text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
The bangladeshi-made Muslin fabric has been a keystone of socio-economic history for ages. It has been so deep-seated in the Bengali culture and legacy that it would be challenging to think about the region’s history without talking about this fabric. With wooden spinning wheels and hand-drawn looms, Bangladesh is reviving a fabric once worn by Marie Antoinette and Jane Austen. Following the direction of the Prime Minister, Bangladesh Handloom Board has taken the effective initiative to bring back the tradition of Muslin fabric. However, to revive it, botanists had to hunt halfway across the world and back for a plant believed gone from the face of the earth. “Nobody knew how it was made,” said Ayub Ali, a senior government official helping shepherd the revival project. “We lost the famous cotton plant, which provided the special fine yarn for Dhaka muslin,” he said AFP recently. The muslin trade at one time helped turn the Ganges delta and what is now Bangladesh into one of the most prosperous parts of the world, historians say. Flowing dress garments weaved from the cloth were worn by generations of the Mughal dynasty then-ruling India before the fabric enchanted European aristocrats and other notables at the end of the 18th century. A muslin shawl belonging to Austen, supposedly hand, embroidered by the ‘Pride and Prejudice’ author herself, is on display at her former home in Hampshire, while a 1783 portrait of Marie Antoinette depicts the French queen in a muslin dress. But the industry collapsed in the years after the 18th-century conquest of the Bengal delta by the East India Company, paving the way for British colonial rule. The quest to bring back Bangladeshi muslin began with a painstaking five-year search for the specific flower used to weave the fabric, which only grows near the capital Dhaka. “Muslin can’t be woven without Phuti Carpus cotton. So to revive Dhaka Muslin, we needed to find this rare and possibly extinct cotton plant,” said Monzur Hossain, the botanist who led the effort. His team consulted a seminal book on plants by the 18th-century Swedish naturalist Carl Linnaeus along with a later historical tome on Dhaka muslin to narrow down a candidate among 39 different wild species collected from around Bangladesh. With local museums lacking any specimen of Dhaka muslin clothing, Hossain and his colleagues went to India, Egypt and Britain for samples. At the Victoria and Albert Museum in London, curators showed them hundreds of pieces imported from Mughal-era Dhaka by East India Company merchants. Genetic samples revealed that the missing plant was already in their hands, found by the botanists in the riverside town of Kapasia north of the capital. The plant is now being grown in experimental farms in an effort to raise yields and scale up production. Project director Ayub Ali said, “We will able to launch the muslin saree in the market for everyone very soon.” The concerned authorities said, “The government gave us Tk 131 million (Tk 13 crore 10 lakh) for this project. But we spent only Tk 45 million (Tk four and half crore) in six years. The rest of the funding was sent back to the government fund.” Now the private sector is also coming up to develop Muslin. Saiful Islam, CEO, Bengal Muslin (an initiative of Drik), thinks that it is indeed possible, though it would require significant effort. When a London-based group did a research project on Muslin and asked Drik whether it would be interested in taking it forward, Saiful Islam took the challenge. “The initial study lacked detailed knowledge and the role of Bangladesh regarding Muslin,” he pointed outs. “There was a lot we could add – from the craftsmanship of the weavers to the specific climate which made the making of the fabric possible,” Saiful Islam added.
<urn:uuid:42dac105-ec1f-474f-a723-169cd2d615d8>
CC-MAIN-2022-33
https://www.textiletoday.com.bd/elite-muslin-revived/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.947875
871
3.234375
3
Carl Jung studied the shadow side in psychology to great lengths. He determined that our shadow side is the part of ourselves that we often push down. It ends up staying in our subconscious and we do everything we can to keep it there. Most of us will repress the shadow side when we’re very young to avoid getting in trouble or becoming an outcast. The shadow side is made up of repressed ideas, instincts, weaknesses, desires, and fears—things we’re ashamed of. They aren’t bad, but through our experiences, we’ve hidden them because they haven’t served us well. The conscious ego will try to stay away from using the shadow parts of our minds. The shadow side represents the wildness that society doesn’t agree with. Carl Jung believed that it is a part of every human’s make up. It can be positive thing: It’s where our creativity sits. It can also act as a gauge of how much we allow society to dictate the “mask” we decide to wear. Signs that you may be repressing yourself include: substance abuse, addictive behaviors like gambling, shopping, or over-eating, and self-sabotage. Not accepting all the parts of yourself can lead to chronic anxiety and depression. It’s time to bring your shadow side to the surface and start accepting every part of yourself. This is where your life will begin to open up in a radical, new way. My Shadow Unleashed Just like everybody else, I started to hide my shadow side or “dark side” when I was pretty young. It doesn’t take much for a child to learn to keep their true self quiet. To be able to fully love and accept ourselves, we need to include the shadow side too, but society doesn’t necessarily support this. If you’re loud, if you say everything that goes on in your head, it’s probably going to offend someone. The wildness inside of you is often shoved down to avoid being isolated from others. The year my mom died was the year I was forced to walk on my shadow side. Instead of being polite and helping someone out (so they would like me), I left to go to her funeral. I started to realize that so much of my life had been spent wearing a mask. I put others’ needs before my own and would keep quiet. If I cried, I would usually do it quietly. But when my mom died, I wailed like a baby. It felt good. We are Born Whole and Complete When we’re born, we have the wildness within. The shadow side isn’t hidden away, and we’re complete. And as we grow up, we slowly begin to live a fractioned life. Some parts, we accept and others, we don’t. We reject parts of ourselves based on other people’s reactions. We all have a light and a shadow side. It’s just as true as having a left and right foot. Society molds us, though. When you’re good, you get praise. When you’re bad, you get reprimanded. As the smart humans we are, we divide ourselves into two—the good part and the bad part. Depending on your upbringing, these ideals differ. This takes its toll on our psyche and it’s a belief we cling to at an early age. Sometimes, we feel really good about ourselves and sometimes we feel terrible. This tends to affect our energy vibrations, and as a result, we can find ourselves in a deep depression. We might also feel nervous about ruining our tidy reputation, so we do our best to tuck away the dark parts of ourselves. In contrast, we flip ourselves backward so people can see our best, good self. The dark parts stay in the background and away from our conscious minds. Carl Jung wrote about what happens when you ignore the shadow part of yourself: “It is a frightening thought that man also has a shadow side to him, consisting not just of little weaknesses and foibles, but of a positively demonic dynamism. The individual seldom knows anything of this; to him, as an individual, it is incredible that he should ever in any circumstances go beyond himself. But let these harmless creatures form a mass, and there emerges a raging monster.” The repression of your negative traits is a major obstacle for any person who is looking to love themselves. To truly be complete, you would have to accept all the aspects of yourself. When you can master this, you also become less disturbed by other’s imperfections. The Shadow Side Has its Beauty Too We are congratulated when we do good things and we strive hard to stay on the good path, the path of light. We can even be taught to avoid and escape the darkness through spiritual teachings. But, if we ignore the other part of us, we fail in giving ourselves the full gift of being human. When we fear this darkness, we use tools to escape it throughout our life—and that’s exhausting. To be free from hiding your true self to your husband, children, or friends is to accept your darkness. It is what will make you feel complete, maybe for the first time in your life. When we don’t show all sides of ourselves, we don’t let anyone else truly know us. And it creates a massive blockage that stops us from fully caring about ourselves, too. When we are openly ourselves, some call it “opening the heart.” This is the ultimate freedom. The Risk of Not Bringing Your Shadow Side to the Conscious Mind When you keep your shadow side from surfacing into your conscious mind, there are risks. You control all of your thoughts, emotions, choices, and actions to avoid the shadow side from making an appearance. As Jung said: “That which we do not bring to consciousness appears in our lives as fate.” This represents the self-destructive behaviors you may struggle with. For instance, drugs and alcohol are believed to bring the whole of a person together. One loses their inhibitions for a time, allowing themselves to be wild, to not care about the shadow side emerging. This feeling can be the source of addiction because it feels good to feel whole. However, it’s much easier and more authentic to confront your shadow. Jung suggests that we become conscious of our shadow side and make it a part of your conscious personality. Accept this part of yourself with open arms, as though this part of you is essential to your life experience. Benefits of Allowing Your Shadow Side to be a Part of You Again The shadow side has its benefits. It is the creative part of yourself and it’s also where much of your power lives. When you allow others to dictate who you become, that’s not powerful. When you get to know your shadow side, you take your power back. We each have beneficial personality traits within our subconscious that are lying dormant—allowing them in would lead us to feel whole and harmonious. Maybe they’re frowned upon by your peers, but perhaps not for reasons you realize. It may just be that others are envious or ignorant of what you are capable of. If we dressed however we wanted because we didn’t care what others thought, we may have become bullied. This could be a positive trait that was nonetheless cast to our shadow side, never to be revisited again. This is where we lose our wholeness. This high energy that we encompassed is now gone—we’ve labeled it as bad and pushed it down. Opening up to the shadow side is our source of renewal. It’s where we can become productive in our lives again, unlocking parts of ourselves that can be useful in our lives today. Putting back the fragmented pieces of ourselves will allow a wholeness we have probably never felt. This is where true bliss lives. Authors: Loraine Couturier and Nicole Aracki Image: Ryann Flippo/Unsplash Editor: Catherine Monkman Copy Editor: Danielle Beutell
<urn:uuid:55ede3c2-c8d5-4b41-8e84-f45c7b651b9e>
CC-MAIN-2022-33
https://www.elephantjournal.com/2017/06/society-shuns-our-wildness-how-to-reconnect-find-bliss-be-whole/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.951652
1,728
2.359375
2
The history of gas meters is not only a story about the methods of calculating the volume of the fuel used but also a process of developing innovative business models. The old gas meters were a fulfilled business prophecy, announcing a new order of economic flows in the form of a user-network relationship, which is so prevalent today. These silent companions of our daily lives are also evocative of global civilizational changes. Although today we associate stoves, heaters and refrigerators with electricity, in the 19th century they were powered by … gas. The introduction of these appliances to people’s homes heralded a lifestyle revolution that continues to this day. An accidental visitor to a traditional gasworks will see a tangle of pipes, some baffling geometrically-shaped installations and mystifying devices. Such a gas plant resembles an octopus with a thousand tentacles, which has crawled out of the canal at the edge of the city. What happens inside this tangle of pipes? What are the mysterious towers for? History of the gas industry Key events in the history of the gas industry in Poland and Europe.Go to history of the gas industry History of Kraków Gasworks First bath heated with a gas water heater This appliance is invented by an Englishman, Benjamin Waddy Maughan. Gas begins to find multiple new applications, and inventions include gas cookers, refrigerators, irons, coffee roasters, boilers, gas heaters and many more. Gas light gains new brightness and colour This is a clever invention of Carl Auer von Welsbach – a fabric mantle, made from cotton mesh impregnated with non-flammable compounds, which when heated by a gas flame emits a bright light without burning. This invention continues to be used today. Natural gas discovered in the Podkarpacie region The beginnings of natural gas in Poland are connected to crude oil extraction in the Podkarpacie region. Coins and tokens in the gas industry Gas industry today and tomorrow Less gas in the gas, that is about regulators, i.e. the guardians of pressure and...our wallets Installed in gas stations or gas connections, regulators constantly watch over the pressure in our home gas systems, thanks to which our gas meters measure the consumed gas correctly! Non-mining methane production methods Mines are not the only sources of natural gas: the fuel can be produced by chemical or biological synthesis.Technology 8 October 2019 NG pressure reducing and metering stations go underground New construction, extension and retrofitting of gas networks frequently pose multiple challenges linked to choosing the locations for pressure reducing and metering stations. Underground NG pressure reducing modules might provide a solution to these problems.read all articles
<urn:uuid:4c3abd9f-0e1c-4e59-9895-43077bb74d34>
CC-MAIN-2022-33
https://wmgaz.pl/en
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.931276
564
2.640625
3
Israeli weapons-maker Elbit Systems launched a new venture in the United Arab Emirates on Sunday, an announcement that comes ahead of visits to Dubai by senior Israeli military officials. The manufacturer of the Hermes armed drone and cutting-edge surveillance technology, among other products, hailed the announcement as a product of the so-called Abraham Accords that saw Israel establish diplomatic ties with several Arab states including the UAE last year. The new venture, Elbit Systems Emirates, “will seek to foster a long-term cooperation with the United Arab Emirates (UAE) Armed Forces,” the Israeli firm said in a statement. Company vice president Ran Kril said, “the Abraham Accords provide a sound basis for business collaborations in the region,” calling the UAE one of the region’s “important new markets” for Elbit. Israeli air force commander Amikam Norkin was in the UAE over the weekend to attend the Dubai Airshow, after his Emirati counterpart visited Israel last month to observe Israel’s largest-ever joint military drill. Defense Minister and former Israeli military chief of staff Benny Gantz and other senior defense officials are due to visit Dubai next week to inaugurate “the first-ever national pavilion” at the air show, Gantz’s office said in a statement. Other leading Israel defense industry firms, including giant Rafael, will participate in the exhibit, his office said.
<urn:uuid:bdbcf4fe-15c9-4541-89c6-5abebf201d81>
CC-MAIN-2022-33
https://www.thedefensepost.com/2021/11/15/elbit-systems-uae-venture/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.944555
299
1.609375
2
Volume 3 (2016) - Issue 9, September Extensive studies have been carried out in the last decade to assess the pharmaceutical potential and screening of the phytochemical constituent, psoralen. This component is found in many plants species and has gained attention nowadays because of its antibacterial, antifungal, antiviral, and anti-inflammatory properties. Psoralen is an active component of Babchi oil found in Psoralea corylifolia... PHARMACOGNOSTICAL STUDIES ON MEDICINAL AND NUTRITIONAL SEEDS OF JACK FRUIT: ARTOCARPUS HETEROPHYLLUS LAM. In the present day world the consumption of fruits, vegetables and natural diet for the prevention of certain diseases, in addition to their nutritional benefits is increased. Jack fruit is well known for its nutritional and therapeutic qualities for many years. The present communication deals on the macroscopical, microscopical, powder microscopical studies along with the preliminary phytochemica... The present study aims to standardize Amritarishta based upon chromatographic and spectral studies. The spectral data and HPTLC fingerprint of ethanolic extract of Amritarishta could be used as a valuable analytical tool in the routine standardization of Amritarishta to check the batch to bath variation. Fraction, I and II of ethanolic extract of Amritarishta and standard luteolin and apigenin, ... Natural products and herbal remedies used in traditional folklore medicine have been the source of many medically beneficial drugs because they elicit fewer side effects, relatively cheap, affordable and claimed to be effective. However, in order to make these remedies acceptable to modern medicine, there is a need to scientifically evaluate them to identify the active principles and to understand... Calotropis gigantea, belonging to the family of Asclepiadaceae. The plant has the antimicrobial activity, antioxidant activity, analgesic activity, anti-pyretic activity, insecticidal activity, cytotoxicity activity, hepatoprotective activity, purgative properties and wound healing activity. The present paper is an attempt to provide a detailed botanical description, classification, phytochemical ...
<urn:uuid:3ffb7fb1-af10-464c-ad56-0dc2e5270034>
CC-MAIN-2022-33
https://ijpjournal.com/articles/?iyear=86&imonth=79
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.913205
499
1.851563
2
This part of the reference documentation explains the core functionality that Spring for Apache Hadoop (SHDP) provides to any Spring based application. Chapter 3, Hadoop Configuration describes the Spring support for generic Hadoop configuration. Chapter 4, MapReduce and Distributed Cache describes the Spring support for bootstrapping, initializing and working with core Hadoop. Chapter 5, Working with the Hadoop File System describes the Spring support for interacting with the Hadoop file system. Chapter 6, Writing and reading data using the Hadoop File System describes the store abstraction support. Chapter 7, Working with HBase describes the Spring support for HBase. Chapter 8, Hive integration describes the Hive integration in SHDP. Chapter 9, Pig support describes the Pig support in Spring for Apache Hadoop. Chapter 10, Apache Spark integration describes the Spark support in Spring for Apache Hadoop. Chapter 11, Using the runner classes describes the runner support. Chapter 12, Security Support describes how to configure and interact with Hadoop in a secure environment. Chapter 13, Yarn Support describes the Hadoop YARN support. Chapter 14, Testing Support describes the Spring testing integration.
<urn:uuid:59a50739-9f3b-4dcd-8ccc-681660c60ec3>
CC-MAIN-2022-33
https://docs.spring.io/spring-hadoop/docs/2.5.0.RELEASE/reference/html/springandhadoop.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.783103
254
1.742188
2
Heinz von Foerster (born Heinz von Förster; November 13, 1911, Vienna – October 2, 2002, Pescadero, California) was an Austrian American scientist combining physics and philosophy. Together with Warren McCulloch, Norbert Wiener, John von Neumann, Lawrence J. Fogel, and others, Heinz von Foerster was an architect of cybernetics.Von Foerster was born in 1911 in Vienna, Austria-Hungary, as Heinz von Förster. He studied physics at the Technical University of Vienna and at the University of Breslau, where in 1944 he received a Ph.D. in physics. He moved to the USA in 1949, and worked at the University of Illinois at Urbana-Champaign, where he was a professor of electrical engineering from 1951 to 1975. From 1962 to 1975 he also was professor of biophysics and 1958–75 director of the Biological Computer Laboratory. Additionally, in 1956–57 and 1963–64 he was a Guggenheim-Fellow. From 1963 to 1965 he was president of the Wenner-Gren-Foundation for anthropological research. He knew well and was in conversation with John von Neumann, Norbert Wiener, Humberto Maturana, Francisco Varela, Gordon Pask, Gregory Bateson, Lawrence J. Fogel and Margaret Mead, among many others. He influenced generations of students as a teacher and inclusive, enthusiastic collaborator. Von Foerster was influenced by the Vienna Circle and Ludwig Wittgenstein. He worked in the field of cybernetics and is known as the inventor of second-order cybernetics. He made important contributions to constructivism. He is also known for his interest in computer music and magic.
<urn:uuid:ae5a4148-fbf7-4d87-82bd-468664462e1c>
CC-MAIN-2022-33
https://win.radicalmatters.com/radical.matters.cd.cdr.authors.asp?tp=1&f=all&a=436
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.965241
383
2.6875
3
The Global Gender Gap Index was first introduced by the World Economic Forum in 2006 as a framework for capturing the magnitude of gender-based disparities and tracking their progress over time. This year’s edition of the report benchmarks 149 countries on their progress towards gender parity on a scale from 0 (disparity) to 1 (parity) across four thematic dimensions—the subindexes Economic Participation and Opportunity, Educational Attainment, Health and Survival, and Political Empowerment—and provides country rankings that allow for effective comparisons across and within regions and income groups. The rankings are designed to create global awareness of the challenges posed by gender gaps, and the opportunities created by reducing them. The methodology and quantitative analysis behind the rankings are intended to serve as a basis for designing effective measures for reducing gender gaps. The methodology of the Index has remained stable since its original conception in 2006, providing a basis for robust cross-country and time-series analysis. The 2018 report’s key findings include: - Globally, the average (population-weighted) distance completed to parity is at 68.0%, which is a marginal improvement over last year. In other words, to date there is still a 32.0% average gender gap that remains to be closed. The directionally positive average trend registered this year is supported by improvements in 89 of the 144 countries covered both this year and last year. - Across the four subindexes, on average, the largest gender disparity is on Political Empowerment, which today maintains a gap of 77.1%. The Economic Participation and Opportunity gap is the second-largest at 41.9%, while the Educational Attainment and Health and Survival gaps are significantly lower at 4.4% and 4.6%, respectively. Among them, on average, only the Economic Participation and Opportunity gap has slightly reduced since last year. - When it comes to political and economic leadership, the world still has a long way to go. Across the 149 countries assessed, there are just 17 that currently have women as heads of state, while, on average, just 18% of ministers and 24% of parliamentarians globally are women. Similarly, women hold just 34% of managerial positions across the countries where data is available, and less than 7% in the four worst-performing countries (Egypt, Saudi Arabia, Yemen and Pakistan). However, there are bright spots, where significant progress has been achieved. Full parity on this indicator is already a reality in five countries (Bahamas, Colombia, Jamaica, Lao PDR and Philippines); and in another 19 countries there are at least 40% of women in managerial positions. - In terms of broader economic power, gaps in control of financial assets and in time spent on unpaid tasks continue to preserve economic disparities between men and women. Women have as much access to financial services as men in just 60% of the countries and to land ownership in just 42% of the countries assessed. Also, among the 29 countries for which data are available, women spend, on average, twice as much time on housework and other unpaid activities than men. - Although average progress on gender parity in education is relatively more advanced than in other aspects, there are still 44 countries where over 20% of women are illiterate. Similarly, near-parity in higher education enrolment rates often mask low participation of both men and women. On average, 65% of girls and 66% of boys have enrolled in secondary education globally, and just 39% of women and 34% of men are in college or university today. This fact calls for more ambitious goals to better develop human capital—for both women and men. - With the rapid changes underway in today’s labour markets, our analysis this year also took a look at gender gaps in Artificial Intelligence (AI), a critical in-demand skillset of the future. Based on collaboration with LinkedIn, we find that only 22% of AI professionals globally are female, compared to 78% who are male. This accounts for a gender gap of 72%, which has remained constant over the last years and does not at present indicate a positive future trend. The implications of this finding are wide-ranging and require urgent action. First, AI skills gender gaps may exacerbate gender gaps in economic participation and opportunity in the future as AI encompasses an increasingly in-demand skillset. Second, the AI skills gender gap implies that the use of this general-purpose technology across many fields is being developed without diverse talent, limiting its innovative and inclusive capacity. Third, low integration of women into AI talent pools—even in industries and geographies where the base of IT talent has a relatively high composition of women—indicates a significant missed opportunity in a professional domain where there is already insufficient supply of adequately qualified labour. - Projecting current trends into the future, the overall global gender gap will close in 108 years across the 106 countries covered since the first edition of the report. The most challenging gender gaps to close are the economic and political empowerment dimensions, which will take 202 and 107 years to close respectively. Although the economic opportunity gap has slightly reduced this year, the progress has been slow, especially in terms of participation of women in labour force, where the gender gap slightly reversed. In terms of political empowerment, the progress achieved over the past decade has started to reverse. Remarkably, gender parity in Western countries has slightly reduced, while the progress is ongoing, on average, elsewhere. The education–specific gender gap is on track to be reduced to parity within the next 14 years, slightly faster than last year’s estimation. The health gender gap—although slightly larger than it stood in 2006—is nearly closed globally, and fully closed in a third of the countries assessed. - The most gender-equal country to date is Iceland. It has closed over 85% of its overall gender gap. Iceland is followed by Norway (83.5%), Sweden and Finland (82.2%). Although dominated by Nordic countries, the top ten also features a Latin American country (Nicaragua, 5th), two Sub-Saharan African Countries (Rwanda, 6th, and Namibia, 10th) and a country from East Asia (Philippines (8th). The top ten is completed by New Zealand (7th) and Ireland (9th). - All eight geographical regions assessed in the report have achieved at least 60% gender parity, and two have progressed above 70%. Western Europe is, on average, the region with the highest level of gender parity (75.8%). North America (72.5%) is second and Latin America (70.8%) is third. They are followed by Eastern Europe and Central Asia (70.7%), East Asia and the Pacific (68.3%), Sub-Saharan Africa (66.3%), South Asia (65.8%) and the Middle East and North Africa (60.2%). This year the 149 countries covered by the report include five new entrants: Congo, DRC; Iraq, Oman, Sierra Leone and Togo. Sierra Leone is in 114th position while the other new entrants rank lower. - Similarly, if current rates were to be maintained in the future, the overall global gender gap will close in 61 years in Western Europe, 70 years in South Asia, 74 years in Latin America and the Caribbean, 135 years in Sub-Saharan Africa, 124 years in Eastern Europe and Central Asia, 153 years in the Middle East and North Africa, 171 years in East Asia and the Pacific, and 165 years in North America. While these estimates reflect the pace observed to date towards achieving gender parity, policy-makers and other stakeholders can fast-forward this process and should take stronger actions in the years to come. There is a strong imperative to do so, in terms of justice and greater social equality as well as the economic returns of a broader base of diverse human capital.
<urn:uuid:f298d8e8-61eb-4e6d-aa1b-ad536171735f>
CC-MAIN-2022-33
https://reports.weforum.org/global-gender-gap-report-2018/key-findings/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.947899
1,608
3.375
3
Topic is Air Quality in California or specifically central valley Due to Covid-19, this semester our Poster and Brochure presentations will be conducted via zoom. Each of the 14 groups (not each student) should create a narrated poster using the template provided in the section “Modules- General Guidelines for Poster Presentations and Brochures.” The narrated poster should be maximum 3 minutes. I will show you an example of a narrated poster and a brochure during our class of Sept 23, 2021 so you can start working on this assignment. Once you have a final version of both (poster and brochure) I will be glad to meet with any group if you need further help with applying the readability formulas to your brochures and posters. Make sure to include in your brochure a description of the readability formula you used and the results (i.e. readability level of your brochure). Don’t forget to include the names of the members of the group in your brochure and your poster. * The narrated posters must be completed in Power Point (not PDF or Word). I am attaching a template that you can use to create your poster. The posters and brochures should include information on statistics and programs in the Central Valley related to the selected topic. Delivering a high-quality product at a reasonable price is not enough anymore. That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe. You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more
<urn:uuid:23323caf-8404-4de1-b060-3afb547db0e7>
CC-MAIN-2022-33
https://keentutors.com/brochures-and-poster-presentation-management-homework-help/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.931744
499
1.804688
2
One of Canada's energy giants will make military veterans a priority when hiring new employees. Federal Veterans Affairs Minister Julian Fantino took part in an announcement Wednesday that Cenovus Energy Inc. has joined a program which was announced last fall as part of a government veterans transition plan. "Cenovus Energy is giving veterans new and interesting opportunities to make a successful transition from military to civilian life," Mr. Fantino said. "The type of training that veterans receive, it's regimented, it's geared in many different areas … and things are very well structured," he said. "Very often transitioning into a different kind of environment in civilian life can be challenging." Jim Grecco spent 27 years in the Canadian air force before retiring in 2000. He's now the military liaison manager with Cenovus. "When you get outside the military and you come into industry, you find that there are a lot of things that the military has taught you: communications, problem-solving, leadership," Mr. Grecco said. "Those things are applicable anywhere in this country – whether in uniform or out of uniform – and a lot of military people don't recognize that." Cenovus plans to inform veteran affairs groups of job opportunities, so those looking for work are aware of openings. "If we have equally qualified candidates for the same role, we will offer the role to the veteran," said Jacqui McGillivray, senior vice-president at Cenovus. "We've been actively working with the Canadian military … on opportunities to hire because the quality of individuals from the Canadian Armed Forces is exceptional – the leadership, technical expertise, the experience. They bring great skills into an organization." Cenovus is a leading Canadian oil company which employs about 5,000 people. Its operations include oil sands projects in northern Alberta and natural gas and oil production in Alberta and Saskatchewan. It's the first energy and utility company to participate in the job creation initiative. Toronto's Hospital for Sick Children was the last organization to sign on to the program a few months ago. Mr. Fantino said support for the program is growing. "Certainly the private sector recognizes more and more the value, the skill sets, the discipline … and the kind of opportunities that are inherent to the training and experience the veterans have had," Mr. Fantino said.
<urn:uuid:bacd502f-f10a-4f82-b1bf-9ffed1492b8b>
CC-MAIN-2022-33
https://www.theglobeandmail.com/report-on-business/industry-news/energy-and-resources/cenovus-energy-to-give-military-veterans-priority-when-hiring/article14260694/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.968319
490
1.515625
2
Traveled to Newport, Rhode Island, to collect debts for a London firm (1761). Member of a group that made itself intensely unpopular, just before the Stamp Act crisis, by seeking to revoke the Rhode Island charter. Later brought before the Rhode Island House of Deputies on a charge of Loyalism; convicted and imprisoned. Went to England (by July 1779). Estate confiscated (1780). Served as an agent to prosecute Rhode Island Loyalists’ claims to compensation (1780s).
<urn:uuid:2a5b3a50-ef8c-4570-b1ec-24f7f88c10bf>
CC-MAIN-2022-33
https://franklinpapers.org/bio?ssn=001-81-2850
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.935286
106
2.171875
2
Review By JENNIFER GANNETT In our house, we’ve really enjoyed a math-themed book by the author of Apples, Cherries, Red Raspberries: What is in the Fruit Group? and since it has been such a beloved read, so I was excited to see what this book all about fruit would be like. In general, it is an enjoyable read. The book discusses all different types of fruit and their health benefits, doing so in a pleasing rhyme. (This may be the first time you realize that honeydew rhymes with the phrase “number two.”) The illustrations are lively and serve to reinforce the silly elements of the book. There was a major disappointment in this book though, and that was that this book extolling the virtues of fruit managed to incorporate an insensitive portion discussing hooking, frying and boiling fish. Sensitive children and adults will want to give this book a pass. If you are willing to abide a page about fishing, the fruity elements of this book are fun and serve to reinforce the idea that fruit is healthy and yummy. It is unfortunate that even a book about fruit depicts the veg-unfriendly idea of hooking and cooking fish. Ages 5 and up.
<urn:uuid:b49c9129-0937-4f95-84d4-f71936a09e3b>
CC-MAIN-2022-33
https://vegbooks.org/index.php/2011/04/08/apples-cherries-red-raspberries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.972909
264
2.3125
2
What you should know before becoming an Online Teacher There are a lot of challenges and question marks that bombard you as you begin your career in teaching so it’s best to understand what you should know before becoming an online teacher. This article is more so directed to the teachers who are teaching one-to-one students. However, those who work in a company with group classes might have similar issues too! This article will be looking at the top 10 things for what you should know before becoming an online teacher. Don’t be afraid of silence As a teacher, it might be awkward if there is silence in the online class. This is especially true if you are teaching one-to-one. You might find staring at the camera screen for 20 to 30 seconds strange but be relaxed. You should realize that the students need time to think, and that’s fine. Experts suggest that students should speak 80 percent in an online class. The teacher should be speaking for 20 percent keeping it as enjoyable as possible while incorporating bits of knowledge meticulously throughout. Don’t take payments after the class Taking the payments after the class can disrupt your relationship with the student. You would have to message the student for reminders repeatedly, which you might feel awkward too. This could also result in losing the student as some individuals don’t pay off easily. It is better to make the payment in advance to overcome this mess. The best way is to offer a free demo class of half an hour, and if the student is interested, you can offer them a package of ten lessons. Keep in mind, take payment in advance. In this way, you won’t disrupt your professionalism with the issue of delay in money and you won’t have to worry about being ripped off. If you’re working for a company, you will have to accept payments monthly more often than not. If a company shuts down or goes out of business (especially an online English company from China) there is a good chance they won’t pay the last month’s salary. Be careful with these situations. Don’t do too many classes in a row Some overly ambitious teachers can make the mistake of booking eight hours straight for lessons. This can cause burnout rather quickly leaving you questioning your choice of career. Relax. Leave time in your schedule for bathroom breaks and lunch breaks. The online sessions can be mentally exhausting. Keep your mental health sharp and give yourself room to sit back and breathe. Always keep at least 10–15-minute breaks between classes. Don’t get too personal One more thing to remember is to keep a fine line between personal issues and regular discussions. You are not a therapist. The student might at times start trusting you with their emotional state. They could be depressed and consider you their therapist. you should try to avoid this and tell their parents if they are teenagers or children. If they are adults, you can suggest they go to a therapist, etc. It’s best to leave any advice you give them open-ended. You don’t want responsibility for a bombshell going off in the students’ lives because you gave them subjectively bold advice on a personal matter. However, encouraging them with a few kind words is never a bad idea. “Keep your chin up” “Stay strong” or “I believe in you”. Now let’s focus on some English for now. Don’t accept extra work without payments Some students might need extra help if their exams are coming up. Obviously, homework correction is your duty, and checking three to five writings per week is fine. Still, if a student needs extra help or wants to get extra homework checked, then you should negotiate extra payment. Especially if you have twenty to thirty students, which means you can’t cope with this amount of work easily. This also goes for specialized classes such as debate, business, etc. An extra charge for a specific niche of learning is necessary in most cases. Don’t set unrealistic homework goals One more thing to keep in mind is setting homework goals that students can easily do. Sometimes the student or parents might ask for loads of homework, and it might take hours to plan it. However, if the student gets busy due to workload or exam pressure, then this might lead to frustration. The student might be worried about the teacher getting upset. Whereas you might get frustrated over no response to the homework allocated. Don’t plan too much Don’t over plan and be strict with timings; instead, be relaxed and go with the flow. Reality isn’t like that, and the student can ask any question that is not expected, or the discussion can prolong. You should keep an overall plan and let the class go in a smooth, productive way. Don’t choose narrow topics for lessons When teaching General English, be sure to choose common topics that every student has good knowledge about if you have group classes. The students generally belong to diverse ethnicities and choose those types of topics which you can talk about with ten different students, such as “what’s your favorite restaurant?” In this way, you would be able to hold a good command over the lesson and keep it interesting and fun so the students can speak as much as possible. Be prepared for technical issues You should anticipate and have a plan B if any technical issue occurs, such as the Wi-fi stopping working or there being an electricity cut-off. You can do so by keeping your Mobile hot-spot on to replace wi-fi and keep your charger close by for laptops. In case there is a fault on your side, then try giving extra time, so the student doesn’t feel as if the teacher didn’t give enough time. Online teaching is rewarding and challenging at the same time (What you should know before becoming an Online Teacher) Online teaching comes with a lot of pros, and you are your boss. You can set your own flexible timings and rates. Watching a student’s progress is pretty delightful as well. You work from the warmth of your home, and that is an incredible part about our generations work. However, on the very same hand, there are some challenges that you have to face too. Too much screen time isn’t good for your health. You need to do some exercise too. Also, sometimes you might be busy over the weekends, which can be troublesome to manage. However, you should try to balance work and life and enjoy this beautiful career that creates other professions! Hope this article brought some fruitful do’s and don’ts for what you should know before becoming an online teacher. Keep a balance, be dedicated, and be positive. After all, everyone learns from their mistakes. Also, you can find more teaching tips HERE.
<urn:uuid:099730b9-f06e-4ff9-87ac-d55befca0048>
CC-MAIN-2022-33
https://eslwild.org/what-you-should-know-before-becoming-an-online-teacher?quad_cc
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.964016
1,425
1.992188
2
Canon is a giclee print by Damien Hirst produced in an edition of 50. The print shows a circular arrangement of butterfly wings, entirely symmetrical and depicted in tones of cream, brown and grey. Hirst removes the butterfly wings from the idea of a real butterfly in the world by abstracting the wings into a decorative pattern with a cohesive colour palette. For Hirst, the butterfly is a ‘universal trigger’ that many people share in finding attractive and joyous. Recalling someone once saying to him: “Butterflies are beautiful, but it’s a shame they have disgusting hairy bodies in the middle,” Hirst in works like this chose only to display the butterfly’s dazzling wings and not their bodies. Speaking to the artist’s preoccupation with the concept that art mirrors life, his use of the butterfly motif has remained prominent throughout his career. Not only is each butterfly born with a unique pattern that mimics the individuality that frames much of human life, but the butterfly for Hirst symbolises growth, change, life and death. The butterfly motif appears both in printed editions as well as in installations where visitors are situated in a room of live butterflies.
<urn:uuid:d82319f1-db5d-45f7-9158-f23f47663f7c>
CC-MAIN-2022-33
https://www.myartbroker.com/artist-damien-hirst/artwork-canon-signed-print
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz
en
0.953369
250
1.789063
2
Oak Park is still exploring the idea of giving free parking to electric cars, five months after the notion was first pitched to the village board. But trustees suggested that the village needs to go a little further, if it wants to make an environmental statement with the new policy. Back in May, Oak Park started talking about the possibility of allowing 100-percent electric cars to park free for two hours at village parking meters. Such an offer, village officials said, might encourage people to buy those vehicles, and make the community look like a hotspot for green automobiles. “What we’re trying to do here is make a statement,” said K.C. Poulos, sustainability manager for the village. Monday, trustees got their first look at a draft ordinance, which would allow the free parking for the next two years, until the ordinance sunsets. Electric vehicles parking anywhere else would follow the normal regulations. Trustees, however, felt the proposal was too unambitious, and wouldn’t entice a significant number of people to look at electric vehicles. “I’d rather say an electric car gets to park free everywhere,” said Trustee Jon Hale. Village board members expressed worry about having electric vehicles hogging valuable on-street parking spots, and they instead suggested that the cars be steered to public parking garages. Trustee Glenn Brewer also questioned whether the proposal would take a big chunk out of village revenues, though Village Manager Tom Barwin estimated that it would affect less than $3,000 in parking revenues. Oak Park is hoping to become something of a destination for electric car enthusiasts. The village is getting a public solar-powered electric car charging station installed somewhere in the community by ComEd next year. And Oak Park has been working to recruit an electric car dealer here, Poulos said. Village staff plans to retool the ordinance and bring it back to the board in the coming weeks for a final decision.
<urn:uuid:b35c38e6-b769-4f1d-9c17-603622284818>
CC-MAIN-2022-33
https://www.oakpark.com/2010/10/05/oak-park-hopes-electric-cars-become-a-craze-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.968426
406
1.9375
2
Time to Explore: The long days of summer, with the sun rising at 6:30 AM and setting close to 10:00 PM, lend themselves to unhurried, lengthy swatches of time. These hours can hold many opportunities for children and adults to engage in unfamiliar activities and discover new skills. Time for free play and exploration is a commodity during our workaday, technology-filled lives, but Camp Klicek in Malejovice, Czech Republic provides exactly this to children and families affected by illness and loss. In the photo above, two seven-year-old boys get their hands on a saw, as they break down a tree branch in preparation for the campfire that all the campers will enjoy. Besides being fun, the boys are building their muscles and coordination, getting some great proprioceptive feedback, practicing cooperation and self regulation, not to mention problem solving. Their self esteem gets a healthy boost as they accomplish something new and contribute the the camp community. These are some of the attributes of spontaneous play that adults should take note of as we consider the developmental, social and emotional needs of all children Sometimes structured games can lend themselves to learning through play that is so much fun that kids forget that they are learning. On this day, the campers were divided into three teams, and each team had four tasks to compete. They had to find a way to measure a liter of liquid, a kilo of sand, the length of a meter, and the span of a minute, all without the use of measuring devices. The camp was alive with children gathering sticks, pouring water, scooping sand into sacks and counting out loud and in their heads, as the teams competed to see who could get the closest to the actual measurement. On another day, volunteers from the Accace Corporation brought a day of activities to the campers. In the morning, they set up tables in the summer garden and mess tent, including paper arts and crafts, flower pot decorating, a drink mixing table with great recipes for virgin mojitos, margaritas and pina coladas, and a beauty salon station with face, body, and nail painting. Kids explored their artistic sides and wore their art with pride. In the afternoon, the company volunteers set up an activity course in the forest, replicating what is entailed in working for a big company. My favorite station was the accounting department, where the employee had to take a fist-full of invoices and chase after the client to whack them with the papers to make them pay their bills! And the other one I loved was a station where kids were taught the art of communication. They were told that communication is the lynchpin of success, and in order to practice communication skills, they had to stand on one side of an easel and describe a picture to their coworker on the other side, who had to paint of draw what that person was describing. It was a tough but very fun challenge for the kids. In yet another station, the children ran through the forrest balancing cups of coffee they had made for their boss, trying to get to their boss’s office to sign power of attorney documents without spilling a drop. Sharing Skills With Others Many of the campers had their own skills to share and teach. Here are several of them, starting with an 18-year-old who made up a rap song on the spot. One 14-year-old camper had a lot of skills, including bugle playing, fire breathing (So sad I didn’t get that on film!!), and archery. Here he is teaching another teen how to shoot a bow and arrow. This young magician taught us all how to get a 100 Crown bill out from under a beer bottle without touching the money or the beer. This artist created a virtual masterpiece depicting several scenes on one ceramic pot. And even the youngest of the campers showed their talents. Whether it was my lunch-mate practicing his English, or a shy kid joining in on a new ly introduced American game of “Happy Salmon”, the kids never ceased to amaze me with their willingness to take risks, learn and share. I watched with admiration as this 6-year-old moved with the utmost patience and precision in a game of pick up sticks. Nothing raises kids up to their potential the way play does. You can see the pride glowing as their self esteem grows by the second. And I feel so blessed to witness and participate in this play at Camp Klicek! Happy Summer!
<urn:uuid:5bb985e2-5914-4a36-9dfe-f36f9f7f465f>
CC-MAIN-2022-33
https://pediaplay.com/tag/camp-klicek/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.976427
944
1.992188
2
The « Escape casse »: an educational game on the expected behaviour to adopt when a cytotoxic bottle breaks Healthcare professionals’ training through a serious game allows for better learning. Amongst risky situations towards staff and environment, the breakage of a bottle that contains some cytotoxic product remains the most critical incident. An educational escape game about this topic was set depending on good health simulation practices. Setting the professional into some realistic environment to have him acquire skills and update his knowledge through an escape game on the expected behaviour to adopt when a cytotoxic bottle breaks. A workgroup (pharmacists, residents and health manager) created a scenario based on the procedure to follow when a cytotoxic bottle breaks. The playing of the game follows key steps: instructions, setting, critical analysis and evaluation. The session lasts 30 minutes and is divided into three steps: briefing (5 min), scenario (15 min) and debriefing (10 min). During the timed scenario, a team of three people has to solve four riddles. These ones cover the main steps of the expected behaviour: to warn, protect yourself, get rid of the anticancer agent and decontaminate. By solving the riddles (cloze test, odd one out word elimination…), the team moves forward through the scenario and gets to a debriefing room. During the debriefing, a participant performs a simulation of the expected behaviour in case of bottle breaking, with his team and manager’s help. Finally, they are given a 10-question anonymous satisfaction survey about the game (general opinion, suggested improvements, other topics…). Six teams (one storekeeper, four pharmacists, 12 pharmacy technicians and one health manager) participated. The mean time to solve the scenario was 14"31[8"23-19"35]. 83% (n=15) of them considered the timing was well adapted. 89% (n=16) of the participants find the process very satisfactory. 78% (n=14) of the participants considered they had updated their knowledge. Half of the participants considered the difficulty level as easy and the other half, relatively easy. Taken as a whole, the four main steps were remembered, but four teams asked for a clue about the safety outfit. They all wanted to repeat the experience with another topic (manipulations under insulators, regulations, traceability, expected behaviour in case of an incident in controlled atmosphere areas…). The participants were satisfied with this new training model and considered they had some update and a backup of their knowledge. This educational game is a good way to convey and apply strong messages among pharmacy department. Adapting this training model to validate an initial training is being considered.
<urn:uuid:11895abe-c88f-4ff1-89c7-4078342920ac>
CC-MAIN-2022-33
https://www.gerpac.eu/the-escape-casse-an-educational-game-on-the-expected-behaviour-to-adopt-when-a-cytotoxic-bottle-breaks
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.951072
569
2.421875
2
Several safety infractions caused a fatal train derailment of a White Pass and Yukon Route work train in 2006, according to Canada’s Transportation Safety Board. The derailment killed one man and seriously injured three more. The train was too heavy; each car was overloaded and the locomotive was pulling more cars than it could handle, said the board’s 32-page report, issued Thursday. Train maintenance records were not kept, brakes on some ballast cars were not adequate and there were no markers explaining weight limits or loading procedures. Also, none of the personnel were trained on car capacity and loading, how to use the brake equipment or how to deal with emergencies. “They took what they thought was safe because that’s how they were educated,” said Terry Toporowski, regional senior investigator for railways and pipelines at the board. “There were no regulations on how many cars it could take, there was no guidelines on the weight on the train, and no guidelines on how to load them,” he said. And there was no risk analysis done in regard to speed, he added. Safety deficiencies on the White Pass and Yukon Route were identified in 2003, but Transport Canada “missed an opportunity to rectify” them, said Dan Holbrook, manager of western regional operations for railways and pipelines at the safety board. “Transport Canada is focusing the bulk of its attention on the class 1 transcontinental railways,” he said. “It appears that the development of the safety system on the White Pass and Yukon Route went somewhat under the radar screen.” In 2003, Transport Canada told the White Pass and Yukon Route railway that it had failed tests in nine out of 10 safety risk areas. They were mainly regulatory issues, said White Pass president Gary Danielson. The company put in a safety plan and had it approved by Ottawa. The route runs through perilous mountain terrain from Skagway through the White Pass to Carcross. It carries 500,000 tourists a year. But Ottawa never followed up to see how regulations were being implemented. Three years later, the train derailed. According to the board, the crew members weren’t trained to deal with a runaway locomotive. “(The crew were) passing down information by word of mouth almost,” said Toporowski. On September 3, 2006, during the tourist off-season, the White Pass crew decided to load eight ballast cars at Log Cabin, British Columbia, before heading north. Previously, the crew had never taken more than four. The load was so heavy that the train had trouble moving after filling the seventh car. So the crew put four cars onto a side rail, filled the eighth car, and the four released cars were re-attached. The train’s engineer and two heavy equipment operators sat inside the locomotive, while the conductor stood on a platform outside the cab. Three kilometers out of Log Cabin, the train performed a controlled stop to set brake retainers in a high-pressure position. Retainers are used on air brakes to conserve pressure to provide better brake control. The brakes were released and the train slowly began rolling. A kilometre and a half farther, the train entered a curve and its speed climbed to 19 kilometres per hour. The engineer held onto the brake for 30 seconds for the pressure to rebuild before pushing on the automatic brake. But the train’s speed only increased. The engineer then put pressure on the independent brake to regain control. Soon the train hit 28 kilometres an hour, and the engineer slammed the automatic brake, bringing it close to full capacity. Smoke began flowing from the wheels. At 32 kilometres an hour, the engineer realized the train was a runaway and made an emergency call. But there was no radio reception and no one heard the call. The train kept gaining speed. After another 1.5 kilometres, the runaway train hit a deadly 16-degree left-hand curve. The conductor jumped off the speeding train and fell into a small stream. The train then left the rails and crashed into the earth along the bend, destroying six cars. The engineer and the two heavy equipment operators were trapped inside the cab. One of the operators was half buried under rubble. After extricating himself, he was able to revive the engineer. They radioed the railroad’s road master, who was following the train on a track motorcar. The road master found the trapped crew. He then found the conductor incapacitated in the stream and pulled him from the water. Emergency medical services from Tagish and Skagway arrived an hour after the road master used his radio for help. The rescue effort was mired by radio trouble and relay stations had to be set up to organize the first responders. The conductor was flown to hospital. Emergency crews freed the equipment operator an hour an a half later. The deceased equipment operator took another three hours to unearth. His body was buried in the nose of the locomotive. The safety board has demanded changes to the route’s safety precautions. White Pass and Yukon Route must now provide full training on safety, better maintenance of the cars, operating instructions in mountain territory and ballast car loading procedures. The train was also not allowed to run until secure radio communication could be established between Bennett and Carcross. “We’re comfortable that the actions we reported on are commenced and are underway,” said Holbrook. The railway has also provided training for personnel on loading limits, installed retainers on all ballast cars and trained crews on how to use them. The company also purchased a satellite phone for the route north of Bennett and hired a full-time safety manager. But it’s unusual these actions weren’t taken earlier. “You would expect a railway, particularly a railway operating in an extremely mountainous area, to have well-defined and concise operating practices,” said Ian Naish, director of railway/pipeline investigations for the board. “(You would expect) practices that guided employees on the maximum loads that their rolling stock can carry, or practices and procedures on how rolling stock were maintained, and training regimes that would ensure that employees knew how to operate the equipment that they were working with,” said Naish. The White Pass route is a small-fry on Transport Canada’s to-do list, but it’s more popular and more dangerous than most small-scale heritage trains. “It (has more riders) than any other heritage railway that I’m aware of,” said Naish. It’s one of the few heritage railways under federal jurisdiction and the board has not dealt with any safety issues with other heritage trains in the country, he said. Under the radar from regulators, these locomotives rely on their crew’s know-how to keep them safe. The train’s engineer had 29 years of experience while the conductor had worked for the railway for 26 years. But experience wasn’t enough to prevent the deadly derailment. “There were no rules in place to prevent them from doing what they did,” said Toporowski. Contact James Munson at email@example.com.
<urn:uuid:9689d216-3b53-4566-b078-33b29f610f90>
CC-MAIN-2022-33
https://www.yukon-news.com/news/no-brakes-no-training-no-chance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.973009
1,548
1.78125
2
Mentoring, encouragement and guidance are integral to our success. You can’t go to the store and buy them, someone has to give these gifts and care enough to do so. Mr. Obama personally knows the importance of a father figure in children’s lives and the consequences of a lack there of. It is obvious this was a deeply personal moment in his presidency. Though, this the 5th year of his term , and the need is eminence, better late than never, Mr. President. One point he made was that the young men of color would be held accountable to do their part in making good choices. All Americans can agree and wish these and all young men, a productive and successful life!
<urn:uuid:11b9097a-df88-4473-97d2-6fa6d3203c98>
CC-MAIN-2022-33
https://talesalongtheway.com/2014/02/28/president-obama-announces-my-brothers-keeper-initiative/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.982355
152
1.632813
2
The patient from my HPI tolerated his cardiac catheterization procedure well. However, later this week I saw another patient for whom the outcomes were way less favorable. During the catheterization he developed a pericardial effusion which quickly turned into a tamponade, he then required a pericardiocentesis resulting in V-fib, cardioversion and a pacemaker placement. This article published on June 22, 2020 reviews Catheterization Risks and Complications Cardiac catheterization is one of the most widely performed cardiac procedures. In the United States, more than 1,000,000 cardiac catheterization procedures are performed annually. As expected, in any invasive procedure, there are some patient related and procedure-related complications. The procedure can be either diagnostic or therapeutic, and interventional cardiologists can perform a variety of interventions depending on the clinical need. The procedure is done in the evaluation and the treatment of the following conditions. - Coronary artery disease - Measuring the hemodynamics in the right and left side of the heart - Evaluating the left ventricular function - Evaluation and treatment of cardiac arrhythmias - Evaluation and treatment of valvular heart disease - Assessment pericardial and myocardial diseases - Assessment of the congenital heart diseases - Evaluation of heart failure Before planning for this procedure, the clinician should have a clear understanding of the clinical question that needs to be answered. Basic workup includes a complete blood count (CBC), basic metabolic panel (BMP), prothrombin time, electrocardiogram and chest x-ray. The risk of major complications during diagnostic cardiac catheterization procedure is usually less than 1%, and the risk and the risk of mortality of 0.05% for diagnostic procedures. For any patient, the complication rate is dependent on multiple factors and is dependent on the demographics of the patient, vascular anatomy, co-morbid conditions, clinical presentation, the procedure being performed, and the experience of the operator. The complications can be minor as discomfort at the site of catheterization to major ones like death. ~Poorly controlled hemostasis post sheath removal ~Thrill or continuous bruit, likely to need surgery ~Dissection/Perforation of Aorta or cardiac chambers ~Coronary or cardiac chamber perf – tamponade ~Thrombosis and embolism (Including atheroembolism) ~ Death – less than 0.05%, up to 1% in some subsets ~ MI – less than 0.1% ~ Stroke – up to 0.4% in clinical intervention, less if diagnostic The occurrence of the ventricular fibrillation or ventricular tachycardia during the procedure could be related to irritation or ischemia of the myocardium by the catheter, contrast material or occlusive balloons. These arrhythmias occur more frequently in people presenting with acute ST- elevation myocardial infarction and treatment includes cardioversion along with anti arrhythmic drugs and restoration of the flow to the occluded artery. Atrial tachyarrhythmias can occur following the irritation of the right atrium during right heart catheterization and is usually self- limiting. Transient brady arrhythmias are also a common occurrence in the cardiac cath lab. Prolonged episodes resulting in hypotension will need treatment with intravenous atropine, or temporary transvenous pacing. In people with preexisting right bundle branch block, development of the left bundle branch block during right heart catheterization may result in complete heart block, and this can be avoided by minimal catheter manipulation in right ventricular outflow tract. With the advent of the small catheters, increased use of the transradial approach, and improving technical skills of the operators, the risks and complications associated with cardiac catheterization have decreased significantly. There is increasing evidence that transradial approach for cardiac catheterization reduces associated complications and improves patient comfort compared to transfemoral approach.
<urn:uuid:66ef77ba-a822-4242-9090-167e8afe2488>
CC-MAIN-2022-33
https://cshamrock.commons.gc.cuny.edu/2021/04/04/em-cardiac-catheterization-article/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.903341
887
1.757813
2
What you’ll find out in Python for Information Analysis: detailed with tasks - How to make use of Python for information analysis - Get to an intermediate degree of Python - Experience analyzing real-world datasets in lectures as well as guided projects - Utilize Python data evaluation collections (Pandas, Scikit-learn, Seaborn) - Import, examine, export information in Python - Manipulate information - Clean information - Change information - Compute recap stats - Produce data visualizations in Python - Usage JupyterLab/Jupyter Notebook Welcome to your Python for data evaluation course! This course uses 11 hours of HD video clip talks, detailed code notebooks, 3 led method tasks, based upon numerous real-world datasets. This course will certainly guide you to gain from scratch just how to analyze information successfully in Python. By following this program, you’ll acquire useful experience analyzing real-world datasets. To ensure that by the end, you’ll be able to conduct your very own evaluation with Python, and essence important insights that can change your business! What are the design concepts of the program? Who this course is for: - Anyone who wants to learn about Python/data analysis, in a practical way - Anyone interested in starting their journey into data science! |File Name :||Python for Data Analysis: step-by-step with projects free download| |Genre / Category:||Development| |File Size :||6.48 gb| |Publisher :||Lianne and Justin (Just into Data)| |Updated and Published:||07 Jul,2022|
<urn:uuid:65ef66e5-e8a7-487e-8cfa-905b75cd51a7>
CC-MAIN-2022-33
https://freecourseplanet.com/python-for-data-analysis-step-by-step-with-projects-free-download/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.851619
364
2.46875
2
Debts are critical financial problems that pop up in anyone’s life at any time. In some cases, the present financial condition might be responsible. On the other hand, your attitude towards money can pave the way for the accumulation of debts. The sooner you pay off debts, the better it is for your finances. But you might struggle to get rid of debts if your income is low. It could be a potential hindrance in making your life free from debts. You can overcome this hurdle with systematic steps. So, it does not matter if your income is low or high. You can achieve this hard-to-reach objective easily. For this, you might have to work on a tight budget. But some emergencies just need immediate loan help. You can turn to a guaranteed payday loan to have an assured funding assistance. Make sure to get it from a direct lender. These uninvited situations are accountable for racking up debt. You must try to handle your finances carefully so that you can prevent these unwanted problems. But you might have already landed on such a problem and seeking ways to escape it. But you are stuck with your low income. Don’t worry! This blog is ready to help you discover different ways to accomplish this objective. Helpful hacks to follow to be debt-free Income is not the only factor that can fast-pace the process of debt payment. You need to introduce some vital steps in your financial system. Check these here: Evaluate the amount of debt you possess To begin with, you must determine the amount of debt you already hold. You might feel troubled to see the pile of debt accumulated for you. But calm down your mind. After that, the next step would be to accept that you have created this small amount of debt. You cannot start the debt-eliminating process if you are unaware of the quantity of debt racked up for you. Moreover, knowing the actual figure is pivotal for you if you are planning to pay off debts. To gather information about debts, list out the following things: - Credit card statement - Monthly bills - Bank statement - Interest rates - Late fees - Penalties etc You must get a complete overview of the status of debts in your life. Then, you can think of how to address the issue. Prevent the formation of new debts People often make a mistake in their endeavor to get relief from debts. They consider borrowing money from outside sources to pay off debts. It is not an effective approach. The reason is it will create new debt instead of reducing the level of past debts. Don’t follow this step! It would be better if you looked for a new balance transfer credit card. You might wonder how a credit card can help you in this situation. It is also a form of debt. But these cards come with a 0% APR introductory offer. If needed, you can resort to ways like consolidation of debts to a single debt. It must totally depend on your convenience and affordability. Formulate a budget The budget has multiple benefits. You can even deal with debt problems with effective budget planning. The reason is that it helps segregate income and expenses. With it, you can understand the type of expenses you handle every month. This way, it tells you how you can adjust expenses to make arrangements for extra finances for debt payments. It will also point out the saving amount you have stashed away. Start with payment of small-sized debt. Now comes the payment part. Until now, you took into account your financial situation, the present quantity of debts, and income and expense balance. Out of a hurry, you might feel the urge to pay off large-sized debts first. But don’t forget that your current financial condition is not adequate to cover the big debt. So, the ideal thing is to attend to small debts in the first place. It might be a small win for you. But if you follow this step-by-step approach, you can beat the ultimate target easily. You can apply the popular debt payment method like the snowball method, avalanche method, etc. The smallest debts are comparatively easy to handle. You can adjust money from here and there to arrange for a small payment if you try. Pay attention to large debts Don’t get overwhelmed by meeting small debts! You have large debts to cover also. You should concentrate on large debts because it will prevent a large amount of interest from accruing. You can take the assistance of different approaches that fetch you desired results. Enlarge your income streams Your temporary unemployment or self-employment could be behind such situations. So, the best solution would be to increase your income. Search for a new job. Besides, you can run a side hustle to make up for the debt amount till you get a new appointment letter. Freelancing is a good option as it allows you to earn money and manage time to attend interviews for a new job. Check if you can get back fees and charges. Maybe, you are charged incorrectly for debts you owed. You can ask for a claim if these charges are unfair. Insurance policies are the best sources where you can find so much of unclaimed components. You can even approach the bank that might have imposed fees that you are not supposed to pay. You must mail your concern right now. The bottom line Don’t feel upset because you don’t earn enough money to disburse debts! You can do it despite having this drawback. Your income could be low since you are working on part-time projects. For temporary purposes, you can opt for loans for unemployed people to manage debts and necessary expenses. But borrowing over and again will have a negative impact on your financial profile. So, be careful. You can also try out some effective strategies that enable you to tackle debts with low income. You can even implement any plan that you think will be best for your situation.
<urn:uuid:c8015d22-0ea7-4c33-ad3a-42f2b8e174e0>
CC-MAIN-2022-33
https://www.aonefinance.co.uk/blog/is-it-possible-to-handle-debts-when-your-income-is-low/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.947582
1,241
1.75
2
We’ve been really excited to be working with Jack Neely and the Knoxville History Project. Not only is it great to be working with our region’s most prominent historian, but it gives us a chance to experiment with different formats. Until now, our Hard Knox Histories installments have been in the form of straightforward articles. J.J. and Jack would decide on a topic, J.J. would interview Jack, and then J.J. would write it up as a traditional article. There was nothing wrong with this process, and many of you seem to have liked it. This time around, however, instead of doing a face-to-face interview, they did their question-session answer session via email. The end result was that we ended up with approximately 1,550 words of Jack’s prose and, candidly, J.J. didn’t feel that he could improve it at all by rewriting it or turning it into a conventional piece. Jack is, after all, the author of numerous books and countless articles, and his distinctive style has been greatly missed by many readers since the demise of Metro Pulse and The Knoxville Mercury. The topic this week is the history of one of Knoxville’s most idiosyncratic neighborhoods, Fountain City. Although he’s a third-generation Fountain City resident who’s in the process of raising a fourth, J.J. is (like many of us) woefully deficient when it comes to knowledge of his community’s background. One of the reasons, in fact, that J.J. wanted to explore this subject was to learn something about the community that he’d heard so many stories about while growing up…. JJ: When did European settlers first start moving into the area of North Knoxville now known as Fountain City? I assume (please correct me if I am wrong) that this was Cherokee territory before the 18th century and that there are few, if any, written records to derive a history from before the Europeans arrived? JACK: To my knowledge, Native Americans are not known to have lived in the Fountain City area. The nearest Cherokee villages were about 40 miles to the southwest, along the Little T. But 250 years ago, one might encounter an occasional Cherokee hunting party in this area. There are believed to have been villages of unknown tribes of the Woodland or Mississippian era in Knox County long before the arrival of Europeans, but most of the evidence of them is near the rivers. Their relation to the Cherokee, if any, is unclear. Theories about the pre-Columbian natives are always evolving. The first European settler in the area that I know of was John Adair, an Irishman from County Antrim who came to America when he was almost 40. He joined the patriots in the Revolutionary War, helping mainly financially, I think. He moved to the Fountain City area in 1788, and built a cabin and a small fort, known as Adair’s Fort. He probably made the Fountain City area seem easier to live in, but it remained pretty sparsely populated in his lifetime. Most of his business was five miles south in the new capital of Knoxville, and he was a leader of the First Presbyterian Church there, and was a founding member of the Board of Trustees of Blount College, which evolved into the University of Tennessee. I assume he did a whole lot of riding back and forth, along the route we now know as Broadway. He was one of the older settlers of Knox County, and was about 60 when Knox County was founded. He can also be considered one of the founders of Tennessee. He was one of only two Irish immigrants among the 55 settlers who signed the Tennessee Constitution of 1796. He outlived many younger settlers, then died when he was about 95. JJ: What was the area like through the 19th century? I imagine it was mostly farmland with maybe a road or two, such as Broadway? JACK: The earliest road through Fountain City area was probably Emory Road, which I believe slightly predates Knoxville as a settlers’ road west. I believe Broadway is a very early road, though. It was known just as Broad Street in the 19th century. Fountain City had farmland, but it was pretty different from most farming areas in that it was also famous as a place to visit. A spring flowing out of a hillside—that was what they called the “fountain head”–was believed to be especially healthy. That brook (it flows through Fountain City Park, a tributary of First Creek) probably had no medicinal properties, yet the area was considered an especially pleasant and healthy spot. So much so that by the 1830s, it was attracting “camp meetings,” sort of like an evangelical Bonnaroo, where people would camp out several days to hear religious music and emotional sermons in big tents. You could almost claim that Fountain City Park dates back to that era. JJ: Did the area play any role in the Civil War? JACK: No major role. You could probably hear the siege of Knoxville from there. I believe some of Longstreet’s Confederates, when they retreated to the northeast after the failure of the siege, may have rode or marched through the future Fountain City area in December of 1863. J.J.: My limited understanding of the area tells me that some sort of resort or hotel was central to the areas development in the late 1800s/early 1990s? Was this the origin of the locally famous Fountain City Lake? And where did the name Fountain City come from? JACK: By the 1880s, cities like Knoxville, with coal-fired industry, were getting crowded, noisy, and dirty, and there was a new demand for a clean, quiet refuge away from all that. The Fountain Head Hotel opened about 1886, right near the old springs. It was a pretty fancy place, with hot and cold running water and multiple balconies and live music for dancing. Fountain City Lake was built around 1890 as part of the hotel. They made it a heart-shaped lake, I assume because they considered it a romantic spot. I don’t know how many people think about that today. For a few years, it was a significant destination attraction, and drew traffic from other states. It was known as Fountain Head Park by 1885. It was privately owned. On some occasions, it was fenced off with barbed wire; the owner charged admission. At the time, notably, Knoxville had no public parks. Chilhowee Park started about the same time, and it was also privately owned. Promoters for Fountain City stressed that its air was clean—Knoxville’s soot didn’t drift north of Sharps Ridge–and so were its morals. It was said to be harder to find liquor there than anywhere else. The area was known as Fountain Head, or Fountainhead, until about 1890, when they opened a post office there. They couldn’t call it Fountain Head, Tenn., because there was already one northwest of Nashville, so they renamed it Fountain City. Unlike some suburban areas of Knoxville, though, it was never an actual city, in terms of a place with defined boundaries and its own city government. Fountain City Park became known by that name the same year. It became popular as a refuge from Knoxville, so much so that a regular “dummy line”—a steam-driven streetcar—ran regularly every day from downtown Knoxville to Fountain City. During special events like the Fourth of July and Labor Day, when there were major events at the park (picnics, fireworks, athletic competitions, political speeches, and sometimes balloon ascensions) the dummy line would run until midnight. Sometimes thousands of people, mostly from Knoxville, would converge on Fountain City Park on those holidays. Incidentally, some surprising speakers sometimes showed up there. America’s most famous socialist, Eugene Debs, appeared there in 1905. The only known photographs of Debs speaking outdoors are at Fountain City Park. They’re often used in documentaries about Debs without mentioning that the setting was Fountain City. J.J.: After the resort went under, what was Fountain City known for? JACK: Well, a lot of answers to that question. Fountain City Park was always there, and the lake, aka the duck pond. The park had always been privately owned, and sometimes restricted, until 1932, when the Lions Club took it over, and made it permanently public. It was prettier and better maintained than most city parks, and I think the Lions Club was proud of that fact. After 1917 or so, it also had Savage Gardens, which is certainly one of the most unusual gardens in Knox County. An oriental garden started by an Englishman, an industrialist named Arthur Savage. And it sounds like I’m joking, but Fountain City was still known for general cleanliness. For much of the 20th century, Knoxville was known for air pollution and soot, but the air was always clean north of Sharps Ridge. It was also mostly free of alcohol. I did a study for a story in Metro Pulse in the ‘90s, and found that the number of bars and liquor stores per capita was much lower in Fountain City than in any other part of town. By the way, there was a band that recorded in the St. James Hotel sessions of 1929-1930 called Ridgel’s Fountain Citians. It’s mainly funny novelty songs. It was considered an ideal place to live, and a couple of generations of very wealthy people built big houses on Black Oak Ridge overlooking Fountain City. John Webb Green, who played a role in making Fountain City Park what it is, was an attorney, a sometime travel author, and a very interesting guy. Another interesting Fountain Citizen was Lucy Curtis Templeton. One of the News-Sentinel’s best columnists. She had wide-ranging interests in natural and cultural matters, and sometimes was bold enough to say things others would not. In the ‘30s and ‘40s, she often wrote about Fountain City for a Knoxville audience. And then, in our time, it was known for Litton’s— J.J.: My grandmother and mother described it as a very slow-paced, almost bucolic collection of middle-class homes and agriculture, at least until the 1950s. Is this accurate? JACK: That sounds pretty accurate, and that’s why a lot of people who work in Knoxville like to sleep in Fountain City. But with a few exceptions. Roy Acuff, probably the most famous person who ever grew up in Fountain City—he was a Central High athletic champ—was a local bootlegger before he began drawing crowds as a fiddler. He was arrested a few times, for gambling, bootlegging, and at least once for assault. This isn’t in any of his biographies, but in 1930 he was shot and wounded in a fight in a bootlegging joint called the Green Lantern on Hotel Ave. I never heard a word about that until about five years ago, when I ran across it in an old newspaper article from 1930. In his Country Music documentary, Ken Burns didn’t make Roy sound nearly as interesting as he was. Harvey Broome was a Fountain City resident when he was helping to found the national Wilderness Society, which was considered pretty radical by 1930s standards. J.J.: In the post-War era, Fountain City seems to have little going on besides the normal, day-to-day happenings of its residents as economic growth fueled a larger population? JACK: There was a white supremacist rally planned for Fountain City Park during the Clinton High crisis, around 1956, organized by some national players, including Ace Carter from Alabama. John Webb Green, in his 90s, was son of a Confederate officer killed in the war, but didn’t want that to happen to his favorite park. So as a lawyer he found some legal way to bar them from entering the park itself. So they held the rally in the ditch alongside Broadway. Litton’s has gotten some national attention, to a degree unusual for a Knoxville restaurant. You never know. In hindsight, it’s interesting how country music, and lots of talented, innovative performers were at work in Knoxville under the radar. That was the case with Roy in Fountain City, 90 years ago, and maybe somebody’s quietly up to something equally remarkable today. J.J.: Am I missing any major events, scandals, or larger trends? JACK: Probably, but I am, too. There’s the big annexation of 1962, and the funeral parade. There were massive annexations all around suburban Knoxville that year, but Fountain City is the only one that protested. The lamented Creamery. Bel Caro, and the whole McClung gothic drama. Holbrook College, the teachers school that was there for several years. And there’s Dr. Jim Tumblin, KHP’s 2020 historian-of-the-year honoree, who knows a lot more than I do. Editors note: As you can see, this article could have covered a LOT more ground if we’d had the time. But that’s one of the best things about a regular column — we can (and will) always circle back around and take a closer look at any of the people, places and events alluded to here. We hope you enjoyed Hard Knox Histories and can’t wait to share our next installment on July 23, when we plan on taking a look at ways in which Knox County residents have tried to beat the summer’s heat over the last 230 years or so. J.J. Stambaugh can be reached at firstname.lastname@example.org Jack Neely can be reached at email@example.com Published on July 9, 2021
<urn:uuid:c7198d51-80c1-46fc-97d0-3bfda7103720>
CC-MAIN-2022-33
https://www.hardknoxwire.com/new-fountain-citys-historical-headwaters/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.983868
2,952
2.171875
2
EIF commemorates Environment DayTogether with the rest of the globe, the Environmental Investment Fund of Namibia (EIF) commemorated World Environment Day on 5 June. World Environment Day 2022 was celebrated with “Only One Earth” as the theme, focussing on living sustainably in harmony with nature. World Environment Day was first observed with the slogan “Only One Earth” 50 years ago in Sweden. Five decades later, it still stands true as the earth is still our only home, and humanity must safeguard its finite resources. Furthermore, Environment Day aims to encourage people to take action and protect the environment. This year’s main event was hosted in Sweden alongside the Stockholm+50 conference under the theme “A healthy planet for the prosperity of all – our responsibility, our opportunity”, to discuss urgent and bold actions needed to secure a more sustainable future. The UN Secretary-General António Guterres called on governments to “shift to a circular and regenerative economy”, claiming that GDP is no longer a correct way to measure richness in today's world. “We must place true value on the environment and go beyond Gross Domestic Product as a measure of human progress and well-being.” The EIF’s chief executive Benedict Libanda echoed this year’s theme by highlighting that “living in harmony with nature is the only choice we have and there is no other choice. On this day, let’s be reminded that we have Only One Earth and that nature is at the heart of development and a strong enabler for achieving all the Sustainable Development Goals and we must all we can to protect it and live sustainably because when you take care of nature it takes care of you.” The EIF in commemorating this day recognizes that we have “Only One Earth” and that as a nation we should scale up efforts and partnerships for promoting nature-based solutions and climate action for the benefit of all Namibians. “Nature and climate action are opportunities for economic growth and social development. The potential for green jobs exist and we must as a nation diversify our range of financial options to support the development agenda, including through innovative and green finance and catalyse innovation and lead to positive impact on sustainability by changing the way we produce and consume, and more broadly interact with nature and its resources,” Libanda said. “Man has the fundamental right to freedom, equality and adequate conditions of life, in an environment of quality that permits a life of dignity and wellbeing, and he bears a solemn responsibility to protect and improve the environment for present and future generations. It is key to scale up efforts to sensitise and empower citizens to act and make smart choices. This is particularly true for the youth who also, thanks to higher education and exposure (for instance, through social media), is more sensitive to sustainability issues,” Libanda concluded.
<urn:uuid:505ece61-1cbd-4707-ba82-f5d38b74eba4>
CC-MAIN-2022-33
https://www.we.com.na/environment-we/eif-commemorates-environment-day2022-06-07
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz
en
0.940201
606
2.3125
2
Sergey Nivens - Fotolia When you deploy VMware vSphere, one of the first design questions you should ask is: "How big should I make my datastores?" As with most design decisions, the answer depends on the VM and application requirements. VMware vSphere 6.0, 6.5 and 6.7 and modern storage systems have removed some of the technical constraints that made accommodating certain workloads difficult. If you use Virtual Volumes (VVOLs), then you might have even fewer storage design tasks to worry about. Luckily, most storage vendors offer all-flash arrays or wide striping that significantly reduces the requirements for storage performance design. Still, when you create VMware datastores, you must understand the way scaling can affect performance and plan accordingly. Size your VMs First, you should design your VMs to accommodate your applications. Every VM needs a boot disk, which uses tens to hundreds of gigabytes, depending on the OS and applications. You can increase virtual disk size later, but you can only scale the last OS partition on the disk. This is because the system adds new space to the end of the disk, so you can only grow the partition into that space. On Windows, you only have a single drive letter on each virtual disk. The boot disk contains the C: drive. Some VMs don't hold any extra data, such as those that house web servers that refer to external databases for their data. These VMs usually just have the boot virtual disk. Other types of VMs hold more data, which the system places on additional virtual disks. For a large file server, you might use a single large virtual disk to keep all the file share data. However, for a database server, you usually need multiple virtual disks because each disk has its own queues, which translate to higher potential database performance. VMware vSphere 6.0, 6.5 and 6.7 enable virtual disks up to 62 TB, which is sufficient for almost any VM use case. Once you know the total size of all of a VM's disks, add its configured memory size and a gigabyte for miscellaneous files to determine its total disk requirements. You might consider using a planning spreadsheet that totals this requirement for every VM you expect to run. Size your VMware datastores When designing storage for vSphere, figure out your VM and application requirements first. When using fully allocated -- or thick-provisioned -- virtual disks, calculate the required capacity for each VM, and map those VMs to VMware datastores. If the maximum size for a vSphere virtual disk (62 TB) or datastore (64 TB) creates a problem for your design, then you should review your design, because you might be doing something wrong. The disk consumes its maximum size from the datastore from its creation, even if it contains no data. The provisioned size is always the same as the consumed size. Once you know your VMs' disk space requirements, you can design your datastore. Keeping the entire VM on one datastore means the VM only depends on that datastore, which simplifies VM management. You rarely encounter cases where a single datastore can't deliver the capacity or performance your VM requires. So, why not create the largest datastores you can and pile all your VMs on the lowest number of them? The short answer is queueing. Each datastore has a limited queue, which puts a ceiling on datastore performance. Small datastores mean more queues, which means higher potential disk performance. There is a second reason for creating smaller VMware datastores: the blast radius for an administrative error. If someone deletes a datastore with 50 VMs on it, it creates a much bigger problem than if someone deletes a datastore housing only five VMs. It takes far less time to recover a 5 TB datastore than to recover a 64 TB datastore. However, more datastores mean more administration, performance and capacity management. There isn't one single datastore size or VM number per datastore that works for everyone, or even one that works for every datastore in your data center. The key is balancing performance and manageability. In addition, keep some headroom in your datastores. The default out-of-space alarms trigger orange at 20% free space and red at 5% free space. VMware datastores should routinely run with at least 20% free space. Thin provision your virtual disks You can also choose to thin provision your virtual disks. Thin-provisioned virtual disks start tiny -- a few megabytes -- and grow as your VM writes data to them. By default, VMs only see the provisioned disk size rather than the consumed size on the datastore. Thin provisioning enables you to tell VMs that you have more disk space. Thin-provisioned disks grow over time, but you risk the virtual disks growing until they fill the whole datastore. When this happens, VMs stop running. Thin provisioning enables you to start with less datastore space than thick provisioning, but you must manage free space on the datastore carefully and grow your VMware datastores as the thin disks grow. VVOLs makes it easy If your storage supports VVOLs, you can simplify your storage process. VVOLs doesn't use datastores. Instead, VVOLs maps each virtual disk to an object on your array. VVOLs uses Storage Policy-Based Management, which communicates the VM's storage availability, performance and data protection requirements to the array. The array administrator sets the available policies, and the vSphere administrator assigns the policy to each VM. With VVOLs, you don't need to worry about sizing or VMs per datastore. VVOLs aims to hand storage management back to storage administrators. Design your datastores with storage performance in mind
<urn:uuid:525bb5f1-ee47-4e5a-8ff4-707cc53448ee>
CC-MAIN-2022-33
https://www.techtarget.com/searchvmware/tip/Sizing-and-scaling-VMware-datastores-101
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.876058
1,242
2.484375
2
A system is disclosed for executing depth image-based rendering of a 3D image by a computer having a processor and that is coupled with one or more color cameras and at least one depth camera. The color cameras and the depth camera are positionable at different arbitrary locations relative to a scene to be rendered. In some examples, the depth camera is a low resolution camera and the color cameras are high resolution. The processor is programmed to propagate depth information from the depth camera to an image plane of each color camera to produce a propagated depth image at each respective color camera, to enhance the propagated depth image at each color camera with the color and propagated depth information thereof to produce corresponding enhanced depth images, and to render a complete, viewable image from one or more enhanced depth images from the color cameras. The processor may be a graphics processing unit. |Original language||English (US)| |U.S. patent number||8643701| |State||Published - Feb 4 2014|
<urn:uuid:9efc1cfa-5d21-409c-9a30-164a3a0575f1>
CC-MAIN-2022-33
https://experts.illinois.edu/en/publications/system-for-executing-3d-propagation-for-depth-image-based-renderi
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.887405
217
2.515625
3
Intention and du’aa’ during prayer The intention is a condition of prayer, which is essential for the prayer to be valid. The shar’i definition of the intention is: “Deciding to do an act of worship in order to draw closer to Allaah.” This definition includes two meanings: 1 – The intention to do the action. This distinguishes acts of worship from other actions, and distinguishes acts of worship from one another. So one has the intention that these movements are the prescribed prayer, and decides whether it is fard (obligatory) or naafil. 2 – The intention with regard to whom it is done for. This means that by doing this action one is seeking the pleasure of Allaah and nothing else. The site of this intention is the heart. By simply deciding in his heart to do this action, a person has made his intention. Hence it is not prescribed to speak the intention out loud when one wants to do the action. Rather speaking the intention out loud is a kind of innovation that was not narrated in the Book of Allaah or in the Sunnah of His Prophet (peace and blessings of Allaah be upon him), nor was it narrated from any of his Sahaabah (may Allaah be pleased with them all). See al-Sharh al-Mumti’, 2/283. For more information please see question no. 13337. With regard to what a person should think about during the prayer, he should focus on the greatness of his Lord before Whom he is honoured to stand. So he should stand before Him properly, with humility and veneration. He should think about what it is prescribed for him to say in every part of the prayer. When he is standing he should ponder the meaning of what he is reciting from the Qur’aan. When bowing he should think about the meaning of the dhikr he is reciting, and the same when prostrating and in other parts of the prayer. He should also strive in all parts of the prayer to recite the dhikrs and du’aa’s that were narrated from the Prophet (peace and blessings of Allaah be upon him). With regard to du’aa’ in the sense of asking Allaah for what one needs of the good things in this world and in the Hereafter, the time to do that is when prostrating, after reciting the prescribed dhikr, because the Prophet (peace and blessings of Allaah be upon him) said: “I have been forbidden to recite Qur’aan when bowing and prostrating. As for rukoo’ (bowing), glorify your Lord therein, and as for sujood (prostration), strive in du’aa’, for then it is more likely that your Lord will answer you.” (Narrated by Muslim, 738). With regard to what is mentioned in the question, that it is narrated in some ahaadeeth that we have to call upon Allaah throughout the prayer, none of the reputable scholars has mentioned this or referred to it. Perhaps you have understood from the definition of some scholars that salaah (prayer) means du’aa’ (supplication), and this is the meaning that you mentioned. Or perhaps you have heard some scholars saying that salaah is all du’aa’. By this they were referring to the second category of du’aa’, for some of the scholars divided du’aa’ into two categories: 1 – Du’aa’ in the sense of asking, which means asking Allaah for one’s needs; and 2 – du’aa’ in the sense of worship, which means worshipping Allaah in the ways that He has prescribed, by means of various acts of worship such as prayer, fasting and zakaah. What this means is that these acts of worship include asking from Allaah, is if one is saying, “O Allaah accept this from me” or “Reward me for this act of worship by granting me forgiveness, admission to Paradise and salvation from Hell,” etc. All of prayer is considered to be du’aa’ in this sense. Hence our advice to all Muslims is to adhere to the Sunnah of the greatest of Messengers (peace and blessings of Allaah be upon him) throughout the prayer, following his command: “pray as you have seen me praying.” (Narrated by al-Bukhaari, 631). They should ponder the meanings of what they recite from the Qur’aan, and the dhikrs they recite, so that they may fulfil the greater purpose of prayer which is, as Allaah explained: “and perform As-Salaah (Iqaamat-as-Salaah). Verily, As-Salaah (the prayer) prevents from Al-Fahshaa’ (i.e. great sins of every kind, unlawful sexual intercourse) and Al-Munkar (i.e. disbelief, polytheism, and every kind of evil wicked deed)” [al-‘Ankaboot 29:45 – interpretation of the meaning] You will find an abbreviated description of the prayer of the Prophet (peace and blessings of Allaah be upon him) in Question no. 13340. We ask Allaah to guide us all… Ameen.
<urn:uuid:1650eb0f-c148-4839-b169-49fb6d0d7de0>
CC-MAIN-2022-33
http://www.islamhelpline.net/iqa/answer/70/20193/intention-and-duaa-during-prayer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.964983
1,134
2.890625
3
Peace education can be delivered to people of all ages, in both formal and informal settings. Programmes exist at local, national, and international levels, and in times of peace, conflict, and post-conflict. To create public dialogue different factions of society are often brought together in peace education programmes – these typically include civil society groups, schools, tribal leaders and the media. Yet due to the many areas covered by peace education, initiatives are primarily determined by culture and context, as well as by the projects’ scopes and objectives. Peace education and peacebuilding are therefore intrinsically linked. For peacebuilding initiatives to remain sustainable it is vital that attitudes towards war and violence are transformed and translated into long-term behavioural change which seek alternative solutions to armed conflict.
<urn:uuid:2a3683a4-ae56-4212-8541-43fa2e013924>
CC-MAIN-2022-33
https://peacetracts.org/campaigns/sudan/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.956575
155
3
3
Later this year, Apple is releasing its own credit card with cash back rewards. The card will heavily integrate with the iPhone and the company has named it the Apple Card. The actual card is minimalist and sleek in the most Apple kind of way. No late fee, no annual fee, no over the limit fee, no card number, no signature, no expiration date, no CVC number, no barcode. This is innovation at its best. To put it bluntly, Apple is selling Air and people are literally falling over themselves in anticipation to signup for this historical credit card. Cardholders will be able to set spending goals, track rewards on purchases and manage their own account balances. Apple’s credit card is created to “help customers lead a healthier financial life. The Apple Card is built into the Apple Wallet app on iPhone, offering customers a familiar experience with Apple Pay and the ability to manage their card right on iPhone,” said the company. The company also said it will provide interest rates that are among the lowest in the industry. In addition to no fees, the card offers smart functionality. “Apple Card uses machine learning and Apple Maps to clearly label transactions with merchant names and locations. Purchases are automatically totalled and organised by colour-coded categories such as Food and Drinks,” said Apple. Weekly and monthly spending reports are also provided with Apple Card. In regards to security, Apple said it has partnered with Goldman Sachs and Mastercard to provide the support required to issue the card, and for it to be accepted by global payment networks. It also features unique security measures, which include a unique card number which is stored on the user’s iPhone. “Every purchase is secure because it is authorised with Face ID or Touch ID, and a one-time unique dynamic security code. The unique security and privacy architecture created for Apple Card means Apple doesn’t know where a customer shopped, what they bought, or how much they paid. With no card number, CVV security code, expiration date, or signature on the card, Apple Card is more secure than any other physical credit card,” said Apple. Apple further says “The unique security and privacy architecture created for Apple Card means Apple doesn’t know where a customer shopped, what they bought, or how much they paid.” This simply means transactions will be done on the device, not on Apple’s servers. Transactions will be done locally and encrypted before it reaches the bank. Also, Apple has specific circuitry built into every iPhone to store secure information on the phone that never leaves the phone such as the security ID and fingerprint data. Apple titanium coloured card has a chip with the customer’s name on the chip. Apple Card is void of numbers and other data that can be used by smart criminals. I suppose all banks will soon follow suit in removing too much personal info from their cards as well. It is said, the Apple Card will be available to US customers in summer of 2019. Apple has been around for over 40 years wowing their customers’ every time and it’s sitting - Finding Innovative Ways to Stay Relevant in the Market Place One of Apple secret sauce is identifying virgin and untapped segments of the market, especially in the service and e-commerce sector. People are no longer changing phones and hardware like they used to. Hardware Company’s like apple need to innovate, and become more of a service orientated company. Providing the hardware, but also providing more of a service for use with the hardware. That’s the only way to stay relevant in business in the 21st century. Apple was started out with computers desktops and laptops. Then they branched into media players, phones, phone accessories, etc. They also built a business creating software and other media for these devices, stuff that some companies might have delegated or licensed out. 2. Stepping into Uncharted Territory There are still many unknowns regarding Apple Card, but it’s safe to say this is uncharted territory for this innovative company, though this isn’t exactly Apple’s first move in a financial service/product. While it already dipped into finance with Apple Pay Cash, it’s now providing the same kind of service you’d expect from a bank, not a tech giant and this is what innovation is all about. Tech companies are muscling in on banks as digitization expands its influence and more people are going cashless. 3. Leveraging on Existing Customers Apple already has a billion users, most who can be considered affluent due to the price of the products. In 4. Giving Customers a Delightful Experience Business is about solving people’s problems and Apple is always expanding into these areas that take advantage of their strengths in relation to people’s lives and needs. When people started using computers for music and movies, Apple got in. When connected mobile devices took off, Apple got in. When cashless payment became mobile, Apple also got in. And with the rise in cashless transactions and 5. Attract New Customers The launch of Apple’s credit card will give people more reason to buy Apple’s products. Yes, that’s the point of the card. To appeal to non-iPhone users. If you want the card, you will need an iPhone. As mentioned already, hardware sales are declining and as an innovative company, they have to find other more service-oriented ways to thrive as well as make money. By Nicky Verd Feel free to share your thoughts in the comments section below. Subscribe to my Blog Now and get a Free 7 page ebook to embrace your Uniqueness Check Out Nicky Verd’s Book titled “Disrupt Yourself Or Be Disrupted.” A practical playbook for dreamers and go-getters who want to create their own employment as well as employees who want to understand the impact of self-service technologies on jobs as well as the threats and opportunities in the Forth Industrial Revolution to ensure they are well-prepared for jobs of the future. Let’s get social: Follow me on Facebook-NickyVerd
<urn:uuid:e638b433-2c59-4244-a3b1-acb25051602d>
CC-MAIN-2022-33
https://nickyverd.africa/2019/03/28/apple-is-launching-its-own-credit-card-and-here-are-five-business-lessons-to-learn-from-this-move/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.954055
1,291
1.625
2
Due to its power, performance, and dependability, the Apple Silicon M1 MacBook Pro is by far the greatest Mac for music creation. Even professionals may produce music on a Mac using the powerful and portable studio that the MacBook Pro offers. Similarly, What Mac specs do I need for music production? 8GB of RAM is often sufficient for little tasks while producing music. For everyday usage and for things like podcast recordings, this is OK. Your Mac can start to have difficulties if you start to construct longer, more intricate tunes. Therefore, you should search for a computer with at least 16GB of RAM for professional music creation. Also, it is asked, Is the new iMac good for music production? The new M1 (and the even more recent M1 Pro and M1 Max) processors offer dramatically improved performance for music production, mixing, and other pro audio operations. They were first included in the 13″ MacBook Pro, Mac mini, and iMac. Secondly, Are Macs really better for music production? Macs are reliable, seldom crash, have a ton of power right out of the box, have an easy-to-use interface, and are built to last. The cost of entry is often justified since there are less maintenance expenses. These tools are really ideal for artistic endeavors in general and music creation in particular. Also, Is MacBook Air OK for music production? Having said that, many people would assert that a MacBook Air is sufficient for music creation, and they are right—especially if you have the best model with the most RAM, the fastest CPU, and the most storage space. People also ask, Why do musicians use Macs? “Mac is excellent for artists because you spend more time focusing on music instead of constantly resolving technical problems, and since each mac is manufactured from precisely the same components, you can immediately address any problem that could develop. it’s readily traceable,” says Simon Mills. Related Questions and Answers Is 8GB M1 MAC enough for music production? For the most basic music creation, you will need at least 8GB of RAM. For the majority of novices, this would be enough. Additionally, this will permit 5 to 25 music tracks using a variety of plugins and virtual instruments. How much RAM do I need for music production? Audio tasks are surprisingly tolerant on your system’s memory despite how crucial RAM may appear. For the bulk of music production processes, 8 GB is more than enough. If you want to use the extensive sample banks required to accurately replicate acoustic instruments, 16 or 32 GB of RAM may be helpful. Which Mac is best for Garageband? The 15-inch MacBook Pro with 512 GB of storage, 16 GB of RAM, a solid-state drive, and an Intel UHD Graphics 630 Card is the finest laptop for Garageband users. Is the new iMac good for logic? Logic Pro X On An iMac One of the greatest options for Logic users who do not need mobility is an iMac. Instead, you may buy a more powerful desktop computer with the money you would have spent on a notebook’s mobility. Do music producers use Mac or PC? Because Apple products are made especially for creatives, many music producers, film editors, and graphic designers utilize them; yet, Macbooks are pricey, making it difficult to purchase one with more RAM and storage. Is FL Studio better on Mac or PC? At the end of the day, using FL on a Mac over a PC does seem somewhat smoother. The ability to use midi controllers with a Mac while using FL Studio is another benefit. Are MacBooks good for music making? 14-inch MacBook Pro (2021) The greatest laptop available right now for music production is the 14-inch MacBook Pro. This exceptionally powerful laptop, which can tackle even the most challenging jobs with ease, comes with either an M1 Pro or M1 Max processor. Is MacBook Air or Pro better for music production? Because it is more powerful than the MacBook Air, the MacBook Pro is preferable for music creation. When it comes to music creation, the MacBook Air only has one benefit over the Pro: it is absolutely quiet since it has no fans, and because it is lighter, it is more portable. Can Logic Pro run on MacBook Air? You must be using macOS 11.5 or later to run the most recent version of Logic Pro X, 10.7. For the optimum performance, it’s also advised to have at least 8GB of RAM. Is 8GB RAM MacBook Pro enough for music production? For modest projects, 8GB is sufficient for 5 to 25 audio tracks with a variety of instruments, MIDI, plugins, VSTs, and effects (EQ, compression, delay, reverb, etc.) without affecting performance. For bigger projects and running many apps simultaneously, 16GB is ideal. Are Macs better for artists? Why are they so unique? Because Apple has created a number of top-notch creative programs built to function in the Apple environment, artists, graphic designers, and musicians utilize Mac computers. For those with a creative mindset, the operating system and user interface on Macs are also simpler and more user-friendly. What kind of computer do I need for music production? The bare minimum suggested computer/laptop specifications for music production are: 2.4 GHz or more from a quad-core CPU (i5, i7) a minimum of 4GB of RAM. an operating system in 64 bits. 500GB minimum of internal storage (HDD or SSD) a 13″ display. Is MacBook Air M1 16GB good for music production? When compared to our M1 MacBook Air, which has just 8GB of RAM, the M1 MacBook Pro with 16GB of RAM was able to successfully play back 106 songs. Given that this MacBook is “entry-level” and not intended for the “pro” market, we’d think it’s a very good outcome. Is MacBook M1 air good for music production? Another Mac laptop you could take into account for your DAW is the MacBook Air. The M1 MacBook Air has the following advantages. If you are recording in the same room as the Mac, it should be completely quiet since it has no fan. It is portable and lightweight, making it perfect for transporting to concerts and recording studios. Can the MacBook Air M1 make music? Even though my M1 Mini only has 8GB of RAM, it functions well for production. Naturally, the next time, I would use more RAM (I bought this as a stopgap until the new ones are released). Every song has been faultless and I utilize a great drummer. Is i5 or i7 better for music production? An i5 would definitely work for you if you’re doing between one and twenty songs. Depending on the sorts of plugins and virtual instruments you use, with 16 to 32 Gig of RAM. An i7 is a fantastic CPU if you have more than 20 tracks, perhaps 100–120 tracks. Is SSD or HDD better for music production? Conclusion. SSDs are a significantly better option than HDDs for contemporary music producers. SSDs provide significantly improved performance and dependability. In real terms, it implies your music creation process will be less stressful and have less loading time, which kills creativity. How much SSD do I need for music production? For music creation, you need a minimum of 500 GB of SSD storage. Your operating system, Digital Audio Workstation (DAW), plugins, sample library, saved projects, and other applications all need this space to be stored. To work more easily, choose 1 TB if you don’t have any financial restrictions. Is 16GB RAM enough for music production? The expert music producer In actuality, 99 percent of producers won’t need more than 16GB of RAM, a solid state drive, a 3.0GHz CPU, and a few terabytes of storage. But other individuals will want to go even farther. For a beginning producer, anything more than 16GB of RAM would be excessive. Is the iMac 27 INCH good for music production? My top pick for music creation in a home studio is the 27-inch iMac. It has an abundance of USB and USB-C connectors as well as more than enough power to operate modern DAW applications. Although it has a big screen and can show a lot of information, its slender design only takes up a little amount of desk space. How much is Logic Pro on Mac? Can MacBook Pro handle FL Studio? Yes, FL Studio for macOS has been made available. If you already possess FL Studio, you may use that license on Windows and macOS computers. On whatever PCs you own, you may do numerous installs. What MacBook is good for FL Studio? We had a genuinely exceptional experience using the Apple MacBook Pro. That pushed us to add this laptop to our list of things to purchase. For running CPU, GPU, and other machine learning experiences, it has an M1 chip. For any high-performance FL studio workstation job, Apple will always be your first pick. Is FL Studio worth it on Mac? Both novice and experienced music producers would enjoy Fl Studio for Mac. The lengthy wait paid off for Mac users since FL Studio for Mac has all the features that have made FL Studio so popular on PC. Which year MacBook Pro is best for music production? I own a mid-2012 non-retina 15″ MBP and highly recommend it. It’s the final model that allowed users to update the disk and RAM. Is Final Cut Pro on Macbook Air? To be more specific, we had 14 other programs open in addition to Photoshop and Final Cut Pro, which had just completed exporting a 4K video. On a regular Mac, much alone a MacBook Air, that’s a lot to run. The use of Final Cut Pro was quite cool, and it is tailored for Silicon. The “best mac for music production 2022” is a question that has been asked before. The best Macs to use for music production are the iMac Pro, MacBook Pro, and MacBook Air. This Video Should Help: - macbook pro music production setup - best used imac for music production - best used macbook pro for music production - macbook air for music production - cheapest macbook for music production
<urn:uuid:eb928f4c-2a36-4ad7-8a77-0e1c84619790>
CC-MAIN-2022-33
https://threejaymusic.com/what-mac-is-best-for-music-production/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.934379
2,191
2.109375
2
HOLLYWOOD—On the heels of his commercially successful coastal New England-set comedy “Moonrise Kingdom,” filmmaker Wes Anderson’s ventures far across the pond to Eastern Europe for his newest comedy adventure, “The Grand Budapest Hotel.” The film jumps around to various time periods, but the main plot revolves around a fussy concierge at a luxury alpine hotel and spa in a fictional country called Zubrowka in the 1930s. Known as Gustave H. or Monsieur Gustave, he takes under his wing a lobby boy, who eventually grows up to become the hotel’s manager, and it is that protégé, as an adult, that tells the story of Gustave H. in flashback to a young writer. The Texas-born Anderson, whose other films include “The Royal Tenenbaums” and “The Fantastic Mr. Fox,” co-wrote the screenplay with his friend Hugo Guinness, starting with the Gustave character, which was based on a mutual friend of theirs. “We had the inspiration and we wrote a section of it, but we couldn’t really figure out what happened next,” Anderson recalls of the six-year writing process. “There was no hotel and he wasn’t a concierge or anything.” Anderson said the script began to take shape when he became interested in the works of Austrian novelist Stefan Zweig. “We had this idea that it would be in a hotel and (Gustave) would be a concierge,” he says. “At that point, (the script) seemed to have the key ingredients, and we wrote the thing very quickly after that. The (design of the) hotel came in later.” Planning for the film began with finding the right location for the hotel. Since the hotel goes through several changes, from it’s 1930s heyday when it was a celebrated spa resort to the period when it fell under fascist control to a nearly uninhabited Communist-era construction in its decline, Anderson and his team scoured Europe for a location with character and visual flexibility. He discovered an unexpected kind of back lot in a vast, turn-of the-century department store in the German town of Gorlitz, on the border of Poland and the Czech Republic. Not only did Anderson and his team build sets inside the store, they also set up their production offices and workshops there, creating an entirely self-contained world that kept cast and crew inside the Zubrowka universe. “It was the perfect spot and it has a structure of its own with this soaring atrium, beautiful chandeliers and a stained glass ceiling,” says production designer Adam Stockhausen. “It even had the concierge area that’s the perfect spot.” “We had been looking together at all these old images of hotels,” recalls Anderson. “So we had all this research and all these ideas and we scouted around looking at other things. We had all these inspirations to sort of apply when we had this place. It turned out to be a great discovery—that department store.” Anderson wrote the character of Gustave H. with one actor in mind: two-time Oscar nominee Ralph Fiennes. “Over the years, I’ve discovered the way to make somebody not want the part is to offer it to them,” he jokes. “Maybe it’s psychology. Maybe it’s just actor psychology. I was locked into it. I only do one movie at a time. I don’t have six scripts sitting around and think, ‘If this one doesn’t go, I’ll do the other one’—this is all I’ve got. And I’ve only got one guy that I thought could play this, so I was very anxious about it.” The filmmaker admits he had no backup plan had Fiennes said no. “I don’t think I would have accepted him saying no,” he says. “ I would have been all over him and, at a certain point, he probably would have had to break down. Luckily for Anderson, Fiennes was just finishing post-production on his self-directed “The Invisible Woman,” a drama about Charles Dickens, that was released earlier this year. The filmmaker says Fiennes’ comedic chops were evident in the 2008 crime caper “In Bruges,” and he’d also see the actor in a British production of “God of Carnage.” “He was great and so funny in that,” he recalls, adding that it didn’t matter anyway to him whether Fiennes had a comedy background. “I don’t usually think about if somebody’s been in a comedy or not,” he says. “I just think if they’re really good and they’re right for the part, then they’ll be fine. There are people that could do a turn at this character but I couldn’t think of anybody that I thought could seem like a real person, like this was a real person you might meet. To me, that’s what he did.” The filmmaker also called upon his usual repertory of actors including Owen Wilson, Jason Schwartzman, Bill Murray, Jeff Goldblum, Bob Balaban and others for supporting parts in the film. He cast newcomer Tony Revolori as the young lobby boy that Gustave H. takes under his tutelage and ends up on a wild adventure in involving a stolen painting. Most moviegoers won’t be able to see Anderson’s latest work right away. It is opening in just a handful of theaters this weekend, in comparison to the green-screen heavy action fantasy epic “300: Rise of an Empire,” and the animated family adventure comedy “Mr. Peabody & Sherman,” which will be showing on thousands of screens. “We’re not the same audience,” says Anderson. “And I don’t really love doing green screen; I would rather we make something.” Though green screen wasn’t used in “The Grand Budapest Hotel,” Stockhausen and his crew created miniatures for various parts of the film, including a miniature of the hotel itself. “There was the introduction to the hotel, the mountaintop observatory and the whole skiing/sledding/bobsledding sequence,” recalls Stockhausen. “It was all miniature work and it’s much more—old-fashioned, is one way to put it—but it’s also an older way of doing the same thing. It’s a handmade way of doing the exact same thing, and it’s a lot of fun. “It’s a good ‘300: Rise of an Empire’ counterprogramming,” he says with a laugh. “We use some stuff they might have used in (film pioneer) Georges Melies-type movies, as old as anything,” adds Anderson. “But it’s digital galore. I mean, at least half of the shots in the movie have some kind of digital element—something we’ve modified or polished or sped up one thing in the frame or replaced a bit of signage and all of that kind of stuff. It’s an amazing kind of luxury.” Anderson also looked to production techniques of the past to create the world of “The Grand Budapest Hotel.” He and cinematographer Robert Yeoman, who has shot all of the Anderson’s previous live-action movies, came up with an idea to shoot the different time periods in different aspect ratios, using anamorphic widescreen for the 1960s, then switching to a more square format for the 1930s, typical of that time period, and then moving to a widescreen look for the scenes closest to the present-day. “I always wanted to do a movie in that square shape,” reveals Anderson. “Every movie before the 1950s was done that way. It’s the look you associate with movies of the period of our story. But I always wanted to do it with a movie that wasn’t a period movie. I just liked that shape. I liked that connection to movie history.” He said he wanted to use the square frame format for his first film “Bottle Rocket,” but was advised not to do so for commercial reasons, so he was happy finally to be able to incorporate it into this film, and it was possible only because the newer digital technology is accommodating to that format. “Now that everything is finished digitally, they just press a button and whatever you do is going to be up there,” he says. While the characters in “The Grand Budapest Hotel” are certainly ones that audiences might like to see again, perhaps in a TV show, Anderson says he can’t imagine staying one place long enough to do a series. “The thing with a TV show, first of all, you’ve got to like settle into one place and stay with this one project for this extended period of time, and I sort of like to do a thing and finish it,” he says. “Then, I’m on my next one, and it has a shape over the course of the years. I’m not dying to say, ‘With luck I’ll be on location in North Carolina for six months of the year, every year for the next seven years.’ And that’s if the show works. If you get a hit show, you get seven years in North Carolina. If you don’t, that’s another bad-case scenario of just being canceled. I would rather have different chapters of my working life, if that makes any sense.” Unlike most of his previous comedies, “The Grand Budapest Hotel” contains a fair amount of violence mixed in with the comedy. But that aspect of the film didn’t really register with Anderson until he was editing the piece. “Every 20 minutes or so of this movie, somebody gets their fingers chopped off or decapitated or stabbed or shot—there’s blood all through this movie,” he admits. “I was doing some color grading in Paris, and my friend came to sit with me and he brought his daughter and she started covering her eyes, and then I started going, ‘Oh no, get ready for this part right here,’ and I had never really thought about it that way.” Up until that moment, he had thought about the violence in the movie as funny violence, even thought it was quite brutal. “But I think that’s why the blood is there,” he explains. “That’s why the violence is there. It’s because there’s a brutality that’s coming, a brutality that’s building in the world and it’s getting ready to be this suicide of this whole region. Maybe that’s the answer.” Over the years, Anderson’s filmmaking style that combines quirky characters in offbeat settings has become synonymous with his name. Asked how he feels about people comparing other movies to his or saying they want to make a movie like him, he responds with modest appreciation. “I like that,” he says. “Usually, I might not have seen if they’ve done that or not. But I just think that’s nice. I know who my inspirations have been, and how closely I’ve wanted to do something like this person or that person, and how many ideas I’ve stolen from these guys and how many things I’ve just literally recreated what other filmmakers did.” He points out s a sequence in “The Grand Budapest Hotel” where Jeff Goldblum’s character, the executor of a rich old lady’s estate, is going to be murdered, that is closely modeled on a scene from Alfred Hitchcock’s “Torn Curtain.” “It’s nice that there’s a continuity and you can see people kind of take something from the other and make it in a new way,” he says.
<urn:uuid:dfb6a68c-3cab-42c6-8904-c65dea2eaa2f>
CC-MAIN-2022-33
http://frontrowfeatures.com/features/film-features/anderson-creates-grand-budapest-hotel-7118.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.971824
2,676
1.515625
2
How to Break Down Your Budget Percentages August 27, 2019 by Emma Gordon To budget, or not to budget. That is the question. Many people don’t enjoy sitting down and taking a close look at their finances, and who can blame them? Compared to spending money, tracking your spending can be a lot less fun. As an online direct lender, we understand the importance of budgeting. If you’ve never created a budget before, you may not know the first thing about planning for your monthly expenses. Although it may be easy to set limits at first, you might eventually struggle to keep up with these limits if your budget is unrealistic. That’s where a percentage budget may help. This method creates structure for your budget, so you can cut out some of the guesswork. Try following one of the three methods below to get started. Picture Your Budget as a Pie Chart Before we begin, imagine you’re in a boardroom watching a presentation. The presentation is all about your spending, and there’s a pie chart on the screen to illustrate how you spend your money. It shows each category of spending, allotting a portion of your income to everything from housing costs to clothing allowances and everything in between. The pie chart may have different categories of varying sizes. Everyone’s budget will most likely look different, and the percentage each category takes up will be unique. For example, rent or housing costs may take up a significant chunk, while a streaming subscription like Netflix — even after its latest rate hike — may only take up a small sliver. That’s where percentages come in handy. Like any pie chart, each slice shows the percentage of the total pie, so you’ll always know how much money is allocated to each category. The trick is setting limits for each category, so your budget works with your finances. Method 1: The 50–30–20 Budget The 50-30-20 method is one of the more common percentage budget methods and is sometimes one of the top results you’ll see if you research the topic. U.S. Senator Elizabeth Warren popularized this method in her book “All Your Worth: The Ultimate Lifetime Money Plan”. The 50–30–20 Budget recommends you break down your after-tax income into 50, 30, and 20 percent portions. Half of your income covers your essentials The largest chunk of your personal budget should be used to pay for the things you need. Unlike a daily cup of coffee, these expenses are essential. A helpful way to identify your needs vs. wants is by using Maslow’s hierarchy of needs. Maslow created a five-level pyramid to outline the common motivations of human behavior. Maslow’s hierarchy of needs works from the bottom up. You need to focus on building a strong foundation before you can move onto the rest, and the needs at the bottom are more essential than each layer above it. Physiological needs make up the bottom two levels. They represent things like: - Basic clothing - Loan payments, if you’ve taken out payday loans online - Rent or mortgage payments - Utilities for heat, electricity, and water Under this rule, you shouldn’t spend more than 50 percent of your income on the essentials. 30 percent of your income covers your wants Moving away from your essential needs, the next largest chunk of your budget covers the wants. These are items and experiences you can survive without, but life might be less exciting without them. Comparing this to Maslow’s hierarchy, the wants represent the next two levels of your pyramid: your self-esteem and your desire to be loved and belong. In other words, it’s the money reserved for things like: - A birthday present for a friend - A pair of designer shoes - In-game purchases for apps or video games - A haircut at a high-end salon - Your gym membership - Takeout dinners - A summer vacation This is a broad category, so it might be easy to spend more than 30 percent of your current income on them. If that’s the case, you should spend some time figuring out which spending habits you could cut out. Do you really need to that expensive haircut? Deep down, you probably know the answer is ‘no’. If you can stand to sacrifice these wants, you’ll have more cash left over for the next category. 20 percent of your income is for savings The final category of your budget is dedicated to savings. This coincides with Maslow’s final layer of self-actualization. This portion of your budget could improve your financial freedom, giving you the ability to save and invest in ways that help you achieve your goals. Whether that’s purchasing your first home, going back to school, or planning for your retirement, savings can help you accomplish these goals. Setting aside money can also help you make additional payments, if you’ve taken out installment loans online. How the 50–30–20 Budget Works in Action Let’s say you bring home $2,500 per month after taxes. Here’s what you should be spending on the following: For some people, the 50-30-20 breakdown may be easy to budget for. For others, it may be difficult, if not unrealistic in today’s economy. A lot of people are making less at a time when things cost more than ever. Method 2: The 70–20–10 Budget For that reason, the 50–30–20 Budget won’t work for everyone. One solution may be to scrap this breakdown and use the 70–20–10 Budget instead. It redistributes your take-home pay to adjust for inflation and higher costs of living. Instead of 50 percent, 70 percent of your income covers the essentials we outlined above. That additional 20 percent gives you a little more breathing room. Since it may be difficult to bring home 20 percent more money each month, this extra 20 percent comes from shifting your budget around. It siphons cash from your wants and savings, leaving them at 20 and 10 percent, respectively. So, if you’re earning $2,500 a month, your budget breakdown would look like this: Although this subtle shift might help you cover the basics, while still allowing you to have fun and plan for your future, it still may not be right budget for you. Let’s think of our friends who live in San Francisco, where the average apartment rent is $3,609. The combined total of rent, groceries, and utilities may exceed 70 percent of their earnings. Method 3: The 80–20 Budget The last iteration of the percentage budget is also the simplest. It’s ideal for people whose current expenses don’t match up with the previous breakdowns, as it shifts your monthly budget priorities into two simple categories: savings and everything else. If you make $2,500 a month, it would look like this: With 20 percent devoted to savings, you have 80 percent of your income to cover your expenses. This non-savings category is a combination of both needs and wants, so it includes everything from rent and groceries to lattes and movies. This works well if your needs take up 80 percent, or under, of your monthly income. Using the other budget methods, you might be overspending but according to the 80–20 Budget you’re still on track. The 80–20 Budget also works if you don’t want to track individual expenses. If you don’t go over the 80 percent limit, you don’t need to track exactly what you’re doing with the remaining money. Finding the Right Budget Percentage Breakdown Money is personal. So, it only makes sense that your budget is personalized. Your personal budget depends on a lot of variables — namely your cost of living. Take, for example, San Francisco. Its infamous rental market is one of the most expensive in the country. The cost of rent, utilities, and groceries are higher here than most places in the U.S. Someone living in the San Francisco Bay Area might typically spend a larger percentage of their income on these categories than someone living in, let’s say, Topeka, Kansas. While someone in the Great Plains may successfully follow the 50–30–20 Budget, someone on the California coast may be better suited to the 80–20 Budget. The cost of living and the job market in your neck of the woods may influence the look of your personal budget. What If None of Them Work? For these breakdowns to work well, you need to make more than you spend. More specifically, you need to make enough money to cover not just your necessities, but also your wants and savings. This is the balancing act of every budget, but when you aren’t working with enough money, it can be a challenge. You might struggle to cover just your basic needs, let alone everything else. If you find yourself in this situation, you may have to put the percentage budget on hold while you ask yourself some questions like: - How much rent can I afford? - How much can I spend on food? - How will I pay for something unexpected? By asking yourself these questions, you’ll come closer to figuring out the amount of money you have available for important expenses and whether your expenses are within these limits. This might not be an easy task. Unlike eliminating certain wants, there are expenses you won’t be able to scratch out of your budget altogether. You might have to find ways to lower your cost of shelter and food, as well as other necessities. It may involve moving to a more affordable accommodation, making changes to your food spending, or getting a better paying job. These tasks may not be what you’d call a quick fix. Some of them are major lifestyle changes that take time and effort to put into practice. If you need to adjust your budget quickly, try focusing on smaller changes until you can make big ones. Some small changes may include packing your own lunch for work or cutting down on your social outings. This may free up extra cash you can put aside in savings. If an unexpected bill or auto repair comes your way before you’ve had time to put money aside, online short-term loans may be a helpful backup to take care of urgent bills quickly. Depending on the lender or service provider, the application process can be quick and convenient. Take some time to read up on these loan alternatives, so you know how short term loans work before you apply. Always leave room for savings However you reduce your expenses, try to keep some money aside for savings. A budget isn’t just a way to track the money coming in and out of your hands each month. It can also help you create a financial safety net. Having an emergency fund can help you cover urgent expenses in addition to your regular bills and obligations. If you’re faced with any unexpected, urgent expenses and don’t have enough saved to cover them, don’t panic. There are online loans that can help you bridge the gap when you’re low on funds. There are many reasons why people get personal loans. As for online short-term loans, we recommend you use these in an emergency that you can’t otherwise pay for. If an unexpected emergency expense pops up and you don’t have the savings to handle it, click here to see if a short-term loan is right for you. Let Percentages Bring Structure to Your Budget Don’t wing your finances. Spontaneity can be a fun part of life, but when it comes to your budget, you shouldn’t be making things up as you go. When you don’t have rules to follow, it leaves a lot up to interpretation. And you may have a lot of questions, including: - How much should I spend on rent? - How much should I budget for food? - How much should I save each month? Without answers to these questions, budgeting may be intimidating. It’s a big job and you might not know where to start! It’s not as hard as it seems — the three percentage budget methods provide a framework for your budget. Sit down with your finances to find out which breakdown works best for you. Once you have the framework in place, you’ll be better able to create a budget you can stick to.
<urn:uuid:010869af-2dc2-4abe-ac8a-5a4a7aa98c6b>
CC-MAIN-2022-33
https://www.moneykey.com/articles/how-to-break-down-your-budget-percentages/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.927575
2,777
2.1875
2
Boulder, Colo., USA: GSA’s dynamic online journal, Geosphere, posts articles online regularly. Locations studied include the Turkish-Iranian Plateau and the Zagros Mountain Belt; West Kunlun, Northwestern China; and the Little Cottonwood stock, Utah, USA. You can find these articles at https://geosphere.geoscienceworld.org/content/early/recent . Seismic attenuation tomography of the Sn phase beneath the Turkish-Iranian Plateau and the Zagros mountain belt Ayoub Kaviani; Eric Sandvol; Wenfei Ku; Susan L. Beck; Niyazi Türkelli … Abstract: The Turkish-Iranian Plateau and the Zagros highlands are among the most prominent physiographic features in the Middle East and were formed as a result of continental collision between the Arabian and Eurasian plates. To better understand the nature of the lithospheric mantle and the origin of the observed seismic anomalies in this region, we investigated seismic attenuation of the uppermost mantle by detailed measurements of the quality factor of the Sn seismic phase (Sn Q). To that end, we collected a large data set consisting of 30 years (1990–2020) of waveforms recorded by 1266 permanent and temporary seismic stations, applying both the two-station method (TSM) and reverse two-station method (RTM) to measure path-averaged Sn Q. Finally, we performed a tomographic inversion on the path-averaged Sn Q to map the lateral variations of the upper-mantle attenuation across the northern Middle East. Our Sn attenuation maps show moderately low Q (Q values (>350) beneath the Zagros and northern edge of the Arabian plate. Furthermore, our Sn Q model is broadly consistent with seismic velocity models in the region suggesting that most of the seismic anomalies are the result of thermal rather than compositional effects. Mafic magma-driven magmatic processes and compositional variation in granitic pluton construction: The Buya intrusion of West Kunlun, Northwestern China Chao Wang; Liang Liu; Wen-qiang Yang; Yu-ting Cao; R. Hugh Smithies Abstract: To investigate the direct evidence for a number of physico-chemical processes related to pluton construction and growth, we examine the Buya pluton of West Kunlun in Northwestern China, which emplaced within the 455–460 Ma time frame. Field observations, geochemical data, and thermodynamic modeling show that mafic dikes of the Buya pluton were conduits for magma chamber replenishment during pluton construction. These mafic inputs, and the enclaves that resulted from them, induced compaction of the semi-consolidated, crystal-rich, felsic mushes below them. The accumulation of highly silicic, fine-grained granite at the top of the Buya pluton is the result of episodic melt segregation events from these mushes. This sequence of events may reflect a common process that promotes compositional variation in granite suites. Combined geochemical and Hf- and Nd-isotopic data suggest that parental magmas of the mafic sheet and enclave are similar to sanukitoid, which is potentially consistent with a mantle peridotitic source metasomatized by slab melts. These mafic magmas intruded the lower crust where the original magma was modified by mafic lower-crust melt. Following emplacement at shallow crustal levels of the mafic inputs (~3.7 kbar, ~5.3 km, constrained by amphibole geobarometry), the felsic mush evolved through the extraction of interstitial melts driven by hybridization with episodic inputs of mafic magmas as well as crystal consequent accumulation and fractional crystallization of plagioclase, hornblende, and accessory phases such as allanite, apatite, and zircon. This fractional crystallization process may also provide an explanation for the apparently high Sr/Y features in some silicic high-K, calc-alkaline magmas. Multi-stage construction of the Little Cottonwood stock, Utah, USA: Origin, intrusion, venting, mineralization, and mass movement Collin G. Jensen; Eric H Christiansen; Jeffrey D. Keith Abstract: Many porphyry molybdenum deposits are hosted in multi-phase plutons, but it is unclear in some deposits how these magmas originated and whether the pluton intruded as it fractionated or was intruded by new batches of magma. New mapping has clarified field relationships between units in the White Pine porphyry Mo system hosted in the Little Cottonwood stock, Utah (western United States), including the White Pine intrusion, the Red Pine porphyry, rhyolite dikes, and phreatomagmatic pebble dikes. Geologic relations and geochemistry show the system formed in a continental arc setting during rollback of the subducting Farallon slab rather than during extension related to orogenic collapse. Whole-rock geochemistry shows distinct fractionation trends for each of the major intrusive units in the composite pluton, suggesting they formed separately, which is supported by new U-Pb zircon laser ablation–inductively coupled plasma–mass spectrometry (LA-ICP-MS) ages of ca. 30 Ma for the Little Cottonwood stock, 27 Ma for the White Pine intrusion, and 26 Ma for the previously undated Red Pine porphyry. Mineral textures, cross-cutting relationships, and alteration mineralogy indicate that intrusion of the youngest phase led to a fluid-saturated magmatic system and triggered venting, including emplacement of pebble dikes. In the adjacent east Traverse Mountains, pebble dikes contain clasts that have similar mineral assemblages, textures, and ages as the major igneous units in the White Pine deposit. This indicates that the pebble dikes in east Traverse Mountains and in the pluton are the upper and lower parts of the same magmatic-hydrothermal system, which was decapitated by a mega-landslide that was likely facilitated by alteration in the Oligocene hydrothermal system and by later Basin and Range faulting. Seismostratigraphic analysis of Lake Cahuilla sedimentation cycles and fault displacement history beneath the Salton Sea, California, USA Daniel S. Brothers; Neal W. Driscoll; Graham M. Kent; Robert L. Baskin; Alistair J. Harding … Abstract: The Salton Trough (southeastern California, USA) is the northernmost transtensional stepover of the Gulf of California oblique-divergent plate boundary and is also where the southern terminus of the San Andreas fault occurs. Until recently, the distribution of active faults in and around the Salton Sea and their displacement histories were largely unknown. Subbottom CHIRP (compressed high-intensity radar pulse) surveys in the Salton Sea are used to develop a seismic facies model for ancient Lake Cahuilla deposits, a detailed map of submerged active faults, and reconstructed fault displacement histories during the late Holocene. We observe as many as fourteen Lake Cahuilla sequences in the Salton Sea (last ~3 k.y.) and develop a chronostratigraphic framework for the last six sequences (last ~1200 yr) by integrating CHIRP data and cone penetrometer logs with radiocarbon-dated stratigraphy at an onshore paleoseismic site. The Salton Sea contains northern and southern subbasins that appear to be separated by a tectonic hinge zone, and a subsidence signal across hinge-zone faults of 6–9 mm/yr (since ca. A.D. 940) increases toward the south to >15 mm/yr. The faults mapped to the south of the hinge zone appear to accommodate transtension within the San Andreas–Imperial fault stepover. We identify 8–15 distinct growth events across hinge-zone faults, meaning growth occurred at least once every 100 yr since Lake Cahuilla sedimentation began. Several faults offset the top of the most recent Lake Cahuilla highstand deposits, and at least two faults have offset the Salton Sea flood deposits. Active faults and folds were also mapped to a limited extent within the northern subbasin and display growth, but their kinematics and rupture histories require further study. The broad distribution of active faulting suggests that strain between the San Andreas, San Jacinto, and Imperial faults is highly distributed, thus discrepancies between geologic and geodetic slip-rate estimates from these major fault systems are to be expected. U-Pb and fission-track data from zircon and apatite resolve latest- and post-Alleghanian thermal histories along the Fall Line of the Atlantic margin of the southeastern United States William H. Craddock; Paul B. O’Sullivan; Ryan J. McAleer Abstract: Although the Atlantic continental margin of the eastern United States is an archetypal passive margin, episodes of rejuvenation following continental breakup are increasingly well documented. To better constrain this history of rejuvenation along the southern portion of this continental margin, we present zircon U-Pb (ZUPb) age, zircon fission-track (ZFT) age, apatite U-Pb (AUPb) age, and apatite fission-track (AFT) age and length data from six bedrock samples. The samples were collected along the boundary between the exposed Appalachian hinterland (Piedmont province) and the updip limit of passive margin strata (Coastal Plain province). The samples were collected from central Virginia southward to the South Carolina–Georgia border. ZUPb age distributions are generally consistent with geologic mapping in each of the sample areas. The AUPb data are highly discordant owing to high common-Pb abundances, but for two plutons at the northern and southern ends of the sample area, they define a discordia regression line that indicates substantial Permo-Triassic exhumation-driven cooling. ZFT age distributions are highly dispersed but define central values ranging from Permian to Jurassic. AFT data mostly appear to define a singular underlying cooling age, generally approximately Jurassic or Early Cretaceous. Apatite fission tracks are moderately long (mean lengths in the range of ~13.5 µm), however track lengths for one sample in central North Carolina are shorter (~12.5 µm). To interpret the post-breakup thermal history, we present inverse models of time-temperature history for the five plutonic samples. The models show a history of (1) rapid cooling (>10 °C/m.y.) from deep-crustal to near-surface temperatures by the Triassic, (2) hundreds of degrees of Triassic reheating, (3) Jurassic–Early Cretaceous cooling (at rates of 1–10 °C/m.y.), and (4) slow Late Cretaceous–Cenozoic cooling (~1 °C/m.y.). An additional suite of forward models is presented to further evaluate the magnitude of maximum Triassic reheating at one sample site that is particularly well constrained by thermal maturity data. The model results and geologic reasoning suggest that the inverse models may overestimate Triassic paleotemperatures but that other aspects of the inverse modeling are robust. Overall, this thermal history can be reconciled with several aspects of the lithostratigraphy of distal parts of the continental margin, including the lack of Jurassic–earliest Cretaceous strata beneath the southern Atlantic coastal plain and Cretaceous–Cenozoic grain-size trends. GEOSPHERE articles are available at https://geosphere.geoscienceworld.org/content/early/recent
<urn:uuid:1313457d-8dde-4356-ae23-acf019a55c0d>
CC-MAIN-2022-33
https://www.miragenews.com/new-articles-for-geosphere-posted-online-in-june-812279/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.895344
2,492
2.078125
2
Okay, so, you're just enjoying the waves on your Labor Day weekend, soaking up the last bit of summer, when your bodily situation becomes very clear: You have to pee. But, the sand is a hot, unpleasant road to an even more unpleasant public-beach bathroom stall — and you're perfectly happy right where you are. Why should you leave this salty paradise just because nature's calling at the least opportune moment? Well, fear not, small-bladdered beach-goers: The American Chemical Society has officially endorsed peeing in the ocean. In a new video released on their Reactions channel, the ACS assures us that it's totally cool to go with the flow. First off, your urine is made up of 95% water — you know, that same stuff you're swimming in. And, the sodium and chloride ions found in pee are also a major component of seawater. So, you're not adding anything that isn't already there. Second, the nitrogen in urine combines with water to produce ammonium, which can feed ocean plants. And finally, the ocean is full of urine anyways; fish pee, too. A lot. So, while you should continue the time-honored tradition of Not Peeing In The Pool Or In Protected Ocean Areas, feel free to go for it the next time you need to take a leak in the general sea.
<urn:uuid:bf0c804d-0481-4d14-a9e7-87b89373b8a8>
CC-MAIN-2022-33
https://www.refinery29.com/en-us/2014/08/73431/ocean-peeing-video
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.958399
286
2.296875
2
Moving research discoveries from the lab to patients, looking for cures for preemie babies with breathing difficulties Dr. Bernard Thébaud still remembers the time when he told a mother that her premature baby was dying from a lung disease and she asked: “Isn’t there anything you can do for my baby now?” “That’s when I realized that I needed to move research findings quicker from the labs into treatments for patients,” recalls Dr. Thébaud, a neonatologist at the Children’s Hospital of Eastern Ontario and a senior scientist with the Ottawa Hospital Research Institute and Children’s Hospital of Eastern Ontario Research Institute. That baby had a genetic condition known as surfactant protein B deficiency. In the lungs, the surface of the tiny air sacs (alveoli), where oxygen goes into the bloodstream and carbon dioxide comes out, is coated in a thin layer that contains pulmonary surfactant. Pulmonary surfactant prevents the collapse of the alveoli and plays a role in defending the lungs from bacteria and viruses. The lungs start making surfactant around 24 weeks into a pregnancy and produce adequate amounts at 35 weeks. But some babies inherit a genetic mutation that leads to a partial or complete lack of surfactant protein B. Although these babies are given an artificial surfactant and are put on a ventilator (breathing machine), the prognosis is poor; many babies die in their first few months. Currently, there is no cure for this deficiency. The only effective treatment is a lung transplant; however, laboratory research shows promise. Dr. Thébaud’s research into surfactant protein deficiency has the potential to save the lives of babies worldwide while also leading to discoveries for other incurable diseases such as cystic fibrosis. Turning stem cells into lung cells In December 2014, he received funding from The Lung Association to help further his research into developing stem cell-based therapies for patients with incurable lung diseases. Dr. Thébaud will take advantage of so-called induced pluripotent stem cells or iPSCs to make lung cells. “If we can recreate lung cells from stem cells in a petri dish, then we can better understand the disease, correct the mutation and ideally return these now healthy cells to the baby.” “Another promising cell therapy we are pursuing is using stem cells from umbilical cords for chronic lung disease of prematurity, also called bronchopulmonary dysplasia (BPD) -- another devastating disease without a cure. We have shown that these cells can heal the lungs of newborn rats exposed to high oxygen,” says Dr. Thébaud, who is also a professor of pediatrics at the University of Ottawa where his holds the uOttawa Partnership Research Chair in Regenerative Medicine.” “Our research has the potential to provide a breakthrough therapy that will improve not only the lung disease, but also the overall outcome of premature babies. Ultimately, our findings may extend to other lung diseases such as asthma, cystic fibrosis or acute respiratory distress syndrome. “Optimizing this ideal source of repair cells will also reveal its potential for adult diseases,” says Dr.Thébaud. Greater potential for stem-cell therapies for other lung disease Dr. Thébaud and his research team were the first to find that stem cells from bone marrow and umbilical cords, known as mesenchymal stromal cells or MSCs, can prevent and repair experimental neonatal lung injury. “Contrary to the common belief, we found that cell replacement is not the primary mechanism by which these cells exert their therapeutic benefit. Rather MSCs act by secreting factors that protect lung cells and allow for lung repair after injury in animal models of neonatal lung injury, asthma, and acute respiratory distress syndrome. We are now on the verge of translating our discoveries into the clinic with phase I trials planned for the end of 2015.”
<urn:uuid:d345ddb5-c833-4843-925d-5931dfa682e9>
CC-MAIN-2022-33
https://lung.f.civicrm.ca/lung-research/our-researchers/dr-bernard-th%C3%A9baud
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.94444
842
3.28125
3
This course covers methods and techniques to secure wireless networks against threats and attacks. Topics include: Security and Cryptography; Network Security Protocols; Security and Layered Architecture; Voice-Oriented Wireless Networks; Data-Oriented Wireless Networks; Security in Traditional Wireless Networks; Security in Wireless LAN; Security in Wireless Ad Hoc Network; Special Topic: Mobile Security. Offered fully online or hybrid (1 lecture/week), 3 Credit hours. Instructor led. - Describe the differences between wireless security and wired security. - Build the working knowledge of security building blocks so that it can be applied to solve the problems of designing security solutions in wireless network systems. - Acquire the fundamental understanding of two main-stream approaches (i.e., data-oriented and voice-oriented) taken by wireless security systems. - Master to learn at least one of advanced wireless network security systems in depth, and enhance the skills of enabling and configuring a wireless network system. - Describe the pros and the cons of at least one emerging system
<urn:uuid:bf91f9dc-bdc8-4f19-85c7-f123221594e1>
CC-MAIN-2022-33
https://niccs.cisa.gov/education-training/catalog/kennesaw-state-university/it-6833-wireless-security-advanced
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.878083
220
2.890625
3
The U.S. economy contracted in the first three months of the year, just not as much as previously estimated. More recent data show that the weakness was largely temporary, with a rebound in the works for the April-June quarter. The Commerce Department says the economy, as measured by the gross domestic product, shrank at a seasonally adjusted annual rate of 0.2 percent from January through March. That's better than last month's estimate of a 0.7 percent decrease. Harsh winter weather slowed spending by keeping consumers away from shopping malls and auto dealerships. The trade deficit ballooned, slicing growth by the most since 1985 as exports fell and imports rose. Yet consumers stepped up their spending in May, and home sales climbed — signs that the economy is back on track.
<urn:uuid:441a0668-900d-4c2d-a9b0-110f86d0a4b6>
CC-MAIN-2022-33
https://www.foxbusiness.com/markets/us-economy-shrank-0-2-pct-in-1st-quarter-rebound-expected-in-spring
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.9798
162
1.789063
2
|Developer(s)||Mercurial Communications | for AOL, Netscape |Initial release||8.0 (2005)| |Operating system||Microsoft Windows (XP, 2000, Me, 98)| Netscape Browser (or Netscape 8) is the eighth major release of the Netscape series of web browsers, now all discontinued. It was published by AOL, but developed by Mercurial Communications, and originally released for Windows on May 19, 2005. Netscape Browser was the first browser of the Netscape series to be based on Mozilla Firefox, as opposed to Netscape versions 6 and 7 which were based on Mozilla Application Suite. Also, Netscape 6 and 7 were Internet suites whereas Netscape Browser (version 8) was solely a web browser. As with other recent versions, it incorporates support for AOL Instant Messenger, and other AOL-related features. Netscape Browser was succeeded by Netscape Navigator 9, which reverted to the Navigator name. |Netscape Browser version||Release date||Based on Mozilla Firefox version| |0.5.6+||November 30, 2004||0.9.3| |0.6.4||January 7, 2005||1.0| |0.9.4 (8.0 pre-beta)||February 17, 2005||1.0| |0.9.5 (8.0 pre-beta)||February 23, 2005||1.0| |0.9.6 (8.0 beta)||March 3, 2005||1.0| |8.0||May 19, 2005||1.0.3| |8.0.1||May 19, 2005||1.0.4| |8.0.2||June 17, 2005||1.0.4| |188.8.131.52||July 25, 2005||1.0.6| |184.108.40.206||August 8, 2005||1.0.6| |220.127.116.11||August 17, 2005||1.0.6| |8.0.4||October 19, 2005||1.0.7| |8.1||January 25, 2006||1.0.7| |8.1.2||September 27, 2006||1.0.8| |8.1.3||April 2, 2007||1.0.8| The browser was finally released on May 19, 2005. A minor update known as version 8.0.1 was released a few hours later to incorporate the key security patches added in Firefox 1.0.4. Perhaps the most noteworthy feature introduced in Netscape Browser is the ability to use either of two layout engines to render websites — either Internet Explorer 6's Trident layout engine or the Gecko engine used by Mozilla and its derivatives. This is used as part of the browser's "Site Controls" system, which allows security settings to be altered on a per-site basis, and is also touted as a defense against phishing and similar attacks, with both blacklists and whitelists built in and automatically updated regularly. This system decides whether a site is "trusted" or "suspect", while only whitelisted sites use the Trident engine by default. However, this feature is actually implemented by using the IE ActiveX control, which is composed of most of IE's architectures. Other features highlighted by AOL's publicity include improved tabbed browsing abilities, a toolbar system called the "MultiBar," which includes up to 10 toolbars in the space of one, and extra support for "Live Content", such as RSS feeds. In keeping with the security emphasis, a new secure form information and password management system, known as a "PassCard," which saves usernames and passwords for individual sites, is also included. In Netscape version 8.1, the Security Center feature is much more integrated into the browser, and extra features, such as ID Theft Protection and Spyware Protection have been integrated. Netscape includes a host of "widgets" designed to improve the browsing experience, including Local Weather information, Movie Times and reviews, Mapquest maps, Yellow pages, White pages, Stocks, and a City guide, all integrated into menu-enabled toolbar buttons. Furthermore, a webmail button is included in the toolbar, which links directly to multiple webmail homepages and is configurable for multiple webmail accounts. A button to run the user's default mail client is included. There are multiple smaller features included, including a shortcut menu that appears when text is selected to paste the selected text directly into a search engine of choice. Finally, the browser includes a pop-up advertisement blocker which can be configured to allow pop-ups for individual sites, block only unrequested pop-ups, and open any pop-ups in new tabs in one window, thus preventing pop-unders. The Netscape Browser has been criticized for various reasons. Perhaps the most severe is the claim that, in contradiction to its claimed emphasis on security, its use of both the Trident and Gecko rendering engines means it unavoidably inherits all the vulnerabilities of both engines, making it potentially less secure than either Firefox or IE on their own. The switching between rendering engines may also confuse users, since the web browsing experience is very different depending on which is used. A standards based website will generally render better in Gecko thanks to its better standards support, but Netscape Browser renders whitelisted pages using Trident instead. "As the switching is transparent to the user, users are left wondering why their experience changes randomly across different websites". The optional theme "Fusion" has also been criticized because it does not conform to the Microsoft human interface guidelines (HIG), either "Luna" or "classic" style, although the default theme, "Winscape", looks more like a traditional Windows application. There is also a claim that the usability of the browser is reduced by not obeying standard Windows manipulations. Similarly, the excessive nesting of tabs has been cited as a sign of generally poor interface design. The installation program of Netscape 8.12 prompts the user into which theme would be preferred, with the traditional "Winscape" being checked by default. Some users have argued the formerly included email client and HTML editor were more valuable as part of the browser package than new features such as a live weather report and news ticker, especially since these applications were tradition in earlier versions. Firefox, upon which Netscape Browser is based, does not include an email client or HTML editor either, but an HTML editor extension can be downloaded from the Extension and Themes section of the Firefox website , and email support is provided by Mozilla Thunderbird. Older Netscape releases were based upon the Mozilla Suite, which did include this functionality. Another criticism is that the browser collects user browsing behavior by default . By default, the option "Allow Netscape to gather anonymous browser usage statistics" is enabled. The option is found in the "Advanced Settings" during installation. As many casual users may skip the dialogs during installation, this feature could be turned on in many installations of Netscape Browser. Some[who?] argue this feature should be called spyware, however this term usually applies only to software that attempts to send private information to companies often later selling this to advertisers, whereas the information collected is actually anonymous. A related possible criticism is that in the browser's password manager menu, saved passwords can be viewed in plain text. Thus, if a user has access to another's account, they could retrieve all their usernames and passwords in plain text with little effort. Further, this option cannot be turned off or removed without editing the software. This problem doesn't happen in version 8.1.3. A few days after Netscape 8.0.1 was released, Microsoft reported the browser disables the XML rendering engine in Internet Explorer by causing IE to render XML pages as a blank page. Netscape fixed the issue in version 8.0.2.
<urn:uuid:fc898314-1e28-45cd-ba29-e6ebb2b21f0c>
CC-MAIN-2022-33
https://db0nus869y26v.cloudfront.net/en/Netscape_Browser
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.939407
1,729
2.140625
2
What happens when you have trouble seeing up close? As we age, we begin to experience the frustrating effects of Blurry Near Vision. Reading the newspaper, seeing the computer screen or sending a text message becomes a struggle. We end up relying more and more on reading glasses or contact lenses to see up close. These changes can lead to age-related Blurry Near Vision caused by the first stage of Dysfunctional Lens Syndrome also known as presbyopia. Approximately 128 million adults in the United States are living with presbyopia. Most people are in their 40s when they first start noticing problems seeing clearly up close. The stages of age-related Blurry Near Vision: Holding objects further away, difficulty reading in dim lighting. Turning up lights in most settings, require aids in almost all circumstances. Inability to read at arm’s length (near and intermediate distance) without a workaround. Now there’s a way to treat Blurry Near Vision VUITY™ prescription reading eyedrops work by reducing your pupil size. It contracts certain muscles in the eye to help you see up close. VUITY™ is the first and only FDA-approved prescription eye drop for the treatment of presbyopia in adults. This procedure is a great solution for people looking to improve symptoms of Blurry Near Vision, related to seeing & reading. It’s commonly recommended for patients over the age of 40.
<urn:uuid:3c5ee994-d091-4fef-b7d6-c6f44846b073>
CC-MAIN-2022-33
https://www.keillasik.com/prescription-reading-eyedrops/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.911874
312
2.359375
2
Video answer: Translate the following statements into chemical equations and then balance them. Top best answers to the question «Nitrogen gas and hydrogen gas react to form ammonia» The balanced chemical equation for the formation of ammonia gas by the reaction between nitrogen gas an hydrogen gas is given. N2+3H→2NH3. Video answer: How to balance: n2 h2 = nh3 (synthesis of ammonia)
<urn:uuid:593c8cc5-8844-4b4b-ae52-ad1a3f2e4db7>
CC-MAIN-2022-33
https://oilandgasguru.com/nitrogen-gas-and-hydrogen-gas-react-to-form-ammonia
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.889279
93
3.125
3
Centre of expertise for good governance The mission of the Centre of Expertise for Good Governance is to promote respect for the 12 Principles of Good Democratic Governance by building capacity at all levels and delivering legal and policy advice in line with European standards and best practice. It does this through continuous investment in research and expertise; by creating and developing partnerships and networks with national and international stakeholders; by developing impact-oriented practical tools, and by implementing country-specific programmes. It has strong links with the Council of Europe intergovernmental Committee on Democracy and Governance (CDDG), which offers it ready access to high-level government officials with a reservoir of knowledge and expertise in governance reforms. Building on a unique set of European standards and the 12 principles, the centre has a repertoire of 24 capacity-building toolkits designed to reinforce Council of Europe standards and promote best European practice. Some of the toolkits are likely to be of interest for NGOs, for example the toolkit on civil participation which was developed with input from the Council of Europe’s civil society sector. The centre organises country specific and ad hoc training and capacity building activities which are often open to (and benefit from) the participation of civil society. A specific e-tool on the 12 principles is freely available to all interested participants on the e-learning HELP platform.
<urn:uuid:ccd8712b-18d3-41f4-92d2-a9526e232fea>
CC-MAIN-2022-33
https://www.coe.int/en/web/civil-society/centre-of-expertise-for-good-governance
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.939493
273
1.984375
2
One of the most iconic of Chinese weapons, commonly known as "Guandao" At first sight, this may look like a miniature version of a standard Qing s Of a type worn among others by the Valiant Cavalry. One of the classic weapons in Chinese martial arts. An extremely rare sleeveless vest from the Ming-Qing transition period. The famous tiger faced rattan shield as used by Chinese skirmishers. A heavy, well-made piece that was probably a military issue. Of a style that fell out of use with the fall of the Qing. A large and impressive blade, its pole cut-down. Of classic shape, with a leaf-shaped blade on a socket, connected by a cast bronze base. Of a rarer form, often used for ceremonial pole-arms. With a large iron guard and hard wooden shaft. This one has the early, peaked form and is signed by its maker. A large Chinese rattan shield called tengpai, used by special front-line troops.
<urn:uuid:9724e884-f6e3-45e5-8f34-977227279a02>
CC-MAIN-2022-33
https://mandarinmansion.com/items/europe/china/pole-arm/europe/china/armor/asia-east/china/china/armor/pole-arm?sort=created&order=asc
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.961065
222
2.34375
2
Many years ago, when I studied with Dr. Albert Ellis, I learned the five words that create stress, dissatisfaction, and ruined relationships. They are: NEED, MUST, SHOULDN’T, SHOULD and CAN’T. These five words are like mental handcuffs. They keep you from feeling free, creatively exploring life, and, most of all, living with self-compassion. They create depression, anger, worthlessness, anxiety, panic, and grief. In addition, they catalyze procrastination, stress, and avoidance. Some people think these words can be motivating, but that assumes the stick works better than the carrot. I have never found that to be the case. Kindness, patience, understanding, praise, appreciation, and gentleness are far more motivating. These five words have incredible power to create stress in your body-mind. You might feel this consciously or unconsciously through various symptoms including: migraines, stomach issues, heart palpitations, hives, neck, shoulder and back pain, insomnia, and a host of annoying or painful conditions. You can also feel their effect emotionally through: anger, anxiety, depression, worthlessness, resentment, etc. By habitually noticing the pervasiveness of these five words in your self-talk and conversations, you begin to recognize the incredible pressure they put on you and on everyone in your life, either directly or indirectly. While it’s tempting to think you can simply replace them with their antidotes, it’s not so easy. The crucial first step is awareness. How often do you tell yourself you need something you merely want? Do you pepper your self-talk with musts? Can you see how this creates pressure? What about all the shoulds and shouldn’ts constantly fighting for cranium space? Do you find yourself thinking or saying you, everyone, and everything in your life should be different from how you, they, or it are? Does your self-doubt appear as “I can’t?” If so, where is the evidence you can’t just because you think something is difficult? The five ANTIDOTE words and phrases are: WANT, WISH, COULD, I WOULD PREFER IT IF…, IT MIGHT BE BETTER IF…, I DON’T WANT TO DO X, Y OR Z. As usual, curiosity is your best friend here. Start by asking yourself these questions: Must I have what I merely want? Do people have to do what I wish they would? Do I truly need what I desire, or wish I had? Are my real needs already being met? Isn’t life, and everyone in it, exactly as it and they should be, whether it suits my wishes, or not? All these words are different from demands on yourself, others, and society. Railing against the way things are is fruitless and creates misery. By changing your inner and spoken vocabulary you can actually change your brain. Your expectations of yourself and others relax a bit and life can feel a little easier. Last but not least, this is self-compassion in action. If you find yourself having trouble accessing feelings of self-compassion, even if you’re using Kristen Neff’s wonderful website (https://self-compassion.org) or YouTube videos, try changing your words. It alerts you to how hard you can be on yourself while giving you concrete ways to change that inner narrative. Copyright Nicole S. Urdang
<urn:uuid:99f93cca-cf22-4076-9791-273714c6355a>
CC-MAIN-2022-33
https://holisticdivorcecounseling.com/antidotes-for-five-words-that-create-stress-and-ruin-relationships/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.936769
741
2.3125
2
Earning what you’re worth There is a perception that certain professions have a much higher pay than they actually do. And there is the widespread belief that some others pay more than what they are actually worth. For example, some public service employees (also known as “civil servants”) in certain countries who are paid much more than even private employees, yet work half the time and can hardly justify what they do as “work”. There is the perception in life that you don’t always get what you give. But that doesn’t mean you should give up. Life has a strange way of turning around and presenting you with the exact opportunities you deserve at the time when you’re ready. And karma takes care of everything else – all those who did not believe in you, who even mocked you or spoke badly of you. There is a place for everyone and in the end, everyone gets what they deserve. Just have faith and acknowledge the fact that even if you don’t earn what you’re worth, all that truly matters is that you know what you can do and those who matter will realise it eventually. “It’s not about how fast you go…it’s about how long you stay there”.
<urn:uuid:beaffdb7-f207-48d6-8271-600febdc47c0>
CC-MAIN-2022-33
https://mcswhispers.wordpress.com/2018/03/19/earning-what-youre-worth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.967428
270
1.851563
2
Stickers & Corflutes Corrugated plastic or Corflute - also known under the tradenames of Polyflute, Coroplast, FlutePlast, IntePro, Proplex, Correx, Twinplast, Corriflute - refers to a wide range of extruded twin wall plastic-sheet products produced from high-impact polypropylene resin with a similar make-up to corrugated fiberboard. It is a light-weight tough material which can easily be cut with a utility knife. We offer a wide variety of colours and thicknesses (quite commonly 3mm & 5mm) Suitable for both indoor and outdoor use, corflute signage is a great solution for short term advertising or informational signage. Lightweight and weather resistant corflute is often used in the real estate, event, trade and construction industries. A sticker is a type of label, a piece of printed paper, plastic, vinyl, or other material with pressure sensitive adhesive on one side. They can be used for decoration or for functional purposes, depending on the situation. Stickers can come in many different shapes and sizes and come in a wide variety of colours and designs. They are often adhered to items such as walls, cars, windows and completed jobs for advertising potential. If you need a label or sticker, we have the expertise to help you. With the ability to print on a wide range of substrates with different types of printing, we can provide the right solution for your application. Below are some things to consider when buying stickers: - Is it for indoor or outdoor use? If outdoor, then for how long? We have UV inks, extended life inks and UV over laminates to extend exterior life. - Will the label be exposed to any chemicals? We have various chemical resistant plastics and over laminates. - What surface is the label being applied to? We have different adhesives for smooth or textured surfaces. We also have different adhesives for low surface energy applications and flexible materials for curved surfaces. - What, if any, are the cost constraints? Do you need a label to be less than a certain price or is having it last much longer of greater benefit? - Surface printed or rear printed? We can protect the ink by rear printing on a clear substrate. Our custom made stickers come in any shape or size on durable, high quality vinyl. Our custom stickers feature a special laminate that protects them from exposure to wind, rain and sunlight. Vinyl stickers are a fast and easy way to promote your business, product, or event and Diverse Sign Studios can turn any artwork, logo, or photo into beautiful vinyl stickers ideal for all your advertisement needs
<urn:uuid:65e62d0b-afe2-4e0d-89b8-2638ea9e0d67>
CC-MAIN-2022-33
https://diversesign.com.au/signage-services/stickers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.93799
574
1.570313
2
KDE Plasma 5.8, is the release of a desktop environment with long term support, updates will be a minimum of 18 months. Plasma 5.8 built using the platform of KDE Frameworks 5 and Qt 5 with the use of OpenGL/OpenGL ES for rendering. When preparing new versions of Plasma 5.8.x the main efforts of the developers is aimed at improving stability, and increasing the functionality of the given secondary importance. 27 December was the fifth release of the KDE Plasma 5.8.5 LTS, which is made of about 50 different fixes and improvements translations. If you are using Linux Mint 18 KDE environment with the Plasma 5.8 and KDE neon, the developers recommend to update to version Plasma 5.8.5. Schedule for subsequent releases of KDE Plasma 5.8: KDE Plasma 5.8.6 – 21 February; KDE Plasma 5.8.7 – 23 May; KDE Plasma 5.8.8 – 17 Oct; And the latest release of KDE Plasma 5.8.9 will be released on 10 April 2018. Installation KDE Plasma 5.8.5 LTS into Linux Mint: You need to add the repository then you must fully upgrade the system via terminal or Update manager
<urn:uuid:edfb6cf5-7a12-4115-9d9a-3a4a46211be1>
CC-MAIN-2022-33
https://mintguide.org/system/718-update-to-kde-plasma-585-lts-in-linux-mint-18-kde.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.849453
267
1.539063
2
apple.news/ACxtId-HGTi2Ux5uwZCh7DQ I’ve been saying it for a while. Maybe for ten years. Indigenous and local voices need to be heard about climate crisis. Indigenous people know the history of the land and the water. And they are the ones living in climate crisis right now. It isn’t a matter of anxiety about the future, butContinue reading “The Discussion Needs More Voices” apple.news/AYxNaoCi3S6KmRgUrywEniw “The relatively cheap electrical energy that first supported the Thompson nickel mine — and now feeds an ever-growing, modern provincial economy — is frequently touted as a “green” alternative to fossil fuels, but even prior to Keeyask, earlier dams had changed the river’s flow patterns, affecting beaver and muskrat habitat, disrupting caribou migratory routesContinue reading “The Long Term Damage of Cheap, “Green” Energy” apple.news/Anvlv6X6eSiy8aYBwa3kL5g What determines what is an endangered species? The answer seems to be its utility to humans. Wolves are “useless” to humans because they endanger the cultivation of land by humans. What utility are wolves to the ecology? What utility are wolves to wolves?
<urn:uuid:10688ed0-f214-432d-b790-ee6c92ab93c5>
CC-MAIN-2022-33
https://polarredclimatecrisis.com/tag/ecology/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.918165
296
1.851563
2
Globalo wanted to check what is going on and visit the people of Molenbeek. It was a delightful surprise. Peace is back in Molenbeek. In April 2016 hundreds of young people came together, some with the Jewish kippahs (yarmulke) on their heads, many Muslims, some black, some white. But all of them were united in football just in front of the city hall. Rabbi Aaron Malinsky, from Antwerp, brought seven young Jewish Orthodox boys to play soccer together. Not easy to convince their parents – but he did. They played in mixed teams- one Jew, one Muslim, and one Christian. Soccer for peace. They want to win- together. The “Together in Peace“ tournament on the “Place comunale de Molenbeek“ was organized by the Roman Catholic Sant’Egidio organization from Rome(an organization that recently helped bring refugees from Lesbos to Vatican City), and was supported by the active mayor of Molenbeek, Francoise Schepmans, and Mrs. Bianca Debaets, State Secretary of the region of Brussels. The Imam of Molenbeek, Mohamad Elboutaibi along with Salah Echallaoui, the President of the Executive Committee of Muslims, and members of the Christian and Jewish communities also joined. Globalo asked some of the 15 and 16 years old students what they thought. “We like it! A great tournament!“ they proclaimed. Football is a perfect tool to bring together young people from different cultures. Rabbi Malinsky explains the idea behind it. When we met we found some connections: Our families both came from Breslau, now in Poland. His family had to flee Nazi extremists in 1938. My parents were expelled as Germans in 1945. We both know the two Rabbis Metzger from Haifa. The mother of the two Metzger Rabbis comes from Breslau as well. Both ladies talked about the Silesian “Streuselkuchen“ on the phone years ago and about their lost Heimat. What a small world! It shows us again that we all are connected and must work together to create a safer world. Having several excellent peppermint teas around the corner with the Turkish owner of a corner cafe, I heard the dominating opinion of most Muslims in Molenbeek: “The known ISIS terrorists living here in Molenbeek were no Muslims like us. They know nothing about the Holy Qur’an and the rules of the prophet. They were drinking alcohol, took drugs, were stealing and lived as criminals. They were misused by ISIS. We are Islam- they are not.” Rabbi Aaron Malinsky said in the video that “Belgium is known in the world for [terror]. Everybody knows Molenbeek…we want to give a new message. A message that Muslims, Jews, Christians, and free-thinkers and others can work together and make such a beautiful football tournament, because football is the universal language.” A group of 6 to 7 year old pupils also trained for a dance show. All this is possible because the young new mayor of Molenbeek, Francoise Schepmans, is committed to community engagement and promoting an active tolerance policy, and she has pushed for many new activities. Here are some impressions of this positive event for mutual understanding and peace from Molenbeek for you- just one year ago in April 2016.
<urn:uuid:85580f45-5d99-4cb1-a629-1062eb1b2235>
CC-MAIN-2022-33
https://www.worldsecuritynetwork.com/Other/deleted-users/PEACE-BACK-IN-MOLENBEEK
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.971198
746
1.671875
2
The Brighter They Shine by Julie Leidel, 2020 Concerning Scorpio Ten Billion Years B.C. by Vance Kirkland Commemorative 2017 poster for the Kirkland Museum created by Julie Leidel The night sky is so full of possibilities, energy and light. In 1925, Edwin Hubble had a theory that the universe was growing. Scientists have been able to prove that the universe is expanding in all directions, and has been since the beginning, or the Big Bang. "Something" doesn't come from "nothing". Everything has a source, just as our planet and each of us has an origin story. So does the universe, even if we don't know exactly how to quantify that in scientific terms today. The creator can't be "in" the creation, they have to be separate from it. For me personally, science is the vehicle for ever-growing understanding of God's creation. Like little puzzle pieces that are being revealed along the way, science sheds light on the Devine. For believers like me, God (or your personal Higher Power) brings hope and light to a sometimes extremely hard world. I have found that this saying is one of my favorites, especially in difficult times. "God's Promises are Like the Stars; The Darker The Night, The Brighter They Shine." You can't see the stars when the sun is out. You can't know what light is unless you have experienced darkness. We can learn so much from the difficult times in our lives. Suffering can lead to great discovery, if we are open to it. That's part of my faith, which is at the core of who I am. This painting has a familiar feel to some of my work, but it is a departure in the sense that so much of the story is told through dots. I didn't set out to with this goal in mind per say, but upon finishing it, the resemblance to some of Vance Kirkland's paintings is striking to me. He used acrylic, and had a lift that would hover him over his canvas laid flat beneath him in his Colorado art studio. Kirkland would use a variety of dowels to dip into his paint to get perfect circles. I used the end of a few different paint brushes to get a similar feel. Vance Kirkland (1904-1981) is a nationally renowned artist and if you are heading through Denver, Colorado you really shouldn't miss the Kirkland Museum. It's got a remarkable collection of Vance's work and his original art studio. The curator, Hugh Grant has amassed an incredible world-class collection of international decorative artwork from the 1870s through the 1960s. Kirkland Museum is in the top 5 museums around the world for decorative art, especially intriguing for me are the salon style rooms of the Arts and Crafts Movement: Aesthetic, Art Nouveau, Jugendstil, Glasgow Style, and Wiener Werkstatte. I was honored to be chosen as the artist for the commemorative grand opening poster for the Kirkland Museum in 2017. I recognize that my art is inspired by so many facets of my personal experiences. Each puzzle of our own lives comes together to be recalled at a later date, and with new perspective. This human experience sometimes feels like the garden hose is turned on full blast. There are so many things to learn, so many ways to expand who we are, and so many connections we can make to one another. We most certainly won't see the puzzle completed before our time on earth is complete, but I'll be trying to grab as many pieces as I can, and I hope to enjoy the experience with a full heart along the way.
<urn:uuid:ad03271d-c590-4269-b17b-125f965538c8>
CC-MAIN-2022-33
https://www.thebungalowcraft.com/blog/the-brighter-they-shine
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00072.warc.gz
en
0.977699
762
1.960938
2
UK banking performance at odds with Government’s green finance leadership ambitions The UK Government's ambition to promote the UK as a global leader of green finance post-Brexit is already at risk, with a new report finding that French banks have shown "marked leadership in green banking" because of innovative new legislation. Research from investment watchdog ShareAction ranked the 15 largest European banks on disclosure and management of climate-related impacts and opportunities. Despite the UK’s attempts to become a world leader in green finance, the research ranked three UK-listed banks – RBS, Standard Chartered, Lloyds Banking – in the bottom five. In stark contrast, French banks account for three of the top five spots. ShareAction’s project manager and report author Sonia Hierzig said: “This leadership and action serves the millions of people with an interest in how banks address climate-related risks, either through their pension savings or their deposits. “Too many of Europe’s largest banks are still moving slowly on this critical agenda, and this report brings that weak performance to the attention of both investors and regulators of banks. We expect this report to stimulate speedy improvement in the performance of more poorly performing banks.” In September 2017, the UK Government launched the Green Finance Taskforce to assist the low-carbon economy and boost the UK’s position as a “world leader” in clean growth investment. Top financial experts from Aviva, Barclays, HSBC, Legal & General, and the Bank of England will work alongside academics and sustainability experts to accelerate private sector funding in green technologies, infrastructure and innovative start-ups. It forms part of an over-arching move to attract and retain banking talent post-Brexit. However, the ShareAction research suggests that the UK Government should be mirroring regulation in France, if it truly wants to bolster green finance opportunities. French bank BNP Paribas secured top spot in the rankings, while Crédit Agricole France and Societe General round-up the top four behind UK-based HSBC. ShareAction claims that the high performances of the French banks can be attributed to the introduction of French law on the Energy Transition for Green Growth, which was adopted in August 2015 and came into effect in January 2016. Under the legislation it is mandatory for banks to disclose carbon requirements for institutional investors. The report suggests that the UK should consider adopting similar mandatory requirements on disclosure and stress testing. The fact that RBS, Barclays and Standard Chartered were listed as “learners” in the report – while Lloyds was named as a “bystander” – serves to highlight the impact that legislation can have. The notion that France is a strong believer in green finance will see the European Banking Authority move from London to Paris in the near future. In January 2017, France become only the second country at the time behind Poland to issue green bonds. The French Ministry of Finance’s financial stability director Jean Boissinot commented: “It is encouraging to see that this policy approach may indeed have contributed to nudging institutions towards stronger action.” The report noted that 13 of the 15 banks have confirmed intentions to implement the Task Force on Climate-related Financial Disclosures (TCFD) recommendations on disclosing climate-related information alongside financial filings. The TCFD recommendations have been backed by businesses worth more than $2trn in assets under management, while shareholders worth a similar amount have also demanded better risk management from banks. However, most banks surveyed by ShareAction gave weak responses to questions on specific financial exposures to climate-related risks and opportunities and there are already calls to strengthen conversations between stakeholders and banks. The UK workplace pension scheme NEST’s director of investment Paul Todd added: “The information in ShareAction’s report empowers us to have better informed conversations with banks we are invested in about climate-related issues, which make a real difference to long-term fund performance and to our members’ well-being in retirement. “We are particularly concerned about the banks that are lagging behind, disappointingly some of them UK-based. We will be monitoring their performance closely.” While the UK banks have performed poorly in the rankings, they are still making efforts to capture green markets. Barclays, HSBC and Lloyds Banking Group have all issued bonds to raise capital to support low-carbon companies and projects. In fact, the “bystander” of the report, Lloyds banking, has launched a £1bn fund to help real estate owners improve the energy-efficiency ratings of their buildings. The bank claims that up to 100,000 tonnes of carbon could be saved over the lifetime of the fund – equivalent to the output of more than 22,000 homes. © Faversham House Ltd 2022 edie news articles may be copied or forwarded for individual use only. No other reproduction or distribution is permitted without prior written consent.
<urn:uuid:4dff211e-f807-4d30-bd13-41c67612812c>
CC-MAIN-2022-33
https://www.edie.net/uk-banking-performance-at-odds-with-governments-green-finance-leadership-ambitions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.947557
1,031
1.671875
2
No matter how it was filmed, the best way to present a movie on video as it was originally created is to letterbox it. This format presents the full, wide picture on the middle of the television screen, with black bars above and below it. This maintains the movie's original theatrical aspect ratio, so that you see everything the director intended you to see. Because they preserve the original cinematography of the movie, letterbox, or widescreen, videos have become more and more popular in recent years. The format is particularly common on DVDs because their increased storage capacity can hold both a letterbox version and a full-frame version, a presentation that uses the entire television screen. Also, their increased picture quality helps counteract the loss of resolution caused by shrinking the movie picture. The problem with letterboxing is that it shrinks the viewing area of the television screen, which, if you have a small set to begin with, can make it fairly difficult to see the movie. For this reason, letterboxing is not the most popular formatting option. Most viewers are bothered by the black bars at the top and bottom of their screen more than they are bothered by the idea of not seeing the picture as it was originally filmed, so full-frame movie presentations are much more prevalent than letterbox presentations. But if you are a student of film and want to fully experience the movie as a work of art, then the letterbox format is the only way to go. Squeezing & Cropping Squeezing & Cropping If a movie was filmed using an anamorphic lens, then the complete picture already exists in a 1.37:1 format and so can be shown full frame on a television without cutting much of the image. The problem, of course, is that this image is severely squeezed, so that circles appear to be eggs and everyone's face is creepily elongated. Most viewers find this distracting, to say the least, so this formatting option is not used very often. Some video producers did release movies this way when home video was just starting out, but these days, the only time you're likely to see this is at the beginning of movies, as a means of fitting wide opening credits on the screen. The more popular option in recent years has been to letterbox the opening credit sequence Another method from the early days of home video is cropping. This term is sometimes used generally to describe cutting off part of the original theatrical picture, but it also refers to one specific formatting method. In this original cropping technique, the video formatter simply presents the middle part of the theatrical picture on video. Cropped movies frequently have rotten cinematography and can actually be hard to follow. This is because the technique blindly ignores anything that happens on the side of the screen, playing the odds that most of the important action will appear in the middle of the screen, at least in part. If a minor character only shows up on the far left side of a wide-aspect ratio shot, then he may not even show up in the cropped edition of the movie. A particularly maddening scenario is when two characters in conversation stand on either side of the picture. The viewer sees the entire conversation with only the very edge of each person's face appearing on their screen, and nothing but blank space taking up the rest of the picture. Fortunately, this technique has mostly fallen by the wayside. Pan & Scan Pan & Scan The method that has mostly replaced cropping and squeezing is panning and scanning. In this process, a video technician views the movie with its original aspect ratio and decides which television-sized chunk of the movie to show at any one time. Usually, this means focusing on the elements of the picture that are most important to the plot, which is obviously a subjective decision. If you have two characters at either end of a widescreen shot, for example, the pan-and-scan operator must decide which one to show. The operator will probably show the one that is talking, or performing the more conspicuous action. A careful pan-and-scan operator will try to represent the different important aspects of a shot by "cutting" between the two halves of the screen, so that what was originally one shot becomes multiple shots. The operator can also create a pan from one side of the picture to another (hence the name of the process). To see what you might miss when a movie scene has been panned and scanned, click several times on the left or right arrow. If a movie was shot with an anamorphic lens or a hard matte, the two main formatting options are to letterbox the movie or pan and scan it. If the movie was shot using a soft matte, however, there is a third option. We know that a filmmaker using a soft matte exposes the entire film area when shooting a movie. If 35mm film is used, this full image has an aspect ratio of 1.37:1, fairly close to television's 1.33:1 aspect ratio. One formatting solution is to leave the matte "open," making the video copy of the movie from this entire film area. The picture then fills the entire television screen and only crops a small amount from the sides of the filmed image. The success of this method depends on how the director shot the movie. Some directors compose each shot with both the soft-matted picture and the full image in mind. When they look through the camera, they see the entire picture exposed to the film and a superimposed rectangle indicating the theatrical aspect ratio. In this case, the main thing you lose in video formatting is visual composition. So if you are mainly interested in following the plot of a movie, and not so much in cinematography, a full-frame version of a soft-matted movie will probably suit you fine. A full-frame picture of this sort doesn't cut out much visual information, so you aren't as likely to miss details or plot points as you are watching a panned and scanned version of an anamorphic or hard-matted movie. The full-frame picture of a soft-matted movie is not always usable, however. A lot of directors will use a soft matte but completely ignore what's outside the theatrical matte. If you take a full image from this sort of movie, you might very well see boom mikes, lights and unfinished sets. Also, if the movie includes special visual effects, there's a good chance they were added only to the theatrical aspect ratio portion of the image. It might be that some shots are usable and some are not. In this case, the video formatter may choose to combine full-frame shots with panning and scanning of the soft-matted theatrical picture. For more information on video formatting and related topics, check out the links on the next page.
<urn:uuid:db01e22a-a123-4575-8f9d-c6cb2695f89d>
CC-MAIN-2022-33
https://entertainment.howstuffworks.com/video-format.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.955692
1,398
2.15625
2
Telehealth for Autism This month, Behavior Imaging Solutions announced the successful results of a small pilot study funded by one of Autism Speaks’ first Innovative Small Business Grants. The grant allowed the company to develop and test its new web-based “telehealth” system to improve medication management via the Internet for individuals with autism. Instead of an in-person appointment, the doctor asks caregivers to send relevant video clips using the company’s “Behavior Connect” software. The system may prove of particular value to families in locations remote from major medical centers with autism specialists. In particular, the pilot study focused on the development and evaluation of a new mobile device app called Med SmartCapture. Through this system, a family can securely share home videos and other health information from their home. The system also includes tools that allow integrated access to personal health records. Three caregivers and two doctors participated in the pilot study. The doctors reported that the video monitoring provided the behavioral information they needed to monitor and adjust medications appropriately. The participating families reported that they could maintain a consistent and informative relationship with their prescribing doctors. “I am very excited about what Med SmartCapture will be able to do for patient care and communication between parents, educators and providers so that we are all putting our integrated energies in the same direction to help the kids we are working with,” said psychiatrist Robert Hendren. Dr. Hendren is the vice chair and director of the Autism and Neurodevelopment Program at the University of California, San Francisco Children’s Hospital. Founded in 2005, Behavior Imaging recently received a $2.2 million grant by the National Institute of Mental Health to pursue Behavior Connect technology for earlier diagnosis of autism and related disabilities. You can find the original article posted on Autism Speaks website here https://www.autismspeaks.org/blog/2014/03/20/your-dollarswork-telehealth-autism Holidays in general can be overwhelming and overstimulating for children with autism.
<urn:uuid:e2c4187e-067b-4ab6-8465-d8de8703cedc>
CC-MAIN-2022-33
https://lighthouseautismcenter.com/blog/telehealth-autism/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.928129
428
1.789063
2
Summary: According to researchers, probiotics may not be as effective as most believe. Researchers report many people’s digestive tracts prevent standard probiotics from successfully colonizing them. Source: Cell Press. Probiotics are found in everything from chocolate and pickles to hand lotion and baby formula, and millions of people buy probiotic supplements to boost digestive health. But new research suggests they might not be as effective as we think. Through a series of experiments looking inside the human gut, researchers show that many people’s digestive tracts prevent standard probiotics from successfully colonizing them. Furthermore, taking probiotics to counterbalance antibiotics could delay the return of normal gut bacteria and gut gene expression to their naïve state. The research publishes as two back-to-back papers on September 6 in the journal Cell. “People have thrown a lot of support to probiotics, even though the literature underlying our understanding of them is very controversial; we wanted to determine whether probiotics such as the ones you buy in the supermarket do colonize the gastrointestinal tract like they’re supposed to, and then whether these probiotics are having any impact on the human host,” says senior author Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel. “Surprisingly, we saw that many healthy volunteers were actually resistant in that the probiotics couldn’t colonize their GI tracts. This suggests that probiotics should not be universally given as a ‘one-size-fits-all’ supplement. Instead, they could be tailored to the needs of each individual.” While past studies have investigated similar questions, they have all used patients’ excrement as a proxy for microbe activity in the GI tract. Instead, Elinav, his colleague Eran Segal, (a computational biologist at the Weizmann Institute), and their teams spearheaded by Niv Zmora, Jotham Suez, Gili Zilberman Schapira, and Uria Mor of the Elinav lab collaborated with Zamir Halpern, Chief of Gastroenterology at the Tel Aviv Medical Center to measure gut colonization directly. In the first study, 25 human volunteers underwent upper endoscopies and colonoscopies to sample their baseline microbiome in regions of the gut. 15 of those volunteers were then divided into two groups. The first group consumed generic probiotic strains, while the second was administered a placebo. Both groups then underwent a second round of upper endoscopies and colonoscopies to assess their internal response before being followed for another 2 months. The scientists discovered that the probiotics successfully colonized the GI tracts of some people, called the “persisters,” while the gut microbiomes of “resisters” expelled them. Moreover, the persister and resister patterns would determine whether probiotics, in a given person, would impact their indigenous microbiome and human gene expression. The researchers could predict whether a person would be a persister or resister just by examining their baseline microbiome and gut gene expression profile. They also found that stool only partially correlates with the microbiome functioning inside the body, so relying on stool as was done in previous studies for many years could be misleading. “Although all of our probiotic-consuming volunteers showed probiotics in their stool, only some of them showed them in their gut, which is where they need to be,” says Segal. “If some people resist and only some people permit them, the benefits of the standard probiotics we all take can’t be as universal as we once thought. These results highlight the role of the gut microbiome in driving very specific clinical differences between people.” In the second study, the researchers questioned whether patients should be taking probiotics to counter the effects of antibiotics, as they are often told to do in order to repopulate the gut microbiota after it’s cleared by antibiotic treatment. To look at this, 21 volunteers were given a course of antibiotics and then randomly assigned to one of three groups. The first was a “watch-and-wait” group that let their microbiome recover on its own. The second group was administered the same generic probiotics used in the first study. The third group was treated with an autologous fecal microbiome transplant (aFMT) made up of their own bacteria that had been collected before giving them the antibiotic. After the antibiotics had cleared the way, the standard probiotics could easily colonize the gut of everyone in the second group, but to the team’s surprise, this probiotic colonization prevented the host’s normal microbiome and gut gene expression profile from returning to their normal state for months afterward. In contrast, the aFMT resulted in the third group’s native gut microbiome and gene program returning to normal within days. “Contrary to the current dogma that probiotics are harmless and benefit everyone, these results reveal a new potential adverse side effect of probiotic use with antibiotics that might even bring long-term consequences,” Elinav says. “In contrast, replenishing the gut with one’s own microbes is a personalized mother-nature-designed treatment that led to a full reversal of the antibiotics’ effects.” Segal adds, “This opens the door to diagnostics that would take us from an empiric universal consumption of probiotics, which appears useless in many cases, to one that is tailored to the individual and can be prescribed to different individuals based on their baseline features.” About this neuroscience research article Source:Cell Press Publisher: Organized by NeuroscienceNews.com. Image Source: NeuroscienceNews.com image is in the public domain. Original Research: Open access research for “Personalized Gut Mucosal Colonization Resistance to Empiric Probiotics Is Associated with Unique Host and Microbiome Features” by Niv Zmora, Gili Zilberman-Schapira, Jotham Suez, Uria Mor, Mally Dori-Bachash, Stavros Bashiardes, Eran Kotler, Maya Zur, Dana Regev-Lehavi, Rotem Ben-Zeev Brik, Sara Federici, Yotam Cohen, Raquel Linevsky, Daphna Rothschild, Andreas E. Moor, Shani Ben-Moshe, Alon Harmelin, Shalev Itzkovitz, Nitsan Maharshak, Oren Shibolet, Hagit Shapiro, Meirav Pevsner-Fischer, Itai Sharon, Zamir Halpern, Eran Segal, and Eran Elinav in Cell. Published September 6 2018. doi:10.1016/j.cell.2018.08.041 Open access research for “Post-Antibiotic Gut Mucosal Microbiome Reconstitution Is Impaired by Probiotics and Improved by Autologous FMT” by Jotham Suez, Niv Zmora, Gili Zilberman-Schapira, Uria Mor, Mally Dori-Bachash, Stavros Bashiardes, Maya Zur, Dana Regev-Lehavi, Rotem Ben-Zeev Brik, Sara Federici, Max Horn, Yotam Cohen, Andreas E. Moor, David Zeevi, Tal Korem, Eran Kotler, Alon Harmelin, Shalev Itzkovitz, Nitsan Maharshak, Oren Shibolet, Meirav Pevsner-Fischer, Hagit Shapiro, Itai Sharon, Zamir Halpern, Eran Segal, and Eran Elinav in Cell. Published September 6 2018. doi:10.1016/j.cell.2018.08.047 [cbtabs][cbtab title=”MLA”]Cell Press”Human Gut Study Questions Probiotic Health Benefits.” NeuroscienceNews. NeuroscienceNews, 7 September 2018. <https://neurosciencenews.com/probiotic-health-questioned-9818/>.[/cbtab][cbtab title=”APA”]Cell Press(2018, September 7). Human Gut Study Questions Probiotic Health Benefits. NeuroscienceNews. Retrieved September 7, 2018 from https://neurosciencenews.com/probiotic-health-questioned-9818/[/cbtab][cbtab title=”Chicago”]Cell Press”Human Gut Study Questions Probiotic Health Benefits.” https://neurosciencenews.com/probiotic-health-questioned-9818/ (accessed September 7, 2018).[/cbtab][/cbtabs] Personalized Gut Mucosal Colonization Resistance to Empiric Probiotics Is Associated with Unique Host and Microbiome Features Empiric probiotics are commonly consumed by healthy individuals as means of life quality improvement and disease prevention. However, evidence of probiotic gut mucosal colonization efficacy remains sparse and controversial. We metagenomically characterized the murine and human mucosal-associated gastrointestinal microbiome and found it to only partially correlate with stool microbiome. A sequential invasive multi-omics measurement at baseline and during consumption of an 11-strain probiotic combination or placebo demonstrated that probiotics remain viable upon gastrointestinal passage. In colonized, but not germ-free mice, probiotics encountered a marked mucosal colonization resistance. In contrast, humans featured person-, region- and strain-specific mucosal colonization patterns, hallmarked by predictive baseline host and microbiome features, but indistinguishable by probiotics presence in stool. Consequently, probiotics induced a transient, individualized impact on mucosal community structure and gut transcriptome. Collectively, empiric probiotics supplementation may be limited in universally and persistently impacting the gut mucosa, meriting development of new personalized probiotic approaches. Post-Antibiotic Gut Mucosal Microbiome Reconstitution Is Impaired by Probiotics and Improved by Autologous FMT Probiotics are widely prescribed for prevention of antibiotics-associated dysbiosis and related adverse effects. However, probiotic impact on post-antibiotic reconstitution of the gut mucosal host-microbiome niche remains elusive. We invasively examined the effects of multi-strain probiotics or autologous fecal microbiome transplantation (aFMT) on post-antibiotic reconstitution of the murine and human mucosal microbiome niche. Contrary to homeostasis, antibiotic perturbation enhanced probiotics colonization in the human mucosa but only mildly improved colonization in mice. Compared to spontaneous post-antibiotic recovery, probiotics induced a markedly delayed and persistently incomplete indigenous stool/mucosal microbiome reconstitution and host transcriptome recovery toward homeostatic configuration, while aFMT induced a rapid and near-complete recovery within days of administration. In vitro, Lactobacillus-secreted soluble factors contributed to probiotics-induced microbiome inhibition. Collectively, potential post-antibiotic probiotic benefits may be offset by a compromised gut mucosal recovery, highlighting a need of developing aFMT or personalized probiotic approaches achieving mucosal protection without compromising microbiome recolonization in the antibiotics-perturbed host.
<urn:uuid:052669ff-268c-4425-86cb-bf40c2091877>
CC-MAIN-2022-33
https://neurosciencenews.com/probiotic-health-questioned-9818/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.901002
2,354
2.96875
3
return to articles... Water in Winter Bill Fintel, Avian Aquatics With winter fast approaching, it is time to tend to the birds' water supply. Following is a basic summary of how to easily provide open water for our feathered friends once cold weather arrives. Open water for birds to drink becomes very important when all natural water sources begin to freeze solid. While snow can be used as a source of drinking water, it must be melted. This consumes energy birds otherwise could use to stay warm. Birds face their most critical situation when it is so cold that all natural water sources have frozen over and there is no snow cover... Read this article in its entirety and and hundreds more in Birdfeeding Plus, the Society's online archive. Lifetime access is only $4.95. Find out more about Birdfeeding Plus Already have a password? Enter Birdfeeding Plus
<urn:uuid:c0d197f1-72b8-4b63-87ec-fb72de15114f>
CC-MAIN-2022-33
http://www.birdfeeding.org/articles/293a.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.914656
196
3
3
Why Hong Kong Is Protesting —And May Do So Again As China seeks to assert greater control over Hong Kong, the city regularly displays its penchant for protest. Recent demonstrations forced the local government to suspend consideration of a bill that would have allowed extraditions to the mainland for the first time. Chinese President Xi Jinping, on a visit to Hong Kong in 2017, warned that challenges to Beijing’s rule wouldn’t be tolerated. But as China moves to strengthen its bond with the city of 7.5 million people, the extradition law is just one of several potential flash points. 1. Isn’t Hong Kong part of China? Yes, but it’s a semi-autonomous region. The city was an outpost of the British Empire for 156 years, during which time it developed into a global business hub. In a 1984 joint declaration, the British agreed to give the city back in 1997, at the end of a 99-year lease on much of the land, and China promised to allow a “high degree of autonomy” for 50 years, including guarantees of free speech, capitalist markets and English common law under a “one country, two systems” arrangement. 2. What is the extradition law? The “Fugitive Offenders and Mutual Legal Assistance in Criminal Matters Legislation (Amendment) Bill 2019” — proposed by Hong Kong’s government in February — covers mainland China and other jurisdictions that don’t have extradition agreements with Hong Kong. It was sparked by the case of a Hong Kong man who was accused of murdering his girlfriend in Taiwan, but couldn’t be sent back for trial there because there’s no legal framework. The Hong Kong government says the proposed law would ensure the city doesn’t become a haven for suspected criminals. 3. What’s the problem? Opponents say the law could open the door for anyone — including political dissidents or civil rights activists — who runs afoul of the Chinese government to be arrested on trumped-up charges in Hong Kong and sent to the mainland, where they would face what the U.S. State Department called China’s “capricious legal system.” The law would apply to Hong Kong citizens, foreign residents and even people passing through on business or as tourists. Critics noted the draft bill assigned to the city’s chief executive — chosen by a committee stacked with Beijing supporters — the leading role in handling extradition requests; currently the legislature can block extraditions. The government says it amended the bill to protect human rights and ensure suspects aren’t extradited for political offenses. 4. Why such alarm? The proposed bill was the latest in a series of moves by China under Xi that are viewed as chipping away at Hong Kong’s autonomy, including barring some activists from seeking elected office, prosecuting protest leaders and banning a pro-independence political party. The U.S. has suggested that the continued erosion of autonomy could jeopardize Hong Kong’s special status, under which the Americans agree to treat Hong Kong as distinct from China for trade and economic matters. 5. How did Hong Kong’s government respond to the protests? Chief Executive Carrie Lam, the city’s highest official, suspended action on the extradition bill on June 15, following protests that brought hundreds of thousands of people to the streets and saw police use pepper spray, rubber bullets and tear gas. Big crowds turned out repeatedly on following days to demand the bill’s complete withdrawal, and Lam’s resignation. Lam apologized for her handling of the bill and said it was unlikely that lawmakers would seek its passage this year. 6. What are some other potential flash points? Hong Kong is required to enact national security legislation to prohibit subversion against China and activity by foreign political bodies. The last time it tried to bring in such a law, in 2003, half a million people poured onto the streets and the bill was abandoned. Lam has said she wants to create a “favorable social environment” before reintroducing it. Hong Kong is also considering legislation to make disrespecting the Chinese national anthem a crime, with prison sentences of as long as three years. And there were protests last year after Lam outlined a project to build artificial islands between Hong Kong island and the Lantau to the west. Detractors object to the estimated $80 billion cost and the environmental impact. The islands would help accommodate a continuing influx of mainland Chinese, whom many Hong Kong residents blame for rising property prices and overcrowded public hospitals. 7. Have protests worked before? The 2003 demonstration that succeeded in scrapping the national security proposal also contributed to the resignation of then-Chief Executive Tung Chee-hwa. Nine years later, mass gatherings led by high school students pressured the government to reconsider a history curriculum lauding China’s ruling Communist Party. But the pro-democracy movement fractured after the government successfully faced down student-led demonstrators who occupied city streets for 79 days in 2014, refusing to yield to demands for direct, popular elections for the chief executive. 8. What does China say? China’s foreign ministry warned against foreign interference in the extradition law protests. An official Chinese newspaper, the China Daily, wrote in an editorial that closing the extradition loophole would strengthen the rule of law in Hong Kong, adding that “foreign forces are seizing the opportunity to advance their own strategy to hurt China by trying to create havoc in Hong Kong.” On his 2017 visit, Xi said any attempts to challenge the Chinese government “or use Hong Kong to carry out infiltration and sabotage activities against the mainland is an act that crosses the red line, and is absolutely impermissible.” –With assistance from Karen Leigh.
<urn:uuid:e56cb2c7-3e6c-45c2-a2f7-ce9b4a9ec85d>
CC-MAIN-2022-33
https://fortune.com/2019/07/01/hong-kong-protests-explained-why/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.959577
1,188
2.734375
3
As Sonia Alvarez Campillo was leaving Catholic Mass on July 14, 2013 with fellow members of Ladies in White, her pro-democracy organization, she was assaulted by Raul Castro's agents. These "security" agents broke Alvarez Campillo's wrist as well as her husband's ribs in their attack on her and other members of her group. Sunday after Sunday in Cuba, the Ladies in White (Damas de Blanco) -- members of a movement started in 2003 by wives and other female relatives of jailed dissidents in Cuba -- have peacefully demonstrated for freedom and human rights in cities across Cuba. They have continually been harassed, beaten, and imprisoned in Raul Castro's Cuba. In an attack just two months ago, Lady in White member Digna Rodriquez Ibañez was pelted with tar by agents of the regime. The Cuban Commission on Human Rights and National Reconciliation -- an organization of Cuban dissidents that the Castro regime claims is illegal -- reported that in 2014 alone, 1,810 members of the Ladies in White were detained. The detentions of these extraordinary women are among the total of 8,899 detentions evidently designed to crush political dissent. That figure represents a 27% rise from the previous year. Oswaldo Paya and Harold Cepero were leaders of the Christian Liberation Movement, a political party opposed to Castro's Communist Party. In July of 2012, Cuban state security agents allegedly murdered Paya and Cepero by ramming into their car and running them off the road, where they crashed and died. The Cuban government officially claims the crash was an accident. But, as documented in the U.S. State Department's Human Rights Report for 2013, when David Gonzalez Peres, another leader of the Christian Liberation Movement, was arrested, Cuban officials at the jail warned him about what happened to Paya. Paya and Cepero were most likely murdered for trying to change a system in which all 612 candidates in a recent Cuban election were members of the Communist Party and ran unopposed, and in which all other candidates had been rejected by the regime. Cuba is still a brutal place, with Raul Castro -- who replaced his brother, Fidel, in 2006 -- as a dictator doing everything he can to hold onto power. The White House has announced that President Obama plans to take Cuba off the List of State Sponsors of Terrorism. Congress has 45 days to review and reverse this decision. Of tremendous concern is Cuba's relationship with Iran -- the world's leading state sponsor of terrorism. The State Department's most recently available State Sponsors of Terrorism Overview for 2013 detailed Iran's vast support for terrorist activities -- including: funding Assad's brutal regime in Syria, where (by that point) 100,000 civilians had died in the ongoing civil war; supporting innumerable terrorists groups that continually attack Israel; supporting rebels trying to overthrow governments in Yemen (now done) and Bahrain; and increasing its presence in Africa. Both Iran and Hezbollah, one of its prime terrorist proxies, were shockingly left off last month's annual terrorism threat assessment report to Congress from James Clapper, the Director of National Intelligence. Iran-Cuba relations are strong, including an annual Iran-Cuba economic summit. In 2008, former Iranian President Ahmadinejad approved 500 million euros for the Cuban regime and Cuba is training Iranian scientists and sending scientists and researchers to Iran. The stated purpose has been for medical biotechnologies. Are these Cuban scientists involved in Iran's biological or even nuclear weapons programs? In 2003, Cuba gave Iran access to a location in Cuban territory it apparently needed to block U.S.-backed, uncensored Farsi-language broadcasting to Iran -- the equivalent of blocking Radio Free Europe during the Cold War. Cuba also has a long-time alliance -- and shares intelligence capabilities -- with Venezuela, which, just last month, the U.S. government declared a national security threat, slapping sanctions on top Venezuelan officials. There are reports that Tarcek Zaidan El Aissami Maddah, a man with strong ties to the Middle East who is now governor of the Venezuelan state of Aragua, may be at the center of this Iran-Cuba-Venezuela alliance and that he has built "a criminal-terrorist pipeline, bringing militant Islamists into Venezuela and surrounding countries, and sending illicit funds from Latin American to the Middle East." Regional intelligence officials also believe Maddah's office has been using technology given to them by Cuba, to issue new Venezuelan identification documents to 173 Middle Easterners. Castro and Cuba also continue to provide safe haven for the Colombian terrorist organization FARC (Revolutionary Armed Forces of Colombia), which has been at the center of a 50-year civil war that has cost over 220,000 lives and displaced 5.7 million people. FARC, at the center of Colombian drug trafficking, has taken thousands of hostages -- including a Colombian presidential candidate and three Americans who were saved in a daring rescue mission in 2008 -- and has forcibly recruited child soldiers. During the last 15 years, the U.S. has invested $9.3 billion in "Plan Colombia," to strengthen the Colombian government's counter-narcotics efforts and cripple FARC. The State Department's annual report on State Sponsors of Terrorism references Cuba's safe haven for FARC every single year. The report for 2011 speaks specifically of "medical and political assistance" for FARC. Sympathizers of Cuba claim that there is no reported evidence of financial resources or military supplies in recent years, and that Cuba should be given credit for hosting peace talks between FARC and the Colombian government. However the State Department's Report on Terrorism 2008 states that Cuba has "one of the world's most secretive and non-transparent national banking systems," which makes monitoring the flow of resources to FARC or other terrorist organizations difficult. Amazingly, it was only in January of 2014 that Castro announced Cuba would freeze bank assets connected to Al-Qaeda. Might this indicate that Castro knew assets linked to Al-Qaeda were flowing through his country? Who else is receiving money through Cuba's "secretive banking system"? In 2013, an illegal Cuban arms shipment was stopped from going to North Korea. Early this year, a Chinese ship with massive amounts of explosives destined for Cuba was stopped in Panama. Also early this year, a shipment of Russian anti-aircraft weapons going to FARC, through Cuba-friendly Ecuador, was stopped by the Colombian military. These incidents all raise the possibility that Cuban weapons are going to terrorist groups. Cuba has hosted past peace talks between the Colombian government and FARC, all of which have failed to produce progress. The current peace talks have dragged on for more than three years, and leaders of FARC are refusing to surrender weapons or face prison. Even though peace talks between the Colombian government and FARC are ongoing, Colombia continues military operations against FARC -- which has used past ceasefires to rebuild. FARC also kidnapped a Colombian General in November 2014 (later releasing him). On April 15, FARC brutally executed 11 Colombian soldiers -- in the middle of the Cuba-hosted peace talks, which supposedly represent a "better" FARC. The U.S. government has automatic warrants for all senior FARC leaders to be arrested and tried on charges of drug trafficking. Castro wants Cuba taken off the Terrorism List so that certain sanctions, including limits on World Bank loans and development aid, will be lifted from his nation. This would also mark the beginning of normalized relations with the U.S., and Castro is no doubt hoping for more sanctions relief from the U.S. trade and travel embargoes. U.S. Congressman Jeff Duncan, Chairman of the House Subcommittee on the Western Hemisphere, has said that lessening sanctions would, "only secure more funds for the Cuban Government, leaving the average Cuban citizen with very little economic improvements." Castro's communist regime controls the Cuban economy, and virtually all businesses and means of production belong to the government. This means that Cuban citizens will only benefit from sanctions relief to the extent Castro decides. Terrorizing the Ladies in White and the abuse of many other Cuban dissidents are apparently not officially considered when making the decision regarding Cuba and the List of State Sponsors of Terrorism -- just as human rights in Iran, or the four Americans being held and tortured in Iranian prisons were, according to the White House Press Secretary Josh Earnest, deliberately not linked to any nuclear negotiations with Iran. The decision of who is on the List of State Sponsors of Terrorism is apparently only based on support for members of officially designated terrorist organizations. At the recent Summit of the Americas, Raul Castro actually justified his support for terrorism. "Yes," he said, "we have conducted solidarity with other peoples that could be considered terrorism." Was Castro justifying Cuba's long years of support for brutal communist revolutionaries around the globe in the past, or was he trying to justify his current support for FARC and others linked to terrorist organizations? Does Castro still justify his support of Joanne Chesimard, a member of the Black Liberation Army who was convicted of killing a New Jersey State Trooper in 1973, but escaped prison and has long been given a safe haven in Cuba? Chesimard is still on the FBI's Most Wanted List of terrorists. Does Castro also still justify his support for William Morales, who escaped to Cuba as he was facing charges for a 1975 bombing in New York City that killed four people as part of FALN, a Puerto Rican terrorist group? Will Castro justify his continued protection of Basque ETA terrorists, whose organization has killed over 800 people in Spain through bombings and attacks? Spain is asking for assistance from the U.S. government, to pressure Cuba to return two Basque terrorists Cuba is currently hosting. The Ladies in White show us the brutality of the Castro regime. They are the ones we should be reaching out to, engaging with, and promoting -- not Raul Castro. Normalizing relations at this time with Cuba will only enable the Castro dictatorship to continue impoverishing and brutalizing its people. To enrich and solidify this dictatorship at this time only prevents the Cuban people from being able to forge a better life through elections in a few years, now that they are finally "on the one-yard line," when the Castro brothers, now in their eighties, could simply be left to their natural, un-bankrolled, ends. In a dictatorship such as this, only the dictators benefit. Let us stand with the Ladies in White and the families of the victims of the Chesimard, Morales, ETA and FARC murders. Let us not give Castro the resources he needs from sanctions relief to continue his regime's 56-year reign of terror on his own people, and his continued support for terrorists and terrorist states. Keep Cuba on the List of State Sponsors of Terrorism. George Phillips served as an aide to Congressman Chris Smith of New Jersey, working on human rights issues.
<urn:uuid:78fb5a82-eed4-466d-853a-ce2a9106f822>
CC-MAIN-2022-33
https://www.gatestoneinstitute.org/5639/cuba-terrorism-state
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.969306
2,261
1.742188
2
Social-emotional learning is a term often used to describe a school’s approach to building what may be considered the softer skills - regulating emotions, building interpersonal relationships, navigating the internal desire to succeed. According to CASEL, a non-profit that aims to make evidence-based social emotional learning (SEL) an integral part of preK-12 education social-emotional learning is: ... the process through which all young people and adults acquire and apply the knowledge, skills, and attitudes to develop healthy identities, manage emotions and achieve personal and collective goals, feel and show empathy for others, establish and maintain supportive relationships, and make responsible and caring decisions. In a school community, the approach to social-emotional learning is evident both in the school climate and culture and how adults and students relate to each other. It is also demonstrated through the time allocated to navigating these important skills with students, while balancing the core academic subjects. Because there can be differences in how social-emotional learning is approached in schools, defining it for a school community is important. What then, is social-emotional learning at WSG? As is illustrated on this graphic, there are two layers to social-emotional at WSG: WSG Core Values (within the girl’s face) and specific Qualities of SEL (the blue circle surrounding the girl). WSG Core Values: Since the school’s founding, these core values have been an integral part of the WSG’s overall program, with a focus on helping students develop skills of leadership, fortitude and resilience. It is with these qualities that students will engage with the world and exert a positive influence. Our core values are: Confidence - providing an environment where students can positively engage and understand their gifts and talents. Excellence - in teaching and learning develops critical thinking and a thirst for knowledge and truth. Faith - in God is the source of our lives and strength and so we encourage each student’s deepening of her spirituality. Goodness - encouraging each student to respect her own dignity and goodness, as well as that of others. Joy - in the learning environment as children best learn when they are happy and feel safe. Peacemaking - focused on teaching and modeling forgiveness to help students shape an alternative future for our world. Perseverance - helping students to face inevitable obstacles in their own lives yet to also pursue their goals with faith, vision, resilience and courage. Generosity - encouraging a willingness to contribute positively to our communities and the world. Layered on top of our core values for social emotional learning are the important skills that WSG incorporates into the daily experience for students, further supporting their growth into young women. Qualities of SEL at WSG are: Self-esteem - ensuring that the school environment is a positive place where students are nurtured and supported for who they are. Relationship building - focusing on nurturing positive relationships between students and adults/students including important conflict resolution. Responsible decision making - providing the conditions necessary for students to develop independence in decision making. Self-awareness - enhancing students’ understanding of who they are and their unique capabilities. Motivation - establishing and maintaining a positive attitude towards school and learning. Cultural identity - creating positive conditions for inclusion and belonging, particularly cherishing their experiences and perspectives as girls of color. Thus, it is the combination of these two groups that makes WSG’s approach to social-emotional learning particularly unique. Blending the perspectives initiated at the school’s founding with an intentional focus on highlighting the skills needed for students to become career or college ready in their future lives are what permeates WSG’s program. In addition, by further incorporating cultural identity into effective SEL learning, WSG acknowledges the particular importance of positively embracing the cultural identifiers of Black and Brown girls. What does this all look like in practice at WSG? An important aspect is ensuring time is built into the schedule to ensure that teachers are able to implement the strategies needed for SEL growth. With a regular schedule for community building and engagement and plentiful opportunities for individual reflection and growth, SEL is ever present at WSG. In addition, through specific aspects of the school’s pedagogy, including conflict resolution and experiential learning, WSG further supports students in developing the skills needed to be a positive member of her school community and the larger world. Finally, through regular examination of current events combined with refinement of curriculum when needed, WSG can lean into the cultural perspectives needed to positively impact students’ learning. Offering opportunities for students to reflect on, discuss and critically think about what is going on in their lives and the world can solidify their internal fortitude and is regularly included in the school day. SEL thus is the process through which students at WSG have the experiences needed in their school environment to develop their perspectives, recognize their strengths and the gifts of others, build community, and feel good about themselves. SEL gives students insight into themselves as learners while also helping them to think about their future goals for their lives. SEL at WSG helps girls to see the unique and beautiful perspective they bring to the world, establishing a foundation for positive personal growth.
<urn:uuid:90359ab6-ae5a-4b55-a9e7-06c5329b625d>
CC-MAIN-2022-33
https://www.washingtonschoolforgirls.org/blog/categories/wsg-news/page/4
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz
en
0.952116
1,093
3.828125
4
The facial recognition process works the same way the human mind functions. It employs biometrics to map face traits from images or videos. Then compares the information with a database to confirm the user’s identification. The market is rapidly increasing. According to Statista, the facial recognition market is estimated at 3.8 billion U.S. dollars in 2020. By 2022, it is expected to be worth more than $7.7 billion. These apps are now available in a variety of commercial formats, ranging from identity verification to marketing. Woodrow Wilson Bledsoe is widely regarded as the father of facial recognition. In the 1960s, Bledsoe developed a technique that allowed users to manually categorize images of people using the RAND tablet. With the use of a stylus that produced electromagnetic pulses, people could enter vertical and horizontal coordinates on a grid on the tablet. That approach was used to manually capture the coordinates of facial characteristics such as the eyes, nose, mouth, and hairline. Metrics that were manually recorded could be preserved in a database afterward. When a new photograph of an individual was entered into the system, the database was able to find the most similar image. Face recognition was unaffected by technology or computer processing power throughout this time. Nonetheless, it was Bledsoe’s first and most important step in demonstrating that facial recognition could be used as a biometric. The future of facial recognition technology seems bright till now. In the following years, the technology is likely to grow and generate significant earnings. The major businesses that will be heavily influenced by technology are surveillance and security. For better administration, schools, universities, and even healthcare facilities are aiming to deploy facial recognition technology on their premises. Facial technology’s complicated technology is making its way into the robotics business. The fact that machines can now reliably recognize individuals opens up a host of possibilities for the security industry. The most important of which is the capacity to detect illicit access to areas where non-authorized people shouldn’t be. Facial recognition could be used in fleet management to give alerts to unauthorized individuals attempting to obtain access to vehicles, preventing theft. This technology has the potential to work in tandem with the advent of self-driving automobiles, which is fascinating. What if cars could react to robbery attempts in order to prevent theft of the vehicle or its contents? This system might be taught to detect when a driver’s eyes are not on the road, given that inattention—largely due to smartphone use—is the greatest cause of accidents after drinking and speeding. It may also be trained to detect eyes that indicate an inebriated or tired driver, improving the safety of fleet vehicles. As far as the sharing economy is concerned, facial recognition acts as another layer of protection to rides-both the driver and the passengers. Grab, a Southeast Asian ride-hailing business that bought Uber’s Southeast Asian stake and exited the market has teamed up with Microsoft to use face recognition technology to precisely identify the right drivers and passengers for each journey. This offers an extra layer of protection, giving commuters peace of mind in a market that isn’t usually known for passenger safety. In the future, cars may be equipped with built-in face-scanning technologies, allowing for enhanced security without the use of a separate device. It can even recognize faces, unlock vehicles, and allow customers to join only if they were the ones who booked the ride. This will provide the highest level of security possible. Users won’t even notice security that smoothly interacts with user behaviors. Once again, a security-driven facial recognition application makes its way into the IoT sphere. Facial recognition is most commonly used in houses on intrusion detection systems, which identify if someone enters a home when an intrusion alarm is left armed. Enhancing the capabilities of existing intrusion devices to expand into access control devices could be a step forward in this industry. Doors could unlock automatically when residents arrive at their front entrance in the future. This will eliminate the need for traditional door locks and fumbling with keys, or relying on mobile devices to manually unlock today’s “smart” lock systems. Face recognition could allow companies to capture what customers are looking at in physical stores. This allows “offline” purchase patterns to be carried over to the internet. It simply translates to better insights and analytics about their clients’ purchase behavior. The retail industry acknowledges that facial recognition is the next stage in their ongoing effort to personalize shopping experiences for customers. Unmanned, automated immigration clearance gates are likely something you’ve noticed and even loved. Facial recognition technology is used at work to protect our borders and keep them secure in a number of ways, which you probably didn’t notice. The ability to recognize and impede border crossings by known criminals and individuals of interest using facial recognition is one of the most important. Today’s border controls use information databases, such as INTERPOL’s ‘Facial Identification’ approach, to identify people against a scale of accuracy. Processing facial data in the cloud also opens up the possibility of running predictive algorithms over the footage to account for things like aging, plastic surgery, cosmetics, and even the effects of drugs, in addition to traditional image upgrades. Face recognition technology is being used by both government and business organizations for a variety of purposes. Initially, it was exclusively used by security organizations or government departments to check for security purposes. But as time went on, it became more widely employed. This technology began to pervade industrial verticals once the iPhone made it a household term. You can also read this previous blog about how augmented reality integration with on-demand beauty apps can improve the salon experience here. The novel technology uses an algorithm to interpret the face as data that can be stored, examined, and compared as needed. Here are the basic steps for using the app: The powerful technology varies according to the application and the manufacturer’s preference, but it generally follows a standard pattern that includes capturing, processing, analyzing, and comparing with the database record. These are the steps: The first step is to develop a scientific understanding of face recognition The second step is to build a system that can acquire and match faces from photographs. You need enough data that the model can learn to get accurate results. You need to translate your high-level representation into a means that drives the facial recognition engine. Deep learning is a subset of machine learning. Deep Learning is modeled after how human intelligence works and is made up of artificial neural networks. It works in a similar way but on a much more complex and deep level. Collect a large dataset of facial images and label them with each person’s name or identifier. Train your model (deep learning) by showing it the labeled images and telling it which is which. While the above information will give you a brief overview of the development process, the following steps will help you get a better understanding of the process. You need to build a database of pictures (at least 5000 for the most accurate results) using facial-recognition software. If you already have pictures, you can use them as well, but make sure they are taken from different angles and distances. One way that artificial intelligence can be used to build a database of pictures for this type of software is by having an artificially intelligent computer program analyzes all the pictures on social media. Then create a database with them categorized by which person’s face was in the picture. Building facial recognition software is not as easy as it sounds. That is why we need to train the software by inserting new pictures into the database. The system will be able to learn and identify images of faces and can then compare them with other images that we haven’t trained it with. To build a good system, we need to start by taking a picture of a person’s face. Then extracting the most important facial features like the eyes, nose, mouth, and eyebrows. We can extract various data points such as distance between specific points on the face or angles of the face etc., which are important for identifying different faces. Building this AI-powered system may seem complicated at first glance. But if you break down each step into smaller tasks it becomes much easier. This will help to avoid errors during identification. The algorithm will learn from your pictures to identify others with similar features in future use cases. Train the algorithm with the survey data to make it more accurate in recognizing faces when it is in “live” mode (recognizing faces when they are in real-time). The first thing to do is to create a training set of faces that are labeled with names. Then, train your algorithm on the data. The goal is to create an algorithm that can correctly identify people in an image or video frame by matching the face with the name associated with it. The main issue that needs to be addressed before the facial-recognition software can be used as an identification tool is its accuracy. There are several issues with the accuracy of the facial-recognition software such as its inability to recognize faces of people who are not white, different skin tones and there is also an issue of false positives. So, there need to be some changes made in order to improve its accuracy. In order to build facial recognition software that is accurate enough for use as an identification tool, it should have layers of data to compare with. In comparison with one-layer recognition where it only has one reference photo available for comparison. Two-layer recognition has two reference images available for comparison. For facial-recognition software, accurate identification of a face is crucial. This accuracy ranges from 99.9% to 100%. The accuracy of the software depends upon the resolution, angle, and lighting conditions. In order to make sure that the accuracy of this software is high, we need to make sure that it can work in any lighting condition and from any angle. The best way to do it is by training the AI with some facial photographs from those angles and lighting conditions and then testing it on live events once again after this training. This is to evaluate how well your algorithm performs on a live-streamed video of faces. Most of the time, the event organizers are required to give an estimate of how many people will be attending their event in order to manage the capacity. This program will be used to count how many people attended and make sure that there is enough capacity. Live video streaming has become a popular way for people to watch their favorite artists in action in real-time. Facial recognition software can be used for this purpose by counting how many attendees are at live events. Like any other technology, facial recognition software has its fair share of pros and cons. We will discuss it here. Because every person who enters your site will be accounted for, a facial biometric security system can significantly increase your security. Trespassers will be detected instantly by the identification system, and you will be notified immediately. You may be able to save money on security staffing by using a facial recognition security system. Face ID technology is becoming more and more reliable with today’s technologies. Because of advances in 3D facial recognition technologies and infrared cameras, the success rate is currently at an all-time high. The combination of these technologies makes fooling the system extremely difficult. You can be confident that the premise is more secure and safe for you and your colleagues with such precision. Previously, security personnel was required to certify a match and ensure that the system was working properly. As previously said, technology has progressed to the point where this is no longer essential. Face recognition technology can now totally automate the process while also ensuring high accuracy. This translates to convenience and cost savings. Data storage is gold in today’s world of data since there is so much of it. Everything demands room, whether it’s a high-definition movie or 100,000 faces to store. This means that, in order for facial recognition systems to be effective, only roughly 10% to 25% of videos are processed. To overcome this, many businesses employ a large number of computers to process information and reduce processing time. However; until technology significantly develops, this obstacle is here to stay. The camera angle has a significant impact on whether a face gets processed or not. A facial recognition system must be able to detect a face from a variety of angles, including profile, frontal, 45 degrees, and more, in order to produce the most accurate matches. In addition, any obstacles, such as facial hair or headwear, can be problematic. It’s vital to keep the database updated and up to date with its data. This is in order to avoid any setbacks or failures. The cost of installing facial recognition systems might vary greatly, but three factors virtually always play a role: business logic creation, integration with facial recognition solutions, and product prices. Consider the given use case of an attendance system when developing business logic. What do you do with the information about who is present once you have it? Do you just save it in a Google Doc or do you build a complicated online application that includes the users’ roles? The business logic varies a lot based on your use case and requirements, and it has a big impact on the cost. Integrating with a facial recognition solution is the next cost. This cost does not vary greatly amongst solutions, but it is influenced by your requirements and individual use case, just like business logic development. Integration with facial recognition technology, on the other hand, can be reasonably straightforward if your business logic is well-planned and built. The final cost is incurred during the manufacturing process. Users of face recognition systems are frequently surprised by this expense. They tend to focus on what they need to spend to get the system up and running, but they don’t always include the ongoing costs of putting the system into production. It can be costly, so making sure the system provides a long-term return on investment is critical. The typical cost starts from $5000 USD and goes up in addition to technical and functional requirements. As the number of applications for facial recognition grows, so does the possibility to create and deploy these systems. Face recognition is becoming a viable alternative for many businesses. This is thanks to advances in technology as well as artificial intelligence and machine learning solutions. Companies must tread carefully, though, because the costs of facial recognition remain quite high. We anticipate that costs will continue to reduce in the near future, and that, when combined with ever-improving technological capabilities, facial recognition will become a more prevalent technology. Idea Usher has years of experience in developing complex software technology. If you believe that facial recognition technology is the future. And if you feel like investing in this sector, then now is the right time. Get in touch with our expert developer for further insight and intricate details now. A Skilled Developer For Every Project Trusted by 100+ clients Facial Recognition in public safety. Facial recognition is one of the easiest and most commonly used biometric tools. There have been two major ethical concerns: development bias and facial recognition ethics of use. In the former, facial recognition must be developed before it can be implemented. Developed in the 1960s, the first semi-automated system for face recognition required the administrator to locate features (such as eyes, ears, nose, and mouth) on the photographs before it calculated distances and ratios to a common reference point, which were then compared to reference data. Idea Usher is a pioneering IT company with a definite set of services and solutions. We aim at providing impeccable services to our clients and establishing a reliable relationship.
<urn:uuid:7f3b0aec-af59-4cf8-8578-accd0efca455>
CC-MAIN-2022-33
https://ideausher.com/blog/how-to-build-a-facial-recognition-software/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.953341
3,241
2.484375
2
Forestry in Wales ‘a top priority’ 14 December 2017 Improving and expanding the woodland of Wales will be one of my top priorities, Environment Minister Hannah Blythyn told the Welsh Assembly yesterday. The Assembly debated the Branching Out report, which called for an urgent increase in the level of productive woodland creation in Wales, produced earlier this year by the Climate Change, Environment and Rural Affairs Committee (see Confor article here). Chair of the Committee Mike Hedges reported that all the stakeholders consulted for this report had called for significantly increased planting rates. There was no shortage of finance or ideas, he said: forestry is profitable, and could have a significant role to play in regenerating former industrial areas, enabling farmers to access payments for ecosystem services, and building on what is already a significant part of the economy, already generating 10,000 jobs and half a billion pounds GVA. Shadow environment spokesman David Melding emphasised this significant economic contribution, along with the multiple environmental and social benefits in absorbing pollution, creating habitat for plants and animals, providing flood management and enhancing recreation and tourism. He challenged the Welsh Government to improve on its track record of planting only a tenth of its target falling well behind Scotland in new planting, and far below European averages for tree cover. Simon Thomas described how visiting a sawmill had demonstrated to him the real benefits of timber production, and called on the government to tackle the ‘underwooded’ state of Wales. Leaving the Common Agricultural Policy provides an opportunity to create a system where it is easier for farmers to benefit forestry. Vikki Howells highlighted the potential of forestry to tackle health epidemics such as childhood obesity and poor mental health, and to provide high-quality housing. In answering members comments, the Minister said that she would explore all avenues for speeding up woodland creation, including removing barriers to planting, collaboration between stakeholders, areas of presumption in favour of woodland creation, and forestry as a carbon sink. She informed the Assembly that she would be visiting Scotland in the New Year to learn how these challenges had been tackled there. Confor Wales Manager Martin Bishop said, ‘There is an unprecedented level of interest in forestry in the Welsh Assembly, and the Minister’s comments are especially positive. We look forward to working with her in the coming year to get trees in the ground in Wales.’ Confor produced an infographic-style briefing for Assembly Members which was widely cited in the debate which you can download here:
<urn:uuid:5334a9e6-e1c0-45d1-99f9-a99f056dbaaf>
CC-MAIN-2022-33
https://www.confor.org.uk/news/latest-news/forestry-in-wales-a-top-priority/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.959911
511
1.984375
2
An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed? Which of the following is NOT an AWS Shared Responsibility Model devised by AWS? What command is used to terminate certain processes in an Ubuntu system? Michael decides to view the-----------------to track employee actions on the organization's network. Which OSI layer does a Network Interface Card (NIC) work on? Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on? Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute? Which of the information below can be gained through network sniffing? (Select all that apply) Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase? Which of the following attack surface increase when you keep USB ports enabled on your laptop unnecessarily? Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination. Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view Which among the following tools can help in identifying IoEs to evaluate human attack surface? Based on which of the following registry key, the Windows Event log audit configurations are recorded? John is working as a network defender at a well-reputed multinational company. He wanted to implement security that can help him identify any future attacks that can be targeted toward his organization and take appropriate security measures and actions beforehand to defend against them. Which one of the following security defense techniques should be implement? Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a____________. If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it? Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into? Which of the following is an example of MAC model? Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using? Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation. You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?
<urn:uuid:504d813b-e571-4fef-a963-c43c514d158f>
CC-MAIN-2022-33
https://www.marks4sure.com/312-38-certified-network-defender-cnd-questions.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.951935
856
2.140625
2
Some time ago, the topic of detox diets came up for my #NutriChats. This is just one of those things I’ve never quite understood why people would want to do, but I also understand it’s also a part of some cultures. When I was a kid, my parents and grandmum would mention Epsom salts for when your poops were smelling a bit unsavoury, or they felt like you needed to be “cleaned out”. Granted, stool never smells like lemons, but I’m sure you know the particular stink of certain poos…that eggy, sulphur-smelling goodness. Look at how mature we’re being talking about stool on the internet🙃. Nowadays detox diets/supplements/teas are a whole sophisticated and lucrative industry where diet culture perpetuates. Promising improved health, weight loss, reduced stomach bloating, improved circulation and liver function, beautiful skin… the works! All stemming from the removal of toxins from the body. But is it worth our time, money and effort? Here’s what you should know before you try: - What are detox diets? - The benefits of diet detoxification - Is it necessary to detox? - The risks of detoxing - What a nutrtionist recommends What is a detox diet? The practice of detoxing has been around for hundreds of years and has been seen in traditional Chinese medicine, Ayurvedic customs, some African tribes, European practices such as blood-letting and even Biblical text where there are rituals of cleansing prior to and after certain life events. As you could tell, many of these practices revolve around cultural norms. Yet, in this modern-day, we have entire industries based on “removing toxins from the body”. I will say, although we have evolved to know more about the science behind health and well-being, there is still a lot we can learn from some of these historic customs. But as a studied health professional, I do question the legitimacy of modern detoxes. Is it just based on user feelings, or is there actual scientific evidence to prove that works? Detox diets in particular promote the removal of “toxins” from the body through eating or not eating certain things. For example, increasing fruit and vegetable consumption along with unprocessed, organic foods during detox is common, while strictly avoiding alcohol, coffee, cigarettes and refined sugar. Many detoxes encourage juicing and smoothie-making, simply drinking liquids such as special tea blends and having large amounts of water. Detox diets are just one in many detoxification practices people swear by. There is also nasal irrigation, intestinal cleansing, foot detox (usually sold as patches, or a full spa treatment), oxygen detoxes, and of course, my favourite to love-to-hate…skincare detox regimens and treatments. They’re probably more out there too. I’ve definitely tried my fair share of detoxifying hair and skincare products, and I still wonder if they work at the molecular level. What are the benefits of a detox diet? I am always happy when diets promote fruit and vegetables, but the idea of juicing and making smoothies from them significantly reduces their fibre content, one of the key reasons why eating whole vegetables and fruits have been seen to promote good colon health. And these processes also release their natural sugars… So they’re not as healthful as you may think. One thing detoxes promote is rapid weight loss, but that’s mostly from fluid loss and decreased glycogen storage. Not sure that’s something I’d want…dehydration and lower energy stores? No thanks. Some people even say they feel “cleaner”, lighter and healthier after detoxing. I’m still on the fence about the reason behind this. A bit TMI, but when I do a #2 I also have that lighter, cleaner feeling. Is that just a coincidence? So is a detox diet/supplement/drink necessary? Short answer, no. In a healthy person, your immune system, gut, liver, kidneys, bladder and skin are very effective at eliminating excess or unwanted matter. Contrary to the belief that there are many “toxins” in food, typically countries have stringent laws about what is allowed in foods including: - the types of chemicals used to grow produce, - the antibiotics and feeds used in livestock rearing, - the amount of bacteria allowed in finished products, - the use of genetically modified foods and additives (which are usually tested for toxicity levels before they’re even allowed near food products), - ingredient and nutrition information, especially allergen warnings, - even the health claims of a finished product. Produce and livestock are routinely tested for the level of contaminants, and there is a standard range to ensure the safety of our food supply. Gone are the days where bakers would add alum to bread to make it heavier, whiter and more appealing. Yes, this actually happened in the 19th century! There are a lot fewer cases of heavy metal poisoning from what we eat. I can’t say as much good quality evidence is available for some of these detox pills, teas and regiments. Most detox diets promote eliminating high salt, high fat and sugary foods, which is good, but they also may remove other processed and fortified foods which means you may end up with micronutrient deficiencies without recognising it. Did I already mention there are very few scientific studies showing the long term effects of these diets? Chemicals such as BPA, phthalates and persistent organic pollutants (POPs) are of more worry today, due to industrialisation. Traces of which can accumulate in fat tissue or blood. But, they’re not simply removed through dietary means. We can, of course, change our lifestyle habits to reduce our exposure to these chemicals. What are the dangers? My biggest question with “detoxifying” usually is, what are we removing that is terrible for our health? Typically this is never explicitly stated by marketers of detox products. We tend to see the words toxins and impurities thrown around quite often. In remembering my chemistry and toxicology classes, I worry about the fearmongering and scare tactics used to sell these products. In modern medicine, there are specific combinations of drugs to be taken to remove excesses for example in alcohol- or heavy meatball poisoning (don’t let the word drug scare you either). So how can a one-size-fits-all detox tea or diet suddenly cure me of these mysterious toxins? Anyway, here’s what risks you expose yourself to through detoxing: - ❌Lack of energy and micronutrients because you may be avoiding carbohydrate-rich foods. - ❌Some diets promote a fasting pattern which if misinformed can lead to dizziness, lack of energy, low blood sugar, hangry feelings (you know what I’m talking about…). - ❌Lack of fibre often results from fasting or having a mainly liquid diet. Even fruit and vegetables which are typically great sources, lose their fibre content when juiced or blended. - ❌Diarrhoea… as if having a liquid diet wasn’t hard enough. - ❌If you have a pre-existing medical condition, detoxing (and fasting for that matter) without the advice of a healthcare professional can also be very dangerous. Herbs from teas can often interact with medications and cause complications, despite all their benefits. If you want to learn more about medicinal herbs and their drug interactions, the US National Institutes of Health is a great resource. Would I recommend it? As I’ve said earlier, I think there is merit to some of the principles of detox, but I’m waiting for the scientific evidence to back it up before I recommend it to anyone. So, NO. What I can suggest to support a healthy diet and lifestyle is (as always) a diverse, plant-based diet with lo of servings of fruit, vegetables, whole grains, legumes and nuts, and moderate (much smaller amounts than currently) amounts of lean protein and dairy. Reduce your consumption of high fat, salt and sugary foods, try to rest when you are tired and get a bit of exercise every day. If you think you need more support, you can speak to a Registered Associate Nutritionist like me, a Registered Dietitian or a registered medical practitioner with nutrition training who should be able to give a nutrition assessment and then further advice. Have you ever tried a detox diet or detox products? What was your experience? - BDA, 2019. Detox Diets [WWW Document]. British Dietetic Association. URL https://www.bda.uk.com/resource/detox-diets.html (accessed 8.13.20). - Dr B. J. Hardick, 2016. The History of Detox – Decreasing Exposure to Toxins | DrHardick [WWW Document]. DrHardick.com. URL https://www.drhardick.com/history-of-detox (accessed 8.13.20). - Harvard Health Publishing, 2008. The dubious practice of detox [WWW Document]. Harvard Health Publishing. URL https://www.health.harvard.edu/staying-healthy/the-dubious-practice-of-detox (accessed 8.13.20). - Katherine Zeratsky, 2020. Detox diets: Do they work? [WWW Document]. Mayo Clinic. URL https://www.mayoclinic.org/healthy-lifestyle/nutrition-and-healthy-eating/expert-answers/detox-diets/faq-20058040 (accessed 8.13.20). - National Institutes of Health – Office of Dietary Supplements, n.d. Dietary Supplement Fact Sheets [WWW Document]. National Institutes of Health – Office of Dietary Supplements. URL https://ods.od.nih.gov/factsheets/list-all/ (accessed 8.13.20). - The history cook: The English Bread Book [WWW Document], 2013. URL https://www.ft.com/content/2be889d8-257a-11e3-b349-00144feab7de (accessed 8.13.20).
<urn:uuid:20c3eb12-7f06-4c82-8034-321750bd58ac>
CC-MAIN-2022-33
https://www.nourishbych.com/detox-diets/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.940413
2,216
2.078125
2
Among patients with rheumatoid arthritis (RA), disease duration and the number of prior disease-modifying antirheumatic drugs (DMARDs) limit the potential efficacy of adalimumab therapy, according to study results published in the Annals of the Rheumatic Diseases. This post hoc analysis included data from 2 randomized controlled trials: DE019 (ClinicalTrials.gov Identifier: NCT00195702) and DE009 or Anti-TNF Research Study Program of the Monoclonal Antibody Adalimumab (ARMADA; conducted prior to trial registration requirement). Both trials included patients with established RA (mean duration, 11 years) receiving adalimumab plus methotrexate. At week 24, response to therapy was evaluated using disease activity outcome measures, including the 28-joint Disease Activity Score based on C-reactive protein (DAS28[CRP]), Simplified Disease Activity Index (SDAI), Health Assessment Questionnaire Disability Index (HAQ-DI), and the percentage of patients with 20%/50%/70% improvement in American College of Rheumatology (ACR) responses. Researchers assessed associations between disease duration or number of prior DMARDs and response to therapy. In the larger DE019 study (n=207), results indicated that a greater number of prior DMARDs (>2 vs 0 to 1) was associated with smaller improvements in DAS28(CRP) (–1.8 vs –2.2), SDAI (–22.1 vs –26.9) and HAQ-DI (–0.43 vs –0.64) from baseline to week 24. Researchers found that patients with RA duration >10 years had higher HAQ-DI scores at week 24 compared with patients with RA duration <1 year (1.1 vs 0.7); however, the effects on DAS28(CRP) and SDAI were mixed. At week 24, researchers also found that a greater number of prior DMARDs and longer RA duration were associated with lower ACR response rates. Data from the ARMADA trial (n=67) generally confirmed the findings from the first trial. Limitations included the post hoc nature of the study, restriction to adalimumab data, and small sample size. “These results support recommendations that combination therapy with a biologic agent and methotrexate be initiated without delay in patients who do not have a satisfactory response to treatment with methotrexate alone,” the researchers wrote. Disclosure: This clinical trial was supported by AbbVie Inc. Please see the original reference for a full list of authors’ disclosures. Aletaha D, Maa J, Chen S, et al. Effect of disease duration and prior disease-modifying antirheumatic drug use on treatment outcomes in patients with rheumatoid arthritis [published online August 21, 2019]. Ann Rheum Dis. doi:10.1136/annrheumdis-2018-214918
<urn:uuid:0cf07a43-8d73-4350-8f78-84aa90a4359d>
CC-MAIN-2022-33
https://www.rheumatologyadvisor.com/home/topics/rheumatoid-arthritis/number-of-prior-dmards-disease-duration-affect-adalimumab-efficacy-in-ra/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.907604
640
1.546875
2
Just follow the step by step tutorial to record live meetings on your Zoom app for desktop. Note: As our world comes together to slow the spread of COVID-19 pandemic, the Zoom Support Center has continued to operate 24x7 globally to support you.Please see the updated Support Guidelines during these unprecedented times. How to Record a Zoom Meeting. Image board: Record Zoom Meeting. PC owners don’t have to install a third-party app if they want to record a Zoom meeting since Windows 10 already features a program that enables them to capture their computer’s screen.Although the name suggests that the Game Bar is designed to record video games, you can also use it to record any other program you are using.. This Screen Recorder allows users to pause, restart and stop screen recording with no time limitation. Step 4Start to record Zoom meeting with audio without permission. Part 1. STEPS 1- If you are here, chances are you already have the Zoom Video Conferencing app installed on your system. How to Record a Zoom Meeting with Host Permission Online. Fix Audio Issues in Zoom. Disable ‘Always Mute My Microphone’ on your phone. Zoom offers incredible built-in functions that can assist you in recording Zoom meetings. How To Record A Zoom Meeting With Video & Audio On PC? Now click "REC" icon to start Zoom meeting recording secretly. By default, only the host of the video call is allowed to record the meeting in Zoom. Zoom has a failsafe feature that disables your microphone every time you join a meeting. Local recordings are the recordings we’ve had all along and saved to your device while Cloud recordings are saved to the Zoom Cloud where they can be viewed, shared, and downloaded. Follow the following steps to ensure that ‘ Always Mute My Microphone’ is toggled off in Zoom settings. Choose "Save" and then click "Next" to move on. # Method One: If you are the meeting host, follow the steps that you can easy to record the meeting. In order to access the Game Bar you have to press … If you are unable to pass audio through to your meeting members then this setting could be enabled on your device. In this part, I will show you how to record zoom meetings using the built-in recording tool. When the process finishes, you will get a preview window. There are two types of recording: local recording and cloud recording in Zoom. All About Zoom Recording. Before starting a meeting on Zoom, it’s always advisable to check audio, video, and microphone for a smooth meeting. How Much Is Door Lock, Fingerprint Thermometer Android, 1 Gallon Acetone, Planning Mcqs Pdf, Ortega Fiesta Flats Nutrition, Random Cluster Sampling, Daiquiri Machine Rental New Orleans, Multiple Choice Questions On Discrete Probability Distribution, Schmaltz Police Meaning, Jesse Johnson Sydney, How To Remove Railing Between Kitchen And Family Room, Navy Blue And Peach Wedding, Analogy Lesson Plan For Grade 7, Orange Tree Flowers, Nori Wraps Near Me, Eating Guava At Night During Pregnancy, Victor Welding Equipment Catalog, Extra Virgin Olive Oil Calories, The Rise Of Anti Intellectualism, Best Restaurants In Old Town St Augustine, Pumpkin Chocolate Chip Cookies Delish, Aerospace Team Names, Strawberry Swirl Cheesecake, Liftmaster 375ut Battery, ,Sitemap
<urn:uuid:c8e14f40-b0c9-43ea-b012-06b25f995eec>
CC-MAIN-2022-33
http://www.fulfillyourdestiny.ca/site/how-to-record-zoom-meeting-on-phone-with-audio-0fd2d8
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.886576
705
1.78125
2
Stress, worry, anxiety, and inadequate nutrition lead to hair loss and premature white hair. A certain amount of hair loss is considered normal, as old strands are replaced by new. When hair loss is excessive, care must be taken. Similarly, the greying of hair after a certain age is a normal phenomenon, but when this starts in the early years of life, one should look into for remedies to prevent white hair and promote natural regrowth of hair. Increased intake of fried, sour, spicy, salty, and fermented foods, as well as tea and coffee, aggravate the Pitta Dosha (Ayurvedichumour representing Fire) in the body. This Pitta accumulates in the skin of the scalp, leading to hair falling out and greying prematurely. Factors like excessive anger and stress are also responsible. Excessive consumption of alcohol and meat also aggravate Pitta. Hair specialist at Jiva Ayurveda has successfully managed cases of hair fall, premature white hair, and other hair problems with herbal medicines to promote natural regrowth of healthy hair. What special Ayurveda does in hair fall treatment? Understand how Jiva Ayurveda helps you live a healthy & happy life Every person is unique, hence treatment for the person’s disease must be unique too. Jiva doctors take the Ayunique™ approach, which includes: Completely personalized authentic Ayurvedic medicines based on thorough diagnosis of the root-cause Throughout your treatment journey, a team of health coaches stay connected with you to track your relief progress and help with your health queries. Customized remedy including diet, therapy and lifestyle planners designed by your doctor to compliment the medicines for holistic treatment of the root-cause Get long-term relief from your Hair Fall problems. I had severe hair loss problem for years. Shampoos and oils did nothing. I was considering Ayurveda treatment but I was not sure yet, then one day I saw Dr Chauhan’s TV program on hair problems and I felt Ayurveda could actually make a difference, and it did! Now I don’t see hair on my pillow every morning.
<urn:uuid:2e46eed5-0451-42ac-8298-36bf96d9dc17>
CC-MAIN-2022-33
https://www.jiva.com/diseases-ayurveda/hair-and-skin/hair-fall-greying
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.953162
453
1.757813
2
The Doctors set the record straight on common health myths and realities. • New year, new you! Singer Mandisa shares her tips for staying slim in 2013. Myth or Reality: Go No. 2 at least once a day Is it necessary to make a bowel movement every day for optimal health? Find out. “Constipation is defined as fewer than three stools per week,” E.R. physician Dr. Travis Stork says. “The more fiber and fluids you include in your diet, the more likely you’re going to have regular bowel movements.” Weight Loss Robot Founder and CEO of Intuitive Automata, Dr. Cory Kidd, joins The Doctors to demonstrate his latest breakthrough in healthcare technology. “I’ve been applying technology to healthcare applications for years and saw that something like Autom could be very effective at becoming a [weight loss] coach or trainer,” Dr. Kidd says. “Autom will have a conversation with you about how well you’ve eaten and how much exercise you’ve done,” he adds. While Autom won’t become available until June 2013, you can learn more and pre-order one at www.myautom.com. “Save” Your Skin Hollywood couple Anne Heche, star of the new NBC comedy Save Me, and actor James Tupper join The Doctors to separate myth from reality when it comes to sun protection. Myth or Reality: Vaginas don’t return to their original size after child birth After delivering a baby naturally, does a woman’s vagina revert to its previous size? OB/GYN Dr. Lisa Masterson has the answer. Myth or Reality: Drinking milk produces excess phlegm Eight-year-old Seth wants to know if drinking milk makes more mucus in the throat. See what Seth discovers as Dr. Sears takes him through an on-stage demonstration. Myth or Reality: Flickering from your TV can cause a migraine Chief medical officer of Pfizer, Dr. Freda Lewis-Hall, joins Dr. Travis to explain common triggers for migraines. Dr. Lewis-Hall explains that headaches come in many different sizes and types. Frequent headaches could signal an underlying health issue, so be sure to consult your physician if you experience migraines or any type of headache on a regular basis. “Here’s the key,” Dr. Travis adds. "At home you need to be proactive. Document when headaches occur, keep a diary of your triggers, then you can take that info and share it with your physician.” For more information on migraines visit gethealthystayhealthy.com. Myth or Reality: Thinning hair means a greater risk for heart attack Could going bald mean you’re at greater risk for suffering a heart attack? Food Fact vs. Fiction Celebrity nutritionist Samantha Grant joins Dr. Travis and Dr. Sears to separate food fact from fiction. For more information about the products mentioned on this show, please go to Related Resources Sign Up for the Newsletter| Show Page |Talk about the Show | Join The Doctors Social Network Allergies | Anti-Aging | Cosmetic Surgery | Fitness & Weight Loss Parenting | Pregnancy | Recipes | Safety | Sex
<urn:uuid:4fcd4932-5b91-46d6-9c61-73e87aaed7e4>
CC-MAIN-2022-33
https://www.thedoctorstv.com/articles/2224-myth-or-reality-the-drs-set-the-record-straight
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz
en
0.908079
709
1.625
2
This paper reports on a preliminary acoustic description of high vowel syncope in one dialect of Lezgian, a NE Caucasian, Daghestanian language. Acoustic data from one speaker confirm the absence of a vowel in the syncope context, but traces of it remain visible (and audible) in the preceding stop release or fricative noise. This raises the question of possible vowel devoicing. It also suggests that a relevant account for the facts should be based on gestural overlap rather than deletion. In support of this hypothesis, two types of measurements are reported. First, vowel duration shows that even non-high vowels are considerably shortened when stress is shifted away from them, participating in a similar process as high vowels. Second, the duration of the inter-burst interval in resulting stop sequences varies depending on the stop place of articulation.
<urn:uuid:d2f954e5-115a-4d8b-be91-df3d9b1f7745>
CC-MAIN-2022-33
http://icphs2007.de/conference/Papers/1492/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.923313
171
1.867188
2
For the 2011 Xi’an International Horticultural Exposition, the Berlin-based landscape architecture office Topotek1 “dug” a hole to the other side of the world. From its edges visitors to this garden in China can peer into a real or imagined world at the end of the tunnel. Whether these are the cows from the pampas of Argentinas, commuters rushing among transit through New York City, the maritime life of Stockholm, and layers of history so audible among the streets of Berlin. These soundtracks pique the imagination of the visitors, transferring them away from China, away from the garden,” and into a far-off place. “As tradition,” explains Topotek1, “a garden is a place that transfers someone into a ‘foreign’ space: from inside to outside, from city to nature, from one culture to another. This garden is the cusp at which two worlds are colliding, a foreign world entering China, defined by the visitor’s imagination.”
<urn:uuid:2b618e40-1fad-488a-9f89-8b9a2480e449>
CC-MAIN-2022-33
https://www.archdaily.com/153732/dug-by-topotek1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.914265
217
2.53125
3
Going For Gold – The ’48 Games BBC Home Entertainment Thrown together as double sculling partners just six weeks before the 1948 Summer Olympics, Bert Bushnell, a boatbuilder’s son, and Richard “Dickie” Burnell, the Oxford-educated son of an Olympic gold-medal winning champion rower, were an unlikely pair. Bert was strictly a single sculler, unused to working as a team, and Dickie was living in his father’s shadow – but with the help of legendary sculler Jack Beresford these two men from very different backgrounds triumphed against the odds, capturing Olympic Gold and embodying the battling spirit of the 1948 London games. The fact that the games took place at all was astonishing in itself: Britain was still struggling with the after effects of World War II, and the 1948 Games were the first in 12 years due to the war. Perhaps even more astonishing was that, with Dickie’s Olympic win, he followed his father Charles Burnell to victory and became one of the few father-son pairs to both win Olympic gold medals. The Legend Of The Ditto Twins Author: Jerry Douglas Publishing House: Bruno Gmuender The Legend of the Ditto Twins is an erotic tale about identical twin brothers: All their lives, Mark and Clark knew they were different. Knew they were special. Knew they would be bound together as long as they lived. Most of all, the twins knew that no one else must ever discover the secret games they played. It wasn’t until they reached puberty that they began to understand how they were destined to become legendary. Follow two young men on their journey from a modest dairy farm in America’s heartland to the glamorous world of Berlin’s physique models, from the wonderland of Prague’s adult film industry to the fast lane of New York’s glittering club life…and ultimately, all the way to the Supreme Court of the United States. Juanes MTV Unplugged Universal Music Latin Solo artistas consolidados forman parte de esta serie de conciertos acústicos llamados MTV Unplugged, y el concierto se ofrece en formato CD/DVD. Juanes no podía quedar fuera de este exclusivo club, y en su concierto nos ofrece temas como “Es por ti”, “Hoy me voy” que magnificamente interpreta con su invitada Paula Fernandes, también tiene dueto con Joaquín Sabina. Marco Antonio Solis – Una Noche de LUNA Universal Music Latin Un disco grabado en vivo de un concierto dado en el legendario auditorio Luna Park de Buenos Aires, Argentina. En formato CD + DVD el concierto de Marco Antonio Solis ofrece temas como “Dios Bendiga Nuestro Amor”, Sigue Sin Mi”, “Mi Eterno Amor Secreto”, y “¿A Dónde Vamos a Parar”? entre otros.
<urn:uuid:9a7e6fbb-1e44-4022-a1aa-3ea9cd421270>
CC-MAIN-2022-33
https://adelantemagazine.com/reviews-august-2012/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.818424
685
1.539063
2
Analysis of Muscular Paralysis using EMG Signal with Wavelet Decomposition Approach Keywords:Paralysis, Electromyography, ALS, Myopathy, Wavelettrans Form, Multi-Layer Perceptron (MLP), Random Forest (RF), Gradient Boosting (GB), Nearest Neighbor (NN) Paralysis refers to temporary or permanent loss of voluntary muscle movement in a body part or region. The degree of muscle function loss determines the severity of paralysis. The muscle function is represented by electrical activity of the muscles. Electromyography is a technique concerned with the analysis of myoelectric signals. EMG allows the determination of muscular activity. EMG signal analysis is performed using the features extracted in time domain, frequency domain and time frequency domain. In this work, the EMG of Amyotrophic Lateral Sclerosis (ALS), Myopathy, and Normal conditions are considered, and the time frequency analysis has been carried out to extract the features using wavelet decomposition approach. The classification of normal and paralyzed condition is carried by four classifier models. The classifier models used are Multi-layer Perceptron (MLP), Random Forest (RF), Gradient Boosting (GB), and Nearest Neighbor (NN) models. The standard data set has been used for the purpose. The classification accuracy obtained for MLP is 80%, for RF is 75%, for GB is 79%, and for NN is 69%. MLP show better classification performance over RF, GB, and NN Classifiers. Christopher Spiewak, MdRasedul Islam, Md Assad-Uz Zaman and Mohammad Habibur Rahman, “A Comprehensive Study on EMG Feature Extraction and Classifiers”, Open Access Journal of Biomedical Engineering and Biosciences, 2018, ISSN: 2637-4579, DOI: 10.32474/OAJBEB.2018.01.000104. Reza Bagherian Azhiri, Mohammad Esmaeili, Mehrdad Nourani, “EMG-Based Feature Extraction and Classification for Prosthetic Hand Control”, arXiv: 2107.00733v1 [eess.SP] 1 Jul 2021. Angkoon Phinyomark, Rami N. Khushaba, Erik Scheme, “Feature Extraction and Selection for Myoelectric Control Based on Wearable EMG Sensors”, Sensors, Vol. 18, pp. 1615, 2018. DOI: 10.3390/s18051615, [Online]. Available: www.mdpi.com/journal/ sensors. Lukasz Wiklendt, Simon J. H. Brookes, Marcello Costa , Lee Travis, Nick J. Spencer, and Phil G. Dinning, “A Novel Method for Electrophysiological Analysis of EMG Signals Using MesaClip”, Frontiers in Physiology, Vol. 11, June 2020, Article 484, [Online]. Available: www.frontiersin.org. Angkoon Phinyomark, Chusak Limsakul, and P. Phukpattaranont, “Application of Wavelet Analysis in EMG Feature Extraction for Pattern Classification”, Measurement Science Review, Vol. 11, No. 2, 2011. Gang Wang, Yanyan Zhang, and Jue Wang, “The Analysis of Surface EMG Signals with the Wavelet-Based Correlation Dimension Method”, Hindawi Publishing Corporation, Computational and Mathematical Methods in Medicine, Vol. 2014, Article ID 284308, [Online]. Available: http://dx.doi.org/10.1155/2014/284308 Bushra Saeed, Syed Omer Gilaniy, Ziaur Rehmanz, Moshin Jamilx, Asim Waris, and Muhammad Nasir Khank, “Comparative Analysis of Classifiers for EMG Signals”, IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), 2019. N. Srisuwan, P. Prukpattaranont, and C. Limsakul, “Comparison of Classifiers for EMG based Speech Recognition”, CCISP 2019, IOP Publishing, Journal of Physics: Conference Series, 2019. DOI: 10.1088/1742-6596/1438/1/012032. Elamvazuthi, N. H. X. Duy, Zulfiqar Ali, S. W. Su, M. K. A. Ahamed Khan, and S. Parasuraman, “Electromyography (EMG) based Classification of Neuromuscular Disorders using Multi-Layer Perceptron”, IEEE International Symposium on Robotics and Intelligent Sensors (IRIS 2015), 2015. Adenike A. Adewuyi, Levi J. Hargrove, and Todd A. Kuiken, “Evaluating EMG Feature and Classifier Selection for Application to Partial-Hand Prosthesis Control”, Frontiers in Neurorobotics, 2016, DOI: 10.3389/fnbot.2016.00015. Yunfeng Wu, and Sin Chun Ng, “A PDF-based classification of gait cadence patterns in patients with amyotrophic lateral sclerosis”, 32nd Annual International Conference of the IEEE EMBS Buenos Aires, Argentina, August 31 - September 4, 2010, pp. 1304-1307. Salim Lahmiri, and Mounir Boukadoum, “Improved Electromyography Signal Modeling for Myopathy Detection”, 978-1-5386-4881-0/18/$31.00 ©2018 IEEE.
<urn:uuid:9f346da5-abe9-4a90-a364-3a11abd55647>
CC-MAIN-2022-33
https://ojs.trp.org.in/index.php/ajcst/article/view/3241
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.762604
1,257
1.703125
2
SKF seal kits for motorcycle forks consist of an oil seal and a wiper seal developed to achieve superior sealing performance. As a result of SKF’s extensive experience in the design and material development of seals for suspension systems, SKF has developed a new self-lubricating compound. The design and performance characteristics of the seals made from this compound enable them to keep oil in and contaminants out of the fork, while virtually eliminating stick-slip and improving performance by reducing friction. To get the most out of your bike, both seals should be replaced. THIS KIT IS FOR BOTH FORK LEGS, 1 KIT NEEDED PER MOTORCYCLE The kit is composed by 2 oil seals and 2 dust seals. SKF PT. NO. KITB-43K
<urn:uuid:abfbf145-eb61-406f-a3ea-c78a78364bbe>
CC-MAIN-2022-33
https://www.rally-raidproducts.co.uk/yamaha-t7-world-raid-wr/skf-seal-kit-kitb-43k
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.937611
166
1.523438
2
As bitcoin is spinning up across the globe, bitcoin holders have become more aware about the confidentiality of their transactions. Everyone was of the opinion that a sender can remain unidentified while forwarding their digital currencies and it came to light that it is untrue. Owing to the implementation of government policies, the transactions are meaning that a sender’s e-mail and even personal identification information can be revealed. But don’t be worried, there is an answer to such public administration controls and it is a crypto scrambler. To make it clear, a cryptocurrency mixing service is a program that breaks up a transaction, so there is a straightforward way to blend different parts of it with other coins. After all a user gets back the same number of coins, but mixed up in a completely different set. As a result, it is impossible to trace the transaction back to a user, so one can stay calm that personal identification information is not revealed. As maybe some of you know, every cryptocurrency transaction, and Bitcoin is no different, is embed in the blockchain and it leaves traces. These traces are essential for the state to track back criminal transactions, such as purchasing weapon, drugs or money laundering. While a sender is not connected with any illegal activity and still wants to avoid being tracked, it is possible to use accessible bitcoin tumblers and secure sender’s personal identity. Many digital currency holders do not want to let everybody know the amount they gain or how they spend their money. There is an opinion among some web users that using a tumbler is an illegal action itself. It is not entirely correct. As outlined above, there is a possibility of crypto blending to become unlawful, if it is used to disguise user’s illegal actions, otherwise, there is no need to worry. There are many platforms that are here for cryptocurrency owners to blend their coins. However, a crypto holder should pay attention while picking a bitcoin tumbler. Which service can be relied on? How can a crypto holder be sure that a mixer will not steal all the sent coins? This article is here to answer these questions and help every crypto owner to make the right choice. The digital currency mixers presented above are among the leading existing tumblers that were chosen by users and are highly recommended. Let’s look into the listed coin tumblers and describe all aspects on which attention should be focused. Surely all mixers from the table support no-logs and no-registration policy, these are important aspects that should not be neglected. Most of the mixers are used to mix only Bitcoins as the most common digital money. Although there are a few crypto tumblers that mix other cryptocurrencies, such as Ethereum, Bitcoin Cash and Litecoin. Additional currencies give a sender more options, some mixing services also allow to combine coins between the currencies which makes transactions far less identifiable. There is one option that is not represented in the above table and it is time-delay. This feature helps a user and a transaction itself to remain anonymous, as there is a gap between the forwarded coins and the outcoming transaction. In most cases, users can set the time of delay on their own and it can be a couple of days or even hours and minutes. To get a better understanding of crypto mixers, it is essential to review each of them independently. Blender has a straightforward interface, it is convenient to use and simple. Time-delay option can be set up to 24 hours. With regard to the fee, there is an additional fee of 0.0005 % per output address. As one of the few, this mixer provides a user with a special mixing code which assures that fresh crypto coins are not mixed with prior deposits. Additional URL (Blender) is also here to guarantee that senders can get to the scrambler, even if the main link is not available. As well as others, CryptoMixer has both a clear-web (CryptoMixer). This mixer is remarkable for accommodating extremely large-volume transactions. After public verification of their reserve of 2000 BTC there is no doubt that users can trust this mixing service and their cryprocurrencies will not be taken. The number of needed confirmations depends on the number of deposited coins, e.g. for sending less that 25 BTC there is only 1 confirmation required, in case of sending more than 1000 BTC a user needs to collect 5 confirmations. To operate on this crypto mixer, a CryptoMixer code needs to be created. A user should note it, so it is easy to use it next time. After providing a CryptoMixer code, users need to provide the output address or several of them and then set a time-delay option. A delay time is determined automatically and a user can modify it if needed. A service fee can be also selected from the table depending on the forwarded amount. Every transaction requires additional fee of 0.0005 BTC. Also, a calculator on the main page helps every user to understand the number of coins sent and got back after mixing. Based on the experience of many users on the Internet, PrivCoin is one of the leading Bitcoin mixers that has ever existed. This scrambler supports not only Bitcoins, but also other aforementioned crypto coins. Exactly this mixing service allows a user to swap the coins, in other words to send one currency and receive them in another type of coins. This process even increases user’s anonymity. Time-delay feature helps to make a transaction untraceable, as it can be set up to 24 hours. There is a transaction fee of 0.0005 for each extra address. One completely special crypto mixer is ChipMixer because it is based on the totally another idea comparing to other tumblers. A user does not merely deposit coins to clean, but makes a wallet and funds it with chips from 0.01 BTC to 8.192 BTC which a user can split according to their wishes. After chips are included in the wallet, a wallet owner can forward coins to process. As the chips are sent to the mixing service prior to the transaction, next transactions are nowhere to be found and it is not possible to connect them with the wallet owner. There is no standard fee for transactions on this tumbler: it uses “Pay what you like” feature. It means that the fee is applied in a random way making transactions even more anonymous and the service itself more cost-effective. Retention period is 7 days and every user has an opportunity to manually clear all logs before the end of this period. Another coin scrambler Mixtum offers you a so-called free trial period what means that there are no service or transaction fee charged. The process of getting clean coins is also quite unique, as the platform requires a request to be sent over Tor or Clearnet and clean coins are acquired from stock exchanges. It should be pointed out that random sums are sent in two and more transactions to make them less trackable. Another reliable mixing platform is BitMix which supports two cryptocurrencies with Ethereum to be added soon. The mixing process is quite standard and identical with the processes on other tumblers. There is a possibility to choose a time-delay feature up to 72 hours and a sender has an opportunity to split the transaction, so the coins are sent to multiple addresses. Thus, sender’s money are more protected and untraceable. Two cryptocurrencies are also supported on SmartMix.io mixing service. This mixer is listed because it works fast and it is reliable. The transaction fee is really small, only the amount of 0.0001 BTC needs to be sent for each additional address. Dividing deposited coins between 5 addresses is also greatly beneficial for keeping user’s anonymity. Every user is able to choose an additional option of delaying the payment meaning that the transaction is becoming even less traceable. Let’s represent another one of the leading bitcoin mixing services which is extremely user-friendly. Bitcoin Laundry (Bitcoin Laundry) has a user-friendly interface and it is worth mentioning that the service fee is the lowest possible, it is 0.0% with 0.0002 BTC per extra address. Retention period is 7 days when it is easy for a user to manually delete all the logs which are stored for this period because of any future transaction-related problems. There is a time-delay feature, however, it is not possible to be controlled by a user but the mixing platform only. Being one of the earliest crypto coin tumblers, BitBlender (BitBlender) continues to be a simple and functional mixing platform. It is possible to have two accounts, with and without registration. The difference is that the one without registration is less controllable by a user. The mixing process can be performed and the transaction fee is charged randomly from 1% to 3% which makes the transaction more anonymous. Also, if a user sends more than 10 BTC in a week, the mixing service reduces the fee by half. Using a time-delay feature the transaction can be delayed up to 24 hours. A Bitcoin holder should be afraid of security problems as there is a 2-factor authentication when a sender becomes a holder of a PGP key with password. However, this tumbler does not have a Letter of Guarantee which makes it hard to address this coin mixer in case of scams. And last but not least, there is a platform with several cryptocurrencies to tumbler named SmartMixer (SmartMixer). At the moment, there are three currencies and Ethereum is going to be added in future. This platform offers a very simple user-interface, as well as the opportunity to have control over all steps of the mixing process. A user can select a delay not just by hours, but by the minute which is extremely useful. The platform gives the opportunity to use a calculator to understand the amount of funds a user finally receives. The service fee is from 1 % to 5 % with fees for extra addresses (0.00045529 BTC, 0.01072904 LTC, and 0.00273174 BCH). Having funds from various resources helps the crypto tumbler to keep user’s personal information undetected. This last mixer does not offer its users a Letter of Guarantee. All cryptocurrency scramblers introduced in the article are reported to be reliable having all transactions unidentified. It is important to pick a crypto mixer wisely, as a sender has no opportunity to address any governmental structure in case of scams. Of course, handling your deposits online can be unsafe, however, using coin tumblers that are listed in the article will help every user to minimize risks and be sure of success of the transaction.
<urn:uuid:9a492af7-2571-458f-9a9f-04d8eceb334c>
CC-MAIN-2022-33
https://desienna.com/mixer-en.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.956733
2,191
1.9375
2
This spring, I released the second in a series of sets coming from one individual: Nicolas de Fer. He’s an interesting historical figure, a famous French geographer who eventually became the official geographer of the Spanish and French courts. He was a prolific engraver and publisher, stole unabashedly, and while his work isn’t considered historically accurate, he brought a uniqueness with his cartography that helps it stand apart artistically from his contemporaries, making his work the perfect base for fantasy map brush sets. Today, I am happy to announce the release of de Fer Cartography, the third and final set in my de Fer Collection, and my twenty-fifth brush set! This is an extensive cartography brush set based on the first plate of de Fer’s Le Cours de Missisipi, ou de St. Louis, an early 17th-century map depicting headwaters of the Mississippi River and the Great Lakes region. The map itself isn’t as accurate as other maps from the period, but like his other work, de Fer’s artistic ability is what shines here. He goes into extensive detail, creating a unique art piece with signs and symbols that stand apart and work exceptionally well for fantasy maps. Much of what you’d expect in a standard cartography set will be found here settlements, landforms, and fauna; however, there is a uniqueness de Fer brings to his work that would add a nice spin to fantasy projects. I particularly like how he’d rendered each building in settlements really fills out a space. And, I hope you like cartouches because this set comes with plenty! They work well to decorate empty spaces and bring an air of authenticity to a fictional piece. While they aren’t historically (and occasionally biologically) accurate and often feel like the illustrative version of a game of telephone, they’d be easy to manipulate for other narratives and purposes. The de Fer Settlement set features over 290 brushes and includes the following: - 30 Grouped Settlements - 15 Individual “Peaked” Structures - 15 Individual “Arched” Structures - 10 Individual “Square” Structures - 14 Forts - 5 Unique Settlements - 50 Mountains - 20 Mountain Pairs - 10 Swamps - 30 Forests - 50 Trees - 11 Animal Cartouches - 6 Canoe Cartouches - 13 People Cartouches - 4 Burial Cartouches - 1 weird thing I couldn’t figure out - 3 Anchorage Symbols - 8 Portage Symbols - 2 Map Elements But wait… there’s more. While most of the interesting signs and symbols came off the first plate, there was a second plate as well, and while the second wasn’t as detailed as the first, it was filled with many more cartouches. Not everyone needs ’em, but if you want to round out the set, there will be a link below the button for the de Fer Cartography BONUS set that includes sixty other cartouches to decorate your maps! HOORAY for bonuses! Unless you hate cartouches. Then BOO for bonuses. Cheer or boo, whatever. The button below links to a ZIP file that contains a Photoshop brush set (it’ll also work with GIMP and Affinity Photo) as well as a transparent PNG (3 Mb) in case you’re using a program that doesn’t support Adobe brush files. They’re black and on a transparent background, so they’ll look broken in some browsers, but trust me, they’re all there. As with all of my previous brush sets, de Fer Cartography and its bonus cartouches are free for any use. I distribute my sets with a Creative Common, No Rights Reserved License (CC0), which means you can freely use this and any of my brushes in commercial work and distribute adaptations. (Details on this decision here.) No attribution is required. Easy peasy! Enjoy de Fer Cartography? Feel free to show me what you created by emailing me or finding me on Twitter. I love seeing how these brushes get used, and I’d be happy to share your work with my readers. Let me see what you make! de Fer Cartography in Use Want to see how I’ve used this set? I created a sample map based on “The Peninsula of the Palm” from Guy Gavriel Kay’s wonderful 1990 fantasy novel Tigana. (Link goes to IndieBound. Pick it up!) It was fun to rework another map as a sample and doing so has made me want to revisit the book. You can see the results below. There are three versions, a colored version, one black and white, and a decorated sample. Click on any of the images below to view them larger. Perhaps this will inspire you as you get started on your projects! Supporting this Work If you like the de Fer Cartography brush set (or any of my free brushes, really) and want to support my work or just help cover the cost of hosting, consider buying one of my cosmic-horror-soaked dark urban fantasy novels instead of a donation. The first book—The Stars Were Right—is only $2.99 on eBook. I think you’ll dig it. You can find all my books in stores and online. They make great gifts. Visit the Bell Forging Cycle hub to learn more about the series. Tell your friends! Not interested in my books but still want a way to support me? Buy me a coffee. Want to stay in touch with me? Sign up for Dead Drop, my rare and elusive newsletter. Subscribers get news, previews, and notices on my books before anyone else delivered directly to their inbox. I work hard to make sure it’s not spammy and full of interesting and relevant information. Sign Up Today →
<urn:uuid:dd988d4d-3666-4e4d-bc5b-a2719dd48c70>
CC-MAIN-2022-33
https://kmalexander.com/tag/tigana/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.935262
1,259
1.859375
2
@ -0,0 +1,52 @@ Here is a very simple chat application in which parties have to take turns. The tool has three parts: keygen, the key generation tool server, the listener client, the connector All three components depend on libgmp and certain POSIX APIs. server can be built from server.c, aes.c, comm.c, and randsource.c. client can be built from client.c, aes.c, comm.c, and randsource.c. keygen requires pthreads, and can be built from keygen.c, sgprime.c, and randsource.c. In the current implementation, randsource.c depends on the existence of /dev/urandom. If there is a different source of entropy on your system, use it instead by changing randsource.c. keygen <bits> <output file> [threads] will create a <bits>-bit key and store it in <output file>. If [threads] is specified, that many threads will be used for the computation; otherwise just one will be used. client <connect address> <port> will connect to a given address on a given port and begin encrypted server <key file> <bind address> <port> will bind a listener on the given address and port, and use the given key file to exchange keys upon a client connecting. Communication is entirely turn-based. This is to simplify the code and prevent inconvenience on a dumb terminal. There are probably a handful of memory errors; for example, providing a key shorter than an AES block size uses uninitialized memory. The AES implementation is not rigorously tested, and thus may not be completely conformant. Also, no inverse was ever implemented, so it uses a strange encryption mode. In addition to network sockets, UNIX file sockets are also supported. Instead of a network address, use a string of the form unix:/path/to/socket to use a UNIX file socket. Due to the poor specification of certain parts of POSIX involving sockets, it's possible that this program won't work outside of Linux. @ -13,7 +13,7 @@ int main(int argc, char **argv) if (argc != 3) printf("Usage: %s <bind address> <port>\n", argv); printf("Usage: %s <connect address> <port>\n", argv);
<urn:uuid:83d2e31b-8e59-4df0-be4f-748e8bf99142>
CC-MAIN-2022-33
https://gitea.cslabs.clarkson.edu/thajohns/cs456-a3/commit/3583cb5ec931406f6454a3b7866bc162b51bcad5
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.826806
584
2.15625
2
The Hunger Games is a plot captured from a book and brought to the big screen. The main characters are Katniss Everdeen and Peta Mellark. The Hunger Games is where two randomly selected teens will participate in a battle to the death. There are a total of thirteen districts involved meaning 26 people will participate. The primary reason for these games to be conducted is for the pure entertainment of others. One thing I loved about the execution of this movie was the fact they were able to capture the fashion sense from the books straight into the movies. The fashion sense is colorful, bright, and daring. Most movies that were captured from books tend to leave out many parts due to time constraints yet in The Hunger Games we did not see that. The directors managed to include every detail. Although I was very disappointed in the casting because Katniss was supposed to have olive skin yet she was fair. Peeta was said to have bright blue eyes yet he ended up having brown. I think the casting could have been better executed. Also, the CGI was flawless. In the books the technology is very futuristic and the movie was able to capture this. Overall the movie was very intriguing and left the viewers wanting more. The Hunger Games movie trilogy is available for checkout from the Mission Viejo Library.
<urn:uuid:37b67c24-802c-4ab6-a774-d030acfcf920>
CC-MAIN-2022-33
https://mvlteenvoice.com/tag/battle-royale/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.986662
270
1.507813
2
Looking for a suitable Apricot Nectar Substitute? Well, Apricots are attractive orange and yellowish fruits that have a slightly tart and sweet flavor. They are as tasty as they are nutritious. Apricots contain an array of nutrients. Therefore, it could be a great addition to your recipe. Apricot nectar is a byproduct of apricots. It has several uses and you can use it in a variety of dishes including cakes, chicken, pork, Bellini, sauces, chocolate pudding, and so many more. You can also add apricot nectar to juices, smoothies, frozen treats, and salad dressing. If you don’t have any apricot nectar on hand or want to try something new in its place, you can use substitutes. Canned peaches, dried apricots, peach puree/nectar, apple juice, pear puree, and mango nectar are ideal apricot nectar substitutes. Is apricot juice the same as apricot nectar? Most people use the terms apricot juice and apricot nectar interchangeably since they have several similarities. However, the two are slightly different. Apricot nectar is usually d highly concentrated while apricot juice isn’t too concentrated. Therefore, apricot nectar is thicker and you can’t directly consume it the way you drink apricot juice. Another noticeable difference is the taste. Apricot nectar has a sharper taste thanks to additives. The additives neutralize the acidic pulp and lengthen the shelf life. If you want a drink, opt for the apricot juice. It is sweeter and also very nutritious. The 7 Effective Apricot Nectar Substitute Ingredients Here are a few substitutes you can use in place of apricot nectar. You can use any of them depending on your preference and their availability. Canned peaches are arguably the best apricot nectar substitute. Although most people believe that canned products are not nutritious, it is merely a myth. Canned peaches are rich in Vitamin C and Vitamin A. Note that the nutrient count of canned peaches is higher because their cell walls are opened. When cell walls are open, the nutrient content multiplies. In terms of flavor, peaches and apricots are quite similar. Peaches have a sweet and tart flavor. Therefore, the taste of your dish will only be slightly different. Dried apricots can be used in place of apricot nectar. They are readily available and you can find them in supermarkets. If supermarkets close to you don’t stock them, you can buy from online vendors. Note that this substitute has no water content. Therefore, you need to puree them for similar results. You can hardly tell the difference between pureed dried apricots and apricot nectar. Dried apricots contain vitamin A, vitamin C, iron, and potassium among other nutrients. You can use peaches to make peach puree or peach nectar at home. Peaches are readily available in most grocery stores and farmers’ markets. The process is quite easy and the puree makes for an ideal apricot nectar substitute. Just like apricots, peaches have numerous health benefits. Additionally, they have a similar flavor and aroma. Therefore, peach puree or nectar will give you results similar to what you get when you use apricot nectar. Apple juice is quite flavorful. Its taste is unique, and it also has several health benefits. The sharp tingle of apple juice makes it one of the best apricot nectar substitutes. I love using this particular choice because it gives me both the flavor and tingle I get from apricot nectar. Additionally, it is highly hydrating. You can use apple juice as an alternative in most recipes that require you to use apricot nectar. Pear puree/ pear juice Pear puree and pear juice are both good substitutes for apricot nectar. You can use fresh pears to make the juice or puree at home. Note that fresh pears will give you sweet juice or puree while the not-so-ripe ones will give you a tingly mild flavor. If you are not in the mood to make juice or puree, you can buy readymade ones from the grocery store near you. Pear puree and juice have numerous benefits, including metabolic benefits. I highly recommend using them as alternatives to apricot nectar. Mango nectar is not a popular substitute choice. However, it is a suitable substitute because its flavor is a perfect balance of sweet and sour. The aroma and flavor of the dish you add mango nectar to will be simply amazing. My favorite thing about this choice is that it has antioxidant and digestive properties similar to apricot nectar. How to make apricot nectar at home You can make homemade apricot nectar from fresh apricots. I use this recipe because it is simple and straightforward. Additionally, you only need five ingredients. Here is how to make homemade apricot nectar. You will need: - 10 cups apricots (halve them and remove the pits) - 5 cups water - ½ cup agave nectar - I cup coconut sugar - 2 tablespoons lemon juice - In a large saucepan, place the 10 cups of apricots and heat them over high heat. When they start to simmer and then reduce the heat to medium. - Let the apricots simmer until they are soft and broken down completely. This will take approximately 30 minutes. - Remove the apricots from heat and then sieve. You can use a spoon to push the apricots through then collect the puree plus liquid in a large bowl. - Add the sugar, agave nectar, and lemon juice. Whisk the ingredients together until they are completely combined. At this point, your homemade apricot nectar is ready. - If you want to preserve it, pour the apricot nectar into a canning jar and place the can in a pan of boiling water ensuring it is completely covered with water. Let it boil for 20 minutes then remove the jar from the water. - Let it cool then store in a cool dry place for up to 6 months. All the options we have discussed above give good results. Therefore, you can use any that suits your needs and falls within your budget. My favorite substitutes are canned peaches and dried apricots because their flavor is very similar to that of apricot nectar. You can hardly tell the difference. Try any of the substitutes above and let me know how your dishes turn out.
<urn:uuid:0ac2e4a0-083f-4fae-bff3-643549ae3291>
CC-MAIN-2022-33
https://kitchenvile.com/apricot-nectar-substitute/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.910145
1,468
1.875
2
Laser technology has found its way into so many aspects of our lives. From surgery to entertainment, lasers now play a leading role. The world of beauty and aesthetics is no exception. Lasers are now used to great effect for cosmetic purposes. Cellulite can be erased with the use of a laser. Psoriasis can be minimized. Rosacea can be reduced. A laser can even be employed to remove a tattoo and even out skin tone. If you want to look younger and more vibrant, a laser can be your best friend. Attend the Largest of the Nation’s Laser Treatment Schools Because of this, laser treatment schools are seeing an enormous increase in students each term. Not all of these schools provide a quality education, however. Some push students through too quickly, wanting to graduate them as soon as possible to make room for more students. Other laser treatment schools are simply disreputable and dishonest. When you choose from among laser treatment schools, you want an institution with a solid reputation for excellence that has been formed over many years of consistent, proven results. At National Laser Institute, we are the model for this kind of institution. Call or email us today to discuss your career plans. We will be happy to discuss our comprehensive laser training programs and financial aid program with you. We are ready to be your partner in starting your exciting new career as an aesthetic laser technician. Reach us at 1-800-982-6817 or at firstname.lastname@example.org. Read more information on:
<urn:uuid:972eb007-543c-4282-9c63-2f1c16515654>
CC-MAIN-2022-33
https://nationallaserinstitute.com/cosmetic-laser-career/laser-treatment-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.944852
316
1.570313
2
Niemann-Pick Type C disease (NPC) is a genetic metabolic disorder in which harmful quantities of cholesterol and other fatty substances accumulate in the cells of the body such as the spleen, liver, lungs, bone marrow and, most dramatically, the brain. Detrimental changes in either of two genes, NPC1 or NPC2, can lead to NPC disease. Neurologically, NPC is characterized by an inability to metabolize cholesterol in the nerve cells of the brain where it accumulates and causes the premature death of these cells. This brain involvement can be extensive, leading to intellectual disability/dementia, seizures, the inability to look up and down, difficulty in walking, swallowing and talking, as well as progressive loss of hearing. The disorder may appear early in life or its onset may be delayed. Currently, the life expectancies of patients with NPC are quite variable. Children often die at a very early age or in their early teens while some adult patients appear to be less drastically affected. Niemann-Pick Type C is a genetically inherited disease. When two NPC carriers have children, each child has a 25% chance of developing NPC. NPC is always fatal. The earlier the onset of the disease, the shorter the life expectancy. People with Niemann-Pick Type C may exhibit an inability to focus, forgetfulness, learning difficulties in school, slurred speech and loss of speech, as well as depression and even hallucinations. NPC can cause a range of signs and symptoms: enlarged liver or spleen, abnormal eye movements, trouble swallowing and speaking, difficulty walking, loss of muscle tone, the inability to control voluntary movements, poor balance, loss of coordination, and seizures.
<urn:uuid:1a750e5e-83fe-45d3-8f23-f2795160fdf8>
CC-MAIN-2022-33
https://soar-npc.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.938438
353
3.03125
3
A new exhibition called Solar Guerrilla: Constructive Responses to Climate Change, at the Tel Aviv Museum of Art looks to not only educate the public on the dangers of climate change but also showcase some solutions to the problem. Organized by Maya Vinitsky from the Design and Architecture Department of the museum, the exhibit features projects from public and private institutions, commercial companies, and professionals from all around the world. When you first enter the exhibition, there is a wall covered in strips of colorful lines. This isn’t just to be visually appealing but also to document how climate has been changing across the globe since the mid-19th century. The lines start out blue and change to orange and then dark red hues to show the climate across Israel and beyond. The installation is powered by data from the World Meteorological Organization (WMO). The exhibit also highlights technology to help the public combat global warming. One of the tools featured is called “Sense”. Sense is a device that plugs into your household electric panel and monitors how much electricity is being used by each device in your home. Through an app you are able to monitor which devices are using the most power and make educated decisions about which you might want to remember to unplug. Other forms of technology displayed include a machine created by Watergren that can transform the humidity in the air into drinkable water and a PodCar that is a small vehicle powered by a lithium phosphate battery. It’s recharged by solar energy and is already in use in Abu Dhabi’s Masdar City in the United Arad Emirates. The exhibition doesn’t just focus on direct to consumer solutions; it also looks at innovative solutions for cities and municipalities. For example, the Solar Guerrilla highlights vertical gardens across Singapore, rooftop tree yards in Chicago and an “Eco Wave Power” plant, which is used to power Tel Aviv with energy harnessed from sea waves. The museum exhibit also provides a chance to get the first look at a new climate neutral neighbourhood to be built in North Tel Aviv. The community will be powered by solar energy, while room climate will be controlled by a minuscule amount of natural gas. Solar Guerrilla: Constructive Responses to Climate Change is a broad view of the dangers and solutions to climate change for people of all ages. The exhibition opened July 18, 2019 and runs until December 15, 2019.
<urn:uuid:57ca11a2-81ee-4301-92c5-fe3bdb9c83f8>
CC-MAIN-2022-33
https://www.spartagroup.ca/museum-in-tel-aviv-highlights-climate-change-solutions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.959105
499
2.65625
3
I decided to record today’s blog post rather than write it. So consider this my first podcast. Today I’ve got some stories from my rock & roll days with Humble Pie. There are also lessons here you can apply to Internet marketing or any goals you’re trying to reach or just consider it a rock and roll history lesson. So let’s take a little trip down memory lane. Be sure and check out the videos below, too. To listen online, use the buttons below to play, pause, rewind and fast forward the presentation. To download this audio to your computer, right-click here to save the file to your computer. The audio is approximately 29 minutes long. That’s yours truly 25 years ago when I was Humble Pie’s tour manager/guitar tech. For the pickers out there, that’s a 1959 Gibson Les Paul 3-pickup model with the middle pickup removed. It’s the lightest Les Paul I’ve ever seen. Steve bought the guitar on an early US tour only later to discover that it had been stolen from Keith Richards. Before Humble Pie, Steve Marriott formed The Small Faces, which were hugely successful in the UK. Itchycoo Park was The Small Faces highest charting US single reaching #16. It was the first British record to feature a recording effect called “flanging”. Steve Marriott was Jimmy Page’s benchmark when seeking a singer for Led Zeppelin. Also, when Mick Taylor left The Rolling Stones, Steve was Keith Richard’s first choice to replace him. Unfortunately, Mick Jagger allegedly blocked the move because Steve upstaged him during the audition. In the video below, you can see Steve with Humble Pie live performing one of their hits, “I Don’t Need No Doctor.” Click on the image below to hear one of the best interviews I’ve seen with the late Steve Marriott of Humble Pie and Small Faces fame. Finally, here’s one of the lineup I first worked with in 1982 featuring Steppenwolf’s Goldy McJohn on keyboards and ex-Savoy Brown bassist Jim Leverton performing an un-released song called “Big Train.” Note: Here is the link to the book I mentioned in the podcast, “Who Are You?” by Jim Barrett and Hugh Green
<urn:uuid:5b35a8f4-e2d7-4f0f-b430-c790d570c896>
CC-MAIN-2022-33
https://ecommerceconfidential.com/?p=118&cpage=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.932494
511
1.546875
2
Hands up if you rode in the back of a pickup truck as a kid and survived. What about rode a bike without a helmet? Drove without a seatbelt? Had measles or the flu? Okay, now hands up if you didn’t survive. Anyone? No hands? Well, I guess the survivors have it, those things must be safe. Every single time I see someone say, “I did it and I survived,” that discourse runs through my head. Yes, you survived, obviously, you’re here preaching about it. We almost never hear from the people who didn’t. I understand the reasoning behind the “I survived” diatribe. It’s clearly backlash from the helicopter parenting movement in which kids are sometimes protected to the point that it becomes detrimental. But there is a difference between not bubble-wrapping your kids and ignoring evolving safety standards. Sure, it is possible to make playgrounds too safe, in fact, it’s been suggested that when playgrounds are designed without any potential danger, our risk-seeking kids will create their own by misusing it. So, include risk, but make it reasonable. Just because we managed to survive the scorchings from metal slides doesn’t mean our kids need to experience second degree burns when alternatives are available. Riding in the back of pickup trucks was fun. But it was stupid. And not everyone did survive. Ditto riding a bike without a helmet. I never wore bike helmets. My takeaway from that is not that my kids don’t need to wear one; it’s that I am thankful I was never seriously injured. Some of it is well-meaning or unintentional. Grandparents are not always up to date on the latest safety protocols. I know my parents have uttered a frustrated, “I don’t know how your generation survived” from time to time when I have insisted on things like grapes being cut in half, or no blankets in the crib. It certainly doesn’t help when guidelines keep changing. When we were little, it was not only acceptable but encouraged to put babies to sleep on their stomachs or sides. Now, that is verboten, back sleeping only. My kids are five years apart, and several guidelines changed in between my first child and my second. I understand the frustration of trying to keep up and also the potential for feeling insulted that the way you always did it was “wrong.” And some of it isn’t clear cut. Is it okay to leave your child in the car on a cool day? Where? How old a child? For how long? Everyone has a different answer for this, and there isn’t a perfect answer. But what I don’t understand is the push back when it is indisputable. Like car seat safety. As testing is done and innovations are made, safety standards and practices increase. This is physics and biology, not opinion. And it is demonstrable. I spoke to a first responder who stated that the outcomes for children in crashes he has responded to have been markedly better since extended rear facing became common practice. So why fight it? Why insist on doing it a way that is irrefutably less safe simply because doing it that way did not kill you? Personally, I have higher standards for my kids’ safety than “It didn’t kill me.” I see the “I survived” comments in every discussion about vaccines. Inevitably, someone had measles, or the flu, or another preventable disease, and did not die, so they don’t see the big deal about vaccines. That a disease is not 100% fatal is a bizarre reason to not prevent it. First of all, the risks of the diseases are there, whether everyone dies or not. Second, not dying doesn’t mean having the measles is pleasant. I’m all for sparing my kids that experience. So yes, you survived. Congratulations. So far, nothing in life has succeeded in wiping out all of humanity, and very few preventable things kill everyone who experiences them. Instead of smugly exasperating, “I did it and I survived” can we please make the shift to, “I did it and I was lucky to survive. Thankfully, we have better methods of doing this now”? We can still let kids be kids. We can still let them take risks and fail, that is an important part of growing up. But let’s make sure they don’t have to pay for their mistakes with their lives.
<urn:uuid:85294ca6-3080-4e18-bf2a-dd4d334e506e>
CC-MAIN-2022-33
https://www.yummymummyclub.ca/family/kids/20180305/just-because-we-survived-doesnt-mean-something-isnt-stupid?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.972409
974
1.773438
2
AudioQuest USB Forest (C to A) (USB 2.0) (0.75M) For many applications, the speed of digital communication is important. Most visibly, “speed” is about transferring large files as quickly as possible, or carrying enough data for an HD video. For USB audio (and for HDMI audio), “speed” is critical not because of how-much how-fast, but because time relationships within a digital stream are critical to the reconstruction of the analog waveform that brings information, music and joy to our ears. Time-based damage (jitter) to this information within the data package makes the sound small and flat instead of 3D, harsh and foggy instead of smooth and clear. AudioQuest USB Type-C cables featuring conductor materials and construction techniques that have allowed AQ’s other USB cables to achieve “Best-In-Class” recognition worldwide. With the newer USB Type-C connector quickly becoming commonplace on many devices, AQ’s line of Type-C equipped USB cables will allow users to connect with Type-C enabled devices such as MacBook, ChromeBook, Pixel, Galaxy Note 7, etc. In addition, ALL of AudioQuest’s USB cables incorporate a newly developed strain-relief system to provide robust durability between the USB cable and plug. SOLID 0.5% SILVER CONDUCTORS Solid conductors eliminate strand-interaction distortion and reduce jitter. Solid silver-plated conductors are excellent for very high-frequency applications, like HDMI audio and video. These signals, being such a high frequency, travel almost exclusively on the surface of the conductor. As the surface is made of high-purity silver, the performance is very close to that of a solid silver cable, but priced much closer to solid copper cable. This is an incredibly cost effective way of manufacturing very high-quality HDMI cables. Hard-Cell Foam Insulation Hard-Cell Foam (HCF) Insulation ensures critical signal-pair geometry. Any solid material adjacent to a conductor is actually part of an imperfect circuit. Wire insulation and circuit board materials all absorb energy. Some of this energy is stored and then released as distortion. Hard-Cell Foam Insulation is similar to the Foamed-PE used in our more affordable Bridges & Falls cables, and is nitrogen-injected to create air pockets. Because nitrogen (like air) does not absorb energy and therefore does not release any energy from or into the conductor, distortion is reduced. In addition, the stiffness of the material allows the cable's conductors to maintain a stable relationship along the cable's full length, producing a stable impedance character and further minimizing distortion. All drawn metal strands or conductors have a non-symmetrical, and therefore directional, grain structure. AudioQuest controls the resulting RF impedance variation so that noise is drained away from where it will cause distortion. The correct direction is determined by listening to every batch of metal conductors used in every AudioQuest audio cable. Arrows are clearly marked on the connectors to ensure superior sound quality.
<urn:uuid:f0d6e7f7-6c40-48ac-96b0-aad3025ca5b7>
CC-MAIN-2022-33
https://www.piyanas.com/product/2787/USBForestCtoA%0AUSB2.00.75M
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.906022
643
2
2
The extent to which neocortical pyramidal cells function as a local network is determined by the strength and probability of their connections. By mapping connections between pyramidal cells we show here that in a local network of about 600 pyramidal cells located within a cylindrical volume of 200 microm x 200 microm of neocortical layer 2/3, an individual pyramidal cell receives synaptic inputs from about 30 other pyramidal neurons, with the majority of EPSP amplitudes in the 0.2-1.0 mV range. The probability of connection decreased from 0.09 to 0.01 with intercell distance (over the range 25-200 microm). Within the same volume, local interneuron (fast-spiking non-accommodating interneuron, FS)-pyramidal cell connections were about 10 times more numerous, with the majority of connections being reciprocal. The probability of excitatory and inhibitory connections between pyramidal cells and FS interneurons decreased only slightly with distance, being in the range 0.5-0.75. Pyramidal cells in the local network received strong synaptic input during stimulation of afferent fibres in layers 1 and 6. Minimal-like stimulation of layer 1 or layer 6 inputs simultaneously induced postsynaptic potentials in connected pyramidal cells as well as in pyramidal-FS cell pairs. These inputs readily induced firing of pyramidal cells, although synaptically connected cells displayed different firing patterns. Unitary EPSPs in pyramidal-pyramidal cell pairs did not detectably alter cell firing. FS interneurons fire simultaneously with pyramidal cells. In pyramidal-FS cell pairs, both unitary EPSPs and IPSPs efficiently modulated cell firing patterns. We suggest that computation in the local network may proceed not only by direct pyramidal-pyramidal cell communication but also via local interneurons. With such a high degree of connectivity with surrounding pyramidal cells, local interneurons are ideally poised to both coordinate and expand the local pyramidal cell network via pyramidal-interneuron-pyramidal communication.
<urn:uuid:7bc23b58-bb35-4e1d-a25c-8e59138ab0ba>
CC-MAIN-2022-33
https://pubmed.ncbi.nlm.nih.gov/12813147/?utm_source=unknown&utm_medium=rss&utm_campaign=pubmed-2&utm_content=1Zs2HUIS--laSvd_TuHgF9wb5J3fXUkfJG-6djOGnnWRP8uEVH&fc=20200625144623&ff=20200625155113&v=2.9.2
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.883728
448
2
2
The justification for that hyperbolic assertion comes from a global study by Havas Group, published in partnership with Cannes Lion ahead of next month’s Cannes Lions International Festival of Creativity, which drew on the attitudes and behaviours of 17,411 people aged 13+ in 37 countries, with a focus on Prosumers – those leading-edge influencers and market drivers whom Havas has been tracking for more than 15 years. This found that people no longer see entertainment as superficial: 83% of them consider it a vital need. Havas compared this figure with 54% in an earlier study who claimed to pay a lot of attention to health issues. Even if consumers might not equate entertainment and health if asked about the two side by side, it is certainly the case the role entertainment plays in people’s lives has changed. Six in ten Prosumers said they couldn’t sit still without consuming content, while 56% were willing to sacrifice sleep to binge-watch a show they liked. Nearly four in ten maintained they couldn’t live without Netflix – including people for whom the brand didn’t really exist five or six years ago. “The digital era has revolutionised the field of entertainment,” said Yannick Bolloré, CEO of Havas Group and Chairman of the Vivendi Supervisory Board. “People have now placed entertainment at the centre of their existence rather than relegating it to the fringes of their life.” And the more entertainment people consume, it seems the more they crave. Some six in ten Prosumers wanted educational systems and workplaces to be made more entertaining, while more than a third said the same about hospitals and retirement homes. Thankfully, what constitutes entertainment isn’t just about mindless distraction: nearly nine in ten Prosumers believed that entertainment should empower and educate. And there was widespread agreement on the importance of local content, language and culture. Impactful entertainment “needs to educate, empower, and give people the tools with which to create better versions of themselves,” said Marianne Hurstel, Global Chief Strategy Officer at Havas Creative. “Nearly half of Prosumers would be willing to pay more for entertainment that is meaningful in this way,” she added. Jeff Goldblum will be discussing these trends in Cannes on June 20 with Stéphane Xiberras, President and CCO of BETC Paris and Head of the Havas Creative Council. Sourced from Havas Group; additional content by WARC staff
<urn:uuid:a024b1cc-43a6-48fa-be23-fcf5ab1282b8>
CC-MAIN-2022-33
https://www.warc.com/newsandopinion/news/the-crucial-role-of-entertainment/en-gb/42113
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.952
528
1.53125
2
A massive plantation drive by Noida Development Authority was carried out on the auspicious eve of 77th anniversary of Quit India Movement. A massive plantation drive by Noida Development Authority was carried out on Friday to prepare city's lung space on the auspicious eve of 77th anniversary of Quit India Movement, launched by Late Mahatma Gandhi, father of the nation in 1942. More than 2.5 lakh saplings were planted across residential sectors, green belts, parks, schools, and in a biodiversity park being developed by the authority in Sector 91. Satish Mahana, Minister of Industrial Development, Uttar Pradesh, Mahesh Sharma, local MP and Panjak Singh, local MLA, Ritu Maheshwari chief executive officer, Noida Development Authority, and students from schools and colleges were present during the drive. Sprawling over land areas of 110 acres, the bio-diversity park and green belt are going to be city's lung space in days to come. The well designed park has been divided into four natural divisions to restore all plant species of hilly ridge area, arable main land, sandy riverine flood plain, low lying land of Delhi/NCR.
<urn:uuid:cf798d00-a5e1-4a11-b91c-52e57269173f>
CC-MAIN-2022-33
https://www.cityspidey.com/news/8940/massive-plantation-drive-carried-out-in-noida
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.949843
243
1.570313
2
Beat your pupil debt. Refinance today. Folks tend to imagine all loans as being developed equal. In the event that you owe a $300 repayment after the period, what is actually it thing how that money was actually borrowed? Nevertheless variety of obligations you incur can affect every section of the payment processes. According to issue like interest rate and mortgage name, consumers might have vastly various activities repaying the exact same sum of money. So how would two popular debt products, pay day loans, and private debts, compare? Some tips about what you need to know. How a Payday Loan Functions A payday loan try a short term mortgage, also referred to as a financing or cash loan. More pay day loans has a small max quantity, around $500 or significantly less, and carry huge charges. Based on the customers economic defense agency (CFPB), more payday advance loan has a 400per cent APR. Payday loan receiver agree to payback just how much lent within a short span of time, combined with any interest and charges. More payday advance loan become because of within thirty day period aˆ“ usually ahead of the borrower is arranged to receive their unique next paycheck. A quick payday loan is unsecured, and for that reason has no equity or possessions backing they. Payday advance loan are designed pertaining to anyone with poor credit and limited entry to traditional financial obligation items like unsecured loans and credit cards. Additionally it is relatively easy to be eligible for an online payday loan. You just need to get 18 ages or earlier and have a legitimate kind ID, a banking account and proof of work. The payday loan cycle In principle, a borrower removes an online payday loan whenever they’re just a little small on cash, repaying they whenever their own after that paycheck comes in. The truth is, more consumers battle to develop the amount lent ahead of the deadline. They have been then compelled to roll over the mortgage, interest, and fees into a financing with a brand new collection of costs. This produces a period of obligations that is incredibly difficult to escape from. The CFPB report that 80percent of payday advance loan were renewed several times, making use of the majority of borrowers spending much more in charges and interest than they originally lent. If a debtor does not renew a loan earlier will come because, the lender will try to take the funds out from the debtor’s bank-account. In the event the banking account does not have adequate resources, the membership owner will likely be billed overdraft charge until they can deposit more income. This is certainly another exemplory case of the reason why payday loans may be thus high priced. Here is another shocking reality about payday advance loan aˆ“ they usually you should not report task on the three biggest credit reporting agencies, Experian, Equifax, and TransUnion. Which means that though individuals improve costs promptly, they won’t see an increase in their own credit history. Exactly how an individual Loan Functions A personal loan may be applied for from a financial, credit union or web lender. More unsecured loans are unsecured and never backed by any equity. Unsecured https://samedaycashloans.org/payday-loans-wv/ loans that do bring equity behind them routinely have decreased rates of interest than unsecured signature loans. A 2018 U.S. Development research found that consumers oftentimes took around signature loans for debt consolidation, renovations, unanticipated health outlay, auto maintenance, huge expenditures, holidays, and wedding events or any other festivities. You are able to take-out your own mortgage for virility therapy, dog healthcare expenses, surgery treatment, plus. Some loan providers posses particular limits about what the borrower can use the income for, and others tend to be more lax. When you yourself have good credit, you’ll qualify for an individual financing with a diminished interest rate than the credit card. That’s why the most popular cause to take out a personal mortgage is repay credit card debt. Consumers can help to save lots in interest with this specific plan. Those decreased rate may the reason why some people incorporate an individual financing to cover biggest spending versus a credit card. Unless you have enough money protected to pay for in earnings, big-ticket things like autos, accessories and medical expenses are less expensive with a personal mortgage. Personal bank loan words in many cases are between two to seven age. The quantity you can easily use is usually between $1,000 and $50,000, with interest rates for personal loans starting between 4per cent to 36%. Interest levels on unsecured loans vary with regards to the person’s credit history, debt-to-income proportion, also elements. Approval ount you’re applying for and the reason for the borrowed funds. Just how Payday and private Debts Review An important difference between a payday loan and a personal financing will be the fundamental terms and conditions. A payday loan is an extremely brief financing frequently because of within a month, whilst term for an individual financing are at the very least 24 months. Personal loans have actually a lower interest rate than payday advances, which are beneficial in case you are deploying it as a debt consolidation mortgage or perhaps to pay money for an urgent situation. Pay day loans also provide limited optimal levels, typically $500 or reduced. Some personal loan companies enable you to borrow just as much as $100,000. Payday loans are a lot better to access than a personal financing. You just need to stop into a quick payday loan store, where you are able to have the mortgage within thirty minutes. Your own loan usually takes several days to endeavor. One lesser-known distinction between payday loans and private debts is that best unsecured loans show up on your own credit report. If you take completely an individual mortgage and come up with payments on time, your credit rating will climb. That will help qualify for best financing and rates of interest in the future. An integral similarity between payday and personal financing is the fact that both are often unsecured, so there’s no homes or advantage behind the mortgage. In other words, should you decide default on an online payday loan or unsecured loan, there is nothing the financial institution can get. If you possess the solution between a quick payday loan and a personal mortgage, aforementioned can be the cheaper choice. If you attempt to apply for your own loan and don’t meet the requirements, have a look at exactly what more you certainly can do. Could you join an area hustle or pose a question to your president for overtime? Can you placed some expenditures on a charge card? Is it possible to borrow cash from your own family members or family? Each one of these options would be much better aˆ“ much less costly aˆ“ than taking right out a payday loan.
<urn:uuid:5446d275-0b5b-4734-91e4-3c50c0b3c2d1>
CC-MAIN-2022-33
https://www.quesosanahuac.com.mx/payday-advance-loan-vs-unsecured-loans-whata%CB%86s-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.964112
1,431
1.867188
2
The Church of Santa Maria delle Grazie An imposing architectural work linked to the work Cenacolo by Leonardo da Vinci, preserved in the refectory inside. In 1460, Count Gaspare donated a chapel with a fresco of the image of Our Lady, called “Delle Grazie”, to ensure that a church and a convent were built. Guiniforte Solari began work in 1463, which ended in 1482. Later, by the will of Ludovico il Moro, who wanted it as a mausoleum for his family, the church was modified by Bramante. The church was included in the UNESCO World Heritage Site in 1980 as one of the greatest testimonies of Renaissance art.
<urn:uuid:fec604d6-9314-4aa9-b7e7-f7b60a749c87>
CC-MAIN-2022-33
https://www.lovingbergamo.it/en/the-church-of-santa-maria-delle-grazie/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00072.warc.gz
en
0.977321
158
2.921875
3
Encyclopaedia of British Pottery and Porcelain Marks "This monumental and authoritative encyclopedia lists over four thousand British ceramic marks, making it the most comprehensive volume of its kind"--Publisher's description. What people are saying - Write a review We haven't found any reviews in the usual places. TYPES OF CERAMIC MARKS APPENDIXUNIDENTIFIED OR PROBLEM MARKS 2 other sections not shown Other editions - View all 19th century added anchor Appendix bear blue BONE CHINA British Pottery Bros Burslem Ceramic Charles Chelsea Cobridge Collection continued crown decorated Derby differing design Distinguishing detail Distinguishing initials found early Earthenwares Edward Encyclopaedia of Marked ENGLAND English entry examples Fenton figures firm Formerly George GREEN Hall Hanley illustrated Encyclopaedia Impressed mark Impressed or printed Impressed seal Incised mark Incised or painted included individual pattern initial mark Ironstone James John joined Lane late letters listed London Longton manufacturers Marked Specimens marks occur marks of differing MISS monogram Museum name-mark Note period plate Pottery and Porcelain POTTERY LTD potting printed marks Printed or impressed production rare recorded registered relate Ridgway ROYAL Shelton shire Potteries signature mark Sons Ltd Stafford Staffordshire Potteries Stoke Stonewares Street Studio Studio-type Pottery style Subsequently Thomas Tunstall typical various wares Wedgwood WOOD Worcester
<urn:uuid:0215ef96-5f38-42aa-9e0d-ecb43f1747ef>
CC-MAIN-2022-33
https://books.google.co.nz/books/about/Encyclopaedia_of_British_Pottery_and_Por.html?id=m4DHOyBdEfgC&redir_esc=y
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz
en
0.789781
325
1.617188
2
Therapy is for everyone; here are 5 reasons why Close your eyes and think of the word "therapy". What comes to your mind? For me the first image is a person laid back on a couch talking about all his or her problems to a person with a clipboard and no facial expressions. Maybe you have a similar image. Well, it’s now time to cast that stereotype out of your mind and create a new one. Therapy is beneficial to every single person who has ever lived. People with depression, anxiety, traumatic experiences and many other reasons may need therapy to help them heal, but there are benefits of going to therapy that every person needs: 1. Undivided attention Rarely do you have someone’s full and complete attention for any decent span of time. Having the opportunity to talk and be listened to can be very healing. Research shows that verbalizing your struggles or things that are bothering you is therapeutic and can help you come to terms with your own feelings. This is accomplished by talking with a therapist. On the flip side, you become a better listener because you understand how it feels when someone listens to you. You won’t have the need to talk when other people are sharing their problems. When you listen more, your relationships with others deepen. Through therapy, you start understanding yourself, among other things. You are able to begin to understand why you react one way instead of another. You are able to see your bad habits and your good habits. This greater understanding of yourself will allow you to more clearly see your role in your friendships and relationships. You might discover ways you can improve your life and become a better person. When you begin to understand yourself, you then make it possible to understand others. You realize that your decisions and emotions stem from a deeper place and it makes you more empathetic to others. 3. Reduced physical problems When emotions or thoughts are ignored or suppressed, your body willreact. Back pain, headaches, sleeping problems and stomach pain can all be warning signs that you need to work through your emotions. When you spend time releasing those emotions to a person who is not connected to your social life (and who legally has to keep silent about your difficulties) will help these physical symptoms disappear. 4. Work through future problems Therapy will help you reason through problems and difficulties with other people and life in general. You start to think differently when you have the chance to talk about yourself. Sometimes you will begin to understand why one person made a decision you previously didn’t understand. This way of thinking will continue on long past the time you spent talking to a therapist. 5. Help others You not only can help your friends by listening to them more, but they will recognize the changes in you. In fact, your choice to see a therapist might inspire them to make changes in their own life. However, the most important people you might affect are your children. You will be able to better help your children understand how to work through their emotions and develop healthy mental habits. This sets your children up to be successful adults. Overall, therapy is bound to make you a happier person in general. You will begin to recognize that you are not alone in your problems and that you are a good person. You will be able to change your bad habits because you will now understand why you developed them in the first place. Your relationships with friends and family will be better. Don’t let the stigma that therapy is only for people who are mentally ill hold you back — it is completely false. There is nothing wrong with going to therapy, in fact it is completely OK. Stacie Simpson, FamilyShare Stacie Simpson is a journalism student. She loves listening to, gathering and sharing stories and advice to help others improve their quality of life. She spends most of her free time with her husband, ballroom dancing, reading and writing.
<urn:uuid:89b3282c-0f9b-4d4e-8035-11f454440f3c>
CC-MAIN-2022-33
https://www.aberdeennews.com/story/lifestyle/2017/02/13/herapy-is-for-everyone-here-are-5-reasons-why/44773041/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.96409
811
2.359375
2
The International Monetary Fund (IMF) and the World Bank are working to close the knowledge gap that exists regarding blockchain in the financial world by creating their own quasi-cryptocurrency called the Learning Coin, announced April 13, 2019. Since crypto has been successfully infiltrating the global financial markets, many world powers have been forced to give it its due attention and one of these is the International Monetary Fund (IMF). Despite having previously that cryptocurrencies posed a vulnerability to the financial market, they seem to have come around since then. As such, it was announced on April 13, 2019, that the IMF and the World Bank have teamed up to explore the potential of crypto in a very hands-on manner. The IMF is not the only large body that has previously criticized crypto as a European Central Bank executive bitcoin an evil spawn of the financial crisis in 2018. The new token is called Learning Coin and as the name implies, it exists not for trading purposes but rather for the purpose of studying and understanding more about blockchain and crypto. As such, the token will not be commercially available but instead will be used by the IMF and World Bank. Employees of the two organizations will be incentivized and rewarded for educating themselves about blockchain and crypto through the use of the Learning Coin. The coin, however, doesn’t actually have any monetary value and its ultimate goal is to fill the “knowledge gap” that exists between world powers who are better recognizing the need to stay up to date. “The development of crypto-assets and distributed ledger technology is evolving rapidly, as is the amount of information (both neutral and vested) surrounding it. This is forcing central banks, regulators and financial institutions to recognize a growing knowledge gap between the legislators, policymakers, economists and the technology,” a statement said. Mind the Gap Two very telling points can be drawn from the announcement of Learning Coin. First, the fact that the IMF and World Bank are acknowledging that a knowledge gap exists shows that there is still a long way to go with blockchain education and sensitizing both individuals and organizations to the inner workings of crypto. Also, it is encouraging that the IMF and World Bank are electing to learn about blockchain in a practical manner by creating their own quasi-crypto rather than working merely with theories.
<urn:uuid:548eba0d-e3a8-42d9-a976-c2bccc6a2848>
CC-MAIN-2022-33
https://crypto.news/imf-world-bank-study-crypto-native-token/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.964763
474
2.609375
3
Z controller File |Uniform Server 5.6-Nano.| File menu Introduction The File drop-down menu has nothing to do with files! Genially this is the first location a user checks, hence this menu contains most commonly used server configurations. I refer to putting the servers on-line this can be confusing! What it means is you are allowing external access (Intranet and Internet) to either the root folder UniServer\www or root folder UniServer\ssl. Restricting access means only the local machine has access to these roots folders. Clicking either of the four menu items opens a window confirming the selection. This window (Passwords Htaccess On-line) also allows you to directly control all the features associated with accessing root folders. For example you can password protect these. This menu item opens a window where you can change some common Apache parameters. It also provides direct access to the two Apache configuration files. After making a change you can check the syntax. This menu item opens a window where you can change some common PHP parameters. It also provides direct access to the three PHP configuration files used in Uniform Server. Closes the program Passwords Htaccess On-line The first thing you will notice there is three root folders, should you wish you can put Apanel on-line. Each root folder is protected by an htaccess file this allows you to enable public access or restrict access either locally or password protect them. Hence three common sections the following description is for root folder www however it applies to all three. Root Folder www Default Uniform Server is locked down allowing only local access. Password access is disabled. Set a name and password: Password protect root folder: On-line Access - Local Access: Related information 5.0-Nano: Security features This window provides access to some common Apache configuration parameters. Generally there is no need to change any of these Note: Changes do not become effective until you restart the server. Uniform server uses three configuration files for PHP. PHP loads and uses the current (php.ini) file this file is overwritten when either the development or production file is switch in. This allows you to easily swap between the two. Access to the current configuration file is provided allowing you to experiment with parameters. If you kill the server switching in either development or production will get you backup and running. Any changes made to the current ini file do not become effective until the server is restarted. After making changes to either development or production use the update button to save changes. After saving changes you can switch the file into service remember this overwrites the current file. Again you need to restart the server for the changes to take effect. Note: Default Uniform Server has the production PHP configuration file switched in. This window provides access to some common PHP configuration parameters. If a parameter is not listed you can edit a configuration file directly using the following buttons: - Do not use the short form <? ?> of PHP open tag. - Always use the long form of PHP open tag <?php ?> - Always switch short form open tags off' However older PHP scripts may use short open tags in order to test these you can change short form open tags to on after testing remember to switch back to full form tags. You can convert older scripts as follows - Replace all occurrences of <? ?> with <?php ?> - Replace all occurrences of <?= with <?php echo The above provides access to some common server parameters that you may wish to change. In particular, putting the server on-line and if required setting name password protection on the root folders. The next page covers the Local drop down menu. This menu provides short cuts to Apache syntax check and switching PHP ini files. It also allows you to open the move servers window.
<urn:uuid:b18df8ee-c397-46e6-9beb-df9fe5826aeb>
CC-MAIN-2022-33
http://wiki.uniformserver.com/Z_controller_File
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.82024
877
1.859375
2
Dead fish litter Kentucky River as bourbon runoff from Jim Beam fire reaches the Ohio Dead fish and bourbon began flowing into the Ohio River Monday — the result of last week's Jim Beam warehouse fire that destroyed thousands of barrels of Kentucky's signature spirit. The bourbon runoff that escaped into the Kentucky River is expected to kill "thousands of fish," although the total damage won't be known for several weeks, said Kevin Kelly, a spokesman for the Department of Fish and Wildlife Resources. "Our biologists need to come back and crunch the data and go through their formulas before arriving at an estimate,” Kelly said. Bourbon from the Woodford County warehouse — which held 45,000 barrels — spilled into the nearby Kentucky River and Glenns Creek as a result of the fire that burned more than three days, Kentucky Energy and Environment Cabinet spokesman John Mura confirmed last week. Mura said the cabinet will be issuing a notice of violation to Beam Suntory, the Chicago-based spirits company that owns Jim Beam, for bourbon runoff spilling into nearby waters. The maximum fine is $25,000 for each violation for each day. The Kentucky Energy and Environment cabinet said Monday afternoon that the leading edge of the 23-mile alcohol plume was past Monterey, Kentucky, and into the Ohio River at Carrollton. Distilling the Jim Beam fire:What we know about the cause, river impact and more From 'bourbonado' to Jim Beam fire:Kentucky's historic bourbon disasters Though those near the Ohio River may have to deal with dead fish, the overall impact of the bourbon flowing into the river is not expected to be severe. "It will have a very negligible impact on the river," Mura said. "The Ohio River is so much larger than the Kentucky that it’s not going to be an issue." Additionally, customers "don’t need to be worried about the quality of Louisville’s drinking water," said Kelley Dearing Smith, vice president of communications for Louisville Water Co. The cabinet posted several other images over the weekend offering a closer look at the toll on the river and its inhabitants. Progress has been made since the Jim Beam warehouse went up in flames. With the fire no longer burning, debris removal will be taking place over the next few weeks, according to Mura.
<urn:uuid:c24587be-9871-4522-99bd-05411881dbb1>
CC-MAIN-2022-33
https://www.courier-journal.com/story/news/local/2019/07/08/ohio-river-impact-from-jim-beam-bourbon-runoff-kentucky-river/1671282001/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.957934
482
2.15625
2
Everyone has struggled with their appearance. Whether it’s a bad hair day or weight or an annoying mole — we all have body image issues. Recently, singer Kelly Clarkson has come under scrutiny for her weight. Her response: “I’ve just never cared what people think. It’s more if I’m happy and I’m confident and feeling good, that’s always been my thing,” she said. “And more so now, since having a family — I don’t seek out any other acceptance.” Share this article about Kelly Clarkson’s response to criticism of her weight and talk with young adults about the importance of accepting the skin you’re in — and also stopping criticism of others. - Have you ever fallen into the trap of criticizing someone (celebrity, co-worker, others) about their appearance — even if it’s just in your head? What do you think drove you to that criticism? - What’s an example when you — or someone else — stood up to criticism, a la Kelly Clarkson? What was meaningful about that response? - What body image issues do you struggle with? How do you manage your self-critique in light of the fact that our faith communicates that we are all made in the image of God? - What are some healthy responses to your personal critique?
<urn:uuid:ff121959-f1b1-4cfe-8305-9fd03cb7f103>
CC-MAIN-2022-33
https://youngadultministryinabox.com/this-week/news-culture/taking-on-critics/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.959181
292
1.5
2
The BCS theory is the first successful theoretical understanding of superconductivity that was widely accepted in the scientific community. John Bardeen, Leon Cooper, and Robert Schriefferproposed their mathematically complex theory in 1957, and were awarded for their work in 1972 by winning the Nobel Prize. It will be presented how this theory came about from previous discoveries, and how there is still a need for further theoretical understanding. This paper will also discuss the different superconductors and what has been discovered since this Nobel Prize winning theory was proposed. It will end by talking about the applications for superconductivity in a wide variety of areas, and how it is leading to some amazing technological feats. Background and History A superconductor is an element, inter-metallic alloy, or compound that will conduct electricity without resistance below a certain temperature . The certain temperature mentioned is different for each element or compound and is referred to as the temperature of conversion or transition temperature . This temperature is denoted with the variable , and it is distinguished by seeing a sudden drop in resistance once the compound reaches it. With zero resistance it is possible that a current will flow foreverin a material that forms a closed loop and has been super cooled below its transition temperature. This phenomenon, along with superfluidity, proves that dissipation free movement is possible, and is the closest thing to perpetual motion in nature. Its inability to be understood by using classical physics causes scientists to refer to it as a macroscopic quantum phenomenon. Superconductivity was first observed by a Dutch physicist named Heike KamerlinghOnnes in 1911 when he cooled mercury to 4 degrees Kelvin and noticed its resistance suddenly vanished. He won the Nobel Prize in physics two years later for his discovery and research. The next important discovery was made in 1933 when German researchers Walter Meissner and RoberOchenfeld recognized that superconducting materials will strongly repel and tends to expel a magnetic field. They called this strong diamagnetism the Meissner effect, and it led to the prediction of the existence ofan electromagnetic penetration depth. These discoveries and theories were able to describe the relationships between the observed phenomena, but there weren’t any theories that explained how these phenomena came about based off of the fundamental laws of physics. That was until John Bardeen, Leon Cooper, and Robert Schrieffer proposed their theory in 1957. It was the first widely accepted theory that explained superconductivity, and it was able to explain how superconductivity happened in elements and simple alloys that were cooled to temperatures close to absolute zero. Understanding the Theory The theory was named the BCS theory after the men who created it and would later receive a Nobel Prize for it in 1972. Their theory was based off of the discovery made by Leon Cooper that electrons in a superconductor become grouped together in pairs near the Fermi level. The Fermi level is defined as the potential energy level of an electron in a crystalline solid. This grouping of electrons is now called Cooper pair, and it was found that a system of these pairs would function as a single entity in a superconductor . Figure 1 and 2 make it possible to get a better visual of what is happening.This pairing action is very interesting because up to this point classical physics had always defined electrons as purely repulsive to one another. These Cooper pairs behave like a particle with integral spin which do not obey the Pauli Exclusion Principle.This principle states that no two particles with half-integer spin may occupy the same quantum state simultaneously . Since the Cooper pairs aren’t constrained by this principle it is possible for multiple electrons to be in the lowest quantum state. This leads to the fact that the entire collection of Cooper pairs in the metal can be described by a single wave function . The way these electrons are able to form pairs together is through their interaction with the underlying lattice’s vibrations. One of the electrons in the Cooper pair creates a region of excess positive charge by polarizing the lattice when it attracts the nuclei towards it. This positive charge or potential well then attracts a second electron. So the attraction between the two negatively charged electrons is created through the positively charged nuclei. A good analogy is imaging a bowling ball rolling down a bed. This motion would create an indention in the bed which would make it easier for a second bowling ball to follow in its path . So as a voltage is introduced to the superconductor, the Cooper pairs start to all start to move and continue to move even after the voltage is removed because they don’t experience any opposition to their motion. To stop or reverse the direction of the Cooper pairs’ travel would have to be done by separating a Cooper pair and a number of the Cooper pairs with itat the same time. This would cause the current to stop, but this doesn’t happen on its own with time alone. One way to cause a material to lose its superconductivity is by warming up the superconductor,which causes the Cooper pairs to separate into individual electrons again. Heike KamerlinghOnnesalso found out shortly after his discovery of this phenomenon that superconductivity could be reversed by applying a large current or a strong magnetic field to the superconductor, and the BCS theory supplied a way to experimentally measure the energy needed to separate the Cooper pairs into their individual electrons.Their theory was also successful in explaining the isotope effect, which what happens when the transition temperature is reduced because a heavier atom of the element making up the superconductor is added.If the conduction was purely electronic, then it wouldn’t matter what the nuclear masses were. Since there is a relation though, it points to the fact that there is an interaction between and the lattice is and the electrons. The mechanical properties of the lattice are what causes this drop in transition temperature. Discoveries since the BCS Theory There have been many interesting breakthroughs in superconductivity since Bardeen, Cooper, and Schrieffer released their theory in 1957. A Cambridge University graduate student predicted that electrons would flow from a superconductor to another superconductor even if they were separated by an insulator or non-superconducting material. This student was a British physicist named Brian David Josephson, and he was able to predict a mathematical relationship for the current and voltage across that barrier. For his work the phenomenon was called the Josephson Effect, and he won the Nobel Prize in physics in 1973 . The electrons are able to make it through a barrier that would classically stop them by a phenomenon called quantum tunneling. Tunneling was first witnessed in 1927 by Friedrich Hund and was mainly used in nuclear physics for decay and half-lives. It was then found through the studying of semiconductors, diodes, and transistors that electrons could tunnel in solids . This led to Josephson’s work with tunneling Cooper pairs. Research on superconductors continues today and now the interest is in high temperature superconductors. The feasibility of using superconductors in certain applications increases with finding compounds that superconduct at higher temperatures. Having all of the advantages of superconductivity without having to use all of the energy to cool a compound and maintain it at that temperature is an alluring idea. This race for finding high temperature superconductors began after an important discovery was made at the IBM Research Laboratory in Switzerland. Alex Muller and Georg Bednorz created a brittle ceramic superconductor that was able work at 30 K, which was the highest known transition temperature at that time. The discovery of a ceramic superconductor that worked at 30 K was important because of how it could not be explained by the BCS Theory. The othertruly amazing part about their discovery is the fact that they created the superconductor out of ceramics which is normally an insulator of electricity. The idea of creating a superconductor out of a material that is classically known as an insulator hadn’t been thought of before by many researchers. Then it was found in 1987 that just by trading one element for another in Muller and Bednorz’s compound the transition temperature rose to 92 K. This marked the first time that a material was created to superconduct at a temperature that was higher than the temperature of liquid nitrogen, which is 77 Kelvin.There have been many different combinations that have been tried to create a superconductor that works at higher and higher temperatures, and as of right now the highest transition temperature known is in the range of 133-138 K. This compound composed of mercury, thallium, barium, calcium, copper, and oxygen was synthesized in 1993 by researchers at the University of Colorado. The creation of all of these new superconductors and seeing the differences between them led to the need to make two different classes of superconductors. Some superconductors had a sudden drop in resistance while others’ resistance gradually decreased, and some allowed a magnetic field to partially penetrate its body while others didn’t allow it to at all. These differences created Type 1 and Type 2 superconductors. Type 1 superconductors are mainly metals and metalloids and they also go by the name soft superconductors. Some examples include lead, aluminum, uranium, mercury, zinc, tin, and titanium. These types of materials were the first superconductors to be discovered and they are generally conductive at room temperature as well. It is interesting to note though that not all materials that are good at conducting at room temperatures can become superconductive. Copper, silver, and gold are three of the best conductors yet they aren’t able to become superconductors.The reason for this is that their lattice structures are too tightly packed together so Cooper pairs can’t form. Their lattice type is called face-center cubic lattice (FCC), and their tight lattice structure constrains the lattice vibrations so the essential Cooper pairs aren’t able to form. Having a FCC lattice doesn’t stop all elements from being superconductors though. Some can still form but it’s because of other factors like the elements elastic modulus. The Type 1 metals and metalloids require the coldest temperatures to become superconductors. The BCS theory works for Type 1superconductors but it has trouble with most of the Type 2 superconductors. This is because the BCS theory says that the Cooper pairs form due to lattice vibrations, and this is not the case with high temperature superconductors. The main difference between Type 1 and Type 2 superconductors though is in how they react to magnetic fields. Type 1 superconductors have perfect diamagnetism and will completely repel a magnetic field where Type 2 superconductors allow a magnetic field to partially penetrate its body. Type 2 superconductors are mainly metallic compounds and alloys and are also called hard superconductors.These superconductors are more complex compounds and some examples are (), , and . These types of superconductors can reach transition temperatures that are much higher than Type 1 superconductors. Their transition to zero resistance is not a sudden drop like in soft superconductors, but is instead more gradual. Below is an example of a generic graph of the resistance drop in a Type 1 superconductor (Fig. 3) and it can be compared to the gradual drop in a Type 2 superconductor by looking at the graph for (Fig. 4) just below Fig 1. Another important difference between Type 1 and Type 2 superconductors is the Type 2 superconductors’ ability to reach such high transition temperatures. This phenomenon is still not fully understood. The BCS theory is unable to explain how this happens, and 25 years after the discovery of the first anomaly we still don’t have an answer. There are many fascinating applications for superconductors that we have already found, and it will be interesting to see what will be thought of next in this relatively new and mysterious area of study. One of the most well known applications of superconductivity is its use in high speed trains. Otherwise known as Maglev vehicles, they use magnets to suspend, guide, and propel the vehicle rather than through classical mechanical components. This technology is able to do some amazing things by using superconductivity. The highest recorded speed of a maglev train is 361 miles per hour which was set in 2003 by the CJR’s MLX01 superconducting maglev . The magnetic field in the trains can be created by permanent magnets or by superconducting magnets. A positive feature in the superconducting system is that the liquid nitrogen used to cool their magnets is inexpensive and leads to higher speeds and pay loads. On the other side of that though a strong magnetic field is created so magnetic shielding is necessary, and the repulsive force is not strong enough at low speeds so wheels are necessary for those speeds. Another way that superconductors have improved existing designs is in magnetic resonance imaging (MRI). By using a superconducting magnet rather than a conventional magnet, they are able to reduce the size of the magnet. Superconductors are also helpful in special instruments like a superconducting quantum interference device (SQUID). This tool takes advantage of the Josephson Effect and is able to detect even the weakest magnet field. It can be used for very accurate motion detection systems. Creating generators that use superconducting wires would possibly save energy since the wires wouldn’t have any resistance in them. The advantages of superconductivity are also getting recognized by the military. They can be used to help reduce the length of low frequency antennas that are used in submarines. They can also help submarines in the making of degaussing cables. American Superconductor has announced that they are making a superconducting degaussing cable, which will lead to less weight, size, and energy. Submarines can emit residual magnetic fields and this could lead to the sub being detected, so the degaussing cables eliminate those electric fields. The military is also using superconductors to create E-bombs. These E-bombs create a large electromagnetic pulse which is capable of taking out the enemy’s electronic equipment. While superconductors themselves continue to defy our understanding, they are also helping us to learn more about the universe. They are used in high energy particle colliders, and they wouldn’t be possible without the use of superconducting magnets. The Large Hadron Collider (LHC)in Switzerland has 5000 superconducting magnets to accelerate its particles close to the speed of light. These magnets in the LHC have already helped lead to rumors about evidence for the discovery of the Higgs Boson, and I know scientists will continue to find important applications for superconductors. Quantum Levitation using a Superconductor The abilities and applications of superconductors are seemingly unbelievable, and I believe it is their potential in technology that makes them so appealing. It has been 100 years since it was observed that an element could be super cooled to the point that it would lose all of its resistance to electricity, and we still don’t have a full answer as to how this is possible. John Bardeen, Leon Cooper, and Robert Schrieffer pioneered a way for us to explain this puzzling phenomenon with their BCS Theory, but it is incomplete. We are already seeing the benefits of its discovery and of Bardeen, Cooper, and Schrieffer’s work in this field, and I know we will continue to learn more amazing applications of superconductivity as research continues. I also know that one day we will have a theoretical answer for how this is all possible, but for now it seems that superconductors will continue to resist our understanding. Eck, Joe (July 2, 1999). Superconductors. Retrieved February 28, 2012 from Ginsberg, Donald M. (2012). Encyclopedia Britannica.Superconductivity. Retrieved February 28, Encyclopedia Britannica. BCS Theory. Retrieved February 28, 2012 from (February 27, 2012).Wikipedia.Pauli Exclusion Principle. Retrieved February 28, 2012 from Serway, Moses, & Moyer (2005). Modern Physics. David Harris (January 21, 2012). Wikipedia.Josephson Effect. Retrieved February 28, 2012 from (February 9, 2012). Wikipedia.Quantum Tunneling. Retrieved February 28, 2012 from (February 27, 2012). Wikipedia.Maglev. Retrieved February 28, 2012 from
<urn:uuid:75919e06-8959-433b-b8d4-9c625e2c1416>
CC-MAIN-2022-33
https://discover.hubpages.com/education/BCS-Theory-of-Superconductivity
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.957828
3,444
3.890625
4
Last month I told you about the spectacular Hoopoe, one of the most distinctive birds of our area. This time, we’ll look at what is undoubtedly our most colourful bird, and it’s right here in the Clot right now. This is the explosion in a paintbox that is the Bee-eater. They don’t occur in the Clot every year, but this year there are at least two main groupings – there are four or five birds hanging around in the high trees just to the north of the main pool, and there is a larger group near the centre by the large civil war bunker. My picture shows an adult pair in full breeding plumage – as the summer progresses the feathers fade a bit towards the green end of the spectrum, but they are still a spectacular sight. Actually the easiest way to find them is to listen out for their calls, they are very chatty birds and have a distinctive liquid-sounding “Pruuiitt” call which carries a long way. You are likely to see them high in trees, or as in this case on a telephone wire, where they keep watch for flying insects, sally forth and often return to the same place to eat it. As the name suggests, the major part of their diet is bees and wasps, but of course you wouldn’t want to swallow a whole bee without dealing with the problem of getting rid of the sting! The Bee-eater does this by bashing the bee against a hard surface (a telephone wire or branch will do) and scraping it along until the venom sac is removed. They also feed on other larger insects such as dragonflies, crickets and cockchafers, but they definitely prefer bees when they can get them. Each year, they excavate a hole in a bank to lay their eggs, and will not re-use old sites, so they will search for new territories. This makes sense – you wouldn’t want to revisit a place full of old eggshells and last year’s droppings, would you? A nesting pair will often have “helpers”, these may be unpaired birds or even the offspring from previous years, who will assist with bringing up the current crop of chicks. Once fledged, the birds will gather in even larger flocks before they commence their migration away from our area to Africa, and towards the end of this month and through September, you might encounter large flocks in the countryside of more than 100 birds feeding up before commencing their long journey. The birds occur annually in the UK in very small numbers, and over the past fifty years or so have managed to breed on about five occasions – when they do, this becomes national news and usually the nesting site is well protected by organisations such as the RSPB who allow people to observe them under highly controlled conditions. Fortunately, this is not required in Spain, where they are relatively common throughout the peninsula. You can see more photographs of birds from our area by visiting www.marketheridge.smugmug.com See you next month.
<urn:uuid:d9f59a7d-dc4e-4844-976f-dad968ca8be0>
CC-MAIN-2022-33
https://www.granalacantadvertiser.com/explosion-in-a-paintbox-that-is-the-bee-eater/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00072.warc.gz
en
0.968716
641
2.3125
2
In Turkey, tea is ubiquitous. Tea, or çay in Turkish, is served at breakfast, after each meal, and during breaks throughout the day. Walk down any Istanbul sidewalk, and you’ll see people perched on balconies and apartment stoops, delicately holding steaming-hot, tulip-shaped glasses on red-and-white striped saucers. On my street, the neighborhood çaycı goes door-to-door balancing an enormous tray, delivering fresh drinks to shopkeepers, and picking up empty glasses from earlier. It’s not an exaggeration to say life happens over tea. At a whopping 3.16 kg per year, Turkey ranks number one in per-capita tea consumption worldwide. That’s almost an entire kilogram more than second-place Ireland, which clocks in at 2.19 kg. The tea in question is almost always a concentrated black tea made in a samovar: a large, two-chamber boiler where steam from the bottom chamber heats the tea steeping in the top section. The hot water in the bottom portion is also used to dilute the finished tea, similar to an Americano. These long infusions are strong and bitter and often sweetened by generous amounts of sugar. But one family-owned tea company is trying to change that. A New Chapter For Turkish Tea “We wanted to do things a little differently,” says Yunus Emre Erçin, co-founder and CEO of Lazika, a vertically-integrated tea company based in Rize, Turkey. Erçin and I met at his tea café in Istanbul’s Maslak district. A wall-sized timeline traces the emergence of tea drinking in China in 2700 BCE to the planting of the first tea farms in Turkey in the 1920s. He tells me about his business over a fresh infusion of black tea blended with tarragon and safflower. Like all of Lazika’s teas and tisanes, there are no artificial flavors or additives, just dried plants. “Originally, I was going to make an electric tea brewer,” says Erçin. “Like an espresso machine, I wanted to shorten the brewing process.” Typically, it takes about 20 minutes to make Turkish tea using a samovar. Erçin, an industrial engineer by training, believed he could make it more efficient. “But then I thought, ‘First, I need to learn all about tea,” he says. More than seven years later, Erçin is still exploring the potential of Turkish tea. Erçin had a significant leg up: his family hails from Turkey’s Black Sea region and, like many families in the area, own a tea field. They followed a common regional practice of separating the best leaves for themselves before blending the rest with their neighbors’ crops to deliver to the local tea processing factory. Erçin began to wonder what would happen if they treated all of their tea with the same care. He also studied different ways of processing tea in other countries. His experiments led to Turkey’s first commercially sold oolong tea and a hand-rolled, whole leaf green tea. Better Quality Through Harvesting It was this hand-rolled green tea that first caught my attention. The tea is floral and delicate in the cup, with aromas of orange blossom, flavors of soft peach, and hints of water chestnut. I would associate the flavor profile with high elevation Chinese or Taiwanese green teas, not the finely-chopped oxidized black tea typically used to make Turkish tea. Erçin attributes the depth of flavor to the health of the tea plants and the care his partners take when harvesting and processing the tea. “In the fields, the quality is very good—it’s camellia sinensis,” says Erçin. Originally from China, this variety of tea is often compared to coffea arabica. The unique microclimate of Turkey’s Black Sea region—temperate and humid year round—provides an environment where the plant thrives. Despite these environmental factors, Erçin has seen a steady decline in overall tea quality since the collapse of the state tea monopoly in the 1980s. “Tea quality continues to get worse. This is not because of the leaves, but from harvesting practices, transportation to the factories, and processing,” he says. Erçin explains that large tea companies like Lipton and state-owned Çaykur offer no incentives for tea quality, just a flat rate per kilogram. As a result, most tea farmers in Turkey harvest their tea with scissors, which is more efficient but also damages the plant and harvests inferior leaves and parts of the stem. “If you pick by hand, you only collect the first few leaves on a branch, but if you use scissors, you can get up to 50 cm of the branch,” he says. But a growing number of producers within Erçin’s social network are implementing selective picking practices thanks to training seminars and the cash incentives Lazika offers for hand-picked tea. According to Erçin, Lazika relies on an informal abla network (Turkish for “older sister”) to spread the word about higher prices for hand-picked tea within the community. Although Erçin admits it can be challenging to convince his fellow tea farmers to implement best practices, he only sees the potential. “We had the idea,” he says. “Could this region be known for tea like Champagne is known for wine?”
<urn:uuid:fa768b8a-88fd-4e47-abe1-25f2ab71822c>
CC-MAIN-2022-33
https://www.freshcup.com/lazika-shows-the-untapped-potential-of-turkish-tea/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.952182
1,190
2.296875
2
- Cartels — Market definition — Market power — European Union The chapter discusses the attribution of liability in cartel cases from three angles: direct attribution of liability, parental liability, and successor liability. The first angle concerns questions such as the conditions under which the conduct of employees or consultants that are directly involved in a cartel can be imputed to a particular legal entity. The second angle deals with the extent to which legal entities that are not directly involved can assume liability for the cartel conduct of a related legal entity. The third angle concerns the attribution of liability in cases where corporate restructuring or corporate transactions have taken place between the time of the participation in the cartel and the date of the decision by the Commission. These topics are discussed by Frank Wijckmans (contrast, Brussels) from a private practitioner’s perspective and by André Bouquet (Legal Service, European Commission) from the angle of a public enforcer. Users without a subscription are not able to see the full to access all content.
<urn:uuid:2447e3f9-d509-45c8-9f59-9c73bd1a3227>
CC-MAIN-2022-33
https://oxcat.ouplaw.com/view/10.1093/law/9780199698202.001.0001/law-ocl-9780199698202-chapter-7?prd=OCL
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.915688
222
1.789063
2
Further, haemophagocytic histiocytes were observed with a decrease in erythropoietic and granulopoietic cells, while megakaryocytes were rarely observed (Figure). Bradstock, "G-CSF: from granulopoietic stimulant to bone marrow stem cell mobilizing agent," Cytokine & Growth Factor Reviews, vol. Saeland et al., "Potentiation of early hematopoiesis by tumor necrosis factor-alpha is followed by inhibition of granulopoietic differentiation and proliferation," Blood, vol. Toxic effects of benzene and benzene metabolites on granulopoietic stem cells and bone marrow cellularity in mice. effects of lithium on human bone marrow in vitro. Examination of the bone marrow from alcoholic patients has shown vacuolated granulopoietic progenitors with a significantly reduced number of mature granulocytes (Yeung et al. Visual examination of spleen sections revealed that splenocytes from NOD mice had a tendency to ring-shaped rather than polylobed morphology, indicating presence of granulopoietic stage 1 myeloblasts. Reduction of Hb and TLC might be due to interference in metabolism, suppression of the granulopoietic activity of bone marrow by residual toxicants (Ianchev, 2001; Rana et al., 2008), increased rate of destruction or reduction in rate of formation of erythrocytes and altered cellular composition of blood leading to anemia, anisocytosis, eosinophilia and leucopenia and also due to impaired absorption of folic acid (Hardman and Limbird, 1996) and disruption of liver biosynthesis of heme (Woods and Fowler, 1986). Suppression of granulopoietic progenitor cell proliferation by metabolites of the branched-chain amino acids. organs of Mustelus schmitti (Chondrichthyes, Triakidae): a light and electron microscopic study. Differential responses of early erythropoietic and granulopoietic progenitors to dexamethasone and cortisone.
<urn:uuid:d3b7f21d-1443-4a54-b4ae-7e05b7694fee>
CC-MAIN-2022-33
https://medical-dictionary.thefreedictionary.com/granulopoietic
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.865128
495
1.78125
2
Talking about African feminism in 2020 it can encompass a number of things, including political philosophy, women writers and cultural production itself – which means the processes of creating cultural practices, values, and shared understandings. The definition of feminism is, “The advocacy of women’s rights on the ground of the equality of the sexes,” and African feminists today are calling for the same thing as their global counterparts: freedom and liberation. Wikipedia breaks down the definition of African feminism even further, citing different types of feminism from the continent as: - Motherism – the Afro centric alternative to feminism involving the “dynamics of ordering, reordering, creating structures, building and rebuilding in cooperation with mother nature at all levels of human endeavor.” A motherist is someone who is committed to the survival and maintenance of Mother Earth and someone who embraces the human struggle. - Snail-sense Feminism – a theory proposed by Akachi Adimora-Ezeigbo. This feminism encourages Nigerian woman to work slowly like a snail’s movement in her dealings with men in the “tough and very difficult patriarchal society they live in.” and; - African Womanism – is grounded in African culture and Afrocentrism and focuses on the experiences, struggles, needs, and desires of African women. Also, as Africa is not a monolith (one homogenous thing)African feminism is not one thing, as Professor Amina Mama, points out, “The continent has seen many civilizations, and long histories of trade and exchange with the rest of the world, including the recent stories of imperialism and colonialism, feminism takes multiple forms, rooted in struggles that predate and can therefore transcend the structures of modern states, to address the patriarchal legacies of capitalism at multiple locations. “ Something all African feminists do have in common is that they are brave leaders, making real changes in the African continent and throughout its Diaspora. In this, our third article on African Warrior Women, we feature four Warrior Women feminists who inspire us to never settle for being treated as less than equal to a man. “I call myself a feminist because I believe in the power of women and our collective ability to effect change. Growing up with a single mother and several aunties and female cousins, I saw how the women around me managed every aspect of life – career, love, children, and all other societal obligations – with strength, tenacity, versatility, a sense of humour and a forward-looking vision. Juggling motherhood, work and all the different aspects that come with being a woman, I am experiencing first-hand this beautiful story of being a whole woman. As whole women we are free to bring all of who we are – our fears, tears, triumphs, gifts, faith and talent to all that we do, recognising that what we do is just as important as how we do it.” MaameAfonYelbert-Obeng Maame was born and raised in Ghana, surrounded by a single mother, several aunts and female cousins. From the early childhood she saw how strong and brave women had to be. This made her feel greatly proud of her gender identity. For the past 12 years, Maame has been working on changes to improve lives of women and girls across Sub-Saharan Africa (SSA).Maame considers herself as a Whole Woman with a great variety of important roles: she is a mother, mentor, activist, musician, wife, sister and a woman of faith.One of her aims is to share the beautiful story of this self-identification, with other females. “Women MUST be protected in their everyday lives from any form of violence, regardless of their age, class and social status.” 50/50 Group, Sierra Leone “It is our right to be free, to move around freely, to feel safe wherever we are and to be protected by the state.” 50/50 Group, Sierra Leone Aisha Fofana Ibrahim is a feminist scholar, researcher, activist and founder of the 50/50 Group in Sierra Leone. She is currently the Director of the INGRADOC at Fourah Bay College, University of Sierra Leone. Her work covers a wide range of issues including women’s experience of war, their role in post-conflict reconstruction and the lack of opportunities for political participation. Aisha tries to change the way people think about women’s leadership. Aisha spends her time focusing on overcoming barriers that limit females’ entry into politics. “I am a feminist because I know no other way to be. I am a feminist because I care. I am a feminist because I just am. I am committed to fighting against every form of injustice, but particularly the kind that creates inequality between men and women.” ZawadiNy’ongo Zawadi’s role in the African feminist movement is one of great value. For over 15 years she has been an advocate for women’s rights and for about nine years – a leader in the field of sexual and reproductive rights.Zawadi’s family is quite famous: her father Anyang’ Nyongo’ is a politician and her sister Lupita is a Hollywood actress. Zawadi’s most successful project is the is the #1MilliForJadudi campaign which raised over $71,000 in a couple of days, to help a 24 -years-old brain cancer patient Emmanuel Otieno to get surgery in India. “I am a feminist because I care”, she says. She really cares not only about women but those who really need support. “Whether you call yourself an entrepreneur, activist, or changemaker, I am here to serve you and help you achieve greater fulfilment, freedom and success.” Shamillah Wilson “Perhaps the greatest service we can do for ourselves during these times, is to surrender to uncertainty. It requires us to embrace not knowing, and rest assured that even with not knowing we can do our best with whatever we are faced with.”Shamillah Wilson Shamillah is a Life Coach and Founder of Project Ignition established to provide young people with a variety of opportunities to reach their greatest potential and grow into activists. Her participation in the feminist movement is followed by the same aim – she wants to let more women take part in different spheres of life, especially, in entrepreneurship. Working as a consultant on females’ rights, HIV/AIDS and sexual rights helps her to achieve this goal. Shamillah believes that feminism is not about the separation of personal and professional, but it is about the way you live your life. Matoyana Media is a champion and supporter of female entrepreneurs, in 2018 we created a “Fearless Women” video and podcast series, interviewing 23 entrepreneurial-minded women, asking them to share their stories about how they work at being fearless in their businesses and lives. Last year we tapped into our inner-warrior and produced a modern-day Warrior Women series, representing African women from around the continent, of all ages, races and career types. How activism has shown up in your life, particularly during the CODID-19 pandemic. Under the banners of equity, inclusion, liberation, justice, solidarity, resiliency and interdependency these are the type of activists we’re seeing more of – which one (or more) are you?
<urn:uuid:b68974f8-f00b-4ef9-87a2-9b267bd1327d>
CC-MAIN-2022-33
https://matoyana.co.za/african-warrior-women-feminist-activists/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.960425
1,553
2.953125
3
MOTHER NATURE'S SOUR CANDY Navitas Organics Goldenberries are organic & gently dried to preserve their abundant nutrients. - 100% organic dried goldenberries - Good source of fiber, iron, potassium & vitamin A - Unsulphured & free of additives - Nutritious, lower sugar swap for traditional dried fruit - See FAQs |Includes Added Sugar||0g||0%| Certified organic goldenberries (Physalis peruviana). How to Use With a unique sweet-tart taste & delightfully chewy texture, Navitas Organics Goldenberries are a delicious healthy snack & an easy addition to sweet & savory dishes alike. TRY IT IN Snacking & Trail Mix TRY IT IN Baking & Raw Treats TRY IT IN Yogurt & Oatmeal Our Sourcing Sets us Apart Resembling a tiny, golden tomatillo, the goldenberry is native to South and Central America, where it has a long history of culinary use. Our Goldenberries are organically grown in Colombia on smallholder farms committed to traditional agriculture, fair wages and responsible working conditions. – Kathleen M. What is a Goldenberry? A cousin of the tomatillo, the goldenberry resembles a small husk tomato with a papery outer shell that turns light yellow when the fruit is ripe. Inside the husk is a marble-sized golden fruit with tropical berry flavor. The goldenberry originated in South America and is also known as the Aztec berry, poha berry, Cape gooseberry and Peruvian cherry. What do Goldenberries taste like? Goldenberries are a delightful surprise in the world of dried fruits! Tart and sour at first bite, sweet and chewy at the finish, this superfood is the closest thing to a natural sour candy that we've found. The flavor is reminiscent of tropical fruit with a touch of citrus. How are your Goldenberries processed? After ripening on the vine, our goldenberries are gently washed and low temperature dehydrated to preserve as much inherent nutrition as possible. Does your packing facility handle allergens? Do you offer free shipping? Have more questions? Visit our Help Center
<urn:uuid:80796dce-9711-485a-be0c-3eebf746a48d>
CC-MAIN-2022-33
https://navitasorganics.com/products/goldenberries?variant=15475185975367
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.839005
640
1.71875
2
Five class of Racine’s scale for seizure stage. Neurological disorders (NDs) are diseases of the central and peripheral nervous system that affected the hundreds of millions of people worldwide. Temporal lobe epilepsy (TLE) is a common NDs with hallucinations and disturbance of consciousness that cause the abnormal neurological activity in any part of brain. Neuroinflammation (NI) has been identified in epilepsy-related tissue from both experimental and clinical evidence and suspected to participate in the formation of neuronal cell death, reactive gliosis and neuroplastic changes in the hippocampus, may contribute to epileptogenesis. The NI is tightly regulated by microglia, but it is thought that excessive or chronic microglial activation can contribute to neurodegenerative processes. Therefore, the modulation of microglia responses may provide a therapeutic target for the treatment of severe or chronic NI conditions. Although the condition responds well to antiepileptic drugs (AEDs), there are still unresponsive to AEDs in about 1/3 of cases. Neural stem cells are the origin of various types of neural cells during embryonic development. Currently, many results of stem cell therapies in the animal experiments and clinical trials were demonstrated the efficacious therapeutic effects in the attenuated symptoms of ND. Therefore, the combined application therapies of stem cells and drugs may be a promising candidate for the therapeutic strategies of NDs, especially TLE. - combined application therapies - stem cells - neurological disorder attenuation 1. Neurological disorders in people When the disorders occurred in the brain and spinal cord included cranial nerves, peripheral nerves, nerve roots, autonomic nervous system, neuromuscular junction, and muscles, etc., these disorders were named neurological disorders (NDs). NDs are complicated and that are caused by a loss of neurons and glial cells in these injured areas in brain or spinal cord. NDs include epilepsy, Alzheimer’s disease, Parkinson’s disease (Figure 1), dementias, cerebrovascular diseases (stroke, migraine, and headache disorders, etc), multiple sclerosis, neuro-infected disorders, brain cancer-caused disorders, head trauma-caused traumatic nervous disorders, and malnutrition-induced NDs. Currently, NDs can affect about hundreds of millions of people worldwide. Among NDs, more than 50 million people have epilepsy worldwide . Approximately 1–3% of the worldwide population suffers from epilepsy. Pharmacotherapy represents the mainstay of treatment for most of the patient population. Moreover, surgery is another option for patients in whom a defined resectable seizure focus can be identified by brain imaging and seizure mapping techniques. For patients whose seizures cannot be controlled by antiepileptic drugs (AEDs) or not viable for surgery, vagal nerve stimulation will be a third possible option . Unfortunately, there are a significant number of patients with epilepsy continue to live with uncontrolled seizures. Therefore, there is a clear need for more efficacious therapies for these epileptic patients with uncontrolled seizures. In order to identify an efficient therapy for preventing epileptogenesis, a validated animal model is required for translating discoveries at the molecular and genetic basis of epilepsy . 3. Neuroinflammation causes of epilepsy Neuroinflammation is an underlying component of a diverse range of neurodegenerative diseases and their associated neuropathology, and increasing evidence suggests that microglia are a key causative factor in this process. Microglia comprised approximately 12% of cells in the brain . They predominate in the gray matter especially in the hippocampus, olfactory telencephalon, basal ganglia, and substantia nigra. Commonly, microglia are readily activated in response to brain injury or immunological stimuli. Over-activated microglia can induce highly detrimental neurocytotoxic factors such as superoxide, nitric oxide (NO), and proinflammatory cytokines (IL-1β, IL-6, and TNF-α, etc.). In status epilepticus (SE), activated microglia have been shown to be present microgliosis [2, 3]. At present, many evidences have demonstrated rapid astrocyte and microglial activation following pilocarpine-induced seizures or SE. However, whether pilocarpine directly activate microglia is poorly understood. 4. Treatments of epilepsy SE is a major neurologic emergency which is characterized by continuous seizures lasting greater than 5 minutes, and SE generation may increase the mortality and morbidity in patients [4, 5, 6]. The mechanism of SE generation is believed to correlate with the increase of excitatory activity and/or the decrease of inhibitory activity in the brain [7, 8]. Treatments can help epileptic patients to decrease seizures or stop seizures. These therapeutic treatments include medicines (anti-epileptic drugs, AEDs), surgery, special diet (ketogenic diet), and electrical device therapy, etc. Traditionally, the strategies of SE treatment included the augmented inhibitory neurotransmission and/or reduced excitatory neurotransmission by pharmaceutical administration, but the clinically AEDs still fail to control the seizures in approximately 20–40% of SE patients [9, 10, 11, 12, 13]. Moreover, the underlying mechanisms of AEDs-resistant SE are still unclear, and it is important to figure out the response of pharmaco-resistance in intact brain for the development of promising treatment. 5. Characteristics, types, and therapy of stem cells The treatment of epilepsy is not cured for a long time, and frequent seizures have brought endless troubles to the majority of patients. Nowadays, the treatment of epilepsy is no longer a medical problem, and can finally be completely ended. Only because of the advent of stem cell transplantation therapy, an indelible milestone has been set for the treatment of epilepsy. Stem cell transplantation technology has brought good news to patients with epilepsy, and has achieved a major new medical breakthrough in the treatment of epilepsy. Stem cell treatment of epilepsy is to inject healthy and young stem cells (SCs) into the patient’s body through intravenous injection to replace their diseased or aging tissues and organs for the purpose of treating epilepsy. Whether stem cell therapy effective for these epileptic patients who are not well treated by surgery? What is the principle? Stem cell transplantation increases the number of neurons In fact, it mainly uses the differentiation function of neural stem cells. Neural stem cells (NSCs) can divide and differentiate into corresponding cell types in the brain according to the induction of their surrounding microenvironment. Their morphology and function are very similar to those of nearby host cells, and they have a certain degree of safety. However, for drug-resistant intractable epilepsy, especially the effect of temporal lobe epilepsy (TLE) is better. TLE is caused by the degeneration, necrosis, and decrease in the number of hippocampal neurons, which leads to a decrease in the inhibitory neurotransmitter γ-aminobutyric acid. However, stem cell transplantation can repair and increase the number of γ-aminobutyric acid neurons. Therefore, restoring the balance of inhibitory neurotransmitters and excitatory neurotransmitters may fundamentally cure TLE. The principle of cell therapy is easily described as your own cells as “autologous cells” or other people’s cells as “allogeneic cells”. After SCs can build every tissue in the human body, there they have great potential for therapeutic applications in tissue regeneration and repair. SCs can differentiate into specific cell types. SCs’ characteristics are the perpetual self-renewal and the differentiation ability to become a specialized adult cell type. Currently, two major classes of SCs are pluripotent SCs (PSCs) and multipotent SCs (MSCs) . PSCs can differentiate into any cell in the adult body and it also was named “embryonic stem cells”. Recently, “induced PSCs” (iPSCs), with some of the same PSCs’ characteristics as proliferation, morphology and gene expression were yielded adult cells back into the pluripotent state via applying the molecular manipulation (added Klf4, c-Myc4, Lin28, and Nanog). Unfortunately, these iPSCs via genetic engineering are not likely approved for human disease therapy. Consequently, the results of a purely chemical approach to deliver safer transcription genes into the cells look promising . MSCs are only restricted to differentiate a limited cell population. MSCs were found in bone marrow and have been used therapeutically since the 1960s. Recently, the new sources for MSCs such as the placenta, heart, umbilical cord blood, and brain were found. In the brain, neuro-progenitor cells have differentiated abilities to become neural cells. MSCs may have a potential for clinical application. MSCs have the plasticity to become all the progenitor cells or become only one or two specialized cell types of a particular tissue . Based on our SCs can develop into cells of different specialized cell types in the body and grow into new body tissues. For example as transformation into different body cell types, including muscle cells, nerve cells, and blood cells. SCs have the potential to treat many diseases, including stroke, heart attack, spinal cord injury, and macular degeneration, etc. Whether SCs be used to treat epilepsy? Since most cases of epilepsy can be attributed to differences in receptor expression in the brain (due to mutations), theoretically correcting these may reduce the likelihood of electrical seizures in the brain. In addition, during status epilepticus, excitatory overload sometimes kills neurons, especially neurons in the hippocampus. Over time, this actually worsens the condition and leads to the development of temporal lobe epilepsy (TLE). Although AEDs can treat seizures, the damage to the temporal lobe is usually irreversible and permanent, and current treatments do not solve this problem [15, 16, 17]. The scientific research of SCs in the treatment of epilepsy were showed as (1) PSCs transplantation to treat TLE: Human induced pluripotent stem cells (hiPSCs) are induced to develop into any type of cells in the body, including GABAergic interneurons. According to literatures, GABAergic interneuron progenitor cells derived from hiPSC were transplanted into the hippocampus of a TLE model to observe its efficacy. The results were presented that medial ganglion cells (MGE) derived from hiPSCs after the cell transplantation into the hippocampus. Later, researchers successfully reduced the frequency of seizures and reduced the loss of GABAergic neurons. (2) SCs were obtained from the patient’s own bone marrow to treat TLE: the use of autologous mesenchymal stem cells in patients with epilepsy can reduce overall seizure frequency. SCs are obtained from the patient’s own bone marrow and intravenously administered into the spinal cord. One year later, 30% epilepsy patients had a complete remission (without seizures), and 50% epilepsy patients who had not previously responded to the medication began to respond well [18, 19, 20]. 6. Anti-epileptic candidate drugs During neuro-inflammation, the pro-inflammatory cytokines as interleukin-1β (IL-1β), interleukin-6 (IL-6), and tumor necrosis factor-alpha (TNF-α) produced by activated microglia or astrocytes provoke pathological signaling cascades through the activation of phospholipase C and phospholipase A2. Later, the release of non-esterified arachidonic acid (AA) from phospholipids and the formation of lysophospholipids and bioactive eicosanoids by oxidized enzymes. Three enzyme systems, cyclooxygenases, lipoxygenases, and cytochrome P450 (CYP) epoxygenases metabolize released AA to lipid metabolites as prostaglandins, leukotrienes, and epoxyeicosatrienoic acids (EETs), respectively. Brain parenchymal tissue metabolizes AA to EETs via the CYP epoxygenase, which regulate cerebral blood flow and perform anti-inflammatory and anti-apoptotic effects. Previous results were showed that hypoxia and ischemic preconditioning experiments have shown that the increased expression of CYP epoxygenase and EETs in brain may confer protection from ischemic stroke induction. EETs signaling may play a role in suppressing the ischemia-evoked inflammatory cytokine responses in the brain circulation. Soluble epoxide hydrolase (sEH) is a key enzyme for metabolic conversion of EETs into their less active form, dihydroxyeicosatrienoic acids. The inhibition of sEH has been used to increase systemic EETs level and bioactivity. By using pharmacologic inhibitor or genetic deletion, the inhibition of sEH attenuated the vascular and neural injury induced by cerebral ischemia, suggesting sEH might be a novel target in treatment of stroke. In response to these findings, we hypothesized that sEH is involved in neuroinflammation-related epileptogenesis . The sEH enzyme has thus been identified as a therapeutic target for inflammation, and therefore might serve to treat inflammatory pain . Previous studies shown that during peripheral inflammatory, pain GABA A receptor mediated synaptic inhibition was enhanced in neurons . Inhibition of sEH may have elevated the GABA agonists levels and enhance spinal GABAergic transmission . In this context, the basis of kindling-induced epileptogenesis has been hypothesized that enhanced and/or attenuated activation in pathways utilizing glutamate and GABA as the neurotransmitter, respectively . The sEH enzyme may influence the balance between neuronal excitation and inhibition, where glutamate and GABA, respectively, play important roles, and alter the seizure-induction threshold. sEH is a member of the α/β-hydrolase fold family of enzymes which has two domains: a C-terminal epoxide hydrolase domain (EH), which is responsible for the biological roles associated with sEH and an N-terminal lipid phosphatase domain (PT) connected by a proline rich linker . The role of sEH in lipid metabolism and lipid related disorders have been emerged in the recent years. sEH and dyslipidemia and related disorders such as atherosclerosis and coronary heart disease were related . The products of the sEH hydrolase domain including fatty acid epoxide substrates and diol were found to activate PPARs, which can modulate plasma lipid by regulating lipid metabolism . Moreover, the hydrolase domain of sEH are shown the effect on lowering cholesterol level by reducing the HMG-CoA reductase expression. However, the phosphatase domain of sEH was shown to regulate the cholesterol biosynthesis pathway by hydrolyzing the isoprenoid intermediates which are involved in cholesterol metabolism . Summarily, the hydrolase and phosphatase domains of sEH exhibit opposite effects on expression of cholesterol levels. According the context about the opposite effects of sEH C- and N-terminal domain on regulating the cholesterol expression, we hypothesize that the sEH C-terminal domain may play a seizure-induction role and the N-terminal of sEH may be a seizure-protection role. In the previous studies, the pharmacokinetic parameters of sEH C-terminal inhibitor, AUDA [12-(3-adamantan-1-yl-ureido)-dodecanoic acid] in brain tissue samples were the mean residence time of 6 h and half-time elimination of 4 h . 7. Pilocarpine-induced SE models in vivoand in vitro A pilocarpine-induced SE model is wildly used to investigate the alteration of neuronal circuits which reproduced most of the epileptic characteristics in patients. In the pilocarpine-induced SE model, acute SE is successfully induced in only a subset of rats after the high-dose pilocarpine injection . According to our previous epileptic mouse model, mice were firstly pretreated with scopolamine methyl nitrate (1 mg/kg BW, Sigma-Aldrich) by intraperitoneal injection for 30 min before the induction of SE. Later, 325 mg/kg body weight (BW) pilocarpine hydrochloride was administrated via intraperitoneal injection. Mouse behaviors were monitored and scored according to Racine’s scale (Table 1) [24, 25, 26]. Two hours after SE onset, mice were treated intraperitoneally with 10 mg/kg BW diazepam to terminate seizures (Figure 3). |Class (seizure stage)||Racine’s scale behavioral expression| |1||Mouth and focal movement| |3||Contralateral forelimb clonus| |4||Symmetrical forelimb clonus with rearing| |5||Rearing and falling| 8. AUDA is safe in in vivostudy and significantly inhibited pilocarpine-induced BV-2 microglial viability and migration in vitro In the acute toxic assay 9. Amendments to the administrative measures for the implementation or use of specific medical technology inspection and testing medical instruments in Taiwan Cell replacement therapy and gene transfer to the diseased or injured brain have provided the basis for the development of potentially powerful new therapeutic strategies for a broad spectrum of human neurological diseases. However, the paucity of suitable cell types for cell replacement therapy in patients suffering from neurological disorders has hampered the development of this promising therapeutic approach. The full name of the “Special Control Law” issued by the Ministry of Health Services is “Administrative Measures for the Implementation or Use of Medical Instruments for Special Medical Technical Inspections”, which was officially announced on September 6, 2018. The six major projects may seem complicated, but in terms of teleology, they can be divided into two categories: “disease therapy” and “tissue repair”. The two peripheral blood stem cells and immune cells are mostly used to treat cancer. The other four cell types belong to regenerative medicine, with the goal of helping tissue regeneration or repair (Figure 6). Currently, cell sources, characteristics, differentiation and therapeutic strategies and applications are frequently discussed worldwide. SCs have great potential in the regeneration and repair of tissue in people. However, limited information were presented at present. Therefore, the deeper studies will be still needs to be learned about their biology, manipulation and safety before their full therapeutic potential can be achieved. SCs-based therapies have shown encouraging results in treating diseases including epilepsy. Experimental animal and clinical studies have shown that SCs have significant regenerative properties on epileptic animal and patients with epilepsy. However, before SCs therapy becomes routine, larger clinical trials are needed [29, 30, 31]. In addition, our previous studies suggested that sEH played a critical role in regulating epileptogenesis in the pilocarpine-induced SE mice and Authors thank the Ministry of Science and Technology and the Council of Agriculture, Taiwan for support. Conflict of interest The authors declare no conflict of interest. Vissers C, Ming GL, Song H. Nanoparticle technology and stem cell therapy team up against neurodegenerative disorders. Advanced Drug Delivery Reviews. 2019; 148:239-251 Hung YW, Lai MT, Tseng YJ, Chou CC, Lin YY. Monocyte chemoattractant protein-1 affects migration of hippocampal neural progenitors following status epilepticus in rats. Journal of Neuroinflammation. 2013; 10:11 Hung YW, Yang DI, Huang PY, Lee TS, Kuo TBJ, Yiu CH, et al. The duration of sustained convulsive seizures determines the pattern of hippocampal neurogenesis and the development of spontaneous epilepsy in rats. Epilepsy Research. 2012; 98:206-215 DeLorenzo RJ, Hauser WA, Towne AR, Boggs JG, Pellock JM, Penberthy L, et al. A prospective, population-based epidemiologic study of status epilepticus in Richmond, Virginia. Neurology. 1996; 46:1029-1035 Hanna J, Nichol A. Status epilepticus: an intensive care medicine problem. Anaesthesia & Intensive Care Medicine. 2012; 13:148-151 Loscher W. Molecular mechanisms of drug resistance in status epilepticus. Epilepsia 50 Suppl. 2009; 12:19-21 Bradford HF. Glutamate, GABA and epilepsy. Progress in Neurobiology. 1995; 47:477-511 Fritschy JM. Epilepsy, E/I balance and GABA(a) receptor plasticity. Frontiers Research Foundation. 2008; 1:5 Alldredge BK, Gelb AM, Isaacs SM, Corry MD, Allen F, Ulrich S, et al. Lowenstein DH. A comparison of lorazepam, diazepam, and placebo for the treatment of out-of-hospital status epilepticus. New England Journal of Medicine. 2001; 345:631-637 Alvarez V, Januel JM, Burnand B, Rossetti AO. Second-line status epilepticus treatment: Comparison of phenytoin, valproate, and levetiracetam. Epilepsia. 2011; 52:1292-1296 Claassen J, Hirsch LJ, Emerson RG, Mayer SA. Treatment of refractory status epilepticus with pentobarbital, propofol, or midazolam: A systematic review. Epilepsia. 2002; 43:146-153 French JA. Response to early AED therapy and its prognostic implications. Epilepsy Currents. 2002; 2:69-71 Wahab A, Albus K, Gabriel S, Heinemann U. In search of models of pharmacoresistant epilepsy. Epilepsia 51 Suppl. 2010; 3:154-159 Song CG, Zhang YZ, Wu HN, Cao XL, Guo CJ, Li YQ , et al. Stem cells: A promising candidate to treat neurological disorders. Neural Regeneration Research. 2018; 13:1294-1304 Wang D, Wang Y, Tian W, Pan J. Advances of tooth-derived stem cells in neural diseases treatments and nerve tissue regeneration. Cell Proliferation. 2019; 52:e12572 Luo L, He Y, Wang X, Key B, Lee BH, Li H, et al. Potential roles of dental pulp stem cells in neural regeneration and repair. Stem Cells International. 2018; 2018:1731289 Nguyen H, Zarriello S, Coats A, Nelson C, Kingsbury C, Gorsky A, et al. Stem cell therapy for neurological disorders: A focus on aging. Neurobiology of Disease. 2019; 126:85-104 Song CG, Zhang YZ, Wu HN, Cao XL, Guo CJ, Li YQ , et al. Stem cells: A promising candidate to treat neurological disorders. Neural Regeneration Research. 2018; 13:1294-1304 Angeloni C, Gatti M, Prata C, Hrelia S, Maraldi T. Role of mesenchymal stem cells in counteracting oxidative stress-related neurodegeneration. International Journal of Molecular Sciences. 2020; 21:3299 Hernández R, Jiménez-Luna C, Perales-Adán J, Perazzoli G, Melguizo C, Prados J. Differentiation of human mesenchymal stem cells towards neuronal lineage: Clinical trials in nervous system disorders. Biomolecules & Therapeutics. 2020; 28:34-44 Scharfman HE, Smith KL, Goodman JH, Sollas AL. Survival of dentate hilar mossy cells after pilocarpine-induced seizures and their synchronized burst discharges with area CA3 pyramidal cells. Neuroscience. 2001; 104:741-759 Isokawa M. Decrement of GABAA receptor-mediated inhibitory postsynaptic currents in dentate granule cells in epileptic hippocampus. Journal of Neurophysiology. 1996; 75:1901-1908 Wiebe SP, Staubli UV. Recognition memory correlates of hippocampal theta cells. Journal of Neuroscience. 2001; 21:3955-3967 Williams PA, Wuarin JP, Dou P, Ferraro DJ, Dudek FE. Reassessment of the effects of cycloheximide on mossy fiber sprouting and epileptogenesis in the pilocarpine model of temporal lobe epilepsy. Journal of Neurophysiology. 2002; 88:2075-2087 Hung YW, Hung SW, Wu YC, Wong LK, Lai MT, Shih YH, et al. Soluble epoxide hydrolase activity regulates inflammatory responses and seizure generation in two mouse models of temporal lobe epilepsy. Brain Behavior and Immunity. 2015; 43:118-129 Racine RJ. Modification of seizure activity by electrical stimulation. II. Motor seizure. Electroencephalogr Clin Neurophysiol. 1972; 32:281-294 Marchi N, Oby E, Batra A, Uva L, De Curtis M, Hernandez N, et al. In vivoand in vitroeffects of pilocarpine: Relevance to ictogenesis. Epilepsia. 2007; 48:1934-1946 Wang CH, Hung CP, Chen MT, Shih YH, Lin YY. Hippocampal desynchronization of functional connectivity prior to the onset of status epilepticus in pilocarpine-treated rats. PLoS One 2012; 7: e39763. Shaimardanova AA, Solovyeva VV, Chulpanova DS, James V, Kitaeva KV, Rizvanov AA. Extracellular vesicles in the diagnosis and treatment of central nervous system diseases. Neural Regeneration Research. 2020; 15:586-596 Sadatpoor SO, Salehi Z, Rahban D, Salimi A. Manipulated mesenchymal stem cells applications in neurodegenerative diseases. International Journal of Stem Cells. 2020; 13:24-45 Wei WJ, Shi B, Guan X, Ma JY, Wang YC, Liu J. Mapping theme trends and knowledge structures for human neural stem cells: A quantitative and co-word biclustering analysis for the 2013-2018 period. Neural Regeneration Research. 2019; 14:1823-1832
<urn:uuid:4e4ed436-756a-4a06-81c6-61e894a12fa3>
CC-MAIN-2022-33
https://www.intechopen.com/chapters/73827
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz
en
0.89059
5,805
3.09375
3