text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
The Stack: On Software and Sovereignty
Benjamin H. Bratton is a theorist whose work spans philosophy, computer science, and design. He is Associate Professor of Visual Arts and Director of the Center for Design and Geopolitics at the University of California, San Diego. He is also Visiting Professor of Critical Studies at SCI-Arc (the Southern California Institute of Architecture) and Professor of Digital Design at the European Graduate School in Saas-Fee, Switzerland.
A comprehensive political and design theory of planetary-scale computation proposing that The Stack—an accidental megastructure—is both a technological apparatus and a model for a new geopolitical architecture.
What has planetary-scale computation done to our geopolitical realities? It takes different forms at different scales—from energy and mineral sourcing and subterranean cloud infrastructure to urban software and massive universal addressing systems; from interfaces drawn by the augmentation of the hand and eye to users identified by self—quantification and the arrival of legions of sensors, algorithms, and robots. Together, how do these distort and deform modern political geographies and produce new territories in their own image?
In The Stack, Benjamin Bratton proposes that these different genres of computation—smart grids, cloud platforms, mobile apps, smart cities, the Internet of Things, automation—can be seen not as so many species evolving on their own, but as forming a coherent whole: an accidental megastructure called The Stack that is both a computational apparatus and a new governing architecture. We are inside The Stack and it is inside of us.
In an account that is both theoretical and technical, drawing on political philosophy, architectural theory, and software studies, Bratton explores six layers of The Stack: Earth, Cloud, City, Address, Interface, User. Each is mapped on its own terms and understood as a component within the larger whole built from hard and soft systems intermingling—not only computational forms but also social, human, and physical forces. This model, informed by the logic of the multilayered structure of protocol “stacks,” in which network technologies operate within a modular and vertical order, offers a comprehensive image of our emerging infrastructure and a platform for its ongoing reinvention.
The Stack is an interdisciplinary design brief for a new geopolitics that works with and for planetary-scale computation. Interweaving the continental, urban, and perceptual scales, it shows how we can better build, dwell within, communicate with, and govern our worlds.
Download citation file:
- Open Access
- No Access | <urn:uuid:08a4c45d-5786-4512-ae47-7ec8803dfde9> | CC-MAIN-2022-33 | https://direct.mit.edu/books/book/3504/The-StackOn-Software-and-Sovereignty | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.912461 | 530 | 1.546875 | 2 |
- National Highway construction slows to 20.43 km per day in first 4 months of current fiscal
- Independence Day Special: How investment habits, preferences of people have changed over the past 75 years
- BMW M4 Competition Coupé 50 Jahre M Edition: Price and features | Photos
- Financial Independence for Women: top investment tips for the other half to make them independent moneywise
SBI account holder? Alert! Lock your SBI Net banking now in just a few clicks
This security gap is now being plugged, much to bank account holders' relief. In an alert for customers, the country's largest bank, the State Bank of India (SBI) has launched a new feature where a customer can lock his/her Net banking access and unlock it when needed.
Hackers have increasingly come up with ingenious new techniques through which they get unauthorized access to a bank account holder's data and then they carry out fraudulent transactions via online banking or other sources. This security gap is now being plugged, much to bank account holders' relief. In an alert for customers, the country's largest bank, the State Bank of India (SBI) has launched a new feature where a customer can lock his/her Net banking access and unlock it when needed. By this feature, when a person locks his/her Net banking account, the account will be disabled as if the user never had the Net banking facility.
The SBI website says, "For better control & security of your account, you can lock or unlock your INB access through link 'Lock & Unlock User' available in Home / Login Page."
One should also know that this facility is only available for retail users. Therefore, corporate users cannot access this facility.
But this feature also comes with a set of responsibilities, the users who want to use lock Internet banking are suggested to remember the profile password. Ideally, one should not write down one's password anywhere that unauthorised persons can get a hold of it.
You should keep in mind that the profile password is different from the login password. Profile password is an additional security password which is created by you when you logged in to your Internet banking account for the first time.
The profile password is primarily used to access or make changes in your bank profile details such as mobile number, adding a third party etc. via Internet banking.
It is suggested to confirm the profile password before locking your Internet banking facility, In case if you have forgotten your profile password, reset your profile password before locking your Internet banking facility.
Get Latest Business News, Stock Market Updates and Videos; Check your tax outgo through Income Tax Calculator and save money through our Personal Finance coverage. Check Business Breaking News Live on Zee Business Twitter and Facebook. Subscribe on YouTube. | <urn:uuid:2d80ead6-9bac-43bb-8409-de47a81eaa7b> | CC-MAIN-2022-33 | https://www.zeebiz.com/personal-finance/news-sbi-account-holder-alert-lock-your-sbi-net-banking-now-in-just-a-few-clicks-110016 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.915126 | 567 | 1.507813 | 2 |
Maximizing interior designers' effectiveness
FF&EZ is a tool for architects, interior designers and FF&E salespersons who wish to plan, organize and present design specifications for FF&E (furniture, fixtures & equipment). It can be used for everything from simple sales quotes to new construction projects, producing multiple documents in the most efficient way possible using a computer—with none of the drawbacks of word-processors and spreadsheets nor the technical overhead of CAD-based approaches.
FF&EZ comes in two basic versions: Design and Design/Purchasing. The Design system can produce project or sales order documentation from budgeting through presentations, sales quotes and ordering lists, while Design/Purchasing adds the conversion of ordering lists into actual purchase orders, then tracks and invoices them. For companies with existing purchasing / accounting systems that want to import ordering data generated by FF&EZ, there is also the Design + Order Export option.
FF&EZ is used by firms in the United States, Canada, Europe and Africa to document FF&E projects on four continents. Project sizes range from small sales projects to new international hotels.
Standardized, familiar structure for FF&E content
FF&EZ's power comes from a database framework in which the familiar parts of FF&E design and presentation work (vendors, areas, rooms, etc.) are created once and then linked together by picking them from the resulting lists. This means that, unlike spreadsheets where descriptive information must be copied (and in turn, corrected) wherever it occurs, in FF&EZ you simply make a correction on the list that is the source of the information (such as a color or cost on a specification) and this change flows through the project.
FF&EZ's database is designed to handle the largest design projects, while special functions and shortcut features allow it to be used for simple quotes and sales orders. This gives you a tool that lets you start small if you need to, but with the ability to grow into projects of any size without having to switch between different software programs, especially if you later need to order replacements.
Automatic calculations, powerful data tools
Although some approaches may calculate simple totals, they may require you to calculate total project quantities for each item across all room types. FF&EZ tracks all three quantities that can affect project totals:
- Quantity of objects in a room
- Quantity of related products used in an object (e.g., fabric needed for a chair)
- The room count (or mix) in repetitive building types like hotels
As you keep using FF&EZ, a major long-term advantage of the system becomes evident: Its ability to use pre-built (prototype) items and re-use data from previous work: With FF&EZ, you can:
- Clone (copy) entire projects to create new ones
- Clone rooms, objects and specifications within a project to create design variations without needless duplication or re-entry of the same data
- Import entire rooms, objects and specifications from other projects, including prototypes and templates you set up (you can build entire project skeletons in minutes, even for very unique designs).
Latest Blog Post
Organize Your Interior Design Projects
The biggest advantage of using FF&EZ is the way it helps keep your designs organized, making it easier to be confident that you havent' missed anything, that your estimates are correct and you'll meet your deadlines. | <urn:uuid:6e42d2ed-5840-4784-9e48-155ec54d10a0> | CC-MAIN-2022-33 | http://www.ffez.com/site/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.902863 | 716 | 1.523438 | 2 |
Flush with cash, the fracking industry is liberally throwing bills around as it battles anti-fracking groups pushing suspensions and outright bans on the practice in four Colorado cities.
Anti-fracking ballot measures have been put forth by residents of Fort Collins, Boulder, Lafayette, and Broomfield. (Similar initiatives are planned in Greeley and Loveland — and some activists are pushing for a statewide initiative.)
Opponents of fracking have raised about $16,000 in total as they fight for votes in those four cities, The Denver Post reports. That’s not bad for a grassroots effort, but it pales in comparison with fundraising by the pro-fracking sector, which is separately fighting a fracking ban in Longmont in court:
Groups opposing four anti-fracking measures have campaign contributions of $606,205 — 99.7 percent of which came from the Colorado Oil and Gas Association, reports filed Tuesday show. …
Most of the money that flowed to pro-industry groups has been spent with iKue Strategies, a Denver firm coordinating advertising and outreach. Former Republican state Rep. B.J. Nikkel is the firm’s adviser on the campaign.
She said the COGA-funded groups are defending people’s mineral rights and economic interests in the oil and gas industry.
“I would love to see us beat every one of these ballot initiates because they’re bad for the cities,” Nikkel said.
Try telling that to residents of a state where recent floods spread more than 60,000 gallons of petrochemical-laced fluids from fracking operations into yards, parks, and rivers. | <urn:uuid:9e7257e7-4767-4c67-affa-c8ece783e827> | CC-MAIN-2022-33 | https://grist.org/climate-energy/colorado-frackers-pump-out-cash-to-ward-off-ballot-initiatives/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.955549 | 342 | 1.75 | 2 |
22nd September 2015 Content supplied by: Integra
INTEGRA Reagent Reservoirs Explained by SimpleShow Video
A new short and engaging SimpleShow’ format video from INTEGRA introduces and explains the unique features and benefits of their Multichannel Pipette Reagent Reservoirs.
The video features the continuing story of animated lab heroes Mason and Mary. Watching this funny video you will learn about how INTEGRA 10ml, 25ml and 100ml Multichannel reagent reservoirs are designed to nest inside each other, making it possible to get twice as many reservoirs in half the space of other products, reducing inventory space requirements and shipping costs.
Unlike traditional reservoirs that have hard to see graduations moulded directly into the plastic, INTEGRA reservoirs are made of crystal clear polystyrene and fit into a reusable base with bold, crisp, clearly visible graduation markings. This unique design allows you to more accurately measure reagents. Each reagent reservoir also has a pour back spout enabling you to return excess reagent to a source container thereby reducing waste.
The unique trough within a trough design of INTEGRA reagent reservoirs is more accessible for pipette tips and reduces dead volume. INTEGRA reagent reservoirs can also be used as lids for short term storage minimizing both reagent evaporation and potential contamination from particulates.
To watch the video please visit www.integra-biosciences.com/sites/video/simpleshow-reservoir.html. For further information contact INTEGRA Biosciences in North / South America on +1-603-578-5800 / firstname.lastname@example.org or in Europe / Asia on +41-81-286-9530 / email@example.com
Date Published: 22nd September 2015
Source article link: View | <urn:uuid:16582a44-e846-4e6f-9543-811615aa90d6> | CC-MAIN-2022-33 | https://www.rapidmicrobiology.com/news/integra-reagent-reservoirs-explained-by-simpleshow-video | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.86741 | 393 | 1.851563 | 2 |
7 September 2021
Commemorated on 7 September since 1996, National Threatened Species Day may well be considered a day of mourning for our endangered species.
Of course, the aim of National Threatened Species Day, and of species-level conservation overall, is to halt, and even reverse, the decline in biodiversity and to shine a light on those species that need our help – which makes the date chosen, marking the death of the last known thylacine (Thylacinus cynocephalus) in a Hobart zoo, a sombre one for a national day.
‘Benjamin’, as he was known, sadly died of hypothermia in 1936, the last of a species hunted to extinction. However, as the years go by and the threatened species count continues to track upwards – many still without national recovery plans and many more largely unnoticed by the Australian public – it seems we’ve learned little from our past.
Worse, the plight of most of the 1,915 taxa recognised as threatened under the Environment Protection Biodiversity Conservation Act (1999), from the green turtle to the malleefowl, has our thumbprint (or oversized carbon footprint) all over it.
Lack of Funding Makes Many Efforts ‘Toothless Tigers’
On 21 May 2021, the Federal government released its Threatened Species Recovery Strategy 2021–2031 for the next decade. The strategy aims to identify areas of focus to support the recovery of threatened species and foster hands-on, real-world change through identifying priority species and communities, establishing concrete actions to recover them, and setting measurable targets.
Wildlife Queensland remains sceptical that the funding and forward momentum to address the issue will be found long-term, especially given ongoing attempts to further weaken environmental laws. However, an August 2021 study published in Ecology and Evolution recently compiled ‘the first complete, validated, and consistent taxon-specific threat and impact dataset for all nationally listed threatened taxa in Australia’ based on the IUCN Threat Impact Scoring System.
The data turned up 4,877 unique taxon–threat–impact combinations. ‘Habitat loss, fragmentation, and degradation’ was the most prevalent combination, affecting 1,210 taxa, whereas a further 966 were affected by ‘invasive species and disease’. However, when assessing only high-impact threats or medium-impact threats, ‘invasive species and disease’ was, unsurprisingly, the most common combined threat.
While we hope that this comprehensive dataset will inform biological conservation and make adhering to the Threatened Species Recovery Strategy easier, the government still needs to address ongoing threatening processes and that less than half of the species listed under the Act currently have binding recovery plans in place.
Even Our Icons Aren’t Safe
Sure, we can add a little sweetener to National Threatened Species Day with the fluffy Threatened Species Bake Off. For researchers who are mired in the daily struggle to conserve biodiversity in this country, the cake-fest is a welcome reward and an opportunity to present some of their work in a more palatable way. But the truth is that unless they inspire real commitment in decision-makers, cute animal cakes are the empty calories in the recipe for disaster that is the current ”Threatened Species Die Off’.
So dire is Australia’s extinction crisis that not even the koala (Phascolarctos cinereus) is safe. The EPBC Act lists the combined populations of koalas throughout Queensland, New South Wales and the Australian Capital Territory as threatened, and a Draft National Recovery Plan for the Koala (Combined Queensland, New South Wales and ACT Populations) is currently available for consultation and review.
Since so many of our human activities have contributed to koala decline, community engagement is one of three objectives included in the recovery plan for this species. The others are increasing population size and distribution in places where declines are predicted, and maintaining or improving factors that affect metapopulations, such as dispersal, gene flow and habitat degradation that reduces the size or viability of koala populations.
In response to the draft plan, WPSQ’s Fraser Coast Branch president expressed her disappointment that it failed to include the Fraser Coast region.
‘Our once-thriving Fraser Coast koala population appears to have crashed in recent years. A decade ago, wildlife rescuers in the region reported handling more than 50 koalas a year,’ stated Vanessa Elwell-Gavins. ‘But when our Branch conducted community koala counts over two successive years in 2014 and 2015, we were dismayed by the low numbers of sightings and the decline from 18 to 5 koalas between the two counts. Since 2015, only occasional and anecdotal sightings have been reported.’
Helping to Arrest Koala Decline
The Fraser Coast branch hopes to undertake a further community koala count in 2022. Similar surveying and counts are currently being conducted on private property near Beaudesert, with the support of Wildlife Queensland’s Scenic Rim Branch and the Logan Valley Koala Project, and in the Logan Local Government Area from October to November 2021.
Wildlife Queensland will be working closely with Logan City Council to host a community webinar on koala spotting and surveying techniques in our popular Talking Wildlife series on 28 October 2021, with an iNaturalist citizen science survey to follow. Those in the Logan LGA are already being urged to report koala sightings.
Private property might soon prove the last bastion of security for koala populations, both in the south-east and further north on the Fraser Coast, as it is for other threatened species like the yellow-bellied glider and greater glider.
‘We have been interested to learn about the University of Queensland’s koala rehoming project on a large private property in the Fraser Coast area, with koalas from Tinana or Hervey Bay rehomed following injury or illness,’ Elwell-Gavins adds. ‘Unless land-clearing for development, mining and agriculture is terminated immediately, this rehoming might be these koalas only hope, because it is clear that human and koala populations cannot cohabit successfully.’
Lessons from History
Unfortunately, robustness, fierceness, fascinating marsupial lifestyles and even fluffy faces aren’t good indicators of species longevity. At the time of European settlement, the thylacine was Australia’s largest marsupial carnivore. That title now falls to its marsupial relatives in the order Dasyuromorphia: on the mainland and here in Queensland, the spotted-tailed quoll (Dasyurus maculatus), and in Tasmania, the Tasmanian devil (Sarcophilus harrisii).
Both south-eastern mainland subspecies of the spotted-tailed quoll are endangered under the EPBC Act (1999), as is the Tasmanian devil. Yet, despite even the scourge of devil facial tumour disease, there is still no national recovery plan for the devil. Recovery plans for many endangered species have stalled due to data deficiency or disagreement over the best way forward. And while there is a National Recovery Plan for the spotted-tailed quoll, territory loss for development is an ongoing issue for this species, which has already seen some 70% of habitat within its historical range fall to land clearing. Even so, peri-urban development continues largely unabated.
If we have learned a lesson from the thylacine, it is that failure to act is acting to fail. If we cannot engage the Federal government in committing to increased funding for programs to save species that are related to the now-extinct thylacine and face similar existential threats, consider how difficult it is to drum up support for lesser-known threatened fauna, such as native rodents, insects, invertebrates, marine turtles and reptiles, and particularly for endangered native flora.
Flora makes up the largest cohort of threatened species under the EPBC Act. Still, a recent study published in Biological Conservation, based on research conducted by the Threatened Species Recovery Hub, found that two-thirds of our native threatened plants aren’t even being monitored!
How You Can Help
You can view and comment on draft recovery plans and lobby the government to take action. National recovery plans are binding – once they are in place, the Federal government must act on their recommendations. Currently, draft plans are available for comment for the koala (until 24 September 2021) and the endangered eastern bristlebird (until 17 December 2021). Both of these species are threatened by habitat loss and increasing urbanisation, as well as climate change, invasive species, and disease.
Of course, baking a cake or sharing a social media meme or your favourite photograph of an endangered species is still a significant, albeit small, way to get involved. But we will need large-scale, long-term actions and investment from Federal and state governments if we are to make National Threatened Species Day a cause for future celebration and not mere commiseration or commemoration for species we have already pushed to the very edge of existence or beyond.
Related articles and information: | <urn:uuid:c732c197-fbe1-41a4-9ced-56987a7e0f03> | CC-MAIN-2022-33 | https://www.wildlife.org.au/threatened-species-day-commiseration-or-commitment-to-do-better/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.938635 | 1,919 | 3.40625 | 3 |
The pressure to generate big ideas can feel overwhelming. We know that bold innovations are critical in these disruptive and competitive times, but when it comes to breakthrough thinking, we often freeze up.
According to today’s guest Josh Linkner, instead of shooting for a $10-billion payday or a Nobel Prize, the most prolific innovators focus on Big Little Breakthroughs—small creative acts that unlock massive rewards over time. By cultivating daily micro-innovations, individuals and organizations are better equipped to tackle tough challenges and seize transformational opportunities.
This episode is sponsored by Skillshare. Explore your creativity at Skillshare.com/AC and get a free trial of Premium Membership.
We love our supporters – thank you! Want to support the show? Get ad-free episodes and access to the full archives at ACpremium.me.
The Accidental Creative is part of the Airwave Media network. | <urn:uuid:4e115d7b-c24f-45c0-8a71-733f62de84fd> | CC-MAIN-2022-33 | https://www.toddhenry.com/podcasts/accidental/big-little-breakthroughs-with-josh-linkner/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.918953 | 187 | 1.789063 | 2 |
Design Thinking Process and UDL Planning Tool for STEM, STEAM, Maker Education
User Generated Education
JUNE 8, 2017
Universal Design for Learning® (UDL). Universal Design for Learning® (UDL) developed by David Rose and Ann Meyers is a registered trademark of the Center for Assistive Special Technology (CAST). UDL was designed to reduce the barriers to the curriculum and maximize learning. UDL provides a framework for all learners to help them become self-directed and independent expert learners. Design Thinking and UDL Planning Tool. Post by Jackie Gerstein, Ed.D. | <urn:uuid:eee10778-5d6a-4f1e-b675-0df0b0299735> | CC-MAIN-2022-33 | https://www.edtechupdate.com/elementary/technology/udl/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.911685 | 122 | 2.375 | 2 |
- Soil Side Bottom (SSB) corrosion of a tank that is in or out of service and has a concrete, bitumen, compacted sand or soil foundation.
- The opportunity costs when storage tanks are out of operation can be crippling.
- Tank operators have to suspend operations in order to complete patchwork repairs, or replace the entire bottoms.
- Storage tank leaks caused by bottom plate corrosion are hazardous to the environment.
Zerust Vapor Corrosion Inhibitors (VCIs) Are A Cost-Effective Way to Control Corrosion. Zerust Oil & Gas ReCAST Soil Side Bottom solutions provide a cost-effective means to mitigate underside corrosion of aboveground storage tanks while the tanks are in or out of service. Whether tank single or double bottoms rest on compacted sand, concrete, soil or bitumen, Zerust Oil & Gas has a solution to extend the serviceable life of these assets. Listed below are Zerust’s methods of introducing a VCI to the tank bottom environment, based on the design of the foundation and whether the tank is in service or out of service.
The Zerust patented ReCAST-SSB Chime Ring Dry solution is recommended for storage tanks with concrete or bitumen foundations. Vapor Corrosion Inhibitors (VCIs) are introduced through Zerust’s dry sleeve system while the tank is in service. Perforated PVC pipe is installed around the entire annular chime area. The VCI dry sleeves are installed into the PVC chime ring and the system is sealed to create an enclosure to maintain the VCIs. The VCIs migrate and absorb onto the metal surface. The diffusion of VCIs provides corrosion protection in the critical 3 to 4 meters from the annular chime ring.
- ReCAST SSB systems can be replenished while the tank is in operation.
- Can be combined with simple monitoring procedures to ensure effectiveness of the solution.
- Corrosion protection for voids and interstices that are impossible to protect with other methods.
- Protection for tank bottom plates and welds with little to no surface preparation. Innovative and cost effective.
- VCIs offer non-permanent corrosion protection at the molecular level that is safe and eco-friendly.
- VCI dispersion ensures uniform distribution across the tank bottom.
- Maintenance time is significantly reduced | <urn:uuid:9aaa7b06-5fe3-42eb-9702-8a67b9b72e6a> | CC-MAIN-2022-33 | https://www.zerust-oilgas.com/chime-ring-flood-solution-in-service-tanks-soil-side-bottom-protection/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.886159 | 499 | 2.15625 | 2 |
Punta Arenas is the gateway city to Chilean Patagonia. The city is the southernmost in Chile, and is the capital of the Magellanes district. It has the only airport in the region, making it the first stop for anyone flying into Chilean Patagonia. Puerto Natales is a much smaller town located just north of Punta Arenas, and is the gateway to Torres del Paine National Park and the rest of the trekking opportunities in Chilean Patagonia.
I arrived in Punta Arenas after a three hour flight from Puerto Montt. Getting to my hostel, Hostal 53 Sur, was easy with the cheap transfer bus at the airport. The staff was really friendly and the hostel was wonderfully warm – much unlike the cold and windy weather outside. Since it was late, I cooked dinner and went to bed early, as I planned to see the city the following morning before heading to Puerto Natales.
I was pleasantly surprised by a pancake breakfast in the morning, apparently included in the hostel fee for the night. I also met up with a French girl who was also staying in the hostel and we ended up touring the city together. After we bought our bus tickets to Puerto Natales, we first headed toward the viewpoint of the city. We ended up missing the main viewpoint, but found a different one that was still really nice. From here we walked toward the cemetery, stopping in a cathedral along the way (where we accidentally let some stray dogs inside).
Punta Arenas is known for its interesting cemetery, which has a wide variety of families located inside. Interestingly, the main gate is closed permanently at the request of the woman who financed the cemetery – she wanted to be the last one to enter it when she died, so there is a side entrance now. Since the city was heavily populated with people from all over Europe, the names on the gravestones are extremely varied.
After the cemetery we went toward the seashore to walk along the coastal sidewalk. The wind was really intense there and was almost strong enough to hold you up if you fell into it. We walked along the water toward the city centre, where we went to escape the crazy wind and to see the last part of the city. The centre is a really nice area, with many statues and memorials scattered throughout its many plazas. The centerpiece of the Plaza de Armas is a large statue of Ferdinand Magellan, who the region was named after. I walked back to the hostel from here to make lunch, splitting from my friend who went to buy some food, and ended up finding the actual mirador along the way. The view was really nice as it was aligned with the streets, giving a better view of the buildings and the ocean. In the late afternoon, I caught the bus to Puerto Natales, located 3 hours to the north.
I made it to Puerto Natales fairly late in the evening and walked to my hostel, The Singing Lamb. The place was pretty empty the entire time I was there, which was kinda weird but the hostel was really nice so it was fine. The next day I set out to explore the town. There really isn’t much to it, other than the main plaza and the seaside walk. Most of the stores and hostels were closed for the off season, making it seem very dead during my entire visit. The waterfront, however, was absolutely stunning and worth spending a day there just to see. The wind was really strong (as in all of Patagonia) so the waves were quite large. The water is overshadowed by large snow-capped mountains and the ever changing sky. I spent hours along the water listening to music and relaxing, at least until I froze from the wind. Later in the afternoon, I managed to run into the German guys who were on my Salar de Uyuni tour in Bolivia a few weeks earlier – they were staying in the same hostel as the French girl from Punta Arenas, which was crazy. I ended up spending the evening having dinner at their hostel and chatting until fairly late.
Early the next morning I took a day tour to Torres del Paine National Park, one of the most famous places in Patagonia. Unfortunately, just before my hostel pickup came, I had a catastrophic incident with my camera which left it unusable (in case you didn’t already know: DSLR + water = bad time for everyone). It wasn’t a very great weather day to visit TdP, so while the tour was incredible and the landscape gorgeous, I was only able to see the famous towers for about 5 minutes of the whole day we were there. The waterfalls and glacial ice were really great though, and the place we stopped to eat lunch had a spectacular view of a lake and the mountains. On the way out of the park we went to Mylodon Cave, which is a giant cave where they found remnants of the Mylodon (a giant sloth like creature that lived in Patagonia until about 10,000 years ago), as well as evidence of prehistoric human occupation in the region. The stop wasn’t too long but it was quite interesting nonetheless. As soon as we arrived back in Puerto Natales, I made supper and then had an intense conversation about archaeology, anthropology, and everything else with a girl from Germany – which is exactly one of the reasons I love traveling so much.
The following day I had planned on leaving to Argentina, but due to bus scheduling problems (i.e. there are no Sunday buses), I ended up doing nothing but rest and catching up on things like blog posts for the entire day. I had to book a tour to Perito Moreno glacier from Puerto Natales rather than taking the normal bus due to this problem, leaving me with an extra day and nothing to do (especially since literally everything else was closed since it was Sunday). It all worked out though, and the next morning I was on the bus to El Calafate, Argentina!
Puerto Varas is a charming little town on Lake Llanquique in the Lakes Region of Chile. This area is the beginning of Patagonia, and it’s a perfect place to begin a trip through the region.
I arrived in Puerto Varas after an overnight bus from Santiago. The weather was miserable when I arrived, and the walk to the hostel from the bus station was a very wet ordeal – which was made longer by the marathon taking place on the road I needed to use to get to the hostel. I made it eventually, cold and wet, and the Margouya Patagonia hostel was a welcome relief with its warm sitting area and log cabin atmosphere. After warming up a bit and waiting for the rain to subside, I took a walk around the thoroughly drenched town and along the lakeshore. The town was quaint, with a blend of authentic and touristy shops and restaurants. I didn’t get too much of a chance to walk around though as the rain came back with a fierce vengeance after about an hour so I made my way back to the hostel.
The following morning was a completely different story. The sun was shining and the sky was clear and blue. After breakfast I walked toward the bus stop to visit Vincente Rosales Perez National Park in nearby Petrohue. When I got the to bus stop, I ran into two Brazilian guys who were also at my hostel so we all went to the park together. When we arrived after the hour-long bus ride, we grabbed a quick lunch by Lake Todos Los Santos and went to the trail. The first few kilometers of trail was mostly forest walking, but after that it suddenly opened up to stunning views of Osorno Volcano, which is located at the edge of the park. Continuing further up the trail and toward the volcano, there was a magnificent viewpoint of Lake Todos Los Santos and the mountains surrounding it. We headed back down the trail and toward another mirador, with equally impressive views, before taking the trail down a dried alluvial river bed toward the lake. While the views from the first two miradors were impressive, the scene at the lake was outstanding. The blue water was crystal clear and waveless, causing the mountainous landscape surrounding it to reflect off the surface. It was very hard to leave the beauty of that place. However, we were running dangerously close to the time of the last bus back to Puerto Varas, and still had 4 kilometers to get back. We had so little time we had to run most of the final 2 kilometers in order to make it back by the time (we were told) the last bus left. We made it just in time, just to find out the bus didn’t arrive for another half an hour. It was nice to have time to crash after the run through the sandy trails, but it would’ve been nicer to avoid the entire run altogether. In any case, we got on the bus and made it back to Puerto Varas for a stunning sunset from the lakeshore.
The next day, I decided to visit the neighboring town of Frutillar. Frutillar is a little German inspired village located a short distance north of Puerto Varas, still along the lakeshore. The local bus cost $1 each way, so it was a nice place to take a cheap trip. The village is famous for its decidedly German architecture, as well as Teatro del Lago, a stunning theatre situated over Lago Llanquique. I spent some time wandering the streets and around the theatre; however, the town was mostly closed down as it was the off season so I didn’t find it especially interesting to visit. After about an hour and a half I headed back to Puerto Varas, where I had lunch before heading south to Puerto Montt.
Puerto Montt was also a $1 bus ride away, this time to the south and the Pacific Coast. The local bus arrived right to the bus terminal, which was very conveniently located along the shore in the downtown area. The city is much larger and industrial than Puerto Varas, and had a much more touristy atmosphere. There were tons of shopping malls and tourist shops in the downtown core, especially around the main plaza. There wasn’t anything especially appealing about the city, so I didn’t stay too long here either. I made my way back to Puerto Varas for dinner and ended up having a great conversation at my hostel with people from the UK, Germany, Austria, Peru, and Brazil until after 3 AM!
Since I was flying out in the afternoon, I didn’t have time to do anything else on my last day in Puerto Varas. I took the bus to Puerto Montt around noon and from there the bus to the airport for my flight to Punta Arenas – my first stop in Patagonia!
Santiago, Chile, is generally not at the top of any list of best cities, but I loved it. The city doesn’t really have any amazing sites nor is it very pretty, but it has some intangible spirit that makes it fantastic. The atmosphere of the city is addictive and draws you in. I regret only spending three days in the city, as it doesn’t do it justice.
I made it to Santiago after the short bus ride back from Valparaiso. I stayed in a hostel only a few metro stops from the bus station so it was really easy to get to. After I checked in and dropped off my stuff, I rushed to the centre for the 3 PM Tours4Tips walking tour, where I met up with another friend who I met in Bolivia that lives in Santiago. This tour went to all the traditional locations in central Santiago, such as La Moneda, the Ministry of Justice, the Plaza de Armas, and various central neighborhoods. When we reached La Moneda, the guide gave us a history of Chile and its coup d’état which occurred in the 1973. The country is still recovering from the decades of military rule under Pinochet, whose regime killed and tortured thousands. The tour ended soon after this talk, and my friend and I headed to her apartment to play Dutch Blitz and eat. Along the way we stopped at a sopaipilla stand, which is a disk of dough that’s deep fried and covered in sauces (spicy salsa and garlic sauce are the best). After playing cards we went to a sushi bar to have dinner which was a fantastic surprise after not having sushi in months.
The following morning I went to the 10 AM Tours4Tips walking tour, which went to the non-touristy parts of the city. This included visiting the various markets of the city, such as the Mercado Central seafood market, La Vega, and Little La Vega. After the markets we headed to the cemetery to hear the history of the city, see the grave of a local “animita,” and visit the grave of Salvador Allende, the president who was overthrown in the coup d’état in 73. Here again we had a history lesson about the past few decades. The tour ended here and I went with another person from the tour to have lunch at Mercado Central. The food here was spectacular – fresh seafood for reasonable prices. I had Machas a la Parmigiana, which was razor clams covered in parmesan cheese and baked. When we finished lunch we returned to the centre and parted ways, as I needed to return to my hostel. I attempted to go to Cerro San Cristobal a few hours later, but missed the last tram by 5 minutes. I had my second Chilean food staple on the way back though, the completo. This is a hot dog covered in generally obscene amounts of mayonnaise, avocado, and tomatoes. Thankfully the place I ate had a reasonable amount of all of the toppings so it was actually not too bad. Later I met up with my two friends again for cards that night and had more sopaipillas, before having to take the metro back to my hostel.
My last day in Santiago was the busiest. In the morning I walked from my hostel to the Plaza de Armas to visit the history museum, which described the early history of the country until 1970. After visiting the museum I walked across the river to Little La Vega to buy a fresh cherimoya-mango juice in the market and then walked to Cerro San Cristobal. This hill is the largest in Santiago and has the best viewpoint of the city. Since it was the weekend, the tram to the top was double the price and extremely crowded, so I chose to walk to the top. It took about an hour but the view along the way wasn’t too bad. The views of the city and the mountains from the top, however, were spectacular. The city was weirdly smogless that day, so the whole skyline was visible under the clear sunny skies. After climbing back down I walked to another hill, Cerro Saint Lucia. This hill is much shorter but has a great viewpoint from the castle-like building located on the top. From here I walked back to my hostel, stopping in the parks and interesting places along the way. I went to the bus station a little early to meet up with my friend one last time and have a churrasco, which is the third popular Chilean food. This is a beef sandwich with tomato, avocado, and mayo (very popular on everything here). We parted ways just before my bus left and I got on my overnight bus to Puerto Varas, located in the south of Chile in the Lakes District.
Valparaiso, Chile, is a seaside city with an amazing spirit. The streets are covered in stunning murals and street art that blend beautifully with the colorful architceture that distinguishes the city from its neighbours. The city is alive with an energy that is hard not to get absorbed into.
I arrived in Valparaiso in the late afternoon after a totally-not-awful 26 hours on a bus from San Pedro de Atacama. I had hoped to break the trip up a bit but was behind schedule after spending too much time in Bolivia. Thankfully, Valpo made up for it with its amazing atmosphere (and oxygen content!). I took a far too expensive cab to my hostel, Hostel Jacaranda, located on Cerro Alegre, which is the heart of the tourist centre. The hostel is in a well maintained old colonial house in a perfect location for accessing the city. Many of the people staying there were staying long term to study Spanish, one of whom offered to show me around the city.
We walked around for about 2 hours, wandering through the streets looking at all the amazing murals and art pieces painted on the walls. The downtown area of the city is fairly small so it’s not hard to get from one end to the other, so long as you don’t mind walking uphill. After going through the Open Air Museum, which features each year’s winning art pieces, we arrived at Pablo Neruda’s home, which is now a museum. Unfortunately I didn’t get a chance to visit it when I was in Valpo, but I heard from many that it was amazing.
When we returned from the walk, I found a nice cafe for dinner since I hadn’t really eaten in a few days after the Uyuni food poisoning incident. I splurged on a 3 course meal of salad, grilled whitefish with a lemon sauce and mushroom risotto, and a chocolate mousse for dessert. It was probably one of the best meals I’ve ever had anywhere, and was only about $11 total.
The following morning I got up early to do the Tours4Tips free walking tour of the city, which started at 10 AM. The tours last 3 hours and take place in either English or Spanish, depending on your choice. The tour started in Plaza Sotomayor, the large plaza near the docks. It covered the history of the seaport, the colonial history, the financial district, and the two UNESCO World Heritage sites of Cerro Alegre and Cerro Concepcion. Along the way the guide talked about the history and symbolism in the street art which decorates the city, which I found really interesting. The tour is definitely a must do thing when visiting Valpo, especially since it’s based on donations!
The tour ended in the plaza near the docks, near a bunch of seafood restaurants, so obviously I ate at one. I had a 3 course meal which started with ceviche, then followed by fried sea bass and a not so good blue mousse (total price, $5). After lunch I went down to the docks to take a boat tour of the city, which went along the coast to give views of the city from the ocean as well as the large freighters in the harbor. For $5, it was quite a bargain.
When I finished I met up with a friend who I had met in Bolivia a few weeks prior who lives in Valpo. She took me first up an “ascensor” to a viewpoint of the city (ascensors are like elevators that go to the top of the many hills). After spending time at the top we headed to the flat part of the city to have some Chilean dishes. I ordered a personal sized Chorrillana, which is French fries covered in grilled onions, sausage, hot dogs, and steak. The pile was 4 inches deep and took up a full sized plate – I have no idea how a single person could eat one, I got full after a quarter. When we left I went back to the hostel and crashed for the night after the large plate of food.
The following morning I attempted to visit the cemetery before taking the bus to Santiago but it was closed. I attempted to take a public bus to the bus terminal, but since I didn’t know where it was exactly I missed the stop and ended up on top of a hill. Thankfully the driver took me to another bus (whose driver let me know when we were there) and I didn’t have to pay again. I got the next bus to Santiago and left about 30 minutes later.
Salar de Uyuni is probably Bolivia’s most famous tourist attraction, and for good reason. The area is located in Bolivia’s extreme southwest corner along the Chilean border. The Salar is the world’s largest salt flat, and is so white and flat it’s used to calibrate satellites! In order to visit the Salar and the stunning landscapes that surround it, you have to take a tour with a licensed guide. Most tours last for 3 days and 2 nights, with the option of ending in San Pedro de Atacama, just across the border into Chile.
I arrived in the little town of Uyuni at around 4 in the afternoon after taking a noon bus from Potosi. Once I found a cheap hotel for the night I went out in search for a good and reasonably priced tour agency. There are tons and tons of tour agencies in Uyuni, especially along the main street near the train station. A lot of agencies have had problems with drunk drivers so it’s best to get recommendations from other travelers or sites like tripadvisor before arriving in order to book with a good company. I used World White Travel, which was recommended to me by some friends that had used them a few weeks earlier (I’d recommend them as well). I paid 800 Bs(~$115 USD) for the 3d/2n tour with transfer to San Pedro de Atacama and a sleeping bag was included. Be sure to ask about the sleeping bag because neither place I stayed had heat it was really needed the second night. It is possible to bargain the price down a bit depending on your skills – I got 50 Bs for mentioning my friend paid 750 Bs for her tour, but others on my tour paid 850 Bs, so it’s always worth haggling a bit. All the tours are the same route and prices (except Red Planet, they are way more expensive but seemed to have really high quality services and English speaking guides from what I saw). All tours are conducted in Spanish by default unless you pay a lot more for English, and the quality of the guide seems to be mostly the same for everyone at the usual price range.
After booking, I had dinner at this amazing American-run pizza place in the Tonito Hotel, called Minuteman Pizza. The owner is from Boston and makes perfect American style pizza, which is impossible to find in South America. I had the Heart Attack special which is essentially a pizza shaped calzone stuffed with tons of meat. Every pizza also comes with a fresh salad, another impossibility in Bolivia. I chatted with the owner after eating and he ended up giving me a free piece of cake as a graduation present, which was awesome for breakfast the next morning before the tour began.
The tour started at 10 AM in the tour office, conveniently located around the corner from my hotel. Soon after I arrived, the American family I met in Potosi joined in the office as they had booked the same tour. I ran into them the previous evening when they were looking for a tour company and told them where I booked, so they joined so I could translate the tour (which sounds awful but was actually quite fun). Two German cousins joined our group and then we packed up the car and headed to the first stop with our driver/guide, Herman.
The first stop on every tour is the Train Cemetery, located on the edge of town. This is where the old and broken trains from the country have been put for decades, since Uyuni is the center of Bolivian railway. All the trains are rusted over but are solid enough to climb around on, which is pretty great for photos and stuff. The stop here is for about a half hour, which is really about all the time you need to see everything and take a bunch of pictures.
The second stop is the main attraction, Salar de Uyuni. We stopped first at a series of salt mounds set up for photos before continuing to a salt hotel for lunch. Just outside of the salt hotel were a giant salt statue for the Dakar Rally, which goes through the area, and a bunch of flags for every country that participates in the rally. Lunch was mediocre, but really every meal was and no company had anything different to eat – no one goes for the food anyway. At some point around this time we stopped at an “artisanal village” which sold generic tourist junk and some salt things but the stop was so short I barely remember it.
After lunch we headed to the middle of the Salar for more pictures, like the stereotypical “giant dinosaur” picture and general pics of the hexagons of salt. We then went to Isla Incahuasi, which is a giant cactus-filled “island” in the middle of the Salar. The place is called an island because the entire Salar used to be a sea, so it’s used to be an island. For some reason the island is full of giant cacti, which only grow 1 cm per year so they had to be really quite old. There’s a nice trail along the island with the option of going into a giant cave made of dead coral, which was really cool to go into. The island also had free bathrooms included in the ticket price (yay toilets!). When we finished at the island our driver took us back to the Salar for sunset, and we were seemingly the only group to do so, which was nice after spending the whole day with a bunch of other people who get into photos and are generally in the way. It was a bit too cloudy for a spectacular sunset, but it was still pretty.
After sunset we drove another 2 hours to our hotel. The hotel was on the edge of the Salar and was completely made of salt. The floor was ground salt, the table and chairs of salt bricks, even the bed and end table were both made of salt (thankfully the bed had a real mattress and pillow!). Since we stayed for sunset on the Salar, we were the last group to arrive and as such we had no room to plug our phones/cameras in as there were only 2 power strips for the whole hotel. Most of us managed to get stuff charged during dinner or after and then we went to bed early in preparation for the 7 AM breakfast the following morning.
Breakfast was the standard Bolivian fare not worth talking about, so I won’t. We headed first to the Ollagüe volcano. Along the way we stopped at a tiny village cemetery with a nice view of the volcano before heading to the proper “mirador.” The mirador was a crazy maze of bizarre rock formations, all overshadowed by the distant volcano. The wind there was brutally cold and the air had a tinge of sulfur to it from the volcanic activity. We left the mirador after about an hour and went to the first of a series of lagoons with wild flamingos.
The Hedionda Lagoon was a stunning dark grey lagoon full of wild flamingos wading through thick black mud. The surrounding landscape of snow-capped mountains and barren hills combined with the general existence of flamingos really made the visit feel otherworldly. After spending a while here we moved on to the nearby Cachi Lagoon, where we also had lunch. It was insanely windy here but the view was spectacular. Here the water was a light green-blue color and there were even more flamingos than the previous hill. At this point the trip got a bit less fun for me as I started feeling the symptoms of food poisoning. Suffice it to say that that is not pleasant on a day spent entirely in a car.
I honestly don’t remember most of the trip involving the desert as I was trying to sleep and avoid vomiting (did not succeed), but felt moderately better by the time we arrived at the arbol de piedra, a large worn stone randomly sitting in the middle of a desert landscape. Not far from here was the day’s final stop, Laguna Colorada. This lagoon is a deep red color due to algae which live in the water. There were flamingos at this lagoon too, and the general area was gorgeous. However I started feeling awful again so I spent most of the visit laying in the car. We spent the night in one of the coldest places I’ve ever slept (this is why the sleeping bag is needed) and started really early the following morning. This hotel had electricity for only 2.5 hours and no heat.
The last day of the tour began at 5 AM with a sunrise trip to a geyser field. The amount of geysers shooting out of the ground and giant pits of bubbling mud was incredible. The weather was bitterly cold, though the steam from the geysers made for decent hand-warmers. We stayed here a bit longer than expected due to a second case of sickness in the group, but then moved on the the natural hot springs. This lagoon was volcanically heated and a small pool was placed next to it for visitors to enjoy the warm waters in such a cold place. Half of our group got into the waters to get warm while the rest of us took some pics and went back to the car and out of the wind. Once we left, we continued south toward the Chile-Bolivia border. We drove by the Salvador Dali desert, likely named for its similarity to his works. We didn’t spend much time here as we were running late for the transfer to San Pedro de Atacama. We had to skip Laguna Verde because of that, though we got to see it driving by. We barely made it to the transfer in time, and thankfully the Bolivian exit process was super easy so we didn’t miss it. There was a 15 Bs”exit tax” to leave the country, which is clearly a scam because I only had 6 Bs on me and he took it and shoved it in is pocket anyway and said good enough.
Crossing the border into Chile is like crossing into a parallel universe. Right at the border the road goes from bumpy gravel to perfect asphalt and road signs. The trip to San Pedro de Atacama only took about an hour, and the Chilean border control was fairly easy to get through (just don’t have fruits or vegetables!). Right after we arrived the German guys in my Uyuni tour and I booked a tour of Valle de la Luna for later that afternoon before going to our separate hostels.
San Pedro de Atacama was so much warmer than Bolivia it was incredible. When I finally found my hostel I had to change out of pants and jackets to shorts and a T-shirt because it was so hot. It was a welcome change. The tour for Valle de la Luna left about 3 hours after we arrived, which was just enough time to charge everything up and walk around town a bit.
Valle de la Luna is located just outside of San Pedro and is an absolute must for anyone visit the town. I paid 9000 CLP ($13) for a 4 hour tour in English and Spanish. The guide was great and took us trekking around the valley for a few hours before watching the sunset over the Andes mountains. He described the history of the area and the various minerals in the valley and volcanic activity that shaped it. The views from the top of the peaks in the valley were amazing. By sunset, we were at the main viewpoint which allowed for a perfect view of the mountains for sunset. The colors gradually changed from pink to red to purple before the sun finally went below the horizon. When we returned to SPdA, I went back to my hostel to get some rest before the 24 hour bus journey that was to occur the following morning.
First thing in the morning I went to the bus station and bought a salon-cama ticket to Santiago ($60, 24 hours) and then had breakfast, which was my first meal since being sick on the Uyuni tour. By the time I had finished the meal and bought some supplies for the bus ride, it was time to head to the station and go to Santiago.
(The bus was actually quite comfortable, other than the baby in the seat next to me that screamed the entire night). | <urn:uuid:9e2709a0-4e52-4c91-a9d8-18d4b3473c82> | CC-MAIN-2022-33 | https://bioarchnomad.com/category/south-america/chile/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.982652 | 6,770 | 1.632813 | 2 |
The Ebola epidemic that began in western Uganda arrived in Kampala yesterday, where at least one person, a nurse, died from the Ebola virus hemorrhagic fever. However, the infection did not occur in the capital but in the Kibale district, about 170 kilometers west of Kampala, but “a person or two” traveled to the capital, setting off all the alerts. In a statement published by the media, President Yoweri Museveni appealed to all Ugandans to remain vigilant against this deadly disease, urging them to avoid all “physical contact” to stop the spread of this terrible disease.
Yesterday, the authorities were looking for everyone who had been in contact with victims of Ebola, a highly contagious and highly lethal disease with no vaccine available. The 20 health professionals who cared for the injured person in the capital, who died in Mulago Hospital, have been placed in quarantine. The Ministry of Health wants to locate everyone who was with the victims. The president said the seven doctors who took care of one of the injured who arrived in Mulago – and died in hospital – and 13 health workers were in quarantine.
The epidemic began in the same district of Kibale where the nurse who was transferred to Mulago came and died. President Museveni has acknowledged the deaths of at least 14 people as of yesterday. Kibale is feared that the epidemic will spread to the villages around Kampala.
The first victim of the new Ebola outbreak was a pregnant woman. During his funeral, several members of his family were injured and subsequently died. This is the third outbreak of Ebola in Uganda in 12 years, a disease that was not yet known in the country. The deadliest was the first in 2000, which caused the death of more than half of the 425 injured.
“Be vigilant, avoid shaking hands, and do not bury anyone who has experienced symptoms similar to those of Ebola (high fever, vomiting, and sometimes diarrhea with bleeding) without contacting health workers who know how to do this,” the president said. Likewise, Musavini also recommended: “Avoid mixing because disease can also be transmitted through sexual contact.”
Announced experts from the Ugandan Ministry of Health World Health Organization (World Health Organization) and centers The United States for Disease Control and Prevention They traveled to Kibale to take measures to prevent the spread of one of the deadliest diseases, as it fought between 25% and 90% of cases. The scientific community is determined to find a treatment to combat the virus, but so far no effective vaccine has been found.
The president asked Ugandans to “inform the health authorities immediately” when they see the slightest sign of possible Ebola infection. After warning residents again, Musavini wished “good luck” to his countrymen.
The Ebola virus is generally spread through contact with an infected person’s body fluids, although there have also been cases due to contact with virus-carrying monkeys. Ebola is the name of a river in the north of the Democratic Republic of the Congo where the virus was discovered in 1976. Since then, 15 epidemics have been recorded in Africa, affecting more than 1,800 people and causing more than 1,300 deaths, according to the World Health Organization.
“Coffee fanatic. Gamer. Award-winning zombie lover. Student. Hardcore internet advocate. Twitter guru. Subtly charming bacon nerd. Thinker.” | <urn:uuid:ed76224a-e94e-4930-ae61-b8d86b0a95be> | CC-MAIN-2022-33 | https://www.sundayvision.co.ug/uganda-calls-for-avoiding-any-international-physical-contact-with-ebola/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.980583 | 708 | 2.28125 | 2 |
eBooks about Neil Armstrong
As part of our space topic year 5 have researched the astronaut Neil Armstrong. They found lots of fascinating facts about the first man on the moon. During Literacy, the children used these facts to create an ebook biography about Neil Armstrong's life.
Take a look at our super work:
For general enquiries please contact Helen Kearns in the school office.Robin Hood Primary School Beckhampton Road, Bestwood Park, Nottingham, Nottinghamshire, NG5 5NA, UK 0115 9153982 - firstname.lastname@example.org
Paper copies of all documents and policies on the website are available from the school office. | <urn:uuid:fcd4171d-ec3a-4aeb-b50e-4716994f27da> | CC-MAIN-2022-33 | https://www.robinhoodprimary.co.uk/ebooks-about-neil-armstrong/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.852951 | 140 | 2.84375 | 3 |
An auditing manager’s job description may evolve based upon the department that they are responsible for overseeing. The standard role that a manager will play includes examining financial statements, to ensure they are compliant with all laws and regulations and if the safeguards are in place. Additionally, the manager will be responsible for overseeing the work produced by supervisors and auditors within the department.
Auditing managers will be responsible for delegating work out to the team and analyzing the reports that are returned for each audit conducted. Taxes may need to be computed, and account books may need to be inspected.
Other responsibilities include:
•Assessing financial operations
•Making recommendations for best practices
•Organizing financial records
Ultimately, the Auditing Manager is responsible for ensuring that the organization is not mismanaging funds. The manager will use an array of ways to identify and eliminate waste, as well as fraud. Ways to reduce costs and enhance revenues will be a daily part of the job. Communication will be focused towards the team of auditors, the VP of Internal Compliance, as well as to the various department heads that are being audited.
All financial data must come from a reliable source. This will be a significant role that the auditing manager is responsible for. The financial data included in any and all reports must come from a reliable source and be properly documented, before it can be included in an official report for the organization. To obtain this data, training may have to be conducted with the individual auditors, to ensure they understand where to look for information.
The auditing manager will be responsible for going into the field on occasion, especially for larger audits, to confirm the work provided by the auditing supervisors. When an audit comes back showing waste or fraud, it will be the responsibility of the manager to determine if the report is correct. Suggestions must then be made to the department to get them back into compliance, which may include additional policies and procedures to be created, more frequent audits, and the potential of obtaining new staff members for the department in question.
The Auditing Manager must ensure that all audits are turned in on time and contain no errors. This requires working closely with the rest of the department and keeping communication flowing.
Those who are interested in the Auditing Manager position must have experience with financial audits and hold a bachelor’s degree or higher. | <urn:uuid:1b2cb9e4-5f2d-409f-98ca-4264dda86abe> | CC-MAIN-2022-33 | http://educationcareerarticles.com/career-information/job-descriptions/auditing-manager-job-description/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.961803 | 480 | 2.171875 | 2 |
Professor Elizabeth Wark, Ph.D., of the Business Administration and Economics Department, received the Outstanding College Partner Award from Junior Achievement of Western Massachusetts (JA) on behalf of Worcester State University. The Junior Achievement of Western Massachusetts works to prepare and inspire young people to succeed in the global economy by educating students in entrepreneurship, work readiness, and financial literacy through hands-on programs.
Wark received this award for developing a class where students analyze survey data from the JA and use that analysis to create formal consulting reports. These reports are used for promotional ideas and grant proposals. Students in Wark’s course Quantitative Analysis and Research Methods have been recognized by the Binienda Center for their service work that they have completed through their JA data projects.
Currently, all students in the Master’s of Science in Management program are required to take this course
Luster Elected President of Worcester County Mechanics Association
Stacey Luster, Worcester State’s assistant vice president for human resources, payroll, and affirmative action and equal opportunity, recently made history as the first African American to be . . . | <urn:uuid:81b153d6-69ca-4210-ab63-884a812c6c1d> | CC-MAIN-2022-33 | https://news.worcester.edu/wark-receives-junior-achievement-award-for-class-data-project/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.937051 | 230 | 1.523438 | 2 |
Janet loved to cook and entertain, so when the opportunity to start a business arose, she jumped at it and opened her own restaurant. Janet thought this was her dream come true as she would get to cook and entertain and get paid for it. What could be better? Or so she thought… Very early into the game she found she had to market the business, keep track of her inventory, hire and manage people, keep track of her expenses and a whole host of other things. Very soon Janet spent very little time cooking and more time on the administrative stuff; She was disillusioned… Did she make a mistake?
Many businesses start as a result of the owners’ passion for something, but every business has certain roles and functions which must be carried out if it is to be successful. At the beginning, all those roles may be carried by the owner and as the business grows, it hires individuals to fill those roles.
The most common roles in a business are:
You are responsible for the overall direction and management of the business. You set the tone for the business, for the service, the product and relationships with all stakeholders.
Accounting is the art of identifying, recording, categorizing, summarizing, analysis and interpretation of financial transactions. More
No matter the size of your business you need to keep track of your expenses, revenues and tax liability to make sure you are on track. Most businesses exist to make a profit and if you do not keep proper Accounting is the art of identifying, recording, categorizing, summarizing, analysis and interpretation of financial transactions. More records, how will you know that you are profitable? Remember cash does not equal profitability.
Sales are the fuel of your business, there has to be enough of it to keep your business going. Someone has to be actively seeking new customers and ensuring that you keep existing ones. It is important to note that studies show that it is more expensive to find new customers than it is to keep existing ones.
Marketing and Public Relations
This involves managing the way your company is perceived by your target audiences and the public that they are motivated to do business with you.
This is perhaps the most important, yet most overlooked function in business. Your people can make or break your business. Finding the right people to represent your vision is important to the success of your business. Someone will need to recruit, manage performance, manage payroll and benefits, train etc.
Almost all new business has some interaction with technology. It helps to have someone with even a basic knowledge of keeping your equipment working and using technology to increase your efficiency.
This role keeps it all together on a daily basis. It may mean answering the phones, taking orders or just keeping the generated paperwork in order.
Tips to ensure all areas are covered:
The size of the business will determine the number of people you will need, but the main thing is to make sure that even if you decide to be ‘Head Cook and Bottle Washer’, all the functions needed to be successful are carried out. Here are some tips to get you going;
- Decide which areas you can comfortably cover. Be careful here, to play to your strengths and think about the value of your time. Do not fool yourself into thinking that because you can do it, you must. For example, you may be able to do data entry for your Accounting is the art of identifying, recording, categorizing, summarizing, analysis and interpretation of financial transactions. More records, but is that the best use of your time?
- Look to outsource the areas in which you have no expertise. Common areas to outsource are Recruitment, IT, Marketing and Accounting is the art of identifying, recording, categorizing, summarizing, analysis and interpretation of financial transactions. More.
- If cost is an issue, look to freelancers or part time workers or family members. You may even look for bartering services with another professional.
- Get advice on software you can use to make your business more efficient. Software as a Service has taken what used to be an expensive proposition for small businesses and made it more affordable, giving you access for small monthly fees.
- Get a business coach or mentor. You won’t be able to see everything, having a coach or mentor come alongside you provides an objective, expert view of your business and provides an accountability partner for you. Coaches and mentors help with strategy, marketing, people matters etc.
What has your experience been starting a business and how do you ensure that all areas are covered? Share your comments with us below. | <urn:uuid:9580a3fa-e0ea-49df-8d79-c46188049952> | CC-MAIN-2022-33 | http://getheadoffice.com/jamaica/blog/turning-your-passion-into-a-business-5-tips-to-ensure-success/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.963987 | 956 | 2.171875 | 2 |
The report starts with an overview of the desertfication and drought and then summarizes the assessment of desertification, drought And other extreme meteorological events. Next, the report gives an overview of the implementation of the United Nations Convention to Combat Desertification (UNCCD) and methods to mitigate the effects of drought. In conjuction with this chapter, the Annex provides a summary of the National Action Programme for India. Then, the report summarizes the actions to be taken by the National Meteorological and Hydrological Services (NMHS) for the UNCCD. There is a brief chapter on a proposed structure for an expert system on extreme meteorological events. The last chapter provides conclusions and recommendations of the Working Group.
Format: Digital (Free) | <urn:uuid:23d9480c-f6a1-49a0-9831-a7f753357329> | CC-MAIN-2022-33 | https://library.wmo.int/index.php?lvl=notice_display&id=5100 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.855419 | 157 | 3.359375 | 3 |
Printed from and copyright of Pakurangavets.co.nz
↑ to top
- This is a surgical procedure that requires an anaesthetic and a day stay in our comfortable hospital.
- Your pet will be monitored closely by our trained staff using modern monitoring equipment. They will receive fluid therapy, anitbiotics & pain relief during their stay and to go home with.
- Our price for routine desexing is including all of the above and carries no extra charges.
- It is usually done when your pet is about 6 months old. We strongly advise having this done.
The positive effect of desexing
- As a member of the family & a companion, desexing has a positive effect on behaviour, personality a
nd even body odour!
Female cats will not be able to produce unwanted kittens.
- Male cats will not have the urge to go hunting and fighting for female cats, so should be involved in fewer fights and infectious disease.
- Fewer problems with urine marking and spraying in the house.
- Bitches will no longer come into season and will not suffer from pyometra (uterine infection), polyps, hormonal behavioural changes such as false pregnancies and depression.
- Male dogs, when neutered, are more settled mentally. They will not be constantly marking and looking for bitches in season. They also tend to be less aggressive to other male dogs. (It does not affect their ability to protect property).
- The risk of some cancers is reduced by desexing. | <urn:uuid:4433da84-a673-484e-9a9e-95ed1c9e7c2a> | CC-MAIN-2022-33 | http://pakurangavets.co.nz/veterinary-services/desexing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.955969 | 328 | 1.648438 | 2 |
Think of, O heart, some remedy 1241 To cure this chronic malady. Bless O mind! you pine in vain 1242 For me he has no love serene. O mind, why pine and sit moody? 1243 Who made you so pale lacks pity. Take these eyes and meet him, O heart 1244 Or their hunger will eat me out. He spurns our love and yet, O mind, 1245 Can we desert him as unkind? Wrath is false, O heart, face-to face. 1246 Sans huff, you rush to his sweet embrace. Off with love O mind, or shame 1247 I cannot endure both of them. Without pity he would depart! 1248 You sigh and seek his favour, poor heart! The lover lives in Self you know; 1249 Whom you think, mind to whom you go? Without a thought he deserted us 1250 To think of him will make us worse. | <urn:uuid:6a1591ba-a184-4b8f-8dd7-99eef5e52f8d> | CC-MAIN-2022-33 | https://avishkar.co.za/1241-1250-soliloquy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.943429 | 195 | 1.859375 | 2 |
Muro, inland town located in the north center of Mallorca, 11 km from the coast.
Update 04/02/20. Muro is an inland town located in the northern center of Mallorca. It is 11 km from Alcudia Bay, 11 from Can Picafort and 15 km from Playa de Muro. In its vicinity we find the towns of Sa Pobla, Santa Margalida, Can Picafort and Alcudia. In the municipality of Muro we also find the tourist center of Playa de Muro. The approximate population of the entire municipality is 7,000 inhabitants.
In the center of the town we find the Comte d'Empuries square, the main church, the town hall and numerous pedestrian streets. It is the area of the town with more shops, bars and restaurants and where the weekly market and popular festivals are held.
MAIN PLACES TO VISIT
• Plaza Comte d'Empuries. Located in the center of the town
• Sant Joan Baptiste Church. Temple located in the center of the town dating from the seventeenth century
• Muro Ethnological Museum. Clothing, tools and customs of the ancient rural environment of Mallorca. Located on Calle Major, number 5
• Plaza de Toros. It dates from 1918, it is located on Cervantes street near the exit towards Santa Margalida.
MAIN FESTIVITIES AND MARKETS
• Weekly market. It is celebrated every Sunday morning.
• San Antonio. It is celebrated in the middle of January. Bonfires, music, dances ...
• Carnivals. Celebrated during the month of February.
• Holy Week. It is celebrated in April.
• Fair of San Francisco de Paula. Fair of agriculture, crafts and livestock. It is celebrated on the first Sunday after Easter.
• San Juan. Celebrated in the middle of June
• Autumn Fair. Held mid November.
How to arrive:
To get to Muro from Sa Pobla, take the Ma-3430 road and from Can Picafort la Ma-3431 | <urn:uuid:d578cb02-4899-419c-aaa6-0fdda4bdf55e> | CC-MAIN-2022-33 | https://mallorca-touristguide.co.uk/locations/muro | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.916274 | 446 | 1.53125 | 2 |
Walter Hose, for the soul of his father and of his mother, and for the salvation of his ouwn soul and of his heirs' and brothers, with the advice of his friends, he has given and granted, and made firm by this his charter, to St James and St Mirin and St Milburga and the monks of Paisley, in free, quiet and pure alms, the church of Craigie (AYR) in his land, to wit, in Kyle, with all its pertinents with one ploughgate of land, namely, half which his father gave to Paisley Abbey, and half a ploughgate of land which he himself gave afterwards to the same church in free alms, by the same bounds by which John Hose, his brother, persona of that church, held the same half ploughgate of land of him. The said John shall hold the same church just as before as long as he lives; and if he should wish to take up the religious life, or if he should die, then the said church shall remain free and quit with the monks of Paisley. In recognition of this alms, John shall give yearly to the said monks three pennyworth of iron.
25 March 1173 X 1177
Papal confirmation of Pope Alexander III × death of Walter son of Alan the steward. | <urn:uuid:518d1677-1760-4d9d-b7c3-c743f79b5d54> | CC-MAIN-2022-33 | https://www.poms.ac.uk/record/source/4654/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.988326 | 291 | 1.726563 | 2 |
Are you one of those who are diet hard sweet lovers? When you go to gym the first thing you tell your trainer is “I can follow any diet but cannot give up on any sweets”? Or are you a chocolate lover like most girls are (even boys nowadays are total chocolate lovers). Or are you one of the desi girls who just love gulabjamun, rasmalai, rasgulla, barfi and all these wonderful Indian sweets? Well if the answer to any of the above questions is a yes then this is the right piece of advice for you. I know what having a sweet tooth feels like, it means you just cannot stop having your favorite piece of sugar and then add up all those unwanted calories. But the answer to such cravings is not their abandonment and thank fully so you can have some of them but in a controlled and regulated manner as if you completely shun them away you might face even greater cravings which might end up being irresistible. There are some easy ways by which you can minimize their consumption and gradually see them end.
Take a note of nutrient deficiencies:
Lack of nutrients or deficiency in some particular nutrients like chromium, vitamin B3 and magnesium cause the problem of craving for sugary food. If you consume proper nutrients and have a good diet it can reduce your cravings for sugar. This not only tames your sugar cravings but the above mentioned nutrients also help in improving blood sugar levels.
Saying no to sweets is not how you deal with them:
When you say no to something you end up having more. This is so very true with sweets, when you ban yourself from having sweets what happens is you bind yourself like the water is captured in a dam and when your craving exceeds what you can bear, the dam gets broken and you end up having a lot of sweets. So, many experts suggest that you should treat yourself once in a while with sweets which will help you live like you want and save you from over eating. What should be kept in mind is that the eating part should be controlled and you should keep a check on whatever you are eating. You can treat yourself with a small piece of the sweet every now and then to silence your sweet tooth.
Get all spiced up:
Add to your list flavor drinks with spices and herbs instead of sugar. Say add mint to the almond milk you are having instead of sugar. You can have various such permutations and combinations. Another can be adding salt and pepper to nimbu paani instead of regular sugar. This not only changes the taste of your drink but also saves you from the sugar content you want to avoid.
Think before you eat out of emotion:
There has been seen a tendency of emotional eating in people. When they get tensed they eat, whenever there is a situation they are emotional, there are more chances of eating sweets. So what one can do is thinking before eating rather than just having sweets continuously. If you think before you eat there are lesser chances of you eating more.
Try a detox:
Introduce a lot of green vegetables into your diet. You can have it raw or added in a juice. They not only detoxify but also help regulate blood sugar by providing protein and also minerals. These also help in maintenance of blood sugar levels of the body.
I hope this will help you come over your craving of sweets. Do share your experiences with us, till then stay fit, stay beautiful. | <urn:uuid:5a7ca3db-417d-4ed3-b1bf-1a783baa985b> | CC-MAIN-2022-33 | https://www.beautyandfashionfreaks.com/come-craving-sugar/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.962117 | 708 | 1.84375 | 2 |
The reverential month of Ramadan edifies us to discipline our lives, give up bad habits and practice restraint in all spheres of life — the goal being to cleanse our soul and make ourselves stronger. To help you choose the right foods during the holy month, we have prepared a guide, loaded with many healthy food choices to keep you energetic and nurtured all through Ramadan.
Don’t: Avoid using butter and ghee in cooking
Do: You should choose fresh vegetables as they contain higher amounts of vitamins and minerals.Use fresh fruits to prepare juices and serve them in moderation without adding sugar. Prefer low-fat milk and other low-fat dairy products.Try using lean meat, fish and skinless chicken. For you to get all the nutrients needed by the body, your meals should contain all the basic food groups (bread and grains, fruits and vegetables, meat and legumes, milk and dairy products).
MEAT AND OTHER PROTEIN SOURCES
Don’t: You should avoid fried chicken and duck. Fatty meats, organ meats, hot dogs and sausages are also not advisable. Reduce also amounts of prawn, shrimp and shellfish. In terms of meats, red meat generates free radicals, which constantly snag electrons from your healthy cells, damaging them in the process. This damage ultimately affects your skin’s ability to protect itself and generate collagen, making you look older than your age.
Do: White meats and fish are the best way to get your daily dose of proteins. For the cooking process, prefer grilled or boiled skinless chicken or turkey because it assures the supply of nutrients. Furthermore, eat 3 times eggs per week (including eggs in cooked foods) because it will help you have the sense of satiety.
MILK AND DAIRY PRODUCTS
Don’t: Eating ice cream and whipped cream will make you feel hungry, faster. By this way, avoid full cream yoghurt and full cream cheeses especially yellow cheeses too. Creamy and cheese sauces are not advisable. And especially for those with oily and combination skin should avoid drinking lots of milk because it can trigger zits.
Do: Prefer skimmed or low-fat milk, yoghurt, low-fat cheese and labneh
FRUITS AND VEGETABLES
Don’t: Keep an eye on the cooking of vegetables, especially fried or boiled vegetables with butter. The only fruit you have to avoid is the coconut because it is rich in saturated fats that are unhealthy for the heart.
Do: Eat fresh vegetables, legumes (beans, lentils and peas) boiled, baked, steamed or cooked with a little oil. Cooking with seasoned vegetables or vegetables with lemon juice or a little oil is the best way to benefit from the nutrients of vegetables. For dessert or munchies, abuse fresh fruits but eat with moderation natural fruit juice.
BREAD AND GRAINS
Don’t: Reduce your amounts of pastries which contain large amounts of fat (doughnuts, croissants, Danish pastries).In terms of starches, avoid fried rice, fried potato chips and French fries.
Do: Arabic or brown bread. Plain spaghetti or rice (without ghee or high fat sauce). Grains with no added fat. Baked or boiled potatoes.
Don’t: You should limit your intake of caffeine in terms of soda, coffee and tea as they all promote mineral and fluids excretion from your body, which ultimately leaves your skin dry, dehydrated and lacking in lustre.
Do: Drink herbal teas and fresh juice to stay hydrated and benefit from vitamins. | <urn:uuid:341e53d5-d0e0-40cb-994b-a771d7421e4b> | CC-MAIN-2022-33 | https://www.listershealth.co.uk/blog/dos-donts-healthier-ramadan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00265.warc.gz | en | 0.925457 | 769 | 2.53125 | 3 |
We are a team of researchers and practitioners from CQUniversity Australia who develop innovative programs to increase the skills and knowledge of the current and next generation agricultural workforce in agri-tech tools and systems.
Our team works with educational institutions, agricultural businesses and industry organisations to develop and implement a range of learning opportunities for educators, students and those working in the agricultural industry to build their capacity to use data and technology to support decision making across the supply chain.
All of our projects aim to showcase the scientific and digital skills required in the agricultural industry to upskill the current agricultural workforce and attract the next generation to work in the food and fibre production sector.
By exposing young people to agri-tech tools and systems from an early age the benefits are two-fold:
- It will increase the adoption of technology across the agriculture supply chain when these young people enter the workforce as they will be confident and skilled in the use of agri-tech.
- Students will act as ‘agents of change’ and influence, encourage and support adults to adopt agri-tech tools and systems on-farm. | <urn:uuid:f68c3503-4759-428b-aea9-f8c9cce21f29> | CC-MAIN-2022-33 | http://agri-techeducation.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.92819 | 228 | 2.046875 | 2 |
You are more aware of stocking stitch than you might realise. Take a look at what you’re wearing, and look closely – your socks, tights, and jersey top are all likely knitted in stocking stitch. By a machine? Yes, of course, those v-shaped stitches are tiny. But it’s exactly the same when you get going with your knitting.
Stocking stitch (abbreviated to st st or stst in patterns), is a roomy, stretchy fabric. Using a mix of knit and purl stitches, it is smooth on the right side of the fabric, with horizontal rows of ridges on the purl side.
Unlike moss stitch or garter stitch, which are both textured stitch patterns, stocking stitch (or ‘stockinette stitch’ if you’re in the US) has a smooth surface on the knit side – perfect for embroidery or showcasing some colourwork. That being said, some knitting patterns will instead direct you to work ‘reverse stocking stitch’, which is exactly the same, but with the purl side of the fabric (the ridged, bumpy side) facing outwards, for a slightly different look.
What you need to knit stocking stitch
Needles and yarn. In fact, any yarn with the recommended needle size – which you can find the information for on its label.
If you’re knitting toys, you’ll find that knitting patterns will direct you to use far smaller needles than recommended. This is to help keep the stuffing in and stop your more intricate knitted shapes from warping and stretching.
How to knit stocking stitch with step-by-step pictures
Cast on your chosen number of stitches. Stocking stitch works with absolutely any number of stitches. To get a clue for how many you might need to knit a piece of stocking stitch in a particular size, see the end of this article.
Stocking stitch is made up of two rows:
Row 1: Knit to end.
Row 2: Purl to end.
That’s it! All you need to do to keep going is repeat rows 1 and 2. You’ll soon spot if you’ve gone astray along the way as a clear ridge will begin to appear on your smooth side.
Reading your ball band and beyond
Every single ball of yarn you buy will come with a handy guide for how to use it – this can be found on its label or ball band. As well as telling you how to wash and care for your finished items, and what needle size you should consider using, it will also tell you how many stitches and rows should create about 10cm square.
This guide to creating a 10cm square is a gauge to check your tension – how tightly or loosely you’re knitting. If you do have a go with the recommended number of stitches to check your tension, and it comes out too small, chances are you’re a tight knitter – so you should try going up at least one needle size. Too loose and your square will be larger than 10cm, so you might want to try going down a needle size.
But most importantly, these guides are all provided on the understanding that you’re using stocking stitch for this test. Knitting patterns will be more specific though so always be sure to read them before you start. | <urn:uuid:956631ea-496e-4b59-9574-0d89ce5b13ca> | CC-MAIN-2022-33 | https://www.prima.co.uk/craft/knitting-patterns/a39946079/stocking-stitch/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00265.warc.gz | en | 0.930202 | 701 | 1.929688 | 2 |
Document Type: FAQ
Product(s): MicroStation V8
Original Author: Bentley Technical Support Group
Legacy Document Number: 6214
Document Type: FAQ
Product(s): MicroStation V8
Original Author: Bentley Technical Support Group
Legacy Document Number: 6214
A Level Library or Libraries are Design Files that store information such as level manager settings to be used as a standard throughout Design Files.
Level Libraries are defined in the MS_DGNLIBLIST variable with an *.dgnlib extension. This functionality works similar to cell and font libraries where these files can be setup by the CAD administrator for setting up level names, symbology, etc. Level Libraries allow for multiple files to be changed globally.
Attaching a Level Library is different than importing a Level Library since the levels are not physically a part of the Design File. However, levels from an attached Level Library can be copied over to the active Design File by double clicking on the level from the attached Level Library in the Level Manager.
Importing a Level Library copies the entire level structure over to a Design File. Whereas attaching a level library, allows individual levels to be copied.
A check mark in the Level Manager under the Library column will indicate that a level is from the Level Library. This is an indicator that this particular level is being read from the MS_DGNLIBLIST variable as one of the standard levels.
MicroStation V8 has a variable called MS_DGNLIBLIST that searches for a Design File that has been setup to be used as a standard throughout the creation and manipulation of files on a global basis. To get to the configuration variable, go to the Workspace > Configuration menus. Next, look for MS_DGNLIBLIST variable list. Next, you can hit the Select button to navigate to where the Design File that contains the standards.
No. MicroStation V8 now allows levels to be saved on a name basis instead of the previous number based system. Prior to MicroStation V8, MicroStation was limited to 63 levels that elements could be placed on. Now the number of levels that can be created is practically limitless as long as the level name is unique compared to other level names.
Yes. Another addition to MicroStation V8 is the ability to have elements be placed on a level with ByLevel Attributes. Therefore ByLevel Attributes allow elements to be changed globally between Design Files for the Color, Style and or Weight for the entire level. This can be set through the *.dgnlib file affecting all Design Files that were placed with ByLevel attributes.
Individual Levels can now be locked in MicroStation V8. Prior to MicroStation V8, Level Lock would lock all of the levels except for the active level. Therefore, no manipulation of elements could be made to any element, unless the element resided on the active level. However, in MicroStation V8, you can toggle on and off individual levels to be locked. Therefore, not limiting you to the active level. The regular Level Lock still works like previous versions of MicroStation where all but the Active Levels are locked from modification.
To lock a level, go in the Level Manager and navigate to the column that is named Lock. Next, click on the level in the column that you want to be locked. A black padlock will appear indicating that this level is locked.
An alternative way to lock a level is to Select the particular level that you want to lock and right-click on the level name. Go to the Properties section and turn on the Lock toggle and then hit Apply. The Level is now locked.
Elements can be placed on this locked level, but cannot be modified since it is locked. A quick way to determine if a Level is locked is to go the Level Display pulldown from the Attributes tool strip. A black Padlock will display next to the level name indicating that the level is locked.
Level Libraries can be attached to Design Files by going to the Levels pulldown menu of the Level Manager and then selecting Level and then Attach. Then navigate to where the Level Library Design File is located and this file will be attached.
Level Libraries can also be easily detached by going to the Levels pulldown menu of the Level Manager and then selecting Level and then selecting detach. Next, select the library that you want to detach.
A Level Library can be imported into MicroStation V8 by going to the Levels pulldown menu from the Level Manager and select Import. This will open the Import Level Library dialog box. Next, navigate to the file that contains the library to be imported. Once the file is located and the OK button is selected. This will allow you to import an existing Level Library from a separate Design File into the active file. These levels are now a part of the active Design File.
A Level Library can be exported from a Design File by going to the Level Pulldown menu and selecting Export. From here you can export the Level Library to a separate Design File since a Level Library is a DGN formatted file.
Once the Level Library is set in a Design File that has the extension *.dgnlib, this file can then be set with permissions to allow only certain users access to the file. For example the CAD Administrator would have permissions to make changes to the Levels in *.dgnlib file. Therefore, essentially making this file accessible to users as a read-only, where the levels can be utilized, but any modification is inaccessible.
Setting this file up as administrative levels allows for control over the Design Files that are created. For example, if a level override name needs to be modified and this level was changed on the administrative level. Essentially, all of the Design Files that utilized this Level Library will be affected globally. Any change or modification can be made very easily and quickly affecting a few files to hundreds of files. MicroStation V8 makes modifying levels through a Level Library very powerful administrative tool.
To modify a Level Library, open up the Design File that has the extension *.dgnlib and contains the Level Library to be modified (it should be located in a path defined by MS_DGNLIBLIST). Once this file loaded, modifications to a Level can be made through the Level Manager. Once the changes have been saved, the Level Library is now updated. Note: If a Level Library has been modified, the changes will not automatically be reflected in the Design Files that have a connection to the particular level or levels that have been modified. In order to have the modifications show in the connected Design Files, a keyin must be used: dgnlib update levels
In addition to using the key-in, the Level Manager provides a way to update the levels. In order to synchronize the levels in a design file to a level library, you can open the Level Manager and then select the Update Level From Library icon.
On an administrative side, Level Libraries can only be modified by the person who has permissions to modify *.dgnlib file.
By Default, under the Workspace>Preferences>References the Copy Levels During Copy is set to If Not Found. Therefore, if the levels are not found within the file that the reference element is being copied into, then a new level will be created.
The Copy Level During Copy can also be set to If Overrides Exist. With this setting the Levels are copied from the reference if the level does not exist in the active model, or if the settings for the active model level are different than those of the attachment. Differences include overrides that have been applied to the attachment levels, or differences between the levels as defined in the active model and reference.
Another setting is Always. With this setting the reference levels are copied even if an identical level exists within the active model
The following should help further distinguish between the functionality's provided by MS_V7TOV8_CSVNAME & the save As remapper:
<!--[if !supportLists]-->1. <!--[endif]-->The MS_V7TOV8_CSVNAME techniques gives a way to transition V7 levels to V8. In particular it provides a way to name V7 levels & to assign values to new V8 level attributes (In hindsight, the name MS_V7TOV8_CSVNAME is much too generic for its intended purpose. It should have been something like MS_V7TOV8_LEVELCONVERT).
The level remapper gives a way to remap levels of elements. It is part of the complete remapper that allows to remap colors, weights, etc.
<!--[if !supportLists]-->2. <!--[endif]-->The MS_V7TOV8_CSVNAME is invoked when opening a V7 file in V8.The remapper is invoked when "saving as" a file into another file.
<!--[if !supportLists]-->3. <!--[endif]-->Both use .csv as a common underlying format, but expect different columns. The remapper format is more sophisticated in that the .csv file sub-divided in multiple sections, with each section specifying a particular type of remapping.
The best way to create the .csv file for MS_V7TOV8_CSVNAME is to use the Levels > Export function in the level manager.
The way to create the .csv file for the remapper is to use the embedded Excel VBA app that can be invoked from the "remap" option of "Save As" functionality.
When using the batch converter on V7 files, both the MS_V7TOV8_CSVNAME technique & the remapper can be invoked. The MS_V7TOV8_CSVNAME technique is invoked by the batch converter when opening the V7 file. The remapper is invoked when saving the data to the specified file.
There are three possible controls that can be used -- each is controlled by setting a configuration variable. All three variables are explained in detail below.
<!--[if !supportLists]-->1. <!--[endif]-->MS_V7_LEVEL_NAME_PREFIX: In MicroStation/J, a level need not have a name. So on conversion, each level is given a name "Level xx" where xx is its level-number. The "Level" prefix can be overridden by setting the MS_V7_LEVEL_NAME_PREFIX. Thus if the variable is set to "my-level", then each MicroStation/J level that does not have a number will be given a name "my-levelxx". The variable can be set to "", which would cause every unnamed MicroStation/J level to have a name which is the same as its level-number.
<!--[if !supportLists]-->2. <!--[endif]-->MS_V7TOV8_CSVNAME: If this variable points to a valid ".csv" (comma separated value) file, then level information is picked up from this file.
Essentially the .csv file is a list of levels. For each level, the possible information that can be specified is Number, Name, Description, OverrideColor, OverrideStyle, OverrideWeight, ByLevelColor, ByLevelStyle, ByLevelWeight, GlobalDisplay, Lock and Plot. Each level attribute is arranged by columns. The first line of the .csv file should be a header line which specifies the names of the individual columns.
The minimum columns expected in the .csv file are the "Number" and "Name" columns. All the other columns are optional. If a particular column exists, then it overrides the level information of the MicroStation/J file. Thus if the OverrideColor column exists, then the level override color in the MicroStation/J file is replaced with the information from the .csv file.
MS_V7TOV8_CSVNAME is a good way to standardize your level information when transitioning design file information from MicroStation/J to MicroStation V8.
The .csv file can have a "Required" column. Under the "Required" column, each level can have a 0/1 value. If the level has a "1" value under the required column, then that means that the level is a required level. If the level has a "0" value (or no value) under the required column, then that means that the level is deleted if the level does not have any elements on it. The "Required" column is optional. If it does not exist, then it is like setting a "0" value.
A .csv file can be created in MicroStation V8 using Levels Export from the Level Manager. This will create a .csv file with all the possible columns, except the "Required" column. The "Required" column may then be added using Excel.
<!--[if !supportLists]-->3. <!--[endif]-->MS_V7TOV8_DELETE_UNUSED_LEVELS: If this variable is set to "1", then all unused levels (i.e. levels that do not have any elements on it) are deleted. This variable is active only if MS_V7TOV8_CSVNAME is not set or is set to an invalid file.
The Workspace > Configuration... dialog includes a "Levels" category, which provides the ability to access and modify the following level-related configuration variables:
Control Level Attribute Sync
Controls the list of level attributes that will automatically synchronize when a file is opened.
When set to 1, reference attachment levels will not synchronize to an attached library.
Level Library Path
Defines the default directory to look for when exporting levels or importing levels to/from a .csv, .dgn or .dgnlib file.
V7 to V8 Level Name Prefix
Defines the prefix to apply to un-named Levels when a V7 design file is upgraded to a V8 DGN file.
V7 to V8 Level CSV File
Defines the .csv file which control how levels are mapped when a V7 design file is upgraded to a V8 DGN file.
V7 to V8 Delete Unused Levels
If set to 1, then all unused levels are deleted when a V7 design file is upgraded to a V8 DGN file. This variable is ignored if "V7 to V8 Level CSV File" variable is set.
Affects the "dgnlib update levels custom" and "reference synchronize levels default" key-ins. This variable controls the list of level-attributes that will sync-up when any of the above key-in is executed. The attributes can be one or more of the following as a comma separated list: OverideSymbology, OverrideColor, OverrideStyle, OverrideWeight, ByLevelSymbology, ByLevelColor, ByLevelStyle, ByLevelWeight, GlobalDisplay, GlobalFreeze, Lock, Plot.
Controls which of the level attributes can be edited or overridden. The attributes to be edited can be one or more of the following as a comma separated list: OverrideSymbology, OverrideColor, OverrideStyle, OverrideWeight, ByLevelSymbology, ByLevelColor, ByLevelStyle, ByLevelWeight, GlobalDisplay, GlobalFreeze, Lock and Plot.
The difference between Global Display OFF & Global Freeze ON is that, Global Freeze is a stronger condition as follows:
(A) When a level's global display is OFF, then this does not affect the nested elements of a shared cell instance, if the nested elements are not on the same level.
On the other hand, when a level is frozen, then nested elements of a shared cell instance are also not displayed, irrespective of the level of the nested element.
(B) A DWG attachment can be on a level. The attachment's display can be controlled by freezing the level.
Definitions of the different color is outlined below.
Black = the Level is ON.No color = the level is currently turned OFF.Gray highlight = the level is ON in some of the views and OFF in the other views.
The maximum length of a level name is 511 characters.
For the MicroStation V8 file format - unless otherwise noted, one or more of the following characters are not permitted in level names:Ampersand ( & ) Asterisk ( * ) Vertical bar ( | ) Backslash ( \ ) Forward slash ( / )Period ( . ) Less than ( < ) Greater than ( > )Single quotation mark ( ' )Double quotation mark ( " )Question mark ( ? ) Comma ( , ) Equal ( = )Note: Although MicroStation does not allow the usage of these characters, it is possible to receive a file that contains them. In this case, the model or level may be problematic and require you to remove the offending characters before proceeding. This is especially true when dealing with DWG files or ex-DWG files.
Yes, if you have the configuration variable MS_LEVEL_SEED_LEVEL_NAME set to the level that you want as the seed level, then the new level will be created using the attributes from this seed level. If this configuration variable is not defined, it will use the Default level to create the new level and use the attributes of the default level.
When a new level is created, the Default level controls which attributes the new level is going to be created with. The Default level will act like a template. Therefore, whatever override or bylevel, color, style, or weight is set for the Default Level, the new level will be created with these attributes.
In addition to the settings defined in the Default level, if the configuration variable MS_LEVEL_CREATE_FROM_SEED_ATTRIBUTE_LIST is set, the new level will take the settings defined in this variable.
Yes, in MicroStation V8.5, you can edit the nested reference file levels symbologies by setting the MS_LEVEL_ EDIT_NESTED_ ATTACHMENT_LEVELS. If you set this to 1, then you will be able to edit the nested levels.
You want to make sure that the reference file level overrides have been set to ON to allow this functionality for the master file. If you go to the key-in Window and type in: SET REFLEVELOVERRIDES ON, this will turn this setting on so that any override change for the reference file made in the master file will remain. You can check to see what the master file is currently set to by typing in: SET REFLEVELOVERRIDES and then selecting enter. The value will appear in the Message Center.
The elements that are on levels beyond level 63 will be placed on levels that will wrap around starting with level 1. For example, if you have elements on level 64, the elements will be placed on level 1 when the file is saved to V7.
You can use the key-in: LEVEL USAGE <level name>. Where you substitute <level name> for the name of the level that you are trying to gather information on. In some cases, the levels may be used by Shared Cell Definitions. You can remove the shared cell definitions from a design file by using the key-in: DELETE SCDEFS ALL.
General Note for specifying level names in key ins:In case the level name that you want to specify contains spaces, always use double quotes when entering the name.Example:Level name in the Level Manager is shown as: Roof of house, make sure to enter:"Roof of house"
Yes, there are a couple of methods. One way is to select multiple levels from the level manager by holding the CTRL button down when selecting the levels and then selecting the delete button. An alternative way is to use the key-in: DELETE UNUSED LEVELS or use the updated Compress functionality of MicroStation V8 2004 Edition found under the File > Compress menu.
If the key-in: level purge [dest:level-spec] level-spec is used where you would substitute <level name> in for the name of the level, the specified level will be deleted from the design file. If elements exists on the level, then the elements will be moved to the Default level before it is removed from the design file.
An alternative key-in: Level Purge [Destination Level] <Level Name> syntax will move the elements, if they exist to the specified destination level.
Use double quotes when you specify a level name that contains spaces. Example: "House with roof"
There is a couple of ways to do this. One way is to toggle off all of the levels to isolate the level that contains the elements and then remove the elements from the design file. An alternative way is to use the key-in: LEVEL ELEMENT DELETE <Level Name>. This key-in will remove all of the elements from the level specified, but will leave the level name in the design file.
If you want to have just the Level Library or Reference file's attributes be the only attributes that are synchronized, the syntax Level or Reference can be added as a prefix before the attribute. For example, to synchronize the Override Color and Weight for a reference file, the syntax would be:
MS_LEVEL_SYNC_ATTRIBUTE_LIST = referenceOverrideColor,referenceOverrideWeight
Yes, if you have the MS_LEVEL_AUTO_SYNC_ATTRIBUTE_LIST defined this will automatically synchronize the attributes listed here when a dgn file is opened. The attributes listed can have a library or reference prefix as well. If no prefix is defined, both the library and reference file levels will be automatically synchronized. See Question “Is there a way to delete all of the elements on a level, but have the level name remain?” for syntax example of adding a prefix to the attribute listing.
MicroStation V7 files worked in which all overrides for a particular attribute were all on or all off. With MicroStation V8, there is the ability to have the override be on or off for each single level. Since MicroStation V7 did not support this, all of the levels for an attribute override must be all on.
When a new level is created in a design file, the level is automatically set to display the new level in versions before MicroStation 08.01.02.xx. However, with MicroStation 08.01.02.xx and later, the configuration variable MS_REF_NEWLEVELDISPLAY can be used to control how the new level is displayed. If the variable is set to 1, newly created levels will Display ON in all Models that contain references with levels created after the time of attachment. If the variable is set to 0 or not set (default), newly created levels do not appear in any files referenced to the master file.
Level Manager is a tool that allows you to manage and maintain your levels within a design file by creating, deleting, renaming, etc... levels. Level Display is a tool that allows you to quickly turn levels on or off per view.
The Global Display column in the Level Manager allows the levels to be turned on or off in the Level Display. If the Global Display is off for a level in the Level Manager, the level in the Level Display and will be grayed out and cannot be turned on. Therefore, if the Global Display is toggled on in the Level Manager, it does not necessarily mean that the level will be on. You may need to open the Level Display tool and turn the levels on.
Yes. There is a new configuration variable that has been added to 08.05.01.XX that will allow you to control this. The variable is: MS_LEVEL_DISPLAY_MODE_V7MAP_V8Names.
If this variable is set 1, the workmode will determine what level display will be used. For example, if the workmode is set to V7, the level display will be in the number map format.
If this variable is set to 2, the level display format will be based upon the file type. If a V7 file is opened, the level number map will be displayed. If a V8 dgn file is opened, the level name display will be shown for the level display.
Yes. You can set the MS_LEVEL_ALLOW_LIBRARY_LEVEL_EDIT variable to 1. When set, changes to library level attributes will cause the library level to be copied into the active file. This allows the changes to the library level attributes to be saved in the active file.
This variable controls if the unused library levels will be kept or deleted when using the "dgnlib update levels" command. If not set or set to "0" then, unused library levels will be deleted upon executing the "dgnlib update levels" commend. If this variable is set to "1" then unused library levels will be kept. If set to "2" then unused library levels will be kept only if some attributes of the library level has been modified.
A number of users have a workflow by which they replace an attachment file with another. MicroStation supports the ability to "re-attach" an attachment - supported by the reference dialog. Some users may prefer to replace the attachment file at the OS level, without the knowledge of MicroStation. This causes the problem where level-masks can get out of sync if the level structure in the attachment file is modified. Levels that were once on/off in the reference file may now appear to the contrary
of the original reference level attachment.
The following keyin should be run: reference filechange <name of reference file or logical name>
This key-in should be run in the master-file that contains the attachment. The key-in takes the name of the attachment file as a parameter. The attachment file parameter syntax is the same as that for other "reference" related key-ins. The key-in can be run either interactively (in MicroStation) or in batch mode on all files that attach to the switched file.
The key-in attempts to rebuild the level-masks after the attachment file has been switched at OS level. It looks in the master-file for all level masks associated with the specified attachments & remaps each individual level-mask to reflect the modified level structure. The modified level-masks are then written back to the active-file.
This key-in should be run immediately after swapping the file at the OS level. If the keyin is run after opening and modifying the master-file that has the attachment, then the chances of the key-in correctly are unlikely.
1.) The key-in fixes levelmasks for primary attachments only.
2.) The attachment needs to be a DGN file.(Currently it will not work on nested attachments or attachments which are DWG files)
Product TechNotes and FAQs
MicroStation Desktop TechNotes and FAQs
Bentley Technical Support KnowledgeBase
Bentley LEARN Server
Bentley's Technical Support Group requests that you please confine any comments you have on this Wiki entry to this "Comments or Corrections?" section. THANK YOU! | <urn:uuid:ceb5b7d2-f592-42f5-87d0-c3795960da03> | CC-MAIN-2022-33 | https://communities.bentley.com/products/microstation/w/microstation__wiki/8861/levels-and-level-libraries | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.866433 | 5,855 | 2.1875 | 2 |
Swedish diplomats acting for the U.S. have visited an American man detained by North Korea weeks ago. Sweden handles consular matters for Americans in North Korea because Washington and Pyongyang do not have diplomatic relations.
State Department spokeswoman Jen Psaki says the Swedish Embassy had consular access Friday to Jeffrey Fowle. Psaki urged North Korea to release Fowle and two other Americans it currently holds so they could return home to their families.
The detention of the 56-year old Fowle, who is from Ohio, was made public two weeks ago, when North Korean state-run media reported he was detained for acts inconsistent with a tourist visit. It hasn’t provided details about the accusations against him. | <urn:uuid:89359e36-badb-4d2e-abdc-6616d0ae8566> | CC-MAIN-2022-33 | https://familycarefoundation.biz/swedish-diplomats-push-for-americans-release-from-north-korea/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.9674 | 148 | 1.523438 | 2 |
Ahead of this Saturday’s national demonstration in Durham City Centre against the detention of women asylum seekers in Derwentside Immigration Removal Centre, Alison Stancliffe, Julie Ward and Suzanne Fletcher, campaigners with the No to Hassockfield group, have put together this guest blog about their reasons for opposing the facility – over to Alison, Julie and Suzanne:
On Saturday 14th May Durham’s picturesque city centre will play host to more than the usual tourists, students and shoppers. Hundreds of campaigners will be there too, on Palace Green, with placards and passionate voices, all with the same message: ‘Shut Down Hassockfield!’ But what is Hassockfield and why are we saying No?
Hassockfield is the name, until very recently, of the place where the government decided to locate its newest Immigration Removal Centre (IRC), using buildings on the site of a notorious former boys’ detention centre.
Tucked away behind trees and prison fencing in the rural hinterland of Consett, County Durham, and now operating under a new name, Derwentside IRC, it’s remote from the urban communities and services that asylum seekers generally depend on, and inaccessible to the casual visitor.
It’s where right now, the Home Office is locking up vulnerable women, many of whom came to this country to seek sanctuary and build new lives free from abuse and war. Women like so many of the people supported day in day out by Action Foundation.
Our campaign group, called No to Hassockfield, is one of four campaign groups behind the Durham demonstration, all calling for closure of the IRC and an end to the hostile environment it represents. We all believe what is happening in Hassockfield/Derwentside is both inhumane and unnecessary. Over the past year, since the Home Office plans for a new women’s IRC became public knowledge, we have been fighting to stop them.
Measures in the government’s new Nationality and Borders Act aim to strengthen the UK’s ‘hostile environment’ policy in an attempt to deter anyone seeking sanctuary, making it more challenging than ever for people from all over the world to settle in this country. And yet ironically here in the North East, Action Foundation has recently completed a ground breaking project, commissioned by the Home Office itself to explore a less ‘hostile’ approach to detention policy.
Alternatives to detention
Called Action Access, it tested an alternative approach to detention for women deemed not to have established a right to stay in this country, thus facing potential deportation – the very category of women intended for Derwentside IRC. Now completed, the project has provided compelling evidence that community alternatives could really work if the Home Office chose to pursue them.
Since the end of December 2021 the IRC has sadly become reality. At a cost of millions of pounds to the tax payer it’s been refurbished to accommodate 80 women (a far bigger capacity than has ever been needed nationally) and it is run by private contractors Mitie. It seems that as intended, the women ferried in and out since its opening are sanctuary-seekers with failed or unresolved claims, alongside women from Europe and beyond – many of them also highly vulnerable – who have been convicted of an offence and have already served a sentence of more than twelve months.
But our campaign is a reality too, calling even more urgently for the IRC’s closure and attracting support from people of all ages and backgrounds. We work both locally and nationally, engaging faith communities, trade unions, academics, students and the local arts community, and across political lines. We have explored legal challenges, gained significant press exposure and kept up a weekly presence at the gates.
Despite the Home Office decision to call the centre Derwentside, we’ve stood by the original name of Hassockfield as a reminder of the site’s disturbing history. Here’s what one of the group’s founding members, Julie Ward, said in mid 2021:
“Hassockfield Immigration Removal Centre will allow the government to effectively imprison 80 vulnerable women at a site with an appalling history of abuse, despite genuine alternatives to detention existing that actually support the women involved, while also being more efficient and cost-effective.
Rather than seeking to extend their hostile environment policy to a small community hundreds of miles away from Westminster, the government should focus on creating an asylum system that treats people with the compassion and care that they both need and deserve. This starts with scrapping the plans for this abhorrent detention centre.”
Since Julie wrote this, both Action Foundation’s Action Access project and a second alternatives to detention scheme in Bedford have strengthened our argument that there’s no need to lock up vulnerable women seeking asylum as they try to exercise their human right to a fair hearing. So we can say No to Hassockfield in the confidence that there are better solutions.
But we also campaign to highlight the wider injustices of detention represented by the IRC. Did you know, for example, that we are the only country in the 46 member state Council of Europe that practises indefinite detention whereby people seeking sanctuary are held for months if not years, not knowing when their nightmare will end, if they will eventually be given leave to remain or whether they will taken in the middle of the night to be deported?
That is the fate of not just the women being held in Hassockfield/Derwentside but of hundreds of other women and men detained in other IRCs. Agnes Tanoh was one of those. Now working for our partner group Women for Refugee Women, she has spoken out tirelessly against Hassockfield/Derwentside. This is what she said at one of our regular demonstrations outside the IRC gates:
“This is personal for me. I claimed asylum here because I was being persecuted in my country and I thought I would be killed. But I was locked up at Yarl’s Wood for three months in 2012. I was put there because the solicitor who was working on my case didn’t do it properly. I suffered so much and for no reason.
“Now, the government has agreed I should stay in this country, and I have refugee status. I dedicate my time to supporting other women. I know how detention destroys a woman. Women become depressed and suicidal in detention. I don’t want to see this happen to any of my sisters who are looking for safety.”
Her experience echoes the stories of so many others who reach our shores full of hope and find instead despair. The No to Hassockfield campaign is a collective act of hope that in a remote part of County Durham at least, an injustice can be confronted and ended.
Amongst those attending the event on Saturday, which takes place between noon and 3pm on Durham’s Palace Green, will be Afghan author Gulwali Passarlay who wrote The Lightless Sky: My Journey to Safety as a Child Refugee; poet Kate Fox and Agnes Tanoh.
Main photograph by @scenebysimone on Twitter | <urn:uuid:922ae804-f0ef-4f87-984b-f3b3c3dc3aa1> | CC-MAIN-2022-33 | https://actionfoundation.org.uk/saying-no-to-hassockfield-guest-blog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.956849 | 1,472 | 1.539063 | 2 |
Living on planet Earth is like living on a spaceship - with finite food and resources we must know what we have and plan how to reuse it. Forever.
Let's begin by debunking the idea that paper - or even wood - is always better than plastic. In fact, it all depends on the function you have in mind and which type of paper or plastic you choose.
Here are three basic principles when looking for good materials:
Principle 1: Know precisely which materials are in your product or component
Principle 2: Choose safe materials from a sustainable source that are fit for purpose
Principle 3: What's the plan to reuse it again and again forever?
For designers applying Circular Economy principles, selecting 'safe and circular' materials is possibly the most important, and tricky, thing we do. That's because, as it turns out, chemistry is super important and we didn't pay enough attention back when we should have...
There are three steps to implement principle 1. List all the parts in a product, list all the materials in each part, then list all the chemicals in each material. Got it? Not so easy, right... We have a couple of strategies to cope with this overwhelming task. Use an RSL - that's a restricted substances list for your suppliers and testing labs identifying which materials you simply won't accept. We're also focused on materials we use in the largest volumes, because, well, one needs to begin somewhere.
Once we know the chemicals we're working with, principle 2 helps us choose materials.
* Safe materials have no negative health or environmental impacts.
* Circular materials either a) come from a waste stream and can form part of a perpetual cycle or b) are renewable and extracted at a rate slower than they can regenerate, while protecting biodiversity and ecosystems.
* Fit for purpose means the material can do its job for the period of time we expect without adding other chemicals - like finishes or additives - just to enable it to work.
OK, so we need to know what materials we're working with - at a chemical level - and choose appropriate and safe materials from a good source.
Principle 3 is the punchline: We must handle our materials in a way that maintains their value in perpetuity.
This means using the simplest raw materials we can. Not mixing materials, adding labels, or attaching parts that make it hard or impossible to un-mix them. Ensuring they can biodegrade safely. Planning to recover the materials, including designing for easy, quick disassembly. | <urn:uuid:8cda9e92-b3ac-4101-be64-31305aaec523> | CC-MAIN-2022-33 | https://row.wishbonedesign.com/pages/values-good-materials?view=ajax-values | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.930347 | 520 | 3.546875 | 4 |
In local communities across Florida, humanities-rich programming is making a lasting impact in the hearts and minds of Sunshine State residents and visitors alike. Florida Humanities is proud to partner with local community champions to bring you high-quality public programming through Community Project Grants, Florida Talks, Museum on Main Street, and more.
Alert: Due to COVID-19 (Coronavirus), some events have been cancelled or postponed. We are working to ensure that our events calendar remains accurate. We strongly urge you to call the event contact for any program you are interested in to confirm that the event is still planned.
- This event has passed.
Maritime Mingle: Stories from the Gulf Coast Commercial fishing industry in Cortez: Environmental Changes
The Friends of the Florida Maritime Museum is hosting an engaging conversation to explore what can be learned from the water ways that surround the Florida coast and those who live and work there. Fishing communities depend upon healthy waterways. The men and women whose livelihoods directly reflect any environmental changes are incredibly connected to the ebbs and flows. What can be learned from their stories?
Get ready to “maritime mingle” with a conversation focused on the environmental changes that the commercial fishing industry has witnessed over the years in the Gulf of Mexico. At this fun, interactive discussion, each table will “speed date” with commercial fisherman, fish house workers, and others who play an important role in the industry.
This event is free to the public. RSVP required. Please email Kristin Sweeting at [email protected] to secure your spot. Funding for this program was provided in part through a Florida Humanities Community Project Grant in partnership with the Friends of the Florida Maritime Museum.
Date/time: April 23 @ 2:30 pm - 5:00 pm
Presented By:Commercial Fishing Industry Workers | <urn:uuid:c823cc9f-5bf1-4acd-bc6a-ba9d44f5108f> | CC-MAIN-2022-33 | https://floridahumanities.org/event/maritime-mingle-stories-from-the-gulf-coast-commercial-fishing-industry-in-cortez-environmental-changes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.922596 | 399 | 1.820313 | 2 |
Welcome to Sonoran Arcana, a column seeking to probe the margins of Arizona cuisine and define a more specific, novel cuisine that has emerged in America's great Sonoran Desert: New Arizonan. Here, we will venture into the arid wilds and culinary unknown to spotlight the chefs and foragers, the millers and brewers, the miso masters and palo verde pod-pickers who are pioneering New Arizonan cuisine, or simply rocking out the food of Arizona. So throw open the doors to your mind and enjoy.
Velvet Button starts to leave the garbanzo field. She stops on the edge and plucks a pod from a low plant, similar to all the others in the yellow rows around her. The lumpy pod looks about as moist as a ruffled potato chip. Velvet rolls the pod between her fingers. It crushes to dust, blows away. Parched garbanzos remain, jewels of the low field drying before harvest.
Beneath Velvet’s strappy sandals, the soil is fabulously cracked.
Cracked like thin ice on a pond — only there won’t be ice anywhere on this June day. The heat is well on its way to triple digits. Velvet’s father, Terry Button, has long been at work with his team of farmers, battling the wind to bale hay since 2 a.m. Roadrunners glide the dirt and paved pathways between Ramona Farms’ 4,000 acres, disconnected and scattered over 27 miles. Hawks circle above mesquite trees, a coyote lopes through a barley field, and colorful corn blows in the wind.
Standing tall above a withered garbanzo plant, Velvet says the legumes are field-dried, just like her family’s tepary beans. Founded on 10 acres of Gila River Indian Community land in 1974 by Terry Button and Ramona Button (Velvet’s mom), Ramona Farms is best known for its prodigious efforts to restore the tepary bean to cultivation.
In the mid-1970s, Ramona and Terry found a jar of the drought-resistant, virtually extinct Sonoran beans in her late father’s truck — and started planting. Within a few long years, they were selling teparies by the 100-pound gunnysack. (Velvet's maternal grandfather was Tohono O'odham and his wife was Akimel O'odham. She identifies as both, but is officially registered as the latter.)
The cracked soil of a field of garbanzo plants, drying before harvest.
Dry climate. Modest water. Robust flavor. The story of the tepary is known in these parts. But on the family farm in the Gila River Indian Community, the Buttons also raise other crops once grown by local tribes, especially by their own Akimel O’odham, formerly called Pima. They grow two heritage wheats, plus a third, durum, and four corn varietals cultivated in the dry Southwest since ancient times. Not to mention common wheat, barley, sorghum, cotton, Bermuda grass, alfalfa, and more.
The Buttons supply crops to their reservation, to regional chefs, and, through their website, to the world. The organic section of their farm — where their heritage crops grow — is the kind of food source with the capacity to change eating in greater Phoenix.
Instead of making tamales and polenta with yellow stuff from afar, cooks could channel the flavors and integrity of the local land using Ramona Farms' Hopi blue, Hotevilla pink, Havasupai red, or 60-day Pima corn. Teparies could substitute for other beans with less flavor, less history, and a larger carbon footprint. In a region with limited water and a meager 3 to 20 inches of precipitation a year, teparies can thrive in the desert summer on a single rainfall.
And these properties will make teparies more important as the Colorado River water supply continues to thin, the planet warms, and the Southwest gets hotter and drier.
Just a short drive from metro Phoenix, in a part of the Gila River Valley where the river has dried up because of upstream human diversion, the Buttons keep Ramona Farms with spartan rigor and boundless love. Here are ancient, modern crops that are made for their environment — and taste great. And yet, only a handful of eateries in the Phoenix area use them.
Cotton & Copper serves a Ramona Farms tepary bean spread.
Some of their chefs visit — to see the indigenous crops, to see the deeply cracked garbanzo field.
“We didn’t do anything to amend the soil other than rotate our crops, and just manage through careful watering and whatnot,” Velvet says, wind whispering in the dry plants, part of the 200 acres of USDA-certified organic land where the Buttons grow their premier crops. “We don’t use organic fertilizers. We don’t use organic herbicides. We don’t use those because of those traditional reasons.”
“What are those traditional reasons?” I ask.
“We don’t put anything on our food," she smiles. "We let the creator do that.”
Velvet trades the garbanzo fields for her car. She rumbles along a dirt lane along the field. Wild mint on the dash bakes in the sun, turns fragrant. As she makes for the next field, Velvet unpapers a breakfast of a biscuit and c’emet
— the latter a flatbread cooked since the Spanish missionary Eusebio Francisco Kino brought grain to the region in the 1600s. Both c’emet
and tortilla are stuffed with tepary beans and salsa. Both are made from Ramona Farms Pima wheat, a heritage grain.
Velvet herself doesn’t raise wheat. Her role on the farm and beyond is more culinary and educational. She is an exponent of Akimel O’odham crops and their applications, a proselytizer of tepary bean brownies and blue corn pancakes, not to mention the likes of wild wolfberries and early summer's saguaro fruit. She is a teacher, cook, and free spirit. She is also, today and other days, a farm tour guide.
Driving, she points out an alfalfa field.
She talks about hospitals and canal projects, about local artist Amil Pedro and Akimel O’odham legend Chief Azul, the tribe's last chief.
Soon, the low green shoots of a corn field show. Velvet parks. She walks into the rows of young plants. The machine-gun trilling of a killdeer is muffled by the vast chorus of crop leaves rustling. The field holds a Hopi blue corn varietal, still a few weeks from harvest.
Beyond this patch and flush with a crook in the road rises a comb-lined parcel of Pima 60-day corn, an Akimel O’odham mainstay known as kiikam huuñ
. Sown to align with monsoon season, 60-day corn can pass from planting to harvest in that lightning time frame.
“When it’s grown in optimal temperatures, it’s gangbusters,” Velvet says. “That corn grows like crazy
Area chefs do many things with Ramona Farms corn. Tamara Stanger of Cotton & Copper uses it to bread chicken. Brett Vibber of Cartwright’s Modern Cuisine has sourced it as ga’ivsa
, mesquite-roasted and cracked, and slurried it molten under wild Pacific salmon. Pueblo Vida, a brewery down in Tucson, uses Hotevilla pink corn in the crafting of Vida Beer, a "Southwestern premium" lager.
“The chefs that are choosing to put these foods on the menu are taking the time to understand the food, understand the people that domesticated this food and have kept it in production,” Velvet says. “It’s getting the respect it deserves, because they’re taking the time to really know it.”
Velvet herself has many uses for corn. She nixtamalizes corn using bean and wood ash. She makes tamales, porridges, mush, tortillas, corn c'emet
, and other old and new preparations. She and her sister, Brandy Button, proudly work to adapt "traditional foods for the modern O'odham table." On hot days, Velvet fortifies apple juice with huuñ haak chu'i
, a roasted corn flour that messengers once packed under their lips before they ran from village to village.
Four kinds of heritage corn bring four different colors.
Come each plot's separate harvest, Ramona’s workers hand-pick corn. Ears are roasted out in the field, over mesquite fires. At intervals, broad empty lanes run between ruler-straight lines of tall green. These idle strips leave space for trucks, so local laborers can stow their just-picked bounty.
Before corn, this plot held barley. Ramona Farms is constantly cycling and rotating crops — to nurse the soil, to dovetail with the seasons. “There’s something planted or harvested every day of the year,” Velvet says.
She gets back into the car. A dirt road slithers ahead. The green acreage and blue sky in the low bowl of mountains slide by in a bucolic dream.
We pass concrete canals skirting fields. Ramona Farms uses flood irrigation, letting pumped groundwater course across fields, watering crops. This is possible because Velvet’s uncle painstakingly leveled fields using lasers. Land he has reshaped, Velvet says, “is flatter than a pool table.”
Velvet now parks at a golden wheat field. Ramona Farms cultivates Pima, durum, and White Sonora wheat. The young wheat riffles and rustles in the wind with a colossal stirring sound, giving the field the peaceful magic of a golden ocean. “All of our wheat products are whole-grain,” Velvet says, listening to the now-far, now-surrounding rustling. “There are parts of the wheat, the oil and the germ, that help us digest other parts and enzymes. We’re supposed to eat the whole thing.”
The heat is mounting, so Velvet makes for a plot of tepary beans. Ramona Farms is divided into dozens of plots that patch across the Gila River Valley like a scattered quilt.
When the Gila River Indian Community was created, land was doled out to families in 10-acre plots. In order to amass 4,000 acres, Ramona Farms had to buy and lease from hundreds of fellow Akimel O’odham and Maricopa, the two main tribes on the reservation, especially when you consider that many of these 10-acre plots were further divided through life, death, and smaller vicissitudes.
Rows of tepary beans pointing to eastern mountains.
The tepary beans were planted just a few weeks ago.
They are leafy, shifting shoots in clods of brown soil. They point at distant, sacred mountains. When the plants are ready for harvest, beans will be white, brown, and black.
White tepary beans, Velvet says, are “sweet and buttery" with "a smooth texture.”
Brown teparies are “nutty and earthy” with “a texture of boiled pecan.” They keep their shape when boiled. “In a nice brothy soup, they showcase like little river petals — they’re so pretty,” Velvet says. “And when you cook the brown tepary bean, oh my gosh, the kitchen smells like rain.”
Velvet’s parents bred the black tepary into existence. “They were created over a very careful hand selection over the last 30 years or so,” Velvet says. What they did was save black tepary beans that arose from the white and brown crops. When they had enough, they planted them.
You can order black (and other) teparies from the Ramona Farms website. It reads: “Firm textured and meaty flavored — the s-chuuk bavi
is a special and very limited tepary variety.”
The original tepary varieties Ramona Farms started growing in the 1970s: white and brown.
Driving back to the farm store and offices (she proudly doesn’t have one), Velvet produces two brownies. These are tepary bean brownies, squares that use cooked beans and heritage flour to form the bulk of their substance. Often, she bakes them for students, part of her mission to educate about the foods of the past and give the next generation a taste for them. The brownies vibrate with a primal, earthy intensity. They have a complex sweetness, arisen not from sugar but desert-evolved beans.
Back in the farm center, Velvet’s mom, Ramona, sits at her desk.
She tells about the farm's history, about the need to share ancient crops with upcoming generations. “We went from a clay pot to a Crock-Pot,” she laments. Her stories about speaking to horses in Akimel O’odham and spirits living in buried clay pots re-tilt your head, adjusting the way you see things.
“In order to die a happy death, you have to eat well,” she says, echoing words from her mother, a partially blind medicine woman, advice that inspired the farm’s founding. "Go back to the traditional values of the Pimas, and exercise more. Till your fields or your gardens. Sing a song and say your prayers.”
Note No. 1: On the Ramona Farms website, you can find information about the availability of crops, order them, find out where they can be bought at stores around metro Phoenix, find out which restaurants in Arizona and beyond use them, and learn some amazing recipes: O'odham grits, blue-corn pancakes, yeast-less biscuits, and, yes, tepary bean brownies.
Note No. 2: Kai Restaurant will be hosting a five-course dinner in collaboration with Ramona Farms on July 5, 2019. It will spotlight Ramona Farms ingredients like tepary beans,
ga'ivsa, and pinole. | <urn:uuid:5e0ab76f-e630-4aa7-8a8d-96b1534a8c60> | CC-MAIN-2022-33 | https://www.phoenixnewtimes.com/restaurants/sonoran-arcana-ramona-farms-tepary-bean-indigenous-foods-11314428 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.934107 | 3,126 | 1.953125 | 2 |
Technology tools can transform the way a check for understanding happens in the classroom. Nearpod is a favorite formative assessment tool that can be used to monitor student progress during a lesson while engaging students with interactive activities. Earlier this year I shared some of the ways Nearpod transformed my teaching in the classroom and how I continue to use this tool to check for understanding with adult learners.
If you haven’t used Nearpod before, you can head over to their website and sign up for free. There are lots of activities you can add to the lessons you create. In this list I focus on four Nearpod activities that check for understanding and the different ways you can use each tool for formative assessment. I hope you’ll dive into this list and try them out in your classroom!
With a Poll…
Gauge student interest with a few quick questions at the start of a lesson. This information can help you determine which direction to take a lesson or which examples to share with the class. For example, before kicking off a lesson on ecosystems you might ask the class which part of the world they would like to visit and let them choose from (1) The Great Barrier Reef, (2) Amazon Rainforest, (3) Antarctica. Depending on how your class responds to this question you can tailor the examples you give to their interests.
Check student confidence with a poll at the beginning, middle or end of a lesson. Even if your students demonstrate proficiency in other ways, it’s important to understand if they feel confident in the material they’re exploring. This can help you decide if you need to slow down or rewind a lesson.
With Draw It…
Students can annotate a passage or image you send to them. For example, you might snap a picture of a poem or short passage and send it out to students through the Draw It activity. Students can then use the highlighter or pen tool to “write” all over the image as they annotate the passage. This will give you actionable information on where there might be gaps in understanding.
The Draw It activity gives students a lot of flexibility, including the option to draw a diagram. Students might draw a T-chart or Venn Diagram to organize their thinking as a way to respond to a prompt or question. When students submit their drawing you can look for responses that match the success criteria you have identified.
With a Quiz…
Conclude a daily lesson with a few quick questions to gauge student understanding. A quiz will give you a picture of the whole class and can help determine if students have patterns of need. This information is useful for grouping students for follow up intervention.
Ask students to think-pair-share before answering each question to talk through their ideas with a partner. This exercise will help students pause when seeing a question and think deeply about the answer – instead of moving through a set of questions too quickly.
With an Open-Ended Question…
Set expectations for student responses to open-ended. You might ask students to respond in full sentences to some questions or just submit a quick phrase or keyword for their answer. Making this announcement to the class before you push the question to them is a good strategy.
Add a reference image within the question to support student answers. For example, if you’ve just discussed a primary source document together, add the image to your open-ended question with the upload feature so students can tap the screen and enlarge the image as a reference.
Visit Nearpod’s website to learn more!
I’d love to hear about the ways you use Nearpod to check for understanding. Leave a comment or question below!
cross posted at classtechtips.com
Monica Burns is a fifth grade teacher in a 1:1 iPad classroom. Visit her website at classtechtips.com for creative education technology tips and technology lesson plans aligned to the Common Core Standards. | <urn:uuid:233d9b90-c625-4c04-9dd6-d0775f85f609> | CC-MAIN-2022-33 | https://www.techlearning.com/tl-advisor-blog/11885 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.929924 | 812 | 3.5625 | 4 |
PPV Fans (Positive Pressure Ventilation Fans) are used in firefighting to remove smoke from a burning building, so that fire fighters can have a clear view inside the house and injured people do not have to breathe toxic smoke. This can be done by placing a PPV fan in a distance of about two meters in front of a door of the burning building. On another, carefully chosen position in the building, e. g. a window, a door or at the roof an opening has to be created, where the smoke can leave the building. The same volumetric flow rate of gas that is blown into the building by the PPV fan has to leave the building at a chosen opening. Because the gas entering the building is air and the gas leaving the building is a mixture of smoke and air, the smoke concentration in the building can be reduced.
To test the performance of such PPV fans, a test building with a door in the first floor and a window in the 3rd floor has been built. To measure the volumetric flow rate of the smoke and air mixture through the window in the 3rd floor that is leaving the building, a flow meter nozzle was designed. The design process was done using the commercial Navier Stokes solver Star CCM+, where three nozzle designs, such as a nozzle with constant velocity increase, a quarter circle nozzle and a non-curved nozzle were investigated for different volumetric flow rates. Also, a rounding at the window, where the nozzle is placed, was investigated to prevent flow detachment and shock losses at the inlet of the nozzle.
The volumetric flow rate through the nozzle can be calculated, by measuring the pressure at the nozzle wall (before the contraction) and applying Bernoulli’s law, the continuity equation and assuming atmospheric pressure at the free jet flow at the end of the nozzle. The so calculated volumetric flow rate was compared with the actual flow rate, given by the numerical CFD simulations. With these values, the nozzle specific coefficient of discharge for several volumetric flow rates has been calculated and a function fitting was done to get obtain analytical relation between pressure and volumetric flow rate.
The detailed design process of the three nozzles, the numerical results of the CFD studies and the determination of the nozzle specific coefficients of discharge are shown and discussed in detail in this work. | <urn:uuid:d9863b96-8d09-408b-b612-c8e438dbd2a1> | CC-MAIN-2022-33 | https://asmedigitalcollection.asme.org/IMECE/proceedings-abstract/IMECE2020/84584/V010T10A055/1099467?redirectedFrom=PDF | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.95722 | 488 | 3.109375 | 3 |
Working with an Investment Professional
Are you the type of person who will read as much as possible about potential investments and ask questions about them? If so, maybe you don’t need investment advice.
But if you’re busy with your job, your children, or other responsibilities, or feel you don’t know enough about investing on your own, then you may need some help.
You can hire a broker, an investment adviser, or a financial planner to help you make investment decisions. You can also get investment advice from most financial institutions that sell investments, including brokerages, banks, mutual fund companies, and insurance companies.
There is no such thing as a free lunch. Investment advisers and brokers do not perform their services as an act of charity. If they are working for you, they are getting paid for their efforts. Some of their fees are easier to see immediately than are others. But, in all cases, you should always feel free to ask questions about how and how much your adviser is being paid. And if the fee is quoted to you as a percentage, make sure that you understand what that translates to in dollars.
Check out your Investment Professional
Choosing whether to work with a professional – and deciding which type is best for you – is a very important decision. The most important question that you should consider before hiring an investment professional is whether the person is registered with us or with a state securities regulator. It is really risky to invest with someone who isn’t licensed and we urge you not to do it. Investor.gov has a free and simple search tool that allows you to find out if your investment professional is licensed and registered.
Read the Firm’s Relationship Summary
Beginning in summer 2020, registered broker-dealers and registered investment advisers will be required to provide a customer or client relationship summary (also called Form CRS) to retail investors. A firm’s relationship summary tells you about:
- the types of services a firm offers;
- the fees and costs you will have to pay for those services;
- conflicts of interest a broker or adviser may have;
- the required standard of conduct associated with the services a firm offers;
- whether a firm and its financial professionals have reportable legal or disciplinary history; and
- key questions (conversation starters) to ask your financial professional.
Each firm’s relationship summary uses similar headings and order of topics to make it easy for you to compare firms. You can find more about the relationship summary at Investor.gov/CRS.
If a broker or adviser has initials after their name, don’t assume that makes that individual more qualified than another. These titles are not all the same and do not necessarily mean better service for you. In fact, the initials may mean that the adviser or broker can only sell certain products. Check the titles to see if there are limits on what that adviser or broker can sell. For instance, if someone can only sell fixed annuities, he or she may be inclined to recommend them for every customer.
Check out this list from FINRA. It shows how some credentials can be obtained easily, and how others are hard-earned.
Must Read Tip
If you have a brokerage or advisory account, read every statement promptly -- it may not be fun to look at it when the market is down, but it is your most important protection against unauthorized transactions. If you do not object promptly after receiving notification of a transaction, you might not be able to contest it later. You should object in writing to better protect your rights. That’s why it’s important to read your statement and object right away if something is wrong.
Please use the menu on the left for more information about broker-dealers and investment advisers.
Investor Bulletin: How to Select an Investment Professional
Updated Investor Bulletin: How to Check Out Your Investment Professional
Investor Bulletin: New Rules Give Customers Option of All Public Arbitration Panels
Investor Bulletin: How to Read Confirmation Statements | <urn:uuid:a33b6c7a-b6c4-4c26-a0d8-b5fd9f7fbd6a> | CC-MAIN-2022-33 | https://www.investor.gov/introduction-investing/getting-started/working-investment-professional | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.951522 | 840 | 1.695313 | 2 |
When we move into a new home or buy a home in Australia, we take it for granted that it will be of safe and sound construction. An older home may need some repairs, but in most cases, it will have strong foundations and we can trust the framework to last as long as we own the home. The reason why Australian homes are built to safe standards is because by law, only licensed builders can be in charge of any significant building projects. You can find licensed Builders on hipages.com.au.
The Australian Building Codes Board (ABCB) is the authority in charge of producing national minimum building standards. Volumes One and Two of their National Construction Code (NCC) contain Building Code Australia (BCA) standards for general construction work, including:
Licensing of Builders
All Australian states and territories impose regulations based on BCA standards. In addition, individual states may have further regulations to suit their particular needs. All states assure that their building regulations will be adhered to by granting licences only to qualified builders who prove they understand and adhere to BCA, state and local building regulations.
Each state or territory has its individual licensing authority. While all states have similar trade licensing rules, there are also important differences. In one state, you might be required to hire a licensed builder for any project over $1,000, while another state may have a different regulation. A builder in one state or territory may have to renew their licence every year, while in another it may be every three or five years.
For further information about builder’s licenses and regulations in your state, please read your state overview below.
Types of Building Jobs
Licensed builders are authorised to carry out a wide range of building and building-related jobs, including, but not limited to:
Whether a licensed builder is required usually depends on the cost of the project and/or safety considerations. These are determined partly by state and local authorities.
In New South Wales, NSW Fair Trading regulates builders. As in other states, their work must conform to BCA and state regulations.
There are a number of types of builders’ licences and certificates in NSW:
Builders’ licences must be renewed every three years in NSW. Apprentices working under licensed builders do not require a licence or certificate, but must work under supervision.
In NSW, it is illegal for anyone to carry out any building work that exceeds $1,000 in value, including materials and labour, without a builders’ licence.Find a local Builder in NSW.
In Victoria, the Building Practitioners Board (BPB) regulates the building industry. All building work over the value of $5,000 (materials and labour) must be carried out or supervised by a builder who is registered with the BPB. Exceptions to this rule include practitioners who carry out only one of a specific set of related activities such as:
There are a few other exceptions, too, but if more than one of these minor works is carried out and the value is greater than $5,000, a builder must have the appropriate registration certificate. If restumping, reblocking, demolition or removal of a home is needed; the work must be carried out by a registered building practitioner regardless of the cost.
If the value of building work exceeds $12,000, the registered builder must also hold appropriate consumer protection insurance.
There are three types of BPB registration certificates in Victoria:
Trade professionals in the DB-U class are registered to carry out all phases of domestic work or supervise, manage or appoint subcontractors.
A DB-M Certificate of Registration allows the registered building professional to arrange for DB-U or DB-L practitioners to carry out building work or manage their activities. By itself, a DB-M Certificate does not authorise the holder to carry out building work, but a holder of a DB-M Certificate often also has a DB-U or DB-L Certificate.
Holders of Domestic Builder – Limited (DB-L) registration certificates are authorised to carry out one only of a variety of building works, including, but not limited to:
Building professionals in the DB-L class are authorised only to carry out work specified in their Certificate of Registration.
Typically, a Certificate of Registration must be renewed every three years, but there may be exceptions. Your building trade professional’s registration certificate will contain all the details you need to know.Find a local Builder in VIC.
In Queensland, the Queensland Building and Construction Commission (QBCC) governs the building and construction industry. Building licences are issued by the QBCC and with the exception of work listed below, all building work exceeding $3,300 in value (labour and materials) must be carried out by a licensed builder. In Queensland, “carrying out” building work includes:
There are four classes of builders’ licences in Queensland:
In addition, a variety of Builder Restricted Licences are available for specialised services, including Builder Restricted to:
A builder’s licence is not required for:
In Queensland, builders must renew their licences every year.Find a local Builder in QLD.
The Attorney General’s Department of Consumer and Business Services (CBS) governs licensing and registration of builders in South Australia. In SA, a builder is defined as any individual or company that engages in a wide range of building related activities, including;
In South Australia, anyone who carries out or supervises building works as defined above must hold a valid contractor’s licence with a nominated Building Supervisor. This includes work carried out by sub-contractors. A builder can have a licence for carrying out a specific type of work, such as painting or installing windows, or a range of general building works.
Two types of builders’ licences are available in South Australia:
Building Contractor licences must be renewed every year in South Australia.Find a local Builder in SA.
All builders and related tradespersons are required by law to be registered with and licensed by the Building Services Board in Western Australia. Under the Builders’ Registration Act 2011, individuals, partnerships and companies that undertake building work valued over $20,000 or requires a building permit must have one or both of two types of licences:
There are three types of Building Contractor licences:
In WA, “building” does not include cabinet making, decking installation, or joinery as it does in some other states.Find a local Builder in WA.
The Department of Justice governs building work in Tasmania. In Tasmania, “accreditation” is the equivalent to trade licensing in other states. There are four types of accreditation for builders in Tasmania:
In addition, there are three classes of building accreditation:
In Tasmania, all categories and classes of accredited builders must undertake Continuing Professional Development (CPD) education and renew their licences yearly after proving they have undertaken CPD training to a minimum standard.Find a local Builder in TAS.
In the ACT, builders are licensed through the ACT Planning and Land Authority (ACTPLA). Four types of builders’ licences are available:
“Specialist” building work includes the building of swimming pools and demolition work. In most cases, builders’ licences must be renewed every 3 years, but there are exceptions. When you inspect your ACT builder’s licence, the renewal date will be stated on the licence.Find a local Builder in ACT.
In the Northern Territory, the Building Practitioners Board is responsible for registering builders and monitoring their compliance with BCA, state and local regulations. In the NT, only registered building contractors can:
A building contractor is not needed to:
In the Northern Territory, there are two types of residential building contractors: | <urn:uuid:35632a3a-ec82-4a05-af80-139389ae5f5d> | CC-MAIN-2022-33 | http://www.licensedtrades.com.au/licensed/builder | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.948822 | 1,605 | 2.328125 | 2 |
UPDATE: Read the latest update regarding our response to the novel coronavirus (COVID-19) situation. Read more.
What is happening with Solar Savers Adelaide?
In April 2016, Council sought registrations of interest and feedback from residents and landlords for Solar Savers Adelaide. The program was endorsed by Council in October 2016.
58 properties met the eligibility criteria and of these, 40 properties signed Property Owner Agreements.
There are no current plans to undertake a second stage of Solar Savers Adelaide.
If you are interested in support for renewable energy see The City of Adelaide's Sustainability Incentive Scheme.
On 25 July Council declared the separate rates for each property that the 40 properties have signed Property Owner Agreements to take part in Stage 1 of Solar Savers Adelaide.
The solar PV systems were installed by Cool or Cosy in late 2017/ early 2018.
The quarterly Solar Savers separate rates charge came into effect for property-owners post-installation and applies for a 10-year period as part of the Property Owner Agreement signed between the household, Council and Cool or Cosy. The panels will belong to the property, and if the property owner moves any remaining repayments will remain with the property.
Council will continue work on the development of future stages and a broader community solar bulk-buy.
What is the objective of the Solar Savers Adelaide Program?
South Australia is experiencing an increase in the frequency, intensity and duration of heat waves. As energy prices continue to rise, vulnerable and low-income members of the community are often forced to consider whether they are able to afford the energy costs associated with air conditioning. An increase in heat waves can pose significant health and financial impacts for households that are trying to maintain healthy indoor temperatures.
There are several barriers to the installation of solar PV systems, including access to upfront capital to purchase and install the PV systems; lack of clarity and trust in the solar market; as well as a split incentive between landlords and tenants. The Solar Savers Adelaide Program was designed in an attempt to overcome some of these barriers and to encourage the increased uptake of solar PV in residences within Council.
In particular, the objectives of the Solar Savers Adelaide Program were to:
What were the steps in the Solar Savers Adelaide Program?
Has this been done anywhere else?
Darebin City Council has run two phases on their Solar Savers Scheme, with a third planned for 2019.
Solar Savers Victoria is a partnership between not-for-profit greenhouse alliances and local councils, funded by the Victorian Government. Solar Savers is being progressively rolled out.
What are the benefits of installing solar if I am a landlord?
How was the solar PV energy system supplier and installer selected?
Council undertook a competitive tender process and selected South Australian Company Homeworks Co Pty Ltd (trading as Cool or Cosy) as the solar PV energy system supplier and installer for Solar Savers Adelaide. Clean Energy Council approved photovoltaic modules and inverters were considered, with a minimum product warranty of 10 years for the panels, inverter, mounting and installation. The Clean Energy Council is the peak body for the clean energy industry in Australia, and they administer a number of schemes to maximise product and service standards in the solar PV industry. Installers were also required to provide proof of Clean Energy Council accreditation; relevant building and electrical contractor licenses; as well as attendance at roof safety training courses. Police checks were also required as part of the tender; and the installers are required to comply with all relevant local, state and Commonwealth Government statutory and regulatory requirements.
Why was Cool or Cosy selected?
Cool or Cosy met all of Council’s requirements for a trusted and quality solar PV energy system supplier and installer. Cool or Cosy is a family-owned South Australian Company that is based in Torrensville, Adelaide. Cool or Cosy was established in 1984 and is a leading supplier of solar PV systems in South Australia. They are solar retailers, manufacturers and wholesalers and are a RAA member partner. The Cool or Cosy installation crews are fully licensed and accredited by the Clean Energy Council. For further information on Cool or Cosy, please visit their website (External link).
Cool or Cosy owns Tindo Solar, a wholly Australian owned and operated company founded in 2011 that designs and manufactures technologically advanced solar panels for Australian conditions. Tindo solar panels are manufactured in South Australia, which lowers the carbon footprint of the product and creates local economic opportunities. Tindo solar PV panels have been selected as the solar panels to be installed in the Solar Savers Adelaide program.
Where can I get more information about solar PV systems and my own energy use?
The following websites have some useful information:
What is a separate rate?
Solar Savers Adelaide has been designed to use a separate rate that is charged to the land, and is paid off by participating property owners in quarterly instalments over a 10 year period. The separate rate charge avoids households paying an up-front cost for solar; and allows Council to recover the cost for the supply and installation over a longer time frame. The principle of the Program is that households are forecasted to save more on electricity bills than they will pay for the solar panels each year over the 10 year period.
The separate rate is permitted through Section 154 of the South Australian Local Government Act 1999. As with other rates declared by Council, once a separate rate has been declared under the Local Government Act, it becomes a statutory charge against the land.
The separate rate charge was only applied to properties that have:
Registered interest to take part in the Program and met the Program eligibility criteria; and
Signed an agreement with the Council that enables the Council to facilitate the supply and installation of an approved solar photovoltaic system by a contractor approved by the Council.
The separate rate will remain with the land for the duration of the 10 year period, regardless of whether the system remains at the property, or if the property is sold, as the rate is levied to facilitate the supply and installation at the property.
How are the quarterly repayments calculated?
A property-specific quotation provided the household with the exact cost as well as the quarterly instalments to be paid through the separate rate. Extra costs associated with installations will increase the standard costs (i.e. multi-storey access, switchboard upgrades).
Council provided a $1,000 upfront rebate on the total cost of the solar PV energy system as part of the City of Adelaide's Sustainability Incentive Scheme. Council also bore the administrative and program costs, as well as the costs of the Solar Analytics energy monitoring system.
An interest rate of 3.55% was applied to the total cost of the system in order to cover Council’s costs of financing the system over 10 years.
Is there an option to pay back the separate rate earlier?
Who owns the solar panels while they are being paid off?
The separate rate is applied to the land and the property owner pays quarterly instalments over a 10-year period. If the owner decides to sell the property, any remaining repayments are taken on by the next owner.
What happens if I want to sell my property?
How will the separate rate be billed?
The Separate Rate is included in the owner's General Rates Notice. Notices are issued quarterly with payment due on the same date as your General Rates.Council offers several payment methods - Details are included on the reverse of your Rates Notice. Payment methods include: online via Council’s Website, Direct Deposit, BPay, Post billpay, via Phone, Cheque; or over the Counter at Council’s Customer Centre at 25 Pirie Street or at an Australia Post outlet.
What if I miss a repayment or can’t make my repayments?
If you are having difficulty making payment we encourage you to contact the Customer Centre to discuss payment options as soon as possible before the due date.
If Rates fall into arrears and other arrangements have not been made, fines and interest may apply. Details are included on the reverse of your Rates Notice.
How was eligibility for Stage 1 of Solar Savers Adelaide defined?
To be eligible for Stage 1 of Solar Savers Adelaide, participants would need to have registered interest in April/May 2016 and met our eligibility criteria as outlined in the Eligibility Information Pack . As part of proving eligibility, supporting documents were required to ensure a transparent and robust selection process. The eligibility process has closed and Stage 1 participants have been selected.
How were the criteria to determine eligibility developed?
Owner-occupiers were required to provide evidence that they qualify as low income. We used existing income-tested measures, such Commonwealth Concession/Pension cards; or Commonwealth Centrelink payments as a means to provide this proof. Should an owner-occupier not hold any Commonwealth Concession/Pension cards, or receive Commonwealth Centrelink payments, they were also able to prove their low income status by demonstrating that:
The proof required to meet these criteria, including the specific Commonwealth cards or Centrelink payments eligible is explained in the Eligibility Information Pack.
Rental properties were required to be private residential rental properties (not serviced apartments), and the property owner needed to provide consent to participate in Solar Savers Adelaide. Rental agreements were requested as proof that the property is currently rented.
Were family rental properties eligible in Stage 1?
Properties that are rented to direct family members are not included in Stage 1 of Solar Savers Adelaide, as this is not consistent with the intent of the program. The intent of Solar Savers is to make it easier and more attractive for landlords to install solar systems on rental properties where they will not receive the benefits of the system. Properties that are rented to extended family members were assessed on a case by case basis.
Information included an outline of the family relationship between landlord and tenant; evidence of a current rental agreement (already provided); evidence of rental payments where the rent is in-line with current market rates.
Were properties that belong to a Body Corporate included in Stage 1?
No. Properties that are part of a Body Corporate (i.e. Strata Corporations under the Strata Titles Act 1988, Community Corporations under the Community Titles Act 1996 or Housing Cooperatives under the South Australian Co-operative and Community Housing Act 1991) were not progressed through Stage 1 of Solar Savers Adelaide. This is due to the potential complexity of the property and energy arrangements.
Were Housing Trust properties eligible?
Housing Trust properties are not eligible the under Solar Savers Adelaide Program. A separate solar scheme is being implemented with eligible Housing Trust properties by Renewal SA. For further information, please contact Housing SA on 131 299.
What is a serviced apartment?
A serviced apartment is a non-residential furnished apartment available for both short-term and long-term stays. These are often inclusive of utility bills. Serviced apartments, as well as holiday rentals and Air B&B properties, will not be included in Solar Savers Adelaide.
Did the program include expansion or replacement of a solar system?
This was not eligible under the Solar Savers Adelaide Program. Rebates of up to $1,000 are available under the City of Adelaide's Sustainability Incentive Scheme for adding various hot water systems (including solar) to a property.
Who will have access to the eligibility information I provide?
Are businesses eligible for Solar Savers Adelaide?
No – business can access support for solar PV installation from City of Adelaide’s Sustainability Incentives Scheme.
If my business is attached to a house, will they both receive the solar generated electricity?
Can I just buy solar panels outright?
Properties in the City of Adelaide local government areas can to access the City of Adelaide's Sustainability Incentives Scheme. This Scheme provides rebates for property owners and tenants to encourage energy reduction, including a rebate for households installing solar panels. For landlords and concession-card holders we provide a rebate of up to half of the total cost (up to $1000 for systems under 10 KW) (or 20% of the total cost if without concession).
How were heritage buildings treated?
Suitability of properties for solar panel installation was determined on a case-by-case basis. Council waives development fees for installing solar panels.
When were the public meetings held?
Two public meetings were held in May 2017 to outline the Solar Savers Adelaide Program and invite feedback on the declaration of the separate rate. This was an opportunity to engage with Council and Cool or Cosy, in order to ask any questions. The details of the public meetings held are:
What happened at the pre-installation site visit?
In April and May 2017, Cool or Cosy undertook pre-installation site visits to assess the suitability of eligible properties for a solar PV energy system and to provide a property-specific quotation. Cool or Cosy also asked some questions about the household energy consumption and requested to see a copy of an electricity bill.
What information was provided after the pre-installation site visit?
A quotation pack was provided within 2 weeks of the pre-installation site visit. The quotation pack was reviewed by Council prior to Cool or Cosy sending it to the property owner; and outlined:
The quotation was non-binding. Once a property owner decided that they would like to go ahead, a Property Owner Agreement was signed between the property owner, Cool or Cosy and Council.
What solar PV energy system components were installed?
Tindo Solar Karra 265 PV module (made in South Australia)
Choice of two different inverter options:
Clenergy Australia PV-ez Rack mounting systems
What is Solar Analytics?
Solar Analytics is an energy monitoring system that provides real time information on:
Household electricity consumption,
Your solar energy system's performance,
Net electricity bought and sold
How much energy your system should be generating vs actual energy generated on any given day
Alerts and faults diagnostics
Click here for more information about Solar Analytics.
What is the benefit of an energy monitoring system?
Energy monitoring systems allow you to measure how you use energy in your home and to identify ways in which you could use energy more efficiently. This may help you to reduce your energy bills and your carbon footprint.
What is the difference between a micro and string inverter/s?
Inverters convert Direct Current (DC) generated by solar panels to Alternating Current (AC) that can be used throughout your home. String inverters operate with a number of panels all connected together that run through one inverter for that panel array. Micro inverters on the other hand have one inverter per panel.
Micro-inverters can be beneficial in installations where shading may be an issue or where there are multiple aspects and pitches for the panels to be installed, as the performance of each panel is not affected by other panels. The Solar Savers Adelaide Program offered both a string-inverter and micro-inverter option as part of the quotation.
Is Battery storage included in Stage 1 of the Program?
No, battery storage systems will not be included in Stage 1 of the Solar Savers Adelaide Program. Cool or Cosy will be able to explain how battery storage systems can be added in the future if you wish to procure one separately.
If you are interested in battery storage, instead of Solar Savers Adelaide, you might be better taking advantage of the City of Adelaide Sustainability Incentive Scheme, where the Council provides a rebate of 50% of the total battery installation cost up to $5,000.
Will the inverters be battery-ready?
Please note that this question is subject to interpretation, and each company is likely to have its own interpretation based on the functionality of the inverter model.
Inverters installed as part of the solar PV energy system convert direct current (DC) from the solar panels to alternating current (AC), which is used in a home. In a battery storage system that stores grid and/or solar power, the inverter needs to be able to route DC power into the battery for charging, and to convert AC power to DC power. Most solar inverters are not built to do this, however they can be AC coupled with a battery control system later on, which allows for this functionality. A hybrid inverter is an inverter that does all this in one go. If you intend to install a battery storage system straight away, a more expensive hybrid inverter may make sense.
However, if you are only considering installing a battery storage system in the future, it may make sense to wait until you are ready to purchase a battery, as technology and future compatibility may change over the years. You may also need to consider increasing the number of solar PV panels in your solar PV energy system, as the leftover electricity generation from a 2kW system is not likely to warrant the cost of a battery system. The two different inverter options (and your roof configuration) then become important.
If you have a string inverter, which is suited to match a certain capacity (i.e. 2.5kW maximum), and you increase the number of solar panels, you may need to upgrade your inverter when you buy a battery system.
If you have micro-inverters, which are individual inverters per panel, then each time you buy a new panel you are increasing the capacity of the overall inverters.
An energy monitoring system (such as Solar Analytics) will help you to determine battery and storage requirements in the future. For any questions about battery ready systems and to understand the implications for your property, please speak to Cool or Cosy.
Where can I get more information on feed-in tariffs?
As of 1 January 2017, Essential Services Commission of South Australia (ESCOSA) has not set a minimum retailer feed in tariff. Retailers can now determine what they will pay for electricity fed back to the grid and it will vary between retailers and between energy plans.
Websites such as www.energymadeeasy.gov.au allow you to compare energy retailer plans for customers with solar PV systems; we recommend that you research several retailers to find the best plan to suit you.
For more information on feed in tariffs please visit http://www.escosa.sa.gov.au/consumers/energy/solar-feed-in-tariff-scheme(External link).
For rental properties - will landlords be able to increase rent to recoup the costs of the solar panels?
There are certain protections available to tenants under the Residential Tenancies Act 1995 that affect whether statutory charges, such as Council rates, can be passed on to tenants. Decisions about the cost of rent payable by a tenant are ultimately matters between the landlord and tenant that must be dealt with in accordance with the terms of individual leases and that Act. | <urn:uuid:2a8d097a-65cc-4382-9463-4dcdd9ecb457> | CC-MAIN-2022-33 | https://yoursay.cityofadelaide.com.au/solarsavers/widgets/228000/faqs | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.946627 | 3,977 | 1.851563 | 2 |
Head Smacker: Can’t Afford Child Care? You’re Less Likely to Have Paid Leave
63 percent of children in the U.S. live in families where all parents work. But the lower the family’s income, the less likely the parent’s employer is to provide any form of paid leave.
The U.S. Council of Economic Advisors (CEA) released a new report, The Economics of Paid and Unpaid Leave, as background for the June 23 White House Summit on Working Families. It found that only half of workers in the bottom quarter for weekly earnings (up to $540 a week) had any form of paid leave, while 83 percent of those in the top quarter (with earnings of $1,230 and up) had paid leave. The CEA report also shows that only 35 percent of workers 25 and older who haven’t finished high school have access to paid leave, while 72 percent of 4-year college graduates have such access.
It’s a pretty safe bet that the lowest income working parents have the toughest time affording child care. The National Women’s Law Center tells us that one in five working mothers with very young children is in a low-income job, and one-third of these is poor. And yet they are the ones who are most likely to have to give up pay, or risk losing their job, to stay home with a sick child.
According to a new report from the Center for Economic and Policy Research, more than 2.5 million employees cannot afford to take leave to care for themselves or a family member with an illness, during pregnancy, or to bond with a new child. About 30 percent of private-sector employees taking unpaid leave incur debt as result of their leave.
Even though most children live with working parents, and at least 13 million are in families with income low enough to be eligible for federal child care subsidies, only 2.5 million received child care assistance in 2009, about one in six. And according to the President’s FY 2015 budget proposal, the number of children receiving subsidized child care had plummeted to 2.1 million in 2013.
So during the post-recession period, when wages were stagnating or falling for those at the bottom, and unemployment remained high, employers more often than not did not provide paid leave. At the same time, federal funding for affordable child care did not keep up with need, and so 400,000 fewer children were served.
Roughly 180 other countries provide paid leave for new mothers, and roughly 80 provide paid leave for new fathers. Nearly 165 countries guarantee paid sick days. The U.S., one of the wealthiest nations in the world, guarantees none of these.
Parents of young children hold the key to our future. They shoulder many burdens to ensure that their children get what they need. And yet the federal government and a great many employers force low-income parents to risk loss of income or employment in order to provide the care their children need. That’s a head smacker. | <urn:uuid:23dda227-d2e1-4aed-9b09-2c8f42dd18bc> | CC-MAIN-2022-33 | https://www.chn.org/voices/head-smacker-cant-afford-child-care-youre-less-likely-paid-leave/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.974008 | 632 | 2.078125 | 2 |
Package of the C Algorithms library by Simon Howard
The C programming language includes a very limited standard library in comparison to other modern programming languages. This is a collection of common Computer Science algorithms which may be used in C projects.
The code is licensed under the ISC license (a simplified version of the BSD license that is functionally identical). As such, it may legitimately be reused in any project, whether Proprietary or Open Source.
Copyright (c) 2005-2008, Simon Howard
Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | <urn:uuid:cad065cb-eb78-4828-8d02-ede40412e4a8> | CC-MAIN-2022-33 | https://freesoft.dev/program/3800803 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.746881 | 291 | 1.5 | 2 |
TDD - Test Driven Development is a software development approach in which test cases are developed to specify and validate what the code will do. In TDD the tests are not done at the end of the software development, the tests are done before writing any production code.
- Is your code difficult to test?
- Don't you know if you have 100% test coverage on the project?
- Are you afraid to make changes to the project because you don't know where it will go wrong?
TDD solves these and other problems because with the laws of tdd every single line of code that you write will be tested.
1.You are not allowed to write any production code until you have first written a failing unit test;
2.You are not allowed to write more of a unit test than is sufficient to fail and not compiling is failing;
3.You are not allowed to write more production code that is sufficient to pass currently failing unit test.
You begin by writing a small portion of unit test. But within a few seconds you must mention the name of some class or function you have not written yet, thus causing the unit test to fail to complete. So you must write production code that makes the test compile. But you cant write any more code than that, so you start writing more unit test code.
Round and round the cycle you go. Adding a bit to the test code. Adding a bit to the production code. The two code streams grow simultaneously into complementary components. The tests fit the production code like an antibody fits an antigen.
TDD allows us to be more productive since the project only grows “if I can say so” after all the tests have passed.
Once the TDD is embraced it will be a step towards the Clean Code.
In the TDD scenario developers need to be very disciplined because sometimes when the calendar starts to get tight some tests may start to be ignored and if you haven't tested the code how will you know there is a hidden bug ?. | <urn:uuid:775ddcdc-698f-4c9a-be29-e5b553ad44c0> | CC-MAIN-2022-33 | https://dev.to/bacarpereira/the-laws-of-tdd-1p1c | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.926123 | 422 | 3.328125 | 3 |
Tax Lien Lawyers in Delano
In Delano, Minnesota, a "lien" is a type of property right, which is created by a court to obtain payment of a lawful debt. Usually, a valid lien gives its holder the right to seize the property subject to it, or at least some of the property's equity, to satisfy the debt. If the owner sells a piece of property that's subject to a lien, the creditor who owns the lien may be entitled to the proceeds, up to the amount you owe them. It can additionally put them "first in line" compared to other creditors, if the debtor files for bankruptcy.
A tax lien, then, is simply a lien that is created for the specific purpose of collecting taxes from a delinquent tax payer in Delano, Minnesota.
However, a tax lien in Delano, Minnesota will be ineffective if the debtor doesn't own any valuable property to encumber with a lien. As with any debt, the creditor can't collect if the debtor doesn't have any assets. However, a tax lien can be applied to property that the taxpayer acquires after the lien goes into effect.
Tax Lien Procedure in Delano, Minnesota
In Delano, Minnesota, the process for creating a tax lien is fairly uncomplicated. First, the tax authorities determine that a taxpayer truly owes taxes that they haven't paid (that they're delinquent in their taxes).
Then, the IRS, or state tax authorities, send a "notice and demand," informing the taxpayer that they owe back taxes, and that they are required to pay their taxes within 10 days.
If the deadline passes without payment, most tax liens in Minnesota take effect automatically, giving the tax collectors all of the rights in your property that any other lien holder would have.
However, there are limits to how and when a tax lien can be enforced, at least under federal law. The IRS has 10 years to enforce a tax lien in Delano, Minnesota or anywhere else in the U.S. If it never bothers to take action to seize property that's subject to a tax lien, the lien simply ceases to exist after 10 years. This rule is in place to ensure that the government does not sit on its rights, and to prevent potentially-valuable property from being encumbered indefinitely. Basically, it creates a measure of certainty for both parties.
How Can a Delano, Minnesota Tax Lien Lawyer Help?
If you are notified by the government that you owe back taxes in Minnesota, and that they are going to pursue a tax lien to collect their money, things can get very intricate, quite quickly.
Accordingly, it's important that you contact a tax attorney in Delano, Minnesota to ensure that whatever legal rights you have in this situation are protected. Your attorney will also be able to advise you on how to best deal with the situation. | <urn:uuid:9d565944-6ad7-40c5-a0d2-65011038cfc3> | CC-MAIN-2022-33 | https://taxattorneys.legalmatch.com/MN/Delano/tax-lien-lawyers.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.949992 | 607 | 1.570313 | 2 |
· Day 1: Lefkada → Sivota (Lefkada)
· Day 2: Sivota (Lefkada) → Kioni (Ithaca)
· Day 3: Kioni (Ithaca) → Vathy (Ithaca)
· Day 4: Vathy (Ithaca) → Fiskardo (Kefalonia)
· Day 5: Fiskardo (Kefalonia) → Vasiliki (Lefkada)
· Day 6: Vasiliki (Lefkada) → Kalamos island
· Day 7: Kalamos island → Meganisi island
· Day 8: Meganisi island → Lefkada
*The itinerary can change due to weather conditions and personal preferences
Sivota is one of the most beautiful bays in Lefkada, located 32 km south of the capital town. The settlement lies around a blue crystalline cove amidst verdant hills and lush green forests overlooking the Ionian Sea. The lovely port of the village provides a safe shelter for private yachts and quite close is also the main beach. Today, Sivota is probably the most popular tourist resort in Lefkada. It is fairly quiet during the day and much livelier at night. Sivota hosts some gorgeous beaches with amazing waters and white sand, extremely famous for their breathtaking beauty and the wild background.
The picturesque traditional settlement of Kioni lies in the southeast of Ithaca, 24 km from Vathy, in a verdant setting with unique attractions. It is built amphitheatrically on the slopes of a mountain, with little tiled roofed houses overlooking the picturesque port. The village was built by the inhabitants who used to live in the mountainous village of Anogi, at the end of the 16th century. Very few houses survived the earthquakes of 1953 but the few ones remaining are very interesting, with renaissance architectural characteristics. Today, this little paradise has grown rapidly into a busy and modern tourist resort.
Vathy, the capital of the island, fans out like an amphitheater. It is built in the inmost part of the gulf of the same name and dates back to 1500 AD. Vathy is an attractive settlement with a pronounced Venetian influence, pretty houses with tiled roofs, imposing mansions and picturesque stone-paved alleys. It has, since 1978, been classified by law as a ‘traditional’ settlement. Vathy has been inhabited continuously since the time of the Venetians. It nestles safely in the beautiful natural harbour that has been identified as the Homeric harbour of Phorcys. This is where the sea-god Phorcys had his temple and where the Phaeacians left the sleeping Odysseus.
The approach to Vathy by sea is truly an experience. The narrow neck of the harbour conceals the view of the gulf that suddenly reveals its true beauty. The entrance to this beautiful natural harbour is guarded by the remains of a small fort with two cannons. This stands just above the beach of Loutsa and was built in 1807, during the French occupation of the Ionian Islands. Purified and beautiful, the tiny isle of Lazaretto adorns the entrance to the harbour and is a point of reference for every Ithacan and visitor. Well-kept and well-lit, it hosts choice cultural events. Vathy is the most developed tourist area of the island. The night life moves at a tranquil pace and for this reason, people of all ages coexist and enjoy themselves. It offers good food and entertainment, a pleasant ‘soulatso’ or walk, and friendly people.
Fiscardo village is located north of Argostoli, the capital of Kefalonia. The village is very much based around its waterfront with many private yachts and small fishing boats. This lovely spot offers nice views to the neighbor island of Ithaca. This picturesque fishing village is recognized as a traditional preservable settlement as it is one of the few villages that remained untouched from the major earthquake of 1953.
Today it is known for its cosmopolitan and warm atmosphere. The traditional and Venetian buildings and houses with pretty colors embrace the natural bay offering the village a unique charm while reflecting the rich heritage of Kefalonia. Mostly for its amazing beauty, Fiscardo has become an attractive destination for thousands of visitors every year. Nearby the village one can find many beautiful pebbled beaches and stunning coves with calm and crystalline waters as well as ruins of a Palaeolithic settlement and plenty of Byzantine churches, and many other picturesque and interesting sites. The Natural and Environmental Museum lies above the waterfront and it is worth a visit.
Vassiliki is a picturesque fishing village located southwest of Lefkada Town. It lies around the beautiful bay, a long-pebbled beach famous for its perfect windsurfing and sailing conditions. Water sports facilities and windsurfing clubs renting material are available on the beach. Vasiliki reflects the zest for life. Enjoy the advantage this spoilt sunny spot in the Mediterranean has. Discover what pure nature is about, with its beaches and incredible landscapes. Vasiliki, in the wandering place of the mythical Odysseus.
Island of the Ionian Sea, located Southeast of Lefkada island, between Meganisi on the West Northwest, Kastos on the South Southeast and the coast of Akarnania on the North Northeast. Kalamos is the largest of a fringe of small islands located in the region of Lefkada. The island’s dramatic landscape combines high peaks and steep slopes ending to the coast which are surrounded by the boundless blue of the sea.
The first evidence of human habitation on the island dates back to the Neolithic era. It is certain that Kalamos was inhabited also in the Mycenaean and Classical periods. In the Hellenistic period of Ancient Greece the passage from the Kalamos – Mytikas strait was of particular military importance. The strait was initially monitored through a small stronghold built on the Xylokastro crest and a system of towers built in the surrounding area.
Meganisi is an isle of only three villages and a population of little more than 1,000… but you’ll hardly know where to start. The beaches, mostly reached by foot or boat, compete with each other for other-worldly beauty – Agios Ioannis, Fanari, Spilia, Barbarezou and Limonari… And of its three villages, Katomeri is the biggest, without being in any way busy. Vathi is the perhaps most picturesque, and you’ll be bewitched by the olive and walnut groves around by Spartochori.
Lefkada is one of the most breathtaking Greek islands and it is located in the heart of the Ionian Sea, boasting one of the most wonderful natural landscapes and some of the most scenic beaches. Lefkada Greece (or the “Caribbean of Greece”, as it is also known as) is the absolute dream destination for those who are into exotic islands. The main reason why Lefkada is wildly famous is its beaches!
You might have seen many pictures of the iconic Lefkada beaches, but, trust us, the reality far exceeds any expectations. Sandy and shrine, with mesmerizing turquoise waters, surrounded by wild nature, Lefkada beaches will amaze you! Apart from Lefkada beaches though, Lefkada rewards the visitor with seaside villages, such as Nidri Lefkada and Agios Nikitas Lefkada, natural beauties, such as Dimosari waterfalls, delicious food and a whole heap of exciting activities! | <urn:uuid:eb7c2271-214a-4a2d-8b22-14ef034af696> | CC-MAIN-2022-33 | http://galux-one.com/be-inspired/ionian-itinerary/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.951886 | 1,734 | 1.742188 | 2 |
Soil dispersion is a prerequisite process for the separation of metal oxides from bulk soil when magnetic separation is employed to enhance the efficiency for soil treatment. This study examined the stability of goethite, hematite, birnessite, and manganite in common dispersion solutions. The stability of pH in the oxide suspension decreased in the order carbonate (50 mM Na2CO3) > pyrophosphate (50 mM Na4P 2O7) > simple alkaline (1 mM NaOH) solutions regardless of the oxides. Dissolution of the four oxides was negligible in the carbonate and the simple alkaline solutions. In the pyrophosphate solutions, however, the oxides were subject to ligand-promoted dissolution by pyrophosphate ion. The extent of dissolution was highest for goethite followed by manganite, hematite, and birnessite. Dissolved Fe and Mn concentrations reached 68.3 and 4.1 μM for goethite and manganite suspensions, respectively, in 21 days with 5 mM pyrophosphate. Higher pyrophosphate concentrations (up to 150 mM) did not substantially affect the extent of ligand-promoted dissolution due to the limited surface sites of the oxides. The results of this study suggest that the carbonate solution would be more desirable than the simple alkaline or the pyrophosphate solution for soil dispersion in the presence of common Fe or Mn oxides.
Bibliographical noteFunding Information:
Acknowledgments This work was supported by the Korean Research Foundation Grant funded by the Korean Government (KRF-2007-331-C00231). Support was also provided to JGK by a GAIA project from the Ministry of Environment of the Korean Government.
All Science Journal Classification (ASJC) codes
- Environmental Engineering
- Environmental Chemistry
- Ecological Modelling
- Water Science and Technology | <urn:uuid:40d6e70c-0b55-4baa-8cc4-6b1defef651a> | CC-MAIN-2022-33 | https://yonsei.pure.elsevier.com/en/publications/stability-of-fe-and-mn-oxyhydroxides-in-common-soil-dispersion-so | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.90843 | 402 | 2.4375 | 2 |
In 1641, the first law in the nation to protect animals was included in our “Body of Liberties.” Today, Massachusetts is consistently at the top of rankings that compare the strength of state animal protection laws.
With the passage of the PAWS (Protect Animal Welfare and Safety) bill in 2014, the Massachusetts Bar Association was named to a task force to complete a systematic review of the laws pertaining to animal cruelty and protection. PAWS gained momentum in the Legislature after officers responded to a cruelty complaint where a puppy — who became known as “Puppy Doe” — was systematically and severely tortured over several months. In addition to the creation of the task force, PAWS increased penalties for animal cruelty and required veterinarians to report suspected animal cruelty.
Chaired by the MBA representative, Elissa Flynn-Poppey, the PAWS task force met over 18 months to create a 118-page report with recommendations that became the foundation of the next PAWS bill, PAWS II, which passed in 2018. This legislation did many things: it prohibited the drowning of animals, added animal crimes to the list of offenses that serve as the basis for a request for a determination of detention and/or release upon conditions in M.G.L. ch. 276 § 58A, ensured that property owners check vacant properties for the presence of abandoned animals, and prohibited the promotion or facilitation of an act involving sexual contact with an animal and forcing a child to engage in sexual contact with an animal.
Two parts of PAWS II created initiatives that are ongoing. The first relates to insurance and dog bites. Starting in January 2019, companies that provide homeowners and renters insurance must provide detailed information on dog bite claims to better understand factors that contribute to dog bites. Insurers have traditionally captured little data on these, with the exception being perceived breed, which has resulted in policy decisions that limit the ability of families to adopt dogs and obtain housing and insurance. This information can also assist with dog bite prevention efforts. The first year of data should be available soon.
Another PAWS II section that created further action relates to facilitating “cross-reporting” — the reporting of abuse and neglect between human service and animal protection agencies. PAWS II allowed animal cruelty to be reported (and removes liability for doing so) by Department of Elder Affairs investigators and Disabled Persons Protection Commission investigators (the Department of Children and Families has had this ability since 2004). Animal control officers were also made mandatory reporters of child abuse, elder abuse, and abuse against disabled persons. Further discussion of mandated reporting issues was left to another commission, led by legislators with more than 18 designated participants. The group has met since the end of 2018 and is in the process of developing a report with guidance on how to move forward to protect both vulnerable animals and people.
Other notable advances for animals include the passage of Question 3 in 2016, a measure that ensures that egg-laying hens, female breeding pigs, and veal calves are not kept in cages where they can’t turn around or extend their limbs. The measure also requires that products from these animals (whole eggs and whole uncooked cuts of pork or veal) sold in Massachusetts are compliant with these standards. The law takes effect in 2022.
A statute protecting animals in cars during extreme weather has elevated this issue in recent years and is timely at publication. The 2016 law gives first responders the ability to remove animals kept in vehicles in a manner reasonably expected to threaten the health of the animal due to extreme heat or cold. This bill also allows the public to remove an animal when in immediate danger in a vehicle and no other options exist.
There are many animal protection bills pending in the Legislature. With the recent decision to extend formal sessions beyond July 31 due to COVID-19, as well as the need to finalize key measures in conference committees, there may still be an opportunity for an animal bill to pass in 2020. Among animal-related legislation that could still advance are bills to ban the use of wild animals in traveling animal acts, allowing animal control officers to issue civil citations when animals are kept in certain cruel conditions, and reducing wildlife poaching in our state. Additionally, legislative initiatives would help the state’s Massachusetts Animal Fund, which provides health services to animals when their families can’t afford it. This will become even more essential given the hardships created or exacerbated by the current pandemic.
For those interested in these issues and others relating to how the law protects (or doesn’t) animals, please join the MBA’s Animal Law Practice Group (ALPG) within the Civil Litigation Section. This practice group was formed to provide a forum for education and the open exchange of ideas and experiences about legal issues concerning the treatment of all animals, the protection offered to animals, and the rights and responsibilities of people who have an interest in animals. The ALPG was formed in response to a growing number of cases and statutes, and increasing public and practical interest. There are 167 law schools in the U.S. and Canada that offer animal law courses and dozens of state and regional bar associations with sections similar to ours, including the American Bar Association’s Animal Law Committee. The ALPG holds meetings to discuss developing areas of animal law. Past topics have included dangerous dog hearings and dog bite liability, advances in legal policy to promote alternatives to animals in research and testing, the Animal Welfare Act and enforcement, careers in animal law and more.
To join the Animal Law Practice Group, email Heather Robertson at email@example.com
Kara Holmquist is the director of advocacy for the Massachusetts Society for
the Prevention of Cruelty to Animals. Contact Holmquist at firstname.lastname@example.org. | <urn:uuid:c186b3cc-db9d-418f-b8ef-c53f9cb6c299> | CC-MAIN-2022-33 | https://www.massbar.org/publications/section-review/section-review-article/section-review-2020-july-august-2020/animal-law-update | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.954716 | 1,180 | 2.25 | 2 |
Online course: Introduction to the Commission on Independent Schools 20|20 Standards
Individuals who wish to participate in the virtual workshops (not required for the Strategic Planning Workshops) are asked to complete the online course: Introduction to the Commission on Independent Schools 20/20 Standards prior to attending a workshop. Please note you may register for the workshop before completing the course.
Course format: asynchronous
Course length: ~1 hour
Course description and registration
Introduction to the Commission on Independent Schools 20|20 Standards
This self-paced online course introduces participants to the principles and practices of NEASC Accreditation. Mission-based, peer-reviewed accreditation depends on accreditors both understanding the intent of the Standards and applying that understanding to school realities. The surest measure of effective NEASC Accreditation is the understanding, skills, and confidence you bring to the process as either a Visiting Committee member or a Self-Study Steering Committee member.
This course will help you “think like an accreditor” as you evaluate the programs, practices, and approaches at your own school. The perspective you gain through this exercise will build a foundation for the workshop following this course. In this course, you will learn more on the following topics:
- What is the New England Association of Schools and Colleges, Commission on Independent Schools?
- Guide to the 20|20 Standards
- Foundation Standards and Indicators
- Program Standards and Indicators
- Guide to Assessing the Standards
The course consists of five sections, which you can work through at your own pace. We appreciate your completion of the survey which appears at the end of the course. As you proceed through the course, please make note of which sections and/or Reflective Questions are most or least helpful to you. The more specific your feedback, the more helpful to us as we fine tune this course. | <urn:uuid:298c9867-d740-4c83-bf0e-dc461ce6edad> | CC-MAIN-2022-33 | https://cis.neasc.org/events | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.91795 | 381 | 2.234375 | 2 |
‘This is a timed exhibition that will take between 25 to 40 minutes to experience’, the museum staffer explains to our group of no more than 20 visitors as we wait eagerly to be ushered into the exhibition, Tyama (pronounced Chah-muh): A deeper sense of knowing, currently showing at the Museum of Victoria.
Developed by Museums Victoria specifically for the Melbourne Museum, Tyama, is the indigenous word for ‘knowing’ and explores the world around us through a First People’s lens; the exhibition combining Indigenous wisdom and ways of knowing and embodying the natural world with Western notions of science and pedagogy. The result, an immersive, sensory experience unlike anything the museum has yet attempted.
We enter a small, cave-like room. It is dark except for the bright flowing light of concentric circles around which we gather while children run joyously to the circle’s epicentre, momentarily alight, little beacons of hope for a future generation and our planet. A recorded voice that draws from the oral story-telling tradition, explains the focus of the exhibition.
Consisting of six carefully created environments designed to respond to our movements and sounds, we suddenly find ourselves characters in a recreation of the natural world unfolding around us: the three protagonists in this play of life, the moth, bat and the fish introducing us to an experience of those imperceptible processes, not picked up by the human senses, but occurring in nature constantly.
Immersive animation and sound environments developed using artificial intelligence (AI) recreate the natural world, allowing us to follow the UV light, like a moth in search of the nectar on which it feeds or experience sound like the bat when we clap our hands and see waves ripple across walls; the echolocation on which this animal relies to navigate its way around.
We join a school of fish through the movement of our bodies and gain some understanding of the importance of this spatial sensitivity as a means of reproduction and survival.
Discreetly dotted throughout the exhibition are small alcoves housing creatures from the museum collection accompanied by minimal text labels with interesting snippets of information related to the protagonist of focus.
Past a spiralling kelp forest, we enter into the final act of this play; a larger space housing a 27 metre-long screen which wraps itself around the walls, capturing the song lines of the southern right whale. Accompanying the imagery is a looped audio recording narrated by Yaraan Bundle, member of the Gunditjmara and Yuin Nations, who brings to life the creation story of this amazing animal. It’s a good place to finish.
Beyond this point, a reflective passageway leads us to a small space of interpretive material and objects, supporting and extending the visitor experience. The participant is also able to gain more information on the exhibition content through the use of a QR code. A map on the museum website Tyama Adventure Trail, allows people to expand further on their experience and discover related animals, objects and themes across the museum that have been explored in the exhibition.
Although creators of the exhibition have clearly been mindful of inclusivity, this exhibition may not be suitable for all visitors such as those with photosensitivity. Visitors with wheelchairs and prams may also find some limitations to their experience. Multilingual guides are available.
A mindfully developed exhibition that artfully combines the aims of contemporary museums as places of learning through enquiry-based pedagogy and multi-sensory experiences as well as places of entertainment.
Tyama will be on display until 29 January 2023 | <urn:uuid:7a05b447-a07d-429f-9a0d-c5e16b51caf2> | CC-MAIN-2022-33 | https://www.artshub.com.au/news/reviews/exhibition-review-tyama-2569079/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.943696 | 759 | 2.703125 | 3 |
If not for this master’s program I may not have ever had the epistemological language to describe my teaching philosophy or experience with learners. Though I digested many edubooks on pedagogy, I can remember none that mentioned a learning theory behind their guidance, nor spent time outlining frameworks of epistemology that could move an educator forward in thinking. Likewise, there have been no discussions of epistemology in the multitude of professional development sessions or staff meetings I have attended. In the readings and discussions on learning theory in my coursework I have come to see that constructivism (arguably social constructivism) most closely resembles my experiences in the classroom and what I try to achieve as an educator – I attempt to create an environment that gives students control in their learning with opportunity to discuss and collaborate in order to actively construct that learning. This involves opportunities for dialogue, experiential learning, group work and reflection. And as my school moved to “BYOD” in 2017 (each student is required to have a laptop or comparable device with them for all courses), a mandate to make use of said technology led to a push to both digitize course content and to create a technology-infused constructivist environment for our learners.
In The World Is Open: How Web Technology Is Revolutionizing Education, Curtis Bonk (2009) mentions that current trends in technological incorporation in the classroom open learners to an ever enlarging and ubiquitous “Web of Learning” (p.29) that demands “instructional approaches that are more active and engaging and in which learners have greater control over their own learning.” (p.33) From my attempts to create a constructivist learning environment utilizing this Web of Learning and my recent research into the parameters that make such a setting successful, I have found that giving students greater control of their learning – either blended, fully online (as with our current remote learning setting), or in f2f settings – requires strong self-regulated learning (SRL) skills. While there are various models of SRL, there is agreement among models that the process is recursive and generally involves goal setting and planning, performance, and reflection. SRL skills are vital for students in making sense of content and not every student that is being thrust into these emerging digitalized learning environments are equipped to handle it.
In a thorough comparison of the provincial K-12 education trends and issues regarding digital technologies in blended and online learning, Blomgren (2017) references a study from 2009 in stating that “being young does not necessarily equate to adequate competency in the learning use of digital tools” (P.85). This reference moves beyond just general technology skills – something the author notes have historically, and drastically been over-estimated to exist among the current student population – and includes those SRL skills that make independent learning in a digitalized environment possible. Unlike BC, which has recently undergone an arguably radical curriculum redesign that incorporates, at least implicitly, aspects of both constructivism and SRL skills, Manitoba is stuck with a curriculum document* that is not only badly outdated (when compared against the pace of technological incorporation), but also decidedly cumbersome.
*In this investigation the Grade 9 Science curriculum was used as an example
The bulk of the curriculum (Senior 1 Science, 2000) consists of three interconnected but separate learning outcome lists:
- General Learning Outcomes (GLOs): covering five ideas around scientific literacy
- Specific Learning Outcomes (SLOs):
- Cluster 0: nine categories covering overall skills and attitudes in science
- Clusters 1-4: content-specific learning outcomes
While there is an attempt to show how these three categories of outcomes fit together, a teacher attempting to decipher their curricular obligations is likely to focus their attention on Cluster 1-4, as the document describes only these as the “mandatory component” (p.3.6) of the curriculum. There are 64 uses of the word “technology” in the curriculum, but only in the cursory sense of a connection between the fields of technology and science, and never as explicit instruction for its use. Additionally, the background information contains no mention of learning theory or epistemological label to guide the reader. If you are looking for it, there is vague connection to both constructivism and SRL skills as it notes the goal that “students must increasingly become engaged in the planning, development, and evaluation of their own learning experiences.” (p.1.3)
To muddle the situation, in an entirely different location than the curriculum, there exists a lesser known and equally important website called Literacy with ICT (LwICT), which exists as “A Model for 21st Century Learning from K-12.” (Literacy with ICT, n.d.) The site contains a continuum document and information, laid out over several linking pages, that suggests it is an ancillary or accompanying framework to overlay (or perhaps underlay) the instruction of the curricula. This website is meant to encourage and outline the infusion of technology into student learning to support critical thinking, creativity, and reflection. Interestingly, under the Supporting Principles section of the site, there is explicit mention of constructivist learning as a foundation to the continuum, and the site contains many references to SRL skills like “plan,” “produce” and “reflect.”
It is not enough to have curriculum make implicit connection to technology use or SRL skills and their requirement for deep learning. Ewijk & Werf, in a 2012 study of teacher beliefs and behaviour of SRL note that “(a)lthough teachers consider SRL as important, most of them do not integrate strategy instruction into their teaching.” (p. 8) Educators likely lack experience, confidence, or exposure to both the technology and SRL skills necessary to instruct in an increasingly digitized, independent learning environment. And although the provincial intent may be somewhat clear, with the convoluted nature of this website and the curriculum, I cannot blame educators who struggle to create the desired technology-infused constructivist environment. Manitoba desperately needs a new and simplified curriculum that explicitly outlines constructivist principles with technology, and the SRL skills necessary for students to navigate and make meaning from the content independently and/or collaboratively.
Photo by Oliver Hale on UnSplash
Blomgren, C. (2017). Current Trends and Perspectives in the K-12 Canadian Blended and Online Classroom. In N. Ostashewski, J. Howell, & M. Cleveland-Innes (Eds.), Optimizing K-12 Education through Online and Blended Learning. Information Science Reference. DOI: 10.4018/978-1-5225-0507-5
Bonk, C. J. (2009). The World Is Open: How Web Technology Is Revolutionizing Education. Hoboken, UNITED STATES: John Wiley & Sons, Incorporated. Retrieved from http://ebookcentral.proquest.com/lib/uvic/detail.action?docID=448869
Ewijk, C. D., & Werf, G. van der. (2012). What Teachers Think about Self-Regulated Learning: Investigating Teacher Beliefs and Teacher Behavior of Enhancing Students’ Self-Regulation. Education Research International, 2012. https://doi.org/10.1155/2012/741713
Literacy with ICT | A Model for 21st Century Learning. (n.d.). Retrieved July 16, 2020, from https://www.edu.gov.mb.ca/k12/tech/lict/index.html
Senior 1 Science | Manitoba Education. (2000). Retrieved July 17, 2020, from https://www.edu.gov.mb.ca/k12/cur/science/outcomes/s1/index.html | <urn:uuid:4c2527e3-149b-4587-b972-6d2986248311> | CC-MAIN-2022-33 | https://theprairieteacher.opened.ca/a-new-curriculum-for-digitalized-constructivism/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.935874 | 1,628 | 2.296875 | 2 |
Last time in our cartographic exploration of Dragonlance, I published a map of the whole world of Krynn. This time around our focus is on the continent of Ansalon, the principle location for the events in the Dragonlance novels and tabletop gaming materials.
Ansalon is a small continent located in Krynn’s southern hemisphere. It was once a much larger continent, but approximately 351 years before the events of the first Dragonlance novel, Dragons of Autumn Twilight, the gods became incensed by the arrogance of the Kingpriest of Istar and dropped a flaming mountain onto eastern Ansalon, the very heart of the Empire. The resulting explosion tore Ansalon apart, created new seas and causing untold destruction. This event, the Cataclysm, wiped out much of the population and destroyed Istar and weakened its great western rivals, Ergoth and Solamnia. In the wake of the Cataclysm, the gods turned their back on Krynn and would no longer heed the prayers of their faithful.
Unbeknown to the other gods, these events had been engineered by Takhisis, the five-headed dragon goddess, to permit her return to Krynn, which she wished to rule over alone. Over the next three and a half centuries, she carefully built up a power base of worshippers and minions in Ansalon, headed by dozens of chromatic dragons. They in turn seized the central, mountainous Khalkist region and used this as a fortress to recruit armies and strike at surrounding lands. By the autumn of 351 AC the dragonarmies had overrun much of central and eastern Ansalon, and neutralised much of the west through pacts and treaties. In The Dragonlance Chronicles (both the adventures and novels), a band of heroes from the town of Solace in Abanasinia are drawn into the conflict and eventually rally the free nations to make a stand against the invaders and prevent Takhisis’ return to Krynn. During the conflict, the other gods also resume their contact with Krynn and the good-aligned metallic dragons join forces with the free kingdoms. The heroes also recover the “dragonlances,” powerful weapons which neutralised the advantage of the chromatic dragons in battle.
Subsequent Dragonlance novels have explored the history of the world backwards in time for thousands of years and forward for over a hundred, through the Second Cataclysm and the War of Souls.
Ansalon is one of the most heavily-mapped lands in all of fantasy. Maps of the continent accompanied both the Dragonlance adventure modules for the Dungeons & Dragons game system and the Dragonlance Chronicles novel series by Margaret Weis and Tracy Hickman, which both began in 1984. Two hundred novels and many dozens of gaming materials followed until the last new Dragonlance material was published in 2010, mapping the continent in whole or in part.
This map drew on several resources: Karen Wynn Fonstad’s Atlas of the Dragonlance World (1987), the Tales of the Lance boxed set (1992) and Tasslehoff’s Map Pouch: The War of the Lance (2006). Fonstad’s map was the earliest attempt to seriously tackle the geography of Ansalon, that is, make it work as a realistic landscape in its own right (Fonstad had done the same previously for Middle-earth, Pern and Donaldson’s The Land, and would go on to do the same for Forgotten Realms). However, as a relatively early publication it is missing many locations added by later writers.
Tales of the Lance has one of the most gloriously huge and detailed fantasy maps ever seen, to the point where it seems the artist ran out of time. The map is clearly unfinished, with unnamed locations all over the place. However, some feel this adds to the mystique of the map.
Tasslehoff’s Map Pouch was a series of maps released by Sovereign Press (Margaret Weis’s company) when they acquired the licence to published third-party Dragonlance material for the 3rd edition of Dungeons and Dragons, between 2003 and 2010. The map series featured maps of Ansalon during all three of its main eras of interest: the Age of Might before the Cataclysm; the Age of Mortals after the Second Cataclysm; and the Age of Despair, also the time of the War of the Lance and the most iconic period of Dragonlance history. The War of the Lance map takes the 1992 map and finishes it off, which is great, but the art style is, to be honest, something of an acquired taste. The coastlines are also a great deal less detailed than the Tales of the Lance and Atlas versions.
Thank you for reading The Atlas of Ice and Fire. To help me provide better content, please consider contributing to my Patreon page and other funding methods, which will also get you exclusive content weeks before it goes live on my blogs. | <urn:uuid:4c49abde-dde8-440f-90ab-f1c8de9f6db4> | CC-MAIN-2022-33 | https://atlasoficeandfireblog.wordpress.com/category/margaret-weis/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.95123 | 1,024 | 1.953125 | 2 |
A4 Work Book. Full-colour covers. 88 pages. The System Colour: Red. 370 gms. Word Skills 4 works exactly with Readers 31-40, using same words & spellings. The student writes directly onto the page. The Fitzroy Word Skills work hand in hand with the corresponding level of Readers. Following the same systematic, step-by-step programme, they are the ideal way to ensure retention and understanding of all key concepts covered in the Readers. They form a complete grammar course.
Word Skills Include:
. Reading with Comprehension
· Expanded vocabulary
· Graded Grammar
· English usage
· Written expression
· Educational games & activities
The Word Skills series gradually introduce more English Usage, Punctuation, Parts of Speech, Tenses, Short Essays – and many other Points of Grammar.
For each Reader Level, there are 7-14 work sheets.
Word Skills sheets A and B help revise new sounds and special words.
The C and D sheets develop a range of grammar skills.
Later sheets have puzzles or codes, Comprehension questions, Practical English, Written Expression.
At the higher levels, the Word Skill Books carry the student through more sheets of important grammar.
The final two Word Skills Books, 6A and 6B, have 14 work sheets for each Reader, raising the student to a high standard of knowledge of English. (ISBN: 9781875755769 – When referring to this item please quote our stock ID: 29483) | <urn:uuid:90e428d1-952a-47d2-8e33-f324e0932a46> | CC-MAIN-2022-33 | https://teslbooks.com.au/product/fitzroy-work-skills-4-answer-book/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.819244 | 326 | 3.5 | 4 |
This site is entirely user-supported. See how you can help.
We don't have any photos of this building yet. Why don't you be the first to send us one?
Latitude: 52.5741 / 52°34'26"N
Longitude: -0.3145 / 0°18'52"W
OS Eastings: 514322
OS Northings: 298695
OS Grid: TL143986
Mapcode National: GBR GY8.R8X
Mapcode Global: WHHNJ.4KJH
Plus Code: 9C4XHMFP+J6
Entry Name: Ferry House
Listing Date: 15 December 1955
Source: Historic England
Source ID: 1162821
English Heritage Legacy ID: 49947
Location: Milton Hall, Peterborough, PE6
County: City of Peterborough
Civil Parish: Castor
Traditional County: Northamptonshire
Lieutenancy Area (Ceremonial County): Cambridgeshire
Church of England Parish: Castor with Upton and Stibbington and Water Newton
Church of England Diocese: Peterborough
Tagged with: House
5141 CASTOR MILTON PARK
TL 19 NW 17/154 15.12.55
C17 house. Coursed stone with flush quoins. Steeply pitched Collyweston stone
roof with coped gable ends. Two storeys and attic. Four window range. Three-light
stone mullion windows, first floor casements, ground floor sashes with glazing
bars. Band at floor level. Later stone porch to left with round arch doorway.
Three small gabled dormers. Rusticated ashlar end and ridge chimney stack with
cornices. Sundial on front. At rear a short central gabled short wing with
stone mullion windows on C18 wing and a late C19 wing.
Named after Gunwade Ferry and formerly an Inn.
VCH Vol II page 478.
Listing NGR: TL1432298695
External links are from the relevant listing authority and, where applicable, Wikidata. Wikidata IDs may be related buildings as well as this specific building. If you want to add or update a link, you will need to do so by editing the Wikidata entry.
Other nearby listed buildings | <urn:uuid:90846a17-e018-42b9-b622-e184f7148394> | CC-MAIN-2022-33 | https://britishlistedbuildings.co.uk/101162821-ferry-house-castor | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.872636 | 518 | 1.5 | 2 |
Incompetence, Willful Blindness or the Profit Motive?
The killing of 50 people at two mosques in Christchurch, New Zealand, on March 15th, once again raised mea culpas from executives at Facebook, YouTube and Twitter, among other social-networking companies. They were exposed as having helped facilitate the widespread distribution of videos of the killings.
Facebook livestreamed the gunman’s 17-minute videos and, as The Guardian reported, it kept it online for 6 hours and YouTube for 3 hours after the slaughters; it reported subsequently removing around 1.5 million videos of the killings. The company’s COO, Sheryl Sandberg, said she identified 900 different variations of the Christchurch shooter’s original livestream. The Guardian also reported that some sites posted the attacker’s full 74-page manifesto.
In the wake of mounting criticism about its role sustain on-going promotion of the attacks on the mosques, Facebook’s CEO Mark Zuckerberg published an op ed in The Washington Post on March 30th that spoke to the company’s – and media-tech industries – inability to manage the social-network content that is helping foster white nationalist and separatist militancy culminating in killings.
Showing his desperation in the face of wide-spread criticism, Zuckerberg momentarily changed his long-held free-market, anti-regulation attitude and wrote:
I believe we need a more active role for governments and regulators. By updating the rules for the Internet, we can preserve what’s best about it — the freedom for people to express themselves and for entrepreneurs to build new things — while also protecting society from broader harms.
From what I’ve learned, I believe we need new regulation in four areas: harmful content, election integrity, privacy and data portability.
Floundering as to how to respond to a system out of control, Zuckerberg is throwing ideas at the wall hoping something sticks. He’s calling for the creation of an independent “supreme court” to oversee content and for the global adoption of an EU-like General Data Protection Regulations. On March 27th, the company instituted a ban on “praise, support and representation of white nationalism and separatism on Facebook and Instagram”.
Many were shocked by the mass murders in Christchurchand the ways Facebook and other social-networking sites feasted on the events. Sadly, it will likely not be the last killings that they help facilitate.
Forgotten by the media, one year ago, in April 2018, Zuckerberg appeared before the U.S. Congress in the wake of revelations that 87 million Facebook users had their privacy rights violated. Escorted by his $12 million lobbying team, the aw-shucks billionaire placated the legislators with high-minded odes of tech blather.
“Facebook is an idealistic and optimistic company. For most of our existence, we focused on all the good that connecting people can bring,” Zuckerberg opined. He puffed on,“it’s not enough to just connect people, we have to make sure those connections are positive. It’s not enough to just give people a voice, we have to make sure people aren’t using it to hurt people or spread misinformation.”
Zuckerbergthen admitted that little of significance would happen, saying, “it will take some time to work through all of the changes we need to make, but I’m committed to getting it right.” A year later, he stood in dumb disbelief as the Christchurch horror played out.
But wasn’t this the same Zuckerberg gee-wiz posture eight-months before he appeared in Congress when the riot and killing took place in the wake of the Charlottesville, VA,“Unite the Right” rally in August 2017? Then he wrote, “There is no place for hate in our community.” He then added, “that’s why we’ve always taken down any post that promotes or celebrates hate crimes or acts of terrorism – including what happened in Charlottesville.” Facebook, Twitter, Spotify, Squarespace, PayPal, GoDaddy, YouTube and other online networks claimed that they suspended hundreds of users associated with the far-right.
The Facebook CEO failed to acknowledge that the Southern Poverty Law Center had provided it with a list of hate groups and that, as The Guardian reported, in July 2017 “at least 175 of those links remained active.”
These are but a few of the ever-growing number of questionable incidents that Facebook has been involved in during the last couple of years; they’ve had deeply disturbing consequence that the company has shrugged off. In 2018, the New York Times broke the story that the company had retained aRepublican opposition-research firm, Definers Public Affairs, to discredit activist organizations, notably Color of Change that is part of Freedom From Facebook coalition, and the “liberal” philanthropist George Soros and his Open Society Foundations. Zuckerberg denied any knowledge of the strategy, claiming he“learned about this reading the New York Times yesterday.” And then there is Facebook’s role in promoting “false news” during the 2016 presidential election campaign, Russia-Gate and the Cambridge-Analytic scandal that is still playing out.
Equally troubling, in February 2018, as the Times reported, a 19-year-old man who confessed to the killings at the Marjory Stoneman Douglas High School in Parkland, FL, had two accounts with Instagram, a Facebook subsidiary. Classmates said that the killer’s lockers were filled with images of weaponry as well as the hats and bandannas he liked to wear to school. The killer reportedly wrote that he hated “jews, ni**ers, immigrants,” and talked about killing Mexicans, keeping black people in chains and cutting their necks.
Facebook and the other social-network services are in a peculiarly American position – they are private companies that can freely distribute (almost) any and all content so long as they wish to or so long as they can make money from it. They are not telecom networks, but rather content distribution platforms; they are more like Amazon and Walmart, aggregators of content, than the roadways and parking lots that facilitate transportation. As such, online platforms do not need to comply with (however weak) net-neutrality requirements. Thus, they face little federal regulation, only the oldest art of public shaming.
These companies are governed by the Communications Decency Act (CDA), adopted in 1996, and especially Section 230. It protects online platform operators from defamation lawsuits, from any liability associated with user-generated content. The statute states: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” The Electronic Frontier Foundation (EFF) cautions,“Though there are important exceptions for certain criminal and intellectual property-based claims, CDA 230 creates a broad protection that has allowed innovation and free speech online to flourish.”
In April 2018, Pres. Trump signed an act that revised Sec. 230. It reconciled the Senate’s Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) and the House’s Stop Enabling Sex Traffickers Act (SESTA). It was ostensibly targeted at sex trafficking but is really intended to further criminalize all forms of commercial sex work. The Justice Department conflated trafficking with sex work in its successful effort to close down the website backstage.com
Facebook is in free fall reflecting the fundamental contradictions of postmodern capitalism. It is a private company providing a social service; it is a U.S. company in an increasingly globalized economy; and it is driven to maximize profits.
The Intercept undertook a covert operation that graphically exposed this contraction. It used “white genocide conspiracy theory” as a pre-defined “detailed targeting” criterion and published two articles target 168,000 Facebook users. They were defined as “people who have expressed an interest or like pages related to White genocide conspiracy theory.” It reveals that the paid promotion was approved by Facebook’s advertising wing. It ends reminding readers that “after we contacted the company for comment, Facebook promptly deleted the targeting category, apologized, and said it should have never existed in the first place.”
Incompetence, willful blindness or the profit motive? – take your pick. | <urn:uuid:0e3a3d6b-c719-4d7f-9897-9a0eb117c0e9> | CC-MAIN-2022-33 | https://www.counterpunch.org/2019/04/05/facebooks-follies/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.952428 | 1,769 | 1.585938 | 2 |
- As your gums recede, you will notice that you can now see sections of your teeth that were previously hidden by gum tissue.
- This will cause the teeth that are affected to appear to be longer than they were in the past.
- You may feel a little notch or depression on your tooth where your gums used to meet it, and with time, your tooth roots may become exposed.
- This is a sign that your gums have receded and exposed more of your tooth.
Tooth sensitivity is typically the first indicator of gum recession, however you may also notice that one of your teeth seems longer than usual. In most cases, a notched surface may be located close to the gum line. You should not disregard gum recession as something unimportant. Make an appointment to see your dentist if you notice that your gums are pulling away from your teeth.
How to tell if you have receding gums?
- Here Are Five Warning Signs That Your Gums May Be Receding 1 Particularly Sensitive Tooth It is possible for the gum to recede down the tooth and even for the bony support of the tooth to be destroyed if there is an accumulation of plaque or tartar.
- 2 Tender Gums.
- In its earliest stages, periodontal disease is typically painless, and its symptoms are only mildly noticeable.
- There are 3 Long Teeth.
- 4 Roots That Are Exposed 5 Loose teeth.
What is gum recession and what are the symptoms?
The condition known as gum recession occurs when the gums pull away from the teeth, exposing the tooth roots. This can happen for a number of reasons. The term ″gingival recession″ is also used to refer to this circumstance. It could appear as though your teeth are becoming longer as time goes on. There are many different symptoms associated with gum recession.
Can receding gums cause shooting pain?
The onset of discomfort won’t occur unless the gum recession continues unchecked. At this time, your gums that are retreating will feel as if they are extremely sensitive, and even light brushing will cause them to shoot with agony. It will be easier to notice when you are chewing, because that is when pressure is being applied to your teeth.
How do I know my gums are receding?
Signs and symptoms of gum recession
- Bleeding after brushing or flossing
- Red, swollen gums
- Poor oral hygiene
- A sore spot along the gum line
- Gums that are visibly receding
- Tooth roots that are exposed
- Loose teeth
What does pain from receding gums feel like?
Tooth sensitivity is the initial sign of receding gums and is the one that is most indicative of the condition. When more of your tooth and nerves are exposed, you will experience greater discomfort from sweet, hot, or cold foods or beverages. This pain will increase as more of your tooth is exposed.
Can a receding gum fix itself?
- No is the short and straightforward response.
- It is impossible for gums that have receded due to periodontitis, the most severe type of gum disease, to grow back after they have been injured.
- This means that receding gums cannot be reversed.
- However, despite the fact that gum recession cannot be reversed, there are treatments that can help to prevent the condition from becoming even more severe.
How can I fix my receding gums at home?
Brush your teeth and use dental floss at least twice daily to stave off gum recession and other oral health issues.
- Oil Pulling. Pulling your teeth through oil is a fantastic method for naturally reducing plaque and preventing gingivitis
- Essential Oil of Eucalyptus
- Saltwater Rinse.
- Aloe Vera.
- Peppermint Essential Oil.
- Turmeric Gel.
- Hydrogen Peroxide
How quickly do gums recede?
It may take years for it to develop, and its progression may be so subtle that the individual affected may not even be aware that they are progressively losing tissue that cannot be replaced. It’s possible that the problem of receding gums won’t be detected as such until a tooth or teeth begin to seem longer than usual.
Why are my gums suddenly receding?
Plaque, a thin coating of bacteria and food particles that accumulates on teeth, is the most prevalent source of periodontal disease, the bacterial infection that is the most common cause of gum recession. Periodontal disease is also known as gum disease. The gums become more fragile as a result of gum disease, which in turn leads them to recede.
How can you tell the difference between gum and tooth pain?
You can notice a painful lump that is red and swollen on or on the side of the tooth that is hurting. When you bite down on anything, the tooth could pain more than usual. An adult tooth that has not yet penetrated the gum tissue (impacted tooth). The gums may become inflamed, red, and painful.
Do receding gums stop hurting?
- There is a possibility that you are suffering from receding gums.
- In the event that it is not addressed, gum recession can result in an increase in dental decay, heightened sensitivity, and even the loss of teeth.
- To make matters even worse, once gum recession has taken place, it cannot be undone by any means.
- However, the dentist that you see regularly in Edina might still be of assistance.
Does gum recession hurt?
It is possible that you are suffering from gum recession if you are experiencing symptoms such as discomfort in the gums, swollen gums, or increased tooth sensitivity, particularly along the gum line. This problem with oral health has the potential to develop to other problems in the future, such as increased tooth decay, sensitive teeth, and even the loss of teeth.
Can gums grow back after brushing too hard?
Unfortunately, if you wash your teeth too vigorously, the tissue in your gums will not rejuvenate or grow back. Brushing one’s teeth too roughly can lead to gum recession, which in turn can expose the root of the tooth.
Does mouthwash help receding gums?
Mouthwash should be used constantly. A therapeutic mouthwash can help prevent gum recession and disease, lower the pace at which tartar builds up, cut down on the amount of plaque that builds up on your teeth, and eliminate food particles that become caught between teeth and in other parts of the mouth.
How much does it cost to fix receding gums?
- The cost of treating gum disease can range anywhere from $1,000 to $2,000 or perhaps a lot more, and this number might change depending on which dentist you see.
- This implies that the sooner you seek treatment for the problem, the more money you’ll save in the long run.
- In many instances, you could require a gum tissue graft, the cost of which can range anywhere from $1,600 to $2,000, if not even more.
Can a dentist reverse receding gums?
Regrettably, gum recession cannot be reversed once it has begun. Although the tissue will not regrow, there are specific measures that can be taken to prevent the recession from becoming even more severe. The cause of your gum recession is ultimately the most important factor in determining whether or not your therapy will be successful.
What to avoid with receding gums?
- When your gums recede, the nerves that feed your teeth are exposed.
- This can be rather painful.
- They will become more sensitive as a result, particularly to the sensation of cold food and drink.
- You should avoid cold foods and drinks like ice cream, popsicles, and ice cubes so that you can remain comfortable.
- Pain and discomfort may also be caused by eating fruits and vegetables that have been chilled.
When is it too late for gingivitis?
Gum disease can be avoided, particularly if it is detected in its preliminary stages and treated promptly. It is never too late to seek diagnosis and treatment for gum disease, even for those individuals whose condition has progressed to a more severe stage. | <urn:uuid:740e3f93-e2df-458f-9dcb-7dffacea6d09> | CC-MAIN-2022-33 | https://considercommonsense.com/feelings/what-do-receding-gums-feel-like.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.958484 | 1,734 | 2.921875 | 3 |
“Blind Bulb etc.”: the title of the show is intriguing, perplexing. Perhaps, just as the artist intended. It makes one contemplate the strange juxtaposition of words, wondering what it denotes. Perhaps, just as the artist wished.
Sunil Gawde is the artist. A painter, sculptor, or installation artist—it does not matter what you call him as long as he is acknowledged as an artist. Ever since he can remember, even as a young child of five, he had always wanted to be an artist. Born into a middle-class Indian family in Mumbai in 1960, Gawde was not initially encouraged by his family, particularly his father, to take to art. However, his teachers, recognizing his talents, always supported him. He went on to complete training in fine arts at the prestigious Sir J.J. School of Art in Mumbai.
It was not all smooth sailing. In 1980, just 20 years old, he abruptly left home. Despite being an award-winning student all his life, due to vested interests in the art school, he barely managed to scrape through his final examinations. Utterly dejected, he decided to renounce the world, and with just 80 rupees (less than two dollars) in his pocket and nothing else, he took off on a journey by foot to the shrine of Vithoba at Pandharpur, a major pilgrimage site. Walking alone or sometimes with a group of varkaris (devotees), he spent two months on the road, a time he claims was “truly a revelation. It proved to be the foundation of my life, for I retreated into myself and absorbed the knowledge one gains from being without any attachments.” He met a wise man who told him that he needed to go back because he had not achieved real detachment but had left out of frustration. He was also told that there was a lot left for him to achieve in life. | <urn:uuid:bce1182a-4abd-4c41-b732-e3698f09bfa0> | CC-MAIN-2022-33 | https://sculpturemagazine.art/sunil-gawde-minimal-approach-maximum-impact/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.99159 | 402 | 1.539063 | 2 |
Finding a graphic design firm is the easy part- all you ought to to do is perform a quick search online and bingo, you’re shown pages and pages of them in the search engine results. The hard part is choosing the right web designer rrn your individual project. Every web design project has a specific set of requirements and every freelance web designer has a unique set of skills that may, or may not, be suitable for your requirements. In this article, I’ll list some key factors that could help you feel the right web designer and how you determine if contain the necessary skills to undertake your online development project.
Research the Ecommerce designers Website and Online Portfolio
Every web designer should have a functioning website in addition to an online portfolio for their work. If they don’t, you can scratch them out of the list. After anyone could have found some ecommerce designers in your area, or anywhere else for that matter, you should research each of their websites and away samples of their work. Different ecommerce designers take different means to their work and use a variety of technologies. You should read up on their skills and route to web design, produce sure they suit your requirements. Viewing completed websites and instances of the web designer’s work is also essential to get a good idea of this design style and skills they posses. Make sure the websites function correctly. If some of internet designer’s recent samples are not working, there is a superb chance that, an individual are use them, web page might have changing issues. Look in the design style within their portfolio samples. Most web designers tend to stick to a clear style. If you like the look of their websites, and their website text sounds appealing, you’re onto successful. Take the next thing and call them, or send a task brief through.
Speak to Your chosen Web Designers
Another key point to determine which internet site is best for you, is mastering whether you can communicate with each of them. You will need regrowth your vision to the designer and really should be able react with ideas and suggestions for the project. If you call your designer and there is, for example, a language barrier between you, that could be a problem throughout the development process. Talking any potential web designer also gives that you a good idea if you are going to aboard with them or even otherwise. If you call to speak having your chosen web design company and in order to put on cell phone to a rude or uninterested individual – in my books, that would not be somebody it seems like want to cope with on an ongoing basis. If effectively enthusiastic, keen and communicate well you’re more likely with an a successful ongoing professional relationship.
Qualification and Experience
Qualifications and experience aren’t always essential but they do give you some security that globe designer knows what are usually doing features the skills to undertake your development. It’s really a lot as your judgment whether you want to make use of a web designer with no training but grime know, they might be a youthful gun with tons of talent and also just looking forward to that first project to unleash their skills on to. Whether that suits you your web design company to have qualifications not really is also up you. Qualifications just mean include had some formal recognition of their skills. My preference that i see experience beats qualifications everyday. Your website designer may have undertaken a six month course which has got them a certificate of some type but not make them a good designer. Nevertheless so much information online and the ways to hone your design talents now, that needing somebody to a person is not required.
It s incredibly important the web designer you speak to understands your creative vision. To create a website that truly serves a motive and business goal, the designer want understand kind of individuals who have and relate to your overall vision. Please be aware on your house web designer offers any ideas or suggestions if you are talking for them. This is a fine indication of whether they understand the project and will be enthusiastic relating to this.
Kelowna, BC V1W 5B5, Canada | <urn:uuid:ab944a46-8d41-4377-9271-5472766dbb59> | CC-MAIN-2022-33 | http://elmore.csdcommunity.com/find-right-web-design-company/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.955005 | 860 | 1.5625 | 2 |
10 Key Advantages of Long Term Rehab
Treatment options for drug and alcohol abuse have grown in recent years, but long-term rehab remains one of the best methods and provides a level of care that many other shorter options do not. Often entering a drug rehab facility is what makes the difference between relapse and long-term sobriety.
Some of the shorter options include ‘cold turkey’ withdrawal or outpatient treatments. Neither of these will provide the consistency of physical and psychological support that a long-term option does. Additionally, long-term facilities offer safety and supervision which many addicts need and find reassuring.
Choosing between a bewildering array of options can be overwhelming. Here are 10 good reasons for choosing a long-term rehab facility for yourself or a loved one:
Reason #1 To remove enabling or negative influences
When a client enters a drug rehab facility their communication with the outside world is limited and monitored. This helps to remove any of the negative environmental influences and also isolate them from those who have enabled their drug use. This means that they are not discouraged or undermined in their attempts to achieve sobriety by preventing access to drugs or negative influences. This removal from ones environment is only one of the advantages of long term rehab.
Reason #2 To live in a drug and alcohol-free environment
A long-term rehab facility is a no drug and alcohol zone. The client must live at the facility and, unlike outpatient treatments which allow the individual to go back into the environments that enable them to access drugs or alcohol, clients may only leave on approved or supervised trips. The facility is a safe, supportive place which provides stability and freedom from temptation.
Reason #3 To establish routine and structure
Once a person is dependent on or addicted to drugs they often lose any structure in their life which leads to more likelihood of substance abuse. Within a rehab facility, the clients have full days which are structured to include all their therapies and other activities to help them towards health and sobriety. The aim is to encourage activities that help them stay away from drugs or alcohol and also start to learn coping strategies to stay sober in the long term.
Reason #4 To access 24/7 support
Long term rehab provides staff 24 hours a day so there is always someone on hand to give support when needed. These professionals are there at all times for the benefit of the client, providing help, advice and support at critical moments on the journey to sobriety making relapse less likely. This is yet another one of the advantages of long term rehab.
Reason #5 To receive medical support and supervision
In the early days, many clients experience unpleasant physical or mental withdrawal symptoms, yet with the right medical support the worse symptoms can be alleviated. This benefits the client immeasurably and is also reassuring to family, friends and loved ones who can see that the client’s struggles are being dealt with sympathetically, appropriately and safely.
Reason #6 To facilitate personal growth
Choosing a long-term rehab program gives the client time to focus on themselves away from all the pressures of day-to-day life. This is a good opportunity to look at areas of personal growth and how they can direct energy away from destructive people and activities and towards more productive, positive pastimes to help maintain sobriety long term.
Reason #7 To live in a sober environment with sober peers
This is particularly valuable for young adults who may have related to their peers through drugs and alcohol use. Within a long term rehab facility, they can form relationships with other people who are sharing the experience and working towards their sobriety. This allows them to develop new ways of relating to others and it provides critical support through the harder stages of withdrawal.
Reason #8 To access more therapy options
Long-term rehab and treatment programs offer many experiences, therapeutic interventions and treatment that will benefit the client on all levels. Physical, mental and emotional needs are equally important and utilizing many different types of therapy and treatment can help the clients start to relate what they learn to their own real-world experiences. Many therapies allow clients to develop new interests and take up new hobbies that they can continue when they leave, filling time productively with positive activities that do not involve seeking and using drugs.
Reason #9 To address nutrition problems
Those that abuse substances often neglect their nutrition which can then lead to worsening withdrawal symptoms and poor health. Inpatient rehab looks at the nutritional needs of each client and produces a nutritionally sound diet to support them through their journey to sobriety.
Reason #10 To get help with returning to the real world
Once the client has been assisted to withdraw from drugs or alcohol treatment will help them develop tools to help them stay sober. By participating in treatment the client will have developed mechanisms for avoiding their triggers and staying away from negative influences, they will be able to avoid relapse by putting the healthy lessons and tools in place once they move on from their stay.
If you would like to learn more about treatment for addiction, particularly long-term treatment programs please contact us. At The Last House, we will work with you to give yourself, your child or your loved one the best chance of moving forward to an addiction-free life.
[gravityform id=”3″ title=”true” description=”true”] | <urn:uuid:f8562854-3963-4ec0-9db3-5993c87078db> | CC-MAIN-2022-33 | https://thelasthouse.net/10-key-advantages-long-term-rehab/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.953992 | 1,095 | 1.632813 | 2 |
Emotions play a very big role in investing, but so does logic.
In finance we often hear people say, “buy low, sell high” or “buy cheap stocks and sell expensive stocks”. You cannot fault the logic. It appeals to common sense, it makes intuitive sense and it should be a profitable strategy.
But it is worth pondering how the stock became cheap or how the stock you want to sell became so expensive. Surely if everyone is using the same logic of buying low and selling high, stocks should not get cheap or expensive.
Add to this the academic research that teaches us markets are efficient and incorporate all information that exists about a stock at any given time.
On the basis that markets are efficient, if a stock is cheap there is a very good reason and if a stock is expensive there is also a very good reason. This logic would suggest there is very little chance of outperforming the market. Our academic training tells us that stocks react to fundamental information and track a company’s earnings and cashflows.
However, emotion plays a very important role when investing in the sharemarket. The market consists of thousands of individual investors who are responding daily to the emotions of hope, fear and greed.
Investors collectively swing from optimism to pessimism, back to optimism and back to pessimism again. We refer to these extremes of emotion in the market as “points of maximum optimism” and “points of maximum pessimism”.
These strong emotions can be a contributing factor to a stock becoming cheap or expensive. In extreme circumstances investors are also known to “throw the baby out with the bath water” or just plain panic.
Authors have written countless books on panics and manias, and many more authors have written books predicting these. The irony is that it is very often the process of panic or mania that creates cheap and expensive stocks, or “busts” and “bubbles”.
Capitalising on investing emotions
Every now and then extreme emotion causes a stock to be either cheap or expensive and this can lead to opportunity. This is how we like to think of the term “contrarian”.
The idea of simply buying a stock because it has fallen in price, or in valuation, is not in itself enough to qualify as contrarian. In fact, we strongly discourage investors from buying falling stocks or selling rising ones.
In most cases if you behave in a truly contrarian way and bet against the market it can be extremely dangerous. The idea of a swashbuckling investor buying all the dips and “fighting the market” is a scary one. The investment processes within our funds expressly prohibit us from buying falling stocks or selling rising ones.
Sometimes “group think” or “group emotions” can be so extreme as to create an opportunity where a stock becomes very cheap or very expensive.
In our version of contrarian, we wait for these extreme emotions to take their full effect on a stock price, sending it to either extremely low or extremely high levels. Then, when the stock has finished rising or falling (when the longer-term trend has ended), we commence either buying shares in an undervalued company or selling shares in an overvalued one.
One of the most important points about this process is the irony that it may not be that contrarian at all. It involves a lot of patience and waiting for a share price to finish falling or rising before either buying or selling.
Whenever I hear an investor say they “love” or “hate” a stock, my ears prick up. The words love and hate in relation to stocks is very emotional for what is, in the end, simply the process of buying and selling shares.
Hearing these words, I think if someone loves a stock they are being driven by strong emotions to buy and if they hate a stock they are being driven by strong emotions to sell it. If these investors are being driven by strong emotions to buy and sell shares, this may be causing stocks to become cheap or expensive.
The interplay of emotions causing stocks to become cheap or expensive leads to two very basic, but important rules:
No matter how cheap you may think a stock is, if investor emotion is sending a stock price down you do not buy it. This means you do not buy a stock that is falling in price.
Conversely, no matter how expensive you may think a stock is, if investor sentiment is sending the stock price higher, you do not sell a rising stock, nor do you short-sell one.
Many fortunes have been lost buying falling stocks and short-selling rising ones. This is not a form of contrarian investing we engage in and not a form we would recommend.
What is useful is to think about investment scenarios in a contrarian way. This can lead to opportunities.
For example, is a pizza company justified in trading on a Price Earnings multiple of 64 times? Is an electric car manufacturer worth $64 billion if it has never turned a profit and may never do so?
Are coal stocks only worth three times cashflow or will the world still need coal in the future? Is a fintech company that makes no profit and may never do so, worth $1 billion?
What happens to heavily indebted infrastructure companies when interest rates go up, and are they really a defensive investment under this scenario?
These contrarian thoughts and questions may be in contradiction to the actual share price movements of these companies. However, contrarian thinking could prove useful when the share price trend reverses and investors no longer love or hate a stock.
We believe that contrarian thinking about investment scenarios is an important component of the job description. What is not a part of the description though is buying shares that are falling in price or selling those that are rising in price.
Who are we to say how low a share price will fall or how high a price will go based on emotions?
Written on our office wall are the following two sentences: “Buy stocks that are going up. Sell stocks that are going down.”
The goal is to be contrarian by nature but never to “fight the market”. Nobody is bigger than the market. | <urn:uuid:07a59066-d139-411b-8d85-6cd75538591a> | CC-MAIN-2022-33 | https://www.cadencecapital.com.au/what-it-means-to-be-a-contrarian-investor/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.959106 | 1,292 | 2.21875 | 2 |
Many schools around the world are now more settled into the routine of online teaching or a mix of in-class and online sessions. It is truly amazing how teachers and students have adapted and how they continue to rise to the challenges of teaching and learning through a pandemic.
An online summer school
In the past, I have worked with an organisation called Cambridge Community Arts, who use creativity to help people overcome mental health challenges. In 2020, I decided to volunteer to help them move their teaching online, and joined a project that was being funded by the Arts Councilin their response to Covid-19. The project was to write and deliver an online summer school for people who were shielding or isolated, and at risk of suffering poor mental health. I decided to focus on design development, as this is something that students often struggle with. Often they can generate an idea but then find it difficult to develop it and push it into new directions.
Teaching a practical subject like Art & Design online is challenging, especially with a group of students with very different ideas and abilities. Throughout the online project I had weekly online meetings with other teachers involved in the project, and we shared experiences and frustrations. I made new friends and learnt new skills that I was not expecting when I started out. We helped each other to learn new technology, tested lessons out on each other, and created a valuable support network.
Face-to-face teaching can sometimes be a little passive. For example, students often come into the classroom and the teacher has already organised everything for them. However, with online learning the students have to get more involved and take more responsibility. They may need to set up their equipment and clean and tidy it away at the end of the session.
I spent a lot of time preparing in advance of my online sessions, so that I was well prepared during the live lessons:
- With the help of my teenage son, I set up a YouTube channel and recorded a series of eight 15–20-minute tutorials.
- I used a camera and a microphone, which we already had, and edited the videos in Adobe Premiere. I also used screen recordings and mobile phone recordings, for shorter tutorials.
- At the start of the course, I gave the students a plan that covered eight weeks so they could prepare materials and knew what each lesson would cover. I also sent out a basic materials pack including glue, pencils and different types of paper and collage materials.
- We used Google Classroom and I put the links to the videos in the classroom stream on a timer. I did this a week ahead of the session so the students could watch them in their own time.
I planned to show the video through my laptop and do the task together with the students, but this didn’t work at all as the sound quality through my laptop was not good enough for the students. So instead, I focused my laptop camera on my hands for the demonstration and then afterwards the students could watch the video and do the activity at their own pace.
It re-kindled my love for sketching and drawing and I found working in my own sketchbooks a great way to switch off from the stresses of working and parenting through a pandemic.
During the course, I kept a reflective diary of my teaching, which is something I had done at the start of my teaching career but less so over the years. It felt like I was learning new skills again and keeping a diary helped me to consider what was working, and what could be improved.
Each group is different, and some worked faster than others who needed more time and support. I realised that I needed to include time to catch-up and recap. The students wanted to finish things off properly, so I needed to include this time in the session rather than spending time on talks and demonstrations.
I will be teaching this course again, and here are some of the things I’m going to do differently:
- Use breakout rooms for students to work together and talk through ideas, these can also be great for 1:1 catch ups. Some students need to ask questions and get reassurance. They don’t all have the confidence to speak up in a group or put a message in the chat box.
- Word of the week photography competition or art club theme to engage students at different levels.
- Make more shorter video tutorials, e.g. 2–5 minutes long. Include a video about how to upload and submit work.
- Focus on skills for some sessions: collages of everyday objects, drawing details like ellipses, folds in fabric, hands and faces of family members.
- Include research into artists, techniques or different materials, as projects or a teacher-led session. All the links to artists and websites are in the class stream and the students add things they are interested in.
- Students enjoyed talking to each other in the sessions, and peer feedback is valuable. There are some great collaborative online tools like Padlet, Google Jamboard, Miro and Trello. Responding to feedback demonstrates evaluation and development skills so I am encouraging this in my classroom.
Taking time out and learning something new
After a day of video calls the last thing I want to do is check my emails and have video catch ups, so I’ve been putting my laptop away and going for a walk and taking my sketchbook with me. Living through a pandemic is a challenge, the students and teachers are tired, and now more than ever it is important to do something for our own well-being. My younger son is learning the guitar and it has been so nice to spend time together in the evenings learning a new skill as we juggle working, home schooling and living our lives online.
To do something creative for myself, I signed up to an online painting course and I am really enjoying being taught and learning something new. I have also seen an amazing Zoom Fashion Illustrationclass that I would like to try. There are some wonderful creative opportunities available online.
We have seen some incredible work from the November 2020 exam series candidate entries, where students have just the basics to work with. They don’t need an expensive camera or a lot of equipment, they just need good ideas and to be inspired. Sometimes just drawing or recording the things in their own environment and developing them into something meaningful is enough.
About the author
Rachel Logan has been with Cambridge International as a Product Manager for eight years and before this worked as a teacher and Programme Manager in a busy sixth form in Cambridge. She has been an examiner, author and curriculum writer and has taught Art & Design in a range of formal and community settings for the last 24 years. Rachel also has a YouTube pottery channel. | <urn:uuid:b76aac90-50c5-4167-b8d9-733cb62d085a> | CC-MAIN-2022-33 | https://blog.cambridgeinternational.org/my-positive-experience-of-teaching-art-design-virtually/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.972226 | 1,383 | 2.265625 | 2 |
Good Sex presents sexual ethics in the light of faith. Speaking on behalf of Christianity, Buss describes "love your neighbor as yourself" as the only Christian "rule"; it is a positive rule rather than one that focuses on prohibitions. Since this call is never fulfilled in practice, it is joined by forgiveness for oneself and others. More concrete guidelines need to be aided by "wisdom," which is not specifically Christian. Detailed biblical support is provided at the end. Stipe, a contemporary Pagan, advocates respect for all living things and doing no harm as a minimal ethical guide, leaving positive prescriptions to individual judgment.
Buss and Stipe discuss details of sexual ethics in largely positive terms--what is good to do--but also with a concern for problems that should be avoided. They agree in many practical matters, just as Christians and Pagans did many years ago, before sexual equality became an ideal. They discuss various kinds of sex, including seeing and being seen, touching, masturbation, and penetration; different sexual identities; committed and uncommitted relationships, including the advisability of extended relations; having and raising children; abortion; and sensuous awareness in a spiritual setting. | <urn:uuid:65f1491e-57f0-4bea-959b-e1041f260780> | CC-MAIN-2022-33 | https://wipfandstock.com/9781625641885/good-sex/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.966223 | 237 | 2.015625 | 2 |
Akademisk uenighet i jugoslaviaforskning
MetadataVis full innførsel
This thesis had its primary focus on contemporary literature written on the topic and breakup of Yugoslavia, and the explanations given to explain why Yugoslavia disintegrated. I sought to find out whether or not there is academic consensus regarding the explanatory factors leading up to the disintegration of Yugoslavia. A short summary of Yugoslavia's history from the creation of the state in 1918 to its breakup in 1991 is included in the introduction. The summary provides background information about the organization of the country, and some explanations on how and why, the political sphere allowed the conflict to turn into the breakup of Yugoslavia. I have analyzed a limited selection of Serbian, Croatian and Anglo-Saxon literature. I have divided the authors thematically into a Serbian chapter, a Croatian chapter and an Anglo-Saxon, thus analyzing and comparing the authors based on their individual explanatory factors used to describe Yugoslavia's breakup. The selection of the literature and dividing them into national spheres, is due to my initial hypothesis that national will have an impact on the academic consensus. Upon reaching my conclusion, I've discussed and compared the authors thematically by national spheres. What I found was a huge diversity within the research field concerning the disintegration of Yugoslavia. There diversity in the explanatory factors provided by each author showed that there is no academic consensus upon explaining the Yugoslav breakup. There was also no consensus within authors in the national spheres, thus disapproving my hypothesis and proving that the lack of consensus is do each authors academic occupation and career. This thesis has also shown that the Yugoslav breakup cannot be explained by only one factor, but was due to several phenomenon interacting with each other. | <urn:uuid:1e9d13bb-3c8a-4615-98d2-d3a6b2702bfb> | CC-MAIN-2022-33 | https://bora.uib.no/bora-xmlui/handle/1956/9978 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.949683 | 386 | 2.34375 | 2 |
The Power of Translation Services in Global Marketing
Many businesses do not expand beyond their physical locations due to cultural divisions.
Even in the United States, not all residents speak the same language, and businesses that address these differences are attracting larger customers. While most owners don’t speak more than one or two languages fluently, translation services give them quick and accurate verbiage that appeals to all cultures and backgrounds.
Break the language barrier
When an owner cannot communicate effectively with potential customers, they lose a larger market. Advertising content should be aimed at all audiences and convey the message of the organization.
Consistent interpretations of foreign languages give hope to owners who wish to branch out and establish offices in different countries. When producing content, information should be translated into the viewer’s vernacular when the website loads. Business owners can learn more about translation for marketing by contacting a service provider now.
Easier expansion abroad
Successful marketing campaigns appeal to the needs of the audience. Before setting up overseas ads, companies should research the culture and lifestyle of customers. Verbiage should contain words and phrases appropriate for the products or services offered by the business. Professional translators not only master languages, they are able to have a conversation with others. Ads should introduce the business to the viewer and explain why its products or services are the best choices.
Educate customers in multiple languages
Videos are good at teaching viewers something new and keeping their attention longer. Many organizations use video presentations to show potential customers how to use their products, how articles work, and what results to expect. Correct interpretations of the English media into foreign languages bring the lessons to a globalized market of customers.
Boost your website SEO
Internet users enter keywords and phrases into search engines to find content, information and products. A global market will not only use English to query search engines. While company contact information does not include other languages, external websites and advertisements are not visible to all buyers. SEO is powered by the terms and words that appear on the web. Translation services help businesses interpret all languages and improve visibility and rankings for e-commerce deployments.
Improve customer engagement
Buyers cannot purchase products if they do not understand what to do when visiting the website. The customer’s experience determines whether they return to the company or navigate to another online space. Communication problems lead to negative impressions of a business, its owner and employees. Owners who book translation services show viewers that they are ready for a conversation with all consumers online.
Organizations are entering new markets by taking steps to attract larger customers. When expanding overseas, the owner and workers of the business should connect with customers by speaking their language. Professional translation services convert verbiage into all languages and end cultural divisions.
A trained interpreter creates content and advertising information in the appropriate language for viewers and encourages them to plan services and purchase goods. Workers understand all dialects and avoid using words and phrases that offend visitors or do not convey the company’s message. The services apply to written content and video presentations. By hiring a translator, companies increase their client list and expand rapidly into global markets. | <urn:uuid:1a8092aa-b1e7-4501-9b83-9e0a95160be2> | CC-MAIN-2022-33 | https://laregue.com/the-power-of-translation-services-in-global-marketing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.928596 | 636 | 1.523438 | 2 |
Check out this convenient mini sound level meter from Pyle. It's capable of both A- and C-level weighting for environmental noise measuring, entertainment noise measurement, and other tasks. Max hold function keeps the top level held in memory. Fast and slow time weighting to get the results you need. Works from 0 to 100 dB (low) or 60 to 130 dB (high), at 31.5 Hz to 8 kHz with an accuracy of +/- 1.5 dB. The small shape is easily portable. 9V battery included.
- Max Hold and Data Hold Function
- Auto Power Off
- Level Range: Low - 0-100dB, High - 60-130dB
- Accuracy: +/- 1.5dB (ref. 94dB @ 1kHz)
- Frequency Range: 31.5 Hz to 8 kHz
- Frequency Weighting: A and C Type
- Time Weighting: Fast, Slow
- Operation Temperature: 0 to 40ºC (32 to 104º F)
- Operation Humidity: 10 to 90% RH
- Storage Temperature: -10 to 60º C (14 to 140º F)
- Storage Humidity: 10 to 75% RH
- Battery Type: 9V (Included)
- Dimensions: 9.06'' H x 2.17'' W x 2.17'' D
- Weight: 7.20 oz.
- Sold as: Unit
- Weight: 0.76 lbs. | <urn:uuid:bc68e79e-80ad-4d6c-8edf-418c1a53960a> | CC-MAIN-2022-33 | https://askjan.org/products/Pyle-PSPL25.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00265.warc.gz | en | 0.839183 | 308 | 1.523438 | 2 |
The activity of synsedimentary faults plays an important role in controlling the distribution of sand bodies in basins and furthermore the porosity and permeability of reservoirs. We have used fault interpretation, the method of image and granularity size analysis, and the seismic pumping effect to investigate the control of the activity of the Kongdong fault on the development degree of the dissolution pores and grain size, further studying the controlling mechanism of the activity of synsedimentary faults on reservoir quality. The (...) results showed that the slip rate of synsedimentary faults is one of the main factors in controlling reservoir quality. The slip rate controls the accommodation space and hydrodynamic conditions and it furthermore controls the grain size. The higher the slip rate, the bigger the grain size in the downthrow wall of synsedimentary faults; the seismic pump produced by synsedimentary faults activity also controls the development degree of dissolution pores. The development degree of dissolution pores in the downthrown wall of synsedimentary faults is greater than that in the upthrown wall. Dissolution pores are more developed in areas with a large slip rate of synsedimentary faults. Porosity increases gradually with the increase of plane porosity of dissolution pores, whereas the changes of permeability are not obvious. (shrink)
In order to clarify the main controlling factors of effective reservoirs in sandy braided river delta plain, the 8 member of Xiashihezi Formation in Chengtan3 area, Ordos Basin is taken as an example. We describe and analyze about 600 cores in detail and correspond the cores on the logging curve. We summarize the logging facies mode suitable for the Ct3 area, and finally investigate the types and spatial distribution characteristics of sedimentary microfacies. P2h8 member of Ct3 area in Ordos Basin (...) is braided river delta plain subfacies. Sedimentary microfacies are divided into three types: distributary channel, channel bar and distributary interchannel. The sandbody in the h84 of P2h8 member is the thickest and the number of channel bar is the largest. All gas reservoirs are developed on the sandbody of channel bar, which is the most favorable microfacies type. Poor gas reservoirs are mostly developed in distributary river channel sandbody, while gas-bearing reservoirs are undeveloped in distributary interchannel. According to the hydrodynamic conditions and sedimentary mechanism, the channel bar is divided into the bar head, the bar tail, the bar main body and the bar wing. It is found that 63% of the gas reservoirs in the channel bar are developed in the bar main body, followed by the bar tail. The number of gas reservoirs developed at the bar head and the bar wing is the least. The results showed the most effective reservoirs are developed in the bar main body. Sedimentary microfacies, sandbody thickness and grain size are the main controlling factors for effective reservoirs. The research results can guide the gas field exploration and later well location deployment in the sedimentary environment similar to Ct3 area. (shrink)
Hao Wang was one of the few confidants of the great mathematician and logician Kurt Gödel. _A Logical Journey_ is a continuation of Wang's _Reflections on Gödel_ and also elaborates on discussions contained in _From Mathematics to Philosophy_. A decade in preparation, it contains important and unfamiliar insights into Gödel's views on a wide range of issues, from Platonism and the nature of logic, to minds and machines, the existence of God, and positivism and phenomenology. The impact of (...) Gödel's theorem on twentieth-century thought is on par with that of Einstein's theory of relativity, Heisenberg's uncertainty principle, or Keynesian economics. These previously unpublished intimate and informal conversations, however, bring to light and amplify Gödel's other major contributions to logic and philosophy. They reveal that there is much more in Gödel's philosophy of mathematics than is commonly believed, and more in his philosophy than his philosophy of mathematics. Wang writes that "it is even possible that his quite informal and loosely structured conversations with me, which I am freely using in this book, will turn out to be the fullest existing expression of the diverse components of his inadequately articulated general philosophy." The first two chapters are devoted to Gödel's life and mental development. In the chapters that follow, Wang illustrates the quest for overarching solutions and grand unifications of knowledge and action in Gödel's written speculations on God and an afterlife. He gives the background and a chronological summary of the conversations, considers Gödel's comments on philosophies and philosophers, and his attempt to demonstrate the superiority of the mind's power over brains and machines. Three chapters are tied together by what Wang perceives to be Gödel's governing ideal of philosophy: an exact theory in which mathematics and Newtonian physics serve as a model for philosophy or metaphysics. Finally, in an epilog Wang sketches his own approach to philosophy in contrast to his interpretation of Gödel's outlook. (shrink)
In this first extended treatment of his life and work, Hao Wang, who was in close contact with Godel in his last years, brings out the full subtlety of Godel's ideas and their connection with grand themes in the history of mathematics and ...
This cogent and knowledgeable critique of the tradition of modern analytic philosophy focuses on the work of its central figures -- Russell, Carnap, and Quine -- and finds it wanting. In its place, Hao Wang unfolds his own original view of what philosophy could and should be. The base of any serious philosophy, he contends, should take as its point of departure the actual state of human knowledge. He explains the relation of this new tradition to mathematical logic and (...) reveals the crucial transitions and mistakes in mainstream Anglo-American philosophy that make a new approach so compelling.Equally at home in philosophy and mathematics, Wang is uniquely qualified to take on the task of critically examining modern philosophy. He carefully traces the path of ideas from Russell and Wittgenstein through the Vienna Circle to modern British and American philosophy, and makes use of his familiarity with the profound thought of Kurt Gödel with whom he has had numerous discussions. He also presents the broader significance of Russell's philosophy, provides a comprehensive and unified treatment of Quine's work in logic and in philosophy, and delineates what is common between Carnap and Quine. (shrink)
In (2011) McLeod suggested that the first century Chinese philosopher Wang Chong 王充 may have been a pluralist about truth. In this reply I contest McLeod's interpretation of Wang Chong, and suggest "quasi-pluralism" (albeit more as an alternative to pluralism than as an interpretation of Wang Chong), which combines primitivism about the concept of truth with pluralism about justification.
Within various contexts, such as politics and parenting, Confucianism has been criticized on the basis that it endorses ‘unquestioning obedience’ to authorities. In recent years, several philosophers have argued against this view by appealing to textual evidence from Classical Confucian philosophers. In this essay, I examine Wang Yangming’s views on this subject, arguing that Wang teaches that criticism of those who stand in a socially superior role relation is not only permitted, but encouraged. From this, I consider the (...) implications that Wang’s analysis has for contemporary discussions of disagreement between epistemic superiors and inferiors and epistemic peerhood. I will argue that Wang’s position is much closer to the total evidence view than the preemptive view. Relatedly, I will suggest that Wang provides a novel proposal about how to recognise or disregard epistemic ‘superiors’, especially in the context of moral knowledge. (shrink)
Through a comparative analysis of diverse texts and contexts, this book offers a cultural history of the interplay between the aesthetic and the political in the formation of personal and collective identity that crystallizes into the Chinese aesthetic of the sublime. It describes how various kinds of politics are aestheticized and how aesthetic manifestations are bound up with prevalent ideologies and politics. In this book, politics refers to various projects for fashioning a viable self, a workable personal and collective identity (...) in the crisis-ridden history of modern China. These projects include imagining a political subject adapted to the modern nation-state, mobilizing revolutionary masses as subjects of the Communist state, sustaining a unified self despite the challenges to traditional culture, erecting the sublime figure of the revolutionary hero, and, finally, debunking the grand images of the hero and history in post-Mao culture. Throughout, the author seeks to delineate the ways the political masquerades as aesthetic discourse and aesthetic experience. Covering a wide range of material from fiction, poetry, aesthetics, and political discourse to memoirs, film, and historical documents, the book reconsiders a number of prominent cultural figures, including Wang Guowei, Cai Yuanpei, Lu Xun, Eileen Chang, Mao Zedong, Zhu Guangqian, and Li Zehou. It also analyzes such important cultural features and events as Western influences on the formation of modern Chinese aesthetic discourse, modernist writings, Revolutionary Cinema, the Cultural Revolution, and New Wave Fiction. An East-West comparative approach informs the analysis, which engages in dialogue with Kant, Hegel, Freud, Marx, and Walter Benjamin, as well as Terry Eagleton and other contemporary critics. The author's interdisciplinary method, which emphasizes the interaction among text, context, and the psyche, both presents new materials and illuminates familiar texts and phenomena from the perspective of the political-aesthetic nexus. (shrink)
A fundamental way in which human thought has developed has been constantly to explain the earliest "classics" that are the source of that thought. All in all, the number of such classics is not very high, their explanations are past counting. Moreover, they are constantly increasing, giving rise to an explanatory chain deriving from the classics. In the development of Chinese philosophy, this aspect is particularly noticeable, so that one can describe Chinese philosophy as a continual explanation of the classics. (...) This holds for both Confucianism and Daoism. The main classics of Daoism are the Laozi and the Zhuangzi. These two works have been constantly reread and reinterpreted throughout history. From the late nineteenth century onward, Chinese philosophy came into closer contact with Western philosophy. Foreign concepts were brought in to provide philosophers with new "insight." Some thinkers applied this new insight or these foreign concepts to the Daoist classics. In this way, they brought a new explanation of the Daoist classics and enriched the ways of interpreting the texts.1 Paving the way in this direction were Yan Fu. Zhang Taiyan, Liang Qichao, Wang Guowei, and Hu Shi. (shrink)
A fundamental way in which human thought has developed has been constantly to explain the earliest "classics" that are the source of that thought. All in all, the number of such classics is not very high, their explanations are past counting. Moreover, they are constantly increasing, giving rise to an explanatory chain deriving from the classics. In the development of Chinese philosophy, this aspect is particularly noticeable, so that one can describe Chinese philosophy as a continual explanation of the classics. (...) This holds for both Confucianism and Daoism. The main classics of Daoism are the Laozi and the Zhuangzi. These two works have been constantly reread and reinterpreted throughout history. From the late nineteenth century onward, Chinese philosophy came into closer contact with Western philosophy. Foreign concepts were brought in to provide philosophers with new "insight." Some thinkers applied this new insight or these foreign concepts to the Daoist classics. In this way, they brought a new explanation of the Daoist classics and enriched the ways of interpreting the texts.1 Paving the way in this direction were Yan Fu . Zhang Taiyan , Liang Qichao , Wang Guowei , and Hu Shi. (shrink)
In this paper we analyses the work of the first century Chinese philosopher Wang Chong as in part grappling with epistemology of testimony. Often portrayed as a curmudgeonly skeptic, Wang Chong actually best seen as a demanding piecemeal non-reductionist, which is to say he believed that testimony was a basic source of evidence unless subject to a defeater (non-reductionism), but also that we should evaluate testimony on a claim-by-claim basis (piecemeal) rather than accepting a whole source on the (...) strength of its reputation or authority, and finally he thought one has a strong duty to search for defeaters (demanding). We defend each of these claims as well as the fruitfulness of applying such anachronistic terminology to an ancient thinker. We end with a discussion of how Wang Chong's epistemology relates to his rhetorical method and then consider some problems he faces because of his epistemic commitments. (shrink)
A trenchant defense of hierarchy in different spheres of our lives, from the personal to the political All complex and large-scale societies are organized along certain hierarchies, but the concept of hierarchy has become almost taboo in the modern world. Just Hierarchy contends that this stigma is a mistake. In fact, as Daniel Bell and Wang Pei show, it is neither possible nor advisable to do away with social hierarchies. Drawing their arguments from Chinese thought and culture as well (...) as other philosophies and traditions, Bell and Wang ask which forms of hierarchy are justified and how these can serve morally desirable goals. They look at ways of promoting just forms of hierarchy while minimizing the influence of unjust ones, such as those based on race, sex, or caste. Which hierarchical relations are morally justified and why? Bell and Wang argue that it depends on the nature of the social relation and context. Different hierarchical principles ought to govern different kinds of social relations: what justifies hierarchy among intimates is different from what justifies hierarchy among citizens, countries, humans and animals, and humans and intelligent machines. Morally justified hierarchies can and should govern different spheres of our social lives, though these will be very different from the unjust hierarchies that have governed us in the past. A vigorous, systematic defense of hierarchy in the modern world, Just Hierarchy examines how hierarchical social relations can have a useful purpose, not only in personal domains but also in larger political realms. (shrink)
At the twenty-second World Congress of Philosophy held in Seoul, Korea, from July 29 to August 5, 2008, a panel was convened to debate the ideas for a "democracy with Confucian characteristics'' in Daniel A. Bell's Beyond Liberal Democracy (Princeton: Princeton University Press, 2006). While all participants welcome the attempt to remedy the shortcomings of liberal democracy with Confucian teachings, Fred Dallmayr worries that Bell's political thinking for an East Asian context may "point beyond democracy tout court/' For Sor-hoon Tan, (...) Bell's chapter 6, "Taking Elitism Seriously: Democracy with Confucian Characteristics" may not be so much an alternative to liberalism as it is a challenge to the democratic value of equality that overlooks the dangers of an imperfect meritocracy. Chenyang Li, on the other hand, approaches Bell's proposal of combining a Confucianism-inspired Upper House of Talent and Virtue selected through competitive examinations with a lower house of democratically elected representatives from the concern that it surrenders the Confucian requirement of virtuous leadership. This feature review also concludes with a spirited reply from Daniel Bell. (shrink)
Higher Education as a Field of Study in China concerns higher education as an academic field—the evolving nature of the field in light of the overall development of higher education in China. Xin Wang illustrates how higher education is becoming an interdisciplinary field rather than a subfield under the discipline of education, especially when higher education has become an enterprise with such a broad scope in China.
Dong Zhongshu (Tung Chung-shu) (179-104 B.C.E.) was the first prominent Confucian to integrate yin-yang theory into Confucianism. His constructive effort not only generates a new perspective on yin and yang, it also involves implications beyond its explicit contents. First, Dong changes the natural harmony (he ネᄆ) of yin and yang to an imposed unity (he 合). Second, he identifies yang with human nature (xing) and benevolence (ren), and yin with emotion (qing) and greed (tan). Taken together, these novelties grant a (...) philosophical basis for the theory and practice of gender inequality in their specifically Chinese manifestations. An analysis of Dong's work shows that the merce complementarity of yin and yang does not guarantee gender equality; they are not fixed categories, but together form a transformative dynamic harmony. (shrink) | <urn:uuid:8c9edcb4-6740-4460-aa11-13eca2eaf0e4> | CC-MAIN-2022-33 | https://api.philpapers.org/s/Xixin%20Wang | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.943117 | 3,498 | 2.140625 | 2 |
Big cats are some of the most alluring wildlife in the world, and the most fear-enducing of all wild cats. There are a number of types of big cats ranging across Africa, Asia and Central and South America… but believe it or not, the exact number of big cat species is actually open to debate.
There are, in fact, a number of different ways that people define which of the 38 cat species around the world should be classed as ‘big cats’:
1. The technical view is that the term ‘big cat’ refers only to the five members of the Panthera genus. These are jaguar, leopard, lion, snow leopard, and tiger. However, it’s worth noting that the snow leopard was only included in the Panthera genus in 2008, and there is some controversy amongst biologists about classing them as Panthera, rather than in a separate genus.
2. There is another school of thought that says that big cats are defined by having the ability to roar. Jaguar, leopard, lion, and tiger all have an adapted larynx and a unique part of the throat called a hyoid apparatus which gives them the ability to make a deep, loud roaring sound. The lion has a famously loud road that can be heard up to 10 km away, thanks to having the longest larynx of all types of big cats.
3. Some people take the view that size is all, so include some additional large cats such as cheetah, cougar, and lynx as a type of big cat.
4. Then there are a whole range of different types of big cats that have been bred by humans as hybrid animals (leopon, liger, tigon, and more)… but these have been left out of this list!
With these caveats in mind, let’s explore all big cats in some details:
A jaguar stalks towards the camera
Group name: Shadow.
Size: 0.75 meters high, weighing up to 150 kg.
Speed: 80 km per hour.
Diet: Jaguars are known to almost anything they can catch, including deer, crocodiles, snakes, monkeys, deer, sloths, tapirs, turtles, eggs, frogs and toads, and fish.
Range & Habitat: Jaguars are found in South and Central America, preferring wet lowland habitats, swampy savannas, and tropical rain forests. Their favorite habitat is in the tropical and subtropical forests, though they are now classed as near threatened due to habitat loss.
Best places to see jaguars: Pantanal Brazil – Cuiabá River & Caiman Ecological Reserve, Manú National Park in Peru, Iwokrama Forest in Guyana, Cockscomb Basin Wildlife Sanctuary in Belize, Calakmul Biosphere Reserve in Mexico, Corcovado National Park in Costa Rica.
Leopard lying on a tree branch
Group name: Leap.
Size: 1 meter high, weighing up to 100 kg.
Speed: 56 km per hour.
Diet: Leopards are opportunistic carnivores and hunt a wide range of prey such as jackals, antelopes, gazelles, monkeys, duiker, eland, impala, wildebeest, and more.
Range & Habitat: Leopards live in more places than any other big cat, and are comfortable in almost any habitat, including deserts, rainforests, woodlands, grassland savannas, mountain, scrub, and swamps. Leopards are one of the few big game species found outside national parks.
Best places to see leopards: Londolozi Game Reserve, South Africa, Moremi Game Reserve, Botswana, Samburu National Reserve, Kenya, South Luangwa National Park, Zambia.
A lioness scouting for prey
Group name: Pride.
Size: 1.2 meters, weighing up to 225kg.
Speed: At a maximum speed of 80 kilometers per hour, the lion is the second fastest land animal in Africa (and the world).
Diet: African lions are apex predators and generally hunt the larger animals in their surroundings – buffaloes, rhinos, zebras, giraffes, and antelopes.
Range & Habitat: Lions tend to prefer grassland, savanna, dense scrub, and open woodland. They are found across sub-Saharan Africa, and also in a small part of north-east India.
Best places to see African lions: Kgalagadi Transfrontier Park, South Africa, Kruger National Park, South Africa, Maasai Mara National Reserve, Kenya, Ngorongoro Conservation Area, Tanzania, Okavango Delta, Botswana.
The snow leopard – is it a type of big cat?
Group name: Given how solitary snow leopards are, there is no collective noun for them.
Size: 0.6 meters high, weighing up to 75 kg.
Speed: 80 km per hour.
Diet: Snow leopards will eat almost anything they can catch, often hunting animals much larger than themselves. Their main prey includes wild sheep and goats, pikas, hares, and game birds.
Range & Habitat: Snow leopards can be found throughout high mountain ranges in Central Asia, including the Himalayas and the southern Siberian mountains in Russia.
Best places to see snow leopards: Hemis National Park is a high altitude park in the Himalayas, and home to around 200 snow leopards – the highest density in any protected area in the world.
A tiger relaxing on the ground
Group name: Streak or Ambush.
Size: 1.2 meters high, weighing up to 310 kg.
Speed: 65 km per hour.
Diet: Tigers have a broad diet, ranging from termites to elephant calves. However, the core of their diet is medium to large-sized mammals such as deer and goats.
Range & Habitat: Tigers occupy a variety of habitats in Asia from tropical and evergreen forests, to mangrove swamps, grasslands, and savanna.
Best places to see tigers: Ranthambore National Park, Raghu Ramaswamy Sundarban National Park, Bandhavgarh National Park and Pench National Park in India, Zhan Tian Chitwan National Park in Nepal, Jigme Singye Wangchuck National Park in Bhutan
Are CheetahsBig Cats?
Although cheetahs are not in the Panthera genus (they are in their own Acinonyx genus) – and are smaller in size and weight than all cats in Panthera genus – they are sometimes referred to as a type of big cat.
Unlike all other species in the cat family, cheetahs do not have retractable claws, rather they are more dog-like, and are only semi-retractable. As the fastest land animal cheetahs need super traction while running, and their protruding claws act like running shoes. | <urn:uuid:bbd822fd-10ac-4ead-9928-b7ed4d0e6997> | CC-MAIN-2022-33 | http://votreart.com/types-of-big-cats-a-guide-to-big-cats-around-the-world-big-cats-jaguars-tigers-leopards-and-lions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.916747 | 1,545 | 3.5625 | 4 |
What’s Living in Forest Park?
Bioblitz in the Pioneer Valley
Saturday, June 5th in Springfield, MA
What is a Bioblitz? A bioblitz is a 24 hour event to find, identify, and record as many species as possible, from microbe to mammal, at a given location. Bioblitzes provide valuable information to park managers and get kids excited about science and the natural world.
During the weekend students will head out on various themed nature walks to explore, investigate, and record what is found. About a dozen local area experts have been recruited to lead these walks. For example, John Foster, of the New England Naturalist Training Center will lead an ecology exploration walk, and Charley Eiseman and Noah Charney, authors of Tracks & Signs of Insects and Other Invertebrates, will help students identify insects and more in the park.
According to Ms. Cesan, science teacher at Duggan Middle School, the United Nations Program for the Environment has declared 2010 the International Year of Biodiversity to draw attention to the rapid loss of biodiversity the planet is experiencing. The Forest Park Bioblitz is a small, local action that we can undertake to increase awareness and appreciation for the biodiversity in our own backyard. In addition, the event applies and reinforces several state science standards that students have been working on this school year. Students are creating a booklet about the ecosystems in Forest Park and the data collected during the event will be included.
The event will not be all work and no play as kayaking lessons, a zoo tour, and campfire s’mores are also scheduled. Joining students around the campfire will be their entire team of teachers. Students and teachers are excited about this event. Consider coming to the park on Saturday and visiting our “base camp” near the grandstands to view student work and check in on our data as students collect and report it. The event runs 8am-3pm on Saturday June 5th.
For more information contact Duggan Middle School Science Teacher, Kerry Cesan at firstname.lastname@example.org. | <urn:uuid:1919a6fd-94b9-40cc-9f4a-d8ba67cac548> | CC-MAIN-2022-33 | https://hilltownfamilies.org/2010/06/02/hf-27/?shared=email&msg=fail&v=ae551853b692 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.943421 | 443 | 3.40625 | 3 |
Where to Buy
Life Cycle Cost Savings
Life Cycle Costing (LCC) aims to quantify the financial impact of a product over its entire life cycle to assist consumers in making decisions that will save them money over the long term.
GSA's Proving Ground found that installation of Hi-R panel retrofits could provide as much as a 41% heating savings in winter, or an 11% estimated savings for an entire buidling's heating and cooling demand. Estimated payback is 9 years for triple-pane retrofits and less for double-pane retrofits.
Contributes to meeting The Guiding Principles for Sustainable Federal Buildings
Highly insulating window panel retrofits are installed on top of existing windows. GSA's Green Proving Ground recommends double-pane retrofits for buildings in cold climates with single-pane windows but notes that site-specific evaluation is critical.
Potential LEED Contributions
This product may contribute* toward points in multiple LEED v4 rating systems, including areas required for LEED v4 building certification. Primarily, the credits will apply in the Building Design and Construction (BD+C) category. This includes the specialty areas of: New Construction and Major Renovation, Existing Buildings, Core & Shell, Schools, Retail, Data Centers, Warehouse and Distribution Centers, Hospitality, and Healthcare. Specific credits are:
- Energy & Atmosphere - Optimize Energy Performance
* It is important to note that no products, individually or collectively, can guarantee a specific number of points for LEED Category credit. Each credit will need to be matched to the product by a certified professional. | <urn:uuid:19eaa096-5ea3-4807-86b2-979694e8803b> | CC-MAIN-2022-33 | https://sftool.gov/greenprocurement/green-products-workspaces/83/enclosed-conference/1578/window-high-r | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.893431 | 362 | 1.640625 | 2 |
Purveyor of ego-stroking profiles Forbes, has a list of 20 Happiest Jobs in America and despite the misery you've seen all around you for the past three months, three years, or three decades, accountants are 8th on the list. Yep! There are capital market servants all over this great land who are whistling their jovial asses at work every single day. Now, it's fine if you give the list credence but there are all kinds of reasons to question the findings or simply conclude that it's a load of crap. Let's examine, shall we?
First, if you go over the list in its entirety, it's full of vague "jobs" similar to "accountant" like, "Software Engineer," "Director of Operations," and "Machine Operator." All these jobs encapsulate a lot of different jobs, so naturally, some of these people will consider themselves "happy" because they're not "dead."
Secondly, we've already covered U.S. News' assertion that accounting is one of the greatest jobs ever. Hell, I even wrote an article ages ago (that I can't find online, thus no link) for Denver Business Journal saying as much. Yes, things like job security and semi-decent money make people happy, but again in this context, I think "happy to not be eating out of a dumpster" is a more accurate way to put things.
Thirdly, look at the stock photo Forbes used for "accountant." Stock photos capture nothing but truth, people. Enough said.
But if you think about it again, maybe accountants are happier than people in other jobs. Sure, you're not coming up with names for Ben & Jerry's ice cream, reviewing marijuana, or riffing with hacks like Adrienne all day but in our take-this-pill-it'll-make-you-feel-better society, it's clear that you're a pretty big loser if you're not happy, so perhaps accountants are simply better medicated than other professions. This, on the surface, seems logical because A) accounting firms don't care if you're on drugs and B) you've probably got decent insurance coverage.
So if you're a happy accountant and you know it, comment below (and hook us up). | <urn:uuid:25e3e55c-5852-46ad-ade7-914ca9c7f288> | CC-MAIN-2022-33 | https://www.goingconcern.com/who-are-all-these-happy-accountants-and-what-are-they/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.96758 | 475 | 1.554688 | 2 |
Anne Arundel County Executive Steuart Pittman signed an executive order to adopt the Anne Arundel County Vision Zero Plan.
By doing so, Anne Arundel County joins the state of Maryland, and other jurisdictions in Maryland (including Prince Georges, Montgomery, Harford, Cecil, Baltimore and Baltimore City), in the commitment to reach zero deaths and serious injuries on our roadways through the Vision Zero strategy.
The move positions the county to receive federal and state grant funding to support the implementation of the plan and fund safety related projects.
From 2016-2020, there were 234 deaths and 1,311 serious injuries in Anne Arundel County. Among the 24 jurisdictions in Maryland, Anne Arundel ranked third for fatalities and fifth for serious injuries from motor vehicle related crashes. The county’s General Development Plan, Plan 2040, and the county’s Transportation Master Plan, MoveAnneArundel!, called for the adoption of such a plan.
“Vision Zero is a data driven approach to eliminating death and serious injuries on our roadways,” Sam Snead, Director of the Office of Transportation said. “This plan allows all of the agencies to come together regularly to develop strategies and share information to work toward a common goal. The collaborative effort reduces duplication and working in silos, resulting in a cohesive, more effective outcome.”This plan brings together individuals from multiple government agencies to work in concert to develop, implement, and track the performance of the strategies.
During the past 18 months the Vision Zero steering committee, through data analysis, worked to identify the types of crashes that occur, and then categorize them under what are known in the industry as the four “Es:” Engineering, Enforcement, Engagement/Education, and Emergency Services as well as two overarching “Es,” Equity and Evaluation.
Committee members include representatives from the Anne Arundel County:
● Office of Transportation
● Department of Public Works
● Office of Planning and Zoning
● Police Department
● Fire Department/Emergency Management Services
● Department of Health
External partners on the committee include representatives from:
● Maryland Department of Transportation State Highway Administration
● City of Annapolis
● Motor Vehicle Administration’s Highways Safety Office
● Maryland Transportation Authority
● Baltimore Metropolitan Council
The plan is available at www.aacounty.org/visionzero. | <urn:uuid:81326c97-e2ea-4561-9088-b1587ec24156> | CC-MAIN-2022-33 | https://bizmonthly.com/pittman-arundel-transportation-adopt-vision-zero-plan%EF%BF%BC/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.911349 | 502 | 1.921875 | 2 |
Visible light communication market size was valued around USD 300 million in 2014 and is expected to grow at CAGR of over 90% over the forecast period and exceed USD 10 billion by 2023.
(Visible Light Communication) VLC market technology makes use of light emitting diode as the source which has inherent characteristics of high speed flickering. Thus, it offers dual function of data communication and lighting simultaneously. The technology is cost effective and extensively suitable. This technology do not offer any sort of interference to RF. It also utilizes image sensors and opto-couplers as components and represents a unique industry that has tremendous growth potential over the forecast period.
Request for an in-depth table of contents for this report @ https://www.gminsights.com/request-toc/upcoming/194
One of the major factors contributing to growth of visible light communication market is the accessibility of high bandwidth. Visible light offers bandwidth frequency spectrum which is larger than that of radio frequency bandwidth. This result in the space for more than one user and thereby, accomplishing higher transfer rates. As a result, the high bandwidth availability is expected to be the biggest attraction of this technology boosting the global industry growth over the forecast period.
Location-based services (LBS) and target-based advertising coupled with increasing R&D investment are the major driving factor for the global visible light communication market. In addition, higher energy efficiency and biologically safe & negligible interference is also expected to increase the VLC adoption in healthcare sector over the forecast period. It transfers the data at rapid rate as compared to other conventional wireless technologies such as Wi-Fi, Wimax and Bluetooth which use radio waves for communication.
Non-uniformity in standardization and complexity in simultaneous data transmit and receipt within the same module is anticipated to hamper the demand growth over the forecast period. Difficulty in existing LED lighting upgradation also acts as a challenge to the industry growth. The prospective opportunities to the industry include technological breakthroughs opening in a wide range of applications along with mounting deployment of energy-efficient LED in numerous applications to pave way for the growth of visible light communication market.
The industry can be segmented by end users as connected devices, underwater communication, automobile & transport, retail indoor positioning, hospitality, in-flight infotainment/communications and light-based internet. The industry is segregated on the basis of communication type which consists of unidirectional and bidirectional. In addition, the industry is segmented on the basis of rate of data which include VLC with data rate up to 1 Mb/s (≤ 1 mbps) and VLC with data rate above 1 Mb/s (>1 mbps). Furthermore, the industry is further segmented on the basis of distance, which includes Up To 10 meter and above 10 meter. Moreover, the industry can be further bifurcated on the basis of geography which includes North America, Europe, Asia Pacific, Latin America and MEA.
In 2014, retail indoor segment dominated the industry in terms of revenue. The growth in this segment is primarily driven by demand from developed nations such as North America and Europe. North America, including U.S. visible light communication market accounted for about 42% of the total industry revenue in 2014 and estimated to be the largest revenue contributor.
Make an inquiry for purchasing this report @ https://www.gminsights.com/inquiry-before-buying/194
Increasing collaboration among major players with the research institutions for extensive research and development activities is the foremost trend observed in the industry. Correspondingly, the original equipment manufacturers of LED in the VLC industry are focusing on mergers and acquisitions with the developers. These collaborations would help the manufacturers to overcome barriers such as complexity in upgrading existing LED lighting and lack of standardization for the industry.
Key manufacturers for the global visible light communication market share include Axrtek, Outstanding Technology Co. Ltd., LightPointe Communications Inc., Koninklijke Philips, Wireless Excellence Limited, Lightbee Corp, Nakagawa Laboratories, Inc., Casio Computer, Fraunhofer Heinrich, ByteLight, Inc. (Acuity Brands, Inc.), PureLifi Ltd, LVX System, Gallium Lighting LLC, Supreme Architecture Inc., Fsona Networks Corp. and General Electric Company among others.
Browse Related Reports:
- (Light Fidelity) Li-Fi Market Size By Component (Microcontroller, Photodetector, LED), By Application (Indoor Networking, Aerospace, Automotive, Healthcare, Location Based Services, Underwater Communication, Defense & Security, Intrinsically Safe Environments), Industry Analysis Report, Regional Outlook (U.S., UK, Germany), Application Potential, Price Trends, Competitive Market Share & Forecast, 2016 – 2023
- High Brightness (HB) LED Market Size By Application (Backlight TV/monitor, Mobile, Sign (Signal Devices & Advertising Panels), Lighting, Automotive), Industry Analysis Report, Regional Outlook (U.S., China, Japan, South Korea), Application Potential, Price Trends, Competitive Market Share & Forecast, 2012 – 2023
About Global Market Insights
Global Market Insights, Inc., headquartered in Delaware, U.S., is a global market research and consulting service provider; offering syndicated and custom research reports along with growth consulting services. Our business intelligence and industry research reports offer clients with penetrative insights and actionable market data specially designed and presented to aid strategic decision making. These exhaustive reports are designed via a proprietary research methodology and are available for key industries such as chemicals, advanced materials, technology, renewable energy and biotechnology.
Company Name: Global Market Insights Inc.
Contact Person: Jack Davis
Address:29L Atlantic Avenu, Suite L 105
City: Ocean View
Country: United States | <urn:uuid:7fecde5a-1cc6-4de5-a8f1-f9d13c5cbd70> | CC-MAIN-2022-33 | https://www.getnews.info/578173/visible-light-communication-market-to-grow-at-over-90-cagr-from-2016-to-2023-global-market-insights-inc.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.908012 | 1,257 | 2 | 2 |
Orpington chickens first originated in Orpington, England back in the late 1800s, which is how this breed got its majestic-sounding name. Since then, Orpington chickens have elevated into one of the most popular chicken breeds to raise as pets.
They are easily distinguishable by their fluffy feathers. People often make the mistake of assuming that they are much larger than they are because of their plumage. It’s their feathers that also allow these chickens to be hardy enough to survive in almost any climate. The lavender gene is different than the blue gene in genetics in that it will produce consistent lavender color in all the offspring. The “lavender” gene (lav) in the chicken causes the dilution of both black and red/brown pigments, so according to color background, dilution due to “lavender” gives a sort of plumage color patterns: On an extended background, this condition causes the entire surface of the body an even shade of light slaty blue, which is the typical phenotype known as ‘”self-blue”‘.
One of the reasons Orpington chickens have become popular as pets is because they are known for being both docile and gentle. If you have kids and plan to have them care for your chickens alongside you, choosing to raise Orpington chicks would be ideal, as they are excellent with children. They are also heavy birds that are unable to fly, which makes them even easier to raise, and gives you the option to raise them in a chicken run or free-range in your yard.
Orpington chickens are considered a good breed for egg-laying. Once your chicks reach maturity, they will eventually lay roughly 200-280 brown eggs per year, which will undoubtedly be enough to supply your family well into the winter season.
|Egg Color||Brown||Hardiness||Very Cold Hardy|
|Egg Production||Good||Hen Weight||7 lbs|
|Personality||Quiet & Affectionate||Rooster Weight||8 1/2 lbs|
Live Chick Guarantee
We guarantee your ordered number of birds arrive healthy and true to breed. Please contact us immediately should any losses or variances to your order occur, this guarantee is only for the safe and live delivery of your poultry. Any loss must be reported to Chickens for Backyards within 3 days of receipt for any adjustment to be made. Reshipments are subject to availability and minimum shipping requirements. If eligible, we will reship only once. Reimbursements are limited to the cost of the birds and will not include shipping charges. | <urn:uuid:127d48f2-7b55-4d60-ae93-94d2f45a22f0> | CC-MAIN-2022-33 | https://www.chickensforbackyards.com/product/lavender-orpington/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.957075 | 557 | 2.0625 | 2 |
Collectors Eric and Jean Cass recently donated over 300 important modern and contemporary artworks to the Contemporary Art Society for gifting to museums, including works by Karel Appel, Michael Craig-Martin, Barbara Hepworth, Joan Miro, Henry Moore, Eduardo Paolozzi, Victor Pasmore, Pablo Picasso and Niki de Saint-Phalle. The gift is one of the most important donations to the Contemporary Art Society in our 103 year history and totals over £4 million.
Developed over 40 years, Eric and Jean’s collection was one of the most unique and significant collections of modern and contemporary art in the UK and was previously housed in the interiors and gardens of ‘Bleep’, their spectacular modernist home in Surrey named after the pager system that Eric Cass’ company invented. Wanting their collection to benefit the widest possible audience, the philanthropists approached the Contemporary Art Society to disseminate works from their collection to museums across the whole country.
From 16 October 2013, a selection of Pop works donated to Wolverhampton Art Gallery, West Midlands, from The Eric & Jean Cass Gift will be on display at the Contemporary Art Society. This is the first time the Contemporary Art Society has exhibited any of the works from the gift and it will be the first of several displays showcasing selected works from Eric and Jean Cass’ collection.
The gift has allowed Wolverhampton Art Gallery to develop its collection of Pop Art by introducing works by Victor Vasarely, Julio Le Parc and Karel Appel and a new focus on the impact of European artists on the UK Pop movement. Major works on display include the first Karel Appel work purchased by Eric Cass, Compelviction (1967); Victor Vasarely’s AXO-99 (1988); and Longue March (1976) by Julio Le Parc, an impromptu purchase by Eric and Jean during a visit to Paris. Other works from Wolverhampton’s collection will also be on display to contextualise the impact of the gift, including those by Eduardo Paolozzi and Bridget Riley.
Eric and Jean Cass said: “When the time came for us to leave Bleep and our 365-strong collection of modern and contemporary art, we had to find a home that would love the pieces as much as we did. The Contemporary Art Society provided the answer. It has been a big job, carried out with the same spirit that involved us in collecting in the first place.”
Sophia Bardsley, Deputy Director at Contemporary Art Society, said: “We are thrilled to be able to show a selection of works from The Eric & Jean Cass Gift in our space from October. Eric and Jean’s collection is one of the most eclectic we have worked with and combines major modernist works with others collected during their many travels – all highlighting their passion for collecting works of art that they enjoyed and identified with. Their collection is hugely personal. Eric and Jean’s decision to gift over 300 works from their collection to the Contemporary Art Society for gifting to UK museums shows their engagement with the arts and their commitment to philanthropy on a national scale. Their donation will make a long-term difference to regional museum collections across the whole of the UK – and it is this development of regional collections, alongside inspiring an appreciation of contemporary art with regional audiences, that is at the heart of the Contemporary Art Society’s mission.”
Pop Works from the Eric & Jean Cass Gift runs 16 October – 22 November. There is a discussion of The Eric & Jean Cass Gift by curator and writer Ann Elliott and Marguerite Nugent, curator and programme development manager at Wolverhampton Art Gallery, on 19 October at 15.00 at the Contemporary Art Society.
For all press enquiries, interview requests and press tickets to the talk on 19 October, contact:
Jenny Prytherch, Communications Manager
T. +44 (0)20 7017 8412
NOTES TO EDITORS:
1. About Contemporary Art Society
The Contemporary Art Society is a national charity that encourages an appreciation and understanding of contemporary art in the UK. With the help of our members and supporters we raise funds to purchase works by new artists which we give to museums and public galleries where they are enjoyed by a national audience; we broker significant and rare works of art by important artists of the twentieth century for public collections through our networks of patrons and private collectors; we establish relationships to commission artworks and promote contemporary art in public spaces; and we devise programmes of displays, artist talks and educational events. Since 1910 we have donated over 8,000 works to museums and public galleries – from Bacon, Freud, Hepworth and Moore in their day through to the influential artists of our own times – championing new talent, supporting curators, and encouraging philanthropy and collecting in the UK.
The Contemporary Art Society has recently appointed a new Director, Caroline Douglas, who will join the organisation from October 2013. For interview enquiries, contact firstname.lastname@example.org
Forthcoming displays at Contemporary Art Society:
*John Stezaker (4 Sept – 4 Oct), Artist Talk 12 Sept
*The Eric & Jean Cass Gift (16 Oct – 22 Nov)
*Laure Prouvost (4 Dec – 17 Jan), Artist Talk 12 Dec
*Simon Fujiwara (29 Jan – 28 Feb)
*PRESS BRIEFING (29 Jan, 9am – 10am)
An exclusive press preview of our Simon Fujiwara display and an opportunity to find out about our displays and initiatives from February 2014. We will be joined by Simon Fujiwara as well as new Contemporary Art Society Director Caroline Douglas.
Key facts about Contemporary Art Society acquisitions:
The Contemporary Art Society is the leading organisation for identifying emerging talent in the UK and has donated many ‘firsts’ to museums across the country throughout its illustrious history, including the first works by Paul Gauguin, Pablo Picasso and Francis Bacon and, more recently, the first works by Damien Hirst, Elizabeth Price and 2013 Turner Prize nominee Laure Prouvost.
- 1910 Contemporary Art Society makes its first purchase, Augustus John’s Smiling Woman, which was later presented to Tate in 1917
- 1917 Contemporary Art Society gifts Paul Gauguin’s Tahitians to Tate
- 1933 Contemporary Art Society gifts Pablo Picasso’s Flowers to Tate – the first Picasso ever to be acquired by Tate
- 1946 The first work by Francis Bacon is purchased, Figure Study II
- 1967 Henry Moore’s Knife Edge – Two Piece presented to the City of Westminster and permanently sited in Abingdon Street Gardens, London W1
- 1988 Mark Wallinger’s Lost Horizon is gifted to The Potteries Museum & Art Gallery, Stoke on Trent
- 1992 Damien Hirst’s Forms Without Life is gifted to Tate – the first Hirst ever to be donated to Tate
- This year (2013-4) the Contemporary Art Society expects to place art worth in excess of £4million into public collections across the UK with the support of our patrons and other stakeholders.
2. Museums to receive works from The Eric & Jean Cass Gift
Gallery of Modern Art, Glasgow (GoMA) receives works by Niki de Saint Phalle, the largest donation of this significant French artist’s work to a UK collection. The donation also includes an archive of ephemera and correspondence between the artist and Eric and Jean Cass. Niki de Saint Phalle – the Eric and Jean Cass Gift will be on display at GoMA from 15 November 2012 – October 2013.
Hepworth Wakefield receives works by Hubert Dalwood, Barbara Hepworth, Robert Adams, Kenneth Armitage, Lynn Chadwick, F. E. McWilliam, Bernard Meadows, Denis Mitchell, William Tillyer, William Turnbull and Eduardo Paolozzi.
Leeds Art Gallery receives works by Robert Adams, Alan Davie, Henry Moore, William Pye, Joe Tilson, William Turnbull and Alison Wilding.
National Museum of Wales receives works by Karel Appel, Patrick Caulfield, Hedegaard, John Hoyland, Joan Miro and Bjorn Wiinblad.
Scottish National Gallery of Modern Art (SNGMA) receives works including sculptures by Reg Butler and Cesar Baldaccini and a room display of works from the 1980’s by Michael Craig-Martin. Michael Craig Martins from the gift will be on display at SNGMA from 5 October 2013 – 25 May 2014.
The Royal Pavilion and Museums (Brighton) receives works by Eileen Agar, Barbara Hepworth, Victor Pasmore, Pablo Picasso, Lucy Tasseor Tutsweetok, Ettore Sottsass and Gillian Ayres.
Wolverhampton Art Gallery receives works by Karel Appel, Allen Jones, F.E. McWilliam, Julio Le Parc, Victor Vasarely, and Glynn Williams.
Other museums to receive works from the Eric and Jean Cass Gift since 2008 include: Yorkshire Sculpture Park, Leamington Spa Art Gallery & Museum, the Harris Museum & Art Gallery, York Art Gallery, Warwick University Collection, Victoria Gallery & Museum (University of Liverpool), Gallery Oldham.
For full information visit: www.contemporaryartsociety.org/our-work-with-public-collections/the-eric-jean-cass-gift
3. About the key artists on display at Contemporary Art Society
Karel Appel. Born in Amsterdam in 1921, Appel studied at the Rijksackademie, Amsterdam’s State Academy of Art (1940-43). A founding member, with fellow artists Corneille and Constant, of the radical avant-garde group COBRA, Appel relocated to Paris in 1950, where his career flourished. Appel received the Unesco Prize at the 1954 Venice Biennale and the Guggenheim International Award (1960).
Julio Le Parc. Born 1928 in Mendoza Argentina, Le Parc studied under Lucio Fontana at the Escuela Superior de Bella Artes, Buenos Aires (1942-54). After moving to Paris in 1958, Le Parc visited Victor Vasarely’s studios, which was to have a lasting influence on Le Parc’s practice, as was the founding of the radical artists’ collective, Groupe de Recherche d’Art Visuel (GRAV) in 1960. Le Parc was awarded the Grand Prix for painting at the Venice Biennale in 1966, more recently in 2013, the Palais de Tokyo staged a major retrospective of his work.
Eduardo Paolozzi. Born 1924 in Leith, Scotland, Paolozzi studied at St. Martins and Slade Schools of Art in London. Becoming a tutor at the Central School of Art and Design, Paolozzi collaborated in the highly influential Whitechapel exhibition This is Tomorrow, in 1956. Working in forms across the artistic spectrum, from bronze sculpture to collage and printmaking, Paolozzi’s works have permeated the cultural landscape of the UK with public works at Tottenham Court Road and the British Library as well as being one of the founding members of the ICA.
Bridget Riley. Born 1931 in London, Riley studied at Goldsmiths and the Royal College of Art. Like Vasarely, Riley exhibited in The Responsive Eye show at MoMA New York in 1965, with trademark monochrome optical works such as Blaze 2 (1963). Her approach to painting, often with the use of assistants, was to be a key component of the development of Op Art in the 1960s, with Riley at the forefront. Internationally renowned, Riley’s works are in prestigious collections across the world and she has been the recipient of many prizes, including the International painting Prize at the Venice Biennale in 1968.
Victor Vasarely. Born 1908 in Hungry, Vasarely studied at the Academy of Painting in Budapest before joining the Budapest branch of the Bauhaus in 1929. His international reputation was confirmed with the exhibition The Responsive Eye at MoMA New York in 1965. Vasarely’s work features in numerous large internationally renowned collections, including the Guggenheim, Tate and MOMA. Museums devoted exclusively to his work include the Vasarely Foundation and the Vasarely Institute, both in France and the house in which he was born in Pécs, Hungry, which houses a permanent exhibition of Vasarely’s works.
4. About Wolverhampton Art Gallery
Funded and built by local contractor Philip Horsman from designs by Birmingham architect Julius Chatwin, Wolverhampton Art Gallery opened in May 1884. A Grade II* Listed building, the sculptural frieze on the outside features 16 characters each representing an element of arts and crafts, from painting and pottery to architecture and metalworking. Science is also represented. The School Of Art, built to the rear of the new building, was opened at the same time and has since been incorporated into the gallery.
From early donations of art by several leading local figures, including industrialist Sidney Cartwright and Horsman, whose contributions to Wolverhampton are marked by a fountain next to the gallery, in St Peter’s gardens, the collection quickly grew in size and reputation. A new extension in 2007 included a dedicated Pop Art gallery and additional space for special exhibitions, while the Victorian Gallery was refurbished in 2009.
Regularly changing exhibitions and displays reveal trends and themes, with contributions from major UK and international artists, both historic and contemporary. Work included ranges from painting, printing, drawing, photography and sculpture, to digital and installation art.
Wolverhampton Art Gallery | <urn:uuid:70bfc9ad-2cb0-4ab7-ba0d-cc234cc62905> | CC-MAIN-2022-33 | https://artstrategy.casconsultancy.org/press-release-pop-works-from-4-million-eric-jean-cass-gift-to-go-on-display-at-contemporary-art-society-16-october-22-november-2013/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.925955 | 2,918 | 1.5625 | 2 |
Characterizing the complexity of microseismic signals at slow-moving clay-rich debris slides: the Super-Sauze (southeastern France) and Pechgraben (Upper Austria) case studies
- Institute for Geophysics, University of Stuttgart, 70174 Stuttgart, Germany
Correspondence: Naomi Vouillamoz (email@example.com)
Soil and debris slides are prone to rapid and dramatic reactivation. Deformation within the instability is accommodated by sliding, whereby weak seismic energies are released through material deformation. Thus, passive microseismic monitoring provides information that relates to the slope dynamics. In this study, passive microseismic data acquired at Super-Sauze (southeastern France) and Pechgraben (Upper Austria) slow-moving clay-rich debris slides (“clayey landslides”) are investigated. Observations are benchmarked against previous similar case studies to provide a comprehensive and homogenized typology of microseismic signals at clayey landslides. A thorough knowledge of the various microseismic signals generated by slope deformation is crucial for the future development of automatic detection systems to be implemented in landslide early-warning systems. Detected signals range from short-duration (< 2 s) quake-like signals to a wide variety of longer-duration tremor-like radiations (> 2 s – several min). The complexity of seismic velocity structures, the low quantity and low quality of available signal onsets and non-optimal seismic network geometry severely impedes the source location procedure; thus, rendering source processes characterization challenging. Therefore, we constrain sources' locations using the prominent waveform amplitude attenuation pattern characteristic of near-source area (< about 50 m) landslide-induced microseismic events. A local magnitude scale for clayey landslides (ML−LS) is empirically calibrated using calibration shots and hammer blow data. The derived ML−LS returns daily landslide-induced microseismicity rates that positively correlate with higher average daily displacement rates. However, high temporal and spatial resolution analyses of the landslide dynamics and hydrology are required to better decipher the potential relations linking landslide-induced microseismic signals to landslide deformation.
Slow-moving soil and debris slides developed in tectonized marl formations are characterized by seasonal dynamics as well as by sudden (generally rainfall triggered) reactivation and liquefaction phases (Malet et al., 2005; Hungr et al., 2014). The slow deformation of soil and debris slides is expected to generate elastic accumulation and rupture, which releases seismic energy within the landslide body. Therefore, passive seismic monitoring is a good approach to monitor and mitigate slope instabilities, as it provides high temporal resolution data (sample rates up to 1000 Hz) in near real-time that relate to the dynamics of the landslide. This means that the transition (and rapid transformation) of the landslide from steady-state sliding into a debris flow may be detected and slope failure anticipated.
Seismic investigations of natural and artificial slope instabilities started in the 1960's with acoustic emission (10–1000 kHz) (e.g., Beard, 1961; Cadman and Goodman, 1967; Jurich and Miller Russell, 1987) and have been complemented during the last decades by an increasing number of passive microseismic monitoring studies (1–1000 Hz), carried out in various geological contexts. The shear boundaries of the Slumgullion earthflow in Colorado were first investigated by Gomberg et al. (1995) as a strike-slip fault zone analog. The study confirmed the existence of detectable brittle deformation processes associated with slide deformation. In Europe, clayey landslides investigated include the Heumoes slope in the Austrian Vorarlberg Alps (Walter and Joswig, 2008; Walter et al., 2011), the Super-Sauze landslide in the southwest of the French Alps (Walter and Joswig, 2009; Walter et al., 2012; Tonnellier et al., 2013; Provost et al., 2017) and the Valoria landslide in the northern Apennines in Italy (Tonnellier et al., 2013). Examples of case studies carried out at rockslides include, but are not limited to, the following: the Randa rockslide in the Swiss Alps (Eberhardt et al., 2004; Spillmann et al., 2007); the Åknes rockslide in Norway (Roth et al., 2005; Fischer et al., 2014); the Séchilienne rockslide in the southeastern French Alps (Helmstetter and Garambois, 2010; Lacroix and Helmstetter, 2011); and the Gradenbach, Hochmais-Atemskopf and Niedergallmigg-Matekopf deep-seated rock slope deformations in the eastern Austrian Alps (Brückl and Mertl, 2006; Mertl and Brückl, 2007; Brückl et al., 2013).
Observed near microseismic signals (source–receiver distances < 500–1000 m) comprise microearthquake events, for which Gomberg et al. (1995) introduced the term “slidequake”. Such events have been reported both at rock and debris slides and are inferred to be associated with fracture processes in the host rock, at the sliding surface or within the landslide body. Rockfall and rock-avalanche signals were also characterized at steep debris slides and at rock slides (Helmstetter and Garambois, 2010; Walter et al., 2012; Tonnellier et al., 2013; Provost et al., 2017). In addition, a wide variety of tremor signals have been reported marginally (Gomberg et al., 1995; Brückl and Mertl, 2006; Mertl and Brückl, 2007; Spillmann et al., 2007; Gomberg et al., 2011; Walter et al., 2012; Tonnellier et al., 2013; Provost et al., 2017). No common typology has yet been suggested for these signals and the signal source interpretation remains speculative.
This study aims at proposing a classification of microseismic signal types as recorded by tripartite microseismic arrays deployed at slow-moving clay-rich debris slides (“clayey landslides”). Tripartite microseismic arrays are suited for the determination of the back azimuth and apparent velocity of an incoming signal; hence, they provide key information about the signal source location (e.g., Joswig, 2008; Sick et al., 2012; Vouillamoz et al., 2016). The classification of microseismic signals is based on the waveform and spectral attributes of the signals and uses microseismic observations reported by similar case studies as a benchmark. Because of the lack of clear phase arrivals and signal coherence across the seismic network at clayey landslides, standard seismological approaches to establishing the source location using arrival times derive minimum uncertainties of ±50 m for near-source area microseismic events (e.g., Tonnellier et al., 2013). Therefore, we apply an alternative method based on seismogram amplitude information to constrain the source–receiver distance of near-source area landslide-induced microseismic events. The technique is generally referred in the literature as amplitude source location (ASL) and has been used following various approaches to locate microseismic sources recorded at distances of less than a few kilometers at volcanoes (e.g., Jolly et al., 2002; Battaglia, 2003; Battaglia et al., 2005) or glaciers (e.g., Jones et al., 2013; Röösli et al., 2014), as well as for different kinds of mass motion, including lahars (e.g., Kumagai et al., 2009) and debris flows (e.g., Walter et al., 2017). We applied a simple ASL approach in which calibration shots and hammer blows carried out in the study area were used to empirically evaluate amplitude attenuation patterns. Then, with the aim of reducing bias and errors in the estimation of landslide-induced microseismicity rates, the distance attenuation function of the local magnitude scale was calibrated for clayey landslides using the active microseismic datasets. Detected microseismic events were finally gathered in a comprehensive catalog. The final catalog of landslide-induced microseismic signals provides an important basis for a multidisciplinary comparative analysis with other landslide observations (such as displacement, cracks and fissures development) or with hydrometeorological data to gain knowledge about landslide dynamics; the catalogue also presents an initial signals library to train automatic detection and classifier systems.
Seismic measurements were acquired at two well-instrumented slopes: the Super-Sauze (southwestern French Alps) and Pechgraben (Upper Austria) landslides (Fig. 1a–b). Both instabilities are characterized by a clay-rich matrix transporting rigid boulders of marls and limestone (including the remains of vegetation at Pechgraben) with moving rates ranging from a few millimeters to several tens of centimeters per day in the investigated areas and periods (Fig. 1c–d). In the monitored areas, the thickness of the instability reaches more than 10 m at Super-Sauze, but does not exceed a few meters (2–4 m) at Pechgraben. More details about the two landslides can be found in Malet (2003), Travelletti (2011) and Tonnellier et al. (2013) for Super-Sauze, and Lindner et al. (2014) and Lindner et al. (2016) for Pechgraben.
Continuous data from the three following seismic campaigns were investigated (Fig. 1):
Super-Sauze 2010 (SZ10): 28 May–24 July 2010; 58 days; 18 sensors over 2 ha; average displacement of 0.4 cm d−1, obtained by daily dGNSS (differential global navigation satellite system) measurements.
Pechgraben 2015 (PG15): 7–15 October 2015; 9 days; 12 sensors over 6 ha; average displacement of 2 cm d−1, obtained by weekly dGNSS measurements.
Pechgraben 2016 (PG16): 8–12 November 2016; 5 days; 12 sensors over 1 ha; average displacement of more than 20 cm d−1, estimated by triangulation, using grids of fixed nails (both on the stable and active parts of the slide) in addition to daily photo-monitoring.
Tripartite seismic arrays were deployed with station spacing of 5–50 m (Fig. 1c–d). Each seismic array consists of a central three-component (3-C) short-period seismometer (Lennartz 3Dlite) which is surrounded by three to six vertical short-period seismometers (Lennartz 1Dlite). The seismometers were buried about 30 cm deep in the landslide material. Data were collected by battery powered SUMMIT M Hydra data loggers. At Super-Sauze, the array S3 consists of Noemax Agécodagis velocimeters (one 3-C and six verticals) with an associated band-pass of 0.1–80 Hz, connected to a Képhren Agécodagis acquisition system powered by solar panels. This array is part of a permanent monitoring installation (RESIF, 2006). Therefore, the seismometers feature a robust installation and are housed in plastic drums on top of a concrete slab. A comparison of the data collected by the different installation systems proved them to be consistent: identical waveforms featuring similar amplitudes are observed for microseismic events recorded at the co-located stations S1.5, S2.6 and S3.6; local, distant and teleseisms are recorded with similar amplitudes across the complete seismic network. No significant difference in terms of waveform scattering was found for signals recorded by stations installed in the more stable areas. At Pechgraben, due to the relatively large aperture (30–50 m) of the seismic arrays in the PG15 campaign, many near-source area microseismic events were recorded by less than three sensors. Consequently, a denser seismic network configuration was designed for the PG16 campaign. Inherent difficulties of operating systems continuously on landslides resulted in partially incomplete datasets (Fig. 1e). This aspect must be considered when evaluating the completeness of landslide-induced microseismic catalogs.
Data were analyzed following the “Nanoseismic Monitoring” methodology using the NanoseismicSuite software package developed at the Institute for Geophysics of the University of Stuttgart (Wust-Bloch and Joswig, 2006; Joswig, 2008; Sick et al., 2012; Vouillamoz et al., 2016). The method is supported by a real-time, analyst-guided interactive multi-parameter visualization approach. First, signals are identified by visual screening of continuous sonograms, where sonograms are logarithmically scaled spectrograms featuring a dynamic frequency-dependent noise adaptation (Joswig, 1990, 1995, 1996). The enhanced visualization of sonograms has the unmatched power to facilitate the detection and recognition of various types of weak signal energies in low-SNR (signal-to-noise ratio) conditions without a priori knowledge (Joswig, 1990; Sick et al., 2012; Vouillamoz, 2015; Vouillamoz et al., 2016; Sick, 2016). The SonoView module of the NanoseismicSuite software provides a dynamic layout, where single-trace sonograms or multi-trace (array-stacked) super-sonograms are visualized on a common timeline, with up to several hours on one laptop screen. Different resampling can be applied to the data, enabling the focus to be directed at various event types (short or long duration, low or high frequency). Detected events are tagged and synchronized in the linked HypoLine module of the software suite for further evaluation. There, waveforms are analyzed interactively to provide an optimized graphical hypocentral solution. Seismograms can be simultaneously processed in network and array mode, taking advantage of the tripartite configuration of the seismic mini-arrays (see Joswig, 2008 and Vouillamoz et al., 2016 for a comprehensive description of the HypoLine software). The strength of the method is its ability to easily detect and successfully evaluate any kind of signals without a priori knowledge in noisy environments. The drawback is that the process is not automated. Consequently, it is time-consuming and not well-suited to large datasets (years). Results may also not be 100 % reproducible.
Much attention was paid to designing a comprehensive database and gathering all microseismic signals observed by passive microseismic monitoring on active debris slides. Continuous sonograms of the three seismic datasets (SZ10, PG15 and PG16) were visually screened in SonoView. To avoid false noise detection, special attention was paid when screening daytime measurements contaminated by anthropogenic noise caused by geophysicists or geotechnical work carried out on the slope. Only signals coherently recorded by at least three sensors were declared as detections. Each detection was first evaluated individually and interactively in HypoLine, where phase information was picked, and time offsets between array-correlated wave packets were used to derive apparent velocity and back azimuth information following the approach described in Fig. 5 of Vouillamoz et al. (2016). Waveform and spectral features of all signals were then analyzed semi-quantitatively using MATLAB® routines as follows:
For each event, all vertical trace seismograms of the seismic network were visualized on a common timeline with normalized and non-normalized amplitudes, using a set of pre-defined time windows (5, 10, 30, 60 and 120 s). The signal's coherency, the event duration and the waveform amplitude attenuation pattern across the seismic network were checked.
Traces on which the signal of interest is contaminated by noise and traces that did not record the event were tagged and discarded from further analysis.
For each trace that recorded the event, the non-logarithmic spectrogram, the unfiltered waveform and a series of waveforms with selected band-pass filters were plotted and evaluated.
The amplitude spectrum (FFT, fast Fourier transform) was calculated to estimate the dominant frequency content of the signals. Since the short source–receiver distances of the considered signals do not allow a clear separation of body waves and surface waves, amplitude information was taken as the maximum absolute zero-to-peak amplitude of the signal unfiltered vertical seismogram.
Potential landslide-induced microseismic events were finally classified considering the following features:
Apparent velocity of trackable wave packets. Well-constrained apparent velocities (computed by array processing for wave packets showing at least four traces with correlation thresholds > 70 %) ranging from less than 0.2 km s−1 to more than 5.0 km s−1. We distinguish two main classes of apparent velocities: < 2.0 km s−1 (top most volume of the landslide body and landslide body) and > 2.0 km s−1 (sedimentary bedrock), in agreement with published velocity profiles of clayey landslides (Williams and Pratt, 1996; Tonnellier et al., 2013).
Clustering of events. Single events are distinguished from events featuring multiple jolts and repeated energetic spikes.
Signal duration in seconds. Signals are classified in three duration classes: short-duration (< 2 s), medium-duration (2–20 s) and long-duration signals (> 20 s – minutes).
Amplitude attenuation pattern. The signals of landslide-induced microseismic sources are expected to be severely attenuated, mainly because of their propagation through heterogenous clay-rich soils of varying water saturation (e.g., Koerner et al., 1981). Calibration shots and hammer blows carried out at Super-Sauze and Pechgraben showed that sources occurring within the seismic network feature prominent waveform attenuation across the seismic network, whereas sources originating a few hundred meters outside the seismic network feature waveforms that are homogeneously attenuated, resulting in similar signal amplitudes across the seismic network. Therefore, only microseismic events featuring prominent and consistent attenuation of the signal maximum amplitudes across the seismic network are considered as a nearby source, potentially induced by the landslide dynamics.
Frequency-related characteristics. The distribution of the dominant energies in individual station records is evaluated from the signal spectrogram, from a selection of band-passed filtered waveforms (1–5; 5–20; 20–50; 50–100 and 100–200 Hz) as well as from the amplitude spectrum. Signals with dominant energies mainly below 50 Hz are separated from events featuring dominant energies well above 50 Hz. Additional observed characteristics include harmonic peaks, dispersive, gliding or multiple-band dominant frequencies. These frequency-related characteristics are illustrated in the event classification (Sect. 4).
Based on these features, and using previous studies (Gomberg et al., 1995; Walter and Joswig, 2008, 2009; Gomberg et al., 2011; Walter et al., 2012; Tonnellier et al., 2013; Provost et al., 2017) as a benchmark, microseismic events detected at clayey landslides are gathered in three main groups, which we describe and discuss in Sect. 4:
Earthquakes (local, regional and teleseisms).
Quakes (source–receiver distance < 50–500 m).
Tremors (landslide-induced tremor signals and external sources of tremor-like radiations).
To help the reader with the comparison of the different microseismic signals, we supply Fig. 2, which illustrates an earthquake signal, for all representative events of the classification (only vertical traces are used):
Shows the signal sonogram (Joswig, 1990) up to the Nyquist frequency with a logarithmic ordinate, which corresponds to 1.95–250 Hz for Pechgraben data and 3.91–500 Hz for Super-Sauze data. Darker colors indicate higher relative energies.
Displays the non-logarithmic spectrogram of the signal with an ordinate up to 250 Hz. The time window was taken as the signal length divided by 30 and an overlap of 90 % was applied. Red indicates higher energies in dB. Both the MATLAB® spectrogram code and colormap were provided by Clément Hibert, of the EOST (Ecole et Observatoire des Sciences de la Terre), University of Strasbourg, France.
Provides the unfiltered seismogram with maximum absolute zero-to-peak amplitude indicated above the trace in nanometers per second.
Shows (from bottom to top) band-pass filtered waveforms of the signal between 1 and 5, 5 and 20, 20 and 50, 50 and 100 and 100 and 200 Hz, defined as bp1 to bp5. A second order Butterworth filter is applied. Maximum absolute zero-to-peak amplitudes are indicated in nanometers per second above each respective trace.
Displays the amplitude spectrum (in nm Hz−1), computed by FFT for the time window indicated by the red bar in (d). A reference horizontal line at 100 nm Hz−1 aids event comparison.
4.1 Earthquakes (local, regional and teleseismic)
Local, regional and teleseismic earthquakes are detected daily by seismic networks. Because earthquakes are potential landslide triggers, it is important to catalogue these events. Seismic features of earthquakes are well known from routine seismogram analyses. At clayey landslides, earthquakes produce medium to long-duration signals that are recorded with similar amplitudes across the complete seismic network. The duration and strength of an earthquake signal as well as its frequency content vary as a function of source distance and magnitude. Sharp and broadband distribution of initial frequency content is typically followed by a decrease in frequency content of the signal energy with successive phase onsets; this results in a typical triangular-shaped sonogram pattern for earthquakes. Onsets of high-SNR events are impulsive. Individual phases with moderate scattering can be identified and return apparent velocities above 2.0 km s−1 (Table 1, Fig. 2).
4.2.1 Previous observations
Quake signals have been observed in previous studies carried out at clayey landslides. Gomberg et al. (1995, 2011) reported short-duration earthquake-like signals, with clearly discernable, trackable wave packets that they referred to as “slidequakes”. Dominant frequencies of slidequakes were not stated, but can be visually evaluated between 10 and 100 Hz based on the waveforms displayed in Figs. 5 and 6 of Gomberg et al. (2011). Walter et al. (2012) described earthquake-like events with durations of up to 5 s and associated frequency contents of 10–80 Hz, which they also referred as slidequakes after Gomberg et al. (1995). Tonnellier et al. (2013) and Provost et al. (2017) reported quake-like signals with durations of about one second, dominant frequencies around 10 Hz, emergent first arrivals and undistinguishable P and S waves.
4.2.2 Updated classification of quake signals
Based on waveform amplitude attenuation pattern, duration and dominant frequency content of the signals, we propose four types of quake events (Table 1; Figs. 3 and 4).
Type I – near high-frequency quakes. Signals showed durations of less than 1 s and were only recorded at a few nearby stations, suggesting a nearby source (Fig. 3a). Waveform amplitudes showed strong attenuation (Fig. 3e). Maximum absolute amplitudes of about 10 000 nm s−1 were observed. High-SNR signals feature impulsive onsets. Dominant frequencies of the highest amplitude traces were in the 20–100 Hz range (spectrogram, band-pass filtered waveforms and amplitude spectrum in Fig. 4a and e (upper panel)). P and S phases could not be clearly distinguished; however, successive phases may be identified based on the apparent velocity of trackable wave packets that scale within 0.2–1.8 km s−1.
Type II – near low-frequency quakes. Signals showed durations of 1–2 s and were recorded by the complete seismic network with strong amplitude attenuation, suggesting a nearby source (Fig. 3b and e). Maximum amplitudes of a few 10 000 nm s−1 were observed. Dominant frequencies of the highest amplitude signals typically stayed in the 5–50 Hz range (spectrogram, band-pass filtered waveforms and amplitude spectrum in Fig. 4b and e (lower panel)). The signals appeared as prominent and scattered surface waves that could be tracked over the seismic network. P and S phases could not be clearly distinguished; however, successive phases could eventually be discriminated based on the apparent velocity of trackable wave packets that ranged within 0.2–1.8 km s−1.
Type III – moderate distance quakes. Signals lasted 2.0–2.5 s and were recorded by the complete seismic network with consistent amplitudes across the seismic network suggesting a source outside of the seismic network (Fig. 3c and e). Most events featured low amplitudes and were recorded just above the noise threshold (100–500 nm s−1). Dominant frequencies were in the 5–50 Hz range, but weak signal energies were typically found within 50–100 Hz at the onset of the events (spectrogram, band-pass filtered waveforms and amplitude spectrum in Fig. 4c). Apparent velocities of scattered wave packets ranged within 1.5–2.0 km s−1. P and S phases were difficult to identify.
Type IV – local microearthquakes. Signals had durations of 2–10 s and were recorded by the complete seismic network with similar amplitudes (Fig. 3d–e). Successive phases could be tracked consistently over the seismic network with apparent velocities ranging within 2.0–5.0 km s−1. Dominant frequencies were in the 5–50 Hz range but signal onsets generally displayed energies in the 50–100 Hz range (spectrogram, band-pass filtered waveforms and amplitude spectrum in Fig. 4d). P and S phases could be identified.
4.3 Tremor signals
4.3.1 Previous observations
Various tremor-like signals were observed at clay-rich instabilities. Gomberg et al. (1995, 2011) reported episodes of tremor-like radiation and sinusoidal waveforms lasting tens of minutes and being coherent across the seismic network, which they inferred as ETS (episodic tremor and slip) signals by analogy to ETS signals observed at strike-slip faults. A deeper analysis showed that many of these signals feature gliding spectral lines above 50–100 Hz in the spectrogram. Although gliding frequency tremors have been observed under 20 Hz at volcanoes and are inferred to display change in the source properties (e.g., Hotovec et al., 2013; Unglert and Jellinek, 2015; Eibl et al., 2015, and references therein), gliding harmonics are also characteristic of environmental noise signals produced by moving vehicles such as airplanes or helicopters (e.g., Biescas et al., 2003; van Herwijnen and Schweizer, 2011; Eibl et al., 2015, 2017). There, the gliding harmonics correspond to the Doppler shift produced by a moving source passing a stationary receiver. At Slumgullion landslide, Gomberg et al. (2011) interpreted gliding frequency tremors in the 50–100 Hz range as having been generated by the action of moving vehicles along a distant (several kilometers) road. However, a slide-generated source (slow rupture of faults or materials entrained within the faults like trees or boulders, or slow basal slip) was not excluded for tremor-like radiation devoid of gliding frequency and featuring the highest amplitudes at the seismic network most remote location from the road. These events lasted several minutes and showed dominant energies broadly distributed above 30–50 Hz and diminishing toward the Nyquist frequency at 125 Hz (Gomberg et al., 2011).
At Super-Sauze and Valoria landslides, tremor-like signals lacking clear onsets and with undistinguishable phases were observed with durations of a few seconds to tens of seconds (Walter et al., 2012; Tonnellier et al., 2013; Provost et al., 2017). Spiky, cascading signals are interpreted as rockfalls. Such events feature repeated jolts in the 10–30 Hz range that correspond to the rockfall impacts, as well as a “noise band” in the 30–130 Hz range that is likely generated by fine-grain material flows. These events are normally well recorded across the complete seismic network, with moderate waveform amplitude attenuation and maximum amplitudes reaching 1000–10 000 nm s−1. High-frequency tremor-like signals with durations of less than 20 s and maximum amplitudes under 10 000 nm s−1, featuring drastic waveform amplitude attenuation and, thus, only partially recorded across the seismic network were also observed (Walter et al., 2012; Tonnellier et al., 2013). Walter et al. (2012) showed that the occurrence rate of these signals correlated well with the measurements of an extensometer installed in a fissure and co-located with a 1-C seismometer at Super-Sauze (July 2009). They concluded that such signals must be triggered by fissure formations at the surface of the landslide, but also considered the scratching and grinding of landslide material against (emerging) hard rock crests as a potential source.
4.3.2 Updated classification of tremor signals
As in previous studies, a wide range of tremor-like signals were recorded at SZ10, PG15 and PG16. Short- and medium-duration (< 20 s) events are distinguished from long duration, minute-long lasting sequences of tremor-like radiations (Table 1). While short- and medium-duration events feature trackable wave packets consisting of spikes or jolts, minute-long lasting sequences are characterized by sinusoidal waveforms and gentle rumbles that are difficult to track coherently across the seismic network. Due to the general waveform intricacy and the wide range of observed dominant frequency, finding an unequivocal classification for tremor events is difficult. Based on the literature and searching for consistent observations at SZ10, PG15 and PG16 we propose a typology of tremor events, where landslide-induced tremor-like signals are distinguished from external sources of tremor-like radiations. Among the landslide-induced events, signals potentially generated by deformation and stick-slip within the landslide body are separated, when possible, from tremor-like signals originating from exogenous landslide dynamics such as rockfalls or small debris flows. Since anthropogenic noises share similarities in waveform amplitudes and in spectral content to landslide-induced tremor signals, it is important to gain knowledge about the characteristics of such events for the manual and automatic detection of landslide-induced tremor signals. Therefore, the proposed updated typology of tremor events from this study is as follows:
ETS-like signals. Microseismic signals showing similarities to ETS signals at strike-slip faults were observed. ETS-like signals at debris slides are emergent and cigar-shaped, last a few seconds and are strongly attenuated across the seismic network (Fig. 5b and d (top panel)). These signals typically occur in temporal sequences. The dominant frequency of the highest amplitude signals range within 5–50 Hz (spectrogram, band-pass filtered waveforms and amplitude spectrum in Fig. 6a and d (top panel)). Maximum observed absolute amplitudes reach some 10 000 nm s−1; however, most events show amplitudes no higher than a few 100 to 1000 nm s−1. Phases cannot be identified, instead, the waveforms feature repeating, intricate spikes or jolts with prominent scattering. Individual wave packets, which can be tracked, return apparent velocities below 2.0 km s−1.
Confirmed rockfall events. Signals generated by rockfalls resemble ETS-like signals (compare Fig. 5b and d with Fig. 6b and d (top panel)). The impacts of falling blocks produce spikes or jolts in the waveforms; loose material saltation and flow combined with the moving character of the source increase waveform intricacy. Signal duration and dominant frequency, as well as waveform amplitude attenuation patterns vary significantly depending on the size of the rockfall event and its distance from the recording seismic network. Apparent velocities derived for individual impact signals remain below 2.0 km s−1. Because rockfalls are exogenic, potential source areas are known from field observations. In addition, the signal source can eventually be caught by field observations or remote sensing. At SZ10, one landslide-induced tremor signal could be matched with a single-marl block failure event captured in high-repetition rate UAV imagery (unmanned aerial vehicle) and optical ground-based images (Rothmund et al., 2017).
Harmonic tremors. Signals lasting a few seconds and consisting of narrow frequency band harmonic peaks were observed at SZ10, PG15 and PG16 (Fig. 5a, c and 6c). The main harmonic is generally found around 8–10 Hz, followed by several multiples of lower energies (Fig. 6c, amplitude spectrum). Maximum absolute zero-to-peak amplitudes do not exceed a few 100 to 1000 nm s−1, and most signals lie barely above the noise threshold. At SZ10, harmonic tremors were only observed at single sensors. At Pechgraben, harmonic tremors were detected with various waveform amplitude attenuation patterns across the seismic network, suggesting a non-unique source location origin for these signals. Because of the harmonics, apparent velocities are difficult to calculate. For high-SNR signals, apparent velocities calculated with the first arrivals derived velocities of less than 0.7 km s−1. Harmonic tremors typically occur in minute-long lasting sequences, alternating with ETS-like signals (Fig. 4a–c).
Dispersive tremors. Several instances of long-duration (few minute long) dispersive tremor-like signals were detected at SZ10, PG15 and PG16. Due to the dispersive character of the signals, the waveforms and spectrograms feature important variations from one station to another; this rendered the events difficult to detect. Figure 7a shows an example of a dispersive tremor, which was well recorded across the seismic network at SZ10. The high amplitudes (> 20 000 nm s−1) and dominant frequency content above 50 Hz at station S3.7 (spectrogram, band-pass filtered waveforms and amplitude spectrum in Fig. 7a (top panel)) suggested a source origin close to that station. Then, with increasing distance to the most probable source area (source–receiver distances indications above the sonograms in Fig. 7a), the signals showed prominent dispersion and waveform amplitude attenuation. Apparent velocities calculated at the signal onset ranged from 0.3 to 0.5 km s−1, close to the velocity of sound in the air or velocities in the top most layer of the landslide (e.g., Tonnellier et al., 2013). The temporal evolution of the dominant frequency content of the signals and the waveform envelopes, well observed in the spectrograms of Fig. 7 and in the waveforms of Fig. 8a, show similarities to signals produced by mass movement (e.g., Yamasato, 1997; Biescas et al., 2003) or by people walking around the seismic network (waveforms in Fig. 8a–b and spectrogram in Fig. 9a); this suggest a moving source.
External sources of microseismic noise and tremor-like radiations. Shallow installation of the seismometers in clayey materials result in important noise contamination of the seismograms, especially in the high-frequency range (> 50 Hz). The variety of events produced by external noise sources is large. Signals range from short to long duration. However, common to all signals is the absence of identifiable successive phases. Individual wave packets are difficult if not impossible to track. Thus, apparent velocities cannot be calculated. Maximum waveform amplitudes can reach several tens of thousands to hundreds of thousands of nanometers per second and waveform amplitude attenuation patterns are incoherent. The most common microseismic signals produced by external source of noise are presented in Figs. 8 and 9. Nearby (< 50–100 m) moving sources such as geophysicists walking around the study areas produce long-duration spiky tremor radiations (Fig. 8b). Typical of such local moving sources is the change towards higher-frequency content of the dominant energies of the signal as the source (the person walking) is approaching the recording station and the change towards lower-frequency content of the dominant energies of the signal as the source gets further away (sonogram and spectrogram in Fig. 9a). Distant moving sources such as airplanes and vehicles, produce long-duration cigar-shaped seismograms and spectrograms with typical gliding harmonics in the 50–200 Hz range (Figs. 7b, 8c and 9b). Beside anthropological noises, many environmental sources of noise were recorded but could not necessarily be distinguished in the absence of additional data at SZ10, PG15, and PG16. Wind bursts, rainfall and storms as well as water streams and bedload transport all produce long-duration tremor-like radiations. Maximum amplitudes can reach several tens of thousands of nanometers per second and waveform amplitude attenuation pattern across the seismic network is incoherent (Fig. 8d). These events illuminate either several frequencies or only specific frequencies in the spectrograms (see also Provost et al., 2017) and the spectrograms are clearly devoid of gliding harmonics (Fig. 9c–d).
5.1 Source location
Seismic velocities and source location quality can be estimated and verified using calibration shots or hammer blows. Calibration shots and hammer blows were carried out at SZ10 and PG16 and could be located with average accuracies of about ±50 m, when using all available first arrivals and back azimuth information with a half-space velocity model. Our results concur with previous results by Tonnellier et al. (2013) at the Super-Sauze landslide, where uncertainties of 40–60 m were estimated for calibration shots carried out within the seismic network. It is worth mentioning that this corresponds to the size of the seismic network and scales with regard to the landslide dimension. Thus, even if the seismic network is dense, locating landslide-induced microseismic sources in clayey landslides and discriminating between a source originating within or outside of the landslide body is challenging due to the following: (1) The velocity structures show drastic variations over short distances (complex material mélange, topography), and also evolve with time (slope deformation, hydrological state). Thus, velocity models are only approximated by tomographic analysis for a specific time (Fig. 10a–b). (2) Scattering and attenuation of the waveforms result in low-SNR onsets where phases are difficult (if not impossible) to identify. (3) The seismic network geometry relative to the source is, in most natural cases, not optimal. (4) With an average station spacing of 5–50 m, as was the case in our study, most landslide-induced microseismic events show no more than four pieces of unambiguous phase information.
We used HypoLine (see Sect. 3) to simulate and graphically analyze the contribution of these parameters to the epicentral location solutions of the calibration shots (SISSY, Seismic Source Impulse System, developed by the LIAG, Leibniz-Institut für Angewandte Geophysik, Germany) at SZ10 (Fig. 10). Three layered vP velocity models simplified from Tonnellier et al. (2013) and featuring both higher and lower velocity contrasts between the landslide material and the sedimentary host rock were tested (Fig. 10a–b; Table 2). For each pair of first arrivals, the time-reversal hyperboles (hypolines) were computed at depth zero. To display the weight of phase uncertainties on the epicenter solutions, all hypolines were also computed for two shifted values of the first arrival by ±5 samples (Fig. 10c). An epicenter solution is found at the highest concentration of hyperboles intersections (see Joswig, 2008 and Vouillamoz et al., 2016 for details). The exercise was carried out for the three velocity models and the resulting epicenter solutions were analyzed for different station combinations. Figure 10d shows the results obtained when using first arrivals of the three seismic arrays individually. The outcomes of this analysis can be summarized as follows:
The applied velocity model has a low impact on the epicentral solution (a few meters) within the considered station network or at small distances. However, outside of the seismic network, solutions diverge significantly.
Five samples (±) uncertainties at 1000 Hz correspond to a high-quality phase onset pick in routine earthquake catalogs (e.g., Diehl et al., 2009). Such high-quality phase onsets derive consistent solutions within the considered station network, but the solutions also diverge significantly outside of the considered seismic network.
First arrivals of natural sources are of lower quality than those of calibration shots (Fig. 10c). Lower quality onsets have an important impact on the epicentral solutions. At ±20 samples (±0.02 s), a mathematical solution is no longer found!
The seismic network geometry relative to the source has the most significant influence on the location solution. The epicenter is resolved with uncertainties of about 20 m when using a set of stations surrounding the calibration shot (Fig. 10d (central panel)); however, the potential location solutions are biased by 50 m or more when using a station network that does not surround the source (Fig. 10d (left and right panels)).
First arrivals at stations in tripartite configurations derive three zones of high-density hyperbole intersections that cannot be discriminated without additional constraints, such as back azimuth information (beam-processing).
Complex velocity structures and the resulting waveform scattering impedes array processing, and back azimuth information can be significantly biased. The calibration datasets at Super-Sauze and Pechgraben derive uncertainties in the order of one quadrant (±45∘) for well constrained beams (using high correlation values of four and more coherent waveform spikes), for sources located 50–100 m outside of the seismic mini-array.
Sources originating within the seismic network return incoherent array processing and back azimuth data.
Thus, it can be concluded that approximation in the velocity model, low-quality first arrivals and non-optimal seismic network geometry at clayey landslides, result in natural source location uncertainties ranging from tens of meters for sources originating within the seismic network to hundreds of meters for sources originating outside of the seismic network. Consequently, the risk of including biased data in maps of landslide-induced microseismicity is high. Moreover, the estimation of the local magnitude of a microseismic event has a logarithmic dependence on the source–receiver distance. Thus, high uncertainties (> 50–100 m) held in the source location can affect the magnitude calculation by several orders of magnitude units.
5.2 Amplitude attenuation pattern to constrain source–receiver distance
Because of the high uncertainties returned by arrival-time based approaches to event location, the drastic attenuation of waveform amplitude observed within the landslide body was used to constrain the source proximity of near-source area landslide-induced microseismic events. This information was then used in the calculation of events' local magnitudes. Distance attenuation data from the SISSY calibration shots and hammer blows at Super-Sauze and Pechgraben show that signals are strongly attenuated within the first 50 m. The water content of the landslide material influences the waveform amplitude attenuation: signals are less attenuated when dryer conditions prevail (Fig. 11a). This observation is consistent with laboratory experiments (e.g., Koerner et al., 1981). To quantify the waveform amplitude attenuation pattern of an event, we use the scatter about the median amplitude, S, which we compute for each trace that recorded a signal as follows:
where Asta is the station maximum absolute vertical trace amplitude of the signal in nm s−1 and Med(Asta) is the median value of all Asta where the signal was recorded. S values computed for the calibration dataset of Fig. 11a show a drastic diminution with increasing source–receiver distance (Fig. 11b). Based on these observation, we use maximum S values of landslide-induced microseismic events to approximate source–receiver distances. We infer that S values higher than 200 % correspond to source–receiver distance of less than about 50 m. At smaller distances, we selected thresholds (in an arbitrary, but conservative way) of 1000 and 2000 % to correspond to source–receiver distances of about 20 and 10 m from the recording station, respectively. Source distances of natural events for which S values remain below 200 % are considered uncertain. Since S values of teleseisms and distant earthquakes were observed to be very stable (< 100 %), no correction for site effects was applied. Among the inferred landslide-induced microseismic events (quakes and tremors), 48 % of events at SZ10, 24 % at PG15 and 39 % at PG16 feature at least one station with a scatter about the median amplitude value above 200 %. With an estimated source-receiver distance of less than about 50 m, these events can be reasonably assumed to have originated within the landslide body or at its edges (see Sect. 6.3); therefore, they are used in the local magnitude catalog of landslide-induced microseismic events.
5.3 Calibrating the local magnitude (ML) scale at clayey landslides
Richter (1958) defines the earthquake local magnitude scale ML as follows:
where AWA is originally half of the maximum peak-to-peak amplitude (in microns) recorded on a Wood–Anderson (WA) seismograph, and log10(A0) is the distance attenuation function i.e., a correction applied for the attenuation of the waveforms with distance. The scale is defined so that a ML 3 earthquake records a 1 mm peak amplitude on a WA seismograph at a source–receiver distance of 100 km. The distance attenuation function of the ML scale has been empirically calibrated for earthquakes in many regions around the world (e.g., Bakun and Joyner, 1984; Hutton and Boore, 1987; Stange, 2006; Edwards et al., 2015); however, standard calibrated source–receiver distances range from 10 to 1000 km (Fig. 12a). Therefore, these distance attenuation functions are unappropriated for near-source area microseismic events at landslides. Wust-Bloch and Joswig (2006) calibrated a distance attenuation function within 30–300 m for sinkhole events in the Dead Sea valley. Its slope is very similar to extrapolated distance attenuation functions at distances of less than 1 km (Fig. 12b).
We calibrated ML in clayey landslides (ML−LS) by defining the slope and the intercept of the simplest form of the distance attenuation function:
where log10(A0−LS) is the distance attenuation function in landslides and D is the source–receiver distance in kilometers. The slope is defined using the MATLAB® logfit function (© 2014, Jonathan C. Lansey), which returns a regression in the form Y=10interceptXslope for the calibration datasets presented in Fig. 11a. An average slope value of −1.75 is found for the different regression curves and taken for log10(A0−LS) (Fig. 12b).
The intercept of log10(A0−LS) is then calculated as follows:
The theoretical moment magnitude Mw of a SISSY calibration shot is estimated following the Gutenberg–Richter magnitude energy relation, where log.8 – E being the radiated seismic energy in ergs. Using E=240 kJ (SISSY product information sheet), we find .39.
Following Deichmann (2017), we derive the ML of a SISSY shot as .58.
The intercept of log10(A0−LS) is found using .58 with the mean slope of the regression curves (−1.75) and the average maximum absolute vertical trace zero-to-peak amplitude of the calibration shots at 1 m of source–receiver distance: (ALS=5e106 nm s−1).
The calibrated local magnitude scale ML−LS in clayey landslides is finally expressed as
where ALS is the maximum absolute vertical trace zero-to-peak amplitude of the signal in nm s−1 and D is the source–receiver distance in kilometers.
The calibrated distance attenuation curves are steeper than the average slope of regional earthquakes' −log10(A0) curves (Fig. 12b). However, since no simple relation exist between AWA in millimeters (as used in the calculation of standard ML) and ALS in nanometers per second (as read on a detection trace in landslides), the comparison of standard distance attenuation functions log10(A0) with log10(A0−LS) is not straightforward. Well displayed in Fig. 12b, is the strong influence various water saturation levels of landslide material prevailing during the different calibration measurements, which can result a bias of one order of magnitude or more at distances smaller than 100 m. The range of potential ML of landslide-induced microseismic events is evaluated in Fig. 13. ML−LS is plotted as a function of the amplitude read in nanometers per second using log(A0−LS) for three source–receiver distances (1, 10 and 100 m). Considering the range of observed signal amplitudes, the graphic shows that landslide-induced microseismicity must scale within about −3.0 < ML−LS < 1.0. This agrees with the potential magnitude range, which can be inferred from field observations and assumptions, where active seismogenic structures are expected to fall in the decimeter to meter range.
6.1 Passive seismic monitoring at clayey landslides
Progress in environmental seismology is driving geophysicists and seismologists into more and more exotic terrains. In this section we provide a few comments about seismic network deployment and optimization at active landslides, based on our experience. Tripartite seismic arrays are well-suited for apparent velocity and back azimuth determination of an incoming signal (e.g., Joswig, 2008; Vouillamoz, 2015; Sick, 2016), and provide key information about source location. Such arrays were used at both Super-Sauze and Pechgraben; however, due to the rugged and obstructed terrain, as one encounters at any active landslide site, it was not possible to deploy the tripartite arrays with their theoretical optimal geometry (equilateral triangles). Nevertheless, the arrays proved successful in deriving back azimuth and apparent velocity information, using a sampling rate of 400 Hz or more. The optimal array aperture was found between 5 and 10 m. Larger inter-distances at stations resulted in many small landslide-induced microseismic events not being recorded by all stations, thereby limiting their characterization. Seismic stations housed and installed on a concrete slab for long-term monitoring showed signals similar to those registered by seismic stations simply buried within the ground for short-term monitoring. No significant difference was observed between landslide-induced microseismic signals recorded by stations installed on the active part of the landslide and stations placed on the stable areas surrounding the landslide. Therefore, future efforts may consider installing the seismic network on the stable areas surrounding the landslide for long-term monitoring campaigns to avoid seismic station displacement and tilting.
6.2 Landslide-induced microseismic events detection and classification
Automatic detection algorithms are suitable for well-known routine seismic signatures but fail for unknown and unexpected low-SNR microseismic events. Therefore, in order to gain knowledge about existing landslide-induced microseismic event signatures we used an enhanced visualization alternative, where continuous seismic data were screened in the form of sonograms for visual pattern recognition (Joswig, 2008; Sick et al., 2012; Vouillamoz et al., 2016). We summarize the final decision tree applied to the microseismic event classification at clayey landslides in Fig. 14, using a minimal number of simple seismic features (described in Sect. 3): (1) a detection was declared for microseismic events observed at a minimum of three seismic stations. (2) A initial distinction was made between microseismic events featuring distinct wave packets and events consisting of incoherent sinusoidal signals. The latter gather external sources of tremor-like radiations such as gliding events (airplanes) and environmental noise (rain fronts, storms, wind, creeks and so on). (3) The decisive discriminating parameter for landslide-induced microseismic events is the slow apparent velocity of distinct wave packets. Events returning fast apparent velocities correspond to external seismic sources, i.e., near, local, regional earthquakes and teleseisms. (4) Unique events were distinguished from multiple events featuring repeated high-energy jolts, making the separation between microearthquake (type I, II and III) and landslide-induced tremors (ETS-like, rockfall, harmonic and dispersive). (5) The signal duration reflected the source proximity for unique events (the shorter the signal the closer the source). For multiple events, it provided an indication about the source size (longer signals carry more energy). (6) Important waveform amplitude attenuation patterns (S > 200 %) were evidence of a nearby source (source–receiver distance of less than about 50 m) (Sect. 5.2). This is consistent with the observation that near, local and regional earthquakes do not show S values above 200 %. Incoherent waveform amplitude patterns were typically observed for external sources of tremor radiations (gliding and environmental signals). (7) Characteristics in the frequency content such as dominant frequency above 50 Hz (e.g., band-pass filtered waveforms in Fig. 4a), harmonics (e.g., unfiltered waveform and amplitude spectrum in Fig. 6c), dispersive dominant energies (e.g., spectrograms in Fig. 7a), gliding frequencies (e.g., spectrogram in Fig. 8b) or multiple frequency bands (e.g., spectrograms in Fig. 8c) enabled the last specification regarding the end-member event classes. (8) Detected events were gathered in a final catalog of microseismicity at clayey landslides.
The shallow installation of seismic stations in the landslide body results in a high level of noise contamination in the data, rendering the detection and distinction of landslide-induced microseismic events and other environmental (or anthropological) sources difficult. Seismic signal signatures of proximal sources show important variations among different stations' records, as a function of changing source–receiver distance (e.g., Figs. 3a–b, 5a–c and 7). Despite this, many landslide-induced microseismic events were observed in temporal sequences, suggesting a common source process; although, a cross-correlation analysis performed in the time domain (1–30 Hz band-pass filter) returned no evidence of similar events among the considered sequences. This stresses the complexity and variability of signals radiated by near-source area microseismic processes at clayey landslides. Individual microseismic sources can also occur simultaneously on a complex debris slide; therefore leading to time-overlapping tremor signals with hybrid characteristics, where individual source radiations cannot be unambiguously separated. For example, several quake doublets (type II and III), similar to short-duration ETS-like signals were observed at both landslides. At Pechgraben, frequent near quakes (type I and II) featuring short-duration harmonics were observed. Thus, we conclude that an unequivocal classification of landslide-induced microseismic signals is possible for well-defined, high-quality end-member signals. For complex and hybrid events, input from the analyst is still required and larger datasets are needed, in particular to train automated classifiers.
6.3 Landslide-induced microseismic event location and interpretation
Due to the high uncertainties – scaling with the landslide dimension itself – of arrival-time based source location of landslide-induced microseismic events (Sect. 5.1), the source–receiver distance of landslide-induced microseismic events was qualitatively constrained; this was undertaken using amplitude information and no maps of landslide-induced microseismicity were produced. Events featuring S values above 200, 1000 and 2000 % were inferred to have been recorded at a source–receiver distance of less than about 50, 20 and 10 m, respectively, according to calibration tests performed at both landslides (Sect. 5.2). For these near-source area microseismic events, observations of high-SNR signal spectral content above 50 Hz in the band-pass filtered waveforms or in the amplitude spectrum corroborated a nearby source.
Quake events are inferred to be generated by a single rupture process. Type I and type II quakes feature S values above 200 % and signal durations of less than 2 s. Thus, they are considered to be generated over distances of less than 50 m. The slow apparent velocities (< 2.0 km s−1) of the signals are consistent with velocities estimated for clay-rich landslide material (Williams and Pratt, 1996; Tonnellier et al., 2013) and corroborate a source originating within or at the edge of the landslide body. However, one cannot discriminate between the two, because location uncertainty is too high and depth estimation is not possible. S values above 1000 %, higher-frequency content, shorter signal duration and few station records of type I events (Fig. 4a and e) likely reflect a small and very close source (< 10–20 m). Low-frequency content and longer duration of type II events may account for slower rupture velocity and larger rupture area (Fig. 4b). Type III and type IV events feature S values which are below 200 % and represent a continuous transition of quake events recorded at larger source–receiver distances. The higher apparent velocities of wave packets of type IV events and the consistent signal amplitudes of well distinguishable successive phases across the seismic network suggest a source origin outside of the landslide body in the host rock.
The complexity and frequent hybrid characteristics of observed tremor signals make their interpretation challenging. Previous studies interpreted ETS-like signals as being generated by stick-slip (near-repeating quakes) at shear boundaries of the landslide or through fissure development or clogging at the landslide surface (e.g., Gomberg et al., 2011; Walter et al., 2012; Tonnellier et al., 2013). At Super-Sauze and Pechgraben, ETS-like events were mainly observed to occur in temporal sequences; at Pechgraben, alternately with harmonic tremors. Models to explain harmonic tremors include resonance of fluid/gas driven cracks (e.g., Chouet, 1988; Schlindwein et al., 1995) as well as stick-slip (i.e., swarms of small repeating earthquakes) (e.g., Helmstetter et al., 2015; Lipovsky and Dunham, 2016). Therefore, we postulate stick-slip episodes as the most common source of ETS-like and harmonic tremor signal sequences but cannot exclude fissure formation or clogging as mechanisms which produce ETS-like signals. Rockfall events produce signals consisting of spikes and jolts, in some instance very similar to ETS-like tremors. Since potential source areas of rockfall can be observed in the field, multiple-spike microseismic signals returning back azimuth towards such areas can be classified as rockfall signals with good certainty. However, in the absence of additional constraints, an unambiguous classification of rockfall and ETS-like signal can be difficult, in particular when the signals are of low-quality. The dispersive character of waveforms and the dominant frequencies of dispersive tremors suggest a moving source (Sect. 4.3.2). Animals as a potential moving source can be excluded with good certainty, as signals triggered by animals show spikier patterns than human footsteps (Figs. 8b and 9a). The inferred source area of dispersive tremors is difficult to access at Super-Sauze and is extremely marshy at Pechgraben; furthermore, no animals or animal traces were be observed during the daytime. Debris flows were neither observed in the field nor in daily ground-based and UAV imagery and photo-monitoring in the affected areas. At SZ10, a secondary rotational slide and the opening of crown cracks were observed near the inferred source area during the signals detection period. Such a source mechanism would be compatible with field observations made in the potential source area of dispersive tremors at Pechgraben. Thus, we postulate rotational sliding initiation and/or opening of crown crack(s) as a potential source trigger for the dispersive tremors.
6.4 Landslide-induced microseismicity rates
Only near-source area quakes (type I and II) and tremor events (ETS-like, rockfall, harmonic and dispersive) with S > 200 % were used in the ML−LS catalog of landslide-induced microseismicity. This catalog was used to evaluate average daily rates of landslide-induced microseismicity to be compared to average daily displacement rates of the three seismic campaigns (Sect. 2). Figure 15 shows the temporal ML−LS distribution of the near-source area landslide-induced microseismic events for SZ10 (a), PG15 (b) and PG16 (c) and the cumulated number of event curves with ML−LS > −1 (d). The corresponding average daily landslide-induced microseismicity rates, for ML−LS > −1 and ML−LS > 0, show an increase with increasing average daily displacement rates of the three campaigns (Fig.15 (e)). No relationship was found between the energy radiated by local and regional earthquakes (maximum vertical trace absolute amplitude) and the occurrence of landslide-induced microseismic events. At all campaigns, temporal clustering of near-source area landslide-induced microseismic events was observed, especially for tremor signals. Sequences typically lasted a few minutes to a few hours and were followed by quiescent periods. However, higher resolution displacement data (< daily) is required to better decipher a potential correlation between displacement rates and landslide-induced microseismicity.
In this study, we propose a unified typology of microseismic signals observed at slow-moving clay-rich debris slides by comparing passive seismic recordings of three campaigns carried out at two landslides and using similar published case studies as a benchmark. The highly heterogenous and water-saturated states of the material within the slides result in strongly attenuated and scattered waveforms. Signals generally consists of complex and intricate surface waves, where P and S phases cannot be clearly distinguished and successive phase (or wave packet) onsets are difficult, if not impossible to pick. Therefore, simple waveform and spectral attributes of the signals were used for the classification (Sect. 3 and Fig. 14). The principal discriminating parameters we find to differentiate landslide-induced microseismic signals from unrelated external sources are as follows: (1) the low apparent velocity (< 2 km s−1) of trackable wave packets that applies for landslide-induced signals generated at source–receiver distances of 0–500 m (estimated); and (2) the prominent and consistent waveform amplitude attenuation patterns of near-source area events across the recording seismic network (Sect. 5.2). Despite the complexity of the waveforms, comparable landslide-induced microseismic signals were detected at both landslides, suggesting that similar microseismic source processes are taking place and that the method used is scalable and reproducible. Two main classes of landslide-induced signals were found: (1) quake-like signals and (2) a variety of tremor signals (Sect. 4.2–4.3). Because arrival-time based approaches to event location at clayey landslides result in an unacceptable level of location uncertainty, waveform amplitude attenuation patterns were used to better constrain source–receiver distances. This was undertaken by applying a distance attenuation function calibrated for clayey landslides, so that ML−LS could be computed for near-source area events (< about 50 m)(Sect. 5.3). Results show an increase in daily landslide-induced microseismicity rates with higher average daily displacement rates. Although much attention was paid to deriving unbiased magnitude catalogs, uncertainties are still high. In addition, the catalogs may be incomplete in the lower magnitude range due to incomplete datasets (see Sect. 2). Consequently, we did not derive b values.
Since passive seismic methods alone do not allow for a detailed characterization of microseismic source processes taking place at clayey landslides, seismic data should be supplemented with high spatial–temporal resolution remote sensing, geodetic, geotechnical, geophysical, meteorological and hydrological measurements. A major inconvenience is that ground-based measurements on landslides during the day result in high anthropological noise levels, corrupting a significant part of daytime seismic measurements. The seismic monitoring of SZ10, PG15 and PG16 was part of multidisciplinary field experiments and the future of this study involves a detailed comparison of microseismic measurements with the other acquired datasets. The aim of this work will be to precisely evaluate the degree to which the main limitation of passive seismic monitoring (high spatial uncertainty of the detected microseismic events and hence speculative sources characterization) can effectively be compensated for by remote sensing and other geodetic and geotechnical information. The landslide-induced microseismic event catalog also provides an initial signal library with which to train future automatic detection systems and classifiers of complex and hybrid microseismic signals at clayey landslides. In addition to the “random forest” supervised classifier already implemented by Provost et al. (2017) at Super-Sauze, unsupervised pattern recognition (e.g., Sick et al., 2015) or hidden Markov models (e.g., Hammer et al., 2012, 2013) should be tested and success rates as well as method reproducibility and scalability benchmarked.
The Super-Sauze and Pechgraben passive seismic datasets used in this study are stored at the Institute of Geophysics of the University of Stuttgart, Germany, in SEG-2 and MSEED data format. Requests to the data as well as the catalog of microseismic events can be addressed to the authors. Computations and plots were carried out in MATLAB® (https://www.mathworks.com/products/matlab.html, last access: 10 November 2017) under a campus license of the University of Stuttgart.
NV designed and performed the seismic field campaigns of Pechgraben 2015 and 2016 and processed the seismic data of Pechgraben 2015 and 2016 and Super-Sauze 2010. SR helped in the design and data acquisition of the seismic campaigns of Pechgraben 2016 and Super-Sauze 2010. She supported the seismic data processing and significantly contributed to the writing of this paper. MJ originated the multi-approach field campaign at Super-Sauze 2010. He hosted the postdoc project of NV and supported this research with discussion threads.
The authors declare that they have no conflict of interest.
This article is part of the special issue “From process to signal – advancing environmental seismology”. It is a result of the EGU Galileo conference, Ohlstadt, Germany, 6–9 June 2017.
This work was funded by an early postdoc mobility fellowship of the SNSF
(Swiss National Science Foundation, grant P2FRP2_158749).
Birgit Jochum, David Ottowitz and Robert Supper of the Geological Survey of
Austria in Vienna are warmly acknowledged for sharing datasets and providing
insightful tips and help with the field work in Pechgraben. Jon Mosar of the
Institute of Earth Sciences of the University of Fribourg, Switzerland is
thanked for lending seismometers and dataloggers for the Pechgraben seismic
campaigns. The authors are very grateful to Clément Hibert,
Jean-Philippe Malet and Floriane Provost of the EOST, University of
Strasbourg, France, for fruitful inputs to this project as well as for
sharing datasets and codes. The authors thank Marco Walter, Ulrich
Schwaderer and Patrick Blascheck of the Institute for Geophysics (IfG) of
the University of Stuttgart for their support at Super-Sauze 2010 seismic
monitoring campaign and their help in the microseismic data pre-process.
Juan-Carlos Santoyo Campus (IfG, University of Stuttgart) is warmly thanked
for his essential participation in the 2015 Pechgraben field campaign. The
authors would also like to acknowledge and express gratitude to the editor, Fabian Walter
(Laboratory of Hydraulics, Hydrology and Glaciology, ETH-Zurich,
Switzerland) and the two reviewers, Emma Suriñach (Department of Earth
and Ocean Dynamics. Faculty of Earth Sciences. University of Barcelona (UB))
and Andreas Köhler (Department of Geosciences, University of Oslo,
Norway) for their thorough reviews of this manuscript which have help to
improve the paper.
Edited by: Fabian Walter
Reviewed by: Emma Surinach and Andreas Köhler
Bakun, W. H. and Joyner, W. B.: The ML scale in Central California, B. Seismol. Soc. Am., 74, 1827–1843, 1984.
Battaglia, J.: Location of seismic events and eruptive fissures on the Piton de la Fournaise volcano using seismic amplitudes, J. Geophys. Res., 108, 2364, https://doi.org/10.1029/2002JB002193, 2003.
Battaglia, J., Aki, K., and Ferrazzini, V.: Location of tremor sources and estimation of lava output using tremor source amplitude on the Piton de la Fournaise volcano: 1. Location of tremor sources, J. Volcanol. Geoth. Res., 147, 268–290, https://doi.org/10.1016/j.jvolgeores.2005.04.005, 2005.
Beard, F. D.: Predicting slides in cut slopes, Western Construction, San Fransisco, 36, 72 pp., 1961.
Biescas, B., Dufour, F., Furdada, G., Khazaradze, G., and Suriñach, E.: Frequency Content Evolution of Snow Avalanche Seismic Signals, Surv. Geophys., 24, 447–464, https://doi.org/10.1023/B:GEOP.0000006076.38174.31, 2003.
Brückl, E. and Mertl, S.: Seismic monitoring of deep-seated mass movements, Disaster Mitigation of Debris Flows, Slope Failures and Landslides, Universal Academy Press, Inc. Tokyo, Japan, 571–580, 2006.
Brückl, E., Brunner, F. K., Lang, E., Mertl, S., Müller, M., and Stary, U.: The Gradenbach Observatory—monitoring deep-seated gravitational slope deformation by geodetic, hydrological, and seismological methods, Landslides, 10, 815–829, https://doi.org/10.1007/s10346-013-0417-1, 2013.
Cadman, J. D. and Goodman, R. E.: Landslide noise, Science, 158, 1182–1184, https://doi.org/10.1126/science.158.3805.1182, 1967.
Chouet, B.: Resonance of a Fluid-Driven Crack: Radiation Properties and Implications for the Source of Long-Period Events and Harmonic Tremor, J. Geophys. Res., 93, 4375–4400, 1988.
Deichmann, N.: Theoretical Basis for the Observed Break in ML/Mw Scaling between Small and Large Earthquakes, B. Seismol. Soc. Am., 107, 505–520, https://doi.org/10.1785/0120160318, 2017.
Diehl, T., Kissling, E., Husen, S., and Aldersons, F.: Consistent phase picking for regional tomography models: application to the greater Alpine region, Geophys. J. Int., 176, 542–554, https://doi.org/10.1111/j.1365-246X.2008.03985.x, 2009.
Eberhardt, E., Spillmann, T., Maurer, H., Willenberg, H., Loew, S., and Stead, D.: The Randa Rockslide Laboratory: Establishing brittle and ductile instability mechanisms using numerical modelling and microseismicity, 9th International Symposium of Landslides, Rio de Janeiro, A. A. Balkema, Leiden, 481–487, 2004.
Edwards, B., Kraft, T., Cauzzi, C., Kastli, P., and Wiemer, S.: Seismic monitoring and analysis of deep geothermal projects in St Gallen and Basel, Switzerland, Geophys. J. Int., 201, 1022–1039, https://doi.org/10.1093/gji/ggv059, 2015.
Eibl, E. P. S., Lokmer, I., Bean, C. J., Akerlie, E., and Vogfjörd, K. S.: Helicopter vs. volcanic tremor: Characteristic features of seismic harmonic tremor on volcanoes, J. Volcanol. Geoth. Res., 304, 108–117, https://doi.org/10.1016/j.jvolgeores.2015.08.002, 2015.
Eibl, E. P. S., Lokmer, I., Bean, C. J., and Akerlie, E.: Helicopter location and tracking using seismometer recordings, Geophys. J. Int., 209, 901–908, https://doi.org/10.1093/gji/ggx048, 2017.
Fischer, T., Roth, M., and Kühn, D.: Seismic monitoring of a rock slope Åknes, Norway: time-reversal localization of seismic activity, Geophys. Res. Abstr., 16, 1610108F, 2014.
Gance, J., Malet, J.-P., Supper, R., Sailhac, P., Ottowitz, D., and Jochum, B.: Permanent electrical resistivity measurements for monitoring water circulation in clayey landslides, J. Appl. Geophys., 126, 98–115, https://doi.org/10.1016/j.jappgeo.2016.01.011, 2016.
Gomberg, J., Bodin, P., Savage, W., and Jackson, M. E.: Landslide faults and tectonic faults, analog?: The Slumgullion earthflow, Colorado, Geology, 23, 41–44, 1995.
Gomberg, J., Schulz, W., Bodin, P., and Kean, J.: Seismic and geodetic signatures of fault slip at the Slumgullion Landslide Natural Laboratory, J. Geophys. Res., 116, B09404, https://doi.org/10.1029/2011JB008304, 2011.
Hammer, C., Beyreuther, M., and Ohrnberger, M.: A Seismic-Event Spotting System for Volcano Fast-Response Systems, B. Seismol. Soc. Am., 102, 948–960, https://doi.org/10.1785/0120110167, 2012.
Hammer, C., Ohrnberger, M., and Fah, D.: Classifying seismic waveforms from scratch: a case study in the alpine environment, Geophys. J. Int., 192, 425–439, https://doi.org/10.1093/gji/ggs036, 2013.
Helmstetter, A. and Garambois, S.: Seismic monitoring of Séchilienne rockslide (French Alps): Analysis of seismic signals and their correlation with rainfalls, J. Geophys. Res., 115, F03016, https://doi.org/10.1029/2009JF001532, 2010.
Helmstetter, A., Moreau, L., Nicolas, B., Comon, P., and Gay, M.: Intermediate-depth icequakes and harmonic tremor in an Alpine glacier (Glacier d'Argentière, France): Evidence for hydraulic fracturing?, J. Geophys. Res.-Earth, 120, 402–416, https://doi.org/10.1002/2014JF003289, 2015.
Hotovec, A. J., Prejean, S. G., Vidale, J. E., and Gomberg, J.: Strongly gliding harmonic tremor during the 2009 eruption of Redoubt Volcano, J. Volcanol. Geoth. Res., 259, 89–99, https://doi.org/10.1016/j.jvolgeores.2012.01.001, 2013.
Hungr, O., Leroueil, S., and Picarelli, L.: The Varnes classification of landslide types, an update, Landslides, 11, 167–194, https://doi.org/10.1007/s10346-013-0436-y, 2014.
Hutton, L. K. and Boore, D. M.: The ML scale in southern California, B. Seismol. Soc. Am., 77, 2074–2094, 1987.
Jolly, A. D., Thompson, G., and Norton, G. E.: Locating pyroclastic flows on Soufriere Hills Volcano, Montserrat, West Indies, using amplitude signals from high dynamic range instruments, J. Volcanol. Geoth. Res., 118, 299–317, 2002.
Jones, G. A., Kulessa, B., Doyle, S. H., Dow, C. F., and Hubbard, A.: An automated approach to the location of icequakes using seismic waveform amplitudes, Ann. Glaciol., 54, 1–9, https://doi.org/10.3189/2013AoG64A074, 2013.
Joswig, M.: Pattern recognition for earthquake detection, B. Seismol. Soc. Am., 80, 170–186, 1990.
Joswig, M.: Automated classification of local earthquake data in the BUG small array, Geophys. J. Int., 120, 262–286, 1995.
Joswig, M.: Pattern recognition techniques in seismic signal processing, in: Proc. 2. workshop AI in seismology and engineering seismology, Cahiers Centre Europ. Geodyn. Seism., 12, 37–56, 1996.
Joswig, M.: Nanoseismic monitoring fills the gap between microseismic networks and passive seismic, special topic, Leveraging Technology, first break, 26, 117–124, 2008.
Jurich, D. M. and Miller Russell, J.: Acoustic monitoring of landslides, Geotechnology, Transport. Res. Rec., 1119, 30–38, 1987.
Koerner, R. M., McCabe, W. M., and Lord, A. E.: Acoustic Emission Behavior and Monitoring of Soils, in: Acoustic Emissions in Geotechnical Engineering Practice, edited by: Drnevich, V. P. and Gray, R. E., ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959, 93-93-49, 1981.
Kumagai, H., Palacios, P., Maeda, T., Castillo, D. B., and Nakano, M.: Seismic tracking of lahars using tremor signals, J. Volcanol. Geoth. Res., 183, 112–121, https://doi.org/10.1016/j.jvolgeores.2009.03.010, 2009.
Lacroix, P. and Helmstetter, A.: Location of Seismic Signals Associated with Microearthquakes and Rockfalls on the Sechilienne Landslide, French Alps, B. Seismol. Soc. Am., 101, 341–353, https://doi.org/10.1785/0120100110, 2011.
Lindner, G., Schraml, K., Ottowitz, D., Jochum, B., Gruber, H., and Tartarotti, T.: Monitoring im Bereich des Erdschuttstroms Pechgraben (Oberösterreich): Methodik und Ergebnisse, Journal for Torrent, Avalanche, Landslide and Rock Fall, 73, 19 pp., 2014.
Lindner, G., Schraml, K., Mansberger, R., and Hübl, J.: UAV monitoring and documentation of a large landslide, Appl. Geomat., 8, 1–11, https://doi.org/10.1007/s12518-015-0165-0, 2016.
Lipovsky, B. P. and Dunham, E. M.: Tremor during ice-stream stick slip, The Cryosphere, 10, 385–399, https://doi.org/10.5194/tc-10-385-2016, 2016.
Malet, J.-P., Laigle, D., Remaître, A., and Maquaire, O.: Triggering conditions and mobility of debris flows associated to complex earthflows, Geomorphology, 66, 215–235, https://doi.org/10.1016/j.geomorph.2004.09.014, 2005.
Mertl, S. and Brückl, E.: Observation of fracture processes in creeping rock masses by seismic monitoring, in: Proceedings of 11th Congress of the ISRM, Lisbon, Portugal, 9–13 July 2007.
RESIF: French Multidisciplinary Observatory of Versant Instabilities; RESIF – Réseau Sismologique et géodésique Français, https://doi.org/10.15778/RESIF.MT, 2006.
Provost, F., Hibert, C., and Malet, J.-P.: Automatic classification of endogenous landslide seismicity using the Random Forest supervised classifier, Geophys. Res. Lett., 44, 113–120, https://doi.org/10.1002/2016GL070709, 2017.
Richter, C. F.: Elementary Seismology, W.H. Freeman and Co., San Fransisco, 1958.
Röösli, C., Walter, F., Husen, S., Andrews, L. C., Lüthi, M. P., Catania, G. A., and Kissling, E.: Sustained seismic tremors and icequakes detected in the ablation zone of the Greenland ice sheet, J. Glaciol., 60, 563–575, https://doi.org/10.3189/2014JoG13J210, 2014.
Roth, M., Dietrich, M., Blikra, L. H., and Lecomte, I.: Seismic monitoring of the unstable rock slope site at Aknes, Norway, NORSAR Report, Oslo, 2005.
Rothmund, S., Vouillamoz, N., and Joswig, M.: Mapping slow-moving alpine landslides by UAV — Opportunities and limitations, The Leading Edge, 36, 571–579, https://doi.org/10.1190/tle36070571.1, 2017.
Schlindwein, V., Wassermann, J., and Scherbaum, F.: Spectral analysis of harmonic tremor at Mt. Semeru volcano, Indonesia, Geophys. Res. Let., 22, 1685–1688, 1995.
Sick, B.: Temporal and spectral pattern recognition for detection and combined network and array waveform coherence analysis for location of seismic events, Thesis, Institute for Geophysics, University of Stuttgart, Stuttgart, Germany, 225 pp., 2016.
Sick, B., Walter, M., and Joswig, M.: Visual Event Screening of Continuous Seismic Data by Supersonograms, Pure Appl. Geophys., 171, 549–559, https://doi.org/10.1007/s00024-012-0618-x, 2012.
Sick, B., Guggenmos, M., and Joswig, M.: Chances and limits of single-station seismic event clustering by unsupervised pattern recognition, Geophys. J. Int., 201, 1801–1813, https://doi.org/10.1093/gji/ggv126, 2015.
Spillmann, T., Maurer, H., Green, A. G., Heincke, B., Willenberg, H., and Husen, S.: Microseismic investigation of an unstable mountain slope in the Swiss Alps, J. Geophys. Res., 112, B07301, https://doi.org/10.1029/2006JB004723, 2007.
Stange, S.: ML Determination for Local and Regional Events Using a Sparse Network in Southwestern Germany, J. Seismol., 10, 247–257, https://doi.org/10.1007/s10950-006-9010-6, 2006.
Tonnellier, A., Helmstetter, A., Malet, J.-P., Schmittbuhl, J., Corsini, A., and Joswig, M.: Seismic monitoring of soft-rock landslides: the Super-Sauze and Valoria case studies, Geophys. J. Int., 193, 1515–1536, https://doi.org/10.1093/gji/ggt039, 2013.
Unglert, K. and Jellinek, A. M.: Volcanic tremor and frequency gliding during dike intrusions at Kılauea – A tale of three eruptions, J. Geophys. Res.-Sol. Ea., 120, 1142–1158, https://doi.org/10.1002/2014JB011596, 2015.
van Herwijnen, A. and Schweizer, J.: Monitoring avalanche activity using a seismic sensor, Cold Reg. Sci. Technol., 69, 165–176, https://doi.org/10.1016/j.coldregions.2011.06.008, 2011.
Vouillamoz, N.: Microseismic characterization of Fribourg area (Switzerland) by Nanoseismic Monitoring, Thesis, Department of Geosciences – Unit of Earth Sciences, University of Fribourg, Fribourg, Switzerland, 270 pp., 2015.
Vouillamoz, N., Wust-Bloch, G. H., Abednego, M., and Mosar, J.: Optimizing Event Detection and Location in Low-Seismicity Zones: Case Study from Western Switzerland, B. Seismol. Soc. Am., 106, 2023–2036, https://doi.org/10.1785/0120160029, 2016.
Walter, F., Burtin, A., McArdell, B. W., Hovius, N., Weder, B., and Turowski, J. M.: Testing seismic amplitude source location for fast debris-flow detection at Illgraben, Switzerland, Nat. Hazards Earth Syst. Sci., 17, 939–955, https://doi.org/10.5194/nhess-17-939-2017, 2017.
Walter, M. and Joswig, M.: Seismic monitoring of fracture processes generated by a creeping landslide in the Vorarlberg Alps, First Break, 26, 131–135, 2008.
Walter, M. and Joswig, M.: Seismic characterization of slope dynamics caused by softrock-landslides: the Super-Sauze case-study, in: Proceedings of the International Conference on Landslide Processes: from geomorphologic mapping to dynamic modelling, edited by: Malet, J.-P., Remaître, A., and Boogard, T. A., CERG Editions, Strasbourg, 215–220, 2009.
Walter, M., Walser, M., and Joswig, M.: Mapping Rainfall-Triggered Slidequeakes and Seismic Landslide-Volume Estimation at Heumoes slope, Vadose Zone J., 10, 487–495, 2011.
Walter, M., Arnhardt, C., and Joswig, M.: Seismic monitoring of rockfalls, slide quakes, and fissure development at the Super-Sauze mudslide, French Alps, Eng. Geol., 128, 12–22, https://doi.org/10.1016/j.enggeo.2011.11.002, 2012.
Williams, R. A. and Pratt, T. L.: Detection of the base Slumgullion landslide, Colorado, by seismic reflection and refraction methods, in: The Slumgullion Earth Flow: A Large-Scale Natural Laboratory, edited by: Varnes, D. J., and Savage, W. Z., U.S. Geol. Surv. Bull., 2130, 77–84, 1996.
Wust-Bloch, G. H. and Joswig, M.: Pre-collapse identification of sinkholes in unconsolidated media at Dead Sea area by “nanoseismic monitoring” (graphical jackknife location of weak sources by few, low-SNR records), Geophys. J. Int., 167, 1220–1232, https://doi.org/10.1111/j.1365-246X.2006.03083.x, 2006.
Yamasato, H.: Quantitative Analysis of Pyroclastic Flows Using Infrasonic and Seismic Data at Unzen Volcano, Japan, J. Phys. Earth, 45, 397–416, 1997. | <urn:uuid:15f280c3-5c53-4dcd-b099-4742fd1dbbaf> | CC-MAIN-2022-33 | https://esurf.copernicus.org/articles/6/525/2018/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.884732 | 19,645 | 1.976563 | 2 |
Coronavirus: Social media influencers like Kylie Jenner could be the ones to save us all in time of pandemic
The US Surgeon General has asked influencers like Kylie Jenner to help the younger generation understand the seriousness of coronavirus. Will the COVID-19 scare help the world realize the true importance of influencer culture?
These are strange apocalyptic times we are living through. So it doesn't seem bizarre to note that the ones to save the millennials and the even younger Gen Z from the coronavirus pandemic could be influencers like Kylie Jenner.
The US Surgeon General Jerome Adams called in for a chat about the novel coronavirus on 'Good Morning America' on March 19. Adams called on social media influencers, including the likes of Kylie Jenner and NBA player Kevin Durant, to use their influencer power for the benefit of humanity: well, the younger ones — millennials and young people — especially, to understand the seriousness of the disease.
His plea comes after reports that "spring breakers" are ignoring strictures about congregating and partying in Miami, Florida. "If I get corona, I get corona. At the end of the day, I'm not going to let it stop me from partying," spring break goer Brady Sluder told Reuters.
Some millennials have also shirked orders to attempt "social distancing". A 21-year-old college student recently went viral on video-sharing app TikTok for trying to start the "coronavirus challenge," in which she filmed herself licking an airplane toilet seat.
How do we stop such madness?
One might argue that it just Darwinism at work, but these young men and women also have at-risk old folks back home — grandmothers and grandfathers — who they might unknowingly infect as carriers showing no symptoms.
The only voices that young people will listen to are people like Kylie Jenner.
Kylie Jenner has already become the youngest self-made billionaire on the back of her influencer game. Starting with ponying other people's products, she has gone on to creating a beauty empire. At just 21, Kylie Jenner is worth $1 billion, and her cosmetics company, Kylie Cosmetics, is valued at $900 million.
So if she tells the 21-year-old college student licking toilet bowls to cease, to desist, she might listen. The spring breakers might still not give a damn but it might start a discussion and get at least some of them to accept self-quarantined conditions, even if it is in hotel rooms.
Influencers have been labeled as the epitome of mindless consumerist culture till now — not without reason.
Influencer culture is all about getting young people to part with their money as quickly as possible. It's 'smoke and mirrors' aspirational illusions created through Instagram snaps and viral videos lean on their fanbase to buy into that lifestyle, into the culture showcased.
Right now, since being alive and healthy is a prerequisite to being sexy, Kylie Jenner could hawk the "culture of social distancing" to her fanbase.
For now, Kylie Jennee is sticking to posting inspirational Instagram messages to her 141 million followers. "Another daily reminder to take this social distancing serious and self-quarantine," she wrote. She also revealed how isolating herself during her pregnancy had trained her to cope with the coronavirus pandemic.
She has a vested interest in keeping as many of her followers alive so that they keep buying her products. So, maybe she could launch a sexy toilet or hand sanitizer. Or maybe a snap chat movie about staying home with family or live stream her online Netlix watch party. So many options really, and it is a win-win for everyone. Kylie Jenner makes money, more young people stay alive and infect fewer people and the US Surgeon General sees an improvement in the situation and maybe gets a whole night's sleep?
Maybe, this is the true purpose (and importance) of influencers. These are strange apocalyptic times we are living through indeed. | <urn:uuid:eb776144-ec11-4657-960a-5bd67b716c32> | CC-MAIN-2022-33 | https://meaww.com/coronavirus-social-media-influencers-kylie-jenner-save-us-all-pandemic-outbreak | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.959785 | 849 | 1.59375 | 2 |
The U.S. Department of Justice has found that the nation’s oldest and largest publicly funded voucher program violates Title II of the American’s with Disabilities Act by discriminating against children with disabilities. Milwaukee Parent Choice Program was started by a group of parents seeking high quality educational alternatives to their struggling public schools, but in 2011 Disability Rights Wisconsin partnered with the ACLU to file a complaint with the DOJ. The DOJ finding comes while the state is in the grips of a renewed storm around voucher expansion and an attempt to establish a special needs voucher specifically for children with disabilities. Advocates around the country can watch for the important lessons being learned in Wisconsin and other states facing similar assaults on the rights of children and families. Vouchers movements – or similarly structured attempts to use public funds for private settings – are gaining traction in many states.
The following comes from The Ability Center of Greater Toledo:
Separate Is Not Equal
In a letter released this week, the U.S. Department of Justice (DOJ) informed Wisconsin that its publicly-funded private school voucher program must comply with the Americans with Disabilities Act. In its letter, DOJ reminded Wisconsin that the state’s “obligation to eliminate discrimination against students with disabilities is not obviated by the fact that the schools participating in the program are private secular and religious schools.”
DOJ’s letter came in response to a June 2011 complaint from the ACLU, the ACLU of Wisconsin, and Disability Rights Wisconsin, alleging that the state’s program was violating the rights of students with disabilities by excluding most of them from the voucher program.
Milwaukee has been operating the country’s oldest voucher or “school choice” program, for twenty years, and the program was recently expanded to other Wisconsin cities. Very few students with disabilities in Milwaukee use private school vouchers, either because they perceive that the program is only for non-disabled students or because the schools themselves counsel children with disabilities out of the program. This has had the effect of segregating students with disabilities in the Milwaukee Public Schools, while cannibalizing the district’s resources through the diversion of money from the public schools to private institutions. Voucher programs, and to some extent, tax credit laws, which use public dollars for private education are becoming more popular in recent years.
There are now 20 states and the District of Columbia with either a tax credit for parents of students attending private schools, or voucher programs like the one in Wisconsin that give a student a taxpayer-funded voucher worth a certain amount – in this case approximately $6,500 — to pay private school tuition. These programs are touted as giving poor students, often in so-called “failing districts,” the same “choice” that wealthy students have. The problem is that these programs do not give poor students much choice at all.
Publicly-funded voucher programs have the effect of setting up a separate escape hatch for only a few, leaving the majority of the poor students in schools that are even less likely to succeed than they were before the voucher program or tax credit began. Furthermore, the private schools that spring up to educate a child for $6,500 are producing results that are no better than the public school district – in Milwaukee, for example, three years of comparison test scores show they are performing worse than the public system. We also know that the Milwaukee parents who take advantage of these programs tend to have higher education levels and children without disabilities, leaving the public school district with a higher percentage of children with disabilities and parents with less education. There are few checks in place to ensure that all of the schools accepting vouchers are more than glorified day care providing convenient hours for parents.
On top of that, some private schools in states like Georgia and Alabama, where tax credits have recently been put into place, were founded as segregation academies to thwart federal integration efforts. While the program in Milwaukee and its school district serve almost entirely students of color, as “school choice” spreads around the country, the stage is set for these programs to become even more exclusionary and segregated. We know this because Milwaukee’s voucher program already excludes students with disabilities and segregates them into the public school district while at the same time stripping the district of much needed funds to educate them. If we permit this to continue, we are condoning separate schools for a number of groups of students, including racial minorities, students with disabilities, religious minorities and LGBT students. What we have known for the fifty years since Brown v. Board of Education is that separate is not equal. School voucher programs and tax credits do not provide a choice for everyone. They create publicly funded separate schools. However, DOJ’s investigation and demand to Wisconsin is a step in the direction of ensuring that states are not permitted to create a civil rights vacuum by delegating public education to private schools. | <urn:uuid:1734362d-7fb4-4f91-a2d2-1b6db4a383fd> | CC-MAIN-2022-33 | https://tash.org/doj-nations-oldest-publicly-funded-voucher-program-in-violation-of-ada/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.969558 | 1,000 | 2.375 | 2 |
Corporate Tax Lawyers in Hamburg
A "corporation" in Hamburg, Pennsylvania is an organization formed under state law which is regarded a separate "person" from any of the people who run it.
This doctrine is recognized as "corporate personhood." While the concept is somewhat abstract, the law of Pennsylvania treats corporations as individual persons, for most purposes. This means that, legally, corporations have most of the same rights, privileges, and commitments as living, breathing human beings.
One of the major legal duties a corporation has is the requirement that it pay taxes on its income, just as a person would.
Corporate Tax Rate in Hamburg, Pennsylvania
Every profit-earning corporation in the U.S. must, legally, pay the federal corporate income tax. Many states further have their own corporate income tax, which corporations located in Hamburg, Pennsylvania have to remit.
Under federal laws that control corporate income taxes, corporations pay a different income tax rate from individual people. Corporations pay a maximum federal income tax rate of 35%, and a minimum rate of 15%, depending on their income. The high tax rate applies to corporations that make .3 million per year, and the low rate applies to any company bringing in less than ,000.
There's also a good chance that the tax rate applicable to corporations in Pennsylvania differ from the individual tax rates. Some states feel that the best economic policy is to attract as many businesses as they can. Therefore, in some states, the corporate tax rate is lower than the individual tax rate.
Corporations in Hamburg, Pennsylvania are obligated to pay both the state and federal corporate tax. Failing to pay either (or both) of these taxes can result in grave legal penalties, including fines that may prove ruinous, particularly for smaller businesses.
How Can a Hamburg, Pennsylvania Corporate Tax Lawyer Help?
Most extremely large corporations have tax attorneys and accountants on staff, as full-time employees, who help them stay in conformity with every applicable state and federal income tax laws.
But if you are the owner of a small corporation in Hamburg, chances are you don't have a full-service legal department on your payroll. Therefore, if you need help with your corporate taxes, it's essential that you speak with a lawyer in Hamburg, Pennsylvania who practices tax law. | <urn:uuid:dc7a8034-4202-41b7-8209-5e4846bdbe3f> | CC-MAIN-2022-33 | https://taxattorneys.legalmatch.com/PA/Hamburg/corporate-tax-lawyers.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.969525 | 475 | 1.546875 | 2 |
Journal Club Overview
This journal club provided an opportunity to dive into the literature on spatial thinking, particularly in the context of the geosciences, and to discuss it in depth with interested colleagues.
Journal Club Goals
Our goals were to:
- Explore the cognitive underpinnings of spatial thinking.
- Develop a more sophisticated understanding of the role that spatial thinking plays in geoscience learning and research.
- Develop a list of research-based recommended strategies for faculty teaching spatial thinking skills.
- Create a network of leaders in geoscience education and cognitive science who can increase our understanding of the role of spatial thinking in the geosciences.
Readings and Discussion Themes
- January: Cognitive aspects of spatial thinking
- Hegarty, 2010, Components of Spatial Intelligence. In B. H. Ross (Ed.), The Psychology of Learning and Motivation, v. 52, pp. 265-297. San Diego: Academic Press.
- Kozhevnikov et al., 2005, Spatial Versus Object Visualizers: A New Characterization of Visual Cognitive Style. Memory and Cognition, v. 33, n. 4, pp. 710-726.
- February: Spatial thinking within the STEM disciplines
- Uttal and Cohen, in press, Spatial Thinking and STEM Education: When, Why, and How? To appear in B. H. Ross (Ed.), The Psychology of Learning and Motivation.
- March: Spatial thinking training in the geosciences
- Piburn et al., 2005, The Role of Visualization in Learning From Computer-Based Images. International Journal of Science Education, v. 27, n. 5, pp. 513-527.
- The online tutorials developed by Steve Reynolds et al., described in the Piburn et al. article: Visualizing Topography and GeoBlocks 3D
- Titus and Horsman, 2009, Characterizing and Improving Spatial Visualization Skills. Journal of Geoscience Education, v. 57, n. 4, pp. 242-254.
- April: Navigation
- Ishikawa and Montello, 2006, Spatial knowledge acquisition from direct experience in the environment: Individual differences in the development of metric knowledge and the integration of separately learned places. Cognitive Psychology, v. 52, pp. 93-129.
- Liu, Levy, Barton and Iaria, 2011, Age and gender differences in various topographical orientation strategies. Brain Research, v. 1410, pp. 112-119.
- May: Recommendations for geoscience education research
- Piburn, Kraft, and Pacheco, 2011, A New Century for Geoscience Education Research. Prepared for the National Academies Board on Science Education Committee on the Status, Contributions, and Future Directions of Discipline-Based Education Research.
Meeting Dates and Times
- Dates: January 26, February 23, March 22, April 19, May 17
- Times: 10:00-11:00 Pacific | 11:00-12:00 Mountain | 12:00-1:00 Central | 1:00-2:00 Eastern
To facilitate a deep exploration of this topic, participants were expected to
- Digest the readings and post questions, comments, or thoughts on a discussion board each month
- Attend and contribute to all five discussion sessions
Application and Selection Criteria
Applications were due November 21, 2011. The journal club was limited to 10 participants. Participants were selected with the goal of assembling a group with expertise in spatial thinking in the geosciences and spatial cognition, as well as a spectrum of institutional settings and teaching experiences and a diversity of participants. Preference was given to applicants who hold faculty positions at colleges and universities and who can attend all five meetings. Applicants were notified of selection in December. For more information see our page on general information for Cutting Edge workshop participants. | <urn:uuid:f7a21cc6-d84f-4aed-aa08-a9dfab7f9617> | CC-MAIN-2022-33 | https://serc.carleton.edu/NAGTWorkshops/spatial/journalclub2012/overview.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00265.warc.gz | en | 0.886913 | 814 | 2.9375 | 3 |
For demagnetising workpieces, tools, dies, milling heads, etc.
In Verbindung mit Nullpunktspannsystemen.
In conjunction with zero-point workholding systems. Can be adapted to most systems.
For chucking medium to large parts for grinding, milling and EDM. Can be adapted to most zero-point workholding systems.
5-side processing is possible with the help of pole bars.
Primarily for horizontal machining of workpieces.
For horizontal milling and drilling processes.
Suitable for chucking thin, small, medium and large workpieces.
Primarily for EDM and grinding. Suitable for thin parts.
Neodymium-iron-boron magnets, extremely high adhesion force
Neodymium magnets, strengthened system
For chucking small and thin to medium workpieces.
For small and medium workpieces.
For workpieces that are difficult to clamp.
Zum Spannen von profilierten Werkstücken auf Magnet mit Parallelpolteilung.
For round and ring-shaped workpieces.
For placing on circular magnet SAV 244.06 with radial pole pitch
For workpieces which are difficult to chuck, e.g. Ferro-Tic and tungsten carbide with cobalt content. For small and very small workpieces.
For manual collet chucks as an auxiliary magnet for chucking small, delicate workpieces. Also suitable for fixtures and as a holding magnet.
For chucking small to large workpieces for grinding and turning.
Page 1 of 8 | <urn:uuid:881b244e-4a86-4495-a656-d567a5c88fa1> | CC-MAIN-2022-33 | https://www.sav.de/en/products | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.794814 | 339 | 1.523438 | 2 |
Today, Norway will start shutting down analog radio signals nationally, becoming the first nation in the world to broadcast digital radio only. The process will begin at 11:11AM local time (5:11AM ET) in Bodø, a town in the far north of the country, with the changeover expected to be finished by the end of the year.
Norway has offered both FM radio and Digital Audio Broadcasting (DAB) since 1995, but the country’s Ministry of Culture says the price of supporting the older format has become unreasonable. A combination of mountainous geography and a scattered population of some five million Norwegians makes reaching each citizen particularly costly. For an eighth of the price, says the Ministry, DAB will offer better audio quality and greater choice — more than 20 national channels as opposed to the five currently offered on FM. Local stations can also continue to broadcast on analog signals if they wish.
Many believe shutting down analog radio is the inevitable future, but the decision is not popular with the Norwegians themselves. Only 17 percent are in favor, while 66 percent oppose the move. Some of the main criticisms are that the changeover could compromise the capacity for emergency broadcasts, and that citizens aren’t technologically prepared. For example, only a third of cars in Norway (around two million) have DAB receivers, and buying an adaptor will cost drivers between 1,000 and 2,000 kroner ($115 to $230).
“Norway is a particularly bad country to test in as we have such high taxes on cars and therefore have so many old cars,” Sverre Holm, a professor in signal processing at the University of Oslo told the Financial Times. “It is against people’s DNA to pay for radio. So they have resisted it.”
Other countries will be watching closely to see what the effects of the decision are. The UK, for example, has said it will review the need to support FM radio once 50 percent of listeners use DAB, while the German government had planned to shut down analog radio in 2015 before politicians rejected the plans. | <urn:uuid:8c864c7a-483c-4395-98da-1cf4360cb9e9> | CC-MAIN-2022-33 | https://www.theverge.com/2017/1/11/14235996/fm-radio-shut-down-norway | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.96007 | 437 | 2.546875 | 3 |
5 Vital Characteristics of Effective Leadership
We live in the digital age. Today, tools and processes are ruling the workplace and humans play second fiddle to software and the internet. I strongly believe that technology is an enabler for becoming more efficient; it is not a replacement. In an organization, it is the people who make things happen. Leadership is what keeps the people motivated and focussed on the end goal.
Leadership is about taking learning a few levels higher
The transition from being an individual contributor to a leader is a tough one, as it needs a significant change in perspective. It should ideally be viewed as a start of a new journey and not as having arrived. Leaders have a greater responsibility towards building and disseminating knowledge across the hierarchy. So if anything they need to broaden their horizons and develop a greater appetite for learning newer skills, be it functional, technical or soft skills.
Leadership and learning are indispensable to each other. – Humble in learning – John F. Kennedy
Lead by example
Substance is what separates the leaders from the managers. Be it the army, the production line or the office floor, leaders who roll up their sleeves and get into the action themselves are the ones that get the job done. Respect cannot be bought, it needs to be earned. Leaders, therefore, need to be cognizant of the fact that exerting authority is not the best way to earn respect. They need to walk the line in front of the team, guiding them to the finish line, every minute of every day.
You don’t lead by pointing and telling people some place to go. You lead by going to that place and making a case. —Ken Kesey
Build a good work culture
With so much focus on getting the work done and meeting top line and bottom line targets, companies sometimes tend to put culture on the backburner. History will tell you ignoring culture has never worked out well for companies. Culture is that invisible glue that binds people, tools, and business objectives together. Leaders have a huge role to play in building and promoting a healthy work culture. Bill and Dave at HP, Jack Welch at GE, Richard Branson at Virgin group and Steve Jobs at Apple are just a few of the many leaders who have built billion dollar enterprises with culture as the backbone.
Speak softly and carry a big stick; you will go far – Theodore Roosevelt
As you grow, take others up with you
It is in the nature of power to breed competition and insecurity. True leaders know better than that. It’s simple really; a leader’s success depends on the success of the people that work with him/her. What better way to do that than to hire people who are better than you. Leaders are selfless when it comes to nurturing talent and giving people opportunities to grow. They, in turn, will do the same for others along the way.
I start with the premise that the function of leadership is to produce more leaders, not more followers. —Ralph Nader
Let’s face it; the workplace is not always fun and frolic. Some days are worse than the others. Leaders need to have the ability to put up a brave front in the face of adversity. The key is to learn from failure and keep those lessons handy for the future. Mindfulness helps leaders build a level of objectivity about situations and people relations and achieve the right balance. Meditation, Yoga, and Exercise are few the many ways one could adopt mindfulness as a way of life.
The challenge of leadership is to be strong, but not rude; be kind, but not weak; be bold, but not a bully; be thoughtful, but not lazy; be humble, but not timid; be proud, but not arrogant; have humor, but without folly. —Jim Rohn
One of the dictionary synonyms of manage is “cope”. In the organizational parlance, coping with a project or work when you have people looking up to you is just not enough. One needs to look beyond hierarchical aspirations and mundane fixations to evolve into a true leader, one that places purpose before oneself. | <urn:uuid:28e26af0-dd0c-4d02-a815-a649709817e8> | CC-MAIN-2022-33 | https://pitchrate.com/article/2636/5-vital-characteristics-of-effective-leadership.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.961531 | 871 | 2.1875 | 2 |
Tuberculin Skin Testing What is It? How is the TST Read?
The Mantoux tuberculin skin test (TST) is the
The skin test reaction should be read between 48
standard method of determining whether a person is
and 72 hours after administration. A patient who
infected with Mycobacterium tuberculosis. Reliable
does not return within 72 hours will need to be
administration and reading of the TST requires
standardization of procedures, training, supervision, andpractice.
The reaction should be measured in millimeters ofthe induration (palpable, raised, hardened area orswelling). The reader should not measure erythema
How is the TST Administered?
(redness). The diameter of the indurated area shouldbe measured across the forearm (perpendicular to
The TST is performed by injecting 0.1 ml of tuberculin
purified protein derivative (PPD) into the inner surfaceof the forearm. The injection should be made with atuberculin syringe, with the needle bevel facing upward. How Are TST Reactions Interpreted?
The TST is an intradermal injection. When placedcorrectly, the injection should produce a pale elevation of
Skin test interpretation depends on two factors:
the skin (a wheal) 6 to 10 mm in diameter.
Measurement in millimeters of the induration Person’s risk of being infected with TB and of
Classification of the Tuberculin Skin Test Reaction
An induration of 5 or more
An induration of 10 or more
An induration of 15 or more millimeters is considered positive in millimeters is considered positive in millimeters is considered positive in
– Persons with clinical conditions that
day of prednisone for 1 month orlonger, taking TNF-alpha antago-
What Are False-Positive Reactions? What is a Boosted Reaction?
Some persons may react to the TST even though they
In some persons who are infected with M. tuberculosis,
are not infected with M. tuberculosis. The causes of
the ability to react to tuberculin may wane over time.
these false-positive reactions may include, but are not
When given a TST years after infection, these persons
may have a false-negative reaction. However, the TST
Infection with nontuberculosis mycobacteria
may stimulate the immune system, causing a positive, or
boosted reaction to subsequent tests. Giving a second
Incorrect method of TST administration
TST after an initial negative TST reaction is called two-
Why is Two-Step Testing Conducted? What Are False-Negative Reactions?
Two-step testing is useful for the initial skin testing of
Some persons may not react to the TST even though
adults who are going to be retested periodically, such as
they are infected with M. tuberculosis. The reasons for
health care workers or nursing home residents. This
these false-negative reactions may include, but are not
two-step approach can reduce the likelihood that a
boosted reaction to a subsequent TST will be
Cutaneous anergy (anergy is the inability to
misinterpreted as a recent infection.
react to skin tests because of a weakenedimmune system)
Can TSTs Be Given To Persons
Recent TB infection (within 8-10 weeks of
Vaccination with live viruses may interfere with TST
reactions. For persons scheduled to receive a TST,
Recent live-virus vaccination (e.g., measles and
Either on the same day as vaccination with live-
Some viral illnesses (e.g., measles and chicken
At least one month after smallpox vaccination
Incorrect method of TST administration Incorrect interpretation of reaction
American Thoracic Society and CDC. Diagnostic
Who Can Receive a TST?
standards and classification of tuberculosis in adultsand children. Am J Respir Crit Care Med 2000; 161.
contraindicated only for persons who have had a severereaction (e.g., necrosis, blistering, anaphylactic shock, or
CDC. Guidelines for preventing the transmission of
ulcerations) to a previous TST. It is not contraindicated
Mycobacterium tuberculosis in health-care settings,
for any other persons, including infants, children,
2005. MMWR 2005; 54 (No. RR-17). www.cdc.gov/
pregnant women, persons who are HIV-infected, or
persons who have been vaccinated with BCG.
CDC. Mantoux Tuberculin Skin Test: Training Materi-als Kit (2003). How Often Can TSTs Be Repeated?
CDC. Targeted tuberculin testing and treatment of
In general, there is no risk associated with repeated
latent tuberculosis infection. MMWR 2000; 49 (No.
tuberculin skin test placements. If a person does not
return within 48-72 hours for a tuberculin skin test
reading, a second test can be placed as soon as possible. There is no contraindication to repeating the TST, unlessa previous TST was associated with a severe reaction.
Class-action suit is linked to man's efforts to uncover military's experimentation mystery |. Page 1 of 2 McClatchy Washington Bureau Class-action suit is linked to man's efforts to uncover military's experimentation mystery Martha Quillin | The News & Observer (Raleigh, N.C.) last updated: October 11, 2012 06:40:50 AM RALEIGH, N.C -- ] A North Carolina's man's quest to learn how
SALA DE LO CONSTITUCIONAL DE LA CORTE SUPREMA DE JUSTICIA: San Salvador, a las catorce horas y cinco minutos del día cuatro de enero de mil novecientos noventa y cuatro. El presente proceso de amparo ha sido promovido por ROBERTO MEZA DELGADO, ingeniero civil, mayor de edad, del domicilio de esta ciudad, contra el DIRECTORIO NACIONAL DEL PARTIDO DEMOCRATA CRISTIANO, que acto que estima violatori | <urn:uuid:e36d3709-d733-4154-bbc5-a2b7f2e2f003> | CC-MAIN-2022-33 | http://drugstorepdfsearch.com/g/gchd.net1.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.840313 | 1,386 | 2.5 | 2 |
There are many various kinds of artwork on this planet. Some artistic owners have even gone as far as to make their own art deco lamps themselves through the use of previous lamp stands and painting lamp shades in flashy geometric designs. The students had been capable of be taught based mostly on summary considering and discover the deeper meaning of the teachings ready by the academics. Pop artists changed all that by changing the monotony of art with humor and relevance to daily life.
Though this will not look like a giant increase, at- risk college students were able to use this type of learning to better understand their studying model thus bettering their learning patterns. These three reports are Coming to Our Senses, by the Arts, Schooling and People Panal (1977), Can we Rescue the Arts for American Kids, sponsored by the American Council for the Arts (1988), and the most revered examine, Toward Civilization, by the Nationwide Endowment for the Arts (1988).
It was then in comparison with these students who obtained laptop training which concerned no superb art parts. Academics have realized that the their artwork of educating is to shape and explore the needing minds of their students. Likewise, large websites dedicated to offering decorative accessories to dwelling homeowners have now started to include retro styled reproductions based on the designs first introduced in the thirties.
Authentic art is the one-of-a-kind portray or work executed by an artist. By working by the humanities, instead of concerning the arts, the scholars academic experience will be achieved otherwise than simply instructing the standard style of learning. A excessive finish junk artist named Gabriel Dishaw provides pieces from again within the mid 90s, and all are constituted of items of metal in addition to gears and wires in running shoes.
They consider the arts instruction as trainer-oriented initiatives used to entertain or train other disciplines (Berghoff, 2003, p. 12). Fractals – This form of digital art has been re-emerging after a time interval. A lot of the items utilized in creating this form of art are symbolic of our occasions and in due interval, shall be replaced by other materials. | <urn:uuid:f1f9403b-99ec-46d3-b53f-905efb57f7bf> | CC-MAIN-2022-33 | https://www.gf-ad.com/ideas-of-art.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.972272 | 434 | 2.4375 | 2 |
The delicious, fresh flavors of Greek cuisine in summer are a highlight of vacationing in Greece. The high quality ingredients and produce make Greece a paradise for foodies. Try the following recipes for a taste of Greek summer wherever you happen to be. Anthous gemistous, stuffed zucchini flowers, can be enjoyed as a vegetarian appetizer or main course. If picking your own zucchini flowers, make sure to do so early in the morning, so they stay open as long as possible. Give them a shake after picking in case any stray bees are caught inside. If some of the flowers seem to be wilting while you’re working on stuffing the others, place in cold water to revive them.
Anthous Gemistous- Stuffed Zucchini Flowers
20 anthous, zucchini flowers
1 1/2 cups rice
1 medium onion, grated
3 small-medium tomatoes, grated
4 tablespoons finely chopped fresh parsley
4 tablespoons finely chopped fresh mint
Greek sea salt to taste
Freshly ground pepper to taste
1/4 cup Greek extra virgin olive oil, plus 1-2 tablespoons for the pot
1 cup water
Rinse the flowers in cold water and remove the stems. Set aside to drain while preparing the filling. In a bowl, mix together the rice, onion, parsley, mint, tomatoes, salt and pepper, and about half of the 1/4 cup of olive oil.
Drizzle about 2 tablespoons of the olive oil to coat the bottom of a large deep pot or Dutch oven. Spoon about a teaspoon of the stuffing into each flower and fold over the ends of the petals. Place the stuffed flowers in the pot side by side in a circular pattern. One level is preferred but stacking them is fine as long as you monitor the water level carefully as they cook to make sure the bottom ones don’t overcook while the topmost remain undercooked.
Add the water to the pot, it should be about halfway up the anthous, and add the remaining olive oil. Place a plate on top to keep them submerged. Bring the pot up to a boil over medium high heat, then reduce to medium and simmer about 20 minutes or until the rice is cooked and most of the liquid absorbed. Serve warm or at room temperature.
Grilled Whole Fish
4 whole tsipoures (sea bream) 14 to 16 ounces each, gutted, and scaled, leaving head and skin intact
Greek sea salt and freshly ground black pepper to taste
1 cup Greek extra virgin olive oil, plus additional as needed
1/4 cup freshly squeezed lemon juice
2 tablespoons chopped fresh parsley leaves
1 small red onion, thinly sliced
Preheat the grill to medium-high. Rinse the fish under cold running water and pat dry with paper towels. Season the fish all over, inside and out, with salt and freshly ground black pepper. Brush each fish generously with 1/2 tablespoon of the olive oil and place directly on the prepared outdoor grill. Cook, turning occasionally with a fish spatula and brush with more olive oil as needed, until the fish flakes with a fork and is completely cooked, about 6 minutes on each side. Remove from grill, place on a plate, and set aside while mixing the remaining olive oil, lemon juice, parsley, and onion in a small bowl. Season with salt and pepper to taste. Drizzle the fish with the olive oil-lemon dressing just before serving. | <urn:uuid:feff59c9-c55f-402e-94e1-63dab0b69731> | CC-MAIN-2022-33 | https://rubbedindetroit.com/classic-greek-summer-recipes-to-enjoy-food-travel-food.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.91223 | 714 | 1.617188 | 2 |
A study permit is granted by the Immigration, Refugees, and Citizenship Canada (IRCC) to an international student to study in a Canadian University/College.
Student Direct Stream
The student direct stream provides a fast track process for students from few Asian countries to quickly avail the study permit and study in Canada.
Study Permit Extension
Canadian government is flexible to help international students to extend their study permit under some special considerations.
Change of DLI
DLI basically means you can change your University/College that you originally applied and joined to another University/College within Canada.
On Campus Work
Canada’s immigration friendly policy allows post-secondary students to work on the campus of their school or learning institute, without having the need to apply for a work permit.
Work off Campus
As an international student is allowed to work off campus and you can work off campus provided you meet certain conditions.
Coop Work Permit
Many colleges and educational institutions in Canada offer co-op or internship work programs for students to boost their knowledge and apply that knowledge in gaining real world industry
Spousal Work Permit
If you are an international student in Canada and you have your spouse or common-law partner living with you in Canada, they are eligible to work provided a work permit is approved. | <urn:uuid:0c9a6e99-af73-4638-bd3d-cfadabd7f945> | CC-MAIN-2022-33 | https://www.v9immigration.ca/study/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.940563 | 273 | 1.992188 | 2 |
As the world becomes more connected and networks continue to evolve, securing IT environments is becoming more complex than it once was. We are now facing Gen-V (5th Generation) of cyber-attacks, large scale attacks that quickly spread and move across attack vectors and industries. Gen V attacks are more sophisticated than ever, crossing mobile, cloud and networks, and bypassing conventional defenses that are based on detection. Separate IT environments often drive businesses to apply different point solutions, many of which are focused on detection and mitigation rather than prevention. This reactive approach to cyber – attacks is costly and ineffective, complicates security operations and creates inherent gaps in security posture, leaving you unprotected from sophisticated Gen-V attacks.
It’s time to step up to Gen V of cyber security, with the architecture that truly protects your entire IT infrastructure.
Check Point Infinity is the only fully consolidated cyber security architecture that protects your business and IT infrastructure against Gen V mega cyber-attacks across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. It provides complete threat prevention which seals security gaps, enables automatic, immediate threat intelligence sharing across all security environments, and a unified security management for an utmost efficient security operation.
Check Point Infinity delivers unprecedented protection against current and potential attacks—today and in the future. | <urn:uuid:e7e5592e-cfd2-459c-9073-1774bfcbd20f> | CC-MAIN-2022-33 | https://iridium.iq/it-solutions/security/checkpoint/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.948267 | 273 | 1.710938 | 2 |
Every Warhol You’d Ever Want to See
What is there left to say about Andy Warhol? He was one of a handful of 20th-century artists who truly became household names, like Picasso. He was a hugely successful pop artist in the 1960s, even if others like Robert Rauschenberg and Jasper Johns were more influential and inventive. His work captured the age, despite or because it often seemed commercial and cynical.
The full sweep of Warhol’s output is now on view in “Andy Warhol—From A to B and Back Again,” a sprawling exhibition at the San Francisco Museum of Modern Art. It’s an exhilarating—and exhausting—tour of more than 300 works, from paintings, drawings, and sculpture to film, video, books, and magazines. Organized by the Whitney Museum of American Art in New York, where the show ran from November through March, it’s a must-see.
Born Andrew Warhola and raised in a working-class Slovakian family in Pittsburgh, Andy was a shy, often sickly gay boy who studied art at Carnegie Institute of Technology. After college, he moved to New York in 1949 to become a commercial artist, creating fanciful drawings of women’s shoes, and began experimenting with his own artworks. (Perhaps reflecting his social ambitions, he also changed his name to Warhol and got a nose job.) By the late 1950s he was showing his own paintings and drawings in small galleries in New York.
The SFMOMA exhibition begins with Warhol’s breakthrough period in the early 1960s. There are drawings and paintings that riff on tabloid newspaper pages (“Pirates Sieze Ship,” “Sinatra and His Rat Pack”) and imagery from popular culture (Superman, Dick Tracy, Coke bottles, Brillo boxes, those Campbell’s Soup cans). This early work already includes his signature features: using photographs as the source for his paintings; repeating silkscreened images, with variations in color and saturation from one to the next; and a tongue-in-cheek tone that could be read as adulation or criticism of American postwar culture, or both.
The SFMOMA exhibition, across more than a dozen galleries, takes up style after style, theme after theme. First are the big silkscreens of celebrities such as Triple Elvis of 1963 (above), with three black-on-silver images of the singer dressed as a cowboy and pulling a six-shooter on the viewer, or Silver Marlon from the same year, a double image of the actor in a black leather jacket, sitting on his motorcycle in The Wild Bunch. (Warhol had a thing for celebrities.)
There are also female icons including Marilyn Monroe, Jackie Kennedy, and Elizabeth Taylor. Liz #6 (Early Colored Liz) is a classic example of the square silkscreen portraits that became his most famous, and lucrative, genre. Based on a film publicity photo, the actress offers an enigmatic smile and is rendered in four saturated colors: a rosy pink for the face, black for the hair and shadows, deep red for the lips and background, and a bit of green eye shadow.
Other themes are darker, including a room full of “death and disasters” such as electric chairs, taxi crashes, and police dogs attacking civil rights protesters. (Two galleries on separate floors from the main exhibition feature Warhol’s early work as a commercial illustrator, as well as his films, videos, and dozens of his commissioned silkscreen portraits, a business that supported the other work at his studio, known as the Factory.)
By 1966, Warhol started to step away from painting to focus on filmmaking, publishing, and other projects. In 1968, he was shot by a radical feminist and hanger-on at the Factory and almost died. After a long recovery, his work took on a more somber tone, sometimes with overt political themes (portraits of Chairman Mao, a silkscreen of a deranged-looking Richard Nixon with his face painted green and titled “Vote McGovern” at the bottom).
He also returned to deathly images, such as Skull of 1976, a silkscreen portrait of a blue human skull sitting on a black and yellow tabletop, or Gun of 1981-82, featuring a snub-nosed pistol rendered in red and black.
In this period Warhol also addresses the issue of sexual identity more overtly, with a series of silkscreen portraits of drag queens and transsexuals, as well as a series of Polaroid photos of himself in a woman’s wig, an off-the-shoulder dress, and other costumes.
Late in his career and perhaps running low on energy or inspiration, Warhol collaborated with the rising art star Jean-Michel Basquiat on a series of paintings. In Paramount of 1984-85, Warhol contributed a big red Paramount Pictures logo to the rectangular canvas, and Basquiat supplied almost everything else: doodles, random words and numbers, small cartoonlike drawings of silhouetted black heads, rocket ships, windows, a man drowning. Most importantly, Basquiat supplied the energy and inventiveness.
Warhol died in 1987, at age 58, shortly after undergoing surgery. He was buried in Pittsburgh next to his parents’ graves.
“Andy Warhol—From A to B and Back Again” runs through September 2 at the San Francisco Museum of Modern Art, 151 Third Street, and will be on view at the Art Institute of Chicago from October 20 through January 26, 2020. An extensive catalog is published by the Whitney Museum and Yale University Press.
(Top image: Andy Warhol, Triple Elvis (Ferus Type), 1963; acrylic, spray paint, silkscreen ink on linen. The Doris and Donald Fisher Collection at the San Francisco Museum of Modern Art, (c) The Andy Warhol Foundation for the Visual Arts Inc. / Artist Rights Society (ARS), New York.)
Previous ArticleDaniel’s Husband & Life’s Perversity | <urn:uuid:136a405b-5648-48d7-9262-df6c26a077c8> | CC-MAIN-2022-33 | https://culturaldaily.com/every-warhol-youd-ever-want-see/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.963091 | 1,279 | 2 | 2 |
Author : Dr Rajkumar, Ms Kavitha and Dr R Rengalakshmi
Upscaling the Plant Clinic initiative under the Resilience Project to build farmer’s capacity
With support from the Royal Norwegian Embassy, the Climate Resilience project is being implemented in Assam and Odisha states since October 2018. By increasing resilience and bolstering the production and value chains for the agriproduct markets, the project intends to increase the agricultural productivity, adaptive capacity, and livelihoods of smallholders to climate and economic changes. Through the Krishi Vigyan Kendras (KVK) and stakeholders, efforts are being made to scale up the proven Climate-Smart Agriculture (CSA) Technologies demonstrated in the project area to other vulnerable districts. In Assam, upscaling of the CSA in eight KVKs through the Virtual Village Knowledge Centres (VVKC) is done. Partners and farmers recognized that the Plant Clinic is an invaluable intervention for addressing farmers’ plant health issues through real-time diagnosis and advisories communicated through digital tools and in-person. Hence, the Plant clinic programme is incorporated as one of the critical upscaling initiatives under the VVKC activities.
To promote plant clinic interventions in the eight KVKs, M S Swaminathan Research Foundation and Assam Agricultural University(AAU), Jorhat jointly organised a four-day training. The residential training titled “Becoming a Plant Doctor” was held from the 14th to the 17th of June 2022 at the Regional Agricultural Research Station. The training programme was attended by twenty-five scientists from KVKs and AAU Research Stations. Dr Ashok Bhattacharyya, Director of Research, AAU, delivered the inaugural address. Dr R. Rajkumar, Principal Scientist, explained the upscaling initiatives and the importance of organising the Plant doctor’s training. Dr Vinod Pandit, Center for Agriculture and Bioscience International (CABI), designed and conducted the training program along with Dr Shalik Ram Adhikari, Senior Plant Protection Officer, Nepal.
A vital goal of the training program is to enhance the knowledge management and capacity-building of the KVKs scientists and farmers in addressing plant health issues, especially in the context of increasing climate risks. Through the Plant Doctor course, KVK experts built the skills necessary to diagnose plant health problems using microscopes and other diagnostic tools. This enables them to provide farmer-centric, eco-friendly, affordable, and locally accessible advisories and operations. As part of their training, trainees were exposed to various crop pests and diseases (fungi, bacteria, viruses, insects, mites, etc.) through presentations, classroom demonstrations, group exercises, and practical sessions to enrich their learning.
In the training, the learners had a hands-on experience with a live plant clinic experience. During the feedback session, the participants expressed that the programme helped them become familiar with easy identification and early diagnosis of plant diseases. They also gained knowledge about the plant pest online management database system and how to classify infections as biotic, abiotic, or nutritional deficiencies. The extension officers added that implementing such interventions would help them to strengthen their trust with farmers. The training program was concluded with a closing ceremony and the distribution of certificates.
M S Swaminathan Research Foundation (MSSRF) established in 1988 is a not-for-profit trust. MSSRF was envisioned and founded by Professor M S Swaminathan, agriculture scientist with proceeds from the First World Food Prize that he received in 1987. | <urn:uuid:27a8f358-1007-4f76-b43f-302464c08c52> | CC-MAIN-2022-33 | https://www.mssrf.org/small-blog/creating-more-plant-doctors/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.94188 | 736 | 2.15625 | 2 |
Today we are making a cake that is not only popular in Morocco but also in Europe and in the U.S.: Marble Cake! It is a cake with vanilla and chocolate mixed together in a swirl! It’s super easy and super delicious!
- 5 large eggs
- ½ cup and 2 tablespoons (125 grams) granulated sugar
- 1 teaspoon vanilla extract
- Pinch of salt
- 1 teaspoon baking powder
- 113 grams butter
- 1 cup (128 grams) all-purpose white flour
- 125 grams dark chocolate
- 125 grams white chocolate
-The first step is to beat the 5 eggs with the sugar, using an egg beater. You want the eggs to become double in volume, fluffy, and have a withish color. This is an important step to make the cake moist!
-The eggs are ready when they become very thick – you can actually create a ‘ribbon’ with the batter when you pour some of it with a spoon over the rest of the batter!
-Add the vanilla extract, a pinch of salt, and the baking powder to the egg mixture. Continue mixing for a few seconds until well incorporated.
-Melt the butter (either in the microwave or in a sauce pan).
-Add the melted butter to the egg mixture while continuously stirring.
-Sift the flour over the egg mixture and gently fold all the ingredients together using a spatula, until well incorporated.
-Split the batter, equally, into 2 separate bowls. In one portion we are going to add melted dark chocolate, and the other one melted white chocolate. If you dont like white chocolate you can skip it, or you can replace the dark chocolate with cocoa powder. You can even create your own flavors, for example, strawberry and chocolate, or green tea and white chocolate!
-Melt the dark chocolate and white chocolate separately.
-Preheat your oven to 180 C.
-Add the melted dark chocolate to one portion of the batter. Then add the melted white chocolate to the other portion of the batter. Mix well.
-Butter your cake mold, then place parchment paper in it (I am using an 8″ rectangular cake pan). The reason we need to butter the pan before the parchment paper is to get the paper to stick to the pan, otherwise, the paper will not stick! Cut the border of the parchment paper with scissors to get even borders.
-First pour half of the white chocolate batter in the pan. Then cover it with the entire dark chocolate batter, use a spatula to spread evenly. Finally pour the rest of the white chocolate batter on top of the chocolate batter.
-Insert the knife in the batter and move it around to create swirls
-Bake the cake for around 45 minutes or until it is done. It will become golden brown, and when you press the top of the cake it feels firm.
-Remove the cake from the pan and let it cool down.
-Slice it and serve with tea. | <urn:uuid:ae26b3ea-c1d8-482f-99ac-0c314fc494fa> | CC-MAIN-2022-33 | https://ayeshahaq.com/2014/10/30/chocilla-chocolate-vanilla-marble-cake/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.884987 | 630 | 1.515625 | 2 |
Roch Marc Christian Kabore will serve another five years as Burkina Faso’s president after being declared the winner of the 2020 presidential election.
According to provisional results announced by the National Independent Electoral Commission, Kabore won with nearly 58 per cent of the vote, beating 12 opponents and claiming victory in the first round.
Newton Ahmed Barry, the commission’s president said Kabore received 1.6 million votes of the nearly 3 million cast, with voter turnout at 50 per cent.
Eddie Komboigo, the candidate of a once-ruling party, came second in Sunday’s vote with 15.48 per cent of the ballot, followed by Zephirin Diabre, with 12.46 per cent.
The opposition has accused the ruling party of foul play, including bribery.
The process was “riddled with fraud” and the electoral commission was not up to the task of organising responsible elections, Tahirou Barry, an opposition candidate, told a press conference.
Halidou Ouedraogo, president of the organisation Codel which monitored the elections, admitted that there were some reports of irregularities but it wasn’t widespread.
According to reports, the opposition has seven days to appeal the outcome of the election.
The African Union (AU) and the Economic Community of the West African States, said appeals should be made through legal avenues.
Makuza Bernard, who led the AU delegation, said it was important they were made in a “calm environment and especially to avoid violence”.
“We don’t need (violence). The Burkinabe don’t need that.”
Roch Marc Christian Kabore, was first elected as president in 2015. He was also the Prime Minister of Burkina Faso between 1994 and 1996 and President of the National Assembly of Burkina Faso from 2002 to 2012. | <urn:uuid:105671b5-a915-41e0-8525-13b4ccf86160> | CC-MAIN-2022-33 | https://climaxtrend.co/burkina-fasos-president-roch-marc-christian-kabore-re-elected-photo/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.967974 | 400 | 1.601563 | 2 |
I am a software engineer who has been working as one for more than 15 years. I mostly work with data, and write the programs to do the analysis on it based on the art of others. Before I became a software engineer, I earned a degree in Electrical Engineering. I spent the first 4 years after getting my degree in the USAF working with radars.
I read a post on xrayvsn.com, where he spoke about burnout and how that could impact his specialty, Radiologists. Similarly, my best friend is a cancer surgeon, and I’ve been exposed to the medical world through our friendship. The surgeon and I have been friends since junior high school, and my familiarity with the medical world is one of the reasons I enjoy reading xrayvsn.com. What he talks about is similar to some of the conversations my friend and I have. When I read this post, it triggered a lot of thoughts about technology, time, and people.
In the old days, think the Roman Empire and earlier civilizations, engineers were what we now associate with the Army Corps of Engineers, in other words Civil Engineers. They made bridges and roads. Some could argue what we now call mechanical engineering also would come into play; the study and understanding of materials, and how to apply them. Over time, that applied mathematical approach to making objects extended more and more into other aspects of a persons life as art became science. While any engineer will still tell you that there is beauty and art in our work, the fact is that for centuries, the sense of art used as the word skill was replaced by mathematics. We don’t guess anymore; we use equations. As they said in the Apollo program, “In God we trust, all others bring data.”
I once saw a documentary about a generational project in France where they are building a castle using what we think are the same techniques that were used in the 1300s. Even then, as Europe emerged from the Dark Ages, masons and other technical people were using geometry and math to build the great castles and cathedrals that adorn Europe. That was the rise of the modern engineer, perhaps the rebirth, as the Greeks and Romans likely did the same millennia earlier, as proven by the Antikythera mechanism. That device is a remarkable piece of machinery, and has to be seen to be believed. The knowledge contained within it was lost for 1600 years.
As the Renaissance led to the Enlightenment, and the two together laid the groundwork for the industrial revolution, great changes for humanity would follow. But let’s stop here for a minute. Thinking of the life of a farmer before the industrial revolution, the life of most people was hard. When it rained right amount and nature was kind, there was still illness and wars to contend with. I wonder, when the weather was not kind, or plague ravaged the area, did that not cause a burnout of it’s own? Perhaps, did that lead to the cruelty of the Dark Ages?
As the Industrial Revolution took root in the world, so engineering finally started to grow up. Fed by the increasing knowledge and most crucially by concept of the Scientific Method, people started applying this thought process to other areas. Charles Babbage is considered by most to be the father of computing. He also helped encourage the idea of the division of labor. When you break down tasks from the difficult ones to the easier ones, you can give the easier ones to lower skilled people to do, and keep the higher skilled, and thus more expensive people, doing the difficult things. Computers are the ultimate expression of that idea.
The term computers actually referred to people who did calculations, and even NASA hired people, mostly women, to do math. The modern electronic computer replaced them, and as time has gone by engineers have made them more and more capable. At it’s core, a computer breaks down complicated tasks to simple yes and no questions that can be answered by voltage and current. The components are very small, and signals travel very fast in wires, so we can get complicated answers to complicated questions more quickly than a person with a pen and paper.
So what am I trying to tell you? As time goes by, computers will likely keep getting more powerful. People are smart and will find new ways to use them. People will find ways to break down complicated tasks so that computers can do what humans used to. In my area, all the fast food restaurants are converting cashiers to kisoks. This is basically a new use for tablet computers, which themselves are new ways to use laptop computers and so on.
Computers are not being upgraded alone, and to consider them alone is to miss out on other parts of the puzzle. Take a look at Boston Dynamics‘ robots. Sure you may have heard about their dog like robot that the Marines and the Army are considering to use as a modern pack animal where wheeled vehicles can not go. Do you know about their robots that can move boxes and unload trucks? We’ve all heard that the big auto manufacturers have been using robots in the construction of vehicles for decades, but can they do other jobs? The answer is yes, and primarily the matter is cost. Which is cheaper the human or the robot? As humans get more expensive, like in fast food restaurants, you will see more, as we have already, machines take their place.
In truth the rise of the machines, if you will excuse the pun, has been hurting people for a long time. Did not the early industrial machines try to make people machines? I recall the stories from my grandmother and others in her generation about the conditions in the factories in Brooklyn now a century ago. Child labor was legal, and wages were low. Poverty was severe, and I ask you, did that not play a part in our problems with alcohol? Was that not a factor in what led to the Prohibition movement in America? Did burned out factory workers, who were tasked to work like machines not drown their troubles in alcohol? Ken Burn’s documentary Prohibition certainly gave me that impression. My own families stores added to that anecdotally as well.
Now we have the information economy. Jobs like xrayvsn.com are getting harder and harder. Insurance companies want doctors to work faster and faster. Does this not sound like the robber barrons of old? Are they trying again to turn people into machines? Will a machine be able to learn to do even that job?
Consider stealth technology, and how it works with radar. Radars are like people shining flashlights shining in the dark; perhaps searchlights is a better analogy. Stealth shapes reflect the light away from the search light , and radars use electromagnetic waves just as light is. Since the light is reflected away, you can’t see it. By the time of the B-2, we figured out how to put coating on the jet to adsorb the light, making it harder still. There’s a catch, though, stealth is tuned to one or a few frequencies. So the trick is to use other frequencies to see if they can get bounced back to the radar. To use our human with a flashlight analogy, perhaps blue light would be bounced away from you, but red would bounce back. Thus, if we use multiple narrow frequencies, we might be able to see what our original blue light could not. That’s multispectrical imaging and I found a paper from 2017 that NASA has showing some of the intended uses of it including medical imaging. This is one of a great many.
The type of electromagnetic waves, from X-ray to visible to radio does not matter. You just need different equipment to use it. The military, and even commerce, have desires for robotic and automatic detection of objects. The difficult part is teaching the computer to see what’s in the image. Ironically, most people are probably helping with this process. Have you ever highlighted the face of a friend or family member in a picture in FaceBook? Guess what, then you are, for free, helping to train a machine to do image recognition. 20 years ago when I was in the USAF, this was all done by humans, but then computers could not do what they can do today. Today, there are even more spy satellites taking even more pictures making the need even greater to identify the next threat. Police are using it today, and business want to.
How long until computers can do what a radiologist can do? How long until we trust machines to drive cars? I don’t know. The problem is that the better machines get, the harder people will have to work to make themselves more valuable than the machines. Could this be leading to more doctors burnout? Could this be leading to the burnout of people in other professions? Is this a contributor to the opium epidemic? Is this not the same problem we had with alcohol a century ago, and perhaps still have?
I am not all doom and gloom. The end is not near. How do I know this, I come to this conclusion by the same evidence I have just given you. For those previous difficult events led to better times after them. I would still be facing burnout today than in the other eras I have discussed. It does mean that FIRE is even more important than people realize, because that gives us options. We need to keep abreast of how technology is changing things so that we can adjust to the changing times. We can take comfort in the fact that times have always been changing, and that those who prepare can adapt. That, after all, is what nature does through evolution. | <urn:uuid:71541f75-59f6-4d00-8663-37684141e4ce> | CC-MAIN-2022-33 | https://genxfire.wordpress.com/2019/09/10/the-rise-of-the-computer-an-engineers-perspective-on-a-xrayvsn-post/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.975034 | 1,982 | 2.09375 | 2 |
From the 4th to the 8th of July 2022, the first edition of the “AI & Society Summer School”, organized by the Italian National Ph.D. program in Artificial Intelligence, PhD-AI.it, took place at the University of Pisa. The summer school consisted of lectures, panels, poster sessions, and project works. The aim was to advance the frontier of AI research with internationally renowned scientists and build a community for the next generation of AI researchers, innovators, and professionals. All ESRs, Tommaso Crepax, Mitisha Gaur, Robert Lee Poe, Qifan Yang, Maciej Krzysztof Zuziak in the Pisa group of LeADS participated in this summer school.
The welcome lectures were given by Prof. Dino Pedreschi, Prof. Marco Conti and Prof. Vincenzo Ambriola. After that, Prof. Alessio Malizia gave his lecture, “MiniCoDe – Minimise algorithmic bias in Collaborative Decision Making with Design”, and interacted with the participants on how to address bias in algorithms. After an hour-long poster session in the afternoon, Prof. Anna Monreale hosted a panel on “The Future of AI Research” with five women scientists – namely Prof. Francesca Chiaromonte, Prof. Rita Cucchiara, Prof. Fosca Giannotti, Prof. Michela Milano, Prof. Sara Tonelli – in different areas. The following lectures of the summer school covered social artificial intelligence, developmental robots for language learning, trust and theory of mind, human face recognition, deep learning theory, interdisciplinarity of data science and AI, etc.
During the poster session, ESRs showed great poster presentations and introduced their works on “interplay between privacy protection and market competition in the digital revolution (Yang Qifan)”, “differential privacy and differential explainability in the data sphere” by Mitisha, “unchaining data portability potentials in a lawful digital economy” by Tommaso Crepax, “the distinction between fairness and bias by Robert Lee Poe, and “use of distributed personal data management for personalization of digital services by Maciej Krzysztof Zuziak. All ESRs had active discussions with the participating scholars.
On the last day, ESRs presented their project works from their groups, involving “reducing polarization in social media through diffusion models” by Qifan Yang, “polarization detection via the semantic network” by Mitisha Gaur, “a smart mobility platform to improve urban air quality” by Tommaso Crepax, “a multi-way explainable interface for high-risk public use applications by Robert Lee Poe and “continual active learning for healthcare” by Maciej Krzysztof Zuziak. The proposals from Tommaso’s group and Mitisha’s group won second and third prizes. | <urn:uuid:69a28dc8-6ed6-48e8-9945-b3d23d60f979> | CC-MAIN-2022-33 | https://www.legalityattentivedatascientists.eu/2022/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.91311 | 645 | 1.515625 | 2 |
Using the FRBSF China Cyclical Activity Tracker, we confirm the robustness of China’s recovery from the COVID-19 downturn. The FRBSF “China CAT” estimates that first quarter 2020 China GDP plunged 6.4 standard deviations below its detrended level a year earlier, but by the end of the third quarter, China economic activity had recovered to only 0.1 standard deviations below trend. As such, the FRBSF China CAT index validates the accuracy of the economic recovery from the COVID-19 pandemic reported in Chinese GDP figures.
As China was the first to suffer the adverse economic consequences of the COVID-19 pandemic, it is not surprising that the country was also one of the first to experience recovery from the crisis. Still, the announced pace of China’s recovery from the crisis has been notable. As reported, real gross domestic product (GDP) plunged 6.8% in the first quarter of 2020 from a year earlier. But reported GDP rose by 3.2% growth in the second quarter and by 4.8% in the third quarter (both figures are compared with the year-earlier period). Is the speed of this rebound plausible?
A number of studies have raised concerns about the accuracy of China’s GDP data. For example, Nakamura, et al (2016) find that official aggregate consumption data are too smooth relative to expected levels based on standard theory. Pinovsky and Sala-i-Martin (2016) find that China’s reported GDP growth rate appears to be exceptionally high relative to its growth in light emissions, as measured from satellite data. Chen, Chen, Hsieh and Song (2019) use both value-added tax data and local indicators less conducive to manipulation. They estimate that GDP growth from 2010-2016 was 1.8 percentage points lower than reported.
In a recent paper, Fernald, Hsu, and Spiegel (2020) revisit the accuracy of Chinese statistics using indices of economic activity created as weighted averages of data on a broad range of measures of economic activity in China. The statistical technique that creates these weighted averages, known as principal components (PC), provides an index that captures as much of the variability as possible in the individual series. Conceptually, this index is similar to the Chicago Fed National Activity Index (see, e.g., Brave 2008) for the United States.
We use our preferred indices to examine the post-COVID-19 rebound in economic activity.
The FRBSF China Cyclical Activity Tracker (China CAT)
One challenge that arises in generating such an index is the very large number of possible combinations of indicators of activity from which to choose. Individual indicators, such as electricity use or fixed asset investment, are all produced within China, so they could all themselves be subject to manipulation or statistical error.
In Fernald, Hsu, and Spiegel (2020), we propose that the relationship with China’s real imports—as measured by trading-partner exports—provides external validation. Trading-partner exports are measured outside of China—and so this measure of imports is not subject to manipulation or statistical error by Chinese authorities. Of course, imports represent only one part of the economy, focused on goods. Nevertheless, we find that, for countries with good statistical systems, imports and GDP co-move closely. (We stop these comparisons prior to the recent trade war and disruptions.)
Our preferred China “cyclical activity tracker” (China CAT) is based on eight non-GDP indicators—a broader set than was famously used by Premier Li (Wikileaks, 2007). The indicators in the China CAT comprise a consumer expectations index, electricity, exports, fixed asset investment, floor space, industrial production, rail freight, and retail sales.
The China CAT represents deviations in year-over-year growth from trend. Intuitively, because the data series have different trends, if we did not detrend the index would be a mix of cyclical effects and the differential trends. Stock and Watson (2016) recommend removing low-frequency trends from the growth rates to avoid misspecification. (The index is thus best suited to assessing cyclical volatility, not systematic bias.) The series is updated quarterly, with the data and additional documentation available on the Federal Reserve Bank of San Francisco web site.
Figure 1. Official China GDP, China CAT, and All Indicators index
The thick green line in Figure 1 shows the China CAT index. We also track an “all indicators” index (gold line) using the first principal components of a broader set of 14 indicators. The similarity of the China CAT and all-indicators indices shows that results are not sensitive to the exact combination of individual indicators chosen. The dark blue line shows China’s official GDP data (dark blue line). Finally, the light blue line shows trading-partner data on China’s imports. The series all move relatively closely together, though GDP is the most different. Perhaps most strikingly, official China GDP figures appear excessively smooth from about 2013 until the arrival of COVID-19 in 2020.
Verifying China’s Recovery
Figure 2. China’s Recovery from the COVID-19 Crisis
Figure 2 focuses on data since 2017, illustrating the COVID downturn and subsequent recovery up to Q3 2020. Because the China CAT is detrended, we measure its values as the number of standard deviations of year over-year growth from trend. Hence, by construction, the series has an average of zero and a standard deviation of one. Other recent updates to the China CAT series for 2020 are summarized in an FRBSF blog.
When we convert reported GDP into similar units, first-quarter GDP growth plunged 6.4 standard deviations below its detrended year-earlier level. By the third quarter, the pace of GDP growth had largely recovered, at only 0.1 standard deviations below trend. That value corresponds to the reported 4.8% third-quarter GDP growth.
Detrended values from the China CAT are qualitatively similar to the official reports—indeed, our results are a bit less negative than official data. The China CAT shows a first-quarter decline of 4.0 standard deviations below trend, with a rebound to only 0.05 standard deviation below trend in the third quarter. Five of the eight individual indicators remained negative (below trend) in the third quarter, but the most negative—the consumer index—was only 1.0 standard deviations below trend. Exports, industrial production, and electricity were all very modestly above trend. We note that the broader “all indicators” index fell a little more than the China CAT in the first quarter, by 5.1 standard deviations. The all-indicators index also rebounded somewhat less, recovering to a year over-year decline of 0.3 standard deviations. We view these numbers as being roughly consistent qualitatively with both the China CAT and reported GDP.
Our updated China CAT index does not suggest any sizeable systematic bias in officially reported Chinese output numbers. Moreover, while official data appeared to be “excessively smooth” relative to the China CAT over recent years (Figure 1), this is not the case so far in 2020. China’s GDP data for the first two quarters of 2020 show even greater movement than those we calculated with the China CAT. Overall, our results confirm the accuracy of the economic recovery from the COVID-19 pandemic reported in Chinese GDP figures.
(Remy Beauregard is a research associate in the Economic Research Department of the Federal Reserve Bank of San Francisco; John G. Fernald is a senior research advisor in the Economic Research Department of the Federal Reserve Bank of San Francisco and professor of economics at INSEAD; Mark M. Spiegel is a senior policy advisor in the Economic Research Department of the Federal Reserve Bank of San Francisco.)
Brave, Scott (2008). “Economic trends and the Chicago Fed National Activity Index.” Chicago Fed Letter No. 250, May.
Chen, Wei, Xilu Chen, Chang-Tai Hsieh and Zheng Song, (2019), “A Forensic Examination of China’s National Accounts, NBER Working Paper No. 25754, April.
Fernald, John G., Eric Hsu, and Mark M. Spiegel. 2020. “Is China Fudging Its GDP Figures? Evidence from Trading Partner Data.” Forthcoming in Journal of International Money and Finance.
Nakamura, Emi, Jon Steinsson, and Miao Liu, (2016), “Are Chinese Growth and Inflation Too Smooth?: Evidence from Engel Curves,” American Economic Journal: Macroeconomics. 8(3): 113–144.
Pinovsky, Maxim and Xavier Sala-i-Martin (2016). “Lights, Camera, … Income! Illuminating the National Accounts-Household Surveys Debate.” The Quarterly Journal of Economics, 131 (2): 579-631, May.
Stock, James H., and Mark W. Watson, (2016), “Dynamic Factor Models, Factor Augmented Vector Autoregressions, and Structural Vector Autoregressions in Macroeconomics.” In Handbook of Macroeconomics, Volume 2A, edited by John B. Taylor and Harald Uhlig. Amsterdam: North-Holland.
Wikileaks (2007). http://wikileaks.org/cable/2007/03/07BEIJING1760.html. | <urn:uuid:1206be84-ef52-4e4f-8e73-e320cb75aa22> | CC-MAIN-2022-33 | https://voxchina.org/show-3-210.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.896327 | 1,975 | 2.046875 | 2 |
- Keeping Down-Level Environments Populated
- The Cost of Managing Database Development Environments
- Employees Need Proper Data in Order to Make Good Decisions
- Data Virtualization: ETL Without the Data Movement
- The Challenges of Testing Backup and Recovery in an Enterprise Environment
- RTOs and RPOs Should Be Driving Recovery, Not Just Backups
- Development Should Get the Same Care as Production
- Enabling Database DevOps with Large Volumes of Data
Companies these days have more data than ever. Even small companies can easily have terabytes of data. Employees need access to proper, reliable, and most importantly correct data in order to translate that raw data into actionable information. Without the ability to properly turn data into actionable information companies aren’t able to make intelligent decisions that can be used to drive the business forward.
Without proper data, people are forced to make assumptions or to insert made-up data in order to approximate the actual data. This effectively made-up data ends up leading people to make incorrect assumptions about the business, which can lead to the business not doing its best or being the most efficient that it can be. Data errors can compound themselves by laying these assumptions underneath other assumptions; which are then based on other assumptions. Quickly the information which is being used to make critical business decisions is based completely on inaccurate data. Incorrect information, and by extension incorrect reports can be the death of a company.
This created information can find its way into all sorts of places, from daily sales numbers to weekly and monthly sales reports, all the way up to reports to investors, the board of directors, executives, or even the public market. The farther the created information goes from the source, the harder it is to remove once it’s discovered that the information isn’t correct.
Companies need correct information in order to make actionable decisions. For companies to get that information it all boils down to employees needing correct and valid data so that those employees are able to convert that data into valid information.
One way to get valid information is to create reports from production systems. Using production systems to create reports can cause performance issues for users of the system, so that’s not a viable solution. Running reports off a readable copy of the production data makes for a fantastic alternative. This allows for the reporting systems having correct and actionable data, which can then be turned into actionable reports; all without putting any impact on the production, user (or customer) facing systems.
There are a couple of easy to document advantages to moving reports from production to a readable copy of the production system. The first advantage is tied to the fact that the schema is identical. Because the secondary is an exact duplicate of the schema that’s in production moving reporting off to that secondary copy is very easy. The reports just simply need to be moved and they will just work. The second big upside is the fact that production performance will increase as we have moved the reporting workload off production. From the DBA perspective, moving the reports off the production system will reduce IO requirements of the production system as well as locking and blocking that happens in the production system.
This gives us the best of both worlds; we get user-facing systems that are well-performing and we get the proper information that we can use to drive our business off of, allowing for good decision making. Once we have valid, actional, accurate information the employees at the business can make informed decisions, and not wild guesses. This will allow the business to thrive and allow the business to drive innovation in their sector.
Once businesses are able to thrive, they can do amazing things for the employees as well as their customers; all while driving probability for the business. All this comes from having true and accurate data; so that the informed decisions that are needed to drive the business forward can be made.
While solutions that can help drive these sorts of accurate reporting and therefore innovation can cost money to purchase and implement; however these shouldn’t be viewed as expenses but as an investment in the business that will, if implemented correctly, help the business grow and expand. | <urn:uuid:65a53aee-5177-499b-a81f-f1f90ca68fc3> | CC-MAIN-2022-33 | https://gestaltit.com/tech-talks/actifio/dennycherry/employees-need-proper-data-in-order-to-make-good-decisions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.936584 | 849 | 1.976563 | 2 |
It’s that time of year again when the world is full of winter wonderlands, talking snowmen, reindeers with red noses and fairy tales of a large man venturing across the globe to deliver presents to good children.
Most people get so caught up in the holiday cheer that they forget that it’s not really a fairy tale at all. The story of Santa Claus evolved from the accounts of a real person who lived nearly 2,000 years ago.
Saint Nicholas was born in a small village called Patara (which resides in what is now Demre, Turkey) during the third century.
Orphaned at a young age and then raised in a devout Christian family, little Nicholas was presented with an inheritance that he felt was better in the hands of the village’s needy and misfortunate, thus beginning his reputation for generosity. He continued to devote his life to God and eventually was ordained Bishop of Myra.
Many stories were told of his kindness that may or may not be true. According to StNicholasCenter.org, a non-profit organization created by two friends who were consumed by the story of St. Nicholas and the life he led, the most popular story is one of a poor man who had three daughters. Back in those days, a young woman was given a dowry, which included anything from money to animals to land, at her marriage.
“Since the man in this story was poor, he was unable to give his daughters anything without sacrificing the family’s livelihood. When Saint Nicholas saw that the daughters were going to be forced into prostitution to earn their own money, he gathered up his own gold and small goods in a sack and anonymously left it at the family’s door,” the organization’s cofounder, Carol Myers, wrote on its website.
The youngest daughter saw Saint Nicholas do this from a window and told her father, who spread the word of the Bishop’s generosity and how he saved his daughters’ lives.
During this time, there was also a religious conflict in Europe. Under Roman Emperor Diocletian, Christians such as Saint Nicholas were imprisoned and exiled unless they converted to traditional Roman beliefs of polytheism.
Christianity was later accepted in the year 313 A.D. under Emperor Constantine the Great, and those once persecuted were released. Once Nicholas was freed, he became a part of the Council of Nicaea, a council of bishops that helped laid the foundation of Christian doctrine. He died twenty years later on Dec. 6, 343 A.D.
December 6 became Saint Nicholas Day, which celebrated his life and ways of generosity, encouraging people and teaching children to exchange gifts and help those in need.
After the Protestant Reformation was over in 1648, this became problematic. Since the celebration of Nicholas was the same month as Christmas, it took away some of the attention meant to honor Jesus.
However, because Saint Nicholas’s way of life had been celebrated for so many years, the Catholic and Protestant churches couldn’t simply get rid of the holiday altogether, so the date was moved to December 25 to share Christmas.
Once the celebration of the Saint made its way across Europe, its meaning began to evolve and mix with other cultures and their beliefs.
In Germany, the Saint’s intent of generosity became a tool to create scary characters that would encourage children to behave or they would be punished. These characters ranged from Ru-Klaus (Rough Nicholas), Aschenklas (Ashy Nicholas) and Pelznickle (Furry Nicholas) who forced children to endure whipping or kidnapping. The most terrifying character of all was Krampus.
According to an article written by Liz Leafloor on Ancient-Origins.net, a website dedicated to the public education of the history and backgrounds of worldly legends and myths, Krampus is a devil-like goat man with fur, horns, hooves and a lizard’s tongue.
“He would punish the kids deemed bad by Santa by beating them with bundles of birch and then throw them into his sack and dragged to his underworld home in hell for a year,” Leafloor wrote.
Though the evil character is supposed to be a Germanic sidekick to Santa, the origin of this myth is said to be as old as the Bishop himself.
In Great Britain, Nicholas is known as Father Christmas. In France, he’s Père Noel (translated to Father Christmas). And in the Netherlands, he’s known as Sinterklaas. Places like the Czech Republic, Austria and Latin American countries kept to their anti-Santa characters to preserve their nation’s traditions.
When the Soviet Union was formed during the Bolshevik Revolution in 1917, the celebration of Santa was abolished because it was related too closely to a religion, which wasn’t allowed.
In 1924, under the rule of Joseph Stalin, a new character–Father Frost–was developed to gain the appreciation and favor of the people. Frost was dressed in a blue coat and was skinny in stature to avoid any confusion with Santa.
When Europeans made their way to the Americas, Sinterklaas became more widely known and eventually who didn’t fly or live in the North Pole.
According to NationalGeographic.com, it wasn’t until 1809 when Washington Irving wrote a book, Knickerbocker’s History of New York, describing a pipe-smoking man who flew over rooftops in a wagon delivering toys to good boys and switches to bad ones, that the Santa Claus we celebrate today began to take shape.
In 1822, Clement Clarke Moore wrote A Visit from Saint Nick also known as The Night Before Christmas for his children, with no intention of including Santa. Yet the book was published featuring the jolly guy flying in a sleigh driven by eight familiar reindeer.
Rudolph wasn’t a popular addition to the tale of Santa until the hit song “Rudolph the Red-Nosed Reindeer,” written by Johnny Marks and sung by Gene Autry, became the number one hit in America the week of Christmas 1949.
Danielle Prat, a WCC first year student, wasn’t raised with Santa Claus coming every Christmas but was rather just made aware of his existence to avoid confusion with what other children were being taught.
“I’m sure it’ll be a discussion to have with my significant other at the time, but my opinion right now is I don’t see any reason to teach my children about it,” she said. “But if I were to teach them about either Santa or Saint Nick, I’d probably go with Santa because to me the real guy is more of a religious symbol than anything.”
WCC student Claudia Cedillo said she is planning on carrying on the tradition of the fictional Santa Claus.
“It’s interesting to question not the validity but the origin of such a praised figure of this time of year,” she said.
Whether you celebrate Saint Nick or not, he has definitely made an impact on the world and how we celebrate this time of year. So remember Saint Nicholas and his life of generosity as you go about your holiday shopping this year.
by Hannah Bailey, Ka ‘Ohana Staff Reporter | <urn:uuid:008ba49f-8421-4941-ad46-bdd0eeeffe39> | CC-MAIN-2022-33 | http://kaohana.windward.hawaii.edu/2017/12/santa-claus-is-older-than-you-think/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.980885 | 1,530 | 3.359375 | 3 |
2016 – Three Man Patrol of pound store pirated clone* BMC US Marines, officer, radioman and prone BAR man providing covering fire.
Not entirely intended as A Mother’s Day Post March 14th as it is largely about the ongoing influence of toy soldier games in the garden with my Dad.
For the last month or two I have been exploring the origins and early players of H. G. Wells’ Floor Game or Little Wars.
Although I researched the women who saw this happening, it appears to be mostly Edwardian men who would happily be found stretched out on Wells’ lawn or nursery floor, firing spring loaded cannon at lead toy soldiers. This sometimes, according to the tongue-in-cheek Wells, brought “disdain” from lady visitors who did not see the imaginative play going on at floor or garden level.
Some gamers of players with toy soldiers would say that not much has changed 100 years later if middle aged men are glimpsed crawling round their floor or garden in pursuit of toy soldiers. Or worse still, their front garden …
Gardens and floors seem a natural home for toy soldiers.
Ever since I was a small boy in the early 1970s, I have left toy soldier figures in the garden “on Patrol”, usually a three man Patrol Post or Observation Post OP tucked away in a flower bed or safe area, safely away from being dug up, trampled or mown down.
Each three man Patrol had the following usual figures:
- One officer or someone with binoculars, armed
- One radio man, armed (usually a bit of a scarcity per box in early Airfix or Matchbox)
- One rifleman, SMG or LMG infantryman for Patrol protection
These were usually unpainted plastic 54mm figures. Sometimes these would be WW2 troops, sometimes Cowboys or Civil War figures (despite the lack of radios) and occasionally even knights.
Each of these 3 Man teams (in threes, like Lighthouse Keepers) had a way to communicate with each other or raise the alarm, some firepower to defend themselves and their OP and enough men to have at least one sleeping whilst others were on watch.
My late Dad took a slightly dim view if I left the same figures out on Patrol, neglected for weeks or months. It made sense. More regular changeovers of personnel kept the garden and these Patrol Posts tidier.
Usually in my childhood garden, a small stone base was made for the Patrol Posts with flat stone or slate walls, roof and floor base. Small palisades of wood or twig log piles completed the defence. Some kind of plastic stores box was usually included of “food” and “ammunition” such as Britain’s farm sacks or Airfix sandbags.
Inside the house up in my room would be the HQ team, such as the little travel box three man Patrol that I take away on holiday and travels – to keep in touch by radio with ‘home’ and teams in the field.
It’s odd but I still find that keeping the three man Patrol out there provides a calming link back to my childhood games, my late Dad’s vanished flower garden and our shared playful interest in toy soldiers.
I liked the Borrowers scale thing, the threat of giant garden wildlife like snails and other minibeasts, the military birdwatching. RLS’ poem The Dumb Soldier captures this well – see also later for a brief quote from the poem:
I wrote a little about this garden before on this blog back in 2016 on a Garden Wargames post, from which I have taken some of these older photos:
Bearing their battered sloppy childhood paintwork … my indoor desktop / travelling Three Man Patrol (TMP) of Airfix figures. About time they got some proper paintwork.
Usually I have used my most expendable pound store figures, as there was always the risk that dogs, lawnmowers and wildlife would trash the Patrol Post.
* Back in 2016 I was using what I now know were BMC clone US Marines
The OP has changed from this safari / zoo animal walkway tower to an odd little house that I picked up about 15 years ago in a pet shop. Italian plastic, originally designed as a rodent hamster type house, sadly I have not seen them since. The label says Casetta per Criceti or a Hamster house (see B.P.S. Blog Post Script)
I liked it straightaway for its white walls and pantile roof. Instant Mexican cowboy town or Mediterranean village hut.
This pet shop where I found this house was a few doors away from a now closed independent pound store where I bought lots of pound store plastic soldier figure packs (Cowboys, Indians copies of Airfix with wagons, pirates, those 60s divers and sea creatures). Another pound store full of plastic tat, vanished and sadly missed …
I have always liked my Patrol or OP posts to have a certain kind of internal logic to them, otherwise they are just useless and silly. So as part of this, the pantiled roof house OP has a rigging type plastic ladder to the roof.
The boat at the foot of the cliff is their Patrol transport in and out of the situation and route of resupply, if not by air. A rope ladder links the house plateau with the river below. Supplies are winched up on ropes and stored in the house. It all makes its own kind of (non)sense.
The blue cowboy in my retiring three man Patrol in the pictures is one such Airfix clone, the blue speedboat in pictures below from a divers underwater play set kit. You got a lot more plastic tat for your pound 15 years ago.
The retiring Patrol after weeks to months in the field (in winter I forget don’t change figures as regularly) are a mix of figures, (what I now know are) some pirate cloned playset Tim Mee USA infantry, * the BMC clone US marine radio man and the blue Airfix clone cowboy. All expendable beach, garden or sandpit plastic figures.
Now in 2021, expendable plastic army men based on cloned Tim Mee, Airfix and BMC figures are being replaced by –
genuine new BMC Plastic Army Women.
Again in our new three woman Patrol we have:
- Female officer figure with binoculars and pistol
- Radiowoman or signaller (with no pistol)
- Sniper on the roof tiles
In my BMC Plastic Army Women Parazuellia Women’s Revolutionary Army figures that I painted for FEMbruary, I gave the unarmed Radiowoman a spare pistol in its holster from Airfix Multipose spares.
Having used up all these spare Multipose weapons, I noticed that there is a handy rifle on the trusty old Britains Herald Cowboy raft cargo boxes. That then is the weapon for the radiowoman – my internal logic says that is so.
A supply barrel (old barrel bead or button) is glued to slate to stop it blowing away. These stores will be packed away into the house whilst this new Patrol gets settled in.
The Patrol house OP has a handy removable red tile roof, but no closing doors or window – so I will assume that there are internal door and shutters. I like the ability to poke a toy soldier rifle out of the window. The house itself is expendable but this one has withstood many frosts and storms (sometimes the roof blows off in very bad weather!)
The Patrol house OP is a pale imitation of those excellent Timpo Wild West plastic buildings of our childhood that now go for such extortionate sums on eBay, even with the working closing doors missing. Timpo buildings would now be too old, brittle and valuable to be left outside in all weathers anyway.
At some point these patrols may mingle and we may have a mixed Co-Ed Patrol, out in the wilderness for weeks and months on end. For now, we will have single sex patrols.
Who knows what they will see, night and day in the wilds of the Yarden or Garden. We might need to alter RLS’ The Dumb Soldier slightly:
“She has lived, a little thing,
In the grassy woods of spring;
Done, if she could tell me true,
Just as I should like to do.
She has seen the starry hours
And the springing of the flowers;
And the fairy things that pass
In the forests of the grass.
In the silence she has heard
Talking bee and ladybird,
And the butterfly has flown
O’er her as she lay alone.”
Alone? Well, maybe not, as there are three highly trained and well equipped Plastic Army women out there anyway, but you may be alone on watch.
The travelling Box HQ three man team remain the same indoors and should now be in radio contact with the new three woman Patrol.
“Come in, Garden Patrol … come in, Garden Patrol.”
The retiring three man Patrol team await a debrief on their return, before a wash and brush up and some well earned leave.
That’s my family toy soldier tradition garden patrols, still going strong. I have come across Marvin at Suburban Militarism’s tradition of Christmas soldiers.
Anyone else have any strange toy soldier superstitions or strange family traditions to do with their toy soldiers?
Blogposted by Mark, Man of TIN on 13 March 2021
B.P.S. Blog Post Script
Below – some Casetta per Criceti or Hamster House examples online 2021, but not my exact pantile roofed example.
Hamster or mouse houses in wood or plastic – search around, there are some interesting small house examples online. Hamster or small rodent houses are a source of some possible garden wargames houses or cottages. They may prove an alternative to the converted bird box or the useful aquarium ornaments, something to look out for whilst browsing the pet store ? | <urn:uuid:66d6c7e5-a84a-4500-bffa-edd33dc34b07> | CC-MAIN-2022-33 | https://poundstoreplasticwarriors.wordpress.com/tag/floor-wars/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.948789 | 2,107 | 1.609375 | 2 |
Android’s backup and restore process can be used to recover deleted data from your Android device. To do this, you need to make sure that the files or applications you want to recover are not currently backed up on the phone (or if they were ever saved). You also will require a computer with Google Play Store installed and USB connection cabling for your smartphone.
Some of the most common reasons for losing your device include: accidentally deleting files and having a software crash. Regardless of the reason, the steps below show how to do data recovery android using a few handy tips. So read on to learn how to restore your lost data today.
How to recover permanently deleted files from Android phones?
To recover deleted data from your Android device, you will need to connect your Android phone to a computer with Google Play Store installed. Once you have done this, open the Play Store app and search for “Backup & Restore.” Download and install the app, then launch it.
Once you have opened the application, tap on the “Restore” option and choose “Restore my data.” You will now be required to select what type of files you wish to restore from your Android phone. Select “Applications” or “Other” depending on what you attempt to recover. You will then be presented with a list of applications that can be restored and a list of applications that cannot be recovered. Select the application you wish to restore from the list and tap on “Restore.”
Once you have selected the application you wish to restore, you will be presented with a list of backups that can be restored. Select the backup that contains the data you are attempting to recover and tap on “Restore”. The application will now start restoring your data. Depending on how much data you are attempting to retrieve, this process may take some time. Once it has been completed, manually launch the application that was just recovered from your Android phone and check whether or not your files were successfully restored.
Can internal storage be recovered?
Internal storage is often the first thing to go when a device starts running low on memory. This can be due to many factors, such as too much background data being saved or system-wide problems with malware and viruses that affect how well a phone connects with its internal hard drive. If you’re in this situation, it may seem like there’s no hope for recovering your pictures, videos, music, or any other files from your smartphone– but fortunately, most smartphones come equipped with either an SD card slot (like iPhones) or built-in microSD card slots (Android devices). In these cases, all stored information will likely still be accessible if backed up onto external media beforehand.
What should I do with my old phone?
It is recommended that you backup your data regularly. This will ensure that your data can be retrieved if you lose your device. There are also some apps available for download on the Google Play Store which allow you to back up or transfer your data to another phone without using a cable. To delete all of the data on your phone, it is necessary to format the SD card for Android phones. This process will erase all information from the phone, including pictures, videos, contacts, messages, and more. Formatting your SD card will not remove anything from your phone’s internal storage unless it is formatted as well.
If you cannot recover deleted files via any of these methods, then take the device to a professional specializing in data recovery services. Using this method may take time and money, but it could save hours of time and frustration trying to recover lost or deleted files without success. | <urn:uuid:b655a3fe-e443-441f-85d9-a1501c949cb6> | CC-MAIN-2022-33 | http://www.theworldnews.us/general/how-can-i-recover-deleted-data-from-my-android-phone.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.941697 | 756 | 1.671875 | 2 |
What is a defensive dime package?
What is big nickel defense?
The growing trend is to use the “big nickel,” or a third safety, as part of the base defense. … First, offenses started to use a slot receiver to take advantage of a speed mismatch with the defensive linebacker that would be forced to cover the extra wide receiver.
What’s the difference between a nickel and dime defense?
Why is it called a dime package?
What is a Cover 2 defense in the NFL?
How often is nickel defense used?
How many defensive backs are in a nickel defense?
What is the SAM linebacker?
Why is it called nickel defense?
Just like a nickel is worth 5 cents, the name comes from the fact that you have five defensive backs in the game, five players, in this case, two safeties, two cornerbacks and the nickel back, instead of the standard four. | <urn:uuid:ce22189f-8641-471e-8079-8a56ff35a770> | CC-MAIN-2022-33 | https://howthingsworks.com/hw/think-what-is-a-big-dime-defense-48349/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.968658 | 192 | 2.234375 | 2 |
Paget's disease of bone (PDB) is an age-related metabolic bone disorder, characterised by focally increased and disorganised bone remodelling initiated by abnormal and hyperactive osteoclasts. The germline P392L mutation of SQSTM1 (encoding p62) is a strong genetic risk factor for PDB in humans, and the equivalent mutation in mice (P394L) causes a PDB-like disorder. However, it is unclear why pagetic lesions become more common with age. Here, we assessed the effect of the p62 P394L mutation on osteoclastogenesis and bone morphometry in relation to ageing, the natural history of lesion progression in p62P394L mice and the effect of zoledronic acid (ZA) on lesion development. p62P394L+/+ osteoclast precursors had increased sensitivity to RANKL (also known as TNFSF11) compared with wild-type (WT) cells, and the sensitivity further increased in both genotypes with ageing. Osteoclastogenesis from 12-month-old p62P394L+/+ mice was twofold greater than that from 3-month-old p62P394L+/+ mice (P<0.001) and three-fold greater than that from age-matched WT littermates. The p62P394L+/+ mice lost 33% more trabecular bone volume in the long bones by 12 months compared with WT mice (P<0.01), and developed pagetic-like lesions in the long bones which progressed with ageing. ZA prevented the development of pagetic-like lesions, and increased trabecular bone volume tenfold compared with vehicle by 12 months of age (P<0.01). This demonstrates that ageing has a pro-osteoclastogenic effect, which is further enhanced by the p62 P394L mutation, providing an explanation for the increased penetrance of bone lesions with age in this model. Lesions are prevented by ZA, providing a rationale for early intervention in humans.
Paget's disease of bone (PDB) is the second most common metabolic bone disorder after osteoporosis and its prevalence increases with ageing. PDB is characterised by focally increased and disorganised bone remodelling, which leads to the formation of poor-quality woven bone. Consequently, pain, bone expansion, deformities, secondary osteoarthritis, pathological fractures and, very rarely, sarcoma can develop in the skeletal sites affected by PDB (Ralston et al., 2008).
Pagetic lesions are believed to be initiated by abnormal, enlarged, hypernucleated and hyperactive osteoclasts, which drive the progression of osteolysis, with increased and disorganised osteoblast-mediated new bone formation leading to the production of woven bone. Bisphosphonates (BPs) have been used for decades as treatment for PDB owing to their ability to suppress osteoclast activity, and heal lytic lesions with subsequent restoration of histologically normal new bone deposition and symptomatic improvement (Meunier and Vignot, 1995; Reid and Hosking, 2011; Reid et al., 1996). Currently, the most potent of the BPs, zoledronic acid (ZA), is the treatment of choice for PDB as it effectively suppresses bone remodelling and typically normalises bone turnover markers, in some patients for up to 10 years (Cundy et al., 2017). There is evidence that BPs improve pain (Corral-Gudino et al., 2017); however, intensive treatment of established PDB does not improve disease outcome in terms of quality of life measures or pain (Langston et al., 2010; Tan et al., 2017), which implies that preventive intervention, prior to lesion development, could be a better strategy for susceptible individuals.
It has been shown that genetic predisposition to PDB is mediated through the effects of several common predisposing variants of moderate effect size coupled with influence of rare variants, which have large effect size (Albagha et al., 2010, 2013). The most important predisposing gene for PDB is sequestosome 1 (SQSTM1), which encodes p62, a scaffolding protein involved in a variety of cellular processes including signalling and protein degradation (Rea et al., 2013). PDB-associated mutations of p62 tend to cluster in (but are not limited to) the ubiquitin-associated domain and occur in up to 40% of patients with a family history of PDB and 5-10% of patients with ‘sporadic’ disease (Hocking et al., 2002; Laurin et al., 2002). The most common and most studied PDB-associated p62 mutation is P392L (Hocking et al., 2002; Laurin et al., 2002). Although it is not entirely clear how p62 mutations cause or predispose to PDB, current evidence points to increased receptor activator of nuclear factor kappa-B ligand (RANKL; also known as TNFSF11)-mediated signalling enhancing osteoclastogenesis and dysregulated protein degradation (Rea et al., 2013).
The penetrance of PDB in p62 mutation carriers rises with age to reach between 80% and 90% by the seventh decade of life (Morissette et al., 2006). However, recent observations of a delayed disease onset in the p62 mutation carriers’ offspring, a less severe disease phenotype (Bolland et al., 2007; Cundy et al., 2015) and decreasing incidence of PDB in many countries over the past 25 years (Corral-Gudino et al., 2013; Cundy et al., 1997) suggest that nongenetic or environmental factors might play a role in triggering the disease and/or affecting its severity. The historical viral hypothesis is controversial owing to conflicting evidence (Friedrichs et al., 2002; Rima et al., 2002; Visconti et al., 2017); nevertheless, transgenic mouse models of PDB-like disorders induced by viral sequences have been reported, suggesting that overexpression of measles virus nucleocapsid protein in osteoclast precursors increased osteoclast activity and bone resorption in vitro and induced areas of high bone turnover in the vertebrae with a 30% penetrance at 12 months of age (Kurihara et al., 2006a,b). One group did not detect evidence of high bone turnover with the characteristics of PDB in the vertebrae of mice bearing a knock-in p62 P394L mutation (equivalent to the human P392L mutation) (Hiruma et al., 2008).
We reported that although the p62 P394L mutation seldom causes vertebral lesions in mice, it frequently causes PDB-like lesions in the long bones, which become increasingly penetrant with ageing (Daroszewska et al., 2011). However, the mechanisms responsible for the age-related increase in penetrance remain unclear and there have been no studies on whether or not BPs could modify this phenotype.
Here, we revisit the p62P394L model of PDB and seek to validate it in the context of age-related osteoclastogenesis. We explore the ‘natural history’ of murine pagetic-like lesion evolution and relate it to human pagetic lesion progression. Finally, we investigate the role of ZA in prevention of the PDB-like phenotype.
Osteoclast formation increases in p62P394L mice with ageing
Studies in vitro showed that macrophage colony-stimulating factor (M-CSF)- and RANKL-induced osteoclast formation from bone marrow-derived macrophages was significantly greater in aged (12-month-old) WT mice when compared with young adult (3-month-old) WT mice (Fig. 1A). The number of osteoclasts generated from young adult p62P394L+/− mice was significantly greater when compared with young adult WT littermates, whereas the number of osteoclasts generated from aged p62P394L+/− mice was greater when compared with young adult and aged WT mice (Fig. 1A,B). This effect was even more striking in the p62P394L+/+ mice. The number of osteoclasts generated from aged p62P394L+/+ mice increased approximately twofold when compared with young adult p62P394L+/+ mice (Fig. 1C) and threefold when compared with aged WT littermates (Fig. 1A,C). Moreover, osteoclast precursors from p62P394L+/+ mice showed evidence of increased sensitivity to RANKL as compared with WT cells, at 10 ng/ml, 30 ng/ml and 100 ng/ml RANKL stimulation, which was intensified by ageing (Fig. 1C). A similar effect was seen in osteoclast precursors generated from the p62P394L+/−, although not as pronounced as in the homozygotes (Fig. 1B). Thus, ageing increases RANKL-induced osteoclastogenesis, and the p62 P394L mutation further enhances the age-related increase in osteoclastogenesis with a gene dosage effect.
The p62P394L mutation is associated with accelerated age-related long bone loss
We have previously shown that there was no significant difference in trabecular bone density and structure at the proximal tibial metaphyses of young adult (4-month-old) p62P394L+/+ male mice and WT littermates (Daroszewska et al., 2011). In view of the p62 P394L mutation-induced potentiation of age-related increase in osteoclastogenesis in vitro, we asked whether the p62 P394L mutation had an in vivo effect on age-related bone loss. We examined the distal femoral metaphyses of 12-month-old p62P394L+/+ mice and WT littermates using micro computed tomography (μCT). There was a significant decrease in bone volume to total volume (BV/TV) of 33% (P<0.01), a significant decrease in trabecular number (Tb.N) and a significant increase in trabecular separation (Tb.Sp) in aged p62P394L+/+ mice compared with WT littermates (Fig. 2), in keeping with accelerated age-related bone loss. There were no significant differences in vertebral (L5) morphometry between p62P394L+/+ mice and WT littermates (data not shown).
Evolution of pagetic-like lesions with ageing in p62P394L mutant mice
In the PBS-treated group, 8/10 (80%) p62P394L+/+ mice developed pagetic-like lesions in the femur and/or tibia with the morphology described before (Daroszewska et al., 2011) by 12 months, as compared with 0/10 (0%) in the ZA-treated p62P394L+/+ mice (P<0.001, Fisher's exact test; see also next section). As femoral pagetic-lesions in patients progress linearly at an estimated rate of 9.4 mm per annum (Renier and Audran, 1997), we monitored PBS-treated p62P394L+/+ mice in vivo with µCT to capture and follow up lesion progression. An example of the most severe lesion observed in this cohort and its evolution until the age of 18 months is shown in Fig. 3. The linear progression (Fig. 3D) between the age of 8 and 10 months was from 1.173 to 2.304 mm (change of 1.131 mm); between 10 and 15 months from 2.304 to 4.146 mm (change of 1.842 mm); and between 15 and 18 months from 4.146 to 4.696 mm (change of 0.55 mm). Thus, the average linear progression rate was 0.37 mm per month (4.47 mm per year) to involve ∼28.5% of the femur, given the femoral length of 16.5 mm, and the lesion gradually expanded in 3D as well (Fig. 3). Given that mice over 6 months old age 25× faster than humans (www.jax.org), and that a female human femur is, on average, 445 mm long (human femur length to mouse femur length, 445 mm/16.5 mm=26.97), the 1.131 mm change over 2 months in mouse is estimated to correspond to a 7.42 mm change per annum in a human. Likewise, the 1.842 mm (over 5 months) and 0.55 mm (over 3 months) changes in mice correspond to 4.84 mm and 2.41 mm growth per annum, respectively, in a human. Accordingly, the average mouse lesion progression rate of 4.47 mm per year corresponds to a 4.89 mm annual progression in human.
Effect of ZA on the development of pagetic-like lesions and bone morphology
To clarify whether BPs could prevent the development of pagetic-like lesions in the p62P394L+/+ mice, we chose ZA, which is a widely used treatment for PDB and osteoporosis. We monitored for lesion development using in vivo μCT at 1-2 month intervals, but did not detect any pagetic-like lesions in either of the p62P394L+/+ groups treated with ZA (hence the data were pooled). However, a significant change in bone morphology was observed in all ZA-treated p62P394L+/+ compared with vehicle-treated p62P394L+/+ and untreated WT mice (Fig. 4). The cortex was significantly thickened in the ZA-treated p62P394L+/+ mice (Fig. 4B) compared with untreated WT mice, and more so when compared with the vehicle-treated p62P394L+/+ mice affected by pagetic-like lesions (where cortical thickening is part of the picture; Fig. 4C). The metaphyses shape in the ZA-treated p62P394L+/+ mice was cylindrical as opposed to flute-like in the vehicle-treated p62P394L+/+ and untreated WT mice (Fig. 4D-F). The growth plate looked highly mineralised. Trabeculae were very well preserved and plate-like as opposed to rod-like structures seen with ageing (Fig. 4E). Although no obvious pagetic-like lesions in the ZA-treated p62P394L+/+ mice occurred, we observed lucencies in the significantly thickened cortex (Fig. 4E, compare with F).
On histology examination, tartrate resistant acid phosphatase (TRAcP)-stained osteoclasts were easily seen near the growth plate of ZA-treated p62P394L+/+ mice (Fig. 5A,B); however, no osteoclasts were identified within the lucencies of the thickened cortex (Fig. 5A,C). Thus, treatment with ZA did not inhibit all osteoclastogenesis, which was ongoing near the growth plate. The cortical lucencies are unlikely to represent treated pagetic-like lesions, as no disorganised bone or osteoclasts were evident (Fig. 5A,C). Goldner's trichrome stain showed no osteoid seams (Fig. 5D,E), and very little calcein double label was present (Fig. 5F,H) by 12 months in ZA-treated p62P394L+/+ mice, suggesting suppressed new bone formation. There was very little label in the cortical lucencies (Fig. 5F,H) [increased labelling would be expected in active pagetic-like lesions (Daroszewska et al., 2011)]. Bone histomorphometry analysis revealed significantly increased bone volume per tissue volume (BV/TV) in ZA-treated versus PBS-treated p62P394L+/+ mice (Table S1). However, bone formation parameters – mineral apposition rate (MAR), mineralising surface per bone surface (MS/BS) and bone formation rate per bone surface (BFR/BS) – were significantly reduced in the ZA- compared with PBS-treated p62P394L+/+ mice (Table S1).
We then analysed the dynamic bone morphometry of the ZA- and PBS-treated p62P394L+/+ mice using the obtained in vivo µCT scans. Between 4 and 12 months of age, the PBS-treated p62P394L+/+ mice lost endosteal, while gaining periosteal, bone at the femoral mid-shaft, which led to an increase in bone diameter and marrow space (Fig. 6A,C,D). In contrast, the ZA-treated mice gained both endosteal and periosteal bone, although the periosteal bone gain was reduced compared with that of PBS-treated control animals (Fig. 6B-D). Treatment with ZA led to a rapid increase in trabecular bone volume during the first 2 months (0.38±0.09 mm3/month; Fig. 6F,G), owing to almost complete suppression of bone resorption and a substantial increase in bone formation. Over the next 6 months, the bone volume further increased, but at a much slower rate (0.05±0.04 mm3/month, P<0.001; Fig. 6E-H). The PBS-treated control p62P394L+/+ animals showed a small increase in trabecular bone volume; however, this was partially offset by trabecular bone loss at 6 months (net bone gain between 4 and 6 months, 0.08±0.04 mm3/month; Fig. 6E,G), and completely offset by 12 months of age (net bone gain between 6 and 12 months, −0.02±0.03 mm3/month; Fig. 6H).
ZA increases bone mass in p62P394L+/+ mice
In view of the striking changes in the ZA-treated p62P394L+/+ mice bone morphology, we carried out a μCT morphometry analysis. At 12 months, BV/TV was approximately tenfold higher in the ZA- compared with PBS-treated p62P394L+/+ mice (P<0.001; Fig. 7), in keeping with histomorphometry findings (Table S1). Tb.Th increased by 20% (P<0.01), Tb.Sp decreased by 60% (P<0.001) and Tb.N increased by over sixfold (P<0.01) in the ZA-treated group (Fig. 7). There was no significant difference between the four mice that received six doses, and the six mice that received five doses, of ZA; therefore, the data were pooled. Thus, ZA not only prevented the development of pagetic-like lesions and protected against the accelerated bone loss in the p62P394L+/+ mice, but substantially increased bone volume and enhanced bone structure.
Long-term treatment with ZA leads to highly mineralised bone in the p62P394L+/+ mice
Long-term administration of ZA to young adult p62P394L+/+ mice led to suppression of bone turnover, which can result in hypermineralisation of bone matrix (Allen and Burr, 2011). Furthermore, during sectioning for histology, we observed that the bone samples were brittle and caused damage to the microtome knives, suggesting high mineralisation. To investigate whether the bones of ZA-treated mice were indeed highly mineralised, we performed additional scans of the distal femurs, with increased averaging and camera binning to reduce image noise, and analysed tissue mineralisation. The ZA-treated p62P394L+/+ mice had significantly higher bone tissue mineralisation compared with the PBS-treated p62P394L+/+ mice (Fig. 8A). The mean bone mineralisation density in the ZA-treated cohort was 1.47±0.031 g/cm3, compared with 1.416±0.032 g/cm3 in the PBS-treated cohort (P<0.01). There was also an increased width of the density distribution in the treated group (standard deviation of the distribution 0.105±0.004 g/cm3) compared with that in the control group (standard deviation of the distribution 0.093±0.004 g/cm3; P<0.001) (Fig. 8B).
We have previously shown that the p62 P394L mutation is sufficient to induce a pagetic-like phenotype in mice, characterised by focal, asymmetric, mixed osteolytic/osteosclerotic lesions predominantly affecting the long bones, femur and tibia, with increased penetrance with ageing (Daroszewska et al., 2011). We also demonstrated the presence of microtubular structures in osteoclasts within PDB-like lesions similar to those previously reported in human PDB (Daroszewska et al., 2011). In the present study, we examined the effect of the p62 P394L mutation on age-related osteoclastogenesis and bone loss, the development and progression of pagetic-like lesions, and the prophylactic use of ZA.
It is well established that osteoclasts and osteoclast precursors from patients with PDB, with or without the p62 P392L mutation, are hypersensitive to RANKL (Chamoux et al., 2009; Menaa et al., 2000; Neale et al., 2000). We have previously shown that osteoclast precursors generated from the bone marrow of 3-month-old p62P394L+/− and p62P394L+/+ mice were hypersensitive to RANKL, and that both heterozygous and homozygous osteoclasts showed higher bone resorption than the WT (Daroszewska et al., 2011). Here, we have extended our analysis to assess the effect of ageing on p62P394L osteoclast RANKL hypersensitivity, and found that it increased incrementally in all groups, i.e. WT, heterozygotes and homozygotes, with a p62 P394L allele dose effect. The in vitro findings of an age-related increase in RANKL-induced osteoclast formation in WT concur with previous findings in mice (Cao et al., 2005; Perkins et al., 1994) and humans (Chung et al., 2014; Koshihara et al., 2002). The role of p62 in osteoclastogenesis has been established by Duran and colleagues, who reported that targeted disruption of p62 in mice impaired osteoclastogenesis mediated by PTHrP (also known as PTHLH) (Duran et al., 2004), whereas overexpression of the human p62 P392L mutation in murine osteoclasts has been shown to increase osteoclastogenesis and induce a low bone mass phenotype in young adult mice, which progressed with ageing (Kurihara et al., 2007). Human studies have shown that the p62 P392L variant increased osteoclast differentiation, nuclearity and longevity (Chamoux et al., 2009). However, our finding of age-related enhancement of already high RANKL-induced osteoclast formation owing to the p62 P394L mutation (with an allele dose effect) is novel, and suggests that the p62 P394L mutation significantly potentiates osteoclastogenesis in an otherwise already pre-osteoclast-rich ageing skeleton (Farr et al., 2017), which intuitively might be permissive for relatively minor stimuli to induce further ‘uncontrolled’ osteoclastogenesis and pagetic lesions. In line with these observations, the known age-related increase of constitutive RANKL expression in stromal cells, osteoblasts and osteocytes (Cao et al., 2005; Chung et al., 2014; Piemontese et al., 2017) could be a contributory factor to the development of an osteoclast formation-permissive environment (Hiruma et al., 2008).
As age-related bone loss coincides with increased osteoclast activity, which is potentiated by the p62 P394L mutation, we hypothesised that the p62 P394L mutation would cause accelerated bone loss with ageing. We previously showed that long bone morphometry of young adult (4-month-old) p62P394L+/+ mice was no different to WT (Daroszewska et al., 2011). In a previous study of the equivalent to our p62P394L+/+ transgenic mouse, Hiruma and colleagues did not see any morphometric differences in the spine for up to 12 months of age (Hiruma et al., 2008), and we similarly did not find evidence of increased bone loss at the spine in the present study (data not shown). However, we found a significant increase in bone loss of the hind limb bones of p62P394L+/+ mice by 12 months of age, which suggests that the p62 P394L mutation enhances age-related bone loss, which likely becomes first apparent in the long bones, as age-related bone loss takes place in the long bones ahead of the vertebrae in mice (Glatt et al., 2007). Interestingly, pagetic-like lesions also develop preferentially in the long bones (Daroszewska et al., 2011) rather than vertebrae (Daroszewska et al., 2011; Hiruma et al., 2008), which raises the possibility that biomechanical factors might interact with the p62 P394L mutation to influence where and when bone lesions develop. Locomotion differences between human (bipedal) and mouse (quadripedal) carry different mechanical loading, which coincides with differences in pagetic lesion distribution: axial skeleton and the long bones are preferentially affected in human, whereas long bones (but not the axial skeleton) are preferentially affected in mice. Interestingly, development of pagetic lesions in humans has been described in bones subject to decades of supraphysiological repetitive mechanical loading (Gasper, 1979; Solomon, 1979). Animal work has shown that mechanical loading-induced bone fatigue or microfractures (Cardoso et al., 2009; Noble et al., 2003; Verborgt et al., 2000, 2002) led to apoptosis of osteocytes (key mechanosensing cells in bone), which occurs focally. As osteocyte apoptosis promotes focal osteoclast activation (Kogianni et al., 2008), it is possible that in the ageing skeleton affected by the p62 P392/4L mutation, highly primed for RANKL-mediated osteoclastogenesis, a trigger for focal pagetic lesion development could be localised osteocyte apoptosis; for example, due to microcracks developing with ageing, or repetitive mechanical loading-induced bone fatigue. This hypothesis warrants further investigation because, if confirmed, it could have significant translational implications for carriers of the p62 P392L mutation and affected individuals.
In terms of mechanisms underlying the increased age-related RANKL-induced osteoclast formation potentiated by the p62 P392/4L mutation, it is possible that alterations in the autophagy pathway play a role. Whilst DeSelm and colleagues provided evidence for the noncanonical role of autophagy in the resorptive function of osteoclasts (DeSelm et al., 2011), we have previously shown increased expression of key regulatory autophagy genes – SQSTM1, autophagy-related gene-5 (ATG5) and microtubule-associated light chain 3 (LC3; also known as MAP1LC3A) – as well as increased accumulation of LC3-II after treatment with bafilomycin in pre-osteoclasts and osteoclasts, respectively, generated from young adult p62P394L+/+ mice compared with WT mice (Daroszewska et al., 2011), in keeping with induction of the autophagy pathway. However, the effect of ageing on canonical and noncanonical autophagy pathways in osteoclasts is currently unknown.
The finding of the p62 P394 mutation's ability to accelerate age-related RANKL hypersensitivity of osteoclasts, paralleled by increased bone loss in p62P394L+/+ mice, is also interesting from the translational perspective. Although in vitro, the p62P394L+/+ osteoclasts showed the highest RANKL hypersensitivity, heterozygous osteoclast formation was also significantly increased compared with WT, implying that p62P394L+/− mice could also show accelerated bone loss with ageing. Indeed, we have previously shown an allele dose effect of the p62 P394L mutation on the PDB-like phenotype severity (Daroszewska et al., 2011) and, as such, focused our investigations on homozygotes. Thus, we have not aged heterozygotes in the current study in an effort to use the minimum number of mice necessary in keeping with the principles of the 3Rs (Replacement, Reduction and Refinement of Animals in Research; https://nc3rs.org.uk). As the vast majority of patients with the p62 P392L-associated PDB are heterozygous, although rare homozygous or compound heterozygous cases with severe disease have been reported (Collet et al., 2007; Eekhoff et al., 2004; Laurin et al., 2001, 2002; Morissette et al., 2006), it is unclear whether our findings could be translated to a potentially increased risk of osteoporosis in the carriers of the p62 P392L mutation. Intriguingly, whilst PDB is classically considered a focal disease, there is evidence of increased bone remodelling in sites unaffected (Meunier et al., 1980), and possibly an increased risk of vertebral and rib fractures, again at unaffected sites (Melton et al., 2000). However, whether patients with PDB, p62 P392L mutation-linked PDB or unaffected mutation carriers are at an increased risk of osteoporosis is currently unknown.
We have previously shown that the PDB-like phenotype penetrance in the p62P394L+/+ mice increased with ageing and reached 70% and 95% by 8 and 12 months, respectively (Daroszewska et al., 2011). Here, we were interested to capture the moment of the PDB-like lesion occurrence and progression over time. Using an in vivo μCT approach, we confirmed that the lesions had mixed osteolytic/osteosclerotic morphology and enlarged over time, but generally did not occur before the age of 6 months. We did not observe purely sclerotic lesions (to indicate ‘burned out’ PDB), which can occur in long-standing PDB in some patients (Siris et al., 1980); however, this is not unexpected given the higher rate of bone turnover in mice, compared with humans and a relatively short observation period, as our mice were culled at the age of 12-18 months. We have previously shown that the lesions most commonly developed at the distal femur and proximal tibia and less commonly in the shaft of the long bones (Daroszewska et al., 2011), which is comparable with a similar distribution in humans in the long bones, albeit with more predilection for the proximal ends of the long bones in the latter (Renier et al., 1996). Here, we presented a lesion in the diaphysis of the femur, which progressed over time. The estimated rate of its linear progression was equivalent to 7.42 mm per annum growth in human at early stages and later to between 4.84 mm and 2.41 mm per annum, which compares to an ∼9.4 mm per annum linear progression of a femoral pagetic lesion in human, according to estimations made two decades ago (Renier and Audran, 1997), when PDB was more severe than currently. Thus, although the murine pagetic-like lesions appear to progress at a slower rate than the human ones, we argue that their progression is comparable. Indeed, the slowing down of progression with ageing, arguably could suggest eventual ‘burning out’ of the phenotype.
There is evidence that treatment with BPs inhibits PDB lesion progression and promotes formation of histologically normal bone (Reid et al., 1996). BPs also suppress the raised bone turnover that is characteristic of active PDB, and ZA is the most potent BP (Corral-Gudino et al., 2017). Thus, we were interested to assess whether ZA could prevent the development of pagetic-like lesions in our mouse model. No lesions were detected in the ZA-treated p62P394L+/+ mice, providing evidence of the efficacy of this agent in suppressing the raised bone turnover that occurs in this mouse model of PDB. Furthermore, the effectiveness of ZA given early, prior to lesion development, provides pre-clinical evidence, to support the approach used in the ZiPP study (ISRCTN11616770; https://doi.org/10.1186/ISRCTN11616770), in which ZA is being investigated as a means of preventing development of PDB lesions in SQSTM1 mutation carriers.
Although studying the general skeletal effect of ZA was not the primary objective of our experiments, our study led to a number of important observations with potential translational implications. The positive effect of ZA on bone volume was striking, and ZA had a profound inhibitory effect on bone resorption. Although the brittle nature of the sections from ZA-treated mice precluded formal measurement of bone resorption parameters by histomorphometry, observation of the (mostly badly damaged) sections indicated a significant reduction in osteoclast numbers in 12-month-old ZA-treated p62P394L+/+ mice. Moreover, ZA attenuated new bone formation, but with a net effect of increased bone volume. Furthermore, bones of the ZA-treated p62P394L+/+ mice showed significantly higher mineralisation compared with controls, which suggests that ZA significantly slowed down the bone remodelling process, which allowed for increased mineralisation over time. On the other hand, the change of shape at the mid-femoral shaft consequent to treatment with ZA suggests that modelling was still taking place, although it was impaired. The dose-dependent protective effect of ZA on bone has been described previously in animal models of ovariectomy-induced osteoporosis (Gasser et al., 2008). ZA is commonly used for treatment of both PDB and osteoporosis, and long-term use of BPs has been associated with an increased risk of atypical fractures (Schilcher et al., 2011), believed to be facilitated by the oversuppression of bone turnover (Compston, 2011); however, we did not observe any fractures in any of the mice by 12 months of age. We also did not see any evidence of microfractures on high resolution 2.5 μm scans (n=9, data not shown). Nevertheless, we were unable to formally assess bone strength, as the above observations were made on already fixed bone samples analysed by µCT and histology. Regardless, the ability of ZA to increase bone mass and promote mineralisation (with potential consequences of accumulation of microdamage) with impairment of remodelling and, to a degree, modelling might have translational implications when choosing this type of treatment for young adult individuals, especially for prolonged periods of time, as already implied by this known effect of BPs (Allen and Burr, 2011). Thus, given incomplete penetrance and declining prevalence and severity of PDB, careful consideration would have to be given when contemplating prophylactic use of ZA in susceptible individuals, in the light of potential negative ramifications of prolonged suppression of bone remodelling. It is expected that the outcome of the ZiPP trial will be instrumental in future clinical decision making.
The current study has confirmed our previous findings that the p62 P394L mutation is sufficient to cause a PDB-like disorder in mice and has provided new insight into the pathophysiology of the increased age-related penetrance of this disorder. The increase in osteoclastogenic potential of bone marrow cells from p62P394L mice with age provides an explanation for the increased penetrance with age that we previously observed in this model (Daroszewska et al., 2011), and for the increased penetrance of PDB with age in humans (Morissette et al., 2006). Furthermore, the preferential targeting of the lower limb bones with sparing of the vertebrae suggests that biomechanical factors could play a key role in determining where and when lesions develop (Daroszewska et al., 2011).
In summary, we have shown that osteoclastogenesis is enhanced with ageing and the p62 P394L mutation further increases age-related osteoclastogenesis and age-related bone loss. In the ageing skeleton, the p62 P394L mutation causes PDB-like lesions, which progress over time. It is unclear what triggers these lesions; however, the increased age-related osteoclastogenesis potentiated by the p62 P394L mutation seems to allow for lesion development, thus creating a permissive environment. ZA prevents the development of the PDB-like lesions, significantly increases bone volume and bone mineralisation, and interferes with age-related long bone shape changes.
MATERIALS AND METHODS
The p62P394L+/+ mice were generated by gene targeting as previously described (Daroszewska et al., 2011) and housed in a standard animal facility with free access to water and food. The study was conducted in accordance with institutional, national and European regulations of laboratory animal care and use, and approved by the Home Office (UK). The mice were on a mixed 129/sv and C57/BL6 background, and the colonies were maintained by breeding heterozygotes; WT, heterozygous and homozygous animals used in this study were littermates. As in this mouse model of PDB, there is no phenotypic difference between males and females (Daroszewska et al., 2011), for the assessment of ZA (Novartis) in prevention of pagetic-like lesion development, ten female p62P394L+/+ mice were randomly allocated to receive treatment with ZA in phosphate-buffered saline (PBS) at a dose of 85 µg/kg subcutaneously (equivalent to a human 5 mg/60 kg dose) as of 4 months of age, at which age mice are fully mature, but have no detectable pagetic-like lesions (Daroszewska et al., 2011). Of the ZA-treated p62P394L+/+ mice, four mice received three doses of ZA at monthly intervals and three subsequent doses at 2 month intervals (six doses in total). The remaining six mice received a total of five doses at 2 month intervals. The initial frequency of ZA administration at monthly intervals is approximately equivalent to 5 mg given at 2 year intervals to a human three times [given that a mouse ages 25× faster than a human (www.jax.org)]. Likewise, the frequency of administration of ZA 2 months apart to mice corresponds to 5 mg given 4.2 years apart to a human. This frequency corresponds broadly to the approach used in clinical practice for treatment of osteoporosis (three to six times annually) and PDB (repeat treatment depending on response). Ten control female p62P394L+/+ mice were randomly allocated to receive PBS alone at the same time points. These numbers were arrived at assuming that ZA would reduce the proportion of mice with lesions from 95% [as previously reported (Daroszewska et al., 2011)] to 19% by 12 months with a power of 80% and an α<0.05. ZA-treated mice were culled at 12 months. Most of the control PBS-treated p62P394L+/+ mice were culled at 12 months using cervical dislocation, but a small cohort was maintained until a maximum of 18 months. One of the control mice died after anaesthesia at 8 months and was replaced by an additional mouse.
Bone marrow was obtained from 3- and 12-month-old mice. Osteoclasts were generated by treatment of macrophages with M-CSF (Prospec Bio) and RANKL (kindly donated by Dr Jim Dunford, University of Oxford, Oxford, UK), according to standard methods as previously described (Idris et al., 2008). RANKL dose response was performed in 96-well plates. Numbers of osteoclasts were counted after TRAcP staining by an observer blinded to genotype and mouse age.
The skin was removed and hind limbs were fixed in 4% formalin-buffered saline and stored in 70% ethanol. μCT analysis was performed using a Skyscan 1272 or the in vivo Skyscan 1076 system. For assessment of bone morphometry, femurs and the lumbar spine were dissected free of most soft tissue, and scanned at a resolution of 4.5 µm (60 kV, 150 µA, using a 0.5 mm aluminium filter). Samples with pagetic-like lesions in the distal femur were excluded from the morphometry analysis. The reconstruction was performed using the Skyscan NRecon package. Trabecular bone parameters were measured using Skyscan CTAn software in a stack of 200 slices immediately proximal to the growth plate as described (van ‘t Hof, 2012). To screen for the presence of lesions and follow up lesion progression, mice were scanned in vivo at 18 µm resolution at 1-2 month intervals between the age of 4 and 12 months (and at age 15 and 18 months where indicated) under general anaesthesia using halothane. Assessment of lesions was performed by an observer blinded to genotype and treatment allocation after reconstruction as described (Daroszewska et al., 2011). Skyscan dataviewer software was used to register the series of in vivo scans for assessment of lesion evolution and bone changes over time. Bone changes over time were analysed in 100 slices at the mid shaft of the femur for cortical bone analysis, and in 100 slices at the distal femoral metaphysis, for trabecular bone changes using macros in CTAn. In the cortex, any bone changes in contact with the marrow space in the 4 month scans were designated as endosteal, whereas changes in contact with the periosteal outline of the 4 month scans were designated as periosteal. For analysing trabecular changes, the macro used first separated the trabecular from the cortical compartment in 4 month scans, and subsequently measured the bone gain and loss in the trabecular compartment by subtracting the registered scans for the 6 and 12 month time points.
Finally, to analyse tissue mineralisation, samples were equilibrated overnight in water, and the distal femur scanned inside drinking straws using a Skyscan1272 scanner (resolution 4.5 µm, X-ray source at 50 kV and 200 µA, 0.5 mm Al filter, camera binning 2×2, rotation step size 0.3°, averaging at 3). Hydroxy-apatite standards (Skyscan), were scanned using identical settings to calibrate mineral density. Next, datasets consisting of 300 slices at the mid shaft of the femur were thresholded to identify bone, and the binary was eroded (3D space) with a sphere with a radius of 2 to remove voxels affected by partial voxel effects. This binary was then used as a mask to measure the mineral density in mineralised tissue only [the tissue mineral density (TMD)].
Bone samples were processed and stained for histology as described by van ‘t Hof et al. (2017). Briefly, animals received calcein intraperitoneal injections 4 days and 1 day before culling. The skin was removed, hind limbs were fixed for 24 h in 4% formalin and stored in 70% ethanol. The samples were embedded in methyl methacrylate and 5 µm sections were cut using a tungsten steel knife. Sections were stained for TRAcP to visualise osteoclasts and counterstained with Aniline Blue. For analysis of calcein double labelling, sections were counterstained with Calcein Blue and histomorphometry performed as described by van ‘t Hof et al. (2017). All sections were visualised on a Zeiss Axioimager fluorescence microscope fitted with a QImaging Retiga 4000R digital camera. The histology assessment was performed by an observer blinded to genotype and treatment allocation.
Statistical analyses were performed using SPSS version 21. Differences between genotype or treatment groups were determined by ANOVA, Student's t-test or Fisher's exact test. All data are presented as means±s.d. unless stated otherwise.
We are grateful to Dr Jim Dunford, University of Oxford, UK, for the kind gift of RANKL.
Conceptualization: A.D., S.H.R., R.J.v.H.; Methodology: A.D., S.H.R., R.J.v.H.; Software: R.J.v.H.; Validation: A.D., R.J.v.H.; Formal analysis: A.D., R.J.v.H.; Investigation: A.D., L.R., N.S., G.C., A.P., K.R., R.J.v.H.; Resources: A.D., S.H.R., R.J.v.H.; Data curation: A.D., R.J.v.H.; Writing - original draft: A.D., R.J.v.H.; Writing - review & editing: A.D., S.H.R., R.J.v.H.; Visualization: A.D., R.J.v.H.; Supervision: A.D., R.J.v.H.; Project administration: A.D., S.H.R., R.J.v.H.; Funding acquisition: A.D., S.H.R., R.J.v.H.
This work was supported by the European Calcified Tissue Society (ECTS/AMGEN Bone Biology Fellowship to A.D.), The Paget's Association (to A.D.), Novartis Pharmaceuticals UK Limited (RB0007 to S.H.R.), the Medical Research Council (G0800933 to S.H.R.) and Arthritis Research UK (19799 to S.H.R. and R.J.v.H.).
S.H.R. has received honoraria to his institution from Novartis, is in receipt of research grants from Eli Lilly and UCB, and was an investigator in clinical trials sponsored by Abbvie, Ultragenyx, Amgen, Gilead and Eli Lilly. The other authors have no competing interests to declare. | <urn:uuid:c116ae15-bb92-436b-a33e-3f5446fed7f1> | CC-MAIN-2022-33 | https://cob.silverchair.com/dmm/article/11/9/dmm035576/53647/Zoledronic-acid-prevents-pagetic-like-lesions-and?searchresult=1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.925431 | 10,012 | 1.585938 | 2 |
Can You Play Overwatch On Pc With A Switch Pro Controller
Using the USB cable, attach the controller to your PC. After about a few seconds, your PC will recognize it as a Pro Controller. In the first instance, once your Pro Controller has been connected, you will see it detect it, and you will then be asked whether you wish to go into the settings further. If everything is set up correctly, proceed through this process.
How To Pair Your Playstation 4 Controller With A Wired Connection
Connecting the DS4 to your PC with a USB-A to Micro-USB cable is by far the easiest way to start gaming with the PS4’s pointer. Just plug it into your PC and let the drivers install themselves.
Hitting the PS button in the middle of the controller at this point won’t do anything unless you have Steam installed and running. If so, you’ll notice that Big Picture mode launches when you hit the button. At this point, you can make some tweaks inside Steam.
How To Connect A Ps4 Dualshock 4 Controller To A Pc
The PlayStation 4’s DualShock 4 controller is a fantastic gamepad, and with some tinkering you can get it to work with your PC.
The DualShock 4 is a great controller, but it’s designed specifically for the Sony PlayStation 4. That means, at least on paper, that it’s not meant to be used with PC games. Fear not, since PCs are such powerful and flexible systems, you can get nearly any peripheral to work on them with a little effort. Here’s how to connect a DualShock 4 controller to your PC.
Read Also: How To Grab Ips On Ps4
How To Emulate An Xbox Controller With A Ps4 Controller
Xbox 360 controllersand Xbox One controllers, now that Microsoft has finally released the necessary driversare usually best for PC gaming. Many PC games are designed specifically to work with Xbox controllers. Many games also require xinput input, which Xbox controllers provide, but other types of controllers dont.
If youre using a a PS4 controller with an emulator to play older games, you could easily configure the emulator to accept the controllers button presses. If youre using it with a PC game, you may need to open the PC games control-settings and configure the game to respond to the controllers inputs.
But for games that expect an Xbox controller, you may have to emulate xinput. This will convert the PS4 controllers input to the equivalent Xbox button presses, and games will just work with the DualShock 4 just like they would with an Xbox controller. Theyll just think youre just using an Xbox controller.
Sony hasnt released any official drivers for the PlayStation 4 controller on a PC, so theres no official way to do this. There are tools for emulating xinput with a PS4, but theyre unofficial, third-party tools developed by the community.
We recommend the free Input Mapper program. This tool will also helpfully show the battery level of your controller, which is something you wont normally be able to see in Windows.
Download And Install Inputmapper Software
Another third-party solution that can help you use PS4 controller on a Windows 10 PC is InputMapper. To configure your controller using InputMapper follow these steps:
We have to point out that certain games might have a few issues, so youll have to tweak a few settings in InputMapper in order to fix those issues.
Connecting PlayStation 4 controller to Windows 10 PC isnt that hard, and if you want to connect your PS4 controller to your PC be sure to try some of our solutions.
If you have any questions about connecting your PlayStation controller to a Windows 10 PC, sound off in the comments section below!
Also Check: Ps4 Running Hot
How To Connect Ps4 Controller To Pc
Simon Sayers / November 12, 2021
How To Connect PS4 Controller To PC, How To Pair PS4 Controller To PC Connecting a PS4 controller To A PC used to be a long and arduous task once upon a time, but now hooking up a DualShock 4 to your gaming set-up has never been simpler, and now that PlayStation Now is about to host some of the best PS4 exclusives its time you should work out how to do it. Follow this guide to discover how to connect PS4 controller to PC.
Rather than having to download drivers nowadays, the software for connecting your PS4 peripheral to your PC will automatically be detected. Use the micro-USB cable that comes with the PS4 and simply plug it into your PC USB port. Wait 30 seconds or so for the drivers to install and your PS4 controller is connected, and youre ready to play games.
How To Wireless Connect A Ps4 Controller To Steam
If you hold down the PS and buttons simultaneously on your controller, your PC might automatically detect it via Bluetooth. If it doesn’t, you might need a PS4 DualShock 4 wireless dongle to play wirelessly. Official ones can be purchased from Sony, or you can find one made by another manufacturer.
To wirelessly pair the PS4 controller with Steam:
Plug the PS4 Bluetooth dongle into your computer’s USB port.
Simultaneously hold the PS and buttons on the controller until the light on top starts flashing.
When the controller appears in the device list, press the X button on the controller to activate it.
Press the button on the end of the dongle. It should also start flashing.
You May Like: Gta 5 Ps4 Install
How To Connect Ps4 Controller To Pc Wirelessly
If youre looking for a wireless solution, then Sony has you covered with the DualShock wireless adaptor for PC. This launched in September 2016 and is available from various online retailers, including Amazon. Simply:
- Plug the adapter into your PC USB port and wait for drivers to install
- Hold down the Share and PS buttons at the same time on your DualShock 4
- This will pair both devices and you should now be able to use your PS4 controller on PC
Note: You are not restricted to just using a Sony controller on PC. Some third-party controllers that also utilize the XInput API will also work, but its worth investigating it thoroughly online before buying a controller that doesnt work!
How To Play Non
To play non-Steam games on a Windows PC, you’ll need a special device driver. The DSWindows driver works by tricking the computer into thinking the PS4’s DualShock controller is an Xbox controller.
Unplug any nearby PlayStation 4 consoles to avoid syncing interference.
Plug the PS4 controller into a USB port on the PC.
Open a web browser, go to ds4windows.com, and select . This takes you to GitHub with a listing of the latest drivers.
Select DS4Windows.zip to download it.
Open the zip file and move the files from the zip file to your PC.
Open the DS4Windows.exe file.
If nothing happens when you select the file, restart your computer and open it again.
Select Appdata in the pop-up window.
If prompted to give DSWindows.exe permission to make changes to your computer, select Yes.
The driver installs automatically, and the controller is ready to use. A menu opens where you can adjust the PS4 controller settings. Open DS4Windows.exe any time to access this menu.
On Windows 7 or an earlier version, you’re prompted to install support for Xbox 360 controllers.
If you experience any problems, reboot the computer. Sometimes this may be needed for Windows to detect the driver and the controller properly.
Recommended Reading: How To Text In Minecraft Ps4
Use Ps4 Controller With Pc Via Bluetooth
Sonys PlayStation 4 controller is wireless. To keep cables out of the way, the controller can be connected to a PC via the built-in Bluetooth function.
- Bluetooth must be activated on the computer so that the connection between the PC and the hardware can be established.
- To do this, first open the Settings and select Devices there. The Bluetooth function appears at the top of the menu and is activated by clicking on it.
- In the next step, select Add Bluetooth or other device and click on the first item Bluetooth .
- The PC will now search for Bluetooth devices close by. The PS4 controller must also be activated so that it can be connected to the PC. This is called pairing mode.
- To activate this mode, press and hold the PS button and the Share button at the same time.
- The PC will recognize the controller as a wireless controller, which you finish by clicking on the selection . From this point on, the computer is connected to the PS4 device.
Even with this connection method, some games require a of the controller. Next, well show how to customize the PS4 controller and change the button assignment for a game.
We explain how to use a PS5 controller on PC in an extra article.
Add Epic Games Launcher To Steam
If you add Epic Games Launcher to Steam and run it through that, every game in your Epic Games library can make use of Steam Input. This is a pretty simple process, and you can do it by following the steps below.
- Launch Steam, and click on Games at the top left
- Select Add a Non-Steam Game to My Library
- After clicking this, a list of programs will show up.
- Here, you want to check Epic Games Launcher, and then click Add Selected Programs
- This will add Epic Games Launcher to your Steam library
- Now, click on Steam at the top left
- Select Settings
- Now, select the Controller tab
- After this, select GENERAL CONTROLLER SETTINGS
- Now, make sure PlayStation Configuration Support is checked
- Now, launch Epic Games Store
- Now, launch Salt and Sacrifice as you normally would in Epic Games Launcher, and youll notice how you can access Steam Overlay as well.
- You can now play with your Dual Shock 4 controller since youve enabled Steam Input
You can use other controllers like the Switch Pro controller as well, and all you need to do is follow the same steps above, and check the Switch Pro Configuration Support.
This is all you need to do and all your Epic Games library will have Steam Input support as well. We hope that the developers add native Dualshock 4 support in some updates, but for now, this is the easiest way to add support manually.
We hope this guide helped you play with Salt and Sacrifice with PS4 Controller. Let us know if you have any questions in the comments below.
Don’t Miss: How To Sign In To Playstation Network For Ps4
Quirks And Game Support
Now for the “bad” news. Using a DualShock 4 on your computer can be a bit tricky at times. A lot of it depends on your system setup and what you are trying to do with the controller.
Windows users relying on DS4Windows should be good to go as long as the game you are playing has controller support. DS4Windows transforms the signals from the DS4 into Xbox 360 code, so it’s effectively remapped across the OS.
We also tested the DualShock 4 with Steam on PC, and it works great in “Big Screen” mode after a bit of tinkering. After starting the Steam launcher in Big Screen mode, you want to click on the Settings icon . Click the Controller Settings tab and check the “PlayStation Configuration Support” box.
Using the DualShock 4 with PlayStation’s Remote Play app is relatively painless since the apps for both PC and Mac have built-in support. However, if you are running a version of macOS earlier than Catalina 10.15, you will need Sony’s DS4 Bluetooth dongle. This is unfortunate because the officially supported adapter goes for about $65 on , although you can find them for less on eBay.
Some Redditors have reported that you can use any Bluetooth adapter, and this may be true, but we have not tested to confirm this. We have tested the official dongle, and it solves Remote Play compatibility issues on older iterations of macOS.
Option : Connect Using Ds4windows
This solution requires a bit of set up, but its still the best way to get your PC and DualShock 4 controllers talking without any major headaches. You can connect your DualShock 4 controller to your PC using DS4Windows, a third-party application, in either wired or wireless mode . Unless you buy the adapter, this is the best option if you plan to play games through Origin, UPlay, GoG, or other PC gaming portals.
Step 1: Download the latest version of DS4Windows, which can be found on the applications official website.
Step 2: Extract it using an archive manager such as WinRAR or 7Zip. You will then have two files, DS4Windows and DS4Update.
Step 3: Double-click DS4Windows to run the installer, which will prompt the following dialogue box:
Step 4: Follow the on-screen instructions, beginning with driver installation. The installation is quick, so you wont have to wait long. Click on Install 360 Driver if youre running Windows 7 or older the driver comes preloaded on Windows 8 and 10 machines.
Step 6: Hold the PS Button on your DualShock 4 for three seconds, or until the light bar begins to flash.
Step 7: Open the Bluetooth settings on your PC.
Step 8: Connect to Wireless Controller.
Step 9: If prompted to input a pairing code, enter 0000.
Step 10: Click Finish on the DS4Windows installer.
Don’t Miss: How To Sign In To Playstation Network
How To Use A Ps4 Controller With A Pc
Bypublished 14 December 17
Connecting a PS4 controller to a PC is easy, but unless you want to invest in a third-party adapter, you’re better off with a PC controller.
In the olden days , connecting a PS4 controller to a PC was a harrowing process, with unpredictable results. Now, PC gamers can use the DualShock 4 with relative impunity, thanks to better software, better hardware and better Steam integration.
Still, plugging in a DS4 is not quite as simple as using an Xbox 360 or Xbox One controller, so if youd like to bring a PS4 peripheral to a PC party, heres what you need to know.
Getting The Gamepad To Work
Connecting the controller is only the start of the process, due to how the DualShock 4 communicates with your PC. Most current Windows games use Microsoft’s XInput, an interface that processes Xbox 360 and Xbox One controller inputs. The DualShock 4 doesn’t send XInput commands, so a wrapper is needed to translate its inputs into something your PC can deal with easier. There are two good options: DS4Windows and Steam’s controller compatibility settings.
Read Also: What Year Did Playstation Come Out
Ds4 For Windows: How To Configure A Ps4 Controller
Unlike controllers from the Xbox series, which are tailored for use with Windows, some games do not recognize the PS4 controller on PC. In other cases, the pre-set assignment of the buttons is not ideal, so they might need to be adjusted. In both cases, programs like DS4 Controller help to recognize a PlayStation controller and assign buttons individually.
This software converts controllers so that they are considered Xbox controllers for Windows. This is necessary because Windows uses the Xinput interface to link controllers to a computer. The Xinput interface is limited to linking Xbox components to Windows, both of which are made by Microsoft.
With the use of programs like DS4 for Windows, it is suggested to the PC that the connected controller is an Xbox controller. It does not matter whether you connected the PS4 controller to the PC via USB or Bluetooth.
If you are using Windows 7, the appropriate driver must be downloaded beforehand Windows 8.1 and higher have the driver pre-installed.
When you start the program, it should directly find and display the controller previously connected via USB or Bluetooth. In the menu of DS4Windows you can see in the Controller area under ID whether the controller has been connected and recognized. The individual assignment of the buttons you make in the menu item Profile. The DS4 controller shows the translation of the PS4 buttons to a virtual Xbox controller there .
Pair Ps4 Controller To Windows
First, well pair and connect the DS4 controller to the Windows computer. Go to Settings by clicking the Settings button on the bottom left corner in the Start menu.
to open the Devices settings, here we can manage all the devices and add the DS4 controller via Bluetooth.
your computer would start looking for Bluetooth devices ready for pairing. Now would be a good time to put your DS4 controller in the pairing mode.Press and hold the PS + SHARE button simultaneously. When the light on the controller starts pulsing white, it means the controller is in pairing mode.
It would show up on the list on your computer. to begin the pairing process.
The light on your controller would turn to a solid color and stop pulsing or blinking. It means your controller is paired and you can use it with supported applications but if you try to use the touchpad, it does nothing.
You May Like: Free Ps4 Backup Codes | <urn:uuid:65f0c392-2918-4490-9ed5-695e96891a0c> | CC-MAIN-2022-33 | https://www.psproworld.com/how-to-use-a-ps4-controller-on-pc/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.880181 | 3,663 | 1.859375 | 2 |
Dozens of monkeypox cases are confirmed or suspected all over the world after long outbreak of Corona virus. There’s a monkeypox outbreak in the United Kingdom, Portugal, Spain, and other European countries.
Monkeypox is a viral disease that occurs mostly in central and western Africa. It is called monkeypox because it was first identified in laboratory monkeys. Monkeypox can be spread when someone is in close contact with an infected person.
Typically, people catch monkeypox from animals in West Africa or central Africa and import the virus to other countries. Monkeypox killed at least 58 people and infected over 1,200 others in the Democratic Republic of the Congo since the beginning of this year.
Monkeypox symptoms are similar to but milder than smallpox symptoms. Early signs of monkeypox include flu-like symptoms such as, Fever, Chills, Headache, Muscle, aches, Fatigue, Swollen lymph nodes. Studies in central Africa, where people have less access to quality health care, show the disease kills as many as it can.
After one to three days, a rash with raised bumps develops. The rash often starts on your face and then spreads to other parts of your body, including the palms of your hands and soles of your feet.
Monkeypox in small animals imported from Ghana as exotic pets was at the origin of an outbreak of human monkeypox in the USA in 2003 according to research from Texas lab. Now the virus outbreaks again and it’s spreading so fast all over the world. Many countries have confirmed many cases and this could lead to a second lock down worldwide.
There’s currently no proven, safe treatment available for monkeypox. Antiviral drugs may help, but they haven’t been studied as a treatment for monkeypox. Instead, your healthcare provider will monitor your condition and try to relieve your symptoms. | <urn:uuid:65fce6eb-4d2f-4d98-8e80-2e891781b758> | CC-MAIN-2022-33 | https://ebinaija.com/is-another-worldwide-lockdown-roaming-here-is-what-you-need-to-know-about-monkeypox/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.94724 | 385 | 3.421875 | 3 |
There are several types of data breaches. Some of these are more widespread than others, such as hacking. There are also ways to protect your company from these types of attacks. However, these methods cannot entirely prevent all data breaches. It would be best to implement strong password guidelines, two-factor authentication, and password updates to protect your company’s sensitive data. This article explains the five data breaches including hacking, application whitelisting, malware and ransomware, and insider threats.
Hacking is malicious software to gain access to data or steal it from a company. Almost six out of ten of all data breaches are caused by hacking. Other common ways for hackers to obtain data include phishing emails and ransomware. According to the ITRC’s annual CyberScout report, phishing attacks accounted for nearly half of reported data breaches. Moreover, phishing attacks rose by 17.7 percent from 2015 figures.
Computer attacks can be quite sophisticated, utilizing weaknesses in software. These vulnerabilities often result from human error. Most software is designed to have one purpose but may behave differently when used for another purpose. Hackers take advantage of these inconsistencies and use them to their advantage. One of the oldest hacks to obtain data is called SQL injection. This exploit allows hackers to read inaccessible data or trick the system into optimizing execution speed.
There are two key ways to implement application whitelisting. First, separate your application whitelist into categories and determine which applications are crucial to your company. For example, a core category should list applications used across the entire organization, while a departmental whitelist should include only applications used by a particular department. Each department should also have a separate whitelist, as the needs of different departments can vary. Next, identify which tasks need to be performed by which applications. In addition, application whitelisting helps protect critical servers and applications from zero-day attacks. These security measures prevent the execution of unauthorized applications that target your network. While this approach is restrictive, it is essential for preventing three types of data breaches. For instance, it prevents zero-day attacks and other types of malware. Since the risks associated with unknown malware are high, whitelisting protects your most critical systems and applications.
The most common types of malware are viruses and spyware. While some preventative measures can mitigate malware attacks, most victims aren’t protected against all of them. While security policies and awareness training are good starting points, no system is completely free of vulnerabilities, and threat actors will always find a way inside. In addition, malicious software poses a serious risk to the data on your computers, devices, and people.
Malware can infect your computer by installing itself onto your hard drive or navigating hacked websites. Malicious software is also called ransomware. Infected software can also be downloaded from unknown sites or opened via email attachments. Malicious apps frequently masquerade as legitimate apps, direct links, or software. They may request personal information or access confidential data, putting your security at risk.
One of the most common types of data breaches is an insider threat. Unfortunately, these attacks often go undetected, and they can continue for years without being detected. For example, Desjardins, a Canadian finance firm, suffered from a similar breach in which users copied customer data to a shared drive. A malicious insider then continued to copy that data for two years before it was discovered. Eventually, the breach was publicly revealed, resulting in 9.7 million customer records being disclosed. As a result, Desjardins spent $108 million to remedy the breach.
One way to combat insider threats is to educate employees on their dangers. The Federal Trade Commission offers a guide to data breach response, and the Identity Management Institute has a web page about insider threats. The FBI also provides an online brochure on insider threats. Insiders are among the most dangerous threats to data breaches. A data breach can cost millions of dollars and cause irreversible damage. In addition to stealing confidential data, insiders can access sensitive information through unapproved means.
Data breaches occur when hackers steal or access personal data. There are several types of data breaches, each with its specific definition. For example, a data breach can be defined as “unauthorized third-party access to, or misrepresentation of, personal information.” Other data breaches occur when computing devices containing sensitive information are lost or stolen. In some cases, ransomware is responsible for both.
Data breaches are not only damaging for victims but also for businesses. A Ponemon study estimates the average cost of a data breach at $3.9 million and $148 per record. The number of websites compromised each month is estimated at around 4,800. According to Ponemon, one in every four companies will experience a data breach. Moreover, these breaches are becoming increasingly difficult to detect, making proper response all the more important.
Read more: How to Register UltData In 2022 | <urn:uuid:7113e224-b97a-42fa-b1d2-f0bc697089d1> | CC-MAIN-2022-33 | https://www.techsnopes.com/five-types-of-data-breaches/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.933897 | 1,021 | 3.078125 | 3 |
By Abel Merawi
February 7, 2020 (Ezega.com) -- When archeologists and evolutionary biologists study the development of human beings, they look for cave drawings and other artistic expressions such as tool making. These are important since they are manifestations of mental progress. On top of that, they are ways of sharing our unique experiences with others. Throughout history, art stood as the mark of the human intellect, which is revealed through creative works. In modern times too, the work of artists is adored because it shows the endless stream of our imagination. Leonardo Da Vinci embodies the complete meaning of a genius artist since he was a painter, sculptor, engineer, scientist, and architect. Everything he did create new possibilities for every human being across space and time. He was constantly opposed by the authorities and people of his age, yet it was through him and others like him that the Italian Renaissance became a reality. Da Vinci has set a standard for artists through his imagination, creativity, bravery, and loyalty to the truth that he knew and pursued to fruition. Presently, artistic expression has been jeopardized primarily because the artist could not stand against political and societal obstacles and be worthy of the name.
The reason behind an action can determine the value, and it is important to know why artists create. As the German philosopher, Immanuel Kant states, it is not based on the outcome of an action but through the intention that we can find the value of the act. Thus I ask: why does the writer write; the painter paint; or the singer sing? Although there are numerous reasons, the top ones have to do with personal or societal interests. It could be for society when the artist feels that there should be something done about the defects in the current system. It could be personal as a way of finding relief from the burden of thoughts by making them part of reality. This could also be for the sake of a truth that the artist wants to glorify. Yet, our post-truth age has given birth to a new breed under the name of commercial artists, who strive solely for fame and money.
There are two opposing sides to artistic expression. These are commonly categorized as supporters of ‘Art for art’s sake’ and supporters of ‘Art for societal sake’. The basic difference arises from the argument on the obligation of the artist: either to the society or to one’s inner callings. When we claim art should be done for art’s sake, we are saying that the artist should only listen to the creative expression within oneself despite the consequences. In other words, the artist is not under any obligation from society because artistic expression can only be realized with complete personal freedom. In this category, we find realistic writers such as Emile Zola of France and Sebhat Gebre-Egziabher of Ethiopia, who try to reflect reality as it truly exists by living the choice to either accept or reject it to society. On the other hand, there are those who argue that the artist has an obligation to society since the final work is presented to people. This means the artist plays the role of an educator by respecting societal values and by opposing the system as defender of the people. In this category, we find writers such as Aleksandr Solzhenitsyn of Russia and Be'alu Girma of Ethiopia, who tried to expose the problems in the existing political system of their times and ended up paying dearly. Sadly, the commercial artist is not found in any of the two categories since he/she cares nothing of art or society.
The real enemies of the people are commercial artists. They are not even real artists because they don’t possess an inner truth expressed through creativity. They rather feed on societal problems in order to gain personal fame and money. During the Italian occupation of Ethiopia, there were many Ethiopian artists who sided with Italy and spread propaganda. In recent times too, there were Ethiopian artists who sided with the government and manipulated the public. When I look at artists who sing about national or ethnic pride and patriotism, I get the feeling that they are exploiting the mob in its irrationality rather than preventing it. Such commercial artists smear the name of true art for they only think of their personal gains at the expense of others. Yet, we should not lose hope because we also have real artists that echo the truth. True artists in the 1960s emerged from university students, who composed voluminous poems that inspired change and revolution and served as the voice of the people. Sadly, our generation lacks such voices since the center stage is occupied by political affiliates.
The writer is bound to face challenges while expressing inner truth or while serving society. In both cases, the artist has to have loyalty to the truth, which can threaten the existing political and social system. It is not the intention of the artist to arbitrarily oppose the system. If he did, it is because s/he lives and expresses the truth, which may end up threatening a corrupt system. Vaclav Havel in his book, ‘The power of the powerless’ expresses this by saying, “I know that there is an invisible line you cross – without even wanting to or becoming aware of it – beyond which they cease to treat you as a writer who happens to be a concerned citizen and begin talking of you as a ‘dissident’.” This is exactly what happened to writers like Be'alu Girma. When Be’alu Girma wrote the book ‘Oromay’, he was showing the truth, but the truth was a threat to the Derg regime and led to his disappearance. The renowned writer Dagnachew Worku spoke of ‘Oromay’ and the consequences by saying that Be’alu wrote the "common knowledge in Addis Ababa at the time, but perhaps he underestimated the power of the printed word." Even the common truth of maladjustment becomes a threat when presented artistically. Freedom of artistic expression is important precisely because it makes the truth louder and undeniable. Accordingly, those who are faithful to art or to society deserve admiration for courageously defending the truth.
Real artistic expression is necessary for the progress of any country. We should remember that before the Wright Brothers invented the airplane, Da Vinci expressed it in his painting. Nietzsche states the effect and power of the artist under the title ‘Music as an advocate’ in ‘The Gay Science’ by stating, “’I am thirsting for a composer,’ said an innovator to his disciple, ‘who would learn my ideas from me and transpose them into his language; that way I should reach men’s ears and hearts far better. With music one can seduce men to every error and every truth: who could refute a tone?’” Even the hard and cruel truth becomes more acceptable through art, and so the artist should use it to reach the hearts of the people and bring about change.
Abel Merawi is Addis Ababa-based contributor for Ezega.com. He can be reached through this form.
Other articles by Abel Merawi:
Achievements vs Natural Accidents
The Grip of Sacrifice
Injustice is Never Justifiable
Education Demands of the Future
Job Security, Life and the Unpredictable Future
The Shift From Racism to Culturism
Sacrificing Meaning for Power?
Culture and Market Forces
Seeking Cosmic Justice
National Myths: Makers and Destroyers of Nations
Are We Truly Free?
Maturity: The Prerequisite to Freedom and Democracy
Loyalty to Truth, Not to Group
The Value of Work
The Flaws with Ethiopian Political System
Intellectuals and the People
Where Are Our Pathfinders?
The Allegory of the Cave and Its Lessons to Leaders
The Truth Behind Humanity
The Seven Virtues
The Seven Deadly Sins
What is the right thing to do?
Building National Identity
Adey Abeba and the Spirit of Change
Living the Truth as a Human Being
Hubris - The Tragedy of Not Learning from Others
The Era of Group Mentality: Us vs Them
Join us on social media:
Like Ezega.com on Facebook and get Ethiopian News updates regularly.
Get the latest Ethiopia News by following us on twitter @Ezega_Official.
Follow Ezega on LinkedIn for Ethiopia Jobs and Ethiopian News Today. | <urn:uuid:84c1fb16-52ff-4edb-9ad9-6a9e98c38cc7> | CC-MAIN-2022-33 | https://www.ezega.com/News/NewsDetails/7729/Manifestations-of-Artistic-Expression | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.963606 | 1,762 | 2.9375 | 3 |
It can be a daunting experience when it comes to managing a deceased estate, especially for people who are still grieving the loss of a loved one.
Barrett Walker has extensive experience in obtaining grants of probate or letters of administration on behalf of our clients.
We can assist our clients in the administration and winding up of deceased estates in an efficient and effective manner.
The probate and administration process of deceased estates
Unless it is a small estate, a person who wishes to administer a deceased estate in Victoria (Australia) must first apply to the Supreme Court of Victoria for a grant of representation. A grant of representation gives the applicant power to deal with the deceased's property (such as bank accounts, shares, real estate, and intellectual property) and thus allowing the applicant to collect and release the assets, and settle the liabilities of the deceased for the benefit of the creditors and beneficiaries.
What is probate?
The three types of grant of representations are grant of probate, letters of administration with will annexed and letters of administration. This depends on whether a valid original can be produced by the applicant.
Grant of probate
A grant of probate is the most straightforward category. When a person passes away leaving a valid will, the executor(s) named in the will is entitled to apply to the Supreme Court of Victoria for a grant of probate by providing relevant documents such as the original will, death certificate, inventory of assets and liabilities and an affidavit. Before these documents can be lodged, an advertisement should also be placed on the Supreme Court of Victoria notice board for 28 days advertising the intention of the executor(s) to apply.
Letters of administration with will annexed
Often we see situations where a deceased left a valid will but the named executor(s) are unable or unwilling to apply for probate. In these circumstances, another person who wishes to apply to the court for a grant of representation can apply to become an administrator.
In addition to providing all the documents specified above, an adequate explanation should also be provided to the court to explain why the applicant is entitled to become the administrator. For instance, in the absence of the executor, the applicant has the biggest interest in the deceased estate.
Letters of administration
In situations where no valid will can be found, there will be what is called an "intestacy." The process is similar to applying for letters of administration with will annexed. The applicant will need to explain his interest in the deceased estate and why, in the absence of a will, the applicant is entitled to become an administrator.
Administration of estate
Once the probate or letters of administration has been obtained, the executor or administrator is then required to:
Gather and preserve the assets of the deceased estate;
Notify the beneficiaries;
Pay off outstanding liabilities (including tax liability) of the estate;
Defend the estate in any legal proceedings;
Distribute the balance of the estate to the beneficiaries under the will or provisions of the Administration and Probate Act 1958 or court rulings (if any);
Set up trusts for the beneficiaries (if applicable).
What could go wrong?
Although it might sound like a straightforward process, a lot of issues can become contentious when it comes to wills and estates. Here are some of the most common issues we have dealt with:
the mental capacity of the will-maker is often called into question.
The terms of the will may become contentious where a person, being a named beneficiary or a potential beneficiary, may hold the view that he or she has not been given a fair entitlement and may seek orders from the court invalidating the will or orders varying entitlements.
When all named executors are or become unable to apply for a grant of representation, and multiple parties compete for a grant of representation.
When all named beneficiaries pre-decease the will-maker and multiple parties compete for entitlement in the estate.
At Barrett Walker, we have extensive experience in dealing with deceased estates. We have acted for executors, beneficiaries, creditors, and various claimants. We offer practical legal advice and aim for parties to come to an early resolution. | <urn:uuid:7d66e86c-e0c2-4b89-8911-0bd0bf124ced> | CC-MAIN-2022-33 | https://www.barrettwalker.com.au/services/legal/probate-and-the-administration-of-deceased-estates | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.934931 | 850 | 1.59375 | 2 |
Don't fix these 7 problems
7 red flags that your startup is solving the wrong problem
If you want to generate value, solving a problem is a great strategy
Early-stage startups struggle with defining the problem to solve
Below are 7 common mistakes when defining your problem
A problem well-stated is a problem half-solved
Charles F. Kettering (head of research at GM)
Here are 7 risky problem definitions
🧠 The reasoned problem
Made up by the founder
Usually comes in an imagined story/scenario
Can not be attributed to an actual living person
Example: When booking tickets for a HyperLoop-journey, people will be concerned about carbon offset.
Ask yourself: Who told you about this problem?
🚫 The non-problem
Assigned problem status to part of the story of customer
Customer doesn't see it as a problem
Example: A potential customer talks about how she plans her holidays. It's chaotic and messy, 20 tabs open, but she says she loves that scavenger hunt style to it. The team (unrightly) classified that as a problem.
Ask yourself: Who told you this is a problem?
👥 Problem without an owner
It’s unclear who owns or cares about this problem
It's often the result of sloppy customer research
Finding the owner reveals why it is a problem
Example: a startup wanted to make impact on election voting turnout among the youth. It's tempting to say it's a good thing, but who actually cares enough to pay for this?
Ask yourself: Who cares?
☂️ The umbrella problem
The problem is very broad (e.g. climate change)
The problem can be broken down into smaller sub-problems
Almost all successful solutions focus on a sub-problem
Find your sub-problem
Example A: Climate change > CO 2 emissions > CO2 emissions by vehicles > CO2 emissions by cars > CO2 emissions by cars while waiting for traffic light
Example B: Climate change > Methane emissions > Meat consumption > Beef Consumption > Lab grown meat is expensive
Ask yourself: What is the direct problem we solve? What is the indirect problem we solve?
🤯 The 'lack of overview'-problem
Customers claim "there are too many solutions" or "I don't know where to start"
Founders think the lack of overview is the problem
Lack of overview can be a result of customer not attempting
No attempts can hint at lack of customer need
Example: a KPI-dashboard that nobody uses because they are not focused on KPIs.
Ask your customer: What have you done to fix this problem?
ℹ️ The 'access to information'-problem
Customers claim they don't have enough information to act differently
Can it really not be solved with a simple Google search?
Lack of simple Google search can hint at lack of true need
Example: I've seen many startups pitch a app that provides better information about how sustainable products actually are (clothing, cosmetics, grocery goods). People in interviews tell them that information on sustainability is hard to find. Is it though?
Ask your customer: When is the last time you searched for extra information?
📈 Making your business goal their problem
Some business goals are related to customer behaviour
Sometimes people forget how this business goal contributes to the life of the customer
Result: customers are forced to do things they don't want
Example A: A dating app did a Corona-fuelled pivot. They saw a sudden usage drop due to the lockdown. They prioritised on how they could stay top of mind for their users. They build a solution that their customers didn't want, as their experiments showed. With this move, they ignored the actual needs of the customer.
Example B: I consulted an energy supplier. They said: 'How can we have a more tight, personal relationship with our customers?' I probed them: 'Maybe your customer doesn't want a tight personal relationship with a commodity as yours?' Didn't occur to them.
Ask yourself: Do I know what my customer wants to achieve?
💡 Note: This is not (exact) science
This article is a synthesis of my experience as a startup coach of 100 startups, this is not scientific research.
For each of these problems, there are scenarios where each of these red flags actually isn't a red flag. I'm not claiming that all these red flags are things to avoid at all cost.
I would urge you to do a double-check if any of these problem types resonate with your current problems in your startup.
Do you have more to add to this list? Let me know!
Hey, you! What about this one:
How was this one for you? | <urn:uuid:232e3819-f7d6-4c2f-88c6-b67c978e4bf5> | CC-MAIN-2022-33 | https://iwantproductmarketfit.substack.com/p/problem-red-flags | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.945157 | 1,026 | 2.0625 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.