text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
Gold and silver nameplats on jewelry board 45,7 x 61 cm Ed. 1/2 of an edition of 2 [Photo: Courtesy Azikiwe Mohammed] The African American artist Azikiwe Mohammed focuses his work on the needs and subjectivity of people of color in the United States, casting light on how likely it is, unfortunately, for them to die at the hands of the police. Unarmed (2016) consists of a jewelry board with gold and silver plates with the names of unarmed Black people who were killed by the police in 2016. The difference between the gold and the silver plaques depends on whether or not they were in police custody at the time of their death. A 2005 graduate of Bard College, where he studied photography and fine arts, Azikiwe Mohammed received the Art Matters Grant in 2015, the Rema Hort Mann Emerging Artist Grant in 2016 and the Rauschenberg Artist Fund Grant in 2021. Mohammed is an alumnus of Pioneer Works in Brooklyn, New York, and Mana Contemporary in Jersey City, New Jersey. Mohammed has held a number of solo shows at locations including the Knockdown Center, Maspeth, New York; SCAD Museum of Art, Savannah; Ace Hotel Chicago, Illinois; Anna Zorina, New York, and Mindy Solomon, Miami. He has participated in group exhibitions at MoMa PS1, Queens, New York; Antenna Gallery, New Orleans, Louisiana; Charlie James Gallery, Los Angeles and the Studio Museum in Harlem, New York.
<urn:uuid:923539bb-5b92-4026-9319-21f3e650b077>
CC-MAIN-2022-33
https://associazionegenesi.it/en/opere/unarmed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.940462
313
1.835938
2
What is Thorrablot? It was a sacrificial midwinter festival offered to the gods in pagan Iceland of the past. It was abolished during the Christianization of Iceland, but resurrected in the 19th century as a midwinter celebration that continues to be celebrated to this day. The timing for the festival coincides with the month of Thorri, according to the old Icelandic calendar, which begins on the first Friday after January 19th (the 13th week of winter). In Toronto we celebrate in Spring for the practical reason of avoiding unpredictable weather and ensuring a fun Feast. Over 20 of these feasts are celebrated in cities all over North America between January and April. Origins of the name “Thorri” is most likely from Thor the God of Thunder in the old Nordic religion. The community gets together to eat, drink and be merry. The menu consists of food cooked and preserved in the traditional ways of smoking, curing with sugar, salt or whey and drying. Toronto’s Thorrablot features Icelandic Lamb imported from Iceland including Smoked Lamb Boneless Leg (Hangikjöt), Rolled Spiced Cured Lamb Shoulder (Rúllupylsa), Lamb Liver Sausage (Lifrarpylsa), Lamb Blood Sausage (Blódmör), Graflax Salt and Sugar Cured Salmon (Lax), Wind Dried Fish (Harðfiskur), (Brúnt Brauð) Icelandic Brown Bread and (Flatbrauð). Traditional Rye Flatbread. This is traditionally washed down with some Brennivin, also known as Black Death, made from potato and caraway or Beer. In Toronto we serve hundreds of Icelandic Pancakes (Ponnukökur) and of course, Vínarterta! Survival in Iceland was harsh and methods for preparing and preserving traditional Icelandic food predated modern day storage and cooking technologies. Food was traditionally stored using more primitive methods. This traditional food consists of pickled, salted, cured, or smoked fish and meat of various kinds. In order to survive the long winter months, all parts of the animal were consumed. Things like fermented shark, singed sheep heads are on the menu of specialty restaurants still today. In many ways food preparation has not changed in over 1000 years. Excellent examples of traditional methods of food preparation are used just as easily by families everyday as they are for annual celebratory Thorrablot feasts in Iceland and in North America. Arden Jackson talks about Thorrablot and Vínarterta on Canada AM Click Here!
<urn:uuid:fdd4f67c-dae3-41c0-8799-82090941a927>
CC-MAIN-2022-33
https://www.vinarterta.ca/what-is-thorrablot-thorrablot/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00072.warc.gz
en
0.953535
534
2.921875
3
- Doctoral Candidate - University of Colorado Boulder This project focuses on a neglected concept in Aristotle’s theory of causation: the notion of accidental causation. Accidental causes have never been given an extended analysis in the way that other parts of Aristotle’s theory of causation have. However, there are compelling features of Aristotle’s theory of causation that have long lain hidden, features that are only brought to light through a consideration of accidental causation. These features provide a lens through which Aristotle’s theory becomes neither as distant nor as easily debunked as contemporary philosophers argue. Moreover, because Aristotle mentions accidental causes in connection with a variety of topics, a better understanding of accidental causes sheds light on many deeply contested aspects of his philosophy.
<urn:uuid:cfab1145-d3df-4dba-bad1-c89e33e621f8>
CC-MAIN-2022-33
https://www.acls.org/fellow-grantees/tyler-huismann/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.938481
160
1.539063
2
St Mary's Stadium is the home of Southampton F.C. , in the city of Southampton . It is a UEFA 4-star rated stadium and with a capacity of 32,689 is the largest football stadium in the south of England, outside of London. Since the 1980s, when Southampton regularly challenged the best sides in the English league (particularly in 1984 when they were league runners-up), there had been talk of the club relocating to a new stadium to replace The Dell due to the old stadium's cramped location which made it unsuitable for major expansion work. When the Taylor Report on 29 January 1990 required all First and Second Division clubs to have all-seater stadiums by August 1994, Southampton's directors initially decided to upgrade The Dell into an all-seater stadium (which was completed in 1993) but speculation about relocation continued, especially as an all-seater Dell had a capacity of just over 15,000; despite this, Southampton continued to defy the odds and survive in the new FA Premier League After a lengthy and ultimately unsuccessful attempt to build a new 25,000 seater stadium and leisure complex at Stoneham , on the outskirts of Southampton , the city council offered the club the chance to build a new ground on the disused gas work site in the heart of the city, about one and half miles from The Dell. The move was cited as the club returning home, because the club was formed by members of the nearby St. Mary's Church , as the football team of St. Mary's Church... Read More
<urn:uuid:3acf4fe0-d2c0-4dcb-bbdd-910d7e430eae>
CC-MAIN-2022-33
http://pages.rediff.com/st-mary-s-stadium/645183
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.972125
329
1.601563
2
Baby Blessing, Naming & Child Welcoming Ceremonies Baby blessings are spiritual in nature. During this ceremony the godparents/guideparents will be announced after which your baby will be blessed with holy water and presented to the Divine with prayers for protection and guidance. Naming ceremonies are more suited to families who are humanist or atheist. During a naming ceremony, your child will be formally introduced to his circle of friends and family. The meaning behind her name will be explained along with the reasons why the name was chosen. Finally we have welcoming ceremonies. A welcoming ceremony is designed to welcome adopted children into the family and to make them feel welcomed by their new extended family and community. Elements of these blessing, naming and welcoming ceremonies can be combined. The fee for these ceremonies starts at $399.00 and includes a personalized birth chart
<urn:uuid:deff56e7-bd9a-4a98-b85e-c0e8cadf291a>
CC-MAIN-2022-33
https://officiantlady.com/baby-blessings
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.961675
173
1.664063
2
Just Launched - Harvard University, Policy Impacts We are pleased to announce the launch of the new website for Policy Impacts, a new not-for-profit organisation based at Harvard University. Policy Impacts helps policymakers, practitioners and philanthropists assess the effect of different government policies. Each policy is analysed using a metric known as the Marginal Value of Public Funds, or the MVPF. This methodology allows decision makers to compare the impacts of different types of policies,identify the highest returns on investment, and produce the most positive social outcomes. The Policy Impacts Library serves as a definitive reference source for researchers to learn about the programmes and policies that the government spends on by taking them on an interactive journey to explore the story behind the research, through detailed policy data analysis and supporting narrative. The website combines data visualisation with interactive scrollytelling to explain the concepts using a dynamic and intuitive interface where the data is presented in a way that encourages exploration and natural interaction. “We are thrilled with the exciting website that Soak has put together. It enables policymakers, researchers, and the public to access cutting edge research on the most effective government policies.” Nathaniel Hendren - Professor of Economics at Harvard University and Co-Director of Policy Impacts Developed using a combination of the latest web technologies including; Tailwind, Next.js, Docker, React with the Strapi headless CMS, the website is now prepared to evolve into a global resource allowing research into international government policies to compare effectiveness across leading countries.
<urn:uuid:b3e4eeb4-019c-44d0-a49b-ef57fbc4c756>
CC-MAIN-2022-33
https://soak.co.uk/news-and-insights/just-launched-policy-impacts/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.88899
316
1.898438
2
Tutor profile: Annie B. Subject: Biomedical Science Which of the following diseases originate in the Peripheral Nervous System (PNS)? A. Encephalitis B. Guillain-Barré syndrome C. Huntington's Disease D. Multiple sclerosis B. Guillain-Barré syndrome. To answer correctly knowledge of the other diseases originating in the central nervous system (CNS) is mandatory. One must also know the difference between the CNS and PNS. Can you define metabolism and two classifications of metabolic processes? Metabolism is the summation of chemical processes in living cells. 1. Catabolism: getting energy from nutrients by breaking down larger molecules 2. Anabolism: combining small molecules to create energy source Subject: Cognitive Science Around what age do children typically begin the early process of developing Theory of Mind? What are two examples of this process occurring? Children begin the groundwork to develop Theory of Mind around 2 and 3 years of age. A few examples of this process occurring as are follows: 1. Directly pay attention to others and mimic behavior 2. Begin to see patterns in behavior with cause and effect (ie. disobey a rule, parent becomes mad). 3. Notice that others have feelings as well and talk about it 4. Notice others have different likes and dislikes. needs and Annie will reply soon.
<urn:uuid:43361009-33c3-48de-89b1-511a5d6b149e>
CC-MAIN-2022-33
https://tutorme.com/tutors/618237/interview/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.907506
296
2.8125
3
The Society for German Genealogy in Eastern Europe (SGGEE) has produced a 2017 desk calendar featuring photos of Germans in Poland. This project was done in collaboration with one of their members in Germany, whose father was an editor and photographer among Germans in Poland and Volhynia early in the 20th century. His surviving photo archive has been donated to the Herder-Institut in Marburg. SGGEE has these calendars available for sale using PayPal in North America and invites anyone with an interest to visit their website for further details. It makes a quality gift for anyone whose German ancestors lived in Poland in the 1930s. Please note that this webpage also contains information in German about where to purchase copies in Europe.
<urn:uuid:c273c26a-fcb9-4de7-8ef7-840758bb5b74>
CC-MAIN-2022-33
https://immigrantgensoc.org/2017-desk-calendar/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.979135
149
1.601563
2
Everything You Need to Know About Chatbots What are Chatbots? Chatbots are programs with which you may communicate through a chat interface. It’s as simple as having a discussion with a chatbot. You may ask it questions or issue orders, and it will react and carry out your requests. Chatbots may be used in a variety of chat programs, including Facebook Messenger, text messaging apps on your phone, and most others. Where are Chatbots used? Chatbots are very common these days; they can be found on almost all the business websites where customers are likely to inquire about anything or may need digital assistance. These are frequently used by web development companies and mobile app development company in Calgary or all across the world. What do Chatbots do? Chatbots are pre-programmed to interact with humans using the internet & A.I. In the form of personal assistant services, Chatbots may also be found on many popular mobile devices nowadays. Siri (Apple iOS), Cortana (Microsoft Windows), and Google Assistant (Android) may all be classified as Chatbots since they can react to inquiries using AI and machine learning. What are their advantages from a business perspective? There are umpteen benefits of having a chatbot as a part of your mobile application. Following are a few of them: - It’s A 24/7 Worker - Is Time & Money Saving - Is in vogue/ trend - Bridges gap between customers and business owners or workers - It provides detailed and expert answers - Very user-friendly - Provides customers with an instant response So, in case you’re also considering leveling up your game in digital business, you gotta have chatbot plugins on your wish list. T&G web solutions are the best Mobile Application Development Company In Calgary.
<urn:uuid:aa3b4015-bc03-45c3-a20b-211154276ff4>
CC-MAIN-2022-33
https://tngwebsolutions.ca/everything-you-need-to-know-about-chatbots-%EF%BF%BC/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.936035
375
2.734375
3
Issued on: Modified: Mataró (Spain) (AFP) – For Neil Harbisson, a self-described “cyborg” artist living near Barcelona, colour is quite literally music to his ears thanks to an antenna he designed to overcome colour blindness. Well-known in Spain and with an international following that enabled him to meet the likes of Leonardo di Caprio and Tom Cruise, Harbisson is now testing out a new device designed to feel physically the passing of time. Where once the term cyborg conjured up images of Arnold Schwarzenegger’s Terminator, technology today is expanding human capacities through prostheses and implants. Born in Northern Ireland with achromatopsia, a rare condition meaning he can only see in greyscale, Harbisson moved to Barcelona as a child and grew up obsessed with colour and things he couldn’t sense. It was an obsession that saw the now 39-year-old Briton eventually go under the surgeon’s knife to transform his identity and his life. While at music college in England, he developed the slim metal rod that arches over his head and vibrates according to colours it detects. At first glance it looks like wearable technology, but it’s as much a part of his body as his nose or his ears, giving him the ability to “hear” the colour his eyes cannot see. “Being a cyborg means technology is part of your identity,” he tells AFP. “It allows me to sense colours from infrared to ultra-violet through vibrations in my head that then become sound, so I can actually hear colour.” In 2004, he managed to persuade a surgeon — who remains anonymous — to drill it into his skull, the technology becoming part of his body as the bone grew around it. The sensor picks up the frequency of colours and translates them into sounds that he perceives through bone conduction. Humans normally hear using air conduction with sound waves passing through the outer and middle ears and causing the inner eardrum to vibrate. But with bone conduction, the vibrations are transmitted through the skull or jawbone directly to the inner ear. The colour-sound association also means he senses colours when listening to music or even speeches, with every syllable having a frequency that relates to colour. “At the beginning, everything was chaotic because the antenna was not telling me: blue, yellow, pink, it was giving me vibrations and I had no idea what colour I had in front of me,” Harbisson said. “But after some time, my brain got used to it and it slowly became part of my perception and became normal,” he added. Although it cannot be switched off, Harbisson’s antenna falls silent in darkness. His “eureka moment” came after dreaming “in colour” and realising the colours “had been created by my brain and not by the chip”. Although he may be the first person to “hear” colour frequencies as notes, bone conduction helped Beethoven as he started going deaf. The German composer realised he could still hear by resting a wooden stick on the piano while biting the other end as he played. Some 200 years later, bone-anchored hearing aids work in the same way via a metal implant inserted into the skull. In the home where Harbisson grew up and where his mother still lives, a riot of coloured canvases line the walls, the staircase lined with curious-looking “facial scores” of celebrities like di Caprio and Cruise. These Hollywood stars let Harbisson detect the “sound” of their skin tone and lip colour, which are rendered in enigmatic charcoal lines. But Harbisson is now turning his attention to a new project. He’s created a device shaped like a chunky metal collar, designed to sense the passing of time, and is kicking off a year-long trial to see how it works. “There’s a point of heat that takes 24 hours to go around my neck and allows you to feel the rotation of the planet,” he told AFP. “Once the brain gets used to it, you can use an app to make subtle changes to the speed of the point of heat which should alter your perception of time,” he added. “You could potentially stretch time or make it feel like time is going faster.” For now, it’s a permanent wearable rather than an implant. A previous incarnation had to be scrapped because he was “getting burnt” at 6:00 pm. “This is an art that does carry some kind of risk but it’s an unknown risk because we don’t have much history of bodies and technology being merged,” he said. © 2021 AFP
<urn:uuid:2839e025-ab79-47d7-89ce-9bc1ec919cd7>
CC-MAIN-2022-33
https://wampumwoman.com/cyborg-artist-who-hears-colour-turns-to-time-travel.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.966322
1,091
2.109375
2
MOSCOW, April 15. /TASS/. Rejection by the UN Security Council of the Russian draft resolution on Syria was predictable, as three permanent members of the UN Security Council (UNSC) - the US, the UK and France - have the veto right and have all means to influence their allies, Head of the Center for Public and Media Relations at the Russian Institute for Strategic Studies Igor Pshenichnikov told TASS. "It was to be expected that no resolutions will be taken and that Americans and their allies will veto all projects," he said. "On the other hand, such sessions are very important, as Russia has a pulpit from which it can speak the truth and others have to listen to it, whether they want it or not," he added. The UN Security Council rejected Russia’s draft resolution denouncing the air strike conducted by the US and its allies over Syria and demanding to stop aggression against this Middle East country. The document failed to win the necessary nine votes. The draft resolution was backed by three countries: Russia, Bolivia and China. Eight countries, including the US, the UK and France, which had carried out a strike against Syria, voted against, and four more countries, including Kazakhstan, abstained. According to Pshenichnikov, the US is "covering up its lies" with these strikes and openly demonstrating that it doesn’t need any investigation. "They know themselves that there were no chemical attacks (in the city of Douma on April 7 - TASS). If they wanted a real investigation, they would have waited for the OPCW delegation’s arrival and wouldn’t have bombed facilities that they believe could be involved in the production of chemical weapons," he explained. According to the expert, the military strikes carried out by the group of countries led by the US against Syria did not pursue military goals, but were directed to support the country’s image in general and President Donald Trump’s image in particular. "The US sees itself beyond the settlement process. Syria is outside the US’ control. Trump wants to show who the world leader is and stop Russia," Pshenichnikov noted. Syria’s bombing is reflective of the US domestic policy as well, he said. "Trump is trying to assert himself, so he could not but carry out the bombing, otherwise he would have lost face," he noted. "However, Americans intentionally and accurately avoided areas controlled by Russia, and it speaks volume, because if they pursued military goals, they would have bombed wherever they wanted, whereas this was more of a publicity move.".
<urn:uuid:fb022b56-2eb0-4741-b101-6d326d155546>
CC-MAIN-2022-33
https://tass.com/politics/999868
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.984279
538
1.796875
2
|Ron Benner (l), Marilyn, Matt McCarthy(r), Sea Ranch, California 2018| My involvement in the marine science community in the 1980s encouraged me to jump into studying the fate of organic matter in the natural world —the slow breakdown of living biomass as it transforms into “goo” that ultimately may form petroleum. John Hedges of the University of Washington and Ron Benner, then a postdoc at the University of Georgia, led this research area. John Hedges, a former Geophysical Lab postdoc and Univ. of Texas Marine Science graduate, was a formidable geochemist known the world over for his careful work. At the Geophysical Lab, his reputation was colored by the stories Tom Hoering told about him. John didn’t learn much chemistry in the Port Aransas Marine Lab apparently, before coming to the Carnegie after earning his Ph.D. In the 1970s, gas chromatograph instruments cooled their furnace boxes by automatically lifting up the top of the instrument and allowing hot air to escape. Hedges rested a full cup of coffee on the top of the instrument one morning, then left the lab to talk to a colleague in his office. As luck would have it, his analytical run ended; the top of the gas chromatograph rose up; and there went his entire cup of coffee drenching the inner workings of the instrument. A rookie mistake, and one that he never outlived. |Ron Benner, 1988| I connected with Ron Benner first by telephone regarding a potential collaboration with a graduate student from Univ. of Georgia. At the end of one conversation, he remarked, “I expect to publish the data from this work,” in a tone that implied that I might be a dilettante and not be serious! I glared at the phone and icily replied that of course, I expected to publish. When we finally met in person in 1986, Ron turned out to be a friendly, generous fellow. A tall, imposing, and ruggedly handsome man (looking remotely like the actor Omar Sharif), Ron has a way of pausing for a few seconds before answering a question. His answers come in full documents with paragraph structure and complete sentences. He’s known widely for being a tough scientist as well as a fun-loving person you’d like to have on an oceanographic expedition. We remain good friends and colleagues to this day. At that time (1985), one of the most contentious theories involved the role of Spartina alterniflora, a C4 grass that dominates salt marshes in North America, for sustaining the growth of important animal species living in highly productive marsh ecosystems. Salt marshes ring the edges of bays and estuaries from Massachusetts to northern Florida. Spartina is the dominant plant that you see when you drive from the mainland in places like New Jersey or North Carolina to the outer beach islands where most tourists are headed. To me, salt marshes are some of the most beautiful places in North America for their brilliant greenness next to sparkling salty waters. Mussels, clams, crabs, and fish abound there. It would make sense to anyone looking at the ecosystem that the Spartina plants should be important contributors to their well-being and be a part of their diet. Carbon isotopes of organic matter in the water, Spartina, sediments, phytoplankton, and invertebrates (e.g. mussels and crabs) were measured from Woods Hole, Massachusetts, all the way down to Georgia. Every study of the isotope patterns found that the carbon isotopes in the sediments and animals in the bays had carbon isotope values closer those of phytoplankton rather than those patterns measured in Spartina. Many concluded that Spartina was just a pretty plant and not important. The interpretation of the carbon isotope data had important implications because salt marshes were threatened habitats. The idea that salt marshes were not important contributors to food web dynamics did not make sense to me. If estuarine scientists could prove that these wetlands were nurseries and energy sources for commercial seafood, they were more likely to be protected from development. |Stable isotopes solve mystery of salt marshes, 1987| Ron Benner was conducting litterbag experiments with Spartina. Dried plants are weighed, sewn into nylon or polypropylene bags with defined mesh sizes, and then incubated in the environment either under aerobic (with oxygen) or anaerobic (without oxygen) conditions. Bags are periodically (e.g. weekly or monthly) removed from the environment, and the remaining plants in the litterbag are dried and subjected to various types of analyses. Kent encouraged Ron to write to me about analyzing the Spartina in the litterbags for carbon and nitrogen isotopic compositions. Using the bulk Spartina material, Benner used chemical methods to separate the major plant structural biochemicals: lignin, cellulose, and hemicellulose. In 1985, Ron wrote to me: “I welcome your suggestions and I believe that the carbon isotope measurements on the chemically fractionated material is a good one. Am I correct to assume that the carbon isotope ratios among these particular fractions (cellulose, hemicellulose, lignin) will probably be indistinguishable?” Samples from an 18-month experiment were brought up to the lab by Kent Sprague and analyzed using laborious, sealed-tube combustion methods. The results were striking (Benner et al., 1987). Although bulk carbon isotope pattern in Spartina had one value, the biochemical fractions were very different—not at all what Benner had predicted. Cellulose and hemicellulose had carbon isotope patterns with slightly more 13C in them, while the lignin (the material that makes wood hard) isotope composition had considerably less 13C. Uncharacterized material, suberins and other insoluble material, had carbon isotope compositions close to those in lignin. As the relative proportion of lignin relative to other compounds increased in the litterbags from 10 to 15%, the carbon isotopes of the remaining Spartina showed small, but significant changes in the direction of what we had measured in sediments and old plant fragments. The change in carbon isotope signature demonstrated that as the plant decayed, labile celluloses were preferentially decomposed leaving more isotopically different lignin. Ron, Kent, and I widened the study to measure biochemical fractions from eight other species of plants (Benner et al., 1987). In all cases, the carbon isotope signatures of lignin showed that same depletion in 13C relative to bulk plant material. Carbon isotopes of the cellulose and hemicellulose fractions from the eight plants had similar patterns to what we measured in Spartina. This paper is my most highly cited publication. It was rejected first from the journal Science because a reviewer was not certain our results could be extrapolated to other plants and ecosystems. The work was then published in Nature and has survived the test of time. It has become a classic. Subsequent studies with compound specific isotope analysis of individual carbohydrates (Teece and Fogel, 2006) showed that the major 6-carbon sugars in celluloses, glucose, galactose, and mannose, have quite variable carbon isotope values. In higher plants, the synthesis of these sugars and their translocation to wood, stems or rhizome is probably associated with additional isotopic fractionation. Small carbohydrates (i.e. sugars) are the most biosynthetically-active and labile molecules in an organism and in the environment. Variation in their carbon isotope signatures compound specific level reflects this dynamic nature. Ron Benner and I after more than 30 years of working together on various projects are both entering the realm of planned retirement, trying to figure out how to slowly unwind and unravel ourselves from a life long career that we’ve loved. His advice to me has been to think about the new life ahead, the new positive challenges, and to embrace the good times we had during our scientific journeys.
<urn:uuid:05f775a3-8a7f-4365-b397-709ce6b526fb>
CC-MAIN-2022-33
https://isotopequeen.blogspot.com/2019/08/salt-marshes-mystery-solved.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.952516
1,678
1.5
2
Ever tell yourself “I should be more productive?” When you think that, you’re probably imagining doing more. Working more hours, getting through more work during those hours, clearing your inbox, cleaning out the garage … just thinking about it is enough to make you feel exhausted already. The truth about productivity, though, is that we don’t necessarily become more productive – producing more worthwhile results in our lives – by constantly doing more and more. Real productivity might actually come from doing less. Less Really Is More I expect you’re familiar with the Pareto principle – that 80% of results are derived from 20% of effort. (For instance 80% of your profit is from 20% of your clients.) While this doesn’t hold true for every single situation, it’s a good principle to keep in mind. There are probably some areas in your life where you’re expending a lot of effort for negligible results. By doing less – cutting back in the areas which don’t really matter – you’ll have more energy, focus and enthusiasm for those things which do make a difference. Try this: Look at your daily to-do list, or write down your commitments – all the things you feel obliged to do. Is there anything which you can cut out? Efficient or Effective? Productivity advice often revolves around making us more efficient. Keep a to-do list. Use a timer to keep you on track. Blitz through your emails. Learn a bunch of keyboard shortcuts. It’s often good advice – but it’s easy to start missing the point. Being efficient isn’t enough – sure, you might be racing through your to-do list faster and faster, but are the items on that list really worth doing in the first place? Being effective, on the other hand, means looking at the impact of our actions. Although effectiveness and efficiency can support one another, there’s sometimes a tension between the two. To be effective, you might have to take a step back from being busy, and look at the real priorities in your life. Try this: Today, rather than thinking about getting through lots of tasks, focus on just one or two really significant ones. Create Your Own Meaning What counts as “productive” work for you? Everyone’s definition is a bit different and it depends on your context. Perhaps your day job feels productive, along with your home improvement projects, but reading novels is just a way to relax. An English Literature student would feel differently! One particular area where people struggle is bringing up small children – it might feel like your “real” work isn’t getting done. I love Charlie Gilkey’s take on this: If you’re ever trying to balance being productive with hanging out with your kids, it’s time to reevaluate how you’ve framed ‘productivity’. Being a good parent is one of the most meaningfully productive things you can do. Utlimately, no-one but you can say what’s productive. And often, a truly relaxing break, or some quiet space to think and plan, is much more productive than simply knocking another chore off your to-do list. Try this: Look at one area of your life which feels like a waste of time. Is it really? Or is it just something which society doesn’t value enough? You can decide that it’s meaningful. How could you do less and start being more productive today?
<urn:uuid:b3865d19-ecd2-4fbb-8516-bb1275277761>
CC-MAIN-2022-33
https://gabrielcatalano.com/2010/12/09/productivity-doesn%E2%80%99t-mean-doing-more/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.948777
753
2.375
2
The idea of exchanging messages has been around since the history of communication. Today that can mean sending a physical letter, email or text message. Email and texting are probably the most common today, but email is where we have some different options for managing our inbox. So let’s take a look at the 3 most common: IMAP, POP, and Webmail. IMAP - What is it? Although it has the word ‘map’ in it, IMAP doesn’t have anything to do with maps or apple. IMAP stands for Internet Message Access Protocol. As the name implies, it provides access to messages over the internet. It is also the most commonly used protocol for email, so let’s look at IMAP first. IMAP allows you to access your emails anywhere at any time and on any device. This accessibility is possible because the messages are not only stored on your local device, but rather on a mail server. When you read a message via IMAP, you’re reading it from the server. Since it is on the server, it allows you, or others, to access the same information in many different ways at the same time. Also, the message data remains in sync because the mail server manages it. An interesting feature of IMAP that can be confusing, however, is the way in which it handles folders. It has a “subscription” feature for folders. Basically, if you don’t “subscribe” to any folders, you will only get new message notifications from the inbox. If you have any message filters routing emails to other folders, it requires you to subscribe to that other folder. Once you have, you receive new message notifications from the inbox as well as any subscribed folders. It may be easy to see why IMAP is most often the go-to choice for many situations. It is especially the case if it’s a business, and more than one person needs access to the same account. It also is helpful for anyone who travels or uses more than one device to access the messages. It also has the advantage of saving space. Messages are only saved to your device if you decide to open them. POP - What is it? No, we don’t mean that drink you find at the store or a restaurant. We’re talking about POP, the Post Office Protocol. To better understand it, let’s take a closer look at its full name. In our traditional mail system, the post office is responsible for taking mail from one person and delivering it to the correct recipient. Sometimes this is received in a mailbox and other times a PO box. Regardless of the method, the post office only retains the message from the time it receives it to the time it is delivered. Upon delivery, the message is no longer the post office’s responsibility, and the only person with that letter is the recipient. POP works similarly. In the case of POP, the post office is the server, and its job is to receive, store, and finally deliver the mail to the recipient. After delivery, the server no longer has a copy of it, and it is up to the recipient to save the message if they need it. One important detail to note about POP is the fact it will only interact with your inbox. This means it does not interact with other commonly seen folders such as drafts, trash, sent and junk. When you make a request for your messages, you will only download the messages found in your inbox. It may seem odd to choose this option since we save the messages on a single device - but that doesn’t make it a poor choice. Having email accessible in only one place can make the information in your messages more secure since only the people with access to that device can quickly gain access to it. It also can save space, due to the fact you aren’t downloading messages to several different devices. Am I solely the one responsible for storing messages? The answer is it depends. Many email services recognize this as a possible deterrent from using POP, even when POP may be the best solution for your needs. Because of this, many platforms supporting it may give you an option to save a copy of the message on their servers or, even better, you can subscribe to an archiving service. The beautiful thing about an archiving service is you can delete your emails freely. It, therefore, saves space on your machine, and be confident that you can find them later. The duration it’s saved is customizable, so even those who need to keep messages for legal reasons can be covered with POP. Webmail should bring to mind BlueTie, Gmail, or Yahoo. While it is probably most similar to IMAP, in that it is accessible anywhere you have internet; it can differ from provider to provider. The one consistent feature of webmail is that the provider will offer you a browser-based (Chrome, Firefox, IE) user interface (UI) to navigate your email. Providing a UI means having a visual representation to see your inbox, other folders, and messages. It is also common to offer additional apps such as contacts, calendar, and task manager. One way in which it differs from IMAP is that a provider may decide to restrict the number of devices logged in at once. This restriction means it may ask you to log out another device, or automatically log you out of another device should you try to log in to a new device. You’ve probably noticed a similar feature in services like Netflix or Hulu, where only so many can “watch” at a single time. Webmail is suitable for most general users and personal email accounts. They give you access wherever you have access to the internet and even provide other applications to help keep you organized. Email providers often will offer POP, IMAP, or Webmail option. Which one you should choose depends on you or your company's needs. See the table below for a simple comparison of the three types. |Accessible via Multiple Devices||Yes||1 Device||Yes, but some providers may restrict the number of devices you can be logged into at once.| |Messages Stored on Mail Server|| |Local Device Only||Yes| |Primary Features||Email is only downloaded if you’ve opened it. Email messages are accessible from multiple devices by multiple people||Email is downloaded to a local machine and only accessible from that machine.||Messages only exist on the mail server. Offers a user interface to navigate email and typically offers other apps such as contacts, calendar, and task managers.| |Accessible via Mobile||Yes||Depends. Due to the nature of the protocol, not recommended.||Yes - most providers also offer an app for your phone.| |Security||Messages are stored on a mail server. If someone can gain access to the mail server, or messages are not encrypted, the information could be exposed.||Messages are downloaded on your local machine. Without proper antivirus installed, you could be at risk.||Messages are stored on a mail server. If someone can gain access to the mail server, or messages are not encrypted, the information could be exposed. Being a browser-based email service, it’s important to remember to log out of any computer others have access to. (i.e. a library or family computer) |Suggestions||We suggest adding a backup service or archiving service to prevent loss of data should anything happen to the machine messages are saved on. We also recommend installing an anti-virus. |Make sure to log out of all devices when you’re done with them. This helps prevent someone from gaining access to your account in public places or having too many open sessions.| |Recommended For||If you need to access an email account in multiple locations or more than one person needs access to the same account.||If you want more control over who can access the emails and are okay having the emails accessible in one place and by one person at a time.||Any general user.|
<urn:uuid:73ec91f9-27c1-4ded-ba92-849f898f6362>
CC-MAIN-2022-33
https://bluetie.com/about-us/blog/2019/07/17/imap-pop-or-webmail/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.923839
1,846
2.78125
3
by Stacey Fulton, EASTCONN A student diagnosed with Dyslexia, poor phonological awareness, impacted by ADHD and speech apraxia was referred to EASTCONN for an AT evaluation, specifically focused on written expression. (The student was using some tools for accessing text and more recommendations were added for reading as a result of the evaluation.) Her handwriting was legible, but due to her very poor phonological awareness, it was difficult to decipher what she was trying to say. Prior to requesting an AT evaluation, the student was utilizing Read & Write’s word prediction feature on a Chromebook, but she was taking excessive amounts of time to complete writing tasks resulting in frustration and eventually shutting down. One issue was that the student had significant difficulties and took excessive amounts of time just logging into her Chromebook (even when provided with a visual of information for her account). Once logged in, she had difficulties finding the keys on the keyboard quickly. The student was bright, creative and had great ideas, but even the simplest words required a lot of effort and energy for her to spell despite the assistance of Word Prediction. When using the word prediction, she was usually able to come up with the first letter of a word. Each time she typed a letter, she used the text-to-speech features to listen to the long list of words predicted. This required extensive time and energy and the student often became so frustrated, she was allowed to dictate her sentences while the staff scribed for her. Speech-to-text was also trialed by the district using Voice Typing (Google Docs), but because of her poor articulation, there were a significant number of errors (at the one-word level and sentence level). It was felt that AT programs that provided the words (like Clicker Writer) would limit her ideas and creativity. EASTCONN’s evaluator trialed Co:Writer Universal using topic dictionaries. Use of the topic dictionaries significantly helped this student as the words she wanted to use came up quickly (after 1 or 2 letters) and she was able to select the correct word by listening (out of a choice of 5). In addition, this evaluator trialed Co:Writer on the iPad and found that the student was quicker and more efficient with finding the letters on the on-screen keyboard and accessing the predicted words above the keyboard. With everything in the same visual plane and no login, she became much more efficient. With the help of these tools, the student can be more independent and successful with some writing tasks, lessening the frustration and increasing the confidence in herself. After a period of time using the recommended tools, the teacher reported: “EASTCONN found tools to unlock so many reading and writing tasks. They loaned us an iPad from their lending library (which proved to be a gamechanger, versus third grade’s traditional use of a Chromebook). After practicing in the resource room, she has now generalized her use of the AT into the general education classroom.”
<urn:uuid:742d131b-63bc-45d9-95fd-78feed00063c>
CC-MAIN-2022-33
https://cttechact.com/at-tools-benefit-student-with-complex-learning-needs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.979569
623
2.328125
2
Cacipacoré virus (CPCV) is a potential emerging virus classified in the genus Flavivirus, family Flaviviridae. In the present study, we present the genetic characterization of a CPCV isolated from ticks (Amblyomma cajennense) collected from a sick capybara (Hydrochoerus hydrochaeris) in São Paulo State, Brazil. The CPCV isolate shares the typical genomic organization of flaviviruses with 10,857 nucleotides in length and a single open reading frame of 10,284 nucleotides encoding a polyprotein of 3,427 amino acids. Phylogenetic analysis revealed that CPCV is unique, as a potentially tick-borne virus, in the Japanese encephalitis virus serogroup. ASJC Scopus subject areas
<urn:uuid:282adb4e-347a-4b16-8715-adcc929930d8>
CC-MAIN-2022-33
https://researchexperts.utmb.edu/en/publications/genetic-characterization-of-cacipacor%C3%A9-virus-from-ticks-collected
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.848671
176
1.875
2
There are two questions that need to be answered with 450 words for each question. Each answer needs to be supported with no less than two citations from the chapter. A $245 million stretch of blacktop intended to be the signature goodwill gesture from the U.S. people to the Indonesian survivors of the 2004 tsunami instead became a parable of the problems of Aceh Province’s recovery. Construction of the 150-mile road along the devastated coast never started, stalled by a host of obstacles like acquiring rights of way through residential areas and farmland and, particularly, through several hundred graves of mystical and religious significance. Though some villagers welcomed the idea, some had reservations about a U.S.-style thoroughfare with a wide shoulder on either side that would replace the existing ribbon of mostly churned dirt and mud. Villagers said they feared speeding traffic—they threw rocks at fast-traveling cars of foreign aid workers—and wanted to be able to sell snacks and tea from stalls snug by the roadside, as they had always done. A demonstration outside the main Indonesian reconstruction agency turned violent when protesters complained that they still lacked basic services and demanded more financing for education. The patience of U.S. officials wore thin, too. They complained that the government had been too slow in buying up the land and resolving the issue of graves. Finally, the U.S. officials had become so disconcerted about delays that they had tried to pry more action from the Indonesians by suggesting that the money for the road would be diverted to the reconstruction efforts in Lebanon. “It was threatened they would take the money away,” said Kuntoro Mangk Usubroto, the director of the Indonesian rehabilitation and reconstruction agency in Aceh. “That’s standard.” The Indonesians said the United States was imposing first-world standards of efficiency on a poor region that was pounded by civil war and then swamped by the tsunami, which killed more than 100,000. Records of land titles were washed away, and questions of inheritance among devastated families take a while to decide what they say. The idea for the road evolved soon after the tsunami when the Bush administration wanted to show that the United States cared about Indonesia, the world’s most populous Muslim country, in its moment of need. It was decided early on to finance one substantial project rather than a number of smaller ones. At first, rebuilding a significant portion of the provincial capital, Banda Aceh, into a kind of “signature city” was discussed. Instead, a well-engineered road from the capital to Meulaboh, the southernmost coastal town, which was nearly completely wiped out, was considered a more fruitful project that played to the U.S. strength of fast and modern construction. The new road would connect the poor fishing communities of the wasted west coast of Aceh to the outside world. - Identify the cultural values that are clashing in this case. - Which dimensions of cultural differences in Hofstede’s model are relevant to this case
<urn:uuid:d3febaeb-70e2-496d-9071-1e9d1e59bf90>
CC-MAIN-2022-33
https://boompapers.com/case-analysis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.969599
642
2.578125
3
|Plural||The language(s) of this currency do(es) not have a morphological plural distinction.| |Freq. used||฿20, ฿50, ฿100, ฿500, ฿1000| |Freq. used||25, 50 satang ,฿1, ฿2, ฿5, ฿10| |Rarely used||1, 5, 10 satang| |Central bank||Bank of Thailand| |Printer||Note Printing Works of the Bank of Thailand| |Mint||Royal Thai Mint| |Source||Inflation (annual %), World Bank, 2011–2015| The baht (//; Thai: บาท, pronounced [bàːt]; sign: ฿; code: THB) is the official currency of Thailand. It is divided into 100 satang (สตางค์, pronounced [sà.tāːŋ]). The issuance of currency is the responsibility of the Bank of Thailand. SWIFT ranked the Thai baht as the 10th most frequently used world payment currency as of January 2019. Main article: History of Thai money The Thai baht, like the pound, originated from a traditional unit of mass. Its currency value was originally expressed as that of silver of corresponding weight (now defined as 15 grams), and was in use probably as early as the Sukhothai period in the form of bullet coins known in Thai as phot duang. These were pieces of solid silver cast to various weights corresponding to a traditional system of units related by simple fractions and multiples, one of which is the baht. These are listed in the following table: |Unit (RTGS)||Thai spelling||Relative value||Value relative to baht||Notes| |Bia||เบี้ย||1⁄100 at||1⁄6400||Bia is Thai for cowry, the shell of which was used as a trade medium of the same value.| |Solot||โสฬส||1⁄16 fueang||1⁄128||Solot here literally means "sixteen" or sixteenth, referring to the fractional amount relative to a fueang.| |At||อัฐ||1⁄8 fueang||1⁄64||Likewise, at literally means eight.| |Siao/Phai||เสี้ยว/ไพ||1⁄4 fueang||1⁄32||Siao means quarter.| |Sik||ซีก||1⁄2 fueang||1⁄16||Sik means half.| |Fueang||เฟื้อง||1⁄8 baht||1⁄8||The smallest silver bullet coins available in the market.| |Salueng||สลึง||1⁄4 baht (0.25 baht, 25 satang||1⁄4||Thai version of the Mace (unit).| |Song salueng||สองสลึง||1⁄2 baht (0.50 baht, 50 satang)||1⁄2| |Tamlueng||ตำลึง||4 baht||4||Thai version of the tael.| |Chang||ชั่ง||20 tamlueng||80||Thai version of the catty.| That system was in use up until 1897, when the decimal system devised by Prince Jayanta Mongkol, in which one baht = 100 satang, was introduced by his half-brother King Chulalongkorn along with the demonetization of silver bullet coins on 28 October 1904 after the end of silver bullet coin production by the opening of Sitthikarn Royal Mint in 1857. However, coins denominated in the old units were issued until 1910, and the amount of 25 satang is still commonly referred to as a salueng, as is the 25-satang coin. Until 27 November 1902, the baht was fixed on a purely silver basis, with 15 grams of silver to the baht. This caused the value of the currency to vary relative to currencies on a gold standard. In 1856 - 1864, the values of certain foreign silver coins were fixed by law, with 5 baht = 3 Spanish dollar = 7 Indian rupees. Before 1880 the exchange rate was fixed at 8 baht per pound sterling, falling to 10 to the pound during the 1880s. In 1902, the government began to increase the value of the baht by following all increases in the value of silver against gold but not reducing it when the silver price fell. Beginning at 21.75 baht per pound sterling, the currency rose in value until, in 1908, a fixed peg to the British pound sterling was established of 13 baht per pound. This was revised to 12 baht in 1919 and then, after a period of instability, to 11 baht in 1923. During World War II, the baht was fixed at a value of one Japanese yen on 22 April 1942. From 1956 until 1973, the baht was pegged to the U.S. dollar at an exchange rate of 20.8 baht = one dollar and at 20 baht = 1 dollar until 1978. A strengthening US economy caused Thailand to re-peg its currency at 25 to the dollar from 1984 until 2 July 1997, when the country was affected by the 1997 Asian financial crisis. The baht was floated and halved in value, reaching its lowest rate of 56 to the dollar in January 1998. It has since risen to about 30 per dollar. The baht was originally known to foreigners by the term tical, which was used in English language text on banknotes until the series 2 1925. Cowrie shells from the Mekong River had been used as currency for small amounts since the Sukhothai period. Before 1860, Thailand did not produce coins using modern methods. Instead, a so-called "bullet" coinage was used, consisting of bars of metal, thicker in the middle, bent round to form a complete circle on which identifying marks were stamped. Denominations issued included 1⁄128, 1⁄64, 1⁄32, 1⁄16, 1⁄8, 1⁄2, 1, 1+1⁄2, 2, 2+1⁄2, 4, 4+1⁄2, 8, 10, 20, 40, and 80 baht in silver and 1⁄32, 1⁄16, 1⁄8, 1⁄2, 1, 1+1⁄2, 2, and 4 baht in gold. One gold baht was generally worth 16 silver baht. Between 1858 and 1860, foreign trade coins were also stamped by the government for use in Thailand. Rama III (1824–1851) was the first king to consider the use of a flat coin. He did so not for the convenience of traders, but because he was disturbed that the creatures living in the cowrie shells were killed. When he learned of the use of flat copper coins in Singapore in 1835, he contacted a Scottish trader, who had two types of experimental coins struck in England. The king rejected both designs. The name of the country put on these first coins was Muang Thai, not Siam. In 1860, modern style coins were introduced. These were silver 1 sik, 1 fuang, 1 and 2 salung, 1, 2, and 4 baht, with the baht weighing 15.244 grams and the others weight related. Tin 1 solot and 1 att followed in 1862, with gold 2+1⁄2, 4, and 8 baht introduced in 1863 and copper 2 and 4 att in 1865. Copper replaced tin in the 1 solot and 1 att in 1874, with copper 4 att introduced in 1876. The last gold coins were struck in 1895. In 1897, the first coins denominated in satang were introduced, cupronickel 2+1⁄2, 5, 10, and 20 satang. However, 1 solot, 1 and 2 att coins were struck until 1905 and 1 fuang coins were struck until 1910. In 1908, holed 1, 5, and 10 satang coins were introduced, with the 1 satang in bronze and the 5 and 10 satang in nickel. The 1 and 2 salung were replaced by 25 and 50 satang coins in 1915. In 1937, holed, bronze 1⁄2 satang were issued. In 1941, a series of silver coins was introduced in denominations of 5, 10, and 20 satang, due to a shortage of nickel caused by World War II. The next year, tin coins were introduced for 1, 5, and 10 satang, followed by 20 satang in 1945 and 25 and 50 satang in 1946. In 1950, aluminium-bronze 5, 10, 25, and 50 satang were introduced whilst, in 1957, bronze 5 and 10 satang were issued, along with 1 baht coins struck in an unusual alloy of copper, nickel, silver, and zinc. Several Thai coins were issued for many years without changing the date. These include the tin 1942 1 satang and the 1950 5 and 10 satang, struck until 1973, the tin 1946 25 satang struck until 1964, the tin 50 satang struck until 1957, and the aluminium bronze 1957 5, 10, 25, and 50 satang struck until the 1970s. Cupronickel 1 baht coins were introduced in 1962 and struck without date change until 1982. In 1972, cupronickel 5 baht coins were introduced, switching to cupronickel-clad copper in 1977. Between 1986 and 1988, a new coinage was introduced, consisting of aluminium 1, 5, and 10 satang, aluminium-bronze 25 and 50 satang, cupronickel 1 baht, cupronickel-clad-copper 5 baht and bimetallic 10 baht. Cupronickel-clad-steel 2 baht were introduced in 2005. In 2008, the Ministry of Finance and the Royal Thai Mint announced the 2009 coin series, which included changes in materials to reduce production costs as well as an update of the image on the obverse to a more recent portrait of the king. The two-baht coin, confusingly similar in color and size to the one-baht coin, was changed from nickel-clad low-carbon steel to aluminium bronze. New two-baht coin was the first of the new series released on February 3, 2009, followed by a satang coin in April, a five-baht coin in May, a ten-baht coin in June, and a one-baht coin in July 2009. In 2018, the Royal Thai Mint and the Ministry of Finance issued a new series of general circulation coins, featuring the same standard specifications, but feature a portrait of its current king, Maha Vajiralongkorn. |Coins of the Thai baht (Rama IX) (in Thai)| |Value||Technical parameters||Description||Date of first minting| |1 satang 1||15 mm||0.5 g||97.5% Al, 2.5% Mg||King Bhumibol Adulyadej||Wat Phra That Hariphunchai, Lamphun||1987| |5 satang 1||16 mm||0.6 g||97.5% Al, 2.5% Mg||Wat Phra Pathom Chedi, Nakhon Pathom||1987| |16.5 mm||99% Aluminium||2008| |10 satang 1||17.5 mm||0.8 g||97.5% Al, 2.5% Mg||Wat Phra That Choeng Chum, Sakon Nakhon||1987| |25 satang||16 mm||1.9 g||Aluminium bronze||King Bhumibol Adulyadej||Wat Phra Mahathat, Nakhon Si Thammarat||1987| |16 mm||1.9 g||Copper-plated steel||King Bhumibol Adulyadej||Wat Phra Mahathat, Nakhon Si Thammarat||2008| |50 satang||18 mm||2.4 g||Aluminium bronze||King Bhumibol Adulyadej||Wat Phrathat Doi Suthep, Chiang Mai||1987| |18 mm||2.4 g||Copper-plated steel||King Bhumibol Adulyadej||Wat Phrathat Doi Suthep, Chiang Mai||2008| |1 baht||20 mm||3.4 g||Cupronickel (1986-2008)||King Bhumibol Adulyadej||Wat Phra Kaew, Bangkok||1986| |3 g||Nickel-plated steel (2008–present)||2008| |2 baht||21.75 mm||4.4 g||Nickel-plated low-carbon steel||King Bhumibol Adulyadej||Wat Saket, Bangkok||2005| |21.75 mm||4 g||Aluminium bronze||King Bhumibol Adulyadej||Wat Saket, Bangkok||2008| |5 baht||24 mm||7.5 g||Copper nickel-clad copper||King Bhumibol Adulyadej||Wat Benchamabophit, Bangkok||1988| |10 baht||26 mm||8.5 g||Outer Ring: Copper-nickel Center Plug: Aluminium bronze |King Bhumibol Adulyadej||Wat Arun, Bangkok||1988| |Coins of the Thai baht (Rama X)| |Image||Value||Composition||Description||Date of minting| |1 satang||Aluminum||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |5 satang||Aluminum||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |10 satang||Aluminum||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |25 satang||Copper-plated steel||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |50 satang||Copper-plated steel||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |1 baht||Nickel-plated steel||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |2 baht||Aluminum bronze||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |5 baht||Copper nickel-clad copper||King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| |10 baht||Outer Ring: Copper nickel Center Plug: Aluminium bronze |King Maha Vajiralongkorn||Monogram of Maha Vajiralongkorn||2018| In February 2010 the Treasury Department of Thailand stated that it has been planning a new circulation 20 baht coin. Main article: Banknotes of the Thai baht In 1851, the government issued notes for 1⁄8, 1⁄4, 3⁄8, 1⁄2, and 1 tical, followed by 3, 4, 6, and 10 tamlueng in 1853. After 1857, notes for 20 and 40 ticals were issued, also bearing their values in Straits dollars and Indian rupees. Undated notes were also issued before 1868 for 5, 7, 8, 12, and 15 tamlueng, and 1 chang. One att notes were issued in 1874. In 1892, the treasury issued notes for 1, 5, 10, 40, 80, 100, 400, and 800 ticals, called "baht" in the Thai text. On September 19, 1902, the government introduced notes which were printed by Thomas De La Rue & Company Limited, England, during the reigns of Kings Rama V and Rama VI, denominated 5, 10, 20, 100, and 1000 ticals, still called baht in the Thai text — each denomination having many types, with 1 and 50 tical notes following in 1918. In 1925, notes were issued in denominations of 1, 5, 10, 20, 100, and 1,000 baht with the denomination in both Arabic and Thai numerals without English text; English speakers continued to refer to these as "ticals". On 27 July 2010, the Bank of Thailand announced that the 16th series banknotes would enter circulation in December 2010. On 9 August 2012, the Bank of Thailand issued a new denomination banknote, 80 baht, to commemorate queen Sirikit's 80th birthday. It was the first Thai banknote that featured Crane's Motion security thread. In 2017, the Bank of Thailand announced a new family of banknotes in remembrance of its late king Bhumibol Adulyadej (Rama IX). The notes are the same size and dimensions as the "Series 16" banknotes, with the front designs as before, but the back designs featuring images of the king's life in infancy, adolescence and maturity. The new family of banknotes were issued on September 20. In 2018, the Bank of Thailand announced a new family of banknotes featuring a portrait of its current king, Maha Vajiralongkorn. The main colors and dimensions of the notes are the same as before, with the back designs featuring images of the Kings of Thailand from past to present. The 20, 50 and 100 baht banknotes were issued on Chakri Memorial Day, April 6, 2018. The final two denominations, 500 and 1,000 baht were issued on the anniversary of the birth of King Maha Vajiralongkorn, July 28, 2018. Images of banknotes have been removed lest they infringe copyright, but may be viewed at the Thai-language article linked in the margin. |15th series banknotes| |Value||Dimensions||Main colour||Description||Date of issue| |20 baht||138 × 72 mm||Green||King Bhumibol Adulyadej in the uniform of the supreme commander of the armed forces||King Ananda Mahidol (Rama VIII)||3 March 2003| |50 baht||144 × 72 mm||Blue||King Mongkut (Rama IV)||19 March 2004| |100 baht||150 × 72 mm||Red||King Chulalongkorn (Rama V) and King Vajiravudh (Rama VI)||21 October 2005| |500 baht||156 × 72 mm||Purple||King Nangklao (Rama III)||1 August 2001| |1,000 baht||162 × 72 mm||Brown||King Bhumibol Adulyadej; Pa Sak Jolasid Dam||25 November 2005| |16th series banknotes**| |Value||Dimensions||Main colour||Description||Date of issue| |20 baht||138 × 72 mm||Green||King Bhumibol Adulyadej in the Royal House of Chakri gown||King Ram Khamhaeng the Great on the Manangkhasila Asana Throne monument; invention of the Thai script; Ramkhamhaeng stele||1 April 2013| |50 baht||144 × 72 mm||Blue||King Naresuan the Great pouring water for declaration of independence monument; Statue of king Naresuan the Great on war elephant; Phra Chedi Chai Mongkol temple||18 January 2012| |100 baht||150 × 72 mm||Red||King Taksin the Great monument in Wongwian Yai circle; Phra Ratchawang Doem (King Taksin's palace); Wichai Prasit Fortress Thonburi||26 February 2015| |500 baht||156 × 72 mm||Violet||King Buddha Yodfa Chulalok the Great (King Rama I) monument; Wat Phra Chetuphon Vimolmangklararm Rajwaramahaviharn (Wat Pho); Phra Sumen Fort (Bangkok city wall)||12 May 2014| |1,000 baht||162 × 72 mm||Brown||King Chunla Chom Klao the Great (King Rama V) monument; Ananta Samakhom throne hall, Dusit palace ground king's monument, end of slavery in Siam||21 August 2015| |17th series banknotes| |Value||Dimensions||Main colour||Description||Date of issue| |20 baht||138 × 72 mm||Green||King Maha Vajiralongkorn in the uniform of the commander of the Royal Thai Air Force and wearing Order of the Nine Gems||Kings Phra Buddha Yodfa Chulaloke (Rama I) and Phra Buddha Loetla Nabhalai (Rama II)||6 April 2018| |50 baht||144 × 72 mm||Blue||Kings Nangklao (Rama III) and Mongkut (Rama IV)||6 April 2018| |100 baht||150 × 72 mm||Red||Kings Chulalongkorn (Rama V) and Vajiravudh (Rama VI)||6 April 2018| |500 baht||156 × 72 mm||Purple||Kings Prajadhipok (Rama VII) and Ananda Mahidol (Rama VIII)||28 July 2018| |1,000 baht||162 × 72 mm||Brown||Kings Bhumibol Adulyadej (Rama IX) and Maha Vajiralongkorn (Rama X)||28 July 2018| Ngoen (เงิน) is Thai for "silver" as well as the general term for money, reflecting the fact that the baht (or tical) is foremost a unit of weight for precious metals and gemstones. One baht = 15.244 grams. Since the standard purity of Thai gold is 96.5 percent, the actual gold content of one baht by weight is 15.244 × 0.965 = 14.71046 grams; equivalent to about 0.473 troy ounces. 15.244 grams is used for bullion; in the case of jewellery, one baht should be more than 15.16 grams. The Bank of Thailand adopted a series of exchange controls on 19 December 2006, which resulted in a significant divergence between offshore and onshore exchange rates, with spreads of up to 10 percent between the two markets. Controls were broadly lifted on 3 March 2008 and there is now no significant difference between offshore and onshore exchange rates. |Year||USD/THB average exchange rate| (Source 1999-2013: usd.fx-exchange.com) (Source 2014-2020: Bank of Thailand) |From Google Finance:||AUD CAD CHF CNY EUR GBP HKD JPY USD INR CNY TWD| |From Yahoo! Finance:||AUD CAD CHF CNY EUR GBP HKD JPY USD INR CNY TWD| |From XE.com:||AUD CAD CHF CNY EUR GBP HKD JPY USD INR CNY TWD| |From OANDA:||AUD CAD CHF CNY EUR GBP HKD JPY USD INR CNY TWD| From the earliest times in Southern Burma, the weight adopted were not the Chinese liang or tael or its variants, but the Indian bahur and the viss, the latter being divided into 100 ticals. It is this Burmese tical, which was and continues to be in Burma the designation of a definite weight of uncoined silver or its compound, that throws light on the problem of the Thai tical. ...each denomination had many types which were printed by Thomas De La Rue & Company Limited, England.... The design was printed only on one side; so the note was called 'Uniface banknote'. There were 7 denominations.... on the back side was the picture of the Royal Ploughing Ceremony. This type of banknote was called "Ploughing Ceremony Note". Does Japan dominate Siam?" I asked a leading Englishman in Bangkok. He laughed quietly: "Have you any Siamese money?" he asked. I drew out a five-ticul note (about 2 dollars 50c). "Read what is printed at the foot of the note", he commanded. I read, "Thomas de la Rue and Co., London". With calm confidence he said: "As long as the word 'London' stands on that Siamese bill, it is not Japan but another little island which will have the larger say in the Kingdom of Siam. new Thai banknote will circulate in December 2010 In Thailand, the Bank of Thailand (BOT) has the sole right to design, produce, issue, circulate and manage Thai banknotes. The reproduction of Thai banknotes is protected by the Copyright Act B.E. 2537 Ch.1 Pt.5 §27 (2) communication to public.
<urn:uuid:ad86ea41-573c-4d76-a652-fa14c534b0ce>
CC-MAIN-2022-33
https://db0nus869y26v.cloudfront.net/en/Thai_baht
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.899378
6,143
2.828125
3
For the beginning of the nineteenth century, tanneries, breweries and ropewalks defined Roxbury; its craftsman supplied goods not only to Boston, but to the rest of the United States as well. Starting in the 1840s however, the character of various parts of Roxbury began to change. One of these areas was the section of Roxbury south of Dudley Square, which began to grow increasingly residential. Industries like leather tanning and brewing had little interest in the area due to its uneven terrain. However, the area appealed to individuals seeking to build mansions and summer homes. Over the rest of the nineteenth century, this area became built-up with other types of homes and residences, especially after the trolley line from Boston was incorporated, providing a quick link to the downtown area. Due to this aforementioned increased development, it became necessary to build more churches in Roxbury. The history of Eliot Congregational Church begins in Eliot Square with the First Church Roxbury. Ultimately, the story of Eliot Congregational Church is also the story of three congregational parishes in Roxbury. Founded in 1834 and built in 1835 along Kenilworth Street in the Highlands section of Roxbury, Eliot Congregational Church was the first church constructed by the Orthodox Congregationalist who had broken away from the First Church Roxbury when it became Unitarian. The church itself honors the “Apostle to the Indians” John Eliot. Over the next few decades, the Eliot Congregational Church on Kenilworth flourished, so much so that some of its members were dismissed in 1857 to found the Vine Street Congregational Church. Less than two decades after that in 1876, the Vine Street Church moved to a new building on Moreland Street and was subsequently renamed the Immanuel Congregational Church where it flourished as well. Given the success of the both congregational churches, and the continued growth of the suburban population of Roxbury, it became apparent that another church would be needed and as a result, the Walnut Avenue Congregational Church was established in December of 1870. The area surrounding Walnut Street was a flourishing upper-middle class neighborhood, which provided and excellent financial base for the congregation. The church itself was constructed in 1873 on the corner of Walnut Avenue and Dale Street at a cost of $42,418.11 and featured a High Victorian Gothic religious structure. A 115 square foot stained glass window manufactured by Louis Tiffany (installed in 1905) was the highlight of the interior. Population growth continued to define the Walnut Street Congregational Church, especially as members of both Eliot and Immanuel Church began to flock there. New construction was necessary again in 1889 when a new chapel adjacent to the Walnut Street Congregational Church was completed. The chapel itself was deigned by architect J. Williams Beal and built by L. E. Giddings of Portsmouth, New Hampshire. The design used the English vernacular style, similar to the All Souls Unitarian Church and Harriswood Crescent, both of Roxbury. By the beginning of the nineteenth century however, the population of the neighborhood surrounding the Walnut Avenue Congregational Church began to change, ultimately resulting in it being joined with Immanuel Congregational Church in 1907 to form the Immanuel-Walnut Congregational Church. In the wake of World War I, the population of Eliot Church began to expand rapidly while the Immanuel-Walnut Congregational Church was in a state of decline . After much deliberation, it was determined that the best option for both churches was a merger, with Eliot Church establishing its parish in the Walnut Avenue Church building. This new church would retain the name Eliot Church. On November 30, 1929, fire ravaged the 1889 church built on the site, but the original 1873 church was left unharmed and services continued there. The 1889 chapel was ultimately rebuilt in 1931, but due to dwindling attendance, the congregation decided that it would be best to repurpose the chapel and turn it into a gymnasium. The original Eliot Congregational Church stood on Kenilworth Street until 1953 when it was destroyed by fire.
<urn:uuid:6cab22dd-e15c-4a8d-891d-32c944180433>
CC-MAIN-2022-33
https://www.eliotroxbury.org/blank
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.975771
851
2.78125
3
Smart business owners will always be the ones that stay on top of their cash flow management. By monitoring and reviewing their cash flow statements regularly they keep their fingers on the pulse of the business. Running your own business can often be like riding a rollercoaster. It’s essential that you understand your cash flow along with when money is coming in and out of your business. In this blog post we have put together some top cash flow management tips to help you keep your business in the black. These tips will also help you boost your businesses cash flow, which is never a bad thing! Review Your Cash Flow Take the time to monitor your cash flow on a regular basis. We would recommend at least monthly, but ideally weekly. Online accounting software makes it really easy to reconcile your accounts and see where your cash flow and business is currently at. Cloud accounting means that your information is safe and you can easily view it from wherever you are. To improve your cash flow management look at those recurring payments, whether they are monthly, quarterly or annually. Are there ways that you can cut back on your utilities or rent? Perhaps you have subscriptions to things that you thought you needed for your business but actually they have been things you haven’t used? What does your bank balance look like? Are there ways that you can renegotiate the terms of outstanding loans or leases? When did you last review your insurances? Are you paying for insurance you don’t need? Line of Credit Getting a business line of credit before you need one is a great way of protecting your business against any future cash flow problems. It may be possible to get a line of credit for a percentage of your accounts receivable. Alternatively, you could use your inventory as collateral. If you need help creating a line of credit, please contact us. We can offer advice and guidance to help you get the best line of credit for your needs. It’s only normal to want to latest computer, smart phone or car with the best features. However, this latest technology comes at a cost. You can access the latest technology without tying up the cash by leasing these items. This means you get the items you need, but you pay on a monthly, quarterly or annual basis instead. Keep On Top Of Invoices Once the work is complete or the products have been delivered, make sure an invoice is sent for full payment. Why wait to get paid? When taking the work on, make sure you find out the name and contact details of the person paying the invoice. Ensure you are clear with your terms of payment so the client or customer knows what to expect. Make your invoices easy to read and even easier to pay. Speed Up Payment Think about things you can do to speed up payments. This could be a percentage off the invoice if the client pays their invoice early. Make sure you do the calculations in advance so when the client pays early, it is still worth the money for you. Part Payments and Deposits Partial payments and deposits are very common among the building trade and web designers too. Some business will charge a set fee at the beginning to confirm the work, another payment will be taken half way through the project and the final payment will be taken on completion. Part payments and deposits are often taken to pay for the materials or workforce needs to complete the job. While part payments may be offered to help the customer, they can also help the cash flow management for the business too. You know what money you have coming in when, and it split over a few months or years. Business Credit Card Business credit cards are a great way of cushioning your cash flow. Take the time to find the best business credit card for you, For example, there are business credit cards that offer points and awards that can then go towards business purchases. Having a business credit card will also make it easier to categorise your purchases. You’ll find it easier to track your business expenses too. Here at Financial Foundations Coaching we strongly believe that staying on top of your cash flow is key to ensuring your business succeeds. If you need a hand, just book a virtual meeting here and we can talk through it all with you.
<urn:uuid:ae65f29a-25ed-422a-ad9b-d663a23053b1>
CC-MAIN-2022-33
https://www.ffcoaching.co.uk/financial-foundations-coaching-cash-flow-management-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.96049
875
1.554688
2
Ayres performed hydraulic analysis and developed hydraulic design recommendations for the repair of County Road 29 along both sides of the Big Thompson River between the County Road 29 Bridge and the dam downstream. After conferring with the Larimer County floodplain administrator, the team successfully submitted a Conditional Letter of Map Revision (CLOMR) for the structures design, using the 2013 pre-flood condition as the baseline HEC-RAS model. To upgrade the road to appropriate Larimer County and AASHTO standards, the overall pavement section design for the repair was wider than the original road. Ayres’ HEC-RAS modeling showed the proposed design would encroach into the channel and cause an unacceptable rise unless retaining walls were used. The proposed design now incorporates retaining walls along most of the repair length. Ayres assembled and submitted the CLOMR package to the Federal Emergency Management Agency in spring 2015, and the CLOMR was approved within five months.
<urn:uuid:bdeb788e-0937-4981-b5f4-ee335f48c659>
CC-MAIN-2022-33
https://www.ayresassociates.com/project/hydraulics-for-county-road-29-repairs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.940962
195
1.578125
2
Assistant Government Chief Information Officer provides insight As stated in the Hong Kong Smart City Blueprint, the mission of the Hong Kong Government in respect of cyber security is to “enhance the Government’s cyber security capability to address new security risks and facilitate collaboration among stakeholders to promote awareness and incident response capability in the community”. To implement the mission, the Office of the Government Chief Information Officer (OGCIO) together with its strategic partners adopt a multi-pronged strategy to provide support to the community, nurture talents, collaborate with stakeholders and fortify internal protection within the Government, with the ultimate aim to strengthen the cyber security capabilities of Hong Kong as a whole. Assistant Government Chief Information Officer, Jason Pun shared Hong Kong’s cyber security capabilities from three perspectives; which include breach detection, early warning signals and strategy. Detecting cyber security breaches in an organisation is no easy task. Attackers use different methods to circumvent detection and hide in your system environment or network infrastructure to collect as much system information as possible before launching an attack. Therefore, it is important to identify the breaches or intrusions as early as possible to reduce the impact, for example by monitoring suspicious activities and anomalies in the systems or networks. Effective communication among all stakeholders on detected breaches is also crucial in taking quick remedial actions to contain damage and rectify problems. Framework for information security management Incident response is an important area in Information Security Management to prepare organisations against security incidents and resuming interrupted services in a more organised, efficient and effective manner. It involves assigning appropriate personnel and responsibilities, reserving resources, and planning for the handling processes. For the Government, the OGCIO has published an organisation framework for information security management and incident response. According to the framework, each government department established its own Information Security Incident Response Team (ISIRT) to handle its incidents. The Incident Response Office (GIRO) is also crucial in coordinating responses to incidents, in particular in handling multiple-point attacks in which more than one department may be affected. For the wider community, the OGCIO and the Hong Kong Internet Registration Corporation Limited (HKIRC) jointly run the “Cybersec Infohub” partnership programme to facilitate closer collaboration among local information security stakeholders by sharing threat intelligence. The programme also provides a platform that enables the efficient exchange of mitigation strategies, best practices and insights from experts in tackling emerging cyber threats. “As of June 2022, we had over 1 100 public and private organisations with over 2 100 representatives joining the programme,” he said. “They are from a wide spectrum of industry sectors including finance, insurance, public utilities, transports, medical care, telecommunications, innovation & technology, education, etc.” According to Pun the success of the programme is built on four pillars: trust, collaboration, sharing and support. Working in silos is not conducive to building a safe cyberspace. We count on the concerted efforts from each and every one of you here to fortify the overall cyber resilience of Hong Kong. If you have not joined the programme yet, please join today and get the most from it. Timely dissemination of alerts “To get well prepared for cyber-attacks, we should have a clear picture of the global cyber security landscape,” he said. “The Government Computer Emergency Response Team Hong Kong (GovCERT.HK) established under the OGCIO has been closely working with the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) and other Computer Emergency Response Teams (CERTs) in the Asia-Pacific region and around the globe.” This not only helps with the gainful exchange of cyber threat intelligence, but also enables the timely dissemination of alerts and advice to government departments and to the general public, helping them stay on top of emerging cyber-attacks. Early detection and warning of cyber threats are of paramount importance. In the face of increasingly sophisticated and frequent attacks, GovCERT.HK and HKCERT have been working closely to monitor the feeds and updates from major product vendors and other CERTs. We also issue timely alerts to government departments and the general public about vulnerabilities of products and emerging security threats so that they can take early precautionary actions. “We also utilise big data analytics to collect and analyse threat intelligence from different sources, enabling us to issue cyber threats, warnings and recommendations in a more efficient and effective manner,” stated Pun. In the first half of 2022, the OGCIO issued over 110 security alerts to government departments, together with recommended mitigating measures. During the same period, HKCERT also published over 190 security bulletins and advisories to the public. Notwithstanding this, HKCERT received some 4 000 reports of security incidents over the same period. Botnet and phishing attacks topped the list of cyber threats, with these two types of attacks accounting for more than 90 per cent of the total number of reported cases. An ounce of prevention is better than a pound of cure. According to a report published in 2021, the average cost of a data breach globally rose from $US3.86 million to $US4.24 million. The loss of business, including business disruption, revenue loss, reputation loss and diminished goodwill, accounted for 38 per cent of the cost. Installing early warning signals for efficient detection not only saves the effort of responding to attacks but also helps uphold the organisations’ reputation and goodwill. Working with partners To help the community enhance the cyber security posture, the Government works with various strategic partners to render support in respect of detecting, preventing and responding to cyber-attacks. Small and medium enterprises (SMEs) have limited resources and generally lack the necessary security know-how. To help with this, HKCERT publishes the “Seven Habits of Cyber Security for SMEs” and provides the “Check Your Cyber Security Readiness” tool for them to examine and enhance their preparedness against cyber threats. HKIRC also provides free in-depth website security scan services to SMEs with “.hk” domain name to assist them in identifying and mitigating issues on their websites. Since the launch of the services in 2019, HKIRC has already inspected over 4 500 websites of local enterprises. HKCERT is now developing an Incident Response Guideline for SMEs and it will be available in the coming months. The guideline will provide practical guidance for organisations to build and implement an incident response plan, including preparing for, responding to and taking remedial action against security incidents in an efficient manner. Detection of early warning signals, however, should not totally rely on IT staff of the organisations. It is of equal importance on the user side for all staff members to pay attention to warning signals such as sudden changes of account passwords, suspicious financial transactions, warnings given by anti-malware tools, etc. On the system side, organisations should consider deploying technical solutions such as Security Information and Event Management (SIEM), Network Detection and Response (NDR), Endpoint Detection and Response (EDR) to detect suspicious network activities, suspicious files in IT systems, bulky data upload or download, intermittent performance issues, etc. Early this year, the Cyber Security and Technology Crime Bureau (CSTCB) of the Hong Kong Police Force joined hands with the University of Hong Kong to launch a suspicious email detection system named V@nguard. It assists organisations in detecting suspicious emails and avoiding falling prey to phishing attacks. This tool has received an overwhelming response from SMEs. As at June 2022, it has recorded more than 13 600 downloads. Apart from the technical support rendered to the community, the Innovation and Technology Commission administers the Technology Voucher Programme (TVP) to provide financial support to eligible enterprises and organisations for, among others, upgrading their systems and improving the cyber security resilience to defend against cyber-attacks. Countering security threats To counter the increasing security threats, a sustainable strategy needs to be in place. Organisations should review their security strategies regularly on the continuity, suitability, adequacy and effectiveness of security measures. As an example, the OGCIO facilitates the growth of the Government’s security capabilities from four perspectives. They are governance & organisation, process, technology and people. The framework of information security management and incident response mentioned before helps manage the growing complexity of the security capabilities of the Government by clearly defining the roles and responsibilities of the OGCIO and various government departments. All departments need to observe the “Government IT Security Policy and Guidelines”, while the OGCIO regularly reviews and revises the policy and guidelines to keep abreast of the ever-changing cyberspace and advancement of technologies. To ensure the departments comply with the policy and guidelines, the OGCIO conducts a security audit for all departments every two years. The OGCIO has developed a series of practice guides for government departments to address the security risks brought about by new technologies and emerging cyber threats. To tie in with the work-from-home arrangements for government staff in response to the epidemic, we have enriched the IT security guidelines to strengthen the requirements of securing remote access. Another practice guide on Internet of Things (IoT) Security was developed to provide comprehensive references and advice for departments to deploy IoT systems in various aspects, such as asset management, access control, physical and environmental security, communications security, etc. Government departments are advised to adopt the “Privacy by Design” principle during the system design phase to avoid the excessive collection of personal data. Adoption of “Security by Design” principle will also help ensure that security considerations are integrated into their systems during design and implementation stages. These security policy, guidelines and practice guides also serve as good references for different organisations to develop their own IT security policy and guidelines. From the technology perspective, the Government adopts multi-layered defence measures to protect websites and IT systems, including data encryption, firewalls, content delivery network, distributed denial of service (DDoS) scrubbing, intrusion detection and prevention systems, endpoint protection solutions, anti-spam filtering systems, real-time monitoring tools, etc. to detect, block and defend against cyber threats. The latest work-from-home arrangement and IoT fade the conventional network perimeter. Organisations should consider deploying zero-trust architecture to protect their resources. According to the aforesaid data breach report, the average cost of data breach with zero-trust architecture is $US1.76 million lower than that without zero-trust architecture deployed. “Human is the weakest link in cyber security”, as is often quoted. The OGCIO strives to improve the human factor by various means. Pun noted the OGCIO encourages staff to pursue internationally recognised information security qualifications to strengthen their professional skills. “We organise cyber security solution showcases, training courses and awareness seminars for government staff to keep abreast of the latest development in cyber security,” he said. To enhance the awareness of phishing attacks among government staff, we have conducted two rounds of the Phishing Drill Campaign since 2019. We have observed a general improvement in staff’s awareness of phishing emails. To build up staff’s capability in responding to incidents, externally GovCERT.HK actively participates in cyber security drills organised by the Asia Pacific Computer Emergency Response Team (APCERT), while internally GovCERT.HK conducts inter-departmental cyber security drills for government departments annually. The drills help paint a clearer picture of the potential problems one may encounter when dealing with an incident. They also help identify areas for improvements and streamline the incident response process. The Government plays an active role in enhancing awareness of cyber security and nurturing talent among the youths. The OGCIO collaborates with professional associations to deliver talks for schools to enhance students’ security awareness and digital etiquette. We also support various programmes including the Cyber Youth Programme organised by HKIRC, and the New Generation Capture the Flag Challenge organised by HKCERT. These programmes not only help enhance the problem-solving and cyber security skills of the younger generation but also raise their interest in pursuing a career in information security. Riding on the success of the programmes, HKCERT and HKIRC will continue to organise similar programmes this year to reach out to more youngsters. Cyber-attacks have been on the rise and becoming increasingly sophisticated in recent years. Organisations should formulate sustainable security policies and strategies, and implement them vigorously.
<urn:uuid:fd7691c4-9960-4ef2-a46b-7a5b60eca5eb>
CC-MAIN-2022-33
https://ciotechasia.com/hk-enhances-capability-in-responding-to-cyber-threats/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.930117
2,571
2.171875
2
You may have heard the story about philosopher and mathematician Blaise Pascal who, when penning a letter to some Reverend Fathers, wrote: 'I'm sorry this is such a long letter; I didn't have time to write a short one'. It's a quote that turns up frequently and often ascribed to others, including Winston Churchill, Cicero, Mark Twain, Voltaire, Albert Einstein, Marcel Proust and Oscar Wilde. However, it was Pascal who made the comment in his Lettres Provinciales (1656-1657), no. 16. He actually wrote: 'Je n'ai fait celle-ci plus longue parceque je n'ai pas eu le loisir de la faire plus courte' ('I have made this letter longer than usual, because I lack the time to make it short'). What he was saying, of course, is that it's easy to ramble on; it takes effort to be succinct. The reason I mention it is that yesterday evening I was invited to write 100 words on Neil Armstrong for today's edition of the London Evening Standard newspaper. One hundred words. It sounds a lot but it really isn't. How could I encapsulate what I feel about Armstrong and his achievements in so few words? It took me an hour of editing, culling and re-writing to arrive at something that summed up what Armstrong meant to me ... with a little bit of humour added in (I can never write anything that's 100% serious). So here they are; my 100 words for Neil Armstrong. Sorry it took so long to explain; I didn't have time to write a short explanation. Imagine this job description: ‘You will be required to sit on top of 3000 tons of explosives and steel and be blasted across 250,000 miles of freezing vacuum to the Moon. You will plant a flag, grab some rocks, and fly home. You will receive standard US Navy pay for the duration of the trip. The computer that will help you calculate the journey has less processing power than a musical birthday card.’ Would you take the job? Neil Armstrong did. And he did it solely to expand the frontiers of human knowledge. That’s why he should never be forgotten.
<urn:uuid:ddd17fd0-d085-4bb4-9414-92c699312632>
CC-MAIN-2022-33
https://colganology.blogspot.com/2012/08/a-century-of-words-for-man-of-century.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.949318
474
2.3125
2
Babies explore by touching, tasting and hearing. Playing is a critical component of their learning process! Sensory activities for children can be a great way to encourage their development and provide them with the opportunity to learn, as well as find out what they like! One great sensory activity? Toddlers love to play with shaving foam. Since it is nontoxic, water-based, and cleans up easily, it can be a safe way to encourage their interest in new things. Is shaving foam safe for messy play? Shaving Foam is generally safe, although you should always supervise your child when they are playing with shaving foam. You can put it in a large Ziploc bag for baby to squish around, or put it in an ice tray and let them play with it once it\’s frozen. If your child likes bubbles, they\’ll probably enjoy playing with shaving foam too! Is shaving cream toxic to babies? If some shaving cream is ingested, it might sting their eyes and cause stomach discomfort. Shaving cream should not be accessible to youngsters unless they are under supervision. The child is more likely to have irritated skin due to an allergic reaction to something in the shaving cream, or have sore eyes from having accidentally squirted it on their face and then use their fingers to try and rub it off. Shaving foam is generally not toxic, but you should always check the ingredients. if you are looking for an alternative to use for messy play, I\’ve included a quick recipe for one at the bottom of this article! What are some shaving foam activities for kids? You can create a host of amazing experiences with only a little bit of creativity, but here are a few messy play ideas to keep your toddlers and preschoolers entertained. Things you will need: - Shaving foam / shaving cream – It absolutely doesn\’t have to be the most expensive brand either, the generic or off-brand will work just fine, and save you some money in the process. - A bucket or sensory bin – If messy play is a staple in your household you may have invested in a specific tub or table. You can buy premade sensory bin kits on Amazon, or repurpose another container you already have. Look for shallow and wide tubs – bonus points for ones that are clear and allow your kids to see through the sides. - Food coloring – Some of the below activities use food coloring. You can consider using non-toxic paint, but to be honest you need such a little amount that it would be cheaper in the long run to use the food coloring. (I\’ve had food coloring in my cupboard for years and years which hasn\’t dried out like the old paints have!) Ice blocks within a shaving foam pool Color some water with a few drops of food coloring, pour it into ice cube trays and freeze overnight. If you have some handy, adding in some glitter is a cool idea. Once the cubes are frozen, empty them into a sensory bin that is filled up with shaving foam and let your preschoolers have at it! while the kids are still frozen they might use the blocks to build with or organize them in colored groups. As they start melting the colors will start to swirl around in the white shaving cream canvas – try encouraging your children to use their fingers to draw different shapes and create art with the color. Shaving foam magic sand Depending on how fine the sand you use is, it might feel a little different to the store-bought equivalent, but your kids will still have a blast playing with it! it\’s not as messy as playing with completely dry sand, so if the weather isn\’t fantastic outside you can still create a fun experience for your kids inside the house. It\’s an easy recipe! Add 3 cups of sand to a sensory bin, and add the shaving foam to it, mixing as you go. The consistency you are looking for is something that looks like dampened sand but feels airy to the touch when you run it through your fingers. You will more than likely use a whole can of shaving foam, so be prepared! Your kids will surely come up with their own activities to do with their new sand, but consider starting them off by providing them with some rocks or shells to make their own mini beach, or get out the trucks and excavators! This one is a pretty easy recipe! Squirt shaving foam into a muffin tin, and color each muffin space with food coloring. give your kids a brush or let them use their fingers to paint away! You don\’t need very much food coloring for each squirt of shaving foam to get some good colors. You may find your kids are more conscious of the process of choosing which color they are going to use, so if you are short on shaving foam or food coloring this could be a good way to ration it out somewhat. TIP: mix in a little bit of dishwashing liquid to the foam before giving it to your children – this can help make washing the coloring off of their skin easier when it comes time to wash up after their painting session. If your child has a penchant for drawing on themselves during art activities, stripping down to a nappy or some old clothes, heading outside onto the grass, and giving them a bucket of shaving foam might just be something they would enjoy! This one is similar to letting them roll around in a mud pile, but the cleanup is absolutely easier! It\’s also a great sibling activity, provided you can keep them from trying to put it in each other\’s eyes. Is there an alternative to shaving foam? Try Aquafaba! Aquafaba is a vegan alternative to egg whites which whips up in a shaving cream texture. It is the leftover liquid from cooled chickpeas – a genius non-toxic alternative that is super easy to create! Drain a can of chickpeas and keep the liquid, then whip it with a hand or stand mixer! Whisking it by hand takes a long time and doesn\’t seem to whip as well. Whipping aquafaba takes anywhere from 3 to 6 minutes, or longer, depending on your equipment and how thick your aquafaba was to begin with. Don\’t get disheartened if it takes some time to achieve stiff peaks; it might take some practice and perseverance. when combined with food coloring, aquafaba foam can be part of the sensory experience that engages all five senses, since it is safe for your kids to put in their mouths. You could even experiment a little with taste by using artificial flavoring! In conclusion – messy, sensory play is not just about fun It is important to remember that children need time for unstructured play. They can\’t always be in front of a screen or doing chores – they require messy, creative activities where they get their hands dirty and explore new textures with their senses. Sensory activities for babies and toddlers are a great way to develop your child\’s cognitive skills, while also having fun. Can\’t get them outside? No worries! There are plenty of ways to have messy play while not destroying the house! The benefits of this type of playtime extend into adulthood as well – creative and imaginative thinking are important skills to develop! I hope i\’ve shared some fun sensory ideas you might not have thought about before! who knows, perhaps some of these activities will be a bit of fun for you, as well!
<urn:uuid:4812742c-6003-46a6-bbf4-e289732f194c>
CC-MAIN-2022-33
https://www.bumpstobaby.com/can-babies-play-with-shaving-foam/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.959009
1,585
2.203125
2
December 21, 2020 The incidence of esophageal adenocarcinoma (EAC) is increasing in adults younger than 50 years and is more often diagnosed at advanced stages in this age group in comparison with cases diagnosed in older adults, according to Surveillance, Epidemiology, and End Results Program (SEERS) data. Between 1975 and 2015, the age-standardized EAC incidence rate increased in three age groups: those younger than 50 years, those aged 50-69, and those aged 70 years and older. The increase was greatest in those younger than 50, at 2.9% per year, Don Codipilly, MD, a gastroenterology fellow at the Mayo Clinic, Rochester, Minnesota, and colleagues report. The findings were published December 11 in Cancer Epidemiology, Biomarkers and Prevention. The investigators analyzed 34,443 cases of EAC diagnosed during the study period. In addition to the increasing incidence rates, they found that between 2000 and 2015, 84.9% of cases diagnosed in younger adults were of regional or distant disease, compared with 77.6% and 67.8% of cases in those aged 50–69 and 70 and older, respectively. As a result, the younger adults had poorer survival outcomes: The 5-year EAC-free survival rates during the most recent period (2000–2011) were 22.9% among those younger than 50, compared with 29.6% in both the 50–69 and the 70 and older age groups, they note. "The magnitude of late-stage disease and poor cancer-related survival in this age group were surprising findings for us," lead author Prasad G. Iyer, MD, professor of medicine, Mayo Clinic, Rochester, Minnesota, stated in a press release. "We are also concerned by the trend of increase over the past four decades." Similar trends have been seen with colon cancer in young adults. In those cases, as with esophageal cancer in younger patients, symptoms are often attributed first to other causes, which contributes to delays in diagnosis and poorer outcomes. As reported recently by Medscape Medical News, cancer rates in adolescents and young adults increased by 30% between 1973 and 2015, driven in part by an increase in colorectal cancer cases. A 2019 report also showed an increase in the incidence of colorectal cancer among younger adults, whereas rates in older adults either stabilized or decreased in several places, including the United States and the United Kingdom. These increases and the increase in EAC rates in younger adults seen in the current analysis may be explained by several factors, Iyer told Medscape Medical News. What's Going On? In an email to Medscape Medical News, Iyers described likely contributors to these gastrointestinal tract cancers. "Certainly, combinations of increased rates of obesity, increased rates of reflux, and changes in diet or the microbiome may be playing a part," he stated. "Some of these will overlap with early-onset [colorectal cancer] as well." Esophageal cancer remains rare -- the 18,440 cases of EAC expected to be diagnosed in the United States this year account for only about 1% of US cancer diagnoses; however, the rate of 5-year survival is only 19.9%. The current findings thus underscore the need for younger patients to be aware of risk factors and symptoms, such as difficulty swallowing, chest discomfort, and unintended weight loss, the investigators note. Those with certain high-risk features, such as long-term reflux and a family history of esophageal cancer, should discuss screening with their healthcare providers, they add. Further, physicians should set a low threshold for suspicion of EAC in younger patients who present with dysphagia, Codipilly noted. "EAC is not a disease of the elderly, and outcomes for young people with EAC are dismal," he said. Those with dysphagia may benefit from an upper endoscopy, inasmuch as the procedure could rule out EAC or allow for earlier diagnosis at a more treatable stage, Codipilly noted. The study was funded by the National Cancer Institute and the National Center for Advancing Translational Sciences. The authors have disclosed no relevant financial relationships. Health Solutions From Our Sponsors
<urn:uuid:c1ee22ee-caf5-44c9-bab0-6f8f55dc0d87>
CC-MAIN-2022-33
https://www.emedicinehealth.com/script/main/art.asp?articlekey=250175
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.964127
902
2.484375
2
Of all the unfortunate places to be when you discover you have a blood clot, the worst has got to be 250 miles up in the sky, zooming around the world at 17,000 miles per hour aboard the International Space Station. But in a study published last month in The New England Journal of Medicine, doctors detailed how they treated one such unlucky case. The astronaut was participating in a study on vascular flow in space and did a routine ultrasound scan on their neck. From the ground, doctors who saw the images noticed that there didn’t appear to be any blood flow in the astronaut’s left jugular vein. (The patient remains anonymous for privacy reasons.) A followup ultrasound confirmed the problem: a venous thrombosis, or blood clot. It was the first one ever diagnosed in space. And it was quite the surprise, because the patient was showing no symptoms and had already been screened by NASA for predisposition to blood clots—and passed. Jugular clots have been associated with conditions like cancer, but an unprovoked clot in an otherwise healthy person is uncommon. For any patient, a blood clot could be a life-threatening discovery warranting an immediate trip to the hospital. That’s because a clot can break apart and move into the lungs, leading to potentially fatal blockages there. For an astronaut on the ISS, the mid-flight discovery of a clot would take on a whole new level of complexity. NASA couldn’t just bring the astronaut home immediately; reentry is a bit like being locked inside a washing machine, and the landing is a bit like a car crash. “We were very concerned that the decision simply to come home would take a patient who’s asymptomatic and doing fine and place them at risk of dislodging a piece of [the clot] and going to the lung or elsewhere,” says NASA flight surgeon James Pattarini, coauthor on the case study. Luckily, the ISS carries an onboard stash of medications, including an anticoagulant, or blood thinner. A thinner prevents the clot from growing and prevents new clots from forming. The patient began injecting it immediately—but the station had only a 40-day supply. So on a resupply mission, the doctors sent up an oral anticoagulant, which the astronaut took for several months before doctors deemed it safe for them to return to Earth. Within just 10 days of the astronaut arriving back on land, the clot had disappeared. Because this patient wasn’t at risk for blood clots in the first place, and because it went away once they returned to Earth’s atmosphere, the study’s authors think it has something to do with space itself. “Which really nails home that it’s the microgravity environment we think is playing a significant role here,” says Pattarini. “I think the biggest question is, if this has been occurring and it’s just something we’re going to routinely see in human spaceflight, what does that mean for doing these longer exploration-class missions?” To learn more about the unprecedented medical situation aboard the ISS, check out our interview with Pattarini in the video above. - Algae caviar, anyone? What we'll eat on the journey to Mars - A code-obsessed novelist builds a writing bot. The plot thickens - Snow and ice pose a vexing obstacle for self-driving cars - The best meal kit delivery service for every kind of cook - The fractured future of browser privacy - 👁 The secret history of facial recognition. Plus, the latest news on AI - 🏃🏽♀️ Want the best tools to get healthy? Check out our Gear team’s picks for the best fitness trackers, running gear (including shoes and socks), and best headphones
<urn:uuid:289824c2-c8a3-4375-9fb4-094875c917fd>
CC-MAIN-2022-33
https://www.wired.com/story/blood-clot-space-station/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00272.warc.gz
en
0.9476
811
2.953125
3
After considering the views of stakeholders, the government of Malaysia has pushed the year limit of its tobacco generational endgame law to 2007 from 2005, reports New Straits Times. Earlier this year, Health Minister Khairy Jamaluddin tabled a new Tobacco and Smoking Control bill to replace the current tobacco product control legislation under the Food Act 1983. Modeled on similar legislation in New Zealand, the proposal included a provision to ban smoking and prohibit the ownership of tobacco and vape products by those born after 2005. Postponing the year limit will allow more time for community education, a robust implementation plan and to ramp up enforcement, according to Khairy. The health minister has been pushing for the Tobacco and Smoking Control Bill in line with efforts to make Malaysia a tobacco-free country by 2040. He said cigarette smoking would cost the government MYR8 billion ($1.8 billion) to treat lung cancer, heart problems and chronic obstructive pulmonary disease by 2030. The cabinet gave the green light for the bill on July 14, and it will be tabled and put to a vote in the Parliament’s Lower House this week. BAT Malaysia said the proposed generational smoking ban is a prohibitive way to reduce the health impact of smoking and will only fuel the illicit tobacco market, which already accounts for almost 60 percent of tobacco sold in Malaysia. “It has never been tested in the real world, lacks any scientific evidence of effectiveness and is likely to be detrimental to our country’s health agenda,” BAT Malaysia Managing Director Nedal Salem was quoted as saying by The Edge Markets. He said the Ministry of Health (MOH) should pursue a science-based regulatory framework, informed by the positions of countries such as the U.K., where vaping is acknowledged as significantly less harmful and a viable alternative to reduce smoking prevalence. BAT Malaysia called on the MOH to include industry players in the overall consultation process in developing appropriate regulations for vapor products.
<urn:uuid:ef740508-f116-4028-81e7-f1d11f4c3952>
CC-MAIN-2022-33
https://tobaccoreporter.com/2022/07/26/malaysia-generational-endgame-revised-to-those-born-after-2007/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.949921
401
2.0625
2
[vc_row][vc_column][vc_column_text]Duplicating a post or page enables you to work on it without changing the original. We’ll teach you how to rapidly clone a WordPress page or post with all of its settings in this article. Why Should I Clone or Duplicate a WordPress Page/Post? For example, a sales page with a lot of information that can be reused, or a previous article that can be expanded into a new one. You might now manually copy and paste the post or page’s contents into a new draught. This does not, however, transfer your featured picture, post settings, SEO settings, or other metadata. Wouldn’t it be great if there was a simpler way to clone a post or page with all of its settings and content? With this method, you may simply modify a post and begin working on it right away. Let’s have a look at how to clone a WordPress post or page with a single click. Make a duplicate of a WordPress post or page You must first install and activate the Duplicate Post plugin. It’s free and easy to use. After activation, go to the Posts > All Posts page. Below each post title, you’ll see two new links to clone or create a new draught. Clicking on ‘Clone’ will just produce a duplicate post without opening it in the post editor. The ‘New Draft’ option duplicates the post and opens the duplicate version in the post editor, allowing you to begin working on it right away. The same choices are available for pages as well. The duplicate post plugin performs admirably. However, if you want to use it primarily to update already published posts, there is a better way to do so. Changing the Settings of the Duplicate Post Plugin The duplicate post plugin works right away and by default supports posts and pages. You may also configure the plugin to support custom post kinds, restrict to user roles, and select what to replicate when making a duplicate. Let’s have a look at all of these options. To configure plugin settings, navigate to the Settings » Duplicate Post page. There are three tabs on the settings page. The first tab allows you to select what to duplicate when producing a duplicate. Most websites should be fine with the default settings. You can, however, check the items you wish to duplicate and uncheck the stuff you don’t want to be copied. The next step is to navigate to the permissions tab. The plugin allows the administrator and editor user roles to produce duplicate posts by default. It also provides the duplicate post feature for post types such as posts and pages. If you use custom post types on your website, those post kinds will be displayed here. You have the option of enabling the duplicate post feature for those post kinds as well. Choose where to display your clone post links by clicking the Display tab. The plugin displays them by default on the post list, edit screen, and admin bar. Remember to click the Save Changes button to save your changes. It’s one of the WordPress Plugins that most people would want to use it. It Saves time, is easy to use, and convenient and it’s free.[/vc_column_text][/vc_column][/vc_row]
<urn:uuid:93cc1313-04cb-40a9-ab67-c7eeb9ac5c30>
CC-MAIN-2022-33
https://michaeltai.co/with-a-single-click-duplicate-a-wordpress-page-or-post/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.861679
717
1.507813
2
If you are trying to raise cattle or plan to at some point this article will walk you through the steps of giving your pasture a boost and providing a great pasture for the cows over time. The key to any successful homestead is to get the most out of every acre of the property and to keep the cost of operation to a minimum. This is especially true when it comes providing a pasture for the homestead animals. This article was designed to introduce the reader to ways to enhance the quality of grazing and not add to the budget. This very informative article is from Reformation Acres. The author of the post really wanted to share some valuable lessons that they learned about needing an actual pasture for the animals to graze instead of repurposing a grassy lawn. The tips include how to go about enhancing the pasture without having to spend any extra money. Benefits of reading and using the information found in the How To: Giving Your Homestead Pasture a Boost Discover how important it is that you have a real pasture set aside for you animals to graze on This article covers a very important topic regarding the raising of livestock that every homesteader needs to know. All of the information that is contained inside is presented in a way that is really easy to read. You will find numerous full color pictures inside that help to provide a good visual reference. By following the tips and advice in this article for giving your pasture a boost, you will end up with great pasture in a few short years.
<urn:uuid:37cac424-07e5-4935-96bb-6c4463e6b66b>
CC-MAIN-2022-33
https://thehomesteadsurvival.com/giving-homestead-pasture-boost/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.950411
307
1.8125
2
For All Types Homes THE RIGHT COVERAGE AT THE RIGHT COST Some of Texas’ largest cities also have the highest rates in the state. For Houston, insurance.com places the average annual home insurance rate at over $2700. The average rate is for a policy including $200,000 in dwelling coverage, a $1,000 deductible and $100,000 in liability coverage. This is about twice as much as the average HI rate for San Antonio, Austin and Dallas. As a point of clarification, the price of something is not the same as its cost. For example, let’s say I scored a pair of designer sunglass at a clearance price of $20. However, I had to drive to the outlet mall which is two hours away. Assume an hour of my time, typically at work, is worth $30. That means the cost of the glasses is actually now $80. The price of the glasses plus the two hours of my time, and this doesn’t include the price of gas, is the cost. This same principle applies to the purchase of your HI insurance. When comparing the various home policies, there are many factors to consider in addition to price. Things you may consider include who your agent/ broker is, types of insurance policies offered, the value of your home, etc. Pay attention to deductible amounts, coverage limits and the definitions of coverages and exclusions. Different insurance companies, for instance, may have different definitions of what constitutes a “flood” or “wind damage”. Terminology contained in insurance policies impacts whether you have too much or too little coverage and whether you lose or save money. As a case in point, we’ll use the terms “replacement cost” and “actual cash value”. These are two different types of coverages. Replacement cost coverage is what you pay to replace or rebuild your home based on current construction costs, not your property’s market value. Actual cash value is what you pay to replace or rebuild your home minus the depreciation. Keep in mind that even the most comprehensive insurances policies have exclusions and limitations. Even so, having the right coverage(s) can have several benefits. But, how do you know what the right coverages are? The Right Coverage. The Right Price. The Right Value FINDING AN INSURANCE AGENT If you’re on the market for insurance, of any type, you’d be smart to shop around. Other than the purchase of our home itself, the purchase of homeowner’s insurance is a major decision. Homeownership is one of life’s major milestones. Protecting such an important investment, correctly, is key. Nowadays, finding an agency is as easy as point and click. There are hundreds of websites dedicated to helping consumers compare insurance agencies and their rates. Information seeking will help you find the homeowners’ policy that best meets your needs. If you’re not keen on sifting through internet sites, you can always ask family, friends and neighbors for recommendations. Homeowners insurance (HI) policies vary widely from state to state and even city to city. For this reason, it’s important to understand that not all coverage is the right coverage. A good insurance agent will help you sort through your policy options and answer your questions. They will also make themselves available in the event you need to file a claim. Finding an agency and the right agent takes a bit of effort, but it will save you money in the long-term. Experts recommend getting anywhere from 3 to 5 quotes. Getting multiple quotes puts the power in your hands as a consumer. Why? For one, it helps you make sure you’re dealing with a reputable company. I often recommend folks check out the Better Business Bureau website to view company ratings. Those businesses with higher ratings tend to be fair in their dealings with consumers and provide top-notch customer service. Second, multiple quotes give you leverage to negotiate with HI providers. Third, and related to my previous point, it can save you money. Protection For Texans TYPES OF POLICIES AND THEIR COVERAGES Texas offers two types of homeowner’s insurance policies: comprehensive coverage and named perils coverage. Comprehensive coverage offers protection covering all causes of loss, except any specifically excluded in the policy. On the other hand, named perils coverage will only cover causes of loss which are specifically outlined in the policy. Based on the type of policy you choose, there are different types of coverages. Coverage for your personal property, for example, is usually limited to a percentage of your dwelling coverage. If the value of your personal property exceeds the coverage provided by your HI policy, you may be able to purchase additional protection, but this may increase your premium. Most policies provide coverage for losses caused by everything from theft to explosions! Being that you are a Houstonian, you are well aware that Houston is subject to floods, hail and windstorms. Unfortunately, the majority of home insurance policies don’t cover any of these. Therefore, in addition to an HI policy, you may be required by your lender to purchase flood insurance. You also have options to buy hail and windstorm coverage through the Texas Windstorm Insurance Association (TWIA). Refer back to the example of price vs. cost, except think of it in terms of insurance. Suppose you bought your policy solely based on price. In fact, you didn’t even bother to read the policy because it was so incredibly cheap. As a result, you failed to realize that your HI policy doesn’t cover losses caused by hurricanes because you live on the Gulf Coast. Your home was one of the properties destroyed by Hurricane Harvey. Nothing was salvageable and you were forced to rebuild. Now, what is the true cost of that policy? The benefits of having the right coverage(s) are illustrated in the above example. Knowing your policy’s terms, conditions and coverages is key to having the protection you need when you need it. Also, although at face value a policy may seem less expensive, it may not be. In the long-term, you save by buying the right coverage. Homeowners Insurance Houston – Protecting Dallas, Austin & San Antonio, Texas I’ve written in the past about home insurance in Texas. It’s no secret that homeowner’s insurance can get ridiculously expensive depending on where you live. If you live anywhere in Texas, that’s not El Paso, you’ll likely end up paying more for insurance. Notice, I said ‘likely’. That means it may or may not happen. THE FLIP-SIDE OF HOME INSURANCE COVERAGE We’ve all done it. At some point or another, we’ve all bought something we didn’t need. Oddly enough, this can happen when we’re buying insurance policies. When buying a policy for your home, make sure you aren’t paying for coverage(s) you don’t need. If you don’t live in a neighborhood that has high crime and vandalism rates, you may not need the higher levels of personal property protection offered by the insurance company. Foregoing or eliminating unnecessary coverages may effectively reduce your premium. There is such a thing as having too much homeowner’s insurance coverage. An insurance policy that’s right for you will provide you with adequate protection while still being within your financial means. Life has enough challenges without the added stress that happens when there are emergencies and natural disasters. Be your own advocate. Ask questions, get quotes from Homeowners Insurance Houston and do your research. Next Steps...Become A Customer Request a home insurance quote Texas. We promise it's easy.
<urn:uuid:7bb48ce6-3ade-4bf1-94cb-ce7ae3eeb17a>
CC-MAIN-2022-33
https://homeownersinsurance-houston.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.951032
1,633
1.617188
2
A client arrives at our kennel with his Labrador Retriever, and as usual, we spend a little time talking with the owner and observing the dog. We notice that often, when the dog comes and sits by the owner, the dog puts his paw on top of the owner’s foot. It seems so innocent, but it is happening with consistency. Sometimes the dog will also walk around the owner stepping on the owner’s feet as he goes. Asking if this is a common behavior, the client says, “Yes, he does that quite a lot.” Then we ask what other issues the client has been experiencing. “Well,” the client explains, “He doesn’t come when I call him, he often runs away, he knows his obedience commands but is very slow to respond to them, he jumps on my wife and kids, and we’re just really a struggle to control him.” We nod our heads, knowingly. We could easily have listed these problems before the client said a word. But how did we know? It all started with the paw on top of the client’s foot. What does it mean if my dog steps on me? What I am about to tell you will be troubling to some of you. If you want to hear that your dog just loves you and is giving your feet a hug, I’m afraid you’re reading the wrong post. But fear not, there are plenty of other posts out there that will tell you exactly what you want to hear. But if you want to know what really drives a dog to step on you, to put his/her paws on top of your feet, then you’re in the right place. I am a professional dog trainer. My husband and I train retrievers for hunting and competition and have been training for over 30 years. So, while my advice might be aimed strongly at those of you who own retriever breeds, it often applies to other breeds also. Because it all ties back to dog psychology. Why do dogs step on your toes? Dogs are pack animals. This is something we can never forget if we want to understand our dog’s behavior. As pack animals, they are constantly testing the pack to find out where they rank. If you own a dog, your family is by default the pack. Some dogs are very alpha, and they want to be the top dog in a family. Those dogs are challenging because they test you and your family often in hopes of rising through the ranks. But every dog will test the pack to figure out rank. It is not so much about being number one as it is about understanding their rank and role in the pack. Another important tidbit of dog psychology is that height is super important in a pack. It is usually the tallest dog that is the alpha dog. This is one reason why dogs will raise their hackles when they encounter another dog that is taller than they are. They want to appear taller, and the hackles give them a couple of inches of height. But dogs don’t just look at height as human’s do. Because a dog will generally never be taller than an adult human. So, they look for other ways to make themselves seem bigger or taller. One-way dogs do this is by putting a paw on top of the human foot. That’s why your dog steps on you, to gain height and dominance over you. Don’t believe me? Well, try this little experiment. The next time your dog puts his/her paw on top of your foot, slide your foot out from under the dog’s paw and gently lay your foot on top of the dog’s paw. Most dogs hate this. They will quickly move their paw out from under yours. They know this is a dominant act and they don’t want to be dominated by you. Dog dominance equals lack of control The hard part to understand is that this one little behavior is leading to many other obedience and respect issues in your home. If your dog is allowed to dominate you by stepping on your feet, or climbing on your when you are laying down, your dog is going to have a problem respecting you overall. Because your dog has determined that he/she is higher in the pack than you are. This is often a huge problem for families that have young children. Because size and height are so important to a dog, a dog will often respond great to either the adult male or female in the home. But he/she will not listen to one or more of the children. This is because your dog has adopted your family as his/her pack. And as a result, your dog will regularly test the members of the pack to figure out where he/she fits in and who he/she must listen to. Often the dog finds his/her spot just under the adult male or female of the home. Sometimes between the two adults depending on the temperament of the individuals. At times, the dog will listen to one of the children, but not any of the other children. It all depends on how each person acts and reacts to the dog’s testing. How do I stop my dog from stepping on my feet? If you want to stop your dog from stepping on your feet, your dog must respect you. Once your dog respects you, he/she will respond to your commands. So the first step is to stop letting your dog step on your feet. Thankfully, this is an easy fix. Start being ultra-aware of your dog’s behavior in this area. Each time your dog puts his/her paw on your feet, push the paw off and say NO. Or you can move your foot so that it is on top of your dog’s paw. This will alert your dog to the fact that he/she is not allowed to dominate you in this way. Addressing other dominance behaviors If your dog has been doing this behavior, it is quite likely that he/she has been dominating you in other ways also. So, you need to address these other dominant behaviors also. Check out Why won’t my retriever listen to me? Jumping on you or others Jumping on people is a dominant dog behavior. If your dog is jumping on you or other members of the family, you must take steps to end this behavior now. This dominate behavior is dangerous, especially to the most vulnerable members of your household -the young or the elderly. Stopping jumping is much harder than stopping your dog from stepping on your feet. To stop your dog from jumping on you, you must be willing to use physical force. For big dogs, like retrievers or other working dogs, a knee to the dog’s chest while he is jumping on you and saying a command such as OFF is very effective at stopping jumping. Don’t worry, retriever breeds are built strong and tough. This will not hurt your dog. If the jumping is happening to someone who is not able to do what is physically necessary to stop it, a long lead can be used and when the dog goes to jump on that vulnerable person, you pull hard on the lead literally flipping the dog backward. The person that was going to be jumped on should say the OFF command in a stern voice. You can even take this a step further by having the person who is unable to exert the force tease the dog, encouraging him/her to jump on them. This will allow you to get some good, impactful corrections. Neither of these corrections will hurt your dog. Well, it probably will hurt his/her pride, but that is all. But teaching your dog this important lesson may lessen the chance of one your most vulnerable family members will be injured by your dog. Jumping is a dominate behavior, and it is always aimed at a specific person. That is why, while you may stop your dog from jumping on you by kneeing him/her, your dog will likely still jump on others. Each person must correct the behavior to earn the dog’s respect. Biting or nipping at your hands or feet A dog that bites your hands or feet is not showing you love. And he/she is not just playing with you. Dog’s bite and nibble on the other dogs to show dominance. We have seen clients come to our kennel with deep sores and bleeding scratches on their hands. Do not allow your dog to do these dominant behaviors to you. Learn how to stop your dog from biting you. Won’t SIT next to you Lastly, if you are having problems teaching your dog to SIT at HEEL, this may be a dominance problem. Dogs that are very dominate do not want to SIT next to a person they consider lower in rank. When in a HEEL position, they flare, move their backend so that it is away from your legs and so they are facing you a little more. If you notice this behavior, take time to work on this specific problem. When your dog flares from you, say NO, and take a step or two backwards and command HEEL. Don’t give up until you get your dog to sit straight next to your side. Be consistent. Don’t let your expectations down just because it is a struggle. It will get better if you are consistent. Learn more in How do I make my hunting retriever more obedient? Final thoughts on why does my Lab step on me? Having your dog step on you or put his paw on you may seem like a minor infraction. But it is a steppingstone for your dog to inch his/her way up the pack (your family). And you will see other dominant behaviors as a result. If you are aware of what your dog is doing, it is easy to put a stop to it right away and reinforce your place as pack leader. If you are still struggling, I’m here to help! You can email me (email@example.com) or just give me a call (651-303-6459). I would be happy to discuss your goals for your retriever and tell you about the programs I offer. Until next time happy retrieving.
<urn:uuid:0228becf-dcfb-4ff5-a292-10a3c914a458>
CC-MAIN-2022-33
https://ottertailkennels.com/why-does-dog-step-on-me/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.963151
2,144
1.789063
2
Adverse Childhood Experiences (ACEs) are severe childhood traumas that can result in toxic stress, causing harm to a child’s brain. Children that experience trauma may have poor concentration, heightened aggression and anxiety. This toxic stress may make it difficult to learn, play healthily with other children, and can result in long-term health problems as adults. In response to the regional need in addressing ACEs, Michigan Health Improvement Alliance (MiHIA) with collaboration with our partners established the ACEs Strategy Map, a valuable regional resource. This strategy map contains information and plans that will assist in outlining which strategies our region will choose to advance and focus on. We have a great video that will walk you through the map and approach to developing the map. To learn more about the ACEs Strategy Map, it’s location, and objectives to support the long term strategic collaboration, click here. In December, we gathered during the 5th Annual GLBR Symposium: Aligning & Connecting Expertise Regarding Trauma-Informed Work to launch Strategy Map. During the symposium, an esteemed collection of presenters took place in short, yet highly informative “lightning talks,” focusing on ACEs. HANDLE WITH CARE Mary Mueller, with the Michigan Department of Human Health- Public Health, shared the program Handle With Care, a collaboration between law enforcement, educators, and mental health professionals. Working together to support kids who have trauma exposure, the process works like this: Information- Law enforcement collects the child’s name and school information when responding to a call in their home. They can transmit a notice to share with the school, making staff aware that the child should be treated with a “Handled With Care” approach. A data system helps make an informed direct contact with the school or intermediate school district. Response- Shared with the child’s teaching team and support personnel to observe, support, and refer. Details of the incident will not be shared, but the information helps support a positive response for the child. Intervention- Teaching team and support personal can link to mental health services within the building, bringing resources where the child has access to them. Primary stakeholders take interest and come together to talk through the steps to support the process. Handle With Care improves a supportive learning environment to keep kids in school, helping them become productive citizens and flourishing adults. Funding is available for implementation training with an overall goal of positively impacting children and improving relationships across the community. OUR COMMUNITY LISTENS The second Lightning Talk of the day included remarks from Misty Janks from Our Community Listens, a national for-good organization working to build connections and better relationships. Through a three-day class and the power of empathetic engagement, they offer distinctive learning experiences that transform individuals and communities. By using tools that encourage and enhance human connection, Our Community Listens is fostering a society where care and compassion rise above indifference and prejudice-person by person, community by community. Misty states that through their unique programming, behavioral change can happen more quickly. “We focus on trauma-informed connections, caring for people first, by giving people tools for true human connection. The truth is, hurt people continue to hurt people.” To learn more about the program, please visit: www.ourcommunitylistens.org Sarah Owens, the Resiliency in Students and Educators (RISE) coordinator from SVSU, spoke about their multidisciplinary training and coaching model designed to strengthen school-wide resiliency. RISE training addresses issues shared by local schools and guides understanding around the complexities of toxic stress and trauma exposure while providing strategies to improve outcomes. Through this program, participants will increase both knowledge and application techniques in supporting student and educator wellbeing, learning and growth, directly increasing academic scores, and decreasing behavior referrals and suspensions. Owens notes that “regulated teachers who are available to teach, and regulated students available to learn are not who we have in front of us any more… the people we are trying to serve has changed.” Through teaching and coaching, Owens says their “Number one goal is to help schools be able to go back to the basic component of human connection…unless teacher wellbeing is held just as important as student wellbeing, nobody is going anywhere.” The rise Summit is happening on the campus of SVSU on March 19th and 20th. For more information, visit them online: www.svsu.edu/rise/ CMU COLLEGE OF MEDICINE Furhut Janssen DO, FACN, is the Director of Behavioral Health, Psychiatry Residency Training Program, and Child and Adolescent Psychiatry Fellowship for the CMU College of Medicine. She shared with the audience how CMU College of Medicine is bridging an access gap and a provider gap with two new child psychiatry fellows that will start community outpatient work in January. Through this new fellowship, it’s been discovered that medical students and residents may know more about trauma than currently practicing physicians, making an opportunity for new residents to be a vocal part of the care team. “They may see a mile-long medication list, and if they take the time to do a trauma history, they probably are going to find trauma and be able to educate.” Future service delivery will focus on: - Staying trauma-informed with realistic expectations - Helping children and strengthening families - Building capacity for needed mental health services - Removing local service deployment - Improving mental health by using a collaborative approach Join us on March 18th for a morning conference with Dr. Heather Forkey, Associate Professor of Pediatrics and The Joy McCann Professor for Women in Medicine at the University of Massachusetts Medical School, at the Horizons Conference Center in Saginaw. She will be focusing on Recognizing and Responding to Trauma with Clinical Tools to Promote Resilience Medical providers and clinical partners practicing in health care settings recognize the pressing needs for professional education to address community priorities for treatment and prevention of child trauma and ACEs-related health and social challenges. Primary care providers and teams are not fully aware of how ACEs-related toxic stress and trauma lead to physical and emotional illness, how to put this science into practice, and/or how to share prevention strategies to help patients heal and build resilience. We will explore the pediatric medical provider’s role in identifying and supporting attachment and resilience in daily practice, strategies for the recognition of trauma symptoms, and practical tools to respond in the busy clinical setting. The program is perfect for Family Medicine Physicians and Teams including: Pediatricians, PA, Nurses, Psych, Counselors, Social Workers. • Define the 4 characteristics of a caregiving relationship necessary for healthy attachment • Recognize the most common symptoms of trauma in children • Identify seven resilience skills that should be supported in children • Formulate a strategy to respond to children who present with trauma symptoms Register Online at mihia.org/events/upcoming-events
<urn:uuid:d8702237-4005-4f03-ac9a-ca2d73189286>
CC-MAIN-2022-33
https://mihia.org/aligning-connecting-expertise-regarding-trauma-informed-work/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.938004
1,459
3.34375
3
A recent up-swing locally in credulous claims about vaccines and the diseases they address has prompted me to list a small number of resources that I have found to have readable explanations of medical information for non-medics and non-scientists. My lists are not complete or ’definitive’, nor do I claim to be some authority on things medical. I’m just sharing a few sites I have used in the hope that they are useful for others who want find medical information. I have not listed sites that deal with medicines per se; these sites are focused on diseases. Don’t forget that your best source of information is your registered medical practitioner. (I emphasise registered medical practitioner to distinguish them from those offering ’natural remedies’ and those whose style themselves as doctors but are not in fact registered practitioners.) Useful medical information websites Others are welcome to recommend other sites in the comments below. The links are on the title of the sources. Major international sites Be aware when reading overseas sites that some drug names, etc., are local; peculiar to (say) the USA. MedlinePlus is a service of the US National Library of Medicine, the same organisation that provides Medline, the widely-used academic research literature database. One thing I like about this source is that it links on to many other resources. The Mayo Clinic is one of the very top medical research hospitals in the USA, along with John Hopkins, which also hosts a useful medical information site. Most people will know the CDC from TV and movies. It is the USA Center (not Centre!) for Disease Control And Prevention. This site also is a good source of statistics on disease in the USA and elsewhere. No international list would be complete without mentioning the WHO, the World Health Organisation. They are focused on ’the big picture’ with data, summaries and reports on major health events or the big international projects. Unfortunately their website can sometimes be a little confusing. One reliable way into information is to click on ‘Health Topics’ on the left, then choose from the list. Using their text search box should present the health topic page for that disease as the first item. New Zealand websites I’ve not elaborated on these, as locals will easily recognise their host organisations, etc. IMAC (Immunisation Advisory Centre) These sites contain useful information, but are more informal and tend to be presented in a forceful style that may not appeal to some. Some of the ’lesser’ sceptical sites can be a little too zealous; those that I have listed should be reasonably balanced. (I don’t care for sites that won’t admit where things have gone wrong, for example.) As sceptical websites, they focus on picking up poor practices or unsound claims and exposing them. If something is smacked down in these sites, chances are good it is unsound (often, very unsound). There are many other sceptical sites like these. I’ve only listed a few I am familiar with that are run by medically-qualified people. While these sites are rarely wrong in any serious way, cautious readers can check their conclusions against the sites I listed earlier. Others are welcome to suggest other highly-regarded sceptical websites in the comments. A well-known blog run by a team of medical professionals. Their regular long-term writers are good, although on rare occasions I find myself sceptical of a handful finer points. (I’m nitpicky!) This site covers a wide range of topics. Dr. Ben Goldacre is a former medic, now a British journalist with a large following. I’m less familiar with this site, but he comes with a good reputation. Orac is the (pseudo)anonymous alias for the medical professional who writes the Respectful Insolence blog, which is well-known. His articles tend to be forceful and long. (Brew a cuppa before you start!) He mainly covers vaccine-, autism- and cancer-related issues. And homeopathy, with the odd other thing thrown in and can be quite entertaining. He once wrote about a blue man. Also an orange man. Quack Watch (Dr. Stephen Barrett; HON code accredited) A large site, with a lot of hosted material and a long history. I haven’t visited this site in a while. HON accreditation (Health On the Net) While checking the sites above and others, I found a number now feature an icon from the NGO Health On the Net which offers international accreditation for health websites. HON is based in Switzerland, with close ties to the University Hospitals of Geneva and the Swiss Institute of Bioinformatics. It has a number of collaborations with research and medical groups around the world. This ’badge of approval’ is an acknowledgement that the site is open to being checked by the HON team and claims to adhere to the HON code of conduct. (I am not familiar with the standards they assess these the registered websites; others are welcome to speak up on this.) The icon on a health information website should be linked to a secure page on the http://www.hon.ch/ website. If it is not, it is not genuine. It’s simplest to stick to the sites I listed in the first section to avoid the hassle of having to sort out what is right or wrong, but if you must explore the wider (and wilder) internet… ’good luck!’ It’s a messy place. I don’t mean to be patronising in writing these last words for those exploring other sites (below), but as physicist Feynman is famous for having said, not fooling yourself is the bigger part of the trick. Until you are at a comparable level to medical researchers, you’re exceptionally unlikely to be able to make a better ’call’ than they can. Sites that encourage their readers to think that they can out-call medical researchers are being deceitful in the same way as it’d be deceitful to encourage someone to think that they can ’instantly’ out-cook a trained gourmet chef or ’instantly’ out-build an experienced joiner. Update (15th July 2010) I am not a medical practitioner; my specialist area is computational biology. Part of my work involves the molecular basis of some human diseases. Other recent articles on Code for life:
<urn:uuid:263b990f-059f-4821-be7b-0638acc502cf>
CC-MAIN-2022-33
https://sciblogs.co.nz/code-for-life/2010/03/18/sources-for-medical-information-for-non-medics-and-non-scientists/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00272.warc.gz
en
0.940304
1,373
2.84375
3
23Tennessee Department of the Military Rutherford County’s JROTC program teamed up with the Tennessee Army National Guard to host the JROTC Cadet Leadership Challenge at various locations throughout Murfreesboro from June 3-10. CLC is a weeklong course designed to challenge students physically and mentally while incorporating JROTC principles and values. High school sophomores, juniors, and seniors are provided a safe military setting to develop leadership, teamwork, and citizenship skills, while being engaged with peers in activities aimed at building confidence and discipline. David Escobar, an upcoming senior at La Vergne High School and JROTC cadet, recently enlisted in the Tennessee Army National Guard as a health care specialist with plans to further his education and start a military career. “The JROTC program has given me the chance to get out of my comfort zone and make connections,” said Escobar. Training included field survival skills, rafting, canoeing, rappelling, water survival, orienteering, rope bridging, and a Field Leadership Reaction Course. Cadets also received a tour of Middle Tennessee State University and a seminar on scholarship opportunities. Following that, there were intramural competitions in various sports, a flag retirement ceremony, and a pass in review graduation. The men and women that help mentor the students consist of Senior ROTC Cadre from Middle Tennessee State University and Tennessee Army National Guard Soldiers. “I enjoy the opportunity to mentor and influence tomorrow’s leaders,” said Staff Sgt. Mistee Harris, Tennessee Army National Guard Recruiter. Organized under the authority of the 1916 National Defense Act, the Rutherford County High School’s Junior Reserve Officers’ Training Corps program was first established in 1967 at Central High School. Since then, the program has expanded into eight area high schools with Rockvale High School opening in the 2019-2020 school year. “We currently have 1,265 students enrolled and we expect that number to rise next semester,” said Lt. Col. Russell Rector, Senior Director for Rutherford County’s JROTC. A JROTC cadet is under no obligation to join the military. The JROTC program is a credited course given during regular school hours that prepares students for life, not the military, such as developing winning habits, job interviewing, financial planning, test taking, and overcoming fears. “The impact of this camp can be measured in the success stories of overcoming fear,” said Sgt. 1st Class Jesus Merino, Senior Leader for the JROTC in Rutherford County. “Learning to make lifelong friendships and trust others by allowing them to help.
<urn:uuid:0d56e09a-5f67-4bd0-9392-6934221b9a38>
CC-MAIN-2022-33
https://rutherfordsource.com/rutherford-county-schools-jrotc-hosts-annual-summer-camp/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.95642
559
1.539063
2
Electrode system for acquiring electrical signals from the heart A wristband having inner and outer sensing electrodes capable of acquiring signals from bipolar limb leads and being electrically associated with electronics capable of processing such signals in a form representative of the electrical activity of the heart. The inner electrode is in continual electrical contact with the skin of the wrist upon which the band is worn. The outer electrode is isolated from the inner electrode and includes an outer portion exposed for contact by the fingers of the wearer's opposite hand. When such finger contact with the outer electrode is made, the bipolar circuit is completed and the ECG skin potential signals are sensed at the electrodes. The signals are processed to produce a digital indication of heartbeat rate, or other signal representative of heart activity. Many biologic, especially electrical, parameters are measured by the difference in electrical potential across specific organs or organ systems. Specifically, electrocardiograms (ECG) and other electrical parameters of cardiac activity require two or more electrodes or sensing devices placed so that they are on each side of the electrical axis of the heart. The basic arrangement, known as Lead I, consists of strapping an electrode to each wrist so as to measure the electrical potential difference across the heart. While such an arrangement is perfectly acceptable for clinical testing, it is inconvenient and impractical, if not impossible, in other circumstances such as during routine exercise programs. A growing number of individuals are performing exercise programs regularly or intermittently. It is generally acknowledged that the heart rate is the best indicator of the value of such exercise to the cardiovascular system, i.e., when enough effort is expended to be useful and when so much effort is expended as to be dangerous. Thus, as reported in L. R. Zohman, Exercise Your Weight to Fitness and Heart Health, 16-18 (CPC International, 1974), it is important in an effective exercise training program that there be a gradual increase in heart rate until a target rate of 70 to 85 percent of the maximum attainable rate (depending on age and physical condition) is achieved. A period of 20 to 30 minutes of exercise at the target level will then provide a significant conditioning effect on the cardiovascular system. While the average target zones for different age groups are readily available (for an average 40-year old male it is, for example, 128 to 155 beats per minute), it is apparent that most individuals lack the skill or inclination to take their own pulse at various intervals during the exercise period to ascertain whether their heartbeat rate falls within the target range. The difficulties and inconveniences attending the attachment of bipolar electrodes to the wrists or to other spaced points on opposite sides of the heart and the obvious problems in exercising with such electrodes in place have lead others to pursue the development of mechanical devices for sensing the pulse and then converting the mechanically-sensed pulse to an electrical signal for processing and display. U.S. Pat. No. 3,807,388, for example, discloses a heartbeat rate monitor in the form of a wrist-watch having a transducer mounted in the wrist strap to detect the pressure change (pulses) and convert them to electrical signals. Apart from the fact that differences sometimes exist between pulse rate and true heartbeat rate, substantial problems exist in providing a transducer which is easily positioned for proper operation and which is capable of accurately sensing the pulse for any of a variety of users. Therefore, despite the availability of technology and electrical hardware for processing and displaying in digital form the pulse rate of a patient once that pulse has been detected by a suitable pressure transducer, devices in wristwatch form or in other convenient portable form have not achieved widespread use or substantial commercial availability. Other patents illustrative of the art are U.S. Pat. Nos. 3,863,626, 3,802,698, 3,948,250, 3,586,835, and 3,717,140. Reference may also be had to V. Elings et al, A Cardiotachometer which Calculates Rate Digitally, IEEE Transactions on Biomedical Engineering, 468-470 (November, 1973), and Hartley, Analogue-Display Rate Meter Build Around Digital Switching Elements, Medical and Biological Engineering, 107-108 (January, 1976).SUMMARY An important aspect of this invention lies in the discovery that the problems of detecting differences in electrical potential across the heart as a direct indication of heart activity, in a manner convenient enough to use by someone wishing to check heartbeat rate during an ordinary exercise program, or desiring to display and/or transmit his electrocardiogram, may be achieved by locating both of the skin electrodes upon only one of the wearer's wrists and by constructing the wristband so that one of the two electrodes remains in electrical contact with the skin of that wrist. The other electrode, which is exposed along the outer surface of the band (either the strap itself or a casing supported by the strap) remains quiescent until such time as the wearer touches that electrode with the other hand. Such contact completes the circuit with the inner electrode in contact with the wrist and the outer electrode in contact with the fingers of the other hand. The electrical ECG signals picked up by the electrodes are then processed and displayed or transmitted utilizing any of a variety of known circuit arrangements and components. In one convenient form, the band includes a casing which contains all of the circuit elements (other than the electrodes) and digital display means such as light-emitting diodes for visually presenting heart rate in beats per minute. Alternatively it may be desirable to develop and/or transmit a signal representative of Lead I of the electro-cardiogram for such purposes as obtaining advice regarding medicines taken for disordered heart rhythms; evaluating the effect of treatment in certain heart disorders; and/or evaluating the function of a cardiac pacemaker. When transmission, such as over a telephone, is employed it is possible for professional medical evaluation to be made at a remote location, thereby saving time and increasing convenience. Further objects, advantages, and embodiments of the invention will appear from the drawings and specification.DRAWINGS FIG. 1 is a perspective view of a heartbeat rate indicator embodying the invention, the indicator being illustrated as it is being used to display heartbeat rate in beats per minute. FIG. 2 is a simplified block diagram of the heartbeat rate monitor. FIG. 3 is a fragmentary elevational view taken partly in section and showing the electrode construction of the heartbeat rate indicator. FIG. 4 is a view similar to FIG. 3 but depicting another embodiment of the invention.DESCRIPTION Referring to FIGS. 1-3, the numeral 10 generally designates a heartbeat rate indicator in the form of a wristband having a strap 11 and a casing 12. The strap has electrically-conductive inner and outer layers 13 and 14 separated by an electrically-insulating central layer 15. When worn on the wrist, in the manner generally depicted in FIG. 1, only the conductive inner layer 13 is in contact with the wrist. Both the outer layer 14 and the casing 12, which may be in electrical contact with each other, are electrically isolated from the inner layer 13 and from the wearer's wrist 16. The conductive inner layer 13 serves as one electrode of a bipolar electrode system, the other electrode of the system being outer layer 14. As shown in FIG. 1, the strap is of sufficient width so that its exposed outer surface may be easily contacted by the fingers of the wearer's other hand 17 without at the same time causing direct contact between those fingers and wrist 16. In the illustration given, the band is shown as it is being squeezed gently between the thumb 17a and index finger 17b and, although such a procedure helps assure effective electrical contact between the inner electrode and wrist 16, and between the outer electrode and fingers 17, it is to be understood that other fingers 17 might be used to contact the outer surface of the band or that, if desired, only a single finger, such as index finger 17b, might be used for that purpose. An important aspect of the invention is that it forces a wearer to hold his arms fixed during the measurement so as to remove artifacts, such as muscle movement, that might cause error. The electrical circuitry for the heartbeat rate indicator may be similar to that disclosed in U.S. Pat. No. 3,807,388, or in other references previously identified. As diagrammatically depicted in FIG. 2, electrical signals detected by electrodes 13 and 14 are supplied to a sensing circuit including amplifier 18 and transmitted by way of shaper circuit 19 to an AND gate 20 to which a signal derived from divider 21 and oscillator 22 is also supplied. The oscillator may be crystal-controlled for operating at 16.384 kHz, and the divider circuit 22 may supply an output signal of 0.5 Hz. The output signal of divider circuit 21 may also, if desired, be supplied to a binary coded decimal to decimal decoder, to provide an output for display of seconds and, by way of a further divider circuit, to other decoders for the display of minutes and hours, respectively (not shown) where it is desired that the wristband indicator display time as well as heartbeat rate. Specific reference is made to U.S. Pat. No. 3,807,388 for such a modification. For a lost or gained pulse from divider 21 to be insignificant, the frequency of the signal supplied by the divider to gate 20 should be, for example, 100 times the fastest heartbeat rate of say 150 beats per minute, so that the frequency required is about 250 pulses per second. To derive such a signal the divider 21 can be intercepted at the appropriate point to give an output of 256 pulses per second, this signal being supplied to the gate 20. The output of the gate 20 is supplied to an accumulating counter 23, the number of pulses at the minimum heartbeat rate of say 30 pulses per minute determining the capacity of the counter 23. To reduce the possibility of occasional random heartbeat periods being displayed, it is preferable for the output of the shaper circuit 19 to be divided in frequency by a divider 24 being supplied to the gate 20 so as to average the measurement over several heartbeat periods. This requires a corresponding increase in the capacity of the counter 23. A further output of the gate 20 is connected to a reset circuit 25 which resets the counter 23 at the end of each counting period. The number of pulses counted in each counting period varies inversely with the heartbeat rate and hence a suitable readout circuit 26 may be provided to give signals corresponding to 100's, 10's, and units of heartbeat rate for supplying to an array 27 of light-emitting diodes. Upon completion of the circuit in the manner depicted in FIG. 1, the light-emitting diodes display the wearer's heartbeat rate in beats per minute through window 28. It will be understood, of course, that other display means such as liquid crystals might be used. The method of use of the device is believed apparent from the foregoing. The wearer simply places the wristband device on his wrist 16 before commencing an exercise program, a sports activity, or any other activity for which heartbeat rate monitoring is desired. By attaching the device to his wrist 16, the user pre-positions inner electrode 13 in direct electrical contact with one limb, that is, a part of the body on one side of the electrical axis of the heart. Completion of the circuit does not take place, however, until the user, desiring to obtain a visual digital indication of his heartbeat rate, touches the outer electrode 14 of the same wristband with a finger (or fingers) of his other hand. The effectiveness of the electrical contact is improved by slight pressure, as already described, and is further enhanced by perspiration developed as a result of the physical activity involved. The embodiment illustrated in FIG. 4 is similar to the one already described except that the outer electrode takes the form of a conductive push button 29 carried by the casing portion 12' of the wristband device. The inner electrode 13' is similar to previously-described electrode 13, and an insulating layer 15' extends over electrode 13' to insure that the inner electrode contacts no portion of the wearer's body other than wrist 16. In addition to serving as the second electrode of the bipolar electrode system, button 29 may be arranged to actuate a switch when depressed to couple the power source to the display circuits, which may include light-emitting diodes, only when the wearer desires a readout. While in the foregoing an embodiment of the invention has been disclosed in considerable detail for purposes of illustration, it will be understood by those skilled in the art that many of these details may be varied without departing from the spirit and scope of the invention. 1. An electrode system for sensing heart activity comprising a wristband adapted to be worn on the wrist of one hand and having inner sensing electrode means directly engagable with such wrist; insulating barrier means extending over said inner sensing electrode means for shielding the same against contact with any part of the wearer's body except said wrist; outer sensing electrode means carried by said wristband and electrically isolated from said inner electrode means by said insulating barrier means; said inner and outer sensing electrode means being disposed on oppositely-facing sides of said wristband with said barrier means interposed between said inner and outer sensing electrode means; said outer sensing electrode means being exposed and adapted for selective contact by the fingers of the wearer's other hand; and sensing circuit means disposed in said wristband in electrical circuit with said inner and outer electrode means for sensing electrical signals derived therefrom that are representative of the electrical activity of the wearer's heart. 2. The electrode system of claim 1 in which there is measuring circuit means disposed in said wristband and responsive to said sensing circuit means for measuring heart activity. 3. The electrode system of claim 2 in which there is display circuit means disposed in said wristband and responsive to said measuring circuit means for generating a visual signal representative of the electrical activity of the heart. 4. The electrode system of claim 3 in which said measuring circuit means measures heartbeat rate and said display circuit means generate a visual signal representative of heartbeat rate. 5. The electrode system of claim 4 in which said wristband includes a casing containing said sensing, measuring, and display circuit means and providing a face for the visual display of said heartbeat rate. 6. The electrode system of claim 5 in which said outer electrode sensing means comprises an electrically-conductive finger button projecting from said casing. 7. The electrode system of claim 4 in which said display circuit means provides a digital display of heartbeat rate in beats per minute. 8. The electrode system of claim 7 in which said display circuit means includes light-emitting diodes. 9. The electrode system of claim 7 in which said display circuit means includes liquid crystals. 10. The electrode system of claim 4 in which said measuring circuit system includes time-based signal generating means and means responsive to both said sensing circuit means and said time-based signal generating means for generating a signal representative of heart activity. 11. The electrode system of claim 1 in which said outer electrode sensing means comprises an outer electrically-conductive layer of said wristband extending a substantial extent along the circumference of said wristband. 12. A method for determining heart activity, comprising strapping a first cardiac electrode directly against the wrist of one hand of a wearer by a wristband which also provides an exposed second electrode supported out of contact with said wrist and in electrically-isolated relation with respect to said first electrode, said first and second electrodes being in circuit with means for processing bioelectrical signals from said electrodes and for providing a measurement of heart activity, said wearer thereafter touching said second electrode with at least one finger of the other hand to complete the electrical circuit, whereby, said first electrode is in direct electrical contact with a limb on one side of the electrical axis of the heart and the second electrode is in electrical contact with a limb on the other side of the heart's electrical axis. 13. The method of claim 12 in which said means for processing bioelectric signals from said electrodes includes means carried by said wristband for displaying a visual indication of heartbeat rate, whereby, upon touching said second electrode with at least one finger of said other hand to complete the electrical circuit, a signal representative of heartbeat rate is generated and visually displayed. 14. The method of claim 12 in which said step of touching said second electrode with at least one finger of the other hand includes immobilizing said hands relative to each other, thereby eliminating artifacts that might otherwise be generated by hand movement. 15. The method of claim 12 in which said step of touching said second electrode involves firmly gripping said wristband between a pair of fingers of said other hand to place said fingers in firm electrical contact with said second electrode and simultaneously urge said first electrode into tight electrical contact with the wrist of said one hand. |3450133||June 1969||Birch, Jr.| |3807388||April 1974||Orr et al.| |3826246||July 1974||Raddi et al.| |3983690||October 5, 1976||McClintock| |4009708||March 1, 1977||Fay, Jr.| - Schaudinischky, L. et al., "Technical Note: The Shape Conforming Electrode," Med. & Biol. Engr., 7, 1969, pp. 341-343. International Classification: A61B 502;
<urn:uuid:c7bbd2c2-b6f2-41c3-b696-d1952a5f83d6>
CC-MAIN-2022-33
https://patents.justia.com/patent/4120294
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.931927
3,671
3.03125
3
Our smart classrooms are ventilated, have comfortable seats for the children. Our teachers use computers, projectors and also the plain blackboard to teach the learners. Class sizes are small so that every child gets the required attention We have well equipped and well-designed science labs for Physics, Chemistry & Biology. Concepts taught in the classrooms are reinforced in the science labs Our ICT lab provides 1:1 computer facilities for each child. We have the latest hardware and licensed software required for students of all classes Kids spend their energy in the bright and colorful play areas. We have a play area outside and one indoors too especially for the kindergarten classes. A well-stocked library for children of all classes. There are library sessions during normal school hours where children are encouraged to sit and read in silence. Our Maths lab is a place where students can experiment and explore patterns and ideas. Students one can find a collection of games, puzzles, and other teaching and learning material. The maths lab provides an opportunity for the students to discover mathematics through doing. In today's world, it is important to learn a foreign language other than English. We have French as a subject for foreign language. Learning such a language is enhanced through speaking and listening sessions which help improve the pronunciation, accent and understanding of the language. A school is not just about academics. Physical exercise is also very important for the body and the brain. We have a vast playground and a separate basketball ground where students spend their PT and Athletic classes. Extra activities like Yoga, Western Dance, Music & Chess are held during normal school time. Apart from these activities, we also have out-of-school-hours activities for Athletics & Karate. We use a school app that acts as a communication point between parents, teachers, school and students. School circulars, notifications, homework, attendance, and exam assessments can be accessed via the app at the fingertips of the parents.
<urn:uuid:63cfb31b-3bde-4a7f-85e4-f9fce2fe1acf>
CC-MAIN-2022-33
https://mkvkschool.in/portal/page/mkvk-school-facilities
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.955694
395
2.71875
3
Interleukin 13 (IL-13) Interleukin 13 (IL-13) is a pleiotropic protein that exerts effects similar to that of the cytokine IL-4. IL-13 is released by Th2 cells, T cells, NK cells, basophils and eosinophils. While IL-13 has anti-inflammatory properties, it is also a central mediator of allergic inflammation and regulates the production of IgE (an antibody type involved in allergy). Levels of IL-13 are typically low in the blood of healthy people, so measuring this cytokine in serum or plasma may require an ultra-sensitive assay. This analyte is eligible for multiplexing. Name: Interleukin 13 (IL-13) Category: Health & Inflammation Type of test: Blood + Saliva Interleukin-13 (IL-13) is a pleiotropic protein that exerts effects similar to that of the cytokine IL-4. IL-13 is very in structure to IL-4, so much so that the type 2 IL-4 receptor does not distinguish between these two proteins. Nonetheless, IL-13 does exert effects independent of IL-4. IL-13 is released by T helper 2 (Th2) cells, NK cells, basophils, and eosinophils, among other cells. Most of the biological action of IL-13 is mediated through the transcription factor STAT6 which regulates gene expression in cells that balance host immunity and facilitate the development of Th2-type responses. Despite having anti-inflammatory properties, IL-13 is perhaps best known for its role in mediating allergic inflammation and contributing to the pathology of asthma. IL-13 is a key regulator of IgE synthesis and release from B cells, the primary antibody involved in allergic diseases and the immune response to large, extracellular parasites like helminths. Given its role in promoting inflammation in airways, anti-IL-13 treatment has been explored as a potential treatment for asthma. For example, drugs targeting the shared receptor of IL-4 and IL-13 (i.e., IL4Ra) hold promise for reducing asthmatic symptoms. In healthy individuals without allergic diseases or asthma, levels of IL-13 are typically quite low in serum / plasma. Nonetheless, this cytokine can be measured in both saliva and serum / plasma samples. The extent to which serum / plasma and salivary IL-13 levels correlate is yet to be confirmed. McKenzie, G. J., Bancroft, A., Grencis, R. K., & McKenzie, A. N. (1998). A distinct role for interleukin-13 in Th2-cell-mediated immune responses. Current Biology, 8, 339-342. https://pubmed.ncbi.nlm.nih.gov/9512421/ Wills-Karp, M., Luyimbazi, J., Xu, X., Schofield, B., Neben, T. Y., Karp, C. L., & Donaldson, D. D. (1998). Interleukin-13: central mediator of allergic asthma. Science, 282, 2258-226. https://pubmed.ncbi.nlm.nih.gov/9856949/ Zurawski, G., & de Vries, J. E. (1994). Interleukin 13, an interleukin 4-like cytokine that acts on monocytes and B cells, but not on T cells. Immunology Today, 15, 19-26. https://pubmed.ncbi.nlm.nih.gov/7907877/
<urn:uuid:0a802a57-03bf-46c0-8bd6-5666fc96c563>
CC-MAIN-2022-33
https://bioanalytics.tcu.edu/product/interleukin-13-il-13/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.882468
775
3.21875
3
Background: Spasticity is often clinically assessed with the Tardieu Scale, using goniometry to measure the range of motion and angle of catch. However, the test-retest and inter-rater reliability of these measurements have been questioned. Inertial sensors (IS) have been developed to measure orientation in space and are suggested to be a more appropriate tool than goniometry to measure angles in Tardieu Scale measurements. Objective: To compare the test-retest and inter-rater reliability of Tardieu Scale scores measured with IS and goniometry. Methods: Two physiotherapists performed Tardieu Scale measurements in two sessions, using both goniometry and IS, to quantify spasticity in elbow flexors of 13 stroke patients. Results: For goniometry, test-retest and inter-rater reliability proved to be excellent (ICC 0.86) and fair to good (ICC 0.66), respectively. For IS, both test-retest (ICC 0.76) and inter-rater reliability (ICC 0.84) were excellent. Conclusions: Inertial sensors are reliable and accurate to use in Tardieu Scale measurements to quantify spasticity in the elbow flexors of hemiplegic stroke patients. Copyright © 2010 Elsevier B.V. All rights reserved.
<urn:uuid:3ed80d98-a5da-4192-aa13-5a9c24508fde>
CC-MAIN-2022-33
https://pubmed.ncbi.nlm.nih.gov/21131203/?access_num=21131203&link_type=MED&dopt=Abstract
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.930003
285
1.523438
2
There are many different ways to use the word "bug." First, a bug can be any type of insect. You don’t have to know the name of the insect. Just call it a bug. - The bugs come out when the weather is warm. - Mosquitoes are annoying little bugs. - I think I swallowed a bug. (This happens accidentally when there are many small flies in the air.) - Hey, there’s some kind of bug on your shoulder. - Some type of bug ate the leaves on my apple trees last summer. - Many bugs are actually useful and necessary for the environment. - If you’ve got bugs in your house, you should try to get rid of them. - A bug zapper attracts and kills bugs outside. A bug can also be a mild form of an illness. - Ophelia can’t come to work today because she says she caught a bug. (bug = cold or flu) - There’s a bug going around the office. - People can get some protection against a flu bug by getting a flu shot. - I think I caught a bug. (I think I have a cold or the flu.) The word "bug" is popular as a verb. In this case, it means that a person or a thing is bothering someone: - Something’s bugging me. - I can’t stop thinking about this thing that’s bugging me. - My boss is bugging me about working extra hours. - Joe’s mother keeps bugging him about his hair, saying that it’s too long. - No one likes Todd because he bugs people. - Andrew’s kids bugged him for years and years about getting a swimming a pool, so finally he got one for them. - All that noise is bugging me. - What’s been bugging you? - Am I bugging you? - Are you busy right now? I don’t want to bug you. A bug can also be a problem with a computer program or a product: - There’s a bug in this program. I can’t use it. - I never use that software. It has too many bugs in it. - This program feels kind of buggy. - They’ve worked the bugs out of the system and now it works fine. Finally, a bug can refer to a big interest in something, especially gold. - Gold bugs can drive up the price of gold. - Vanessa’s a gold bug. (She collect a lot of gold.) - She caught a gold bug. - Jonah has a bug for antique jewelry. Visit the Word of the Day section every day! November 2, 2018
<urn:uuid:cc601beb-d949-4f54-bae2-f43d050a745e>
CC-MAIN-2022-33
https://www.learnamericanenglishonline.com/Word%20of%20the%20Day/2018-2/November/bug.html?noamp=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.92518
608
3.015625
3
Facebook has this one simple rule that you need to be someone’s Facebook friend to be able to post to their wall. However, back in 2013, a security researcher Khalil Shreatah managed to discover a bug that allowed a hacker to post anything on anyone’s wall without becoming their friend. Khalil had made countless attempts to report the bug to Facebook, but all the response that he ever got was that ‘it was not a bug at all’. He finally chose to post to the wall of the founder himself to make them realize the issue. Unfortunately, Facebook did not like the way he did it. Many companies offer unbelievable rewards if you report the security bugs and breaches, but definitely not when you do not comply with the reporting rules. The same happened to Khalil who expected a reward for exploiting Mark’s timeline, just to inform the company about the bug. Khalil first tried to report the incident by posting on Sarah Goodlin’s wall, who was Mark’s college friend. The Facebook security member who handled the query was not friends with Goodlin. He had no access to the link, even though, generally they are able to override the security to see anything on the website. When the security team responded with saying, “I am sorry, this is not a bug,” Khalil resorted to post on Zuckerberg’s timeline himself. Facebook pays security researchers a minimum of $500 for reporting a security bug, and it can go as high as possible depending on how severe the bug is. The only condition is reporting responsibly which Khalil missed to do. Having been job-less for over two years, Khalil had been very hopeful to get the reward, as he needed the money desperately. However, he ended up in disappointment, and one major reason was the security team’s inability to understand the bug. Watch the video and see Khalil explaining the problems associated with posting on other people’s wall without permission.
<urn:uuid:14248c7b-2eba-46fb-b3db-b9e86f3bfc9c>
CC-MAIN-2022-33
https://wonderfulengineering.com/posted-zuckerbergs-wall/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.980657
414
1.789063
2
Theodore Dalrymple, City Journal, Autumn 2002 Everyone knows la douce France: the France of wonderful food and wine, beautiful landscapes, splendid châteaux and cathedrals. More tourists (60 million a year) visit France than any country in the world by far. Indeed, the Germans have a saying, not altogether reassuring for the French: “to live as God in France.” Half a million Britons have bought second homes there; many of them bore their friends back home with how they order these things better in France. But there is another growing, and much less reassuring, side to France. I go to Paris about four times a year and thus have a sense of the evolving preoccupations of the French middle classes. A few years ago it was schools: the much vaunted French educational system was falling apart; illiteracy was rising; children were leaving school as ignorant as they entered, and much worse-behaved. For the last couple of years, though, it has been crime: l’insécurité, les violences urbaines, les incivilités. Everyone has a tale to tell, and no dinner party is complete without a horrifying story. Every crime, one senses, means a vote for Le Pen or whoever replaces him. The laxisme of the French criminal justice system is now notorious. Judges often make remarks indicating their sympathy for the criminals they are trying (based upon the usual generalizations about how society, not the criminal, is to blame); and the day before I witnessed the scene on the Boulevard Saint-Germain, 8,000 police had marched to protest the release from prison on bail of an infamous career armed robber and suspected murderer before his trial for yet another armed robbery, in the course of which he shot someone in the head. Out on bail before this trial, he then burgled a house. Surprised by the police, he and his accomplices shot two of them dead and seriously wounded a third. He was also under strong suspicion of having committed a quadruple murder a few days previously, in which a couple who owned a restaurant, and two of their employees, were shot dead in front of the owners’ nine-year-old daughter. The left-leaning Libération, one of the two daily newspapers the French intelligentsia reads, dismissed the marchers, referring with disdainful sarcaèm to la fièvre flicardiaire — cop fever. The paper would no doubt have regarded the murder of a single journalist — that is to say, of a full human being — differently, let alone the murder of two journalists or six; and of course no one in the newspaper acknowledged that an effective police force is as vital a guarantee of personal freedom as a free press, and that the thin blue line that separates man from brutality is exactly that: thin. This is not a decent thing for an intellectual to say, however true it might be. It is the private complaint of everyone, however, that the police have become impotent to suppress and detect crime. Horror stories abound. A Parisian acquaintance told me how one recent evening he had seen two criminals attack a car in which a woman was waiting for her husband. They smashed her side window and tried to grab her purse, but she resisted. My acquaintance went to her aid and managed to pin down one of the assailants, the other running off. Fortunately, some police passed by, but to my acquaintance’s dismay let the assailant go, giving him only a warning. My acquaintance said to the police that he would make a complaint. The senior among them advised him against wasting his time. At that time of night, there would be no one to complain to in the local commissariat. He would have to go the following day and would have to wait on line for three hours. He would have to return several times, with a long wait each time. And in the end, nothing would be done. As for the police, he added, they did not want to make an arrest in a case like this. There would be too much paperwork. And even if the case came to court, the judge would give no proper punishment. Moreover, such an arrest would retard their careers. The local police chiefs were paid by results — by the crime rates in their areas of jurisdiction. The last thing they wanted was for policemen to go around finding and recording crime. Not long afterward, I heard of another case in which the police simply refused to record the occurrence of a burglary, much less try to catch the culprits. Now crime and general disorder are making inroads into places where, not long ago, they were unheard of. At a peaceful and prosperous village near Fontainebleau that I visited — the home of retired high officials and of a former cabinet minister — criminality had made its first appearance only two weeks before. There had been a burglary and a “rodeo” — an impromptu race of youths in stolen cars around the village green, whose fence the car thieves had knocked over to gain access. A villager called the police, who said they could not come at the moment, but who politely called back half an hour later to find out how things were going. Two hours later still, they finally appeared, but the rodeo had moved on, leaving behind only the remains of a burned-out car. The blackened patch on the road was still visible when I visited. The official figures for this upsurge, doctored as they no doubt are, are sufficiently alarming. Reported crime in France has risen from 600,000 annually in 1959 to 4 million today, while the population has grown by less than 20 percent (and many think today’s crime number is an underestimate by at least a half). In 2000, one crime was reported for every sixth inhabitant of Paris, and the rate has increased by at least 10 percent a year for the last five years. Reported cases of arson in France have increased 2,500 percent in seven years, from 1,168 in 1993 to 29,192 in 2000; robbery with violence rose by 15.8 percent between 1999 and 2000, and 44.5 percent since 1996 (itself no golden age). Where does the increase in crime come from? The geographical answer: from the public housing projects that encircle and increasingly besiege every French city or town of any size, Paris especially. In these housing projects lives an immigrant population numbering several million, from North and West Africa mostly, along with their French-born descendants and a smattering of the least successful members of the French working class. From these projects, the excellence of the French public transport system ensures that the most fashionable arrondissements are within easy reach of the most inveterate thief and vandal. Their hatred of official France manifests itself in many ways that scar everything around them. Young men risk life and limb to adorn the most inaccessible surfaces of concrete with graffiti — BAISE LA POLICE, fuck the police, being the favorite theme. The iconography of the cités is that of uncompromising hatred and aggression: a burned-out and destroyed community-meeting place in the Les Tarterets project, for example, has a picture of a science-fiction humanoid, his fist clenched as if to spring at the person who looks at him, while to his right is an admiring portrait of a huge slavering pit bull, a dog by temperament and training capable of tearing out a man’s throat — the only breed of dog I saw in the cités, paraded with menacing swagger by their owners. There are burned-out and eviscerated carcasses of cars everywhere. Fire is now fashionable in the cités: in Les Tarterets, residents had torched and looted every store — with the exceptions of one government-subsidized supermarket and a pharmacy. The underground parking lot, charred and blackened by smoke like a vault in an urban hell, is permanently closed.
<urn:uuid:eb9f3f93-603f-4c08-b017-c06b79ca74b9>
CC-MAIN-2022-33
https://www.amren.com/news/2005/11/the_barbarians_at_the_gates_of/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.977826
1,664
1.828125
2
Nearly two years ago the U.S. District Court of California issued a permanent injunction against BitTorrent search engine isoHunt. The Court ordered the owner of isoHunt to start censoring the site’s search engine based on a list of thousands of keywords provided by the MPAA, or cease its operations entirely in the US. “I find it absurd that we are required to keyword filter which ironically all search engines in countries like China are required to do due to political censorship, but isoHunt would be the only search engine serving traffic to US users required to do similar filtering,” isoHunt owner Gary Fung wrote to the court in a response. Hoping to get the decision overturned isoHunt filed an appeal, which is still ongoing, but in the meantime it saw no other option than to comply. The filter was implemented and has since prevented a list of film-related phrases from showing up in the search results. But not without collateral damage. Besides blocking links to Hollywood blockbusters, the MPAA’s filter is also preventing public domain works and authorized content from being accessed. Filmmaker Brian Taylor is one of the independent artists whose work is falsely censored by the MPAA filter. Last week his small film production firm En Queue Film released a 18 minute horror short titled “the Bite.” In addition to putting it on video streaming sites Taylor also thought it would be a good idea to put it on isoHunt. “I got it going, had downloads start from the US and Europe almost immediately, which made me a very happy guy,” Taylor told TorrentFreak. However, this enthusiasm faded quickly when he tried to access the torrent from a US connection a day later. Instead of a link to the torrent file the filmmaker was welcomed with the following message. “Torrent has been censored, as required by US court.” Needless to say Taylor was shocked to see the work that he owns 100% being censored. The whole idea was to share it with a wide audience, including people from the US. “Some of us aren’t stealing movies from torrent sites, some of us are offering original material,” Taylor told TorrentFreak. “My original material being blocked in the US hurts my chances of: being discovered, making money, making more art. Not to mention the fact that Americans miss out on “the Bite,” the most original realistic short horror film ever made.” Unfortunately, this takedown is not an isolated incident. Another good example is this torrent with thousands of songs from the 1930’s, that are all believed to be in the public domain. While the content is completely unrelated to any motion pictures, the MPAA filter prevents US visitors form accessing it. We asked isoHunt to look into the issue and we were told that an unfortunate combination of keywords in the file names is to blame. “We’ve found that it was a TV title that censored it,” Gary Fung told TorrentFreak, adding that these false positives are quite common. “There are thousands of titles the MPAA sent that we are forced by the US court injunction to censor our index against, and these are but two tangible examples of non-infringing content that is falsely censored,” he added. As isoHunt has pointed out to the court before, this false censorship based on a filter which includes many dictionary words, is clearly hindering freedom of speech. This is one of the main reasons why the BitTorrent search engine continues to fight the filter requirement in court. The Ninth Circuit Appeal Court now has to decide whether the permanent injunction will stay in place or not. This decision will be a crucial one to the future of isoHunt, and possibly many other search engines including Google.
<urn:uuid:1c69d2f6-8860-44b5-a791-06239f40d862>
CC-MAIN-2022-33
https://torrentfreak.com/mpaa-filter-censors-legit-torrent-files-on-isohunt-120406/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.964619
794
1.523438
2
Amidst all the high profile will-we, won’t-we confusion of Brexit, you wouldn’t be blamed for having lost sight of the fact that the EU Trade Mark Directive comes into force today, 14 January 2019. The Directive (2015/2436) was designed, in part, to make trade mark law across the EU fit for the digital age. It causes, as of today, some important changes to UK trade mark law and is something quite separate from any Brexit-based reforms. Some of the more significant changes are: - New types of marks can be registered. There will no longer be a requirement for a graphical representation of a trade mark. The intention is to allow trade marks to be represented in the widest range of digital file formats possible. If you have been longing to register a hologram as your trade mark, now may be your chance! However, marks must still be represented “in a manner which enables the registrar and the public to determine the clear and precise subject matter of the protection afforded to the proprietor”. - Technical function objection. It has long been the case that a trade mark consisting exclusively of a shape can be refused if that shape itself performs a technical function, is necessary because of the nature of the goods, or adds value to the goods. The Directive extends this to characteristics other than shape. A mark may be refused if it consists exclusively of any characteristic that performs a purely technical function, is intrinsic to the goods or results from the nature of the goods, or adds value to the goods. - Proof of use in contentious proceedings. Previously, if an Opponent wished to rely on a mark which has been registered for more than 5 years, he/she would need to submit proof of use of the registered mark in the 5 years prior to the publication of the opposed application. Under the new Directive, the 5 year period will end on the filing date (or priority date, if applicable) of the opposed application. A similar change will apply in invalidity proceedings. - Non-use as defence in infringement proceedings. If faced with an infringement action where the infringed registration is vulnerable for cancellation for non-use, the Defendant would previously have needed to bring a separate action for revocation of the registration. Under the Directive, the Defendant will be able to request the owner of the prior registration to provide proof of use, failing which the infringement action will be dismissed (assuming there were no other grounds relied on in the proceedings). - “Own name” defence. Under the Directive, this defence can no longer be invoked in respect of a company name, only if the alleged infringement constitutes use of one’s own personal name. it is not clear how courts will deal with infringement cases involving long-established companies which would previously have been able to rely on an “own name” defence - Challenges against non-compliant licensees of a registered trade mark. Previously, a trade mark owner could only take action against a licensee under contract law if the licensee does not comply with the terms of the licence. Under the Directive, the owner can also take action under trade mark law. - Changes to licensees’ rights in infringement proceedings. Under the Directive, an exclusive licensee only needs to give the trade mark owner the initial opportunity to take action against an infringer. If the owner does not take action within 2 months, the exclusive licensee can take action directly. A non-exclusive licensee will still need the consent of the trade mark owner to take infringement action directly. If the owner of a trade mark brings an infringement action, any licensee may intervene in the proceedings to seek compensation for damages suffered by the licensee owing to the alleged infringement. The implementation of the Directive provides trade mark owners with more powers to enforce their rights against infringers, and with the possibility of expanding their portfolios to include new types of marks. For more information about the implications of the Directive and how you may be affected, consult your trade mark attorneys. This article is for general information only. Its content is not a statement of the law on any subject and does not constitute advice. Please contact Reddie & Grose LLP for advice before taking any action in reliance on it.
<urn:uuid:7de23f58-257a-4eb4-b57d-01dcd99fab92>
CC-MAIN-2022-33
https://www.reddie.co.uk/2019/01/14/never-mind-the-brexit-here-comes-the-eu-trade-mark-directive/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.931482
862
1.59375
2
In other manufacturing companies, they offer a lot more options that the metal enclosures. They also support the campaigns for having a greener and safer environment endeavors such as conservation and community outreach programs. They partner with the Non-government offices in pursuing this endeavor. There was a team of college students who asked an enclosure manufacturing companies about their series of formulation for their hybrid project. The company happily obliged. The company also sent samples of the formulation project to a certain college in the USA and this company helped the student in developing their first hybrid car that can potentially win the Formula Hybrid Competition. The body of students from this university has also taken the initiative to have a very advanced goal: that is to not only they will build a Hybrid gas/electric car that year, but they will also be able to use the chassis that they have designed to come up with alternative power source. Such as fuel cell. The team of students planned to design and build their first hybrid vehicle that can switch its power source while running. Most of the vehicles today are running on gasoline because of certain economic conditions. However, once this technology is applied to vehicles, it can easily switch from gasoline to possibly fuel cell. The formulation for this hybrid challenge is primarily designed and built for the engineering competition open for the college level students. The main focus of this competition is to spark innovation among engineering students. Geared towards having a more sustainable fuel efficiency, and can range also to having high-performance applications of the energy to formula SAE program. The team of students who approached this company should be able to design and build an open wheel plug-in hybrid racecar. And also they should compete against other teams. The competition will be held at New Hampshire Motor Speedway in London, NH on May 3-6. Best of luck to all 40 teams. In conclusion to this, it is great to see that companies are also into encouraging the young generation to be part of the new engineering innovations geared towards having a more conclusive and holistic source of energy. With the worsening problems of our nature today, this dilemma calls for more people to be concerned about the source of our renewable energy and how we can help the next generation.
<urn:uuid:732a230f-4466-474c-b801-520f3f65c6ea>
CC-MAIN-2022-33
https://scxintao.com/what-does-the-future-of-renewable-energy-holds/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.974086
442
2.53125
3
Fire chief: hand sanitizer highly unlikely to combust in your hot car this summer A viral social media post has been making it sound like your hand sanitizer could blow up in your car this summer. PROVIDENCE, R.I. (WLNE) – We’re all carrying a lot more hand sanitizer with us right now. Chances are you even have some in your car. But is it safe to keep in your vehicle as the weather gets warmer? A viral post on the internet this week seemed to say differently. Chances are you’ve seen this image of a scorched car door circulating around social media. It came from a post by a fire department in Wisconsin talking about the dangers of keeping hand sanitizer, which is alcohol based, in a hot car. “I shook my head. It just didn’t sound right,” said Lakeville Fire Department Chief Michael O’Brien. The original post also mentioned it being particularly dangerous around an open flame. But the wrong information went viral on social media, leading people to believe your hand sanitizer would combust while sitting in your hot car. But that car door wasn’t actually burned from a hand sanitizer explosion, but a random photo the department chose to show a burnt door. “During the Covid-19 crisis there’s a lot of information put out over social media,” said O’Brien. “A lot of it’s bad.” O’Brien, attempting to clear up any questions, posted to their department’s Facebook page Friday to try and put people at ease. He says hand sanitizer is highly unlikely to combust without an ignition source. “If you’re pumping away on your hand sanitizer when you have a cigarette in your hand, you’re not being very smart, and you might get burned,” he explained. Your average bottle of hand sanitizer likely says right on the back, ‘flammable, keep away from fire or flame.’ Chief O’Brien says in order for your hand sanitizer to spontaneously combust in your hot car this summer, your car would have to reach about 600 degrees. “Living in the northeast, we’re not going to get temperatures in excess of 600 degrees in our cars,” he said. The chief told ABC 6 not having the sanitizer in your car could in fact do more harm than good. “I don’t want anybody to be fearful of having some hand sanitizer in their car,” said Chief O’Brien. “Because at the end of the day when you’re going out in public, and as we go out in public even more, having that hand sanitizer will maybe prevent them from being sick or maybe infecting one of their family members.”
<urn:uuid:6f686992-2353-49ab-8143-bdecb6c3e195>
CC-MAIN-2022-33
https://www.abc6.com/fire-chief-hand-sanitizer-highly-unlikely-to-combust-in-your-hot-car-this-summer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.961475
622
1.890625
2
That didn’t take long: Just a couple months after Google announced its open source Docker-management system called Kubernetes, Microsoft is already supporting it on the company’s Azure cloud platform. For two companies, Google and Microsoft, not historically known for their open source work, that’s a pretty impressive feat. Aside from just enabling users to launch and manage their Docker environments with Kubernetes, [company]Microsoft[/company] has also released a tool called Kubernetes Visualizer that graphically represents the Kubernetes architecture and terminology. Because it’s so new, Microsoft decided it was best to let Azure users see how Kubernetes organizes containers and components rather than try to learn solely by reading the documentation. The company details Visualizer in a blog post, and has released the code on GitHub. All the recent announced support for Kubernetes — from Google, Microsoft, Red Hat, IBM and even VMware — is of course great for the Docker project and the eponymous company driving it, but it also looks increasingly like one de facto standard by which large vendors will look to tout the openness of their cloud offerings. Whatever competitive advantages they think they have appear a lot less like avenues for lock-in if developers can move relatively easily among platforms and retain the same general experience of launching and managing applications. Factors such as price and performance might stand out more, as well. For Microsoft and [company]Google[/company], especially, a groundswell of support for Kubernetes would be welcome news, indeed. They’re trying to steal market share from [company]Amazon Web Services[/company], which has owned the cloud market since it first launched its S3 storage service in 2006 but has also chosen to go it largely alone when it comes to industry-wide projects like this one. If Microsoft and Google can win over the next generation of developers like AWS did with the last generation, the hugely important but hereunto largely uncompetitive cloud computing market will look a whole lot different in a few years’ time.
<urn:uuid:60ced995-6ec0-45b9-93a7-a5f7decb20d1>
CC-MAIN-2022-33
https://old.gigaom.com/2014/08/28/microsoft-now-supports-googles-kubernetes-on-azure-and-has-open-sourced-a-visual-ui-for-it/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.947161
430
1.507813
2
The first webpage went live on the 6th of August 1991 dedicated to information made available by Tim Berners- Lee at CERN with a long address http://info.cern.ch/hypertext/WWW/TheProject.html outlining how to build webpages and other information. This ushered the phenomena of the world wide web. Today, any business or service professional cannot think of competing in the market without a digital persona as most of the consumers rely on the internet and more recently their mobile handsets to glean information before opting for a service or making a purchase decision. So, you are thinking of starting a website to represent your work, products or services? The moment you start searching on how to go about things you are likely to be bombarded with 2 options. Do the website yourself (DIY) or have it done professionally? There is a third hybrid option that will be discussed as well later. This article will mainly discuss how you can come to a decision, the merits and demerits of both while underlining the most important factor, what is the right fit for you? Making the Decision It seems like a tough decision to make but is in fact not that daunting. How? Well, the average life of a website is around 3 years as in today’s fast-paced environment the design language and the demands of the customer are fluid and rapidly changing. To keep pace, we recommend a website rebuild every 3 years to ensure you stay fresh and in line with the trends of the day. Any decision you make will not make a permanent impact, remember as long as you offer the product or service in demand at the right price point and the right customer service. Ask yourself the below and if you answer all or most of them yes then you need a professionally built site for your purpose. - Do you need to have more that one page? - Do you want to generate revenue from the Web page? - Do you want your web page to rank on search engines? - Will you rely on your website 80% or more to generate Revenue? - Do you struggle with technology at the best of times? DIY websites can at first view look like amazing propositions that are easy & quick to do and there are advertisements plastered all over, telling you that you can do it. In reality, it is difficult for an average layperson to build and host a website for commercial purposes. DIY website builders like WIX, Weebly, Squarespace these days offer lots of designs and templates along with simple customizations, “Drag & Drop” Editors and graphics as well. They are a great way to save money and you get an amazing sense of accomplishment once you see your website published. A DIY website does serve the purpose of a person who wants to showcase his art, design, photo portfolio or bloggers who want to write or professionals who want to showcase and highlight their CVs or small brick & Mortar stores who are just looking for some online presence. They are great in highlighting your potential and reaching out to family & friends or even potential customers. A DIY website can also be used for hosting Brochures, Magazines or sharing your recipes with the world. Depending on your skills it may also be good for a part-time freelancing business that you run out of your home. DIY Website, is it right for you? However, it doesn’t serve the purpose of any full-fledged business including freelancing that wants to generate online traffic resulting in people making a purchase decision. A DIY website is dependent on your skills solely and your view of the world including design, content and layout. This may not be keeping in trend or might not be the ideal layout as far as others are concerned. Also due to the skill factors mentioned above the feature on your website will be seriously limited and you have to be restricted to a template that might not be ideal. The main problem no one will highlight is that SEO or search engine optimization is highly required today to rank on any search engines. These websites do no allow you the flexibility, even if you possess the skill to do SEO optimization which will help your ranking. Are you ready to risk losing a lot of business that might come your way by saving on a small amount of money? Ask your self? If you need a car would you build one or rather buy one? A Professionally designed Website Despite most website building websites portraying that website building is a one-person job, it’s actually not. When Cipher Solutions builds websites at a minimum we deploy the expertise of 6 people with expert skillsets namely the UX Designer, UI Designer, Web developer, Graphic Designer, Content Writer and an SEO Engineer. This team works on the website together to create a polished piece of art that is stunning visually and offers great functionality and speed. Consumers these days are smart and easily differentiate the efforts of a professionally built website. The speed and added functionalities make the customer journey smooth and satisfying thereby encouraging your customer to recommend, return and use the website with ease. A professional web design firm in Saudi Arabia these days has the expertise to build anything from a single page website to a complex E-Commerce website. For any business professional or a company a customized site the best and only option for a website as you can look beyond design into marketing aspects and professional web design firms bring in expertise like user experience knowledge that is vital to a high traffic site. In fact, it can be the reason your business gets a boost or you lose customers. A badly built website is hard to use and confusing for a user, which results in the person bouncing or leaving the website to find something else. A website built by professionals ensures that the customer flow is smooth and can have inbuilt UX functionalities and fine subtleties to attract users to interact with your website more. Statistically a user who had had a positive experience with the website is more likely to recommend your products or services than an unsatisfied user. Therefore, in this digital age of social media where a simple tweet or comment can go viral in a matter of hours, it is paramount for any serious business who wants to scale to have a professionally built website. You would not like a horrible looking storefront with very hard access? Would you? No, so why torture your customers with a bad website. This is an investment that will bring you returns quickly if properly done and will generate leads with very less work. Make your customers Digital Journey a pleasant one! Lets Discuss the Technology a Bit! We at Cipher Solutions understand that technology can be daunting to many of us who are not really tech savvy but want to conduct our businesses. But in today’s day and age we need to understand technology basics to ensure that we aren’t taken for a ride by the unscrupulous few. These days there are abundant technologies that can be deployed to build websites. There is simply no right or wrong technology framework and is entirely dependent on your requirement and suitability for your business. Factors you should consider mainly are your Developers experience, team talents and more importantly cost both tangible and intangible. Also in consideration should be Website performance, maintenance, ease of scaling and more importantly integration with your existing systems. You should ask your potential shortlist of vendors to suggest technologies and then home in on the one suggested to most. Please read our article on Choosing the Right Technology Partner for your Small and Meduim Enterprise to know more. A website is like a cake with many layers of technologies built in for design, functionalities and performance. It can be broadly classified into Linux or windows based. It all boils down to preference and existing systems. If you have an existing infrastructure that is heavily windows based and are highly invested in windows for the future then it is recommended to go with a windows solution for easier integrations for all other purposes we would advise to go with linux based technologies due to the sheer volume of developers available. Both are cross integratable so there is cause for concern that you are using the wrong technology. At Cipher Solutions we use different technologies to develop websites dependent on the client preference, infrastructure and their organizations ability to manage the technology. We would not offer to build you a Tesla when you do not have the infrastructure to charge it. Cipher Solutions is a Saudi based complete software solutions provider offering Web Development, Mobile App development, Customized Management Systems, Cyber Security and industrial solutions. In addition, we also provide support services like Managed Services, Digital Marketing and Business Services to ensure a 360 degree solution. The difference that we bring is that along with the technology we provide Operational, Marketing, Management, Business and Industrial Expertise to ensure the best possible delivery for the customer. We operate from Riyadh but have clients all over Saudi Arabia. Please visit our website www.ciphersol.com to find out how we may assist you. The strength of CipherSol™ or Cipher solutions lies in the founders who originate from a varied heritage and background, bringing diverse skills to the board, which when combined forms a creative dynamic, generally not found in technology companies. We believe in working with passionate, driven individuals who are on a mission to change the world, who will stop at nothing to help someone, those who are constantly developing themselves and others around them, those who believe in our vision of making everyday lives easier.
<urn:uuid:6b203551-2455-4fe1-ace3-acf9d128bb7f>
CC-MAIN-2022-33
https://ciphersol.com/websites-diy-or-have-it-done-professionally/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.951786
1,907
1.820313
2
This Real Grammar KS2 resources pack provides everything that you need to explore verb suffixes. Suffixes included in the resource pack are -ate, -ise-, -en and -ify. Teaching slides, worksheets, games and an opportunity to apply the new learning in a writing task are all included to create a complete resource to teach adding suffixes to words to form verbs. Pupils will need to be familiar with verbs and what a suffix is before completing the activities in the resource pack. Pupils will also need to be familiar with root words, nouns and adjectives. What is a suffix? A suffix is a group of letters that can be added to the end of a word. The suffix can change the word’s meaning. Examples of suffixes include -ing, -ed, -er, -est, -ness, -less, -ful, -ly, -ment and -ous. What are verb suffixes? A verb suffix is where a suffix is added to a word and a verb is formed. Examples include -ate, -ise, -en and -ify. - active – activate - critic – criticise - short – shorten - simply – simplify What are the spelling rules when adding suffixes to words? Many root words can just have the suffixes added to the end of the words but there are some spelling rules, learnt in earlier year groups, that may need to be applied. What is included in this resource pack? This pack is divided into five parts: This section includes PowerPoint teaching slides and teaching notes with an optional script to introduce verb suffixes. It can also be used to revisit this aspect of grammar with pupils. An independent activity for pupils to practise using what they have been taught, allowing teachers to assess understanding. A series of short, 10-minute activities that can be used following the TEACH session to revisit and rehearse what has been taught. These may be short writing tasks, grammar games or editing/proofreading activities. A short writing task where pupils can use the grammar skills taught in context to produce independent writing. Five SATs style test questions, including cloze activities and multiple choice quiz questions, based on the grammar that has been taught. Teachers can choose which section of the resource pack to use according to their pupils’ needs and could use the activities over a series of lessons or weeks Teacher notes are provided to show how these quality resources could be used with pupils. How is this resource differentiated? The PRACTISE and REVISE sections include three activities differentiated for three levels of ability: - Worksheet 1 for pupils who may need support. Questions will have a lower cognitive domain (what is being asked of pupils) and/or vocabulary used may be simplified where possible. - Worksheet 2 for pupils working at age related expectations. - Worksheet 3 for pupils who may need an additional challenge and may be working at a greater depth in this area. Questions will have a higher cognitive domain with more challenging vocabulary. SUPPORT and CHALLENGE ideas are also included in the teacher notes of each section where relevant, with ideas of how to support pupils working towards the expected standard or at greater depth in this area. What pupil-facing resources are included? PPT slides; model text ‘Capturing the fort’; word mat Practise 1, Practise 2 and Practise 3 worksheets Game 1, game 2 Answer sheets for all worksheets are provided, where appropriate.
<urn:uuid:4c523892-d90e-4218-bcc9-ac5222b17269>
CC-MAIN-2022-33
https://www.plazoom.com/real-grammar/5.6-w-converting-nouns-or-adjectives-into-verbs-using-suffixes-for-example-ate-ise-ify
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.938607
772
4.84375
5
Prior to installation of the erosion control products, to ensure uniformity and integrity of the subgrade, the contractor proof rolled the slopes. At the crest of the spillway, approximately 6,000m2 of topsoil, seed and mulch was placed followed by a blanket of P42, a turf reinforcement mat fabricated from 100% polypropylene fibres. With vegetation, the maximum permissible flow velocity is 4.9m/s. On the slope, ranging from 6:1 to 9:1, Armorflex was installed with an underlying layer of 50mm dia. Clear limestone and 400R non-woven geotextile. Design flow velocities were calculated by the engineers with the U.S Army Corps of Engineers HEC-RAS model. Utilizing Armortec’s software, which calculates the class of block required based on the hydraulic design parameters, the engineers’ specification of class 40T tapered block was confirmed. The maximum permissible flow velocity (vegetated) was determined to be 7.5m/s. A standard mat dimension for this class is 2.4m x 6.1m x 0.12m thick, weighing approximately 2,600 kg. Due to the geometry of the slope, custom dimensions of mats were also fabricated. The contractor then placed 100mm of topsoil with seed over the mats. In approximately 4weeks, 6,000m2 of Armorflex was installed using an excavator and spreader bar. The undisturbed, existing embankment of the river was protected by two rows of A-Jacks installed at the toe of the spillway slope approximately 2m behind the river bank. A-Jacks are high stability concrete armour units designed to dissipate energy and resist erosive forces of flowing water. Each unit (model AJ-24) weighs approximately 36 kg. Otherwise known as Armorflex, these interlocking matrix concrete blocks are connected by a series of cables to form an articulated mat that has excellent performance in erosion control. Armourflex mats have proven to be an aesthetic and functional alternative to dumped stone, rip rap. This is a permanent system that allows for vegetation, is easy to install and virtually no maintenance. Extensive research and testing of performance with wave and open channel flow conditions makes this product a proven system. Slope stabilization and erosion protection for an existing earthen emergency spillway on the Binbrook Dam connecting Lake Niapenco and the Welland River was required for passage of the Inflow Design Flood of approximately 215 m3/s, in accordance with Ministry of Natural Resources criteria. Devron worked in conjunction with CRL Campbell providing detailed installation and onsite support. A combination of P42 (turf-reinforcement mats), Armorflex (articulated concrete block revetment) and A-Jacks was installed to form the slope stabilization and erosion protection lining for the emergency spillway. Do you have a project similar to this one? We want to hear all about it! If you need help or have any questions, our qualified staff is more than happy to help.
<urn:uuid:cab4e927-98a7-43ac-bdad-d8e14236f730>
CC-MAIN-2022-33
https://www.devronltd.com/binbrook-dam-case-study/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.942564
642
2.109375
2
Coldbeck Limestone Formation Coldbeck Limestone Formation (CLK), Carboniferous, Northern England Province Coldbeck Limestone Formation is part of the Great Scar Limestone Group The name is derived from Coldbeck, Ravenstonedale, Westmorland. See Mitchell (1978); Dunham and Wilson (1985). The formation comprises dark grey, fine-grained, well bedded limestones with mudstone partings, and flaggy dolostones characterised by an abundance of algal macrostructures including stromatolites and oncolites. The formation was deposited in a carbonate-dominated, nearshore to peritidal, restricted marine environment. Lower and upper boundaries The lower boundary is at the base of the ‘Spongiostroma Band’ of Turner (1950), which overlies the thick-bedded, porcellanous limestones and thin-bedded dolostones in the upper part of the Stone Gill Limestone Formation, Ravenstonedale Group (Figure 9, Column 16). The upper boundary of the Coldbeck Limestone Formation is at the top of the Algal Nodular Beds. These conformably underlie the dark grey limestone of the Scandal Beck Limestone Formation. Some 52 m of strata are visible in a continuous section in Stone Gill, Ravenstonedale, but Turner (1950, p. 30) estimated that a further 31 m are cut out by faulting. The formation is about 50 m thick at Gaisgill, but thins westward from here. Distribution and regional correlation Ravenstonedale, Cumbria and the Stainmore Trough. Age and biostratigraphical characterisation Early Chadian. There are at least three algal bands within the formation. - Mitchell, M.1978.Dinantian.168–177 in The geology of the Lake District. Moseley, F (editor).Occasional Publication of the Yorkshire Geological Society, No. 3. - Dunham, K C, and Wilson, A A.1985.Geology of the Northern Pennine Orefield: Volume 2, Stainmore to Craven.Economic Memoir of the British Geological Survey, Sheets 40, 41 and 50, parts 31, 32, 51, 60 and 61(England and Wales). - Taylor, B J, Burgess, I C, Land, D H, Mills, D A C, Smith, D B, and Warren, P T.1971.British regional geology: northern England (4th edition). (London: HMSO for Institute of Geological Sciences.) - Turner, J S.1950.Notes on the Carboniferous Limestone of Ravenstonedale, Westmorland.Transactions of the Leeds Geological Association, Vol. 6, 124–134.
<urn:uuid:bdd25a99-0b63-42c6-8977-1b4396d20153>
CC-MAIN-2022-33
https://earthwise.bgs.ac.uk/index.php?title=Coldbeck_Limestone_Formation&oldid=52810
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.776183
618
2.65625
3
These standards help to develop, evaluate and improve online and blended programs. For more information, visit the Virtual Learning Leadership Alliance. The National Standards for Quality Online Teaching have been developed by the Virtual Learning Leadership Alliance. The Online Teacher Tool Kit is designed to help teachers implement these standards to help student succeed and reach their potential through online options. The standards are: The Standards are: A. Professional Responsibilities B. Digital Pedagogy C. Community Building D. Learner Engagement E. Digital Citizenship F. Diverse Instruction G. Assessment and Measurement H. Instructional Design “When you talk about 21st century learning, we are doing it. Online learning is one of the best things that has happened in education. We provide multiple pathways to graduation.” — District Director of Virtual Education
<urn:uuid:eea62251-9c0d-4a5a-936d-364e5510e195>
CC-MAIN-2022-33
https://deannmeyers.wordpress.com/national-standards-for-quality-online-teaching/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.910683
174
3.1875
3
The best healthy cooking oils to stock in your kitchen and how to choose the healthiest oil for each style of cooking. There is so much misinformation out there about oils and fats and I still have clients coming to me asking “what are healthy cooking oils I can use?” or “what cooking oils should I avoid?” I mean one day you hear that coconut oil is the BEST oil and you should eat it like crazy, and then the next, your hear that “Oops, never mind, it IS actually bad for you”. It’s so confusing, and there is a lot of conflicting information out there. So I finally wanted to clear the air, and give you the low-down on what exactly is healthy and what is not. We’ll go over everything you need to know to feel confident in the kitchen. You’ll be able to stock your kitchen with the healthiest oils for cooking, and learn which oil should be used for what occasion. What Cooking Oils Should I Avoid? So let’s start with the cooking oils that you should avoid first. This way you can check your pantry and toss any that might be lurking in there. This will also create space for healthier oils instead. First, you’ll want to look for anything that has the word “hydrogenated” in it. These are the problem fats that will cause the most damage to your body. Starting in 2018 the government banned companies from creating partially-hydrogenated oils. These are the oils many restaurants and fast food companies used to make fried foods with. And also where found in many processed and packaged food like chips and snack foods. These partially-hydrogenated oils where huge providers of the ultimate unhealthy trans fat. Luckily it’s pretty hard to find products now made with these types of oils. BUT you can still find fully hydrogenated oils out there. Hydrogenation is a process where manufacturers add hydrogen to a liquid fat, such as vegetable oil, soybean oil, corn oil, and cottonseed oil to turn it into a solid fat at room temperature. The process allows the oils to have a more stable and longer shelf life, BUT creates unhealthy saturated fat. These types of hydrogenated oils should be avoided, especially in excess. And instead you should opt to stock you pantry with healthy oils that will also provide so many more nutritional benefits. And to be clear…there are plenty of solid state oils and fats that CAN be added healthfully into you meals without hydrogenation. Here are some of the best oils to keep stocked in your kitchen. The Healthiest Cooking Oils First, let’s just talk about smoke point for a second. Every oil has a “smoke point”, this is the temperature at which it will start to burn and smoke. Not only does that affect the flavor, but it can also cause oxidation and break down the nutrients as a result of heat exposure. Each oil in the list below will tell you the smoke point, this is the highest temperature you should use when cooking with that specific oil. Extra virgin olive oil Most of us know olive oil as a staple for the heart-healthy Mediterranean diet. And it is a go-to for many of us for drizzling on salads, pasta, and bread. But here’s a little more about olive oil and how to choose the best type. First, virgin olive oils are those in which the oil has been extracted without using chemicals, and extra virgin is the highest grade. Extra-virgin olive oil has naturally occurring antioxidants and polyphenols that may fight inflammation. (source) Olive oil is amazing for heart health because it contains higher amounts of healthy monounsaturated fats. And monounsaturated fat can help lower your LDL (“bad”) cholesterol levels, and may help improve HDL cholesterol (“good cholesterol”) — reducing the risk of heart disease. You can use olive oil for sautéed dishes and as a finishing oil, but it does have a relatively low smoke point, so it’s not good for high-heat cooking — such as anything over 350-375°F. Just be sure to get good quality olive oil — choose 100% Italian, Greek, or Californian Olive Oil, and make sure it comes in a dark green bottle. (Did you know that olive oil is one of the most counterfeited products ever??) Coconut oil is filled with a type naturally occurring saturated fat called medium-chain triglycerides. Which are a great source of energy AND may help you burn more fat when eaten. (source) And while saturated fats have been getting a bad rap for a long time there have been a lot more studies debating this particular type of naturally occurring fat. But as with anything saturated fats in moderation are completely fine — our body actually needs them in small amounts. And coconut oil, like most saturated fats are usually a healthier oil to use when cooking at high temperature since they have a higher smoke point. Coconut oil is also a great oil to use while baking — especially as a substitute for butter when baking vegan treats! It’s also great to grease pans and baking dishes like muffin tins and cake pans without using hydrogenated oils. In terms of smoke point, unrefined coconut oil can be cooked up to 350°F, while refined coconut oil has a smoke point of 450°F. Both are great, but refined does go through a small amount of processing. Avocado oil is high in monounsaturated fat (again, typically touted as a good fat or healthy fat) and is generally considered one of the healthiest cooking oils. We love getting a large liter of avocado oil when we do our healthy Costing shopping. Refined avocado oil also has a higher smoke point than most plant-based cooking oils (about 500°F). This makes it one of the most efficient pantry items. You can use it for sautéing, roasting, searing, grilling, and drizzling. It has a mild, buttery flavor that works well in both sweet and savory recipes. And the subtle taste and doesn’t overpower the flavor of your dish. Once you open it, there’s no need to refrigerate it — just store it in a cool, dark place. Sesame oil is rich in omega-3 and omega-6 fatty acids. These types of polyunsaturated fats are essential to your diet, and play an important role in heart disease prevention. It also contains sesamol and sesaminol, two antioxidants that may help reduce cell damage caused by free radicals and prevent inflammation and disease. (source) Sesame oil adds a delicious, nutty flavor to a wide variety of dishes. It’s a popular ingredient in Asian cuisine. Unrefined sesame is light in color, offers a nutty flavor, and is best used when cooking at a low to medium heat, under 350°F. Refined sesame oil, which is minimally processed, has a neutral flavor and is best for deep-frying or stir-frying up to 400°F. It’s also great for roasting asian-inspired veggies. Organic Grass-Fed Ghee Ghee is not technically an oil, it’s clarified butter. But I’m going to mention it because it’s a great option to cook with as well. Ghee is made by melting butter, skimming the fat off to save, then discarding the leftover liquid. It’s basically the BEST part of butter. It’s rich in healthy fat-soluble vitamins such as vitamins A, D, E, and K. These are vitamins important for promoting bone health, brain health, and boosting your immune system. Ghee is perfect for high heat cooking up to about 475°F, because it won’t break into free-radicals like other oils when cooking at high temperatures — think stir-fry! How to choose the Healthiest Oils for Different Cooking Methods Best Oils for Baking Because coconut oil is solid at room temperature, it is an ideal oil for baking with, and greasing baking pans with. Best Oils for Sautéing Depending on what you are sautéing coconut oil, avocado oil, and sesame oil are your best options. Avocado oil is a great neutral oil to sauté with, while coconut oil and sesame oil are amazing with asian-inspired meals. Best Oils for Roasting Because roasting if a high heat style of cooking — usually over 400°F — Avocado oil is a great option for its high smoke point. Roasting is such an amazing and EASY way to cook, and a very hands off — especially when cooking veggies! If you haven’t started roasting veggies yet, I have an entire guide on how to roast vegetables and I totally recommend using avocado oil. Best Oils for Grilling Just as with roasting, grilling is another high heat style of cooking, making avocado oil or ghee and great choice. For grilling, take a fresh paper towel or fresh kitchen towel and roll it tightly, then dip it into some avocado oil or ghee. Then using tongs to hold the towel, rub the grill grates with your oil to lightly grease your grill to ensure that whatever you’re cooking doesn’t stick. Best Oil for Garnishing + Finishing Now some oils with low smoke points are better for finishing dishes and in salad dressings. They also make great sauces, and marinades that don’t require heating. Here are some of the healthiest oils to use when you aren’t heating them. Healthy Oils to Have on Hand, but NOT for Cooking with… Sweet Almond Oil While unrefined almond oil is a rather delicate oil that can’t withstand very high cooking temperatures, it is still a great oil to keep on hand as a finishing oil because is a great source of the antioxidant vitamin E that protects cells from free radicals. It’s great when used to make a light vinaigrette for a salad or to drizzle over when finishing some roasted vegetables. Or you can also use it to drizzle over some cooked pasta for a light pasta topping. Sweet almond oil is also an amazing oil to have on hand for your beauty routine too, and has amazing moisturizing properties for your hair, skin, and nails. Flaxseed oil is high in omega-3 fatty acids, and specifically the form alpha-linolenic acid (also called ALA). Omega-3’s are an important addition to any diet because they are a type polyunsaturated fat that you body cannot produce on it’s own. And while flax oil should not be heated above 225°F, it has been shown to have several health benefits, such as reduced blood pressure, boost brain function, and improve regularity. And simple ways that you can add this amazing oil into your diet are using it in salad or even drizzling in a tablespoon into your smoothie for a powerful heart and brain booster. It’s also an amazing oil for seasoning your cast iron skillet. When you expose flaxseed oil to high heat, it creates a durable layer of seasoning that other oils don’t provide. If you are looking around for the BEST all around go-to oil for you pantry, my recommendation would be Avocado oil! Get the Recipe Guide! Instant access to over 300+ delicious recipes that will help you glow from the inside out. These healthy recipes will save you tons of time in the kitchen and help you FINALLY reach your goals.
<urn:uuid:93342f5e-af52-4e2a-bb0a-0c56ae6c765f>
CC-MAIN-2022-33
https://thelivefitgirls.com/healthiest-cooking-oils/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.945096
2,518
1.835938
2
By Paul Andersen Like cloud computing, mobility—or more specifically, the “bring your own device” (BYOD) trend—is causing businesses to reevaluate their approach to information technology. It is also presenting IT with a major challenge: preventing a security disaster. Every personal mobile device connected to the corporate network is a threat and every personal tablet and smartphone introduces the potential for data leakage. Security concerns arise when traditional VPNs are used to connect mobile devices to the corporate network. VPNs create a tunnel through which data may escape or attacks may be introduced. In addition, it is impossible to lock down personal devices the way one would a traditional managed device such as a laptop or desktop PC. Mobile devices are also greater in number, more prone to theft or loss, and more frequently open up the organization to the risks of personal use. Mobile device management (MDM) solutions provide some measure of control over mobile devices connected to the corporate network and simplify the provisioning of apps, but they do not fully mitigate risk. Device support is another consideration. Before enacting policy and opening the BYOD floodgates, the implications of supporting multiple applications, platforms, and OS versions should be carefully considered. As every permutation imaginable surfaces, business can end up mired in helpdesk calls and upgrade requirements or curtailing BYOD support after the fact. An often overlooked pitfall of implementing BYOD is the lack of native enterprise applications. Although many more business apps will be developed over time, the challenge is enabling BYOD today. At present, a vast majority of enterprise applications remain tied to Windows and traditional desktop environments. Even if a BYOD solution supports a broad range of personal devices in a secure manner, the investment can still be a disaster if the applications employees use every day are not available in the mobile environment. To enable mobility and avoid a bring-your-own-disaster scenario, many businesses, solution providers, and value-added resellers have taken a clever approach to BYOD—one that leverages remote desktop access and secure access gateways to extend applications on physical or virtual desktops or terminal services to mobile devices. Unlike with VPNs, mobile devices do not connect directly to the corporate network. Because data never leaves the corporate network, data leakage is fully eliminated. And because devices are kept off the network, the risk of attack is eliminated as well.
<urn:uuid:970b1547-23e6-47aa-8533-0aa78cf9fd9b>
CC-MAIN-2022-33
https://www.channelpronetwork.com/article/how-avoid-bring-your-own-disaster-scenarios
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.919524
493
1.773438
2
Why has the dollar been strong? ''Euro Drops to Two-Year Low Amid Speculation on ECB The euro fell to the lowest level in two years against the dollar as slowing inflation boosted the case for the European Central Bank to add further monetary stimulus to avert deflation. The 18-nation currency had its worst quarter since 2010 amid the ECB's moves to swell its balance sheet and cut borrowing costs to spur growth. Russia's ruble sank after Bloomberg News reported the central bank is weighing capital controls, and Canada's dollar weakened as the nation's economy stalled. The U.S. dollar climbed the most in six years this quarter as the Federal Reserve considers raising interest rates. 'The violence of this euro move has been fairly dramatic,' said Camilla Sutton, head of currency strategy at Bank of Nova Scotia in Toronto. 'We're in this period of broad U.S. dollar strength. It's fairly hard for almost any currency to strengthen in that kind of environment.' ''
<urn:uuid:cfa60a69-4e4d-41c3-95b0-c9a987502c7e>
CC-MAIN-2022-33
https://www.monex.com/why-has-the-dollar-been-strong/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.940577
199
2.1875
2
Keywords: Dissenting opinion, separate opinion, Constitutional Court, legitimacy Abstract: This text deals with dissenting opinions, especially in terms of their impact on the legitimacy of judicial decisions. After a definition of the term itself, a brief introduction to foreign and Czech legislation is given. At the same time, the text presents some dilemmas related to dissents. It turns out that without a closer examination of what is the subject of dissents, how they are formed in practice or what their language form is, it is not possible to draw a conclusion as to whether dissents belong to the Czech legal culture. The most important passages in the text are therefore those in which the general starting points and arguments related to dissents are compared with the practice at the Czech Constitutional Court. The text seeks to demystify some arguments associated with dissents, tries to confront them with reality, and thus continuously arrives at what conditions are suitable for dissents and what demands must be placed on their procedural regulation.
<urn:uuid:f0f41de8-0b3f-454f-8790-c509888d4d53>
CC-MAIN-2022-33
https://www.jurisprudence.cz/en/magazine/the-art-of-disagreement-dissenting-opinions-in-the-context-of-the-legitimacy-od-court-decision.m-498.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.941379
203
2.484375
2
Jessyka Villalva wants to motivate her two children with her educational journey. Photo provided by Jessika Villalva. By Annais Garcia. Staff Reporter. Every morning, Jessyka Villalva, a California State University Dominguez Hills student of Liberal Studies, wakes up at 5:45 a.m. to shower, cook breakfast, wake up her kids, and get them ready for school. Villalva is the mother of a six-year-old boy and a four-year-old girl. She also works as a nanny of two kids and is enrolled in two online classes that would take her closer to earning her bachelor’s degree. “I would say that this is challenging, stressful, but very rewarding,” Villalva said. After she drops the kids off at school, Villalva stops at the park for a quick workout before going back home to cook for her family and join her online classes. Then, she takes her kids to soccer games and to other activities. Her day ends by doing homework at midnight. “To watch them, work with them, take them to their activities, those little things I enjoy to do,” Villalva said. During the last years in California, 1.5 million students applied for Financial Aid, and from those, 13% were parents of children according to a UC Davis report. Villalva is also one of many students who have applied to Financial Aid, have children and divide their time between family, career, and work. “I’m only one of the millions and everyone has a different story,” Villalva said. Villalva decided to take online courses to spend time with her children at home. They are the most important part of her life but she is also very committed to her career. Her degree would not only provide her family with economic stability, but it would also motivate her kids to pursue their educational goals in the future, just as she is doing it right now. “I could finish when I was younger, but I was not as motivated as I am right now,” Villalva said. It has been demanding for Villalva to take care of her two children and attend college at the same time. But her kids are the motivation she needs to graduate. She wants to make them proud by earning a college degree. “I think that if I wait until my kids are older, I would be much more tired and not as motivated as I am right now,” Villalva said. Ever since Villalva graduated from high school in 2005, she has never stopped taking classes. She believes that right now is the perfect time to finish her studies. “Honestly I don’t think that there is a right way to do it, you have to do it when it feels appropriate because everybody’s circumstances are different,” Villalva said. According to a BPS study, students who are parents are 10 times more likely to finish their Bachelor’s degree in a longer time than those students who don’t have any children. As Villalva gets closer to finishing her academic goal of graduating next spring 2023, she is considering pursuing a master’s degree to work in the education field. A career path she has always wished for. While Villalva has been a student and mother, she has encouraged other members of her family, like her younger sister, to go to college and finish a career. She tells her that it is never too late to go back to school, and that it is important to work on one’s goals. “If you are motivated and want to have some stability, then do it, and do it for yourself,” Villalva said. “Once you have that degree on your hand, it is something you can be proud of.” In April 2022, the CSUDH Student Parents organization invited those students that have children to participate in a survey (that closed on April 30th), where they would share their experiences and could win a $50 gift card. “The experiences of pregnant and parenting students are valuable and the purpose of the survey was to gather more information about their needs,” said Melissa Neustein, from the CSUDH office of equity and inclusion. CSUDH has developed special accommodations for students who are pregnant or have recently given birth. These accommodations include excused absences, the opportunity to make up missed work, alternatives such as retaking a semester in case of missed course, and lactating stations for mothers who attend in-person classes. Villalva is a first-generation student who will earn a bachelor’s degree at CSUDH and she wants her children to do the same in the future. “I’m the first one in my family to graduate, this is not just for me and my kids, it is for my family,” Villalva said. “My family is definitely my motivation.”
<urn:uuid:07986037-0d4e-45dc-b396-5b8feb10a802>
CC-MAIN-2022-33
https://www.csudhbulletin.com/the-mother-student-and-woman/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.984366
1,059
2.109375
2
Culex quinquefasciatus (originally named Culex fatigans), commonly known as the southern house mosquito, is a medium-sized mosquito found in tropical and subtropical regions of the world. It is a vector of Wuchereria bancrofti, avian malaria, and arboviruses including St. Louis encephalitis virus, Western equine encephalitis virus, Zika virus and West Nile virus. It is taxonomically regarded as a member of the Culex pipiens species complex. Its genome was sequenced in 2010, and was shown to have 18,883 protein-coding genes. |Left: male, right: female| American entomologist Thomas Say described Culex quinquefasciatus, which he collected along the Mississippi River, in 1823. Originally written as "C. 5-fasciatus", the name refers to 5 (quinque) black, broad, transverse bands ("fasciatus" or "fasciae") on the mosquito's dorsal abdomen. The name remains despite later revelations of more than 5 fasciae, thanks to improved microscopy. Although quinquefasciatus is the official scientific name, there are at least 5 synonymous names for this species. Cx. quinquefasciatus is a member of the Culex pipiens species complex. Smith et al. 2004 develop an assay specifically for this complex and use it to confirm that it does encompass this species. The adult C. quinquefasciatus is a medium-sized mosquito and is brown in colour. The body is about 3.96 to 4.25 mm long. While the main body is brown, the proboscis, thorax, wings, and tarsi are darker than the rest of the body. The head is light brown, with the lightest portion in the center. The antennae and the proboscis are about the same length, but in some cases, the antennae are slightly shorter than the proboscis. The flagellum has 13 segments that may have few or no scales. The scales of the thorax are narrow and curved. The abdomen has pale, narrow, rounded bands on the basal side of each tergite. Males can be differentiated from females in having large palps and feathery antennae. The larva has a short and stout head. The mouth brushes have long yellow filaments used for filtering organic materials. The abdomen consists of eight segments, the siphon, and the saddle. Each segment has a unique setae pattern. The siphon is on the dorsal side of the abdomen, and is four times longer than its breadth. The siphon has multiple setae tufts. The saddle is barrel-shaped and located on the ventral side of the abdomen, with four long anal papillae protruding from the posterior end. Mature C. quinquefasciatus females fly at night to nutrient-rich standing water to lay eggs. They breed profusely in dirty water collections, including stagnant drains, cesspools, septic tanks with leaks, burrow pits, and almost all organic polluted water collections. A single female can lay up to five rafts of eggs in a lifetime, with each raft containing thousands of eggs. The exact number varies depending on climatic conditions. The larvae feed on organic material in the water and require between five and eight days to complete their development at 30 °C (86 °F). The larvae pass through four larval instars, and towards the end of the fourth instar, they stop eating and undergo moulting to give rise to pupae. After 36 hours at 27 °C (81 °F), adults emerge. The exact timing of development can vary depending on temperature. In optimum temperature and humidity, the lifecycle will be completed in seven days, passing through the egg, larval, pupal, and adult stages. Both male and female adults take sugar meals from plants. After mating, the female seeks a blood meal from a mammal or bird, as ingested blood is necessary for egg development. C. quinquefasciatus shows a preference for the blood of birds, but will also commonly bite humans. Known hosts include birds (Aves), cattle (Bos taurus), dogs (Canis familiaris), Equus including donkeys (E. asinus), cats (Felis), mice (Mus musculus), house sparrows (Passer domesticus), rats (Rattus) and boars (Sus scrofa). "Quinx" are among the world's most abundant peridomestic mosquitoes, earning the nickname "southern house mosquito". The species' place of origin is uncertain. It may have been native to the lowlands of West Africa, or to Southeast Asia. Cx. quinquefasciatus is now found throughout subtropical and tropical areas worldwide, including the Americas, Australia and New Zealand, except for exceedingly dry or cold regions. Thomas Say described the species as "exceedingly numerous and troublesome". It rests in trees and high places. As a vectorEdit The southern house mosquito is a principal vector of numerous pathogens, transmitting the phlebovirus Rift Valley fever virus, and the two flaviviruses St. Louis encephalitis virus and West Nile virus, plus filarial worms and avian malarial parasites. It transmits zoonotic diseases that affect humans and wild and domestic animals, such as lymphatic filariasis, avian malaria, St. Louis encephalitis, Western equine encephalitis, and West Nile fever, and may be a vector of the Zika virus. It causes infection through biting during blood meal. In the southern U.S., it is the primary vector of St. Louis encephalitis virus. In India and Southeast Asia, it is the primary vector of Wuchereria bancrofti, a nematode that causes lymphatic filariasis. It acts as an intermediate host for the helminth parasite by harbouring the larval stages. In Hawaii, it is the principal vector of avian malaria (Plasmodium relictum), to which historic extinctions and significant contemporary population declines in Hawaii's native honeycreeper species are attributed. It is the definitive host for the malarial parasite as it harbours the sexual cycle. In 2013 West Nile Virus positive specimens were collected in Southern California. - Nolen, Stephanie (July 21, 2016). ‘Very bad news for Brazil’: Zika virus found in second mosquito species. The Globe and Mail. - Hill, Stephanie; Connelly, Roxanne (2009). "Features Creatures: Southern house mosquito". University of Florida. Retrieved 19 March 2014. - Sandhu TS, Williams GA, Haynes BW, Dhillon MS. Evaluation of arboviral activity at Northwest Mosquito and Vector Control District, Riverside County, California during 2008. Proc and Papers of the Mosq and Vector Control Assoc of Calif, vol 77, 2009. p. 108-15. - Harbach, Ralph E. (2012). "Culex pipiens: Species Versus Species Complex – Taxonomic History and Perspective". Journal of the American Mosquito Control Association. The American Mosquito Control Association. 28 (4s): 10–23. doi:10.2987/8756-971x-28.4.10. ISSN 8756-971X. PMID 23401941. S2CID 31007129. - Turell, MJ (2012). "Members of the Culex pipiens complex as vectors of viruses". Journal of the American Mosquito Control Association. 28 (4 Suppl): 123–6. doi:10.2987/8756-971X-28.4.123. PMID 23401952. - Arensburger, P.; Megy, K.; Waterhouse, R. M.; Abrudan, J.; Amedeo, P.; Antelo, B.; Bartholomay, L.; Bidwell, S.; Caler, E.; Camara, F.; Campbell, C. L.; Campbell, K. S.; Casola, C.; Castro, M. T.; Chandramouliswaran, I.; Chapman, S. B.; Christley, S.; Costas, J.; Eisenstadt, E.; Feschotte, C.; Fraser-Liggett, C.; Guigo, R.; Haas, B.; Hammond, M.; Hansson, B. S.; Hemingway, J.; Hill, S. R.; Howarth, C.; Ignell, R.; Kennedy, R. C.; Kodira, C. D.; Lobo, N. F.; Mao, C.; Mayhew, G.; Michel, K.; Mori, A.; Liu, N.; Naveira, H.; Nene, V.; Nguyen, N.; Pearson, M. D.; Pritham, E. J.; Puiu, D.; Qi, Y.; Ranson, H.; Ribeiro, J. M. C.; Roberston, H. M.; Severson, D. W.; Shumway, M.; Stanke, M.; Strausberg, R. L.; Sun, C.; Sutton, G.; Tu, Z.; Tubio, J. M. C.; Unger, M. F.; Vanlandingham, D. L.; Vilella, A. J.; White, O.; White, J. R.; Wondji, C. S.; Wortman, J.; Zdobnov, E. M.; Birren, B.; Christensen, B. M.; Collins, F. H.; Cornel, A.; Dimopoulos, G.; Hannick, L. I.; Higgs, S.; Lanzaro, G. C.; Lawson, D.; Lee, N. H.; Muskavitch, M. A. T.; Raikhel, A. S.; Atkinson, P. W. (2010). "Sequencing of Culex quinquefasciatus Establishes a Platform for Mosquito Comparative Genomics". Science. 330 (6000): 86–88. doi:10.1126/science.1191864. PMC 3740384. PMID 20929810. - Guagliard, Sarah Anne J.; Levine, Rebecca S. (August 2021). "Etymologia: Culex quinquefasciatus". Emerg Infect Dis. 27 (8). Retrieved September 2, 2021. This article incorporates text from this source, which is in the public domain. - "Brown House Mosquito (Culex quinquefasciatus)". OzAnimals.com. Retrieved 19 March 2014. - Prada, Paulo (2016). "Research indicates another common mosquito may be able to carry Zika". Reuters. - "Culex quinquefasciatus (southern house mosquito)". Invasive Species Compendium. CAB International. Retrieved 6 January 2022. - "Southern house mosquito – Culex quinquefasciatus Say". Featured Creatures. University of Florida. Retrieved 6 January 2022. - Kathy Keatley Garvey. 2016. "Are Culex Mosquitoes Potential Vectors of the Zika Virus?", Bug Squad, Happenings in the Insect World, March 2, 2016. - Albuquerque, Cleide MR; Cavalcanti, Vânia MS; Melo, Maria Alice V; Verçosa, Paulo; Regis, Lêda N; Hurd, Hilary (1999). "Bloodmeal microfilariae density and the uptake and establishment of Wuchereria bancrofti infections in Culex quinquefasciatus and Aedes aegypti". Memórias do Instituto Oswaldo Cruz. 94 (5): 591–596. doi:10.1590/S0074-02761999000500005. PMID 10464399. - Farajollahi, Ary; Fonseca, Dina M.; Kramer, Laura D.; Marm Kilpatrick, A. (October 2011). ""Bird biting" mosquitoes and human disease: A review of the role of Culex pipiens complex mosquitoes in epidemiology". Infection, Genetics and Evolution. 11 (7): 1577–1585. doi:10.1016/j.meegid.2011.08.013. PMC 3190018. PMID 21875691. - Sandhu TS, Williams GW, Haynes BW, Dhillon MS. Population dynamics of blood-fed female mosquitoes and comparative efficacy of resting boxes in collecting them from the northwestern part of Riverside County, California. J Global Infect Dis [serial online] 2013 [cited 2013 Oct 22];5:15-8. - Data related to Culex quinquefasciatus at Wikispecies - Media related to Culex quinquefasciatus at Wikimedia Commons - "Culex quinquefasciatus". VectorBase. Archived from the original on 2010-07-18. - Disease monger - Identification guide at University of Florida - NSW Arbovirus Surveillance & Vector Monitoring Program - Taxonomy at UniProt
<urn:uuid:bc8a685f-60fb-4f93-a66e-1c439ef51500>
CC-MAIN-2022-33
https://en.m.wikipedia.org/wiki/Culex_quinquefasciatus
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.766702
2,993
3.5
4
Sit tight, cubicle dweller: The rest of the world may soon be returning to the office. Human resource experts predict that telecommuting--touted throughout the 1990s as the hottest office trend since carpooling--will likely become as rare as the 40-hour workweek. They predict corporate America is on the verge of a severe backlash against telework, which if not properly regulated can result in productivity drops and an erosion of team spirit. "Telecommuting is really a failure, big time," said Larry Prusak, executive director of IBM's Institute for Knowledge Management in Boston. "People know that if they do it often, they never get anywhere because they're out of all the loops. Only people with no ambition in their organization buy into it...The idea that it's going to reshape the working world is a grand myth." Such skepticism is a stark contrast to the sentiment even six months ago, when few people publicly questioned the benefits of telecommuting. The ranks of telecommuters have grown rapidly throughout the late '90s, as employees have wired homes with high-speed Internet connections and multiple phone and fax lines. Fueling the trend: An office-space crunch in most major U.S. cities, particularly in Silicon Valley and the Northeast, has forced employers to be creative when it comes to hiring. Instead of leasing new office space or expanding the existing headquarters, it's vastly less expensive to provide workers with laptops and phone lines and tell them to stay home. Northern Telecom estimates it saves $2,000 per person per year when it does not have to provide the typical 64 square feet of space needed for an employee. According to a recent report from the International Telework Association & Council (ITAC), at least 16.5 million regularly employed workers in the United States over age 18 telecommute at least one day per month. At least 9.3 million U.S. workers telecommute at least one full day per week, ITAC reported. By some estimates, as many as one in four workers will telecommute within five years. But those statistics typically include occasional teleworkers--people who do it instead of calling in sick or who work at home part of the day to let the plumber into their home. According to IBM research, fewer than 5 percent of all U.S. workers telecommute on a full-time basis, and the number appears to be shrinking. In fact, a small but growing legion of workers say they'd rather be in the office than at home--and they'd rather have their managers and co-workers close at hand, as well. "I know a lot of people would die to telecommute, but I actually prefer working with other people," said Kevin Key, a Webmaster in San Diego, who recently popped into an online chat group about telecommuting. "I like to interact with other people, especially because I work on a computer all day. I wouldn't want to be sitting at home all day." It's difficult to find HR executives who blatantly admit that they're reining in teleworkers. A recent poll by Techies.com shows that telecommuting has become one of the most preferred perks among workers in the technology industry. Few managers want reputations as rigid tyrants who require their minions underfoot during daylight hours. But privately, HR professionals are beginning to grumble about at-home workers. At the heart of the backlash is a candid acknowledgement among managers: Telecommuting--as progressive and logical as it may be in the Internet Age--has gone too far, too fast. Most people agree that telecommuting privileges make sense for regional sales managers and others who spend much of their time traveling. It's also popular on an occasional basis for workers who have to finish deadline projects when they're feeling under the weather, when child-care plans fall through, or when a construction project or snowstorm impedes the commute. But even telecommuting advocates admit it doesn't make sense for reception desk clerks, senior executives, or anyone whose responsibilities include "face time" with other employees or the public. Given the historically tight job market, the fierce competition for talent, and the record high turnover among workers, many executives see telecommuting as a perk to woo new recruits--no different than offering them company cars, subsidized Internet access or stock options. "We tell everyone that it's allowed, but in reality we hope that people realize that it's not always practical, and we hope they don't take advantage of it too much," said an HR manager for an e-commerce company based in Sunnyvale, Calif. "If everyone took advantage, the office would be empty and it wouldn't be pretty." Many experts say the telecommuting trend will die a quick death when the economy begins to cool and the job market loosens. When that happens, employers won't have to fight for employees with such lifestyle perks as telecommuting. "If there's a downturn, who would be more likely to be let go--a friendly person in the office or someone no one ever saw?" Prusak said. "You can bet that when the economy takes a turn, people won't want to telecommute as much." Another pail of water on the telecommuting blaze: The Occupational Safety and Health Administration (OSHA) released a five-page document on telecommuting in 1999 in response to a query sent by a company that was unclear about safety standards of teleworkers. OSHA said that an employer would be responsible for preventing or correcting hazards in a home office, passing an unprecedented burden of liability onto the employer. "Employers must take steps to reduce or eliminate any work-related safety or health problems they become aware of through on-site visits or other means," OSHA stated. OSHA did not detail how much responsibility an employer has for a teleworker's home office. It's unclear whether an employer is responsible for making sure a teleworker's office is ergonomically sound or whether the employer should pay for snowplowing services on the porch and driveway of a traveling salesperson's home. But experts said the OSHA recommendation will go down as the first budge of moving the pendulum away from telecommuting. "People are going way overboard; they're sending people home with computers and cable modems and thinking everything will be fine," said Jessica Lipnack, CEO of Virtualteams.com, an industry portal for employers and employees who participate in networked offices. "If people never see one another, that's ridiculous," said Lipnack, who advocates bringing together telecommuters numerous times during the course of every work project. "We don't want to do away with the thing that we really love: human contact." The scholars' take Also fueling the backlash are academics, who are just starting to study the effect of telecommuting on productivity and corporate identity. Most reports point to increases in productivity among teleworkers. According to the ITAC study, sponsored by AT&T, the self-reported productivity improvement of home-based teleworkers averages 15 percent. But many studies indicate that teleworkers may unwittingly undermine workplace collaboration and sap productivity in more subtle ways. According to a report in the S.A.M. Advanced Management Journal in the fall of 1999, ranks of disparate telecommuters may sabotage corporate culture. Telecommuters, the scholarly journal reported, are vastly different than office workers. "These individuals question how the basic norms, beliefs, and values that composed a particular culture will be reinforced and maintained with 'no water coolers to gather around or lunchrooms to meet in,'" wrote the authors, Thomas W. Gainey of the State University of West Georgia and Donald E. Kelley and Joseph A. Hill of Francis Marion University. "In other words, this position argues that corporate cultures traditionally strengthened and reinforced through informal discussions of stories, ritual and specialized language can no longer be maintained. Therefore...geographic dispersion is the primary factor contributing to a weakened culture." Despite the emerging questions about telecommuting, the practice is likely to remain--at least on an occasional basis for a portion of the work force. The emerging generation of workers--also known as Generation Y--shows an unprecedented desire for workplace flexibility, including telecommuting. But instead of expanding telework, many companies are experimenting with alternatives. Merrill Lynch staffs a corporate hotel in the New York suburbs where certain employees can book a cubicle whenever they don't have to appear in the headquarters. Early research indicates that so-called telework centers may boost productivity, allowing employees to evade the distractions of dirty laundry and the television at home--as well as water-cooler chitchat at the office. To cope with the high price of commercial real estate and the shortage of information technology workers near its San Francisco headquarters, software company Macromedia is in the process of opening outpost offices in Maryland, Minnesota, San Diego and throughout Europe. Each office will have a conference room equipped with three large video screens so programmers and engineers can collaborate from remote locations. Macromedia CEO Rob Burgess said the remote offices have become popular with employees, who don't necessarily enjoy punching a keyboard in home isolation all day. "I don't see a practical limit to that kind of setup," Burgess said. "I like the local community culture."
<urn:uuid:2e7a1946-597b-44d4-8871-2cdc47c32764>
CC-MAIN-2022-33
https://www.cnet.com/tech/tech-industry/employers-workers-begin-to-hang-up-on-telecommuting/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.956889
1,950
1.953125
2
Concrete is the most common and the most popular material used, now-a-days, in construction. It is abundantly available and can be molded into various shapes. While it has low tensile strength, it has high compression strength. Being alkaline in nature, concrete offers a non-corrosive atmosphere for re-enforcing steel. So if you are searching for “concrete repairs Sydney” then look no further than Get Dry Waterproofing Solutions. Get Dry Waterproofing Solutions offers high-quality services of concrete repairs in Sydney for structures that have come under a damping effect. Whether you are looking for strata type repairs or a large scale repair, we can be of immense help. Our purpose built machinery base is perfectly able to cater to your needs. In order to treat concrete issues, we remove the broken or damaged concrete and make sure that the steel that has been exposed is cleaned or replaced. We then use cement mortar or concrete to restore the treated area. For treating cracks, we make use of special mortars, epoxy resins and injection techniques. Steel Reinforcement Repair Concrete is susceptible to damage through the egress of water into the structure, oxidising the steel reinforcement. This is known as rust to steel. This can be caused by various influences. - Poor quality of concrete work causing porous concrete or honeycombing. - Reinforcement steel with insufficient cover of concrete to protect it. - Aggressive environment or exposure of concrete to: Chlorine Ion Attack- salt water-rusted reinforcement. - Carbonation- attack from other chemicals other than salt water. Our Steel Reinforcement Repair and solutions of concrete repairs in Sydney follows several methods, like Dry Spray and Wet Spray. Dry Spray – If you want to repair concrete on a large scale, dry spray method can be perfect. With reduced wastage and rebound, and project-specific selection of material, we can efficiently deliver work. Wet Spray – A concrete repair material, prepared and mixed, is fed into a pump wet before being sprayed over the substrate. It is best known as a solution for medium to large scale repair work. During original construction or structure life-cycling, cracks often develop that allow water and pollutants to enter a substrate. They are often caused by too much of loading, mistakes in design and cracking caused by erosion. Each concrete crack has its specific set of characteristic features. It is essential to know all of them and use the right method. A proper and thorough service in crack repairs in Sydney is necessary to make sure that a concrete structure works as expected. We check and re-check all joints to see to it that there are no contaminants inside them that can cause any type of obstruction in the usual functioning of the edifice. With crack repairing services, we ensure that the entry of moisture is checked to a great extent, making the concrete less susceptible to get broken. If this cracking is non-moving (dead crack) but structural it is repaired through injection of a low-viscosity epoxy. The epoxy seals the cracks and restores the structural nature of a substrate. If the cracking is moving (live crack) a polyurethane injection system is applied. These materials are hydrophilic which can expand from 7 to 20 times in order to fill these moving cracks. Get Dry is the leading concrete repairs Sydney business with only the highest trained and professional staff. If it’s steel that needs repair or removal and replacing or cracks to be taken care of be assured we use the highest quality materials and systems available for any given application. Through years of experience, we have gathered deep insight into the environmentally aware methodologies that make sure that the social responsibilities are adhered to. We have a detailed understanding of the mechanism of concrete damage leading us to implement the best fit solutions for each issue, right from the core. Our concrete repairs Sydney service is ready and waiting to take your call. Call us for free no obligation quote and advice for our concrete repairs in Sydney service. No job to small. Waterproofing Technician and Floor and Wall Tiling
<urn:uuid:a9eac554-2dea-4538-871b-1ef3778ed6cc>
CC-MAIN-2022-33
https://getdry.com.au/concrete-repair
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.934539
857
1.710938
2
On the weekend, I went for a walk with my dog, Murphy, and we found ourselves approaching a large green tree that has a nest in it. As we approached the tree, I was not surprised when Murphy started barking, something he probably has had all his life. But when he started barking, he started barking in a way that was quite unusual for a smaller dog. He started barking in a way that made us smile to see such a beautiful thing happening. As Murphy continued to bark, I could feel his pain. He was in lots of pain. His back hurt, his legs hurt, his tongue hurt. It was clear that he had been injured he his little dog. I was going to put him in the nest. At that moment, I thought it would be good for him to be in a larger space where he might not have the chance to get hurt. But then, I thought about why he needed to be in the nest at all. I started thinking about what this looked like. If my dog had been in a great cat house like the “Terningert Park” (though I haven’t gotten my share of the bird, cat, or animal options), would he have to leave the nest? Would he end up with a painful relationship as a result of Using cruelty to Prevent cruelty? Would I have to put my dog through some horrible thing if I tried to hurt him and then have him return to the same damn spot he was on when I found him hurt? If Murphy had not been forced to leave the nest, it would have been so much more peaceful if he would have remained there and not explored this world at all. So, I decided to put Murphy in the nest and take him home. As I ran towards the dog house, I could hardly believe my eyes. I was surrounded by thousands of dogs and cats. All of them were looking out for their own “home”. I experienced just about the total confusion of what I had perceived to be “my house” was around me. And to add insult to injury, there were dead dogs that looked as though they had been run over by a semi. They all looked so very sad and emaciated. What is all the commotion about and how does this relate to a dog leaving the nest? Try this. Close your eyes. Take a slow breath. See if you can picture your own “home” in the back of your mind. Do you know exactly where your home is? Do you know exactly what you can and cannot do to make your home happy? Can you leave anything there? The reason you want to take this out of your head and heart is because you now have to and are going to pay real attention here and now. I believe a dog leaves that “home” every day of their life. Your “home” may be only a few feet away, but you must be honest NOW and see if you are truly leaving that “home” every day. It may be the amount of time you spend on your computer, it may be sitting in front of the TV, it may be how much you spend on the internet, but ask yourself honestly. Where are you going in life? Are you taking those daily steps to really get to the place you want to be? If you are not, then you are not going in your life. I quickly learned that if I wanted my dog brain to be working in a way that was going to help me into what I really wanted, I had to focus on a different thing. Every day, I took my dog to the park. No exceptions. Every day. So many people like pets. It’s a part of the American culture. Dibaca juga : Pokerstars – The Place For Online Poker But the thing that made all the difference in the world was that while I was walking to the dog house, something really cooking in my brain came to the surface. Before the dog came home I had a very intense conversation with myself. I was going to leave my dog with Murphy in the nest. I picked up all the discomforts of my home. We all have them. They are habits. The dog came in and behaved as if he was from another planet. He played, he ran, and Universally, I felt I was going to have to “oys” and move every single item in my home and office to another space. That is what it’s going to take to move your mind now. To stop taking ownership of those habits. Love is essential to truly living. It all comes down to the Law of Attraction and Attraction only. You need a new habit. All the-time. Like if you want to attract money, but you are constantlyreciation more stuff. You put out that head vibrating and sense of positive energy, you will be sending a lot of good vibrations out to the Universe, which will return to you just a lot more stuff.
<urn:uuid:3068fb61-a390-4c05-b616-05e3f42a89ed>
CC-MAIN-2022-33
http://reichstadt.info/you-have-a-chronic-healing-easiness-problem/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.992283
1,028
1.875
2
How Long To Hike 100 Km Can a person walks 100 km in a day? The majority of people regularly walk around 5 kilometers a hr. Presuming you’re in no rush, and also the surface is flat, and also you can strolling at a continuous rate for the better component of a day, you ought to be able to cover 100km in around 20 hours. Can you walk 100 km? Finishing a 100 kilometres run is tough yet walking 100 km is not likely to be any less complicated. On our Dartmoor in a Day 50 km event, the fastest joggers finished in 6 hours but lots of walkers took control of 12. The runners had ended up, consumed and also placed on fresh clothes, while a lot of pedestrians were still out. How do I prepare for a 100km walk? Your training ought to focus on developing a base of walking, after that enhancing your gas mileage in a structured way. Build some back-to-back lengthy days to allow you to analyze any type of troubles that may happen from walking the fars away. Take routine but short breaks on these long training walks. How far can a human walk without stopping? If a pedestrian is trained and also is taking breaks and also a dish stop, after that 20 miles a day is reasonable. If you take no breaks as well as are going quickly, you might have the ability to cover 30 miles if you have actually progressively developed your mileage throughout three to 6 months. How far can you walk in 12 hours? A runner can increase the speed substantially, and ultra-marathon competitions display individuals completing the extraordinary 100-mile distance in 12 hrs, or half a day. Really few walkers will get to that mark in less than 24 hr, as well as finishing that distance as a daily standard is just impossible. How long does it take to walk 80km? Certain, the 80km Bondi to Manly stroll can be finished in around 15 hours if you run, but also for simple walking mortals, it can take anywhere from two-eight days. A preferred– as well as practical– schedule is to take 4 or 5 days, covering around 20km (12.5 miles)… concerning seven hours of walking each day. Can a person walk for 24 hours? The lengthiest distance that a person can stroll in 1 day is concerning 48 miles (80 kilometers) without quiting to remainder. You should quit and relax about every 8-12 miles (15-20 kilometers). Can you walk an ultramarathon? Then you are all set for the world of ultramarathons! Ultramarathons are walking/running occasions of any kind of range above the marathon 42 kilometers (26.2 miles). While these occasions are normally established for runners, walkers are invited if they can fulfill the necessary time cutoffs. How long does 10km take to walk? A 10-kilometer (10K) stroll is 6.2 miles long. It is a common distance for charity runs and strolls and also the basic range for volkssport strolls. A lot of walkers complete a 10K stroll in 90 minutes to two hrs. How far can a person hike in a day? Every hiker and route is various, however on average, you can trek 8-15 miles a day Also the slowest hikers can cover a significant range if they have the moment to save. At a rate of 2 miles per hour (slower than standard), you can easily trek 10 miles in a day.
<urn:uuid:6136845d-2493-415f-ab28-922e5c43c19a>
CC-MAIN-2022-33
https://theprospect.net/how-long-to-hike-100-km/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.949954
742
1.890625
2
a fantastic day to learn about using prayer for others. “And pray for me, too. Ask God to give me the right words so I can boldly explain God’s mysterious plan that the Good News is for Jews and Gentiles alike.” Ephesians 6:19 NLT As Christianity was developing, no one understood the power of prayer quite like Paul. He knew that the sacrifice of Jesus Christ gave us the ability to communicate with God and summon His awesome power to give us strength, courage, and wisdom. While imprisoned in Rome, Paul sent a letter to the Church at Ephesus. It was a letter of encouragement, and at the end of the letter Paul reminds them to, “Pray in the Spirit at all times and on every occasion. Stay alert and be persistent in your prayers for all believers everywhere.” (Ephesians 6:18 NLT). Then Paul did something truly remarkable. He did something that should give us all pause as we try to imagine the circumstances he was in. Paul asked for the prayers of the members of the church of Ephesus, but he did not ask them to pray for his release, or any improvement to his personal circumstances. Instead, he asked them to pray so that God would give him the right words to use to spread God’s message even in prison. It is difficult for many of us to understand or appreciate the Christ-like selflessness of that humble request. It was a request for help, but it was a request to “help me to help others.” Of all of the beauty that the Bible contains, this is truly one of its more beautiful moments. Of all of the lessons taught within its pages, this is certainly one we should all learn. Prayer is a powerful tool provided to us by God, and while He wants to hear from us when we have personal problems that require His help, He wants to hear us call out to Him on behalf of others. He wants us to pray for one another. If we know someone who is sick, who is lost, who needs God in their lives – He wants to hear us call out to Him on their behalf. He also wants us to ask others for their prayers on our behalf when we are sick, or when we are facing tragedy or difficult times. God wants us to use the power of prayer that the sacrifice of His only Son affords us. Don’t be afraid to pray or to ask others to pray for you. Remember Paul’s request and learn from that perfect example. Taken from “TODAY IS….A Gift From God”, (C) 2013 Tony Casson
<urn:uuid:94d26939-ddaf-46f7-9fba-7dc0a24864f7>
CC-MAIN-2022-33
https://theafteroakdalechronicles.com/2022/06/28/june-28-8/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.969322
568
1.929688
2
Currently, there is not enough reliable data on the mid- and long-term consequences of pneumonia caused by COVID-19. One study described that more than half of patients who had to be admitted to hospital due to the SARS-CoV-2 virus continued to present symptoms two months after the start of the illness, with fatigue and dyspnoea (a feeling of shortness of breath) being the most common. At the pulmonary level, a recent article analyses patients discharged from intensive care units after suffering a serious illness. It is observed that 40% display changes to respiratory function a month after discharge, although the large majority of patients can carry out their day-to-day activities with no restrictions. However, the study was carried out on a small group of patients, with all the limitations this involves. In the Pneumocovid study, which involved more than 200 patients admitted to Hospital Clínic with serious COVID-19, approximately 25% of patients presented changes to respiratory function three months after being discharged from hospital. Various investigations in this field, which are still being carried out, will determine the real impact of the after-effects of this disease, especially those that persist in the mid- and long-term, in other words, 6 and 12 months after the serious illness caused by COVID. One of the scientific community’s main concerns regarding the potential after-effects of COVID-19 infection is the development of pulmonary fibrosis. Pulmonary lesions can be observed in x-ray images of some patients admitted due to COVID. These can be precursors to pulmonary fibrosis. The current hypothesis is that these lesions are a result of the inflammation caused by the virus itself, along with the consequences of mechanical ventilation in patients who require intubation. Although the full impact of the lesions is currently unknown, various centres are monitoring these patients to be able to detect the potential development of pulmonary fibrosis early, including post-COVID consultation at Hospital Clínic. In conclusion, the mid- and long-term after effects of COVID-19 are still not well understood. A high number of cases have been documented with persistent symptoms following the acute phase, without any clear relation to the severity of the illness. At the pulmonary level, it is known that a significant percentage of patients who have had a serious form of the illness present changes to respiratory function after three months of being discharged from hospital. Over the coming months, determining both the real incidence of after-effects and how to treat them is of high importance, in order to understand the full impact of pneumonia caused by COVID-19 in patients. Authors: Jacobo Sellarés, director of the Interstitial Lung Disease Working Group, and Oriol Sibila, Head of Department at the Hospital Respiratory Care. Pulmonology Department at Hospital Clínic de Barcelona
<urn:uuid:20c4e23c-2904-401e-b624-1a17ea1a155e>
CC-MAIN-2022-33
https://www.clinicbarcelona.org/en/news/pneumonia-caused-by-covid-19-can-result-in-significant-respiratory-after-effects
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.948901
590
3.109375
3
Global Citizen hosted its first concert in Montreal on Sept. 17. The event put pressure on world leaders who gathered in the city for the Global Fund’s 5th Replenish Conference and raised awareness for infectious diseases — specifically AIDS, tuberculosis, and malaria. It also brought some of world’s most exciting artists to the stage. In the weeks leading up to the concert, Global Citizens took action to get world leaders to commit to the Global Fund, to support the eradication of polio, to invest in girls’ education, and more. The night before the concert, governments, philanthropists, and corporations raised $12.9 billion for the Global Fund and then many in attendance came to the Bell Centre for a night of music and advocacy to celebrate all the progress that has been made against infectious diseases. It was a rainy evening outside, but thousands of Global Citizens lined up to listen to some great music and learn more about how to make a difference in the world. From the start, the show recognized the cultural heritage of Montreal by alternating between French and English through hosts like Maripiere Morin, Patrick Langlois, and George Stroumboulopoulos. Prime Minister Justin Trudeau stepped onto the stage and delivered a rousing speech. "I've said it before and I'll say it again: Poverty is sexist!" he said. He went on to describe his his commitment to gender equality and his country’s commitment to fighting infectious diseases around the world. Montreal-native Charlotte Cardin then performed a few powerful ballads before telling the crowd, "Let's make tonight one of many toward a kinder, safer, and more equal world." Elton John made a surprise appearance via video to talk about how important it is to continue the against fight AIDS. "Seeing the next generation embrace the fight against AIDS is incredibly inspiring," he said. "Fighting AIDS is a cause so close to my heart." Continuing on the topic of AIDS, Kweku Mandela introduced Johnson & Johnson Canada CEO Paul Stoffels who talked about his company's commitment to developing a vaccine. Later on, Loyce Maturo, who has been diagnosed with HIV and survived tuberculosis, came on stage to describe her work as a champion for victims of both diseases, especially when it comes to girls and women. It was a powerful moment for the audience, which had spent weeks, months, and, in some cases, years campaigning against both diseases. Canadian group Metric played a gorgeous acoustic set, running through some of their classics like "Help I'm Alive." Frontwoman Emily Haines said, "We want to beat AIDS, malaria, and tuberculosis. And we know the ones most affected are girls and women, and not only do they get sick, but they have to care for those in their family who are sick ... that means sliding into poverty. We have to break this cycle." Global Citizen favorite Ramesh Ferris carried on Maturo's message by sharing his story of contracting polio at 6 months old and then going on to become a global advocate. Read More: A Hat Trick for Polio Eradication Prime Minister Trudeau made one of many visits to the stage soon after. He was joined by philanthropist Bill Gates and, in one of the most touching moments of the evening, the two shared a long hug. The Gates Foundation had committed $600 million to the Global Fund the day before. Two more Montreal-natives, Grimes and Half Moon Run, also performed. Grimes raced around the stage with a frenetic energy for some electronic pop and dance songs. Half Moon Run slowed the crowd down with heartfelt calls for unity. The night ended on a celebratory note that brought everyone in the audience to their feet. The Roots backed up Usher for a boisterous take on the soul singer's sultry music. Usher is a long-time supporter of Global Citizen and didn't let the audience down when it came to advocacy. Multiple times he called on the audience to take action and to make the world a better place. Toward the end, after dazzling the crowd with his dance moves, Usher stood at the front of the stage and got the crowd to say, "I'm GC and I'm proud," over and over again. It was powerful end to a weekend that made significant gains in the fight against tuberculosis, malaria, and HIV.
<urn:uuid:ac88a3ee-9cdb-41e9-b5ca-384e49123277>
CC-MAIN-2022-33
https://www.globalcitizen.org/en/content/global-citizen-montreal-concert-recap/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.96822
906
1.8125
2
When I heard about the controversy surrounding (yet another) movie in which Colombia is portrayed as a land of cocaine, crime and armed insurrection, I was disheartened. It is baffling how apparent ignorance in Hollywood has led to the continued dissemination of the notion that Colombia—my country—is still an unsafe, violent place where visitors and tourists are regularly kidnapped or killed. On August 26, 2011, Sony Pictures’ Colombiana will premiere at theaters across the United States. It may be titled Colombiana, but the movie’s official synopsis doesn’t even mention the country. According to the Internet Movie Database, the entire film was shot in Mexico, Chicago and France—producers never even set foot in South America. Even more disturbing: the movie won’t have the same name in every country. In Colombia its title will be Dulce Venganza (Sweet Revenge), and Chinese theatergoers will flock to see Black Beauty Evil. Colombiana’s title is a brazen attempt by Hollywood producers to capitalize on the decades-old reputation of a country that has made tremendous progress in recent years. It is a purely commercial strategy grounded in fantasy, not reality. And what producers don’t realize is that perpetuating the myth that Colombia is a violence-ridden failed state can have real costs for people living there, and that negative perceptions can have serious negative real world consequences, such as an impact on tourism. This is good reason to support organizations such as Por Colombia—a group of volunteer students and friends of Colombia in the U.S. and Canada—and initiatives like Colombia, the Other Side of the Coin—a pacifist campaign lead by Carlos Plaza, a Colombian community leader in New York. The latter is leading efforts to distribute materials on premiere night in theaters throughout New York City that shed a more positive (and realistic) light on Colombia. When they first saw the trailer early this summer, Por Colombia launched #ColombiaisBeautiful—a grassroots social media campaign on Facebook and Twitter designed to counteract overly negative depictions of Colombia in pop culture. The campaign’s banner is a digitally altered poster of the movie: instead of a gun, the “Colombiana” on the film’s poster holds a bunch of flowers, and the tagline “Vengeance is Beautiful” is replaced by “Colombia is Beautiful.” This simple campaign has attracted thousands of followers and received coverage from national and international media outlets, including Univision and Huffington Post. Bogotá-born Carlos Macías, the president of Por Colombia, argues that Sony Pictures is making a profit at Colombia’s expense. Colombians are not against talking about the conflict, says Macías. “If you’re going to talk about the Colombian armed conflict, go ahead, we’re the first to start the conversation,” he points out. We don’t deny that violence remains a problem, but we demand balance. We want to provide people with actual facts, while at the same time remembering to include the country’s positive side—which is all too often left out. A few months ago a Russian student at Columbia University told me he had been everywhere in Latin America except Colombia. When asked why, he replied, “Because my dad can’t afford to pay the ransom.” Maybe it was a bad joke, but there is nonetheless some truth to it. It may have been slightly offensive, but it is good reason to stop and think. How can we expect people not to say such things when in July, policemen José Libardo Forero, Wilson Rojas, Carlos Duarte, Jorge Romero y Jorge Trujillo completed 12 years in captivity by guerillas? When in April, the Fuerzas Armadas Revolucionarias de Colombia (FARC) kidnapped two more unarmed soldiers in Medellín, Antioquia? And in July five Colombians were kidnapped in Arauca and that same month a money-laundering network caught in Spain with $30 million in Colombian cocaine money? Let’s face it: as long as these things keep happening, the rest of the world will keep making jokes about Colombian cocaine and kidnappings. It would be great if more people would keep an open mind, but that can’t be expected. So let’s focus on what we, as Colombians, can do. First, let’s avoid complaining about or denying our reality. Let’s not always answer, “We also have coffee and flowers.” (We do, but it goes beyond that.) We must be permanent promoters of our positive side by recognizing the improvements the country has achieved and delivering good, unbiased information about Colombia. We can also cite some concrete facts. For example, security on our national road system is better today than anytime in recent history, and more Colombians and tourists are traveling by car throughout the country. From 1990 to 2009, 26,977 drug laboratories were destroyed, according to the Observatorio de Drogas of the Dirección de Antinarcóticos, and 92,772 hectares of illegal crops have been eradicated so far in 2011. In addition, there were 1,602 extradition requests from 2002 to 2010, 1,106 of which were approved. These are real improvements. Further progress is a matter of time and consistent policy. Por Colombia and The Other Side of the Coin are great initiatives deserving of broad-based support. Let’s all join Por Colombia’s social media rally on August 26. It’s about becoming agents of “the other side of the coin”: the reality that Colombia is a fascinating country that has captured—rather than kidnapped—thousands of foreigners who have visited recently and simply fallen in love with our people. Lina Salazar is a guest blogger to AQ Online. She works with Americas Quarterly and in the policy department at Americas Society/Council of the Americas.
<urn:uuid:82c940cf-2fed-458d-a17f-11bd73c02fbd>
CC-MAIN-2022-33
https://www.americasquarterly.org/blog/im-colombiana-the-movie-is-not/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.947567
1,247
1.90625
2
Food waste processing and destruction At GWE Biogas, we have been processing food waste since 2010 and over that time have learned a lot about effective food waste destruction. We offer commercial food waste disposal services including: - All bulk organic wastes, whether packaged or clean - All types of palletised food waste, including product in glass and cans - Raw or cooked meat and fish - Sachets and stick packs containing ketchup, mayonnaise, sugar, etc. - Cooked food and ready meals - Bread and pastry - Liquids – milk and soft and alcoholic drinks - Fruits and vegetables - Tea bags, coffee grounds - All dairy products - Any ABPR Category 3 animal by-product. All food waste processed by GWE Biogas goes towards the production of biogas and electricity which is fed into the National Grid. No waste processed at our plant goes to landfill, which helps our customers fulfil their environmental obligations. All food waste is destroyed within 48 hours of reaching the plant. We provide completely traceability of the waste we destroy, including, as required, CCTV and video footage of your waste being processed and Certificates of Destruction once the process is complete. As well as food waste disposal and destruction, our site is set up to manage and process all your industrial and commercial waste including cardboard, plastic, glass and mixed packaging. All non-food waste is processed in an environmentally sustainable way with none going to landfill. Although the majority of our customers prefer to deliver their waste to us, we offer a UK-wide waste collection service. For more details about the collection service, or our food and non-food waste disposal processes, please contact Chris Young at firstname.lastname@example.org or on 01377 229425. About anaerobic digestion How we use anaerobic digestion to destroy all of your food waste in the most environmentally friendly way by converting it into renewable biogas and biofertiliser. We tailored a solution for a national food manufacturer to manage all food waste and recycling needs. We streamlined their operations and saved money Next day collection across UK We offer a full-service logistics solution that enables us to collect food waste from anywhere in the UK, which led to a deal with a national food supplier Our permits and certificates GWE Biogas turns your food waste into green energy. To do that, we have conform to certain regulations so here are all our necessary permits and certificates
<urn:uuid:1546e144-dd05-403b-879b-38207bc35716>
CC-MAIN-2022-33
http://gwebiogas.co.uk/food-waste-services
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.927964
529
2.265625
2
Writing find with Java 8 streams23 Jul 2015 In this guide, we’re going to write our very own simplified find command using Java 8 streams. By the end we will be able to run it from the command line, just like the unix find program. This post assumes you at least a little familiar with Java 8 streams and regular expressions. We’re actually going to review find, so it’s ok if you do not yet know it. What is find? According to wikipedia, “find is a command-line utility that searches through one or more directory trees of a file system, locates files based on some user-specified criteria and applies a user-specified action on each matched file.” So if we wanted to find all the markdown files in the kahlil.me directory, we could run: and we would get as a result: To keep things simple, our find won’t be able to perform any user-specified actions on the files it finds. Instead, it will simply take a starting directory and a pattern, then print out the full paths of any files that match the pattern and are somewhere in that directory. This is where all of our find logic resides. It turns out to be pretty straightforward. We’re going to use java.nio.Files::walk to recursively traverse all subdirectories of the starting directory we pass it. Then, we’re going to filter the results and only keep the files that match the pattern we passed. (note: I’ve omitted the throws clause to keep the code clean). All we need to do in our main method is pass the command line arguments to find, and print the results. Let’s use Find.java to find all css files that style this very website.
<urn:uuid:3100e949-d769-4cba-bb5e-36b9ca8641be>
CC-MAIN-2022-33
https://kahlil.me/tutorial/java8/2015/07/23/java-8-find-with-streams/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.863873
412
2.4375
2
We all know it – the global market is unstoppably evolving. With the endless technical discoveries and perpetual innovations, all things online, including shopping trends, have become our norm. eCommerce is now a standard and the most efficient sales model for many. It has numerous perks, becoming increasingly favored among consumers, especially in the past months. And the prognosis is clear – the future of eCommerce is bright and promising. Everything in 2020 has reshaped our ways, routines, jobs, and purchasing habits. The majority of companies have embraced remote work, which complies with the physical distancing health policies. eCommerce businesses now play the same role. Their part is more significant than ever. There’s no room for doubts – eCommerce is the future. What is eCommerce? Each time an individual or an organization buys or sells products and services online, they’re engaging in eCommerce. This business type is also known as electronic commerce or internet commerce. eCommerce definition incorporates several major market segments such as business to consumer, consumer to consumer, business to business, and consumer to business. People and companies engage in eCommerce through various devices, like computers, laptops, smartphones, or tablets. From the customers’ perspective – the usage of the internet to obtain a specific product or acquire a service (instead of physically visiting a store or a service provider) is eCommerce. Advantages of eCommerce eCommerce has numerous advantages – from business owners’ point of view and consumers’ perspective. The benefits of eCommerce include: - A global reach for the sellers - Lower costs and more profit - More accessibility and a more flexible approach - An efficient and time-saving business model for customers - Better customer experience - 24/7 availability - Numerous ways to reach out (call center, live chat, social media, email, AI solutions, etc) - Direct contact and better communication between a business and the consumers It is safe to say that the future of eCommerce brings its unquestionable prevalence. eCommerce Statistics from 2020 Despite global economic difficulties and unpredictability, eCommerce continues to rise at a fast rate. The forecasts suggest that by 2023 the number of online shops will reach 22% of all retail stores. There is an extensive analysis of eCommerce trends available on Statista. According to their eCommerce statistics and facts, there’s plenty of room to grow and develop this business model. At this moment, the figures show us that a bit over 14% of retailers worldwide engage in eCommerce. Even though the future of eCommerce seems triumphant, the business owners must continuously keep their eyes on the new trends and stats to stay up to date. Some of the noteworthy eCommerce statistics and facts for 2020 are: - Over 2 billion consumers worldwide shop online - The world’s fastest-growing eCommerce market is in China - More than 50% of consumers prefer to pay with their credit cards - More than 50% of current eCommerce purchasers use their smartphones for online shopping According to a survey conducted by eCoomerceGuide, one-third of the consumers confirmed that they purchase products online at least once a week. Among other 2020 eCommerce statistics and trends, they have also discovered that around 9% of surveyed consumers use voice technology to shop. - Pro Tip for eCommerce businesses: Make free shipping available. According to various sources, the stats from the past two years show that free shipping represents one of the key factors in customer acquisition and loyalty. - Pro Tip for eCommerce businesses: Excellent eCommerce customer service also plays a vital role in customer experience, satisfaction, and retention. Numerous eCommerce businesses choose customer service outsourcing to easily attract and retain customers, drive more profit, and increase customer lifetime value (CLV). The Most Important eCommerce Trends from 2020 As we said, eCommerce is continuously evolving and becoming more relevant and profitable. With a swiftly changing market and increasing customers’ needs, new eCommerce trends are inevitable. Forbes discovered the main three eCommerce trends to leverage in 2020. Their top 3 eCommerce trends include: - Providing customized experience to consumers by leveraging personalized eCommerce - Boosting social media (and giving social proof) through Influencer Marketing - High-quality visual material means more reliability Still, these three important eCommerce trends for 2020 are the tip of the iceberg. There’s much more about this fast-growing industry we should learn and implement into our methods, businesses, and techniques. The future of eCommerce has much more to offer. Top eCommerce Trends You Should Leverage in 2021 Some eCommerce businesses use Augmented Reality (AR) to enhance their customer experience. This perk helps online shoppers visualize the products that they’re interested in buying. Visually pleasing images and videos attract the viewers. However, the main reason to incorporate AR into the future of eCommerce is the mutual trust it achieves. A prediction says that 75% of American households will own a smart speaker by 2025. More and more people turn to virtual assistants, and similar technologies will start to make buyers feel more comfortable using them. Voice search will become one of the top eCommerce trends in the years to come. Artificial Intelligence (AI) Customer service always represented a vital part of eCommerce. The traditional way to deal with it involves call center services. It affects every segment of the sales process (starting before the purchase and lasting way beyond its finalization). Artificial Intelligence solutions automate processes and could be helpful, but it’s not recommendable to exclude an actual customer service team. Customer support outsourcing is often the best solution for eCommerce businesses. Still, combining AI and human support usually drives the optimal outcomes. Turning to Mobile Users Purchasing products online by using a mobile device is one of the most important eCommerce trends. Having all the facts and stats in mind, your eCommerce website needs to be well-optimized, mobile-friendly, and responsive. Some businesses build progressive web apps (PWA) or mobile apps. Development always represented a significant part of eCommerce. Nowadays, it is more crucial than ever. Businesses can build an eCommerce website or app in-house or turn to an outsourcing company. Adding More Payment Options Customers are continually asking for improvement when it comes to their interactions with online shops and service providers. The significance of a product’s quality, the punctuality and accuracy of the information obtained through a live chat or call center, and trouble-free payment systems should be on top of everyone’s priority list. Creating Subscription Plans Subscription-based eCommerce enables customers to subscribe to products or services they will need repeatedly. Subscription plans have several benefits for retailers and the future of eCommerce. They make it simpler to predict customer needs and their fulfillment and allow businesses to increase customer retention and add more value to the relationship. Enhancing Digital Marketing Strategies Building an adequate digital marketing strategy helps your business stand out. It can keep you ahead of your competition. You can improve your digital marketing strategies by employing freelance experts or specialized outsourcing companies. Digital Marketing and Social Media roles are vital. However, hiring staff to fulfill these positions is time-consuming and often costly. Outsourcing tasks and responsibilities related to marketing is the best way to obtain desirable results fast and cut some of the costs. A well-made and implemented marketing strategy leads to more conversions. Collaborating with a reliable outsourcing partner is the easiest way to boost your results. eCommerce & Outsourcing Hiring a third-party service provider to perform multiple significant job functions is a widespread business practice. Outsourcing represents a fundamental way to enhance your eCommerce business. And there are several business roles you should outsource with eCommerce. Online businesses, especially retailers, can find outsourcing beneficial when they need to quickly and cost-effectively assemble: - Sales agents - Call center agents - Marketing Strategists - Social Media Specialists - Content and Copy Writers and Editors - Web developers and Designers The benefits of outsourcing services have a massive impact on businesses. Some of the main reasons to consider this business practice is to: - Save time - Cut costs - Increase the profits - Acquire more customers - Achieve better customer experience - Become more productive - Maximize employee satisfaction and lower the employee churn rate with outsourcing - Scale your growth successfully - Cover more areas - Cover different time zones Customer Service Outsourcing Customer service always meant a lot when running an eCommerce business. The future of eCommerce demands paying even more attention to this aspect and finding new ways of reaching desired results. While numerous new eCommerce trends are emerging, customer service outsourcing remains one of the most influential business practices. The main reasons to outsource eCommerce customer service include: - Improved customer experience - Increased customer lifetime value - Better resource management - Enhanced efficiency - More flexibility - Obtaining more coverage - Multi-channel support - Multi-language support Outsourcing services help eCommerce businesses reach their full potential trouble-free. Excellent customer service is a competitive advantage, and it guarantees lasting positive results. All you need to do to ensure your eCommerce success is to find the right outsourcing company. eCommerce in a Post-pandemic World COVID-19 pandemic has changed the future of eCommerce as we know it. Even though the digital transformation represented a major buzzword in the past few years, companies didn’t grasp its true significance until 2020. COVID-19 has affected all markets and businesses and altered the retail ecosystem. Although we still have more traditional retail stores at our disposal globally, the eCommerce trends and statistics show that the number of online sellers and service providers keeps growing.
<urn:uuid:4dad819a-8ed7-433b-8a78-b30156763824>
CC-MAIN-2022-33
https://www.morphnetworks.com/customer-support/the-future-of-ecommerce/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.929287
2,045
1.9375
2
If Britain is attacked by nuclear bombs or by missiles, we do not know what targets will be chosen or how severe the assault will be. If nuclear weapons are used on a large scale, those of us living in the country areas might be exposed to as great a risk as those in the towns. The radioactive dust, falling where the wind blows it, will bring the most widespread dangers of all. No part of the United Kingdom can be considered safe from both the direct effects of the weapons and the resultant fall-out. The dangers which you and your family will face in this situation can be reduced if you do as this booklet describes.
<urn:uuid:c4c0593d-4684-41ff-bfcc-ab1a30c98f67>
CC-MAIN-2022-33
https://www.materiaprima.co.uk/protect-and-survive/protect-and-survive-01.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.949887
130
2.828125
3
Skip to Main Content It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results. Citing is a formal way of showing where you got the information in your assignment. Your instructors don't expect you to be an expert. Instead, they want to see that you have read and understood credible sources written by people who are experts. Show them who you know, rather than what you know, by citing all the sources you used to complete your assignment. - The Citation Lesson teaches you how to create citations. - The Columbia College APA and MLA citation guides show you how to cite in each style. Citing is important for many reasons: - Gives credit to the authors of the information source. - Shows your reader where you found the information, and lets them go back to the original source to learn more. - Provides your argument with credibility. Citing shows that you've done your research. Incorporating Information from Outside Sources You need to provide a balance between outside sources and your own original ideas. You can include information from outside sources by using: When you paraphrase, summarize or quote another author, their ideas still need to be connected to your own. Signal phrases can help the reader know that you are using information from an outside source. Phrases and words such as "according to", "states", or "argues" can be used to introduce a paraphrase, summary or quotation. After using outside information, explain why the source is significant or how the idea relates to your own argument. When In Doubt, Cite It! You must cite all sources used in all assignments that you create. It does not matter what format your assignment is in, or where you use a quote, summary, paraphrase or statistics. Direct quotations taken from sources - place quotation marks around the words in direct quotes. Paraphrased ideas and opinions taken from someone else's work. Summaries of ideas taken from someone else's work. Factual information, including statistics or other data (unless it is considered common knowledge.) Summarizing, Paraphrasing & Quoting A summary is a condensed version of information from another source. Summaries usually highlight the main points discussed in a source. When you summarize: - Keep your summary brief. Summaries should be much shorter than the original source. - Stick to just the main points. - Make sure your summary is in your own words. A paraphrase is a restatement of another person's ideas in your own words. When you paraphrase, you must: - Change both the sentence structure and the words used. - Accurately express the original author's ideas. - First read the original passage a few times to make sure you understand what the author is saying. - Write down the author's main points in point form. - When writing your paraphrase, don't look at the source you are paraphrasing. Use your notes of the author's main points and write sentences that present those ideas in different ways. - Avoid switching out words with synonyms. This will create sentences that sound odd! - When taking notes, try to paraphrase important passages immediately, rather than writing down direct quotes. This can lead to unintentional plagiarism. Quotes are a word-for-word copy of what another author said. When you quote: - Make sure quotes are contained in "quotation marks." - Make sure you don't over-rely on quotes! Your paper should mostly be your own original ideas. Use quotes only to illustrate your point. - Use quotes from experts, not from unreliable sources - If you have to change a word within a quotation, put the changed word in square brackets. The Citation Exception: Common Knowledge The only source material you do not have to cite is information that's considered common knowledge. Common knowledge generally refers to any well-established, uncontroversial fact about the world, or a fact that cannot be attributed to just a single source. - 5 Credible Sources Rule: - As a general rule, if you can find a piece of information in 5 credible sources without a citation, you can consider this information common knowledge. If you're not sure if something is common knowledge, it's better to be safe and cite it!
<urn:uuid:14641f56-edaf-476b-83fb-81af7e925f5e>
CC-MAIN-2022-33
https://columbiacollege-ca.libguides.com/plagiarism/citing
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.919269
975
4.25
4
SECESSIONIST party Mthwakazi Liberation Front (MLF) has unveiled its new national flag. BY OUR STAFF REPORTER In a statement on Monday, MLF secretary-general Paul Siwela said they intended to officially hoist the flag when their plan to form Mthwakazi nation in 2018 materialises. He said the flag, which features red, blue, black and white colours in addition to a shield, spear and a knobkerrie, symbolised the struggle for the independence of Matabeleland. “Red stands for the blood of our heroic forefathers who fought many battles to create our great nation and state resisting colonialism in the 19th century,” reads the statement. “It also represents all who died during the war in Rhodesia and those killed by the Zimbabwe government.” He said from 1980, Mthwakazi people had suffered much humiliation, genocide, marginalisation and domination first by the British and now by rival local ethnic groups. Siwela said the shield, spear and knobkerrie signified the weapons which were used by the Matabele State standing army during the 19th century. “All ethnic groups found in Matabeleland, including the Shona who desire to make it their permanent home, are entitled to be full citizens of the republic,” he said.
<urn:uuid:d8afb2c7-04e7-48ae-b195-0ca45c70baa9>
CC-MAIN-2022-33
https://www.newsday.co.zw/2012/11/mlf-unveils-new-flag/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.9546
287
1.773438
2
If you’ve got Alice Cooper’s “School’s Out for Summer” scrolling through your head, I am right there with you! I can’t wait to run barefoot through the grass and lounge lazily in the backyard watching my kids splash in mud puddles. Before you let the school doors swing shut behind you, here are a few things to consider. Does your child have any leftover school supplies that should be saved for next fall? Not all teachers send home leftover supplies. It’s worth asking them about. Don’t spend $80.00 per child for beginning of year supplies in August. Try to gather what you can now and set it aside. Your kiddo probably won’t need brand new scissors or zipper pockets for their binder. Make it a point to organize and save school supplies now. Does your child have workbooks, journals, or books to read and work on over the summer? Most school programs purchase some type of workbook for students. Then they don’t have enough time during the school day to do every page. Something else parents often seem surprised by is that students are expected to make growth in reading and math over the summer. It is a great idea to set up some type of schedule for learning for your child to help them continue growing and not fall behind. If your child’s teacher can send unfinished workbooks or at least a reading level for you to work with, then you can get started in the right spot. Don’t allow your child to sit around and play video games all summer while you work. There are many opportunities for children to be part of summer camps and activities in the Albuquerque area. Do a little research and find something that fits your family’s needs. At the very least, make sure you have the contact information for at least one of your child’s friends. Then you can set up a play date to keep them in touch over the summer. Give your child’s teacher a THANK YOU. Whether you have loved them every day of the school year or not, they have provided structure, an environment for growth, and have kept your child safe this school year. Let them know you appreciate their efforts. Your words and kindness might be just what they need to help them come back and be amazing next year. Let us know how you start summer well. Originally published May 2018. The opinions expressed in this post are those of the author. They do not necessarily reflect the official policy or position of ABQ Mom, its executive team, other contributors to the site, its sponsors or partners, or any organizations the aforementioned might be affiliated with.
<urn:uuid:9558924d-fafb-4f6d-b138-a40d35b46425>
CC-MAIN-2022-33
https://albuquerque.momcollective.com/school/end-of-school-year-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
en
0.954645
565
1.96875
2
Basic clipping path is the first step of the clipping path. It is used in only straight lines. Basic clipping path is used on oval, rectangle, etc. shaped basic images that have no holes and have very simple curves. It’s one kind of image manipulation technique. By this craft, one can remove the whole background of a certain object. Sometimes, when you click on some photographs, the background may not look suitable for the picture. In that type of case, the clipping path service is required for the photograph. Many companies want to detach their images from the background but they have no idea where to find the best service for that. In situations like this, the PixiGraphics team is ready to provide you with this type of graphic services.
<urn:uuid:d753757e-6940-4fb7-a463-be82cac095e2>
CC-MAIN-2022-33
https://www.pixigraphics.com/clipping-path
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.930459
152
2.4375
2
Russian producers are planning the so-far-ultimate survivors' show—in the Siberian wilderness for nine months (temperatures as low as -40 degrees Fahrenheit), with 30 contestants selected after signing liability waivers that protect the show even if someone is raped or murdered. Police may come arrest the perpetrators, but the producers are not responsible for intervening. The show (Game2: Winter) will be telecast live, around the clock, beginning July 2017 via 2,000 cameras placed in a large area full of bears and treacherous forest. Producers told Siberian Times in December that 60 prospects had already signed up for the last-person-standing prize: the equivalent of $1.6 million. Only requirements: You must be 18 or older and "sane." Bonus: The production company's advertising lists the "dangerous" behaviors they allow, including "fighting," "murder," "rape," "smoking." Roundup From the World's Press With car-camel collisions increasing in Iran's two southern provinces, an Iranian government ministry is in the process of issuing identification cards to each camel, supposedly leading to outerwear license "plates" on each of the animals. Authorities told the Islamic Republic News Agency the registration numbers are needed if an accident victim needs to report the camel or to help trace smugglers. (No actual U.S.-style license plates on camels have yet made the world's news photographs.) • Martin Shkreli became the Wall Street bad boy in 2015 when his company, Turing Pharmaceuticals, bought the right to market the lifesaving drug Daraprim and promptly raised its typical price of $18 a pill to $750, but in November, high schoolers in the chemistry lab at Sydney Grammar in Australia created a molecular knockoff of Daraprim for about $2 a tablet. Their sample of "pyrimethamine" (Daraprim's chemical name) was judged authentic by a University of Sydney chemistry professor. Daraprim, among other uses, fights deadly attacks on immune systems, such as for HIV patients. Gazing Upon Nature as Nature Calls To serve restroom users in a public park in China's Hunan Province's picturesque Shiyan Lake area, architects gave users in toilet cubicles a view of the forest through ceiling-to-floor windows. To discourage sightseers who believe the better view is not from the cubicles but into them. The bottom portion, up to the level of the toilet, is frosted—though that stratagem probably blurs only a pair of legs, seated. CNN reported in October that China has at least one other such restroom, in Guilin province, viewing distant mountains. • Oops! Organizers of the Christmas Day caroling program at the Nelum Pokuna theater in Colombo, Sri Lanka, drawing thousands of devout celebrants, were apparently confused by one song title and innocently included it in the book for the carolers. (No, it wasn't "Inna Gadda Da Vida" from a famous Simpsons episode.) It was "Hail Mary" by the late rapper Tupac Shakur—likely resulting in the very first appearance of certain words in any Christmas service publication anywhere. • Officials of Germany's Ulm Minster—the world's tallest church (530 feet high)—said in October that they fear it might eventually be brought down by visitors who make the long trek up with a full bladder and no place to relieve themselves except in dark alcoves, thus eroding the structure's sandstone. A building preservation representative also cited vomit in the alcoves, perhaps as a result of the dizzying height of the view from the top. News of the Weird has reported on erosion damage to a bridge in Mumbai, India, from spitting and at the Taj Mahal from bug droppings. • The Dubai-based Gulf News reported in November that 900 Kuwaiti government workers had their pay frozen during the current investigation into no-shows, including one man on the payroll (unidentified) who reportedly had not actually worked in 10 years. Another, who had been living abroad for 18 months while drawing his Kuwaiti pay, was reduced to half-pay, but insisted he had asked several times for assignments but was told nothing was available. (Gulf News reported that the 10-year man is appealing the freeze!) • Prosecutors in Darlington, England, obviously take child "cruelty" seriously because Gary McKenzie, 22, was hauled into court in October on four charges against a boy (whose name and age were not published), including passing gas in the boy's face. The charge was described as "in a manner likely to cause him unnecessary suffering or injury to health." He was on trial for two other slightly harsher acts—and another gas-passing against a different boy—but the judgment has not been reported. • World-class chess players are famous for intense powers of concentration, but a chess journal reported in October that top-flight female players have actually been disqualified from matches for showing too much cleavage as they play, thus distracting their opponent, according to Ms. Sava Stoisavljevic, head of the European Chess Union. In fact, the Women's World Chess Championship, scheduled for February, has decreed that, since the matches will be held in Tehran, all contestants must wear hijabs (leading a U.S. women's champion to announce she is boycotting). News You Can Use German Horst Wenzel, "Mr. Flirt," fancies himself a smooth-talking maestro, teaching mostly wealthy but tongue-tied German men lessons (at about $1,500 a day!) in how to approach women—but this year has decided to "give back" to the community by offering his expertise pro-bono to lonely Syrian and Iraqi refugees who have flooded the country. At one class in Dortmund in November, observed by an Associated Press reporter, most "students" were hesitant, apparently divided between the embarrassed (when Wenzel informed them it's "normal" to have sex on the first or second date) and the awkwardly confident (opening line: "I love you. Can I sleep over at your place?"). But, advised Wenzel, "Don't tell [a German woman] that you love [her] at least for the first three months ... German women don't like clinginess." A 24-year-old woman who worked at a confectionary factory in Fedortsovo, Russia, was killed in December when she fell into a vat of chocolate. Some witnesses said she was pouring flour when she fell; others say she fell while trying to retrieve her dropped cell phone. • A 24-year-old man was decapitated in London in August when he leaned too far out the window of one train and struck an extension on a passing train. Next to the window he leaned from was a sign warning people not to stick their heads out. The Passing Parade A December poll—sponsored by University of Graz and Austria Press Agency—revealed that Austria's "word of the year" for 2016 was a 52-letter word beginning "bundespraesident" and referring to the postponement of the runoff election for president in 2016. • The Wall Street Journal reported in December a longstanding feud on the tiny Mediterranean island of Gozo, Malta, which has only 37,000 residents but two opera houses because of the owners' mutual antipathy. Thanks this week to Peter Swank, Alexander Campbell and the News of the Weird Board of Editorial Advisors.
<urn:uuid:76a5bd34-6c26-43f3-92f4-20fc4b0baf76>
CC-MAIN-2022-33
https://m.cityweekly.net/utah/roundup-from-the-worlds-press/Content?oid=3577042
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.973351
1,570
1.53125
2
"So, just what IS going on with the Chicago Cubs?" My oldest son joined the discussion, an inter-generational reflection by three die-hard Cub fans on the direction of our favorite team. The new management of the team (known for having the longest stretch of futility in major American sports, 103 years since winning baseball's World Series) is trying to fill the numerous gaping holes in the Cubs' lineup before the season begins again in April. "But who are they going to get?" my perceptive mother-in-law continued. "We have no pitching. Who will play first base? Can anyone hit?" As usual, she was correct in her questioning. My son weighed in. He pays particular attention to pitchers and his recitation of the low level of starting and bullpen talent slowly deflated the happy feelings still lingering from the meal. "So, is there ANY hope?" his grandmother sighed. Only with a consistent approach, I suggested. "Consistent?" Yes. Only with a broad framework of making decisions, selecting talent and making game decisions could the Cubs change their trajectory. There are several such frameworks in baseball...the Cubs have never embraced any of them. Good decisions, when uncoordinated, make for a disjointed organization. And 103 years of futility. In the business world, understanding Lean gives such coherence to decision making. It is this, far beyond its mere tools, which makes it a powerful concept. Would Lean help the Cubs? I'm not going that far. But it does mean a lot for most of our organizations.
<urn:uuid:ff251954-7e0c-40f9-80b0-cf6b854a9909>
CC-MAIN-2022-33
https://joeelylean.blogspot.com/2011/11/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.961897
332
1.554688
2
An ICTC Study Settling for More Matching Newcomers to Alberta’s Tech Sector Published by ICTC, November 2021 Alberta’s digital economy is growing and thus faces potential labour shortages in the near future. At the same time, internationally educated newcomers to Alberta often face challenges finding employment for which they are qualified. This report investigates how best to enhance newcomer participation in Alberta’s digital economy. Its findings draw upon a literature review, interviews with Alberta employers, focus groups with newcomers, and data on the skills newcomers bring to Canada. The report first covers labour demand among Alberta’s digital economy employers, and compares this to the supply of available talent among newcomers. Key findings are that soft skills are in high demand and that newcomers are often overeducated and underemployed. The report then covers six challenges to newcomer participation in Alberta’s digital economy that are unrelated to skills mismatches and provides potential solutions to each. Researched and written by Tyler Farmer (Manager, Special Projects & Marketing Strategy), Khiran O’Neill (Research & Policy Analyst), and Mansharn Toor (Research & Policy Analyst), with generous support from Tracy Martell (Program Coordinator), Maya Watson (Research & Policy Analyst), Bingjie Xiao (Data Scientist), Alexandra Cutean (Chief Research Officer), and the Digital Think Tank by ICTC team.
<urn:uuid:0e749d14-9fd6-4297-9d74-54a11859fece>
CC-MAIN-2022-33
https://medium.com/digitalthinktankictc/settling-for-more-87c97915b823?source=user_profile---------9----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.915339
293
1.851563
2
What is a Dutch Bike? The Dutch may not have invented the bicycle, but a visit to the Netherlands will quickly prove that the Dutch invented and continue to perfect cycling culture. Bikes are everywhere, and riders take all shapes, sizes, and ages. Biking is in Dutch blood! All Dutch-style bicycles share a few unique qualities designed to make cycling practical, enjoyable, and above all, a regular part of life, from work to the weekend. Let’s see what sets Dutch bikes apart from other bikes… Step-Through or Low-Step Frame Most traditional Dutch bikes feature a low, or step-through-style frame, which allows for easy mounting and dismounting as well as a comfortable, casual upright riding position. This design is especially handy for riders who carry cargo, ride in more formal or rigid attire, or pedal routes where stopping is frequent. The upright seating position of the Dutch bike is an unmistakable feature and one with a ton of rider benefits. - Weight is shifted onto the legs and hips, reducing pressure on the neck and back, creating a more comfortable ride. - Visibility is improved for the rider, not only in the immediate vicinity but also in the distance, as the rider’s sightline is extended. - Sitting up taller allows the rider to be more easily seen by motorists, pedestrians, and other cyclists. Fully Loaded and Ready to Ride Dutch bikes typically come with everything a rider needs including a headlight, tail light, bell, storage rack, kickstand, and rear-wheel lock. The bikes are very utility-driven and are designed to meet (nearly) every possible need a person might have, and also reduces the demand for car-based trips and errands. The rear rack is especially handy for carrying cargo or attaching additional accessories like panniers or even small children! Weather, in the Netherlands, ranges from summery to snowy, with salt-tinged air present in every season. With this in mind, Dutch bikes are designed to suit all weather conditions, with a few special features. These include: - Front and rear fenders - Skirt and mudguards - A covered chaincase - Using rust-resistant materials like aluminum These features not only protect the bike from the elements, but they also help keep the rider clean and comfortable, and able to wear regular clothes while biking, even to the office. Ride Like The Dutch, Even on Hills The Netherlands are famously flat, and for this reason, Dutch bikes are typically on the heavier side, with a single, or limited speeds. Here at Gazelle North America, we use top-of-the-line electric bike systems to make every hill feel as flat as Holland. Using low gears and high assist levels neutralizes inclines and puts joy into every cycling experience. Ready to experience the fun, convenience, and sheer delight of riding like the Dutch?
<urn:uuid:a5299bd2-7c6f-4246-97e7-366b64d84d20>
CC-MAIN-2022-33
https://www.gazellebikes.com/en-us/blog/dutch-bikes
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.952609
615
2.15625
2
- This event has passed. Mental Health Action Day: Raising Awareness and Promoting Change Through Authentic Mental Health Representation in Media May 20, 2021 @ 4:30 pm - 5:30 pmFree RespectAbility is proud to be a founding partner in the first-ever Mental Health Action Day on Thursday, May 20, spearheaded by MTV Entertainment Group alongside nearly 200 additional brands, nonprofits and cultural leaders. Though more people than ever are comfortable discussing mental health, suicide rates over the last two decades have still risen, particularly among young adults, and finding effective resources and knowing how to get help remains a challenge. Join us as we discuss the importance of portraying mental health accurately and authentically in TV, film, and other forms of media, especially as a means to create awareness and serve as a first step to systemic change. Panelists include Nikki Bailey (comedian, actress, author, and producer), Ali MacLean (playwright and TV writer), and Amanda Burdine (screenwriter) with more to be added soon. ASL interpreters and live captioning will be provided.
<urn:uuid:aa6958e7-fc0f-4c45-a5fd-ae243d35be62>
CC-MAIN-2022-33
https://jrspgh.org/event/mental-health-action-day-raising-awareness-and-promoting-change-through-authentic-mental-health-representation-in-media/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.9503
225
1.570313
2
A Flybe flight from Birmingham to Edinburgh discovered the company was going bust in MID-AIR. Europe's largest regional airline, Flybe, has finally collapsed into administration, threatening thousands of jobs and the future viability of a number of airports across the UK. UK regional airports will suffer a "massive impact" from the failure of Flybe, an industry expert has warned. And EdinburghLive reports one passenger has told how Flybe staff on an Edinburgh-bound flight found out the company was going bust mid-air, after having to turn the plane around and land at Manchester Airport. The passenger, who does not want to to named, has spoken of "devastation" and "confusion" on a Flybe flight that had been intended to travel from Birmingham to Edinburgh on Wednesday night. Passengers on board the flight were left bewildered after being told they were landing in Edinburgh, only to discover the plane had been turned around moments after touching down at Manchester Airport. The passenger said: "They said to us we were landing up in Edinburgh. The young pilot said 'don't worry our company's not in trouble, it's just Edinburgh Airport are overreacting. Manchester Airport are going to refuel us and we'll get back in the air as quick as possible'. "Manchester never intended to refuel us but she really believed it, which is the really sad thing. Officials came on and spoke to the pilot. She [the pilot] said: 'I'm really sorry we're not being refueled now, you may know more than me. I only know what I'm reading on Twitter'. "They really believed until that point that the company was not going into administration because that's what she [the pilot] had been told." The passenger, who frequently travels by plane for work, said: "It was another two hours before Manchester Airport let us off the plane. "It was really hot and staff were running up and down giving out glasses of water but we knew then they had lost their jobs - they were just amazing. "They were in the wrong location too and they were trying to put on a brave face, you could hear it in the pilot's voice, she was trying to be strong about the situation." She added: "The feeling on the plane was devastation for these people that were standing learning what was happening to them. We were all horrified at that."
<urn:uuid:265342aa-335b-4b4d-85a5-5e085f8ef075>
CC-MAIN-2022-33
https://www.birminghammail.co.uk/news/midlands-news/flybe-pilot-birmingham-airport-flight-17870236
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.992028
492
1.648438
2
Samuel Smiles was a firm believer that growth comes from the individual; hard work, perseverance, and application all made an individual strong and knowledgeable.1 Smiles was a Scottish writer who learned the importance of self reliance from his childhood; as one of eleven children with no father, he learned from his mother the meaning of individual strength. When he was a little older he moved to England where he joined the chartists in fighting for worker’s rights.… Read the rest here A. Samuel Smiles was a Scottish author and government reformer. His father died of cholera so his mother had to work very hard to support him and his many siblings. This example set by his mother had a great influence on his life and certainly this book. C. Published during the Victorian Era in Britain, this book made Smiles quite famous. The book has been called the bible of “mid-Victorian Liberalism.” L. The language is simple and inspiring.… Read the rest here
<urn:uuid:3422c0dd-fb3b-4abb-9afd-cf1c46989881>
CC-MAIN-2022-33
https://blogs.dickinson.edu/quallsk/tag/self-help/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.992666
208
3.296875
3
Study finds that low-carb diets may prevent and reverse age-related cognitive decline; IEEE Spectrum's weekly selection of awesome robot videos from March 6.; a Steem essay describing the current state of knowledge on the novel coronavirus (COVID-19); A podcast argues that bitcoin mining might be returning to the US, and that it might represent a new business model for power plants; and a TED talk describing research into how specific neural pathways in the brain impact behavior Straight from my RSS feed Whatever gets my attention Links and micro-summaries from my 1000+ daily headlines. I filter them so you don't have to. pixabay license: source. - Low-Carb Diet May Reverse, Prevent Age-Related Cognitive Decline - A March 3 study was published in PNAS describing research into the effect that aging has on brain functioning. Using imaging, the researchers found that cognitive decline can be observed starting (on average) at the age of 47, and it generally accelerates around the age of 60. They also found, however, that this decline can be avoided or reversed by switching to a diet that avoids simple carbohydrates. In short, they report that "they found that glucose decreases the stability of brain networks while ketones have the opposite effect, promoting stronger and healthier brain networks." - Video Friday: NASA's Curiosity Mars Rover Captures 1.8 Billion-Pixel Panorama - Here is IEEE Spectrum's weekly selection of awesome robot videos from March 6. Videos include: A video describing the Mars Rover's video-capture of 1,000 images that were subsequently assembled into a single 1.8 billion pixel panorama image; An update on Sarcos Guardian XO powered exoskeleton (previously covered in Curating the Internet: Science and technology digest for December 11, 2019; an ambulance robot from AIART Lab; An adverse event video of a snake robot trying to climb an obstacle; and others. Here is the exosuit - Steem @rt-international: What's coronavirus & who faces the greatest risk? - This article describes the results from discussions with scientists from Russia and the United States. It begins by saying that there are 40 families of coronavirus, and most have evolved to be relatively benign for humans, but the novel strain that emerged from Wuhan is likely to have emerged from an epidemic among bats or some other animal species. As such, it can be more deadly to humans. As the virus continues to adapt, however, it may well become less deadly. As of now, it is believed that anyone can be effected, but cases among young people are rare, with susceptibility increasing rapidly after the age of 20, and lethal outcomes are highest among people aged beyond 50. Describing the mechanism of infection, the article says that the virus mimics a protein that is useful for humans in order to trick human cells into fusing with it. Apparently, this substance is more necessary among the older population, because their cells are tricked more readily. Medics and first responders also fall into a higher risk group, because their level of exposure is so much higher than the average person. According to official numbers, the disease has a higher mortality rate (3.5%) than the traditional flu (0.5%). However, that rate varies by location, suggesting that the virus is evolving to be less deadly. It also has a lower infection rate, which means that the traditional flu kills more in terms of raw numbers (these numbers don't seem to recognize the widely believed notions that statistics from some countries may be unreliable and a large number of mild cases have gone unreported because they weren't tested and didn't seek treatment). According to one doctor, the disease has four phases, of which most patients only experience the first - which is like a cold or flu. In the second phase, which comes after 7-9 days, the virus breaks into previous sterile areas in the lung - causing viral and bacterial pneumonia. At this point medical treatment is necessary. If medical professionals fail to arrest the disease here, acute respiratory distress can develop in phase 3. In phase 3, artificial respiratory assistance is needed. Even if patients survive through this phase and shake the virus, staying on artificial respiration for so long can cause fungus to develop in the lungs, which might also lead to death. That scenario describes the experience of about half of the fatalities to date. As to testing, the article says that current testing tools may yield false positives and that testing is only useful for people who are displaying symptoms of the COVID-19 disease. (A 10% beneficiary setting has been applied to this post for @rt-international.) - Why Bitcoin Mining Might Be the New Business Model for US Power Plants - The power-plant portion of the discussion begins at about 10:45 in the podcast at the link. That's the only part I listened to. It talks about how Greenidge Power Generation has completed a $65 million power-plant renovation that converted a plant from coal to natural gas, and added 7,000 mining rigs that are mining about 5 1/2 BTC per day by using "behind the meter" power to power the rigs at an extremely low cost. This is interesting, the narrator says, because it's happening in NY State, which is one of the most hostile states to cryptocurrency, and also because it's part of a larger trend towards a return to BTC mining in the US. I also shared this article on LinkedIn with the following commentary: I've been wondering for a year or two why someone doesn't harness the heat from the underground coal fires in Centralia, PA for a power-plant and data center that services cryptocurrency mining and cloud computing. That coal is gonna burn anyway... Power plant discussion is at about 11 minutes into the podcast. (More about Centralia here - In the near future, I expect to see a mental health treatment revolution, where we focus on specific neural circuits in the brain. Diagnoses will be made based on both behavioral symptoms and measurable brain activity. Further in the future, by combining our ability to make acute changes to the brain and get acute changes to behavior with our knowledge of synaptic plasticity to make more permanent changes, we could push the brain into a state of fixing itself by reprogramming neural circuits. Exposure therapy at the circuit level.and Mental health professionals, we're always thinking about what's the next new treatment. But before we can apply new treatments, we need people to feel comfortable seeking them. Imagine how dramatically we could reduce the rates of suicides and school shootings if everyone who needed mental health support actually got it. When we truly understand exactly how the mind comes from the brain, we will improve the lives of everyone who will have a mental illness in their lifetime -- half the population -- as well as everyone else with whom they share the world.One of these days, maybe I'll be able to embed these TED talk videos through a Steem front-end, but as of now it still doesn't seem to work. You can click through to see it. In order to help bring Steem's content to a new audience, if you think this post was informative, please consider sharing it through your other social media accounts. This post will also appear on my pre-Steem blog, chescosteve.blogspot.com. And to help make Steem the go-to place for timely information on diverse topics, I invite you to discuss any of these links in the comments and/or your own response post. - Cited author(s) - rt-international - 10% - Experimental - penny4thoughts - 18% - Posting and/or scheduling service (steempeak.com) - steempeak - 5% - Steem/RSS services (steemrss.com) - torrey.blog - 5% - STEM curation - steemstem - 5% Sharing a link does not imply endorsement or agreement, and I receive no incentives for sharing from any of the content creators. Thanks to SteemRSS from philipkoon, doriitamar, and torrey.blog for the Steem RSS feeds!
<urn:uuid:9c404e07-e770-4f51-ae18-4be8b9298519>
CC-MAIN-2022-33
https://stemgeeks.net/rsslog/@remlaps-lite/curating-the-internet-science-and-technology-digest-for-march-9-2020
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.952285
1,683
2.46875
2
Research has prominently assumed that social media and web portals that aggregate news restrict the diversity of content that users are exposed to by tailoring news diets toward the users’ preferences. In our empirical test of this argument, we apply a random-effects within–between model to two large representative datasets of individual web browsing histories. This approach allows us to better encapsulate the effects of social media and other intermediaries on news exposure. We find strong evidence that intermediaries foster more varied online news diets. The results call into question fears about the vanishing potential for incidental news exposure in digital media environments.
<urn:uuid:c9cf3ab3-9693-4fcf-9e01-c57010df24ee>
CC-MAIN-2022-33
https://mediawell.ssrc.org/citation/how-social-network-sites-and-other-online-intermediaries-increase-exposure-to-news-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.887621
118
1.71875
2
My 3 year old daughter’s current favourite book is Jakob Martin Strid’s Den utrolige historien om den kjempestore pæra. In the story a giant pear is made hollow, and eventually turned into a boat. I decided to try and make a similar upright floating pear-boat out of a normal pear. One that my my daughter could play with once finished. Off I went to buy a pear and tools, the pear I ended up with have these specs: - Weighs around 238 g. - Displaces approximately 225 ml of water. This means it is slightly more dense then water since the weight of that water would be approximately 225 g. - Judging from the pears available in the shop, the one I chose was slightly more symmetric then most pears. In addition to the pear, the tools I used are shown in the image below: The first step in pear pram creation, is to cut the windows using a knife. Once that is done carve out the inside using the melon baller. I recommend making the windows close to the top of the pear. If you make them too low they will result in water intake when launched. It is better to create the windows high initially and expand them downwards once you have a feeling for how the pear floats. Another great reason for making the windows high up is lowering the center of mass. Pears have not yet been cultivated to float upright, and the center of mass is way too high for that. Having a too high center of mass on a ship is catastrophic. In its unmodified form a hollow pear will most likely perform worse then the Vasa on its maiden voyage. To lower the center of mass even more, it is important to carve out as much as possible of the “roof”. Since the stalk extends into the pear this is difficult. It is easy to ruin the pear if you use too much force; be careful. Even with the windows high up and a very light roof, the center of mass is still too high. Initially I added coins on the inside as ballast, this worked if I put the pear very carefully into the water, but it was still prone to capsizing. To remedy this I moved the center of mass even lower by adding ballast on a thread below the pear. This was done by creating a knot on the thread and using a needle to get it through the bottom of the pear. Then the coins were added as shown in the picture. To ensure that water would not leak along the thread into the pear, I greased the entry points. In its finished form the pear is quite stable, it could hold a surprising amount of Lego men without capsizing. I never got around to test adding a sail, but I think it might be stable enough to support a small sail. Sadly rot is an inevitability facing all pear prams. If you have a great idea for prolonging pear pram life, please leave a comment.
<urn:uuid:1ede0370-3631-4e25-b175-f2983644b1ec>
CC-MAIN-2022-33
https://www.bitbreeds.com/Blog/pear-pram-construction/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.965793
620
3.015625
3
The Ministry of Agriculture enforcement and investigation unit today found 700 kilograms of meat in the Tel Aviv Tikva market smuggled into Israel from Judea and Samaria. The unit also intercepted enormous quantities of smuggled meat at the Dragot checkpoint near the Dead Sea. The unit, together with Israel Police officers, stopped a truck. At first, when they opened the doors of the truck, they found nothing, but representatives of the unit and the policemen sensed there was something there, and exposed a hidden compartment with 6.5 tons of meat from the territories. The unit has stepped up its operations ahead of the Passover holiday, when meat consumption rises, thereby increasing profits and leading to repeated attempts by smugglers to bring meat into Israel and distribute it to restaurants and shops. While previous reports mentioned the seizure of meat from donkeys and camels, the Ministry of Agriculture stresses that these reports are unfounded. A series of forgeries Today's report follows one from yesterday, according to which enforcement and investigation unit inspectors exposed a ring smuggling meat into Israel from the Palestinian Authority (PA). The smuggled meat, which was sold to leading restaurants and various meat shops, bore forged expiration dates, slaughter dates, and kashrut certificates. The restaurants that purchased the spoiled meat included Octagon, Zepra, Moses Ramat Hachayal, the Dixie Grill Bar, and Ad Ha'Etzem in Kfar Saba and Herzliya; Yeda Habesarim in Tel Aviv; and Marsel Brothers in Haifa. The suspected smuggling ring, which includes both Israelis and Palestinians, illegally brought the meat into Israel from the PA in trucks using concealed compartments and other methods. The suspected method was as follows: a Palestinian importer purchased meat in South America supposedly for the PA, and imported it into Israel through Haifa Port. From the port, the merchandise was brought to a warehouse in A-Ram, and various methods were then used to smuggle the meat into Israel through various roadblocks under conditions that violated the rules of the Veterinary Services. The Ministry of Agriculture bans the import of animal products from the PA to Israel because of improper storage conditions, and in order to prevent the entry of spoiled meat into the country. The smuggled goods reached a warehouse in the Atarot industrial zone, where they were repackaged and kashrut certificates, expiration dates, and veterinary authorization documents were forged. The meat, which was unfit for human consumption, was distributed to restaurants and various meat shops. Concealment of transactions and income in Israel is also suspected. Published by Globes [online], Israel business news - www.globes-online.com - on April 5, 2016 © Copyright of Globes Publisher Itonut (1983) Ltd. 2016
<urn:uuid:949f87f5-41b6-46df-be3c-b50ea95fb127>
CC-MAIN-2022-33
https://en.globes.co.il/en/article-agricultural-inspectors-seize-contraband-meat-1001115260
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.960926
569
1.578125
2
How to fill out a bank deposit slip. Bank deposit slips can be paper or electronic. They provide essential information to the bank and need to be completed correctly. Let’s take a look at the important steps. The bank deposit slip has been around as long as there have been banks. They’re easy to fill out but also contain essential information the bank needs to fulfill the transaction. Modern banking often happens online but the bank requires the same information —whether online or standing before a teller. Follow these steps to fill out a bank deposit slip. Electronic deposit slips are generally much easier to fill out than paper ones because the bank already knows who you are and which accounts you can access when logging into your account. Many banks allow you to deposit checks by taking a picture of their front and back, but for cash, you still need to use a teller or ATM. For the bank to fulfill your deposit request and put your money where you want it, there are a few steps you should follow: - Make sure you provide your name as it appears on your account. - Include the account number. Some paper deposit slips are pre-printed with the account number. - If you are requesting cash back, you may be required to sign the deposit slip in the appropriate space. - Fill in how much cash you’re depositing, if any. Cash, in this case, refers to both paper bills and coins. - Fill in how much of your deposit is from actual checks. Most banks want you to list the amount for each check separately. - Include a subtotal for the cash and checks along with any amount you want back. - Total the deposit at the bottom. Whether it’s a deposit slip or another digital form from your bank, when you need to provide a signature, be sure to use a secure e-signature tool for protection and ease. Take a moment to discover everything that’s possible with Acrobat Sign today.
<urn:uuid:a7ef7ddc-7944-4e99-a9b1-e1904b2fe87d>
CC-MAIN-2022-33
https://www.adobe.com/sign/hub/document-types/how-to-fill-out-a-bank-deposit-slip
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.929882
412
1.96875
2
Immigration Minister Ahmed Hussen on Friday will announce the 11 communities that will take part in an immigration pilot to attract newcomers to remote and northern communities. (Frank Gunn/Canadian Press) The federal government has picked 11 communities from across Canada to kick off a new pilot program aimed at attracting immigrants to rural and northern communities. The goal of the program is to bring newcomers to regions confronting severe labour shortages due to a youth exodus, declining birth rate and aging population. Immigration Minister Ahmed Hussen is making a formal announcement today in Sault Ste. Marie, Ont. “The equation is quite simple. Attracting and retaining newcomers with the needed skills equals a recipe for success for Canada’s rural and northern communities,” he said in a news release. “We have tested a similar immigration pilot in Atlantic Canada and it has already shown tremendous results for both newcomers and Canadians.” The selected communities are: - Thunder Bay, Ont. - Sault Ste. Marie, Ont. - Sudbury, Ont. - Timmins, Ont. - North Bay, Ont. - Gretna-Rhineland-Altona-Plum Coulee, Man. - Brandon, Man. - Moose Jaw, Sask. - Claresholm, Alta. - West Kootenay region of B.C. - Vernon, B.C. The government will begin working with communities this summer to help them identify candidates for permanent residence as early as this fall. The first newcomers under the pilot are expected to arrive in 2020. ‘Continued vibrancy of rural areas’ Communities were selected as a representative sample of regions to lay out a “blueprint” for the rest of the country. About 78 per cent newcomers to Canada settle in big cities such as Toronto, Montreal and Vancouver under existing federal economic immigration programs. Rural Economic Development Minister Bernadette Jordan said the pilot program will support the economic development of the communities by testing new, community-driven approaches to fill diverse labour market needs. “The initial results of the Atlantic immigration pilot show that it has been a great success,” she said in a news release. “I’m pleased we are able to introduce this new pilot to continue experimenting with how immigration can help ensure the continued vibrancy of rural areas across the country.”
<urn:uuid:b774459d-bb1f-4c7b-8184-8fe61a7be8b1>
CC-MAIN-2022-33
https://wowplus.net/ottawa-picks-11-communities-for-pilot-immigration-project/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00272.warc.gz
en
0.92398
502
1.546875
2
The “Missing Piece” Of Childbirth Education by Toni Harman, MICROBIRTH Filmmaker & Founder When I was pregnant 14 years ago, my childbirth educator gave me two things. Knowledge and confidence. I felt fully prepared to give birth at home, and also to exclusively breastfeed. I felt powerful. But, as can often happen, I ended up needing a C-section. When I struggled to breastfeed, I “topped up” with infant formula. I felt all my power was stripped away. The Search for the “Missing Piece” I felt something was missing from my antenatal preparation, so I went looking for answers. After spending 10 years interviewing top scientists and university professors for our films and courses, I believe I have found this “missing piece.” This “missing piece” can help empower expectant parents, informing their birth and feeding choices. What is it? A simple understanding of the critical microscopic processes happening during pregnancy, birth and breastfeeding. What are These Critical Microscopic Processes? Everyone has a unique microbiome. This is a microscopic ecosystem of bacteria, viruses, fungi and other microorganisms that live on and in us. The vast majority of these microorganisms are either harmless or actually beneficial to human health. Emerging research suggests how a baby is born and fed affects the early development of the infant microbiome with knock-on effects for the immune system. Very Simply Explained The mother passes her beneficial microorganisms to her baby during vaginal birth. Special sugars in her breast milk feed those beneficial microorganisms. Fed by those special sugars, the beneficial microorganisms quickly grow in the baby’s gut. These beneficial microorganisms help optimally train the infant immune system, thus helping protect the baby’s long-term health. What Happens with C-section? Research suggests that if born by C-section, a baby may not receive all the mother’s beneficial vaginal and gut microorganisms. This may mean the baby has an “altered” gut microbiome compared to if born vaginally. (Stokholm J et al., 2020). This altered microbiome may mean the baby’s immune system is not optimally trained, with potential long-term consequences. For example, C-section can increase the risk of immune and metabolic disorders (Renz et al., 2017). C-section has also been found to be associated with more than a doubled risk of asthma and allergies in later life (Stokholm J et al., 2020). What Can Expectant Parents Do? If expectant parents know about the infant microbiome EARLY in pregnancy, they can make diet and lifestyle changes during their pregnancy to best prepare their gut microbiome BEFORE birth. Expectant parents can also connect with lactation specialists to help them prepare for exclusive breastfeeding. Exclusive breastfeeding can help restore the infant gut microbiome if a baby is born by C-section, and exclusive breastfeeding can also lower the risk of infection in early life (Guo et al., 2020 and Liu Y. et al., 2019). What Can You Do? Knowledge about the infant microbiome can be both powerful and empowering, especially when given to parents EARLY in pregnancy. That’s why we have created Microbiome baby – a ready-made toolkit of evidence-based resources, plus full training, so you can simply explain the infant microbiome to parents. If you are interested in training to be a Microbiome Baby Approved Instructor, visit the website. Stokholm J, Thorsen J, Blaser MJ, Rasmussen MA, Hjelmsø M, Shah S, Christensen ED, Chawes BL, Bønnelykke K, Brix S, Mortensen MS, Brejnrod A, Vestergaard G, Trivedi U, Sørensen SJ, Bisgaard H. Delivery mode and gut microbial changes correlate with an increased risk of childhood asthma. Sci Transl Med. 2020 Nov 11;12(569):eaax9929. doi: 10.1126/scitranslmed.aax9929. PMID: 33177184. Renz, H., Holt, P. G., Inouye, M., Logan, A. C., Prescott, S. L., and Sly, P. D. 2017. An exposome perspective: early-life events and immune development in a changing world. J. Allergy Clin. Immunol. 140, 24–40. doi: 10.1016/j.jaci.2017.05.015 Guo, C., Zhou, Q., Li, M. et al. Breastfeeding restored the gut microbiota in caesarean section infants and lowered the infection risk in early life. BMC Pediatr 20, 532 2020. https://doi.org/10.1186/s12887-020-02433-x Liu Y, Qin S, Song Y, et al. The Perturbation of Infant Gut Microbiota Caused by Cesarean Delivery Is Partially Restored by Exclusive Breastfeeding. Front Microbiol. 2019;10:598. Published 2019 Mar 26. doi:10.3389/fmicb.2019.00598 Toni Harman, MICROBIRTH Filmmaker & Founder Toni Harman is an award-winning documentary filmmaker, author and digital course creator. Her documentary MICROBIRTH has been broadcast around the world and her books have been translated into multiple languages. To help childbirth educators better understand the infant microbiome, Toni has created an online school called MICROBIOME COURSES, now with over 34,000 health professionals enrolled as students. Toni has also created MICROBIOME BABY, a new ready-to-use toolkit of evidence-based resources that childbirth educators can use to explain the infant microbiome to parents.
<urn:uuid:5e55b1f8-ed4e-4f46-bebb-562d06d68285>
CC-MAIN-2022-33
https://icea.org/the-missing-piece-of-childbirth-education/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.879851
1,266
2.828125
3
What means anticipatory? How do you define the Americas? What does the media consist of? What is the main type of environment? What is an example of symbolism? What is called as note? What is a synonym for legitimacy? How do I write my name in Western script? What does it mean to encapsulate a placenta? How is preparation going on reply? What nationality is Danny Kenyon? Is Senora Acero based on a true story? What is the spokesperson role? Table of Contents: - What are the main religious symbols? - What are some symbols of the church? - What are the four symbols of the church? - What do these symbols mean in math? - What does IHS stand for on a cross? - What does INRI mean on a cross? - What does NI KA mean? - What does XP mean in Christianity? - What does the Catholic symbol PX mean? - Why do Protestants not worship Mary? - Is having a cross a graven image? - What's the difference between a cross and a crucifix? - What does a cross symbolize? - What does wearing a cross symbolize? What are the main religious symbols? |Christianity||Christian cross||32 AD| |Church of Jesus Christ of Latter-day Saints, The||Angel Moroni||1844| What are some symbols of the church? - Crucifix. The crucifix is a cross with the figure of the body of Jesus Christ attached to it. ... - Alpha and Omega. Alpha and omega are the first and last letters of the Greek alphabet. ... - The Cross. The most famous and widespread Christian symbol is the cross. ... - The Sacred Heart. ... - IHS and Chi-Rho. ... - The Fish. ... - Fleur-de-Lis. ... - The Dove. What are the four symbols of the church? The Four Marks of the Church, also known as the Attributes of the Church, is a term describing four distinctive adjectives—"One, Holy, Catholic and Apostolic"—of traditional Christian ecclesiology as expressed in the Niceno-Constantinopolitan Creed completed at the First Council of Constantinople in AD 381: "[We ... What do these symbols mean in math? This symbol > means greater than, for example 4 > 2. ≤ ≥ These symbols mean 'less than or equal to' and 'greater than or equal to' and are commonly used in algebra. What does IHS stand for on a cross? IHS (also IHC), a monogram or symbol for the name Jesus, is a contraction of the Greek word for Jesus, which in Greek is spelled IHΣΟΥΣ in uncial (majuscule) letters and Iησους in minuscule letters and is transliterated into the Latin alphabet as Iēsus, Jēsus, or Jesus. What does INRI mean on a cross? Iesus Nazarenus, Rex Iudaeorum What does NI KA mean? Conquers = Jesus Christ Conquers What does XP mean in Christianity? a symbol or emblem for. Christ2. Word origin. first two letters (chi & rho) of Gr XPIΣTOΣ, Khristos. What does the Catholic symbol PX mean? The monogram that looks like a combination of a P and an X is actually the first two letters of the Greek word for Christ – Chi (X) and Rho (P). The symbol was used by early Christians and is attributed to the Roman Emporer Contstantine, who used it as a military symbol. Why do Protestants not worship Mary? The Roman Catholic Church reveres Mary, the mother of Jesus, as "Queen of Heaven." However, there are few biblical references to support the Catholic Marian dogmas — which include the Immaculate Conception, her perpetual virginity and her Assumption into heaven. This is why they are rejected by Protestants. Is having a cross a graven image? Yes, they are considered “Graven (carved, crafted) Images.” They are indeed objects of both reverence and worship that goes against the first commandment along with false statues of “Jesus”, “Mary", and any other “saint". ... The cross is just a symbol of Jesus' ultimate sacrifice. It should serve only as a reminder. What's the difference between a cross and a crucifix? A crucifix (from Latin cruci fixus meaning "(one) fixed to a cross") is an image of Jesus on the cross, as distinct from a bare cross. ... Strictly speaking, to be a crucifix, the cross must be three-dimensional, but this distinction is not always observed. What does a cross symbolize? Cross, the principal symbol of the Christian religion, recalling the Crucifixion of Jesus Christ and the redeeming benefits of his Passion and death. The cross is thus a sign both of Christ himself and of the faith of Christians. What does wearing a cross symbolize? Crosses are often worn as an indication of commitment to the Christian faith, and are received as gifts for rites such as baptism and confirmation. ... In addition, many Christians believe that the wearing of a cross offers the wearer protection from evil. - What is the significance of weather symbols? - What genre is the social dilemma? - Is healthcare free in Netherlands? - What social bakers do? - Why is virginity a social construct? - What is the point of the social contract? - What does social capital company do? - Are there any symbols associated with China? - When did Sweden become a social democracy? - What is social energy? - What is the meaning of social impact? - What are examples of social groups? - What is a social impact venture? - What is an example of social engineering? - Why are social games so popular? - How do I get social housing in Netherlands? - What do you study in social anthropology? - How Do You Use feed them social? - What is a social handshake? - What triggers social anxiety?
<urn:uuid:5a08b2ca-6f35-4c4d-a058-454a494a34ef>
CC-MAIN-2022-33
https://sociology-tips.com/library/lecture/read/37427-what-are-the-main-religious-symbols
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.923688
1,477
2.953125
3
We are searching data for your request: Upon completion, a link will appear to access the found materials. Balance problems can be caused by many situations. They are especially troublesome in the elderly, who are at a higher risk of breaking a bone. However, in younger individuals they can create problems at work or in daily activities. Balance problems can range from a mild annoyance to a more severe and disabling condition. Below is some basic information on the different situations that can affect your ability to maintain balance. In order to maintain balance your brain needs to receive information from your eyes and ears, and from pressures against your skin and muscles. You also need to have good muscular strength. All of these systems work together to provide information to the brain about where your body is in space and what corrections are needed to maintain balance. When any of these systems is affected by disease or when they are not functioning correctly, then you may have sensations of spinning, light-headedness and trouble focusing your eyes. You may then lose your balance and fall. As you age there are changes to your eyes, ears and your skin's ability to sense pressure. All of these changes reduce the amount of information available to the brain to help you maintain balance. In addition, there is a tendency to become more sedentary, which can lead to muscle tightness and weakness. According to the National Institute on Aging's Senior Health Division, approximately 40 percent of people over age 65 fall each year. This leads to even less activity due to the fear of falling again. This creates a downward spiral where the individual becomes more and more at risk for losing balance and falling. Participating in an appropriate strength training program can help to counteract this process. According to the Vestibular Disorders Association, vertigo is the most common form of dizziness. There are different types of vertigo, but all are caused by a problem in the inner ear. This problem can be inflammation, Menagerie's disease, tumors or other growths in the ear, certain medications and many other conditions. When there is a problem within the vestibular system, you may experience symptoms such as dizziness, vertigo, imbalance, spatial disorientation and other symptoms. Changes in Blood Pressure Orthostatic hypotension is a condition that occurs when there is a significant drop in blood pressure. It tends to happen when rising from lying down or a seated position. Getting up too quickly can cause your blood pressure to drop too low and can bring on feelings of light-headedness or faintness. Heart conditions such as atherosclerosis, cardiomyopathy, arrhythmia and other cardiac conditions can cause your blood pressure to drop. This means you will not have an adequate supply of blood flow from the heart. This can reduce your levels of oxygen and lead to balance issues. Diseases and Treatments The National Institute on Deafness and Other Communication Disorders states that balance issues can also be caused by a tumor that affects an area of the brain. Infections and head injuries can also cause you to feel off balance. Medications to treat these conditions and other medical conditions often have a side effect of drowsiness or dizziness. It is important to talk with your doctor or pharmacist to find out what effect your medication may have on your balance. This can be especially critical if you are taking more then one prescription medication or are using over-the-counter remedies or herbal treatments as there may be interactions.
<urn:uuid:832e192f-b1bc-46c3-806c-a1c757508106>
CC-MAIN-2022-33
https://au.rottweiler-delbracciale.com/6306-what-are-the-causes-of-balance-problems.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.948866
713
3.21875
3
Windows 7 Service pack 1 or SP1 contains all the Windows 7 updates released till date to keep your Windows PC up to date. Installing SP1 will help you prevent any security, functionality or compatibility related issues which you might be facing because of not having updated your Windows OS software. https://geekgirls.com/2011/02/installing-and-troubleshooting-windows7-sp1/ https://forum.thewindowsclub.com/windows-tips-tutorials-articles/32240-service-pack-installation-cannot-continue-one-more-system-components-missing.html https://www.computerworld.com/article/3067268/the-shame-of-windows-update.html https://support.lenovo.com/us/en/solutions/ht037207 https://www.windowscentral.com/how-to-upgrade-windows-7-windows-10 Problem installing Service Pack 1 (SP1) - Windows 7 Help Forums I have a PC running windows 7 64-bit and I am finding it impossible to get windows 7 Service Pack 1 (SP1) to install. I start the installation and it seems to run for more than an hour and appears to be installing OK; but when I restart the PC I get an error saying that the installation was not successful... Windows 7 SP1 service pack update - Windows 7 | Forum Description: Installation Failure: Windows failed to install the following update with error 0x80070643: Windows 7 Service Pack 1 for x64-based Systems Microsoft in their narrow minded wisdom made it impossible to install service pack1 without IE 11, and impossible to install IE 11 without service pack1. How to Install Service Pack 1 Update on Windows 7 (SP1) - YouTube This Tutorial is for Easy installation of Windows SP1 Download link Windows 7 SP 1 32bit 538 MB... How to Install Windows 7 Service Pack 1(SP1) 1.Installing Windows 7 SP1 using Windows Update (recommended) If your PC is set to automatically install updates, you’ll be prompted by Windows Update to install SP1. Follow the instructions to install the update. Windows 7 Service Pack 1 (SP1) 32-bit & 64-bit (KB976932 ... Download3K did not scan Windows 7 Service Pack 1 for viruses, adware, spyware or other badware. For your own safety, we recommend that you always have an antivirus, with virus definitions up to date, installed on your computer when downloading and installing programs from the web. Télécharger Windows 7 "Service Pack 2" | WindowsFacile.fr I am using the legitimate version of windows 7. When i purchased my computer,it was told to me that my computer has Windows 7 starter SP1 32-bit. However when i open "winver.exe", it shows "Build 7601 ( Service Pack 3)" which is quite strange... Windows 7 Service Pack 1 Beta Installation Installation walkthrough of Windows 7 Service Pack 1 Beta and information on specific changes for both Windows 7 and Windows Server 2008 R2 systems.You can register for the Service Pack 1 Beta, which will allow you to receive information and updates on new builds and beta expiration dates. Should you install Windows 7 Service Pack 1? | ZDNet Last week, Microsoft released Service Pack 1 for Windows 7 and Windows Server 2008 R2. Since then, I've been monitoring the release.If you decide to press ahead with an SP1 installation, some basic precautions are in order, the same ones you should use with any important upgrade
<urn:uuid:f3abde6f-095c-4fc9-ac9c-9fdc3abaadf9>
CC-MAIN-2022-33
https://usenetloadsxvec.web.app/installation-windows-7-service-pack-1-impossible-hyme.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.819644
748
1.789063
2
The latest dust-up between the U.S. government and Afghan president Hamid Karzai involves the treatment of some 3000 prisoners the U.S. is holding in Afghanistan. The lack of due process for detainees at Bagram has been a problem since the prison opened, and was documented most recently in a report Human Rights First released last May. Congress actually attempted to address the problem in its latest defense authorization bill, which said the U.S. should provide detainees in Afghanistan with defense lawyers and neutral military judges to hear their cases. President Obama, however, in a statement he signed on New Year's Eve, signaled that he plans to ignore that. The United States' failure to accord suspects imprisoned by our military in another country the right to defend themselves is now coming back to bite us. Although this isn't the first time Karzai has complained about U.S. actions, in part for his own political reasons, the U.S. has given him plenty of material to support his complaints. In the past, it's been the night raids by U.S. and NATO forces that have enraged the Afghans, who find it an affront to have foreign soldiers raiding their homes in the middle of the night based on secret claims by unnamed informants. Now, it's the fact that some 3000 Afghan men (and several dozen from other countries) are being imprisoned based largely on secret evidence that U.S. forces admit wouldn't hold up in a real court of law. According to the Associated Press: Members of the Afghan investigation said U.S. officials told them that many of those militant suspects held at the U.S.-run portion of the prison outside Bagram Air Base north of Kabul were taken based on intelligence that cannot be used in Afghan courts. Gul Rahman Qazi, who led the Afghan investigation, said: "Detainees interviewed during two visits by the investigators complained of freezing cold, humiliating strip searches and being deprived of light, according to Gul Rahman Qazi, who led the investigation ordered by Karzai." These complaints echo those my colleague, Gabor Rona, Human Rights First's International Legal Director, and I heard when we interviewed former detainees in Kabul last year. And although we documented them in a 42-page report and have discussed our findings extensively with U.S. government officials, the U.S. embassy spokesman acted as if this was the first time they'd heard such claims: "American officials only received the commission's report after its press briefing," said the U.S. embassy spokesman, adding that the U.S. investigates all allegations of prisoner abuse. "We will certainly take seriously the report and study it," he said. He added that the U.S. is committed to working with the Afghan government on a joint plan to turn over detainees "in a responsible manner." Responsibility begins with due process. As we wrote in our report in May, based on our observations of the hearings given to detainees at the U.S.-run detention facility at Bagram: "the current system of administrative hearings provided by the U.S. military fails to provide detainees with an adequate opportunity to defend themselves against charges that they are collaborating with insurgents and present a threat to U.S. forces." As a result, the U.S. hearings "fall short of minimum standards of due process required by international law." For President Karzai, that's an argument that the U.S. should immediately turn the thousands of detainees it's holding over to the government of Afghanistan. But that would do little to solve the problem. The United Nations reported in October that Afghanistan's intelligence service systematically tortures detainees during interrogations. The U.S. government cannot hand prisoners over to the Afghans if they're likely to be tortured, according to its obligations under international law. And unfortunately, as we also noted in our report, the Afghan justice system, although improving with the growing introduction of defense lawyers, is still hardly a model of due process. Still, unlike the United States, at least Afghan law does not permit detention without criminal charge, trial and conviction. The United States hasn't exactly proven itself the best model for the Afghan justice system. Restoring U.S. credibility is going to be key to our ability to withdraw from Afghanistan without it becoming a future threat to U.S. national security. The U.S. government can't credibly insist that the Afghans improve their justice system and treatment of detainees if the U.S. military doesn't first get its own detention house in order. Whether for the sake of international law, U.S. credibility, or merely to improve relations with the Karzai government, upon which U.S. withdrawal from Afghanistan depends, the U.S. military needs to start providing real justice to the thousands of prisoners in its custody.
<urn:uuid:4340e33e-33d1-45f0-8148-f6bce85fbbd7>
CC-MAIN-2022-33
https://www.huffpost.com/entry/the-latest-skirmish-in-af_b_1193010
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.975403
991
1.953125
2
What Does Estate Mean? An estate is the total collection of items of value that belong to a person. It is what they pass onto to their beneficiaries when they die. In the context of Insurance, life insurance is commonly used in estate planning, and it is often part of the estate that a decedent passes onto a beneficiary. Insuranceopedia Explains Estate Many people choose to purchase life insurance policies for the purpose of increasing the value of the estate that they pass on to their children, spouses or other beneficiaries. Moreover, life insurance proceeds or other cash value accumulated in the policy can help beneficiaries conclude the decedent's affairs. The available sum is oftentimes also exempt from certain taxes. This can make life insurance even more appealing for estate planning.
<urn:uuid:cae6b694-9813-4160-a364-335c85f3f7d7>
CC-MAIN-2022-33
https://www.insuranceopedia.com/definition/325/estate
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.949103
156
2.15625
2
Traditional Version of Trente Et Quarante Trente Et Quarante, also known as Rouge et Noir, is an old French poker game of French origin, originally played using a special game board with seven cards. It isn't quite as common in US casinos, but it is still very popular in Italian and European casinos, particularly in French-speaking countries, such as France, Italy, and Monaco. The classic game was divided into three parts, each comprised of seven cards. The dealer would announce the contents of the third, second and fourth rooms after the initial phase. The players yelled "present" in the event that they were aware of what was in the previous room, and at that the dealer would then reveal the cards in that room. To determine the order of the round, players would choose among the other cards and count the ones that were revealed. There are a variety of effects that can be created dependent on the kind of card was revealed in the game. For instance, in the third round, the player with the most poker chips was the winner, as long as there were no other players at that level. If two players were at the exact level, the winner would be the player who had the largest amount of chips. Along with revealing actual cards the dealer also employed an effect. When a player reveals the card, it would leave a red mark on chips of the player's hand. These red marks would eventually change into a color, signifying what kind of card it was. When you flip a card you will see the suit. You could apply the suit against another player with all red chips. This, as you could imagine, caused quite a buzz among the players. The unique effect also had an interesting side. A card that was dropped by a player and picked up again would reveal another card. If those discarded cards were of the same suit, it would indicate that a different player may have received that card. It was not uncommon to conclude a game with two cards from the same suite. The originality of this game However, it was not able to last long. In the 20th century electronic games took its place. Electronic games eliminated the role of playing and instead focused on basic mathematical calculations. While it may not be exciting, Quincey found that it removed the boring part of traditional games. You can also play Quincey’s Trente Et Quarante today. It is also possible to play the game with a https://mt-god.com/ regular playing card, instead of using an electronic device. This makes it simpler for players who want to play the game but are unable to use an electronic device. You could also choose to play the game with different versions. The usual rule is to use four playing cards when you play the traditional game of Quincey's. However, the new version allows you to play eight cards. This is because there are also two jokers in the game. The jokers are utilized in the classic game to eliminate undesirable cards that are used in the game. The new joker makes it possible to eliminate cards without taking the joker out of the deck. It's time to play the traditional Quincey's Queue game. It doesn't require an electronic device or even to buy anything. You can play it at home or at any other location you prefer. Your family and friends will surely be entertained by this traditional version as well.
<urn:uuid:9dacad60-f462-4c6d-a33b-ddf001e8feca>
CC-MAIN-2022-33
http://codyjzro313.wpsuo.com/10-best-mobile-apps-for-meogtwisaiteu
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.989395
701
1.640625
2
A Career in Designing – Did you Made the Right Choice? We all aspire to be something in life. For me, your choice should never be affected by the monetary aspects of job. Think of your passion and interest before anything else for they will take you ahead in life. Most of us are not able to get the required exposure or platform to showcase our talents or what if we don’t really know where to head. Don’t worry folks! I‘ll get you through this. If there is a creative side of yours and you are thinking to start a career in designing then let me tell you it’s perfect. Slowly and gradually you will achieve what you aspire. No matter what is your field right now or how inexperienced you are. It is possible to find your place as a designer. Qualities you would need as a Designer Manage your time Take it as an essential quality for you to gain advantage in this competitive industry. You must know how to manage your time and reach out your goals without affecting the quality of your work. Designing is all about being creative which is why you need to be quick and unique at the same time. Also, when you have a little pressure on you this quality will be your shield. The key to stand out from the crowd is never compromise from the quality of your work. Being in a creative field, the most important thing is to keep you updated with all the trends and changes in the market. Trust me; being a creative writer myself, I have to keep refreshing my mind from all the latest trends. I would say this is not just about designing; whichever field you choose, improving on your knowledge will always benefit you and help you make your profile distinct from the others. Your skills will automatically reflect on your work once you start improving them. Creativity is at the heart of designing be it graphics, fashion, textile, product, animation, jewellery or any other form. You need to present the creative side of yours and your designs should be different from what others have to offer. Try to think out of the box whenever working on a project and create designs which are artistic and yet classy. This will come slowly and gradually so you do not need to rush initially. I would suggest you to stay focused and make use of your strengths. A Team Player Well, initially you might have to work with a group of designers to polish your skills and gain some experience. Now, this can be a bit difficult for people who do not like to work under people and rather like to be their own boss. Working in a team will make you deal with work pressures and coordinate with people for different projects and assignments. Getting an official degree is not enough professionalism comes with the overall development of the personality and a positive character. If you are starting with your designing career be clear of the fact that education is not the only thing but yes, it will help you to gain the required skills and work efficiency for you to work as a designer in any field you want. Usually, aspirants pursue Bachelor of Design (graduation degree) of 3 years to kick start their career from different colleges. However; with time, things have evolved and now there are many short-term courses to cater to your designing needs and that too in a short span of time. Many diploma and advance diploma courses of 6 months to 1 year make it convenient for students who do not wish to study for 3 consecutive years. This is on you to decide which way you wish to start your education. What Career Options you have? After completing your educational degree you can either work as a freelance designer or a full-time designer in a private or government company. Areas such as hotels, fashion media, boutiques and manufacturing units offer jobs to designers on different salary scales. It also depends on the area of your expertise and the skills you possess. Being a designer, you will create various designs everyday and showcase the same to people which makes it extremely important for you to protect them through design registration and make sure that no one misuses them. This will help you to own the artistic work legally. The above article has been written and brought to you by tanya. - I Was the Small Town Loser - November 23, 2021 - How to Protect Outdoor Wood Furniture From Dust and Bugs - October 26, 2021 - 5 Useful Tips That Can Make Your Car Last Longer - October 19, 2021
<urn:uuid:365ec30c-998f-4ba9-a09a-eb6dba2c75a1>
CC-MAIN-2022-33
https://www.innertowords.com/a-career-in-designing-did-you-made-the-right-choice/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.961464
947
1.796875
2
Idaho Wildlife Officials Discover Elk Boneyard on Craig Mountain Officials found at least 15 elk heads and countless other bones at the base of a steep gully Officials with Idaho Fish and Game made a grisly discovery at the base of a steep slope near Lewiston last week. Amidst a pile of rubble and debris, they found what Northwest Sportsman Magazine referred to as an “elk boneyard.” Officials found at least 15 elk heads, along with fur, broken legs, spines, and countless other bones. “All of this is elk,” says IDFG senior wildlife technician Mark Shepard in a video he filmed of the discovery. “At least 15 heads and four collars found…and a lot of broken legs.” The collars that Shepard refers to are GPS radio collars that IDFG uses to track and monitor elk. He explained in a press release that the agency had received a mortality signal from one of these radio collared elk earlier this year. The signal came from within Craig Mountain Wildlife Management Area, which is located along the Snake River near Lewiston. “With the data and GPS location provided by the collar, wildlife staff were able to navigate to the location of the collar,” Shepard said. “When wildlife staff arrived at the location of the radio collar, they discovered the surprising but unfortunate story of what had occurred.” He explained that the elk bones were mixed in with scree material and “boulders up to the size of beach balls,” which led him to believe that the herd of elk must have been side hilling along the ridge line when the animals were caught in a landslide. The slide then apparently carried the elk almost 1,000 feet down a steep, rocky gully. In addition to all the bones that were found, wildlife technicians came across four radio collars in total. “I’m sure [there was] some scavenging,” Shepard says in the video. “But with so many bones, it’s hard to say which ones go to which collar.”
<urn:uuid:a0a90feb-00b8-43ad-9b2d-573c269dd023>
CC-MAIN-2022-33
https://www.outdoorlife.com/conservation/idaho-officials-discover-elk-boneyard/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.971688
446
1.664063
2
Have patience. All things are difficult before they become easy. – Saadi Everyone stinks at first. My favorite example of this is walking. When a young child begins to walk, we cheer them on. We help them and keep them safe, but we don’t discourage their progress by expecting them to get it right the first time. We expect lots and lots of mistakes. We encourage them to work through the failures and missteps. We cheer them on when they take the first few tentative steps. As you learn and grow, do the same for yourself. Don’t expect perfection, encourage mistakes and next attempts. Celebrate the small victories. Make it a great day.
<urn:uuid:122672e3-fcde-4c7c-b30d-b4876b349530>
CC-MAIN-2022-33
https://thedailyattitudeemail.com/2018/05/30/daily-attitude-email-05-30-18/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.935945
152
2.046875
2
For the king had at sea the ships of Tarshish with the ships of Hiram; once every three years the ships of Tarshish came bringing gold and silver, ivory and apes and peacocks. “At the end of every third year you shall bring out all the tithe of your produce in that year, and shall deposit it in your town. Never miss a post New American Standard Bible Copyright ©1960, 1962, 1963, 1968, 1971, 1972, 1973, 1975, 1977, 1995 by The Lockman Foundation, La Habra, Calif. All rights reserved. For Permission to Quote Information visit http://www.lockman.org
<urn:uuid:329434cf-c4e7-43e7-a228-62e8a2433b8f>
CC-MAIN-2022-33
https://bible.knowing-jesus.com/topics/Every-Three-Years
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00272.warc.gz
en
0.893635
137
1.539063
2
ELTA HELPS KEEP FOREST WAY COOL When Forest Way Special Educational Needs School was opened recently, thirty five Elta Fans were installed as part of the system to provide a comfortable, effective and well ventilated learning environment for the pupils. The school, situated in the National Forest in Leicestershire, is a new co-educational special school for 138 pupils aged 3 – 19 years old with a wide range of special needs. With a location about a mile from the centre of Coalville, (a market town close to Junction 22 of the M1 and ten miles north-west of Leicester) the school has an interactive forest heart and features corridors of curved walls using floor to ceiling images of woodland scenes. Designed with sustainability in mind, the school incorporates several integrated, eco-friendly systems, added to which is the low energy ventilation system that utilises the Elta fans. The ventilation system incorporates eighteen Elta ‘Quietflow’ single fans, three ‘Quietflow’ twin fans, one Elta ‘Skyflow’ SSF roof unit, four domestic SE fans and two SCE fans. The twenty two larger fans were supplied complete with all required ancillaries and accessories such as mounting feet, silencers, speed controllers and sensors. The system is powered by renewable energy and automatically controls the ambient environment in each classroom. The main contractor for the development was Wilmot Dixon, with Fans and Spares Nottingham (Elta’s local distributor), providing the Elta equipment to Derry Building Services. The school is intended to be a major focal point and resource for the whole community and was designed around an internal courtyard to a very high specification. Many of the inspirational features are there to provide a very intimate and tactile environment for the students with multiple learning difficulties. Other environmental systems incorporated include a rainwater harvesting scheme which is used to flush the toilets and a wind turbine to meet some of the school’s energy requirements. There is strong local community support for the school, which is currently preparing a bid for Specialist Schools Status in the area of Communication/Interaction. Adrian Franklin, the Building Services Engineer at Derry Building Services responsible for the project, said: “We have successfully worked with Elta on a number of contracts and worked closely with Elta on this project to ensure we had the right units for the application and to meet the client’s needs. The fans featured PIR control, with speed controllers also fitted to ensure they are operating at optimum capacity. The fan units were clearly identified, along with the ancillaries, to identify the relevant locations.” Elta Fans Sales Engineer Keith Lomas commented – “schools are undoubtedly a growing market for us at the moment. Many people see a need for an ecological approach to the construction and services installation process. In this way we can offer the children a chance to be educated on the importance of a healthy awareness of their environmental responsibilities. Elta have a philosophical approach that fits in very well with this ideology.” Elta Fans in the UK have been manufacturing fans for more than 30 years now with a continuous investment in people, plant and machinery to produce modern development techniques for a fast, responsive and flexible approach to satisfy ever changing market conditions and energy efficiency needs. Whilst its principal manufacturing plants are located in the UK – in Kingswinford in the West Midlands and Fareham in Hampshire – there are also strong global facilities (including manufacturing and assembly operations) in Australia, New Zealand, India, Malaysia and South Africa.
<urn:uuid:89742dbe-9e28-4efc-92cc-de2cf3695534>
CC-MAIN-2022-33
https://bsee.co.uk/elta-helps-keep-forest-way-cool/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.960281
741
1.945313
2
U.S. Enters Recession Territory With Second-Quarter GDP Falling 0.9% The real economic growth in the U.S. declined 0.9% in the second quarter of this year, hurling the economy into a so-called "technical recession" as it records two consecutive quarterly contractions. - The U.S. second-quarter Gross Domestic Product growth has come in at -0.9%. - The latest data shows a second consecutive quarterly contraction, meaning the U.S. economy is technically in a recession. - The bleak GDP numbers come after the Federal Reserve raised interest rates by another 75 basis points Wednesday. Share this article The U.S. has reported its second consecutive quarterly decline in Gross Domestic Product growth. U.S. GDP Shrinks by 0.9% The U.S. economy is in a technical recession. According to data published by the U.S. Bureau of Economic Analysis, the annualized second-quarter economic growth in the country has come in at -0.9%, falling below economists’ expectations of a 0.5% increase. The result follows an unexpectedly large 1.6% contraction of Gross Domestic Product in the first quarter of the year. “The decrease in real GDP reflected decreases in private inventory investment, residential fixed investment, federal government spending, state and local government spending, and nonresidential fixed investment that were partly offset by increases in exports and personal consumption expenditures (PCE),” the report read. The U.S. economy is now technically in a recession, which outside the U.S. is commonly defined as two consecutive quarters of economic contraction. The National Bureau of Economic Research, an academic institution that determines whether the U.S. has entered a recession based on a broad range of factors, is set to evaluate the data and the state of the economy over the following week. The U.S. Secretary of the Treasury, Janet Yellen, will also hold a conference today. The bleak U.S. GDP numbers come after the Federal Reserve hiked interest rates by another 75 basis points Wednesday. After the last increase, the U.S. interest rates are now between 2.25% and 2.5%, with the Fed allegedly planning to further hike the rates to about 3.4% by year’s end and 3.8% in 2023. The Fed’s primary mandate is to lower inflation to its intended 2% target, a long way down from the current fuming inflation rate of 9.1%. However, the central bank’s effort to bring inflation down from its four-decade high may come at a cost to consumer spending, employment, and ultimately economic growth. Market participants may interpret the latest U.S. GDP numbers as either bullish or bearish, depending on whether they believe the data has been priced in. While negative growth is certainly not a favorable economic climate for risk-on assets, it may cause the Fed to switch to a more easing monetary policy sooner than anticipated. As markets are generally forward-looking, they may begin pricing this event months ahead, despite the present dire economic conditions. Disclosure: At the time of writing, the author of this article owned ETH and several other cryptocurrencies.
<urn:uuid:f652c847-721a-429b-b2c3-5d25ebe8d127>
CC-MAIN-2022-33
https://cryptobriefing.com/u-s-enters-recession-territory-with-second-quarter-gdp-falling-0-9/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.950152
679
2.1875
2
But let us see if this people is the heir, or the former, and if the covenant belongs to us or to them. Hear ye now what the Scripture saith concerning the people. Isaac prayed for Rebecca his wife, because she was barren; and she conceived. Rebecca went forth to inquire of the Lord; and the Lord said to her, “Two nations are in thy womb, and two peoples in thy belly; and the one people shall surpass the other, and the elder shall serve the younger." You ought to understand who was Isaac, and concerning what persons He declared that this people should be greater than that. And in another prophecy Jacob speaks more clearly to his son Joseph, the Lord hath not deprived me of thy presence; bring thy sons to me, that I may bless them." And he brought Manasseh and Ephraim, desiring that Manasseh should be blessed, because he was the elder. With this view Joseph led him to the right hand of his father Jacob. But Jacob saw in spirit the type of the people to arise afterwards. And what says [the Scripture]? And Jacob changed the direction of his hands, and laid his right hand upon the head of Ephraim, the second and younger, and blessed him. And Joseph said to Jacob, “Transfer thy right hand to the head of Manasseh, for he is my first-born son." And Jacob said, “I know it, I know it; but the elder shall serve the younger: yet he also shall be blessed." Ye see on whom he laid [his hands], that this people should be first, and heir of the covenant. the same thing was intimated through Abraham, we reach the perfection of our knowledge. says He to Abraham? “Because thou hast believed, it is imputed to thee for righteousness: behold, I have made thee the father of those nations who believe in the Lord while in [a state of] uncircumcision."
<urn:uuid:a50f439c-2703-42f2-8844-9537b5349f00>
CC-MAIN-2022-33
https://barnabas.seranates.com/html/chapter13.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00272.warc.gz
en
0.954101
489
1.890625
2