text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
The NHS is facing one of the busiest winters in history. The demand for emergency care has never been greater and it’s vital that we do everything possible to help them to keep up with this demand. Non-emergency patient transport services are an area where more can be done to help ease pressure on the front line.
The NAO’s figures show that around 2 million trips are made each year via NEPTS in England, with ambulances carrying many of the patients.
NEPTS (non-emergency patient transport services), is provided by a range of providers such as taxi firms and voluntary organisations. They are used for patients who don’t need an ambulance but can’t get themselves to hospital because of their condition or mobility issues.
The NHS spends around £1 billion each year on taxis, ambulances and other forms of transport for NHS patients – about 5% of the total NHS budget.
But the NAO warns that the current arrangements for NEPTS could be wasting money by sending too many people on expensive ambulances when cheaper alternatives would suffice (such as booking a taxi service). It estimates that around 2 million trips are made via NEPTS in England each year, with taxis carrying 37% of these journeys while ambulances make up 63%.
All NHS Trusts have to offer free transport for eligible patients who cannot make their own way for medical appointments.
All NHS Trusts must provide transport for patients who cannot make their own way to medical appointments. This presents a need to get the safest, most cost-effective route to care booked for many patients.
So what is the solution?
The solution to this issue is not just about finding a balance between clinical need and cost, it’s about finding a balance between clinical need, patient experience, safety and efficiency. Whilst also ensuring that the quality of care remains high.
The cost of providing this service varies tremendously across England, with Trusts spending up to £195 per patient journey. This is partly because there are different types of transport used, from ambulances to community transport vehicles (CTVs) and private hire taxis; but also because some hospitals have a more complex patient base than others and so they require more resources in terms of staff time, training and equipment. This complexity may also increase costs if it means that more trained staff are required to make sure patients are transported safely, or if specialist equipment has been purchased by hospitals to facilitate safe care provision during non-emergency transfers.
How we can help to source ambulance and taxi transport
Using our eProcure Platform, we are able to provide access to a range of transport providers, including ambulances and taxis. Our dedicated team work tirelessly to ensure the highest standard of care is provided by the transport services that we work with, guaranteeing that your patient receives the best possible care while they are being transported. We are able to provide a cost-effective solution that is tailored to your patient’s needs. Our service is flexible and can be adapted to meet any NEPTS requirements (including Mental Health journeys), meaning we can help you to provide an effective service with minimal delay.
Keeping the NHS moving helps us all
We’re passionate about helping patients get to and from places of care safely, and we know that NEPTS is a vital part of making sure this happens. That’s why we want to work with NHS Trusts to help them make the most of their budgets, saving valuable time and resources.
We provide this service and access to our Digital Transport Marketplace free of charge to the NHS. Keeping the NHS moving is more important than ever as Trusts face the biggest crisis they have ever seen. We’re ready to help as soon as you need us. Give us a call to tell us your requirements or send us an email to firstname.lastname@example.org. | <urn:uuid:85a7f86c-821a-4a32-a943-9d216a4b143d> | CC-MAIN-2022-33 | https://365response.org/help-to-improve-non-emergency-patient-transport-in-the-nhs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.959862 | 790 | 2.15625 | 2 |
PPC advertising and marketing or ppc advertising and marketing is one of the most popular method of advertisement employed by many sites on the Internet. Pay Per Click marketing might frequently be referred to as pay for placement, cost per pay or click for efficiency. No matter the term used, Pay Per Click marketing is the on-line marketer's tool of choice for promoting services as well as items to on-line customers.
PPC advertising is valuable to both the marketing expert and the consumer. Marketers using PPC marketing just have to spend for the real click throughs connected to their sites from on-line internet search engine. At the very same time as consumers are eliminated of needing to obtain aggravating emails or pop-up ads for fixes and also products.
When an online customer searches for a specific product or service on the net, matching Pay Per Click advertising promotions are furthermore revealed along with the results produced by the online search engine. This forms a highly targeted customer team that is more than likely to purchase a particular product or service. Additionally, web sites get to restrict their advertising campaign costs with utilizing PPC advertising and marketing Pay Per Click marketing is truly a winning option for both parties.
Feasible drawbacks of Pay Per Click advertising and marketing.
Regardless of the noticeable benefits of Pay Per Click marketing, there are feasible disadvantages that could counteract its advantages. Among the most usual problems gotten in touch with Pay Per Click advertising and marketing is the inadequate of experience of numerous individuals attempting to use this rewarding advertising campaign approach. Merely submitting Pay Per Click advertising advertising campaigns to an on the internet online search engine such as google, does not make up the entire task
Pay Per Click advertising and marketing needs an arranged as well as calculated method to establishing promotions. Pay Per Click advertising includes making use of key words and biddings in order to get top placing on a net internet search engine. Obtaining leading net online search engine positioning assists enhance web traffic to a web site that could easily translate into income.
Without the essential experience and also knowledge to execute a common Pay Per Click marketing advertising campaign, might end up being an expensive task that does not convert into revenue. Pay Per Click advertising promotions also require constant funding, as stopped payments will certainly also cause stopped ads. This can be negative for a site that has actually currently constructed high rankings with their Pay Per Click advertising and marketing advertisements.
Bidding on key phrases can similarly be quite pricey, as the expanding selection of web sites on-line resist each other to bid on one of the most popular keyword phrase for their Pay Per Click advertising and marketing ad. Clearly tiny company websites go to a drawback right here taking into consideration that market websites have the capacity to pay more for prominent keyword phrases related to their website. This is given that a great deal of tiny companies merely alloted a little part of their funding for advertisement, placing them at a disadvantage.
Running a reliable PPC marketing campaign.
When running a reliable Pay Per Click marketing task, there are a variety of points that a site need to consider. It is vital to develop an advertising strategy so as to get one of the most return on investment from Pay Per Click marketing Picking one of the most suitable keywords that connect with the web site's business is necessary in PPC marketing.
Merely picking one of the most preferred keywords does not necessarily equate right into revenue. Choosing much more particular keyword phrases that will certainly place a website within the primary 10 outcomes of a search also obtains greater awareness from on the internet clients. Furthermore, it doesn't set you back as long as getting the leading area for Pay Per Click marketing.
At the specific very same time any type of Pay Per Click advertising promotion that has actually not proven reliable can be instantly stopped. Altering PPC marketing ads is a continuous process that great deals of sites do in order to increase their return on monetary investment.
Obtaining expert aid with PPC advertising and marketing.
The appeal of Pay Per Click advertising and marketing has actually triggered specialists supplying PPC advertising and marketing fixes for huge and little companies. Collaborating with a professional PPC marketing business is a great idea for a little company without encounter in PPC advertising and marketing. Most Pay Per Click advertising and marketing company deal reasonable rates for their supports and also at the similar time generate appropriate results.
A Pay Per Click marketing expert can take care of all the details generally connected with a PPC advertising job. Managing a Pay Per Click advertising and marketing job is a time consuming process that could be frustrating for a little business. A PPC marketing expert could assist develop a PPC marketing project as well as later train somebody from within business to handle it to ensure its continued success.
PPC advertising or pay per click advertising and marketing is one of the most preferred method of ad used by various websites online. The appeal of Pay Per Click marketing has actually supplied rise to professionals supplying PPC advertising and marketing services for little as well as huge companies. Dealing with a professional PPC advertising firm is a good idea for a little company without encounter in PPC advertising and marketing. A PPC advertising and marketing specialist could attend to all the information frequently associated with a Pay Per Click marketing task. A Pay Per Click marketing expert can help established a Pay Per Click marketing task and also later train somebody from within the company to handle it to assure its continuous success.
PPC marketing or ppc advertising is the most popular method of advertisement utilized by numerous websites on the Internet. The appeal of PPC advertising and marketing has actually given increase to specialists offering Pay Per Click marketing services for big as well as tiny businesses. Functioning with an expert PPC marketing business is a great idea for a little business without encounter in Pay Per Click advertising and marketing. Working with a professional Pay Per Click advertising company is recommended for a little firm without experience in PPC marketing. A PPC marketing professional could assist set up a Pay Per Click marketing project as well as later on train somebody from within the company to handle it to guarantee its ongoing success.
Your shopping cart is empty.
Items/Products added to Cart will show here. | <urn:uuid:119ccb01-feb1-4163-bf2f-98c137d6a472> | CC-MAIN-2022-33 | http://cheapestwebdesign.biz/new-york/ridgewood/ppc-management.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.958604 | 1,246 | 1.75 | 2 |
When Facebook rebranded itself as Meta in October, CEO Mark Zuckerberg described his vision for the “next chapter of the internet.” People would work, socialize, shop, and live much of their lives in an immersive digital world called the Metaverse.
Other tech giants, including Microsoft, Google and Apple, alongside video game companies, fashion brands, entertainment companies and numerous startups, have also invested billions in metaverse technology and apps.
In an effort to better understand what the next evolution of the internet might be, “Marketplace” host Kai Ryssdal explored a virtual world with Rabindra “Robby” Ratan, associate professor in the Department of Media and Information at Michigan State University.
Using a Quest 2 virtual reality headset purchased from Meta for $299, Ryssdal met with Ratan in a simulated conference room.
“Little moves,” Ratan said when explaining how to navigate. “You don’t want to vomit.”
This virtual conference room was created by a company called Engage, which bills itself as a “metaverse platform” for immersive meetings and events. “It’s one of many,” Ratan said.
“I think that’s an ill-informed question,” Ryssdal said. “How many metaverses are there? »
“I would say there aren’t any right now,” said Ratan, who has been studying virtual worlds for about two decades. “It’s kind of like the question, how many internets are there?” he said. “In 1988, there were zero. Maybe in 1992 you would say, ‘OK, there are internets’. There is an Internet forming. So it’s like a little oasis in the internet in three dimensions.
Ratan regularly uses Engage to meet with undergraduates for his VR classes. For Ryssdal, Ratan demonstrated drawing on a whiteboard and “creating” virtual objects, such as a dinosaur skull.
In the screenshot on the left, a virtual Tyrannosaurus rex skull chews on a participant in a computer-generated meeting. On the right, the avatar of Ryssdal draws on a whiteboard in virtual reality.
“I often ask my students to create virtual objects like this, and we bring them up as part of our discussion,” he said. “For example, if it’s a course related to architecture, we could talk about buildings. People could bring things they design, we can look at them from different angles.
Some observers say the “metaverse” is basically a marketing term used by companies that build anything related to virtual and augmented reality or immersive digital environments. “One day we can just easily switch between virtual platforms, [but] right now you have to install it as an app on your phone,” Ratan said.
In the Engage app, Ratan took Ryssdal to another, much larger virtual space with multiple levels, seating, and a stage.
Screenshots of a simulated “exhibition hall” on the immersive meeting and education platform Engage.
“It’s actually one of my favorite places to hold classes,” Ratan said. “I’m going to install the students in different booths and prepare a small presentation. And then in class, we move around and we hear them present, but we can also imagine that for business meetings, of course. For congresses, all types of event conventions.
Ratan helped Ryssdal “create” a life-size virtual helicopter.
“Let’s say we sell helicopters,” Ratan said. “I could, as you can see, very easily create a helicopter for you to see…and make pieces of gear based on custom commands that people actually experience in a virtual space like this.”
Between hardware, software, events and advertising opportunities in virtual environments, Bloomberg Intelligence estimated that the metaverse could represent an $800 billion market by 2024.
But Ratan said part of the economic potential of the metaverse is that platforms become more interoperable or easier to move around. Currently, it is difficult to transfer digital assets from one platform to another.
“Do you think the challenge is the technology, or is the scale of the challenge in getting wider adoption? asked Ryssdal.
“Typically when we look at mass media, historically technology is the scale issue,” Ratan said. “We need to be able to standardize the different technologies in order to produce at a low enough cost…and we also need them to be less of a walled garden.”
Ryssdal explores a simulated underwater environment in virtual reality with Rabindra Ratan, associate professor of media and information at Michigan State University.
In another virtual environment – meant to resemble the bottom of the ocean – Ratan and Ryssdal discussed the concept of avatar identities, or visual representations of people in digital spaces.
“There’s this phenomenon called the Proteus effect, which is one of the main theories I’ve studied as a media researcher,” Ratan said. “It’s the idea that when you use an avatar that has certain characteristics, it influences your behavior.”
For example, “If you use a bigger avatar, you will trade more aggressively. If you use a more attractive avatar, you will have more social trust,” he said. “My personal favorite: If you use an avatar that looks like an ‘inventor’ versus a street-wearing avatar, you’ll actually get more creative ideas while brainstorming.”
Ratan’s own avatar, the one he used to speak with Ryssdal, is called Hiro Protagonist. It’s a reference to the 1992 science fiction novel “Snow Crash,” in which author Neal Stephenson coined the term “metaverse” to describe a virtual 3D world.
Ratan said he has been using this name for about two decades. “I was so inspired early on by these technologies.”
While a 3D Internet that seamlessly blends virtual and digital life is still science fiction in many ways, companies are already hosting virtual concerts, buying virtual real estate, and creating merchandise specifically for the metaverse, which they often call the metaverse.
Ryssdal pointed to similarities to the film adaptation of another sci-fi novel, “Ready Player One,” which is largely set in an immersive virtual reality video game. In terms of technology, Ratan said, “many elements of this vision of the future are likely to be true.”
There’s a lot going on in the world. Through it all, Marketplace is there for you.
You rely on Marketplace to break down world events and tell you how it affects you in a factual and accessible way. We count on your financial support to continue to make this possible.
Your donation today fuels the independent journalism you rely on. For just $5/month, you can help maintain Marketplace so we can keep reporting on the things that matter to you. | <urn:uuid:3ef9a220-40d1-4ef8-963c-b72ee46d4c5c> | CC-MAIN-2022-33 | https://www.amanpk.org/so-what-does-the-metaverse-look-like/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.942167 | 1,525 | 2.484375 | 2 |
Sherburne County is using some America Rescue Plan Act dollars to invest in broadband service for their residents and businesses.
The county is taking applications from service providers to share in a $1.5-million grant to expand broadband to unserved and underserved areas.
Eligible projects must be substantially completed on or before December 31st in 2024.
The effort is to bring reliable, affordable high-speed internet to more Sherburne County households and businesses.
The application can be found on Sherburne County’s website and all applications are due on December 31st this year.
Here’s a little more info on the opportunity from the grant guidelines…
The purpose of the Sherburne County Broadband Access Grant Program is to encourage and facilitate necessary investment in broadband projects designed to provide high- speed, reliable, and affordable broadband service to unserved or underserved households and businesses in Sherburne County. The County may award up to $1,500,000 in grants to service providers for eligible projects that will provide service designed to reliably meet or exceed a symmetrical 100 Mbps download and upload speeds or, where symmetrical 100 Mbps speeds are not practicable, 100 Mbps download and at least 20 Mbps upload speeds, along with other requirements set forth in the American Rescue Plan Act of 2021 (“ARPA”).
The Broadband Access Grant Program will be administered through the County Administrator’s office. | <urn:uuid:e296b698-ddc9-47e0-be2c-f3c9356a4f82> | CC-MAIN-2022-33 | https://blandinonbroadband.org/2021/11/05/opportunity-sherburne-county-looking-for-partners-to-build-better-broadband-with-arpa-grants/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.937579 | 294 | 1.570313 | 2 |
As a student, the chances are high that you will need an extra source of income. Well, the good news is that you can make it an interesting adventure where you work and travel at the same time. Such might seem like a challenge given that you still have academic tasks to accomplish. Continue reading to find out how easy you can study, work, and travel simultaneously.
Consider your work options
There are plenty of job opportunities out there for college students. Once you have identified a job, it is essential to consider its options to ensure that they suit your preferences. For instance, some jobs will require you to travel, hence leaving you with little time to focus on your studies. Such should not prevent you from taking the job because https://resumethatworks.com/ can help write the best-fit resume. If your academic worries are well taken care of, then it becomes easy for a student to focus on other things such as making money.
Make your itinerary
A schedule is one of the most important elements of a student who wants to know how to work while traveling. The schedule would help the student in planning their tasks to ensure that they do not miss on both work and academic deadlines. An itinerary will play a substantial role in balancing your academic, travel, and work goals. You do not want to focus so much on work and travel to the extent that you end up scoring low grades. All that you need to know is the tasks ahead of you. If you know what you are supposed to be doing at a particular time, it will be easy to focus on following such a schedule. You will thus realize how fun it is to travel as a student.
Complete all college tasks
As a college student, you should always remember that your top priority is the achievement of your academic goals. The rest of the activities, such as work and travel, are an addition to your student’s schedule. Therefore, it is necessary to ensure that you have completed all the academic tasks before you decide to travel and work. If you are caught up by plenty of tasks for your work, then you do not have to worry much about your academic needs. You can use the hire the services of the perfect essay and let them take care of your academic goals. As a result, you will be able to focus more on your job and travel.
Make a List of All Holidays
Regarding how to travel in college, the holidays are the best time to do it. During this time, students have few academic tasks to worry about and, therefore, have plenty of time to plan trips. Therefore, the best thing to do is make a list of all holidays to make it easy for you to plans your work and travel schedule. Having an upcoming trip will motivate you to complete both your academic and work tasks. Therefore, if you are wondering about how to work and travel, then the holidays are the best time for you to travel.
Keep the Weekends for Bigger Trips
During the weekends, most students have fewer academic tasks to worry about. Therefore, this makes it the best time for them to travel. However, lecturers ensure to give them tasks that they can work on from home. Such tasks could be overwhelming hence limiting the chances of the student to travel. The good news is that such assignments should not be a worry. A student can seek help from essay writing help and have the experts handle their academic needs. Therefore, if the only thing left to worry about over the weekends has been taken care of, then why not plan that big trip. You will be amazed by how much the trip will help you relax your mind be able to concentrate in class.
Move around in Multiple Locations
Traveling to the same destination over and over again can be boring. Therefore, if you intend to be working while traveling, it is best to take advantage of such an opportunity to move around in various locations. After a few months of traveling, you will be surprised by how much you have been able to visit many destinations. All you need to do is make a list of areas that you wish to visit and focus on accomplishing your mission.
If your traveling is one of your hobbies, then it is high time you made the best out of it. All that you need to do is set your academic and work priorities right. You will be amazed at how easy it is to earn an income as you travel and still be able to score high grades. All that you need to do is apply the above tips, and college life will become more interesting than you could have imagined. | <urn:uuid:0f373888-65bf-4205-be7f-9e19c78c5ffb> | CC-MAIN-2022-33 | https://streetbounty.com/tips-for-work-travel-for-students/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.971882 | 932 | 2.078125 | 2 |
Looking for more and better sex? If you're a man, you might consider doing the dishes once in a while.
A new study out of the University of Alberta reveals that couples enjoyed more frequent and satisfying sex for both partners when men made a fair contribution to housework. The same study also found there's no relationship between the amount of housework male partners completed and the sexual functioning of a couple.
The new study contradicts a widely reported 2012 US study entitled Egalitarianism, Housework, and Sexual Frequency in Marriage (Kornrich et al. 2012) that stated that when men perform what is regarded traditionally as female housework, things like doing the dishes, cooking and laundry, the couple had less sex.
"(That study) didn't ring true," said Dr. Matt Johnson, a family ecology professor in the Department of Human Ecology at the University of Alberta. "It didn't fit with my intuition and background experiences as a couple's therapist."
Johnson poured over data from a five-year study of 1,338 German couples to see if the amount of housework the male partner did was a predictor of a couple's sex life. He didn't find any connection. He also looked men's perception of whether they made a fair contribution to housework, and how that was related to their sex life.
"In any relationship, the amount of housework is going to mean something different based on the couple's context, based on their own expectations for what each partner should be doing, and their comparison levels of what happens with other couples they know," Johnson explained.
He found that when men perceived their contributions to the division of labour as fair, the couple engaged in more frequent sex and both male and female partners were more satisfied with their sex life.
Johnson acknowledged there are cultural differences between Germany and the US and explained that Germany tends to have more traditional gender roles than the US. And men, on average, tend to do less housework there, based on some studies, than in North America.
"There are cultural differences but if the logic held from the prior studies, we would have expected to have a more pronounced negative impact of housework on sexuality in Germany because it's a bit more traditional. But that wasn't the case at all," said Johnson.
He added that the findings are important for couples seeking to maintain sexual intimacy while balancing the demands of daily life.
"Rather than avoiding chores in the hopes of having more sex, as prior research would imply, men are likely to experience more frequent and satisfying passion for both partners between the sheets when they simply do their fair share."
The paper, entitled Skip the Dishes? Not so Fast! Sex and Housework Revisited, has been published in online first format and will appear in print in a future issue of the Journal of Family Psychology. Link to: http://psycnet.apa.org/psycinfo/2015-46448-001/
For more information, please contact
Dr. Matt Johnson | <urn:uuid:4aea956e-e002-4516-98b8-ad5b753d069d> | CC-MAIN-2022-33 | https://scienmag.com/new-study-suggests-fair-division-of-chores-leads-to-better-sex-life/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.972381 | 625 | 2.28125 | 2 |
Divorce and a New Life
Upon the pronouncement of divorce by the Maltese Courts, every person has a right to remarry and to start a new life with another partner. Hence, divorce and a new chapter in life seem to follow each other. However, this remarriage can have repercussions in the sense that if the spouse used to receive maintenance from the other spouse, such maintenance will stop upon remarriage of the spouse who was receiving such maintenance. One is to note that upon separation in accordance to Maltese Law spouses still owe each other fidelity to one the spouse who is receiving maintenance engages in a relationship with another person s/he forfeit his/her right to maintenance from the other spouse. Moreover, the spouses will continue to enjoy the joint and legal custody of their children and divorce and a new life of the spouses when one or both of the spouses remarry do not change that. Hence, although divorce implies the start of a new life, both parents continue to have the obligation of maintenance towards their children until the age of twenty three years old in the case of those children who are furthering with their education while until the age of eighteen years old in the case of those children who stop from furthering with their education. Each case has to be seen in its own merits.
Divorce and the State
When one says that upon the pronouncement of divorce and then one one can remarry, this means that one can only remarry by virtue of the civil marriage. Hence, divorce and the State can be considered as one thing while the Church and its annulment proceedings have to be considered as another totally different thing. Indeed, divorce is only pronounced by the State which can be resorted to by any of the spouses, both if they are already separated by a pronouncement or judgment and even if they are still not yet separated. The only important condition that needs to be satisfied for the Maltese courts to accept a Malta divorce application is that the spouses have lived apart for four(4) years out of the preceding five years from the date of application for divorce and then there has to be no probability of reconciliation of the applicants.
Hence, a person has to make a distinction between the civil marriage and the church marriage. The State offers a person to resort to either separation proceedings, to divorce proceedings or even to annulment proceedings. However, a distinction shall be drawn between the three (3) types of proceedings, themselves since they have different implications. Divorce and then the implication that a person has an absolute right to remarry, mean that one will lose any maintenance that is person receiving from the other spouse, annulment also means that the spouses can remarry since the first marriage is declared as non existent and none of the spouses can ask for maintenance from the other spouse since such marriage is declared non existent while separation means that the spouses can stop cohabiting together but cannot remarry and maintenance can be asked by any of the spouses from the other spouse. The Courts will take into consideration the means of both spouses to come to a decision if there is the need to provide for maintenance by any of the spouses to the other spouse or otherwise.
Annulment can be pronounced by the State on the grounds as indicated in the Marriage Act. The said Act provides for an exhaustive list from which the Maltese Courts decide if there is the possibility for an annulment decision or otherwise.
On the other hand, separation is only pronounced by the Court if one of the following four (4) cases arises, which are:
2. excesses, cruelty, threats or grievous injury
3. desertion (but four years have to pass from the date of marriage to be cited by any spouse)
4. irreconcilable characters (five years have to pass from the date of marriage to be cited by any of the spouses)
Hence, two important distinctions seem to arise between divorce, annulment and separation being:
Nonetheless, a common characteristic between these different types of pronouncements is that maintenance for children is always granted by both spouses even if any of the spouses remarries and even if the marriage is declared null.
Divorce and the Church
The universal acceptable thinking is that a person can only celebrate a Church marriage once in his or her entire life, unless such marriage is pronounced annulled by the Ecclesiastical Tribunals but such annulment procedure can take time. However, if a person wishes to resort to such annulment, he can do so but one has to bear in mind that such annulment is only given in specific cases mentioned in the Canon Law, with the Ecclesiastical Tribunal having full discretion to decide to approve such annulment or otherwise. Nevertheless, for a lawyer in Malta to represent a person in such Tribunal, he or she must be qualified to do so.
A rather significant point to make is the distinction between the State annulment and the Church annulment where although a person might be able to obtain the annulment of the State, this in no way will guarantee the same person the annulment pronounced by the Ecclesiastical Tribunal. Thus, it might be the situation where a person’s marriage might be declared null for the State but not for the Church. This leads to the issue that annulment pronounced by the Maltese Courts will in no way give a person the right to remarry in Church. One cannot institute parallel cases both in the in Ecclesiastical Tribunal and before the Courts of Malta. | <urn:uuid:227fd250-bf89-4a9d-9999-49164e472b50> | CC-MAIN-2022-33 | https://www.maltadivorce.com/divorce-and-then/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.964399 | 1,137 | 1.953125 | 2 |
El Salvador’s Volcano Bond Will be Issued by a Tiny State-Owned Energy Company, Not the Government
Why is nobody talking about this game-changer?
I wrote about El Salvador’s upcoming bitcoin-backed ‘volcano bond’ sale a few times before. Basically, I argued that it doesn’t make much sense. Using half of the billion-dollar issuance to buy bitcoin is risky and the country can’t afford new infrastructure for the half-baked bitcoin city when on the verge of insolvency. Also, the volcano bond will be governed by El Salvador law, not New York law, which is concerning given that President Bukele just packed his country’s supreme court. Lastly, bond funds and pensioners might be interested in a plain vanilla bond, and speculators might be interested in the bitcoin ‘dividend’ (effectively call options on BTC), but there’s little obvious overlap between the two groups.
In any case, Bukele is selling to crypto diehards on the Bitfinex exchange, not to Wall Street, so his bet is that none of this matters. I also joked that Bukele could use the volcano bond and crypto in general to engineer a huge market selloff and re-purchase the country’s vanilla bonds for cents on the dollar, wiping out up to 10% of GDP in debt.
The volcano bond is supposed to be issued this week (although it could be pushed back due to market conditions). In anticipation, the FT ran a piece with incredible new information. Apparently, the volcano bond won’t be issued by the government of El Salvador but “by state thermal energy company La Geo” instead. This raises important questions we need to talk about (!!!), starting with –>
What is LaGeo?
It’s a tiny energy generator. According to their website, LaGeo produces 204MW or about 22% of El Salvador’s electricity with geo-thermal plants. El Salvador has just 6.5 million people, and it consumes about as much electricity as India on a per-capita basis, so the company doesn't do a lot of generation.
According to the 2021 financial statements, its revenues were $136 million last year and it booked a profit of $36 million. LaGeo has $773 million in assets, but around half are (illiquid) long-term loans to electricity distributors in El Salvador. Only $257 million are tangible assets, mostly the Ahuachapán plant near the border with Guatemala (founded 1975, 95MW) and the Berlin plant in the east (founded 1992, 105MW).
LaGeo also has $200 million in long-term debt outstanding from a 2014 deal where they securitized and sold part of their future cashflow. LaGeo isn’t rated by Moody’s or S&P, but local rating agency Zumma says in their June 2021 report that the company had to defer principal and interest payments for 24 and 6 months respectively because of COVID.
Given these numbers –>
Can LaGeo repay a billion-dollar bond?
Basically, the volcano bonds will generate $65 million in annual interest payments (6.5% coupon x $1 billion), which is about half of LaGeo’s total revenue. The company’s annual interest expenses would jump from $15 million per year to $80 million per year (+430%), turning its healthy profit of around $35 million into a loss of $30 million. LaGeo’s long-term debt would also rise from $200 million to $1.2 billion (+500%).
The company just doesn’t have the size or cashflow – like even remotely – to pay the interest on the volcano bond, never mind the principal in ten years. So the plan must be … for LaGeo to get transfers from the central government every year to fund Volcano bond interest payments (?).
In that case –>
Why is LaGeo issuing the volcano bond instead of El Salvador’s government?
Maybe it makes sense on some conceptual level? LaGeo does produce geo-thermal energy, and the marketing for the bond is all about extracting energy from volcanoes to power bitcoin mining, so there’s a link? ¯\_(ツ)_/¯. Jokes aside, there are more realistic explanations.
First, if LaGeo issues the Volcano bond, El Salvador can default on the rest of the sovereign debt without hurting Volcano bondholders. As I wrote recently, Bukele’s ability to pay the country’s $7.7 billion dollars in bond debt in the short and medium run is an open question. Increasingly, Bukele’s willingness to pay is also in doubt. If Bukele stops paying traditional bondholders, he can continue paying the crypto bondholders through LaGeo and crucially, he can continue tapping the crypto community for further financing.
Second, if LaGeo issues the Volcano bond, it’s really easy for El Salvador to just walk away with the money in what would be the first (quasi-) sovereign “rug pull” in crypto. Why? Because if LaGeo goes broke or disappears, then as a bondholder, you would have little recourse, no good ways to recover your investment. You could sue LaGeo in El Salvador and push for a bankruptcy proceeding or debt restructuring, but it would be led by god knows what court and judge, and would get cents on the dollar, if anything. Having LaGeo issue the Volcano bond makes a rug pull even easier.
Anyways, enough speculation. What does the bond prospectus – the document with all the key legal and financial information – say about all this? –>
There is no prospectus? The bond is supposed to be issued this week but I can’t find any official documentation anywhere. LaGeo’s website, LaGeo’s page on El Salvador’s securities exchange, bitfinex’s webpage and blockstream’s website don’t have any documents.
None of the press articles I have linked here or read mention any official documents. We still only have the absurd pictures of Bukele standing in front of a powerpoint slide in a leather jacket from last November and scattered statements from government spokespeople and bankers.
Ladies and gentlemen –>
Welcome to the future of finance
Crypto commentary on reputable sites like CoinDesk sometimes describe the Volcano as “the most truly disruptive and empowering part” of El Salvador’s adoption of bitcoin, which is “the most transformational cryptocurrency landmark in a year full of them.”
“By selling bitcoin-backed bonds through blockchain infrastructure” this CoinDesk author writes, “El Salvador will bypass the Wall Street banks and international institutions that have had a century-long choke hold on loans to developing economies.”
That sounds great, but I still have questions. What infrastructure does bitcoin city need and how will it generate revenue for LaGeo to repay the debt? What happens if LaGeo misses debt repayments? Isn’t this self-described ‘bond’ a security that should be subject to regulation in virtually all jurisdictions, including the U.S.? If Americans are banned from using bitfinex, will there be enough buyers when the volcano bond is issued? Who has the keys to the $500 million bitcoin wallet? What happens if it gets hacked, is there insurance? Is interest payable in USD, USDT or bitcoin? What’s the formula for the bitcoin dividend?
There aren’t words on PDFs that answer these basic questions, not yet, perhaps not ever. Instead, we are expected to be hyped about this ‘historic opportunity’ even though the legal framework that will govern the instrument still hasn’t gone through El Salvador’s congress and no draft versions of the laws have been made public. We are supposed to be pumped even though we learned the weekend before the issuance that a small state-owned enterprise you’ve never heard of will sell the bond rather than the government, as was widely expected.
And we’re supposed to believe that this is better than the traditional financial system? It’s a joke…
(If you enjoyed this post, please consider subscribing. It’s free! I publish researched, thoughtful content on finance, crypto, economics or policy once a week. You can also follow me on twitter). | <urn:uuid:2ec7089b-d0c6-4a04-bcc1-5f6415d0b6a3> | CC-MAIN-2022-33 | https://frankmuci.substack.com/p/el-salvadors-volcano-bond-will-be?utm_source=substack&utm_medium=email&utm_content=share&action=share | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.938088 | 1,804 | 1.796875 | 2 |
Dead skin cells and oil that have clogged hair follicles on the skins surface can cause active acne.
Acne can include blackheads, whiteheads and more serious conditions such as cysts and deep rooted pimples. Active acne requires prescribed medicated creams and skin hygiene treatment programmes.
How is Acne treated?
The skin's surface layer is gently cleansed for removal of bacteria, dead skin cells and oils - in addition to any required medical topical treatment. Recommended treatments for best results include combination therapy of medicated skincare, peels, hydradermabrasion and laser skin rejuvenation.
What can you do at home to help prevent Acne?
You can firstly always protect your skin by using a SPF30 - SPF50 broad spectrum coverage sunscreen. To help prevent a build up of dead skin cells and bacteria, gentle cleansing exfoliators can be effective in keeping skin cleansed and hygienic. If you enter a treatment programme, our experienced clinical practitioners can also recommend medical grade skincare to help achieve desired results. All products can be purchased in clinic or ordered directly with The Face by SK. | <urn:uuid:53d2e196-5534-499d-af58-3dc4c04e388b> | CC-MAIN-2022-33 | https://www.thefacebysk.co.uk/conditions/acne | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.913672 | 238 | 2.078125 | 2 |
The painting depicts a scene that's familiar to all who travel up Boonton's curving Main Street. The red brick, wedge-shaped, "flatiron" building that dominates the center of the picture is something you'll see driving through the business district of this Morris County town, as are the bay windows of the buildings to the left where Plane Street angles off to one side, or the three-story structure in brownish brick to the right that over the years has held antiques stores, a bakery and other shops.
But a closer inspection reveals a Boonton that's no longer there. A high-rise apartment building would now dominate the view up Plane Street from the spot depicted in the painting. The Victorian era Methodist church visible in the background, as well as the stores next to it, were razed in the 1970s for a new post office. And Main Street itself is shown paved in red brick, with trolley tracks running down the center.
The painting harkens back to the 1930s when three friends were growing up in this town perched on a hill above the Rockaway River. And it also speaks to the friendship that still endures between the three octogenarians — one who painted the scene, and the other two who continue to encourage his creativity.
The image is on the cover of The Artistry of Bob Bogue, a book containing 38 of Bogue's paintings of scenes around the Town of Boonton and Boonton Township, as well as commentary and reminiscences by A. Lloyd Charlton, who compiled and published the collection. Bogue, Charlton and Don Estler grew up on the same block of Schultz Street (later renamed West Main Street) in Boonton, and shared memories of attending local schools, going to the movies, and stopping at The Kozy Korner ice-cream shop. After high school, Bogue studied for two years at the Commercial Illustration Studio in New York City, where he honed a talent he used in his career in advertising. He also continued to paint as a hobby.
Bogue and his family moved to North Carolina in 1972, and about twenty years ago, he sent prints of two of his paintings to Charlton. One was the view of lower Main Street as he remembered it from their shared youth. The other, of Boonton's First Presbyterian Church, was for Charlton's mother, who was 90 at the time. In 2000, Charlton contacted Bogue and asked him to paint depictions of the home on Schultz Street where he grew up, and the Cornelia Street home where he has lived since 1963. "Since Bob had fond memories of his childhood in Boonton and his married life in Boonton Township, he was willing to get out the paint brushes and do more than 15 new paintings," Charlton remembers.
Some were of homes and other scenes Bogue recalled from his years in the area. There's the movie theater—originally built for vaudeville in 1919—and the stone arch bridge over the Rockaway River, both of which still stand today. Another was of the Kozy Korner, replaced years ago by a gas station. Others were of local scenes that predate Bogue, Charlton and Estler, and are painted from old photographs and postcards. Several depict the Morris Canal, another is of the ironworks that owed its prosperity to the canal.
In 2007, Charlton and Estler, both members of the Boonton Historical Society, decided to assemble an exhibit of Bogue's paintings to display in the society's museum. And last year, Charlton and his wife, Terry, compiled the paintings into a book, which is available on Amazon.com and at the historical society museum, located at 210 Main Street and open 1-4 p.m. each Saturday. | <urn:uuid:b3ad90e6-f482-47eb-8fd7-754178f8d745> | CC-MAIN-2022-33 | https://www.njskylands.com/cl_artist_bogue_093 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.982407 | 786 | 1.890625 | 2 |
Navigating the world of natural skincare isn’t easy, and discovering which ingredients are natural is not always very straightforward. However, worry not, as we’re here to help. Do not be fooled by too-sciencey names, as the name of an ingredient has nothing to do with its origin and safety. Even some hard to pronounce ingredients are totally natural and, as all ingredients used in European formulas, totally safe to use.
Natural exfoliation? Bring it on
If you’re a fan of exfoliation, there are some good news for you, as almost all of the main acids are of natural origin. Glycolic acid, for example, is found in sugar cane, while malic acid was first isolated from–get ready–apple juice. Even salicylic acid can be found in the bark of white willow (Salix alba) trees.
Additionally, there are some other game-changers such as bromelain (from pineapple) and papain (from papaya) which produce a light exfoliation. Even heard of exfoliating enzymes? That is just exactly what they are.
Natural antiaging? We’ve got you covered!
Similarly, if you’re looking for anti-aging solutions from the natural world, we can tell you a bit about some of the best. For example, the world-renowned retinol alternative bakuchiol is derived from a plant–but it is far from being the only one. A few of the best antioxidants out there, such as vitamin C (we know, this one isn’t unexpected), ferulic acid, and phloretin are all natural.
Oh, and did you know that Coenzyme Q10 is also natural? This anti-aging superstar occurs naturally in the human body, but it’s also available in many of the foods we eat. As you can see, there is no excuse for not choosing the best anti-aging, even if you’re going all-natural with your skincare routine.
Last, but not least, we have squalane, which can be found in olives, rice and sugar cane. While squalane isn’t an anti-aging active, per se, it is one of the best moisturizers in the market. Given that keeping the skin’s moisture barrier intact is one of the first steps to keep it looking young, we totally had to mention it.
& some ingredients that can be natural, but not always
There are some ingredients, however, that might have different origins. Both hyaluronic acid and glycerin can be of natural origin or derived from synthetic procedures. However, considering that these two are some of the best ingredients ever for the skin, we think they’re worth checking out. Keep in mind that you will not find this information on the ingredient list, but a quick read-through the product’s description should be able to tell you if an active is of natural origin.
To make your life easier, we’ve selected a few products with all-natural hyaluronic acid and glycerin below:
If you’d like to explore some more natural options for your skincare routine, check out our selection of natural products, and make sure to use the filters to navigate through them in order to discover your next favorite product. We’re sure you’ll find something to your taste! ?
Head of Content at Care to Beauty | <urn:uuid:1308ac33-fc56-4341-bc76-2a1734913ea0> | CC-MAIN-2022-33 | https://blog.caretobeauty.com/best-natural-ingredients-skincare/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.951382 | 734 | 1.859375 | 2 |
The Dynamics of the medical industry have changed enormously concerning the onset of the coronavirus pandemic. The top nations barely survive healthcare and medical supply store issues. Consequently, there is a dire need for healthcare facilities around the globe.
In the twenty-first century, medical public health infrastructure must be revamped.
So, what is public health?
The coronavirus pandemic has ushered in a chance to rethink America’s public health infrastructure. The pandemic revealed significant flaws in disease surveillance, early warning systems and real-time data collection.
In addition, there are notable gaps in racial and ethnic data collection. Information related to testing, contact tracing, and vaccine availability is unclear.
In addition, there were numerous coordination issues between federal and state agencies and other critical stakeholders in the pandemic response.
The medical public health communication system had a difficult time dealing with an infodemic of misinformation surrounding the pandemic like:
- The federal and state government’s inability to quickly and effectively leverage digital solutions caused or exacerbated many of these issues.
- Traditional disciplinary barriers separating engineers from public health and other professionals have shown to be substantial roadblocks to implementing cutting-edge, life-saving technology.
- As a result, our best defence against the coronavirus remained outdated when it first emerged: social distancing, masking, and excellent cleanliness, all of which were utilized to combat the Spanish flu epidemic in 1918.
While these public health strategies continue to be beneficial, the new and powerful instruments of the digital era were not being used efficiently or innovatively during the pandemic.
Consider long lines online to find a vaccine in your area, or use one-size-fits-all cotton masks that aren’t certified for virus particle filtering efficiently. However, the medical supply store will have all the necessary materials.
Convening a group of superior technology, public health, medical supply stores, and design experts to jointly study the establishment of a new field of public health technology would be a significant step forward. Together, they may build a blueprint for the architecture and prerequisites in dire need to establish certificates, degree programs, schools, new integrated pedagogies and curriculums that mix their separate specialities.
These new programs might start in engineering, the medical public health sector, and other related professional schools. This new field must prioritize diversity, equity, inclusion, and accessibility.
This profession could capitalize on the rise in interest from technology experts looking to apply their abilities to the pandemic’s plethora of medical public health concerns. We’re starting to realize how successful wastewater monitoring technology can be in detecting not only diseases like SARS-CoV-2 but also chemicals like opiates, which have become epidemic in some communities.
Why is healthcare so expensive?
Various low-cost, open-source technologies have been created for a pandemic response, such as at-home saliva-based diagnostic tests and pulse-dose oxygen-saving devices. To improve the efficacy of science communication efforts, data analytics is being used.
These and other promising new collaborations between technologists and public health professionals could result in significant advancements in disease surveillance, forecasting, contact tracing, medication, vaccine development, and advanced materials for personal protective equipment.
There is currently a 20-year life expectancy differential in communities across America based on your zip code. We hope this is just the beginning – these new partnerships can serve as an example of how public health and technology specialists can collaborate to address our current problems and future health risks. This showcases the understanding of what public health is.
Ultimately, one of the main goals is to encourage a new generation of multidisciplinary innovators to use their unique abilities to develop the 21st-century medical public health infrastructure.
There is a dire need for enormous investment and innovation from the public and private sectors to revamp this infrastructure.
Why is healthcare so expensive? We believe that establishing a new field of public health technology will hasten this process. Providing a new generation of leaders with the multidisciplinary skills to build an integrated public health system. This will help in responding quickly and seamlessly to the health challenges that communities face.
In developing nations, there is a constant struggle to fulfil basic needs. The government needs to build an advanced healthcare infrastructure to provide medical public health benefits. This is impossible with fewer resources available, and the population suffers immensely.
Healthcare is so expensive because there is a shortage of healthcare technologies, hospitals, and professionals to assist humanity. In this 21st century, there is an utmost need for medical assurance for better living and health benefits. | <urn:uuid:08b54a8a-8813-476c-ad21-3fc1d11dae96> | CC-MAIN-2022-33 | https://blog.cheapmedicineshop.com/a-possible-change-in-medical-public-health-infrastructure/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.936461 | 1,083 | 2.984375 | 3 |
Was andere dazu sagen - Rezension schreiben
Es wurden keine Rezensionen gefunden.
Andere Ausgaben - Alle anzeigen
action Apostles appear baptism baptized beauty become believe body called cause character Christ Christian Church constitution course covenant danger desire divine doctrine duty effect efforts evidence evil excitement existence express fact faith feel friends give gospel grace hand heart heaven holy hope human important influence institutions interest labour language learning less letters light live Lord manner means mind ministers moral nature never object operations opinion original persons piety practice present principles produce profession question reason received Reform regard relation religion religious remark respect result Sabbath seems sense society soon soul speak spirit suppose things thought tion true truth United whole wish writers
Seite 520 - Also the sons of the stranger, that join themselves to the LORD, to serve him, and to love the name of the LORD, to be his servants, every one that keepeth the sabbath from polluting it, and taketh hold of my covenant; even them will I bring to my holy mountain, and make them joyful in my house of prayer...
Seite 556 - The diseased have ye not strengthened, neither have ye healed that which was sick, neither have ye bound up that which was broken, neither have ye brought again that which was driven away, neither have ye sought that which was lost; but with force and with cruelty have ye ruled them.
Seite 228 - Methinks I see in my mind a noble and puissant nation rousing herself like a strong man after sleep, and shaking her invincible locks: methinks I see her as an eagle mewing her mighty youth, and kindling her undazzled eyes at the full mid-day beam...
Seite 520 - If thou turn away thy foot from the sabbath, From doing thy pleasure on my holy day ; And call the sabbath a delight, The holy of the Lord, honourable; And shalt honour him, not doing thine own ways, Nor finding thine own pleasure, nor speaking thine own words: Then shalt thou delight thyself in the Lord...
Seite 52 - The old man told him that he worshipped the fire only, and acknowledged no other God ; at which answer Abraham grew so zealously angry, that he thrust the old man out of his tent, and exposed him to all the evils of the night and an unguarded condition. When the old man was gone, God called to Abraham, and asked him •where the stranger was : he replied, ' I thrust him away, because he did not worship thee.
Seite 377 - ... renounce the devil and all his works, and constantly believe God's holy word, and obediently keep his commandments. I demand therefore, DOST thou, in the name of this child, renounce the devil and all his works, the vain pomp and glory of the world, with all covetous desires of the same, and the carnal desires of the flesh, so that thou wilt not follow nor be led by them ? Answ.
Seite 409 - But ye are not in the flesh, but in the Spirit, if so be that the Spirit of God dwell in you. Now, if any man have not the Spirit of Christ, he is none of His.
Seite 508 - Let no man therefore judge you in meat, or in drink, or in respect of an holy day, or of the new moon, or of the sabbath days : which are a shadow of things to come ; but the body is of Christ.
Seite 52 - And when Abraham saw that the man blessed not God, he said unto him, Wherefore dost thou not worship the most high God, creator of heaven and earth ? 7. | <urn:uuid:0d614fd3-06e5-4cbc-86c6-929854770a7f> | CC-MAIN-2022-33 | https://books.google.de/books?id=0A41AAAAMAAJ&dq=editions:OXFORD555020994&hl=de&output=html_text&lr= | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.921386 | 777 | 1.789063 | 2 |
Write-N-Cite 4 Installation Troubleshooting If you are having difficulties installing Write-N-Cite 4 on your computer, below are some steps you can try on your own to resolve the problem.
Write-N-Cite version version 4. Working with Write-N-Cite You can get started with Write-N-Cite easily and view the formatting of your in-text citations, footnotes and bibliography — all while you are writing your paper.
The first time you launch Write-N-Cite, you must be connected to the internet in order to log in to your RefWorks library and sync it with Write-N-Cite. In most cases, there is no need to log out of Write-N-Cite when you are not using it.
If you are using Write-N-Cite on a public computer without a personal login, you should log out of Write-N-Cite when you complete your work.
Click RefWorks from the Microsoft Word ribbon. Click "Flow" and then enter your email address and Flow password and click "Login". This may take a few seconds. It is downloading your references and collections.
Any time you make changes to your RefWorks items you can click Sync my Database your new and edited items will be added to Write-N-Cite. Selecting Your Output Style The first thing you will want to do is select an output style for your document.
Any in-text citations or footnotes and your bibliography will be displayed in your document while you write your paper — in the output style you have selected. You can always change the style later if you need to.
Click the Style drop down. Click on the style name. You can change your output style and the formatting of your paper at any time by clicking on another Style in the list and selecting a new output style. Access to other Styles can be gained by using Select Other Style at the bottom of the list.
You may want to sync your RefWorks library with Write-N-Cite if you have recently added items you want to use in your paper. Click the Sync my database icon to download new or updated items.
When you are ready to insert an in-text citation or footnote into your paper: If you have previously used Write-N-Cite, you may see some recently selected citations listed above the Insert New option. You can select citations displayed from this list or access all your references from the Insert New option.
The Search box will search every field. Use the horizontal scroll bar to see the full title. Right-click on the item and select Show Full Reference Detail to display all fields of information file attachments are not displayed.
Click on the item you wish to insert into your paper. You will see a preview of the formatted citation in your current Output Style. Add more references to the citation using the plus icon, remove them by using the minus icon, or reorder the references with the up and down arrows in the Compose Citation area.
Click OK to insert your formatted citation into your paper.
To insert a footnote instead of an in-text citation, click the Make Footnote checkbox in the Edit References area.Proper citation aids the reader in locating and reviewing the sources you consulted so that your work can be validated and built upon--all part of the scientific process.
Following are four simple (and easily avoidable) common APA citation errors, along with a quick review of . COMMON FORMAT PROBLEMS WITH MLA CITATION Q: How Do I Punctuate Titles?
A: It Depends Upon What Title You Refer To. What Are Common Formatting Tasks Students Forget About? A: Nearly All of Them. In regular prose writing--such as in novels, short stories, or scholarly articles--no slashes should appear. No slashes are necessary when using. Write-N-Cite 4 Installation Troubleshooting If you are having difficulties installing Write-N-Cite 4 on your computer, below are some steps you can try on your own to resolve the problem.
Please contact RefWorks Technical Support ([email protected]) if you need further assistance. If the group code is not used you will need to login to your account and go to Tools, Write-N-Cite and copy the Write-N-Cite 4 login code posted there.
Pasting this code into the Login Code text box provided in Write-N-Cite 4 will link it directly to your account without using your Institution’s group code. Get Your FixGrammarly scans your text for common and complex grammatical mistakes.
Get Your FixGrammarly scans your text for common and complex grammatical mistakes, initiativeblog.com has been visited by K+ users in the past month. | <urn:uuid:414ad392-39b1-4e6c-a76d-5ec4b51dd664> | CC-MAIN-2022-33 | https://lizotui.initiativeblog.com/write-and-cite-errors-30493da.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.86078 | 994 | 2.09375 | 2 |
An independent investigation into the deaths of seven prisoners concludes that Vermont Department of Corrections (VDOC) policies were partly to blame for some of the deaths. The deaths occurred between November 25, 2002, and October 7, 2003. After the suicide death of PLN contributing writer James Quigley, the Vermont Agency of Human Services retained Michael Marks, a Vermont lawyer, and Philip McLaughlin, a former New Hampshire attorney general, to address the issues those deaths appeared to implicate. Those issues included the provision of medical service, mental health service, and the grievance process.
The VDOC can accommodate up to 1,000 prisoners, but is expected to reach 1,900 in the next three years. Some 500 Vermont prisoners are currently housed in a Corrections Corporation of America prison in Kentucky. The report found the VDOC system is rife with communication problems and is under "tremendous stress" from budget cuts and the increased population. The report examined in great depth the circumstances of each prisoner's death and the conclusions to be drawn from those facts. Recommendations for change were included for administrative and legislative action.
The bulk of the investigative report addressed the events that preceded the suicide death of PLN contributing writer James Quigley. On February 11, 2001, after serving 21 years on a life sentence, Quigley was transferred, via Interstate Prisoner Compact, from a Florida prison to Vermont. That transfer was part of the terms of a settlement in a lawsuit against officials of the Florida Department of Corrections, alleging retaliation against Quigley, and law clerks in general, for filing grievances and lawsuits.
That transfer did not extinguish Quigley's activist spirit, for between September 13, 2001, and his departure from NSCF on July 17, 2003, he filed 36 grievances. His vote against Superintendent Kathy Lanman's proposal to buy flowers with canteen proceeds resulted in Quigley's removal from the "inmate recreation committee" in June 2003.
On June 10, 2003, Quigley had a parole hearing with the Florida Parole Commission, who established parole would not be considered for another ten years. Simultaneously, NSCF's Deputy Superintendent received information from an informant that Quigley had a "back-up plan" to parole. Quigley was promptly placed in administrative segregation as an escape risk. Five days later, the Deputy searched Quigley's property and found maps of all Vermont counties, which were cut from a local newspaper. Also found were Florida maps the Deputy learned Quigley received a year earlier. While those maps were not problematic then, they now constituted support for the "back-up plan."
The Deputy recommended Quigley be put in SMU on open status. The compassion Lanman showed for the dying George Sumner [discussed below] did not extend to "a pain in the butt" who "likes to write tons of grievances over petty issues." Lanman disapproved the recommendation, ordering the "legal paper pusher" Quigley to continue in ad seg until review in 15 days. Lanman then took action to have the VDOC send Quigley back to Florida.
Quigley appealed the ad seg decision. The appeal officer, John Murphy, concluded the hearing record was inadequate to support that there was an escape risk because there was improper reliance on a confidential informant and consideration of material outside the record. On July 1, however, a new hearing officer again concluded Quigley was an escape risk.
While an appeal of that decision was pending, Murphy suggested to Lanman that Quigley be transferred to the St. Albans Facility, which is VDOC's most secure prison, because he was considered an escape risk and he had significant grievances with Lanman.
Under VDOC policy, ad seg decisions are to be reviewed every 15 days, and if there is no evidence to support segregation, the prisoner is to be returned to his previous status. On July 17, 2003, Quigley received such a review, which stated: "Facility has no new evidence to present. Recommended remove from ad seg status," Lanman approved that recommendation, but she overrode Quigley's status to close custody, and approved a transfer to St. Albans. Normally, transfers must be approved by VDOC's Director of Classification. No such approval was received here.
Upon arrival at St. Albans, Quigley was placed on D-Wing. Prisoners in D-Wing occupy solitary cells and they do not have access to standard items such as dental floss or standard tooth brushes. Quigley did not have access to standard writing implements with his full legal file even though he had a pending post-conviction relief motion. He was also denied access to outside recreation or exercise.
Quigley described D-Wing conditions as "the worse I've ever seen." With 40 degree temperatures, his cell window would not close. Quigley wrote his mother, Claire Quigley, and said, "There is nothing to do but retreat under the covers and tremble because they won't provide us adequate clothing or allow us to have our own."
VDOC policy directs that Quigley's classification, Close Management Level I, was designed to be a short term of 30 days in duration. Quigley was on D-Wing for 82 days. During that period his regular descriptions were: "quiet" and "no issues."
When a close management prisoner demonstrates progress and movement towards self-risk management, he is to be placed on a "movement list," in order of priority, for removal from D-Wing. Despite receiving no disciplinary actions and being "quiet," Quigley was never placed on the movement list. Instead, the D-wing management team had an understanding that "Quigley would stay in D-wing until a transfer to Florida" and "He would stay there indefinitely regardless of his good behavior."
On September 11, John Murphy met with Quigley regarding the accumulation of appeals questioning his D-wing placement and the confinement conditions. After Murphy expressed to his supervisor that it was credible Quigley's placement was retaliatory, the supervisor ordered him to look into the reliability of the assertion Quigley was an escape risk.
During that investigation, Murphy was told by NSCF's Deputy Superintendent that, "The only reason that guy [Quigley] is in ad seg is he pissed off the superintendent." Lanman denied she was angry at Quigley. Nonetheless, Murphy concluded there was "more evidence Quigley was retaliated against than he was an escape risk."
Murphy's conclusion was part of an October 6 telephonic conference between various VDOC lawyers and officials and lawyers acting on Quigley's behalf, who agreed Quigley, would be removed from D-wing. This decision was never communicated to Quigley.
In the early morning hours of October 7, Quigley tied a bed sheet to a grate in the ceiling and hanged himself. He died on the 118th day of confinement in administrative segregation or close custody.
The investigative report concluded the system failed in Quigley's case. The initial decision to remove him from open population was justified. A reasonable investigation, such as Murphy conducted in one day, would have disclosed Quigley did not pose an unusual or heightened risk of escape. His confinement to D-wing was not justified. If the system had worked, Quigley would have been removed from D-wing long before his death.
"Distinguishing which individuals were consciously retaliating from those who were indifferent or ineffective would not affect our ultimate conclusion: Vermont's correctional system treated Mr. Quigley differently because he filed grievances and objected to institutional practices. We can discern no good reason for the different treatment," said the report.
Quigley's family has retained counsel and preparing a wrongful death suit against the Vermont DOC as this issue of PLN goes to press. Lanman was removed from the DOC and is now a supervisor with the Morrisville office of the Department of Children and Family Services. Hopefully she shows more care and less vindictiveness dealing with the children of Vermont than she did with its prisoners.
For several years before his death, forty-eight year-old Neil Prentiss had an institutionally well documented history of serious illness, including but not limited to hepatitis B, hepatitis C, peripheral vascular disease and a traumatic brain injury. In October 2002, Prentiss was received from a Virginia prison at VDOC's Chittenden Facility. Between October 14 and 28, Prentiss submitted numerous medical request forms stating he had not received his medications, he was in pain, and urgently needed medical care.
Over that period, guard Douglas Dinsmore noticed Prentiss' condition deteriorating. Acting outside the scope of medical request policy, Dinsmore called the medical department twice in an attempt to procure care for Prentiss. It was not until October 31 that medical staff did more than examine Prentiss and document his symptoms.
By that date, Prentiss had been experiencing for several days abdominal pain, a swollen tense abdomen, diarrhea, and vomiting. Prentiss was transported to a hospital by ambulance. By November 12, he was being considered for a liver transplant and was on life support and a ventilator. Prentiss died on November 23 at the Leahy Clinic in Burlington, Massachussetts.
Because the report's authors are not physicians, they could not conclude if the quality of response to Prentiss' requests was a factor that contributed to his death. They did conclude, however, that the Chittenden medical staff did not act adequately and in a timely manner to Prentiss' requests for health care that expressed urgency and provided detail to support urgency. The investigative report was highly critical of the fact there was no written report from any governmental agency regarding Prentiss' death. "The government owes a duty of candor and transparency to investigate, to report, to accept criticism, to learn, to improve, to move on in the case of all deaths within VDOC."
While trying to regurgitate a bag of drugs a visitor had brought him, Charles Palmer experienced a drug smuggler's worst fear. The bag holding the drugs broke, resulting in the release of drugs into his system. On April 20, 2003, Palmer died of a massive overdose at the Northeast State Correction Facility (NSCF).
Because Palmer's case is the subject of an active criminal investigation, the report detailed few factual findings. The report concluded, nonetheless, that Vermont prisons suffer a problem common to prisons throughout America: The smuggling of drugs.
The report recommended several steps to dissuade persons from engaging in that activity. First, contact visits for prisoners testing positive for drugs should be limited, contact visits should be more closely monitored, and dogs trained to detect drugs should be utilized. Finally, prisoners and visitors caught with drugs should be prosecuted and that fact published.
On January 9, 2002 George Sumner presented to medical staff that he had not been feeling well and had lost twenty pounds over a two month period. Testing diagnosed Sumner with AIDS.
The medical record and interviews with Sumner's family revealed the staff at NSCF was "very attentive to Sumner and provided him not only with medical care, but empathetic and supportive personal attention." As Sumner's condition deteriorated, infirmary staff questioned the suitability of his continued confinement in the infirmary. Options for transfer were considered.
Sumner, aware his condition was terminal, expressed a desire to die among people he perceived as caring for him. His mother confirmed his desire to die at NSCF. Absent the investigative report, acts of kindness extended to Sumner would not have received the recognition they deserved. Superintendent Kathy Lanman occasionally took lunch with Sumner. Five days before his death, Sumner's family visited with him. He requested pizza, and prison staff ordered out for him. Despite an inability to chew or digest, Sumner's mother said he "just smelled the pizza and smiled."
At approximately 5:30 a.m. on February 14, 2003, an infirmary nurse checked Sumner and found he had no vital signs. Emergency resuscitation was begun. When the supervising physician was presented the vital information, he directed cessation of resuscitative efforts, and transport of Sumner to the hospital.
Prior to leaving the prison, as required by VDOC policy on transporting prisoners, Sumner's leg was shackled to the gurney. When Sumner's body arrived at the emergency room of the hospital, the doctor became angry that an obviously dead person had been brought to him. After the doctor refused to accept Sumner's body, he was taken to the funeral home. Sumner's "body remained shackled at the funeral home for several hours and until the accompanying officer was relieved."
While the report concluded infirmary staff provided competent and compassionate care to Sumner, it recommended VDOC's policies on treating terminally ill prisoners be examined for revisement. However, this report asked what the rationale is for shackling and transporting a "patently dead" prisoner to a hospital. Perhaps, that was done to back up staff boasts that, "no one dies in a Vermont prison."
Upon intake into VDOC on November 6, 2002, to begin serving a sentence of one to five years for aggravated assault and petty larceny, Eva LaBounty reported she was depressed, but not suicidal. The next day, LaBounty submitted a request for medical services that she could not sleep and was stressed over just losing custody of her kids. A clinician recommended medication and support.
Upon arrival at the Dale Facility, LaBounty was placed on medication, which increased in quantity as time passed. Between November 2002 and her May 7, 2003, death, LaBounty participated in two weekly group sessions and she worked with substance abuse counselors. By May 1, 2003, LaBounty was receiving daily doses of 250 mg of amitriptyline, 15 mg of buspar, and 300 mg of wellbutrin. The latter two are psychoactive drugs.
Throughout her incarceration, LaBounty expressed experiencing pain and difficulties in dealing with losing her two children, but said she could not harm herself. LaBounty appeared in court on May 5, where her parental rights were terminated. The next day, she met with her case worker. La Bounty said that losing her children was the hardest thing she had ever gone through, and she had to do it without abusing substances.
Around midnight on May 6, LaBounty went to bed. At approximately 5:45 a.m. on May 7, one of her three cellmates could not rouse LaBounty or detect a pulse. Subsequent toxicology reports disclosed LaBounty died of an overdose of amitriptyline, wellbutrin, and methadone. The amitriptyline was in a concentration four times the lethal range. LaBounty also had elevated levels of nortriptyline, diazepam, and desmythldiazepam.
Obviously, the report could not conclude if LaBounty intended suicide or had accidentally overdosed. The report faulted Dale staff for failing to assure prisoners actually consumed their medications when it was known prisoners horded their drugs to use as intoxicants. Additionally, "The Dale staff erred by failing to control access to Ms. LaBounty's room after the discovery of her body. This failure impeded the investigation by the State Police. The investigating officer documented that at least some cleansing of the scene occurred by inmates. There is no way for us to know the full extent of the lost evidence," the report said.
The report concluded Superintendent Rowe was to be commended for trying to discover what went wrong in LaBounty's death and making "responsive, effective changes." The changes included: Guards may no longer dispense medications; they may only be dispensed by nurses, who must physically verify they were consumed. Because amitriptyline is lethal if overdosed, it was removed from the list of approved drugs. All prisoners who have parental rights are automatically placed on mandatory 15 minute checks, and only a mental health professional who has examined the prisoner can discontinue those checks. The report found, further, that the medication level at the Dale Facility is the highest in Vermont. This warrants a systematic audit by a medical expert to determine its appropriateness.
Lawrence Bessette had been in jail on pending assault charges for just over two months when he hanged himself in his cell at NSCF on May 22, 2003. During that period, he had expressed to mental health staff his desire to "string myself up." As a result, Bessette was maintained on a mandatory 15 minute check. By May 14, Bessette's attitude changed because his sentence was not going to be as long as expected. He "report[ed] futuristic thinking, hopeful about release, and spending time with his wife and children." Mental health staff considered Bessette a non-threat to himself and removed him from the mandatory checks.
A telephone call on May 22 made Bessette decide to forfeit his future. He had a lengthy conversation with the mother of his two children, who was also the victim in his assault charge. The woman told Bessette that she was with another man and she would not marry Bessette. When the woman refused to change his mind, Bessette threatened to kill her. He then said he was going to kill himself.
At 3:07 p.m., Bessette returned to his cell. He placed a sign in his window signifying bathroom use. At 3:57, his cellmate found Bessette's body suspended by a belt tied to the bunk bed.
Because of the change in Bessette's behavior, the report did not fault staff for removing him from periodic checks. Staff could not foresee the telephone call or change its affect on Bessette. The report found, however, that there was a delay in transmitting mental health records between facilities that requires immediate attention. That delay had no affect on Bessette's treatment course.
While on furlough status, twenty-five year old Jeremy Garcia died at an appointment in Winoski, Vermont, of an overdose on October 1, 2003. His December, 2002, release plan required, among other things, that he avoid substance abuse. Garcia was unable to do so and he failed twelve drug tests up to his reincarceration in March 2003. At that time, VDOC incarcerated Garcia for 15 days as a sanction for the failed tests.
Subsequently, on May 9, 2003, Garcia was reimprisoned after failing yet another drug test. While in prison he failed several more drug tests. VDOC refused to release him until he entered an approved residential treatment program.
On September 29, 2003, VDOC furloughed Garcia so he could enter the Maple Leaf Farm treatment center. The next day, Garcia called his parole officer and said he felt threatened at the center. He then left Maple Leaf Farm. Sometime on October 1, Garcia died of an overdose of oxycodone.
"Garcia's death depicts the destructive power of drug additional," the report said. State officials used all the tools in their power to dissuade Garcia from using drugs, but not even incarceration prevented him from doing so. The only issue presented for state officials to act on in the matter is the availability of drugs in prison.
The investigative reports authors did a commendable job of establishing the facts and conclusions in an impartial manner. They recommended changes on issues related to these prisoners' deaths.
In the mental health area, there needs to be a quality assessment system to grade the services rendered to prisoners. The grievance procedure should assure a prisoner's complaint is acted upon or rejected in a timely manner. The authors also suggested that the state or VDOC provide more funding for the Prisoner's Rights Office of the Vermont Defender General because it may provide quicker and more reliable adjustment of VDOC errors.
In his last letter, Quigley said, "They're all full of crap. Spin is everything to these prison officials. It's all a front." The report's authors agreed when they lambasted VDOC's written reports into the deaths of Bessette, Quigley, Palmer, and LaBounty. Those reports did not address in depth the circumstances surrounding the deaths, and they provide no basis for assessing or improving VDOC practices. Instead, they emphasize facts that would be favorable to the VDOC in subsequent litigation while ignoring potential errors that warrant correction.
The question that now arises in these prisoners' deaths is now that VDOC's facade has fallen, will administrators and legislators act to correct the problems or will the philistines spin a new front?
A copy of the report is posted on PLN's website at www.prisonlegalnews.org.
Sources: Investigative Report in the Deaths of Seven Vermont Inmates and Related Issues; Brattleboro Reformer; New York Times.
As a digital subscriber to Prison Legal News, you can access full text and downloads for this and other premium content.
Already a subscriber? Login | <urn:uuid:84811326-f2e0-4129-b55f-6cf4b82f085c> | CC-MAIN-2022-33 | https://www.prisonlegalnews.org/news/2004/sep/15/report-faults-vermont-policies-in-prisoner-deaths-retaliation-precedes-pln-writers-suicide/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.981038 | 4,415 | 1.617188 | 2 |
Danny Chung loves drawing – not maths! But when his ex-maths-champion grandma comes to stay; he soon realises that they have more in common than he ever thought possible…
Eleven-year-old Danny Chung loves drawing more than anything – certainly more than maths; which; according to his dad and everyone else; is what he is ‘supposed’ to be good at. He also loves having his own room where he can draw in peace; so his life is turned upside down when a surprise that he’s been promised turns out to be his little; wrinkly; ex-maths-champion grandmother from China. What’s worse; Nai Nai has to share his room; and she takes the top bunk!
Nai Nai can’t speak a word of English; which doesn’t make things easy for Danny when he is charged with looking after her during his school holidays. Babysitting Nai Nai is not what he wants to be doing!
Before long though it becomes clear to Danny that there is more to Nai Nai than meets the eye; and that they have more in common that he thought possible….
Requires a Yoto Player | <urn:uuid:7fa147a8-93b8-4128-84c6-60fcc471c5cc> | CC-MAIN-2022-33 | https://katzenworld.shop/product/yoto-danny-chung-does-not-do-maths/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.988946 | 254 | 1.632813 | 2 |
Communication is: - Sharing information, thoughts, beliefs and emotions - Social activity - Good communication is a lear..
Respiratory Failure Due To Covid-19
BASIC PRINCIPLES OF COVID-19 MANAGEMENT
MATERNAL HEALTH IN COVID TIMES- ITS MANAGEMENT
Invasive and Non-Invasive Breathing
In this session we shall learn: Common Presentation Classification according to severity Monitoring at home Monitor..
Covid Care in Children
Critical Hour Management | <urn:uuid:a870e3d3-451c-4317-93c5-e81425241bea> | CC-MAIN-2022-33 | https://academy.nationalmedicosorganisation.org/browse?id=9&category=doctor&sortby=z-a | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.767289 | 108 | 2.828125 | 3 |
Support for Electoral Stakeholder Engagement in Myanmar
Since 2013, the International Foundation for Electoral Systems (IFES) has been assisting the Union Election Commission (UEC) of Myanmar in its efforts to involve other key electoral stakeholders, such as civil society organizations (CSOs), political parties and the media, in the electoral process. Central to these efforts are meetings held between the UEC and other electoral stakeholders, including civil society and political parties. These events have provided the opportunity for the UEC to present draft strategies, guidelines and materials for feedback and have also helped to develop lines of communication where previously there was little engagement.
With IFES support, the UEC has institutionalized UEC-CSO stakeholder workshops in Yangon as an every other month event. These workshops involve representatives from the UEC, international non-governmental organizations and local CSOs. On average, 18 UEC representatives and 50-60 representatives from CSOs attend. These workshops represent a significant shift in the relationship between the UEC and civil society representatives. Recent workshops allowed the UEC and CSOs to work collaboratively to develop a code of conduct (CoC) and draft accreditation process for observers. During this process, one civil society participant remarked, “It is good to have discussions in the forming of the CoC first before the UEC presents it. In the past, the UEC would provide us with documents and now they are letting us shape those documents with engagement.” In December, the UEC also presented the national voter education strategy and asked CSOs to provide feedback on nine voter education posters that the UEC intended to use in support of the national voter list update. The UEC incorporated all of the recommendations that the CSOs provided into the redesign of the posters. At the following stakeholder workshop in February, the UEC shared these posters with CSOs, and these CSOs then helped to distribute them during preliminary voter list displays across the country between March and July.
The UEC’s efforts to expand stakeholder engagement have helped to increase the flow of information, foster relationships and build a foundation for an inclusive electoral process; and the UEC’s commitment to engaging stakeholders has not gone unnoticed. In recent months, the Carter Center, International Crisis Group and Center for Strategic and International Studies have released reports or articles in which the UEC’s collaborative efforts are noted.
IFES supports the UEC’s stakeholder relation efforts under the “Support to the Election Process in Myanmar” program funded by the Australian Department for Foreign Affairs and Trade, the UK Department for International Development and the Swiss Federal Department of Foreign Affairs and under the “Elections and Political Processes Assistance” program funded by the U.S. Agency for International Development. | <urn:uuid:451df43c-3d5a-4c6a-a8a1-0de5e7292854> | CC-MAIN-2022-33 | https://www.ifes.org/news/support-electoral-stakeholder-engagement-myanmar | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.943445 | 571 | 1.554688 | 2 |
A fluffy abundant fern!
The Asparagus Setaceus is always referred to as a fern but it is actually a member of the Lily family.
The Lace Fern comes from South Africa, they have long, wiry stems with super fine ferns, like lace thread. As it matures it loses its early bushy look and throws out tendrils that give it the potential to climb. It may even sprout flowers in late summer which turn into purple berries.
Key features of the Lace Fern - Asparagus Setaceus
Another amazing plant to help purify your home’s. The Asparagus Fern absorbs and eliminates toxins from the air around them.
We know that being around plants can help reduce feelings of stress and anxiety, but did you know they can also help lower blood pressure? Plants like the Asparagus Fern bring feelings of calmness and optimism and add a touch of happiness to your day!
How to care for the Lace Fern
- Give it plenty of bright, indirect sunlight
- Keep the plant moist but don’t let it sit in water to prevent root rot.
- It survives well in average household temperatures. Avoid draughts.
- Mist it often to keep humidity
- During the growing season, feed it with a weak fertiliser
- If you notice its roots becoming pot bound, it’s time to repot it
The Lace Fern Story
Also known as common asparagus fern, asparagus grass, climbing asparagus, or ferny asparagus
Where is it from?
Native to South Africa. Some say that they were brought to Europe in the 1600s. They then became popular in greenhouses and conservatories of the European elite.
Is The Lace Fern The Right Plant For Me?
Not a plant that you see often as a houseplant. When its delicate feathery foliage grows big enough, it resembles a canopy.
If you give it frequent watering, a moist warm place, and indirect sunlight, this plant will thrive in your home!
How tall does it grow? It is fast-growing and easy to care for and can reach a height of 2.5m unless pruned.
Fact: Although I'm always referred to as a fern (because of my appearance) I am actually a member of the Lily family.
Pets: Not considered toxic, but it can grow little berries that are inedible, best kept away from pets and children.
A delicate plant that will add extra elegance to your home! Get yours now! | <urn:uuid:796fed7a-0bf6-4828-80bd-1557f19a3a5b> | CC-MAIN-2022-33 | https://bloomboxclub.com/collections/small-indoor-plants/products/lace-fern | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.95331 | 541 | 2.546875 | 3 |
Perhaps it’s always been this way; humankind has been more motivated by emotions than reason and the primary emotion that generates beliefs is fear. The more that we’re driven by fear the less space we have in our brains to try to deal rationally with issues.
Two recent items from very different parts of the world struck me as providing evidence for this contention.
Chris Mooney, author of The Republican Brain and The Republican War on Science, wrote an article in the December 2, 2015 edition of the Washington Post entitled “This is why sowing doubt about climate change is such an effective strategy.” He begins:
For some time, social science researchers have been studying an oddity about the U.S. — compared with many other nations, we’re a hotbed of global warming doubt and denial. Accordingly, and to counteract this, a variety of messages or ways of “re-framing” the issue have been proposed, often with the goal of appealing to the ideology of political conservatives, which is where most of the doubt lies.
He cites a study of Americans reading various newspaper accounts of climate change. He summarizes the findings as:
“while the positive messages weren’t particularly impactful, the negative message was considerably more powerful in changing people’s beliefs when it was present. In an overall comparison between those who read articles containing the negative message and those who read articles that didn’t, the negative message led to less belief that global warming is real or that climate science is reliable, and also lessened participants’ support for climate change solutions.
“It’s not that the denial counter-frame is more powerful when matched with one type of positive frame versus another, it just has a consistent effect over all the subjects,”
The negative framing utilized arguments that played on fear of legislation by liberals and that addressing climate change would be bad for the U.S. economy.
The day before Mooney’s article, Liz Sly wrote an article in the Washington Post entitled, “Iraqis think the U.S. is in cahoots with the Islamic State, and it is hurting the war.” She reports from Baiji, Iraq:
On the front lines of the battle against the Islamic State, suspicion of the United States runs deep. Iraqi fighters say they have all seen the videos purportedly showing U.S. helicopters airdropping weapons to the militants, and many claim they have friends and relatives who have witnessed similar instances of collusion.
Ordinary people also have seen the videos, heard the stories and reached the same conclusion — one that might seem absurd to Americans but is widely believed among Iraqis — that the United States is supporting the Islamic State for a variety of pernicious reasons that have to do with asserting U.S. control over Iraq, the wider Middle East and, perhaps, its oil.
In the interest of balanced reporting, we must say that perhaps the suspicions of many Iraqi fighters are correct. However, it seems that such a view can only be seen through highly conspiratorial lenses. Regardless of how much U.S. policy may have unintentionally benefited ISIL, it seems rather preposterous that the U.S. is directly supply the Islamic State with weapons and other supplies. But apparently that is what many Iraqis have come to believe. As Joseph Goebbels, Hitler’s Propaganda Minister said in denying the Holocaust, “If you tell a lie big enough and keep repeating it, people will eventually come to believe it.” Obviously that can only happen when people either do not have access to facts or choose to ignore them.
It is indeed a frightening world when so many people, particularly Americans, deny the truth or importance of climate change. When the Iraqi soldiers in opposition to ISIL think that the U.S. is helping their opponent, that too is frightening. And all of this is happening when a large minority of Americans, mainly Republicans, think that “our prayers and thoughts” are the best answer to gun violence in the U.S.
Of course, by stating that these misperceptions of others are frightening, I run the risk of my own arguments being motivated by fear. It’s quite a struggle for all of us to balance our emotions with our powers of reason. It just seems that some of us are more aware of this conflict than others, and the ones who deny the conflict often are weak at trying to secure the closest thing we can find to the truth. | <urn:uuid:b43d38c2-63a2-4709-b567-2a38f2586244> | CC-MAIN-2022-33 | http://occasionalplanet.org/2015/12/06/the-elusive-connection-we-have-to-truth/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.967965 | 932 | 1.9375 | 2 |
Starting your own business starts with your dreams, ideas, desires, a whole lot of time, commitment, worries and bumpy roads, yet it doesn’t have to be scary and complicated. Like any big challenge if you prepare as much as possible the ride will be somewhat more of a smooth. For the individuals who (are doubting thomas’s) or have some sort of fear of starting a business, here is a great starting point…. an essential list of “need to know” 10 reality checks before starting your own business, to help all those who are lost or have a fear of getting started.
Reality check, brain check, business check…whatever you want to call it….
- Research your startup needs, the business requirements, what is the type of business you want to get into? What do you love to do? No really, what do you love to do?
- Understand that starting your own business is full of hard work. Can you commit to being overworked and underpaid to achieve success?
- Will your idea or business fill a need? Can you offer something unique, do you have a special niche?
- Do you have a business plan? Even if you are starting part time you need a plan of the road you will go down. You can always make adjustments because there will be turns, bumps and complete stops. Design a plan.
- Will the market you are interested in promoting continue to expand thru the years, will you be able to include other niches, products and services?
- Will you be able to give total commitment, dedication and hard work to follow thru, to get the job done?
- Can you accept and handle all cost, business requirements, marketing needs, can you wear all the hats? Are you ready to tackle whatever it takes to keep your business and website running smoothly?
- Do you have a network of people or a mentor to rely on, to get answers and help when needed?
- Do you have a vision of where you want to be. Do you have that burning desire that will continue to push you towards success?
- You will have to contend with the fact that your customers will be your bosses. Fulfilling their needs and wants, determining what is expected from your work ethics and handling complaints and issues.
What would you compare your business too?
Many consider their own small business as to the similarities of being a rider on an amusement park ride. Taking in all of the highs and lows of a coaster ride, not knowing where the turn in the ride is going to take the rider, that climb to the top that takes forever. The thrills, the heart stoppers, sometimes even the feeling of sickness from absorbing the unknown effects of the uniqueness thrill of their business ride.
Interesting enough when you get to a certain point on that business ride, you can find it leading up to the rewards of amazing success or mediocre results. It all depends on you expectations, how much of yourself you put into the ride, the wait, and riding out all of those lows and those unexpected changes.
Other “thrill ride anomalies” or “ready to take on the challenge” issues to consider … with you being the boss you will:
- take on all responsibility, take on the problems, the headaches
- have to remember that reality does not always fit into your dreams
- need to find a way to deal with reality of life
- will have to keep going when it seems as if you are going through a drought, or hit a dead end
- discover that people who want to succeed with their own business will achieve goals if they follow a plan, work with a mentor in the same field, put in the time, and are dedicated to helping others.
- be putting in long hours on a daily basis, even on weekends to fulfill the commitments of being the boss and this will continue as long as you control your own business. It is up to you how efficiently you handle your hours
As a business owner, (no matter what type it is, brick and mortar, internet, home based) the 10 reality checks before starting your own business that I have just listed is just a starting point to get you going.
With the power of the internet, you can now set up your own business in very little time and follow other internet entrepreneurs who are having great success with their own online website businesses.
Surveys have shown that thousands of individuals, including millennials, those who are close to retirement or in retirement years, those who fear the fact of losing a job, and those who are looking for success in life, are get their ducks in a row and are discovering their options to start out on their own.
An excellent idea is to start out part time while you have income coming in from your present job and build your internet business.
Many are giving up the job hunting process and are now turning to the advantages of starting and running their own small business especially online.
- how much of yourself you put into it
- how you plan out the ride ahead of you
- what you expect the end results to be
In today’s technical world you will need a website with your business, no matter what type and where you are going to conduct business. If you go the route of entirely doing business online make every attempt to find::
- a mentor, a network of business people who have the same desires of achieving success as you do.
- a legitimate quality program that you can start out with
- the right web design and web hosting ( you absolutely can do this on your own,)
- quality traffic and promoting your site is a must
The 10 Reality checks before starting your own business listed here plus the other tips are just the beginning of your success. Always keep learning, always keep pushing yourself. Never ever give up! Remember, do what you love and the money will follow.
Never stop learning….Angela | <urn:uuid:3f020ac0-d222-42e0-af3c-d1e71c293b84> | CC-MAIN-2022-33 | https://whatagecaniretireat.com/10-reality-checks-before-starting-your-own-business | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.95941 | 1,222 | 1.726563 | 2 |
In response to our Steampunk Darwin, David Klinghoffer observes, at Evolution News & Views, a classic example of the way in which mediocrities know they are right: Because they can attract a consensus of, mainly, themselves to end discussions of problematic new information:
Shutting Down the Evolution Debate, the “Mainstream Science” Way
We noted the other day our biologist colleague Cornelius Hunter’s online adventure, parachuting into a discussion with theistic evolutionists over at the BioLogos website. The debate in a thread at their Open Forum, “What is Universal Common Descent?,” is long and discursive. It runs to 212 entries so far. I can’t claim to have read every word, but this struck me as telling.
At comment #203, Washington University’s Joshua Swamidass weighs in, seeking to call a halt to the proceedings. It’s partly a suggestion to his BioLogos friend Dennis Venema, a biologist at Trinity Western University, to move along and stop engaging Dr. Hunter. Notice the repeated appeal to “mainstream science” — seven mentions of that exact phrase. It almost seems like it should be in all caps with a trademark symbol after it. More.
Yeah. Past Sell ByTM As the recent rethinking evolution meetings show, many biologists, not soon due for retirement, know that there is something wrong with the classical mainstreamTM position that Swamidass equally knows that it is his duty to defend.
If everyone had taken his approach to evolution and applied it to power generation from the 19th century onwards, you wouldn’t be reading this. You’d be out forking coal into your car’s boiler.
Note: Steampunk: The writing genre defined
See also: Steampunk Darwin: For those of you who have never heard of steampunk, it is a sub-genera of science fiction that anachronistically fuses Victorian steam powered technology into the digital age. Darwinism is an analog-based Victorian relic trying to make its way in the digital information age. Darwin had no conception of the information problem facing any account of naturalistic evolution. (Barry Arrington)
Follow UD News at Twitter!
Hey, it worked, in its day. But … | <urn:uuid:58276b66-a6fd-4875-9114-0e5c6c230268> | CC-MAIN-2022-33 | https://uncommondescent.com/evolution/darwinism-the-steam-engine-of-modern-biology/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.939777 | 480 | 2.0625 | 2 |
You can use these commands for give some general settings for the main menu.
First of all, you have to indicate which level is to be used to create the menu: go to the sitemap and select the required level. The various items at this level will be used as items in the menu. When you have done this, you can select the options in the View box to work on:
|▪||Main menu alignment / Hamburger Button alignment: these two options respectively define how the menu and hamburger button are aligned (Left, Center or Right), with respect to the space available for the Menu object. If the Menu object has been inserted in the template editor, the available space depends in the size of the object. If, on the other hand, the Menu object has been inserted in a page, the available space is determined by the size of the cell in the page layout table that it has been added to. |
When there isn't enough space to display all the items, the menu is automatically replaced by the hamburger button. This also happens when the website is not responsive (indicated in Resolutions and Responsive Design). Remember, therefore, that the hamburger button can be used in desktop websites as an alternative to the traditional navigation menu.
|▪||Always display the Hamburger Button: this allows the Hamburger Button to always be displayed instead of the main Navigation Menu, regardless of whether the available space is large enough to accommodate the expanded view of all the options.|
The options in the Button style section are:
|▪||Width: you can set the width in pixels of the buttons for the menu items.|
|▪||Margin: you can specify the horizontal and vertical margins in pixels (the space between the button border and the text in the button).|
|▪||Spacing: you can specify the outer margin in pixels (the space between each button).|
When you define the width of the buttons, take into account the overall space available for this menu: this parameter can be changed if you are not using a default template (see Template Structure.
|▪||Border: use this option to indicate the border thickness and corner bevel of the buttons. You can define each button individually.|
The options in the Button text section are:
|▪||Font Type: specifies the font, style and size to use for the text.|
|▪||Alignment: you can specify how you want the text to be aligned in the button: to the Left, in the Center or to the Right.|
You can now define the appearance of the single items in the main menu. First of all, select the Menu item you want to work on: Background, Menu Item, Item on mouseover, Item for Current Page, Separator.
The following options are available in the Style section, depending on which menu item you have selected:
|▪||Background color / Text color: define colors for the Background, the various states of the Menu Options, the Menu Separator, and the Hamburger Button.|
|▪||Opacity: this sets the level of transparency of the menu object's background color. Values closer to 0 increase transparency, letting the page's background show through.|
|▪||Border: this defines the color, thickness and bevel of the corners of the background border (all 4 corners or singularly). If you are working on the menu items in their various states, you can only define the border color: thickness and bevel values are taken from the parameters given in the Button style box.|
|▪||Margin: this sets the value (in pixels) of the buttons' external horizontal and vertical margins. The margin determines the size of the menu's background.|
|▪||Background image: you can specify the image to use as a background for the element you are working on. You can search the image on the File Selection window by clicking on the button and selecting from the available resources: you can use .JPG, .GIF, .PNG. formats.|
|▪||Use the same settings as the Mouseover state / Use the same settings as the Menu Item: available, respectively, for the Item for Current Page and Hamburger Button elements, allow the use of the same options defined for the Item on mouseover or the Menu Item; otherwise these two elements can have different settings.|
|▪||Effect: this option is only available for the Item on mouseover: it indicates the effect on the button on mouseover|
|▪||Button text: this option applies a text style to the selected menu item or menu separator: Normal, Bold, Italics or Underlined. This style is in addition to the definitions given in the Button text box.|
Read the guides: | <urn:uuid:64135a25-f4fc-4213-828a-99312b6ae902> | CC-MAIN-2022-33 | https://help.websitex5.com/en/v2022.2/pro/ogg_menu_tab1.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.781109 | 1,025 | 2.09375 | 2 |
Failure to Pay Overtime or Minimum Wage
Disputes about overtime, minimum wage, salaries, commissions, vacation time, stock options and other forms of compensation are common in workplaces. As employment lawyers we can help you to obtain the compensation that you have earned. Washington, D.C. and Maryland are particularly liberal jurisdictions with regard to wage claims, and you may find that you are entitled to more compensation than you realize. For example, a worker in D.C. may be entitled to recover up to four times the amount of wages that they are owed, and a worker in Maryland may recover up to three times the amount of wages owed, plus attorney’s fees and costs. Additionally, Virginia’s Wage Payment Act now provides that workers may sue for liquidated damages plus attorney’s fees and costs. Therefore, in the event of any dispute about compensation, it makes sense to have your situation analyzed by our experienced wage and hour attorneys.
Employees are entitled to receive payment in an amount that is equal to at least the minimum wage in their state and local jurisdiction. Employees must receive the minimum wage even if they receive a set salary. Failure to pay the requisite minimum wage, may entitle you to 3 to 4 times the amount of unpaid minimum wages, as well as attorney’s fees and costs.
Pursuant to the Maryland Wage and Hour Law, the minimum wage is set to increase each year up to $15.00 an hour by January 1, 2025, for employers with 15 or more employees, and by July 1, 2026, for companies with 14 or fewer employees. Additionally, Montgomery County and Prince George’s County currently have their own minimum wage rates, which are higher than the floor set by the State of Maryland.
Under the D.C. Minimum Wage Act, minimum wage will gradually increase to $15.00 per hour on July 1, 2020. The Act also provides for a gradual increase in the minimum cash wage to tipped employees — to $5.00 by July 1, 2020.
Many employees do not realize that they are entitled to overtime for every hour worked over 40 in a workweek. Overtime pay should be made at 1.5 times an employee’s usual hourly wage for all hours over 40 in the workweek. If you have been unlawfully denied these wages, you may be entitled to up to 3 or 4 times the amount of unpaid overtime, as well as attorney’s fees and costs.
In addition to state wage laws, our attorneys can represent you in Fair Labor Standards Act (FLSA) claims. The FLSA is a federal law mandating minimum wage and overtime standards for full-time and part-time employees in the private and public sectors. We can review your claim and advise you of your options, as well as the risks and benefits of each one. | <urn:uuid:7a8aad93-3c6f-4e67-971c-61eb501a9b75> | CC-MAIN-2022-33 | https://www.thatcherlaw.com/employees-contractors/overtime-and-minimum-wage-claims/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.967269 | 592 | 1.6875 | 2 |
Federal Data Privacy ActsThe federal government has multiple data privacy laws designed to protect the public. No one law provides complete protection – instead, there are sector-specific laws. These include:
- U.S. Privacy Act of 1974
- Federal Educational Rights and Privacy Act of 1974
- Video Privacy Protection Act of 1988
- Driver’s Privacy Protection Act of 1994
- Health Insurance Portability and Accountability Act of 1996
- Children’s Online Privacy Protection Act of 1998.
U.S. Privacy Act of 1974
This Act regulates the government’s collection and use of personally identifiable information about individuals. Prohibited disclosure of this information is punishable by criminal penalties. The Act statesat 5 U.S.C. section 552a(i)(1):
“Any officer or employee of an agency, who by virtue of [their] employment or official position, has possession of, or access to, agency records which contain individually identifiable information the disclosure of which is prohibited by this section or by rules or regulations established thereunder, and who knowing that disclosure of the specific material is so prohibited, willfully discloses the material in any manner to any person or agency not entitled to receive it, shall be guilty of a misdemeanor and fined not more than $5,000.”
While this privacy law provides criminal penalties, it creates no private right of action.
Federal Educational Rights and Privacy Act of 1974
The privacy of student education records is protected under this Act. It applies to educational institutions that receive funds from the United States Department of Education. The law also gives students (18 or over) or their parents (students under 18) certain rights. These include the right to:
- Inspect and review the student’s academic record maintained by the school.
- Request correction of records that the parent or eligible student believes are incorrect. If the school declines to modify the academic record, a formal hearing is available to the parent of eligible students.
There is no private right of action under this Act. However, if a parent or eligible student believes their privacy rights have been violated, they may file a complaint with the Department of Education. If this department finds a violation, it may issue a corrective action to the educational institution and even end funding.
Video Privacy Protection Act of 1988 (VPPA) and Amendments
This narrow law protects consumers against the following:
- Disclosure, without written, informed consent, of personally identifiable information related to the rental of videos.
- Disclosure, without a warrant or court order, of information to law enforcement.
- Long-term retention of consumer rental records by video rental stores.
The VPPA, at 18 U.S.C. section 2710(c)(1), allows the following civil action:
(1) Any person aggrieved by any act of a person in violation of this section may bring a civil action in a United States district court.(2)The court may award …actual damages but not less than liquidated damages in an amount of $2,500; …punitive damages;… reasonable attorneys’ fees and other litigation cost reasonably incurred; and…such other preliminary and equitable relief as the court determines to be appropriate.
Therefore, unlike many federal privacy laws, the VPPA provides consumers a private right of action. Today, with videotapes being obsolete, there is an emerging area of law applying this Act to modern technology such as digital videos and online streaming services. There is little settled law and ample scope for creativity by the data privacy lawyer.
Driver’s Privacy Protection Act of 1994 (DPPA)
This Act requires the states to protect the personal information in a person’s motor vehicle record, such as name, address, phone number, weight, height, photo, and Social Security Number. Exceptions exist for disclosure to law enforcement, civil and criminal proceedings, motor vehicle safety, and other legitimate government functions.
DPPA provides a private right of action against those who knowingly disclose protected information. Remedies include:
- Actual damages
- Punitive damages if the disclosure was willful or in reckless disregard of the law
- Reasonable attorneys’ fees and litigation costs
- Equitable relief.
DPPA also provides for fines levied against state departments of motor vehicles of up to $5,000 for substantial noncompliance.
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
This law protects a patient’s medical information from being disclosed to unauthorized parties. Noncompliance with HIPAA can ruin a business. HIPAA imposes fines ranging up to $50,000 per violation, with a cumulative limit of $1.5 million per year. Criminal penalties are also available under the law. No private right of action exists.
Children’s Online Privacy Protection Act of 1998 (COPPA)
COPPA requires the Federal Trade Commission to promulgate and enforce rules pertaining to children’s privacy online. Its primary focus is to control the type of information collected from minors under 13 years of age. COPPA applies to commercial websites and online services that target minors and use collected data from the children for business purposes.
Both the federal and state governments can take enforcement actions against commercial websites and online services operators, with civil penalties ranging up to $43,792 per violation. COPPA only allows the federal government and state Attorneys General to enforce the law. There is no private right of action.
Opportunities for the Data Privacy Attorney Under Federal Privacy Laws
Those data privacy attorneys who represent clients whose privacy has been violated have minimal options under federal privacy law. This is due to two reasons. First, there is no comprehensive federal privacy legislation – instead, there is an incomplete patchwork of laws. Second, with a few narrow exceptions (VPPA and DPPA), there is no right of private action to compensate clients who have had their privacy violated.
To seek full redress and compensation, the data privacy lawyer looks to state law to provide appropriate remedies.
State Data Privacy Laws
Unlike the federal government, many states have or are considering comprehensive privacy laws
This stateis the leader in the field. The Golden State has the 2018 California Consumer Privacy Act (CCPA). It provides a private right of action for both monetary and equitable relief. CCPA, at California Civil Code section 1798. 150(a), states:
“(1)Any consumer whose nonencrypted and nonredacted personal information ... is subject to an unauthorized access and exfiltration, theft, or disclosure as a result of the business’s violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information may institute a civil action.”
Remedies available to the consumer include the greater of up to $750 per incident or actual damages. Equitable relief is also available.
Texas Business and Commercial Code section 521.051(a) provides:
“A person may not obtain, possess, transfer, or use personal identifying information of another person without the other person’s consent and with intent to obtain a good, a service, insurance, an extension of credit, or any other thing of value in the other person’s name.”
A person has a right to bring an action under this statute.
Other State Laws
While many states consider specific laws providing comprehensive data privacy protections, other state laws provide causes of action for violation of privacy. These include the torts of negligence and invasion of privacy.
Opportunities for the Data Privacy Lawyer Under State Law
A client who has had their private information wrongfully disclosed hires the data privacy lawyer to seek redress. This is not an easy task, as there is no comprehensive federal data privacy law and few state laws explicitly provide rights of action for data privacy breaches. Therefore, the data privacy lawyer must research specific federal legislation and the case law regarding torts to find the law that best provides causes of action for the client.
How Do I Become a Data Privacy Lawyer?
Like all careers practicing law, membership in a state bar is required. Many data privacy lawyers work for large law firms, and these companies typically require three to five years of prior legal experience. | <urn:uuid:f709e2c3-dea4-4eb2-9771-193df0f544f7> | CC-MAIN-2022-33 | https://www.bcgsearch.com/article/900051083/What-Does-a-Data-Privacy-Attorney-Do/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.914764 | 1,693 | 2.875 | 3 |
In order to study the mode of action of beta-adrenoreceptor antagonists in essential tremor the efficacy of single oral doses of 2, 4 and 10 mg LI 32-468, a peripherally acting, selective beta-2 adrenoreceptor antagonist, was compared with a single oral dose of 120 mg propranolol in a randomised, double blind, placebo controlled trial. Both the lowest dose of LI and propranolol were shown to be equally superior to placebo in attenuating tremor magnitude. This finding supports the contention that the beneficial effect of beta-adrenoreceptor antagonists in essential tremor is mediated via peripheral beta-2 receptor mechanisms.
Statistics from Altmetric.com
If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways. | <urn:uuid:b3b41d84-95c4-41c5-827f-fef6daae954e> | CC-MAIN-2022-33 | https://jnnp.bmj.com/content/47/9/976 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.844455 | 207 | 1.617188 | 2 |
Known as the home of numerous Jewish luminaries in its 700-year history, the northern city of Safed is set to get its first traffic light.
The new installation, expected to start operating in the coming days, will serve Safed’s 40,000 residents as it moderates traffic at the Birya Junction at the northern entrance of the city.
Perhaps it’s fitting that news of the traffic light for Safed was broadcast on Sunday, the eighth and last night of Chanukah, the Festival of Lights.
Safed has been the center of Jewish mysticism and Kabbalah since the 16th century. Its Old City is made up of small cobbled alleyways and steep, winding stairways.
Safed’s mayor, Shuki Ohana, who was elected in October 2018, said the traffic light, and the general upgrade of the Birya Junction, represented a major step forward for the historic city.
“We cannot remember a revolution like this in the city compared to what is taking place now,” Ohana told Kan television news.
“We have managed without a traffic light but we are now moving forward … to a city like one like no other in the world,” he said. | <urn:uuid:b628b18d-5cfd-463c-987c-022feb164ed8> | CC-MAIN-2022-33 | https://www.jta.org/2020/01/01/ny/northern-light-safed-gets-first-traffic-signal | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00065.warc.gz | en | 0.96943 | 261 | 1.734375 | 2 |
Drop off your CV
We'd love to hear from you. Send us your CV and one of our specialist consultants will be in touch.
It’s true, the pandemic has revealed many weaknesses within the healthcare system. But at the same time, it has signalled towards several areas of opportunity, namely, through technological innovation.
RPM (remote patient monitoring) is not a new concept. However, no longer able to rely on typical in-person doctor visits during the Covid-19 pandemic, the demand for RPM and telehealth soared. According to a report from S&P Global, telehealth patient volume increased 3,000% - 4,000% across the US during the early stages of lockdown. Meanwhile, global venture capital funding for digital health companies shattered records with $6.3 billion in funding during the first half of 2020. Peter Antall, chief medical officer for the telehealth provider Amwell, commented, "As we got into March and April, we saw growth like nobody could have ever predicted or planned for; it was just remarkable."
Indeed, with the market for at-home medical devices expected to double in size over the next 5 years, what does this mean for the future of healthcare?
Patients, health professionals and care managers alike are driving adoption rates:
Patients are calling for new ways of care:
(Phillips: digital transformation, shaping the future of healthcare report)
At the same time, practitioners are feeling the strain of inefficiency:
(Phillips: digital transformation, shaping the future of healthcare report)
Welcoming Patients Through a Digital Front Door May Be the Norm:
According to the Royal College of General Practitioners, 71% of routine consultations were remote in the four weeks leading up to April 2020, compared to the 25% in the same period in 2019. Without a doubt, this is a tremendous shift in how we access public health care.
As a result, many healthcare providers have looked at communication technologies with a new perspective. We spoke to Precision Medicine and Diagnostics Associate Director Vicky Kerrigan, she shared her own insights; “virtual care could be the solution to plugging many of the operational gaps within the current care model system. For example, the gap between going to the doctor and being referred to the hospital.” She added, “RPM monitoring allows rapid data collection and processing - this means that patients' problems are already acute by the time they go into the hospital, saving valuable triage time and resources. For example, ECG blood pressure monitoring from wearable devices will alert a clinician if there is a change in the patient's blood pressure level, before visible symptoms present themselves.”
Certainly, incorporating RPM into a patient’s chronic disease management may improve patients’ quality of life by allowing them to maintain independence, prevent complications, and minimize personal costs. It can be especially helpful for patients who are managing more complex self-care processes such as post-operative care, home dialysis, diabetes or congestive heart failure. (Pharma Times).
Moreover, patient no-shows disrupt workflow, leave staff and equipment underutilized, and costs millions. Communication technologies provide patients with helpful reminders and health information regarding their upcoming appointments, helping relieve anxiety whilst relaying important information. Studies have shown that such automated reminders can lead to a 42% reduction in patient no-shows and a 67% reduction in poor patient preparation.
Of course, the colossal acceleration in vaccine development platforms over the past 2 years has been unprecedented. The most notable names include Moderna and BioNTech, who used mRNA platforms to bring the first Covid-19 vaccines to market in late 2020.
However, many people don't realize that artificial intelligence played a major role developing these mRNA vaccines. We spoke to CSG’s Precision Medicine, and Diagnostics Associate Director Vicky Kerrigan, who explained the significant impact AI in data analytics and data reading has had. She gave a recent example in Oncology and revealed how AI data processing saves a considerable amount of time - the machine can read large sequences of the genome quicker than any human could, thus, spotting anomalies quicker for researchers and patients alike.
What does this mean for the future of healthcare? It means that long term health outcomes are significantly stronger. Because AI can process genome data quicker, we are able to find anomalies within the genome faster and diagnose patients with cancer quicker.
Indeed, access to care as we know is likely to change. Several primary care providers and external investors are seeing the value in remote patient care and are already investing big.
Doctor OnDemand expanded its critical virtual medical services to 33 million Medicare Part B beneficiaries across all 50 U.S. states--helping make it a standard solution.
A new triage solution 98point6, that allows people to interface with an artificial intelligence system before seeing a human doctor witnessed significant growth.
These innovative companies highlight a permanent shift in patient behaviour toward looking to online and mobile sources of trusted, AI-generated healthcare content prior to talking to a doctor.
Challenges To Telehealth Adoption:
But to turn this vision into a reality, healthcare leaders need to overcome several barriers. The Philips Future Health Index 2021 report revealed that healthcare leaders found difficulties with:
Indeed, healthcare providers have two key challenges to overcome before we can fully adopt telehealth services.
The first is collaboration. Successful RPM requires real-time collaboration between GP practices and a network of other healthcare providers and technologies to ensure the right patients are treated at the right time
CSG’s Medical Devices expert Gary Logan told us that “the USA is far more forthcoming with RPM because they operate via a private model. However, the UK (for example) is more concerned with breaking even than capital gain.”
The second is talent. Gary explained, “With new procedures and new products coming in - everyone needs to be reskilled in the market so there's constant need for more training and more people coming up into the roles - people of an older age will have to reskill and get to know the products in detail”.
Moreover, alongside upskilling clinical professionals to work with new technologies, there is also huge demand for talent that can build and protect these telehealth platforms. A fundamental role of RPM is to improve the quality of data and information flow so that timely, effective and safe care can be delivered. Therefore, the protection of patient data is paramount.
At CSG, we’re seeing the emergence of major talent hubs in Boston, San Francisco, Seattle and Washington. Salaries are bigger but not big enough to warrant those big moves - who wants to add a 90 minute commute onto their day? At CSG, we understand talent motivations and pride ourselves on our ability to support people on their candidate journey. As a result, candidates nearly always come back to us at different stages of their career - even those who we maybe didn’t place!
Will RPM and Telehealth Become A Permanent Addition?
It very much seems that way. Although it may be a while before you see RPM offered by public health care models, AI and technological innovation are already working behind the scenes to help identify and manage chronic conditions.
Without a doubt, moving from pockets of digital innovation to sustained digital transformation requires a collaborative approach from healthcare professionals and a significant amount of talent. That’s where we come in. At CSG Talent, we’re curious about what the future of healthcare looks like. Our experts take an active interest in extremely niche areas, discovering new ways of working alongside technology with you.
If you’re looking for a new role within the realm of RPM and telehealth, speak to a member of our team now. | <urn:uuid:16931a4a-82a5-42f0-a796-7ab0d03fb7d8> | CC-MAIN-2022-33 | https://www.csgtalent.com/emea/insights/blog/remote-patient-monitoring---telehealth--what-will-the-future-of-healthcare-look-like-post-pandemic--204/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.942129 | 1,600 | 1.742188 | 2 |
Members of Congress have a hard time agreeing on virtually anything, and they’re already butting heads with the new president. But one issue should unite them: a new initiative to shrink the Pentagon’s massive overhead.
President Trump and Secretary of Defense James Mattis have pledged to cut waste. And key leaders in Congress have renewed their calls for rationalizing the Pentagon’s base structure. Now is the time for Congress to come together, put the national interest over parochial interests and finally support a new round of base closings.
If properly structured, any new set of base closings could result in billions in savings. This item is high on the military’s agenda. The brass have been asking Congress for permission to eliminate unneeded facilities for years, and for good reason. The last round of closures occurred eleven years ago, at a time when the military was busy fighting two wars.
So why isn’t there an overwhelming push to close unneeded bases? The resistance is grounded in pork-barrel politics, not a careful assessment of the nation’s defense needs. Too many members of Congress believe that they were elected to put the interests of their state or district over that of the country. They believe that they are doing their duty by blocking any base closures.
In fact, these representatives are actually doing harm to the nation and their constituents. Their stubborn refusal to allow the military to use its resources efficiently also prevents defense communities from taking advantage of land and property currently trapped behind chain-link fences and razor wire.
In that sense, the closure of military bases actually opens them up. Just ask the people of Philadelphia, who can now follow South Broad Street all the way to the Delaware River, through the gates of what used to be the Philadelphia Navy Yard. Austin, Texas, welcomes millions of people every year through the gleaming Austin-Bergstrom International Airport, formerly Bergstrom Air Force Base. The former naval air station in Brunswick, Maine, is now Brunswick Landing, a thriving business campus. Cal State Monterey Bay was carved out of the sprawling Army training base at Fort Ord. Thousands of acres have been set aside in the Fort Ord National Monument, which includes eighty-six miles of mountain bike and hiking trails.
A 2005 study by the Pentagon’s Office of Economic Adjustment looked at seventy-three communities impacted by a base closure, and determined that nearly all civilian defense jobs lost were replaced within fifteen years. In addition, the new jobs are in a variety of industries and fields, allowing communities to diversify their economies away from their excessive reliance on the federal government.
To be sure, base closures are initially disruptive to local economies and patterns of life, but most places do recover. In some cases, recovery has been quite rapid. The best way to ensure a successful transition is by encouraging local elected officials and civic leaders to plan for the future. Congressional leaders wishing to facilitate a new round of base closures should familiarize themselves with successful defense conversion cases, and be willing to help apply lessons learned.
Before Congress signs off on sharp increases in Pentagon spending, it should make sure the department is using its current resources as efficiently as possible. Closing unneeded bases is a good place to start.
By Christopher A. Preble and William D. Hartung
Source: National Interest | <urn:uuid:81b13daa-6d5c-41e2-b320-9af182c29e6f> | CC-MAIN-2022-33 | https://astutenews.com/2017/02/america-has-too-many-military-bases/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.955906 | 678 | 1.953125 | 2 |
Interpreter, storyteller and hiker of the Italian Southern Lands
Describing our ambassador is no easy task, but never more than in this case does his name help us, Silvio, that means: ‘someone who lives in the woods, in the forests’.
Walker, storyteller, curious observer. These three characteristics, united together and brought to the Italian regions of Calabria and Basilicata, make Silvio an interpreter of the territory, a guide who can make a place appear to us in its clearest and fullest light, make a space generate emotions and thoughts.
His hiking in the ‘Mediterranean lands‘ are under the banner of slow sport, immersed in nature but with a keen eye on the relationship between man and land. Not only in the sense of safeguarding and protection but also in the ‘generative’ sense. It is in the relationship between places and people that culture is born, also in this relationship we read history and, always within this environmental and environmentalist horizon, that we can plan the future.
Silvio’s many years of experience in environmental tourism led him to want to share with his fellow travellers the cultural roots of the highlands of the Pollino, roots that energise these places rich in art and tradition. It is precisely on the road as a philosophy of life, on a slow walk, where one can best admire and enjoy a thousand-year-old tree, an ancient Roman road, a marvellous panorama or listen to the story of an ancient noblewoman while, having just finished our daily hike, enjoying a dish of ‘lagane e ceci’ (tipical pasta with chickpeas) and drinking a Saracen Muscat. | <urn:uuid:a5c7b315-30a4-4d10-a298-12a26585b8f8> | CC-MAIN-2022-33 | https://www.aku.it/de/ambassador/silvio-carrieri/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.946925 | 366 | 1.804688 | 2 |
Indonesian president wants to prioritize on renewables for new power projects
Indonesia's President, Mr Joko “Jokowi” Widodo is drumming up support for new renewable energy projects.
Indonesia is eager to boost energy generation and the country’s president, Mr Joko “Jokowi” Widodo is promising to give renewables and more specifically, geothermal a more important role in new energy projects.
It is well known that Indonesia has massive amounts of untapped geothermal power amounting 28,000 MW.
The President is trying to bolster the growth of green energy by all means necessary.
The country’s premier declared at a public event that “Of the total 35,000 MW worth of power plants targeted to be built within the next five years, more than 90% is coal based. This should be shifted and changed. We have geothermal resources worth 28,000 MW, in addition to power energy from wind, waves, solar heat and biomass”.
Investors seem to also be eager to funnel funds into renewable projects and new development are happening, but the country needs to add more momentum to green energy. | <urn:uuid:e7763e76-ca25-43dd-930a-71325d9678a1> | CC-MAIN-2022-33 | https://www.thinkgeoenergy.com/indonesian-president-wants-to-prioritize-on-renewables-for-new-power-projects/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.95011 | 246 | 2.078125 | 2 |
Kirsten Walsh writes…
Laura Bassi (1711-1778) had a remarkable career. In eighteenth-century Italy, it was rare, but not unheard of, for a woman from a wealthy family to receive a higher education, a doctorate, or even a lectureship. But what made Bassi unique was how she used her positions at the University of Bologna and the Academy of Science (which would ordinarily have been symbolic) to contribute to the scientific community of Europe.
Thony Christie over at The Renaissance Mathematicus recently wrote a very good post about Bassi’s life and career, so I will not go into those details here. Instead, today I’m interested in Bassi as an eighteenth-century Newtonian and experimental physicist.
Over the course of her career (roughly 1732 to 1778), Bassi presented papers on mathematics, pneumatics, fluid dynamics, mechanics, optics and electricity. Most of these papers have been lost, but the few surviving papers display Bassi’s talent for mathematics and her commitment to the Newtonian method (as exemplified by Principia). For example, in her paper on differential calculus (“De problemate quodam mechanico”, 1757), Bassi dealt with the problem of how to determine the motion of the centre of mass of two or more bodies moving along any curved paths in a plane. In this paper, she followed the Newtonian method of avoiding metaphysical and empirical assumptions about the nature of matter.
From the 1740s onwards, Bassi and her husband Giuseppe Veratti became very interested in electrical phenomena. Here, we can identify two different Newtonian themes. Firstly, their research appears to have been heavily influenced by the later queries of the Opticks, which attempt to link phenomena such as light, heat, electricity and magnetism with biological phenomena such as muscle movement, growth of plants and phosphorescent fish. Secondly, they supported Franklin’s electrical-fluid theory, which had been systematised in a Newtonian framework by Beccaria.
In the late 1740s, Bassi began teaching privately. Bassi and Veratti had a well-equipped physics laboratory in their home, including an electricity machine. This made it possible for Bassi to teach experimental physics in their home. At the University, the philosophical curriculum was essentially scholastic, and at the Institute of Sciences, the courses on experimental physics had a physiological focus (which reflected the interests of the Bolognese scholars, most of whom had medical degrees). Bassi’s knowledge-base, which by then included advanced mathematics, mechanics, optics, and electricity, made her uniquely qualified to teach a course on Newtonian philosophy and Franklinian electricity. In a letter to Scarselli in 1755 she mentioned the popularity of her classes: “The classes have gathered such momentum that they are now attended by people of considerable education, including foreigners, rather than by youths”.
From this brief survey of Bassi’s work, she appears to have adopted many facets of Newtonianism: she accepted and built on Newton’s rational mechanics, but also followed the leads left by Newton in his optical queries. Indeed, in her own time, Bassi was a well-known Newtonian. Algarotti mentioned her several times (although not by name) in his Sir Isaac Newton’s Philosophy explain’d for the use of the Ladies and explicitly presented her as a Newtonian in ‘Non la lesboa’ – his contribution to the book of poems published in honour of Bassi’s graduation. Also, in 1744 Voltaire implicitly compared Bassi with Newton when he wrote:
- Most Honoured Lady: I would like to visit Bologna so that I might say to my fellow citizens that I have seen Signora Bassi, but, deprived of this honour, I trust that I may with justice cast at your feet this philosophical homage in reverence to the glory of her century and sex. As there is no Bassi in London I should more happily enter your Academy of Bologna than the English one, even though it may have produced a Newton.
But what can we say about Bassi’s ‘experimental physics’? The subject-matter was certainly Newtonian, but what about the methodology? On this blog, we have argued that, from the 1690s onwards, the experimental philosophy was approached in a way that emulated Newton’s mathematical-experimental method. Bassi certainly had the expertise to follow the Newtonian method, which raises the question: Should Bassi’s experimental physics be seen as another facet of her Newtonianism, or should we regard it as a more general interest in the experimental method?
Unfortunately, I haven’t been able to find the evidence to answer this question. I’m not even sure if Bassi engaged in any kind of methodological reflection. Does anyone know how I might find out?
Alberto Vanzo writes…
So far, we have argued in many posts that British philosophers from the 1660s onwards worked in the tradition of experimental philosophy and criticized speculative philosophy. However, the distinction between experimental and speculative philosophy was also widely employed outside the British isles. In this post, I will document the presence of the experimental-speculative distinction in Italian natural philosophy between 1667 and 1716.
The Accademia del Cimento, founded by 1657 by Prince Leopoldo de Medici in Florence, was one of the first scientific societies in Europe. In 1667 the Accademia published a collection of experimental reports with the title Saggi di naturali esperienze. The preface to this work ends with a caveat:
- We would not like anyone to believe that we presume to give to the light a complete work, or even only a perfect scheme of a great experimental history, because we know well that more time and strengths are required for such an enterprise […] if, sometimes, an even minimal allusion to anything speculative has been made, […] always take it to be a specific idea or intuition of [some] academics, but never one of the Accademia, whose only aim is to experiment and to narrate.
Note the emphasis on experiments, the references to natural histories, and the refrain from endorsing any speculation. These are all indications that the Academy was presenting its work in terms of the then nascent distinction between experimental and speculative philosophy.
Not everyone was endorsing experimental philosophy in late seventeenth-century Italy. However, some of the authors who expressed reservations towards it did so in terms of the experimental-speculative distinction. For instance, Daniello Bartoli distinguished in 1677
- the two manners of natural philosophy which nowadays are very rumored, because they fight over the glory of primacy […]: the Theoretical and the Experimental […]
On the one hand, theoretical or “purely speculative” philosophy “needs experimental [philosophy] to “see [things] by means of the senses”. On the other hand, “purely experimental” philosophy must seek the help of speculative philosophy to proceed from particular experiences to their causes.
- [E]ither [philosophy], by itself, can be defeated if the other does not help and rescue it when it may fall down. But if both are united and if they fight side by side, although they may not always win, surely they will never be defeated.
Among the Aristotelians, Giovanni Battista de Benedictis (writing under the pseudonym of Benedetto Aletino) criticized experimental philosophy for its inability to proceed from facts to causes. He claimed that experimenters were not philosophers, but mere empirics, because they failed to establish any evident, undisputed premises as the basis for a deductive scientia of nature.
- Indeed, if our Peripatetics, who only paid attention to speculative subtleties, had followed Aristotle’s teachings by directing their efforts towards experience, I have no doubt that they would have unfailingly attained the glory that the Atomists [i.e., experimental philosophers] are now seizing, not because of their knowledge, but because of the neglicence of others [the Peripetetics].
While Aletino defends the Aristotelians, he categorizes them as speculative philosophers and he rejects experimental philosophy.
Antonio Conti was a Venetian abbot who acted as intermediary in the epistolary exchange between Leibniz and Newton. He published a discussion of the relation between experimental and speculative philosophy in 1716. For Conti, experimental philosophy alone “is truly science” because it rely on experience to prove the truth of its claims. By contrast, speculative or conjectural philosophy can only establish the probability or truth-likeliness of hypotheses. Due to the endless variety of nature and the limitations of our senses, Conti did not think that experimental philosophy could eventually supplant all speculations. His fallibilism concerning hypotheses sounds rather modern:
- One makes hypotheses to establish [new] ideas and experiences; but hypotheses last only until phenomena modify or destroy them, or until a more perfect art of comparing truth-likely [statements] proves their uselessness or their imprudence.
Like Bartoli, Conti endorsed experimental philosophy without wholly rejecting the speculative approach. Bartoli and Conti, like Aletino and the compiler of the Saggi di naturali esperienze, thought of natural philosophy in terms of the experimental-speculative distinction. As in the British isles, so also in Italy the experimental-speculative distinction provided important terms of reference for thinking about nature in the late seventeenth and early eighteenth centuries.
In this post, I have not discussed to what extent the experimental-speculative distinction shaped the contents, besides the rhetoric and methodology, of Italian natural philosophy. I must do more work to answer that question. In the meanwhile, let me know what you think in the comments. | <urn:uuid:031d907e-82e4-45e4-b597-1ff9cd15230e> | CC-MAIN-2022-33 | https://blogs.otago.ac.nz/emxphi/tag/italy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.956629 | 2,082 | 2.53125 | 3 |
BIRS Workshop Lecture Videos
Spreading strategies and morphology of bacterial colonies: interplay between passive physico-chemical effects and bioactive growth John, Karin
The spreading of bacterial colonies at solidâ air interfaces is determined by the physico-chemical properties of the involved interfaces and bioactive growth processes. The production of surfactant molecules by bacteria is a widespread strategy that allows the colony to efficiently expand over the substrate. On the one hand, surfactant molecules lower the surface tension of the colony, effectively increasing the wettability of the substrate, which facilitates spreading. On the other hand, gradients in the surface concentration of surfactant molecules result in Marangoni flows that drive spreading. These flows may cause an instability of the circular colony shape and the subsequent formation of fingers. In this work, we study the effect of bacterial surfactant production and substrate wettability on colony growth and shape within the framework of a hydrodynamic thin film model. We show that variations in the wettability and surfactant production are sufficient to reproduce four different types of colony growth, which have been described in the literature, namely, arrested and continuous spreading of circular colonies, slightly modulated front lines and the formation of pronounced fingers.
Item Citations and Data
Attribution-NonCommercial-NoDerivatives 4.0 International | <urn:uuid:aa8cde98-22b8-4570-a1e0-610ab283722a> | CC-MAIN-2022-33 | https://open.library.ubc.ca/cIRcle/collections/48630/items/1.0384861 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.87935 | 281 | 1.945313 | 2 |
Often, a singer will come to me and ask me to teach him to sing piano. The strange thing is that the singer often has the ability to sing a well-coordinated piano but does not realize that s/he has the ability. Our classical singing world is so driven by volume that quality is often sacrificed for it. The terms falsetto or flute voice are very misunderstood and are often so named because the singer does not yet have the ability to sing such notes with enough breath energy (sub-glottal pressure) to match the quality of the the lower voice that they summarily accept as their “real” voice. In many such cases the real voice is in fact a “pushed” voice. In other words, a voice sung with too much breath pressure, forcing the vocal folds slightly apart. In such cases the voice sounds loudly up close but because of the lack of efficient fold closure, the resulting harmonics lack in power and the voice is not heard well at a distance or with orchestral accompaniment.
Very often we hear lighter voices sounding much more present than their fuller voiced counterparts, yet the fuller voices are called more dramatic, more powerful than the lighter voices. The darker sound we associate with dramatic voices is indeed a natural characteristic of such voices. However, it is important to distinguish between a sound that is rich and has dark qualities even at its most efficient and brilliant and a false darkness that come with “loose” phonation (inefficient fold closure).
It is important to remind that the world record holder for the highest note sung is a male and he sings C#8, a half step beyond the high side of the standard 88-key piano. This would suggest that a woman could theoretically coordinate pitches in the vicinity of C#9 since male and female voices average around an octave apart.
The greater error is however the misnomer “falsetto” applied to soft high notes that cannot handle a great deal of breath pressure. I had an F6 even 20 years ago that was referred to as “reinforced falsetto”. As I train as a tenor, I am finding that those notes have come back and they are becoming stronger. This I have also noticed with coloraturas I teach. Over time, what used to sound like a flute voice becomes gradually fuller (what some might call “real”). In short, what is often called “not real” or “falsetto” is rather an undeveloped sound. The coordination required for each individual note necessitates a specific recruitment of muscle fibers. See a simple discussion of muscular motor units here!
The ability to coordinate the two main pitch muscles (Vocalis and CT) on an individual note does not mean that the muscles are able to exhibit the same strength on even an adjacent note, one half-step apart. An individual note depends not only on increasing muscular activity of the more dominant muscle (CT for high notes, Vocalis for low notes) but also decreasing muscular activity in the more passive muscle (Vocalis for high note, CT for low notes). The strength of motor units in each of the muscles factors in. The strength of the required muscular motor units must be high enough to resist the breath pressure applied to the system (i.e. volume). The question therefore is whether the system, correctly coordinated relative to necessary motor units in each muscle, is strong enough to handle the applied pressure without the system buckling and recruiting additional motor units that are not appropriate for the note in question.
For example, if a tenor is trying to sing B5 and has a vocalis recruitment that is appropriate to Bb5, the pitch will either lower or the folds will loosen (i.e. relaxing the Inter-Arytenoids that close the posterior end of the folds. I.e. Speeding up vibration cycles to maintain pitch). The result would be correct pitch but with a kind of inefficiency that prevents the note from sounding brilliant and present.
What often sounds like a light sound is often a correct muscular set-up that has not yet gained enough strength to handle the necessary breath pressure that would result in a note that sounds “real” (i.e. matching the quality of other notes that are strong in the range).
In short, forcing a note to sound louder before its time will change the natural set-up of that note. To develop notes that sound weak, a singer needs 1) to accept the notes as weak and challenge them carefully by applying a little more volume until they develop in strength. This might take time but it guarantees the correct coordination of the laryngeal musculature.
Increased sub-glottal pressure can also have another effect. It could induce hyper-activity in the Inter-Arytenoids causing pressed voice. In such a case, folds thin out and are pressed to maintain pitch (i.e. slow down the vibration cycles). This is often the case with Counter-Tenors who often apply more sub-glottal pressure on very thin folds than the muscular set-up can handle. Over time, the hyper-function of the IAs cause a reduction of sound pressure (volume) lowering the quality of the sound. Counter-Tenors often start to sing big repertoire (for them) too early. The extreme light mechanism of a traditional male voice requires a long time to develop enough strength to sing Handel Castrato roles in large Opera Theaters with large orchestras. The tendency is to press the lower octave of the Counter-Tenor’s range in order to match the thin but relatively intense sound of the upper octave. It is not unusual that the quality of Counter-Tenor voices that specialize in Opera, with large orchestras in large theaters, lowers significantly over about 10 years.
Several issues need to be reviewed.
1. What we call falsetto and flute voice is usually a weak but properly coordinated upper range that needs to be encourages and challenged carefully in order for it to develop into a full sound.
2. The lower and middle voice, often called “real voice” is often inefficient production with fold postures that are too deep resulting in looser adduction.
3. Volume must be applied judiciously in order to maintain a muscular motor unit recruitment mode that is appropriate to the note being sung. Too much volume applied too soon (i.e. singing roles that require great volume before the singer has properly developed) can ruin the quality of the sound and hinder the progress of the singer. | <urn:uuid:9727404c-8d21-4880-9ad0-4dc25d02c83b> | CC-MAIN-2022-33 | https://kashudo.wordpress.com/2009/12/26/kashudo-%E6%AD%8C%E6%89%8B%E9%81%93the-little-voice-is-the-real-voice-the-danger-of-volume-before-its-time/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.95895 | 1,363 | 3.03125 | 3 |
Objective: To explore population characteristics, organization of health services and comparability of available information for very low birth weight or very preterm neonates born before 32 weeks' gestation in 11 high-income countries contributing data to the International Network for Evaluating Outcomes of Neonates (iNeo).
Study design: We obtained population characteristics from public domain sources, conducted a survey of organization of maternal and neonatal health services and evaluated the comparability of data contributed to the iNeo collaboration from Australia, Canada, Finland, Israel, Italy, Japan, New Zealand, Spain, Sweden, Switzerland and UK.
Results: All countries have nationally funded maternal/neonatal health care with >90% of women receiving prenatal care. Preterm birth rate, maternal age, and neonatal and infant mortality rates were relatively similar across countries. Most (50 to >95%) between-hospital transports of neonates born at non-tertiary units were conducted by designated transport teams; 72% (8/11 countries) had designated transfer and 63% (7/11 countries) mandate the presence of a physician. The capacity of 'step-down' units varied between countries, with capacity for respiratory care available in <10% to >75% of units. Heterogeneity in data collection processes for benchmarking and quality improvement activities were identified.
Conclusions: Comparability of healthcare outcomes for very preterm low birth weight neonates between countries requires an evaluation of differences in population coverage, healthcare services and meta-data. | <urn:uuid:a4644e19-e50a-4dc5-b456-d27ca5cf7504> | CC-MAIN-2022-33 | https://pubmed.ncbi.nlm.nih.gov/28383541/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.943047 | 308 | 1.945313 | 2 |
- Properly done encryption is still safe.
- They go after the weak things like passwords, bugs in software, ...
- Some software might contain backdoors.
I don't think this should really surprise anybody.
There is also speculation that maybe the NSA has better algorithms for reducing the complexity of public key cryptography or that maybe RC4 might be broken. Those things clearly are possible, but it's not clear. Nobody has suggested that AES has any problems, and I think that's still safe to use.
One of the question becomes what does properly done encryption mean. There are various factors to this and many applications using various protocols. SSL/TLS is the most used, so I'm going to concentrate on the parts in that.
As far as I understand it, 80 bit of security is around what is currently the upper practical limit of a brute force attack. In 2003 NIST said to stop using 80 bit by 2015, in 2005 they said to stop using it by 2010.
When using something like SSL/TLS you using various things each having it's own size. So it's important to known which is the weakest part.
Public key encryption (RSA, DSA, DH) doesn't offer the same amount of security per bit than symmetric keys. The equivalent sizes I find are:
There are other sources that have other numbers, but they're similar
So this basically means you really should stop using 80 bit symmetric and 1024 bit public keys and that your public key really should be at least 2048 bit, and should maybe even consider going to 3072 bit.There seems to be a push to moving Diffie-Hellman (DH) to provide Perfect Forward Secrecy (PFS). There are many variants to this. We want to use ephemeral (temporary) keys. But it basically boils down to 2 variants:
- Standard Ephemeral DH (DHE/EDH) with a public key
- Elliptic Curve Ephemeral DH (ECDHE)
With DHE you first negotiate a temporary DH key for this session (hopefully) using a random number on both sides, and then using that DH key to exchange a normal symmetric key for the session. This temporary DH key is what provides the PFS, assuming that this temporary key is thrown away. The drawback of this is that creating a sessions takes a lot more CPU time.
The standard DH has the same security as other public key encryption. So we really also want to stop using 1024 keys for that.
With ECDHE the key size needs to be the double of the symmetric size. This is also faster than DHE, so people want to move to this. There are various curves that can be used for this, and some of them are generated the the NSA and people have no trust in them. Some people even don't trust any of the curves. Most people seem to think that ECDH is the way forward, but then limit the curves they support.
There are also hashes used for various things including signatures and MACs. Depending on how it's used the properties of the hash are important. They have 2 important properties collision resistance and preimage resistance.
For a collision attack the upper limit is a little more than the output size over 2. But there are attacks that are known to give worst results. I found those numbers:
|SHA-2||No known attack (so SHA-256 would have 1.2 * 2^128)|
For preimage attacks I found:
|SHA-1||No known attack (2^160)|
|SHA-256||No known attack (2^256)|
So I think that MD5 is still safe when a collision attack isn't possible, but should really be avoided for anything else and SHA-1 should probably be considered the same. So you want to avoid them in things like certificates.
SSL/TLS also use MD5 / SHA-1, but as part of a HMAC. I understand that those are not vulnerable to the collision attack but preimage resistance is important then and so are still considered safe.
A lot of the algorithms depend on good random numbers. That is that the attacker can't guess what a (likely) random number you've selected. There have been many cases of bad RNG that then resulted in things getting broken. It's hard to tell from the output of most random number generators that they are secure or not.
One important thing is that the RNGs gets seeded with random information (entropy) to begin with. If it gets no random information, very limited amount of possible inputs or information that is guessable as input it can appear to give random numbers, but they end up being predictable There have been many cases where this was broken.
There are various encryption algorithms. But since the public key algorithms take a lot of time we usually want to limit the amount we do with them and do most with a symmetric key encryption. There are basically 2 types of symmetric ciphers: stream and block ciphers.
For block ciphers there are various ways of combining the blocks. The most popular was CBC. But in combination with TLS 1.0 it was vulnerable to the BEAST attack, but there is a workaround for this. An other mode is GCM but it's not yet widely deployed. This resulted in the stream cipher RC4 suddenly getting popular again.
Some ciphers have known weaknesses. For instance triple DES has 3*56=168 bits, but only provides for 2*56=112 bits of security. Other attacks make this even less.
The algorithms them self might be secure, but they might be attacked by other mechanism known as sidechannel attacks. The most important of that is timing attacks. If the algorithm has branches they might result in different amount of time taking in each branch. This might result in an attacker finding out some information about the secret key that is being used. It's important that the difference should be reduced as much as possible. This is usually not a problem if it's implemented in hardware.
SSL/TLS SessionA typical SSL/TLS session uses those things:
- A certificate chain. Each of those certificates contain:
- A public key. That needs to be big enough.
- A signature which is usually a combination of a hash with an encryption algorithm. This is signed by public key of next CA in the chain, or a self-signed certificate like a root CA. The hash algorithm's collision resistance is important. But this isn't important for a self-signed certificate, like a root CA, since you either trust that or don't.
- a key exchange method so that you can share a secret key for the session. This might contain a separate temporary key in the case of (EC)DHE, in which case it needs to be big enough.
- a cipher
- a MAC
- You need to check that they are still valid. This can be done using a CRL or via OCSP. But nobody seems to be downloading the CRLs and not all CAs offer OCSP.
- You need check that the hostname of the certificate you get actually matches the hostname you're trying to connect to.
The client sends it's list of supported ciphers to the server and the server will then pick one. This is usually the first from that list that is supported by the server, but it might also be the order that is configured on the server that is used.
Current status in software
If you go looking at all of those things, you find problems in most if not all software. Some of that is to be compatible with old clients or servers, but most of it is not.
Apache only supports 1024 bit DHE keys and they don't want to apply a patch to support other bit size. Apache 2.2 doesn't offer ECDHE but 2.4 does.
I don't know of any good site has lists which browser supports which ciphers, but you can test your own browser here. It lacks information about EC curves that your client offers. You can of course as look at this with wireshark.
Mozilla currently has a proposal to change it's list of supported ciphers here. They currently don't have TLS 1.1 or 1.2 enabled yet, but as far as I understand the NSS library should support it. They should now have support for GCM, but they still have an open bug for a constant time patch. In general Mozilla seems to be moving very slowly with adopting things.
Last I heard Apple still didn't patch Safari for the BEAST attack. | <urn:uuid:973c321d-4b6c-4107-9816-aa42706a1648> | CC-MAIN-2022-33 | https://www.roeckx.be/journal/State_of_encryption.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.965195 | 1,861 | 3 | 3 |
The Ambassador of the European Union to the Republic of Mauritius, Marjaana Sall and the Minister of Finance and Economic Development, the Honourable Pravind Jugnauth signed a new technical cooperation facility for the amount of 2 million euros.
The Ambassador of the European Union to the Republic of Mauritius, H.E. Marjaana Sall said: “The Technical Cooperation Facility that we are signing here today is the first initiative to be implemented in the framework of the EU-Mauritius bilateral cooperation programme up to 2020. It will support the process for Vision 2030 which aims at transforming Mauritius into a High Income Country.”
The European Union and the Republic of Mauritius have a longstanding partnership. This partnership now covers a wide range of policy areas, including: maritime security, trade and investment opportunities, environmental protection, climate change mitigation, migration and culture.
The EU accompanies the Republic of Mauritius to evolve to a High Income Country. The EU-Mauritius bilateral cooperation programme up to 2020, which was signed in June for the amount of 9.9 million euros, is in line with the Government priorities to improve the human capital base, and to contribute to unlock growth. The programme targets the Higher Education sector while putting emphasis on Research and Innovation.
The new technical cooperation facility of 2 million euros (approximately 80 million Rupees), which was signed today, is the first initiative to be implemented in the framework of the EU-Mauritius bilateral cooperation programme.
The facility will support the preparation and implementation of projects, and provide appropriate technical support to the Government in areas of mutual interest related to EU polices. The facility will also provide for studies, analytical work, training, seminars, peer to peer learning and knowledgesharing initiatives that will contribute to enhancing capacity building.
Distributed by APO on behalf of European External Action Service (EEAS). | <urn:uuid:1b1d9313-195e-4269-9a13-d1ad4e31788a> | CC-MAIN-2022-33 | https://african.business/2016/12/finance-services/european-union-republic-of-mauritius-signature-of-a-new-technical-cooperation-facility-of-2-million-euros/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.917792 | 390 | 1.59375 | 2 |
Exactly what Wiring Diagram?
A new wiring diagram is an easy visual representation from the physical connections plus physical layout of your electrical system or even circuit. It displays how the electric wires are connected with each other and may also display where fixtures and elements may be linked towards the system.
When and How to Use a Wiring Picture Use wiring blueprints to assist in building or manufacturing the circuit or perhaps electronic device. They are usually also useful with regard to making repairs.
12 24 Volt Trolling Motor Wiring Diagram
DO-IT-YOURSELF enthusiasts use electrical wiring diagrams but they usually are also common inside home building and auto repair. For example, a home builder will want to confirm the physical location of electrical outlets in addition to light fixtures using a wiring diagram in order to avoid costly errors and building code violations.
How to be able to Draw a Signal Plan SmartDraw comes with pre-made wiring diagram templates. Personalize hundreds of electric symbols and rapidly drop them into the wiring diagram. Specific control handles close to each symbol let you quickly resize or perhaps rotate them as necessary.
To draw a wire, simply click around the Draw Lines option on the particular left hand aspect of the drawing area. If you right click on the line, you could replace the line's shade or thickness plus add or get rid of arrowheads as necessary. Move a symbol onto the line in addition to it will put in itself and take into place. When connected, it will remain connected even though you move the particular wire.
If a person need additional emblems, click on the arrow alongside the visible collection to bring upward a drop down menus and select A lot more. You'll be in a position to search for additional symbols in addition to open any appropriate libraries.
Click on Set Line Hops in the SmartPanel to show or perhaps hide line hops at crossover factors. You can also change the size and shape of your line hops. Select Display Dimensions to display the length of your wire connections or size regarding your component.
Exactly how is a Cabling Diagram Different coming from a Schematic?
The schematic shows the particular plan and performance for an electrical circuit, but is not necessarily concerned with the physical layout from the wires. Wiring diagrams show how the particular wires are attached and where they should found in the particular device, and also the physical connections between all the components.
How is a Wiring Plan Different from the Pictorial Diagram? As opposed to a pictorial plan, a wiring picture uses abstract or simplified shapes plus lines to exhibit parts. Pictorial diagrams are usually often photographs together with labels or highly-detailed drawings of typically the physical components.
Standard Wiring Diagram Emblems In case a line pressing another line provides a black department of transportation, it means the particular lines are linked. When unconnected outlines are shown traversing, you'll see a line hop. | <urn:uuid:ddcc83d9-f121-472e-87b4-7aa84e414b60> | CC-MAIN-2022-33 | https://wiring.coloring.best/12-24-volt-trolling-motor-wiring-diagram-download/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.907295 | 590 | 3.265625 | 3 |
How To Ensure That Your Car Remains Fit To Drive Through Maintenance.
Considering Buying a second-hand car can be the best option for individuals who cannot meet the big investments of buying a brand new car. Before the cars could come to a common thing to individuals, long walking distances were involved but nowadays individuals have the privilege to enjoy all the travelling services from cars at their convenient time and place.
Routine maintenance and servicing is required for any car at particular intervals to help the vehicle to give service all through without failure and delays. Environment is full of gases and objects that subject cars to wear and tear and regular servicing is the only solution to these unavoidable circumstances that face cars.
The owner of the car should ensure that the auto repairing shop that he goes for regular servicing of his car is the right one so as to save the maintenance costs involved. Vehicle components need little maintenance costs than the repair cost in the case of full breakdown of the vehicle and individuals should consider taking their cars for regular servicing.
Operation costs if not taken care of, the vehicle can stop operating for quite some time and cater for this problem, regular servicing and maintenance while checking the gas level is very important to reduce the possibility of paying a large amount of money on gases especially when their prices rise drastically.
Commuting in a car that receives regular servicing increases its life while in the other avoiding to take your car for
maintenance can end the dreams of using your car for a long period of time as the car can stop fully from functioning requiring extreme investment to repair.
Unwanted problems, delays, and breakdowns while trying to reach your destination can be avoided through regular maintenance.
Not all the individuals would like to keep their cars with them for a very long period of time, servicing their cars at regular intervals has been the best solution for their cars to look new and sell them at almost the same value as the one that they had bought them.
Planning your car servicing and maintenance regularly while ensuring that you take your car to the right auto shop will save you a lot of money while ensuring that you get regular travel services from one point to another at a convenient time. | <urn:uuid:4fe82500-6947-41a9-930c-ec07ba2e3d28> | CC-MAIN-2022-33 | https://www.open-rhone-echecs.com/short-course-on-services-what-you-should-know.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.964183 | 438 | 1.75 | 2 |
A Langford author and his daughter have teamed up to publish a funny new book for children and their parents.
David Bradshaw, 74, and his daughter Lisa Johnson, 49, have created 'Tooth Mouth Fang Beak', which features a set of funny poems from the animal kingdom.
Believe it or not, David first put pen to paper around 40 years ago, when he wrote the pieces during quiet periods at work.
No hosepipe ban in Biggleswade area says Anglian Water
Changes to Schools for the Future programme will impact Shefford and Stotfold cluster and Aspley Guise
Biggleswade Dental Centre holds grand open day to celebrate new makeover
Pub in Biggleswade saved as plans to turn the listed building into a house are rejected
Man injured in light aircraft crash at Shuttleworth airfield
However, four decades later, the father and daughter joined forces to bring his poems to a wider audience, with talented artist Lisa providing the illustrations.
David said: "Animals are often anthropomorphized in children’s books.
"Then came the idea of taking the process a stage further by illustrating various animals with medical problems that afflict humans. Whoever heard of a pig with halitosis, or a snake that lost a fang?"
In 'Tooth Mouth Fang Beak' youngsters will meet a slithery character with dental problems, a porky farm animal with bad breath, a lion that has lost his teeth, and a parrot that won’t let anyone look in his mouth.
There's even a story about a rat with compassion!
David said: "The five animals featured in the book all tell a story, with a happy ending as all children’s books should have. The characters come to life because of the amazing artwork, especially as some animals are old but still sensitively and humorously depicted.
"It was nice having a project with my daughter. We get on extremely well."
David was born in Stamford in 1947, but his family moved to the country when he was 11-years-old.
He spent his working life in financial services, and later moved to the village of Langford.
He laughed: "I began writing [at work] because in those days there were jobs where you didn't have enough to do!
"The idea started because I thought that animals must have medical problems, too, just as they affect humans in different ways.
"My daughter was beginning to get old enough to do the drawings - originally the early ones were poster-sized."
Fast forward to the 21st century, and the book has taken David and Lisa 18 months to put together - with all the pictures redrawn and fitted around the verses on the pages.
The father and daughter held a book signing to celebrate the launch, which took place in Lisa's business 'The Place' in Stamford.
The Place is a craft and community centre (which Lisa owns and runs in partnership with a friend) while she is also a busy mum, home schooling her young daughter.
Tooth Mouth Fang Beak, from Austin Macauley Publishers, is available to buy online from stores including Amazon, WHSmith, and Blackwell's.
It is recommended for children aged three to five.
For more information, please visit:
> Readers may also recognise David's name, as his book 'Edie’s Last Christmas' was published in 2020 and featured in the Chronicle. | <urn:uuid:910e22fd-579f-45aa-bb26-cea5b3ff8c91> | CC-MAIN-2022-33 | https://www.biggleswadetoday.co.uk/news/people/langford-dad-teams-up-with-daughter-to-publish-funny-childrens-book-tooth-mouth-fang-beak-3523919?itm_source=parsely-api | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.982045 | 745 | 1.726563 | 2 |
At Wolpert Insurance, we are keeping the victims of the recent Boston Marathon tragedies in our hearts and minds. We pray that officials will resolve the situation soon, and for now, we are committed to remaining strong and showing our support Boston.
Due to such threatening events, the National Limousine Association is offering a “Heightened Awareness Alert” guide for front line staff, including chauffeurs and limousine drivers. Does your livery company have a plan in place during times of heightened awareness? If not, then you should establish one so your employees can remain safe and out of harm’s way during a catastrophe.
Although terrorist attacks may not target limousine companies directly, you should still take precautionary action, especially since your customers may be traveling to the spots being targeted. As an owner operator, you need to train your drivers to be observant and helpful to officials by following the rule, “If you see something, say something.”
When creating a training course for your employees, you should make sure each lesson helps them prepare for personal safety hazards. First, make sure they have a firm grasp on the area they will be servicing. Each employee should be able to find appropriate destinations for customers, be proficient in map reading, know regional area safe/danger zones, and find emergency facilities in case a mishap occurs.
Since your staff works mostly alone and interacts with the public at all hours, they are at an increased risk for accidents and harm. This is why when they should always wear their seatbelts and practice safe driving techniques. Other security measures that can be taken are keeping the doors locked and windows up when parked. Also, if a driver is unfamiliar with the surroundings, they should keep the vehicle running during a pickup.
Using safety devices such as partitions or shields that separate the driver’s area from the passenger area will help avoid dangerous situations. In addition, installing security cameras, emergency signs, and panic buttons can keep drivers safe during times of heightened awareness. With the proper training, your chauffeurs can avoid accidents, injuries, liability issues, and more, especially during times like this. | <urn:uuid:85429ba7-6345-4d17-9a86-b5bb9c375e14> | CC-MAIN-2022-33 | https://liveryexchange.com/2013/04/19/training-your-employees-to-have-heightened-awareness/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.954391 | 439 | 1.523438 | 2 |
Why I find MySQL to be so bad compared to Firebird
MySQL is the most used Open Source database engine. I have personally used it for almost 10 years. I worked with versions 3.x, 4.x and 5.x of MySQL, but I also used other database engines, some of them handling the same “data-set size” as MySQL, while others have been smaller databases (mostly Desktop based databases such as SQLite, MS-Access and Paradox).
This is the first part of my complaint about MySQL and why I dislike it. | <urn:uuid:ca87c070-d15f-4db5-bd95-877c04755c14> | CC-MAIN-2022-33 | https://www.firebirdnews.org/why-i-find-mysql-to-be-so-bad-compared-to-firebird/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.949135 | 116 | 1.515625 | 2 |
Load and resistance characterization of tunnels under explosive threat scenarios
Tunnels are key elements in modern traffic networks, often crossing rivers and city regions with a high traffic density and important, highly frequented buildings and infrastructures in close proximity. Against this background, economical and societal consequences of large scale accidents and malicious threats such as fires, explosions, etc. are potentially very high. Furthermore, a comparatively small initial damage to the structure might lead to a disproportionate effect for the tunnel itself, the whole urban infrastructure system, or structures which are founded above or beneath the tunnel. In order to evaluate how critical and vulnerable a structure or its elements are, many stages of analysis have to be carried out to lead to an evaluation of the object under consideration. Explosions in tunnels have an extremely low probability of occurrence in comparison to other statistically certain events (wind, live loads), but at the same time, an enormous damage potential for structure, life and environment. The scenario of explosions with a criminal, terrorist background is additionally subject to further, sometimes subjective criteria so that the probability of occurrence has to be combined with a plausibility check Therefore, a method categorized as deterministic has been chosen for the investigation and evaluation of the possible extent of damage. The paper presents combined with the scheme explained in important elements for such an evaluation procedure. Within this context, the paper will focus on the local and global structural integrity of tunnel constructions in the event of explosions. In order to assess this local and global structural integrity, it is of high importance to quantify the loading on and the resistance of the different tunnel types adequately. Therefore, methods will be presented to capture the dynamic loading and the structural resistance, especially taking the dynamic soil response under large stresses and strains into account. | <urn:uuid:e7f1dc1f-d6fd-45f0-b47c-334af7871537> | CC-MAIN-2022-33 | https://publica.fraunhofer.de/handle/publica/391442 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.916455 | 377 | 1.703125 | 2 |
The Zork books were a series of four books, written by S. Eric Meretzky, which took place in the fictional universe of Zork. The books were published by Tor Books. Like the Zork video games, the books were a form of interactive fiction which offered the reader a choice of actions symbolized by pages to turn to, as in the contemporary book series Choose Your Own Adventure or the later Give Yourself Goosebumps series. The protagonists of each book were a boy and girl, called Bill and June on Earth and re-dubbed Bivotar and Juranda in Zork. The settings and plots were reminiscent of locations and events from the Zork universe.
At each ending the player received a score from zero to ten based on how far they had made it through the book and, if the ending were a failure, a chance to try again at the incorrect choice. The books also usually contained a "cheater trap", reached by opting to use an item which does not exist (at least not in the current book). In these traps, the story abruptly ends; the reader is chastised and not given a chance to try again.
The books were written in English and translated into Spanish. All four books were published as "What-Do-I-Do-Now Books". Copies did contain publication errors—page numbers that the reader was directed to turn to or turn back to were at times incorrect. The first three books were published as a trilogy in August and September 1983; each has the titles of the other two listed opposite the cover page. The fourth book in the series was published in October 1984.
The Forces of Krill
The first book in the Zork series, The Forces of Krill, used familiar Zork locations and scoring systems. Bivotar and Juranda are on a quest to find the three Palantirs of Zork and to defeat the evil sorcerer Krill. There were 20 possible endings.
The Malifestro Quest
The second book in the Zork series, The Malifestro Quest, contained several inside jokes for those familiar with the Zork games. Bivotar and Juranda must rescue the hero Syovar and two quirky elves, Fred and Max, from the evil wizard Malifestro. There were 18 possible endings.
The Cavern of Doom
The third book in the Zork series, The Cavern of Doom, tried to capture the "exploring the dungeon" motif of the earlier games. Bivotar and Juranda search the Cavern of Doom, which is an uncharted portion of the Great Underground Empire and the site of several mysterious disappearances, including the elves Fred and Max. There were 17 possible endings.
Conquest at Quendor
The fourth book in the Zork series, the Conquest of Quendor, featured silly riddles reminiscent of Zork II. Bivotar and Juranda search for the Helm of Zork in an attempt to bring peace to the Land of Frobozz, in defiance of Jeearr, a riddle-telling demon. There are 17 possible endings.
Other books based on Zork
Of six novels published as "Infocom Books" by Avon Books between 1989–1991, two were directly based on Zork: The Zork Chronicles by George Alec Effinger (1990) and The Lost City of Zork by Robin W. Bailey (1991).
Colin Greenland reviewed The Forces of Krill, The Manifestro Quest and The Cavern of Doom for Imagine magazine, and stated that "Any child of any intelligence will swiftly realize they're being patronized, and will return to their own fantasies - and a good thing too."
- S. Eric Meretzky (1983). The Forces of Krill. ISBN 0-8125-7975-5.
- S. Eric Meretzky (1983). The Malifestro Quest. ISBN 0-8125-7980-1.
- S. Eric Meretzky (1983). The Caverns of Doom. ISBN 0-8125-7985-2.
- S. Eric Meretzky (1984). Conquest at Quendor. ISBN 0-8125-5989-4. | <urn:uuid:d36661fa-0b2b-42e0-acca-b6481d3a84f6> | CC-MAIN-2022-33 | https://en.wikipedia.org/wiki/Zork_books | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.955119 | 902 | 2 | 2 |
Stanley Spencer was an English, early modernist, painter and draughstman, mainly of ambitiously sized biblical works. He studied at the Slade School of Art, where his contemporaries included Dora Carrington, Paul Nash, David Bomberg and C.R.W. Nevinson. Nevinson dubbed Spencer 'Cookham', after the artist's profound attachment to the Berkshire village of his birth which appeared in almost all of his pictures, and where, most days, he would take the train back home in time for tea.
Spencer was an official war artist in both World Wars, serving in Macedonia from 1916, and creating his monumental series of paintings of shipbuilding on the Clyde from 1941. He was commissioned to paint murals for the Sandham Memorial Chapel in Burghclere which was dedicated to the war dead.
Spencer's romantic life was extremely complicated, to put it mildly. He married Hilda Carline, a student at the Slade, in 1925, however he met the artist Patricia Preece four years later in Cookham and became infatuated with her. A week after Hilda divorced Spencer in 1937 he married Patricia, who, rather inconveniently, was a lesbian. She continued to live with her partner, Dorothy Hepworth, and though she frequently posed nude for her husband, she refused to consummate the marriage. Patricia persuaded Spencer to sign over the house to her and when the bizarre relationship finally broke down, she never granted him a divorce.
Spencer's works were greatly admired by Lucian Freud, and some of his nude paintings of Patricia Preece were clearly influential to Freud. It is however his epic works such as The Resurrection, Cookham (1923–27), clearly set in the village and with actual residents taking part, for which he is chiefly celebrated and remembered. | <urn:uuid:f879e362-4cf3-456a-b0f6-97dbd28312d0> | CC-MAIN-2022-33 | https://www.archeus.com/bookshop/artist/spencer-stanley | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.989724 | 382 | 2.234375 | 2 |
npm is written in Node.js, so you need to install Node.js in order to use npm. You can install npm via the Node.js website, or by installing a Node Version Manager or NVM. This chapter explains both options.
If you just want to get started exploring npm, using the Node.js installation method is fastest. If you are an advanced developer ready to jump in and work with versions, use the node version manager. If you aren't sure, please read this chapter before you decide. You can always change how you run npm in the future.
If you're using OS X or Windows, use one of the installers from the Node.js download page. Be sure to install the version labeled LTS. Other versions have not yet been tested with npm.
If you're using Linux, you can find installers by scrolling on the Node.js download page, or, check NodeSource's binary distributions to see if there's a more recent version that works with your system.
After installing, run
node -v. The version should be v8.9.1 or higher.
When you install node.js, npm is automatically installed. However, npm gets updated more frequently than Node.js, so be sure that you have the latest version.
To test, run
To be sure that this matches the latest version, scroll to the bottom of this page. If the version you see does not match the latest version, run:
npm install npm@latest -g.
This will install the latest official, tested version of npm.
To install a version that will be released in the future, run:
npm install npm@next -g.
Since npm and node.js products are managed by different entities, updates and maintenance can become complex. Also, the Node.js installation process installs npm in a directory that only has local permissions. This can cause permissions errors when you attempt to run packages globally.
To solve both these issues, many developers opt to use a node version manager, or nvm, to install npm. The version manager will avoid permissions errors, and will solve the complexities of updating Node.js and npm.
In addition, developers can use an nvm to test their applications on multiple versions of npm. The nvm enables you to easily switch npm as well as node versions. This makes it easier to ensure that your applications work for most users, even if they are using other versions of npm. If you decide to install a version manager, use the instructions for the version manager you select to learn how to switch versions, and to learn how to keep up-to-date with the latest version of npm.
Click here to learn how to install nvm for MacOs.
To install and manage npm and Node.js on Windows, we suggest nvm-windows.
Click here to learn how to install nvm for Linux.
For more advanced users
If you want to try the next, unreleased version of npm to test that packages you have created will work with the planned next release of npm, use this command:
npm install npm@next -g
This may simply reinstall the current version, depending on the development cycle. Also, this early version is not final. So features may or may not match what is ultimately released.
To learn more about how to use nvm, click here.
Last modified March 01, 2021 Found a typo? Send a pull request! | <urn:uuid:93925967-8c0d-49b8-9297-7230221e9fd0> | CC-MAIN-2022-33 | https://www.npmjs.cn/getting-started/installing-node/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00065.warc.gz | en | 0.867025 | 722 | 2.921875 | 3 |
Medicare Part B (Medical Insurance) covers power-operated vehicles (scooters) and manual wheelchairs as durable medical equipment (DME) that only your doctor may prescribe for use.
You must have an in-person examination and a written prescription from a doctor or other treating provider before Medicare helps pay for a power wheelchair. Power wheelchairs are covered only when they are deemed medically necessary.
If your supplier accepts your assignment, you pay 20 percent of the Medicare-approved amount, and the Part B deductible will apply. Medicare pays for different kinds of DME in different ways. Depending on the type of equipment that you need, you may need to rent or buy the equipment.
Doctors and suppliers have to meet certain standards to enroll and stay enrolled in Medicare. If your doctors or suppliers aren’t enrolled, Medicare won’t pay the claims submitted by them.
It’s also important to ask your suppliers if they participate in Medicare before you get DME. If suppliers are “participating” suppliers, they must accept the assignment. If suppliers are enrolled in Medicare but aren’t “participating,” they may choose not to accept the assignment. If suppliers don’t accept the assignment, there’s no limit on the amount they can charge you.
What to Know
As of September 1, 2018, you may have to get prior approval (known as “prior authorization”) for certain types of power wheelchairs. Under this program, 33 types of power wheelchairs require “prior authorization” before Medicare will cover the wheelchair cost.
Your DME supplier will need to:
- Request “prior authorization”
- Send the request and required documents to Medicare
You don’t need to do anything. If your physician prescribes one of these wheelchairs to you, your DME supplier will, in most cases, submit a prior authorization request and all documentation to Medicare on your behalf. Medicare will review the information to make sure that you’re eligible and meet all requirements for power wheelchair coverage. Your Medicare coverage and benefits will stay the same, and you shouldn’t experience delays getting the items you need.
Your prior authorization request may be denied if:
- Medicare finds you don’t medically require a power wheelchair.
- Medicare doesn’t get all the information needed to make a decision.
- If additional information is needed, your DME supplier may resubmit your prior authorization request. | <urn:uuid:5b0c14cd-5e04-4e1d-8e1d-40f622d40da6> | CC-MAIN-2022-33 | https://medicareworld.com/service-details/electric-scooter/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.908865 | 530 | 1.601563 | 2 |
“Factory-kitchen” is an old, forgotten word, which smells like cabbage soup, borscht, cutlets, meatballs. Many, however, remember such institutions.
Thousands of people walked inside. To satisfy one’s stomach, one simply had to come to the great hall and choose a dish. Satisfied, paid and walking companions. And use the saved forces in production, build socialism!
In the pamphlet “On Life”, published in 1927, the People’s Commissioner for Education Anatoly Lunacharsky wrote:
“We can not reconcile with a small smoking kitchen for 5-6 members of the family, because we know very well what is possible with the same money… to give excellent healthy food in the atmosphere of a bright dining room with good music, newspapers, chess, in a good atmosphere that gives joy and relaxation during dinner; all this can be given for the same funds spent on a gloomy homemade borscht … with every spoon we eat women’s freedom, women’s dignity, women’s dignity future “
Beautiful, isn’t it? Only a woman’s surviving strength should have been spent not on herself, not on being elegant and attractive – this was considered a bad, urban tone – not on raising children, but on working up a sweat on the machine, carrying sleepers, unloading bricks. This is the concern of a woman who had the party and the government…
The “People’s nutrition” (“Narpit”) partnership was responsible for overseeing and preparing work for the design of kitchen factories. His specialists built gastronomic businesses in various cities of the USSR. One of the first kitchen factories in the country opened in Samara on Novo-Sadovaya Street 90 years ago – in 1932 and was designed by architect Ekaterina Maksimova.
There were: an ordinary dining room, a children’s and a diet. There was a summer terrace for dining outdoors. The building also housed a shop, a hair salon and a post office. In general, it was possible to combine the useful with the necessary.
The hero of Yuri Olesha’s novel “Envy” – the director of the food industry trusts Andrei Babichev, built a huge house – a kitchen factory. Of course, the main room was the kitchen itself – myriad, fiery, full of food odors. An entire army of cooks mingled around the hearths. The largest kitchen factories could produce up to 60 thousand (!) Meals a day. There was a workshop where they monitored the quality of the food, a convenience store, a snack bar, a regular, banquet halls and festive events.
The first kitchen factory in Moscow opened on Leningradskoe shosse – now Leningradsky Prospekt, designed by architect Alexei Meshkov. The plates were heated with oil, the dishwasher conveyor was washed and dried three thousand dishes per hour, the electric bread cutter cut hundreds of kilos of bread. In the kitchen factory worked potato peelers, vegetable peelers, electric meat grinders.
“On average, more than four thousand dishes were sold here tonight,” the newspapers wrote. – The menu is very different. The price is not more than the cost of the respective work buffets. So, for example, vegetable salad – 3 kopecks, white fish teshka -1 ruble, pork -1 ruble 50 kopecks, fresh muffins – 25 kopecks, cakes – 35 kopecks. An orchestra was playing in the cafeteria.
Having had enough, one could read books, newspapers and magazines, play chess and checkers. And just chat with friends. Kitchen factories also served as a kind of club.
Lev Kassil sang a real ode to the factory-kitchen: “In the great hall there are 24 snow boilers with shiny nickel lids. The tiled floor is sparklingly clean … 24,000 first courses can be cooked in these cauldrons …
The used slabs are collected in many parts of the room, here they are discarded in hatches for clippings and the slab itself is placed on a mesh rotating base of the conveyor and lowered to the lower floor. There she takes a bath with boiling water, goes through a hot dryer, to come back to the surface in a minute on the top floor with the glow of its porcelain purity.
Another colorful excerpt is poetic, written by Yaroslav Smelyakov:
And now the hostess is sitting in the dining room
and eats (suppose) chicken broth.
The broth he got
for a very low fee
which boiled it in huge cauldrons
girls in bathrobes.
And in front of the hostess the flowers are burning,
like the best burners in the world,
and on the side of the hostess, like stars, they shine
By 1936, according to the All Moscow Address Book, there were 25 kitchen factories in the capital. It was located at Bolshaya Tulskaya Street, 52/2, Budyonny Avenue, 21, Kutuzovsky Avenue, 36, 1st Vladimirskaya Street, 12a, Novozavodskaya Street, 12/11 and other parts of the city.
However, over the years, the popularity of factory kitchens began to decline. The food there was plentiful, satisfying, but not very tasty. However, he cared little. Renowned dietitian Manuil Pevzner has argued that delicious food is an urban bias. The main thing is that it should be healthy: not spicy, not fried, but “calm” – boiled, stewed, with plenty of carbohydrates, fats and calories.
However, people did not want to eat formal, in addition, faceless food, but their own, homemade. Not only to be full, but also to enjoy. In addition, the Bolsheviks talked about it. As, for example, the popular commissioner of the food industry Anastas Mikoyan: “The taste must be developed. “Our people are not yet accustomed to delicious food, they are not accustomed to the taste of certain products, they do not know what asparagus is, they do not know how to eat cheese.” The People’s Commissar recalled the case when mandarins were brought to the collective farm and the villagers ate them with the peel.
However, kitchen factories continued to work in the USSR for a long time. Many people were busy and did not want to waste time in a gastronomic shed. We bought semi-finished products in stores, heated and …
Mikoyan himself said: “Workers should have at their disposal a factory product or an intermediate product that requires only a little heating, they should have spices from any recipes for this product. Any taste “.
But some people still eat. In addition, a whole army of people has appeared who can not imagine any other food. However, I will not disagree with the tastes. Talk about the benefits and the disadvantages – too. | <urn:uuid:9b788e5b-5c30-408d-87df-8bc5ecb36708> | CC-MAIN-2022-33 | https://banggiaxemoi.com/2022/04/30/60-thousand-meals-a-day-factory-kitchen-of-the-ussr/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.966215 | 1,513 | 1.953125 | 2 |
M-Bus (Meter-Bus) is a European standard (EN 13757-2 physical and link layer, EN 13757-3 application layer) for the remote reading of gas or electricity meters.
M-Bus is also usable for other types of consumption meters. The M-Bus driver is compatible with all devices that support the M-Bus protocol.
To use this driver, or to evaluate it, you need to download the last release of eWon Drivers eXtender from the Download section.
With eWon Drivers eXtender you can retrieve, from one or more M-Bus devices, the available data.
Tested on Itron Ultramax and Itron TH4 series, using an M-Bus Level-Converter PW3 gateway on RS232 port. | <urn:uuid:579954eb-f601-4772-8df2-12d2b32d004f> | CC-MAIN-2022-33 | http://ewondrivers.cpsistemi.it/index.php/en/drivers-eng/89-mbus-eng.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.842518 | 167 | 1.703125 | 2 |
The Coronavirus Pandemic may be the most warned about event in human history. Surprisingly, we even did something about it. President George W. Bush started a pandemic preparation plan and so did Governor Arnold Schwarzenegger in CA but in both cases when a pandemic didn’t happen in the next several years those plans withered away. We ignored the important in favor of the urgent.
It is evident that the US government finds it difficult to invest in long-term projects, perhaps especially in preparing for small probability events with very large costs. Pandemic preparation is exactly one such project. How can we improve the chances that we are better prepared next time?
…we would like organizations tasked with protecting the public from low-probability, high-cost events to be funded on a permanent basis that is not subject to budgetary discretion or degradation. Instead of yearly appropriations, it’s preferable to have a one-time appropriation to finance a stream of investments. The financial means of doing this is to buy a bond with an earmarked revenue stream. That is, instead of selling bonds the government buys long-term safe bonds which pay out dividends that are earmarked to a program, in this case to pandemic preparation.
There is a well-known example of such a financing scheme, the social security trust fund. The social security trust fund was established in 1937. It buys long-term safe bonds that pay dividends that are used to finance social security payments. Unlike the pandemic trust fund I propose, the Social Security Trust Fund buys bonds on an ongoing basis but that is a relatively unimportant difference.
The Social Security Trust Fund buys the safest form of government bonds, which has given rise to a long-standing controversy over whether the trust fund is a “fiction.”10Of course, the trust fund is a kind of fiction but so are federalism, checks and balances, and the Constitution. Fictions can be powerful because they create shared understandings that govern behavior and determine equilibrium action. The trust fund does what it says—it increases trust by indicating that Social Security payments are higher in creditor priority than other spending. Just as Section 507 of the Bankruptcy Code increases trust by indicating that secured bondholders get paid before unsecured creditors such as a company’s suppliers. Since 1937, the Social Security Trust Fund has always held net assets, and when it briefly ran deficits in the 1970s and early 1980s, the Greenspan commission was established to shore up the system.11 That is, the simple existence of the Trust Fund as an accounting entity created an awareness, which made it easier to act to maintain the Fund.
A Pandemic Trust Fund would begin with a $250 billion investment in bonds earmarked to pandemic preparations. At current effective rates of interest of about 3%, this is enough to support spending of $7.5 billion annually.12 Note that $7.5 billion is nowhere near enough to address the current pandemic, but that is because we did not invest enough in pandemic preparation. Had we invested $7.5 billion in pandemic preparation every year for the last two decades, for example, we would be in much better shape today. The $7.5 billion is for annual ongoing preparation.
…A Pandemic Trust Fund invested in $250 billion of government bonds is an accounting fiction that may be readily agreed upon today at the height of the crisis because it has few current costs. Yet, as we have discussed, accounting fictions can have real power in changing the future allocation of resources.
Read the whole thing, it is also includes some interesting info on clever DOD contracts that have advanced pandemic preparations. | <urn:uuid:2c7a8d27-9be8-4fa0-9431-64c2d8b996db> | CC-MAIN-2022-33 | https://marginalrevolution.com/marginalrevolution/2020/05/a-pandemic-trust-fund.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.96569 | 752 | 2.4375 | 2 |
The Americans with Disabilities Act (ADA) was signed into law July 26, 1990. It prohibits the discrimination of people with disabilities in healthcare, voting, businesses, community events, criminal justice, technology, school, work, etc. I am one year older than the ADA. In my lifetime, I’ve seen many improvements to technologies, practices, and research on assisting individuals with disabilities and understanding their capabilities, but the ADA has remained the same. So, is this law enough?
Did you know that even with these rights, many disabled people struggle to make the decision to get married due to laws around the issue of combined incomes? Disabled parents run the risk of losing their children if they disclose their diagnoses to the wrong person, as they could be deemed unfit to parent due to assumptions about their disability. Many have limits on their earned income due to the potential of losing crucial benefits. You see, even if you made enough money to survive without government benefits, often support services are only accessible through government funding. Each state is different, of course, but that’s the case for many. Even the things the ADA does protect are often outdated.
If your business or event is just meeting ADA, you’re fulfilling a legal obligation. At AWS Foundation, we set a precedent to prioritize projects that go beyond what is required by law. A key criticism is that the ADA does not address many needs of individuals with disabilities. New buildings (or upgrades on old ones) must have wheelchair accessibility, but tables and desks are often too low for a power wheelchair user. Ramps are great, but can a wheelchair user access all parts of your space (including being able to work there)? Is a blind person able to access an accurate menu on your website that is accessible to their screen reader? Would the volume of the music in your business be overwhelming for someone with a sensory sensitivity (concerts excluded, obviously)?
No matter the scenario, you will find that the ADA covers some important aspects of disability life, but not everything.
What can be done? There isn’t just one answer. We need to create a ripple effect to enact change that will last. Be mindful of issues that affect disabled people and vote for local, state, and federal leaders with the interests of those constituents at the forefront of their work. Encourage city planning and business practices that implement Universal Design (see Joni’s article) over standard ADA. If you are a business owner, leader, or decision maker, consider how Universal Design elements benefit all customers, not just ones with disabilities. Most importantly, listen to people with disabilities and work on understanding their needs. Simple actions can make a significant impact for everyone. | <urn:uuid:ad770a4f-675c-476e-88fa-b7c61f3fec33> | CC-MAIN-2022-33 | https://www.awsfoundation.org/is-the-ada-enough/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.97065 | 549 | 2.96875 | 3 |
The UN Human Rights Council on Friday held an event titled "Urgent Debate on Afghanistan" on the human rights situation in the country, where the "violation" of the rights of women become the main focus of the participants.
Speaking at the event, the UN High Commissioner for Human Rights Michelle Bachelet called for the protection of Afghan women.
“Together with Afghan women in the lead, we must ensure that the rights of all women & girls are protected & promoted,” Bachelet said.
The UN Rapporteur for Afghanistan, Richard Bennett, who was speaking at the conference, refered to his visit to Afghanistan, saying: “Degradation of women’s rights was essential to their ideology. These violations include forced early and child marriage, restrictions on women’s attire or movement, exclusion from education and public life and barriers to employment.”
Referring to the rights of women in Afghanistan, Fawzia Koofi, former MP, told the Urgent Debate on Afghanistan of the Human Rights Council to “move from” their “beautiful statements and resolutions to practice” and use their “leverage."
Also, the Afghanistan representative in Geneva, Nasir Ahmad Andisha, said that the situation of women rights is the “worst” in Afghanistan.
“Reports coming out of Afghanistan clearly indicates the situation of human rights, particularly, those of women and girls (is) today...the worst anywhere else on the planet,” he said. | <urn:uuid:5557ec58-03cd-4f43-9de8-bf4e77fe882b> | CC-MAIN-2022-33 | https://tolonews.com/science-technology-178743 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00065.warc.gz | en | 0.948672 | 316 | 2.046875 | 2 |
MADISON, Alabama -- U.S. Rep. Mo Brooks had little good news for the audience at a town hall meeting in Madison Saturday.
Brooks, R-Huntsville, said many people do not understand the seriousness of the country's $1.4 trillion budget deficit and long-term debt problems. He raised the specter of eventual U.S. insolvency unless major changes are made.
"Great nations weaken from within before they fall from without," Brooks said, echoing a number of similar quotes from U.S. officials who expressed grave concern about the country's national debt and growing budget deficit.
Brooks showed figures and charts on the growth in government spending in the past three years, the continued high unemployment rates and the size of foreign ownership of U.S. debt, including about 29 percent by China and 19 percent by Japan.
Brooks, who was elected last November, told the crowd that in early August Congress will have to hold a vote on whether to raise the U.S. debt ceiling, currently at $14.2 trillion. Experts have warned that lifting the debt ceiling is necessary to ensure the U.S. meets its financial obligations over the short run through borrowing.
Brooks said the current looming deadline gives lawmakers a chance to dramatically cut spending. He said the Republican majority in the U.S. House is committed to doing that, but the Senate, which is controlled by Democrats, and President Barack Obama have a different vision.
Brooks said House Republicans oppose defense spending cuts and any tax increases while Democrats favor increasing taxes.
Brooks said he would not vote to raise the debt ceiling unless spending cuts are made this year, to the tune of $300 billion to $500 billion, or roughly 9 percent of the entire annual budget.
Brooks, an attorney, also wants to see Congress pass legislation calling for an amendment to the Constitution that requires a balanced budget each year. Brooks said spending cuts won't go far enough and there is no predicting how future members of Congress would vote.
Brooks said he wants to see an amendment that would require votes of three-fourths, or possibly two-thirds, of both the House and Senate before an unbalanced budget would be allowed for a given fiscal year.
Audience members spent more than an hour questioning Brooks on issues ranging from illegal immigration, federal regulations, oil drilling and the wisdom of the "Fair Tax." Brooks said he supports the fair tax proposal, which calls for the elimination of federal income and payroll taxes and replaces it with a national sales tax of 23 percent.
A longtime critic of U.S. immigration policy, Brooks said he supports any measure, "short of shooting them," that would force illegal immigrants back to their home countries. He said Congress is unlikely to do anything on the issue in the next few years.
Brooks also called for President Obama to carefully consider whether U.S. forces need to remain in Afghanistan. He said the U.S. should not be involved in Libya's civil war and called on European and Asian nations to take a larger role in the Persian Gulf and Middle East.
Brooks said the U.S. can no longer afford to be the world's policeman and said he favors cutting up to 90 percent of the country's foreign aid commitments.
In calling for changes to Social Security and supporting U.S. Rep Paul Ryan's plan to eventually turn Medicare over to private insurers, Brooks said the country has to seriously address its huge budget deficit and national debt. Failing to do so will be catastrophic, he said.
"The American people need to decide what direction they want to go," Brooks said. | <urn:uuid:4d103638-7399-4ccf-9ae2-fcaf06187958> | CC-MAIN-2022-33 | https://www.al.com/breaking/2011/06/us.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.970769 | 750 | 1.664063 | 2 |
This was our first research trip for Some:when – a chance to meet people, learn about the place, connect with the water, track down information about the elusive Flatner, and start piecing together plans for making the boat.
To get to Langport we decided to take the train to Bridgwater and follow the waterways inland, cycling cross-country to get a feel for the watery landscape of the Somerset Moors and Levels.
As far as we could, we followed the River Parrett – tracing in reverse the planned journey of the Flatner. Close as we were to the water, we barely saw it – instead we found ourselves cut off from the river by the high embankments, hemmed in between pumping stations and dusty hedges.
The brief spectacular views of the river showed us a rapidly changing scene, from the mud slicks and buried bicycles of Bridgwater to bucolic, leafy bends, canal boats and herons. Further upstream, we came suddenly on the signs of dredging – long armed diggers perched above smooth-sided, geometrical slopes of clean-scraped mud. A small sign beside a row of riverside houses read ‘Dredge the Rivers’ in vivid red paint. Signs were everywhere: warning signs, planning notifications, road closures, and – scrawled across the road in white spray paint – ‘Flooded To Here’.
The view from Burrow Mump had transformed. We had each been here before, earlier in the year, to see the broad silvery reaches of the Winter floods. I recalled the flocks of wildfowl strung out along field edges, wheeling lapwings, and swans bright against the dark strings of willow. Now two buzzards circled, lazily calling, above hay meadows and lush green fields. We refilled our water bottles at the King Alfred Inn and set off towards our first rendez-vous at the SAW offices in Langport. The road dipped between lush meadows then wound its way into a cluster of steep hills. Gradually we climbed above the floodplain and made our way into Langport. | <urn:uuid:8b7a6ec3-da7e-4217-b8b2-e5344e4678dd> | CC-MAIN-2022-33 | https://some-when.co.uk/tag/dredge-the-rivers/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.949185 | 442 | 1.875 | 2 |
|File size||17.33 MB|
|Date of Creation||October 8 2021|
Old Stock-Illustrator Actions Description
Old Stock Adobe Illustrator Actions for CS3, CS4, CS5, CS6 and CC.
What is Old Stock? Old Stock is a set of over 130 Actions for Adobe Illustrator. They cover a wide range of vintage and modern drop shadows and fills to create beautiful and striking effects for your designs. They can be used on any vectorized type or object. Old Stock creates the effects in vector and separates and groups the shapes for you. All you need to do is apply your own color!
Created especially for:
- Graphic Designers- Graphic Designers will benefit from the ease of use of Old Stocks Actions. Complex effects can be effortlessly produced in record time. This offers the Graphic Designer a wide array of effects for their logos and layouts.
- Type Designers- Type Designers can use Old Stock’s Actions to add drop shadows and fills to their new or existing typefaces. Every Action is vectorized and separated for ease of use. Old Stock does all of the hard work for you!
What is included in the package:
- Old Stock has over 130 Actions ranging from drop shadows to fills.
- Old Stock Fill – 16 Actions that provide a wide range of fills.
- Old Stock Inset Fill – 16 Actions that provide a wide range of inset fills.
- Drop Shadow – These Actions produce a drop shadow that goes right up to the letter or object. Small, medium and large versions are included for a total of 30 Actions.
- Drop Shadow with Outline – These Actions produce a drop shadow with an outline. Small, medium and large versions are included for a total of 30 Actions.
- Drop Shadow Minus Outline – These Actions produce a drop shadow without an outline. Small, medium and large versions are included for a total of 30 Actions.
- Drop Shadow Gradient – These Actions produce a shaded drop shadow. Included is drop shadow, with outline and also without outline. Small, medium and large versions are included for total of 9 Actions.
- Expander – Add Old Stock swatches to text or an object, and the Expander action converts the swatch into a vectorized object.
Old Stock-Illustrator Actions Preview
Old Stock-Illustrator Actions Video
This video demonstrates how to use Old Stocks Actions in a graphic and type design setting.
Old Stock Installation.
Old Stock Tutorial – Creating a simple drop shadow, split shade, modern use and fills.
Old Stock tips and troubleshooting.
Learn More About Old Stock-Illustrator Actions
You’ve scrolled all the way down here so I imagine you’ve looked at all of the pictures and mockups to give you an idea of what’s included in the ‘Old Stock-Illustrator Actions’ bundle. Otherwise, quickly scroll up to discover those graphics – I assure you, it’s worth the effort.
You know what the best part about this bundle is? It’s cheaper with us than anywhere else on the web. For just $25 you’ll be able to download the zip file with the graphics as listed above, and also an instruction manual and also a promo code for any subsequent buys. So, how big could be the price reduction? The normal price tag for the bundle is $ ~$200 . Then, the price reduction is an unbelievable 71%. Incredible! You most probably won’t find a better price, our bundle compiling crew guarantees that!
The zip file is pretty compact – approximately 17.33 MB – so you’ll get the product on your computer almost instantly. Oh yeah, by the way, if the price tag of $25 for personal use or $100 for commercial use still appears just a little bit more than you were prepared to pay – take a look at the section under the Buy Now button. Promote the page on the social networking sites and here’s your additional 5% off!
This ‘Old Stock-Illustrator Actions’ bundle bundle is an artwork by Borgeslettering. Head out and check out Borgeslettering’s Masterbundles page. Who knows, he might so happen to have some other impressive graphic products and you might be all the more surprised with the most affordable prices.
When I was writing this text, there was 0d:11h:5m:21s remaining before the bundle expiration. The product owner might reactivate it later but if I were you, I won’t be testing my luck and hurry up to make a purchase right away!
This ‘Old Stock-Illustrator Actions’ bundle is a part of the Illustrator Add-ons category. In case you’ve decided to go on a shopping spree – check other suitable bundles in the category – it’s never the best time than right now.
All of our clients get the chance to rate the items they purchased. As you can see this bundle received 15 ratings with an average of 5 points. Get this bundle and have a go at rating this bundle – I’m confident it’s another 5 😉 Additionally, you will come to be part of Masterbundles family, with an additional benefit of even more deals on any following transactions.
Give us a call at +1(888) 598-03-31 or ask any additional questions via chat – we’re here for you!
Happy bundle shopping! | <urn:uuid:c68667e3-9468-41df-b772-a82f274fd3a8> | CC-MAIN-2022-33 | https://masterbundles.com/borgeslettering/old-stock-illustrator-actions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.902608 | 1,191 | 1.640625 | 2 |
Today, many parents and educators work vigilantly to guide children along the “right” path, hoping it will lead to a bright future. Adults, naturally, believe they know just what that path should look like, often drawing on their own experience or colleagues’ advice. But this top-down approach often leaves parents feeling pressured, educators struggling, and youth stressed and lagging behind their international peers.
Two new books by developmental scientists work in tandem to rescue children from overinvolved parenting and from outdated educational practices. Their guidance is refreshing and based on decades of solid, cumulative evidence on how children really develop.
Wanted: Parents as gardeners, not carpenters
Alison Gopnik is an internationally recognized developmental scientist and author of The Gardener and the Carpenter: What the New Science of Child Development Tells Us About the Relationship Between Parents and Children. Today’s parents were not raised with the experience of caring for young children, Gopnik says, and so they come to parenthood after extensive education and work, and approach parenting like another subject to be mastered: “Get a book, take a course, and things will come out well.” Parents, she says, believe that if they can just learn the right techniques and do the right things, the child will turn out the right way: well-educated and prepared for success.
Drawing on her own and others’ cognitive research, along with evolutionary theory and philosophy, Gopnik concludes that children were not meant to be “molded” in the way parents are molding them today. Babies and young children should be raised in safe spaces protected by adults, but they are wired to be “explorers” of information and their environment in order to become efficient and innovative in adulthood. They need their freedom protected and made safe in order to mess around.
Babies and toddlers are keen observers of their world, actively and accurately interpreting what people and objects do and why they do it—like little scientists. Preschoolers use words to investigate their world. One study found that preschoolers can ask 75 questions per hour, not as bids for attention but to “extract” information from the adults around them. And through imaginative and pretend play, young children experiment with their understanding of people and objects, preparing them for engagement in their social world later.
Gopnik points out that the messy experimentation of early childhood, along with the intense motivation to explore and take risks in adolescence, is crucial for the human species to innovate, evolve, and adapt to a rapidly changing environment. This implies that education and caregiving should encourage, rather than constrain, exploration. In other words, we shouldn’t seek ways to hammer and nail our children into a predesigned shape, like a carpenter working on a piece of wood. Instead, we should approach children like a gardener would a garden—“providing a rich, stable, safe environment that allows many different kinds of flowers to bloom.” The resulting diversity of outcomes is what allows children to prepare for a future that adults cannot yet see.
The Gardener and the Carpenter is a sophisticated read, not a prescriptive, how-to-parent book. But it does allow a peek under the hood of how children develop and what they really need from the caring adults around them. The book charts a strong, philosophical course, from which specific actions and decisions naturally follow.
It does falter somewhat, though, in its practical relevance to a world where parents are often pinched between their own desire to “garden” and the demand from schools to be “carpenters.” Here, another new book picks up the baton to offer guidance.
Transforming schools into gardens
In Becoming Brilliant: What Science Tells Us About Raising Successful Children, Roberta Michnick Golinkoff and Kathy Hirsh-Pasek, scholars of education, psychology, and cognitive science, make a case for a transformation of education that aligns neatly with Gopnik’s thesis.
According to Golinkoff and Hirsh-Pasek, our current content-driven approach to educating children is failing. Students are made to be passive consumers of content (or “knowledge digesters”), as if preparing for the world of 1953, rather than becoming the “knowledge transformers” needed in an increasingly competitive global environment. Programs like No Child Left Behind and Common Core—with their focus on “hard skills” and the mastery of content, both very “carpenter”-like approaches to education—have failed children, and teaching has regressed to an emphasis on test preparation.
Children need the kind of education that prepares them to think, be creative, and innovate. Drawing on input from business leaders as well as the science of learning, Golinkoff and Hirsh-Pasek suggest six core competencies that will create the “thinkers and entrepreneurs of tomorrow”: collaboration, communication, content, critical thinking, creativity, and confidence. The authors detail how these skills build upon each other throughout development and try to point out how each competency can be “scaffolded” (broken down into teachable components) at different ages. However, that section of the book is left sufficiently vague as to be of questionable help to naïve parents.
There is converging evidence that Golinkoff and Hirsh-Pasek are correct in broad strokes and that children and schools do better when there is an emphasis on softer skills, like social and emotional learning. However, just what those soft skills are has not yet been determined in the wider world, and you can find other, well-researched lists of skills from the World Economic Forum, the Collaborative for Academic, Social, and Emotional Learning, or the Yale Center for Emotional Intelligence. While all of these qualities surely correlate, scientists do not truly understand which is most foundational.
So, while perhaps the ship is headed in the right direction, the specific course we should be charting remains to be worked out.
The book to keep on your bedside table
Why should parents, educators, grandparents, and alloparents care about these different frameworks for raising children? Because decades of research show that our beliefs—about the nature of children and about how children best grow and develop—inform our daily practices. If we understand ourselves to be “gardeners,” we will patiently and reliably answer young children’s questions and make safe spaces for risk-taking teens. If we know that children do best when they are encouraged to develop their “soft skills,” we will make sure schools teach with that in mind.
But in moment-to-moment decision-making, it can be hard to suss out a concrete choice of action. That’s why, even as a developmental scientist, I value good nuts-and-bolts advice like the kind you’ll find in Erica Reischer’s What Great Parents Do: 75 Simple Strategies for Raising Kids Who Thrive.
Though the title’s hyperbole is unfortunate, her 75 tips are based on sound developmental science and parenting experience. The tips lie at the intersection of “gardening,” secure attachment, authoritative parenting, and soft skills. I would recommend keeping the book handy and reading just one tip every so often. That’s about all busy parents can digest, anyway. | <urn:uuid:574c88ec-ae98-4219-b409-2e236ce85108> | CC-MAIN-2022-33 | https://greatergood.berkeley.edu/article/item/how_to_help_children_unleash_their_potential | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00065.warc.gz | en | 0.950146 | 1,551 | 3.203125 | 3 |
South Korea scrambles jets to respond to Russian, Chinese warplanes
28 November 2021 | 2:41 pm
South Korea's Joint Chiefs of Staff said the incursion off its east coast lasted roughly 10 minutes. Beijing later said the warplanes entering South Korea's air defense identification zone was part of an exercise.
30 Nov 2021
Can NATO strike the right balance of force and diplomatic fortitude to make the Kremlin back off? Aboard the British aircraft carrier HMS Queen Elizabeth, Teri Schultz tees up a key meeting of foreign ministers in Riga.
5 Dec 2021
Since France began its military withdrawal from Mali, many social media posts have been misleading. Reports assert that Mali is negotiating with the Russian private military company Wagner. One photo on Facebook from November 10 claims that a Wagner military instructor is training Malian soldiers. Another photo from November 20 claims that Mali received a delivery of military equipment from Russia. We tell you more in this edition of Truth or Fake.
1 Dec 2021
Since France began its military withdrawal from Mali, many misleading social media posts have appeared. Reports claim that Mali is negotiating with the Russian private military company Wagner. One photo on Facebook from November 10 allegedly shows a Wagner military instructor training Malian soldiers. Another photo from November 20 claims to show that Mali received a delivery of military equipment from Russia. We take a closer look in this edition of Truth or Fake.
2 Dec 2021
German academic Adrian Zenz tells DW how new documents show that speeches made by Chinese President Xi Jinping and other top leaders link the government to the crackdown on Uyghurs in Xinjiang.
6 Dec 2021
Citizen journalist Zhang Zhan is in a Chinese prison for reporting from Wuhan during the height of the city's coronavirus outbreak in 2020. Her family says she is on hunger strike and could be near death. All calls for her release have gone unheeded.
11 Dec 2021
The Chinese ride-hailing app Didi has announced plans to shift its shares from the New York Stock Exchange to Hong Kong. It's among the first in what could be a series of delistings due to new regulations in both the US and China. Some 200 Chinese firms could be affected, with huge consequences for investors. Also on the show: Europe's tourism sector hopes the latest Covid-19 surge won't throw off their end-of-year bookings.
7 Dec 2021
French Armed Forces Minister Florence Parly granted an interview to FRANCE 24 and RFI in Dakar, Senegal. Parly slammed a "disinformation campaign" aimed at creating "anti-French discourse" in Africa's Sahel region, as France reorganises its military presence there. The minister said she did not believe Russian Wagner Group mercenaries were in the Malian capital Bamako, but added that "that does not mean the current Malian authorities are not planning to bring them there". The arrival of Russian mercenaries in Mali would be "simply unacceptable", she said.
9 Dec 2021
The Chinese property giant Evergrande has missed a key debt deadline and is inching closer to a possible restructuring. Financial Analyst Danni Hewson explains why the meltdown isn't sparking turmoil on global stock markets. Also in the show: the Carbon Disclosure Project releases its 2021 ranking of sustainable business practices.
12 Dec 2021
South Korea garnered early success in battling COVID-19. But as the country has begun to open up, daily case numbers have hit new highs. The government is considering reimposing restrictions. For businesses already struggling, that is not good news.
12 Dec 2021
Shares in the Chinese property company Kaisa have been suspended from trading in Hong Kong, as fears mount that the firm may be unable to make a $400 million debt payment due on Thursday. Kaisa is a much smaller player than the troubled giant Evergrande, but also has high levels of foreign debt. Also today, we look at how the United Arab Emirates has changed its working week to Monday-Friday to align with other international business hubs.
14 Dec 2021
Australian Prime Minister Scott Morrison and South Korean President Moon Jae-in have signed a defense deal worth 1 billion Australian dollars as the two countries mark 60 years of diplomatic relations.
15 Dec 2021
As Mali and Russia continue to strengthen their military cooperation, a video purporting to show Russian helicopters during military exercises in Mali does not necessarily seem that far-fetched. So how to go about debunking it? Find out in Truth or Fake.
46 mins ago
A small group of women rallied in the Afghan capital for the first time in months, demanding a return of their freedoms, after the Taliban reneged on promises to maintain the marginal gains women made in recent years.
48 mins ago
Europe's second-largest river is continuing to dry up, affecting freight barges and even forcing one passenger ferry to halt its operations entirely. But rain is forecast this week.
2 hours ago
Spaniard Rafa Nadal said Sunday that he hopes to return from an abdominal injury this week in the Cincinnati Open after not playing for more than a month.
2 hours ago
While the fight for supremacy on the battlefield continues, it seems the fight for the hearts and minds of the Russian people may have already been won. Support for the war remains high; so too does indifference. Pollsters are trying to find out why.
2 hours ago
More than three decades after Iran's leader issued a fatwa, Teheran has blamed Rushdie's supporters for the knife attack on the award-winning novelist in the US.
2 hours ago
As calls grow louder in the European Union for a ban on Schengen visas for Russians, thousands of Russian tourists are using Finland as a transit country to the West. DW's Juri Rescheto reports from Riga. | <urn:uuid:e4abc3c8-6f25-4d57-9f34-1445203e4b55> | CC-MAIN-2022-33 | https://tv.guardian.ng/news/world-news/south-korea-scrambles-jets-to-respond-to-russian-chinese-warplanes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.954486 | 1,195 | 1.554688 | 2 |
In Seine-Madureira, one of the worst-hit cities, nearly 70% of its area was flooded or flooded, and more than 4,000 families were relocated, the fire service said.
In Rio Branco, the capital of Accra, television images showed large parts of the city flooded.
Water levels in several municipalities fell on Wednesday, but more rain is expected this week.
The floods pose greater difficulties for a poor country that has already struggled with a resurgence of COVID-19, a dengue outbreak and a migration crisis on its border with Peru.
Acre confirmed 622 new COVID-19 cases on Tuesday, according to the health ministry.
Governor Gladson Cameli said on Tuesday that he had asked for more oxygen to be sent to Acre to treat a growing number of patients and avoid a public health disaster like the one in the neighboring state of Amazonas. Earlier this year, in the capital of the Amazon, Manaus, oxygen was missing in hospitals, forcing the families of patients to find the cylinders on their own.
“I won’t be surprised by someone’s death because I didn’t have oxygen,” Cameli said.
The state also suffered more than 10,000 suspected cases of dengue fever in the first two months of this year, more than twice as many as in the same period in 2021, according to the G1 internet news. Cameli warned that after river levels recede, dengue and other mosquito-borne diseases are likely to spread more aggressively, increasing pressure on the public health system.
“I ask professionals who are able to come here to help us,” he said.
Finally, the authorities must deal with the protracted migration crisis on their border with Peru. About 400 migrants arrived in Acre’s border town of Assis Brasil in mid-December.
The migrants, mostly Haitians and Venezuelans, were trying to cross the border with Peru on their way to Mexico and the United States, federal authorities said. But the Peruvian government closed the border with Brazil last year, due to the COVID-19 crisis.
Brazilian Citizenship Minister Miguel Ângelo Oliveira said migrants had been misinformed that the border in Assis Brasil had reopened. Clashes between migrants and Peruvian police forces erupted last week.
Copyright 2021 The Associated Press. All rights reserved. This material may not be published, broadcast, transcribed or distributed without permission. | <urn:uuid:96be895d-33b4-4cbb-86ec-26862672e766> | CC-MAIN-2022-33 | https://currentglobe.news/brazilian-prime-minister-bolsonaro-visited-the-flood-affected-jungle-state-of-the-amazon/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.967021 | 518 | 1.820313 | 2 |
Enbridge to court: State can't override feds' pipeline regulation on Line 5
Michigan can't order the Line 5 oil and gas pipelines on the Straits of Mackinac lake bottom shut down even temporarily over concerns about anchor strikes or other damage — only federal regulators of interstate pipelines have that authority, Enbridge's attorneys argued in an online court hearing Tuesday.
The company is fighting a preliminary injunction sought by state Attorney General Dana Nessel, seeking to keep Line 5 shut down until Enbridge provides the state with all information related to "significant damage" found June 18 to an anchor support on the east leg of the twin underwater pipelines, and a mark from some object apparently striking the west leg of the line, potentially affecting its outer protective coating.
The state wants its own evaluators to determine whether it is safe to continue operations of either or both of the pipelines. Nessel's office cites the state's 1953 easement with Enbridge allowing it to place and operate the pipes on the state-held lake bottom. A provision in that easement requires the pipeline operator "at all times shall exercise the due care of a reasonably prudent person for the safety and welfare of all persons and all public and private property."
Ingham County Circuit Court Judge James Jamo last Thursday ordered Enbridge to shut down Line 5 in the Straits, pending the outcome of Tuesday's hearing on a temporary injunction. After more than four hours of testimony Tuesday, Jamo said he would consider the evidence and issue a written ruling, likely within the next few days.
"Underlying this case, and relevant to this motion, there is a serious risk of harm, not only to natural resources, but to many communities — that endangers, or potentially endangers, the livelihood of many people and businesses," assistant state attorney general Robert Reichel said.
Though Enbridge last week provided state officials with engineering reports and video from its remote-operated vehicles inspecting the underwater pipes, critical information is still not available to the state to evaluate whether the pipelines should continue operating, Reichel said.
Enbridge now believes that the damage was done to the individual underwater lines by two separate boats in separate incidents — one ship traveling east-west through the Straits, dragging something other than an anchor, perhaps a cable, based on drag marks and the glancing loss of outer biological coverings on the west leg pipeline, and the other ship traveling north-south through the Straits, parallel to Line 5, that caused the damage to the east leg anchor support.
"They've hypothesized about it, but there's been no determination of cause," Reichel said. "And even more remarkably, there's been no determination of when these events that gave rise to these conditions occurred. There's no evidence that Enbridge has systems in place that have the capacity to detect when they incur impacts by foreign objects to the pipelines — which, needless to say from the state's perspective, is extremely concerning."
The state contends there are still important pieces of information that have not yet been provided by Enbridge.
"Without full information, the state cannot exercise the duty that the court recognized it has to protect the public trust and to ensure compliance with the 1953 easement," Reichel said.
Enbridge attorneys, however, said they have agreed to provide the state with all information they are sharing with the federal Pipeline and Hazardous Materials Safety Administration, or PHMSA, which allowed the west leg of the twin pipelines to resume operations June 20, before Jamo's order temporarily halted the flow.
"The burden of supporting the attorney general's preliminary injunction motion is, of course, on the attorney general. She has not come close to meeting it," Enbridge attorney David Coburn said.
"Neither the attorney general, nor any other organ of the state of Michigan — or any other state, for that matter — can serve as the regulator of an interstate pipeline. The state is preempted from doing so expressly by the Pipeline Safety Act," a 1979 federal law passed by Congress to bring uniformity to the regulation of interstate pipelines, he said.
Though Enbridge acknowledges the "due care clause" in the 1953 easement, the authority designated by law to determine whether it is exercising due care is PHMSA, company attorney William Hassler said.
"If Enbridge is not acting consistent with its due care obligations, in terms of safety, then the state can complain about that to PHMSA," he said. "What it cannot do is start regulating safety on its own."
Jamo at one point in Tuesday's hearing appeared to question PHMSA's diligence in reviewing the damage Enbridge had found to Line 5 before allowing resumption of oil and gas flows on the western pipe. He noted that PHMSA indicated it agreed to resume the western flows "based on Enbridge's assurances that there are no issues or damage to the west line."
"Where in all of that ... is it documented that PHMSA undertook any kind of analysis and reached an independent conclusion?" the judge asked.
Enbridge attorneys noted that within days of PHMSA's statement, the agency had reviewed its video inspection footage and other provided pipeline integrity data.
Hassler at one point argued that the strikes and damage, which don't appear to be severe enough to have occurred from a large ship's anchor, were not significant enough to cause a safety concern with the thick underwater pipes.
"There is no iota of evidence in the record that (the damage that's occurred) is dangerous," he said. "If (the state) want to put into evidence that the east line is unsafe, they have not done that."
Enbridge proposes as a longer-term solution to the aging Line 5 underwater pipelines a $500 million tunnel beneath the Straits of Mackinac lake bottom, into which a single, 30-inch oil and gas transmission line would operate.
But the Michigan Public Service Commission on Tuesday ruled that the project wouldn't get an automatic go-ahead, but will instead require a contested-case hearing process.
Contact Keith Matheny: 313-222-5021 or firstname.lastname@example.org. | <urn:uuid:5c32e011-5f87-4c0c-93d6-3c11f87e01ad> | CC-MAIN-2022-33 | https://www.freep.com/story/news/local/michigan/2020/06/30/enbridge-court-override-feds-regulation-line-5-straits-mackinac/5352591002/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.962498 | 1,264 | 1.617188 | 2 |
HSE Report Reveals Ongoing Legacy of A Disease That Continues To Claim Thousands Of Lives
The government’s annual report into cancer deaths linked to exposure to asbestos has revealed the areas in the UK with the biggest concentration of cases.
Published on 7 July, the updated report on Mesothelioma Mortality in Great Britain: 1968-2019 by the Health and Safety Executive (HSE) shows that 1,945 men and 424 women died from mesothelioma, a terminal cancer of the lining of the lungs or abdomen in 2019.
There were 2,369 mesothelioma deaths in Great Britain in 2019. This is seven per cent lower than the 2,540 average over the period 2012-2018 and would seem to suggest deaths have peaked and reflect the long-expected downward trend in mesothelioma deaths.
Specialist lawyers at Irwin Mitchell, who have represented thousands of families affected by mesothelioma and other asbestos-related diseases, say the figures are a distressing reminder that the danger posed by asbestos is far from over and continues to impact the lives of thousands of people.
The report reveals 12,000 lung disease deaths are estimated to be linked to past exposures at work, with mesothelioma and other asbestos-related lung diseases making up 40 per cent of the total.
The top five areas with the most men who died from mesothelioma are unchanged from last year. Figures covering 1981 to 2019 show that Barrow-in-Furness ranks first with 289 deaths, followed by West Dunbartonshire at 289 deaths and North Tyneside with 547 deaths, with South Tyneside and Portsmouth ranked fourth and fifth with 414 and 443 deaths respectively.
The local authority areas are ranked using standard mortality ratios (SMRs), which compares the actual mesothelioma deaths recorded to how many were normally expected to die in the area.
The top three areas with the most female deaths are also unchanged from last year’s report, with Barking and Dagenham top with 87 deaths, followed by Sunderland and Newham (East London) at 156 and 75 deaths respectively. West Dunbartonshire (Clydeside) with 39 deaths and Barrow-in-Furness with 30 deaths are fourth and fifth.
Annual mesothelioma deaths in Great Britain increased year-on-year over a 50 year period, but there is a slight downward trend now. There were ten times as many deaths in the period 2010-2019, compared with 1970-79.
Areas with major shipbuilding activity continue to have higher SMR rates, while men who worked in the construction industry when asbestos was widely used in the post-war years, continue to be most at risk, the HSE said.
Some occupations, such as carpenters, plumbers, electricians and others associated with the construction industry come up most frequently on death certificates for men, with 46 per cent of mesothelioma in men born in the 1940s attributed to building work.
The picture for women is more mixed, due to fewer cases being directly linked to occupation. The report suggests only third of mesotheliomas in women were a result of either occupational or domestic exposure – including the risk of living with a worker exposed to asbestos.
This contrasts with the Gendered Experience of Mesothelioma Study (GEMS) undertaken by the University of Sheffield on behalf of Mesothelioma UK and supported by Irwin Mitchell, which shows women remain largely unaware of the dangers posed by asbestos and can be reluctant to come forward and seek the support they may be entitled to.
The release of the HSE report comes in the wake of Action Mesothelioma Day on 2 July, a time for patients and their families to raise awareness of the illness and the importance of upholding safety standards at all times.
Expert Opinion“Following the challenges faced by the country during the Covid-19 pandemic, it’s easy to forget that deaths from asbestos-related diseases like mesothelioma remain stubbornly high.
“The vast majority of mesothelioma sufferers’ encountered asbestos in their working lives, often decades prior to diagnosis and these HSE figures show that the risk to health remains very real.
“Northern England and parts of Scotland which were associated with heavy industry such as shipbuilding and the manufacture of asbestos products continue to dominate the figures, but areas such as Portsmouth, Plymouth and Southampton also make the top ten for similar reasons.
“Through our work, we see the terrible impact of this asbestos related cancer on people and their families. While there remains no cure, an early diagnosis gives the best possible chance for treatment and improving quality of life.
“It remains vital to continue to fight not only for justice for those exposed to asbestos, but to raise awareness, and campaign for the removal of asbestos from public buildings and also to ensure better funding for mesothelioma research and improving survival rates.” Adrian Budgen - Partner | <urn:uuid:0dd10318-f75b-4a8c-8c90-cc4e3c04bdf5> | CC-MAIN-2022-33 | https://www.irwinmitchell.com/news-and-insights/newsandmedia/2021/july/new-report-reveals-northern-britain-remains-top-for-asbestos-related-cancer-deaths | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.957643 | 1,053 | 2.515625 | 3 |
3 Things To Do To Improve Self Confidence
All good communication begins with the self. But, sometimes were our worst enemy. So, working on your confidence is key.
The New York Times interviewed Mental Health professionals, and here are three things you can do today!
1) Try things that make you uncomfortable
Yep, this means maybe speaking up at the meeting, if you usually don't. Or, simply striking up a conversation with someone new. What about something crazy and fun like Buffalo Riverworks Silo climbs?
Says Dr. Adam D. Galinsky, a professor at Columbia Business School,
“Confidence is ultimately about being comfortable in a wide variety of situations that would make most people feel uncomfortable,” he said. “So if you stretch your comfort zone every day, very quickly you’ll have a large comfort zone and be able to feel more comfortable even when outside of it.”
2) Try a new look. Here's a great excuse to go shopping.
How you dress can affect how other people perceive you, but it can also affect how you perceive yourself. Wearing different clothes can prompt you to think or behave differently. If you want to feel more confident, dress the way a confident version of yourself would.
If you are on a budget, you could try the Fashion Outlets of Niagara Falls.
3) Defy your impostor syndrome
Impostor syndrome is a nasty mental bug that convinces you that your accomplishments don't really count and that you’re going to be found out as a fraud. This doubt can creep in because it’s easier to remember faults but more difficult to remember successes. Make a habit of periodically writing down or reflecting on times you’ve done things well. It’s easier to be confident in your abilities when you remember them
So, take away: Baby step challenges, go shopping for confidence boosting clothes, and grab a notebook to write down all the things you are doing well. :-) | <urn:uuid:427e403e-dee9-4dc8-9d1f-406178d98763> | CC-MAIN-2022-33 | https://961thebreeze.com/3-things-to-do-to-improve-self-confidence/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.950007 | 415 | 2.328125 | 2 |
"It's Not Just What You Learn, It's Who You Will Become"
Established at Loyola Marymount University in 2007 and funded by a grant from the U.S. Department of Education, as well as generous contributions from LMU, Upward Bound (UB) is a federally-funded TRIO Program designed to provide educational and personal support services to increase high school graduation, college enrollment, and college graduation rates of its participants. In 2017, LMU received funding for an additional program, Upward Bound Math & Science (UBMS).
The two programs serve high school students from low-income families in which neither parent has earned a bachelor's degree. Services include academic advising and workshops, tutoring, college visits, assistance with the college and financial aid application process, enrichment activities, community service, leadership opportunities, and a residential summer school experience on the LMU campus. UB serves 58 students from Westchester Enriched Sciences Magnet (WESM) and UBMS serves 60 WESM students.
UB and UBMS ensure equitable access to, and services for participants. No student will be denied admission consideration based on gender, race, national origin, color, disability or age.
Interested in joining Upward Bound Programs?
Fall 2020 Updates
Remember to check your e-mail and UB/UBMS social media platforms for any additional updates.
Save the date: Tuesday, September 1, 2020 at 6:00 pm - Fall 2020 Parent & Student Orientation
Also, please visit California Department of Public Health's guidelines, the CDC's guidelines, LAUSD, and LMU's Coronavirus Website for the latest information and tips to remain healthy during these uncertain times. | <urn:uuid:31737eed-07c5-43d6-b2d2-6eb2caba0de1> | CC-MAIN-2022-33 | https://soe.lmu.edu/centers/upwardbound/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.938822 | 350 | 1.882813 | 2 |
Touch devices have quickly overtaken traditional mouse and keyboard devices (device sales, mobile usage). The current landscape is such that we can confidently assume our visitors will be experiencing our web pages on their phones first and then on their desktops second… if we are lucky. The tricky thing is, when we speak of touch devices, we are not only referring of small screen devices (like phones and tablets) but we are now talking about all device sizes.
The large device market has been quickly incorporating touch capabilities into large tablet, laptops and desktops. Recently Apple introduced the iPad Pro, joining Google Chromebooks, and Microsoft Surfaces and laptops as large format (typically 11-13” and above) touch enabled devices.
Commonly in Responsive Web Design both designers and developers have used arbitrary size (usually around 750px) for the breakpoint between touch devices and mouse and keyboard devices. This commonly segregates styles and functions giving assumed desktop sizes more robust elements and ignoring considerations for touch. This practice was not reliable, and is becoming increasingly problematic.
We should avoid hiding content behind hover states that can be finicky on different touch browsers. Ensure that links, buttons, and form elements have a large enough “touch target” (Luke Wroblewski has a great reference). Interactive elements (like carousels) should accept touch gestures by using plugins like hammer.js and others. And form fields should utilize specialized virtual keyboards on mobile operating systems whenever possible.
Mobile First Design has become an important part of how we think about the conception of our web pages. More and more we need to remember that these lessons do not end at a certain widths… they are continuous throughout the experience no matter the screen size or device. | <urn:uuid:ec9dbfe9-0353-4670-ae56-7f04d3ff921d> | CC-MAIN-2022-33 | https://aha.elliance.com/2015/10/15/touch-is-big/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.925351 | 353 | 2.25 | 2 |
I have been working with JJ’s List and I always find myself learning about their presentations and workshops in which they present to different communities all over. In fact on February 17, 2012 the JJ’s List Disability Awareness Players went over to Glenview State Bank, to give employees from all GSB branches at corporate headquarters a presentation.
The JJ’s List Disability Awareness Players is a cross-ability team that teaches disability awareness through fun, skills-building interaction. With the players’ help and encouragement, GSB staff underwent practice on 21st Century disability-speak called “person-first language” and role-played to build confidence interacting with a person who has a disability. In addition, The Players and staff also practiced one-to-one networking skills to help The Players build soft skills for employment readiness. ” Jake Joehl, one of the JJ’s List players comments, “the training at GSB went really well because they were really receptive to what we had to say as a group. Also, I especially liked the networking part of the presentation because it was good to meet the staff one-to-one and talk to them about different things associated with employment and job readiness.”
From the feedback received, every training attendee said they would recommend this workshop to other businesses. When asked, “what part of today’s session was most valuable for you and why?” Tim Gaida, a GSB Vice President said, “to see and hear the JJ’s List players openly discuss their disabilities and the perspective that they provided in discussing the ways in which they prefer to be addressed was the most valuable part of the session.” Tim also added, “while I have dealt with individuals with various disabilities in my 30 plus years of working with the public, I have never been educated in the proper ways of addressing those with disabilities. Hearing it first hand from the JJ’s List players was profound.”
Why is it so important for businesses to be trained in disability awareness? In my opinion, it is highly important because people with disabilities are people too. Employment is just as important to us and we need the job skills and networking experience in order to be successful. In addition, it is important for businesses to engage in a working environment that is diverse in all abilities and walks of life. No one’s abilities should be limited or challenged. Instead we should all be treated with respect and equally, not by our faults or by our limitations. On that note, Danka Tasiopoulos, another GSB Vice President said, “it is great that JJ’s List is educating people about ways to communicate with disabled persons. All of us have faults and need to respect and treat people equally.”
If you would like to learn more about disability awareness training for your business or organization, please contact us at email@example.com or 847-869-0000.
About the Author
My name is Ariel Singer and I am 23 years old who graduated college with a bachelors in Human Services. I love to help people and volunteer my time as well as learn new things. Learning new things is a little challenging for me because I, Myself have a learning disability. I do not let it phase me instead I work hard and advocate for myself. I currently volunteer at JJ’s List and I am loving it because I am treated with respect and they work with me and encourage me to be all I can be and I believe that is what Businesses should be doing with their employees. I am very proud that GSB is taking initiative to collaborate and understand Person First Language.They will now be able to serve their customers more effectively. | <urn:uuid:c3ec384d-82cb-4d64-ae97-8a72ea4b1dad> | CC-MAIN-2022-33 | https://www.jjslist.com/blog/disability-awareness-training-at-gsb | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.978341 | 770 | 1.742188 | 2 |
Find Out What A Frenectomy For A Baby Is
We Offer Frenectomies For Babies
- Quick procedure
- No anesthesia required
- Improved breastfeeding
- Better experience for mom
- Prevent development issues.
If you’re like most first-time parents, you haven’t heard of a frenectomy for a baby. Well, as your pediatric dentist in London, we’ll share what you need to know about this procedure.
Some babies are born with a lingual frenum that is too tight or short, which affects the movement of their tongue and ability to breastfeed correctly. This thin, white strip of tissue goes from the floor of the mouth to the bottom of the tongue.
What Is A Frenectomy?
It’s a very straightforward outpatient procedure that is completed in seconds. During the procedure, we cut the lingual frenum. It may sound like it would be a painful process, but it’s not. We don’t need to use anesthesia! And right after it’s been done by your child’s pediatric dentist, they can go to breastfeeding.
When the flap of tissue is too tight, it’s known as a tongue-tie. Symptoms for the mother and child include:
- Painful nipples
- Decreased milk production
- Gas pains (baby)
- Loud suckling.
If left untreated, a tongue-tie can cause future problems. Infants can find it hard to chew and swallow firmer foods. It can impact the development of their jaw and result in unhealthy sleep patterns, increased gas and bloating, and mouth breathing.
A significant tongue-tie can also affect speech development because the tongue cannot move as freely as it should. Another downside is that the tongue cannot spread saliva over teeth to help clean them.
To find out if your baby needs a frenectomy, give our friendly team a call! We’d be happy to talk about it and book an appointment. | <urn:uuid:4835e6f3-5bf5-4372-abe1-54c63fe87870> | CC-MAIN-2022-33 | https://dentistryforkids.ca/frenectomy-for-baby/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.928518 | 413 | 2.25 | 2 |
A unique program for young people globally to develop
entrepreneurship & innovation in Space
What are the innovations and products required to colonize the Moon and beyond?
The Science Accelerator students develop products that are practical, innovative and scientifically based that will help future Moon and Mars colonizers.
The program was developed by Out of the Box, with the close guidance of Dr. Jacob Cohen, Chief Scientist, NASA Ames Research Center.
Thousands of students in 9 different countries have already participated in the Science Accelerator program.
Through lectures and interactive lessons, students across the world interact with space and science experts, and entrepreneurs, acquiring the skills to effectively utilize 3D printers and pitch and promote their ideas.
The students enjoy visiting delegations, traveling together to conferences, space, and aeronautical institutes, meet with astronauts and NASA scientists.
The program conducts an international competition in US & IL and invites all schools, grades 8-12 to take part.
The program was recognized by the Ministry of Education in Israel as part of the SAT it received special recognition as a pioneering, innovative, program by the Ministry of Education Israel, the senator of California, Givatayim Municipality, and was invited to present at Local and International science and Educational conferences such as IAC Paris 2022 (IAF), SEEC Houston Space Center 2021, XXXth General Assembly of the International Astronomical Union Vienna, August 20-31, 2017, Gender In Science “Shaping tomorrow” 2018, Israeli Space Week 2019-2022 and more
All Science Accelerator students will be part of a unique "Mastermind" youth network for professional entrepreneurs in collaboration with : | <urn:uuid:f9dbe707-f1f6-48fe-9bd0-f49745428eb0> | CC-MAIN-2022-33 | https://www.scienceaccelerator.space/saccelerator | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.924418 | 347 | 2.78125 | 3 |
How to Calculate a Balloon Payment in Excel (with Pictures) – How to Calculate a Balloon Payment in Excel. While most loans are fully paid off throughout the life of the loan, some loans are set up such that an additional payment is due at the end. These payments are known as balloon payments and can.
Bankrate Loan Calculator Mortgage bankrate.com – Compare mortgage, refinance, insurance, CD rates – Use Bankrate.com’s free tools, expert analysis, and award-winning content to make smarter financial decisions.. mortgage Loans . Popular Calculators . See All Calculators . Mortgage. Mortgage.
Balloon Loan Calculator | Single or Multiple Extra Payments – The final payment is called a balloon payment because of its large size." This Balloon Loan Calculator will not only calculate the final balloon payment, but it will.
How to Manually Calculate a Mortgage – Before you jump in to buying a home – often the largest purchase of your life – you need to know that you can afford the monthly mortgage payment. You could calculate the payment using a quick online.
Mortgage Disclosure:New Forms for Getting a Loan – balloon payments, and various combinations. Closing Costs Loans have various costs including lender fees, third-party fees, prepaid and escrow fees. The proposed loan estimate mortgage disclosure form.
Bankrate Com Mortgage Bankrate – Bankrate 3801 PGA Blvd., Suite 555, Palm Beach Gardens, FL 33410 1675 Broadway, 22nd Floor, New York, NY 10019. Deposits. mortgage. home equity. videos. overview. services. Recent activity. Campaigns Budgeting. Article created 21 days ago. 0. Listing Enhancements Current Promotion (Checking only)
Balloon Mortgage Calculator: Commercial & Investment. – Calculator Rates Balloon Loan Calculator. This tool figures a loan’s monthly and balloon payments, based on the amount borrowed, the loan term and the annual interest rate.
Interest-Only Home Loan Payment Calculator: Interest-Only. – Interest-Only Mortgage Calculator. This tool helps buyers calculate current interest-only payments, but most interest-only loans are adjustable rate mortgages (ARMs). When the housing market is hot many people chase it, buying near the peak with interest-only loans.
Loan Payment Formula and Calculator – The loan payment formula is used to calculate the payments on a loan. The formula used to calculate loan payments is exactly the same as the formula used to calculate payments on an ordinary annuity.
Bankrate Loan Calculator bankrate mortgage calculator – YouTube – bankrate mortgage calculator Watch my video bankrate mortgage calculator and learn how to calculate Monthly payment, Total interest, Total payments e.t.c. I show you how to use bankrate calculator.Balloon Home Loan How Balloon Loans Work: 3 Ways to Make the Payment – Home purchase: balloon loans can also be useful when buying a home. In some cases, a payment is calculated as if you’ve got an amortizing 30-year mortgage (and part of the loan balance gets paid off), but a balloon payment is due after five or seven years.
Balloon Loan Payment Calculator | Excel Templates – Common payment term for this payment method is Balloon Loan Payment. It is called balloon because this payment method can be described as inflatable balloon. Small amount in the beginning but leave a very big amount at the end of loan period.
Loan Calculator | Bankrate.com | Calculate your loan payment. – Loan Calculator This loan calculator will help you determine the monthly payments on a loan. Simply enter the loan amount, term and interest rate in the fields below and click calculate.
Balloon loan payment calculator – templates.office.com – Balloon loan payment calculator. Enter your loan amount, interest rate, amortization period, and years until balloon payment, and this loan calculator template computes your monthly payment, total monthly payments, total interest paid, and the final balloon payment due on a balloon loan. This is an accessible template. | <urn:uuid:a6313717-ec11-435c-be3c-8e38415a8412> | CC-MAIN-2022-33 | https://www.aaahot.org/loan-payment-calculator-with-balloon-payment/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.928875 | 818 | 1.6875 | 2 |
Thursday, February 21, 2008
This story I'm working on is about a group of kids who find out that kids from another town brought a snowman to life using a magic hat. This inspires the kids to make their own snowman. But since they don't posses a magic hat they genetically engineer one. The result leads to them creating an evil snowman named Frostbite, that's set on terrorizing their town...as much as a snowman can. It's now up to the group of kids to correct this mistake. | <urn:uuid:a1a9507f-b1b5-47d6-99d2-cd7b8db98567> | CC-MAIN-2022-33 | https://jeftoonportfolio.blogspot.com/2008/02/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.977979 | 109 | 1.515625 | 2 |
Explore the words cloud of the MARCAN project. It provides you a very rough idea of what is the project "MARCAN" about.
The following table provides information about the project.
HELMHOLTZ ZENTRUM FUR OZEANFORSCHUNG KIEL
|Coordinator Country||Germany [DE]|
|Total cost||1˙757˙432 €|
|EC max contribution||1˙757˙432 € (100%)|
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
|Duration (year-month-day)||from 2017-01-01 to 2021-12-31|
Take a look of project's partnership.
|1||HELMHOLTZ ZENTRUM FUR OZEANFORSCHUNG KIEL||DE (KIEL)||coordinator||878˙707.00|
|2||UNIVERSITA TA MALTA||MT (MSIDA)||participant||833˙251.00|
|3||NEW MEXICO INSTITUTE OF MINING AND TECHNOLOGY||US (SOCORRO)||participant||45˙472.00|
Topographically-driven meteoric (TDM) recharge is a key driver of offshore groundwater systems because sea level has been lower than at present for 80% of the last 2.6 million years. Groundwater has been implicated as an important agent in the geomorphic evolution of passive continental margins and the canyons that incise them. However, the geomorphic efficacy of groundwater remains dubious, and a diagnostic link between landscape form and groundwater processes remains poorly quantified, especially for bedrock and cohesive sediments. Obstacles that prevent going beyond the current state-of-knowledge include: (i) a focus on terrestrial contexts and a lack of mechanistic understanding of groundwater erosion/weathering; (ii) limited information on offshore groundwater architecture, history and dynamics. By addressing the role of TDM offshore groundwater in the geomorphic evolution of the most prevalent types of continental margins, MARCAN is expected to open new scientific horizons in continental margin research and bring about a step-change in our understanding of some of the most widespread and significant landforms on Earth. The project’s methodology is rooted in an innovative, multi-scale and multidisciplinary approach that incorporates: (i) the most detailed 3D characterisation of TDM offshore groundwater systems and their evolution during an integral glacial cycle, based on state-of-the-art marine data and hydrogeologic models, and (ii) the development of a comprehensive continental margin geomorphic evolution model, based on realistic laboratory simulations, accurate field measurements and advanced numerical solutions. By placing better constraints on past fluid migration histories, MARCAN will also have strong applied relevance, primarily by improving assessment and exploitation of offshore freshwater as a source of drinking water.
|year||authors and title||journal||last update|
Aaron Micallef, Joshu Mountjoy, Katrin Schwalenberg, Marion Jegen, Bradley Weymer, Susi Woelz, Peter Gerring, Neeske Luebben, Daniele Spatola, Daniel Cunarro Otero, Christof Mueller
How Offshore Groundwater Shapes the Seafloor
published pages: , ISSN: 2324-9250, DOI: 10.1029/2018EO090691
Joshu J. Mountjoy, Jamie D. Howarth, Alan R. Orpin, Philip M. Barnes, David A. Bowden, Ashley A. Rowden, Alexandre C. G. Schimel, Caroline Holden, Huw J. Horgan, Scott D. Nodder, Jason R. Patton, Geoffroy Lamarche, Matthew Gerstenberger, Aaron Micallef, Arne Pallentin, Tim Kane
Earthquakes drive large-scale submarine canyon development and sediment supply to deep-ocean basins
published pages: eaar3748, ISSN: 2375-2548, DOI: 10.1126/sciadv.aar3748
|Science Advances 4/3||2019-06-19|
Aaron Micallef, Angelo Camerlenghi, Daniel Garcia-Castellanos, Daniel Cunarro Otero, Marc-André Gutscher, Giovanni Barreca, Daniele Spatola, Lorenzo Facchin, Riccardo Geletti, Sebastian Krastel, Felix Gross, Morelia Urlaub
Evidence of the Zanclean megaflood in the eastern Mediterranean Basin
published pages: , ISSN: 2045-2322, DOI: 10.1038/s41598-018-19446-3
|Scientific Reports 8/1||2019-06-19|
Michael Clare, Jason Chaytor, Oliver Dabson, Davide Gamboa, Aggeliki Georgiopoulou, Harry Eady, James Hunt, Christopher Jackson, Oded Katz, Sebastian Krastel, Ricardo León, Aaron Micallef, Jasper Moernaut, Roberto Moriconi, Lorena Moscardelli, Christof Mueller, Alexandre Normandeau, Marco Patacci, Michael Steventon, Morelia Urlaub, David Völker, Lesli Wood, Zane Jobe
A consistent global approach for the morphometric characterization of subaqueous landslides
published pages: SP477.15, ISSN: 0305-8719, DOI: 10.1144/SP477.15
|Geological Society, London, Special Publications||2019-06-19|
Aaron Micallef, Angelo Camerlenghi, Aggeliki Georgiopoulou, Daniel Garcia-Castellanos, Marc-André Gutscher, Claudio Lo Iacono, Veerle A.I. Huvenne, Joshu J. Mountjoy, Charles K. Paull, Timothy Le Bas, Daniele Spatola, Lorenzo Facchin, Daniela Accettella
Geomorphic evolution of the Malta Escarpment and implications for the Messinian evaporative drawdown in the eastern Mediterranean Sea
published pages: 264-283, ISSN: 0169-555X, DOI: 10.1016/j.geomorph.2018.11.012
Aaron Micallef, Daniele Spatola, Antonio Caracausi, Francesco Italiano, Giovanni Barreca, Sebastiano D\'Amico, Lorenzo Petronio, Franco Coren, Lorenzo Facchin, Rita Blanos, Alessandro Pavan, Paolo Paganini, Marco Taviani
Active degassing across the Maltese Islands (Mediterranean Sea) and implications for its neotectonics
published pages: 361-374, ISSN: 0264-8172, DOI: 10.1016/j.marpetgeo.2019.03.033
|Marine and Petroleum Geology 104||2019-06-07|
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "MARCAN" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (firstname.lastname@example.org) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "MARCAN" are provided by the European Opendata Portal: CORDIS opendata.
Elucidating the development of sexually-dimorphic circuits: from molecular mechanisms to synapses and behaviorRead More
Economic Fluctuations, Productivity Growth and Stabilization Policies: A Keynesian Growth PerspectiveRead More
The Mass Politics of DisintegrationRead More | <urn:uuid:47ac2414-6dce-4492-a9cd-fba0a41c2b64> | CC-MAIN-2022-33 | https://www.fabiodisconzi.com/open-h2020/projects/204694/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00065.warc.gz | en | 0.723261 | 1,841 | 2.25 | 2 |
Soil microbial community structure and diversity are largely influenced by soil pH and nutrient quality in 78-year-old tree plantations
- 1Center for Global Change and Ecological Forecasting, Tiantong National Forest Ecosystem Observation and Research Station, East China Normal University, Shanghai 200241, China
- 2Australian Rivers Institute and Griffith School of Environment, Griffith University, Nathan, Brisbane 4111, Queensland, Australia
- 3State Key Laboratory of Soil and Sustainable Agriculture, Institute of Soil Science, Chinese Academy of Sciences, Nanjing, Jiangsu Province 210008, China
- 4Shanghai Key Lab for Urban Ecological Processes and Eco-restoration, School of Ecological and Environmental Sciences, East China Normal University, Shanghai 200241, China
Abstract. Forest plantations have been recognised as a key strategy management tool for stocking carbon (C) in soils, thereby contributing to climate warming mitigation. However, long-term ecological consequences of anthropogenic forest plantations on the community structure and diversity of soil microorganisms and the underlying mechanisms in determining these patterns are poorly understood. In this study, we selected 78-year-old tree plantations that included three coniferous tree species (i.e. slash pine, hoop pine and kauri pine) and a eucalypt species in subtropical Australia. We investigated the patterns of community structure, and the diversity of soil bacteria and eukaryotes by using high-throughput sequencing of 16S rRNA and 18S rRNA genes. We also measured the potential methane oxidation capacity under different tree species. The results showed that slash pine and Eucalyptus significantly increased the dominant taxa of bacterial Acidobacteria and the dominant taxa of eukaryotic Ascomycota, and formed clusters of soil bacterial and eukaryotic communities, which were clearly different from the clusters under hoop pine and kauri pine. Soil pH and nutrient quality indicators such as C : nitrogen (N) and extractable organic C : extractable organic N were key factors in determining the patterns of soil bacterial and eukaryotic communities between the different tree species treatments. Slash pine and Eucalyptus had significantly lower soil bacterial and eukaryotic operational taxonomical unit numbers and lower diversity indices than kauri pine and hoop pine. A key factor limitation hypothesis was introduced, which gives a reasonable explanation for lower diversity indices under slash pine and Eucalyptus. In addition, slash pine and Eucalyptus had a higher soil methane oxidation capacity than the other tree species. These results suggest that significant changes in soil microbial communities may occur in response to chronic disturbance by tree plantations, and highlight the importance of soil pH and physiochemical characteristics in microbially mediated ecological processes in forested soils. | <urn:uuid:60aa3ed6-5519-43c9-88df-d09ed6ff1b35> | CC-MAIN-2022-33 | https://bg.copernicus.org/articles/14/2101/2017/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.918555 | 567 | 2.421875 | 2 |
They conclude that the Saturn core is diffuse.
2021/08/17 Elhuyar Zientzia Iturria: Elhuyar aldizkaria
Saturn's ring oscillations offer a view of the internal structure of the planet, according to an article published in the journal Nature Astronomy. From the data collected by the Cassini spacecraft, Saturn presents a diffuse nucleus with diffuse limits that condition the formation and evolution of the planet.
Normally, the structure of the giant planets is deduced from the study of the gravitational field. However, the influence of the gravitational field is weak in the core, so the consequences are quite limited.
In the research just published, seismic measurements of the rings have been added to the gravity data. As a result, astrophysicists have gained a new vision of the internal structure of the planet. According to him, the nucleus extends to 60% of the planet's radius, much more than in previous calculations. Apparently, the core is diffuse, rather than completely separated and formed exclusively by hydrogen and helium, combining both heavy elements.
According to the researchers, the study of the internal structure of Saturn also serves to investigate other gaseous giants. | <urn:uuid:25b2ecc6-24b5-4a52-ad22-bc414ec32a79> | CC-MAIN-2022-33 | https://zientzia.eus/artikuluak/saturnoren-nukleoa-lausoa-dela-ondorioztatu-dute/en/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.928368 | 248 | 3.390625 | 3 |
Chicken in soy sauce
EYW wants your food photos!
EYW wants your food stories!
What: At its core, San Francisco is a gold miner’s town, full of big dreams, decadent appetites, and the always-present possibility that today might be the day you’ll make it big. Appropriately, one of the city’s iconic dishes is the Hangtown fry, a heart-stopper of an omelet stuffed with bacon and oysters—and direct ties to California’s prospecting past. There are two creation myths here, each nicely echoing the make-it-or-break-it mentality of Gold Rush days. The first tells of a man (circa 1890s) who struck it rich, went to the Cary House Hotel in Placerville (then nicknamed “Hangtown” for its propensity for hangings), and demanded the most expensive thing on the menu. Eggs were difficult to transport over rough wagon roads, bacon came in from the East Coast, and oysters had to be carried on ice from San Francisco—voilà, a dish as decadent in price as in flavor was born. In another riff, a man condemned to death in the Placerville County Jail requested this omelet as his last meal for similar, if more desperate, reasons: The ingredients would take quite a while to reach him. Whichever tale holds true, this classic breakfast remains a delicious special-occasion treat.
Good to Know: Depending on the restaurant, sometimes the oysters are breaded and deep-fried before being tossed into the omelet.
Where: Keep it simple and old-school with the Hangtown fry at Tadich Grill (240 California St., betw. Battery & Front Sts., map). This landmark of classic San Francisco cuisine has been serving its Hangtown fry for more 100 years—clearly, they know what they’re doing.
When: Mon-Sat, 11am-9:30pm
Order: A Hangtown fry ($22.95). Here it’s served like a frittata—a hearty serving of eggs is studded with thick-cut diced bacon, whole oysters (that have been breaded and fried), green onions, and pockets of melty cheese. Be sure to ask for Tabasco sauce on the side: A splash of the vinegary heat cuts through the dish’s richness well. Pair it with a Bloody Mary if you’re feeling feisty.
Alternatively: We love the down-home (and decidedly cheaper) takes on the Hangtown fry at Brenda’s French Soul Food (652 Polk St., at Eddy St., map) on Polk and Just For You Cafe (732 22nd St., betw. Tennessee & 3rd Sts., map) in the Dogpatch. These are two of the best Southern-style spots San Francisco has to offer—expect oysters fried to perfection and side dishes that include grits, biscuits, and even beignets.
Photo courtesy of Craig Lee
©2022 Eat Your World, LLC - All Rights Reserved | <urn:uuid:5885faa3-c00c-4c26-8835-1459949bc933> | CC-MAIN-2022-33 | https://eatyourworld.com/destinations/united_states/california/san_francisco/what_to_eat/hangtown_fry | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.932634 | 657 | 1.609375 | 2 |
by Kara Dolan-West | Apr 22, 2014 | General Information
Social Security Disability provides compensation to people incapable of working, if they meet certain requirements. In opposition, workers’ compensation involves a work-related injury that renders the injured employee disabled in some way. The requirements for each program differ, but one major distinction is that to receive workers’ compensation, an individual’s disability must result from a work-related injury or from an occupational disease. Social Security Disability, on the other hand, provides compensation to people incapable of working, regardless of if they were injured on the job.
If you have questions regarding workers’ compensation or social security disability benefits contact The Bainbridge Firm for a free initial consultation.
- Social Security and Disability Compensation
- General Information
- Hearing Process
- In the News
- Workers' Compensation Benefits
- Workplace Accidents and Injuries | <urn:uuid:2d645730-e7cd-459e-95dd-37653931ed26> | CC-MAIN-2022-33 | https://www.bainbridgefirm.com/blog/2014/04/how-is-social-security-different-from-workers-compensation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.925856 | 201 | 1.84375 | 2 |
By Euro Weekly News Media • 24 July 2018 • 14:49
BEAT THE HACKERS: Professional tips for data security
WE can’t deny the importance of staying secure online in the 21st century. The age of mobile computing made us more aware of how precious the data is.
It is hard to find a serious company or a professional entrepreneur for whom data security means nothing at all.
Almost every sphere of life somehow depends on software and technology. That is why it is important to be wise about online privacy not only as a businessman, entrepreneur, or a civil servant but also as an average Internet user.
There are millions of more or less useful recommendations on how to keep your data safe online.
Of course, not all of them are effective enough to deserve your attention. That’s why we’ve prepared a list of top online security tips, recommended by professionals only.
We’re going to pay special attention to one of the most effective tips as well – a VPN. In case you need more info, check bestvpnrating and get practical steps in protecting your privacy on the Internet.
Professional tips for data security
What you can be sure about is that a professional data security expert definitely won’t advise you to use antivirus, make up a strong password, change your nicknames frequently, and visit only the websites you know to keep your data safe.
But this is what real Internet users think they should do to avoid hacker attacks and data leaks. In fact, everything is not so simple.
First of all, having an updated antivirus software and a strong complicated password is not enough. Believe it or not, but this won’t save your data from being stolen while connecting through a public network. Instead, here is what you have to pay attention to and what you have to do first to make that antivirus and password work for you well.
Get a VPN. The first and the most important thing in data security is a VPN. As it is based on tunnelling and encryption technology, which is complicated enough to avoid even a professional hacker to tap into your personal data. A VPN servers for anonymous and private browsing as well. It hides your IP and location. So, get more info about VPNs and choose one before going to the next steps.
Then, install a software update. Yes, updating your antivirus is not enough. When it comes to privacy and data security, antivirus catches only up to 50% of the bugs out there. Installing software updates on a regular basis is crucial.
Get a unique password. A strong password doesn’t make it a unique one. But a unique password is a strong password. A password with 105 characters isn’t a good idea. Instead, think about a password, which you don’t use for any other account online and which is a combination of phrases and numbers. You can use a password manager if you’re afraid you will forget ten different passwords to ten different accounts.
Basically, that’s all for making your devices 10X more secure than they are now.
Share this story
Subscribe to our Euro Weekly News alerts to get the latest stories into your inbox!
By signing up, you will create a Euro Weekly News account if you don’t already have one. Review our
Share your story with us by emailing [email protected], by calling +34 951 38 61 61 or by messaging our Facebook page www.facebook.com/EuroWeeklyNews
Your email address will not be published. Required fields are marked *
Download our media pack in either English or Spanish. | <urn:uuid:6baee63f-bc2f-4c4e-a334-75959be00d6c> | CC-MAIN-2022-33 | https://euroweeklynews.com/2018/07/24/online-security-tips-vpns-passwords-and-antiviruses/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.918743 | 798 | 2.234375 | 2 |
2019 was a substandard year for digital rights in China. TikTok, a popular Chinese-owned social networking and video-sharing service, instructed moderators to censor videos that brought up “sensitive” topics like Tiananmen Square or Tibetan independence. Gamers noted on Reddit several months ago that League of Legends, a popular multiplayer online game, prohibited its users from changing status messages to include the word “Uyghur,” in reference to a minority ethnic group in the western region of Xinjiang. And ahead of the Taiwanese elections on January 11th, disinformation campaigns swirled around Tsai Ing-wen, the country’s president loathed by Beijing.
Internment camps in Xinjiang and the protests in Hong Kong received significant coverage in Western media, often with geopolitical ramifications. After Daryl Morey, the general manager of the Houston Rockets, tweeted an image voicing support for the protests in Hong Kong, it took all of a few days for the Chinese leagues, sponsors, partners, and streaming services to cut ties with both the National Basketball Association (NBA) and the Rockets. In a Reuters interview, NBA deputy commissioner Mark Tatum later said that basketball is the most popular sport in China, with some 300 million players across the country.
The entanglement between the Chinese government and digital tools is undeniable. Although the Internet posed a threat to the Chinese Communist Party (CCP) early on, it is increasingly viewed as a means to further foreign policy aims. Censorship of online content can boost nationalism or shape relations with countries in the region, promote regional economic projects like the Belt and Road Initiative (BRI), or influence the outcome of territorial disputes. But it can be used for domestic purposes too, by creating anti-competitive practices that give an edge to Internet businesses in China.
There have been several notable instances of foreign tech businesses that comply with censorship laws in return for access to the Chinese market. One of the criticisms levied against such firms is that operating in China could lead to a spillover effect and provide more legitimacy to censorship practices. This has created a huge debate around whether tech firms can provide a limited version of digital services (i.e. search engines, apps, infrastructure) while continuing to maintain values like openness and competition.
According to the American scholar James Carey, communication is not just a means of transmitting information, but a “symbolic process whereby reality is produced, maintained, repaired, and transformed.” Per this ritual view of communication, the production and reproduction of shared beliefs can apply to the building of community culture and reinforces the importance of symbols in framing human conversation; from Carey:
A ritual view of communication will focus on different range of problems in examining a newspaper. It will, for example, view reading a newspaper less as sending or gaining information and more as attending a mass, a situation in which nothing new is learned but in which a particular view of the world is portrayed and confirmed. News reading, and writing, is a ritual act and moreover a dramatic one. What is arrayed before the reader is not pure information but a portrayal of the contending forces in the world. Moreover, as readers make their way through the paper, they engage in a continual shift of roles or of dramatic focus.
…Under a ritual view, then, news is not information but drama. It does not describe the world but portrays an arena of dramatic focus and action; it exists solely in historical time; and it invites our participation on the basis of our assuming, often vicariously, social roles within it.
In the case of the Chinese government’s legislative or technological efforts to regulate the Internet (which it achieves by blocking access to foreign websites or slowing down cross-border online traffic), Carey’s view of communication is highly pertinent. The country’s censorship infrastructure, dubbed the Great Firewall of China (GFW), aims to cherry-pick the information making its way to the broader public, and create and maintain shared beliefs that encourage the public to adopt social roles in a manufactured reality. The most effective tool for censorship has often been the people themselves; in December alone, citizens reported 12.2m pieces of “inappropriate” content, a fourfold increase from the same month in 2015.
The “portrayal of the contending forces is the world” noted by Carey is precisely why the Great Firewall is an effective mechanism for building an alternate reality. Algorithms do not only reinforce biases by filtering and censoring content; they also encourage the creation of social roles within the public. China’s state apparatus has mastered the art of manufacturing an imagined community, albeit one ostensibly based on a similar set of values, norms, or life experiences as a majority of the public.
Although much of today’s economic prosperity in China can be credited to market reforms, the same cannot be said for its partial media liberalization. The prospects of centralized technological innovation may be appealing in certain cases (self-driving vehicles, gene editing, or quantum computing), but it is a question of values that spills over into more dangerous territory. Tech firms like Tencent and Huawei are often praised for an innovative streak, but the centralized nature of their activity comes at the expense of privacy, openness, and competing ideas.
We Shall Fight on the Breaches
Deng Xiaoping, China’s leader from 1978-92 widely credited for the country’s economic revival, was a big proponent of the GFW’s ideological foundations, often saying that “if you open the window for fresh air, you have to expect some flies to blow in.” With the wider distribution of the Internet across China in the 1990s, flies increasingly needed to be swatted away.
Initial steps to censor the Internet in China came with a preliminary set of regulations in 1997 to govern its use; from Congressional Digest:
Individuals are prohibited from using the Internet to: harm national security; disclose state secrets; or injure the interests of the state or society. Users are prohibited from using the Internet to create, replicate, retrieve, or transmit information that incites resistance to the PRC Constitution, laws, or administrative regulations; promotes the overthrow of the government or socialist system; undermines national unification; distorts the truth, spreads rumors, or destroys social order; or provides sexually suggestive material or encourages gambling, violence, or murder. Users are prohibited from engaging in activities that harm the security of computer information networks and from using networks or changing network resources without prior approval.
This framework formed the basis of the Golden Shield Project, a network security construction initiative that doubled as the state’s censorship and surveillance apparatus. Arbitrary parameters like “information that incites resistance” or “activities that harm the security of computer information networks” were beneficial to the Communist Party of China (CPC), granting it with significant leverage to crack down on news, forums, and discussions.
One of the earliest examples of Internet censorship is content relating to the Tiananmen Square protests of 1989. The architect of many such regulations was the Assistant Minister for Public Security, Zhu Entao. Any content that was deemed defamatory to government agencies or that brought about security problems like “manufacturing and publicizing harmful information, as well as leaking state secrets” could lead to a fine of up to 15,000 yuan (or USD $1,800). The banning process was initially uncoordinated and ad hoc, as several sites would be taken down in a particular city and stay online in another.
Enforcement has become a lot more sophisticated over time. In 2005, the government purchased hundreds of routers from Cisco Systems, a networking hardware company based out of the U.S., which provided it with a more refined censorship mechanism. A number of tech firms have since made similar concessions in return for access to the Chinese market:
- Apple has removed listings from the App Store, including Quartz, a publication, citing that they failed to comply with Chinese laws and the company’s own guidelines.
- Blizzard banned a professional eSports player (known as Blitzchung) from a tournament after he yelled “Liberate Hong Kong, revolution of our age!” during an interview.
- Microsoft briefly blocked search results on Bing for reportedly “illegal content” and took down a post on LinkedIn which referenced Tiananmen Square.
As the market for Internet services continues growing in China, western companies face a trade-off of values: openness and competitiveness, or centralization and control. Given the growth potential within China, it will be appealing for several to opt for the latter. And while the GFW has effectively swatted away some flies in the name of national unification, there is little consistency around national censorship laws. China’s government is betting that this won’t deter business.
The latest concession came in October, when Apple removed HKmap.live, a dynamic online map illustrating the developments of the Hong Kong protests, from its App Store. Reminiscent of the navigation software app Waze, HKmap.live plainly shows the locations of police and alerts around ongoing events nearby (albeit in this case, it includes protesters and locations of barricades and tear gas deployment).
After the People’s Daily, China’s state-run newspaper, criticized Apple for approving the app, the company quickly reversed course. It then provided a statement to the developer team for HKmap.live explaining its justification to remove it from the App Store:
We created the App Store to be a safe and trusted place to discover apps. We have learned that your app has been used in ways that endanger law enforcement and residents in Hong Kong.
The app displays police locations and we have verified with The Hong Kong Cybersecurity and Technology Crime Bureau that the app has been used to target and ambush police, threaten public safety, and criminals have used it to victimize residents in areas where they know there is no law enforcement. This use of your app has resulted in serious harm to these citizens.
For these reasons, we have determined that this app violates our guidelines and local laws and we have removed it from the App Store.
It was not clear HKmap.live, which had been used by residents and visitors to know which areas to avoid, encouraged its users to evade law enforcement any more than other (still available) live app maps. The administrator of the app later posted on Twitter that there was no evidence to support the accusation of app usage “to target and ambush police, threaten public safety, and [that] criminals have used it to victimize residents in areas where they know there is no law enforcement.” Moreover, several user reviews in the App Store suggested the app improved public safety, instead of posing a danger to Hong Kong’s residents or passersby.
Apple’s decision was complicated by the continued presence in Hong Kong of other community-generated platforms. One example of this is Waze, which is billed as a navigation app, but allows drivers to avoid both police and traffic cameras. It’s also difficult to imagine Apple and the Chinese government tracking data on HKmap.live over a few days and concluding that it facilitated or encouraged illegal activity.
These decisions reflect poorly on tech firms and the purported values of openness they claim to embody. In an update to iOS 13.1 days earlier, Apple removed the Taiwanese flag emoji for users in mainland China, Hong Kong, and Macau, but made no mention of these changes in its release notes. While senior leadership at Apple acknowledged the public debate around pulling HKmap.live (with Tim Cook stating that “this decision best protects our users”), the same was not the case for the choice to remove the Taiwanese flag emoji, underscoring continued subservience to the CCP that isn’t going to abate anytime soon.
Just before midday on December 31st, 2018 (11:30am local time in Kinshasa), there was a significant drop in bandwidth in the Democratic Republic of the Congo. In an act that carried into the following days and weeks, officials in the DRC cut off access to the Internet while voters awaited the results of a contentious presidential election. Advisors to President Joseph Kabila said to Reuters that digital services like the Internet and text messaging were shut off to ensure public order was preserved, and dispel any “fictitious results” that had been circulating on social media. Access was not restored until January 19th.
Internet shutdowns have become more common in a number of countries. According to NetBlocks, a civil society organization, partial or full shutdowns have been reported in countries from Cameroon to India, Iraq, Iran, Turkey, Sudan, and Venezuela over the past year, frequently for political purposes. The shutdown in the DRC was only the latest iteration of a model first effectuated in Xinjiang in 2009, where Internet access was cut off for almost a year after riots broke out over disputes between migrant Uyghurs and Han Chinese. Ever since, several governments have defaulted to reasons like “public safety” or “national security” as justification for Internet shutdowns.
The GFW would be deemed a success even if it were contained in the Chinese mainland. But over the past few years, tech firms in China have been exporting tools that provide companies and governments with abilities like managing and monitoring communications online, in an effort Maria Farrell dubs “autocracy as a service” on Medium:
What rings clear is the assiduous cultivation and responsiveness of China’s technology firms to the worries of a smaller and much poorer country struggling to deal with the Internet. We don’t know how close the coordination is between Huawei’s local operatives and head office, and between tech firms in the Chinese state. We do know the Chinese officials have accompanied African intelligence officials to meetings with Huawei in the Chinese technology hub of Shenzhen, and that Huawei employees train and work alongside African officials on national cyber-surveillance teams in Uganda and Zambia, at least. We also know that when struggling countries call for help managing communications technologies, China answers. The results are human rights abuses and the export of a punitive, state-centered “sovereign Internet.”
Government-backed Chinese firms like Huawei, ZTE, and others are becoming increasingly responsible for the digital infrastructure in states across Africa. They are providing online filtering technologies and surveillance systems (read more about Zimbabwe’s strategic partnership with the facial recognition firm CloudWalk), as well as advice on controlling dissent online. China is not only exporting technology to African governments, but also a new set of norms and rules around respecting national sovereignty in cyberspace.
In the Internet’s early days, many believed that having unfettered access to information would spread values of democracy and openness. The GFW’s prevalence outside of China has proved otherwise, even leading some to call for a World Data Organization akin to the WTO, to set the standards for how individuals’ data is being used. This would have ostensible benefits from improving data privacy to boosting competition – but it may also prevent China from making further inroads in exporting its technology (and its values) to illiberal governments around the world. | <urn:uuid:30c7f346-5c3b-468f-9bd3-d96950c0d7de> | CC-MAIN-2022-33 | https://besteps.net/2020/01/20/the-greatest-firewall/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.949875 | 3,137 | 2.703125 | 3 |
There are 2 file types use the .LOG file extension:
1. Log File
A LOG file is a log used by various operating systems and programs. It typically contains a plain text log of certain events with their timestamps. LOG files may be created by the operating system to keep track of system events or by a software installation program to list location and names of installed files.
Web servers also generate log files to track visitors and to monitor bandwidth usage. Web stats programs allow Web hosts to analyze log files through generated charts and graphs, which present logged website traffic data in a graphical format.
Updated: January 28, 2016
2. AntiVir Report Log File
Virus scan report created by AntiVir, an antivirus program for Windows; saved in a plain text format and contains a log of an anvitirus scan or a software update; used for saving the antivirus software history.
AntiVir LOG files can be viewed through the Overview → Reports pane, which shows a list of reports. From this pane, open a report and click thebutton to open the file.
LOG files are saved to the following directory: Program Data\Avira\AntiVir Desktop\LOGFILES\.
Updated: November 4, 2011 | <urn:uuid:16ebaa90-4752-46d6-8482-7f4c4d441cac> | CC-MAIN-2022-33 | https://filelook.net/file-extension/log.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.917767 | 257 | 3.1875 | 3 |
Most of us have fed our babies ragi porridge when they were little. However, ragi doesn’t have to be relegated to baby food – even older kids can have them, in the form of cookies! Yes, our Choco Sprouted Ragi Cookies are made from sprouted ragi flour and cocoa powder. Now, you can be confident of your kids getting all the benefits of ragi even as they grow out of infancy!
Ragi on its own is an excellent source of protein, iron and calcium, making it a superfood. When it is sprouted, the nutrient quality increases and the nutrients become more bio available, which means that they are more easily absorbed by the body. Using genuine cocoa powder ensures that your kids don’t get any unnecessary added flavors or preservatives in their food.
That’s not all, these cookies have nothing refined – not flour or sugar! Instead, we have used whole wheat flour and jaggery to ensure that these cookies stay wholesome and safe for little kids. We don’t even use baking powder or baking soda while making our cookies. With a yummy chocolate flavor, these are sure to be a hit!
♥ A best alternative to processed cookies available in stores.
♥ Free from added salt, sugar, baking powder, baking soda and refined flour.
♥ Full of fiber, protein and good fats.
♥ Prepared fresh for every order.
Age Recommendation: Advisable for all ages above one year.
Ingredients:Whole Wheat, Sprouted Ragi, Natural Cocoa, Jaggery, Butter and Milk.
Caution: Babies need to be monitored to avoid choking hazards.
Storage and Shelf Life:
After opening the pack, immediately transfer to an airtight container. Use within 1 month of opening the pack.
This product contains dairy and nuts. This product is made in a facility which processes gluten and nut products.
DOES NOT CONTAIN ADDED MAIDA,BAKING POWDER, BAKING SODA, SUGAR OR SALT. | <urn:uuid:dafa720d-2666-4c60-85bb-1f798d314e5d> | CC-MAIN-2022-33 | https://shop.mylittlemoppet.com/shop/choco-sprouted-ragi-moppet-stick-cookies/?add-to-cart=19529 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.926298 | 435 | 1.515625 | 2 |
Last week we embarked on R/V Falkor as part of a collaboration with Harvard’s Microrobotics Lab. We had several goals for this expedition. Primarily, we wanted to test a new low pressure hydraulic engine for soft robotic manipulators. The engine survived many firsts on this trip: First time integrated onto an ROV. First time submerged in the ocean. First time combined with new manipulators from the Harvard Lab. All represent major milestones for the project that can not be tested in the lab.
The hydraulic engine is a new design for the purpose of speeding up actuation and increasing control of the soft actuators. Previous engines were slow and cumbersome. The newer design combines a precision linear actuator with a soft robotic bellows allowing for a direct transfer of fluid from the bellows to the actuator. This cruise allowed us to show just how versatile soft robotics can be. One highlight was picking up a xenophyophore, a large delicate single cell organism that is very difficult to collect with conventional manipulators.
Our lab focuses on engineering for deep sea applications. The challenges of being at sea helps us dispel misconceptions held in the lab. We suffered from burst actuators, leaking bellows, and a broken housing, but with the help of the crew, we were able to fix everything and have a successful mission. In one instance, the ROV team was able to 3D print a replacement part for us. We also learned a great deal about how we can change our lab designs to better match real world applications. We spent time talking to the ROV pilots about the challenges they faced and learned how we can improve designs.
Time at sea offers many advantages to research engineers that can be hard to quantify. For us it has represented a chance to work very closely with colleagues we normally only reach out to in email. Being trapped offshore with fellow researchers results in an exchange of ideas that leaves me excited to return to the lab and try out new things before the next cruise.
I can not thank the Falkor team enough for all their hard work and hospitality. | <urn:uuid:c64a61a8-2ab0-4b5b-807d-22961ddd586a> | CC-MAIN-2022-33 | https://schmidtocean.org/cruise-log-post/powering-the-hold/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.951904 | 424 | 2.09375 | 2 |
Cybersecurity has hit the agenda so quickly that it is now a “paramount national security risk”, one futurist warned even as French presidential candidate Emmanuel Macron weathered an email hack on the eve of the country’s election.
Little wonder that another expert suggested that cybersecurity is “by far” the biggest threat to small and medium enterprises. But with results of user education varying dramatically, it never hurts to have another technique to try to get them to use stronger passwords – or to work to secure employees’ home endpoint devices.
If nothing else, a concerted effort at improving human defences now will help boost corporate defences to financial cybercrime – which is still keeping banks up at night. As always, reducing the chances of a serious compromise requires a commitment to addressing the basics.
China is attempting to address the basics by using regular security checks on IT vendors that are designed to identify vulnerable Internet and networking services early on. They’d be wary of compromises such as a sneaky Gmail phishing attack, which incorporates a fake Google Docs app.
That’s a problem given the reliance on cloud-based applications that, a Google executive said, can ease the burden of data protection compliance. Indeed, online platforms require particular vigilance as many warn that a phishing attack or ransomware infection may just be a lead indicator of a broader extortion or fraud attempt.
Mac users were being warned about new malware – linked to Russian attackers who recently ported their Windows backdoor program to macOS – that snoops on encrypted connections, while the Xen project was hit with the third highly critical virtual-machine escape bug in 10 months, Intel rolled out a patch to fix a severe vulnerability in some Intel-based business computers, and Android got security patches for over 100 vulnerabilities affecting a range of components.
Search engine Shodan took a new approach to botnet management, launching a service that enables security researchers and law enforcement officers to look for malware command-and-control servers. It’s a notable step forward that could help improve the response to new malware families.
Security practitioners are still suffering threat alert fatigue, while employers are suffering their own form of fatigue as they try to derive meaning from the range of cybersecurity credentials in the market.
This, as experts warned about tightening controls on third-party access and remaining extra vigilant when choosing the right cybersecurity products in the face of often dubious claims by cybersecurity product vendors.
Meanwhile, criminals are continuing to explore new methods for financial exploitation, with fraudulent gift cards becoming increasingly popular. Another group was abusing the Windows Application Compatibility Infrastructure to facilitate financial crimes, while others were notching up their success in compromising government agencies with a Frankenstein malware framework built from a range of publicly available tools. Others are sticking to old favourites, with the average ransomware demand now past $US1000 ($A1320).
New technologies were causing other problems, too: India’s Supreme Court, for one, was hearing a challenge to a biometric authentication system that forces the use of biometrics identifiers when filing tax returns. These sorts of real-world problems are just some of the many challenges facing innovative security startups, who need to hedge their bets carefully to maximise their chances of survival. | <urn:uuid:1f0afb16-2047-475d-9527-616a90110381> | CC-MAIN-2022-33 | https://www2.cso.com.au/article/618851/week-security-crims-get-creative-cybersecurity-named-biggest-risk-nations-smes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.94224 | 655 | 2.3125 | 2 |
Did you know around 80% of children are not meeting their recommended physical activity guidelines and pre-school children spend around 70% of their day sitting. Scary right!? Read this guest blog from the amazing Kids Collab to find out about the benefits of physical development and how you can promote it at home.
The complete collection of our phonics activity cards. This amazing bundle contains everything you need to support your child on their phonics journey.
Complete Phonics BundleBuy now
Do you have a child in Year 1 or Year 2? This bundle contains everything you need to support your child with reading and writing throughout Key Stage 1.
Key Stage 1 BundleBuy now
The equipment needed for all of our activities are everyday items that you probably already have at home. If you don't already have one of the ite...
Fantastic cards, so easy to use and really engaging. My daughter loves doing all the activities and I’m so happy to have go to activities which are simple and quick to set up.
Fab ideas! Really helpful to have these thoughtful activity ideas in one place. Kids are really enjoying them!
Absolutely fantastic! I could not recommend these beautiful cards enough! If you’re at home, teaching or running interventions these are a wonderful resource!
We love our Phase One cards. We’ve already set up some of the activities - easy to set up, using household items, and simple enough to hold the attention of my nearly three-year-old.
Genius. I have been using these with my daughter and we both love them. Easy simple and creative!!!! Such a great learning through play tool. Would highly recommend | <urn:uuid:3c3c7c47-7b5a-40b4-9779-65caa2c48095> | CC-MAIN-2022-33 | https://www.playmakessense.co.uk/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00065.warc.gz | en | 0.965477 | 346 | 1.789063 | 2 |
Many of the developments in the biosciences reported on in BioNews involve novel moral issues or further complicate existing ethical debates. While concerns about the efficacy or safety of a new therapy inevitably lead to calls for further action within the scientific community - more research, bigger studies, better analysis - ethical worries instead result in calls for non-specialist external validation, consultation exercises, public debate and engagement. While the public are put in the passive role of spectator when scientific developments are dealt with in public, when it comes to handling tricky ethical issues they are instead presumed to have a substantial competency to actively debate the relevant issues as a means of achieving some kind of robust, democratic, consensus.
However, it seems increasingly clear from the remarkably limited and, often, orchestrated responses that are elicited by expensive and well-publicised consultations and public engagement exercises that broad and inclusive public debate is far from being achieved. Speaking in general terms, one of the principle bars to public engagement with scientific matters is the inability, or unwillingness, of certain factions of the press to accurately, cogently and appropriately communicate scientific developments to the public. A growing portion of the academic literature on the public understanding of science has exposed the deceptive, inaccurate and sensationalist ‘churnalism' that predominates in much of the modern commercially driven press. Fortunately awareness of such journalistic failures in science reporting is on the up, and it is heartening that the paperback edition of Dr Ben Goldacre's ‘Bad Science' (a no-nonsense primer in scientific method built around a systematic debunking of scientific misinformation in the public eye) is back in the best-sellers list.
Dr Goldacre's central thesis is that most of what is being done by scientists is capable of being expressed in a way that the majority of the public is readily able to understand and that the failure lies with certain journalists indulging damaging stereotypes about science including, most pertinently, that it is impenetrably complicated and entirely beyond the reach of non-specialists. It is this characterisation of science as inaccessible and not any inherent complexity of the science itself that frequently serves to alienate the public.
When it comes to assessing scientific developments with an ethical dimension the press frequently ensures that the public is doubly vexed. While it would be inaccurate and unfair to suggest that no newspaper addresses ethical questions with discussion of ethics, they still represent a minority of an overall coverage characterised by vague human interest pieces. The limited philosophical articles are also the preserve of a very limited section of the daily press and these pieces are vastly outnumbered by non-specialist opinion pieces taken from opposite extremes of the issue (the recent media furore over creating human sperm from stem cells in the laboratory provides several examples of this). Such coverage is illustrated with stark arguments drawn exclusively from the periphery of the issue. While these positions are clearly part of the discourse as a whole it is clearly counterproductive to give such irreconcilable positions exclusive coverage. Moderate views and arguments based on compromise are often crowded out.
A public debate cannot be informed by such thin and tumultuous discourse and thus it comes as no surprise that thousands of column inches fail to illicit involvement from the public. The recent Department of Health consultation on sperm and egg storage, licensing of IVF clinics and disclosure of donor information, for example, drew only 178 responses and of these 31 were from organisations with a pre-existing interest and more than a hundred were from the supporters of a group called ‘Christian Concern for Our Nation.' The Human Fertilisation and Embryology Act 2008 received a vast amount of coverage in the press and yet still this consultation exercise on three matters of public interest yielded less than 50 independent responses from interested individuals.
Thus inaccurate or hyperbolic science reporting deprives the readership not just of scientific knowledge but also of constructive ethical argument. In the same way that the failure to adequately report on science prevents members of the public from developing an interest or opinions on scientific progress, failure to responsibly report on ethical matters depletes the ‘‘public sphere'' of constructive opinion. I draw attention to the phrase ‘‘public sphere'' because by preventing readers from developing an interest in scientific issues and by preventing them from being exposed to moderate ethical arguments they are effectively destroying the public space within which any large-scale discourse on bioethics can take place. By casting science as obscure the media has made science obscure and by presenting ethical debate as irresolvable conflicting they have made it inaccessible.
Though the academic literature on public understanding of science has included commentary on the coverage of ethical matters there is no devoted literature to the public understanding of ethics. Given that decisions on ethics are seen by our modern democratic government as to be a matter within the public's competence it is important that further work be put into understanding and improving the way in which ethical debates are presented to the public.
While a wider awareness of the inadequacy of scientific communication appears to be developing, remedying this is only one step on the way to involving the public in the defining ethical decisions of our time. The existence of channels such as BioNews, through which expert ethical coverage can be readily accessed, provide that the public space for debate is kept at least partially open and it is to be hoped that improved accessibility of this information via the internet will ensure that at least existing interested parties are able to access reasoned opinion on bioethical matters. However, only through wider public engagement will any great percentage of the population be sufficiently enfranchised to contribute and until the mass media acts responsibly in providing a measured and informative approach to ethical issues the vast majority of the population will continue to be left out of the ethical discussions to which they are superficially invited to contribute. Unless steps are taken to provide the wider public with accurate, informed and moderate coverage, the grand notion of ‘public debate' will continue to be one without substance. | <urn:uuid:0e2fa624-afa8-424c-b8dc-47497f9fb68f> | CC-MAIN-2022-33 | https://www.progress.org.uk/the-press-public-debate-and-the-public-understanding-of-ethics/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.95251 | 1,195 | 2.265625 | 2 |
Baptism marks the beginning of a journey with God which continues for the rest of our lives, the first step in response to God’s love. For all involved, particularly the candidates but also parents, godparents and sponsors, it is a joyful moment when we rejoice in what God has done for us in Christ, making serious promises and declaring the faith.
The wider community of the local church and friends welcome the new Christian, promising support and prayer for the future. Hearing and doing these things provides an opportunity to remember our own baptism and reflect on the progress made on that journey, which is now to be shared with this new member of Saint Columb’s Cathedral.
The service paints many vivid pictures of what happens on the Christian way. There is the sign of the cross, the badge of faith in the Christian journey, which reminds us of Christ’s death for us. Our ‘drowning’ in the water of baptism, where we believe we die to sin and are raised to new life, unites us to Christ’s dying and rising, a picture that can be brought home vividly by the way the baptism is administered. Water is also a sign of new life, as we are born again by water and the Spirit. This reminds us of Jesus’ baptism. And as a sign of that new life, there may be a lighted candle, a picture of the light of Christ conquering the darkness of evil. Everyone who is baptized walks in that light for the rest of their lives. As you pray for the candidates, picture them with yourself and the whole Church throughout the ages, journeying into the fullness of God’s love.
Please contact The Dean: The Very Reverend Raymond Stewart 02871262746 to arrange a date for this important occasion.
A voluntary Thankoffering is appreciated. | <urn:uuid:652aebcb-6765-4feb-8a2a-5813cabf3393> | CC-MAIN-2022-33 | https://www.stcolumbscathedral.org/baptisms | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.940293 | 379 | 1.921875 | 2 |
the system real-time (time of day) clock
The clock special device file (/dev/clock)
provides access to the battery-powered, real-time time of day clock.
Reading this file returns the current time;
writing to the file sets the current time.
The time, 10 bytes long, has the form MMddhhmmyy
where MM is the month, dd is the day,
hh is the hour, mm is the minute, and
yy is the last two digits of the year.
The command echo `cat /dev/clock` prints the current
time on the standard output.
0826150392 corresponds to 15:03 on August 26, 1992.
Not all computers have battery-powered real-time time of day
clocks. Refer to your computer's hardware reference manual.
You cannot set the time on the real-time clock if the permissions
of /dev/clock do not allow it.
full pathname of clock
© 2005 The SCO Group, Inc. All rights reserved.
SCO OpenServer Release 6.0.0 -- 03 June 2005 | <urn:uuid:1911f865-7cd9-4e59-8bde-fb535a4fa2ba> | CC-MAIN-2022-33 | http://osr600doc.xinuos.com/en/manF/clock.F.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz | en | 0.808541 | 282 | 3.328125 | 3 |
Telstra’s plans to separate into three entities is the most drastic shake-up of Australia’s largest telecommunications provider since 1997 when the Howard government privatised it.
David Hetherington is a senior fellow at Per Capita’s progressive think tank. He suggests that is 23 years late.
The Howard government created an environment for imperfect competition by privatizing a public monopoly, which was responsible for controlling copper wires and other infrastructure. This meant Telsta had to compete against other telcos that it provided critical infrastructure services. It was not ideal.
The market is now even more murkier after the botched and politicized roll-out for the National Broadband Network.
Julia Gillard and Kevin Rudd, Labor’s Labor governments, have proposed the NBN model. This would replace the century-old copper wire network that connected the nation to its homes and businesses with fibre optics. It could have also corrected the mistakes in how Telstra was privatised.
The Abbott government threw out that plan and launched a half-baked NBN. Now, the federal government is planning to privatize the broadband network.
Telstra is looking to break up into three separate entities. Telstra is attempting to buy NBN, which would put it back in a monopoly situation. This might be good news for shareholders. It’s not good for consumers and competition.
Strategic sense – For shareholders
This is Telstra’s Plan. InfraCo will continue to manage Telstra’s fixed-line assets. InfraCo Towers will become the mobile infrastructure. ServeCo will be the third entity that owns Telstra’s active mobile phone business. This includes its radio access network, spectrum assets, and network coverage.
Telstra sees this as strategic.
To make way for the National Broadband Network in 2010, the Australian parliament passed legislation that required Telstra to separate its wholesale and retail divisions and to sell its copper broadband networks and its cable broadband networks to government-owned NBN Co.
At the time, analysts said that it was a positive for Telstra because it would get a return from its aged assets and be able to concentrate on higher-margin revenue business such as Next G Mobile and HFC Cable networks.
It has also lost approximately A$3.5 Billion in earnings due to the loss of control over its network.
Positioning for a privatised NBN
Telstra will have the chance to purchase a privatised NBN through the split.
Last year, Paul Fletcher, Federal Communications Minister, disapproved of any possibility that Telstra could acquire the NBN. He stated that no entity providing retail telecommunications can own the broadband network. A vertically integrated telco cannot own the NBN.
The restructure reveals that it won’t take Telstra to buy NBN, but InfraCo.
Vicki Brady was Telstra’s chief financial Officer.
We are aware that the government indicated their intention to privatise NBN at some point. However, we wanted to ensure we have the option at that point.
Analysts believe that Telstra is the best partner for privatizing NBN. It could provide a better service to NBN customers and make Telstra more efficient.
NBN Co is clearly not doing well. It reported in February a A$2.8 million half-year net loss, after tax. This is on top of multiple multibillion-dollar losses. Although it was a significant improvement, the latest half-year result still reflected a loss of A$648 millions.
The biggest problem with the NBN is its inability to be created without political interference.
In 2013, the Abbott Coalition government was elected and claimed it could deliver NBN faster by reducing from a pure fibre-optic network to one that uses coaxial cable.
It claimed it would deliver the NBN at $29.5 billion instead of the A$50 billion Labor had planned. The results: has been unable to fix outdated technology, and NBN Co has produced a substandard product.
The NBN is far over budget and over time and is delivering an expensive product. Australia is ranked 62nd in the global rankings for download speeds. This places it ahead of Montenegro and Kazakhstan, while Uruguay is in the last place. | <urn:uuid:90ea3a8a-1833-44aa-bf75-e7d735201d21> | CC-MAIN-2022-33 | https://zestdigitalmag.com/split-decision-telstras-carve-up-plan-is-23-years-late-for-customers-and-competition/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.961247 | 873 | 1.921875 | 2 |
It’s Like a Computer ModelJune 30, 2009 3 Comments
Network Theory and Social Technology have become so tightly bound that it becomes increasingly difficult to talk about networks for social change without having one of our nonprofit-types freak out about technology, learning curves, accessibility, etc. I have been looking for ways to sift through the distinctions in a way that salvages core network lessons for movement building; here is some of what I’ve come up with:
- The network approach works offline as well as online (it is a logic, not a technology)
- We should move from an organization-centric paradigm to a network-centric paradigm (our organizational structures can evolve in this direction)
- Our leadership models must evolve in order to handle decentralization (deemphasize control and emphasize connection)
I have been using a “rocket building” analogy. Building a rocket is too expensive for us to just start building at random. Instead, we first build a computer model of the rocket, there we adjust for all sort of variables, the pull of gravity, energy needs, the best types of material, etc. We see how it works on the computer, and then we build it.
Similarly, we could not have dared to build an offline world that allows for as much decentralization and self-organization as the online world does. Our current organizational structures – from the state, to the corporation, to the foundation and the nonprofit – are too strongly cemented. Breaking down organizational walls and internal hierarchies would have put too much at risk.
The online world has provided an unprecedented space for large-scale experimentation in new forms of organization. It has become our own computer model and it is showing us amazing things about what is possible not only online but also offline. Kevin Kelly of Wired Magazine has gone as far as calling this The New Socialism. And while I’m sure that Marx is turning in his grave, what I continue to argue is that an entirely new paradigm is finally emerging and that it is through our participation that we’ll actually have a chance to shape it. | <urn:uuid:c961d11e-1982-443a-9235-ebc4406f1415> | CC-MAIN-2022-33 | https://interactioninstitute.org/its-like-a-computer-model/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.957093 | 430 | 1.976563 | 2 |
Millidge, Gary Spencer: Alan Moore. Storyteller. Lewes: Ilex, 2011. (320 S.)
Added by: joachim (2011-11-05 15:22)
|Resource type: Book
ID no. (ISBN etc.): 0789322293
BibTeX citation key: Millidge2011
Email resource to friend
View all bibliographic details
Keywords: Biography, Moore. Alan, United Kingdom
Publisher: Ilex (Lewes)
Fully authorised and absolutely comprehensive, this is the illustrated biography of Alan Moore, co-creator of Watchmen, and one of the most popular and important British writers, in any medium, alive today.
Having interviewed Moore and many of his collaborators in depth, Gary Spencer Millidge is well placed to examine Moore's entire career. Subjects covered include rarely-seen early work, breakthrough UK comics, the hugely successful American work that brought comics to a wider, adult audience, and the genre-defying independent stories of the 1990s, up to his current alternative periodical, Dodgem Logic.
Of equal interest, and covered in full here, are Moore's other endeavours: freedom of speech; magic and ritual; performance art; anarchism; self-publishing; and supporting the arts in his native Northampton, amongst others.
Richly illustrated throughout with behind-the-scenes script pages, personal photos and stunning comic art, Alan Moore: Storyteller is the definitive analysis of the creative spirit of one of the most important figures in popular culture today.
INCLUDES: Exclusive 19-Track CD of rarely-heard songs, readings, and performances by Alan Moore & Friends.
Added by: joachim
PHP execution time: 0.04685 s
SQL execution time: 0.10876 s
TPL rendering time: 0.00223 s
Total elapsed time: 0.15784 s
Peak memory usage: 1.2990 MB
Memory at close: 1.2480 MB
Database queries: 63 | <urn:uuid:78a96e6b-0e92-4a43-9479-8557ab55c994> | CC-MAIN-2022-33 | https://www.bobc.uni-bonn.de/index.php?action=resource_RESOURCEVIEW_CORE&id=6709 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.882204 | 480 | 1.734375 | 2 |
The potential for solar power use in Virginia is significant. There are now more than 82,314 homes in the state that are powered by solar.
Solar panel installations in Virginia are certainly on the rise. A total of 731 megawatts of solar capacity is now operational in the state. This helped it reach a ranking of 17th across the nation.
To find an affordable solar installer in Virginia, just fill out the form on this page. Read further for info about the state’s solar industry.
Here are some key numbers about the Commonwealth State’s solar installation activity to date;*
- A total of 956 million dollars have been invested into the solar industry to date.
- Prices for solar are have decreased 47 percent through the last 5 years.
- There are more than 253 solar companies doing business in Virginia. They are actively employing about 3,890 people.
IKEA, a strong investor in solar across the U.S., also has an installation in Virginia. The company has a 504 kilowatt system in Woodbridge. There is also a utility scale solar project being planned in Fauquier County which should be about 20 megawatts in size.*
Virginia has a decent net metering policy. Residential systems are allowed to be as large as 20 kilowatts – a size adequate enough for even the largest power users. Customers are credited at the retail rate for their excess solar. The 1 percent aggregate capacity limit must eventually be increased as the state takes on more solar.**
The state has a “voluntary” Renewables Portfolio Standard. It is suggested that utilities attempt to provide 15 percent of their power from renewable sources by 2025. If this policy remains voluntary, hopefully utilities will look to reach and surpass this goal as renewables like solar power become even cheaper in the coming years.**
There are approximately 111 solar contractors in Virginia. These solar panel installers can be found throughout the state. Plenty can be found in Richmond, Arlington, Springfield, Alexandria, Woodbridge, Herndon, Reston, Chantilly, Harrisonburg, Charlottesville, Chesapeake, Virginia Beach, Newport News, Norfolk, Blacksburg, and Roanoke.
Fill the form on this page to get connected to a trusted installer in Virginia today.
*Information and figures gathered from seia.org.
**Information and figures gathered from dsireusa.org. | <urn:uuid:3cb1ea15-3afe-4b27-968a-22ac33938f2d> | CC-MAIN-2022-33 | https://solar-power-now.com/solar-panel-installation/solar-panel-installations-in-virginia/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.933564 | 494 | 2.015625 | 2 |
Higgins is born on April 24, 1896 on the west coast of Ireland in Foxford, County Mayo. He is the eldest son of Joseph, a policeman stationed in Foxford at the time of his son’s birth, and Annie Higgins. His poem “Father and Son” is a loving tribute to his father. He grows up in Ballivor, County Meath, where his family has farmed for several generations. He spends the largest part of his adult life in Dublin, in a house he has built beside the River Dodder in Rathfarnham. His health is poor, and though his friends are inclined to regard him as a hypochondriac, his frequent predictions that he would die young prove to be accurate.
Higgins marries Beatrice May Moore in 1921. The marriage is a happy one. Even Frank O’Connor, who dislikes him, praises him as a kind and considerate husband. He is however reputed to have had a number of affairs, notably with the actress Ria Mooney.
Higgins is a student of William Butler Yeats and serves on the board of the Abbey Theatre from 1935 until his death. His best-known book of poetry is The Gap of Brightness (1940). He is also well known for his poem “Father and Son.” He writes a moving elegy for his fellow poet Pádraic Ó Conaire. He is generally acknowledged to be a fine poet, but is less successful in his Abbey Theatre work. Frank O’Connor says unkindly that Higgins could not direct a children’s poetry recitation.
In 1937 Higgins is tour manager of the Abbey Theatre production of Teresa Deevy‘s Katie Roche, which tours to the Ambassador Theatre in New York City. There are five performances from October 2-6. His Abbey career can be seen in the Abbey Theatre archives.
Higgins is a popular and convivial man. Even O’Connor, who comes to regard him with deep suspicion, admits that he is a delightful person to know. His circle of friends include many of the leading Irish literary figures of his time, including Yeats, Padraic O Conaire, George William Russell, Lennox Robinson, and for a time O’Connor. O’Connor, however, comes to regard him as untrustworthy and a troublemaker, and describes him unflatteringly in his memoir My Father’s Son. For Yeats, Higgins seems to feel a genuine affection, once remarking that he never left Yeats’ house without “feeling like a thousand dollars.” He is also capable of great kindness and generosity to younger writers like Patrick Kavanagh.
(Pictured: “F. R. Higgins,” Oil on Canvas by Sean O’Sullivan, courtesy of the Abbey Theatre, Dublin) | <urn:uuid:8b379762-c403-4536-a92e-a56fa98785a3> | CC-MAIN-2022-33 | https://seamusdubhghaill.com/tag/lennox-robinson/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.98377 | 598 | 2.484375 | 2 |
Every week, the National Association of Episcopal Schools (NAES) publishes a weekly meditation, written by the Rev. Daniel R. Heischman, Executive Director of the organization.
For the week of September 2nd, the meditation featured Archbishop Andrew Hutchison, former Primate of the Anglican Church in Canada and the subject of a Portrait of the Week in June. In his message, reprinted below, Rev. Heischman invites us all to consider that as many students begin their time at new schools this month, they will wish not only to be welcomed but to be welcomed to contribute to the communities they join.
Please know that we would be delighted for you, our Portraits in Faith community, to contribute to the project by sharing your own stories and your thoughts on the stories that we share. Reach out to us directly here, find us on the Portraits in Faith Facebook page, or tweet us @faithportraits. We look forward to connecting with you.
“Andrew Hutchison, the former Primate of the Anglican Church in Canada, tells of the time in his childhood—at six years old—when he was shipped off to a boarding school, due to the fact that his family life had fallen apart.* There he found himself lonely, unhappy, and homesick. He found solace, however, in the daily chapel he experienced at school, as well as the time he spent alone in that chapel, simply sitting there and gazing upon the window above the altar. The window depicted Jesus standing at a door, holding a lamp. The door, however, could only open from the other side—its opening was obviously dependent upon the person hearing the knock. Hutchison found himself imagining himself being on both sides of that door. On the one hand, he thought about letting the light into his life represented by Jesus and the lamp he held. On the other hand, he felt an affinity with being on the other side, standing there and knocking, particularly in those moments where he felt he did not belong at school. He wondered in such moments if someone would in fact open the door; would someone let him in?
During these initial weeks of school, we need to remind ourselves of the fact that many people—students and adults alike—enter our doors wondering if they will fit in, if they will find a place for themselves in this school. As Atul Gawande told graduates at the University of North Carolina at Chapel Hill, this past spring, the search for meaning in life is as much a search for a place as an idea, a place where the door indeed opens for all of us. We seek not only a place of welcome but also a place where we can contribute.
In ways small and large, in places such as the classroom or athletic field or the dining room, we seek to cultivate communities of welcome, where the door opens to so many. Statistics tell us just how crucial these initial weeks can be for people in determining whether or not this is a place where they feel a sense of belonging. Fewer and fewer people seem willing to wait it out and take the long-term view on finding a place.
Few things are more fundamental to our identity as Episcopal schools as the culture of belonging that we seek to develop. It is hard work, but the benefits are immense for those on both sides of the door. It turns out that, in opening that door, we are more than being gracious—we are letting the light into our lives.
*You can see Archbishop Hutchison tell this story at http://www.portraitsinfaith.
Our thanks to Alexis Kent for connecting our two communities, to Rev. Heischman for sharing this portrait, and of course to Andrew Hutchison for sharing his powerful story with us. | <urn:uuid:34a4821f-d876-4b22-af24-484c7c00c91c> | CC-MAIN-2022-33 | https://portraitsinfaith.org/portraits-faith-featured-national-association-episcopal-schools-naes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.974673 | 767 | 1.992188 | 2 |
In 1866 Welsh missionary to China, Robert Jermain Thomas, sailed up the Taedong River near Pyongyang, dressed in traditional Korean garb and carrying Bibles. The ship Thomas sailed upon, an American vessel, was attacked and the crew was killed. When Thomas came ashore he carried a white flag and a number of Bibles. When a Korean combatant approached him, Thomas reached out to hand the man a Bible just before the soldier brought a sword down upon his neck.
Twenty-four years later. Samuel Moffett, the first full-time missionary to Korea, met many of the people who had contact with Thomas, including the children of his executioner. Several of these Koreans became leaders in the budding Korean Christian movement and witnessed mighty revivals that led to the flourishing of the Gospel in that nation.
Servant of Christ is an enthralling documentary tracing the historical roots of Christianity on the Korean Peninsula.
|Title: Servant of Christ - Robert Jermain Thomas & Korean Revivals [Video Download]|
By: Christian History
Format: Video Download
Vendor: Vision Video
|Publication Date: 2011|
Stock No: WWDV3463-CP
Ask a Question▼▲
Find Related Products▼▲
Ask a Question
What would you like to know about this product? Please enter your name, your email and your question regarding the product in the fields below, and we'll answer you in the next 24-48 hours.
If you need immediate assistance regarding this product or any other, please call 1-800-CHRISTIAN to speak directly with a customer service representative. | <urn:uuid:09698169-e970-4c9c-a3a8-740c789042bc> | CC-MAIN-2022-33 | https://www.christianbook.com/servant-robert-jermain-thomas-korean-revivals/pd/DV3463-CP?event=ESRCG | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.919383 | 381 | 2.15625 | 2 |
Steps announced to curb monopolies
2021 is a big year for China to counter monopolies, and authorities have taken a series of measures to regulate enterprises' market behaviors for fair play.
China's State Council issued antitrust guidelines on the country's platform economy, addressing economic and social activities facilitated by platforms, on Feb 7, signaling strengthened antitrust enforcement against monopolistic behaviors in the country's internet platform sector.
The country's draft amendment to the Anti-Monopoly Law was submitted on Oct 19 to the National People's Congress Standing Committee, the top legislature, for review. China's national anti-monopoly bureau was inaugurated in Beijing on Nov 18, which aims to strengthen anti-monopoly supervision in the country.
China has made great efforts to ensure market players have a good business environment for fair competition and ensure market entities' rights are well protected by providing policy and institutional supports. | <urn:uuid:cea42368-35fe-4ddc-9096-494921dc5fb6> | CC-MAIN-2022-33 | https://govt.chinadaily.com.cn/s/202112/27/WS61c93c77498e6a12c121bcec/major-economic-policies-boost-recovery-in-2021_7.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00065.warc.gz | en | 0.95369 | 181 | 1.984375 | 2 |
A couple of weeks ago, I booked myself onto a day-long spindle spinning workshop at Get Knitted, my favourite Bristol yarn store. I’ve wanted to learn to spin for several years, ever since a friend gave me her slightly broken spinning wheel but I didn’t want to spend money getting it fixed until I knew for sure that spinning was something I wanted to pursue. I have to be careful to balance my need to enthusiastically throw myself into new things with keeping a focus on my existing art: I am very easily distracted! However, number 55 on my 101 Things list is Learn to Spin, so when I saw the workshop advertised, I jumped at the chance to do it.
I’ve been feeling very unenthusiastic about my art for months now but this workshop really released my creative juices: I came home this evening ready to get right back into the studio and start making again. There were 9 of us on the course and our teacher was Jen from the hand-dyed yarn company, Fyberspates. Jen got us all spinning with a simple wooden and plastic spindle in an amazingly short time. Spindles are an ancient technology, possibly one of the oldest in the world – apparently in the Middle Ages they sometimes used a stick and a potato if they didn’t have a nice carved wooden spindle to hand! We got to play with wool, alpaca, silk, mohair, linen and even a little bit of cashmere. Just sinking my fingers into all the different types of fibre was an education and it was interesting to see how we all differed in which ones we found easiest to spin.
My tiny lumpy balls of yarn don’t look like anything special but to me they’re quite magical because hey, I made yarn! Actual yarn, from fibre – how cool is that? OK, so it’s not very good yarn – a 5 year old medieval child with a potato could probably have made better. It’s extremely uneven, going from thick to thin and back again and some places aren’t twisted enough but I don’t care, it’s a beginning. This is the incredible thing about learning something new; the joy of looking at something that you’ve made with little technical skill but with utter concentration and passion and knowing that you’re back in that humble place of Beginner’s Mind. Every artist should keep feeling their way back to that place; it kicks you out of your complacency and gives you that little skip in your creative spirit that charges you up.
A Boring Bit
There’s been a bit of downtime on the site this week because we needed to upgrade WordPress after a possible spambot incursion – so if anyone’s had trouble getting the site to load, that would be why. A couple of things are still a bit funky: the gallery pages aren’t quite right and the blog archives have done a bunk but hopefully we’ll get everything back to normal soon. If you’re very observant, you may also have noticed that we’ve switched on a confirmation box for comments. I’m sorry about this, I know they’re a nuisance but I was getting upwards of 400 spam on the blog every single day and it was driving me absolutely nuts. | <urn:uuid:e79eaeb4-46cd-44db-acc8-3dccc0403e42> | CC-MAIN-2022-33 | https://kirstyhall.co.uk/2008/04/20/you-spin-me-right-round/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.963288 | 697 | 1.6875 | 2 |
Until now there’s been no standard providing criteria to help determine the placement or number of flame and gas detection devices needed to optimize safety in an explosive or toxic atmosphere. This blog post discusses the new British Standard that is plugging that gap.
It’s fair to say that there are a number of standards covering explosive atmospheres. The European 60079 series alone is extensive and wide-ranging. It includes, for example, BS EN 60079-29-2:2015 Explosive atmospheres. Gas detectors. Selection, installation, use and maintenance of detectors for flammable gases and oxygen. This standard deals with – as the name points out – choosing, installing, using and maintaining flame and gas (F&G) detectors. Nevertheless it – in common with all other standards – doesn’t talk about the important subject of detection mapping using software tools and techniques.
Moreover recent years have seen an increase in the number of commercially available mapping tools. This has tended to exacerbate the issue. Because as much as these tools are useful, there are still no generally agreed principles or guidance as to what it is that they should be achieving.
To fill that deficit we’ve now published an all-new British Standard that will complement and support existing explosive atmosphere standards. It is: BS 60080:2020 Explosive and toxic atmospheres: Hazard detection mapping – Guidance on the placement of permanently installed flame and gas detection devices using software tools and other techniques.
Permanently installed F&G detectors
BS 60080:2020 gives guidance on the placement of permanently installed F&G detectors. It defines permanently installed detection systems as including optical flame detection (including ultraviolet, infrared and visual), flammable gas/vapour detection and toxic gas detection.
The standard covers the setting of performance standards for coverage, placement of devices and technology selection. And it provides guidance on the most commonly used methods of mapping and/or modelling – prescriptive, volumetric and scenario-based. It also provides guidance on operations, maintenance and the availability/reliability of the system to complement relevant standards.
It’s relevant to applications where optical flame detection is used as a means of detecting flaming fires in internal and external environments; where a gas detection system is used as a method of explosion protection; where the hazard arises from the release or accumulation of explosive gases and vapours and where the hazard arises from the release or accumulation of toxic gases.
Increasing the level of safety
The standard was written to be used by manufacturers, retailers and distributors of detection devices and software, as well as engineering companies and engineers tasked with implementing a detection system. They’re responsible for the detection layout and implementation of the system but rely on company or end-user guidance on what targets to meet and which rarely exist. Before this standard existed, this resulted in inconsistent designs across similar sites which may even be operated by the same end user. Analysing adequacy is also difficult, as this is typically based on the experiences of the individual tasked with generating the layout.
The standard will also be used by consultants and auditors who’re brought in to conduct third-party reviews, and who themselves need a design guide with which to assess adequacy or otherwise. (To date consultancies are prepared to sign off on systems but state that since no standard exists on which to base a finding of adequacy, they accept no liability if, in fact, the system is not fit for purpose.)
Certification bodies will also use the new standard as it gives them a checklist that they can certify compliance against.
Secondary users will be insurance companies. It can form part of their checklist – i.e. “gas detection systems installed in compliance with....” It can be used by regulators in the same way. Academic institutions can use the standard in their courses. Finally the judicial system may be able to turn to the standard as a model of best practice in the event of accidents, injuries or deaths as a result of explosive atmosphere explosions.
And at the end of the day, that usage vividly highlights the purpose of this new standard. It exists to increase the level of safety in explosive atmospheres in order to protect those working on sites, as well as the general public and the environment in the vicinity of sites. The standard will tell users what an acceptable minimum level of safety is in respect of explosive atmospheres, so that they can achieve it. | <urn:uuid:80a0c357-3cbe-4b0f-8d22-45f9c26f0923> | CC-MAIN-2022-33 | https://www.bsigroup.com/mn-MN/blog/health-and-safety-blog/bs-60080/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.931387 | 905 | 2.390625 | 2 |
Relying on the regulatory and legal uncertainty surrounding cannabidiol (CBD), Food and Drug Administration statements and state laws, several class actions have been filed since late 2019 against companies selling CBD products, a number of which have been filed in California federal courts. In at least two cases, courts have adopted defendants’ requests to delay the cases while the FDA continues to study CBD and how it should be federally regulated. These cases could represent a developing “wait and see” approach by federal courts dealing with CBD class action lawsuits.
In Colette v. CV Sciences, Inc., a federal district court recently granted a CBD company’s motion to stay the lawsuit indefinitely on the basis that FDA is actively considering how it plans to regulate CBD-containing products. In this case, Michelene Colette and Leticia Shaw represent a class of plaintiffs throughout the U.S. who have purchased CV Sciences’ CBD products (e.g., sprays, oil drops, gummies, capsules, and softgels). Their suit alleges that the company’s sale of CBD products is illegal under the Federal Food, Drug, and Cosmetic Act, essentially adopting the logic in many of FDA’s recent warning letters that CBD products are unapproved new or misbranded drugs in violation of the FDCA. In addition, the plaintiffs claim that CV Sciences’ sales violate several California and Arizona unfair competition, false advertising, warranty and consumer fraud laws.
In response, CV Sciences asked the court either to dismiss the case or pause it until FDA makes a final decision on how it will regulate CBD products. To support its argument, the company relied on a legal doctrine known as “primary jurisdiction.” This doctrine allows a court to dismiss or pause a case while the resolution of the main issue is pending before a government agency. CV Sciences cited to FDA’s ongoing rulemaking, public hearings, and information collection activities regarding CBD products.
The court was persuaded by CV Sciences argument and decided to delay the case. The court cited a few main reasons for its decision.
- Notably, the court stated “[t]he fact remains that the FDA has not formally established its position.”
- The court found that regulatory oversight of CBD products is complex and involves multiple federal and state agencies.
- Congress delegated regulation of CBD products to FDA and has increased pressure on the agency to issue guidance.
- The number of similar class action lawsuits increases the risk of inconsistent decisions.
The court also rejected two of the plaintiffs’ counter arguments. First, plaintiffs argued that any future FDA regulatory action could not be retroactively applied. The court, however, pointed out that Congress has the power to pass retroactive legislation.
Second, the plaintiffs argued that the court had the power to decide issues of unlawful, misleading, or deceptive labeling and advertising without FDA’s guidance. But the court countered that, given the number of CBD-related class action lawsuits, there would be a real risk of inconsistent rulings without FDA guidance. Consequently, the court approved the defendant CBD company’s motion for a stay until “FDA completes its rulemaking regarding the marketing, including labelling, of CBD ingestible products.”
It appears the court’s decision to delay the case may be a trend. In at least one other case, Snyder, et al., v. Green Roads of Florida LLC, another federal district court has granted a delay based on similar legal arguments. Given the fact that FDA has made no commitment to engage in rulemaking regarding the marketing or labelling of CBD products, and the length of time it could take the agency to complete such a rulemaking, these cases are likely to be stayed for years. | <urn:uuid:1432ef36-8473-4f89-a827-5395e8e594c6> | CC-MAIN-2022-33 | https://www.tobaccolawblog.com/2020/06/federal-courts-may-be-trending-toward-delaying-cbd-consumer-class-action-lawsuits/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.948842 | 763 | 1.546875 | 2 |
Ardmore - Ardogina House
Richard died trying to escape from the law for a crime he did not commit. He can be heard screaming, choked to death on the reins of his horse. The spectral Jeremiah Coghlan reportedly rides on the back of a white horse - if seen, the viewer will die within a year. Finally, Sir Francis Prendergast, a psychotic murderer, stalks nearby woodland.
A ghostly fishing boat in the mist.
Ardmore - Whiting bay to Glencairn Beach
Two groups of fishermen half a mile out to sea observed a large fishing boat heading towards them. Even though the boat made no sound and did not create any waves, the fishermen pulled back their nets fearing that the vessel contained customs officers and hid in the nearby coves for the boat to pass - but it had vanished. A fortnight later, a huge storm hit the area and a local schooner named 'Nellie Flemming' was lost without trace, and the fishermen became convinced that the 'Nellie Flemming' was the strange boat they had seen.
Ballinacourty - Ballinacourty house (no longer standing), and general area
A mother whose son was hanged by a local sheriff for being 'lazy' cursed all who lived in the area to endure the heartbreak she felt.
Ballinalee - Private residence
It was said that the original owners were magicians and that one of their spirits remained in the house. Sickness plagued one of the occupants, but when they moved out in 1968, the illnesses ceased.
Butlerstown - Coach House restaurant
It is claimed this location is haunted by a gunman shot dead by the British in 1921.
Cappoquin - Melleray Grotto
16 August 1985
The statue of the Virgin Mary animated on this day, speaking to visitors and answering their questions.
Lismore - Glencairn Abbey
The abbey was once haunted by a young woman dressed in white. She was seen and heard moving in the upper part of the building, though it is said the haunting stopped once a Major discovered a heart in a metal box in the attic and gave it a proper burial.
Portlaw - Gill House
The Second Earl of Tyrone and Nicola Hamilton agreed that the first one to die should appear post-mortem to the other. Many years later at Gill House, Nicola (now Lady Beresford) encountered the ghost of the Earl, who touched her wrist. The spectre left a blackened mark and caused the joint to shrivel up; Lady Beresford covered the area up with a black ribbon which she never removed. It is worth noting that the same story is told about a house in Dromore.
Templemichael - Templemichael Castle and Church
Several unconfirmed stories speak of this location being haunted, but no one can say for sure by whom or what.
A ghostly nun wandering the roads.
Waterford - Back roads of Presentation Convent
Little is known about this ghostly white nun who walks along the roads after dark.
Waterford - City centre
A banshee is said to have been observed sitting on walls around the city centre, wailing whilst brushing her hair. Her cries are said to upset nearby dogs.
Waterford - Private house in the Grange area
A family reported that a middle-aged woman with her dark hair tied up in a bun had haunted their home for twenty years. She often stood on the staircase, watching the occupants go about their business.
Waterford - Private residence, Ballybricken area
A resident here reported all the lights in the house turning themselves off (without the trip switch kicking in), footsteps being heard, and the kettle turning itself on.
Waterford - Quay
Late nineteenth century
Eli Hayson peered from the window of his house which overlooked the quay and watched his twin brother Jack emerge and come running towards him. Jack appeared terrified and was being chased by three men. Before Eli had a chance to act, all four figures vanished. Not long after, Eli heard that his brother had drowned at Cork, fifty miles away. | <urn:uuid:946edc05-4979-44e8-8bfa-01fa0fab4546> | CC-MAIN-2022-33 | https://www.paranormaldatabase.com/ireland/waterford.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.963958 | 963 | 1.6875 | 2 |
WHEREAS changes to the seasonal workers benefits under Employment Insurance are no longer assured as provinces find their social assistance funds stretched to the limit as they cope with hunger, housing and security;
WHEREAS many children, seniors and individuals with disabilities also face income insecurity across the country;
WHEREAS pension security is at risk;
WHEREAS the federal government has not kept pace with local needs;
WHEREAS many explicit and invisible signs of income insecurity exist in Canadian rural and urban settings, both presenting unique circumstances in the Provinces and Territories;
WHEREAS Provinces and Territories require greater flexibility in designing and administering programs which specifically fit their respective jurisdictions;
BE IT RESOLVED that a Federal Liberal Government work with the provinces and territories to design and implement a Basic Annual Income in such a way that differences are taken into consideration under the existing Canada Social Transfer System.
Liberal Party of Canada (Prince Edward Island) | <urn:uuid:8c6a53eb-24d4-4bb2-8e4e-870ed42b4884> | CC-MAIN-2022-33 | https://liberal.ca/policy-resolutions/100-priority-resolution-creating-basic-annual-income-designed-implemented-fair-economy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.932782 | 186 | 1.734375 | 2 |
The 4-states in lanthanide elements are spin-polarized in many cases, and the majority states are located at below a few eV taken from the Fermi level. However, LDAs and GGAs cannot describe the feature of band structures for those materials. Although one way is to perform the plus U method by introducing on-site Coulomb repulsion for the 4-states in such a case, OpenMX provides a simpler way that the spin-polarizaion of 4f-states is taken into account via a pseudopotential, so-called open core pseudopotential, while a few open core pseudopotentials are available in the database Ver. 2019. The open core pseudopotential of a lanthanide element is generated by assuming that the 4f-states are a part of core states, and the partial core correction charge is generated so that the radial shape resembles well the charge distribution of the 4f-states. Pseudopotentials: Nd_CA19_OC.vps and Nd_PBE19_OC.vps stored in the database Ver. 2019 were generated in this way.
To illustrate how the open core pseudopotential can be used, a series of calculations for NdCo in the CaCu structure is shown in Fig. 4. It is found that the calculation with the open core pseudopotential qualitatively reproduces the result by the LDA+U method. When the open core pseudopotential is used by OpenMX, the partial core correction charge can be spin-polarized by the following keyword:
<scf.pcc.opencore Nd 1 Co 0 scf.pcc.opencore>The example is for the NdCo calculation discussed above. The first column is the name of species which is defined by the keyword 'Definition.of.Atomic.Species', and the second is a flag to specify the spin direction, where '1' and '-1' mean that the partial core correction charge is fully spin-polarized upward and downward along the -axis, respectively, and '0' means no spin-polarization. Using the keyword, one can control the spin direction of 4 states being open core states site by site. It is also noted that the open core pseudopotential is valid if the overlap between the 4-states and orbitals in the neighboring atoms is negligible, and if the occupation of the 4-states is not largely different between the pseudopotential generation for an atom and the states in compounds. | <urn:uuid:a2402165-48ab-4857-bf62-ff89241395d8> | CC-MAIN-2022-33 | http://openmx-square.org/openmx_man3.9/node33.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00065.warc.gz | en | 0.927771 | 528 | 2.328125 | 2 |
As music fans seek out unforgettable experiences, drone displays are poised to become a staple at festivals around the world. Here’s why we believe they’re
“Artivism” was first coined in the 1960s to describe demonstrations against the Vietnam War, student movements, and counter-culture. But it’s been arguably been around much
Drone light shows and nature might not be something you would immediately think go together. However, as we look to technological solutions to protect our
Whatever industry you’re operating in, getting your brand in front of your target market can be tough. This is especially the case for B2C businesses,
Drone technology was originally built for military purposes, but they’ve come a long way since then. Now, many of them are being used for good.
There are a whole range of components that go into creating a drone light show, as every show is a delicate balance between storytelling, motion
Fireworks have been synonymous with big public events and celebrations for hundreds of years. But the world has changed a lot since they were first
Drone light displays have been taking off in recent years, removing the need for carbon laden fireworks and introducing more eco-friendly alternatives. With the ongoing | <urn:uuid:e5cfaa7d-5488-46bc-ad10-3df1c9ea8f88> | CC-MAIN-2022-33 | https://celestial.show/blog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.973752 | 258 | 1.585938 | 2 |
Studying samples of reservoir rocks: core analysis gives the most accurate insight into the characteristics of a drilled oil or gas well and the conditions down-hole. Typically, core samples of rocks are cylindrical in shape, taken from a core that is obtained from the side of and measuring about 1 inch in diameter and 3 inches long. Apart from porosity and permeability of the reservoir rock, core analysis also explores fluid saturation and grain density. Together, these measurements help people involved in the oil and gas industry such as geologists, engineers, drillers, etc. better understand the conditions of the well and maximize productivity and efficiency.
NanoCT (here GE Nanotom M) provides an excellent platform to study porosity (B), permeability (C), and grain density (D) of a rock core (A). The extracted information provides critical input in understanding oil well dynamics and how rock characteristics, along with other parameters, drive the mechanism. | <urn:uuid:9a687050-5509-4218-a789-a3a547bda7e2> | CC-MAIN-2022-33 | http://mic.usc.edu/imaging/core-analysis-of-reservoir-rocks/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00065.warc.gz | en | 0.938434 | 192 | 2.875 | 3 |
ON THE TUESDAY BEFORE New York Fashion Week, two months before the U.S. presidential election, American designers demonstrated their political zeal with swag. The ‘Made For History’ collection, which debuted at a runway fundraiser, included a bandana by Thakoon, a pouch by Brett Heyman and T-shirts by Marc Jacobs, Joseph Altuzarra and Tory Burch. These favoured, predictably, Hillary Clinton. ‘Unlike the Republican candidate’s unspeakably hideous ties, our collection is made in America by union workers,’ announced host Anna Wintour.1 Two more Clinton fundraisers would be held before the week wrapped. ‘I attended all these events because being a Democrat is always fashionable,’ wrote the socialite journalist Derek Blasberg.2
Before there was Clinton swag, there was Obama swag. Before there was Obama swag, there was Kerry swag. (Donald Trump has swag, but no designer names are attached.) That the fashion industry leans to the left is no surprise considering that seventy per cent of people currently favour Clinton in New York City, where the U.S. fashion industry is also based.3 All the same, it’s worth asking: if being a Democrat is always fashionable, whom are these items really trying to convince? Do we purchase Diane von Furstenberg’s Hillary Clinton T-shirt to show solidarity, or to build our personal brands? Do designers create them because they will change hearts and minds – or to reassure themselves that their industry has a role to play in their nation’s critical decisions?
For an industry whose existence hinges on newness and excitement, an election year is a threat. Hemlines are not important when millions might lose healthcare coverage. Front row quotes appear meaningless when the future of foreign policy is being debated. Collections like ‘Made For History’ are meant to encourage political engagement among consumers – but they also assert the fashion industry’s relevancy at a time when it is in jeopardy.
Fashion is especially vulnerable to accusations of frivolity during moments of social turmoil. Consider Marc Jacobs’ recent use of dreadlocks on a cast of predominantly white models, the farthest-reaching political message of the most recent New York Fashion Week (and, ironically, per Jacobs, an accidental one). The show ignited outrage over cultural appropriation, but pundits also criticised the backlash as a distraction. ‘Don’t Rage Over Dreadlocks While African Americans Are Dying in the Streets,’ read the headline of an op-ed by Columbia University professor John McWhorter. ‘Republicans are trying to deny black people the vote nationwide… A War on Drugs has destroyed black communities left and right… Amidst all of that – hair????????’4
The industry has not historically positioned itself as an authority on serious political matters. Like many for-profit enterprises, fashion labels benefit from neutrality – Oscar de la Renta for example famously dressed First Ladies from Kennedy to Reagan to Clinton. Similarly, retailers discourage controversy. Katharine Hamnett, a British designer known for T-shirts with slogans like ‘SAVE THE WORLD’ and ‘WORLDWIDE NUCLEAR BAN,’ recalls trying to sell her creations in the early 1980s: ‘American buyers were rushing into my showroom, willing to spend their money. They took one look at the T-shirts, got a horrified look in their eyes, spun around on their heel and left.’5 Similarly, New York label Pyer Moss’ spring/summer 2016 collection, which featured slogans from the Black Lives Matter movement, reportedly cost the brand $120,000 worth of business, according to the designer,6 though the collection was covered by dozens of media outlets and garnered praise from celebrities including Usher and Erykah Badu.
Sartorial Sloganeering has a Catch 22: when a message is radical enough to provoke, its garment is incompatible with commercial distribution. When a garment is a commercial success, its message fades. Hamnett’s T-shirts, while initially controversial, eventually became popular among celebrities and musicians, and were knocked off by everyone from other designers to the pro-life movement, who appropriated her ‘CHOOSE LIFE’ message, initially created to discourage drug abuse and suicide, to oppose abortion.
It’s telling that, in creating a political fashion statement, the right has borrowed from the left. Though conservatives have more recently developed aesthetic languages of their own – consider the gore of anti-abortion billboards – movements like Black Power, Women’s Liberation and anti-Vietnam war protests were some of the first to harness self-presentation to communicate via mass media. In America, the aesthetics of protest are historically linked to progressive causes.
This does not mean that the values Donald Trump represents are absent from contemporary fashion design. Clothing that promotes gender conformity, and which bolsters existing power structures by glamourising wealth and whiteness, is so ubiquitous that you sometimes forget about it until it bumps awkwardly against a new attempt at ‘wokeness.’ This is as true internationally as it is in the U.S. Consider Chanel’s spring/summer 2015 show, for which Karl Lagerfeld chose the theme of a feminist protest. Models brandished quilted-CC loudspeakers and signs inscribed with a mix of second-wave mantras (‘History is Herstory’), cute one-liners (‘Make fashion not war’) and gibberish (‘Tweed is better than Tweet’). A brooch from the collection featured an image of the house’s founder, Coco Chanel, with the slogan ‘Feministe mais Feminine.’ The show omitted Chanel’s other political history as a Nazi sympathiser, as well as Lagerfeld’s 2009 assertion the house’s founder ‘was never ugly enough’ to be a feminist.7
Chanel’s brand was recently estimated to be worth $7.2 billion,8 yet it positions itself not as the product of corporate market research, but of individual conviction and creative genius. With the number of seasons, collections and fashion weeks increasing, political statements benefit brands by attracting media coverage. But they also position fashion as more art than industry, all the better to smooth friction between progressive values and capitalist profit motive.
Might clothing actually ‘SAVE THE WORLD’? ‘T-shirts are great, but they don’t change anything, really,’ Hamnett said last year. ‘Unless you take constructive action in other areas of your life, just wearing a T-shirt actually isn’t going to do anything.’9
Alice Hines is a writer living in New York City. | <urn:uuid:9776a0e2-0800-46e5-b30a-bdfac03337f7> | CC-MAIN-2022-33 | http://vestoj.com/why-being-a-democrat-is-always-fashionable/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.926393 | 1,771 | 2.0625 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.