text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
Mounting evidence suggests that animals and their associated bacteria interact via intricate molecular mechanisms, and it is hypothesized that disturbances to the microbiome can influence animal development. Sponges diverged from other animals more than 750 MYA and represent one of the earliest branching animal phyla that exhibit symbiotic relationships with diverse bacteria. Over 41 microbial phyla have been found in association with sponges, forming a holobiont that is integral to aquatic ecosystems worldwide. Sponge-associated microbes contain an enriched set of proteins bearing eukaryotic-like domains, and their metabolism supports the host with nutrients. This indicates strong physiological interconnections in the holobiont, which are thought to be modulated by sponge immunity and pattern-recognition proteins. Despite the hypothesized tight physiological integration and ancient origin of the sponge holobiont, the effect of changes in the symbiotic community on the sponge metabolism and morphogenesis remains poorly understood. Here, we show that the loss of a key microbial sponge symbiont correlates with a stark body plan reorganization of the sponge host. This reorganization is coupled with broad transcriptomic changes and includes the modulation of signaling pathways known to be involved in morphogenesis and innate immune response in sponges and other animals. This study provides a combined genetic, physiological, and morphological assessment of the effect of changes in the microbiome on sponge post-embryonic development and homeostasis. The drastic microbiome reorganization and the correlated response observed in the sponge host provide evidence for a coupling between sponge transcriptomic state and the state of its microbiome. Our results suggest that sponges use molecular mechanisms to respond to changes in their microbiome and that the ability to sense and respond to microbiome perturbations has deep evolutionary origins among animals. | <urn:uuid:55a0f14e-8310-47be-934d-131f7512b126> | CC-MAIN-2022-33 | https://sciety.org/articles/activity/10.1101/2022.07.22.501172 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.913531 | 355 | 2.65625 | 3 |
Google began working on the European Union’s General Data Protection Regulation (GDPR) compliance more than 18 months ago.
“It's really important, and we care about getting it right,” Sundar Pichai, chief executive officer at Google, said during the company’s first-quarter earnings calls.
Pichai said Google updated its privacy policies and is committed to meeting long-term requirements on May 25, and the company is working “very closely with advertisers, publishers and our partners.”
When RBC Capital Markets Analyst Mark Mahaney asked whether Google sees GDPR as materially impacting advertisers' targeting capabilities on Google, Sundar said:
“It’s important to understand that most of our ad business is Search, where we rely on very limited information, essentially what is in the keywords to show a relevant ad or product,” -- suggesting that the law will have limited impact for advertisers and publishers.
Gary Kibel, partner at Davis & Gilbert LLP, suggests a slightly different approach. During the MediaPost Search Insider Summit on Thursday, Kibel pointed to cross-device tracking and site visitors from European Union countries as two areas that should be a greater focus for search marketers in terms of GDPR -- all because of the data.
Kibel compared and contrasted some of the U.S. laws with GDPR during a presentation at the summit. He said that iin the U.S., privacy, in general, is regulated by the Federal Trade Commission. Privacy law is governed by one concept in the U.S. -- unfair or deceptive acts, which have been declared unlawful.
In the U.S., some data is only considered personal information for those who are under 13 years of age. In the EU, it’s all considered personal data.
The GDPR has 99 articles that govern privacy. While the law is in effect now, enforcement begins May 25, 2018. And the penalties for not respecting personal privacy are huge. “There will be some serious teeth if you mess up if the regulators choose to come after you,’ he said.
The GDPR also applies to companies not established in the EU when companies process EU citizen data, such as email service providers and companies that target ads and sell goods.
Much of what Kibel spoke about is also applicable to search marketers. The video of Kibel’s presentation can be found here. | <urn:uuid:7bdb92b1-ffca-4cd7-a891-ca76ec1406a2> | CC-MAIN-2022-33 | https://www.mediapost.com/publications/article/318266/gdpr-sharpens-search-marketers-focus-on-cross-dev.html?edition= | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.949324 | 499 | 1.664063 | 2 |
The 2020 Mayo Business Plan Competition took place on Thursday, April 23, 2020. A recording of the competition is available here.
Congratulations to the competition winners, Jake DeGennaro ’21 (mechanical engineering) and Alexander Iorio ’21 (civil engineering) of team The Vortex. The team won the $30,000 grand prize.
The Vortex developed a device of the same name that provides an innovative way of maintaining and disposing waste fishing line. Recreational fishing maintains an important role in sustainable management of resources, economic development, and data collection. It is vital to limit pollution and continue working towards sustainable recreational fishing habits. The Vortex allows recreational anglers a quick and easy way to help limit their environmental footprint and keep our waters pollution-free.
Second place went to Sree Chinta ’22 (biology), Arshya Chopra ’22 (accounting), and Svanik Shirodkar ’22 (computer science) of team EmpowerMe. In third place were Brian Fardman ’20 (health and exercise science) and Alicia Podwojniak ’20 (biology) of team BAC Lock. EmpowerMe and BAC Lock were awarded $20,000 and $10,000, respectively.
Congratulations to all of this year’s participants! | <urn:uuid:62280cab-bd5f-44c1-9ece-151e3c67e0ba> | CC-MAIN-2022-33 | https://mbpc.tcnj.edu/2020/04/23/the-vortex-wins-2020-mayo-business-competition/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.918432 | 275 | 1.773438 | 2 |
Solder Ball Inspection
1. Solder Ball Application Description
Solder ball is a spherical solder that electrically connects between the chip package and the PCB, and is used in the semiconductor packaging process to precisely control the amount of solder. The solder ball has advantages such as superior electrical conductivity compared to the traditional solder application method. But like traditional methods solder defects due to temperature/ moisture/ contaminants, etc. lead to defective products. Since chip packages, which are mainly used for household appliances such as smartphones and tablet PCs, are getting smaller and lighter, the defect detection of solder balls requires a higher level of technology.
2. Stable, In-line and High Speed Defect Detection – Even Shiny Balls
PARMI 3D AOI obtains an accurate height and area data of solder balls through the unique laser profiling technology. Based on the data, it detects solder ball defects such as Insufficient/Excessive solder, Offset, Coplanarity, Bridge, Double ball, Foreign material, Contamination, etc. It utilizes a sensor with a resolution of up to 3.5 × 3.5 μm to realize a clear 3D image even for fine solder balls that require high precision. PARMI’s unique laser profiling technology renders precise 3D images of the highly specular surface, which are difficult to realize with general inspection methods. It is able to precisely inspect even on a warped PCB because it compensates warped base along the PCB surface in real time.
3. Inspection of Components with Solder Balls in JEDEC Tray
When inspecting the solder balls in the tray, PARMI’s dual laser renders precise 3D images without noise and shadow effects. The user can set the ROI (Region of Interest) for the entire tray or array unit. | <urn:uuid:a9e05924-ef1c-4d01-9617-02bb7206a668> | CC-MAIN-2022-33 | http://jp.parmi.com/2022_06_newsletter/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.910727 | 365 | 2.484375 | 2 |
A new approach of identifying mechanical system under-operated is presented in this article. The basic idea
is to spread the extensive least-square algorithm and the Stieglitz and McBride algorithm to the case of under-operated
systems. The considered models are OE and ARMAX type. The comparative evaluation through simulation using
numerical example shows clearly the quality of the identification using this approach compared to the result obtained by
the non-recursive linear least-squared methods. The use of the OE and ARMAX models has made the improvement of
the asymptotic convergence of these algorithms possible.
An elementary mathematical example proves, thanks to the Routh-Hurwitz criterion, a result that is intriguing with respect to today’s practical understanding of model-free control, i.e., an “intelligent” proportional controller (iP) may turn to be more difficult to tune than an intelligent proportional-derivative one (iPD). The vast superiority of iPDs when compared to classic PIDs is shown via computer simulations. The introduction as well as the conclusion analyse model-free control in the light of recent advances.
This article presents a study of non linear state estimation based on invariant preserving observer : l’IUKF (Invariant Unscented Kalman Filter ). Several research works on nonlinear invariant observers have been led and provide a geometrical-based constructive method for designing filters such as the IEKF (Invariant Extended Kalman Filter ) wihle preserving the physical properties and systems symmetries. The developed IUKF estimator suggests a systematic approach to determine all the symmetry-preserving correction terms, without requiring any linearization of differential
equations or compatibility condition. The IEKF and IUKF algorithms are compared on academic case of tilt sensor system. The developed IUKF is then used with an aided Inertial Navigation System (INS). The results show promising perpectives and demonstrate that nonlinear state estimation converges on a much bigger set of trajectories than for more traditional approaches. | <urn:uuid:bd4f22be-2c5f-43ca-96fd-aee0807997f7> | CC-MAIN-2022-33 | https://openscience.fr/Issue-1-326 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.879942 | 434 | 2.265625 | 2 |
The Only Remedy For Sin
Psalm 103:12 — “As far as the east is from the west, so far hath he removed our transgressions from us.”
Two facts in the text do not require any effort to prove: Man is a sinner, and salvation has been provided. But our text teaches that sin sticks, stays by you. You can move from the North to the South; you can move from the East to the West. You may go to distant lands, but your sin goes along with you. You may change your name; you may surround yourself with other circumstances; you may move away thousands of miles from where you have sinned, and yet your sin remains with you. You may reform; you may turn over a new leaf; you may begin to lead what you call a different life, and still your record is exactly the same. You may be haunted by your conscience, you may be convicted by the Holy Spirit; you may drink that which for awhile may bring you forgetfulness: but when you awake from your drunk, awake from your stupor, you will find that your sin will remain with you. The world provides no way for the removal of sin. Sin stays by a man, sin sticks close to a man, sin stays in his memory.
Just a few years ago, in one of our States, we had a man who was the Quartermaster, and who had charge of the clothing of the militia. He robbed the State of something like twenty thousand dollars. It was discovered, and he left the State and went to New Orleans. He took passage on a boat that was going to South Africa with a load of mules for the British army during the war with the Boers, but that man carried his sin with him. Everywhere he went he could say with the Psalmist, “My sin is ever before me.” There he was, away from friends, away from the American authorities; no one knew, but he was having a perfect hell of it because he carried with him the consciousness of his sins. He took passage on a boat, came back to the State where he had committed sin, gave himself up, and he said, “I only had peace when I determined to return and give myself up, and take the penalty of violated law.”
Twelve years ago, in the State of Michigan, a woman was found murdered. They arrested a man, convicted him on circumstantial evidence, and for twelve years he has been in the State Penitentiary. But listen! he was an innocent man. Within the last three months a man went out to the grave where the murdered woman lies buried, stood over her grave, took out a revolver, pulled the trigger, blew out his brains, and sent himself into eternity. When that man killed himself above the grave of that woman he confessed himself the murderer. Why did he kill himself? Why did he go to the grave of his victim? He wanted to make some kind of reparation. Five years had gone by, ten years had gone by, twelve years had gone by, but sin sticks. Sin stays in the conscience, stays in the memory; sin stays on the record of Almighty God; and the memory of that man’s sin drove him to suicide; and Daniel Webster, one of the greatest legal minds America ever knew, once said, “suicide is confession.”
Some time ago in Michigan, a man had insured his barn for a large amount and he wanted money. In the dead hour of the night he set fire to it and it burned to the ground. He collected the insurance, and no one suspected anything. But God knew, and he knew, and that was enough. In the course of time, there was a revival in that neighborhood, and this man went to the altar; and while he was trying to pray, God said, “How about that barn?” He confessed out, went to the insurance company, paid back what lie had received, and God forgave him. But get the truth: confession did not save him; restitution did not save him; these things do not wash away sin; it takes the blood to do that, the shed blood of the Christ of Calvary.
Here is a woman down at the altar. She is screaming and crying to God for mercy. Oh, how she pleads; how she begs! What is the matter? Years ago, way back there, she had sinned. Her husband was a home man, and she was a wife that wanted the theater, the moving picture show, and she went with another man. It was years ago, but the sin sticks. She pleads, oh, so earnestly, and gets nowhere. At the close of the meeting she came to this preacher and asked what she should do. She had sinned; must she tell her husband? I did not say so; I just said, “Mind God.” The next night she came to the altar and prayed through. She had minded God, and was at peace.
Wait a moment. I want you to see that sin sticks, stays with you. Here is a child, a beautiful child. Her hair is curly, and the mother winds it about her finger while the husband, admiring it, looks on. The father takes the little girl on his knees, hugs her, kisses her, and calls her “his own darling child.” Watch the wife; she grows pale, as she looks at the husband. Five years roll along, then ten go by; and the father and husband delights himself in that daughter, growing more and more lovely every day. Every time the husband goes near that daughter, and caresses her, the wife goes from the room and draws her hand across her heart and cries, “O God! O God! shall I tell him, must I tell him?” The child grows to womanhood, and the woman carries her sin with her. She wants to get right with God, and so one day she takes him aside and says, “Husband, that child is not yours; you are not the father of that girl. O God, have mercy on me!” Sin sticks, curses, and will eventually damn the soul unless the sinner takes God’s way.
An official member of the church was walking along one day, and a member of the church came to him and said, “Here is five dollars on the pastor’s salary.” He put it in his pocket and kept it. He went along year after year, but was not right with God. Oh, how many backslidden church members and church officials there are! I just read that there are four million church members in one denomination, and the official paper of that church had a communication that said that not half of them gave anything to missions or church benevolences. The professed church today is the greatest hindrance to the advance of the cause of Christ. This man wanted to get right with God, but he had stolen money in his pocket. When will the church do as they did in the days of the Apostles — select men who are full of faith and the Holy Ghost — not take men because they are sociable, good mixers, or fine fellows? God said to this man, “Pay back that five dollars.” He made out a check, sent the interest along with it, and then God saved him. I was in a meeting some time ago, and a man, after hearing a sermon along this line, sat down and wrote a letter to a railroad official and said, “I rode on your line thirty years ago (sin sticks) and did not pay my fare. I enclose a check for the amount, and ask you to forgive me.” That man got an answer back from the company and also got a blessing from heaven that sent him shouting through the Church, and to his pastor. God never forgets the sin that is unconfessed.
Some time ago I went to a lawyer’s office, and there on his desk I saw a bottle containing ink eraser, and the directions were, “Take this fluid and apply it to the writing. Do not rub it; do not put a blotter on it — just apply it and leave it alone, and every vestige of ink will disappear.” Man has a chemical by which he can erase anything that he may write, but hell never invented nor discovered anything that will blot out sin from the Book of God’s remembrance; but thank God, in the laboratory of the skies it has been recorded, “The blood of Jesus Christ His Son cleanseth from all sin.” Hallelujah! .
You cannot get rid of sin. You may destroy the books, but you cannot get rid of sin that way. God said to Jeremiah, “Get a stenographer. I am going to tell you what you shall dictate to him. Baruch comes at once with his note book, and Jeremiah with one ear toward the skies, looked to the stenographer, and began to say to him, “Write, Thus saith the Lord, Israel shall be destroyed. She shall be carried off into captivity. I will give her for a prey to the king of Babylon.” Baruch read it to the princes. They said, “Sit down and read it in our ears.” Then they said, “Tell us, how didst thou write all these words?” Baruch answered them, “He spake all these words unto me with his mouth, and I wrote them with ink in the book.” Then they said, “Do not say anything about it. Go and hide, and we will show them to the king.” Jehudi reads them to the king, and then takes a penknife and cuts the leaves and burns them; but you cannot get rid of the Word that way. The Word of God is an anvil that has worn out many a hammer, and will wear out all the hammers the modernists and the enemies of God’s Word, can use. God said to Jeremiah, “Take another book and write in it all the former words, that were in the first book which the king hath burned.” Jeremiah dictated the very same words from the Lord, and added thereunto many like words. Say, listen! When you reject God’s message, because it comes red-hot from the throne, God will give a hotter one. You cannot get rid of the Word of God by fire, or knife. You cannot destroy the message that God sends you.
Listen to the Psalmist, “Remember not the sins of my youth.” He is the sweet singer of Israel; he is Israel’s king; he is sitting on a throne; but back there are the sins of his boyhood days. Do you remember the sins of your youth? Do you remember the sins of your young manhood and young womanhood? Some of you folks shudder when you think of the sins you used to commit, and you ought to shudder. God Almighty has the record. As you have advanced in age, you have grown harder and harder. You have rejected Jesus Christ, and God Himself has the record. But hear it, — sin may be removed. As far as the east is from the west, so far hath he removed our sins — my sins — from me. Who said it? David. He knew what he was talking about, the man after God’s own heart. Hear David as he shouts it, “Bless the Lord, O my soul: and all that is within me, bless his holy name. Bless the Lord, O my soul, and forget not all his benefits. Who forgiveth all thine iniquities; who healeth all thy diseases.”
I see a man who has breathed out threatenings and slaughter; I see him bringing men and women bound to Jerusalem; I see him standing by while the first martyr is being stoned to death; but as this man, persecutor and murderer, is on his way to Damascus, he sees a great light, and falls from his horse and hears a voice saying, “Saul, Saul, why persecutest thou me?” He asks God to have mercy on him, and afterwards he writes, “This is a faithful saying, and worthy of all acceptation, that Christ Jesus came into the world to save sinners; of whom I am chief.” Sin may be removed, but it takes God to do it. There is no church, nor minister, nor priest, who can remove sin. “As far as the East is from the West, so far hath He removed our transgressions from us.” We cannot do it.
The world by wisdom knew not God. Job found out two thousand years before Calvary that a man could not cleanse himself. He said, “If I wash myself with snow water and make my hands ever so clean; yet are they not clean.” The world by wisdom knew not God, but thank God, what the world could never find God made known to us. “God commendeth His love toward us, in that, while we were yet sinners, Christ died for us.”
Here is the man who pillowed his head on the bosom of Jesus; who walked with him in loving fellowship for three years; and I ask him, “John, I want you to tell us how much God loves us?” He dips his pen in ink and brings out his parchment and writes, “God So loved the world.” Hallelujah! Hallelujah! God So loved the world. Say, I want to measure the depth of the love of God? and I exhaust all the twine in all the rope factories of the world, and I begin to let it down, and down, and when I get to the end I call on God to give me more twine; and when I have exhausted all the resources of earth, I can never find the depths of the love of God. God So loved us!
Wait. How did He do it? A soldier was captured by the Sepoys. An officer came with two handcuffs and began to put them on the prisoners, wounded though they were. Here is a man dying, and they are going to put them on him. The soldier said, “Sir, you would not disgrace humanity by putting handcuffs on a dying man, would you?” He replied, “I must put them on some one. If I go back with any I will have to give an account of why I take them back. There are just enough to go around. What am I to do?” And the soldier said, “Put two pair on me,” and they did so. Jesus died in our stead. The law said, “Cut him down.” Jesus said, “Let Me die in his place. Let Me go to Calvary.” God so loved that while we were yet sinners Christ died for us. He removes our sins, takes them all away. The Scripture idea is the separation of the sinner from his sins, not the remission of the penalty.
I see the High Priest as he stands before the multitude. The scapegoat is brought out to him. He puts his hands on the scapegoat and confesses the sins of Israel and then a proper man takes that goat and leads it away to a land of forgetfulness, and with it goes the sins of Israel. Today we put our hands by faith on Jesus Christ, and He bears our sins, and carries them all away — “as far as the East is from the West, so far hath He removed.” How far is the East from the West? I want you to follow Halley’s comet, moving at thirty-seven thousand miles an hour. Put a bit in its mouth and a saddle on its back, and start towards the East at thirty-seven thousand miles an hour, twenty-four hours a day, seven days a week, fifty-two weeks a year, ten years in a decade, ten decades in a century, and ten centuries in every millennium, and when you have ridden on your fiery steed millennium after millennium you are still going East. How about the West? If you should go at the speed of a flash of lightning for a million years, toward the West, after you have gone a million years at one hundred and eighty-six thousand miles a second, you would not have yet reached the West, and thank God, “as far as East is from the West, so far hath he removed our transgressions from us.” I am glad I have a mighty Savior, one who can deliver from sin, one who can remove all sin, and make us white as snow. I am glad that God is so much interested in every sinner. If you will meet the conditions, He will remove every sin. The devil has never once had the cheek to tell me that God did not save me many years ago; and I can point him to the very spot where I knew and felt my sins forgiven. He will wipe out every stain that sin has made. I believe in the power of Divine Grace to reach anybody who wants Bible salvation — that wants to find Bible salvation. God bless you, beloved, I want you to know that if you want to go with God there are some folks that are headed that way and who know that they know.
There is a woman I want to see when I get to heaven, and that is Mary Magdalene. I want to see the woman who was the last at the Cross and the first at the sepulchre, the woman to whom was given a commission to preach the risen Christ. I want to see the woman who loved Him so because she was much forgiven. A woman phoned me one day, asking, “Mr. Kulp, would you go and pray with a bad woman?” “Sure I would.” “Would you go and pray with a very bad woman?” “Yes, why not?” “Will you come and pray with the Madame of a sporting house who is dying?” ‘Certainly.” “How soon can you come?” I said, “Wait a moment.” I turned to my wife and I said, “Wife, there is a woman dying, the keeper of a bad house down on Jackson street. How soon can we go?” She said, “As soon as we eat dinner,” and the dinner was ready then. I said to the woman who called me, “I will be there right after dinner and it is all ready now.” After the meal we started off, wife and I, and when we got to the place, I tied my horse to the hitching post, helped my wife out of the buggy, and started towards the door of the place. Going, I passed a Doctor who knew me well and spoke to me. He saw where I was going, and my wife said that he turned his head to watch me. But when you have your wife along you can go everywhere, or anywhere that you ought to go. We went right up to the second floor. I knocked at the door, and a woman came. We went in, and I took a seat. They went to the dying Madame and said, “The preacher is here. Will you see him?” “Yes.” I went in, and prayed with her, and the heavens seemed as brass. I pointed her to Jesus. My wife said to her, “Sister, did you ever hear of Jesus?” “Oh, yes.” Yes, she had, and we left her with Him.
Hear it! I want you to get the thought born out of the great loving heart of God, that whosoever will, may. This Gospel will save the poor and will save the miserable rich, as well, for they need God and are less likely to find Him. The world today has a hold on the rich, as on no others. But I want you to know it, — He saves to the uttermost all them that will come.
“There is a fountain filled with blood,
Drawn from Immanuel’s veins,
And sinners, plunged beneath that flood,
Lose all their guilty stains.”
“Though your sins be as scarlet, they shall be as white as snow; though they be red like crimson, they shall be as wool.”
I want to tell you that every one that is out of Christ needs this salvation. The rich and the poor, the moral and the immoral, the old and the young, all need Jesus, and they may have God by complying with conditions, and meeting God on His terms. How is it with you? Are your sins under the Blood? There is no such thing as a dead past. That is the figment of a disordered brain, whether it was the poet’s who sent it out or of the folks who preach it. Sin unrepented of will accompany you to the deathbed, and to the judgment, and will meet you there unless you are saved through the blood of Jesus. Do you want to know the truth of this text? Are you desirous of getting rid of the past? You may know that you are a child of God, that your name is written in the Lamb’s Book of life, and you may know that you know. How may you? Just let God have His way. Unconditional surrender and faith in God will bring victory. A soldier was dying in a hospital, and he was afraid to die. “Repent,” said the chaplain. “Oh, I do not know what to do.” “Surrender,” said the chaplain a gain, and the poor fellow, just a few hours from eternity, threw up both his hands and said, “Lord, I surrender unconditionally,” and God took him. I was talking, one time, or rather, I was letting Bishop Taylor do the talking, and he was telling of a man in Africa who was dying and they sent for him to come and pray with the dying black. But when he got there the man was dead. Bishop Taylor asked, “Men, what was he saying when he died?” And they told him that he was saying right along, “Oh, Mishwa, I am your man; take me, Mishwa, take me, I am your man.” And I’ll never forget the words of the Bishop, “If Jesus did not take him, He is not the man I think He is.” “As far as the East is from the West, so far will He remove our transgressions from us.” Thank God for the Book that tells us that He will save all them that call upon Him. | <urn:uuid:8d02260d-2b02-470d-8649-23079be6bc67> | CC-MAIN-2022-33 | https://www.raptureready.com/transfigure-10/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.986108 | 4,824 | 1.804688 | 2 |
Henry Emanuel (H.E.) Levy established Levy’s Arcade Oyster Saloon in 1865, at what is today 1316-18 Government Street in Victoria. It stood beside the luxury New England hotel and was at first, one of the poshest dining establishments in town. The restaurant was also one of the earliest to have a liquor license. H.E. was the sole proprietor until 1887.
With the profits from the business, H.E. was able to move his mother and siblings from London to Victoria. After the family had settled, H.E. took his elder brother Joseph (Joe) as a business partner in the restaurant. Soon after, H.E. turned the restaurant over to Joe and left Victoria to pursue other entrepreneurial interests in Seattle and Olympia. He met and married the socialite Eva Rosteinin Seattle. When fires destroyed his businesses there, H.E. returned to Victoria with his wife and two sons. He rejoined his brother as an owner/manager. The restaurant was renamed Levy’s Arcade Restaurant and Chop Shop and later became known as Levy’s.
The partnership between Joe and H.E. was dissolved in 1897-8 so that Joe could follow his mercantile interest during the Klondike gold rush. H.E was the sole proprietor until 1903 when he brought his son Arthur into the business. When H.E. retired in 1907, Arthur became full manager. Arthur sold the business in 1912 and opened the Poodle Dog Café on Yates Street, near Government Street. The new owners of Levy’s were able to keep the restaurant open for a few years, but permanently closed its doors in 1916.
While in operation, Levy’s featured an aquarium built into the front window. It displayed goldfish in one section and imported catfish, crayfish and terrapin in another. Diners could select the fish that they wanted to eat for dinner. The menus were printed as a booklet and indexed at the top. This layout kept the pages from becoming dog-eared and helped people make a selection quickly. There was a large pot-bellied stove in the middle of the restaurant which provided warmth in the winter.
The floor was covered with sawdust and a live parrot and cockatoo added to the ambience. The birds would provide entertainment as they played, squawked and carried on.
There was also a large Regina Corona music box. For a silver 5 cent piece, a patron could make a selection from a variety of operatic pieces which had been recorded onto large steel discs. The restaurant had 12 discs from which to choose.
Linen tablecloths and napkins were imported from Ireland. Dishware came from potteries in Staffordshire, England. The logo of an oyster shell highlighted the words “Levy’s Restaurant established in 1865”. Every three months a ship arrived from England bringing two large crates (each weighing 600 lbs.) of Levy’s tableware. A continuous supply of dinnerware was needed to replace the dishware which had been broken as part of normal use, or stolen for souvenirs.
Levy’s specialized in fish and shellfish as well as ham and eggs, steaks and chops. Local prawns and crabs were served in season. In the early days, pheasant, grouse, quail, trout, venison, and bear meat were also featured. Levy’s imported honey and butter from Wellington N.Z, whitefish from Duluth, oysters and frogs’ legs from Baltimore, oysters from San Francisco, freshwater lobsters and catfish from Portland, crayfish, giant shrimp (weighing about 2-5 lb., also called lobsters) and clams from Los Angeles. Joe found a supplier of oysters from Sooke. Live turtles (weighing about 200 lbs. each) came from Tahiti. Arthur’s children, Manny and Virginia would sometimes ride the turtles in the basement of Levy’s before they were made into soup.
All of the pastries were made in house. Every year a half ton supply of rhubarb, raspberry, strawberries, peaches and plum were delivered and made into jam. Vinegar, dill pickles and sauerkraut were all homemade. Haggis was prepared for Robbie Burns Day. Baked whole Sheep’s Head and cock-o-leek soup were served for St. Andrews Day. Other specialty items included; oyster loaf, chicken loaf, whole suckling pig, salted salmon belly and mackerel. H.E. paid homage to his Jewish roots by featuring traditional delicacies such as gefilte fish, herring, and matzo ball soup on the menu year round.
Excess fats were saved in butter-tubs and traded to the soap factory for bars of soap used for washing dishes. Fifty pounds of meat bones and 6 sheep’s livers were donated daily from the butcher shop. Wholesale prices in 1912 includes: fish (salmon, halibut, cod, sole, and smelt) for a flat rate of 6 cents/pound, eggs: 20 cents/dozen, butter: 20 cents/lb., potato: $16-$20/ton.
Full course meals ranged in price from 25-50 cents. For 25 or 30 cents dinners would receive; bread and butter, soup, a fish appetizer, a full order of fish, roast or stew, a slice of pie and a cup of tea/coffee or a glass of milk. Meals which featured more expensive cuts of meat such as steak, mutton, chops, or ham and eggs cost between 25-50 cents. That order also came with a side of potatoes. One exception to these prices was made. According to Arthur Levy, until 1912, not many drunken people tried to enter Levy’s restaurant. Should one stumble in looking very disheveled, the staff would inform them that it would cost 75 cents for ham and eggs. The person would often respond with “’gor blimey me I can get that somewhere else for a shilling” and leave.
Red and white Italian Chianti were imported directly from Genoa, Italy. Local beer sold at 5 cents a pint, American beer and ale and Guinness ‘stout’ cost 25 cents, all liquors and mixed drinks were 15 cents. The proprietors of Levy’s restaurant wanted their patrons to be able to completely enjoy themselves and their meal without any fear of spending the night in the drunk tank. To that end, the proprietors created, a “toe tag.” This “toe tag,” possibly the precursor to the designated driver, was attached to the clothing
Levy’s restaurant was open 24 hours a day, seven days a week. There were 22 employees who worked 10-hour shifts, six days a week. The kitchen crew were all Chinese, many of whom worked at Levy’s for 20 years. Staff was well paid at $10.50 per week for the day shift and $12.00 for the night shift. A raise of $5 a month was given after one year of service and again each year thereafter. In 1910 The Union came to Victoria to organize the cooks and waiters. H.E. was already paying above the union wage and was happy for his staff to sign up. The union certificate was displayed on the wall. However, many other cafes refused to let their staff organize. The union called for a strike. Employees at Levy’s were required to join the strike to support the Union in their attempts to organize other restaurants. As their employees were already receiving double the union wage, H.E. and Arthur were very angry and called the action a ‘gross injustice.’
Business was sometimes brisk for all of the 24 hours in the day. At its height, the proprietors were able to make a net profit of 35%. People from all walks of life came to Levy’s including the Premier, and other politicians, dignitaries, as well as the staff from the Empress. Arthur remembered that after a “bad” night of fires, the members of the fire department came to the restaurant for T-bone steaks and charged the bill to the city. Arthur’s son Manny would often gamble with the Chief of Police and the Fire Chief in one of the rooms upstairs. Patrons of the theater, the cast and crew from traveling theater companies, dancers and vaudeville acts would frequent Levy’s from 10pm-4am. Passengers on steamships from San Francisco sometimes stayed until dawn. They would return to the ship in time for their passage to Seattle.
Service at Levy’s was efficient. A short order could be cooked and served in 7 minutes. Patrons who didn’t want to linger could be on their way in about 20 minutes. At one point, the Tally-ho, a local sightseeing company, had 6-8 high seated vehicles. Part of their tour included a quick bite at Levy’s which brought 20-30 tourists into the restaurant.
The doors at Levy’s restaurant were only closed one time in 47 years. That occurred when there was a rate war on the steamships on the Victoria-Seattle route. When the fares dropped to 25 cents, thousands of people descended on Victoria. Many of them flocked to Levy’s. When the restaurant was full, the doors were locked. As people left, others were allowed in to replace them.
Levy’s restaurant played an important role in many of the special events held in Victoria. In 1909, a horse racing event was held in Victoria. Many of the owners, jockeys and book makers devoured T-bone steaks at Levy’s. Arthur recalled that the cooks cut up 8 full loins of beef, or about 600 pounds during that weekend. When Dr. S. F. Tolmie was president of the Agricultural Fair, held in the autumn at the Willows Fair Grounds, he treated the visiting rodeo cowboys to a banquet at Levy’s. The cooks at Levy’s would prepare a special menu which featured a 20 lb. Tyee salmon which had been stuffed, baked whole and served on a special platter. In 1887 the United States purchased Alaska from the Russians. Delegates from both countries met in Victoria. They stayed at the Oriental Hotel on Yates Street and ate at the Arcade Oyster and Chop Shop as Levy’s was called then. The ‘champagne flowed like water to wash down the oysters, crabs, steaks and caviar.’
Arthur Levy recalled that at one time there were eight British warships stationed at Esquimalt. Occasionally, in the wee hours, sailors would have a hoe-down at Levy’s. They stacked all of the tables and chairs against the wall, started the music-box, danced and drink for hours. They would then replace the tables and chairs and ask, ‘How much boss?’ The patrons would usually each pay one or two sovereigns (British coins). Some of the sailors needed to sober up before returning to their ship. They retired upstairs to one of the half a dozen small (8 X 10-foot) rooms furnished with 1 bed, a table and a chair. For five cents each, five men would ‘flop’ crosswise on the bed and two would bunk on the floor.
In 1912, after 47 years in the family, Arthur decided to sell Levy’s and open the Poodle Dog Café. Over the years, the restaurant had a number of locations on Yates near Government Street. Arthur sold the cafe in 1941, but it remained popular with the locals and became a hang-out in the 1970’s.
When Arthur owned it, the Poodle Dog Cafe menu items included: soup, halibut, flounder, salad with lobster mayonnaise, eastern oysters, chicken a la Maryland (fried), sweetbread patties, roasted young turkey, prime rib of beef, leg of mutton, Welsh rabbit on toast, assorted Canadian cheeses, browned sweet potatoes, cauliflower, stewed tomatoes, mashed potatoes, oranges, grapes, apples, nuts ,raisins and black coffee.
Arthur Levy also ran The Sandwich Shoppe in the 1930’s. He named the sandwiches after his family members. As his son Manny was uninterested in the restaurant business, Arthur closed the restaurants in the early 1940’s when he retired.
Levy’s Meets Pagliacci’s
Thanks to twists in time, the Levy’s Restaurant of old has met and intermingled with the Levy’s of today. There are some overlaps between Levy’s Restaurant a popular Victoria restaurant located a few blocks away called Pagliacci’s.
When New Yorker Howie Siegel, first arrived in Victoria, he was unable to find the kind of restaurant he was used to from his youth. When they opened Pagliacci’s in 1979, Howie and his brother, David, transplanted a bit of New York to Victoria by featuring a Broadway-style cheesecake, and other classic menu items. Like Levy’s restaurant, Pagliacci’s has become a local favorite as well as a destination for tourists. Both restaurants provided entertainment: live birds and an early jukebox at Levy’s and regular performances by local musicians at Pagliacci’s.
The restaurants also share similar histories. Both had brothers as co-proprietors. When H.E’s brother, Joe, left Victoria, H.E. became the sole owner. He would later take his son, Arthur, into the business. H.E. and Arthur ran Levy’s until H.E. retired, leaving Arthur the sole proprietor. Today, after Howie’s brother, David, passed away, Howie took his son, Solomon, into the business. Solomon is now Paggliaci’s sole proprietor.
Both restaurants had a strong local following and were known by a shortened version of their proper name. Levy’s Arcade Restaurant and Chop Shop was called Levy’s and Pagliacci’s is known locally as Pags.
In 1986, Howie Siegel published an article about Levy’s Restaurant in the Jewish Historical Society Newsletter, now called The Scribe. H.E.’s great grand-daughter, Diana Eva Lofstrom still has a copy of the article in her files. Diana’s daughter, Danise, and her husband, Jeff, created Bruinwood Estates, a craft distillery specializing in Vodka and Gin. On a selling trip to Victoria, Danise stopped into Pags. She and Solomon discussed their mutual family history as restaurateurs. As a result, Pags now offers some selections of spirits from the Bruinwood Estates. And, iconic legacy pioneered by H.E. Levy still thrives today with gusto at its New York style equivalent in downtown Victoria.”
Information for this article came primarily from sources and photos provided by Arthur Levy’s granddaughter Diana Eva Levy Lofstrom. | <urn:uuid:80d8425b-df98-4a77-b25e-161678d3355b> | CC-MAIN-2022-33 | https://jewishvictoria.wordpress.com/jews-in-early-victoria/levys-restaurant/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.978372 | 3,193 | 1.765625 | 2 |
An on-line game is generally a video game which is mainly either greatly played over the Web or a few other computer network existed worldwide. Today, one can play his favored online video games from any type of corner of the globe. Earlier people made use of to play their preferred games via physical media such as CDs or tapes. Nonetheless, these media were rather costly as well as additionally the video games had a bad quality. As a result, it was required to discover an additional way of playing them.
The initial step in the direction of opening up brand-new avenues for video gaming was to seek a brand-new platform for them. Since the Internet had already ended up being common amongst the common people, there was no need to await others ahead up with an appropriate system. Thus, the first option available for gamers to play their favorite games online was the Net. Xbox and Play terminal was the initial video gaming consoles to be launched on the market. Star Trek Fleet Command Online No Download
This resulted in a huge change among the youngsters, who liked to play on-line video games. This fad boosted the appeal of the Net, as they started to recognize the importance of the Web to help them execute their tasks. In this era of Infotech, it was easy to access the Net from any kind of location. Hence, the young people found it convenient to access the pc gaming atmosphere. Not only did the young people locate the video gaming setting entertaining, but they additionally discovered it simple to communicate and also fraternize each other.
Furthermore, one more benefit of the Internet helped to introduce enhanced reality into the pc gaming setting. Augmented truth is the modern technology of presenting basically anything on the computer system screen utilizing the assistance of graphics. This was the prerogative of game games, but when the Internet got in the picture, it supplied an opportunity to present realistic graphics. After the introduction of the Internet, pc gaming started relocating into the virtual dimension. Numerous online video gaming websites began offering their favorite games in the digital globe, which offered a much better experience to the gamers.
This was the moment when social networking began ending up being popular among youths. Every person was discussing something, and now the on-line gamers wanted to utilize the internet for the same function. They utilized the Internet to review science and modern technology, style art as well as layout versions, solve clinical problems, interact in teams and also join different activities. All these activities were possible just when individuals and also their computers became part of the online atmosphere. Therefore, partnership and team job ended up being unpreventable in the virtual setting.
The primary reason why firms started to approve the idea of going on the internet for business functions was due to the fact that they understood that the youngsters are going on the internet for various objectives, which would ultimately help them sell their services and products. Therefore, they started supplying individual details of their clients, so that these young people can contact them. Later on, it arised that companies would acquire these individual info for promoting their organization. Nevertheless, this method brought the rage of the personal privacy supporters that did not like these individual details being liquidated to any type of entity. Thus, this pattern did not go very well.
Nevertheless, with the video game developers thinking of very engaging and also enormously multiplayer video games, these video games indirectly advertised the principle of online gaming. It indirectly advertised the concept of on the internet organization based upon online worlds. These massively multiplayer video games are based upon a globe as well as the entire earth where youths from all over the world can communicate with each other, develop their friendship, work together and also become buddies. Therefore, this idea of on-line video gaming came to be exceptionally preferred with everybody, particularly with the younger generation. Call Of Duty Mobile Bluestacks Hack Pc
There are many games offered online, and also a lot of them have a multiplayer mode. In this mode, there are a number of players at a single table. Numerous gaming sites permit one to play against each other or compete with others in a multiplayer video game; a few of these internet sites even permit a free multiplayer alternative in which players can take another individual as a close friend and also interact to finish the game.
Games for the mobile system remains in a sense a more affordable choice to the development of premium gaming consoles. They provide a means for more youthful individuals to appreciate their favorite leisure activities without having to invest a great deal of money. With even more young adults investing hrs at a time having fun portable games, firms are delving into the mobile pc gaming scene by establishing more cost effective handheld games for players. These games are created to be used any modern smart phone and can be acquired at practical rates.
Another remarkable aspect of online gaming is the surge of computer games. The appearance of broadband innovation has actually opened the possibility of gamers having the ability to attach to the world wide web no matter where they are. This suggests that gamers no more have to have a specific gadget to play on. With broadband innovation also comes a new age of mobile devices that allow gamers of any type of age to play on the go.
In the previous researches we have looked at the effects of loneliness on individuals experiencing on the internet game addiction. In this paper we now take a look at the results of loneliness on people that are not dealing with the condition. It is located that isolation does not trigger the same level of modification as the visibility of on-line gaming. People that are lonesome normally have less possibilities to interact with other individuals. This can have a negative result on their health, as it can result in clinical depression as well as solitude. However, there is one significant exception to this. Dbz Dokkan Battle Hack Tool
Gaming consoles are an additional instance of how playing online can have an indirect influence on health and wellness. Players can still experience the incentives that multiplayer pc gaming provides such as social interaction. This is specifically true with the intro of consoles such as the Xbox 360 and also the Move. There is also an arising market for mobile gaming, where phones that permit users to play games on the move are becoming progressively popular. As this continues to occur, we will certainly look for a boost whens it comes to solitude and also net dependency. | <urn:uuid:044f0a7b-af56-48c2-9dca-aa9cd6e6c687> | CC-MAIN-2022-33 | https://wittgallery.com/2021/08/09/just-how-will-certainly-online-game-remain-in-the-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.971821 | 1,274 | 2.265625 | 2 |
Bajhat Abdulwahed has a face familiar to many Iraqis. On occasion, he's even recognized here in Philadelphia, half a world away. His wife, Hayfaa Ibrahim, tells a story of how a group of his English-language classmates once approached him. “One of them [said], 'I know you,'” she explains. “'I have seen your face. But where, I don’t know. Tell me please, what’s your name?'”
People recognize Abdulwahed because he was a news announcer for three decades on Iraqi state TV and radio. He read the news as bombs fell on Baghdad during the Iran-Iraq War.
But those moments of recognition are rare. Indeed, for some refugees, starting over from scratch means going from being minor celebrities in their home country to being completely unknown in their new country. When Abdulwahed’s classmates realized who he was, “They were shouting, 'We know you! You are here in Philadelphia with us?'” his wife says.
Today, the couple live in a small apartment in northeast Philadelphia.
Following the US invasion of Iraq and more violence, Abdulwahed started receiving threats because of his public profile. In the mail one day, he received an envelope with two bullets: one apparently meant for him, the other for his wife. They fled to Jordan after a second envelope came and got permission to come to the United States in 2009.
“Many people said to me, 'Oh, in Pennsylvania there are many studios, many TV, many newspaper,” Abdulwahed says.
He thought he would go to work. “I [was] very happy,” he says. But it turns out no Arabic-language TV is produced in Philadelphia. Plus, Abdulwahed’s health had deteriorated, limiting his options. He travels with an oxygen tank.
“I am old man now, but I feel sometimes now I am ready to read news or to do everything I can,” he says. “When I sit, I can work for five, six months.”
It’s a sense of displacement many retired people can feel and that some refugees feel even more strongly.
The couple have made a small community of friends, mostly Arabic-speaking refugees: Palestinians, North Africans and a few Iraqis like the men who recognized Abdulwahed at his English class. His wife says that she gets emotional when she makes new friends here. “Myself, I cry. I cry because it's nice to be to have friends this way from the same country even if we have been in our country maybe we don't know them. But when we are in the [US] we are now friends with them,” she says.
In their home, they also have a set of beautiful, leather-bound books Abdulwahed wrote about Arabic grammar. After he retired from the news business, he taught young Iraqi broadcasters formal Arabic and how to present themselves on air. Every couple of weeks, he still gets emails from students in Baghdad with questions about classical Arabic. He writes back and jokes with them that his Arabic is getting rusty now that he’s in the US. “I forgot my language because I am American now," he tells them. "They say, 'No, you are still our teacher.'”
He’s working on his English. He knows he makes mistakes, and that’s OK in his second language. But it's a different life for this former news broadcaster, who now spends his life quietly watching the news from Iraq read on television by someone else. | <urn:uuid:3a46d881-f155-4f2d-80d1-556c4574ffb9> | CC-MAIN-2022-33 | https://theworld.org/stories/2015-12-14/former-walter-cronkite-iraq-now-living-unknown-philadelphia | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.985929 | 779 | 1.625 | 2 |
Figure 1 depicts the surface observations at 8:00 am EDT, which shows a cold front off the northeast coast of the United States. This front moved across Massachusetts in the early morning hours of September 16th, which ultimately led to this tornado.
The Scituate, MA F1 tornado of September 16, 1986 impacted Plymouth County in Massachusetts. According to NOAA (2019), the F1 tornado caused no fatalities or injuries, but caused $250 thousand dollars in property damage. The tornado touched down near Porter Road at 5:35 am EDT. The tornado travelled for 0.1 mile and had a maximum width of 50 yards.
NOAA Central Library. (2020). U.S. Daily Weather Maps. Tuesday September 16, 1986 [PDF]. Retrieved from https://library.noaa.gov/Collections/Digital-Collections/US-Daily-Weather-Maps
NOAA National Centers for Environmental Information (2020). Storm Events Database. Retrieved from: https://www.ncdc.noaa.gov/stormevents/ | <urn:uuid:6dc07608-4586-416a-a036-30cf501a5d44> | CC-MAIN-2022-33 | https://highwaysandhailstones.com/tornado/scituate-ma-f1-tornado-of-september-16-1986/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.900702 | 214 | 3.359375 | 3 |
Collaborative adaptive management (CAM) has shown great promise for addressing complex natural resource management problems but the transition from promising theory to effective practice has been challenging (Mitroff and Featheringham 1974, Catton 1989, George 1995, Miller 1999, Susskind et al. 2010, Spradlin 2012, Chevallier 2016). The difficulty in implementation is largely because of the great complexity of the problem situations considered suitable for CAM. Such situations do not consist of isolated decision processes through which a single actor (or a limited set of actors) addresses a single problem. Instead, they are evolving situations in which many interconnected actors are engaged simultaneously in many overlapping and interrelated but commonly poorly interconnected decision processes that address different sets of problematic conditions at various organizational and governmental levels, and that are constantly being adjusted in response to events. In short, a common characteristic is that both the systems being managed and the management systems themselves are complex adaptive systems. In addition, such systems continually change so interventions meant to influence them must also change continually, and practitioners must frequently adapt and redevelop their plans in response to systems change (van Bokhoven et al. 2003, Shiell et al. 2008, Sugihara et al. 2012).
The complexity of the management system presents particular challenges for practitioners responsible for project planning. Development of an effective action plan requires identification of potential interventions that are both likely to have an impact and be practical in that particular social-political context. Because human behavior change is almost always needed to resolve complex natural resource management problems, human behavior needs to be an intervention target. This is not easy for most natural resource management practitioners; the majority come from biophysical science backgrounds with training in how to work with those elements of the system of interest, i.e., the ecological parts of social-ecological systems. They typically lack background and experience in addressing human behavior, i.e., the social parts of these systems, and few resource management professionals have access to training in how to understand and influence the problem-relevant behavior of individuals and groups. There is a need to translate promising research findings into practical guidelines that are written and organized in ways that make it relatively simple for practitioners to integrate into their work. For CAM concepts to have real impact in the world, practitioners have to be both willing and able to apply those concepts in real-world settings.
The results of descriptive-analytical research (Weik and Lang 2016) associated with projects is not typically available to participating resource management practitioners early enough to influence project planning. When available, the information is often not in a form that is usable or useful to those responsible for actions that have a direct impact on the problem situation. The academic literature currently provides little guidance for practitioners, and there has been only limited translation of theory-driven guidelines into practical and readily useable recommendations for project managers (Allen and Garmestani 2015). This guidance gap has not gone unnoticed. For example, it is been noted that existing human dimensions research has not been fully utilized in recreational fisheries management, and this utilization gap appears to be widening (Hunt et al. 2013).
Similar translation and implementation challenges are shared by many applied social science and transdisciplinary fields of research that focus on interventions aimed at changing individual and collective human behavior. It has been acknowledged that standard approaches to project planning and management are not well-suited to situations characterized by uncertainty, complexity, and the need for innovation (Kapsali 2013, Mahmoud-Jouini et al. 2016). In response, new approaches and tools have been developed in several applied fields for strategic planning in such situations. I suggest that these can be of value to natural resource management practice.
In a recent paper (Beratan 2019), I discussed how natural resource managers setting up a CAM project can enhance that project’s likelihood of success by committing more time and attention to the very first steps in getting a project underway. That paper introduced an exploratory problem assessment (EA) approach designed to help managers learn about a problem situation quickly to usefully inform project planning. Exploratory problem assessment assists managers to quickly obtain information needed to develop an appropriate initial problem definition without antagonizing potential project participants, and then integrate and present that information in a readily understandable conceptual model that is useful for strategic planning.
In this paper, I delve deeper into one aspect of the EA process, i.e., how to organize information about human behavior that is specifically relevant to the problem situation so that it can be integrated into the EA conceptual model and inform project planning. I base my approach on insights emerging from applied social science fields that focus on fostering changes in human behavior, including public health and health promotion, social work, sustainability science, and transition management, along with methods and approaches from intervention design and social marketing. Areas of overlap among these fields provide opportunities for exchanging practical lessons for achieving directed system change.
I focus particularly on the subfield of intervention research, which was developed to assist with program development in applied social science fields. I suggest that intervention design strategies and tools can help natural resource management practitioners increase their practical understanding of the specific human factors shaping their particular problematic situation, thereby enabling more realistic and effective change theories that can improve project outcomes. They can also assist in developing leading indicator metrics capable of tracking a program’s progress in a time frame permissive of adjusting the management plan.
“The planning process is about changing the expected future by changing the links between the present and the future” (Abbott 2005:245).
The purpose of a collaborative adaptive management process is directed system change, i.e., altering the dynamics of a particular social-ecological system in ways that shift it away from a problematic trajectory toward a more desirable one. Accomplishing this requires that individuals and organizations take actions that are capable of altering one or more factors shaping the system’s dynamic behavior. The design of an effective response to a problematic situation thus requires an accurate general understanding of relevant determinants of change that explain how a particular action or event would cause change (van Bokhoven et al. 2003, Craig et al. 2008, Fraser and Galinsky 2010, Funnell and Rogers 2011). In other words, it requires a change model or theory of change (Maxwell 2004, Patton 2011, Gilgun and Sands 2012).
The term “theory of change” is used to describe the sequence of outcomes expected to occur as a result of an intervention (Weiss 1995). Theories of change are derived from assumptions about how the system of interest responds to interventions, actions, or perturbations (Margoluis et al. 2013, Qiu et al. 2018). Logic models and results chains are the most common representations of change theories (Margoluis et al. 2013; Fig. 1). Logic models are required by many funding agencies to show the relationships among an applicant’s resources, planned activities, and expected results. However, logic models are not particularly appropriate for complex problem situations because they generally consider only a limited set of factors while leaving out important contextual information, and they do not adequately show how specific actions are expected to lead to expected outcomes (Rogers 2008, Margoluis et al. 2013). Other change theory representations such as results chains have been developed to address these limitations. A results chain is a diagram depicting a series of “if...then” relationships, the assumed causal linkages between an intervention and the expected impacts, through a series of expected intermediate results (Foundations of Success 2009). Results chains have been used effectively in natural resource management projects. However, effective results chains require significant up-front work to identify targets, threats, and driving factors and to figure out appropriate intervention strategies (Margoluis et al. 2013). Practitioners need assistance with this up-front work; intervention design strategies offer some practical guidance.
Human behavior is a major (if not “the” major) determinant shaping change in social-ecological systems, and so changes in human behavior are almost always needed to direct system change toward a particular trajectory. This means that change theories for CAM projects need to focus on factors shaping the behavior of relevant human actors and how those link to the resource system.
Insights into how to better integrate human behavior into causal models can be drawn from research and practice in applied social science fields such as social work, public health, and health promotion that focus on fostering changes in human behavior. Researchers in these fields recognized by the early 1990s that problems such as drug addiction have multiple causes, pathways, and correlates, and so efforts to address such problems must involve multiple program components that address dynamic risk factors across multiple groups and levels (Cázares 1994, Hawe 2015). The subfield of intervention research was developed to explore ways to tease out the complex factors at multiple levels that shape specific behaviors, and to learn how practical actions with the potential to foster positive changes can be identified.
An intervention has been defined as “a specified strategy or set of strategies designed to change the knowledge, perceptions, skills, and/or behavior of individuals, groups, or organizations, with the goal of improving...outcomes” (Clauser et al. 2012:127). More generally, interventions can be thought of as efforts to introduce planned change into social systems (Schensul 2009) or as purposively implemented change strategies (Fraser and Galinsky 2010). In this sense, rather than being simply a package of actions, an intervention is a critical event in a system’s history from which new structures of interaction and new shared meanings evolve (Hawe et al. 2009).
Until recently, the term “complex intervention” was applied to any intervention built up from a number of components that may act interdependently (MRC 2000). Many intervention design and evaluation researchers have shifted toward thinking of complexity as a property of the systems being targeted by the intervention rather than of the intervention itself (Shiell et al. 2008). Informed by complexity science and ecosystem studies, this new approach recognizes that interventions in complex adaptive systems need to target multiple levels because determinants at multiple scalar, temporal, and governance levels interact to influence human behavior and health outcomes (Eoyang 2006, Hawe et al. 2009, Clauser et al. 2012, Weiner et al. 2012). In such a context, simple consideration of the merits of individual interventions is insufficient. Instead, sound causal reasoning about the likely interactions among the combined interventions is needed (Weiner et al. 2012). Given the difficulty in determining causality in complex adaptive systems, the intervention design process needs to be iterative and adaptive (Gilgun and Sands 2012).
Intervention design usually involves consideration of three basic elements: interventions, targets, and settings. The intervention is the set of actions to be taken. An intervention target is a determinant (causal factor) that the intervention is intended to modify. The targets of interventions are human behaviors, characterized in terms of scope or level of influence. Levels of influence shaping human behavior include intrapersonal (biological, psychological), interpersonal (social, cultural), organizational, community, and policy (e.g., McLeroy et al. 1988). Bronfenbrenner’s classic model of social systems describes several subsystems among levels (Table 1): a microsystem (the immediate environment such as the home, school, and neighborhood), the mesosystem (the interrelationships between various settings within the microsystem), the exosystem (mass media, extended family, social services, etc.), and the macrosystem (cultural ideologies and attitudes; Bronfenbrenner 1979, 1986, Bronfenbrenner and Crouter 1983). Corresponding levels can be identified within ecological systems.
Behaviors at one level can be influenced by factors at multiple levels, so a critical part of multilevel intervention work is consideration of the levels that are to be targeted by the intervention (Natasi and Hitchcock 2009). Environmental or policy factors at the organizational, community, state, and national levels are often important to specify as mediators and moderators of behavioral or system-level interventions (Clauser et al. 2012). An intervention setting is the social system in which the intervention target is reached; like targets, intervention settings can range in scope (Weiner et al. 2012).
The basic organizing structure of intervention design can be summarized as: intervening actors take actions intended to cause modification of the behavior of targeted actors leading to improvement in the conditions of interest. In other words, the actions making up the intervention are intended to cause (e.g, enable, encourage, trigger) a shift in the particular behaviors of individuals, groups, and organizations that are hypothesized to drive the key processes shaping the emergent conditions of interest.
Actors are social entities (individuals, groups, organizations, communities) that have some ability to influence the system of interest, either directly or indirectly. Actors can be considered a subset of stakeholders, a category that also includes social entities that have an interest in the system but lack ability to influence the system. For CAM applications, I recognize two basic categories of actors; intervening actors, i.e., individuals, groups, and organizations who need to be actively involved in planning and/or implementing the intervention, and targeted actors, i.e., individuals, groups, and organizations whose behavior is the focus of the intervention (Table 2). Because complex, multilevel interventions include multiple actions, there is likely to be considerable overlap in these two categories, with a given actor being among the targets of one action while also needing to be involved in implementing another action. It is important to keep in mind that the goals of an intervention project will not exactly match those of key actors, and the goals of organizational actors will not exactly match those of the individuals representing them. The intervention design must balance among various and potentially competing goals to obtain and maintain actors’ productive engagement with the intervention project.
Three basic categories of roles are available for intervening actors in CAM applications. Project planners are actively engaged in project initiation and planning and will help design the intervention. Project implementers carry out the actions specified in the intervention’s action plan. Project influencers influence the planning process through provision of important guidance and oversight or through their likely response to the planned action, but do not play an active role in intervention design or implementation.
Because individual and collective human behavior is the most important factor shaping system dynamics in CAM and other integrative research applications, the determinants (causal factors) of most concern to intervention designers should be factors that influence (mediate or moderate) the behavior of targeted individuals, groups, and organizations, and the paths through which those behaviors shape the system’s emergent structure and dynamics.
Individual and collective behaviors are influenced by a very wide range of determinants. Among the factors reported in the literature as needing to be taken into account when designing interventions are:
Plummer (2009) presented an analytical framework that can assist in exploring the social processes involved in adaptive comanagement. Two categories of determinant variables are distinguished: exogenous, originating outside the CAM actor network, and endogenous, originating within the CAM actor network (Table 3). Endogenous variables can be altered by actions taken by members of the network and thus are particularly important for intervention design. Exogenous variables influence the real or perceived circumstances of the actors involved and thus provide important context for understanding the dynamic interactions among endogenous variables and the consequent impacts on the system. These variables appear to be especially powerful in catalyzing the process early on (Pinkerton 1989, Plummer and FitzGibbon 2004). Intervention designers need to distinguish between these two types of factors so that they can focus resources on the influenceable determinants and treat unalterable contextual determinants as design constraints. For example, factors such as regional weather patterns and federal regulations can constrain the options available to regional and local actors. Leverage points to consider as intervention targets would be endogenous variables for which a relatively small action (input) is likely to produce a disproportionately large response (output).
The existence and importance of particular determinant-behavior relationships must be inferred on the basis of assumptions, as are the expected impacts of those behaviors on the system. Critical assumptions may be explicit or implicit; an important task for intervention researchers in a given situation is to “daylight” actors’ implicit assumptions so that they can be explored and tested. It is useful to differentiate between necessary, sufficient, and contributory causes (Rouse and Serban 2011). In addition, it is useful to distinguish between factors that can and cannot be influenced through actions within the scope of the project.
Some methods for interrogation of intervention logic have been developed (Hawe et al. 2009). For example, intervention mapping was developed as a systematic method of linking problem analysis, program design and evaluation, and integrating theories and scientific evidence in the design in health promotion interventions (Bartholomew et al. 1998, 2001). Hawe et al. (2009:269) observed that intervention mapping and other similar approaches are potentially productive but may simply represent “more meticulous ways of doing the same thing” by focusing over simplistically on the “package” of activities and/or their educational messages, just like conventional thinking about preventative interventions. As an alternative, they suggested focusing on the dynamic properties of the context into which the intervention is introduced, including the nature and diversity of activity settings in the system and the strategic positions occupied by key actors. Their approach draws attention to the networks of social relationships that make up the system, the variety of roles that exist or can be created within those networks, and the meaning that different actors might attach to an intervention event. This information can be more clearly and usefully presented in graphic form as the diagrammatic results chain than in a textual description.
These various approaches and methods highlight important considerations and show promise as tools for gaining useful understandings of a range of complex problems and potential solutions. However, they have had only limited influence on real-world applications beyond their original social work and health promotion contexts. Implementation challenges are greater for sustainability and natural resource management applications, which tend to have vaguer and more contentious goals, more complex and subtle causal relationships with more cross-scale and cross-sector links, greater misalignment of scale and timeframe between key dynamics and available governance mechanisms, and a kaleidoscope of influences from a wide array of past and current interactions that a new program must find a place within.
I have adapted the concepts described into an organizing structure for deriving and displaying contextualized causal relationships within a problem situation using readily understandable conceptual models of the problem space. These diagrams show relevant system elements (polygons) and critical linking relationships (arrows) that correspond to the categories listed in Tables 2 and 3. Categories of elements and linkages are differentiated by differences in object shape, line style/width, and color of elements and arrows (Fig. 2). These graphic elements function as a form of grammar that can be used to capture and convey information about complex causal relationships (Beratan 2019). These diagrams can be considered a variant of results chains, distinguished by the more structured graphic grammar used to enhance interpretability. The resulting conceptual models, such as the example described below, are designed to be of practical use for the selection and design of interventions in CAM projects.
An example application of the organizing structure described comes from a 2011 land-use planning effort in eastern North Carolina. The Governor’s Land Compatibility Task Force was charged with developing recommendations for “maintaining and enhancing the military presence in North Carolina through preservation of land uses that are compatible with the military mission and that also preserve and sustain economic development and natural and cultural resources” (NCDENR 2012:1). In other words, they conducted strategic planning to design a collaborative, integrative, and complex intervention. The task force comprised representatives of the major actors with responsibility for preservation and conservation of undeveloped land (Table 4) including state agencies, local governments, and military installations. The military is one of the two top economic sectors in the state, with the other being agribusiness (food, fiber, and forestry industries). The state’s natural systems are the basis for economically important tourism/outdoor recreation and fisheries industries and provide irreplaceable ecosystem services. Development is a common threat to these three economic engines; development pressure has been growing in eastern North Carolina in recent years largely in response to expansion of the military missions of Camp Lejeune and Fort Bragg,
As is typical of sustainability projects, this planning effort was just one small step in a larger, longer term process. This was clearly understood by the process participants and in fact the particular goal of this process was to set the stage for and shape a longer term process that would directly address the problem. Also typical was the relatively short time period allotted for this planning process.
I assisted the project manager and served as technical writer of the final report, functioning in the roles of knowledge intermediary and process facilitator. I applied the intervention design organizing structure summarized in Table 1 and Figure 2 to develop a conceptual system model (Appendix 1) to assist with strategic planning. I obtained information about the project from three main sources: unpublished written reports, informal interviews with project leaders, and task force meetings during which information was exchanged among participants.
In my note taking, I followed the organizing structure presented in this and my previous paper (Beratan 2019) to represent assumed or observed causal linkages in the form of short graphic sentences. These formed the building blocks for conceptual models of the group’s collective change theories. Interim and final diagrams were checked for reasonableness and relevance by having them assessed by the project leader and two other leading participants. I used the conceptual model summarized in the model to help identify feasible mutual benefits options, suggest appropriate metrics for tracking progress in implementation, and to guide preparation of the final report submitted to the governor at the conclusion of the intervention design process. Companion graphic representations of aspects of the recommended plan of action were also created to assist with outreach, implementation, and evaluation when it was time for the process to move forward.
Two major benefits were realized through this intervention design process. First, the organizing structure guided my information search, serving as a filter that permitted me to sort through a large amount of information and identify the most important elements and relationships in a limited time period. This allowed me to integrate relevant information from all sources at a level of detail that was appropriate to the project and to focus information I provided to the task force on elements critical to the project. Second, the process was useful in helping me organize the final report to make a strong case for the interventions selected and to lay out a clear path forward from this planning effort to implementation.
The most valuable outcome of the project as a whole was more open communication among the project partners, which led to a greater understanding of each other’s missions and constraints. This allowed the task force to successfully developed a joint-benefits strategy and implementation plan for state-wide prioritization of land-use protection targets that was strongly supported by primary decision makers in all of the partner organizations. The final report outlining the plan, the first of its kind in the United States, was presented to Governor Beverly Perdue in May 2012. Unfortunately, the plan has not yet been adopted by the governor and general assembly as a consequence of changes in political priorities following the 2010 and 2012 elections. Despite the disappointing political outcome of the process, the project succeeded in achieving enhanced cooperation among the partners on this issue for several years.
The exploratory problem assessment approach presented here and in Beratan (2019) was developed from a transformational perspective with the practical goal of assisting project managers to increase the effectiveness of their CAM project planning. The intervention design concepts focus on integrating specific individual and collective human behaviors into change theories in ways that are directly useful for project planning and evaluation. The approach begins with the recognition that the behavior of specific actors who can affect outcomes needs to be factored into change theories. Based on my experience, the particular network of relationships between people, power, and influence in a given problem situation are the critical determinants of what gets done and how it gets done.
The multilevel approach presented provides an integrative modeling process that can be done by or for a CAM project manager with a minimum of facilitation. It provides information directly relevant to project planning: conceptual models based on this integrative approach can help natural resource managers gain a more complete overview of the complex and dynamic causal pathways responsible for problematic conditions. These models can help daylight assumptions and highlight potential leverage points. In addition, these causal models can guide the development of evaluation metrics that can usefully inform partners, stakeholders, and funders about the project’s progress and impacts quickly enough to permit modification of the plan if needed.
The EA process can serve as an aide to sensemaking (Weick et al. 2005), which “refers to how we structure the unknown so as to be able to act upon it” (Ancona 2012:3). The EA process can enhance articulation (Benner 1994, Winter 1987), a particularly important aspect of sensemaking, which is defined as “the social process by which tacit knowledge is made more explicit or usable” (Weick et al. 2005:413).
The EA process is highly flexible and can be used in many ways. For example, in my experience it is rare for the complete conceptual model to be widely circulated. Instead, I have found that project leaders make use of it for their strategic planning and then request specific communication products based on the diagram as needed to meet the specific needs of a particular audience and purpose.
The academic intervention terminology adopted is technical and can be off-putting for stakeholders. Nonetheless, the basic concepts are readily understandable to nonspecialists both because humans are predisposed to perceive causal relationships and, as noted in Beratan (2019), a diagrammatic presentation using information design principles can readily convey quite complex relationships. A conceptual model constructed using the exploratory problem assessment’s graphic grammar can be particularly effective in communicating causal hypotheses to diverse stakeholders and can serve as a change theory, guiding project planning and evaluation in complex problem situations.
In conclusion, I show how CAM practice can benefit from insights derived from intervention research and other tools from the applied social sciences. I focus particularly on how to organize information about human factors that is specifically relevant to the problem situation so that it can be integrated into the exploratory problem assessment conceptual model. The resulting graphic representation, codified in the graphic grammar presented here and in Beratan (2019), is designed to be a practical and useful tool that can help diverse participants share information and gain a more complete and shared understanding of the problem situation. The EA approach affords the positive features of results chains while further enhancing the usability and timeliness of the results for facilitation of strategic planning and project evaluation. The approach and objectives draw from Weik and Lang’s (2016:32) “transformational” research stream, which focuses on “providing evidence for how successfully to intervene in sustainability problems in order to resolve or at least mitigate them.”
The organizational structure I present here and in Beratan (2019) can be successfully used by any natural resource practitioner as a guide for gathering and filtering information. Because the approach is structured around causal relationships, it can help individuals and groups focus on specific and feasible pathways to desired outcomes rather than on information that is not relevant to the problem being addressed. As noted in Beratan (2019), greater value can be obtained by engaging a process facilitator to conduct a full exploratory problem assessment at the start of a planning process. A suitably trained process facilitator can conduct the assessment process quickly and cost-effectively.
Much of the work presented in this article was done while the author was a member of the Research Faculty at North Carolina State University. Special thanks to Jim Berkley, Jennifer Pratt Miles, and other members of the Collaborative Adaptive Management Network (CAMNet) Core Group for their encouragement and many thought-provoking conversations. Thanks also to two anonymous reviewers who provided thoughtful comments that greatly improved the paper.
Abbott, J. 2005. Understanding and managing the unknown: the nature of uncertainty in planning. Journal of Planning Education and Research 24:237-241. https://doi.org/10.1177/0739456X04267710
Allen, C. R., and A. S. Garmestani. 2015. Adaptive management. Pages 1-10 in C. R. Allen and A. S. Garmestani, editors. Adaptive management of social-ecological systems. Springer, Dordrecht, The Netherlands. https://doi.org/10.1007/978-94-017-9682-8_1
Ancona, D. 2012. Sensemaking: framing and acting in the unknown. Pages 3-19 in S. Snook, N. Nohria, and R. Jhurana, editors. The handbook for teaching leadership: knowing, doing, and being. Sage, Los Angeles, California, USA. [online] URL: https://www.sagepub.com/sites/default/files/upm-binaries/42924_1.pdf
Bartholomew, L. K., G. S. Parcel, and G. Kok. 1998. Intervention mapping: a process for developing theory and evidence-based health education programs. Health Education and Behavior 25(5):545-563. https://doi.org/10.1177/109019819802500502
Bartholomew, L. K., G. S. Parcel, G. Kok, and N. H. Gottlieb. 2001. Intervention mapping: designing theory- and evidence-based health promotion programs. Mayfield, Mountain View, California, USA.
Benner, P. 1994. The role of articulation in understanding practices and experience as sources of knowledge in clinical nursing. Pages 136-156 in J. Tully, editor. Philosophy in an age of pluralism: the philosophy of Charles Taylor in question. Cambridge University Press, New York, New York, USA. https://doi.org/10.1017/CBO9780511621970.011
Beratan, K. K. 2019. Improving problem definition and project planning in complex natural resource management problem situations using knowledge brokers and visual design principles. Ecology and Society 24(2):31. https://doi.org/10.5751/ES-10815-240231
Bronfenbrenner, U. 1979. The ecology of human development. Harvard University Press, Cambridge, Massachusetts, USA.
Bronfenbrenner, U. 1986. Recent advances in research on human development. Pages 287-309 in R. K. Silbereisen, K. Eyferth, and G. Rudinger, editors. Development as action in context: problem behavior and normal youth development. Springer, New York, New York, USA. https://doi.org/10.1007/978-3-662-02475-1_15
Bronfenbrenner, U., and A. C. Crouter. 1983. The evolution of environmental models in development research. Pages 357-414 in W. Kessen, editor. History, theories, and methods: handbook of child psychology. Wiley, New York, New York, USA.
Catton, W. R. 1989. Choosing which danger to risk. Society 27(1):6-8. https://doi.org/10.1007/BF02695443
Cázares, A. 1994. Prevention intervention research: focus and perspective. Pages 5-35 in A. Cázares and L. A. Beatty, editors. Scientific methods for prevention intervention research. NIDA Research Monograph 139, National Institutes of Health, Rockville, Maryland, USA. https://doi.org/10.1037/e495892006-003
Chevallier, A. 2016. Strategic thinking in complex problem solving. Oxford University Press, New York, New York, USA. https://doi.org/10.1093/acprof:oso/9780190463908.001.0001
Clauser, S. B., S. H. Taplin, M. K. Foster, P. Fagan, and A. D. Kaluzny. 2012. Multilevel intervention research: lessons learned and pathways forward. Journal National Cancer Institute Mongraphs 2012(44):127-133. https://doi.org/10.1093/jncimonographs/lgs019
Craig, P., P. Dieppe, S. Macintyre, S. Michie, I. Nazareth, and M. Petticrew. 2008. Developing and evaluating complex interventions: the new Medical Research Council guidance. BMJ 337:a959. https://doi.org/10.1136/bmj.a959
Eoyang, G. H. 2006. Human systems dynamics: complexity approach to a complex evaluation. Pages 123-140 in B. Williams and I. Imam, editors. Systems concepts in evaluation: an expert anthology. American Evaluation Association, Edge Press, Point Reyes, California, USA.
Foundations of Success. 2009. Using results chains to improve strategy effectiveness: an FOS how-to guide. Foundations of Success, Bethesda, Maryland, USA. [online] URL: http://www.fosonline.org/resource/using-results-chains
Fraser, M. W., and M. J. Galinsky. 2010. Steps in intervention research: designing and developing social programs. Research on Social Work Practice 20(5):459-466. https://doi.org/10.1177/1049731509358424
Funnell, S. C., and P. J. Rogers. 2011. Purposeful program theory: effective use of theories of change and logic models. Jossey-Bass, San Francisco, California, USA.
George, R. V. 1995. Expert support for problem formulation in urban planning. Environment and Planning B: Planning and Design 22(2):175-190. https://doi.org/10.1068/b220175
Gilgun, J. F., and R. G. Sands. 2012. The contribution of qualitative approaches to developmental intervention research. Qualitative Social Work 11(4):349-361. https://doi.org/10.1177/1473325012439737
Hawe, P. 2015. Lessons from complex interventions to improve health. Annual Review of Public Health 36:307-323. https://doi.org/10.1146/annurev-publhealth-031912-114421
Hawe, P., A. Shiell, and T. Riley. 2009. Theorizing interventions as events in systems. American Journal of Community Psychology 43:267-276. https://doi.org/10.1007/s10464-009-9229-9
Hunt, L. M., S. G. Sutton, and R. Arlinghaus. 2013. Illustrating the critical role of human dimensions research for understanding and managing recreational fisheries within a social-ecological system framework. Fisheries Management and Ecology 20:111-124. https://doi.org/10.1111/j.1365-2400.2012.00870.x
Kapsali, M. 2013. Equifinality in project management exploring causal complexity in projects. Systems Research and Behavioral Science 30:2-14. https://doi.org/10.1002/sres.2128
Mahmoud-Jouini, S. B., C. Midler, and P. Silberzahn. 2016. Contributions of design thinking to project management in an innovation context. Project Management Journal 47(2):144-156. https://doi.org/10.1002/pmj.21577
Margoluis, R., C. Stem, V. Swaminathan, M. Brown, A. Johnson, G. Placci, N. Salafsky, and I. Tilders. 2013. Results chains: a tool for conservation action design, management, and evaluation. Ecology and Society 18(3):22. https://doi.org/10.5751/ES-05610-180322
Maxwell, J. A. 2004. Using qualitative methods for causal explanation. Field Methods 16(3):243-264. https://doi.org/10.1177/1525822X04266831
McLeroy, K. R., D. Bibeau, A. Steckler, and K. Glanz. 1988. An ecological perspective on health promotion programs. Health Education Quarterly 15:351-377. https://doi.org/10.1177/109019818801500401
Medical Research Council (MCR). 2000. A framework for the development and evaluation of randomized controlled trials for complex interventions to improve health. MRC, London, UK. [online] URL: https://mrc.ukri.org/documents/pdf/rcts-for-complex-interventions-to-improve-health/
Miller, A. 1999. Environmental problem solving: psychosocial barriers to adaptive change. Springer, New York, New York, USA.
Mitroff, I. I., and T. R. Featheringham. 1974. On systemic problem solving and the error of the third kind. Behavioral Science 19(6):383-393. https://doi.org/10.1002/bs.3830190605
Natasi, B. K., and J. Hitchcock. 2009. Challenges of evaluating multilevel interventions. American Journal of Community Psychology 43(3-4):360-376. https://doi.org/10.1007/s10464-009-9239-7
North Carolina Department of Environment and Natural Resources (NCDENR). 2012. Governor’s Land Compatibility Task Force report. State Library of North Carolina, NC Digital Documents Collection, Raleigh, North Carolina, USA. [online] URL: http://cdm16062.contentdm.oclc.org/cdm/ref/collection/p16062coll9/id/22139
Patton, M. Q. 2011. Developmental evaluation: applying complexity concepts to enhance innovation and use. Guilford, New York, New York, USA.
Pinkerton, E. 1989. Attaining better fisheries management through co-management prospects, problems and propositions. Pages 3-33 in E. Pinkerton, editor. Co-operative management of local fisheries: new direction in improved management and community development. University of British Columbia Press, Vancouver, British Columbia, Canada. https://doi.org/10.2307/1242652
Plummer, R. 2009. The adaptive co-management process: an initial synthesis of representative models and influential variables. Ecology and Society 14(2):24. https://doi.org/10.5751/ES-03130-140224
Plummer, R., and J. FitzGibbon. 2004. Co-management of natural resources: a proposed framework. Environmental Management 33(6):876-885. https://doi.org/10.1007/s00267-003-3038-y
Qiu, J., E. T. Game, H. Tallis, L. P. Olander, L. Glew, J. S. Kagan, E. L. Kalies, D. Michanowicz, J. Phelan, S. Polansky, J. Reed, E. O. Sills, D. Urban, and S. K. Weaver. 2018. Evidence-based causal chains for linking health, development, and conservation actions. Bioscience 68(3):182-193. https://doi.org/10.1093/biosci/bix167
Richard, L., L. Gauvin, and K. Raine. 2011. Ecological models revisited: their uses and evolution in health promotion over two decades. Annual Review of Public Health 32:307-326. https://doi.org/10.1146/annurev-publhealth-031210-101141
Rogers, P. J. 2008. Using programme theory to evaluate complicated and complex aspects of interventions. Evaluation 14(1):29-48. https://doi.org/10.1177/1356389007084674
Rouse, W. B., and N. Serban. 2011. Understanding change in complex socio-technical systems. Information, Knowledge, Systems Management 10:25-49. https://doi.org/10.3233/IKS-2012-0184
Schensul, J. J. 2009. Community, culture and sustainability in multilevel dynamic systems intervention science. American Journal of Community Psychology 43:241-256. https://doi.org/10.1007/s10464-009-9228-x
Shiell, A., P. Hawe, and L. Gold. 2008. Complex interventions or complex systems? Implications for health economic evaluation. British Medical Journal 336:1281-1283. https://doi.org/10.1136/bmj.39569.510521.AD
Spradlin, D. 2012. Are you solving the right problem? Asking the right questions is crucial. Harvard Business Review 90(9):84-93. [online] URL: https://hbr.org/2012/09/are-you-solving-the-right-problem
Sugihara, G., R. May, H. Ye, C.-H. Hsieh, E. Deyle, M. Fogarty, and S. Munch. 2012. Detecting causality in complex ecosystems. Science 338:496-500. https://doi.org/10.1126/science.1227079
Susskind, L., A. E. Camacho, and T. Schenk. 2010. Collaborative planning and adaptive management in Glen Canyon: a cautionary tale. Colombia Journal of Environmental Law 35:1-55. [online] URL: https://scienceimpact.mit.edu/sites/default/files/documents/Collaborative%20Planning%20and%20Adaptive%20Management%20in%20Glen%20Canyon-%20A%20Cautionary%20Tale.pdf
Taylor, A., C. Cocklin, R. Brown, and E. Wilson-Evered. 2011. An investigation of champion-driven leadership processes. Leadership Quarterly 22:412-433. https://doi.org/10.1016/j.leaqua.2011.02.014
van Bokhoven, M. A., G. Kok, and T. van der Weijden. 2003. Designing a quality improvement intervention: a systematic approach. Quality and Safety in Health Care 12(3):215-220. https://doi.org/10.1136/qhc.12.3.215
van den Belt, M., J. R. Kenyan, E. Krueger, A. Maynard, M. G. Roy, and I. Raphael. 2010. Public sector administration of ecological economics systems using mediated modeling. Annals of the New York Academy of Sciences 1185:196-210. https://doi.org/10.1111/j.1749-6632.2009.05164.x
Weick, K. E., K. M Sutcliff, and D. Obstfeld. 2005. Organizing and the process of sensemaking. Organization Science 16(4):409-421. https://doi.org/10.1287/orsc.1050.0133
Wiek A., and D. J. Lang. 2016. Transformational sustainability research methodology. Pages 31-41 in H. Heinrichs, P. Martens, G. Michelsen, and A. Wiek, editors. Sustainability Science. Springer, Dordrecht, The Netherlands. https://doi.org/10.1007/978-94-017-7242-6_3
Weiner, B. J., M. A. Lewis, S. B. Clauser, and K. B. Stitzenberg. 2012. In search of synergy: strategies for combining interventions at multiple levels. Journal of the National Cancer Institute Monographs 44:34-41. https://doi.org/10.1093/jncimonographs/lgs001
Weiss, C. H. 1995. Nothing as practical as good theory: exploring theory-based evaluation for comprehensive community-based initiatives for children and families. Pages 65-92 in J. P. Connell, A. C. Kubisch, L. B. Schorr, and C. H. Weiss, editors. New approaches to evaluating community initiatives: concepts, methods and contexts. Vol. 1. Aspen Institute, Washington, D.C., USA. [online] URL: https://pdfs.semanticscholar.org/ff5a/3eea8d1d4e07a768ded6b426b425efde8f7c.pdf
Wilder, D. 1999. Network exchange theory: issues and directions. Pages 1-21 in D. Wilder, editor. Network exchange theory. Praeger, Westport, Connecticut, USA.
Winter, S. 1987. Knowledge and competence as strategic assets. Pages 159-184 in D. J. Teece, editor. The competitive challenge? Strategies for industrial innovation and renewal. Bollinger, Cambridge, Massachusetts, USA.
W. K. Kellogg Foundation. 2001. Logic model development guide: using logic models to bring together planning, evaluation, and action. W. K. Kellogg Foundation. Battle Creek, Michigan, USA. [online] URL: https://www.bttop.org/sites/default/files/public/W.K.%20Kellogg%20LogicModel.pdf
Yano, E. M., L. W. Green, K. Glanz, J. Z. Ayanian, B. S. Mittman, V. Chollette, and L. V. Rubenstein. 2012. Implementation and spread of interventions into the multilevel context of routine practice and policy: implications for the cancer care continuum. Journal of the National Cancer Institute Monographs 44:86-99. https://doi.org/10.1093/jncimonographs/lgs004 | <urn:uuid:ca7ffda6-0a4a-409f-8612-b82d71bdb6d0> | CC-MAIN-2022-33 | https://ecologyandsociety.org/vol25/iss1/art11/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.891944 | 9,698 | 2.234375 | 2 |
One of three public libraries opened in 1909 by Rowley Regis Urban District Council; the other two being Cradley Heath public library (listed Grade II) and Blackheath (listed Grade II but no longer a public library). The architects were Herbert Winkler Wills and John Anderson. The Shelf Life project notes that it was built from (or at least faced with) limestone.
Details found in the Gazeteer of Historic Public Library Buildings 1850-1940, say that the library was opened in 1904. Photos found on Birmingham Images website seem to indicate a different story. Their caption reads: “Interior of Birchfield Public Library, Perry Barr, looking remarkably smart in 1952. The building dates from 1874 but only became a branch library in 1886.” Perhaps the 1904 date refers to a Carnegie funded extension?
I found references on other sites to Birchfield Road library (Aston) – but no details. The Shelf-Life project has a pin on their map for Handsworth-Perry Barr Institute, Birchfield Road. Also marked as demolished.
The architect was Charles J Gunyon. Few other references found, other than the line: A central library, built at the junction of Station and High roads with a donation from Andrew Carnegie, opened in 1907.
Designed by the borough architect, John “concrete” W Cockrill “in his familiar and distinctive terra cotta style”. The depot for the tram service was next door. The tram service gave way to buses in 1930, but the library remained until 1975, when the joint sites were developed into the present day library.
Current status: Demolished in 1975.
Year grant given: 1905
Amount of grant: £2,000
Year opened (and by who – if known): 1907
Old photo of library (postcard):
Nothing in my collection yet – but there is a picture in the news article below
Clearly it is impossible to visit the original library now, but we found the plaque, and saw the modern library which was built on the same site, when we visited Gorleston in June 2022. | <urn:uuid:40f80456-35bc-4074-97db-0b71029c7f55> | CC-MAIN-2022-33 | https://carnegielegacyinengland.wordpress.com/tag/demolished/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.960559 | 447 | 2.5625 | 3 |
Fuel injectors for automobile engines atomize fuel into multi-scale free surfaces: liquid films formed at the fuel-injector outlet, ligaments generated by the liquid-film breakup, and droplets generated from the ligaments within the air/fuel mixture region. We previously developed a fuel spray simulation combining the liquid-film breakup near the injector outlet with the air/fuel mixture. The liquid-film breakup was simulated by a particle method. The fuel-droplet behavior in the air/fuel mixture region was simulated by a discrete droplet model (DDM). In this study, we applied our method to simulate fuel sprays from a fuel injector with collision jets. The simulation results were compared with the measurements—the mean diameter of droplet in spray, D32, was 35 percent larger than measured D32. We also studied the effects of DDM injection conditions on the spray distribution in the air/fuel mixture region—diameter distributions of injected DDM-droplets were given by the liquid-film breakup simulation, or by Nukiyama-Tanazawa’s theory. The diameter distribution of droplets near the injector outlet was found to affect the spray distribution within the air/fuel mixture region, mainly around the leading edge of spray.
- Fluids Engineering Division
Fuel Spray Simulation With Collision Jets for Automobile Engines
- Views Icon Views
- Share Icon Share
- Search Site
Ishii, E, Sukegawa, Y, & Yamada, H. "Fuel Spray Simulation With Collision Jets for Automobile Engines." Proceedings of the ASME 2010 3rd Joint US-European Fluids Engineering Summer Meeting collocated with 8th International Conference on Nanochannels, Microchannels, and Minichannels. ASME 2010 3rd Joint US-European Fluids Engineering Summer Meeting: Volume 1, Symposia – Parts A, B, and C. Montreal, Quebec, Canada. August 1–5, 2010. pp. 1763-1772. ASME. https://doi.org/10.1115/FEDSM-ICNMM2010-30098
Download citation file: | <urn:uuid:0ebc94ec-d333-45a9-a317-548159d11589> | CC-MAIN-2022-33 | https://asmedigitalcollection.asme.org/FEDSM/proceedings-abstract/FEDSM2010/49484/1763/361113 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.889367 | 449 | 2.34375 | 2 |
Japanese Barberry ( Berberis thunbergii DC) was introduced in 1875 and promoted as an ornamental substitute for common barberry (Berberis vulgaris), which is a host for black stem rust. Prevalent in the East and Midwest of the United States, it forms dense stands that compete with native trees and plants (from USDA Plant Profiles).
USDA Plant Profiles provides background, maps of U.S. distribution, and links to selected federal, state and regional resources.
Invasive Plant Atlas of New England describes the history of introduction in New England, habitats where found, similar species, management options and additional resources.
Michigan Dept. of Natural Resources -- This 7-page illustrated PDF includes recommendations of specific chemicals to use for control, ways to dispose of the plant materials, and additional resources.
Invasive.org -- Post of USDA fact sheet that describes habitat, distribution, environmental impact, control and management, and references on Japanese barberry.
Last updated January 13, 2021 | <urn:uuid:559b29e6-0136-4c97-8c76-58510384398f> | CC-MAIN-2022-33 | https://ulster.cce.cornell.edu/environment/invasive-plants/japanese-barberry | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.892858 | 208 | 3.375 | 3 |
Transport User Voice – November 2020 – What makes passengers feel safe?
27 October 2020
Views from our transport user community
Our latest Travel during Covid-19 survey shows that fewer people have been travelling by train or bus in recent weeks. Hardly surprising as restrictions have tightened. Despite this, around four in five passengers still say they feel safe – it’s very important those who are travelling continue to feel this way.
We know that key factors in helping passengers feeling safe include the ability to social distance, the wearing of face coverings and high standards of cleanliness. This month we have dug deeper with our Transport User Communities into what else transport providers can do to help passengers feel safe. This includes focussing on the role of staff, and exploring views on scientific evidence about the risk posed by Covid-19 on public transport.
Role of staff
Over the years Transport Focus has carried out a huge amount of research with a consistent message that passengers like and value having staff around. We asked our Transport User Community about the role of staff on public transport now. They told us that, if anything, Covid-19 has added a new dimension to their role – one of reassuring passengers that rail and bus is safe to use.
“I believe staff do play a big role in the future safety of the rail network. Without staff I would not, and do not, feel totally safe. They’re a human deterrent and reassure passengers, and offer advice if needed.” Female, 64, Wales
However, passengers didn’t always feel staff were as visible or proactive in challenging lapses in social distancing or rules on face coverings as they would have wanted. This is not a case of ‘having a go’ at staff. The research shows that people understand how difficult it is for those in the front line.
“I feel sorry for bus drivers as they can’t tell everyone at every stop to wear a mask – it just isn’t fair because they are far too open to abuse. I don’t know what the solution is here.” Female, 65, south east.
Some felt that the police had a bigger role in enforcement – though it was equally recognised that you couldn’t have a police officer everywhere. Our bus community members wondered whether bus drivers needed some help – it being hard enough to drive the bus without having to make sure passengers follow the rules as well. No one is pretending that this is an easy problem to solve but it’s equally clear that the reassuring presence of staff has never been more important.
We know many people are apprehensive about using public transport but can scientific evidence that the risks are low encourage people to get back on board?
We showed our Transport User Community the Rail Safety and Standards Board’s published findings about the estimated risk of Covid-19 infection on rail. The community was glad to see that scientific analysis of risk existed and appreciated that it was coming from an independent impartial body and felt informed, rather than ‘pushed’ towards travelling.
“This is interesting. I do feel that the calculations and conclusions are valid, and presented in a reasonable way…I would have thought that the risk would have been higher than the estimates given here, and reading the information presented is generally reassuring.” Female, 32, Newport
However, people’s pre-existing perceptions on the risk of travelling influenced how they interpreted the report, with some taking issue with aspects of the methodology or trustworthiness of the findings. For a small group of people, there is no tolerable risk threshold for Covid-19 transmission, so they will avoid rail until there is a vaccine.
“The risk of infection is good odds if you’re betting with money. But I’m not betting with money. Travelling by rail exposes me to a virus that could kill me and my family.” Male, 57, South East
Others do not feel they have a choice about whether or not to travel at the moment due to personal circumstances and have to accept the risk as it is without needing this level of detail to inform them.
We also showed the report to our bus community who responded positively and would like to see similar information applied to bus.
Overall, while people felt it was important information to have, and it did provide some comfort, it did not change the mind of any passengers already predisposed against travelling by bus or rail. The transport industry must continue to demonstrate it is doing its utmost to ensure passengers are safe by taking visible, proactive measures to reduce the spread of coronavirus.
Back to newsletter. | <urn:uuid:4b4a4dca-ce3b-4580-9323-4af23a832511> | CC-MAIN-2022-33 | https://www.transportfocus.org.uk/news/transport-user-voice-november-2020-what-makes-passengers-feel-safe/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.971114 | 964 | 2.203125 | 2 |
Types of Gutters
What are Gutters? They are the channels and slats that collect surface water on buildings. Gutters are a vital part of your water discharge system and should be properly maintained. Contact Gutters Albuquerque NM to learn more about the purpose of Gutters. But for the sake of brevity, let’s look at some of the most common types. This way, you’ll have a better idea of the type of gutter you need to get your house in order.
If you’re building a new home, most homes come with gutters installed. If you’re installing them yourself, make sure you install them properly and connect downspouts away from your foundation. Flexible hose connectors can help you connect downspouts correctly. In general, gutters are included with a new house. In order to prevent water from backing up against your foundation, they need to be installed away from it.
There are two basic styles of gutters. Seamless gutters are formed entirely on-site and run the length of your roof. Because of performance issues related to thermal expansion, seamless gutters are recommended for homes that have a 50-foot roof. The shape of seamless gutters can vary. They can be rectangular or semi-circular in cross-section. They can also be curved, similar to crown molding. And you can paint them to match the trim on your building.
Properly installed gutters can be very effective in preventing hydrostatic pressure on your building’s foundation. This concentrated water can overflow dampproofing systems, causing structural damage. Gutters also reduce soil erosion below the foundation. Depending on the density of the soil under your home, the soil can change over time, causing your building to settle. Fortunately, most buildings are designed to withstand a certain amount of settlement, but overflowing gutters will make your house susceptible to disaster.
The first rain gutters appeared during the Indus Valley Civilization, which lasted from 3,000 BC to 1,500 BC. These ancient structures were comprised of clay bricks over drains. Later, the Roman Empire invented roadside drainage systems that allowed rainwater to flow into the gutters. In around 47 AD, the Roman Empire brought this civilization. Gutters were widespread during the Empire, which ruled from the 10th to the 13th century. They rebuilt many buildings with stone roofs and gargoyles.
In the Victorian era, gutters were increasingly common. Victorians recognized that gutters kept their walls dry. Then, during the Second Industrial Revolution, the popularity of gutters increased, and steel became the most popular material. Gutters were made easier to manufacture with new technologies during the Second Industrial Revolution. Metal rolling machines allowed builders to roll half-round steel gutters. These new methods made gutters more accessible and affordable to the average homeowner. However, some disadvantages of these gutters remained.
If you have a small yard, it is not a bad idea to use a garden hose to clean the gutters. This method can be effective for assessing the extent of gutter blockages. You can then dump the debris onto a drop cloth and inspect the entire system for leaks or debris. You can also use a leaf blower to blow the debris off the roof. But remember, it’s important to be safe when cleaning your gutters.
Your gutters are responsible for managing the water that falls on your roof. If the water does not flow properly, it can accumulate on the roof, damage the siding and landscape, and seep into the foundation. Gutters are incredibly important for your home, but too many homeowners ignore them until they notice problems. But it’s important to remember that gutters are important for the structural integrity of your home, and it’s better to have a good pair of gutters than an inferior roof. | <urn:uuid:078a73e6-44b5-4187-80a1-57e6c43e60a4> | CC-MAIN-2022-33 | https://www.restorationbusinessesforsale.com/types-of-gutters/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.956099 | 795 | 2.90625 | 3 |
The Leeanne Palmer NSW Country Development Program (CDP) Day Camps
The NSW Country Development Program (CDP) Day Camps are to assist players and coaches from Country NSW to further their skill and development as an athlete during the school holiday period or as a standalone session throughout the basketball season.
The camps are focused around individual skill development, specifically designed shooting session, how to play fast and introduction to the exciting game of 3X3. These camps are suited for anyone from beginners to the elite who want to further develop their basketball skills.
This year Basketball NSW in conjunction with the BNSW Country Committee would like to formally recognise NSW Life Member Leeanne Palmer with the school holiday activation now be known as the “The Leanne Palmer NSW Country Development Program”. Palmer has given a lifetime of service to basketball in NSW, especially in our Country communities.
Who can attend?
The CDP camps are open to both male & female players in the following age groups:
U14, U16, U18.
Note: All athletes must be registered with a Country association.
A typical camp operates as follows:
1st Session: 9:30am-11:00am
2nd session: 11:30am-1:00pm
3rd session: 1:30pm -3:00pm | <urn:uuid:3674281a-35a6-4f59-be43-c497ffbe6581> | CC-MAIN-2022-33 | https://www.bnsw.com.au/players/country-development-program/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.966932 | 274 | 1.507813 | 2 |
As we walk in the purple shade of the rocks, stepping around fallen pandanus fruit and erasing the squiggly marks left by heat-seeking reptiles, the sun rises higher, peeping from behind the jagged tip of the gigantic beehive formation to our right and reducing our patch of coolness. The dividing line between shade and light takes on a sharper edge as it creeps closer – the day’s heat honing its blade, preparing to cut into us. We hurry our step along the Jarnem Loop.
We’re in Keep River National Park, in far north-west Northern Territory, an unassuming green patch on the road map neighbouring the WA border. We’ve done Kakadu, done Litchfield, ticked off all of the iconic Top End destinations, and now, hungering after the Bungle Bungles of the Kimberley, we seem to have run into WA ahead of schedule. By all appearances, here it is, 3km short of the border, just off the Victoria Highway. But where are the crowds?
Aside from the sweltering heat, it’s not a difficult national park to experience – there’s campgrounds on site and 2WD access during the dry season. Yet the hordes keep clear. Perhaps they don’t even know the park exists, or perhaps they’re deterred by the distance: some 800km from Darwin and 1100km from Broome. Such numbers are truly shocking. The all-too-human failure to comprehend size has blacked out vast swathes of latitude and longitude from the public imagination.
But the land is out there, provided you’re game. We venture into that great unknown out of the east, after camping by the Victoria River, where the moon-shadows of boab branches play over the canvas and crocodiles (betrayed only by their glinting eyes) drift silently in the turgid waterway. We set out early the next day, through ochrous hills and mesas with crumbly embankments, into a neverland where the high white orb of the sun flings boab shadows direct into the dirt and the distended grey boab trunks, swollen like Pop Eye’s forearm, offer brief flashes of carved text (“JK was here”, “The Thomas family 2009”).
Clusters of five-pronged kapok flowers flash by like sunspots and the noisy aircon and Cold Chisel compete to be heard as we roll over the sizzling bitumen and turn right onto the baking gravel. Instantly, we’re welcomed by the heartening crunch and crackle of stones under the tyres, the familiar opening sequence to any authentic bush experience. First stop, the information centre and Cockatoo Lagoon, where magpie geese, spoonbills and whistling ducks drift on the surface and wade in the shallows, unperturbed by the presence of saltwater crocs.
In Tune with the Land
Just down the road, we tackle the 200m hike up to Ginger’s Hill. This short stroll, insignificant by southern standards but deceptively challenging in the 90 per cent humidity and mid-day sun, delivers us to an ancient indigenous hunting structure. Inhaling the slightly chemical scent of freshly applied Nivea sunscreen, offered to my nostrils as if on a plate by my several weeks of moustache stubble, I read the signage to make sense of what’s in front of me – a circle of stones covered by a dense net of sticks. Genius – it’s for catching birds of prey. A hunter sits underneath the sticks, kindles a small smoky fire, and waits for the hawks to swoop down, then grabs them.
How this structure made by the first peoples, the Miriwoong, would work is by now intuitive to us. Terrain is constantly on fire in the North. Unseen custodians light roadside burn-offs then seem to disappear. The unattended ashy terrain is left to smoulder for days afterwards. The image is only complete when you add in the thirty, forty or fifty hawks drifting above on spread wings, patrolling the underbrush for mammals fleeing the carnage and awaiting their moment to dive.
Further along the winding dirt road, from the Jenemoom trailhead, we tramp along the banks of Keep River, brushing back fronds of vegetation and glancing down at the opaque brown rockpools, to arrive at an ancient Miriwoong rock shelter. As I eye the middens in the prevailing silence beneath an overhanging sweep of white sandstone, I can almost hear the fat globules of wet season rain collapsing into the saturated soil, underlaid by the quieter echo of grinding implements, the gentle clacking of shells, and whispered speech in an unfamiliar language. Later, at Nigli Gap, we’ll witness rock art on the escarpment, perhaps the best-kept trace of this culture in tune with the land.
Experiencing it on Foot
We pull into the Goorrandalng Campsite, the departure point for a 2km walk along a flat track through anything but flat terrain. Terrific sandstone monuments, eroded by howling winds and monsoonal rains into stark shapes and endless complexity, appear to have been deposited by an ancient force on the spinifex plains. The campsite is about a third full; campers loll around in camp chairs, their feet resting over the arms, a dewy drink in hand, their skin dully reflective with a sheen of sweat. They rest in the shade of awnings, fanning themselves with magazines, their expressions unreadable behind their sunglasses.
As we set out along the track in the early afternoon, it’s instantly clear that these longue-abouts had the right idea. Within minutes, we’re seeking the shade within hollows carved out of towering orange rock formations. Resting our palms on the chalky coolness, we gaze out through the dark jagged frames of silhouette towards the faraway clumpy spinifex fields and the endless collections of sandstone sculpture – some towering into the sky, others scooped out of the earth. From here, the intricate flaky crust of their surface is lost; only the powerful red sings out.
In the evening, we turn into our choice of bollarded sites at the all-but-abandoned Jarnem Campground. As we fold out the tent and put the whistling kettle on to boil, we’re joined by two rainbow bee-eaters. They perch out of harm’s way on a horizontal gum tree branch, their bright yellow bodies in profile, narrow beaks marking tiny arcs across the faded blue sky. Over coffee (it’s never too hot for that), the four of us discuss our plans for the morrow. Exhausted by the day’s exertions, we drift off early, and it feels like the next moment we’re descending the ladder bleary-eyed at 7am, to complete the 6.5km Jarnem Loop before the heat turns viscous.
This little wonder of a national park in NT’s remote tropical borderland is like a slice of the Kimberley gone adrift. I contemplate the diversity of what we’ve seen as I steady myself against a cabbage palm trunk, two thirds of the way through the loop. But as I step out into the sun again, I’m suddenly confused. Here I am, feeling whole, at one with the landscape. Yet the scenery is so strange, so unfamiliar, that at the same time I feel out of place. Perhaps there is something deep and meaningful to this, I ponder, or maybe the experience is merely part and parcel of going troppo. Good thing there’s ice-cold soda water in the fridge.
Where In northern NT, 3km from WA border on the Victoria Highway. 804km from Darwin, 491km from Katherine, 88km from Kununurra
Camping options National Parks camping at Jarnem and Goorrandalng sites. Composting toilets, no showers. $3.30 per adult, $1.65 per child, pay by envelope.
Best time of year Dry season (May to September)
Difficulty Easy access along in-and-out road during dry season. Potential wet season damage to tracks at start of tourist season
More info nt.gov.au | <urn:uuid:108cc254-a702-4a6c-95e2-4749e2b2ca1a> | CC-MAIN-2022-33 | https://campertraileraustralia.com.au/Destination/13829/Keep_River_National_Park | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.913291 | 1,788 | 1.710938 | 2 |
Alain (Émile Chartier) taught him; Sartre, Nizan and Aron were fellow-students. Cavaillès encouraged him to join the resistance during WWII. Bachelard taught alongside him. Deleuze and Bourdieu studied under him; he sponsored Foucault’s doctoral thesis on the history of madness, and advised Derrida to establish himself seriously before indulging in intellectual humour. Althusser declared that his debt to Canguilhem was incalculable. | <urn:uuid:bd050f0e-3f3a-4df9-8f48-911bf4646214> | CC-MAIN-2022-33 | https://culturalcartography.net/names/georges-canguilhem/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.972781 | 110 | 1.65625 | 2 |
Google has already announced that the new Pixel 6 smartphones will feature their first internal processor, the TensorBut she did not mention many details. Based on various leaks from Google and elsewhere, Google’s codename was “Whitechapel” and “GS101”, with the latter referring explicitly in a document on the company’s intranet, but the information now known is very interesting.
Samsung will also play an important role in the development of the new Tensor processor, as it already has experience in the market segment and is already manufacturing its Exynos brand. to me Galaxy ClubSamsung’s involvement in Tensor may be much deeper than you think. Apparently, the new Tensor is also known as ‘Exynos 9855’, a name closely related to Exynos 9840, the internal name of Exynos 2100 found in the Galaxy S21 series.
Samsung is used to developing similar versions of the same processors, having done so with the Exynos 9820 and Exynos 9825 in 2019. Although the two may have 8nm and 7nm chips respectively, they share the same cores and ARM Mali – G76 GPU MP12. This means, according to the new information, that Samsung will play a major role in this new build.
Thus, we should expect the Pixel 6 and Pixel 6 Pro to feature an ARM Cortex-X1 performance core, three Cortex-A78 cores, and four economy Cortex-A55 cores. The clock speed is still unknown, though we wouldn’t be surprised if Samsung overclocked the Cortex-X1 beyond the 2.9GHz that peaks in the Exynos 2100.
Therefore, the performance of the Pixel 6 and Pixel 6 Pro should rival that of the Exynos 2100, Snapdragon 888, and Snapdragon 888+. Notably, Samsung is expecting to bring 2 RDNA-based GPU cores to the Exynos 9925 next year, starting with the Galaxy S22 series, according to some rumors. Thus, Tensor will not necessarily be the pinnacle of Samsung’s capabilities, even if it matches or exceeds the Exynos 2100.
Obviously the problem here is not who manufactures or develops the processor, since Apple created the processor, but the manufacturing was not done by them, however, Tensor may not be (completely) by Google, as Google’s argument seems to be Ad time. However, we will have to wait a little longer for more information about the processor.
“Coffee trailblazer. Social media ninja. Unapologetic web guru. Friendly music fan. Alcohol fanatic.” | <urn:uuid:67ccbaab-6841-4326-bb4a-dcb5cf572b1c> | CC-MAIN-2022-33 | https://www.brytfmonline.com/after-all-the-all-new-google-tensor-wizard-will-not-be-from-google/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.934678 | 549 | 1.664063 | 2 |
June 02, 2020
Maxime Bernier, who recently became the world’s first major leader to call for the re-imposition of the gold standard, is quietly carving out a niche as one of the country’s most innovative monetary policy thinkers.
“Central banks are printing massive amounts of currency to prevent the economy’s collapse under the weight of debt,” says Bernier, leader of the People’s Party of Canada. “The fiat money system is bankrupt.”
Bernier made the comments in the wake of widespread spending announcements by the Trudeau government, which he argues has been using the financial crisis to funnel money to special interest groups.
“The gold standard forces politicians to be fiscally responsible,” says Bernier. “The Trudeau Government is spending money every day that we don’t have. But in the end we have to pay, and the price will be inflation.”
Bernier argues that ordinary Canadians are bearing the brunt of these policies. “Inflation is a hidden tax that transfers money in a sneaky way. We are seeing rising prices in things that people need, like food. But for stuff that they don’t need, like airline tickets, they are falling.”
A global monetary policy conference
Bernier acknowledges that in a globalized economy Canada cannot implement a gold standard on its own. However, as Canadian Prime Minister he would use his bully pulpit to promote the idea in international forums, possibly at an updated Bretton Wood conference.
In the meantime, a People’s Party of Canada government would use its clout to negotiate a new inflation targeting agreement with the Bank of Canada, one which would set stable prices—that is, a 0% inflation rate—as a key goal, as opposed to the current 2%.
More important, Bernier would review the way that inflation rates are currently calculated, to ensure they do not understate the burdens that ordinary Canadians are feeling.
“The U.S. dollar is the international currency, but that has to change,” says Bernier. “The Constitution forced the American government to back coinage by gold or silver. But now it is backed by nothing.”
Talking directly to the Canadian people
The fact that Bernier made his monetary policy announcements on both Twitter and his new YouTube station provides an indication as to how free market thinkers have been forced to adapt.
The Trudeau Government’s decision to fund major media has imposed a climate of fear and self-censorship on industry executives, who now receive a significant portion of their operating budgets from the governments they are supposed to cover.
According to Bernier, a long-time critic of the CBC, this creates inherent conflicts of interests, many of which are so subtle that they are hard to identify, let alone remedy.
Bernier cites the Toronto Globe and Mail, which recently called for increased government funding to help Canadian media weather the recent government lockdowns.
“How can you report fairly about someone who signs your paycheck … when you are asking for a raise?” asks Bernier rhetorically. “It is not possible. I want the media to be independent.”
Convincing Canada’s real elites: the 10%
Bernier, like others who have argued for sounder monetary policies (such as Libertarian Party of Canada leader Tim Moen and Conrad Black, author of The Canadian Manifesto), will face considerable challenges.
The most difficult will be overcoming objections of Canada’s real elites, who could be thought of as “the 10%”: the politicians, bankers, and insiders who are the first to get their hands on the cash when the Bank of Canada prints money.
The 10% includes the influential tenured university professors, administrators, and government workers who produce much of the existing “research” into monetary policy, almost all of whom quietly leave office with multimillionaire taxpayer-guaranteed pensions and vast real estate wealth.
These privileged elites, coupled with government-financed media who cover them, have huge incentives to maintain the status quo.
Preparing for the next election
Bernier’s immediate priority will be preparing for the next Canadian election, which according to some rumours could come as early as this fall.
“We created a party in less than a year,” says Bernier. “While I lost my seat, we fielded 315 candidates and got 1.6% of the vote. It took the Green Party 20 years and five elections to get to that level. Our challenge is to build from there.”
“The future of Canada depends on it,” says Bernier. “I have read Hayek, Mises, and Rothbard, who educated me about the gold standard, which is the best way to maintain purchasing power and prosperity. In the 19th century we had a gold standard and had unprecedented growth. Now we have constant booms and busts.” | <urn:uuid:358efc69-1c4d-416b-bbda-25a983108ca5> | CC-MAIN-2022-33 | https://www.sprottmoney.com/blog/maxime-bernier-becomes-first-major-western-political-leader-to-call-for-a-gold-standard-peter-diekmeyer-june-02-2020 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.965104 | 1,042 | 1.859375 | 2 |
Kabul – The United Nations Security Council will come together to discuss the Taliban’s decision concerning the closure of education doors to girls. The meeting date is not fixed yet, but it will happen soon in the near future.
Since the return of Taliban rebels in power, they have been imposing restrictions; particularly, women and girls have been paying the price with their basic rights of access to education, civil and health services. The rebels, with no hesitation in the first days of their entrance to Kabul closed all the education doors to girls, but later on, as a result of the international community’s pressure promised to reopen the education doors to girls in the spring of 1401. In contrast, they have stepped back from their promise and have argued that girls’ uniforms are not aligned with Islamic morals. The schools’ doors will remain closed for girls till further notice.
International Community and their very close supporters have called on the Taliban many times to change their outdated ideologies and cope with the realities of Afghanistan. But Taliban on the bases of vague religious arguments have been trying to make a hell out of the country, particularly for women and girls.
Every restriction that they have been imposing so far is argued on the bases of religious values; while, they do not give any exact reference in the holy book.
Source: Hasht-e Subh Daily | <urn:uuid:29bbfb3b-6f99-432a-82ec-0fb659b8ffe5> | CC-MAIN-2022-33 | https://en.kokchapress.com/2022/03/25/un-security-council-to-hold-a-meeting-over-the-talibans-decision-on-closure-of-education-doors-to-girls-in-afghanistan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.963216 | 276 | 2.09375 | 2 |
What Is CSV Injection ?
It is not uncommon for applications to export data in comma-separated-values (CSV) format for subsequent analysis or downstream processing. Many times that later processing includes viewing and analyzing the exported data in Microsoft Excel or Google Sheets.
CSV Injection, also known as Formula Injection, describes a vulnerability arising from this scenario, in which untrusted input is exported directly to comma-separated-values (CSV) files as data for subsequent import into a spreadsheet. Such input can be maliciously crafted to break the data/code barrier in spreadsheet software and result in unintended command and program execution.
Spreadsheets and Formulas
We will use Microsoft Excel for our examples, while noting that similar vulnerabilities exist in Google Sheets.
Microsoft Excel is ubiquitous and is the de-facto standard for spreadsheet processing, and has long supported the ability to open and read CSV files. In fact, in many user-environments, the default program for processing a file with a .csv extension is Excel.
A comma-separated value file is very much what it sounds like, with each line becoming a spreadsheet row, and each comma-delimited value used to populate the cells of the corresponding row.
A file (OneTwo.csv) containing the following lines:
1, 2, Buckle, My Shoe 3, 4, Shut The, Door
appears as the following (partial screenshot) when opened with Excel:
Thus far, this is the happy path; nothing but data. The twist comes with the fact that Excel is also perfectly happy to accept formulas as cell values:
A file (OneTwo.csv) containing the following lines:
1, 2, Buckle, My Shoe 3, 4, Shut The, Door Today is:,=today(), Tomorrow is:,=today()+1
illustrates how Excel quietly executes the formulas, displaying the calculated dates as numbers:
Changing the format of the cells to “Short Date” format will result on the display below, showing that the certain cells have been configured as formulas:
CSV File that Invokes a Program
The fact that formulas can be imported may be useful under certain scenarios, but it allows an attacker to craft malicious cell content such as:
1,2,Buckle,My Shoe 3,4,Shut the,Door Today is:,=today(), Tomorrow is:,=today()+1 This opens the calculator:,=calc|a!z
The obscure code on the end (and I agree it is about as obscure as it gets), is explained here and here, and uses Microsoft’s DDE (Dynamic Data Exchange) protocol to launch the standard Windows calculator program. Without getting bogged down in the syntax, this demonstrates the ability to launch any program that can be launched via DDE. Granted, as a security measure, Microsoft requires the user to acquiesce and first declare their trust of the file , but remember, this is a CSV file –users do reasonably expect it to initiate programs or commands.
Our final example shows the generalized form of the exploit that can be used to run any program from the command line, once again with the provision that the user must agree they trust the file:
1,2,Buckle,My Shoe 3,4,Shut the,Door Today is:,=today(), Tomorrow is:,=today()+1 This opens the calculator:,"=2+5+cmd|' /C notepad'!A0"
CSV File that Exposes Spreadsheet Data To The Web
Another exploit that requires less trust from the victim is to embed a link within the document that will export spreadsheet content right out of the organization. The following syntax, when it is loaded from a CSV file into a cell will display the error message as a hyperlink to the user, that when clicked will quietly transfer the contents of the indicated cells:
CSV Injection Vulnerability Summary
CSV Injection stems from the fact that CSV files can contain cell values that represent formulas and that those formulae can be maliciously crafted to unintentionally execute code and/or interact with hostile web-resources. Clearly, care must be taken when importing untrusted CSV files into spreadsheet applications. We would deem a CSV file to be trusted only if it was produced by an application under our control that we know with certainty does not produce cells containing formulas. (Note that the former does not imply the latter.)
For additional insight into how to discover CSV Injection vulnerabilities in your web-applications, please see the article entitled: “How to Test For CSV Injection“.
For additional insight into how to prevent or fix HSTS vulnerabilities, please see the article entitled: “How To Prevent CSV Injection“.
About Affinity IT Security
We hope you found this article to be useful. Affinity IT Security is available to help you with your security testing and train your developers and testers. In fact, we train developers and IT staff how to hack applications and networks.
Perhaps it was a network scan or website vulnerability test that brought you here. If so, you are likely researching how to find, fix, or avoid a particular vulnerability. We urge you to be proactive and ensure that key individuals in your organization understand not only this issue, but also are more broadly aware of application security.
Contact us to learn how to better protect your enterprise.
Although every effort has been made to provide the most useful and highest quality information, it is unfortunate but inevitable that some errors, omissions, and typographical mistakes will appear in these articles. Consequently, Affinity IT Security will not be responsible for any loss or damages resulting directly or indirectly from any error, misunderstanding, software defect, example, or misuse of any content herein. | <urn:uuid:7f5a0452-8c11-4b21-87a9-e91bce9e4dc1> | CC-MAIN-2022-33 | https://affinity-it-security.com/what-is-csv-injection/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.899026 | 1,212 | 2.703125 | 3 |
Histamine acts as a neurotransmitter to regulate various physiological processes. Brain histamine is synthesized from an essential amino acid histidine in a reaction catalysed by histidine decarboxylase (Hdc). Hdc-positive neurons exist mainly in the tuberomammillary nucleus (TMN) of the posterior hypothalamus and project their axons to the entire brain. Recent studies have reported that a chronic decrease in histamine levels in the adult human brain was observed in several neurological disorders. However, it is poorly understood whether lower histamine levels play a causative role in those disorders. In the present study, we induced chronic histamine deficiency in the brains of adult mice to allow direct interpretation of the relationship between an impaired histaminergic nervous system and the resultant phenotype. To induce chronic brain histamine deficiency starting in adulthood, adeno-associated virus expressing Cre recombinase was microinjected into the TMN of Hdc flox mice (cKO mice) at the age of 8 weeks. Immunohistochemical analysis showed expression of Cre recombinase in the TMN of cKO mice. The reduction of histamine contents with the decreased Hdc expression in cKO brain was also confirmed. Behavioural studies revealed that chronic histamine depletion in cKO mice induced depression-like behaviour, decreased locomotor activity in the home cage, and impaired aversive memory. Sleep analysis showed that cKO mice exhibited a decrease in wakefulness and increase in non-rapid eye movement sleep throughout the day. Taken together, this study clearly demonstrates that chronic histamine depletion in the adult mouse brain plays a causative role in brain dysfunction.
- Adeno-associated virus
- Histidine decarboxylase
- Sleep analysis
ASJC Scopus subject areas
- Cellular and Molecular Neuroscience | <urn:uuid:a44709a0-2626-4e83-84e0-071f5e97bc49> | CC-MAIN-2022-33 | https://tohoku.pure.elsevier.com/en/publications/chronic-brain-histamine-depletion-in-adult-mice-induced-depressio | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.907116 | 379 | 2.125 | 2 |
Interfaith Training with Interfaith Youth CoreCollege students who are interested in establishing an interfaith group on campus are encouraged to apply for Interfaith Leadership Institute , a spectacular summer training with Interfaith Youth Core (IFYC, Eboo Patel 's organization). This is open to both students who are involved in a campus ministry and those who are not. Please contact Kayla directly at email@example.com if you are interested in attending or know someone who you think would be enriched by this experience. We are dedicated to financially assisting UU students who would like to attend.
- Direct link to Interfaith Leadership Institute information.
- Blog post by Mary Ellen Giess, a UU and employee at IFYC who organizes this training, on the impact of interfaith on her religious experience as an undergraduate. Mary Ellen is looking forward to meeting and working directly with the UU students who attend the training - a great opportunity!
Global Justice Summer Internship Program with Unitarian Universalist Service CommitteeUnitarian Universalist Service Committee's (UUSC) first Global Justice Summer Internship Program will be in partnership with the Papaye Peasant Movement (MPP). One of the leading peasant organizations in Haiti and a world leader in food-sovereignty issues, MPP empowers Haitian peasants to claim their political and human rights. For the summer of 2012, they are seeking an English teacher and a videographer/video-editing intern. UUSC offers this internship in collaboration with MPP specifically for young adults interested in exploring global social-justice issues in a Unitarian Universalist (UU) context. Candidates will be expected to engage in daily spiritual practices. A pre-trip orientation will prepare interns for work in Haiti and provide a background in UU traditions of social justice and action.
Young Adult Outreach Internship with UU Ministry for EarthThe Young Adult Outreach Intern will connect and inspire an active community of UUs for environmental justice, spiritual renewal, and shared reverence for our Earth home. Unitarian Universalist Ministry for Earth is seeking a young adult who will help us to build the network and identify the support needed by young adults to become more involved in environmental work. The summer internship will accomplish the following:
• Identify young adult UUs who are doing environmental work in their regions, states, congregation, District or campus • Identify young adult UUs who could connect UUMFE resources and programs with groups in their regions, states, congregation, District or campus • Make connections with the UUA Young Adult office to find out what kind of training and support they have available for young adults doing environmental work • Document leadership opportunities both within and without UU organizations that are available for young adults interested in environmental work and environmental justice • Attend General Assembly in Phoenix (expenses paid) to set up focus groups and other types of meetings with Young Adult to meet strategic objectives related to outreach and information gathering. Help staff the UUMFE booth at scheduled times. • Make connections with the Continental UU Young Adult Network and potentially attend Opus, their gathering in Toronto, August 8-12, to continue building the network of young adults interested in environmental work • Make recommendations to the UUMFE Board on ways to strengthen relationships with and meet the needs of young adult UUs.The internship will run from June 1 through September 30, 2012. A stipend of $3000 will be given in return for an expected 200 hours of work. Expenses for attending General Assembly, and if appropriate, Opus, will be covered. The intern will work closely with a UUMFE Board member to create a work plan, set intermediate objectives, and to determine the success of the project. Interested candidates should be between the ages of 20 and 35. Send resume, three references, and the answer to this question (one page or less): Why should you be selected as the UUMFE Young Adult intern? Applications are due by May 1; e-mail to firstname.lastname@example.org . Contact Nancy King Smith at that address or 216-496-3543 with questions. | <urn:uuid:ca59828f-a60e-4743-be4d-b23642bcf114> | CC-MAIN-2022-33 | https://www.uua.org/blueboat/events/summer-opportunities-young-adults | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.926217 | 836 | 1.554688 | 2 |
Flexibility Is Key to Successful, Equitable Remote Learning
By Krystal Clifton
In September, when most of my fourth-grade students were learning remotely, I asked them to set up three scenarios with three slices of bread. It was a perfect at-home science investigation: They would take pictures of the bread over time and write about their observations. When it was Lauren’s day to come to school in person, I asked her why she hadn’t submitted her pictures yet. She hesitated; I could tell she felt uncomfortable. Then she whispered, “Sometimes the people who live next door don’t take care of their house. Sometimes, things come from their house to ours. The rats ate my bread.”
Although I thought I had created a project that would work for all students, I failed. At Lauren’s home, the living conditions didn’t allow for food items to be left out. Two other students just didn’t have bread at home. The best laid plans can fail if we don’t take into account and value students’ individual circumstances.
I’ve always been mindful of my students’ needs because I teach in a district where most students are living in poverty and many have unstable home situations. However, with remote learning, I have to be even more flexible than before. I’ve adjusted my hours so I can meet with students early in the morning and communicate with parents throughout the evening when they get home from work. I’ve created videos for students who cannot attend school in person or on Zoom due to childcare needs or lack of internet access. I’ve spent hours getting donations from local businesses to create an incentive system for students who have lost motivation because of the pandemic. I’ve begged, borrowed, and pleaded to see the kids who need the adult interaction in person. I’ve partnered with parents and I’ve connected with kids in person, online, or on Zoom. Most of all, I’ve become an advocate for my neediest students.
This is why I believe that remote learning policies should be flexible enough to account for the variety of the circumstances of the students, parents, and their homes. This is not to say that flexibility should come at the expense of accountability. Students need to access instruction in a way that works for them, but the expectation is that they will access the instruction.
For example, expecting all students to access Zoom at the same time every day may seem like a reasonable expectation until you start to think about the variety of situations in students’ homes. Some students do not have a quiet place to attend a meeting, some have unreliable internet access, and others don’t have a home at all. They need flexibility to get access when and where they can. This means providing Zoom meeting times, in-person learning in small groups, pre-recorded lessons, and self-paced interactive learning experiences. The more ways we provide access, the more likely it is that students will access it. One of my students, Daniel, is at a daycare with no WiFi until 6 p.m. and can’t attend the Zoom meetings I hold during the day. I’ve worked with his mom to have him come to school to work with me one day a week. On other days, I provide him with video or interactive lessons that mirror what we learned in our class on Zoom that day. I cannot control his childcare situation, but I can make sure that he has access to an education regardless.
To make a variety of such options viable, teachers like me need time and support to develop them. We need planning time in our schedules to create additional materials. Districts can also help teachers by placing them into leadership positions because every decision will inevitably have an impact on students. Not only do teachers know instructional strategy and scope and sequence, but we also know the kids. We know which ones are currently homeless, which ones might be in a dangerous situation, and which ones aren’t putting in their best effort.
After speaking with Lauren, I knew that I needed to make a change. I posted several pictures of students’ results and asked other students to make observations from them. The relief on her face when I showed her the new plan made it clear that it only took a little bit of flexibility and compassion on my part to change the story for her. We all need to recognize that at this moment in time, presenting students with the most options gives them the greatest chance at accessing an equitable education.
Krystal Clifton teaches 4th grade at King Middle Grade School in Kankakee, Illinois. She is a 2020–2021 Teach Plus Illinois Policy Fellow. | <urn:uuid:7bc26f18-e8bb-49fe-8b1b-ef10961f129f> | CC-MAIN-2022-33 | https://medium.com/whats-the-plus/flexibility-is-key-to-successful-equitable-remote-learning-8d38e642e062 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00072.warc.gz | en | 0.973931 | 977 | 2.53125 | 3 |
Rhode Island Center for the Book is a statewide organization devoted to promoting personal and community enrichment by celebrating the art and heritage of reading, writing, making, and sharing books. By providing access to books in a wide range of formats, supported by relevant, socially impactful programming, created by an inspired network of teachers, librarians, writers and readers, the Center for the Book engages people of all ages and backgrounds across Rhode Island.
Every state has a Center for the Book that are all affiliates of the Center for the Book in the Library of Congress. Rhode Island Center for the Book has been the Rhode Island affiliate of the national Center for the Book at the Library of Congress since 2003. The Center collaborates with Rhode Island schools, libraries, senior centers, nonprofits, churches, book festivals, bookstores, businesses and more to promote empathy, experience and understanding through literacy, discussion, education and reading. In these difficult and polarized times, collaboration and not divergence is essential and the strength of the Rhode Island Center for the Book comes from the hundreds of passionate volunteers throughout the state, who drive the Center’s programming, events and connections.
Download our RI Center for Book Infographic to see the impact of your support.
Rhode Island Center for the Book is a cooperative effort of a dedicated community of volunteers. People from varied backgrounds and interests come together to celebrate their love of books. If you would like to volunteer or become a member, please send an email to email@example.com .
Reading Across Rhode Island (RARI)
For over 15 years, Rhode Island’s only One Book, One State program focuses on a single book selected to stimulate meaningful discussions across our state. Once the selection is made, bookstores, schools, and libraries spread the word and build up momentum toward our concluding event featuring sold out addresses by the author. The Center provides thousands of books at no cost to schools and readers to fuel discourse that flows from connecting over a shared story and then bolsters the program with an in depth resource guide compiled by experienced teachers. The Center integrates dramatic and visual arts to enrich the reading experience. RARI penetrates every city and town in Rhode Island across all generations and classes of citizens.
Kids Reading Across Rhode Island (KRARI)
Since 2009 The Center has partnered with Rhode Island Office of Library and Information Services for a summer reading program focusing on children in grades 3-6. KRARI seeks to instill a lifelong love of reading while preventing summer learning loss. KRARI kicks off at the magnificent Rhode Island State House, hosting hundreds of young readers and their families, who receive the selected book at no cost and meet the author. For many of the students, it is their first encounter with a live author which makes a lasting impact. The program then launches into book groups, crafts, theater and visual arts events throughout the summer to stimulate young readers.
A collective of Rhode Island based artists illuminate written works by creating concrete characters and events performed live for audiences.
Youth Poetry Ambassador
The Center partners with the Rhode Island Poet Laureate to select a RI high school student to serve as a youth poetry advocate to bring more poetry to our state’s youth and to inspire young people through example. | <urn:uuid:04845b17-2363-4376-8723-2fdf69d63e30> | CC-MAIN-2022-33 | https://ribook.org/about-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.937541 | 668 | 1.898438 | 2 |
We have been reliably informed (but it is still a rumor) that the rules for the election will ban exit polling.
Exit polling is a simple method of determining if the votes counted represent the votes cast. People leaving the polling station are asked if they wish to indicate who they voted for. They are free to refuse but normally 42% will freely answer and in the US it is accurate within 15%. It is used in most democracies including USA. While not super accurate it gives an early indication of how people voted.
The only reason I can think of as to why the Electoral Commision would want to stop this is that there may be a major discrepancy between who people say they have voted for and the final counted vote. This may result in claims of vote rigging.
Could one of the registered parties please query this with the Commision. | <urn:uuid:546edbbc-f44e-4b38-8274-0287c440dfcf> | CC-MAIN-2022-33 | https://fijitoday.wordpress.com/2014/02/07/rumor-eminated-out-of-the-electoral-commission/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.976798 | 170 | 1.859375 | 2 |
Notes towards a phenomenology of conspiracy theory
by Sam Kriss
Really, what I want to talk about here is the unspoken axiom behind all epistemology: that we ought to believe statements that are propositionally true, and that we ought not to believe statements that are propositionally false. This general principle is rarely ever stated, and tends to just appear as the hidden code that governs any logical process. P1 is true, so it was kept; P2 is false, so we no longer considered it; the fact that this is less a logical axiom than a moral injunction is subdued in all this bloodless process, while the invidious character of the terms ‘true’ and false’ neatly closes up any gap between ‘is’ and ‘ought’ that would otherwise make such an ethics of reasoning more distinctly problematic. In any case, there are forms of truth beyond the propositional, ones where this autogenerative law finds itself making commands beyond its jurisdiction. What about the revealed truth of religious texts, which must be believed before their truth can become apparent? What about the unconscious truths of psychoanalysis, which must not be consciously believed in order to function? It’s now accepted (among most of the media and political classes, at least) that the statement ‘While at Oxford University, Prime Minister David Cameron took part in an initiation ceremony during which he fucked a dead pig’ is not propositionally true – but even if that’s the case, isn’t it in a very important way more true than the truth?
But I’m not going to resort to postmodern vaguery, beardscratchingly prognosticating on the distortion inherent in any reduction of truth to concept. Instead, I want to sink down deep into a set of statements that are generally considered to be propositionally false, and surface arguing why we should believe them anyway. For this I’m choosing conspiracy theory, because conspiracy theory is fascinating and mysterious and vast, and I love it, and I hope that you do too. Conspiracy theory appears to be an epistemic discourse, almost maniacally focused on ‘truth’ – so that, for instance, the phrase ‘9/11 truth’ for most people immediately yields the meaning ‘crazy 9/11 speculation’. But the other great master-signifier of conspiracy, the call to ‘wake up’, is very different: we’re dealing with modes of experience, the clouded, the fantastic, the pellucid, that demand a consideration beyond dreary propositionalism: a phenomenology of shapeshifting lizards and the New World Order.
An interesting point of entry here is provided by ‘Conspiracy Theories and the Popular Wisdom‘, an essay by the University of Otago philosopher Charles Pidgen, published in Episteme volume 4, issue 2, which has been doing the rounds lately in certain left-wing circles that are understandably sensitive to accusations of conspiracy theory. Pidgen’s central proposition – that we should believe conspiracy theories, or at the very least investigate them while being open to the possibility that we might – is not dissimilar to mine, but the case he makes is an epistemic one, and given that there’s clearly something broken in epistemic reasoning, it’s inevitably insufficient. He thinks we should believe conspiracy theories because they are propositionally true. He begins by noting that the charge of conspiracy theory is often used to discredit ideas that are unhelpful to the powerful, and that according to the conventional wisdom conspiracy theories are a priori absurd and unworthy of investigation. But if we hold this position, and sensibly define conspiracy theory as ‘a theory that posits a conspiracy,’ then we have to throw out most of what we know about the past. If we don’t believe in conspiracy theories, then we would have to hold that Brutus and Cassius and the others all happened to come up with the idea of murdering Caesar independently and coincidentally. ‘Much of recorded history would dissolve into a blur of inexplicable events.’ (Which, from a certain Benjaminian perspective, is exactly what it is, but never mind.) Clearly none of this is tenable, and so Pidgen – who’s spent the bulk of his essay disproving a position that nobody actually holds – quite correctly concludes that there’s something wrong with his definition. But if conspiracy theory isn’t just ‘a theory that posits a conspiracy’, then what else could it be?
Pidgen’s proposed redefinition is still insufficient. When the conventional wisdom tells us not to believe in conspiracy theories, he writes, it means those ‘that postulate evil schemes on the part of recent or contemporary Western governments (or government agencies) and that run counter to the current orthodoxy in the relevant Western countries.’ He notes that the idea that Saddam Hussein’s Iraq was stockpiling weapons of mass destruction and in league with al-Qaeda is not considered a conspiracy theory, even though it posits a conspiracy. But because of his focus on propositional truth, he ignores the tissues through which any proposition lances. A conspiracy theory is an explanatory device used to make sense of conditions that are not entirely understood: a general prerequisite for conspiracy theory is that it is sincerely believed by the person that proposes it. The charge that Iraq had WMD wasn’t a conspiracy theory; it was a lie. It’s very possible to imagine conspiracy theories that don’t fit Pidgen’s definition. Had George W Bush instead announced that President Hussein were the high priest of an ancient Mesopotamian death-cult that had controlled humanity since the dawn of civilisation through the emasculating medium of writing, and that he could only be defeated by a sturdy gang of tooled-up all-American illiterates, some people might still have believed him, but that would have been unambiguously a conspiracy theory. Conspiracy theory isn’t a type of proposition that can be taxonomically isolated by its propositional content; it’s a relation between propositions, between knowledge and unknowledge, the seen and the unseen, the incomparably ancient and the buzzing urgency of the present.
We could start, Occam-like, by proposing that conspiracy theory is the general tendency to attribute visible events to invisible conspiracies when a simpler and more plausible non-conspiratorial explanation is available. But that’s not enough: what is a conspiracy, anyway? It’s not a epistemic or a phenomenological concept, but a legal category. Of course conspiracies happen; if they didn’t, there’d be no need for a law. The crime of conspiracy was not codified until the Criminal Law Act of 1977; until then, in English common law (which also provides the basis for law in the United States and many Commonwealth countries), it fell under the category of ‘inchoate offences’, along with attempt and incitement; a nebulous cluster of suspicion, sporadically enforced and prosecuted according to the whims of the enforcers. The charge is not entirely extricable from that of witchcraft, broadly understood as a conspiracy with the Devil; as such, a conspirator could easily have been working alone. (Aren’t we all conspiring within our own heads?) In common law, something that is not an offence may become one if conspiracy is present: handing out medicinal herbs is legal; doing so with the Devil at your side, or after meeting your coven by midnight, is not. Conspiracy was not considered to be the mode of operation of the powerful, but the powerless: Satanic peasants in rickety huts, plotting against the mirrored institutions of God and State. The first major shift came with Lutheranism, and its charges of Papal blasphemy: suddenly it was not only the rulers who feared conspiracies on the part of their ungrateful populations, but everyone; social existence itself became a host of potential conspiracies. For obvious reasons, this is not a sense of the word that made it into the 1977 Act, which states that ‘if a person agrees with any other person or persons that a course of conduct shall be pursued which, if the agreement is carried out in accordance with their intentions, either— (a)will necessarily amount to or involve the commission of any offence or offences by one or more of the parties to the agreement, or (b)would do so but for the existence of facts which render the commission of the offence or any of the offences impossible, he is guilty of conspiracy to commit the offence or offences in question.’ One important provision of codified conspiracy law is that conspiracy is only an offence if the act that the conspirators intend to commit is itself an offence. In conspiracy theory, meanwhile, the acts that are alleged to have been perpetrated by unknown conspirators are sometimes formally illegal (assassinating JFK, carrying out the 9/11 attacks), but more often tend to exist in a Benjaminian sphere of violence that founds the law, and is incorporated into it (putting flouride in the drinking water, faking the Moon landings, inventing the Holocaust). It’s hard to imagine the shapeshifting lizards being taken into court in handcuffs; in any case, for an alien lizard to invade the planet by assuming human form and putting strange patterns on the currency isn’t even a crime in most jurisdictions. (It might, conceivably, be a tort.)
The ‘conspiracy’ in ‘conspiracy theory’ refers to the term in its pre-codified sense, in which it describes not a hidden relationship between multiple human individuals, but a relationship between human individuals and hiddenness itself. Conspiracy theory is not a theory that posits a conspiracy, but the hypostasisation of conspiracy to the level of theory, or occlusion as a general system of Being. It’s not just that public events have hidden causes: the seen is only an attribute or epiphenomenon of the unseen, which is essential to reality. In many conspiracy theories, the primary aim of the conspiracy seems to be the presentation of an experience in which the conspiracy itself does not outwardly appear. For readers of the Protocols of the Elders of Zion, what appears to be the chaotic stampede of human history is actually an elaborate performance-piece engineered as a distraction by the Jews lurking backstage. Flat-Earthers believe that a vast and sinister plot exists to place globes in every classroom and doctored images on the TV, with the sole purpose of having us think that the Earth is round. In David Icke’s sweeping cosmology, the Moon is an artificial satellite broadcasting something called the ‘Moon Matrix’ (although it actually originates from Saturn), an information-blocking signal that reduces our consciousness to its five limited senses. More convincingly (although I’m here not really interested in evaluating the propositional truth of any of these notions), many leftist media critics consider the wealth of images in capitalist society to form a single ‘spectacle’ that obscures existing class antagonisms.
None of this should be particularly unfamiliar: conspiracy theory in this sense is a kind of Kantianism. Noumena, the objects as they actually are, are by nature hidden from us; all we can approach by reason or perception is the phenomenon, the distortion provided by our senses. But rather than performing a Husserlian Einklammerung or epoché, conspiracy theory maintains a puckish Hegelian ambition to touch the face of the thing-in-itself. Its goal is reconciliation: as in Adorno, the subject-object distinction is not eternal but the product of particular historical conditions. But given that the conspiracy itself is by definition imperceptible, it’s not possible for one to have direct knowledge of it within experience. (There are, of course, people who claim to have witnessed UFOs spinning through the sky, or to have listened in on the cloistered Zionist congresses; there are various ‘leaked’ documents purporting to be minutes of the global conspiracy, but in practice such transcendental arguments make up a surprisingly small portion of the general conspiracy corpus.) Instead, conspiracy theory tends to coincide with a strange form of immanent critique, in which the visible phenomena of the world must be ‘decoded’ to reveal their secret meaning. Hence the insistence that the secret masters of the world would, for unknown reasons, leave little clues around the place pointing to their existence. Banknotes are popular here – what’s that eye and pyramid business about? And did you notice that if you fold them a certain way, it looks just like the photos of 9/11? Numerology and cod-etymology is also popular: can’t you see that it’s called an iPhone because its ‘eye’ is always watching? If we’re not living in Hell, then why do we greet each other with Hell-o? Conspiracy theory could be understood as less a set of discrete propositions and more a Heideggerian Stimmung – attunement or mood, a mode of In-der-Welt-sein in which phenomenal reality reveals itself to Dasein in some particular manner. Here, as in boredom (discussed in The Fundamental Concepts of Metaphysics), things appear empty and impoverished, but by contrast they are not without interest. They point beyond themselves to their occulted source; the world takes on significance not as a world, but as a map. Conspiracy theory reaches beyond the world as it seems, not by grasping at clouds from tiptoes, but by digging down, uncovering the foundations of things to see the vastness below.
It might be futile. But is it, phenomenologically speaking, true? In Heidegger, truth is not a matter of a subjective mental image conforming to reality, but the disclosure of a world. Truth is ‘letting whatever is sleeping become wakeful’ (sheeple) – the unconcealment of what had been hidden. I say that Socrates is mortal, and his manifest mortality, knobbly knees and tremoring heart, is suddenly made apparent to you. In this sense, conspiracy theory – all conspiracy theory – is true. And it’s a truth far more fecund and far more fun than anything allowed to us by epistemology. In conspiracy theory, the things of the world are atoms of signification, to be combined and recombined into the modes of appearance of any number of potential noumena. ‘The RAND Corporation, in conjunction with the saucer people, under the supervision of the reverse vampires, are forcing our parents to go to bed early in a fiendish plot to eliminate the meal of dinner.’ Life encrusts itself like milk on endless fathoms of possibility. And yes, most of it is evil. But it doesn’t have to be. Remember that through much of our history, the conspiracy was not a creature of aristocratic malice, but a mode of popular resistance. The Illuminati is not only to be fought; it’s to be established. | <urn:uuid:c6a79279-2e40-4b31-924c-994e90742081> | CC-MAIN-2022-33 | https://samkriss.com/2015/11/26/notes-towards-a-phenomenology-of-conspiracy-theory/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.949511 | 3,169 | 1.546875 | 2 |
« PreviousContinue »
from what he says,* that after the reading, the president exhorted the people to the imitating of the examples and the following of the instructions which they had heard. If the Scriptures were so read, it could hardly have been otherwise in regard to the prayers; for which there would have been less excuse, in the circumstance of divine inditement. But Origen is more particular in this
matter; for he testifies, t that “the Greeks and the Romans used their respective languages in their prayers; and so every one, in his own dialect, prayed to God and gave thanks, as he was able."
The less needs to be said in proof of this point; as the aforesaid cardinal distinctly states, that when Christianity was first preached and received in different nations, the Hebrew tongue, or the Greek, or the Latin was used, accordingly as one or ano. ther of them was prevalent in any country. But herein he discovers his prejudice, that he does not perceive the same reason to apply to every country and in every age. The reasons which he gives for the law of his Church in this particular, relates to the preservation of religion in its purity. This reason, acted on consistently, would go to the extent of requiring the Old Testament to be read in Hebrew, and the New in Greek; and would dispense with the Latin. Let it however be acknowledged, that there are literary reasons both of a classical and of a religious nature, for cultivating a knowledge of each of the three languages in question: those of a religious nature being the more to be regarded, on account of the pointed enmity to the cultivation of them, manifested by infidels of modern times; in which they are also joined by many persons, who are not aware of the motives and the tendency of the efforts of the others. Certainly, the cultivation of these languages ought to be an object with all lovers of literature; and should especially be held
* Apol. Thirlby, p. 96.
+ Contra Celsum. lib. 8,
in estimation with those, by whom the concerns of any religious communion are directed. But experience has shown, that each of the languages in question may be cultivated, without being made that of the prayers of the common people. If to the poor especially the gospel is to be preached; why should there be stopped up from them the channel of instruction, which is through the medium of evangelical prayers, set before them in the publick service; and on that account, the more likely to be impressive.
It is not here unknown, that what at first induced the continuing of the use of the Latin tongue in the Italian Churches, when it had ceased to be the common language of the people, was the variety of dialect prevailing after the irruption of the Northern nations; until, from the mixture of them, there arose what is now called the Italian. But it so happened, that what was thus began, proved a convenient engine of power in the hands of the growing greatness of the papacy, It became in time the mean of causing the rites of all the Churches to give way, to those of the Church which came gradually to be considered as the mother and the mistress of them all. Before that revolution, there were, for instance, the Ambrosian Liturgy-the Mosarabick, and the Gallican; subsisting through many ages in flourish. ing and famous Churches. They all at last submitted to the strong arm of the “Ordo Romanus:" And that this was effected in a great measure by the celebrating of the services in an unknown tongue, cannot be doubted of by any.
1.'1'? qilish OF CERTAIN PROPERTIES OF THE PUBLICK WOR
11: SHIP OF THIS CHURCH. *
Reading of the Scriptures, The Joining of the People.
Bodilyl worship.—End. '
properties alluded to, and what very much tend to give to our worship a distinctive character among the various modes of Protestant Communion, are–The reading of considerable portions of the Scriptures—The joining of the people in certain parts of the service, and—Bodily worship. In each of these particulars, our practice is different from that of a great proportion of our fellow-Christians; either entirely, or in the degree in which we respect and require it. Our being tenacious of them, is sometimes ascribed to the laying of undue stress on what is of man's authority. Accordingly, it is but justice to our own Communion that we should be aware, under each of the heads, how far divine direction is implied in the practice.
That this is bound on us as a Church by divine direction, and to be performed to a considerable extent, so as to be an essential property of social worship under the gospel, is designed to be proved by the following considerations.
See Lecture VIII.
It is difficult to discern in what extent, before the establishment of the synagogue worship among the Jews, provision was made under divine direction, for the habitual reading of the Scriptures among them, in their religious assemblies. At the time of the delivery of the law, there was a command for the periodical reading of it, in the year of release: when" All Israel should come to appear before the Lord, in the place which he should choose.”* There may be perceived in the Old Testament other periodical readings of the law, which need not to be here recited; because they could not have answered the purpose of habitually presenting it to the popular attention. In what way this was done, is not evident; although that there must have been some provision for the purpose, we may infer from the circumstances of the dispersion of the Levites into their several cities, and the establishment of the seminaries of “ The sons of the prophets." For these things there would seem to have been no occasion, but with a view to the instruction of the people. And as the foundation of the instruction would be the divine law, this would be read to them of course. Without some such way of keeping up their knowledge of it, there would be little likelihood of their obeying of that precept concerning the divine commands—“Thou shalt talk of them when thou sittest in thine house, and when thou walkest by the way, and when thou liest down, and when thou risest up.”+
It must be confessed, that there is much obscurity on the present subject, until we come to the worship appointed for the synagogue. Even of this, we gather our information from the New Testament: yet it must be considered as applying to the times preceding the Christian æra, at least as far back as to the return from the captivity. Now the practice of reading the Scriptures in the synagogues, appearst from the offering of
# Deut. xxxi, 10. + Deut. vi. 7. | Luke xvi, 19.
the book to our Lord; on his being present in the syn. agogue of Nazareth, and his reading from it a passage prophetick of himself. To the same purpose we find, that St. Paul being at Thessalonica, " where was a synagogue of the Jews, as his manner was, went uinto them, and reasoned with them out of the Scriptures."* So the same apostle and his company being present at the worship of the synagogue in Antioch of Pisidia-after the reading of the law and the prophets, there was offered to them an opportunity of giving a word of exhortation to the people.
From the incidental notices in the New Testament of the manner of performing publick worship, we can gather from circumstances only, that it was customary to read, in the congregations of Christian people, the writings of the Old Testament. These must have been the books of which St. Paul speaks, when he says to Timothy—“ From a child thou hast known the holy Scriptures, which are able to make thee wise unto salvation:”I and again—"All scripture is given by inspiration of God, and is profitable for doctrine, for correction, and for instruction in righteousness.” The Scriptures here contemplated, were doubtless those of the Old Testament. These were absolutely neces. sary for the proof and for the explanation of the doctrines of the gospel: and if it should appear, that it was a part of the Christian economy to read them on occasions of social worship; there can be no doubt, that the Scriptures of the New Testament, after their publication, were not neglected: as indeed is more directly mani. fested by the usage of the early ages of the Christian Church, at a time when it cannot be supposed to have departed from apostolical appointment.
Some time passed over from the beginning of Chris. tian preaching, before either the gospels or the epistles were indited. But that on their appearance they were publickly read, may be presumed from St. Paul's directing in his epistle to the Colossians, ļ that it should
• Acts xvii. 2. † Acts xjii. 15. 2 iii. 15. S iv. 16. | <urn:uuid:ed8f934c-df27-4851-9e4c-914527dddbf0> | CC-MAIN-2022-33 | https://books.google.com.ph/books?id=ymwQAAAAIAAJ&pg=PA495&vq=%22thou+not+be+accepted%3B+and+if+thou+doest+not+well,+sin+lieth+at+the%22&dq=editions:NYPL33433070799204&lr=&output=html_text | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.977276 | 1,912 | 2.3125 | 2 |
The impact of electronic waste (e-waste) on our environment is a significant concern—especially as enterprises across the globe increase the use of electronic devices to innovate and attract new talent. Today, according to sustainability research from SOTI, a leading provider of mobile and IoT device management solutions, nearly 7 in 10 U.S. IT leaders are replacing devices prematurely and, even more, close to half (41.6%) replace mobile phones, handhelds and wearables simply for a shiny newer model.
Changes can be made in IT departments to reduce corporate e-waste and introduce Green IT solutions that reduce the negative impact IT operations have on the environment. As Shash Anand, SOTI’s vice president of product strategy points out, it begins with leadership’s knowledge of a device’s lifespan. The longer the device’s lifespan, the fewer hardware replacements IT departments conduct, saving leaders’ capital and positively impacting the environment. For those looking to make the necessary changes, Anand recommends the following small steps to adapt and adjust their sustainability practices.
Increase the Lifespan of Mobile Devices with Their Batteries
When enterprises have a mix of new and older devices to manage among their workforce, their natural inclination may be to simply update the older devices. But just like a car, regular maintenance and service can keep devices clean and help extend the lifespan.
The same idea applies to Enterprise Mobility Management (EMM) solutions, according to Anand. He adds, “having visibility into each device, plus a snapshot of what’s needed to increase its battery life, helps teams save on capital and begin to properly maintain the lifespan of their devices at scale. A few tips for better battery management include shorter idle times, using data to predict when batteries will fail, whether they will last a full shift when to replace them, and using battery dashboards to monitor the number of charge cycles and changes in temperature.”
Avoid Shipping Hardware
Due to a shift to a more hybrid working model, workers are scattered across various places or working remotely, making the process of getting a device repaired cumbersome with a lot of back and forth between the user and the IT department. Not only is this time-consuming, but it’s also an unnecessary burden on the environment with packaging, shipping and fuel costs.
The new way, as Anand describes, involves using a diagnostic intelligence tool that helps avoid shipping costs, reduces the environmental footprint, and saves time for the IT department and end-user. For example, when devices go down, it’s easier, faster, and greener to diagnose this information remotely versus shipping it back and forth. Not to mention, that the majority of time, it’s a software issue.
Recycle and Dispose of E-Waste Properly
As SOTI’s report outlines, 51.6% of IT leadership will replace tablets and laptops prematurely. And if requested to do so with no reason behind it, 38.2% will replace mobile phones, handhelds and wearables—leading wearables to top the list as 71% of most discarded devices.
With the latest and greatest devices rolling out every couple of months, it’s common for leaders to think the company needs the latest tech. Often there’s just no need to upgrade a device simply because it’s the latest one. Below are some ways leaders can reuse or recycle devices instead.
- Share devices among workers: Are there other departments within the organization who could use and repurpose the devices? Perhaps replace a paper and pen process with a mobile device.
- Donate devices no longer needed: Are the devices no longer working for workers or the company, but still in good working condition? Find a non-profit or small business who could benefit from using these devices. Be sure to wipe them and log out of any accounts before handing them over to ensure security and data privacy is maintained.
- Research where in the community electronics can be recycled: If the devices cannot be reused or donated, be sure to recycle them properly. The simplest step IT departments can take to reduce e-waste is to ensure any electronics are disposed of properly.
- Just like washing containers before they go into the recycling bin, it’s vital to clean and clear your previous device before you recycle it. EMM solutions can easily wipe their devices clean to ensure no corporate data is leaked.
Green IT is good business for IT departments, for companies, and of course, for the planet. Sustainability initiatives such as Green IT don’t have to be cumbersome. With some attention paid to sustainability, IT departments can add new and evolving goals to their sustainability practices, while leaders increase the currently low annual budgets and reduce the number of times devices are replaced. | <urn:uuid:c6d68f52-c431-4988-a672-3b7b01ae0ea9> | CC-MAIN-2022-33 | https://allgreenrecyclingservices.com/electronic-waste/how-leaders-can-reduce-the-environmental-impact-of-electronic-waste/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.924607 | 991 | 2.40625 | 2 |
Diamond Days The Crown Jewels! at The Beacons
It would be easy to think that up here in West Cumbria, you might miss out on the Diamond Jubilee celebrations. However, that is not the case for Copeland. The Beacon is celebrating the lead up to the Queen’s Diamond Jubilee in style by displaying some of the most famous symbols of the British Monarchy.
Opening on Monday 14th May as part of an exhibition of memorabilia relating to the reign of HM Queen Elizabeth II, Copeland Borough Council’s museum will be displaying a collection of no less than six replica Crown Jewels. These glittering symbols of British Royalty will be on display alongside an exhibition looking back at Royal Visits to Copeland.
These beautiful replicas have been produced for Royal Exhibitions by the London-based company Juliette Designs, who manufacture jewellery for film, theatre, shows and the bridal industry. Their replica Crown Jewels are exhibited worldwide.
The exhibition entitled Diamond Days, will be displayed in The Beacon Gallery on the second floor of the museum from Monday 14th May to Tuesday 5th June.
The replica crown jewels will be on display at The Beacon for a limited time only – Monday 14th to Sunday 27th May. During this time, special evening tours of the jewels will be available. Phone The Beacon directly on 01946 592302 for details and bookings.
Schools are also encouraged to take advantage of this wonderful opportunity. There is no charge for school groups to visit the exhibition, however due to the anticipated demand, special slots have been set aside for schools to book. Please call The Beacon’s Learning Team on 01946 592302, to make sure your school group doesn’t miss out. | <urn:uuid:9843ef8b-0ea5-4faf-97d2-912eba836b94> | CC-MAIN-2022-33 | https://replicacrownjewels.com/info/islington-gazette-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.947565 | 366 | 1.617188 | 2 |
The NHS is investing in an artificial intelligence avatar which will allow people to access their healthcare data more easily.
NHS Digital’s director of data Professor Daniel Ray told BusinessCloud that the IPsoft avatar – known as Amelia – could be the first point of contact for patients seeking personal information.
Available 24/7, it would also enable clinicians, researchers and commissioners to find and appropriately access the data they need and therefore improve NHS services, according to Prof Ray.
“AI can absolutely play a role in making healthcare more cost-effective and affordable, given the burden the population is placing on the NHS,” he said at the HIMSS UK Executive Leadership Summit at the King’s Fund in London.
“At the moment we’ve got people who are helping navigation to the data that we hold, but we’re investing in technology which will allow an avatar to do that. If you want some A&E data [for example] you’ll come and talk to ‘Amelia’.
“You can still talk to a person, of course, but we’re going to put technology up front.”
Requests through NHS Digital for all types of data are increasing, with double the number of applications received in 2017 compared with 2016. A little more than half of applications are for NHS purposes, with a quarter for research or academic purposes and a quarter for other national health bodies.
An avatar could make the process faster and more efficient while not losing the checks and balances necessary to keep information secure.
“The implementation of AI will be in a staged approach. We are at the early stages of it at the moment,” Prof Ray continued.
“There are still a number of unanswered questions such as regulation, commercial IP, ownership, ongoing tracking, and who does the AI make its decisions in favour of – is it the health system, or always the patient?
“It needs to walk before it can run, focusing in on making some of the routine decisions that are taken in a reliable way.
“Once it’s proven that it can do that efficiently and effectively without any adverse consequences and we maintain patient trust, we can start to advance it into slightly more complex areas.”
He added: “We’ve got a challenge around communicating the benefit to patients of AI. We need to come up with a set of language and phrases around some key points that we can put out as to what the true and real benefits are.
“Let’s not try and explain what’s in the black box, but try to put what it does in layman’s terms: how it may get key decisions made more reliably, free doctors up to do more complex things, take away some of the mundane routine things and improve the accuracy of diagnostics.
“These are easy for people to understand.” | <urn:uuid:bc2e8fa9-0699-4485-94cf-609e6a914ee6> | CC-MAIN-2022-33 | https://businesscloud.co.uk/news/nhs-investing-in-ai-avatar-to-improve-data-access/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.951753 | 606 | 1.71875 | 2 |
The long-awaited Presidio Parkway opened for the first time to Bay Area motorists on July 12th, ahead of schedule and to local and national praises.
The $1.1 billion Presidio Parkway replaces Doyle Drive – an outdated and seismically deficient viaduct – as San Francisco’s main connection to the Golden Gate Bridge. The new 1.6-mile, six-lane roadway tucks elegantly into the natural contours of the historic Presidio of San Francisco, and enhances transit, pedestrian and bicycle access within the national park area. The Presidio Parkway has received numerous honors, including awards for design, public outreach, historical renovation and innovative project delivery.
The Presidio Parkway is important in California because it is the only project delivered under the state’s revived public-private partnership (P3) law, which in 2009 authorized Caltrans and regional transportation agencies (under Streets & Highways Code Section 143) to enter into an unlimited number of P3 projects without certain restrictions that previous laws had imposed.
The Presidio Parkway was procured jointly by Caltrans and the San Francisco County Transportation Authority using California’s first availability payment contract for a transportation project. Under the contract, between Caltrans and Golden Link Concessionaire (GLC), GLC is responsible for delivering and operating the project using the design, build, finance, operate and maintain (DBFOM) model. In exchange for providing these services, GLC receives a construction milestone payment (payable shortly after the project opens to traffic) and a 30-year stream of availability payments to cover its costs to finance, operate and maintain the project plus a reasonable return on equity.
Availability payment P3s gained traction in the U.S. over recent years, as cash-strapped government entities searched for innovative ways to deliver much needed infrastructure to their constituents. These deals are attractive because they can offer significant advantages over traditional project delivery methods, including freeing up public funds for use on other projects, achieving expedited delivery schedules, and shifting to the private sector the risks of financing, design, construction, operation and long term maintenance.
Despite California’s multi-year multi-billion dollar shortfalls in highway transportation funding, however, the state has been slow to use its broad P3 authority for highway projects. Some market observers attribute this to the effects of the last financial crisis and considerable in-state political opposition to P3s, which contributed to the lapse in 2003 of the state’s previous P3 statutory authority.
The Presidio Parkway is currently used as a case study by the USDOT’s Build America Transportation Investment Center (BATIC), which serves as a one-stop shop for state and local governments, public and private developers and investors seeking to utilize innovative financing strategies for transportation infrastructure projects. P3 proponents are hopeful that a Presidio Parkway success story will reinvigorate California’s appetite for highway P3s, before the existing statutory authority expires at the end of 2016.
For more information on the Presidio Parkway and other US transportation P3 projects, visit BATIC’s website at http://www.transportation.gov/buildamerica.
Nossaman LLP’s 30-plus infrastructure attorneys offer clients, colleagues, strategic partners, and industry media a wealth of practical experience, insider insight, and thoughtful analysis here on Infra Insight. We blog about what we know best, from industry-leading procurements to local and national policy developments that affect the market and our clients. | <urn:uuid:843930ea-8ba7-41b2-ab27-053c9db0478a> | CC-MAIN-2022-33 | https://www.infrainsightblog.com/presidio-parkway-opens-in-san-francisco | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.925879 | 730 | 1.96875 | 2 |
Last fall, shortly before Qantas Flight 32 gave a hairy, scary ride to 446 people on the Airbus A380, I was invited to tour the Airbus Training Center in Miami, Florida, given a detailed tutorial on the Airbus design and safety philosophy and just for fun – allowed to pilot the A340 simulator.
These high-tech simulators can be programmed to fly any flight when the data has been captured, so we flew USAirways Flight 1549, better known now as the “miracle on the Hudson“. This was, at the time, the most famous example in aviation of turning chicken s**t into chicken salad.
Airbus and Chesley Sullenberger may differ over how important the fly-by-wire design was to the successful water landing of the A320 after geese disabled both of the airliner’s engines. But the point is that the opportunity to analyze and re-analyze the flight through simulators is beneficial, hindsight being 20/20 and all that.
Photo courtesy ATSB
Of course, the tan I acquired in Miami was barely fading when USAirways Flight 1549 was eclipsed on November 4, 2010 by the near disaster of Qantas Flight 32, the result of another engine failure, this one endogenous. Within weeks, investigators with the Australian Transport Safety Bureau determined that a burst engine disk on the left inboard engine was the result of a manufacturing defect in the production of the Rolls Royce Trent 900 engine.
So the passengers and flight crews who have or will in the future be traveling on the mammoth A380 – now the world’s largest passenger jet – should take comfort in knowing that the ATSB has been flying simulations too.
I’ve been blogging for a while about how this accident seems to implicate more than the engines, it raises concern about the airplane itself. Capt. Richard de Crespigny, commander of the five man crew (and who now can choose among several media-bestowed nicknames, Capt. Courageous, Capt. Marvel and my personal favorite, Capt. Fantastic) flew the plane in crisis with this help for two hours that day in November. He continues to praise the A380 for holding up while error messages spat out of the flight computer at a startling clip. Still, the overriding question remains; why did so many things go wrong?
In an announcement today, the ATSB promised it is still looking for the answer. By examining the damage to the plane and its systems it hopes “to understand its effect on those systems and the impact on flight safety. That includes their effect on the aircraft’s handling and performance and on crew workload.”
The airlines that fly the Airbus A380, Lufthansa, Air France, Emirates, Singapore, and soon, others, consistently fly them with two-person crews. Only luck or Providence is responsible for the fact that on the Qantas flight five highly experienced airmen were on the flight deck trying to sort out the problems.
So before the investigators wrap up the Flight 32 investigation, they should be darn sure Qantas Flight 32 isn’t written up as a near-disaster, successfully completed by a crew of heroes and an exceptional plane. They should fly the simulator and make sure that this airplane isn’t too big and too complicated for two pilots to handle when things go wrong.
Author of The New York Times bestseller, The Crash Detectives, I am also a journalist, public speaker and broadcaster specializing in aviation and travel. | <urn:uuid:22d17636-5d6d-4226-ab44-1cfe100fa781> | CC-MAIN-2022-33 | https://christinenegroni.com/australians-simulate-airbus-380-near/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.946175 | 732 | 1.992188 | 2 |
While it might seem like Africa is far behind in progress to the external world, a deeper look at the nation shows a high level of progress. According to statistics, Egypt is now known as the first country on the digital competitiveness index with a score of 258 points. The county is then followed by other states, including Gambia and Tanzania, with a score of 160 and 135 points, respectively.
The Future Of Digitalization
When the internet is widely used, we may say that the digital revolution has occurred, and they are moving toward a completely electronic society. Digital technology has the potential for a similar impact on Africa as it had on the western world during the first industrialization.
Despite Africa’s steady economic progress over the last two decades, the continent is constantly working on delivering many of the necessary ICTs facilities and networks and various services other areas offer. All of this makes the digital future look promising.
The Effect Of COVID On Tech Adoption
COVID-19 has accelerated Africa’s ability to speed up the digitalization process. During the implementation of the stay-at-home orders, individuals resorted to mobile devices such as smartphones, tablets, and computers to go on with their daily lives.
Regarding network infrastructure, telecom company use costs, and even educational standards, there were evident restrictions on particular nations, the availability of devices that provided connection, and the ability to pay for such products. Despite this, the overall trend was obvious.
The finest illustration of this is education. When schools in Africa were shut down and pupils were forced to remain at home, instructors had to come up with other ways to teach. Technology businesses that had difficulty persuading educators and parents that their products were worthwhile were flooded with requests. The number of people using digital platforms increased dramatically.
The Future Of African Industries
Different industries are excelling thanks to digitalization, and progress can be seen. A clear example of the medical domain excelling can be seen in the work of Temie Giwa-Tubosun. LifeBank was launched in 2016 to improve the delivery of plasma and medical specimens in Nigeria and Kenya. For instance, hospitals may buy certain genetic traits from licensed blood banks using an internet portal. An AI-based distribution system and more user-friendly technologies like the USSD or SMS system make the service more convenient for customers.
Even the world of consumer goods is benefitting. Africans and companies like Jumia were compelled to explore the advantages of online marketplaces as the epidemic forced them to use digital platforms for everything from manufacturing to healthcare to real estate and garbage management. As a result, platforms and their suppliers and subcontractors saw a rise in demand, which led to increased job opportunities.
With a growing youth demographic, evolving nature of employment, climate change for the better, rise of various platforms, and connectivity as the driving forces, it is very much possible that the entire continent will adapt technologically at a faster pace than ever before. | <urn:uuid:b04226ba-2050-4799-ab1a-448ec691087c> | CC-MAIN-2022-33 | https://awakeningafricamag.com/the-future-of-the-african-digital-revolution/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.964941 | 602 | 2.34375 | 2 |
Next.js is an open-source development framework built on top of Node.js enabling React based web applications functionalities such as server-side rendering and generating static websites.
|CPU (Core)||RAM (MB)||Temp. Storage (MB)|
How to deploy Next.js
To install this service, go to the service library. Select the Next.js service and click "Add service". Follow the on-screen instructions and finalize the create process by clicking "Save".
There is detailed tutorial available on how to launch Next.js with mogenius. | <urn:uuid:58ceb1e1-57b9-43f3-b49f-b5dc297f76ea> | CC-MAIN-2022-33 | https://docs.mogenius.com/services/frontend/nextjs | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.760686 | 140 | 1.625 | 2 |
Using evidence for Aflatoxin Control in Ghana
Aflatoxin contamination is highly prevalent in Ghana and affects crops such as maize, groundnuts, and their processed products, exposing humans and animals to the consumption of contaminated food and feed. This has a significant negative impact on public health, food and nutritional security and incomes of poor households. Ghana faces a number of challenges to comply with stringent requirements related to aflatoxin levels requested by importing countries and to develop potential value chains for export. SPS capacity gaps in the public and private sector, weak institutional capacity and limited resources are among the key challenges faced.
The purpose of this PPG is to enable concerned public and private sector stakeholders, with interest in aflatoxins (from agriculture, trade, health perspective) to (i) support the implementation of the national policy for aflatoxin control in food and feed by applying STDF's P-IMA framework to rank the various activities identified in the policy's implementation plan, and (ii) based on prioritized actions identified, develop a project proposal for funding by STDF and/or other donors. | <urn:uuid:206b20ea-142c-4d09-9a8e-ff8c40b4fa1b> | CC-MAIN-2022-33 | https://www.standardsfacility.org/PPG-786 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.931641 | 233 | 2.4375 | 2 |
As Donald Trump got elected as the new president of the United States, concerns have emerged inside NASA –and among its fans – about the future of the agency’s earth science program. The concern continues to increase as Trumps surrounds himself with advisors who are somewhat skeptical about global warming.
One of the more noticeable statements made by Trump during his campaign regarding sciences comes from his space policy adviser Robert Walker, and it focuses on a reduction of funding for the environmental science research at NASA with the apparent objective of depoliticizing the sciences.
“Mr. Trump’s decisions will be based on solid science, not politicized science,” Walker said.
The future of NASA
NASA’s achievements and space missions along the years have fascinated the American Public. People trust NASA, and according to national polls, it is the second-most trusted governmental institution after the Centers for Disease Control and Prevention.
However, NASA’s work on our planet might be compromised under the upcoming Trump’s administration. Trump has energetically shown that he does not believe in climate change. Therefore NASA’s $2-billion-a-year earth-science program, which has long tracked global-scale environmental conditions on Earth, including climate change, could be even shut down.
Just a few hour after Trump’s acceptance speech on Nov. 9, an internal email from a senior official in the Earth Sciences division at NASA’s Goddard Space Flight Center circulated within NASA where it was highlighted that NASA might be exposed to severe funding reductions. And the alarms have not been reduced at all.
Science should not be politicized
All over the years, the budget destined to NASA’s Earth Science Division saw several fluctuations. There was a substantial investment during Reagan’s mandate. George H.W. Bush founded a program called “mission to planet earth”. On the contrary, George W. Bush reversed course reducing funds for the program. He was even accused of trying to eliminate NASA research on global warming.
The funds were restored by Obama. During Obama’s administrations, the increasing investments in climate science were criticized by several republicans such as Ted Cruz or Lamar Smith, who said that NASA should focus on outer space, not on the Earth, let alone climate change research.
As Smith put it in 2015, “There are 13 other agencies involved in climate-change research, but only one that is responsible for space exploration.”
According to Walker, Trump’s choice to lead the transition at NASA, the agency’s research should not be politicized. He referred to NASA’s earth science program as politically correct environmental monitoring and said that the agency should focus on deep space achievements, moving its earth science missions to the National Oceanic and Atmospheric Administration.
The climate change-skeptical republican also said that NASA funding should be based on merit and not politics. However, why should Walker think that there is a lack of merit in NASA’s earth sciences division?
On the matter, the director of the Earth Sciences Division at NASA’s Goddard Space Flight Center, Piers J. Seller – A former astronaut and a climate scientist – said that he would not talk about the politics surrounding NASA during this transition of administration. However, he did say that NASA has a unique and important position regarding global environmental risks, therefore this division of the agency does require the funds to work.
Source: Herald Net | <urn:uuid:13bd0da4-5502-4fd7-9fc0-a4c7ce2043f2> | CC-MAIN-2022-33 | https://www.pulseheadlines.com/future-nasas-climate-research-trump-administration/56794/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.957225 | 713 | 2.34375 | 2 |
The CBEP is glad to announce the next Webinar “Technology focus: Natural Gas and Biomethane” that will take place on Thu, 8th September 11.00-12.00 CEST.
The webinar will be conducted by Jean-Marc Boucheret, Public Transport Sustainable Mobility Manager at IVECO, who will cover, among others, the following aspects:
- Introduction to natural gas technology (CNG, LNG) and biomethane technologies
- Vehicle and components
- Refuelling infrastructure
- Safety aspects
- Technology main advantages and drawbacks
- State of the art and future developments
If you are interested in joining, please register here or contact Aida Abdulah (email@example.com). | <urn:uuid:bd44e527-2c61-4c86-bcaa-4be4959f2528> | CC-MAIN-2022-33 | https://cleanbusplatform.eu/news-and-events/events/webinar-technology-focus-natural-gas-buses | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.874735 | 162 | 1.65625 | 2 |
Vital soil organisms being harmed by pesticides, study shows
The tiny creatures are the ‘unsung heroes’ that keep soils healthy and underpin all life on land
Pesticides are causing widespread damage to the tiny creatures that keep soils healthy and underpin all life on land, according to the first comprehensive review of the issue.
The researchers found the measured impacts of farm chemicals on earthworms, beetles, springtails and other organisms were overwhelmingly negative. Other scientists said the findings were alarming, given the importance of these “unsung heroes”. | <urn:uuid:7da83cb1-83ac-4c92-a4c9-6486bf0850df> | CC-MAIN-2022-33 | https://www.theweeklyinvestor.com/2021/05/04/vital-soil-organisms-being-harmed-by-pesticides-study-shows/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.952686 | 113 | 2.609375 | 3 |
The Nanda Devi peak in the Garhwal Himalayas, which are well known for their beauty, is one such breathtaking peak. The national park, which was founded in 1982 and is now a World Heritage site, is situated all around the top of the Nanda Devi. The Valley of Flowers National Park and the park Sanctuary, which is a ring of mountain peaks with elevations ranging from 6000 to 7500 metres, make up the park. Over 3,500 metres above sea level, the park’s whole area, is located. Although this Sanctuary trip is still a highly regarded walk, the park itself is now inaccessible to the public owing to ecological damage and environmental concerns.
The Nanda Devi Sanctuary’s perimeter is bordered by valleys and meadows straight out of a fantasy. Mountaineers have an unrivalled perspective of the Kuari Pass as well as the neighbouring peaks Dunagiri and Kamet when climbing up Nanda Devi. There are two sections to the Sanctuary:
Inner Sanctuary: The Nanda Devi and two glaciers next to the peak—the Rishi Glacier in the north and the Rishi Glacier in the south—cover about two-thirds of the area in the east. In 1934, Eric Shipton and H.W. Tilman are said to have been the first two trekkers to successfully penetrate the Inner Sanctuary.
Outer Sanctuary: The Inner Sanctuary is separated from the Outer Sanctuary by ridges, which accounts for roughly a third of the total Sanctuary area in the west. In actuality, only the Rishi Ganga can get through this ridge wall, which is 6000 metres high. It’s thought that T.G. The first person to successfully travel through the Outer Sanctuary was Longstaff, who in 1907 ascended Trisul I (the glacier located in the south). Also explore about Hampta Pass Trek and Valley of Flowers Trek .
Joshimath is the starting point for one of the greatest Nanda Devi trekking routes. To reach Lata Village and the Nanda-Devi temple, where this journey truly begins, hikers use the road. Lata Kharak is a high plateau that requires a four-hour hike to reach, but the landscape makes the effort worthwhile. The Dharansi Pass is the next stop, and the path provides a good view of peaks covered in snow, such the Dronagiri. The Malthuni-Betratholi ridges, which create a beautiful route to Rani Kholi and Donidar, are simpler to approach from this pass. The Hitoli camp site, accessible from Jhandi Dhar through a magnificent route that travels through groves of rhododendron and fir trees, is the next destination after returning to the Dharansi Pass. Trekkers must go via the hamlet of Tolma before continuing on by car to Joshimath. It takes 10 days to finish this hike in a national park.
Nanda Devi Base Camp (7816 metres), the second-highest summit, is found in India’s Uttarakhand Himalayas. Its source is the little Kumaun Garhwal city of Munsiyari. This mountain is very beautiful and important to the people. On the peak’s eastern flank lie Pachu Glacier and Nanda Devi Base Camp. To reach the Nanda Devi Base Camp, one can travel along the trade route that previously carried a civilised people.
Nanda Devi Peak has two summits: Nanda Devi East (7,434 m) and Nanda Devi West (Nanda Devi) (7,816 m). The Nanda Devi East Base Camp Trek, we have observed and learned, is the best way to experience these spectacular peaks up close.
This post was created with our nice and easy submission form. Create your post! | <urn:uuid:e29db509-f503-41d4-9f84-7cc7fe90c243> | CC-MAIN-2022-33 | https://picgiraffe.com/explore-about-nanda-devi-peak/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.953188 | 790 | 2.40625 | 2 |
India has contributed immensely to the emergence and development of mankind through Ayurveda. Ayurveda is a blessing of God to the whole world. Ayurveda means the "science of life". The basic principles of Ayurveda are based on the concept of the five elements (PRITHVI-Earth, AAP-Water, TEJ-Fire, VAYU-Air, and AKASH-Space). This universe has been build by these five elements. Ayurveda is a unique yoga of science, philosophy, and spirituality in which the plants and minerals derived from nature are processed in a specific manner and used as therapeutics. The great Scholars like Charak, Sushruta, wrote the description of these medicinal preparations based on their experience. Which are very relevant and useful even in today's modern era.
Inspired by these basic principles & concepts of Ayurvedic Science, Unjha Ayurvedic Pharmacy, located in Unjha, Gujarat, has been continuously engaged in the manufacture and distribution of Ayurvedic medicines for more than a century, which aims to manufacture the best Ayurveda products. More than 400 Classical and proprietary Ayurveda medicines are manufactured by Unjha.
A JOURNEY OF TRUST & CARE OVER 125 YEARS [CALL US FOR FREE ONLINE CONSULTATION FROM OUR VAIDYA JI M. 08527675280]
Dhanwantary Prasad, Station Road Unjha Gujarat India +918037405265 | <urn:uuid:a57ee869-8089-40c4-a5ea-a13a3ab0757d> | CC-MAIN-2022-33 | https://m.unjhaayurvedicpharmacy.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.92941 | 332 | 2.09375 | 2 |
Going to college in the city is expensive. The price of attending Boston University is $45,686 for the 2014/2015 academic year, much more expensive than going to college in places like the South or Midwest.
Going to school in a city like Boston gives you access to experiences that you don’t have in most places.
“One of the major attractions to attending school in Boston is the plethora of companies that are based in the city and surrounding area. Whatever your major, there is usually an internship or some other experience that can enrich your learning experience and allow you to gain some skills that are essential to your area of study,” said Kyla Fearon, a sophomore from Northeastern University.
At BU, students have the opportunity to get hands-on experience in the field they are interested in through research, internships and volunteer work. For example, the College of Communication provides opportunities like the State House Program and a fellowship with National Public Radio-affiliate WBUR right on campus.
Alyssa Ling (CAS ’17), who is interested in teaching, likes the accessibility to schools in the city because it allows her to volunteer. “There are a lot more opportunities to help out in schools here, as compared to other places,” she said. Ling volunteers at William Monroe Trotter Elementary School in Dorchester through BUILD — a collaborative program that allows BU students to tutor students in the city’s public schools.
Those experiences help after graduation. Boston University graduates typical early career salary is $50,100. Alums from Massachusetts Institute of Technology and Tufts University report similar numbers.
More generally, Boston has a lot of opportunities for young professionals after students graduate. According to Social Explorer, which provides nice visualizations of US Census data, 18 to 34 year olds make up 71% of all employed adults in Boston, compared to 65% in the rest of the country. Plus, the median earnings for full-time employees in Boston is $44,548 compared to $33,883 in the United States.
Put in words, Boston is a good place to be young, with lots of job opportunities for young people.
Still, going to school in the city has it’s downsides. A big one students point to is the lack of cohesion on city campuses. “Lots of schools don’t really have a campus; rather it’s incorporated into the city. So one downside is that we never really get the full ‘campus’ experience,” said Ling.
Joyce Chang, a sophomore at Boston College, which is 45 mins away from the city by T, echoed that sentiment. She said she likes that students there have close bonds with other students and faculty. Chang said it translates into a strong sense of community where students feel safe and can depend on school resources.
But even if city campuses can feel disjointed, they make up for it in their connections to the city.
“Attending a university in a city like Boston is a one-of-a-kind experience,” said Fearon, the Northeastern student.
College is as much about exploring and experiencing new things as it is about textbook learning, and there is always something to do in the city, especially relating to the arts. Students have the opportunity to attend the Museum of Fine Arts, see a show at the Huntington Theater, or watch the Boston Ballet. Many of these cultural experiences are free or at a student discount.
Often these opportunities are within walking distance, and the city’s landmarks make it hard to get lost. “I love that the city is walk-able, and that you can never get lost with our trusty Pru’ standing tall,” said Leslie Ress (CAS ’15).
The best part of living in the city though would be the the type of people you meet in Boston. According to Boston Magazine, “a quarter of a million college students reside in Boston and Cambridge, making us America’s youngest major metropolis,” and many of these students come from diverse backgrounds. Nearly 20% of the population of 18 to 34 years olds in Boston is born in another country.
While the city may not feel like a tight-knit community, many students here at BU are accepting of others, whatever flaws you may have.
As a shy and indecisive female from suburban New Jersey, I have grown a thicker skin while living in Boston. The students at BU are driven, motivated, and hard working, which forces me to get out of my comfort zone and to be more confident in myself. While I may have chosen the insecure career of journalism, I am confident that if I work hard, go after the opportunities presented, and trust myself, everything will eventually fall into place.
After all, there is always something happening in the city of Boston. | <urn:uuid:073ec1d7-7701-45f5-ad8e-7f152c0252e0> | CC-MAIN-2022-33 | http://buquad.com/2014/12/19/advantages-of-going-to-college-in-boston/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.961699 | 1,008 | 1.859375 | 2 |
Learn English by using English
With Holmwood’s English Premium, your students learn real English in an attractive way. Students can learn independently using our online environment. As a teacher, you can use our classroom materials to ensure that your students actively use English in class.
Unique yet proven English course
English Premium is broadly based on the communicative approach. By using English and being exposed to large amounts of authentic material, both written and audiovisual, students learn in a natural manner.
Our approach is based on teaching experience, empirical research and a good dose of common sense. The priority is always to ensure that students learn effectively, quickly and enjoyably.
How to use
English Premium is an online course. Both teachers and pupils have their own personal accounts. Pupils can work independently and teachers can follow their progress, listen to their pronunciation and see their strengths and weaknesses. All exercises are automatically corrected. Classroom time can be used for speaking and activities.
Unique writing module
Tired of spending hours marking writing assignments? Our unique writing module lets students do writing assignments that are first corrected by the system and, after that, by a real teacher. The student gets feedback and a mark, without any extra work for you!
For schools and other institutions our courses are built into a comprehensive class and results management system. Whether you have 10 or 10,000 students they can be added quickly and easily and can start immediately.
As a teacher you have the choice to let students work at their own pace, or you can choose to keep all students together in one unit or level. By scheduling goals you have as much or as little control over students progress as you wish.
Looking for classroom activities? You can use our smartboard materials and activity sheets. You can download these from the learning environment. | <urn:uuid:125a4c3f-b5ed-4fd4-8546-470e019c9997> | CC-MAIN-2022-33 | https://www.teflresources.eu/our-courses/premium/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.953532 | 381 | 2.296875 | 2 |
I started modeling in highschool and had waist length dark brown hair and brown eyes. When I do the entire makeup, eyelashes, excessive heels, gown look I am very intimidating.
This was the princess, essentially the most lovely woman he had ever seen. It at all times works when a wonderful woman on my right raises her hand. Beauty standards around the globe can differ tremendously, although sincerity and pure magnificence, at all times wins compared to those depicted in social media. When we enable our requirements of magnificence to blossom and turn out to be extra inclusive, the idea of beauty will—by nature—become a feminist manifesto.
Naysayers also dub it “heroin chic” for the gaunt look related to Seattle’s grunge music scene. At 5’7” Moss is undeniably petite for a model and thin, even by industry standards. It’s a firmly unathletic look and a reaction to the Amazonian, uber-fit woman of the 80s.
The snail slime facial is real and really good for your skin, says New York City-based dermatologist Joshua Zeichner, M.D. “The slime that snails produce is rich in hyaluronic acid, which explains why snail facials can help soothe the skin,” he says. “Hyaluronic acid is a pure sugar with powerful humectant properties. It attracts water from deep throughout the skin to assist hydrate the dry outer layers.”
These women additionally saved their bodies covered from head to toe, even in the hottest of months to maintain their pores and skin from tanning. Māori ladies in New Zealand have traditionally adorned a tattoo on their chin as a way to draw a mate. Each moko is completely different and contains ancestral tribal information specific to the wearer. The moko additionally displays the lady’s family and tribal affiliations, as nicely as her social status inside her tribe. As time goes by, a woman’s status within the Masai tribe, as nicely as other tribes in Africa, is heightened by how large and elongated her earlobes have turn out to be. To draw consideration to their elongated earlobes, Masai women will adorn them with brightly colored beads and jewellery to draw attention to their impressive size. “They have turn into extra style aware because they are disadvantaged of it,” author of Reading Lolita in Tehran, Azar Nafisi, informed ABC News.
Women have minds and they have souls as well as just hearts. They’ve got ambition and they’ve got talent as well as just beauty.
I am so sick of people saying that love is just all a woman is fit for. I’m so sick of it. But… I am so lonely.
— KRAMPUS 🌲✨ (@ilysmhp) July 1, 2021
2021 signifies a golden period of absolute equality in which the fruits of liberation are blooming past the vines of victory. We find ourselves experiencing a paradigm shift just like that of the 1970s, only this time Black trans women aren’t an afterthought—we’re the driving force. The glow of a burgeoning future is on the horizon, and if Black trans women are capable of flourishing, anybody can. In 2018, participated in Miss International Queen, the sweetness pageant for transgender girls since 2004, in Pattaya, Thailand. Catalog Enriquez was crowned as Miss Nevada in the Sally Beauty Careers magnificence pageant and became the first trans woman to take part in Miss United States on November 29, in Tulsa, Oklahoma. This 12 months, Woodall plans to release three ‘gold star’ launches (“a hugely progressive new product or category”), two ‘silver star’ launches (“a set in an current category”), and 4 shade extensions. Previous ‘A star launches’, like tinted serum-skincare hybrid BFF DeStress, have not solely pushed the business’ bottom line up by £50k ($69k) in a day, however resulted in long-term boosts.
But that particular numerical milestone will all the time hold a certain significance in phrases of beauty. Before we’re in our thirties, most of us aspire to shine up our make-up sport, work out which hairstyle is definitely our greatest look, and finally shake off tired insecurities for good. At the identical time, turning 30 has a means Hot Wife of suddenly making wrinkles and grey hairs pop up someplace on your to-worry-about radar. So for all of you approaching this imaginary-yet-important beauty deadline , we provide 30 gems of hard-earned beauty wisdom that’ll carry you into your prime years, so you can feel and appear extra attractive than ever.
- As a child I took her playful heart without any consideration, but as an adult I can see that my mom has the reward of lightness.
- We know you’re sick of listening to it, however you need to put on sunscreen—rain or shine, each single day.
- The same symmetry of face with more masculine options defines an attractive man.
- With girls spending a lot time veiled, they embrace the utilization of surgical procedure on one of the few physique elements that they can present.
- While each men and women are tattooed, the primary purpose for girls to tattoo their lips and chins is for beauty.
Your lover must be reminded that she is gorgeous in and out. If your relationship is new, then you definitely need to inform her this each second of daily. If you may have been across the block collectively a quantity of instances, then you know the way important it’s for you to maintain telling her. Being in a relationship for quite a long time does not imply that the spark of romance should die. As you spend extra months and years collectively, it’s all the extra important to rekindle the love and hold the hearth burning. Just get into the behavior of telling her how candy, sensible, humorous, and delightful she is to you.
The result’s a discerning curation of products, suggestions, and inspiration deemed important — the Industry’s Beauty Edit. If you’re not the kind who enjoys researching/trying each new skincare pattern and product, don’t worry. | <urn:uuid:97c9fd83-fa37-4e74-98f8-ad0e4ee17517> | CC-MAIN-2022-33 | https://quattrozerodelivery.co.uk/toothless-tiktok-woman-responds-to-trolls-who-criticize-her-beauty-transformation.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.944617 | 1,345 | 1.523438 | 2 |
To help you choose, install and maintain your garden shed or log cabin, we have put together a number of instructional documents. They should be treated as guides, if you require any further help please feel free to contact us.
Sheds and Log Cabins – Planning Permission
A guide that list some key points to take into consideration when thinking about what kind of shed or log cabin you think you are after. Our sales team is always available to speak to you about your requirements.
Construct a Base
A guide for all skill levels, follow this step by step booklet, with a bit of hard work you can make your very own base for your shed saving you money. Alternatively if your after somebody else to do the work for you then please contact us, for our recommendations on base work specialist.
A brief description of some issues to look out for to keep your shed and log cabin lasting longer. Roofing felt ripples, movement on the floor, damp by the windows & dampness at ground level. If you need to, you can contact us regarding your concern with any queries on your building.
A guide for assembling your Titan Garden shed. One person can assemble the majority of small sheds, it is recommended that 2 fit and able body people assemble any shed. Alternatively we are able to install the shed for you, this is recommended and occurs with approximately 95% of all our sheds.
To make your building last longer and get more years for your money we recommend a primary, secondary and possibly final coat applications. You have purchased a quality product so it is sensible to offer quality treatments. Water & damp are the main enemy of timber buildings. We hope the information in this leaflet will help you combat these.
We hope the DIY Help page was useful to you. | <urn:uuid:378d98cc-f1d2-45a9-99cf-6ca10fa2cb45> | CC-MAIN-2022-33 | http://titangardenbuildings.com/diy-help/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.941983 | 376 | 1.617188 | 2 |
When designing a garden, I am often looking for plant material that tolerates both full-sun and shade conditions. Perhaps the garden bed includes a young tree that currently provides very little shade but over time will shade more and more of the garden. In this situation, I want a plant that can tolerate full sun now but will be just as happy once the garden is shaded. Or I may be looking for plants that I can weave throughout a planting to create rhythm and continuity in a garden that straddles different sun exposures. Whatever the reason, finding plants that tolerate both sun and shade is no easy task, especially in the hot Southern Plains.
The obvious choice might be plants labeled as “part sun” or “part shade”; however, many of these plants cannot tolerate our hot afternoon sun. They thrive in morning sun and afternoon shade or filtered light throughout the day. Others struggle with too much shade. After a bit of experimentation and much searching, I’ve created a plant palette that works under varying sun exposures. The following are just a few plants that transition well in these challenging sun-shade scenarios. As you experiment with others, pay attention to heat tolerance. Our sizzling summer sun is often the limiting factor.
Shrubs for sun-shade transition areas
Mountain bush honeysuckle
(Diervilla rivularis and cvs., Zones 5–7)
There is so much to love about this gorgeous native, from sunny yellow blooms buzzing with pollinators to gorgeous colorful foliage. The variety ‘Kodiak Black’ (pictured) is a standout that displays burgundy-black foliage in spring and fall, with lighter tints in summer. Fall brings dry fruit capsules that attract songbirds. A reliable bloomer throughout the summer in sun or shade, ‘Kodiak Black’ grows 3 to 4 feet tall and wide, tolerates a variety of soil types, and thrives in any sun exposure.
(Abelia chinensis and cvs., Zones 7–9)
An abelia variety exists to complement just about any garden design. The floriferous ‘Rose Creek’ (pictured) is among my favorites. It blooms in early May, with sporadic flowers throughout summer before another mass bloom in September. This dense, mounding variety grows 2 to 3 feet tall and 3 to 4 feet wide. Also look for variegated hybrids and larger cultivars to meet your design needs. Abelias are gorgeous massed around trees, providing a seamless transition from sun to shade when they are provided with rich, well-drained soil.
(Viburnum carlesii and cvs., Zones 4–7)
This spring-blooming beauty fills the garden with spicy-sweet perfume in late March to April. A slow growing shrub, reaching 4 to 6 feet tall and wide or larger, Koreanspice viburnum is a wonderful choice for planting in beds with young trees that will eventually provide shade. Wine-red autumn color adds interest to the garden, while birds flock to the late-summer fruit clusters that turn shiny black in fall. Plants prefer moist, well-drained soil but tolerate heat and drought once established. They also work well in windy sites.
Perennials that can tolerate bright and shady conditions
(Malvaviscus arboreus var. drummondii, Zones 7–10)
One of my favorite native plants for its versatility and heat tolerance, Turk’s cap grows as a subshrub or dieback perennial, depending on location. In the northern parts of the Southern Plains, it dies back to the ground each winter, while in the southern parts it remains evergreen. Even dieback plants can grow 3 to 5 feet tall and wide each season. To say this plant is rugged is an understatement. I’ve seen it growing out of a limestone cliff face in Texas in the full sun, though plants are more at home along streams and woody edges. In sun or shade, plants produce an abundance of twisted red blooms that attract hummingbirds and butterflies from early summer through fall.
(Spigelia marylandica and cvs., Zones 5–9)
I’ve grown this native perennial, which is also called Indian pink, in full-sun and full-shade conditions in Oklahoma. In nature, it is found in moist woodlands and along streambanks. In the garden, it performs best in partial shade, however, don’t be shy about planting it in transitional areas. It tolerates dry shade but needs a bit more water in full sun. Growing 12 to 24 inches tall and wide, pinkroot emerges late in the spring and produces gorgeous red and yellow blooms through much of May. Hummingbirds adore this stunning, adaptable plant.
(Ajuga reptans and cvs., Zones 3–10)
A flowering evergreen ground cover for sun or shade, bugleweed tolerates all light conditions and is quite adaptable to different soil types and moisture regimes. The foliage comes in a variety of hues and sizes, from the diminutive ‘Chocolate Chip’ to the purple-bronze ‘Catlin’s Giant’ (pictured). Plants spread to form a low-growing mass 6 to 12 inches tall and up to 2 feet wide. Bugleweed can be aggressive, so avoid planting it near plants sensitive to crowding, like the pinkroot described above.
—Kim Toscano is a horticulturalist based in Stillwater, Oklahoma. She previously hosted Oklahoma Gardening, a weekly PBS television program produced by the Oklahoma Cooperative Extension Service.
Photos: Kim Toscano | <urn:uuid:7f9589ac-4dc7-4ab4-9006-b0a5b85c086e> | CC-MAIN-2022-33 | https://homegrownediblegardens.com/2022/04/21/6-great-plants-that-tolerate-both-full-sun-and-shade-conditions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.922888 | 1,212 | 2.15625 | 2 |
WEST LAFAYETTE, Ind. — Fresh produce growers and consumers have been hearing mixed messages about farm markets shutting down because of regulations established through the Food Safety Modernization Act, specifically the Produce Safety Rule.
“Here’s why farmers markets will never go away: Consumers will always be able to buy direct from the farmer,” said Amanda Deering, clinical assistant professor, Department of Food Science at Purdue University. “Farmers’ markets provide an opportunity for direct-to-consumer sales of a variety of products, including fresh fruits and vegetables.”
“FSMA helps ensure consumer confidence that the foods they buy are safe as possible,” Deering said. “FSMA is all about preventing contamination and this is done, in part, by educating producers with programs like Good Agricultural Practices. The goal is to prevent contamination from occurring rather to reacting to an outbreak like we have in the past.”
A farm is covered by the FSMA Produce Safety Rule based on total sales. Growers are exempt from the Produce Safety Rule if their annual average total in produce sales (in the previous three years) is $25,000 or less. If average food sales are in the $25,000 – $500,000 range, vendors can still qualify for an exemption if they sell within the same state or within 275 miles of the farm. At that point, they would only be required to label their produce with the farm name and contact information.
The practice of growers selling to another business, such as a restaurant, is considered wholesaling. The Indiana Department of Health requires wholesale growers and distributors to register at no charge at https://forms.in.gov/Download.aspx?id=10956 with a simple one-page form. ISDH also recommends that growers who are wholesaling also take a GAPs course. In addition, ISDH offers growers the availability of farm food safety consultants as a resource who can help answer questions if needed.
Deering recommends all fruit and vegetable growers, regardless of size and where they sell, invest in taking a GAPs training. These trainings provide best practices for growing fruits and vegetables. The current GAPs training developed by the Produce Safety Alliance offered by Purdue Extension provides information on topics such as worker training, production and postharvest water, postharvest handling and sanitation, and how to develop a Farm Food Safety Plan.
Purdue Extension will provide opportunities for GAPs training twice a month starting in October. The eight-hour training sessions will be held each month through March 2018, with the exception of December. For training schedules, registration or more information go to www.safeproduceIN.com. You also can contact Amanda Deering at 765-494-0512 or Scott Monroe, food safety educator for Purdue Extension, at 765-427-9910.
— Purdue University | <urn:uuid:585c65fd-36e6-4b5a-9cd3-40fb7bb42310> | CC-MAIN-2022-33 | https://www.morningagclips.com/why-farmers-markets-food-safety-are-here-to-stay/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.944176 | 600 | 2.671875 | 3 |
FINAL BIOCHEM PAPER
Embed Size (px)
Transcript of FINAL BIOCHEM PAPER
- 1. Crystallization of Chromatographically Purified 6X-His-tag Green Fluorescent Protein via Induction of pET21b Plasmid from Transformed BL21(DE3) Escherichia coli. Cameron Naglieri-Prescod Biochemistry 276 05/03/2013
- 2. 2 Abstract Green Fluorescent Protein is a very useful and interesting tool for scientists to express genes and proteins, and visualize observations of those proteins. In this study, goals of the experiment were to amass a substantial amount of 6X-His-tag GFP, and to crystallize the GFP. The 6X-His-tag GFP gene in a BL21(DE3) E.coli bacterial culture was induced to produce GFP. Via cell lysis, nickel affinity chromatography and hydrophobic interaction chromatography, the GFP was obtained in a purified form. Different solutions from the chromatography methods were exposed to a Bradford Assay and a Sodium Dodecyl Sulfate- Polyacrylamide Gel Electrophoresis (SDS-PAGE) to quantitatively determine the concentrations and amounts of total protein in different solutions, and to determine if there is GFP present and the size of the GFP in the solutions. A standard curve and best fit line were obtained via the Bradford Assay. Hanging drop vapor diffusion crystallization of the purest GFP solution was performed with a lysozyme crystal comparison, and the superlative crystals of both the lysozyme and GFP achieved were photographed and observed.
- 3. 3 Introduction In the world's oceans, there are numerous creatures that exhibit bright and fascinating colors and patterns. These creatures use these colors and patterns for a multitude of tasks, from finding a mate, to camouflage, to an indicator of danger. There is one creature that uses color in a slightly different manner. The crystal jellyfish, also known as Aequorea victoria, is a simplistic and delicate jellyfish that uses bioluminescence to glow and produce light. What makes this bioluminescence possible is a small protein appropriately named Green Fluorescent Protein, or GFP, because of the emission of green light this protein exerts at a certain wavelength. GFP is used in the biochemical field as a fascinating indicator for the expression of genes and also other proteins. Scientists now are creating perceivable three-dimensional structures of proteins to identify the properties and functions of these proteins at a level smaller than the human eye can see. A set of laboratory experiments were conducted to extract green fluorescent protein from Escherichia coli (E.coli) that has been genetically modified to produce abundant amounts of whatever protein desired in a controlled setting. The main goals of the experiment were to amass a substantial quantity of green fluorescent protein at a high concentration, and to ultimately crystallize the extracted GFP. The E.coli used for the experiment, named BL21(DE3), was engineered to produce a large amount of protein. The engineered plasmid used, named pET21b, contains a T7 viral promoter in its sequence, and this promoter is transcribed by a T7 RNA polymerase; the polymerase is specific to the T7 promoter and therefore will not transcribe any other sequence but that promoter sequence. While the T7 promoter is influenced by the T7 RNA polymerase, the polymerase is controlled by an inducible bacterial promoter, specifically for the lac operon gene on pET21b. The inducer for the bacterial promoter is isopropylthiogalactopyranoside (IPTG). This compound behaves much like lactose in terms of expression of genes, but it is not metabolized so it remains intact. The T7 promoter on pET21b resides next to the multiple cloning site, which in turn resides by the sequence for a specific GFP gene, 6X-His-tag GFP (GFP with six histidine residues attached). The result of specificity in sequencing is a large amount of mRNA, which leads to an immense amount of GFP translated. Induction of the GFP gene was performed on a colony of BL21(DE3) to express the GFP gene in the pET21b plasmid. Cell lysis was performed on the sample in order to extract the induced 6X-His-tag GFP from the plasmids to continue with the purification processes and crystallization; a cell pellet and a supernatant (cleared lysate) were obtained via lysis. Two different methods of purification were implemented to expel the contaminant proteins and to extract a sample of pure GFP. The first method used was Nickel Affinity Chromatography. This method uses a molecule called imidazole, which binds to the 6X-His-tag GFP and keeps it from being washed out of solution. This was used to purify the GFP that was contained in the supernatant that resulted from the cell lysis. Different concentrations of imidazole allowed for higher purification, but lower concentration of GFP. To further purify and to concentrate the sample, Hydrophobic Interaction Chromatography was utilized. This method is based on the idea of salting out proteins. The step adds a high concentration of salt to make
- 4. 4 proteins insoluble, and these proteins are then discarded when the salt concentration is changed. In this case, the salt concentration is set high enough so that contaminants are eliminated from solution but the GFP remains in solution. Both the nickel affinity and the hydrophobic interaction chromatography steps purify the specific target protein and concentrate it as well. Qualitatively the chromatography steps show a highly concentrated GFP sample, but quantitatively there is not enough information. Direct Ultraviolet spectrophotometry of protein samples is a widely used method as an estimator for protein concentration, but it does not pinpoint the exact amount. To obtain a direct numerical concentration, a Bradford Assay was conducted. This procedure uses the binding properties of Coomassie Brilliant Blue reagent to bind to protein in order to determine a concentration of total protein in a sample; Coomassie binds to all of the proteins in the sample, so it is not possible to distinguish between the proteins. The protein bovine serum albumin was used in this assay as the control for the standard curve. This assay lacks the capability of distinction of individual proteins in a sample, but does provide an average optical density (OD) of the sample. The information obtained is used to create a standard curve and a linear range of the sample, and this curve allows for the comparison between absorbance value and protein concentration. In order to determine the purity of the GFP sample, a Sodium Dodecyl Sulfate- Polyacrylamide Gel Electrophoresis (SDS-PAGE) was conducted. The basic concept of electrophoresis is the progression of charged particles exposed to an electric field. The SDS- PAGE tracks the mobility of the target protein by denaturing the protein into a primary structure. The negatively charged sodium dodecyl sulfate disrupts the tertiary and quaternary structures of proteins, and when the protein is exposed to a positive charge, the protein has an overall negative charge due to the SDS. When the protein is inserted into the gel, and when a positive electric field is passing through, the protein will drift towards the positive terminus at a rate that corresponds to their molecular weight; a blue dye is inserted to track the protein migration. The result of the SDS-PAGE procedure is distinct bands of protein based on molecular weight. The experiment concludes with the crystallization of the 6X-His-tag GFP. Crystallization requires the protein to have a high concentration to ensure protein growth, but also the right amount of a precipitant to lower the overall solubility of the protein. One of the most common methods of crystallization is the hanging drop vapor diffusion method, which utilizes evaporation. The protein is mixed with a precipitant in a certain ratio, sealed in a container, and left alone to crystallize. Through vaporization and condensation of the precipitant, the crystalline structure of the protein grows while the concentration of the protein increases. The end result is an array of different protein crystals for observation. Based on the various types of purification and testing for protein concentration, a large quantity of 6X-His-tag GFP in a very high concentration is expected to be acquired as a product of the entire procedure, and a large amount of high-concentrated crystallized GFP is expected to result as well from the crystallization method used in the experiment.
- 5. 5 Materials and Methods Bacterial Strain and Reagents The bacterial strain used for the experiment was a pET system host strain called Escherichia coli BL21 (DE3). The genotype of Bl21(DE3) is F-ompT hsdSB (rB- mB-) gal dcm (DE3). The encoding of the T7 RNA polymerase gene and the integration of the DE3 lysogen which also contained T7 RNA polymerase gene under the influence of a lactose- inducible lacUV5 promoter on this specific BL21 strain, allowed for the high expression of a target protein, in this case Green Fluorescent Protein (GFP), in an a posteriori manner. The plasmids used for this experiment were pET plasmids that contained the GFP gene, which encoded for the production of Green Fluorescent Protein. The plasmid that contained the GFP gene, called pGFPstop, was a gift from Professor Jeanne Hardy, Department of Chemistry, University of Massachusetts. The GFP gene was subcloned into the multiple cloning site pET21b, which was obtained from Novagen located in Darmstadt, Germany, the coding region of GFP was presented in the most accurate reading frame, and GFP was fused with a 6X His tag located at the C-terminus of that GFP. All of the reagents and supplies needed for this experiment were acquired from Fisher Scientific (Fair Lawn, New Jersey), unless stated otherwise. Induction of GFP expression A group of BL21(DE3) that was transformed with pETHis GFP was used by the teaching staff to inoculate a 5 mL culture of LB medium that contained 100 g/mL ampicillin antibiotic (5 L of a 100 mg/mL stock in 5 mL of medium). The culture | <urn:uuid:38e116b7-4d27-490c-ba32-6f89a136c734> | CC-MAIN-2022-33 | https://fdocument.org/document/final-biochem-paper.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.937903 | 2,215 | 2.46875 | 2 |
Internet giant Google has opened a 3D asset library. Called Poly, the repository teems with everyday and exotic objects for VR/AR creation.
Online behemoth Google has just released Blocks, a new 3D modeling software that promises easy and accessible content creation for VR.
Your want to digitize, modify or augment through computing and then 3D print it? These are the companies which will make things happen in 3D visualisation.
Google has launched the Coral Dev Board, which uses the best of Google’s machine learning tools to make AI more accessible. The new board boasts a removable system-on-module (SOM) featuring the Edge TPU and looks a lot like a Raspberry Pi. They announced it ahead of the TensorFlow Dev Summit.
With a 3D printed turtle or baseball, say MIT researchers, you have the tools you need to spoof a neural network in the physical world.
In Australia, Alphabet is trialling their Project Wing drone delivery system with real people and is initially offering medicine and fast food.
The Victoria Hand Project (VHP) is up for the chance of winning $750,000 from the Google.org Impact Challenge. You can help out by voting.
The winners of the Google Impact Challenge: Disabilities have been announced, with many using 3D printing to change lives for the better.
Google's Project Ara and UK start-up OwnFone are already experimenting with 3D printed mobile phones. Will we love them? | <urn:uuid:e906e4b4-6d04-4b70-ad4c-2c9f8022b4cd> | CC-MAIN-2022-33 | https://all3dp.com/topic/google/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.918013 | 304 | 1.929688 | 2 |
The conference call is a common component of the average communication stack in many modern businesses. If you need to get in touch with a group of people fast, and an in-office meeting isn’t appropriate, it’s incredibly simple to get everyone dialled into a shared virtual conference room.
The arrival of new technology even means that many companies are beginning to discover the advantages of video conferencing for the first time. Simpler connections and user-friendly tools have made the provisioning of video conferencing technology easier than ever.
However, the conference call hasn’t always been the immersive solution that we have today. When we explore the evolution of this technology over the years, it’s easy to see just how significant the transformation has been.
From Audio to Video: The Communication Revolution
In basic terms, a conference call provides a platform through which numerous people can connect to each other at the same time.
The earliest instance of a conference call happened in Bulgaria, with the Jordanphone designed by Asen Yordanoff in 1945. The wireless device could transmit voice on a standard phone to a loudspeaker, so that various people could hear the person at the other end of the conversation.
Bell Labs then became the first company to work on the larger concept of telephone conferencing in 1956. In 1960, AT&T picked up on the idea and dabbled with teleconferencing. With AT&T’s creation, users were able to communicate through three phones lines managing audio and video.
There was even a picture on a very small screen that appeared every two seconds. However, the device was bulky, expensive, and not very easy to adopt in the corporate world.
The AT&T PicturePhone didn’t give us a very good introduction to the possibilities of video conferencing. However, it did get people thinking about what video conferencing solutions could potentially do for the business world. Being able to see someone from the other side of the world on your phone was an exciting idea in the 1960s.
It took a while for companies to find the innovation required to make video conferencing a more achievable reality, however. The idea of video didn’t have a chance to go mainstream until the 1980s, when systems began to be introduced from Compression Labs. These systems sold for about $250,000, meaning that they were only available to larger corporations.
However, there was definitely a demand for video elsewhere. People were excited by the idea of being able to communicate with groups and individuals through voice and video at the same time. We wanted an evolution to the audio conference.
IBM dropped the price of their video systems to $20,000, and other companies began to experiment with the latest advancements in IP technology, video compression, and internet streaming. In 1992, Cornell University’s IT department introduced the CU-SeeMe application – the first video conferencing application in the world at that point.
At the same time, AT&T introduced their videophone for home use – the AT&T videophone 2500.
By 1993, the World Wide Web had entered the public domain, and PictureTel was introducing new products that converted the standard PC into videophones with camera technology. In 1994, the world’s first webcam was born, offering 16 shades of grey for video transmission. By 1995, PictureTel was able to conduct the world’s largest multipoint global dial-up conference using video with more than 50 sites worldwide.
The Rapid Development of Video Conferencing
By the late 90s, the drive to create better video conferencing experiences was more significant than ever. In 1996 alone, the BT Presence desktop phone was introduced – offering a unique 6-inch colour touchscreen with seven frames per second.
At the same time, Panasonic was building the world’s first cordless video phone, and Microsoft was building its “NetMeeting” service.
As we moved into the new century, 2001 brought with it the arrival of “Operation Lindbergh”, the first telesurgery ever to be conducted through a video connection. By 2003, all major instant messaging clients, including AOL and Yahoo, came with video calling support. Skype even introduced video call solutions for up to 25 people at a time.
Later in the 2000s, the quality of video conferencing began to evolve. Polycom introduced the first HD video conferencing system in 2006, and in 2010, tools like Apple Facetime became available, making video more of a mainstream concept for the masses.
In less than 20 years, video went from being something only available to the largest brands to something that everyone could access at the tap of a button on their smartphones.
Companies worldwide were starting to recognize the benefits of video conferencing as a tool for immersive communication. We saw that video could build on the average conference call by giving us access to a much deeper connection.
An online video conference could eliminate the need for worldwide travel and help teams around the world work together, wherever they were. The world’s highest-ever video call was made on Mount Everest in 2013.
As the years went on, companies like RingCentral invested more time and effort into the possibilities of video-conferencing software. We discovered how to create more crystal-clear images and combine them with high-quality audio. We innovated until we discovered things like smart framing tools and intelligent focus to bring more depth into the images provided in each conference.
All the while, as the technology improved, it became more accessible too.
Video calling today is no longer reserved just for those with the best budgets or the strongest tech team. Tools like RingCentral Meetings offer businesses of all sizes the chance to video conference anywhere, using HD images and enterprise-quality voice.
3 Major Innovations That Transformed the Conference Call
In a world brimming with trends like globalization and dispersed workforces, video conferencing is more valuable today than it has ever been. Through video-conferencing equipment, remote and mobile workers can stay connected to their peers wherever they are.
At the same time, video conferencing solutions can expand into the customer service environment too. The advantages of video conferencing can include everything from better customer experiences to faster response times. It’s no wonder that the market for video conferencing is set to reach $6.7 billion by 2025.
While there have clearly been many changes that contributed to the evolution of conference video calls and software over the years, three major innovations have been crucial to shaping the way that we communicate. These were:
1. Central Exchange
The conference call has been around for a lot longer than most people realize. The first conference call was made in 1915, and cost an average of $485 per minute. However, hosting conference calls today isn’t as ridiculously expensive as it used to be, thanks to the central exchange.
The central exchange means that there’s less routing required over hundreds of switches to get everyone connected on the same platform. Fewer lines were required to connect callers after this, making the conference call more accessible to all.
2. Digital Conference Bridges
As the technology available in the communication landscape evolved, we moved into a more digital world. For many years, companies were reliant on analogue audio bridges to transfer voice from one environment to another. Unfortunately, these analogue systems weren’t great at delivering the enterprise-quality voice that we rely on today.
Attempts to amplify audio often led to noise interference, making it difficult to hear what other people said. Digital audio bridges now make it possible to mute lines that would otherwise add background noise. This means that we get more clarity in our calls, less background noise, and increased call capacity.
3. Internet Audio Codecs
Finally, while digital audio bridges initiated the movement away from the analogue conference call, internet codecs magnified that value even further. Internet audio codecs compress and decompress files using advanced algorithms. This meant that larger packets of information could be sent across the web without compromising audio quality.
Internet codecs also led to the rise of video codecs for conferencing. This allowed for video data packages, just like audio packages, to be transmitted by video-conferencing software and equipment.
Today, the internet and the right codecs mean that modern teams can access truly collaborative experiences over the web. The rise of meetings tools has begun, allowing for real-time collaboration with video, screen sharing, and audio all combined into a simple, cost-effective, and lightweight service.
Here’s What Video Conferencing Can Offer Today
At the beginning of conferencing history, video was a complex concept.
Even years after video was introduced as a method of communication, businesses still had a hard time finding the cash required to invest in such advanced technology. Now, we’re entering a brand-new world, where anyone can access video, without having to worry about excessive expenses or complicated tech.
In the age of digital transformation, defined by dispersed workforces, global communication, and remote working, we’re all embracing the benefits of video conferencing. Not only that, but we’re discovering new ways to improve the way that video conferences are held. For instance, with the right meeting software you can:
- Access HD video instantly: There are no more grainy pictures or black-and-white images to worry about with today’s video conferencing. Companies can immediately and easily dial into high-quality conferences at a moment’s notice. There’s even the option to download an app straight to your phone so that you can access a conference without a specialist device.
- Share content and screens: Video conferencing is now just one piece of a comprehensive collaboration puzzle. Through meeting tools, businesses can host large training sessions and conferences, or manage one-on-one interactions with team members. At the same time, they can share files, screens, and documents in real time to bring more context to the conversation.
- Connect additional technology: Speaking of adding context to meetings, there are various tools beyond the standard webcam and conference phone to add to the modern meeting. Today’s employees have access to things like digital whiteboards, where they can share information and visual ideas in real time. You can even connect your meetings to smart devices that take notes on the behalf of attendees and schedule future meetings.
- Integrate with other software: As video-conferencing software becomes more accessible, it’s also becoming more extendable. Today’s video conferencing software can integrate with everything from file sharing tools to CRM systems, so people can access all the information they need for an effective meeting in the same pane of glass.
- Build immersive rooms: Video conferencing rooms no longer have to be expensive and huge boardrooms. The rise of technology like RingCentral Rooms means that businesses can build HD telepresence huddle rooms in seconds. There’s even access to things like seamless calendar integrations so you can schedule and start video-boosted meetings with a tap on an Android or Apple device.
- Stay flexible: If companies already have on-premise telepresence endpoints in their business, they don’t have to rip and replace them to access the latest in video conferencing. Systems like the RingCentral Room Connector mean that you can just connect the system to the cloud to link into any RingCentral Meeting.
- Access crucial information: Your video conferencing systems can also provide in-depth information on how your teams use their telepresence equipment. Many video conferencing software solutions now come with access to technology that allows for the development of insightful reports on employee adoption and use.
The Trends Driving the Evolution of Video-Conferencing Equipment
So, why is video conferencing growing at such a phenomenal pace?
One obvious answer is that globalization is present in virtually every industry. As the digital world has evolved and the internet has become more immersive, IT is empowering consumers and businesses alike to reach further out into the world. 75% of international calls are now made over the internet, highlighting the fact that we can now connect virtually with almost anyone.
Additionally, it’s worth noting that people are more comfortable with video today than they ever have been. When video conferencing first emerged in the marketplace, it was a novelty – but not something that most businesses felt they needed. However, as workplaces grew more dispersed, and new generations arrived in the workforce, the demand for video grew.
Around half of all smartphone users now make video calls on their phones. Younger generations like Millennials and Gen Z expect to be able to communicate face-to-face, even when they’re not in the same space as their colleagues.
Video apps and chat apps have shown us how convenient it is to communicate via video. As such, companies are beginning to take the following trends and push them into the video conferencing experience:
1. User Experience
Now that today’s workers can see just how simple video conferencing can be with things like Apple FaceTime, they expect the same kind of convenience in today’s video-conferencing equipment. Companies rolling out video technology for the modern employee need to make sure that they’re not just delivering the latest functionality, but the easiest usability too.
The easier it is for people to tap into your video-conferencing tools, the less you’ll need to worry about some of the most common concerns usually associated with having a conference video call, like adoption.
Part of developing that excellent user experience will also be ensuring that the video system works seamlessly with the tools that your employees already know and love. Interoperability emerged as a crucial trend within the conference call environment in 2019.
In 2020, businesses will likely continue to focus on integrations with third-party video software, equipment, and other tools.
Additionally, it’s worth ensuring that your video systems can work with the latest collaboration services too. Collaboration and team tools like RingCentral Glip are at the heart of many business communication plans today. A video system that can work at a click from within a collaboration service will deliver incredible UX.
2. Mobility Is Essential
We’re moving into a world where today’s employees don’t necessarily have to be chained to a desk to get work done. It’s more common than ever for people to work outside the office. Businesses from all industries are taking advantage of the benefits of video conferencing to help them connect with remote and mobile workers worldwide.
Through video conferencing, it’s possible for companies to access the best talent wherever they might be and to keep those employees immersed within the business culture. However, the only way to allow for this mobile revolution is to ensure that you have the right video technology in place. This means that organizations will need to think about more than just video-conferencing rooms.
It will be important for future staff members to be able to dial into a video conference using the service available on their phone, without having to worry about downloading specific software on their computers. Click-to-call functionality and easy conferencing for team members on the go will be essential in the modern workplace.
At the same time, however, it’s worth making sure that the video conferencing software you choose doesn’t offer mobility at the expense of security. Just because you can access your service from any device that you need to doesn’t mean that you should be compromising on safety.
3. Flexibility Is a Must-Have
Finally, the flexibility of the cloud has truly transformed the way that we communicate via video conference calls. Studies suggest that around 90% of today’s organizations are using cloud technology in some format. Additionally, around 47% of companies have moved their messaging platforms to the cloud to allow for simpler and more scalable communication strategies.
Accessing video conferencing as part of a complete cloud-based solution for unified communications will allow tomorrow’s companies to provide a more flexible environment for their workers and their communication stack. At the same time, meeting on the cloud will mean that modern brands can access more information about their video conferencing calls too.
Much of the best video conferencing software comes with access to analytics and data that you can collect on the cloud and transform into actionable insights. You could even find out where the bottlenecks in communication and collaboration are for your team members.
The more information today’s businesses have about their teams and their collaboration and communication preferences, the more they can strengthen future strategies.
Web Conferencing vs Video Conferencing
To fully understand video conferencing and what it means to the modern world, it’s important to recognize that video conferencing and web conferencing aren’t the same thing.
Though awareness and understanding of video conferencing is growing, there are still people that confuse this technology with other forms of communication. Very often, web and video conferencing are seen as the same thing referred to by different names. However:
Video conferencing is a two-way visual and audio communication strategy that involves sharing content between two or more people. The video stream is sent between different locations and often requires the set-up of crucial endpoint equipment like cameras, speakers, or even a phone at each end of the conversation. Video conferencing software provides a real-time linkup between participants over the internet in a way that feels very similar to a face-to-face meeting environment.
Used correctly, video conferencing allows teams to conduct highly effective and interactive meetings, which make it feel as though you’re connecting with your colleagues face-to-face.
Web conferencing, on the other hand, is more about sharing information. While a web conference can include video and audio communication, the entrance point is always a web browser. Endpoints are usually represented by the web browser using something called WebRTC technology, or third-party plugins and applications. Some people refer to web conferencing as “webinars.”
While the main aim of video conferencing is face-to-face communications, web conferencing is all about sharing details and providing information. Companies often use web conferencing to host impromptu meetings over a browser or deliver large amounts of information to a group.
The Difference Between Web Conferencing and Video Conferencing
Video conferencing systems require the installation of special equipment or applications, and they can work without any internet connection if necessary. However, they always require a server to control multipoint conferencing sessions. Depending on the capabilities of the system, companies can use video conferencing to organize different kinds of conferences, including web conferences.
Video conferencing can be organized either through the internet or within a company’s local network. The deployment usually requires some basic equipment, including a camera, PC, and a microphone. It’s also possible to expand system capabilities using speakerphones, high-quality cameras, and other tools.
For web conferencing, internet connections are mandatory, as the conference is hosted via a browser. Most web conferencing platforms come with a broad set of features, including telephony, recording, participant registration and so on.
While the main purpose of web conferencing is to show presentations and host live events, video conferencing can be a substitute for business trips. It brings people together for an instant and intimate communication through a technology that mimics face-to-face interaction.
Why Do Businesses Prefer Video Conferencing?
So, what makes video conferencing such an excellent choice for businesses today?
Simply put, we’re living in an era where people are connected constantly by technology. We now have access to a much more sophisticated set of solutions for communication. People can interact with each other using various electronic media, and this paves the way for businesses and corporations to connect better with employees and partners alike.
Here are just some of the biggest benefits of video conferencing.
1. Video Is Great in the Era of Mobility
The demand for mobile has continued to grow in recent years, particularly as employees are now looking for more flexibility in their careers. Going forward, we can expect to see more remote workers entering the marketplace. Additionally, businesses will want to take advantage of the telecommuting landscape so that they can access the people with the best skills to help them grow their businesses. As the workplace becomes more digital, video will ensure that today and tomorrow’s employees can stay connected to the workforce wherever they are. Video will reduce the isolation that many team members feel when they miss out on face-to-face in person conversations.
2. Video Allows for Better Conversations
As methods of communication become more digital, it’s easy for miscommunication to be a problem within the business landscape. In many emails and texts today, people tend to fill in the blanks for themselves, adding facial expressions and inflections to the words that they’re reading.
This can even happen during phone calls when people can’t see the smile of their colleague. A key benefit of video is that it allows us to see the non-verbal communication that we’re missing. This allows for the development of better relationships between colleagues, co-workers, and customers.
3. Video Keeps Employees Happy
Ultimately, today’s team members want access to video in their communication stack. Studies have shown that a solution that integrates email, video, telephony, and instant messaging is highly desirable in the modern landscape. People want to be able to choose how they communicate each day. Sometimes, the best way to send a message will be through a quick instant message on a team collaboration app. Other times, it will be essential to use video to bring more information and context to a conversation. Either way, adding video to your strategy will ensure that your employees have access to the tools they need for better collaboration.
4. Video Creates Better Meetings
Aside from just displaying body language and non-verbal communication to allow for better connections between workers, videos can also deliver extra information in a conference in other ways. For instance, when in a video conference, team members can use virtual whiteboards to demonstrate ideas in a more engaging format for their colleagues. They can also show the product or graph that they’re talking about, rather than just sending pictures over email.
Teams can also combine their video conferencing strategy with other tools like file sharing and calendar systems to make every meeting more structured and cohesive.
5. Video Saves Time and Money
Finally, in-person conversations will always be a necessary part of business. Sometimes, discussions just can’t be had over the phone or sent via email. In the past, businesses have had to rely heavily on extensive travel to make these face-to-to-face conversations possible. However, this means taking large chunks of money out of the company budget to allow for air travel and other expenses.
At the same time, when crucial executives are travelling around the country to engage in meetings, they can’t also be focusing on the tasks that they’re usually responsible for in the office. However, with video conferencing, it’s possible to host face-to-face meetings without having to travel across the globe. Once a close and intimate conversation is required, video conferencing can provide all the context and body language you would get if you were there in person, without the expense or the lost productivity.
The Future Is in Video
We’ve come a long way from the days when video conferencing solutions were reserved only for the most innovative and budget-rich companies in the market. Today, businesses of all shapes and sizes can embrace the benefits of video conferencing without having to break the bank.
Simple meeting solutions that make it easier for team members to connect over video at the click of a button are transforming the way that internal teams collaborate. At the same time, the ability to host conversations over video also means that companies can strengthen the relationships that they have with customers and clients without as much global travel.
As we continue to develop the possibilities of video conferencing with new HD streaming services, AI, and intelligent integrations, it’s fair to say that video conferencing will only become more appealing in the years to come. If you haven’t invested in the video revolution yet, now is the time to get started.
This blog post has been re-published by kind permission of RingCentral – View the original post
For more information, visit www.ringcentral.co.uk | <urn:uuid:b03be2f3-dfe2-4931-a305-c9813b1f7b25> | CC-MAIN-2022-33 | https://www.callcentrehelper.com/evolution-of-the-conference-call-150881.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.943569 | 5,142 | 3.078125 | 3 |
ADHD (short for Attention Deficit Hyperactivity Disorder) is a common neurodevelopment disorder. Typical characteristics of ADHD include impulsiveness, hyperactivity, and lack of attentiveness. Specialist sensory ADHD products can prove hugely beneficial for people with ADHD as they can promote focus, calm, and control. Designing a sensory room for individuals with ADHD is certainly possible, and can be an incredible way to support their development.
Facts About ADHD
According to the Centers for Disease Control and Prevention, it is estimated that over 6 million children have been diagnosed with ADHD in the US. Studies also show that boys are more likely to be diagnosed with ADHD compared to girls.
ADHD is typically diagnosed in childhood, however it can be difficult to differentiate ADHD symptoms with characteristics that are normal of a toddler, including impulsivity and inattentiveness. For most individuals with ADHD, symptoms will continue into adulthood.
There are three different types of ADHD:
- Predominantly Inattentive Presentation
- Predominantly Hyperactive-Impulsive Presentation
- Combined Presentation
Presentation can change over time, along with ADHD symptoms.
The characteristics of ADHD can cause challenges for individuals in both childhood and adulthood. So, it’s important to provide ADHD children with the proper care and support to give them the best chance of a successful and happy life. One way in which to support ADHD children is through specialist sensory ADHD items.
How can Sensory Tools for ADHD help?
Sensory ADHD products can help with calming, attention, control, and other developmental skills.
Vibration, focused lighting, aromatherapy, and sound control can dramatically affect our ability to attend. These tools act as filters for children with ADHD and ADD (Attention Deficit Disorder). The inability to focus and attend when necessary can be debilitating to education and life skills.
Bubble tubes, for example, are mesmerizing and effective at capturing the attention of its users, so they make an excellent sensory ADHD tool. The movement of the bubble and their changing colors is both calming and engaging. People with ADHD also benefit from having control over their environment, and many of our bubble tubes enable that.
Our multisensory rooms at Experia USA can help filter out extraneous sensory information and organize and modulate thinking, speech, and orientation. Once exposed to our calming lights, sounds, and aromas, an individual with attention challenges can relax, engage, and focus on their surroundings.
Setting up a sensory room in your school or home may improve the quality of life and provide the much needed sensory nutrition to improve attention. Our rooms can be a place for the individual with ADHD to engage calmly and succeed.
Top Sensory Items for ADHD
Some great tools for your ADHD needs:
We offer a FREE Room Design Service and are happy to help you with designing a sensory space that encourages attention, focus, concentration, and awareness. Our expert team can advise you with sensory items for ADHD, so just get in touch today!
Call us toll free at 1-800-882-4045 or >Email us | <urn:uuid:747016aa-23b1-4b6e-9407-2ab9fed72ae4> | CC-MAIN-2022-33 | https://www.experia-usa.com/special-populations/adhd/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.947968 | 638 | 2.953125 | 3 |
Uganda Institute of Information and Communications Technology (UICT) was founded in 2000 by Uganda Communications Commission (UCC). This was in compliance with the Commission’s mandate; to establish, manage and operate a communication services training center, as spelt out in section 5 (z) of the Uganda Communications Act, 1997.
In line with this Mandate, the assets of the former Uganda Posts and Telecommunications Corporation (UPTC) Training School, (at Plot 9 –21 Port Bell Road, Nakawa) were invested in UCC, and that is where the Institute is located. UICT is a successor Institute to the UPTC Training School established in 1965 by the then East African Posts and Telecommunications as a regional training center.
Following the enactment of the Universities and Other Tertiary Institutions Act 2001, the Institute was expected to operate within the provisions of this Act. Accordingly, the National Council for Higher Education advised the Minister of Education and Sports (MoES) to establish UICT as a public tertiary institution. Consequently, MoES issued Statutory Instrument No. 79 in October 2005 establishing UICT as a public tertiary institution.
The management of Uganda Institute of Information and Communications Technology (UICT), a public tertiary Institution, was transferred from the Ministry of Education and Sports to the Ministry of Information and Communications Technology on November 29, 2007. This followed a Cabinet decision and the subsequent directive from the Prime Minister to the Ministry of Education and Sports to make the transfer….
The Uganda Communications Act 2013 mandates Uganda Communications Commission to operate and manage the Institute. This has been done to enable the Institute to get policy guidance and funding to upgrade the Institute into a Centre of Excellence to the level of internationally renowned ICT Institutions.
The Uganda Institute of Information and Communications Technology (UICT) is the only Government institution specializing in skills-based middle-level ICT training. It offers practical-oriented ICT training at certificate and diploma levels as an alternative to the theoretically-grounded degrees offered by Universities and other Tertiary Institutions in this same professional area. The institute provides education and training in all fields related to the communications sector including telecommunications services, computer engineering, and information technology and business management. | <urn:uuid:b6c92876-35f9-48bf-aff2-bf1ae142263e> | CC-MAIN-2022-33 | https://ict.go.ug/about-us/agencies/uganda-institute-of-information-communication-technology/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.950057 | 454 | 1.546875 | 2 |
Dances In The Rain
Georgia Carniato, Grade 8
My window pane is covered with red dust.
I look outside to see the earth fly with the wind
My heart pounds as the ground moves.
It has come.
The great drought is here.
Soon, food is destroyed,
Lives are lost,
Everything green turns to scarlet,
The sun may shine bright but it brings no joy to us
I fall down, in tears, I let go, almost breathe one’s last.
Flash from heaven roars my name and soon
The sky weeps like a small child.
I run out.
If you say happiness comes from sunshine,
I believe you have never danced in the rain. | <urn:uuid:f03b15ae-e495-4245-a1bf-b2d0b69640fe> | CC-MAIN-2022-33 | https://www.write4fun.net/view-entry/110385 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.913788 | 166 | 2 | 2 |
SS Lesson for 07/17/2016
Devotional Scripture: Eph 2:1-7
The lesson establishes that all mankind can be Set Right By Grace. The study's aim is to see how God can be just and right and still justify the believing sinner. The study's application is to know that we live by faith and the grace of God and not through law and works.
(Adapted from the Bible Expositor and Illuminator Commentary)
23 for all have sinned and fall short of the glory of God, 24 being justified freely by His grace through the redemption that is in Christ Jesus
In God’s condemnation of the human race His own personal infinite righteousness was revealed along with the fact that not a single human being—the Lord Jesus Christ excepted—has ever or will ever be able to meet that standard and be accepted by God on his own merit. Now in this second major section of Romans Paul discussed God’s “provided righteousness” for people through Jesus in justification. Justification is a forensic declaration of righteousness as a result of God’s imputing to believers Christ’s righteousness, provided by God’s grace and appropriated through faith.
3:21. By the words but now Paul introduced a sharp contrast with what preceded. He had just affirmed, “No one will be declared righteous in His [God’s] sight by observing the Law” (v. 20). This is now followed by the statement, Apart from Law (in the Gr. this phrase is in the emphatic first position) a righteousness from God... has been made known (i.e., made plain). This in essence repeats the words of 1:17a. But Paul added the fact that the Law and the Prophets testify to this fact. What Paul was introducing about God’s righteousness was not foreign to the Old Testament. “The Law and the Prophets” was often used of the entire Old Testament (see references at Matt. 5:17), the Law referring to the first five books and the Prophets, the other books. In Romans 4 Paul illustrated this truth from the Law (Abraham: Gen. 15:6; Rom. 4:1-3, 9-23) and from the Prophets (David: Ps. 32:1-2; Rom. 4:4-8).
3:22. The first part of this verse is not a new sentence in the Greek; it is an appositional clause, and could be rendered, “a righteousness from God through faith.” These words reminded Paul again of the Jewish insistence on their special position before God. As a result he added, There is no difference (cf. 10:12), introduced in the Greek by the word “for” to tie it to what precedes. Any prior privilege the Jews had is gone in this Age when God is offering a righteous standing before Him to all sinful people on the basis of faith in Christ alone. Since all are “under sin” (3:9), salvation is available “to all” on an equal basis.
3:23. Paul explained that “no difference” existed among human beings because all have sinned. The Greek is literally, “all sinned” (pantes hēmarton). The same two Greek words are used in 5:12. Since the entire human race was plunged into sin with Adam, all (whether Jews or Gentiles) are sinners. It is impossible to say there is a “difference,” that the Jews’ privileges (2:12-21; 3:1) exclude them from God’s condemnation. Not only did all sin, but also all fall short. This single Greek verb is in the present tense, stressing continuing action. It can be translated “keep on falling short.” The simple fact is that as a sinner not a single human being by his own efforts is able to measure up to the glory of God. God’s glory is His splendor, the outward manifestation of His attributes. God desires that humans share that splendor, that they become like Him, that is, Christlike (cf. “glory” in 5:2; 2 Cor. 3:18; Col. 1:27; 2 Thes. 2:14). Yet their sin keeps them from sharing it.
3:24. In view of man’s sin God has stepped in with His provided righteousness, because all who believe are justified (the pres. tense may be trans. “keep on being declared righteous,” i.e., each person as he believes is justified). “Justify” (dikaioō) is a legal term, meaning “declare righteous” (not “make righteous”; cf. Deut. 25:1). See Romans 1:17 on Paul’s frequent use of this verb and its related noun “righteousness.”
God’s justification of those who believe is provided freely (dōrean, “as a free gift,” i.e., without charge) by His grace. God justifies by the instrument of His grace, His unmerited favor. Grace too is a favorite word of Paul’s, used by him in Romans 24 times (in the Gr.). But God would not declare a person righteous without an objective basis, without dealing with his sin. That basis is the redemption that came by Christ Jesus. The Greek word for “redemption” is apolytrōsis, from lytron, “a ransom payment.” Apolytrōsis is used 10 times in the New Testament (Luke 21:28; Rom. 3:24; 8:23; 1 Cor. 1:30; Eph. 1:7, 14; 4:30; Col. 1:14; Heb. 9:15). (See the chart, “New Testament Words for Redemption” at Mark 10:45.) The death of Christ on the cross of Calvary was the price of payment for human sin which secured release from the bondage of Satan and sin for every person who trusts God’s promise of forgiveness and salvation.
3:25a. God presented Him, Christ, as a Sacrifice of atonement. The Greek word for “Sacrifice of atonement” is hilastērion, rendered “propitiation” in the kjv and the nasb. This noun is used elsewhere in the New Testament only in Hebrews 9:5 for the mercy seat (niv, “the place of atonement”) of the tabernacle’s ark of the covenant. There a goat’s blood was sprinkled on the Day of Atonement to cover (atone) Israel’s sins (Lev. 16:15), and satisfy God for another year. Jesus’ death is the final sacrifice which completely satisfied God’s demands against sinful people, thus averting His wrath from those who believe. (The verb hilaskomai, “to satisfy by a sacrifice, to propitiate,” is used in Luke 18:13 [“have mercy”] and Heb. 2:17 [“make atonement”]. And the related noun, hilasmos, “propitiation,” appears in 1 John 2:2; 4:10.) Christ, God’s propitiatory Sacrifice for sin, was “presented” (lit., “set forth”), in contrast with the tabernacle’s mercy seat which was hidden from view. This work of Christ is through faith in His blood (cf. Rom. 5:9). It is appropriated by faith (cf. 3:22). By the death of Jesus and the shedding of His blood the penalty for sin has been paid and God has been satisfied or propitiated. The phrase “in (or by) His blood” probably should go with “a sacrifice of atonement,” not with “through faith.” A believer places His faith in Christ, not in His blood as such.
3:25b-26. God’s purpose in Christ’s death was to demonstrate His justice (i.e., God’s own judicial righteousness, dikaiosynēs; cf. 1:17) because in His forbearance (anochē, “holding back, delay”) He had left the sins committed beforehand unpunished (cf. Acts 17:30). Why did God not always punish sins in the past? Does this mean He is not righteous after all? Previously Paul said God was forbearing because He wanted to lead people to repent (Rom. 2:4). Here God is said to be forbearing because He anticipated His provision for sins in the death of Jesus Christ. Such forbearance was an evidence of His grace (cf. Acts 14:16; 17:30), not of His injustice. Paul was so insistent that God’s righteousness be recognized that (Rom. 3:26) he repeated (from v. 25) the words to demonstrate His justice (dikaiosynēs, “righteousness”). God’s purpose in the redemptive and propitiatory death of Jesus Christ was so that He could be seen to be just (dikaion, “righteous”) and the One who justifies (dikaiounta, “the One who declares righteous”) the man who has faith in Jesus. God’s divine dilemma was how to satisfy His own righteousness and its demands against sinful people, and at the same time how to demonstrate His grace, love, and mercy to restore rebellious, alienated creatures to Himself. The solution was the sacrifice of Jesus Christ, God’s incarnate Son, and the acceptance by faith of that provision by individual sinners. Christ’s death vindicated God’s own righteousness (He is just because sin was “paid for”) and enables God to declare every believing sinner righteous.
3:27-28. After explaining God’s provided righteousness for sinners, Paul considered five questions (in Gr.) which he anticipated his readers might ask. Two are in verse 27, two in verse 29, and the other in verse 31. The first is, Where, then is boasting? How can Jews have any boasting in their special position? (2:17-20, 23) Paul’s response was abrupt: It is excluded (“completely shut out”). Since justification is by grace (3:24) through faith (vv. 22, 25-26), boasting because of one’s accomplishments (works) is ruled out. This prompted a second question: On what principle? (“Law” here in the Gr. means “principle.”) On that of observing the Law? (lit., “through works”) Paul’s response was, No (lit., “not at all,” an intensive form), but on that of faith. Doing works (i.e., observing the Law) is no basis for boasting for the Law cannot justify. It was not given for that purpose (cf. v. 20). The apostle then summarized, For we maintain (the verb logizometha, “to reckon,” here has the idea of coming to a settled conclusion) that a man is justified (“declared righteous”) by faith (cf. vv. 22, 25-27) apart from observing the Law (lit., “apart from works of Law”).
3:29-30. The next two questions cover the same issue of Jewish distinctiveness from a different angle. Because the Gentiles worshiped false gods through idols, the Jews concluded that Yahweh, the true and living God (Jer. 10:10), was the God of Jews only. That was true in the sense that the Jews were the only people who acknowledged and worshiped Yahweh (except for a few proselyte Gentiles who joined with Judaism). But in reality Yahweh, as the Creator and Sovereign of all people, is the God of all people. Before God called Abraham and his descendants in the nation Israel to be His Chosen People (Deut. 7:6) God dealt equally with all people. And even after God’s choice of Israel to be His special people, God made it plain (e.g., in the Book of Jonah) that He is the God of everyone, Gentiles as well as Jews. And now since there is “no difference” among people for all are sinners (Rom. 3:23) and since the basis for salvation has been provided in the sacrificial death of Jesus Christ, God deals with everyone on the same basis. Thus there is only one God (or “God is one”). Paul no doubt had in mind here the “Shema” of Israel: “Hear, O Israel: The LORD [Yahweh] our God [ʾElōhm], the LORD [Yahweh] is One” (Deut. 6:4). This one God over both Jews and Gentiles will justify all who come to Him regardless of background (circumcised or uncircumcised) on the same human condition of faith.
3:31. The final question is, Do we, then, nullify the Law by this faith? Paul responded in his characteristic expletive, Not at all! (mē genoito, “Let it not be”; v. 4) and then explained, Rather, we uphold the Law. The purpose of the Mosaic Law is fulfilled and its place in God’s total plan is confirmed when it leads an individual to faith in Jesus Christ (cf. v. 20; Gal. 3:23-25). Paul repeatedly affirmed that faith, not works of the Law, is the way of salvation. He wrote the word “faith” eight times in Romans 3:22-31! (See vv. 22, 25-28, 30 [twice], and 31.)
This text is set up in a problem/solution format. Thankfully, God's solution to our problem is more than sufficient. What is the problem? In a word, it is sin. It is looked at from a couple of different ways in the text. First, sin involves all of us. All have sinned. Since the Fall of Adam and Eve, no one has lived a perfectly sinless life. The whole human family is in the same boat as far as God is concerned. Here on earth, we have various ways of comparing the relative goodness and badness of our fellow human beings, and that can be helpful in some cases; but all of that is irrelevant for the purposes of God and salvation. All have sinned. All have the same problem. Next, we see that sin causes us to fail short of God's glory. The meaning of "to fall short" is a simple one: "to not have enough." It is sometimes used of poverty. It focuses on what is lacking. We are lacking what is necessary to experience God's glory. The glory of God is a broad term, encompassing all that He is in His eternal and holy nature. I think it probably has a future sense here also; that is, it refers to the future reality of experiencing the glory of God's presence in heaven. Because of sin, we all fall short of experiencing that. We cannot make it back to God. We cannot make it to heaven. We cannot enter into God's presence. In heaven nothing defiled or sinful will be allowed (Rev. 21:27). That is the problem. All have sinned. And our sins keep us from heaven and all the blessings of God's eternal presence and power. This is the most significant problem of the human race, though not everyone recognizes it. So what is the solution? The solution is God's plan and work of redemption, of salvation through grace, and of justification by faith. Let us outline the elements of this plan. First, it involves being justified through faith in Christ. The term "justified" comes out of the legal world—it refers to being declared not guilty. The word has the same root as the word "righteousness." It means to be declared righteous, to achieve a completely righteous standing that is not by works but by God's grace. We can be made righteous only by God's grace. Second, let us also note that salvation is a free gift. It is not earned or purchased. The term "free" is used. We all know what that means. You do not have to pay for it. It is received without payment. This is grace—God's unmerited favor. Through faith in Christ, we are given the righteousness we could never achieve on our own. This is what obliterates the problem of sin and falling short. A third point is that this all flows from Christ's redemption, that is, His purchase of us by His blood. "Redemption" is a broad term that has in the background a commercial transaction, particularly the purchase of bondage. Redemption gives a total picture of God's saving work for a sinner. Only grace can overcome our problem; only grace can make us right for heaven. Thanks be to God for the free and powerful gift of salvation.
The mystery is a popular kind of story. The puzzle at the story’s beginning is solved by the detective who discovers all the clues and figures out “whodunit.” The story moves to a climax when the mystery is revealed.
The problem of evil in the world is arguably the greatest mystery. Why does the world contain so much suffering? Why do human beings seem so persistently wicked? Skeptics wonder if there is a God, one who is good and powerful, then why does he allow such things to go on? Yet if God were to end evil in the world, would he not have to destroy evil humanity (compare Genesis 6:5-7)? And in the end, has not every human who knows right from wrong proven to be a participant in the pervasive evil? How could anyone survive God’s just judgment? How can he be merciful and still bring judgment on evil? Today’s text makes the bold assertion that through Jesus Christ, God has revealed the solution to that great mystery. In Christ, God has brought his righteous judgment on evil. In Christ, God has made mercy freely available to everyone. In Christ, God has solved the mystery of the ages.
Bringing the opening section of Romans to a climax, our lesson text draws on the important Old Testament theme regarding what it means to belong to God’s people. One key concept in this regard is the distinct calling of ancient Israel as God’s people. The Old Testament asserts that Israel’s God is the only true God, the Creator of all that exists and the world’s true sovereign. Why then was he worshipped by only one tiny, insignificant nation? That situation was to be temporary, as explained by God’s dealing with Abraham: God promised that through that man all nations would be blessed (Genesis 12:1-3; 22:15-18). Closely related to this promise was the role of God’s law in the life of Israel. The Law of Moses was God’s gift to Israel distinctly (Exodus 20). While much of the law expressed God’s justice and purpose for all peoples, many parts of it expressed specific commands that God gave Israel to express that nation’s distinct identity in the world. All peoples—both Gentiles and Jews—were held accountable to laws such as those prohibiting murder and stealing. But only ancient Israel was bound to certain others. This raised a difficult question: When God fulfilled his promise to bless all nations, did that mean that all nations were to become part of Israel and keep Israel’s distinct laws, such as circumcision? Or would God receive Gentiles without those markers of Israel’s identity? Paul worked to answer this question at the famous Jerusalem Council (Acts 15:5). In the early part of Romans, he labored further to answer it. Today’s lesson text picks up where last week’s ended.
It is sometimes hard for us to grasp the concept that faith is not a work that earns a person favor with God. The idea of earning something by working is deeply ingrained in our minds. We may think that simply having faith and believing what God has said is giving God very short change in the bargain of salvation. Yet God does not need our belief in Him to be happy or blessed in some way. He does not need our good works, even evangelism. Nor does He need our praise. We are the ones who benefit from good works, faith, and worship. God has no needs. He is perfectly capable of carrying out all He desires and plans. He is complete and perfect whether or not anyone trusts in Him. Mankind, on the other hand, is completely needy. We have no ability to save ourselves or even to believe in God. Unless He graciously bestows on us the strength and ability to have faith in Christ, we would never believe and be saved (Eph. 2:8). So today we look at how God sets us right by grace. The law God gave to Moses showed His standards for daily conduct and worship. God's demands were possible to achieve on a mechanical level, but unless the sacrifices and other acts of worship were done in faith, they were of no value in spiritually aiding the individual.
21 But now the righteousness of God apart from the law is revealed, being witnessed by the Law and the Prophets,
22 even the righteousness of God, through faith in Jesus Christ, to all and on all who believe. For there is no difference;
21 so that, just as sin reigned in death, so also grace might reign through righteousness to bring eternal life through Jesus Christ our Lord.
30 It is because of him that you are in Christ Jesus, who has become for us wisdom from God — that is, our righteousness, holiness and redemption.
21 God made him who had no sin to be sin for us, so that in him we might become the righteousness of God.
5 But by faith we eagerly await through the Spirit the righteousness for which we hope.
7 But whatever was to my profit I now consider loss for the sake of Christ. 8 What is more, I consider everything a loss compared to the surpassing greatness of knowing Christ Jesus my Lord, for whose sake I have lost all things. I consider them rubbish, that I may gain Christ 9 and be found in him, not having a righteousness of my own that comes from the law, but that which is through faith in Christ — the righteousness that comes from God and is by faith.
17 For the kingdom of God is not a matter of eating and drinking, but of righteousness, peace and joy in the Holy Spirit,
17 For in the gospel a righteousness from God is revealed, a righteousness that is by faith from first to last, just as it is written: "The righteous will live by faith
21 God made him who had no sin to be sin for us, so that in him we might become the righteousness of God.
23 for all have sinned and fall short of the glory of God,
24 being justified freely by His grace through the redemption that is in Christ Jesus,
20 There is not a righteous man on earth who does what is right and never sins.
9 What shall we conclude then? Are we any better? Not at all! We have already made the charge that Jews and Gentiles alike are all under sin.
22 But the Scripture declares that the whole world is a prisoner of sin, so that what was promised, being given through faith in Jesus Christ, might be given to those who believe.
8 If we claim to be without sin, we deceive ourselves and the truth is not in us.
12 Therefore, just as sin entered the world through one man, and death through sin, and in this way death came to all men, because all sinned— 13 for before the law was given, sin was in the world. But sin is not taken into account when there is no law.
20 When you were slaves to sin, you were free from the control of righteousness.
16 Therefore, the promise comes by faith, so that it may be by grace and may be guaranteed to all Abraham's offspring — not only to those who are of the law but also to those who are of the faith of Abraham. He is the father of us all.
16 know that a man is not justified by observing the law, but by faith in Jesus Christ. So we, too, have put our faith in Christ Jesus that we may be justified by faith in Christ and not by observing the law, because by observing the law no one will be justified.
24 You see that a person is justified by what he does and not by faith alone.
39 Through him everyone who believes is justified from everything you could not be justified from by the law of Moses.
20 The law was added so that the trespass might increase. But where sin increased, grace increased all the more, 21 so that, just as sin reigned in death, so also grace might reign through righteousness to bring eternal life through Jesus Christ our Lord.
13 Do not offer the parts of your body to sin, as instruments of wickedness, but rather offer yourselves to God, as those who have been brought from death to life; and offer the parts of your body to him as instruments of righteousness. 14 For sin shall not be your master, because you are not under law, but under grace. 15 What then? Shall we sin because we are not under law but under grace? By no means! 16 Don't you know that when you offer yourselves to someone to obey him as slaves, you are slaves to the one whom you obey — whether you are slaves to sin, which leads to death, or to obedience, which leads to righteousness? 17 But thanks be to God that, though you used to be slaves to sin, you wholeheartedly obeyed the form of teaching to which you were entrusted. 18 You have been set free from sin and have become slaves to righteousness.
5 So too, at the present time there is a remnant chosen by grace. 6 And if by grace, then it is no longer by works; if it were, grace would no longer be grace.
8 And God is able to make all grace abound to you, so that in all things at all times, having all that you need, you will abound in every good work.
9 But he said to me, "My grace is sufficient for you, for my power is made perfect in weakness." Therefore I will boast all the more gladly about my weaknesses, so that Christ's power may rest on me.
8 For it is by grace you have been saved, through faith — and this not from yourselves, it is the gift of God— 9 not by works, so that no one can boast.
25 whom God set forth as a propitiation by His blood, through faith, to demonstrate His righteousness, because in His forbearance God had passed over the sins that were previously committed,
26 to demonstrate at the present time His righteousness, that He might be just and the justifier of the one who has faith in Jesus.
11 For the life of a creature is in the blood, and I have given it to you to make atonement for yourselves on the altar; it is the blood that makes atonement for one's life.
9 Since we have now been justified by his blood, how much more shall we be saved from God's wrath through him!
19 For God was pleased to have all his fullness dwell in him, 20 and through him to reconcile to himself all things, whether things on earth or things in heaven, by making peace through his blood, shed on the cross.
28 This is my blood of the covenant, which is poured out for many for the forgiveness of sins.
7 In him we have redemption through his blood, the forgiveness of sins, in accordance with the riches of God's grace
14 How much more, then, will the blood of Christ, who through the eternal Spirit offered himself unblemished to God, cleanse our consciences from acts that lead to death, so that we may serve the living God!
13 But now in Christ Jesus you who once were far away have been brought near through the blood of Christ.
8 The Lord is compassionate and gracious, slow to anger, abounding in love.
4 Or do you show contempt for the riches of his kindness, tolerance and patience, not realizing that God's kindness leads you toward repentance?
9 The Lord is not slow in keeping his promise, as some understand slowness. He is patient with you, not wanting anyone to perish, but everyone to come to repentance.
Patience of God to show His wrath (Rom 9:22)
22 What if God, choosing to show his wrath and make his power known, bore with great patience the objects of his wrath--prepared for destruction?
2 Now we know that God's judgment against those who do such things is based on truth.
7 The Lord reigns forever; he has established his throne for judgment. 8 He will judge the world in righteousness; he will govern the peoples with justice.
17 The Lord is righteous in all his ways and loving toward all he has made.
31 For he has set a day when he will judge the world with justice by the man he has appointed. He has given proof of this to all men by raising him from the dead."
5 All this is evidence that God's judgment is right, and as a result you will be counted worthy of the kingdom of God, for which you are suffering.
27 Where is boasting then? It is excluded. By what law? Of works? No, but by the law of faith.
28 Therefore we conclude that a man is justified by faith apart from the deeds of the law.
29 Or is He the God of the Jews only? Is He not also the God of the Gentiles? Yes, of the Gentiles also,
30 since there is one God who will justify the circumcised by faith and the uncircumcised through faith.
31 Do we then make void the law through faith? Certainly not! On the contrary, we establish the law.
3 If you, O Lord, kept a record of sins, O Lord, who could stand? 4 But with you there is forgiveness; therefore you are feared.
38 "Therefore, my brothers, I want you to know that through Jesus the forgiveness of sins is proclaimed to you. 39 Through him everyone who believes is justified from everything you could not be justified from by the law of Moses.
13 It was not through law that Abraham and his offspring received the promise that he would be heir of the world, but through the righteousness that comes by faith. 14 For if those who live by law are heirs, faith has no value and the promise is worthless,
4 But when the kindness and love of God our Savior appeared, 5 he saved us, not because of righteous things we had done, but because of his mercy. He saved us through the washing of rebirth and renewal by the Holy Spirit, 6 whom he poured out on us generously through Jesus Christ our Savior, 7 so that, having been justified by his grace, we might become heirs having the hope of eternal life.
18 The former regulation is set aside because it was weak and useless 19 (for the law made nothing perfect), and a better hope is introduced, by which we draw near to God.
3 What if some did not have faith? Will their lack of faith nullify God's faithfulness?
6 And without faith it is impossible to please God, because anyone who comes to him must believe that he exists and that he rewards those who earnestly seek him.
11 Now faith is being sure of what we hope for and certain of what we do not see. 2 This is what the ancients were commended for.
17 For in the gospel a righteousness from God is revealed, a righteousness that is by faith from first to last, just as it is written: "The righteous will live by faith."
9 The Lord is not slow in keeping his promise, as some understand slowness. He is patient with you, not wanting anyone to perish, but everyone to come to repentance.
2 I urge, then, first of all, that requests, prayers, intercession and thanksgiving be made for everyone— 2 for kings and all those in authority, that we may live peaceful and quiet lives in all godliness and holiness. 3 This is good, and pleases God our Savior, 4 who wants all men to be saved and to come to a knowledge of the truth.
10 For the Son of Man came to seek and to save what was lost."
18 Consequently, just as the result of one trespass was condemnation for all men, so also the result of one act of righteousness was justification that brings life for all men.
11 For the grace of God that brings salvation has appeared to all men.
The Roman poet Horace, laying down some lines of guidance for writers of tragedies in his day, criticizes those who resort too readily to the device of a deus ex machina to solve the knotty problems which have developed in the course of the plot. ‘Do not bring a god on to the stage,’ he says, ‘unless the problem is one that deserves a god to solve it’ (nec deus intersit, nisi dignus uindice nodus inciderit).
Surely man’s problem as Paul summarized it is one that needs God to solve it. James Stifler suggests in his commentary on Romans that there is a ‘sigh of relief that can be heard’ in the particle ‘but’ which introduces verse 21. Surely this is the case, for what a relief it is to know that God has provided a solution for man’s dilemma of sin.
The dilemma of man is such that he is incapable of releasing himself from the shackles of sin. He must be saved by someone other than himself and by someone who does not suffer from the same malady. One drowning man cannot help another. What man cannot do (provide a righteousness acceptable to God), God has done in the person of His Son, Jesus Christ. This is the good news for which we have waited.
A Preliminary Definition of Righteousness. The righteousness of which Paul writes in verses 21-26 may be defined as: The gift given to every man who trusts in Jesus Christ which enables him to stand before the Holy God uncondemned and in His favor. This righteousness of God is described in verses 21-26.
(1) The source of righteousness is God. Paul wrote, “But now apart from the Law the righteousness of God has been manifested, being witnessed by the Law and the Prophets” (Romans 3:21, cf. also v. 22). This righteousness is that which is provided by God and not produced by the efforts of men. It is the righteousness of God.
(2) This righteousness, though not produced by the Law, was promised by it. From this same verse (v. 21), we can see that in one sense this righteousness of God is related to the Old Testament Law and in another it is totally distinct. It is related in that it was predicted in the prophecies of the Old Testament concerning the Person and work of our Lord Jesus Christ. Further, the Old Testament Law is a valid standard of righteousness, so when our Lord came to the earth as a man the Law pronounced Him to be righteous, according to God’s standards. Not one charge of sin could be made against our Lord Jesus Christ, according to the Law of the Old Testament (John 8:46).
But this righteousness of God which Paul writes about is completely independent from the Law in that it cannot be attained by men and their futile efforts to satisfy the requirements of the Law. So the righteousness of God comes not from Law-keeping, as the Jews erroneously supposed.
(3) The righteousness of God is retroactive. The righteousness of God is retroactive in that it is sufficient for the sins of men who lived in previous ages. “… This was to demonstrate His righteousness, because in the forbearance of God He passed over the sins previously committed” (Romans 3:25). Paul’s argument about the retroactivity of God’s righteousness subtly undermines the false hope of the Jew in attaining righteousness by Law-keeping. Since the righteousness of God is retroactive and saves those who had faith in God in the Old Testament age, then Law-keeping not only fails in the present age; it has never saved men.
(4) God’s righteousness vindicates Himself. Stifler has written, “The chief question in saving man is not how the man may be accounted just, but how God may remain so in forgiving sins.”
With reference to God’s character under the Old Testament economy, God appeared to ‘look the other way’ when men sinned. It appeared that God was less than just in dealing decisively with man’s sin. When God’s wrath was poured out on His Son, Jesus Christ, there was not one shadow of doubt left as to how God felt about sin.
A number of years ago, I was a school teacher with a reputation for being the toughest disciplinarian in school. One woman bus driver at least thought so and brought a couple of boys to my room who had thrown rocks at the bus. I paddled these two boys, but was informed that there was yet one culprit who had not yet been brought to justice, and this lad was the principal’s son. I had a long talk with the principal, who implied that perhaps his son should be exempted because he had a glass eye. Since he did not have a glass bottom, I went to his room and paddled him, too. Until this boy was paddled, there was a cloud of suspense which hung over the school. Would Mr. Deffinbaugh paddle the principal’s son, or would he make an exception? How quickly the cloud was dispelled with the crack of the paddle.
So it is with God’s character. God’s character was in question. For hundreds of years, God had passed over sins previously committed. He could not be just and overlook sin forever. Sin must be punished. When the wrath of God was poured out on His own Son, God’s righteousness was vindicated once for all. This is not only so in reference to past sins, but also to present sins. God simply cannot overlook sin. If He were to pronounce men righteous without a payment for sin, He would contradict His own character, His holiness and justice. The justice of God demanded a payment for sin. So the righteousness of God in Jesus Christ vindicated God’s character by satisfying the requirements of justice and holiness.
(5) The righteousness of God accomplishes man’s salvation. The revelation of God’s righteousness not only vindicates God, but it saves men. This salvation is described in three dimensions in verses 21-26.
The first term, ‘redemption,’ in verse 24 describes salvation in terms of the slave-market. Redemption refers to the payment of a purchase price which liberates the captive. When a man went to the slave-market and paid the price of the slave he redeemed the slave. The death of Christ on the cross and the shedding of His blood was the payment of our redemption price. We, just as Israel was redeemed from the slavery of Egypt, have been redeemed from the bondage of sin.
The second term, ‘propitiation,’ takes us to the temple. This word is used in the Septuagint (the Greek translation of the Old Testament) for the ‘place of propitiation’ or the ‘mercy seat’ which covered the ark in the Holy of Holies. In this sense our sins have been covered or blotted out by the shed blood of Jesus Christ. But propitiation also conveys the idea of appeasing. God’s wrath has been legitimately aroused by man’s sin. This wrath has been appeased by the death of Jesus Christ on the cross. God’s holy anger has been satisfied in the work of Christ.
The final word, ‘justification,’ takes us to the courtroom. This is a legal term which means to pronounce righteous. If God were to judge us according to our own righteousness, He would have to declare us as unrighteous and wicked. But when we acknowledge Jesus Christ as our substitute—the One Who died in our place and Who offers His righteousness in place of our wretchedness—then God declares us to be righteous on the basis of the work of Jesus Christ.
By the terminology of the slave-market, the temple and the court room, we see this righteousness of God described in terms of its effect on the believing sinner.
(6) God’s righteousness is available to all men, and appropriated by faith. God’s righteousness is true to God’s character in that it is available to all men without distinction. Just as there is no distinction with God in universally condemning all men as sinners, so God does not show partiality in offering it only to the Jews.
Just as the righteousness of God is not allotted to men on the basis of their race, so it cannot be earned or merited by man. It is given by grace as a free gift: “Being justified as a gift by His grace through the redemption which is in Christ Jesus” (Romans 3:24). Your salvation is not without cost, for it cost God the death of His Son, but it is without cost to you for there is nothing you could ever do to earn it. The gift of God’s righteousness must be accepted by faith, not earned by works: “Even the righteousness of God through faith in Jesus Christ for all those who believe …” (Romans 3:22).
The problem for most people is not that becoming a Christian is too difficult; it is that it is too easy. We want desperately somehow to contribute something to our salvation. But the Word of God tells us that our righteous deeds are like filthy rags in God’s sight (Isaiah 64:6). The more we offer our works to God the greater the offense to Him.
What kind of righteousness are you relying on for your eternal salvation? The rags of your own works, or the riches of Christ’s merit. You don’t have to walk the aisle or raise your hand to become a Christian. All you need to do is acknowledge the wretchedness of your righteousness and trust in the righteousness which Jesus Christ offers in its place—a God-kind of righteousness which results in eternal life. Stop trusting in yourself and lean only on Him. That’s the good news of the gospel. Come to think of it, none of Romans 3 is bad news for the Christian.
(Adapted from URL:https://bible.org/seriespage/5-some-bad-news-and-good-news-romans-3)
In the best mystery stories, the audience is uncertain as to how the mystery will be solved until the very end. All the clues are clear, but how they fit together is obscure. When the solution is revealed, a good mystery prompts the audience to express satisfaction with the outcome. “Yes, that makes sense. It had to be that way.” The gospel is just such a solution to the mystery discussed in the Introduction. If there is any meaning in the world, there must be a God who demands justice. But if God is just, then we are subject to his judgment because of our sins. We need a God who is merciful. In Christ, God is both just and justifier, both righteous and merciful. The cross solves the mystery and answers our deepest need.
1. God sent Jesus as the way all men can know His character and way of righteousness (Rom. 3:21)
2. As we rely on Jesus to forgive our sins, He empowers us to live a life that pleases Him (vs. 22)
3. There are no "big" or "small" sins. All sin separates us from God (vs. 23)
4. As we rely on Jesus for forgiveness, He wipes the slate clean as if we had never sinned (vss. 24-26)
5. We have no bragging rights, because saving faith is all about what God has done for us (vss. 27-28)
6. As we rely on Jesus for salvation, He gives us an identity and a relationship with Him (vss. 29-31) | <urn:uuid:28186761-4f65-4b01-aabc-51d39ad3ee22> | CC-MAIN-2022-33 | http://www.zaologos.com/sslesson/SS160717.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.967503 | 9,464 | 2.203125 | 2 |
With Savvy And New-Age Speeches, A First Couple Runs Nicaragua
Nicaragua's gigantic transoceanic canal, if it gets built, will dwarf the neighboring Panama Canal. Ground-breaking is set to begin before the end of the year.
The $50 billion mega project would bring an economic boom to the poor nation — and a political bonanza for its president, Daniel Ortega.
Ortega is not the bombastic revolutionary of years past. He shies away from public appearances and has left day-to-day operations to his wife, an eccentric former revolutionary poet.
Supporters hail the two as socialist saviors of the country, but critics charge the couple with creating a closed, authoritarian regime more akin to the dictatorship they toppled more than 30 years ago.
A Much Different Ortega
At 68, Daniel Ortega has less hair and is much thicker around the middle than when he was first elected president nearly 30 years ago, not long after he and his Sandinista rebels put an end to more than four decades of the Somoza family dictatorship.
He has also toned down his fiery revolutionary rhetoric, even toward his former No. 1 enemy, the United States. At a rare public appearance earlier this summer, commemorating the Nicaraguan navy's 34th anniversary, Ortega told the crowd of faithful Sandinista supporters, "I want to recognize the role of the United States government and President Barack Obama."
He went on to praise U.S. contributions and cooperation in combating drug traffickers in Central America.
His Wife Is The Voice Of The Government
But while Ortega shies away from the public, his wife, Rosario Murillo, doesn't. She is the government's official spokeswoman.
Unlike her husband's stiff style and plain white shirts, Murillo dons bright flowing skirts, rings on every finger and a multitude of colorful necklaces. She has also decorated many of the capital's traffic circles and main thoroughfares with huge, bright-yellow metal trees that look like something out of a Dr. Seuss book.
Every weekday, she takes to the national airwaves. Referred to widely as the Companera, or Comrade, Murillo's daily address begins around noon and usually lasts about 20 minutes.
On a recent sweltering summer day, Murillo used the address to tout the government's free medical services to the poor, and to talk about the weather — Nicaragua is suffering through a devastating drought, which has led to crop losses and a spike in basic food prices.
Christina Ulloas says she tunes in while cooking lunch and enjoys the updates. Nearly every home in her neighborhood was paid for by the government.
While most residents here enjoy Murillo's new-age spirituality lectures, the daily talks drive her critics crazy.
"She just invented that title of secretary of communication," says Sofia Montenegro, a longtime opposition journalist. "In Nicaraguan law, there is no such position."
Montenegro says the first couple has consolidated power to enrich themselves and their family. Ortega recently pushed through favorable electoral laws eliminating presidential term limits. Of Nicaragua's eight national TV stations, seven are owned by Ortega family members and friends.
"They have created a totally secretive political system," she adds. "There is no access to public information or accountability in Nicaragua."
But even key opponents to the government say there are few current alternatives to the first couple. Writer Sergio Ramirez, Ortega's vice president in the 1980s, says the opposition is conservative and divided, and isn't offering the people of Nicaragua anything better than Ortega.
"People are more worried about their social and economic state than about the state of the constitution and democracy," Ramirez says. "What they are worried about is if they will eat today, have a job tomorrow."
The two no longer speak. Most of the original Sandinista leaders have split with Ortega.
Ortega Holds The Power
While Murillo may be the face and voice of the government, Ortega clearly holds the power in the country.
Despite multiple attempts by NPR to talk to Murillo or the Nicaraguan embassy in Washington, D.C., neither would comment for this story.
Richard Feinberg, a professor of International Relations at the University of California in San Diego, says over the years, Ortega has shrewdly become a more flexible politician.
"[He] has learned to accommodate the interests of his opposition, including the Catholic Church, the important business community and, internationally, Ortega is on good terms with the multinational donors," Feinberg says.
Nicaragua's impressive economic growth, averaging nearly 5 percent in the last four years, and low inflation, have kept Ortega on good terms with the World Bank and the IMF, and more importantly, with the country's poor.
Marina Loza irons clothes for a living and makes about $5 a day. She says the Ortegas are doing a good job running the country.
She predicts Murillo will be president one day, after Ortega can no longer do the job.
"If the two continue doing right by us, then they will stay in power," she adds with a broad smile.
Copyright 2021 NPR. To see more, visit https://www.npr.org. | <urn:uuid:3bbcbec2-0288-4cc9-8926-fe8158f7e84f> | CC-MAIN-2022-33 | https://www.wamc.org/2014-09-28/with-savvy-and-new-age-speeches-a-first-couple-runs-nicaragua | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.963826 | 1,111 | 1.8125 | 2 |
The flame is born to shine,
But can only shape to a rhyme,
When a breeze chooses to chime.
The earth is bound to hold,
But whether that is grain or gold,
Plots the potter when it is mold.
The flying fragrance of the flower,
Follows the hand that plucks forever,
Destined to where it’s smell shall shower.
So, to those who rid you of platitude,
For your fame, fortune, and fortitude,
For them, spare a thought of gratitude.
Gratitude is called kataññutā in Pali. The word consists of two parts: kata, which means that which has been done, especially to oneself; and annuta means knowing or recognizing. So katannuta means knowing and recognizing what has been done to one for one’s benefit. | <urn:uuid:5a45ef37-9a5b-4acb-aec3-0402230b9bd5> | CC-MAIN-2022-33 | https://breathefeellove.in/2018/04/10/gratitude/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.94866 | 186 | 2.0625 | 2 |
In constrictive shoes, the big toe is forced to bend toward the second toe and the first joint of the big toe is moved out of place. To compensate for the realignment, the outside of the joint is increased in size. Tendons then begin to pull the toe into an abnormal position. Over time the change in position becomes painful and permanent. The change in position also causes the mechanics of the toes and foot to be affected. The joint at the base of the big toe carries a lot of weight when walking or running. In a normally shaped foot the position of the big toe helps create a wide base of support and stability. A foot that has had the big toe bent toward the second toe will tend to roll inward. This abnormal pronation, along with the ill-fitting shoes will make the Bunion even worse. If a person has a foot anatomy that is prone to Bunions, wearing footwear with a too-narrow toe box will accelerate the development of a Bunion. Wearing footwear with a wide toe box may help prevent or at least delay the development of Bunions.
Bunions develop when the pressures of bearing and shifting your weight fall unevenly on the joints and tendons in your feet. This imbalance in pressure makes your big toe joint unstable, eventually molding the parts of the joint into a hard knob that juts out beyond the normal shape of your foot. Experts disagree on whether tight, high-heeled or too-narrow shoes cause bunions or whether footwear simply contributes to bunion development. Other causes include inherited foot type, foot injuries, deformities present at birth (congenital). Bunions may be associated with certain types of arthritis, particularly inflammatory types, such as rheumatoid arthritis. An occupation that puts extra stress on your feet or one that requires you to wear pointed shoes also can be a cause.
The most common symptoms associated with this condition are pain on the side of the foot. Shoes will typically aggravate bunions. Stiff leather shoes or shoes with a tapered toe box are the prime offenders. This is why bunion pain is most common in women whose shoes have a pointed toe box. The bunion site will often be slightly swollen and red from the constant rubbing and irritation of a shoe. Occasionally, corns can develop between the 1st and 2nd toe from the pressure the toes rubbing against each other. On rare occasions, the joint itself can be acutely inflamed from the development of a sac of fluid over the bunion called a bursa. This is designed to protect and cushion the bone. However, it can become acutely inflamed, a condition referred to as bursitis.
Your doctor can identify a bunion by examining your foot. Watching your big toe as you move it up and down will help your doctor determine if your range of motion is limited. Your doctor will also look for redness or swelling. After the physical exam, an X-ray of your foot can help your doctor identify the cause of the bunion and rate its severity.
Non Surgical Treatment
A bunion treatment must address the underlying cause of the deformity, not just the bump (bunion) itself but also the functions of the foot. The up and down motion of the longitudinal arches in the foot. The sideways motion of the transverse arch. Bunion aids effectively treat this underlying foot function while straightening the big toe because the mid-foot strap stabilizes the longitudinal arches and transverse arch. The toe strap gradually and gently pulls the big toe away from the second toe. The metatarsal pad helps align the transverse arch. The hinged splint enables the big toe to flex while walking and adapts to the contour of the foot, especially around the inflamed area of the joint.
A bunion is considered moderate when it pushes against the second toe. In fact, over time, the big toe can force itself under the second toe, causing it to buckle and form a "hammer toe." If non-invasive treatment is not effective, and the joint is still causing discomfort, the doctor may suggest a bunionectomy to realign the big toe. With this procedure, the bunion head is moved over realigning the angled great toe joint back to a normal position. The tendons and ligaments are also balanced for a more normal pull on the toe. In moderate bunion cases, you will experience a relatively rapid recovery. The procedure allows for immediate weight on the foot in a boot and return to tennis shoes in about a month. The choice of procedure best for each patient depends on the deformity size, the stiffness of the 1st metatarsal and the ease of realignment of the 1st metatarsal during the clinical exam.
Make better shoe choices. If you?re a woman, avoid high-heeled footwear whenever possible (at the very least, choose shoes with heels lower than two inches), and make sure all your footwear has a wide, deep toe box. Whether man or woman, if you?re trying on shoes and your toes feel ?squished? or crowded by a particular shoe, reject that style and try another, or go for a larger size. You don?t need to invite trouble. In general, shoes that come to a point at the toe are bad news, as they tend to push the toes together into an overlapping pattern. Shoes with rocker soles will unload pressure on the bunion area. Examine your feet regularly. Note any redness, swelling or discoloration. Flex your toes and check for any stiffness. If there is any, think back to what you?ve worn or done in the past few days. If the condition persists more than a few days, or worsens, a visit to the podiatric physician is in order. | <urn:uuid:87da2b4a-6c65-4f9b-9b06-f20a9def5f8a> | CC-MAIN-2022-33 | https://annettoravetz.hatenablog.com/entry/Bunions_All_You_Need_To_Know | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.926656 | 1,247 | 2.921875 | 3 |
By Peter Giampaoli, Climate Change Specialist, Land Tenure and Property Rights Division, USAID.
Clear, secure rights to manage and use forests are an important aspect of sustaining traditions and economic opportunities. Although this web site often discusses property rights in the context of developing countries, insecure title and undocumented land rights can undermine smallholder ownership in the United States as well. In the American South, some African American owners of rural land and forests face challenges stemming from imprecise boundaries and a lack of clarity regarding their property rights–both of which are legacies of how land and property rights were allocated to freed slaves following the Civil War.
In an ongoing case near Olney, Maryland, a kinship community is in a dispute with the Maryland-National Capital Park and Planning Commission over the whether a public road actually exists. Residents–descendants of freed slaves who settled in the area following the Civil war–argue that a public road previously existed but was removed from planning maps as the surrounding area was developed. A Commission official commented on the property deeds held by the residents, saying the descriptions of property boundaries are inadequate for determining “who actually is entitled to use a right-of-way.” He went on to note, “Ancient deeds make references to property descriptions in a lot of different ways. Sometimes it’s to a rock. Sometimes it’s to an apple tree.” An attorney representing one member of the community pointed out that if there is no recognized public road, then residents don’t have addresses, and “they can’t build on the land, they can’t get services, they can’t get emergency services, they can’t do anything with the property they’re paying taxes on.” He continued, “Obviously, the property is not worth much. … If you can’t build on it, it’s hard to sell it.”
In North and South Carolina, a pilot program by the U.S. Department of Agriculture and U.S. Endowment for Forestry and Communities is helping sustain the African American legacy of forest ownership in those states by helping clarify smallholder titles over forest lands and providing training on how to productively manage forest lands for economic benefit. Many of these family holdings date back to the period following the Civil War. Often deeded to multiple families, these forest lands are now held in common by numerous inheritors without clear titles. Economic distress has driven some smallholders to sell their forest land, and individual descendants are able to force the sale of these lands–terminating family ownership.
In both the Maryland and North and South Carolina cases, owners face challenges exercising their property rights due, in part, to modern requirements regarding the precision and detail of property records. Such conflicts may be resolved by programs similar to the USDA’s, which attempts to achieve greater precision regarding ownership and property boundaries. The pilot program has enabled African American forest owners to retain ownership of their forest holdings and has been cited as a model for expansion across the South. The USDA program and similar efforts reflect the Voluntary Guidelines on the Responsible Governance of Tenure of Land, Fisheries, and Forests in the Context of National Food Security by helping smallholder owners clarify their rights and by providing extension and other services that allow them to use their land for economic benefit. | <urn:uuid:1ced42d7-4762-42fb-96ca-ae42a4efabf9> | CC-MAIN-2022-33 | https://land-links.org/2013/12/lack-of-documented-land-rights-continues-to-constrain-descendants-of-freed-slaves-in-u-s/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.953386 | 691 | 3.15625 | 3 |
Delegates at the COP23 meeting in Bonn say the finance sector needs to recognise how climate change is affecting investments.
The sector was being encouraged to move away from carbon intensive investment.
The UN said finance for climate projects was flowing at a greater pace, with vibrant markets now for renewable energy, electric vehicles, green buildings and climate-smart agriculture.
The World Bank said funding needed to flow so people everywhere could benefit from low-carbon and climate resilient investments.
It hopes the UN can attract public, private, and philanthropic investors.
The European Commission said hundreds of billions of euros in investment were needed to move to a low carbon economy and meet the Paris Agreement targets.
It is preparing an action plan on sustainable and green finance for early next year. | <urn:uuid:996fbde6-cc9b-43f2-9bec-c92af3594026> | CC-MAIN-2022-33 | https://www.rnz.co.nz/international/pacific-news/343819/un-calls-for-greener-investors-at-cop23 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.950247 | 156 | 2.390625 | 2 |
Los Angeles World Airports, which operates LAX, have been working hard on the future of transportation at the airport lately—the big issue is car traffic, and it's working on a big overhaul now, plus planning a consolidated rental car facility and an intermodal transportation facility that would allow drop-offs, bag checks, parking, and a meet and greet area. Yesterday, the Board of Airport Commissioners also met to discuss the biggie: a people mover that would connect to the Metro system. As mentioned yesterday, LAWA is looking at having a PM with two or four stops at LAX; the former would require passengers walk farther, but cost about a billion less and take few years less to build (between 5 and 7 years).
That seems good, but, according to yesterday's presentation, via LA Airspace, LAWA still really wants the PM to connect to Metro via the intermodal transportation facility, which would require a spur off of the Crenshaw Line, which is already under construction. A spur to the ITF would not only require a new environmental review (a lengthy, costly process), but billions of dollars and re-routing complications with Crenshaw trains. Connecting the PM to the Crenshaw Line's Aviation/Century station would seem like the way to go, but LAWA can't seem to let the spur idea go.
· LAX plans ambitious ground transportation projects; Read the report [LA Airspace]
· Here Are LAX's Two Plans For an Airport People Mover [Curbed LA] | <urn:uuid:336e581d-1a6b-481c-a6c5-fc2f08c5ea65> | CC-MAIN-2022-33 | https://la.curbed.com/2014/5/6/10102752/all-the-details-on-laxs-potential-people-mover-system | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.968692 | 319 | 1.710938 | 2 |
Here are some frequently asked questions about CAE Pathways
What is inclusive design?
Inclusive design is a design principle that places people at the heart of the design process. It’s based on the understanding that we are all different, and all have varying needs. Inclusive design seeks to reduce the barriers that can stop people from being able to access the environments or services they need (whether physically or digitally). The course will primarily focus on the physical environment, however there will be a module on digital accessibility.
How many people will be on the Pathways programme?
There are places for up to 15 participants each year.
How much does the Pathways programme cost?
The programme is free, though participants will be expected to cover their own travel costs.
Who is the programme funded by, and why does this scheme only apply to people living in London
This training programme is funded by City Bridge Trust’s Bridge to Work programme. The Bridge to Work programme provides funding to support organisations, like CAE, to narrow the employment gap for young disabled people in London. Unfortunately we are not in the position at the moment to take on people from outside of London
When does the 2021 programme start?
The Pathways programme will begin in October 2021
Can I be on the programme if I am already in education?
It is important to think about whether you have enough time available to commit to the Pathways programme. You will be expected to commit to 22 days of training over a period of 12 months. In addition, you will also be expected to complete up to 4 work shadowing opportunities during the year. You will get a better understanding of the time commitment at the virtual taster sessions.
Can I be on the programme while employed?
You can be in part-time employment or be doing voluntary work alongside the programme. You will need to be able to commit to two days of training every 3-4 weeks and work shadowing opportunities. If your employment is short term and you are available to take part in October 2021 then you may still be eligible. Please email email@example.com to discuss your individual circumstance with a member of our Pathways team. As places for the Pathways Academy are limited we may prioritise applications from individuals who are not in employment.
How can I apply to be on the programme? | <urn:uuid:001eb00b-a121-4aff-bc92-eaa90e239bd1> | CC-MAIN-2022-33 | https://cae.org.uk/pathways-academy/frequently-asked-questions-about-cae-pathways/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.947039 | 481 | 1.8125 | 2 |
It’s no secret that boosting your net worth is entirely possible if you use the right methods. Savvy investors and individuals keeping an eye on the family budget have been using several tried and true strategies for decades. The really good news is that you don’t need to be a financial planner or tax expert to ramp up net worth in a matter of months. Keep in mind that patience pays big dividends in this endeavor, so be ready to take action and then wait a while before seeing solid, measurable results. However, a few of the methods listed below can deliver quicker results depending on your personal money situation.
Not all methods will work for everyone. For example, if you already own a home or have already refinanced student loans, then you’re okay in those areas and can move on to some of the alternatives on the list. Visit Credible for refinancing options available to you. Always remember to begin slowly, keep very accurate records of everything you do and measure results when they begin to take effect.
1. Earn More
It almost sounds too simple, but many people overlook this solution to a net worth dearth. Earning more money can mean different things. For some, working a few extra hours per week at a second job does the trick. Even ten additional hours in every five-day cycle can add up quickly.
Another variation of the earn more technique is taking on a part-time job on weekends or during the week. This approach works best for younger, hardier folks who are content with the added workload of a side freelance opportunity, even for only a few months. Finally, you can always try to earn more at your current job by getting a raise. That means becoming proactive, making sure to ramp up your performance for a few months before springing the question on your boss, and having an alternative strategy in place. However, the fact remains that making more money through work is one of the most direct and uncomplicated ways to improve your net worth.
2. Purchase a Home
If you’re currently renting, you have a golden chance to quickly add to your personal bottom line. Get out of your apartment and purchase a home. Even when you have little equity built up in the new abode, your monthly payments will, at least, be going toward equity rather than an expense. Some people view this method as an accounting trick because you’re just changing your place of residence. But, in the long run, your financial wellbeing can go way up as a result of being a homeowner.
Don’t fall into the trap of thinking you have to put down as much money as possible on your new home. Make only the down payment amount required by the bank so as to free up funds to pay off any high-interest debt, like credit cards or medical bills, that you currently have on your books.
3. Refinance Student Loans
Another method used by people who have college and graduate degrees is student loan refinancing. The goal here is to renegotiate your education loan and take advantage of three unique benefits which are a lower interest rate on the debt, lower monthly payments and a longer time to repay the student obligation. Refinancing from Earnest.com is a smart, and relatively fast, way to improve your financial situation.
You’ll have more disposable income available each month due to the lower payments. That extra cash can go toward investments, paying down high credit card bills or putting a little extra toward your mortgage each month.
4. Cut Spending
You don’t have to take a chainsaw to your budget, but it’s a good idea to scrutinize your spending habits with the aim of chopping away some of the unnecessary expenditures. Do you really need that health club membership, the second car, a long vacation every year, and all those meals out? In truth, those are four of the most common places where people find themselves spending to excess. Even reducing your habit of eating out by half, you can sock away a large chunk of change each month.
If you like to use apps to hone your budget, consider any of the free expense cutting apps available for no cost download. These clever little pieces of computer code can assist you with finding waste by comparing your budget numbers and percentages with those of millions of others. You’ll get a quick take on whether your spending is above or below national averages in hundreds of different categories. No matter how much you currently earn or save, budgeting apps can help you cut expenses by a lot.
Investing is not a quick way to improve your financial picture, but it’s one of the best long-term approaches. Even putting a fixed amount of money, like $250, into a balanced stock fund each month can earn generous dividends for the average investor. Try to stick to conservative stocks and funds so you won’t need to worry about a likely drop in equity.
Some of the most famous financial gurus in the world have built their wealth with this technique alone. It takes perseverance, the ability to handle occasional downturns and basic knowledge of the market. But studies have shown that a slow, conservative buildup of a stock portfolio can add to your monetary wellbeing over the long term. The thing to remember is to diversify, avoid high brokerage fees and stay up to date on current events. There’s no need to become a financial guru, but as long as you know how the market works and what the general state of the economy is, you’ll be better off.
6. Open a Roth IRA
Roth IRAs are funded with after-tax income. They offer unique advantages to people who want to earn interest without the future burden of Uncle Sam taking a cut out of the financial pie. Unlike ordinary IRA’s, Roth’s allow you to create wealth slowly with after-tax contributions. There are a few restrictions about withdrawals and contributions, but not nearly as many as there are for traditional IRA’s. | <urn:uuid:a3606474-71d0-4214-b693-8cd632b8d7e8> | CC-MAIN-2022-33 | https://thewashingtonnote.com/boost-your-net-worth/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.954268 | 1,235 | 1.632813 | 2 |
The Santa Clara History Museum opened its door Swiss Days 2012. Santa Clara City had built their new Town Hall with an empty basement that could house the story of this community. From the time Santa Clara Swiss Days began in 1990 events were held to share the history of its families. Many artifacts were out there but a place was needed to house them. The Relief Society House and Hug-Gubler Home were available to house some, but a larger facility was needed to really be able to “tell the story”. Permission was given to have the space, but funding was needed to complete the project. Charlie Clayton came to our aid to contribute enough to add to what we already had and the project was completed. Mr. Clayton is a descendant of Samuel R. Knight – so because of his contribution the name – Samuel R. Knight Santa Clara History Museum.
A committee was organized with each person or persons taking on a specific subject to cover. We began with the American Indians (Shivwitt Band), Mormon Missionaries, Swiss Company, etc. to tell the story of how Santa Clara began and how it would thrive.
Those involved in the creation of the museum were:
Susie Nilsson, Charlie Clayton, Sherri Anderson, Jan Stucki, Vicki Lasswell, Donna Stafford, Lee & Brenda Ence, Jan & Gretchen Graf, Lori Hafen, Claudia West, Debbie Hafen, Paul Graf, Ester West, Alice Steel, Barbara Beckstrom, Shirlee Bray, Penny Barben, Noreen Mackley, and many others. Much time and effort has gone into the creation and maintenance of the Santa Clara History Museum. | <urn:uuid:9d6c67bd-8330-4cbe-92fc-1d1b268b435f> | CC-MAIN-2022-33 | http://santaclaramuseum.com/about/?s= | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.965102 | 342 | 2.296875 | 2 |
1 in every 3 kids get constipation and it’s often caused by new things like changing home or school. Worry and stress can make it harder to poo and the longer they wait the harder it gets!
We’re pleased to be working with the department of Typography & Graphic Communication at University of Reading to support the design of a physical and digital resource that will help parents look after their children if they are constipated.
The resource builds on the journey mapping research carried out by the University of Reading and builds on some of the illustrative techniques that we have been developing with the University of Oxford and the NHS.
While this guide shows that constipation can be treated successfully, the impact on stress, poor diet and welfare on children’s development is stark and guides like this can only be part of the solution to the growing challenge of childhood obesity and inequalities in physical exercise and parental support. | <urn:uuid:ecc20e24-91ca-4207-bda6-4a2e519303ca> | CC-MAIN-2022-33 | https://www.design-science.org.uk/news/parent-guidance-children-constipation | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.952899 | 188 | 2.625 | 3 |
We live in a pretty spectacular time, when you think about it. Technology allows us to share information, ideas, and methods for better living with the touch of a few buttons. By simply typing in a few keywords, we have access to tips for organizing our lives, schedules for working out, medical advice, and a seemingly endless array of recipes. Where once recipes were shared between friends, family, or magazines, we now share recipes and explore food trends with strangers worldwide in a matter of seconds. It is this instant feedback and efficient sharing of knowledge and ideas that has enabled some of the fastest moving food trends in history.
In 2016, one of the fastest and most prolific food trends will easily be non-meat protein rich substitutes taking over our plates. For both social, environmental, and health reasons, a push towards replacing animal-based proteins with fruits and vegetables is quickly becoming the next big thing in fine dining and home cooking alike. As consumers become more aware of the carbon footprint that mass meat production leaves on our planet as well as the cruel conditions that these animals are forced to endure, the trend has shifted from meat and potatoes to exciting new alternatives such as spiralized vegetables, spiced beans, or fresh locally sourced produce. Where once it was commonly accepted that every meal had to have an animal-based protein, a shift in thinking has resulted in fewer meals including meat, and when meat is on the menu, consumers are opting to purchase a higher quality and locally sourced provider. | <urn:uuid:705458b5-4acd-45d1-a34e-012439876811> | CC-MAIN-2022-33 | https://www.bullpenfood.com/move-over-meat/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.967945 | 303 | 2.5625 | 3 |
National Level Reporting. Field Level Accuracy. HSAT can provide analysis on crop health, yield, irrigation, and sustainability.
Increasing – populations, sustainable practices and extreme weather events – means an in ever-increasing demands for farmers. HSAT can help tackle these challenges by providing accurate, reliable, and efficient information.
HSAT can provide reports on a global scale or a field level. This is possible because the analysis is conducted at 10x10m level, and then expanded to cover a farm, field, region or country.
HSAT works to understand your challenge and then build a bespoke solution to address those needs – from understanding crop production and transport logistics to identifying areas of crop disease or requiring irrigation for precision agriculture. | <urn:uuid:deac80fd-9c16-467f-b924-818ed9892fe6> | CC-MAIN-2022-33 | https://hsat.space/industries/agriculture/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.926977 | 148 | 2.546875 | 3 |
How to Fracture a Fairy Tale
by Jane Yolen
Genre: Short Stories, Retellings
Length: 240 Pages
Release date: November 5, 2018
Publisher: Tachyon Publications
Fantasy legend Jane Yolen (The Emerald Circus, The Devil’s Arithmetic) delights with this effortlessly wide-ranging offering of fractured fairy tales. Yolen fractures the classics to reveal their crystalline secrets, holding them to the light and presenting them entirely transformed; where a spinner of straw into gold becomes a money-changer and the big bad wolf retires to a nursing home. Rediscover the fables you once knew, rewritten and refined for the world we now live in―or a much better version of it.
My thanks to NetGalley and Tachyon Publications for sending me an ARC of this book in exchange for an honest review. All opinions are my own and are not influenced by the publisher.
I have mixed feelings about this anthology, making it difficult to give it an overall rating that feels accurate. There were a few stories that I really enjoyed, but a few too many that never sufficiently grabbed my interest. I love fractured fairy tales, and think I was looking for more drastic changes from the original source material in some cases. What’s the point of writing a retelling without turning the whole story upside-down and making us think about it in a totally new light?
One thing that I loved about this collection was the sheer variety of stories and cultures represented. This anthology includes dragons, princesses, a vampire, and even time travel; you will find stories that feel like they could have been plucked out of a Brothers Grimm book as well as much more modern tales. The Jewish themes seemed to be the most prominent throughout the anthology, but Yolen has reworked tales from Europe, Asia, and more.
Here is a small sampling of the sources of inspiration for some of Yolen’s stories:
- The Bridge’s Complaint – Billy Goats Gruff, Norwegian
- One Ox, Two Ox, Three Ox, and the Dragon King – Chinese dragon stories
- Brother Hart – Brothers Grimm story (Little Brother Little Sister)
- Sun/Flight – Icarus, Greek Mythology
- The Foxwife – figure from Japanese folklore
- The Faery Flag – Scottish folklore
- One Old Man, With Seals – Greek mythology
- The Undine – inspired by Little Mermaid and various French stories
- Sister Death – Jewish myth
- The Woman Who Loved a Bear – Native American myth
The stories vary quite a bit in tone; many of them use somewhat antiquated language, while the occasional tale reads like something a friend is telling you over coffee. These differences helped to break up the anthology and keep it from feeling overly uniform or repetitive. The variety assures that there will be something in this collection for just about everyone. Whether you’re looking for something totally re-imagined, something with a classical feel, something whimsical, or something dark, you’ll find it somewhere in these pages.
Thank you for reading! What is your favorite retelling of a classic fairy tale? Discuss in the comments! | <urn:uuid:29ebe294-8964-4542-a6f6-aba0be995805> | CC-MAIN-2022-33 | https://jennabookish.wordpress.com/tag/jane-yolen/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.934743 | 663 | 1.570313 | 2 |
This is a 3rd party Knowledgebase and does not reflect actual stock
(Photo courtesy of NetPS Plant Finder)
Height: 5 feet
Spread: 4 feet
Other Names: Taro, syn. Alocasia, syn. Xanthosoma
Amazing super large leaves grow from the center of this giant taro; elegant as a large accent or screening; grows well in containers and makes a wonderful room accent
Features & Attributes
Elephant's Ear features solitary conical creamy white hooded flowers with white centers rising above the foliage in mid summer. Its attractive large glossy heart-shaped leaves remain dark green in colour throughout the year.
This is an open herbaceous evergreen houseplant with an upright spreading habit of growth. This plant usually looks its best without pruning, although it will tolerate pruning.
Planting & Growing
When grown indoors, Elephant's Ear can be expected to grow to be about 5 feet tall at maturity, with a spread of 4 feet. It grows at a medium rate, and under ideal conditions can be expected to live for approximately 5 years. This houseplant will do well in a location that gets either direct or indirect sunlight, although it will usually require a more brightly-lit environment than what artificial indoor lighting alone can provide. It is quite adaptable, prefering to grow in average to wet conditions, and will even tolerate some standing water. The surface of the soil should be kept consistently moist all of the time, and you should expect to water this plant two or more times each week, especially if it's growing in a low-humidity environment. Be aware that your particular watering schedule may vary depending on its location in the room, the pot size, plant size and other conditions; if in doubt, ask one of our experts in the store for advice. It is not particular as to soil type or pH; an average potting soil should work just fine. Be warned that parts of this plant are known to be toxic to humans and animals, so special care should be exercised if growing it around children and pets.
There are many factors that will affect the ultimate height, spread and overall performance of a plant when grown indoors; among them, the size of the pot it's growing in, the amount of light it receives, watering frequency, the pruning regimen and repotting schedule. Use the information described here as a guideline only; individual performance can and will vary. Please contact the store to speak with one of our experts if you are interested in further details concerning recommendations on pot size, watering, pruning, repotting, etc.
-- THIS IS A HOUSEPLANT AND IS NOT MEANT TO SURVIVE THE WINTER OUTDOORS IN OUR CLIMATE -- | <urn:uuid:525c8484-f77b-4f73-b494-293dd1d710dd> | CC-MAIN-2022-33 | https://plants.ritchiefeed.com/11090003/Plant/22065/Elephants_Ear | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.928215 | 570 | 2.09375 | 2 |
Summer Adventures Treasure Chest
Whether your summer adventures take place at a sun-splashed beach or the cool mountains, at Grandma’s house or your own backyard, be sure to give reading a starring role!
A great place to start looking for summer reading fun is your local library. Almost every public library sponsors special programs, author visits, reading contests, book clubs, and free passes to area museums and attractions. And remember that the librarians are also a rich resource. They can offer expert advice about completing summer projects and book suggestions for even the most reluctant readers.
To discover some great summer learning activities, browse our treasure chest of ideas below. You may also want to check out the ideas on the Reading Rockets’ Summer Reading page.
Beyond the Book: Take a Literary Field Trip
Have you ever read a book and wondered what inspired the author to write it? Or perhaps you have contemplated how you can help your young people learn more about writers and their work by going beyond the pages of the book to a place you can visit and experience. Fabulous literary heritage sites await you from coast to coast, from the California Salinas Valley and home of John Steinbeck to the home and gardens of the Alcott family in Concord, Massachusetts where Louisa May Alcott wrote and set her beloved book Little Women.
You can discover the literary heritage sites in your own state by contacting the Library of Congress Center for the Book office. Each state office sponsors programs and printed literary history maps that show the locations of literary cultural sites and points of interest. Some state offices even provide interactive literary maps online. Visit the Center for the Book State Center Affiliates page for a complete list of state Center for the Book offices and direct links to their websites
For a list of museums and galleries that offer exhibits of children’s book art, refer to the NCBLA article “A Literacy Field Trip.” For more tips about connecting books to places, read the Reading Rockets article “Day Trips for Book Lovers.”
Reading List Suggestions for Kids and Families
Supplement this summer’s mandatory reading with these engaging suggestions from the NCBLA and other organizations.
For a digital reading adventure, share the electronic pages of some fabulous Classic Books on Read.Gov, such as The Story of the Three Little Pigs, The Wonderful Wizard of Oz, and The Secret Garden, all of which feature the complete texts and illustrations of the originals.
Progressive Story Games
Exquisite Corpse Adventure fans! Don’t forget to try your own hand at writing progressive stories and playing progressive story games. Whether you are cooped up in the car on a long road trip or banished to the basement on a rainy afternoon, kids of all ages will enjoy testing their imaginations while creating their own exquisite corpse story. | <urn:uuid:75eea225-aec3-46ea-b204-4da75da3e8cf> | CC-MAIN-2022-33 | https://thencbla.org/summer-adventures-treasure-chest/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz | en | 0.931021 | 579 | 2.25 | 2 |
A survey report from the Direct Marketing Association (DMA) reveals that direct marketing contributed substantially to company revenues in 2009.
According to the DMA’s first Value of DM report, UK companies spent £43.3 billion on direct marketing activities, while workers employed in the industry earned nearly £17 billion altogether.
The report, which surveyed 412 companies, shows that direct mail contributed to more than a third of sales to the retail sector in 2009. Of the retail industry’s £285 billion revenues, £102 billion came from direct marketing activity.
Some 50 per cent of firms in the finance sector said they plan to increase their direct mail spend, while nearly two-thirds (64 per cent) of companies in the automotive sector aim to do the same.
Chris Combermale, executive director of the DMA, said: “The report shows that direct marketing has been a consistently solid sales generator for businesses throughout all sectors.
“As well as the financial contribution direct marketing makes to UK PLC, the report also shows the value it adds to people’s lives through employment and empowering them as consumers.” | <urn:uuid:1dbb8393-142e-42cc-b40f-275da87de530> | CC-MAIN-2022-33 | https://www.marketscan.co.uk/insights/dma-report-reveals-true-value-of-direct-mail-0003861/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.952677 | 234 | 1.5625 | 2 |
If you have ever shopped in America, the shopping carts are often huge, they could almost fit an elephant, and in Europe, the trend is larger and larger, with more shoppers going to buy wholesale. In Japan wholesale exists but I’ve never tried it. This shopping cart is small but so are the goods. In Japan everything is made with the intention of fitting right into your cupboard or fridge.
All manufacturers take this into consideration, or else it would be havoc. Many of the Japanese vegetables are packed in small container or in the odd larger case, the premium products come in boxes.
I had a friend here that made an obvious but very cleaver observation, he said the vegetables are all perfectly uniform, and so where are the rest. The question is: are there the rest, those others that are not perfectly matched, or is farming that precise here? The answer is mixed, of course not all vegetables are perfect but the growing system here is Japanese. It must be consistent and as perfect looking as possible so uniformity is key, and the farmer is not just a farmer growing vegetables, he is a farmer, and he is thinking! | <urn:uuid:a1df52d5-0c0f-4ec8-87d2-1c2d90a0bcdd> | CC-MAIN-2022-33 | https://mesubim.com/2015/03/09/farmers-shopping-isetan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.980725 | 236 | 1.53125 | 2 |
Aivin Gast: I am a second year undergraduate at the University of Oxford studying Classical Archaeology and Ancient History. I’m a big fan of travelling, discovering new cultures, learning both ancient and modern languages, and having a good time with my friends. Originally I am from Twente, a Dutch region near the German border. I have a special interest in the economy and management of the Roman Empire, but during my degree and archaeological excavations, I also became interested in international heritage management as well as cultural diplomacy. I am planning to pursue an international career that includes these sectors.
Netherlands | June 27, 2020 | Student Essay
Once again the current George Floyd protests have sparked the debate about the appropriate management of dark heritage. Consensus will probably never be reached, but it clearly shows the influence heritage has on our society and the importance of correct heritage management. As Germany and the Netherlands are neighbouring countries, much of their heritage, from prehistoric sites to modern art galleries, is closely interlinked. Nevertheless, the border forms an obstacle. Although open and physically absent, it restricts laws, policies and projects. This is why cooperation between the two countries is essential. Fortunately, both Germany and the Netherlands recognise the importance of their heritage and are working together on different levels. They are not only improving the promotion, preservation and presentation of their past, but also taking care of valuable lessons for, and exceptional legacies of, all humankind.
Germany and the Netherlands also share some dark heritage. After World War II, the Netherlands was full of reminders of a horrible period in history. Monuments glorifying the Nazi government were removed or torn down, others, remembering the atrocities committed by the oppressors, were set up. Earlier this year, it was announced that a Holocaust museum was to be built in Amsterdam after Germany offered a four million euros donation in memory of the 104,000 Dutch Jews murdered by the Nazis. Germany has long been engaged in the conscientious processing of the past. With this contribution they take their responsibility and want to warn people. German Minister of Foreign Affairs, Heiko Maas, said that the museum would mark the post-war reconciliation between the two countries: “In the Netherlands, the Nazi destruction machine worked in the most horrible way. The shared memory of this darkest chapter in our German history makes clear the importance of the achievements of European unification and the reconciliation between Germany and the Netherlands.’’ The relationship between Germany and the Netherlands is currently stronger than ever before, which would not have been possible without Germany’s role in the management of Dutch World War II memory.
Most shared heritage fortunately has a less troubled background, but is by no means less interesting. One of the most astonishing archaeological areas in Europe is the Roman limes at the Rhine frontier. It is dotted with the remains of millennia-old forts, settlements and infrastructure. To fully understand this section of the border of the Roman Empire, one has to look at sites both in Germany and the Netherlands. Last year, it was announced by the Dutch Minister of Culture that the Netherlands would nominate the Limes Germanicus as a UNESCO World Heritage site. This would, however, not be possible without German cooperation. After all, 25 of the 44 archaeological sites that are part of the designated area, are located in Germany. Although the nomination was sent in by the Netherlands since only one country can do so, as Dr. M. Polak from Radboud University let me know, North Rhine-Westphalia and Rhineland-Palatinate helped drawing up the nomination dossier (a process already started in 2015) and Germany is currently helping the Netherlands with writing reports as well as discussing the management of the sites in case the nomination will be successful next year.
Travelling forward in time, we see another string of related sites crossing the border. The medieval Hanseatic League was a commercial and defensive confederation dominating the Baltic maritime trade for over three centuries. Its lingua franca, Low German, is still the language traditionally spoken in my home town, not far from the German border. In 2019, fourteen Hanseatic cities, both German and Dutch, started a three-year long project to promote their shared history. It forms part of the Interreg-programme ‘Deutschland-Nederland’ and is partly funded by the European Union. There will be a cross-border route for campervans and bikes, using augmented reality and mobile apps to revive Hanseatic history. One of the participating Dutch provinces, Gelderland, and the Lower Rhine region in Germany set up another project last year, Grenzeloos Gelre (‘Borderless Gelre’), highlighting their shared medieval past. In this case, the focus is on a very important aspect of public history: children. With the help of a game, primary school students in both Germany and the Netherlands learnt more about their shared history while playing around at historical locations, such as Kloster Graefenthal in Germany and Kasteel Rosendael in the Netherlands. Moreover, a free bilingual comic book about the shared medieval history was delivered to all primary schools in the two regions.
Of course, Germany’s role in the Dutch heritage sector goes beyond bringing history and culture to the public. Heritage also needs restoration and conservation specialists. This is why the restoration centre of Gelderland organised a convention with the German Chamber of Commerce and Industry with the goal to bring the Dutch and German restoration sector together. Metal, stone and carpenter industries discussed the optimal methods for restoring and conserving cultural heritage. Germany’s help is especially important nowadays, when there is a growing lack of relevant craftsmen in the Netherlands. Cooperation is possible, and needed, on all levels and in all areas of heritage management.
Whether it is nominating a site as UNESCO World Heritage, establishing a bike route along medieval market towns or the restoration of monumental buildings, Germany’s role in the Dutch heritage sector is absolutely essential. Heritage does not stop for borders, nor should our management. Only by close collaboration between Germany and the Netherlands can Dutch heritage be presented to the public and preserved for the future appropriately. Past projects haven proven to be fruitful and both countries continue working together on their shared past. The Fonds Soziokultur, for example, offers a grant of €50,000 each year to German-Dutch culture and heritage projects. Germany and the Netherlands are setting an example of cultural diplomacy and bilateral heritage management, boosting not only their own tourism and heritage sector, but also strengthening their age-old and extraordinary close relationship.
Subscribe to The German Diplomat to receive the latest articles (without any ads) | <urn:uuid:ec7da264-c1cb-4347-b9f9-842b7173f1c1> | CC-MAIN-2022-33 | https://germandiplomat.com/2020/06/27/sharing-is-caring-german-dutch-cooperation-in-the-heritage-sector/?replytocom=866 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.959516 | 1,366 | 2.46875 | 2 |
On the new PEERtrainer Facebook page recently somebody posted something to the effect of "Your vegetable soup recipe is great, but I took out the coconut milk because my friend the cardiologist says that the saturated fat in coconut is bad for you."
- Coconut and coconut oil are superfoods. Coconut is one of the most healthy, amazing things you can ingest.
- People in Asia and the Pacific Islands whose diets are high in coconut oil have low levels of chronic disease- cancer, heart disease etc.
- The fat in coconut is actually good for you. The book explains the science in detail, but the basic idea is that the fatty acids in coconut are easier to metabolize, and are different from the fatty acids in other forms of saturated fat. | <urn:uuid:3563c4d2-ea5d-4312-a110-51703f8b3b78> | CC-MAIN-2022-33 | https://blog.peertrainer.com/tip_of_the_day/2010/05/is-coconut-bad-for-you-because-it-contains-saturated-fat.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.970596 | 155 | 2.5 | 2 |
Matches for reading have the same properties as normal, everyday matches, except for one additional quality: as you may already have guessed, they can be read.
Matchbox contains fifty-six matches with pro-match (and sometimes anti-lighter) slogans on their sides. The beginning of each phrase is marked by a small triangle, which allows to move quickly to reading and understanding without revolving the match too long. The inscriptions are not repeated and their whole list is attached to the matchbox.
Toys for adults. When things get serious.
I’m a firestarter, twisted firestarter (hey hey hey).
Absolutely natural, totally safe.
Lighters a grimace of civilization. Matches the experience of generations.
Do not burn oil and gasoline. Save non-renewable resources!
Multifunctionality: this can be used as a toothpick.
A portable Prometheus is in your hand.
Multifunctionality: you can build toy buildings with matches.
Even if a match is broken in half, you can still use it.
For as long as matches are in use, do not be alarmed about this planet.
Matches have style!
A match. Convenient, self-tuned plug-and-play device.
Regardless of the fact that matches can become wet, they always dry fast.
In case of extreme hunger matches can be eaten.
One simple move and you are warm, sated, safe and sound.
The harmfulness of matches is fabulously exaggerated by manufacturers of lighters.
An economic stability measure: The price of a box of matches in the year
You are not getting zombified right now, but: matches, matches, matches
Matches. Simply ingenious.
Matches: little things that make a big difference.
Multifunctionality: you can measure the length of objects using matches.
The product that does not change its appearance in years is stable and dependable.
The content of harmful substances in this match is
Well, it is essentially harmless!
The last match
How poetic does that sound!
The match is an important component in the foundation of civilization.
A lighter is for cheap peacockery, a match is for a reasoned choice.
On top of everything else, matches float on water.
A match is a bright example of coordinated teamwork.
The sparkling that affordable even for a totally stupid man or a zombie.
Each and every match has its own special personality.
This thing stands for roots and traditions. Our grandfathers were using matches!
The match is a simple, foolproof device that doesn't require any usage instructions.
It is rumored that on other planets, some creatures are ready to give everything for a single match.
There are no troubles with lighting a match during the winter season.
You just can't survive without matches. It is a fact.
A matchbox itself is a really useful thing as well, it is not simply a package.
To light matches and to meditate are about the same thing.
Ideal for combusting a huge variety of materials.
Mcath si wlel-kwnon eevn aonsmgt ailnes. Yrspotch!
In the shape of matches you can keep secure a priceless reserve of wood substance.
Multifunctionality: when you don’t have a pencil, you can use a match to write down something important.
Without bragging, the humble match-hero helps us in our lives.
All fire accidents were caused by people, not matches.
We should either build a big tower in honor of the match or be ashamed of our ingratitude.
The match is what truly separates humans from all other animals.
To use matches, you don’t even need a remote control unit!
A match is a representation of true inherent dignity.
Even the worst kind of worm knows that each match deserves to be respected.
Only a match can give you real, true, non-imitated and authentic fire.
When electricity no longer exists, every human will understand the importance of the match.
Matches are more necessary than salt, more beautiful than pastry and way better than lighters.
Drumsticks for quiet but groovy rhythms.
The historical account of the match is a billion times bigger than the match itself.
Recommended by the best sword swallowers and dragons!
Multifunctionality: as you can see, matches can also be read.
Matches vs. lighters: game, set and match! | <urn:uuid:08ec1aaf-bde9-4086-a3ab-742cba0ab167> | CC-MAIN-2022-33 | https://56stuff.com/galleries/matches_for_reading/index.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.919642 | 954 | 1.59375 | 2 |
By 1920, Chicago had become “the literary capital of the United States,” according to one of the nation’s influential cultural arbiters, H. L. Mencken. Indeed, American literature of the period bore an aesthetic shaped by a palpable confrontation with the city’s railroads, skyscrapers, and stockyards. Chicago helped produce many of the most important writers of the era, from Theodore Dreiser and Carl Sandburg to Willa Cather and Sherwood Anderson. Many started as journalists for Chicago newspapers, which were famous for breeding sharp, recognizable voices.
The Newberry has compiled a rich collection of manuscripts, photographs, printed materials, periodicals, and ephemera related to Chicago and Midwestern writers. The collection includes materials from the 1893 World’s Columbian Exposition, through the Black Renaissance of the 1930s and 1940s, and to the present.
See Modern Manuscript Collections for finding aids for Chicago journalists, book designers, printers, theaters, family papers, clubs, and arts organizations.
Finding aids for these following writers and others can be found in the Literature section of Modern Manuscripts:
Finley Peter Dunne
James T. Farrell
Henry Blake Fuller
William Morton Payne | <urn:uuid:f024d22a-c876-4deb-a61b-a75c4dcc52b7> | CC-MAIN-2022-33 | http://newberry.org/chicago-and-midwestern-writers | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.893392 | 326 | 3.1875 | 3 |
The evolution of large human brain size has had important implications for the nutritional biology of our species. The question of whether brain function is entirely genetically determined or may be influenced by the environment or by nutrition has been debated for decades. Large brains are energetically expensive, and humans expend a larger proportion of their energy budget on brain metabolism than other primates. Military interest in the effects of nutritional factors on brain function has stimulated considerable research on a variety of food constituents. In this perspective, Brain Skills®, which consists of an association of amino acids, vitamins, minerals, precursors of neurotransmitters and antioxidants, was tested in human neuron cultures. Brain Skills® promoted greater migratory and neuroplastic effects after 72 hours of treatment.
Keywords: Brain Skills. Culture. Plasticity. Neuron Development.
Fausto Pierdoná Guzen | <urn:uuid:b8111b19-8fbf-4a95-a63e-e8bfb69f66c8> | CC-MAIN-2022-33 | https://journalpcbs.com/brain-skills-promotes-neuronal-migration-and-development-in-cultivated-human-brain-tissue/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.92662 | 179 | 3.046875 | 3 |
My bizarre trip into virtual reality with Facebook’s Oculus
I stood on the ledge of a skyscraper and looked down at the cars—tiny specks, really—driving by on the street below. All that stood between me and the pavement was hundreds of feet of air.
Suddenly, a woman’s voice jolted me from my near-hypnosis: Step out, she said. Walk around.
Well, sure. Why not? (I told myself this with my usual cavalier attitude about danger.) Then my brain took over and my feet refused to budge for fear of falling off the edge. Nope—not going to happen, I told her.
This was my first try of Oculus Rift, the virtual-reality goggles that can place a person wearing them into a sort of uncanny video game. Despite my initial skepticism, the technology seemed all-too realistic—to the point that I couldn’t overcome my natural instinct for self-preservation. Intellectually, I knew full-well I was standing safely inside a former military warehouse in San Francisco with a ridiculous looking electronic device strapped to me head. But my brain overrode logic and left me immobilized.
Last year, in a bit of a head-scratching move, Facebook (FB) acquired the startup behind this headset, Oculus VR, for $2 billion. The sci-fi technology seemed like a big departure for a company best known for a social network filled vacation photos, videos of cute kittens, and parents sharing silly stories about their children. But Facebook has big plans for Oculus that include video games, movies, and virtual doctor appointments. The goal is to bring people together in ways they never could before, Mike Schroepfer, Facebook’s chief technology officer, said last week at the company’s developer conference.
He used the example of his daughter’s birthday party and how some friends and family had missed it. In the future, they could instead wear Oculus to put themselves in the middle of the celebration, even if they are really thousands of miles away. “I wish that everyone would have been teleported to that moment,” Schroepfer told the audience.
Well, Facebook vision for Oculus is certainly ambitious. But there’s still a lot of technical work to be done to live up to the hype, as Schroepfer readily acknowledged. (The Oculus headset isn’t yet available to the general public. For now, only software developers can buy the headset to toy around with and invent ways to use it.) Moreover, does wearing bulky goggles that preclude face-to-face contact really bring you closer to friends and family? Or does it create distance and isolation?
I hoped to find out in my test of Oculus, which involved the latest, prototype version of its headset, called Crescent Bay. For around 10 minutes, I tried it out in a dark empty room with a woman standing nearby to guide me (and keep me from wandering off a small floor mat and face-plant into a wall).
In addition to standing on the skyscraper, I faced off with a snarling Tyrannosaurus Rex with a mouth full of sharp teeth. I was also caught in a street battle with bullets and explosions going off all around me while debris hurtled through the air in slow motion.
I could tilt my head up, down and behind me to get a different view, just like in real life. Images shifted smoothly with no lag time that would have made the experience seem phony. In a welcome sign, I never felt nauseous—a common problem reported by people who have used previous versions of Oculus. But my reaction never matched the vertigo I felt standing on the skyscraper ledge. Maybe my brain isn’t hardwired to fear slightly cartoonish dinosaurs and robots.
Next, I moved downstairs to try out Samsung Gear VR, a headset with a lower resolution display that seemed, in some ways, to be more immediately ready for prime time. I could easily imagine television and movie studios along with video game makers using the technology to make their productions more immersive.
While sitting in a chair, I dropped in on a Mongolian family filmed inside their yurt and thought how fantastic the technology would be as part of a documentary. I spun around to inspect every part of their home, although the family didn’t seem to notice me.
I also spied a scene from the Hollywood movie Wild as actress Reese Witherspoon’s character, an exhausted backpacker, spoke with an apparition of her dead mother on a mountainside. They never saw me standing there between them, which made me feel almost like an eavesdropper.
It was the same feeling watching Jerry Seinfeld warm up the crowd during Saturday Night Live‘s 40th anniversary show. I could watch the monologue from the perspective of atop the main camera near the audience. After a few seconds, I realized that celebrities filled most of the chairs around me. While Seinfeld joked, I turned my back to him and tried to pick out the actors I recognized like Adam Sandler, John Goodman, and Michael Douglas.
On one hand, it was an incredible experience to feel like I was there with Hollywood’s elite, and, course, the Mongolian family and the snarling dinosaur before. But I also felt a twinge of apprehension because it seemed so easy to confuse this virtual world for reality. In some ways, it could be a blessing by letting people better experience other cultures, like the Mongolian yurt, than they can by watching broadcast television. But I also feared the potential risk of some people choosing to spend most of their time in this fantasy world to escape their hum-drum existence and real human contact. | <urn:uuid:8606e15b-d2bb-4ee5-9ce4-64012376c677> | CC-MAIN-2022-33 | https://fortune.com/2015/04/01/facebook-oculus-rift/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz | en | 0.966753 | 1,180 | 1.648438 | 2 |
This course is included in our premium subscription. Get your subscription now and discover thousands of 4K content available to you.
After taking this course, you will be able to achieve all of these goals:
Course taught by Dr. Nazareth Castellanos, Degree in Theoretical Physics and PhD in Medicine - Neuroscience - by the Autonomous University of Madrid (UAM). Master in Mathematics applied to biology and Master in Neurosciences by the Faculty of Medicine of the UAM.
She has worked as a researcher and teacher at the Cognitive and Computational Neuroscience Laboratory of the CTB (Complutense and Polytechnic University of Madrid), at the Max Planck Institute for Brain Research in Frankfurt and at Kings College in London.
Syllabus of this course:
ANATOMY OF STRESS
What makes us unhappy?
What is an unhappy brain like?
The silence of the brain: mental calmness
Neuroscience of meditation
Why does the brain need to listen to the body?
Do we make decisions with our body or with reason?
The influence of body posture on our mind
The gut: our first brain
Psychology as seen from the gut
Diet and mental health
What are stress and anxiety?
The influence of breathing on the brain
Stress is an emotion. How does our brain manage it?
Ayurvedic Abhyanga Massage and Self-Massage
Medicinal Juices: Make food your medicine.
Witches: Knowledge of the healing woman
Prenatal Yoga course
Yoga for Kids Course | <urn:uuid:a0672c71-7f68-4e4d-ae16-1e7fc18d3c6f> | CC-MAIN-2022-33 | https://conscious-tv.com/course/neuroscience-scientific-recipes-for-wellbeing-1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.886488 | 359 | 2.9375 | 3 |
In Singapore, the law can be a bit complex and daunting. There are many factors that you will need to take into consideration before a sentence can be imposed. Criminal Breach of Trust Singapore is one of those offenses that sound complicated to a layperson, but it is easier to understand once it has been broken down. To determine if an accused has done this kind of offense, you need to check all of the elements surrounding it. If you are accused of Criminal Breach of Trust (CBT), getting a professional lawyer’s help can help you in many ways.
A Singapore Criminal Defence Lawyer can help you if you find yourself in this kind of hurdle. Whether you or someone you know is accused of this offense, getting the help or expert advice of a professional lawyer can make things easier for you in the long run. The three elements are Entrustment of funds or property, Misappropriation, and Dishonesty. These three elements are considered to know if the accused has committed the offense. Of course, many factors are surrounding CBT to know how heavy or light the sentence should be. Learn more about the Criminal Breach of Trust here.
How to Know if Criminal Breach of Trust Has Been Committed
As mentioned above, three elements are the factors considered to know if a person has committed a Criminal Breach of Trust. The first is the Entrustment of property or funds to the accused. The second is Misappropriation/Conversion, which means the misuse of property or funds for personal gain. And the third most important element is Dishonesty, which means they have the intention to do the offense without the victim’s knowledge. There are other two elements: a violation of law/contract and allowing someone else to misuse the property or funds. But these depend on the circumstances surrounding the case.
If three elements have been determined to play a huge factor in a case, the court will assess the gravity of the situation. The penalty will also depend on some factors, like if the accused has provided restitution to the victim, how long the offense has been going on, the overall value of the property or funds, whether the accused has other charges aside from CBT, and the impact of CBT to the victim, other people, and the general public.
What are the Different Penalties for Criminal Breach of Trust
Once the accused has been determined to commit CBT, the court will hand them different penalties according to the scope of trust endowed. If found committing a regular Criminal Breach of Trust, the penalty can be imprisonment of up to 7 years and/or a fine. For those entrusted with properties for transportation for hire or storage for rent, the imprisonment can last up to 15 years and/or a fine. For the acting employees or employees entrusted in such capacity with property, the imprisonment can last up to 15 years and/or a fine. Lastly, public servants, bankers, merchants, and partners can be imprisoned for 20 years and/or a fine. | <urn:uuid:66bcac5e-69c7-4d6c-b4af-7edb69aaadea> | CC-MAIN-2022-33 | https://www.johnholdship.com/2021/how-criminal-breach-of-trusts-works-in-singapore.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.946659 | 605 | 1.984375 | 2 |
Hiking TraIl nearby Zone population.
The largest locality in the area is Pisogne
, with a population of 7,716 persons, at a distance of 5.922 kilometers from the center of the map.
The nearest is Zone
(1,145 persons), at a distance of
The following indicators give us an idea of the difficulty of the route:
- Trail length: 2.856 kilometers.
- Min height: 682 meters above sea level.
- Max height: 1,197 meters above sea level.
- Average height: 937 meters above sea level.
- Average slope uphill: 22.680 %.
- Average slope downhill: 0.000 %.
- Mathematical difficulty index: 36.138. | <urn:uuid:6bb0f157-8908-4c5a-825d-37af34fe601d> | CC-MAIN-2022-33 | https://www.buscamapas.com/mapas/hiking-trails/2842013-CORNA-TRENTAPASSI-andata-CAI-VILLASANTA | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.790628 | 165 | 1.835938 | 2 |
If you’ve flown on more than one commercial flight in your life, odds are about even that you’ve experienced a flight delay of some kind. In these instances, in an attempt to make up for lost time, the pilot will generally floor it once you’re airborne, pushing the plane past the usual cruising speed. This can actually work pretty well, as this writer once had a half-hour delay erased by the added speed of travel.
This leads to the question: Why not just fly extra fast all the time? The worst part of any flight is actually being on the plane, so if airlines could get passengers where they’re going faster, it would lead to many more happy customers. The usual response is that going faster than usual uses more gas, which airlines want to avoid, because jet fuel is even more expensive than regular gasoline.
However, a new development may make a “best of both worlds” scenario possible. Unlikely, but possible.
Better Than A Squeegee
Commercial airplanes are huge, and they go really fast. Ergo, it seems odd that something as seemingly insignificant as splattered bugs could affect their performance, but by golly, they do. A buildup of bug guts increases drag, which leads to increased fuel consumption.
To combat this, researchers from NASA’s Environmentally Responsible Aviation Project conducted an extensive study of non-stick coatings for airplane wings. Working with a modified Boeing 757, the NASA team performed a series of test flights over a two week period. To maximize the effects of bug splatter, testing took place in Shreveport, Louisiana—known for its heavy bug population—and researchers added extra takeoffs and landings. Five different coatings were tested, to varying degrees of success.
Getting Down to the Nitty Gritty
To help them find the best possible solution, the NASA researchers studied the biochemistry of common airborne insects to find out just what happens to the wee buggies when they splatter on moving vehicles. Strangely enough, it turns out that, mid-squish, a bug’s blood goes through instantaneous chemical changes (possibly caused by the sudden exposure to air) that make it more adhesive.
After further study, the scientists determined that lotus leaves were the key to counteracting this increased stickiness. “When you look at a lotus leaf under the microscope […] water doesn’t stick to it […] because it has these rough features that are pointy,” said NASA senior materials scientist Mia Siochi. “When liquid sits on the microscopically rough leaf surface, the surface tension keeps it from spreading out, so it rolls off. We’re trying to use that principle in combination with chemistry to prevent bugs from sticking.”
The most effective lotus leaf-inspired coating tested was found to reduce bug splatter buildup by almost 40 percent compared to a control surface. What that equates to in fuel savings has not been reported, but it could be significant—after all, if it keeps bugs off, what else could it prevent from sticking to a plane? With something as big and as fast as an airplane, even tiny improvements in aerodynamics can make a big difference.
Now might be a good time to invest in companies that provide aerospace coating services, especially if you can find one in a buggy part of the country. | <urn:uuid:bb9c2fd1-a8f6-4174-8717-83fb61b9d1c6> | CC-MAIN-2022-33 | https://bolenreport.net/airplane-wing-coating-to-repel-insects-decrease-fuel-use/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.959267 | 698 | 2.625 | 3 |
From Solid Snake to Slither.io - a history of snakes in video games
What is my life
Believe it or not, but Slither.io isn't the first game to feature a snake. I know right? Mad.
Here, then, are 7 other games that feature a snake either as a playable character, as a helpful chum, or as a slippery enemy.Snake
Anyone who had a Nokia phone in the 90s will remember this waste-of-time classic. But did you know that it wasn't always about a snake? The first version, released back in 1976, was simply titled "Blockade".
Variants (or clones, if you're not feeling so charitable) changed the line into dominos, Tron light cycles, a worm, and eventually a snake. Now the game was about a serpent gobbling up food, getting bigger and bigger, and trying to avoid munching on its own body.
In 1997 the game came to phones and kicked off the mobile gaming revolution that has ruined all of our lives.Snake Rattle 'n Roll
Once again perpetuating the stereotype that snakes are greedy food hoovers, Rare's late NES game Snake Rattle 'n Roll is about making snakes eat Nibbley Pibbleys (seriously) until they're fat enough to activate a weight scale.
Special mentions must go to David Wise's jazzy 50s soundtrack, and the last boss of the game which is a giant space foot you must lick to death. Yep. That's a thing.Yawn (Resident Evil)
Loads of games have featured snakes as baddies and bosses, but few are as pant-ruiningly scary as this monster serpent from Resident Evil.
It started life as a regular ol' snake, but those dumb bums in the Umbrella Corp tried to turn it into a bio weapon. Bad move: the snake escaped. Then, to add insult to injury, it got infected with the t-virus and turned into a mega monster.
You'll run into this ugly reptile twice during Resident Evil, and it will probably kill you a fair few more times than that. So, uh, good luck!Snake Man (Mega Man 3)
All the Mega Man robot masters were designed as useful robots before Dr. Wily went bonkers and turned them all into unstoppable death robots. And so, Snake Man's slender body was created to slither into narrow areas and survey topography on uninhabited planets.
But under the reign of Wily he becomes a terrifying killer, capable of wiping out its enemies in- oh what's that? Mega Man stood in a safe space, jumped over a few search snakes, and murdered Snake Man with a barrage of needles? Okay, fair enough. Next!Ekans (Pokemon)
I'm about to blow your mind. Prepare to be amazed. You'll never look at the world in the same life. This is going to turn your life upside down. You won't be able to sit straight for weeks. Ready? 9/11 was an ins- I mean, Ekans backwards is "Snake".
KA-BOOOOM. That's the sound of your head shattering into a zillion pieces. I've just changed the course of your life forever. Now just wait until I tell you about Ekans's evolution, Arbok...Solid Snake (Metal Gear Solid)
You didn't think we'd leave out this chap, did ya? He might be an elongated, legless, carnivorous reptile. He doesn't shed his skin or lay eggs or have only one functional lung. But he is called Snake, and that's enough for me.
There's actually loads of Snakes in Metal Gear. There's Naked Snake who's actually big boss and there's Liquid Snake and Solid Snake who are his clones and there's Solidus who I think is another clone.
And, wait, which one is Punished Venom Snake? Someone get me a wiki.Rattly (Donkey Kong Country)
Of all the animal buddies in the Donkey Kong Country games, I can quite safely say that Rattly is the most snake-like. He's also super bouncy and can be used to hop on enemy heads, to leap over big gaps, and - with his super jump - leap up enormous heights.
That's about all there is to say about this guy. He's a snake. What more do you want?Slither.io
I almost forgot about Slither.io. That's the whole reason I'm writing this stupid feature in the first place.
Harkening back to those classic snake games, Slither's all about gobbling down dots to grow in size. But, thanks to a modern twist, you'll be sharing the plays pace with loads of other real life gamers.
It's a snake eat snake world, so don't crash into any other reptiles or it's game over...
Want more Slither.io stuff? Then check out the following bits: | <urn:uuid:e24a081e-3f6f-42ee-8279-2eda73ebbee3> | CC-MAIN-2022-33 | https://www.pocketgamer.com/slither-io/from-solid-snake-to-slither-io-a-history-of-snakes-in-video-games/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.968788 | 1,038 | 1.796875 | 2 |
Hackers have found a handy tool to take control of bank accounts, tap into corporate computer networks and dig up sensitive government documents.
It’s called Google.
The Internet’s most popular search engine can find everything from goldfish-care tips to old classmates in the blink of an eye, but it’s equally adept at finding caches of credit-card numbers and back doors into protected databases.
…Using Google, identity thieves can easily find credit-card and bank-account numbers, tax returns, and other personal information buried in court documents, expense reports and school Web sites that contain such information.
Hackers’ adeptness at using Google to access the depth of the Web to find private information has even caused speculation that one day Google might be sued by an irate consumer who has been ripped off thanks to password or file-path information divulged by Google. | <urn:uuid:e507e563-7dd9-4412-8d82-466903c1e80d> | CC-MAIN-2022-33 | https://michaelzimmer.org/2005/02/14/google-hacking-digs-up-sensitive-material/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz | en | 0.90503 | 182 | 2.171875 | 2 |
MCM undertakes purposeful advocacy at all levels – government, private sector and community. We work closely with the sector to advocate for positive social change.
You can read our policy and research submissions below.
PDF | 3.6 MB
The isolating effect of the pandemic has been felt acutely by Australia’s young people, with lockdown and emergency measures disrupting the routines and connections that keep young people safe and engaged. Many have been exposed to increased risk of family violence, mental health pressures, school disengagement and insecure housing. The upcoming Federal Election is an opportunity to ensure the safety and wellbeing of all young people and to ensure they are not left behind as Australia recovers from COVID-19.
PDF | 30.7 MB
As we know at MCM, having a home is critical for people’s mental and physical health, their education and employment opportunities, and their ability to fully participate in society. This submission focuses on the interface between youth homelessness and the over representation of young people in the criminal justice system, and the distinct set of challenges that vulnerable young people face that require a differentiated response to adults. Lack of stable housing is one of the biggest factors that is driving up the number of young people and in particular young women on remand and in prison, many of these young people have experienced adverse childhood experiences including family violence and are homeless as a result. Furthermore, people without a home are at risk of spending longer periods in prison as they must have access to stable housing to get parole. MCM urges the Victorian Government to shift from a crisis investment lens to an early intervention lens funding supported medium term housing, family violence prevention and continue the focus on reforming the out of home care system.
PDF | 410.1 KB
MCM and Y-Change welcome the opportunity to provide feedback on the Draft National Plan to End Violence against Women and Children 2022 – 2032 (Draft Plan) and commends the Australian Government on maintaining this important focus. This submission should be read in conjunction with MCM’s submission to the National Plan for the Elimination of Violence Against Women and Children. The increased focus on preventing and responding to gender-based violence across Australia is strongly welcomed, however despite this focus, young people who are experiencing family violence are not recognised as victim-survivors in their own right and have been overlooked by the Draft Plan. Adolescents and young people are largely seen under the Draft Plan for their use of harm and violence and are not referenced in the title of the Draft Plan.
PDF | 3 MB
Family violence continues to be a pervasive, systemic issue in Australia. In Victoria, the need for deep and sustained reform to address this challenge was reflected in the outcomes from the Royal Commission into Family Violence. Significant progress has been made in implementing these recommendations, however, gaps remain for young people who are experiencing family violence, either in the home or from an intimate partner. The Amplify Project, undertaken by Melbourne City Mission, seeks to understand this gap in policy and services and map a way forward. This report outlines the findings from the research conducted as part of this project and which has been shaped and guided by the insights of lived expertise.
PDF | 995.4 KB
Current policy frameworks have not been effective in reducing youth homelessness in Victoria. Young people have distinctive pathways into, and experiences of homelessness compared to other cohorts. Youth-specific responses are required to best support the needs of Victorian young people and assist their transition to adulthood in a well-supported trajectory. This Position Paper presents the findings of a review undertaken by the Australian Housing and Urban Research Institute (AHURI) for Melbourne City Mission (MCM). The focus of the review is on the existing Victorian youth homelessness system and policy environment that guides the delivery of support services available to young people experiencing homelessness. Findings of the Paper aim to inform discussion about the possible need for and potential focus of a youth homelessness strategy for Victoria, and the delivery of effective outcomes for Victoria’s young people experiencing homelessness. | <urn:uuid:3953fa7d-aeab-463c-9556-15a58bcc3ba7> | CC-MAIN-2022-33 | https://www.mcm.org.au/advocacy/research-and-policy-submissions | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.959632 | 814 | 1.710938 | 2 |
Lord Lovat Revisited
Two weeks ago I blogged about a hero of D-Day, Simon Fraser, the fifteenth Lord Lovat. While researching for that post I came across another Lord Lovat, not quite so heroic. In fact, he was such a wily scoundrel, he was known as The Fox.
If you’re a fan of the television series, Outlander, you’ll remember Simon Fraser, the eleventh Lord Lovat, from a season two episode, The Fox’s Lair. Lovat is grandsire to the fictional Jamie Fraser, but the real Lovat was no fictional character. His life story epitomizes the political intrigues and brutality of the time as the Scottish clans battled each other and the English.
He lost titles and had titles restored, raised armies to push for his personal gain, and fought both on the ground and in the courts for the properties he thought should be his.
The rest of Simon’s life involved untangling the legal and financial problems he had inherited with the title, as well as fending off lawsuits from various claimants in the courts…
A Thorough Scoundrel
This Jacobite Broadside depicts Lord Lovat at the time he was arrested. Difficult to make out is the text below:
Among them there was a Politician with more Heads than a Beast in Vision And more Intrigues in every one Then all the Whore of Babylon Could turn his Word and Oath and Faith as many ways as in a Lathe”
I assume the “Whore of Babylon” refers to the Catholic Church. While at the French court, Lovat had converted to Catholicism for political reasons.
Lord Lovat is seated on a wall:
…many pictures on the wall portraying scenes from his life–all bad, his sporin hangs open with bottles of spirits visible, he’s also holding a piece of paper with 6 lines of verse on it. The Scenes are entitled: “The Lady Dowager of Lovat forced into Bed &c” and “When a Jesuit in France the Young Lady and her Maid” and “The Magnificent Monument erected to set forth ye Virtues of ye Family of Lovat” and “M___ Daughters and Maid poulled out of their Bed and Abus’d, for which three of he Gang were hanged” and “Mt___ Corn and Hay stacks were burnt to Ashes one night” and “A servant in the cave for asking his wages” and “A Hundred Head of Large Cattle belonging to Mr. ___ all Killed and Lamed in one Night”
Lord Lovat’s scandalous reputation provided excellent fodder for anti-Jacobite propaganda.
Lovat changed loyalties between the Stuarts and the English as needed, spent time in French prisons, and tried playing both sides in the rebellion of 1745. Ultimately, he was executed for treason in 1747.
While researching the post two weeks ago, the contrast between the eleventh and fifteenth Lords Lovat struck me. At the end of his life, the fifteenth Lord Lovat had serious financial difficulties. Perhaps if he’d lived in earlier times he might have raised an army and seized another clan’s property to cover his bills. But he didn’t. Instead he made the hard decision to sell his ancestral home.
Find out more
If you have a Netflix subscription, seasons one and two of Outlander are now available there. I confess I haven’t read the Outlander books, but I think the series does a good job of depicting the brutality and chaos of the era. What do you think?
Credits: the images and quotes are from Wikimedia commons and Wikipedia. | <urn:uuid:4f5ad3e4-01cd-48f8-9fa0-dcddd282125e> | CC-MAIN-2022-33 | https://alinakfield.com/part-ii-the-highland-laird-the-fox/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.970163 | 794 | 1.929688 | 2 |
Please enter your search criteria to begin searching
Day 3 - Creating myTrailhead content and where to start. In yesterday’s blog, we covered how to create your myTrailhead strategy. Today, we’re going to talk about how to write your actual content.
Firstly, don’t just jump into myTrailhead and start writing! At this point you know your audience, you know what they need to be able to do once they have successfully taken your modules… but you still need to plan your content.
One of the steps that is vital, but often forgotten, is your style guide. How will you and the other writers ensure your content is similar. Plan in advance areas such as terminology, capitalisation, image alignment and borders that you will be using.
Take a moment (or a few) to think about each audience and piece of learning content. Start to write your outline of what your content needs to include. This needs to include your objectives, key learning points, further resources, and how you intend to assess learning at the end of each unit. You should create an outline for each module and all units that are part of it. This should be circulated and agreed before you take any further steps.
Now this has been signed off, you can get your hands dirty getting into your content. Stop! Don’t go into myTrailhead yet… we recommend that you actually write your content outside of the Trail Maker tool. One of the restrictions you will encounter with Trail Maker is it doesn’t easily allow collaboration within the tool itself so we recommend using a collaborative tool such as Google Docs or Quip before moving into Trail Maker – something where you can easily share your content amongst your team and make suggestions until you get to your final version. We like to use Google Docs with the Suggesting option.
You also need to think about your writing style – what is your company culture? Do you prefer a formal or informal approach to your learning? Do you need different styles for different audiences – for example, would you ‘speak’ to your Directors in the same way that you would to your sales reps? This should be defined before you start – especially if there is more than one Writer in the team.
As you start writing your content, although I’m sure you are already an engaging writer, consider how you can connect with your learners even more……as well as your words, what else can you show your users? For processes, consider graphics to explain the flow. For system training, use screenshots and embed videos. These should have been planned in your outline, but it’s ok to make amendments as you go! Here you can see an example in Trailhead:
Finally, how are you assessing your learners? This is where you need to plan your quiz. You should be testing knowledge of your objectives that you included at the beginning, and a best practice approach would see you have a question for each objective identified at the start.
So, you think you are now ready to publish your content? Hold up – this is where your editor steps in. Your content needs to be reviewed by someone else who also knows and understands the topic, and has an overview of all the content to be produced within the project. This will ensure all writers have a similar ‘voice and tone’ and should eliminate the dreaded typo or grammatical error you may have missed.
We also have a myTrailhead webinar on the 17th March where we will explain what myTrailhead is and how it can benefit your users. Don't miss out, register to attend. | <urn:uuid:f5c5702e-d368-44af-834c-30f0031b4c1a> | CC-MAIN-2022-33 | https://www.stimulusconsulting.co.uk/news/writing-mytrailhead-content/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.958568 | 747 | 1.742188 | 2 |
Deadline: 31 October 2019
Open to: students (under/graduate) from around the world
Benefits: USD 5,000
The Center on Conflict and Development (ConDev) at Texas A&M University works to improve the effectiveness of development programs and policies for conflict-affected and fragile countries through multidisciplinary research and education. ConDev uses science and technology to:
– Reduce armed conflict,
– Sustain families and communities during conflict, and
– Assist states to rapidly recover from conflict.
This is accomplished through (1) multidisciplinary, interlinked research, teaching and practice (2) dissemination of results into development policy, program design and management, and (3) scholarly publication on the causes of conflict and its remediation through the application of science and technology. The Center tests the general hypothesis that conflict at the interface of human communities is caused by perceived differential benefits from capital in its various forms, and that science and technology can be used to modify perceived benefits at those interfaces to reduce conflict and the damage it causes.
For ConDev’s Student Media Grants, there will be an award up to USD 5,000 to current students interested in capturing conflict-related issues facing fragile and conflict-affected areas of Latin America through stunning photography and/or videography. This photojournalism grant is funded by the Howard G. Buffett Foundation Chair on Conflict and Development.
The program is open to university students worldwide (undergraduate, graduate or Ph.D.) wishing to conduct photojournalism projects in Latin America. Proposals for other areas of the world will not be considered.
An award is not expected to exceed USD 5,000 per awardee and will be made at the discretion of the Chair.
How to apply?
Proposals should be submitted to [email protected] with “SMGP 2020: [Name of Student]” as the subject line and up to two proposals can be submitted per student.
Students should submit proposals that will describe their expected travel, research and photographic subjects. They should choose an international development area that reflects issues of food insecurity, health, education, land tenure, poverty, or other issues facing people in fragile and conflict-affected nations in Latin America.
Proposals should be submitted as a Microsoft Word Document to [email protected] with “Student Media Grant: [Name of Student]” as the subject line, with any samples attached. Only one proposal can be submitted per student.
For more information, please visit the official web page. | <urn:uuid:d7301b70-4f13-4978-a1eb-df465bd5aa73> | CC-MAIN-2022-33 | http://www.mladiinfo.eu/2019/09/03/student-media-grant-program/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.934512 | 527 | 2.125 | 2 |
Communication Tips for the Hard of Hearing
Whether you wear a hearing aid or not, there are several things you can do to improve your ability to communicate with other people. Following are some useful tips:
What should I do about background noise?
Whenever possible, try to reduce background noise. This will help you to hear speakers more clearly with the least amount of strain. You may wish to:
- Ask to be seated in the quiet part of a restaurant
- Sit next to the wall
- Sit away from the kitchen or heavy traffic area
- Turn down the TV when having a conversation
Is lip reading useful?
Yes! While many do not have formal training in lip reading, looking at the faces of those with whom you are speaking can enable you to see many important cues. Watch for facial expressions and gestures that will provide information about the speaker’s mood. Your eyes will help fill in the part of the message you cannot hear clearly. Try to communicate in well-lit areas so you can see the speaker’s face clearly. If glasses are needed, make sure they are worn.
It also helps to know the topic of conversation. If you can pick up a few words in each sentence, you may be able to fill in the blanks. When you become “lost” in group conversations, try to concentrate on one person who seems to be assuming the majority of the dialogue.
You will have more difficulty with lip reading if speakers have a cigarette, pipe, or food in their mouth, or if their hands are covering their mouths. Do not be afraid to politely ask for them to remove it so you can understand them clearly.
Where should I sit in public speaking events or theaters?
In public-speaking situations or places of worship, try to sit in the front of the room or near the loudspeakers. If one ear is better than the other, sit with your better ear facing the speaker. Many theaters and other venues now have assistive listening devices available that are very helpful. Ask an usher, manager, or box office employee. With an assistive listening device, you will be able to adjust the volume for your specific hearing loss. In these instances, an assistive listening device may be more helpful than your hearing aids. Large public venues, especially theatres and large churches, may have an electromagnetic system that is compatible with certain types of hearing aids. Please ask your audiologist if your hearing aids have this feature.
Are there any other things I should consider?
If you cannot understand what is being said to you, ask the speaker to rephrase, rather than just repeat, the message. You can also paraphrase the parts of the message that you actually heard instead of only saying “what”.
Try to relax while you are speaking with others. While it may be challenging to relax, if you are tense or even trying too hard, it becomes more difficult to understand speech.
Be sure to let your family know how they can help you by asking them to:
- Speak in a normal tone of voice
- Avoid over-articulating their words
- Look directly at you when speaking.
- Avoid speaking to you from another room.
- Rephrase messages if needed
Are there organizations in Raleigh that can help me?
Yes, one of these organization is the Hearing Loss Association of America. The website for North Carolina chapters of HLAA can be found here: www.hearingloss.org. The HLAA opens the world of communication to people with hearing loss by providing information, education, support and advocacy. There are over 250 chapters throughout the United States, including chapters in Wake Forest and Winston – Salem.
The goals of HLAA meetings are:
Education: Promoting understanding of the nature, causes, complications, and remedies of hearing loss. Advocacy: Promoting new technology, medical research, and legislation that will alleviate the effects of hearing loss. Self Help: Promoting self-confidence; empower individuals with skills to improve their lives; and providing interaction among people with hearing loss, their friends, families, and professionals.
Wake County HLAA Chapter meets one Thursday a month
For more information, contact: | <urn:uuid:ce41ce63-e9e0-47c7-9527-f49ea2bc5a6f> | CC-MAIN-2022-33 | https://www.raleighcapitolent.com/our-services/hearing-aids/hearing-loss-education/communication-tips | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.949313 | 875 | 3.34375 | 3 |
Check SMF forum configuration since webmin and console works must mean that the forum config needs fixing.
There are only two options:
Mail type : (PHP default)
SMTP server :
SMTP port : 25
This setting allows you to choose either PHP’s default settings, or to override those settings with SMTP. PHP doesn’t support using authentication with SMTP (which many hosts require, now) so if you want that you should select SMTP. Please note that SMTP can be slower, and some servers will not take usernames and passwords.
You don’t need to fill in the SMTP settings if this is set to PHP’s default.
If you use php, I would double check the sendmail_path is correct in php.ini (normally located /etc/php.ini).
I would use smtp over php since it can be problematic. If you do use smtp then you dont need sendmail locally. All my joomla installs use smtp instead of php.
You put in the name of your server so tsgw1 or whatever it is called.
Nope, tried it, mail still vanishes. It’s not in the mqueue and the only indication in maillog is the word failed.
tried which? php or smtp?
Both, but I guess I don’t know enough about sendmail to be able to fix it. Here’s an exerp from the mailog, it doesn’t mean a lot to me I’m afraid.
Aug 06 21:31:06 rocky-86 sendmail: 276JV5AA781452: email@example.com, size=825, class=0, nrcpts=1, firstname.lastname@example.org, proto=ESMTP, daemon=MTA, relay=localhost [127.0.0.1]
Aug 06 21:31:12 rocky-86 sendmail: STARTTLS=client, relay=mail.protonmail.ch., version=TLSv1.3, verify=FAIL, cipher=TLS_AES_256_GCM_SHA384, bits=256/256
Aug 06 21:31:13 rocky-86 sendmail: 276JV5AA781452: email@example.com, firstname.lastname@example.org (48/48), delay=00:00:08, xdelay=00:00:07, mailer=esmtp, pri=120825, relay=mail.protonmail.ch. [188.8.131.52], dsn=2.0.0, stat=Sent (Ok: queued as 4M0XdD3cvgz9vNPN)
Looks like it was sent means it left the queue and your server. Maybe in spam folder in protonmail. If not or no return email for reason of delivery faiure it will be impossible to solve. Had you sent via your email server instead using smtp then it would have returned to the senders mailbox with an error and then it would be possible to solve.
Using sendmail on the SMF server doesnt allow that stage of diagnosis to occur. Therefore configure smtp in smf server to use tsgw1 instead of sendmail. Otherwise we cannot help further.
I suggest asking protonmail support what happened to message ID 4M0XdD3cvgz9vNPN, if it isn’t junk.
If the email is being sent using standard Rocky php infrastructure (including sendmail), it’s worth creating a 10 line php CLI script to test it. It’s not clear to me if you are saying the mail is bouncing, or if it’s just disppearing? It doesn’t help with the over obfuscation of the logs. One thing I can see straight away is where it says “from apache@rocky-86…”, most upstream hosts would reject this becuase it’s not a real from address, but in that case it should bounce back…
It MAY bounce back, but it takes time.
I did try configuring SMF, to send to port 25 on my mailserver, but that does the same thing - vanishes.
According to the last log snippit you posted, protonmail accepted it for delivery. Have you contacted their support?
Asking is easy, waiting for a reply - takes time. Not like it’s urgent. I have patience.
I’ve found the problem, (but I don’t know how to fix it).
In sendmail.mc I have Masquerade _as set to myDomain.com
For some reason, all outgoing mail has the From field as email@example.com. Never gets delivered to protonmail. If I create a mail in webmin and chage the From: manually to firstname.lastname@example.org, it works fine.
Must be something in the later version of sendmail I reckon. the CentOS 7.3 version never gave a problem.
Must be something wrong or missing in sendmail.mc, but what?
This may help:
I checked, it’s setup correctly.
I rotated the logfile and sent 2 more mails from SMF
Aug 9 22:39:15 rocky-86 sendmail: 279KdFM4897885: from=apache, size=583, class=0, nrcpts=1, email@example.com, relay=apache@localhost
Aug 9 22:39:15 rocky-86 sendmail: 279KdFM4897885: firstname.lastname@example.org, ctladdr=apache (48/48), delay=00:00:00, xdelay=00:00:00, mailer=relay, pri=30583, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
Aug 9 22:39:37 rocky-86 sendmail: 279KdbqK897887: from=apache, size=594, class=0, nrcpts=1, email@example.com, relay=apache@localhost
Aug 9 22:39:37 rocky-86 sendmail: 279KdbqK897887: firstname.lastname@example.org, ctladdr=apache (48/48), delay=00:00:00, xdelay=00:00:00, mailer=relay, pri=30594, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
Sending from the command line works perfectly. as well as from webmin. Everything is masqueraded as myDomain.com.
It worked fine on CentOS 7
Now sendmail is refusing the connection. Its not really clear that why.
At this I would try iwalker’s suggestion:
It’s worth checking that sendmail is listening on the sending host e.g.
check the service is running, and if it’s not, why did it stop?
Nope, didn’t work, it actually made things MUCH worse, because then ALL mail came out from email@example.com
Nere’s the header from the undelivered mail:
Received: from TSMAIL1.office.myDomain.com (unknown [99.999.999.999]) by
mailin029.protonmail.ch (Postfix) with ESMTP id 4M30P82k0Fz9vNPS for
firstname.lastname@example.org; Wed, 10 Aug 2022 19:29:16 +0000 (UTC)
Received: from NTD-MTA by TSMAIL1.office.myDomain.com with Novell_GroupWise;
Wed, 10 Aug 2022 21:29:10 +0200
Authentication-Results: mailin029.protonmail.ch; arc=none smtp.remote-ip=99.999.999.999
Authentication-Results: mailin029.protonmail.ch; dkim=none
Authentication-Results: mailin029.protonmail.ch; spf=none
Authentication-Results: mailin029.protonmail.ch; dmarc=none (p=none dis=none)
X-Mailer: Novell GroupWise Internet Agent 9.9.9
Date: Wed, 10 Aug 2022 21:29:10 +0200
Subject: Message status - undeliverable
X-Spamd-Result: default: False [4.95 / 25.00]; HFILTER_HOSTNAME_UNKNOWN(2.50);
MIME_MA_MISSING_HTML(1.00); AUTH_NA(1.00); MV_CASE(0.50);
BOUNCE(-0.05)[mailer-daemon+subj]; R_SPF_NA(0.00)[no SPF record]; R_DKIM_NA(0.00);
MIME_TRACE(0.00)[0:+,1:+,2:~,3:+,4:+]; FROM_NO_DN(0.00); ASN(0.00)[asn:9031,
ipnet:184.108.40.206/19, country:BE]; TO_MATCH_ENVRCPT_ALL(0.00);
NEURAL_SPAM(0.00)[0.786]; RCVD_COUNT_TWO(0.00); SUBJ_BOUNCE_WORDS(0.00);
ARC_NA(0.00); TO_DN_NONE(0.00); RCPT_COUNT_ONE(0.00); | <urn:uuid:34611a60-cbfd-4141-bb01-e0c90257bf00> | CC-MAIN-2022-33 | https://forums.rockylinux.org/t/ougoing-smf-forum-mail-being-rejected/6842?page=2 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.736541 | 2,620 | 1.53125 | 2 |
Question for you: When was the last time you took a good long look at your skin? Not just your face, but everywhere. While it’s important to visit a dermatologist or your primary care doctor for a scan at least once a year to check for anything out-of-the-ordinary, it’s also a wise idea to take stock of your epidermis on your own. A quick peek can usually clue you in to anything that looks too large, too asymmetrical, or too, well, not great looking. If you’ve recently taken notice of a little red bump (or three) that have cropped up on your chest, limbs, or elsewhere, you may be wondering “WTF is that?” And if that question has sent you down an internet rabbit hole of self-diagnosing, you’ve probably come across the term “cherry angiomas,” and once again asked yourself, “What on earth are those?” If that’s the case, you’ve come to the right place.
Although the skin condition is incredibly common — up to 50% of adults present with cherry angiomas, according to a study in American Family Physician — they are rarely discussed outside of a dermatologist’s office. That’s why TZR chatted with a handful of top dermatologists to break down exactly what these little red specks on our skin are, how they develop, and how to treat them. But before you panic, remember: It’s important to see a doctor to confirm any suspected diagnosis. Keep reading for everything you need to know about cherry angiomas.
What Are Cherry Angiomas?
You’ll know you have a cherry angioma when you see it, as they don’t really look like any other kind of mole, bump, or skin condition. “Cherry angiomas are small skin growths made up of blood vessels,” says Dr. Corey L. Hartman, founder of Skin Wellness Dermatology. “They look like what many people describe as raised moles.” That said, some can be completely flat. These spots tend to be dark red in color (and can present darker on deeper skin tones) and are typically circular, ranging in size from a ballpoint pen head to a pencil eraser.
Cherry angiomas are most likely seen on the chest, abdomen, arms, and/or legs, and while they may be raised, they shouldn’t be irritating, according to Dr. Alexis Parcells, board-certified plastic surgeon and founder of SUNNIE Skincare. “But if scratched or picked at, they can easily bleed,” she adds.
The good news, however, is that aside from being annoying, cherry angiomas are pretty much harmless and are widely viewed as a cosmetic issue. “They are not cancerous, nor are they pre-cancerous,” says Dr. Jeanine Downie, a board-certified dermatologist in Montclair, NJ. “However, sometimes these lesions can be confused for a skin cancer and might be biopsied.”
What Causes Cherry Angiomas?
Unfortunately, there isn’t one hard-and-fast reason why cherry angiomas develop. Doctors do, however, have a few ideas of where they may come from. “There’s been some research suggesting their appearance may be genetic, and age and hormones may also play a role in their development,” says Dr. Parcells. Other research has shown that women are more prone to cherry angiomas than men. “Many women see these for the first time during or after pregnancy, which is likely due to estrogen production,” Dr. Parcells adds. “Estrogen can make our blood vessels dilate and may contribute to the overall production [of cherry angiomas].”
Dr. Hartman adds that certain research suggests that cherry angiomas are more common as you age. That may be due to the fact that collagen in your skin depletes in your skin as you get older, making your skin thinner, and the blood vessels close to your skin surface lose support, which makes these moles appear.
How To Treat & Prevent Cherry Angiomas
Unfortunately, as of right now, there is no tried-and-true way to prevent cherry angiomas. Dr. Downie suggests using sunscreen, since sun damage is a potential factor in developing them, but aside from that, you can only treat these marks, not avoid them.
Luckily, since these moles are benign, you can probably just leave them alone. “Most cherry angiomas do not need to be treated unless they are in an area of the body where you commonly bump them, which can lead to bleeding,” Dr. Hartman says. “You may also want to remove them for cosmetic reasons.”
If removing them is of interest to you, there are actually multiple ways to get rid of cherry angiomas, including options that either heat or freeze the mole. If removed, they don’t usually come back in the same spot, but that doesn’t mean other areas of your skin won’t develop additional angiomas at a later time.
“I often use electrocauterization, which uses heat from an electric current to cauterize the cherry angioma,” Dr. Hartman says. This procedure is often used on skin lesions from angiomas to tumors, and feels like a quick snap of a rubber band. There might be a red or dark mark left behind but that usually fades in a day or two, and you can be in and out of your dermatologist’s office in less than 30 minutes.
You could also go in the opposite direction and freeze the angioma. “Cryotherapy, or freezing the vessels with liquid nitrogen, is another option,” adds Dr. Parcells. “This will cause the vessels to shrink and fall off.”
Another option still is pulse-dye lasers, or PDL, which Dr. Parcells says is not only effective, but mostly painless. “The laser light will break down the blood vessel at its root,” she says. “However, several treatments may be required, and post-treatment color changes [to the skin] can last a few days.”
You can also remove the angioma with a scalpel, but that takes a while to heal — more so than the other options.
It’s important to note that you shouldn’t, under any circumstances, try to remove the angioma on your own. “We do not recommend that you hit them or pick them,” Dr. Downie says. “They can get badly infected and leave scars.”
While cherry angiomas may be scary, on the whole, the only issue they really cause is unsightliness — which is entirely in the eyes of the beholder. Talk to your dermatologist about your options, and remember to wear your sunscreen! | <urn:uuid:d096cb22-1cb3-40b9-bcf6-4540b8ae2981> | CC-MAIN-2022-33 | https://www.thezoereport.com/beauty/what-causes-cherry-angiomas | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.954226 | 1,518 | 1.78125 | 2 |
In the “Fourier-, Hilbert- and wavelet-based signal analysis: are they really different approaches?” paper they demonstrate how to somewhat arbitrarily scale filter-hilbert and stfft power values to demonstrate that they are equivalent. I’m trying to do something similar, but in my case I want to compare narrowband inst. power from the analytic signal with surrounding broadband power from the frequency domain. Since I’m not directly comparing apples to apples, what is a good way to scale them so they are comparable?
For example, I’ve notice that the filter kernel from fir1() isn’t normalized. Does it need to be in my case?
The kernel returned by fir1 (and firls, firprm, etc) is normalized to have unit spectral gain. You can see that by plotting its amplitude spectrum.
Normalizing narrowband and broadband time series to be comparable is tricky, because the narrowband signal by definition has less energy than broadband. Perhaps it’s best to normalize them, e.g., z-score or min-max scaling (smallest value of 0 and largest value of 1).
Thanks, is it correct that when scaling the FFT by dividing by the number of points in the signal (prior to zero padding) it’s not necessary to scale the analytic signal after doing the IFFT?
Also I’m curious, if I wanted to scale the analytic signal but hadn’t scaled the result of the FFT, would I divide by the size of original signal or by the size with zero padding?
Correct: If you do FFT->IFFT, you don’t need the scaling factors.
Whether to normalize by the time series length or padding length is another issue, probably scaling by the time series length is what you want. Normalization is always tricky Honestly, if your goal is simply to compare different methods/parameters, then I would just z-score everything and not worry about normalizations. | <urn:uuid:3ed61c21-acd2-4c97-8151-cff29b7a4401> | CC-MAIN-2022-33 | https://discuss.sincxpress.com/t/comparing-broadband-and-narrowband-power/599 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.918306 | 430 | 1.59375 | 2 |
The committee set up to look for ways to overhaul engineering education in the county in 2018 had earlier advised the government to put a moratorium on granting approvals to new engineering colleges for two years starting 2020, and now in its interim report, it has recommended continuing the freeze barring some exceptions, the union ministry of education informed the Parliament on Monday.
The committee cited low enrolment in engineering and diploma programmes across the country as the reason behind the recommendation, the ministry said.
The All India Council for Technical Education (AICTE) in 2018 constituted the committee headed by BVR Mohan Reddy, the chairman of Indian Institute of Technology (IIT), Hyderabad, to recommend short term and medium term prospective plans for engineering education in India. The development came after AICTE observed that seats were lying vacant in several engineering colleges.
In 2019, the Reddy committee advised AICTE to stop setting up new colleges from the academic year 2020 and “review” the creation of new capacity every two years after that. The committee observed that the capacity utilisation in engineering colleges during 2017-18 in undergraduate and postgraduate level was at 49.8% .
“The Committee has held three meetings on 18.10.2021, 10.11.2021 & 30.11.2021 and reviewed the Engineering Capacity, Enrolment and Placement Data over the last three years in Engineering Institutions. In the light of low enrolments into the Engineering and Diploma programmes across the country, the Committee in its interim report submitted in December, 2021 recommended to continue the moratorium on approving new Engineering Colleges in the country barring a few exceptions,” minister Dharmendra Pradhan said in the statement.
The committee’s recommendation has come at a time when engineering colleges in India recorded a 10-year-low in the number of seats being offered this year. Officials had cited closure of over 340 colleges between 2018-19 and 2020-21 and the ban on opening of no new colleges as the reason behind the drop.
As per the data presented by the minister, the total approved intake in the AICTE approved engineering institutions has declined from 26,95,333 from academic year 2012-13 to 23,66,728 in academic year 2021-22. The intake was 24,42,948 in 2020-21, and 25,39,682 in 2019-20.
As per the data provided by the ministry, the enrolment remained low over the last three years. For instance, against the intake capacity of 24,42,948 in 2020-21, only 12,75,880 enrolment were reported. Similarly, in 2019-20, only 14,10,683 students enroled against the 25,39,682 seats, and in 2018-19, only 14,16,319 out of 27,11,068 available seats were filled. | <urn:uuid:e5e6bf03-3ae3-4a2f-bab8-9ea30a9b8a78> | CC-MAIN-2022-33 | http://jagatwani.com/advised-to-continue-ban-on-approving-new-engineering-colleges-govt/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.961062 | 591 | 1.757813 | 2 |
Tesla's new cybertruck gets four engines and individually controllable wheels
Tesla CEO Elon Musk has announced a number of changes for the new Cybertruck compared to the prototype presented in 2019.
Photo Credits: James Duncan Davidson
Tesla CEO, Elon Musk, has announced a number of changes for the new Cybertruck compared to the prototype presented in 2019. The finished model should have four motors and be able to control each wheel individually.
The Cybertruck, a new pick-up with an electric drive from Tesla, is due to hit the market in 2022 - but probably different than originally planned. Because Tesla CEO Elon Musk recently announced a series of changes to the finished vehicle. With which the Cybertruck should differ in some important ways from the prototype presented in 2019.Tesla is stepping up with the Hummer feature
The US company plans to bring the Cybertruck onto the market with four engines in 2022. Originally the pick-up was supposed to appear with three engines. In addition, the Cybertruck offers the option of controlling each of the four wheels separately. In addition, the car allows separate steering of the rear axle, so that drivers can also move the Cybertruck diagonally to the side, in a so-called dog or crab walk.
A competitor model of the Cybertruck, the GMC Hummer EV also has this function. It is possible that those responsible at Tesla have therefore decided to introduce the corresponding control option for the cybertruck as well. The latter is made of stainless steel, by the way, which gives the car its idiosyncratic look.
The cybertruck is expected to cost $ 70,000 and have a range of more than 800 kilometers. Further technical details are not yet known about the vehicle. Elon Musk announced, however, that his company has already received several hundred thousand pre-orders for the Cybertruck. So the hype about the futuristic-looking vehicle seems to be in full swing. | <urn:uuid:e7b1bdd9-1014-46a3-be6b-e658edeebc8f> | CC-MAIN-2022-33 | https://zexron.com/teslas-new-cybertruck-gets-four-engines-and-individually-controllable-wheels?amp=1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.9688 | 401 | 1.5 | 2 |
Hi FLUKA experts,
I am using an electron beam to irradiate the water, the beam is exiting through a titanium window, air, the water window and then into the water, shown in the following figure.
I have two questions here.
Geometry error, while the file runs normally.
While I was trying to add a cover plate above the water window, it showed error where the red frames are in the figure. However the file is running successfully. Can you please help check if it is the input file error or the system error?
Material not error while the input file failed to run.
I was trying to build the compound for stainless steel 304, the files ran successfully when I only used the built-in elements like C, Fe, Mn… However, when I added the material “sulphur” and “phosphrus” and then used them for stainless steel 304 compound, the input file fails to run. It showed
*** Impossible to open file ***
*** on unit 1 ***
Abort called from VXLINP reason UNABLE TO OPEN VOXEL FILE Run stopped!
STOP UNABLE TO OPEN VOXEL FILE
I attached my input file. tiwindow.inp (22.0 KB) . Thank you very much for your time and help. | <urn:uuid:7a1fa708-e8fb-461f-978c-e97c339b149c> | CC-MAIN-2022-33 | https://fluka-forum.web.cern.ch/t/geometry-error-run-ok-and-failed-material-setting-run-failed/1254/3 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.921701 | 291 | 1.882813 | 2 |
Writer Joseph J. Airdo
Photography by Gerry Groeber
[dropcap]I[/dropcap]ndependence Day may have come and gone but we are smack-dab in the middle of the real fireworks display.
In 2008, National Weather Service officials decided that Arizona’s monsoon season would begin on June 15 and end on Sept. 30. Of course, the thunderstorms that bring rainfall may form at different times and in different places across our region, but these summer months are typically when we see the most — and the most dramatic — activity.
And that activity extends far beyond just rainfall. Ominous clouds form in the distance and menacingly make their way directly overhead, turning day into night. Wild winds swirl dust particles into the air, blanketing entire communities in complete chaos. Our skies light up with streaks of lightning, which are then followed by startling cracks of thunder.
Suffice it to say, these storms make their presence known.
However, as alarming and destructive as they may be, there is also abundant beauty in our monsoons. Those dark clouds and their resulting rainfall give the Valley some much-needed relief from summer’s scorching temperatures. The varying density of the clouds also makes it possible for lightning to momentarily paint remarkable mosaics across our skies.
Viewing dust storms from a distance illustrates the sheer magnitude of our cities — yet, at the same time, how they are merely small dots on an enormous planet. And the thunder encourages us to huddle together with our loved ones, who make us feel safe and secure regardless of what foreboding forces might threaten us.
Of course, then there are the astonishingly colorful rainbows that stretch from one mountain range to another, indicating the end of the storm and symbolizing how when we traverse the tough times we emerge stronger and more resilient.
Fine art landscape photographer Gerry Groeber is very familiar with all of this beauty and more as he captures all aspects of Arizona, including its monsoons, on camera. It is our hope that in sharing his work, which so sagaciously reflects both the magnitude and the aesthetic magnificence of these storms, that our Images Arizona readers will see them in a new light — appreciating nature’s fireworks rather than fearing them.
About the Photographer
Originally from Southern California, Gerry Groeber has always considered himself to be an artist.
“My father enjoyed doing oil paintings so I had a lot of books on classic landscape oil painters,” says Groeber, who began exploring videography in his 20s before discovering a passion for fine art landscape photography. “A lot from my early years of seeing the masters of landscape oil painting comes back to me as I incorporate it into my compositions and how I photograph landscapes.”
Groeber arrived in Arizona about 23 years ago and quickly fell in love with the state — especially what it had to offer him in the way of his art. Although he has spent time in other Arizona cities, including Mesa, his move to Prescott two years ago has proven to be the most beneficial to his craft.
“Prescott is kind of the hub or the spoke of the wheel,” Groeber explains. “I can get to the Grand Canyon in less than two hours. I can get to Flagstaff, I can get back down to the Valley … it is nice to be centrally located for all that Arizona has to offer. Plus, Prescott has a really great art vibe.”
Groeber’s photography and replica pottery can be viewed at Art2 Prescott in downtown Prescott on the Mezzanine in the Old Capital Market Building.
“It has always been inherent for me to create,” says Groeber, who has explored a number of different mediums, including music. “Photography is where I landed after years and years of creating different types of art. I think that artists are born with the drive to create. It can be in many forms and still be something that satisfies that drive to create, do something new and then share it.” | <urn:uuid:235b6c56-5189-4b16-b262-3f009542ab02> | CC-MAIN-2022-33 | https://imagesarizona.com/natures-fireworks/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz | en | 0.960854 | 851 | 2.203125 | 2 |
This session covers an overview of mobility explaining basics about mobility procedures like handovers and redirections. It also includes guidelines about correct design of handover and mobility thresholds along with tips and tricks for KPI optimization. Last but not the least, it explains how connected mode & idle mode mobility comes together and provides examples of common mistakes observed in various networks.
Thanks a lot… I must say it takes very little effort to read but takes a lot to draft such nice articles.।
Exactly what i was looking for. Thanks. | <urn:uuid:1d162afb-e60d-46ad-a6f7-5492603377c9> | CC-MAIN-2022-33 | https://www.telecomhall.net/t/learn-all-about-mobility-in-15-mins-handovers-reselections-redirections-and-tips-tricks/15716 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz | en | 0.942185 | 113 | 1.578125 | 2 |
Pet adoption over mass-production: A social IMC campaign for PAWS
Date of Publication
Master of Marketing Communications
Ramon V. Del Rosario College of Business
Marketing and Advertising Department
For more than 50 years, the Philippine Animal Welfare Society or famously known as PAWS, a non-profit organization, has been saving and helping abondoned, neglected and mistreated animals by medically treating them, rehabilitating them, giving them love and affection and more importantly giving them justice for all the pain and suffering they have been through.
As reports on animal abuse and cruelty cases such us meat trade, dog fights, or just plainly hurting an animal continue to arise, it is only expected that the animal rescues admitted in shelters will increase as well, hence, more facilities are needed to accommodate and to treat these victims and eventually put them up for adoption to be given a second life in the arms of a loving human. Unfortunately, that is not always the case as animals admitted in the shelters usually stay there for a long period of time, waiting to be adopted out for the reason that people would usually go for buying purebred animals from pet shops. In 2007, PAWS has released the See Beauty Behind Breed campaign to uplift the image of native dogs and cats from askal to aspin, pusakal to puspin and encourage the people to adopt these animals. The aim of this social marketing communication plan is to expose an ugly industry behind the suppliers of pet stores, online pet stores and other animal retailers, which are known as puppy mills or simply, irresponsible breeders. In effect, the campaign seeks to re-introduce and reinforce among the people the idea of choosing adoption from animal shelters and veer them away from buying from pet stores. This plan seeks to educate and inform them about what the organization does to rehabilitate these abused animals to qualify for adoption against the lives of the animals being bred continuously without necessary care just to gain profit. As a result, this plan will inspire and encourage the audience to consider adopting an animal from the shelter instead of buying from pet stores.
The proposed budget of Php 4M will be utilized for the development of the Audio Visual Presentation in the form an infographic video for flexibility of usage and it will eventually be translated to a public service announcement, out-of-home, digital activities and event. The campaign will run from April to October 2013.
During the evaluation phase, several online system reports will be employed during and after the campaign to monitor ad performances. Moroever, adoption rates from the shelter will also be part of the campaign post-report to validate if the campaign was a success and if objectives are met.
Archives, The Learning Commons, 12F Henry Sy Sr. Hall
computer optical disc.
Chua, J. (2012). Pet adoption over mass-production: A social IMC campaign for PAWS. Retrieved from https://animorepository.dlsu.edu.ph/etd_masteral/4994 | <urn:uuid:8022c15c-9c55-40b0-bc1a-75c551e5c8c7> | CC-MAIN-2022-33 | https://animorepository.dlsu.edu.ph/etd_masteral/4994/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz | en | 0.932832 | 674 | 1.6875 | 2 |
Our Custom Home Builder Construction Navigational Checklist (CNC) serves as a resource outline for the typical steps normally assumed prior to construction activity of the actual home itself. The CNC will walk you step by step through the design phase from identifying the desired lot through a set of Engineered Blueprints ready to build.
The CNC can be completed in a few months but may take longer depending on the municipality. You may already have several line items that are completed. If so, we can easily progress to the next step. The goal of the CNC is not be a daunting list but to serve as a transparent checklist and resource to help understand what the next steps are.
(NOTE- THIS LIST IS CREATED FOR A HOME WITH EVERY OPTION IMAGINABLE – YOU MAY NOT NEED ALL THESE STEPS. SO PLEASE OVER LOOK THE OBVIOUS.)
Preliminary Discussion What are your Goals and Needs?
- We review our building process with you and discuss the timeline for your build.
- We will help you identify land and/or talk about your geographical areas of interest.
- If you have a design in mind already, we will discuss your wish list and priorities for your home design.
- Finally in this phase, we will look at your budget as well as direct you toward qualifying for construction loan financing if needed.
Let’s Walk the Lot
Finding the right land or lot for your family is an exciting and fun process. But understanding national, state and local regulations can be a heavy task. That’s where having a professional walk the land with you is invaluable. Depending on the municipality, home site regulations vary. Whether you already own a lot, or are still weighing your options, we will walk the land with you, to:
- Provide design-build insights for optimal home site location.
- Identify potential “red flags”
- Create an idea of what to expect in site costs
- Discuss septic and well impact, where applicable
- Provide a basic overview of required foundation work
- Discuss clearing options and outdoor living spaces
- Determine potential location of driveway
- Discuss suitability for the home you’d like to build
- Give tips about how to leverage advantages provided by the lot – from basements to views and efficiency.
Schedule your lot assessment with Chad or Begin your lot search
Simple Floor Plan & Diligence Phase
- Together we will review your simple floor plan sketch and/or your architectural drawings.
- We will obtain your authorization to have survey measurements performed on your lot.
- We will then hire engineers to test the soil (if applicable).
- Environmental Health applications / well & septic (if applicable) will be submitted.
- Lastly we will review impervious surface calculations and zoning.
“Charrette” Design Consulting Team
Building a home is a creative and collaborative process, so we partner with seasoned Professionals and Craftsmen to ensure a smooth build:
- Architect (if applicable)
- Structural Engineer
- Interior Designer (if applicable)
- Landscape Architect Designer (if applicable)
- Mortgage Lender (if applicable)
- Your project may require a property survey identifying boundaries, locations of existing structures, setbacks and areas of impervious coverage.
- Survey work includes field work and development of survey plan which is then used as necessary to provide data for any engineering work that may be required by municipality for grading and storm water management.
Floor Plan Review & Presentation
- We review the hard lined floor plans and preliminary site plan with you and confirm the final design direction.
- We discuss interior material, designs and furniture needs throughout your home.
- Lastly we will review and fine-tune all specifications such as Siding/Brick/Shingles Veneer, Exterior Doors/Windows, Garage Door Design, Shutters, etc., that will assist us in narrowing down your budget figures.
Final Plans & Budget Review
- During this phase, final plans will be reviewed and confirmed.
- We will guide you in your budget allowance figures for those items such as Cabinets, Counter-tops, Appliances, Flooring, Lighting, and Plumbing Fixtures.
Contract & Specification Agreement
- After confirming all details of your build project, we will execute the contract and specification agreement.
- Also we will discuss the utilization of our Online Construction Management Software that will further enhance your home building experience.
- We will complete permit applications and make submissions to municipality for all building and mechanical permits required.
- An allowance included in this agreement for the permit fees.
- Independent municipal review costs will be billed to client as needed for storm water management and engineering review.
- Chad personally oversees all construction and improvements.
- Chad sends several photos from the homesite via text several times a week.
- Not only only is Chad a Licensed General Contractor but he is a Licensed Home Inspector as well.
- Chad loves the building process. His homes are his babies.
Welcome to Your new home
- During the Home Buyer Orientation Chad educates and trains you on how to best maintain your new home.
Thank you for taking the time to read through our process. It’s nothing proprietary or anything and it is likely the exact path all Builders take. We hope this information has been helpful and will serve as a useful guide when we get started. Contact Chad to start today! 919-422-2818 | <urn:uuid:0faa1c91-6bf8-4f57-8627-16b85de8e1ec> | CC-MAIN-2022-33 | https://www.collinsdesignbuild.com/our-process/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00072.warc.gz | en | 0.906658 | 1,157 | 1.59375 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.