text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
Digital Art Photography menggunakan Facebook. CLASS ACTION WAIVER FOR U.S. CUSTOMERS. THESE TERMS DO NOT ALLOW CLASS OR COLLECTIVE ARBITRATIONS, EVEN WHEN THE AAA PROCEDURES OR RULES WOULD. HOWEVER ANOTHER PROVISION OF THESE TERMS, THE ARBITRATOR MAY AWARD MONEY OR INJUNCTIVE REDUCTION ONLY IN FAVOR OF THE PERSON OCCASION SEARCHING FOR REDUCTION AND ONLY TO THE EXTENT CRUCIAL TO SUPPLY THE AID WARRANTED BY THAT OCCASION’S PARTICULAR PERSON DECLARE. ARBITRATION OR COURT DOCKET PROCEEDINGS HELD BENEATH THESE PHRASES CANNOT BE BROUGHT, MAINTAINED OR RESOLVED ON BEHALF OF OR BY A CLASS, AS A PRIVATE ATTORNEY-BASIC, OR IN SOME OTHER CONSULTANT CAPACITY. IN ADDITION, INDIVIDUAL PROCEEDINGS CANNOT BE COMBINED WITHOUT THE CONSENT OF ALL OF THE PARTIES. ANY QUESTION CONCERNING THE ENFORCEABILITY OR INTERPRETATION OF THIS PARAGRAPH SHALL BE DECIDED BY A COURT AND NEVER THE ARBITRATOR.
One of the best ways to do this is to meet the artist one-on-one. Opening receptions are the most effective places to satisfy artists and converse with them about their work. Ask about their influences, their creative journey, and what the work means to them. Nevertheless, if you can’t make it to considered one of these occasions, most galleries could have data out there about the artist: printed materials, write-ups, interviews, or their artist assertion. Ask the gallerist or curator, as properly, and listen to about their private interactions with that artist.
Conceived in 1996 because the Moscow Home of Photography, it was the first Russian state art institution focused on the art of pictures. Now it’s comprised of the Moscow Home of Photography and The Alexander Rodchenko Faculty of Photography and Multimedia. The museum’s web site is a showcase for a century’s value of incredible recovered Russian photography, dedicated to the representation of recent artwork associated to new multimedia applied sciences.
Within the artwork commerce the term retains some currency for objects from before roughly 1900 and could also be used to define the scope of auctions or auction home departments and the like. The time period also remains in use in tertiary education , appearing within the names of faculties, colleges, and courses. Within the English-talking world that is largely in North America, but the same is true of the equivalent terms in other European languages, equivalent to beaux-arts in French or bellas artes in Spanish.
1. a movement in painting involved with effects of light, particularly the usage of damaged colour in its full depth with a minimal of shadow effects, utilized particularly to many Impressionist and Pointillist artists. Not an artist? That is the simple answer. Artists are different individuals. They do not costume or act or work like we do. They don’t seem to be required to go to meetings, they’re filled with themselves, they’ve tattoos, and so they have expertise.
Auto-Renewal. Along with Part 11(b)(v), the next shall apply: In case your subscription is auto-renewed and the price has increased, you may be notified of the relevant new price and you’ll be allowed to terminate your subscription inside a period of 14 days upon receipt of the discover. In such case the brand new price will not change into effective and your subscription will finish at the end of the time period.
Art for social causes. Artwork can be used to lift awareness for a big variety of causes. A variety of artwork actions were geared toward elevating consciousness of autism , seventy five seventy six seventy seven most cancers, seventy eight 79 eighty human trafficking , 81 eighty two and a wide range of different subjects, akin to ocean conservation, eighty three human rights in Darfur , eighty four murdered and missing Aboriginal girls, 85 elder abuse, 86 and pollution. 87 Trashion , utilizing trash to make vogue, practiced by artists reminiscent of Marina DeBris is one instance of using artwork to raise awareness about air pollution. | <urn:uuid:b44019dd-8d9a-4179-8b8a-225f2179dabd> | CC-MAIN-2022-33 | https://www.fatpierecords.com/bedroom-artwork-panoramic-photographs-posters-photography-wall-artwork-framed-prints-more.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.893301 | 914 | 1.546875 | 2 |
When your car won’t go in reverse, it’s natural to feel worried or agitated. This is usually an indication of transmission issues. However, this does not always imply that the entire system must be replaced. You may only need to replace the transmission fluid and filter in some circumstances. On the other hand, the problem can be resolved by changing the automatic transmission linkage. If everything else fails, you can totally rebuild the part.
According to Mechanicbase.com, the easiest workaround is to quickly go from Park to Low, repeating the action multiple times. Doing so will dislodge the rust or corrosion in the system. Consequently, it allows the computer signal to be correctly read, allowing the switch to move again.
There are some instances in which you might be able to keep on driving your car even though it won’t go in reverse. But in general, you should try to steer clear of driving a car that appears to be having transmission trouble. You could make the problem a whole lot worse if you have a car with low transmission fluid or another semi-serious transmission issue. You’re going to be much better off driving down to an auto repair shop to have your car looked at right away.
Here are additional things to do when your car doesn’t go in reverse.
For instance, if your automobile will not go into reverse because it is spilling transmission fluid, all that has to be done to fix the problem is to repair the component that is leaking. The same holds true in more extreme circumstances, such as when there is damage to the reverse gear.
Rebuilding the transmission may be necessary if the condition is relatively severe, which requires dismantling the transmission and inspecting each component. Obviously, this one requires a lot more time and effort, which equals a larger price tag. Fortunately, the reversing issue will not be the only one receiving attention. In place of that, your transmission will be thoroughly inspected, cleaned, and fixed (if needed). After this, you’ll feel a lot better about yourself.
Naturally, if the defective reverse gear is simply one portion of a gearbox that is in poor shape, you should probably think about replacing the entire transmission rather than just the one part that is broken. A replacement might be an easier solution to implement, depending on the level of damage that has been sustained. It’s true that buying a brand-new transmission will run you quite a bit of money, but you may cut those expenses by opting instead to purchase a used transmission that’s in pristine shape. | <urn:uuid:021e85a0-657e-4b63-9d75-6df3ddbf1859> | CC-MAIN-2022-33 | https://ecjionline.com/2022/07/16/when-your-car-does-not-go-in-reverse-do-these/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.946914 | 540 | 1.820313 | 2 |
Utilizing citizen science to model the distribution of Aedes aegypti in West Africa
Abstract: In the rapidly urbanizing region of West Africa, Aedes mosquitoes pose an emerging threat of infectious disease that is compounded by limited vector surveillance. Citizen science has been proposed as a way to fill surveillance gaps by training local residents to collect and share information on disease vectors. Understanding the distribution of arbovirus vectors in West Africa can inform researchers and public health officials on where to conduct disease surveillance and focus public health interventions. We utilized citizen science data collected through NASA's GLOBE Observer mobile phone application and data from a previously published literature review on Aedes mosquito distribution to examine the contribution of citizen science to understanding the distribution of Ae. aegypti in West Africa using Maximum Entropy modeling. Combining citizen science and literature-derived observations improved the fit of the model compared to models created by each data source alone but did not alleviate location bias within the models, likely due to lack of widespread observations. Understanding Ae. aegypti distribution will require greater investment in Aedes mosquito surveillance in the region, and citizen science should be utilized as a tool in this mission to increase the reach of surveillance.
Keywords: Africa / models / citizen science / West / aegypti / mosquito / Aedes / distribution
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Click here to see the statistics on "Journal of Vector Ecology" . | <urn:uuid:b5c91ca9-3aeb-4c73-9edc-73ad67e8e249> | CC-MAIN-2022-33 | https://www.scilit.net/article/c0ad9dd16659935bd83114c98640a1e0?action=show-references | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.886675 | 344 | 3.015625 | 3 |
In international counties, the unemployment rate has given society no sense of hope but there has been an alternative source to boost their spirits. The underground market has been a resource for individuals to gain a taste of some tangible dividends. Also the underground market has helped the economy growth significantly given the sluggish recovery in the U. S. Unemployment situation.
With this notion, what is the underground market? And what are the entities of this resource? The underground economy is goods or services are traded illegally! It consist of criminal nature, such as smuggling, counterfeiting, prostitution, drug dealing, and gambling, but also includes legitimate lines of work (Hide B. Malaria, 2000-2005). The international countries alone trades an estimated total of $625. 63 billion a year all completely under the table, and, of course, tax free. A billion dollars is a lot of money.
But when you multiply that figure by 6, that's more money than the combined Gross Domestic Product GAP of a few small countries combined. Whether cigarettes or movies or body parts, it's being traded, and there are no signs of it stopping. These 8 industries are the most prolific on the international countries black market, according to figures reported by Statistician. Com taken from sources including the FBI and the United Nations. The international countries recession has pushed more of its workforce into this informal market.
Order custom essay America’s Underground Economy Market with free plagiarism report
Some of the activities are illegal, drug sales, stolen good exchanges, America's Underground Economy Market By Jamming 2014). Although these commodities are largely banned from the marketplace, people n America spend a lot of money on them, particularly illegal drugs (Smartest, 2014). Workers turn to anything that pays them under the table, with no income reported and no taxes paid especially with an uneven Job picture (Kobo, 2013) . Those working and not paying the taxes puts the burden on those who pay the tax.
Within legal occupations such as: landscaping, waiting tables or dog walking, the shadow market helps people to earn a living without having to pay income taxes. Undercooked professionals are driven to the underground market in search of arrival, especially through the tough Job market. Others rely on the grey or black market to find work, gain experience or transition to a new career. Businesses and companies are not angels, and they exist to make a profit, they are going to do everything they can to keep costs down, and if that means paying people off the books, they will do it.
Also companies focus on keeping expenses low, they are turning to the shadow market to find affordable freelancers, consultants and part- time workers. Undocumented employees can help a business to avoid labor-related taxation (Smartest, 2014). In addition, society doing what they can to survive in a dour Job market, millions of international countries exist in an underground economy that has ballooned to $2 trillion annually. The rapidly growing amount of unreported wages in the U. S. Is costing the nation billions in lost tax revenue (Seller, 2013 ).
The Internal Revenue Service estimated that the losses from unreported wages have grown from about $385 billion in 2006 to about $500 billion last year (Seller, 2013 ). State governments lose another $50 billion to the overall underground economy. That means the people ho play by the rules are getting a raw deal (Seller, 2013 ). Furthermore, the Urban Institute used official national datasets on drugs. It estimated how drugs have changed over time and then used its own research to size up the underground economy.
Jamaica continues to be the largest Caribbean supplier of marijuana to the United States. Cocaine and synthetic drugs are not produced locally, but Jamaica is a transit point for cocaine trafficked from Central and South America to North America. Drug production and trafficking in Jamaica are both enabled and accompanied by organized crime, domestic and international gang activity, and endemic police corruption. The market for illegal drugs was worth $754 million. Legal arms sales come from Russia and could be much higher, and they include countries subject to a weapons embargo and areas of armed conflicts. Russia was accused of supplying arms to terrorist organizations such as Hams, GIG and Hezbollah, with the ruling Sad regime in Syria acting as an intermediary. The revelation of Venezuelan President Hugo Shave's plans to supply militants from the terrorist organization AFAR, operating in Colombia, with Russian weapons set off one f the biggest International scandals of modern time.
When studying from both Thailand and Cambodia on the prostitution industry in the underground market, sex work is so lucrative for everyone involved that it is more blatant than almost anywhere else in the world. Economic researchers were able to understand much more than market size (Chalk, 2014). They concluded that 9. 7 percent of pimps accept credit or debit cards as a method of payment, children who had been trafficked into sex work and women and men that were allowed to do bar work over the age of 18. Chalk, 2014). Hotels and motels were the most common location for work (67 percent), followed by streets (53 percent) (Chalk, 2014). Transportation was the most frequently cited expenditure; 66 percent of pimps said it was one of their outgoing costs (Chalk, 2014). Also, counterfeiting is element of the underground market and is divided into two categories: deceptive and non-deceptive (B. , 2014). Within deceptive counterfeiting, people are led to believe the product they're buying is genuine (B. , 2014).
In non- deceptive, people are only interested in the money they are saving, and are fully ware that what they are purchasing may not be real (B. , 2014). China is by far the world's largest producer of counterfeiting goods. The International Chamber of Commerce estimated the underground market value of counterfeiting will be the net worth of 1. 8 trillion. It's not Just watches or clothing that are being counterfeited (B. , 2014). The list goes on to include things as big as aircraft parts, as risky as fake documentation, and as dangerous as pesticides (B. 2014). Just below drugs, counterfeit electronics alone reaches the top of the list with a total value of $168 billion 2014). In China, gambling has a long history together and many states today have legalized it for its economic profitability. Gambling in China is officially illegal under Chinese engage in legal gambling in the special administrative regions of Hong Kong and Macaw, whose legal systems resemble those of European countries which formerly administered those regions the United Kingdom and Portugal, respectively.
Despite the growing network of legal casinos and bookies, illegal back-door gambling is still prevalent on the black market and is worth billions of taxable income. With all levels f legal gambling, whether in a casino or at an online poker table, there must be a prize, chance, and consideration. However, when one of these prerequisites is removed if, for example, the house has eliminated almost every chance at winning almost to the point of fraud it becomes illegal black market gambling. Some people will do anything to avoid spending money on a movie ticket.
This includes buying bootlegged versions of movies from street vendors or downloading them from the internet through POP networks. This is done by either digitally recording a movie directly from a theatre, or digitally copying DVD's or web streams ND distributing them all free of charge. As with music piracy, movie piracy and smuggling are vastly growing industries. But the penalties are high. A first-time offender of video recording in theatres can face up to 5 years in prison or be fined up to $250 000.
Despite avoiding prison time, offenders may face a lawsuit from the Motion Picture Association of America so that they may recoup their billion-dollar losses. Since the advent of the internet, illegally downloading music has become one of Americans' choice methods of staying up to date with the latest tunes. Online Peer to Peer or POP networks allow people to share digital information anonymously, providing music lovers with hassle-free access to Just about anything they can imagine all without paying a dime.
Although this is essentially stealing, in this case the laws are notoriously complex and have yet to catch up with the rapid technological advancements. Because most internet servers that transfer the pirated music from one computer to another are usually located in a country other than the U. S. , the prosecution of such crimes becomes a Judicial nightmare. Not showing any signs of slowing down, the digital and physical smuggling of music on the black market leaves thousands of musicians and music labels with empty pockets.
America doesn't even fall in the top 10 countries for online piracy, yet its industry losses reach the billions. Most people will risk losing everything, or even prison, for the chance to outsmart the Federal Government. That is why illegally moving cigarettes over Canada state lines has become one of the most lucrative trades in the black market. It might not mean much to the average smoker purchasing their cigarettes from a local deli, but for organized crime syndicates, the risk is worth every penny.
According to a report by the Mackinac Center for Public Policy, when a state adopts a new cigarette tax, cent of the price of a package of cigarettes is tax. Many border-goers take advantage of the situation, not only in Canada but also in the U. S. , the land that has traditionally imported rather than exported illegal goods. Canadian provinces with lower tobacco taxes have reported higher rates of smuggling, and much of the smuggling is dominated by First Nations members though the bulk of First Nations members and dervish have opposed and condemned tobacco smuggling.
Sometimes people aren't Just trafficking cigarettes or alcohol they're illegally selling body parts. There are three different methods organized crime offenders will use to take and sell your organs on the black market: First, traffickers may trick a person into giving them their organ. Second, people may do away willingly with their organs for reasons of their own, usually when they're in dire need of monetary compensation. The third, and perhaps the most terrifying, is traffickers luring unsuspecting people o have treatment for unknown ailments and removing body parts without their knowledge.
Usually the "donor" countries are South America, Africa, Asia, and Eastern Europe, with recipients from U. S. A. , Canada and Australia. Alcohol, in the context of alcoholic beverages rather than denatured alcohol, is illegal in a number of countries, such as Saudi Arabia, and this has resulted in a thriving illegal trade in alcohol. Vague the manufacture, sale, transportation, importation and exportation of alcoholic beverage were illegal in the United States during the time known as the Prohibition in the sass and early sass.
Did you know that we have over 70,000 essays on 3,000 topics in our database? | <urn:uuid:dcca59d5-3a63-4f62-bc41-c26d8c800ccb> | CC-MAIN-2022-33 | https://phdessay.com/americas-underground-economy-market/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.957497 | 2,192 | 1.992188 | 2 |
This article was originally published here
Mayo Clin Proc. 2021 Aug 20:S0025-6196(21)00435-3. doi: 10.1016/j.mayocp.2021.04.026. Online ahead of print.
OBJECTIVE: To compare the bleeding risk in patients with gastrointestinal (GI) cancer with that in patients with non-GI cancer treated with anticoagulation for acute cancer-associated venous thromboembolism (Ca-VTE).
PATIENTS AND METHODS: Consecutive patients with Ca-VTE seen at the Mayo Thrombophilia Clinic between March 1, 2013, and April 20, 2020, were observed prospectively to assess major bleeding and clinically relevant nonmajor bleeding (CRNMB).
RESULTS: In the group of 1392 patients with Ca-VTE, 499 (35.8%) had GI cancer including 272 with luminal GI cancer (lower GI, 208; upper GI, 64), 176 with pancreatic cancer, and 51 with hepatobiliary cancer. The rate of major bleeding and CRNMB in patients with GI cancer was similar to that in 893 (64.2%) patients with non-GI cancer treated with apixaban, rivaroxaban, or enoxaparin. Apixaban had a higher rate of major bleeding in luminal GI cancer compared with the non-GI cancer group (15.59 vs 3.26 per 100 person-years; P=.004) and compared with enoxaparin in patients with luminal GI cancer (15.59 vs 3.17; P=.04). Apixaban had a lower rate of CRNMB compared with rivaroxaban in patients with GI cancer (3.83 vs 9.40 per 100 person-years; P=.03). Patients treated with rivaroxaban in the luminal GI cancer group had a major bleeding rate similar to that of patients with non-GI cancer (2.04 vs 4.91 per 100 person-years; P=.37).
CONCLUSION: Apixaban has a higher rate of major bleeding in patients with luminal GI cancer compared with patients with non-GI cancer and compared with enoxaparin in patients with luminal GI cancer. Rivaroxaban shows no increased risk of major bleeding in patients with GI cancer or luminal GI cancer compared with patients with non-GI cancer.
TRIAL REGISTRATION: ClinicalTrials.gov identifier: NCT03504007. | <urn:uuid:9788d59e-142a-4b6e-86af-1033d48c6aac> | CC-MAIN-2022-33 | https://www.breathinglabs.com/pulmonary-diseases/pulmonary-embolism/bleeding-in-patients-with-gastrointestinal-cancer-compared-with-nongastrointestinal-cancer-treated-with-apixaban-rivaroxaban-or-enoxaparin-for-acute-venous-thromboembolism/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.899197 | 533 | 1.71875 | 2 |
Indigenous African Warfare is a contribution to the enhancement and enrichment of contemporary military professional and academic studies, including its assignment in graduate courses in African history. It is a theoretical study of that military art and science using Ghana and parts of present-day West Africa as a case study. It first attempts to present a structured approach to the study of the concept and art of African indigenous warfare, including its contestations with colonial entities. It also aims to help correct the fundamental misconception that such warfare owed to or evolved only after contacts with Europeans. Finally, it seeks to rejuvenate the study of indigenous warfare and raise its profile in the study of modern warfare.
The book was first self-published under the imprint of Ulinzi Africa Publishing (UAP) Solutions in 2010 and launched at the Kofi Annan International Peacekeeping Training Centre in May 2011.
Given the appeal of the book for professional military studies by the Ghana Armed Forces and other national, regional international institutions and organisations, the Indigenous African Warfare was reprinted in December 2016.
It is available at the University of Ghana, Legon, Bookshop
Original excerpts on the book:
‘… [R]eaders – including researchers, teachers and students – will discover useful pieces of information that will confirm the pertinence of Indigenous African Warfare and its thematic implications… Indigenous African Warfare has a timely place in the annals of African military history, and I recommend it highly to all’.
– Prof A B Assensoh, African–American and African Diaspora Studies (AAADS) Department Indiana University-Bloomington Campus, USA
Festus Aboagye is one of the most brilliant and highly professional officers who ever served in the Ghana Armed Forces. His vast experience in conflict management continues to be an immense asset to the African continent. His very well researched maiden book, The Ghana Army is authentic and served as an invaluable reference material to the National Reconciliation Commission instituted by the Ghana government (2002–04). Indigenous African Warfare is a comprehensive and an exceptionally well documented book and should fi ll the lacuna in the study of our indigenous national and African military history.
– Lieutenant General E A Erskine (Retired), First Force Commander, UNIFIL and Former Commander, Ghana Army
This book fills a huge gap in our understanding of the military history of West Africa and throws new light on many previously neglected areas. Its analyses are also highly relevant to present day conflicts. Its author, a highly experienced retired soldier of the Ghana Armed Forces, brings his own extensive military understanding to this groundbreaking work.
– Malcolm Donald Mcleod, Professor Emeritus and Honorary Research Associate, the Hunterian Museum (Glasgow University) and Trustee of the National Museums of Scotland
There are several similarities in the belief systems, motivations and operational concepts of the old indigenous forms of conflicts and the contemporary post-Cold War intra-state conflicts, especially within Africa. The Indigenous African Warfare is a book that should be read by potential mission leaders–civilian, military, police and humanitarian actors – for useful insights and lessons towards the management and resolution of internecine conflicts’.
– Lieutenant General (Retired) Daniel Ishmael Opande, Former Force Commander UNMIL and UNAMSIL
‘…Festus seeks to collate and reinterpret the scattered existing works on indigenous military history…he goes well beyond that by adding new areas of research, such as the gender dimensions of military organisation and warfare, and military budgeting, while establishing important parallels in logics. Going by his earlier works, one should expect a highly readable text.’
– Prof Eboe Hutchful, African Security Sector Network (ASSN) | <urn:uuid:a5f80078-eaea-495a-8a7a-897eee147a2a> | CC-MAIN-2022-33 | https://ulinziafrica.co/books/indigenous-african-warfare/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.935454 | 761 | 2.03125 | 2 |
At our Bedford clinic, we use cupping and myofascial release treatments with great results. In this article, we are going to tell you everything that you need to know about how cupping and myofascial release can help as physical therapies.
What is cupping?
Cupping is a form of medicine that has existed since ancient times, the way cupping works is that it uses specially designed suction cups that are placed on the areas where there are muscle strain and pain. The suction cups will draw blood up to the affected area that will then help it heal.
What is cupping used for?
- Cupping can be used to loosen up tight muscles and tissues in the body
- To draw up blood and increase blood flow in a certain area in the body in order to promote healing in the area.
- Finally, cupping can also be used to calm down the nervous system which helps in cases of anxiety and high blood pressure.
- Used by many professionals athletes such as Michael Phelps who is a former American Olympic gold medallist in the swimming discipline. He uses it to help his body recover faster after training or competition.
When is cupping not right for you:
- If you are using medication that makes your blood thinner/
- If you suffer from sensitive skin
- If you are sunburned on the area that you want to carry out the cupping procedure
- If you have any wounds that are healing up in the place that you want to carry out the cupping procedure
- If you have any internal organ problems
What is myofascial release?
First of all the Myofascial Tissues are a group of tissues that stretch around your back to your chest and down to your legs, the Myofascial Tissues help support some of the most important muscles in your body.
Myofascial Release is a kind of massage that tries to release tension and relax the Myofascial Tissues, which can massively increase the overall wellbeing of a person.
What is Myofascial Release used for?
- Myofascial Release can be used to treat headaches for examples by massaging tensed muscle near and around the neck.
- Can help get rid of knots and tension in muscles all over the body reducing substantially any pain that you may be feeling.
- Can potentially also increase your flexibility by freeing up and relaxing your muscles.
- Promotes blood flow around your body which contributes to faster healing of old tensed up spots.
- Contributes to a big reduction in the soreness of your muscles.
- Can boost your immune system by promoting the body to pump lymph towards the heart.
When is Myofascial Release not right for you:
- If you have fractured or broken bones in areas where you want to carry out the Myofascial Release
- If you have open wounds that are still in the process of healing
- People with varicose vein problems
- People taking blood thinning drugs
- People that are known to suffer from extra fragile bones
In conclusion Cupping and Myofascial Release are a great type of physical therapy to help promote healing, extra flexibility, boost your immune system and release knots and tension all over your body. It is very important to only work with experienced professionals on all kinds of physical therapies to make sure that you are getting the correct treatment that will not end up hurting or injuring you. | <urn:uuid:5d0bc4de-a50c-4c8b-b8a4-03f545118ba2> | CC-MAIN-2022-33 | https://thebodysage.co.uk/cupping-and-myofascial-release | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.944839 | 711 | 2.5 | 2 |
This course trains students to direct film and television credits, music and advertising videos, televisual graphic design, web banners, advertisements on smartphones and tablets, animated documentaries and illustrated digital books.
The course is taught by active professionals who are recognised in their fields and brings together theoretical and creative classes with work placements at businesses in partnership with the school. This course is recognised by the Ministry of Culture and Communication and is listed in the top seven private graphic design courses preferred by professionals (L’Etudiant, 2015).
The motion design course takes place over two years following a foundation year or an Introductory Course in Applied Arts (MANAA) year. Students can join in at the beginning of every year (1st, 2nd or 3rd year).
Advantages of the Course
A large network of alumni and partner companies, offering a broad range of work placements and rapid professional insertion
Classes in the workshop, centred around real projects in order for students to obtain creative and technical skills
Student follow up for the construction of their portfolio, work placement reports and professional project
Links between different disciplines in order for the students to understand the complementary nature of skillsets
2-D / 3-D Graphic designer
Video clips director
Entry Requirements & Application
Admission to LISAA Paris is subject to both the presentation of a portfolio of work and an oral interview. The objective of these conditions is not merely to assess the candidate’s level but also — and above all — to gauge his or her motivation and the potential of his or her academic profile to suit the specificities of a profession in graphic design. Students can join in at the beginning of every year (1st, 2nd or 3rd year). | <urn:uuid:d92bbe8d-2f78-4f53-8162-b69418825177> | CC-MAIN-2022-33 | https://www.bachelorstudies.co.uk/Bachelor-Motion-Design/France/LISAA-Paris/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.93931 | 387 | 1.578125 | 2 |
Below is an investigative article that appeared in the Dutch on-line magazine De Correspondent. The original Dutch article can be read at the above link and a translation to English is given below. The translator included some comments or notes in brackets in the text.
The Dutch pharmaceutical company Organon left crucial data that pointed at increased health risks out of their research findings of birth control product Nuvaring. Also, the company did everything [possible] to minimize the risks of thrombosis in the ‘enclosed’ [= the pamphlet accompanying the product, I’ll use ‘label’ from here on, also shows up as ‘product insert’]. This shows up in the documents in possession of ‘De Correspondent’ [this blog]
From guest [blogger] Lucien Hordijk.
Correspondent Technologie & Surveillance
How health risks of the NuvaRing disappeared from the graphs
Fall 2000. The American Federal Drug Administration had the task to judge a new birth control method of Dutch manufacture. The FDA had to judge if the NuvaRing, the revolutionary anti conception method by pharmaceutical company Organon [Brabant, province of NL, Oss, name of town] will be allowed access to the US market.
The NuvaRing is a plastic ring, applied vaginally as opposed to pills, secreting for three weeks a ‘stable’, ‘low’ dose of hormones. Easier than a daily tablet, at least as effective in preventing pregnancy and insertable by the women themselves. The most important advantage: the low quantity of hormones, keeping side effects to a minimum.
But precisely at the world’s greatest drug authority serious doubts arose about possible side effects of the NuvaRing. One of the medical researchers of the FDA, Daniel Davis, estimates that the number of thrombosis events in a few small-scale samples are twice as high as is known from pills with the same hormones already on the market. In comparison with anti-conception pills considered at that time as the safest, the chance [of thrombosis] is even four times as high.
It is clear, writes Davis in an internal evaluation that, if we approve this new product, we have to point out the higher risks than those associated [normally] with these [same] hormones in the scientific literature.
From documents in possession of ‘The Correspondent’, it appears that in the background a robust discussion has taken place between the FDA and Organon, that crucial data associated with increased risks of the product were left out of trial data and that the Company [Organon] successfully lobbied to keep the objections of the FDA out of the label.
Because if the label emphatically warns for an increased risk of thrombosis, entry into the market would have been dead on arrival. Doubts of the FDA caused turmoil at Organon, as the company from Oss at that point already had invested ten years in this anti-conception product, specifically to be safer and easier than the pills, used as comparison by the FDA for the ring. The pharmaceutical has all reasons to get a favorable indication [literally ‘manual’] and rigidly maintains their position in the negociations about the wording on the label.
The benefit of doubt
The FDA decides, after months of bickering, to overlook a few young victims of thrombosis during the drug trials. Instead of mentioning the doubts of the FDA about the hormones, the final label notes that it is unknown if the increased chances with pills regarding thrombosis are also valid for the NuvaRing.
The anti-conception ring is current used by 1.5 million women yearly.
Dutch and US employees of the ‘Regulatory Affairs’ division of Organon are satisfied when the hard fought business license is ‘pulled out of the fire’, documents show. The anti-conception ring, the first of its kind, is ready to conquer the world.
And a conquest it became. The anti-conception ring is used these days by 1.5 million women yearly and yielded MSD, the current manufacturer of the NuvaRing, 686 million dollar in 2013. According to MSD 179 million units were sold in the initial 10 years and it is meanwhile available in fifty countries. In the Netherlands the ring is provided 170 thousand times.
Lobbying to keep information ‘indoors’ [restricted]
But this commercial success has another side. Past June, the manufacturer concluded a lawsuit before the US high court [they use this term], where they were sued by thousands of users and next of kin because of the systematic withholding of information. Information that would point at health risks such as thrombosis, embolism and cerebral infarction. The result of the indictment is a settlement of $100 million, accepted by 95% of the approximately 3,800 plaintiffs. In return, MSD was found not guilty of withholding information that would inform users and prescribers of the ring of the higher risks of thrombosis and embolism as compared to other anti-conception products.
After a ‘muscled’ publication, ‘De Tegel-genomineerde publicatie van Anneke Stoffelen’ in the ‘Volkskrant’ [=a Dutch paper] of November last year about this lawsuit, a short discussion took place in the Netherlands about the NuvaRing. The Volkskrant article explored the doubling of the risk of blood clots of the NuvaRing compared to older anti-conception products. The ring would be just as risky as the Diane-35 pill, an anti-conception product that was withdrawn from the French market early 2013 because of the possibility that it caused the death of four young women. In the Netherlands, too, deaths were related to the use of the Diane-35 pill.
MSD, in a press release, ‘considered the article as information’ and ‘stands completely behind the NuvaRing’. Henk Jan Out, ex vice-president Women’s Health of the company, sneered in a column in ‘Artsennet.nl’ [link supplied] that the Volkskrant article was a mouthpiece of the US tort lawyers.
Caroline Doornebos, medical director at MSD, reacted during broadcasts of the NOS [=Dutch broadcast network] and Omroep Brabant ‘Het bericht’ van Omroep Brabant (local broadcaster) and assured ‘that there is no difference in risk of thrombosis from the NuvaRing as compared to other anti-conception products’.
From the court documents of the US lawsuit, witness declarations and correspondence with lawyers and scientists, another picture emerges. MSD has tried to prohibit public access to these documents but were overruled by the judge. [‘anders’ is a link to the judgement: ‘the decision in this matter’].
The Dutch enterprise Organon received before, during and after market entry different signals that the Nuvaring certainly entails an increased risk of bloodclots compared to other anti-conception products, but did not undertake anything to publicize this. Even worse [lit. ‘even stronger’], Dutch employees lobbied effectively to keep this information ‘indoors’ [restricted].
Onto the market
Before the NuvaRing was admitted to the market in the Netherlands as well in the US, a lot of discussions took place in the medical world about the hormones that would be used: ethinylestradiol, an estrogen, and etonogestrel, a so-called third generation progestogen.
Already in the nineties a lot of scientists agreed: anti-conception products with third and fourth generation progestogens have twice the chance of causing life-threatening side effects such as thrombosis compared to products with second generation progestogen. Out of sixteen trials thirteen confirmed this link. Three pharmaceutical industry sponsored studies found no link. That the manufacturer selected the patented etonogestrel for the NuvaRing is a logical choice business-wise: the hormone is a chemical derivative of its predecessor desogestrel, as of 1995 no longer patented. Still, etonogestrel was marked by the drug authorities as a ‘new molecular entity’.
For this reason, Organon hardly needed to supply new toxicological (animal and in-vitro) results. Also in the clinical phase of the research the company was allowed to refer to trials of the older products in the portfolio of Organon such as Marvelon and Mercilon.
In short, Organon was allowed to patent in an attractive way a new (sort of) molecule for their unique anti-conception product.
To convince the drug authorities about the effectiveness and safety of the product, nine studies were performed by Organon.
These trials mostly took place in the Netherlands, with the participation of 2,586 women. The larger part of the studies investigated the effectiveness of the ring. One study was devoted to the way the hormones from NuvaRing were absorbed by the body. An essential study, since hormone levels that are too high are associated with a greater chance of side effects.
The study, that should validate the reason for existence of the product, consisted of sixteen participants and was performed by two scientists from Organon.
From the graphs and tables of this study, some of which also found their way onto the label, and in the publicized evaluation report of the ‘Dutch college for the evaluation of drugs’ [CBG], it shows that the average secretion of both hormones is stable. [lit.‘average release from both hormones with users stable happening’]. Good news for Organon.
Bron: Onderzoek 34.218 van Organon.
Text above graph: average hormone secretion of the NuvaRing.
Bron: Expert Report of Shelley Ann Tischkau.
But the visualizations [graphs and tables] are not a complete representation of what was found with the participants [of the study].
From two research reports, introduced as evidence during the in June settled court case, it appears that the data of at least four women were omitted from the graphs and tables. These reports show that two medical employees of Organon confirm this. Therefore the US label, the publication of the study, the evaluation report of the CBG and the concluding document submitted to the FDA by Organon in order to obtain a license did not show a complete picture of the results of the study.
At four of the sixteen participants strong peaks of the hormone ethinylestradiol, a so called ‘burst effect’ took place. In two users the peak occurred a few hours after insertion of the ring, two other women experienced a surge of ethinylestradiol later on.
Source: Expert Report of Shelley Ann Tischkau
Above graph: the omitted peaks; burst effect with four women
Tom Sam, at the time a biochemist at Organon, admitted in a testimony during the court case that these four peaks were not processed into the graphs and tables. One of the researchers of the trial confirmed that the physicians prescribing the NuvaRing for women never would know that a few ‘burst effects’ took place.
The research data [lit. ‘little research’] that should show that the NuvaRing secretes hormones in an even manner, showed that the contrary was the case. In September 2001, when the FDA still had the application for NuvaRing under consideration, a worried Organon employee sent an e-mail to a colleague. It would be extremely damaging for the NuvaRing if the FDA were to be informed of the ‘burst effect’. He wrote: ‘Going to FDA to change these specifications is absolutely the LAST thing we should consider, i.e., that’s the worse[sic] possible scenario.’
‘The Correspondent’ asked the Dutch drugs authority CBG if they were aware of the selective data use by the manufacturer in this specific research. The answer was that they could not possibly imagin that these data were omitted from the graphs. The authority [CBG] stated to get to the bottom of this now.
The CBG does emphasize that the alleged clinical advantage of the anti-conception ring is not mentioned in the Dutch label. ‘We have from the outset pointed to an increased risk of thrombosis, similar to Marvelon. We expressly prohibited Organon to claim in the pamphlet that the hormone levels were better of more even than the daily peaks that would be apparent with pills [lit. ‘that you would see with pills’].
In other words: the manipulated research by Organon is also taken by the Dutch authority as guidance but considered too skimpy [lit. ‘skinny’] to endorse the conclusions.
Manufacturer MSD, to this day, maintains the position that the ring has less side effects because of the low and even secretion of the hormones. In a reaction to an article in ‘De Volkskrant’ of November 2013, the company takes the position that ‘the hormones that prevent pregnancy are secreted evenly over a month. Even secretion means that no hormone peaks or valleys in the blood levels occur. Inasmuch that high levels can lead to side effects and low levels to insufficient effectiveness, striving for even blood levels is a very much accepted and logical starting point’.
Illustrating the point: on the MSD website ‘Anticonceptie.nl’ under the header ‘anticonceptiering’ [anti conception ring], ‘voordelen’ [advantages, link provided], ‘hier te lezen’ , read here. ‘An even secretion of hormones: the anti conception ring has therefore no daily hormone peaks like the pill’
The summary document from the CBG of 2001 endorses this position. There can be read, among other things, that the ring effectively prevents pregnancies but that less side effects in comparison with pills are insufficiently indicated: ‘Additionally, any clinical advantage of an absence of daily peak concentrations of estrogens and progestogens, in terms of a more favourable adverse event pattern, remains to be established.’
Thrombosis occurrences expunged from the label
Organon, during the registration procedure in the US, also did everything to get all unfavorable information out of the label.
In the clinical studies for market entry, three young women were shortly after application of the NuvaRing diagnosed with variations of thrombosis. On this basis, the FDA concluded that the risk of thrombosis of the NuvaRing was twice the risk of anti conception pills with Desogestrel, known to have a risk of twice the second generation pills.
‘We should really try to get it out of the text’
Susan Allen, with final responsibility of the FDA department judging studies, pointed specifically to one of these cases of thrombosis. A 26 year old woman in the clinical study developed a deep vein thrombosis in her left leg eight days after application of the NuvaRing.
It was for Allen a reason to order the manufacturer to emphasize in the pamphlet the increased risk of thrombosis of third and fourth generation progesterones, such as used in the ring. And more importantly, to specifically mention the thrombosis occurrence of the 26 year old. This way, physicians could judge for themselves if they wanted to prescribe a drug that was already associated with violent side effects in such a small research population.
From internal correspondence between marketing department and registration procedure department employees in the US and the Netherlands, it appeared that this proposal by the FDA was not well received [lit:‘did not really fall on fertile ground’]. Wim Mens, at the time working in the department of Regulatory Affairs in Oss, reported to his colleagues that he worried greatly about the mention of this case of thrombosis on the label. He wrote: ‘We should really try to get it out of the text’.
A marketing colleague in the US, David Stern, agreed. He suggested to use animal data from an earlier toxicological study as a trump card in the negotiations, to get the FDA to delete the ‘more important things’ such as the specific thrombosis case, deleted from the label. [this does not really make sense to me – but this is what it says here].
‘A good thing’
Surprisingly, Organon prevailed. By refusing the proposals of the drug authorities, the company managed to delay the initial registration procedure, the documents show. The 26 year old woman disappeared from the pamphlet and the position became ‘that it is unknown if the increased chances of thrombosis associated with third generation anti-conception products are also valid for vaginal application of etonogestrel’. The label contained only a general warning for blood clotting.
For Organon’s US marketing director this was still not enough, so he wrote to his colleagues: ‘The label change looks much better, however, I am still unhappy with the VTE section [Venous Thromboembolism, venous thrombus emboli, LH] of the label. Obviously the case that we presented to them [FDA, LH] has made some impact, in that they added the statement about being unknown if NuvaRing has this increased risk. What are the chances that this section can be removed all together?’
Retired team leader Willem de Boer, at the time team leader ‘Regulatory Affairs’ in Oss, was pleased by the finished label, which omitted the young woman with the deep artery thrombosis: ‘I have reviewed the new proposal for the NuvaRing Package Insert made by the FDA. To my satisfaction a number of critical issues have been implemented in the current proposal of the FDA (e.g. the deletion of the single VTE case).’
His US colleague Nancy Alexander also found the disappearance of the thromboses matter ‘a good thing’
An extra complaints department .
Still, Organon would not be able to prevent forever that their anti-conception ring would not increasingly be associated with increased thrombosis risk. Immediately after obtaining a trade license the company started new studies. Between the end of 2001 and begin 2004, again three more deep vein thrombosis cases occurred in a clinical setting.
Here, too, young women varying in age from 20 to 28 years were suffering side effects. In an interim report, generated by Dutch ex-employees, a VTE (Venous Thromboembolism) risk factor of 10.1 out of 10,000 women is calculated at that time. Five years after entering the market it appears after all that the anti-conception ring increases the risk for thrombosis.
Organon started the same year with a ‘VTE issue team’, tasked with the sensitive matter. Inside Organon the fear exists for underreporting, the phenomenon that the number of thrombosis victims is many times higher than estimated on the basis of calculations. Also, the public at large starts to get worried about the side effects, witness the dramatic increase in patient’s questions regarding the chances of a thrombosis induced by the ring, as mentioned by a US director.
Patients reporting side effects only will be acknowledged [lit. ‘called back’] after the judicial department has analyzed [lit. ‘x-rayed’] the report. Of all reported side effects for the complete drugs gamut of Organon, nine out of ten relate to the NuvaRing, according to an internal mail. Lacking capacity, an external entity is contracted to process the reports regarding the anti-conception ring.
Winning from the patch
The consternation of the users is, among other reasons, fueled by the action of the FDA a few months earlier. A direct competitor of the NuvaRing, the Evra anti conception patch manufactured by Johnson & Johnson, approved one month after the NuvaRing, gets end 2005 a review of the label and an infamous ‘black label box warning’. The patches, just like the rings, dispenses hormones in an alternative way and, according to the FDA, exposes women to a relatively high dosage of estrogen so consequently doubles the risk of dangerous side effects such as thrombosis.
The ‘black label warning’ has disastrous effects on the sale of the patches in the US. Where the company still sold about five million patches in 2005, in 2011 this decreased to less than 1.5 million. The NuvaRing sales skyrocket in 2005 by about 50% to 2.5 million units sold.
Organon is gets the chance to increase their sales at the expense of their main competitor but struggles internally with how to manage the matter of the thrombosis risk. Indeed, the patch touted the same stable hormone levels but still received an emphatic warning.
Convenient for the marketing
The pharmaceutical [Organon/MDA] obtains help from Susan Allen, the manager of the FDA who, five years earlier, wrestled with Organon about the thrombosis cases in the clinical studies. Under her leadership, the FDA not only approved the NuvaRing, but she also was instrumental in the Evra patch obtaining a license. Now she is making a living as an independent consultant for the pharmaceutical industry.
In 2006 Allen met Dutch director Hans Rekers, at that moment Vice President of Medical Affiars at Organon. They ‘sit at the table’ to craft a ‘fitting communications strategy’ now that the company is increasingly faced with ‘spontaneous reports of side effects like thromboses’.
The company decides to recruit the problems of their competitor by starting a marketing campaign touting the ‘advantages’ of the anti-conception ring over the maligned patch. A ‘dear doctor’ letter is crafted, in which the company informs physicians of the low estrogen exposure of the ring with respect to the patch. Also, a course for medical representatives is developed, training them to emphasize specifically the differences between the ring and the patch.
Never a word about the increased risk of thrombosis, as is apparent from the testimony of a US Sales Director, Sue Iannone: ‘It’s not something you’re going to see in a sales aid or in a users guide, because that’s not what healthcare providers typically want to talk about with representatives. And that’s not how we promote the products […] because they are safe if it’s approved by the FDA and there is a label.’
Women should be empowered to make a choice.
In a reaction of the company to questions of ‘The Correspondent’, MSD informs them [link supplied] ‘The questions of ‘The Correspondent and the answers of MSD’, that a substantial investigation is pending that will guarantee the safety of the product. The company points at the adaptations made worldwide to the ‘product inserts’, showing the results of both these researches that did not find a higher risk of thrombosis compared to second generation pills. [This is a really weird sentence: it mentions ‘pending investigation’, future tense, and than says the results of these pending investigations are known.]. However, one of these investigations according to a process document in the possession of ‘The Correspondent’ , does not have sufficient number of participants to give a decisive answer regarding the safety of the NuvaRing.
A well known Danish study under leadership of the Danish professor Øjvind Lidegaard with more than 3 million participants, found a NuvaRing thrombosis risk factor that was double that of second generation anti conception products. This study is not taken seriously by MSD on grounds of the methodology.
Lidegaard denounces the position of the manufacturer, which, according to him, has been trying for years to nip the discussion about the safety of the product in the bud: ‘There is strong scientific proof that the NuvaRing has at least twice the chances of causing thrombosis as compared to second generation pills’.
Asked if he feels that the drug authorities have to warn about risks, the professor answers affirmative. ‘As long as women are not informed about the differences in risk of thrombosis between the various products, they are not in the position to make an informed choice’.
Ironically, the manufacturer also considers adequate information for women fundamental. Only, the product insert of the NuvaRing does not mention, up to today, any study that flags the increased risks compared to the second generation pills.
This article is written by guest correspondent Lucien Hordijk | <urn:uuid:395bd741-6dbd-4cde-858b-6b2c9760a491> | CC-MAIN-2022-33 | https://nuvaringtruth.com/how-health-risks-of-the-nuvaring-disappeared-from-the-graphs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.952945 | 5,316 | 1.828125 | 2 |
RbBr radical anion
- Formula: BrRb-
- Molecular weight: 165.372
- Information on this page:
Gas phase thermochemistry data
Go To: Top, References, Notes
Data compilation copyright by the U.S. Secretary of Commerce on behalf of the U.S.A. All rights reserved.
Data compiled by: John E. Bartmess
|fH°gas||-243.3 ± 4.0||kJ/mol||R-EA||Miller, Leopold, et al., 1986||Extrapolated by polarizability and radius from experimental data.|
Go To: Top, Gas phase thermochemistry data, Notes
Miller, Leopold, et al., 1986
Miller, T.M.; Leopold, D.G.; Murray, K.K.; Lineberger, W.C., Electron Affinities of the Alkali Halides and the Structure of their Negative Ions, J. Chem. Phys., 1986, 85, 5, 2368, https://doi.org/10.1063/1.451091 . [all data]
Go To: Top, Gas phase thermochemistry data, References
- Symbols used in this document:
fH°gas Enthalpy of formation of gas at standard conditions
- Data from NIST Standard Reference Database 69: NIST Chemistry WebBook
- The National Institute of Standards and Technology (NIST) uses its best efforts to deliver a high quality copy of the Database and to verify that the data contained therein have been selected on the basis of sound scientific judgment. However, NIST makes no warranties to that effect, and NIST shall not be liable for any damage that may result from errors or omissions in the Database.
- Customer support for NIST Standard Reference Data products. | <urn:uuid:9628b840-0246-4382-b9da-a72efb836164> | CC-MAIN-2022-33 | https://webbook.nist.gov/cgi/cbook.cgi?ID=B3646&Mask=1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.746703 | 406 | 1.820313 | 2 |
The US Food and Drug Administration (FDA) has expanded the indication for the antiviral(Xofluza) to include postexposure prophylaxis of uncomplicated in people aged 12 years and older.
“This expanded indication for Xofluza will provide an important option to help prevent influenza just in time for a flu season that is anticipated to be unlike any other because it will coincide with the coronavirus pandemic,” Debra Birnkrant, MD, director, Division of Antiviral Products, FDA Center for Drug Evaluation and Research, said in a.
In addition, Xofluza, which was previously available only in tablet form, is also now available as granules for mixing in water, the FDA said.
The agency first approved baloxavir marboxil in 2018 for thein people aged 12 years or older who have been symptomatic for no more than 48 hours.
A year later, the FDAto include people at high risk of developing influenza-related complications, such as those with , chronic lung disease, diabetes, heart disease, or morbid , as well as adults aged 65 years or older.
The safety and efficacy of Xofluza for influenza postexposure prophylaxis is supported by a randomized, double-blind, controlled trial involving 607 people aged 12 years and older. After exposure to a person with influenza in their household, they received a single dose of Xofluza or placebo.
The primary endpoint was the proportion of individuals who became infected with influenza and presented with fever and at least one respiratory symptom from day 1 to day 10.
Of the 303 people who received Xofluza, 1% of individuals met these criteria, compared with 13% of those who received placebo.
The most common adverse effects of Xofluza include, , nausea, sinusitis, and .
Hypersensitivity, including, can occur in patients taking Xofluza. The antiviral is contraindicated in people with a known hypersensitivity reaction to Xofluza.
Xofluza should not be coadministered with dairy products, calcium-fortified beverages,, antacids, or oral supplements containing calcium, iron, magnesium, , aluminium, or .
Full prescribing information is.
This article first appeared on. | <urn:uuid:dc078cee-3403-40bc-be30-e79e0351a926> | CC-MAIN-2022-33 | https://www.the-hospitalist.org/hospitalist/article/232514/infectious-diseases/fda-expands-xofluza-indication-include-postexposure | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.945633 | 480 | 2.453125 | 2 |
Find NHLBI Clinical Trials
Search selected NHLBI-supported ClinicalTrials.gov.and by condition, location, or age group. You can also view the complete list of NHLBI-funded studies at
Showing 1 - 5 out of 5 results
Have you had a heart attack, and do you want to help improve strategies for blood transfusion? The study is comparing two strategies for blood transfusions in heart attack patients who have anemia—whether to give a blood transfusion when the hemoglobin level is less than 10 g/dL, or to give blood only when the blood count is below 8 g/dL. To participate in this study, you must be at least 18 years old, have anemia, and be hospitalized for a heart attack. The study is located in New Brunswick, New Jersey.
Do you have coronary heart disease, and are you interested in helping researchers improve how they treat and prevent this condition? This study is exploring new risk factors that may allow for more people with heart disease to get approved for an implantable cardioverter defibrillator (ICD), a device that can detect and stop irregular heartbeats. To participate in this study, you must be 18 years old or older and already have or be eligible for an ICD. This study takes place in Buffalo, New York.
Is your newborn in the NICU at Holtz Children’s Hospital in Miami? Newborns born very prematurely often need oxygen therapy or ventilation to help them breathe and survive. This study will help doctors understand how changes in oxygen and carbon dioxide levels while newborns are getting treatment affect how their lungs develop. While your newborn is in the newborn neonatal intensive care unit (NICU), researchers will record his or her oxygen and carbon dioxide levels, heart rate, and other measures. To participate in this study, your newborn must have been born prematurely between 23 and 28 weeks’ gestation, be less than 28 days old, and be receiving oxygen therapy. This study is located in Miami, Florida.
Are you or a loved one on a ventilator in the hospital in Minnesota? This study is finding out whether people who are on a ventilator sleep better and have less anxiety if they can control their own sedation medicine. To participate in this study, you must be at least 18 years old and receiving mechanical ventilation while hospitalized. This study is located in Minneapolis and Rochester, Minnesota.
Is your child on a ventilator at Children’s Hospital Los Angeles? Ventilators can sometimes weaken the muscles around the lungs, especially in children. This study is testing whether a new computer method to control ventilators can help prevent muscle weakness in children. To participate in this study, your child must be between 1 month and 18 years old and have been on a ventilator for less than 48 hours (or 72 if they were transferred from another hospital) because of a serious lung disease. This study is located in Los Angeles, California. | <urn:uuid:5ecd6ac5-c1cc-4943-9220-c39d9b6a9bfe> | CC-MAIN-2022-33 | https://www.nhlbi.nih.gov/research/clinical-trials?f%5B0%5D=disease_or_condition_name%3AHeart%20Attack&f%5B1%5D=disease_or_condition_name%3AVentilator/Ventilator%20Support | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.942132 | 648 | 2.0625 | 2 |
China to work with BRICS to promote common development: Xi
Beijing: China is willing to work with all countries, including the BRICS nations, to promote common development around the world, Chinese President Xi Jinping said.
Xi made the remarks on Thursday in a congratulatory message to a virtual meeting attended by representatives from political parties, think tanks and civil society organisations in BRICS countries and other developing nations, Xinhua news agency reported.
Given the fragile global economic recovery, widening development gap and serious challenges such as climate change and digital governance, the BRICS nations should remain true to the bloc’s founding purposes and work with other developing countries to rise to challenges and open up brighter futures, Xi said.
China is ready to work with all countries, including the BRICS countries, to accelerate the implementation of the UN 2030 Agenda for Sustainable Development, steadily push for the implementation of the Global Development Initiative, and jointly build a global development community, Xi said.
He stressed that political parties, think tanks and civil society organisations of BRICS and other developing countries should fulfill their responsibilities, deepen exchanges, and contribute wisdom and power to achieve common global development and build a community with a shared future for mankind.
BRICS is the acronym for an emerging-market bloc that groups Brazil, Russia, India, China and South Africa.
Leaders including South African President Cyril Ramaphosa, who is also president of the ruling African National Congress, and Argentine President Alberto Fernandez, also president of the country’s Justicialist Party, offered congratulations on the opening of the meeting.
More than 130 political party leaders and representatives of think tanks and civil society organisations from 10 countries attended the meeting online.
Foreign representatives attending the meeting spoke highly of China’s remarkable development achievements, saying they believed that the Global Development Initiative and the Global Security Initiative put forward by Xi have injected new impetus into world peace and development and the building of a community with a shared future for mankind.
They said that, in the face of global challenges such as the COVID-19 pandemic and climate change, BRICS political parties, think tanks and civil society organisations should enhance their sense of shared destiny, firmly safeguard the UN-centred international system, reject bloc politics and camp confrontation, promote coordinated development in economic, social and environmental fields, and build a better, fair and prosperous world. | <urn:uuid:ed2e282c-c599-4c22-ae51-b471f9583de7> | CC-MAIN-2022-33 | https://www.mangalorean.com/china-to-work-with-brics-to-promote-common-development-xi845511-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.93027 | 483 | 1.71875 | 2 |
Julie Neal, Director and consumer products sector specialist at management consultancy, Vendigital, explains how design-to-cost techniques and other value engineering solutions can help FMCG producers to achieve a successful green transformation
Responding to a significant shift in consumer behaviour during the pandemic, many FMCG producers are exploring ways to develop greener processes and sourcing strategies. However, with the continued growth of online and discounter channels, careful cost management remains critical. So how should they go about it?
Over the past year, consumers have become more focused on buying green and concerned about the provenance of the goods they buy, sourcing locally where they can. At the same time, tightening environmental legislation in the push to achieve the Government’s legally binding target of net-zero emissions by 2050 is putting further pressure on businesses to turbocharge their own climate action plans.
Planning for a green transformation is a significant undertaking however and businesses need a whole-supply chain view of their operations in order to make changes that deliver on their strategic objectives, while also benefitting the planet. To remain viable, they also need to understand fully the operational impact and ensure there is sufficient demand for decarbonisation to justify the investment.
Highlighting the potential rewards for early-movers, a report published recently by the CBI, entitled ‘Seize the Moment’, sets out a cross-industry vision for a dynamic and future-focused economy, which focuses on innovation and winning the global race to net-zero. The report states that taking action to decarbonise operations could unlock growth opportunities worth £700bn for the UK economy by 2030.
If further evidence is needed that consumers care about climate change and expect products to be made and distributed in a way that is kind to the planet, an oft-cited study by Nielsen has found that 66% of global customers are willing to pay more for sustainable goods. During the pandemic, this willingness to pay more has led to an uptick in demand for goods sourced and supplied by smaller independent retailers such as coffee shops, farm shops, delis and specialist grocers.
At the same time, the rise in online shopping during the pandemic has buoyed sales for many larger e-commerce businesses too, not least the major supermarkets. Responding to heightened consumer awareness of the effects of climate change, many of the leading omnichannel retailers are placing greater focus on decarbonisation, with the introduction of initiatives designed to reduce their carbon footprint. As part of its 4Rs strategy to ‘remove, reduce, reuse and recycle’, Tesco has launched a scheme inviting customers to return soft plastics to recycling collection points at 171 stores across the UK. The supermarket also has plans in place to roll out the initiative to all stores nationally by the end of the year.
Case study: Co-op
The Co-op has recently launched a new climate plan, with the aim of offsetting all operational greenhouse gas emissions and being the first supermarket to sell fully carbon-neutral own brand food and drink by 2025. Explaining this action, Co-op Food’s CEO, Jo Whitfield, said ‘emissions from our operations and own brand products are where we have the greatest responsibility and can make the biggest difference’. The company is also calling for Government to make it mandatory for all businesses to report their full end-to-end greenhouse gas emissions.
End-to-end supply chain visibility is critical to reducing a product’s whole-life carbon footprint. Manufacturers need to look across the entire value chain – from the supply of raw materials, to manufacturing processes, distribution and waste minimisation through to the end consumer and beyond. It is only by peeling back the supply chain in this way that the real carbon drivers become apparent, allowing for the development of strategies to eliminate, reduce or mitigate them. In some cases, collaboration with suppliers can help manufacturers to decarbonise their operations and share the cost of doing so, particularly if investing in green technologies designed to reduce energy consumption or avoid the use of fossil fuels.
To assist in developing a roadmap to net-zero, manufacturers need improved visibility of accurate and reliable data, so they can complete detailed modelling of these complex factors and processes. They can then use this model to calculate the impact of their decisions across the value chain. As well as ensuring they achieve their sustainability objectives, such modelling could prove invaluable in accelerating the pathway to net-zero and securing a real competitive advantage. | <urn:uuid:66fb5453-0dab-46cc-aee3-4244b67ec1e0> | CC-MAIN-2022-33 | https://www.openaccessgovernment.org/fmcg-producers-achieving-successful-green-transformation/113600/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.950314 | 930 | 1.882813 | 2 |
By Eckhard Roediger, MD author of Contextual Schema Therapy
Sometimes clients will express to you that they are disappointed with their therapy, or the lack of outcomes with their therapy. Disappointed clients are a challenge in therapy, since they activate our own patterns (or schemas). Many therapists try to avoid a rupture by finding a quick “solution” to maintain the working alliance. Literally “stepping out” of the interaction instead, and taking a deeper look at the underlying needs, can strengthen the therapy relationship much more.
In moments like these, why not try shifting your perspective by moving around a bit? Here’s a technique for looking behind their feeling of disappointment together. Try standing up together side by side and “floating above the chairs” in a joint perspective. Then, work with the client to investigate what has been going on down there while you were seated in the chairs. The effect is amazing!
You can deepen the effect of the physical perspective change by changing into third-person language, too. This exercise helps cool down the client’s triggered emotions and reestablish the working alliance between you and your client as an “observer team”—you are, after all, observing the emotional experience together.
Instead of going too deeply into the content of your past conversations, I suggest asking the client questions that focus on the underlying needs, interpersonal intentions, and the resulting pattern. For example:
• What did the client feel?
• What needs did he or she feel at that time?
• How did he or she express this need?
• What was the desired outcome?
• What was the actual outcome?
• Does this happen to the client more often?
Then, ask the client if they have a good and competent friend. Invite the client to step into this friend’s shoes by asking: “Thank you, [friend’s name], for coming to help us. You know [client’s name] well. What do you think about the situation and what [client’s name] really needs now?” Once the client managed to distance from their emotional activation and you repaired the working alliance on the observer level, they can access their innate resources again and show up with promising ideas.
An example: Many clients hide their vulnerable side behind a wall of anger—but there are often more vulnerable emotions behind anger that you and your client can examine together. Stepping out of the anger activation and getting in touch with the underlying vulnerable side again allows expressing the need for support. This encourages others to help instead of withdrawing. Looking down on the scene from above and stepping into the best friend’s shoes helps access the hidden feelings and express them. This enables clients to communicate more effectively.
Eckhard Roediger, MD, is director of the Frankfurt Schema Therapy Institute, the first established in Germany. He is former president of the International Society of Schema Therapy (ISST), and board member since its foundation in 2008. He has been a schema therapy trainer and supervisor since 2008, and is author of numerous books, book chapters, and articles about schema therapy in German. | <urn:uuid:f0fd4db0-ba8f-4d2b-9fec-0662e943e91a> | CC-MAIN-2022-33 | https://www.newharbinger.com/blog/quick-tips-therapists/dealing-with-disappointed-clients-and-ruptures-in-the-relationship/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.955709 | 658 | 1.859375 | 2 |
- 1 How much do Akita puppies cost?
- 2 Is an Akita a good family dog?
- 3 What is the price of a Akita?
- 4 Why do Akitas have a bad reputation?
- 5 Are Akitas hard to train?
- 6 What dog has killed the most humans?
- 7 Why is Akita banned?
- 8 Can Akitas be left alone?
- 9 What is the most loyal dog?
- 10 How long do Akitas live for?
- 11 Will Akita really protect you?
- 12 How do Akitas show affection?
- 13 At what age do Akitas become protective?
How much do Akita puppies cost?
Average Akita Puppy Prices Purebred Akita puppies from reputable breeders will vary between approximately $600 and $2000, depending on the breeder, bloodline, American Kennel Club (AKC) papers, and verifiable family health history.
Is an Akita a good family dog?
The Akita is a bold and willful dog, naturally wary of strangers but extremely loyal to their family. They tend to be aggressive toward other dogs, especially those of the same sex. They are best suited to a one-dog household. With family, the Akita is affectionate and playful.
What is the price of a Akita?
Usually, the average cost of purchasing a pet quality puppy from a reputable breeder is about $1,000 to $2,500. However, for an Akita puppy with top breed lines and a superior pedigree, you may need to pay between $3,500 and $5,500.
Why do Akitas have a bad reputation?
Akita’s have a bad reputation due to bad breeders and bad owners. They are not a dog for everyone. They are large, very powerful and dog dominate. They are not for the first time dog owner nor for the first big dog a person will own.
Are Akitas hard to train?
Akitas are one of the most challenging breeds to understand and to raise. Many Akitas are willful, obstinate, and dominant (they want to be the boss) and will make you prove that you can make them do things. To teach your Akita Inu to listen to you, “Respect Training” is mandatory.
What dog has killed the most humans?
The following infographic shows that the Pit Bull is still responsible for the most fatal attacks in the U.S. by far, killing 284 people over that 13-year period – 66 percent of total fatalities. That’s despite the breed accounting for just 6.5% of the total U.S. dog population.
Why is Akita banned?
Akita. The Akita faces bans in many cities across the United States. According to the Akita Rescue of the Mid-Atlantic, these dogs “have a reputation for being aggressive.” So, “in any encounter with other dogs or uninformed people, whether your dog was the aggressor or not, expect the Akita to be blamed.”
Can Akitas be left alone?
Yes in 90% of the time Akitas can be left alone without issues. On some occasions, they can suffer from separation anxiety and this can lead to some problems in leaving them home alone. If your Akita doesn’t show any signs of this behavior you might just be fine leaving him home alone.
What is the most loyal dog?
Top 10 Most Loyal Dog Breeds
- #8: Yorkshire Terrier.
- #7: Dobermann Pinscher.
- #6: German Shepherd.
- #5: Golden Retriever.
- #4: Staffordshire Bull Terrier.
- #3: Labrador Retriever.
- #2: Cavalier King Charles Spaniel.
- #1: Xoloitzcuintli.
How long do Akitas live for?
You can buy an Akita from a show breeder, who breeds Akitas to match a detailed standard of appearance for the dog show ring. You can also buy an Akita from people who “just breed pets” or “just had one litter.” But should you? Be sure to read the article to learn more about these people.
Will Akita really protect you?
Akitas are not normally aggressive towards people, but do have a very well developed protective instinct. Akitas are natural guardians of the home and do not require any guard-dog training. They are very quiet dogs and do not bark unless there is a good reason.
How do Akitas show affection?
Sometimes, you may notice them start to lean on you. This could happen when you’re standing or sitting but watch for that lean. It may happen in the presence of someone new in your home or just when you’re lounging and watching some TV. When your Akita leans on you, they’re showing you that they trust and love you.
At what age do Akitas become protective?
By age 1, Akitas tend to become more protective and territorial, so it’s important to socialize them with many different people as puppies. | <urn:uuid:9533e0f6-9850-4d39-a052-39545d5a9cac> | CC-MAIN-2022-33 | https://hoka-hey.com/akita/how-much-is-akita-puppy.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.940176 | 1,095 | 1.875 | 2 |
“Yeah boy, yeah,” is Flava Flav’s oft-quoted catchphrase, but the one people should be repeating is, “You can’t see me.” This is the famous line of wrestler-turned-rapper John Cena. Hailing from Massachusetts, Cena became a wrestler in 2001 and has been at the top ever since. He is all that and a bag of potato chips in wrestling, but Cena is also da bomb at something else: rap.
I bought Cena’s CD because it had his entrance music on it. When I finished listening, I explored the rest and was surprised at what I heard. It was a pleasant surprise, as I wasn’t expecting his songs to be good. It felt like digging for treasure and finding tons of gold every time I listened to a new song.
I like that Cena writes his own lyrics since most rappers just use others’ lyrics. When you sing your own, it sounds a lot better because it is coming from your heart.
I also like that Cena brings in his rapper cousin, Tha Trademarc, to help. Together they make the songs flow nicely. These two are even better than 50 Cent and The Game because they have a bond and sound like one person when they sing.
Cena started his rap career in the WWE. On a bus ride, when everyone was into hip-hop, the wrestlers were free styling and having a good time. Cena started to free style, and the creative team heard him and thought this should be his storyline while wrestling.
A few years later, Cena wanted to get a CD out there to show that he could rap as well as anyone. I think he did a great job, but there is one problem: the stereotype that athletes are only good at sports. Most of the time that is true, as evidenced by Shaq and his CD, or when Hulk Hogan made a CD which became the stereotype for wrestlers. But you have to try Cena’s CD and forget the stereotype. See how amazing this dude can rap. If you like it, give him the respect he deserves and walk up to any opposing rapper and say, “You can’t see me.”
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more | <urn:uuid:934f5ab9-be9e-472a-be80-eac109ad9474> | CC-MAIN-2022-33 | https://essaytubi.com/2020/03/20/john-cena-you-cant-see-me/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.980255 | 686 | 1.640625 | 2 |
On behalf of all the team here at The Panel we would like to extend our congratulations to our colleague Simona Fufezan’s daughter Maria Louise and fellow student Diana Bara.
In January of this year they secured first place at the Young Scientist & Technology Exhibition in Dublin and have since worked hard to improve their already impressive project entitled “An Investigation into the Effects of Enzymes Used in Animal Feed Additives on the Lifespan of Caenorhabditis Elegans”.
Yesterday (19th September), they were awarded third prize at the 28th European Union Contest for Young Scientists in Brussels, the European leg of the competition and won €3,500 for their hard work. Full winners list .
We are all incredibly proud of and happy for Marie Louise and Diana. Well done girls!! | <urn:uuid:111a014f-1f93-49f0-aa7d-69c9db65d5bc> | CC-MAIN-2022-33 | https://oldpanel.bmcdesign.com/2016/09/20/they-did-it-again-congratulations-maria-louise-diana/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.963868 | 170 | 1.523438 | 2 |
WASHINGTON (AP) ? When a president introduces a budget, there are always phantoms flitting around the room. President Barack Obama’s spending plan sets loose a number of them.
It counts on phantom savings from the wars in Iraq and Afghanistan. It’s underpinned by tax increases Republicans won’t let happen and program cuts fellow Democrats in Congress are all but certain to block.
And it assumes rates of growth that the economy will have to become strikingly undead to achieve.
A look at three budget ghosts, sometimes known as gimmicks:
BUDGET: Claims about $850 billion in savings from ending the wars and steers some $230 billion of that to highways.
REALITY: There is no direct peace dividend from ending the wars because the government borrowed to pay for them. The government would have to keep borrowing that amount of money to have it to spend on something else.
Counting the end of wars as a dividend is like a student coming out of college loaded with debt and aching to buy things, says Maya MacGuineas, president of the Committee for a Responsible Federal Budget. “When you finish college, you don’t suddenly have thousands of dollars a year to spend elsewhere ? in fact, you have to find a way to pay back your loans.”
MacGuineas says, “Drawing down spending on wars that were already set to wind down and that were deficit-financed in the first place should not be considered savings.”
President George W. Bush kept the cost of the wars out of his budgets, a contentious accounting maneuver that may have papered over the impact on spending projections but deepened the national debt as surely as if the price tag had been shown transparently. Taken together, the Bush and Obama budget tricks seem to suggest war costs nothing but ending it frees a ton of money.
BUDGET: Forecasts healthy growth in years ahead, with GDP growth predicted to reach a robust 4 percent in 2014 and 4.2 percent in 2015.
REALITY: It’s obviously too soon to know, but reputable private forecasts are not nearly as rosy as the administration’s assumptions, and their track record tends to be better. They are generally forecasting a percentage point lower or close to that, a huge difference, and don’t see reaching 4 percent growth in the foreseeable future.
Last year, the administration built its proposed budget on a projection of 2.7 percent growth in 2011; it turned out to be 1.7. The forecast for 2012 was 3.6 percent, which the White House lowered in the new budget to 3 percent. IHS Global Insight, a leading forecaster in Lexington, Mass., projects 2.1 percent.
Such projections are key because the government’s spending and debt plans rest on how much revenue can be expected to come in.
BUDGET: Assumes taxes will go up on the rich, tax breaks will end for the oil and gas industry, and spending will be cut for programs the president is willing to sacrifice.
REALITY: Tax increases are a non-starter before the election, with Republicans standing in the way, so sweeping parts of Obama’s budget plan are little more than a campaign platform laying out what he would try to get done if re-elected.
Some of his proposals are not so tied to the election. They have little or no chance of passing Congress regardless of what happens in November.
For example, he proposes using money from a Justice Department fund for crime victims for other purposes. But Democratic Sen. Patrick Leahy of Vermont, chairman of the Judiciary Committee, quickly signaled he would work to protect the fund, just as he has successfully done in the past.
Obama is the latest in a line of presidents to zero out ? provide no money for ? programs in order to show budget savings even while knowing Congress will restore the money. Amtrak and the post office are among institutions that have seen such phantoms before.
Associated Press writers Martin Crutsinger and Pete Yost contributed to this report. | <urn:uuid:222bc4ef-d981-47d8-b42b-17f5f72cbb71> | CC-MAIN-2022-33 | https://tnj.com/fact-check-there-are-budget-phantoms-room/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.959235 | 856 | 2.015625 | 2 |
Varicose veins are enlarged veins that you can under the surface of your skin. Varicose veins are most common in the lower legs, but they can happen anywhere. According to Mayo Clinic, you may have them if you notice the following symptoms.
- Veins with a bulging, ropelike appearance.
- Dark blue or purple veins.
- Achy or overly tired legs.
- Lower leg swelling or muscle cramping.
- Pain that gets worse after you sit or stand still for a long time.
- Itching near a vein that seems to be varicose.
If you start to notice that you have varicose veins developing, there are plenty of simple treatments you can try at home to keep them from getting worse. They can be effective, but you may need a vein doctor for some cases of varicose veins.
Keep moving throughout the day.
Varicose veins form when blood pools in your veins, usually in the veins of your legs. This can happen when you sit or stand without moving for hours at a time, like you might at work or on airplanes. Move regularly to improve your circulation and help your legs return blood to your heart. Stand up every hour if you have a seated desk job, or shake your legs out if you normally stand motionless at work.
Lose weight if needed.
Being overweight or obese puts extra weight on your legs and makes it harder to return the blood to your heart. Every pound of extra weight you lose takes some of the burden off of your legs. Lose weight by avoiding high-calorie foods, such as fatty foods and sweets, and emphasizing lower-calorie choices, such as fruits, vegetables, and lean proteins.
Try compression stockings.
Compression stockings are tight socks that put pressure on your legs and help them return blood to the heart instead of letting it pool. They are available at some pharmacies and medical supply stores. Vein specialists can suggest how tight your stockings should be and help you figure out which size is best.
When to Get Professional Help for Varicose Veins
If the self-help measures you try do not get rid of your symptoms, it may be time to go to a vein doctor for help. A variety of vein treatments can be performed at a vein clinic.
- Laser surgery, which can get rid of smaller varicose veins without injections.
- Sclerotherapy, or minor injections that closes veins so they eventually fade.
- Vein stripping to get rid of a long vein.
Varicose veins are not necessarily dangerous, but they can make be unsightly and painful. A number of simple home remedies can help reduce their symptoms if you have varicose veins, but they’re not always effective. Vein specialists can provide more aggressive vein treatment for better results. | <urn:uuid:2567e820-ad93-446f-ab84-744d5633c876> | CC-MAIN-2022-33 | https://tricitycardiology.com/what-you-can-do-to-manage-varicose-veins-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.932513 | 587 | 2.515625 | 3 |
New Hampshire Can Lead on Privacy Protection
This appeared in the New Hampshire Union Leader on February 13, 2014.
In the wake of the NSA scandal, American citizens demand Congress take a hard look at government surveillance practices. While only the federal government has the power to halt NSA activities, the states will likely be the real battleground for privacy issues. In fact, state legislators are actively moving legislation aimed at protecting citizens’ civil liberties in the digital age.
Digitally connected devices are an integral part of Americans’ daily lives. More than 90 percent of Americans deem essential one device in particular: the smartphone. For many, the buzz of a smartphone alarm is the first thing heard each morning, and the hum of a phone powering off is the last thing heard each night. Every day, people use mobile devices to exchange text and voice messages, check emails, take photos, browse the web and update Facebook accounts. Advanced geolocation services mean our mobile devices now reveal where we have been, where we are and where we plan to go.
For all its utility, the ubiquitous and indispensable smartphone’s wealth of confidential information exposes users to privacy risks. A recent Pew poll reports a majority of Americans believe their civil liberties are in danger — and when it comes to how much access law enforcement has to a person’s cell phone—they certainly are. Only four states currently have laws addressing how much access law enforcement should have to smartphone data without obtaining a search warrant.
Warrants should protect individuals’ Fourth Amendment right to privacy, but today’s technology has far outpaced this legal protection. For decades, the law has held that although a warrant is needed to search a building, law enforcement can freely search items on an arrestee’s body. This distinction — delineated in the 1973 court case United States v. Robinson — no longer makes sense when the average smartphone holds more data than an entire warehouse.
Until a firm precedent is set regarding the search and seizure of cellular devices, Americans will remain vulnerable to law enforcement perusing intimate details of their lives — without a warrant or even probable cause. Courts have grappled with how much leniency to afford law enforcement in inconsistent attempts to set the standard for accessing cell phone data.
In United States v. Wurie, the First Circuit Court of Appeals, which includes New Hampshire, recently ruled that searching a cell phone without a warrant is not constitutional; however, courts in the past have ruled differently. For example, the Southern District Court of Kansas ruled in 2008 that citizens lack a “reasonable expectation of privacy” regarding call records and address books. Even the U.S. Supreme Court sidestepped answering whether searching cell phone data without a warrant violates the Fourth Amendment. Instead, in City of Ontario (California) v. Quon, the court ruled on narrower grounds, kicking the legal question back to the lower courts.
Supreme Court rulings this summer may lend more clarity to this dilemma. But, with a daily drumbeat of news stories about law enforcement and governments’ use of data — and regular reports of the private sector abusing personal information — privacy concerns aren’t going away anytime soon. State policymakers must be a guiding voice in the fight to protect citizens’ privacy, and safeguarding the mobile devices that have become portals to our personal lives is a good place to start.
To this end, states should follow the lead of those like New Hampshire. The New Hampshire Legislature plans to take the reins on the Fourth Amendment issue and consider legislation that would ensure no information contained within a portable electronic device would be subject to warrantless search and seizure.
Americans should not have to lower their privacy expectations in the digital age. A groundswell of opposition to collection and use of personal data resulted after the NSA revelations. Yet, the type of data collected by the NSA is trivial when compared with the personalized data stored on our mobile devices; a look through our smartphones indicates much more than our call logs or data mined from mobile apps. A host of privacy challenges are on the horizon, but safeguarding Americans’ cellular devices from unwarranted searches should be an area for both sides of the aisle to seek cooperative solutions. While the federal government continues to delay, it is time for state policymakers to move on protecting citizens’ privacy. | <urn:uuid:70bf5afb-deae-425e-9b67-7fc03eefc870> | CC-MAIN-2022-33 | https://alec.org/article/new-hampshire-privacy-protection/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.92529 | 878 | 2.015625 | 2 |
Ellu chutney or sesame coconut chutney is a healthy and delicious chutney recipe, or thogayal really, that is usually served with rice. During summer breaks, we would go to Salem to my aunt’s house. That train ride with aunts and cousins and nieces and nephews was one of my happiest memories and of course, no train ride in India is complete without the mention of food.
Lemon rice packs really well and when it’s placed in warmed banana leaves with this ellu chutney on the side, that’s pure deliciousness right there. Ellu or black sesame contains healthy omega 3 fatty acids and also fibre that helps in digestion. The nutty aroma when it’s roasted is perfect when combined with raw coconut.
A few things to remember when preparing to make this ellu chutney at home
- Use black sesame or black ellu for the chutney
- Fresh coconut works best but frozen coconut works just fine too
- If you would like ellu chutney without coconut, it’s definitely possible too. Omit the coconut in the recipe below and half all other ingredients
- Roasting the ellu or sesame is an important step. Since the seeds are black, it’s hard to tell when it’s done. Look out for a nutty aroma and to be doubly sure, rub a few seeds between your palms to see if the inner white seed has turned a light brown (see picture below)
- Since we want the flavour of ellu to dominate, no curry leaves, coriander leaves or other spices are used in this recipe. Keep it simple!
- The proportion of ellu to coconut can be altered. Keep ellu on the higher side, again, for the true flavour of the sesame to come through
- Ellu chutney tastes best with rice more than dosa or idli
You may also like this ellu sadam recipe (sesame rice).
Ok, now on to the ellu chutney recipe.Print
Ellu chutney or sesame chutney is a delicious and healthy chutney recipe using black sesame seeds and coconut. Goes perfectly with rice
- 1/4 cup black sesame seeds (black ellu)
- 2 tablespoons grated coconut, thawed if frozen
- 2–3 flakes of garlic, crushed
- 2–4 dry red chillies, adjust to taste
- A marble-sized ball of tamarind
- Salt to taste
- In a dry pan without oil, roast the sesame seeds on medium flame
- The goal here is to get all the moisture out of the seeds first and roast it to a golden colour inside. This is tough to see since the seeds are very dark coloured so I have a tip below to check that
- Keep stirring the seeds as they roast and adjust the heat to make sure they don’t burn
- After about 3-4 minutes, add the red chillies and continue roasting on low-medium flame
- The seeds may pop and scatter a bit similar to mustard seeds. This doesn’t mean they are done. Keep stirring and roasting
- After about 5-6 minutes, take 2-3 sesame between your fingers and gently rub them open. The white parts inside should be a light golden brown. This means they are done. If it still looks white, continue roasting for another few minutes
- When the sesame seeds are nicely roasted, turn off the heat and add the crushed garlic, coconut, salt, and tamarind to the same pan and give everything a good mix
- Cool completely and grind to a coarse chutney with minimal water. Ellu chutney is meant to be thick so be cautious not to add more water than is needed. It’s also important not to grind the chutney very smooth. Ellu chutney should be a bit coarse in texture
- All done! Enjoy with some rice and ghee or any flavoured rice like lemon rice
Why is my ellu chutney bitter?
If you burn the sesame seeds while roasting, it can turn bitter. Keep a close eye on the heat used as you roast them and take my timings above as just a guideline. Stoves and pans and definition of low heat will differ from kitchen to kitchen. Adding some more coconut can salvage a bitter ellu chutney somewhat
Can I make ellu chutney without coconut?
Yes you can! Omit coconut in this recipe and halve all other ingredients. Taste as you go when grinding. However, I must say that this chutney tastes bet with some coconut so consider adding at least one tablespoon if you can
What can I do if my chutney becomes too spicy?
I have given a range of 2-4 chillies in the ingredients list. My mother adds 6 because our food back home is usually more spicy than how I cook in my kitchen. Start with 2 chillies, it’s much better to have chutney that’s less spicy than it be too spicy to eat! Adding more coconut can help salvage a chutney that is too spicy
Can I make ellu chutney with white ellu or white sesame seeds?
Technically you can but the flavour just won’t be the same. It’s the bran on the black sesame seeds that gives this chutney it’s unique nutty flavour and texture. Definitely worth getting the right type of sesame seeds to make this!
Keywords: ellu chutney, sesame chutney
Step by Step Ellu Chutney Recipe
Dry roast 1/4 cup sesame seeds in a pan for 3-4 minutes in medium heat, stirring frequently. Add 2-4 red chillies (adjust per your spice tolerance and preference) and continue roasting
Do not worry if the sesame seeds start spluttering. They are still not done and need to be roasted until the insides turn light golden brown.
When the sesame seeds are done, turn off heat and add 2 heaping tablespoons of grated coconut, 2-3 flakes of crushed garlic, and a marble-sized ball of tamarind to the pan. Add salt too.
Mix everything well and let it sit in the remaining heat of the pan. Cool completely.
Grind with minimal water to a coarse texture. Remember that ellu chutney is not meant to be very smooth.
Serve with rice! Enjoy 🙂 | <urn:uuid:80ca6aa5-0967-43d6-baf1-8140b3cc60bd> | CC-MAIN-2022-33 | https://www.cookingandme.com/2020/09/27/ellu-chutney-sesame-coconut-chutney/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.907243 | 1,389 | 1.539063 | 2 |
Tuesday, July 8, 2014
Artist - Oscar Murillo
"One of those collectors who fell hard for him is the art adviser Stefan Simchowitz, who has bought 34 Murillo works for himself since 2011 (for as little as $1,500) and a similar number for clients (who include the actor Orlando Bloom and New York Giants owner Steve Tisch). He has become known as a sort of art-flipper bogeyman—despite never, he insists to me and on Facebook, having flipped a Murillo in his own collection (work he’s gotten for others, however …). He believes Murillo’s selling a painting to a wealthy collector is like a graffiti artist “tagging a home.” Rich people “are clueless and should be educated and not just be parasitic socialites. And I think that is what Oscar’s art does,” Simchowitz says. “In this expensive, fancy home arrives this ‘trophy’ that is actually more a Trojan horse.” Or, as Murillo put it in a recent edition of the very glossy L’Officiel Art (which features a photo of his uncle Carlos sunk in bubbles in the bathtub of a 1930s Beverly Hills villa, owned by a collector, that they were staying in during the Mistake Room show): “Any opportunity of artistic achievement comes with an opportunity to infiltrate a social class.”
"New York Magazine - "Oscar Murillo Perfectly Encapsulates the Current State of the Contemporary Art World"
New York Times - "Art World Places Its Bet" | <urn:uuid:cd737ea1-ee42-4800-95d3-e3cf12929a00> | CC-MAIN-2022-33 | http://blog.wedefyaugury.us/2014/07/artist-oscar-murillo.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.969293 | 335 | 1.59375 | 2 |
On today’s Morning Magazine, the latest UN climate report says political polarization is one of the biggest barriers to crafting solutions to the climate crisis. We’ll hear from two congressional representatives reaching across the partisan divide and a student-produced report on what a “just transition” to clean energy implies. After that, we will visit an exhibit at CU Boulder that explores racism and classroom spaces. Finally, we’ll have our regular Friday feature, Dot Org.
The Morning Magazine features local news headlines, stories, and features and broadcasts on KGNU Monday through Friday 8.04-8.30 AM. Theme music is by Podington Bear.
Subscribe to KGNU's Morning Magazine Podcast: | <urn:uuid:b1402b6a-780f-4480-a7d6-744cb8a740ba> | CC-MAIN-2022-33 | https://news.kgnu.org/2022/04/morning-magazine-podcast-friday-april-15-2022/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.898122 | 152 | 1.804688 | 2 |
NASA sees activity continue on the sun
This flare is classified as an X1.2 flare and it is the 18th X-class flare of the current solar cycle. The flare caused a radio blackout – categorized as an R3, or strong, on NOAA’s space weather scales from R1 to R5 — which has since subsided.
The flare was also associated with a non-Earth-directed CME. CMEs and flares are separate but related solar phenomena: solar flares are powerful bursts that send light and radiation into space; CMEs erupt with billions of tons of solar material. They often, but do not always, occur together.
Any time we can see a solar flare from Earth’s view, than at least some of its light and radiation must be directed at Earth. CMEs on the other hand may or may not be Earth directed. NASA observes CMEs, however, even when they are not traveling toward Earth, because they may impact spacecraft.
Experimental NASA research models show that this CME left the sun at around 745 miles per second, beginning at 10:18 p.m. EDT. It is not Earth-directed, however it may pass the Spitzer and Epoxi orbits, and their mission operators have been notified. If warranted, operators can put spacecraft into safe mode to protect the instruments from solar material.
Updates will be posted as necessary.
NOAA's Space Weather Prediction Center (http://swpc.noaa.gov) is the U.S. government's official source for space weather forecasts, alerts, watches and warnings.
Karen C. Fox
NASA's Goddard Space Flight Center, Greenbelt, Md.
All latest news from the category: Physics and Astronomy
This area deals with the fundamental laws and building blocks of nature and how they interact, the properties and the behavior of matter, and research into space and time and their structures.
innovations-report provides in-depth reports and articles on subjects such as astrophysics, laser technologies, nuclear, quantum, particle and solid-state physics, nanotechnologies, planetary research and findings (Mars, Venus) and developments related to the Hubble Telescope.
Sound plus electrical body stimulation has potential to treat chronic pain
New technique could relieve pain for individuals with various chronic and neurological conditions. A University of Minnesota Twin Cities-led team has found that electrical stimulation of the body combined with…
Bioengineered cornea can restore sight to the blind and visually impaired
Bioengineered corneal tissue for minimally invasive vision restoration in advanced keratoconus in two clinical cohorts. Researchers and entrepreneurs have developed an implant made of collagen protein from pig’s skin, which… | <urn:uuid:e344838e-70d9-4419-ab87-0402c43af885> | CC-MAIN-2022-33 | https://www.innovations-report.com/physics-and-astronomy/nasa-sees-activity-continue-sun-214220/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.928181 | 570 | 3.15625 | 3 |
New Mexico has laws that require landowners, business owners, and homeowners to maintain their property so that it does not present a risk of harm to others. This means that if you or someone you know has been harmed on another’s premises, the property owner has an obligation to help you in your recovery.
Many victims are hesitant to act, believing their injury may be the result of personal irresponsibility. However, there are often circumstances where the property owner was aware of the harm and did not take the necessary steps to protect their guests.
These injuries can have very real consequences on those who endure them. In addition to slip and fall cases, premises liability cases also include:
- Injuries sustained from defective construction
- Failure to warn of dangerous conditions
- Injuries inflicted by a third party on the premise
Common injuries of premises incidents include:
- Serious wrist injuries
- Back and spinal injuries
- Brain trauma, including concussions
- Broken bones
- Head injuries
- Herniated discs
- Hip fractures
- Sprains, tendonitis, and torn ligaments
These injuries have very real costs, too. In addition to the intense pain, you or your loved ones can face loss of income, heavy medical costs, psychological trauma, and permanent disability.
If your injuries were the result of someone else’s negligence, you have a right to compensation for the consequences of their action. | <urn:uuid:b2a544c4-942e-43ae-9a92-ff00667f3811> | CC-MAIN-2022-33 | https://weemshazenlaw.com/practice-areas/premises-liability/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.966665 | 290 | 1.742188 | 2 |
The Bank for International Settlements is the stopped clock of international economic institutions. It has argued for monetary and fiscal tightening, whether that makes sense, or not.
Fortunately, policymakers, or at least the central banks that are members of the BIS, have ignored its apparent conviction that the world needed an even deeper and more prolonged recession.
Yet now, precisely because central banks wisely ignored its advice, a synchronised recovery has finally arrived.
So does the latest BIS annual report tell the right time again, as it did in the years before the crisis?
It is worth recalling how wrong the BIS has been in the past. In June 2010, when, as we now know, the post-crisis damage was very much with us, the BIS already asserted that "the time has come to ask when and how these powerful measures can be phased out".
Oh no, it had not. The time had come to act more aggressively to accelerate the recovery and so limit the longer-term damage of the crisis. The need then was not to phase out monetary and fiscal stimulus, but to strengthen it.
The weak recovery is in good part a consequence of that failure.Yet now things do look different. As Catherine Mann, chief economist of the OECD has stated, things are "better, but not good enough".
The Paris-based club of developed economies, in line with most forecasters, expects a modest pick-up in global growth this year and next. The hope must be that this will be the beginning of a sustained upswing, in which strengthening investment and faster productivity growth keep inflation in check.
But hope is what this still is.
So what risks lie in wait for the recovery? An obvious one is that monetary tightening will be too fast, even in the US, let alone the eurozone. Inflationary pressure remains remarkably subdued.
Even the BIS, a worrywart's worrywart, agrees that resurgence of inflation is not a large risk. This is partly because of globalisation, which has greatly enhanced competitive pressures.
Another risk is financial. As Jaime Caruana, general manager of the BIS, notes: "In a number of smaller advanced economies and emerging market economies, long financial booms have moderated or turned into downswings. And globally, debt is at record levels: in 2016, the stock of non-financial sector debt in the economies [of the group of 20 countries] stood at around 220 per cent of GDP, almost 40 percentage points higher than in 2007."
A striking feature is the remarkably rapid growth of credit and debt in China.
Warren Buffett has said that: "Only when the tide goes out do you discover who's been swimming naked." As interest rates rise, financial risks will crystallise.
Yet reasons for optimism on this point also exist: the core western financial system is far better regulated and capitalised than it was in 2007; the Chinese authorities can stabilise their financial system, if necessary; no globally significant credit-driven boom is to be seen, except in China; and, finally, even though prices of highly valued equities might fall, that would not of itself cause a crisis in the credit system.
If a financial risk exists, it is likely to be in public debt, maybe in the eurozone.
Yet another danger is renewed weakness in aggregate demand. This is one on which, rather surprisingly, the BIS does focus.
But, so long as inflation remains subdued, both monetary and fiscal room for manoeuvre remains.
Of course, this also argues against premature monetary tightening. Let us establish strong forward momentum first. The final and possibly greatest danger is a collapse in global co-operation, perhaps even an outbreak of conflict. That would destroy the stability of the world economy on which all - including, though they do not know it, foolish nationalists and protectionists - depend.
Indeed, it could destroy the stability of the global order.
There is no doubt that, as the BIS notes, "formal statistical evidence, casual observation and plain logic indicate that globalisation has been a major force supporting world growth and higher living standards".
Yet, as Ms Mann rightly says, this indubitable progress has coincided with rising inequality, a concentration of job losses at the middle-skill level, and sharp declines in jobs in manufacturing in the high-income economies. That, in turn, has, among other things, led to the protectionism we see, notably in the US.
A collapse of the global political and economic orders could do enormous damage. The assumption, apparent in the markets, that such actions would be "full of sound and fury, signifying nothing" seems remarkably insouciant.
It is perfectly possible that nothing much will happen. But it is also possible that the fragile spirit of rules-governed co-operation will simply vanish overnight.
We in the high-income countries allowed the financial system to destabilise our economies. We then refused to use fiscal and monetary stimulus strongly enough to emerge swiftly from the post-crisis economic malaise. We failed to respond to the divergences in economic fortunes of the successful and less successful.
These were huge mistakes. Now, as economies recover, we face new challenges: to avoid blowing up the world economy, while ensuring widely shared and sustainable growth.
Alas, we seem likely to fail this set of challenges. The BIS talks, sensibly, of building resilience. A part of this lies in ensuring that growth becomes less dependent on debt.
Yet that is only one way in which we need to make our economies more effective and politically legitimate.
If we fail to respond to these structural challenges, the recovery is unlikely to prove strong or lasting.The post-rescue phase is at last quite close. It is a time for reinforcing what was good and reforming what was not. email@example.com
Fetching latest articles | <urn:uuid:1393cbb6-9b54-4280-953b-752742741513> | CC-MAIN-2022-33 | https://www.afr.com/world/risks-remain-amid-the-global-recovery-20170705-gx4rm5 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.958189 | 1,215 | 1.789063 | 2 |
Teaching should be held in high esteem: What other profession prepares the future leaders and workforce of America?”
Camden Hanzlick-Burton’s pivotal moment came when, as a senior in high school, he took Advanced Placement (AP) biology. His teacher, a 40-year veteran of the school, “allowed us to work on challenging, inquiry-based labs and relied on our ability to solve it scientifically. It was the first time I felt like I had done real science.” Camden decided to pursue biology in college and, eventually, to become that teacher who inspires students. At the University of Kansas, Camden had the opportunity to conduct scientific research and teach at several levels of the K-12 system. “I’ve developed as a person and an educator whose primary goal is to inspire students to be critical thinkers and inquisitive lifelong learners.”
Camden is a 2012 Kansas Teacher of Promise and two-time recipient of the AFCEA (Armed Forces Communications and Electronics Association) STEM teacher’s scholarship. As a member of an improvisational troupe, he performed on the stage through high school and college. Camden’s longest theatrical experience was as a member of “OUTRAGE: A journey through teen dating violence and sexual assault,” a play aimed at informing the community about dating violence, sexual assault and healthy relationships.
Camden earned a BS in biology and his teaching credential from the University of Kansas and is beginning his career in his native state as a freshman biology teacher at Olathe Northwest High School, a public school of nearly 2,000 students. “A teacher in a large public school has the responsibility of reaching a wide diversity of students and doing their best to create an equitable classroom where everyone can learn.”
Knowles Academy Courses Taught | <urn:uuid:48b6003c-ad4b-4138-b1c8-c19b29b49d83> | CC-MAIN-2022-33 | https://start.kstf.org/bios/camden-hanzlick-burton | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.977618 | 387 | 2.296875 | 2 |
We are searching data for your request:
Gather your supplies.
Brush out hair.
Take two small sections of hair and put one over your left shoulder and one over your right. Put the rest back in a pony tail.
Take a handful of hair on the top of your head and put it in a messy bun. Leave the strands that you put in the front where they are.
Put the bottom section in a pony and take out the messy bun. Still do not touch the front sections.
Hair spray all you have teased.
Use your small elastic band to tie hair about half way up the beehive. WARNING! If your beehive is messy brush it out before putting in the elastic band. We had to do that.
(After we brushed it) :)
Randomly place bobby pins in the back. You can use as many as you will need.
Bobby pin that back.
Oh and I forgot to tell you take the ponytail at the bottom out.
Part hair where wanted. | <urn:uuid:26aae966-33c1-44c5-9071-d14c21407373> | CC-MAIN-2022-33 | https://jm.zaprennes.org/5874-how-to-get-biker-hair-from-teen-beach-movie.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.939612 | 216 | 1.6875 | 2 |
dried cherry, red currant, malt syrup
region: western highlands, mt. hagen
wet mill: roteps
varietals: bourbon, typica, arusha
process: fully washed
elevation: 1650-1900 masl
importer: crop to cup
from crop to cup:
"Roteps Wet Mill is a large scale wet mill, common for the PNG Western Highlands context. Very few wet mills operate high in the mountains where you find the homes and farms of the majority of smallholder coffee producers. The owner of Roteps, Paul, sends out a strong team of cherry collection agents and their trucks on a daily basis to collect from known smallholders and small estates within a 20 mile radius of the wet mill, which is located in Kuli, along the Highlands Highway east of the city of Mt. Hagen. As is common in PNG, a large, expansive drying field holds long tarps for drying, and the dry parchment is stored at a warehouse on site. The coffee is then sent for final milling into the town of Goroka before export out of the port of Lae. Premiums are paid to both agents and smallholders for premium ripe cherry, to reduce the number of lower grade lots he needs to dry separately. To keep ripe cherry from fermenting in the back the truck before milling, most trucks can only complete one or two routes up a single valley and back. Paul’s wet mill, founded in 2013, is 100% pre-financed by our export partner in PNG, meaning we have a much higher level of control over cherry collection and we can pick the best lots coming out of this operation.
Papua New Guinea coffees most commonly hail from the Highlands – the high-altitude areas of the “mainland” and split up between Western (Hagen), Central and Eastern (Goroka) Highlands regions. Smaller regions are beginning to pop up (e.g. the smaller islands like New Britain). The country offers a diverse set of options not in processing (rare to see anything but fully washed), but in producer format. Suppliers range from small cooperatives to well financed estates, to massive washing stations that can each produce dozens of containers per year. Crop to Cup’s focus is generally on the smallholder coffees of PNG (as opposed to its estate coffees). While each smallholder farm is small in land size and yields are drastically low, the sheer volume of smallholder farmers allows the country to produce massive volumes most years.
Many smallholders pulp by hand and wash in bags on their own farms, then sell parchment to local collectors who then re-sell to larger middlemen who buy from the side of the road and sell to exporters in larger towns like Goroka and Hagen. Those are generally low-quality coffees, but they account for most of the volume produced by the country (usually sold as Y- Grade). Most specialty lots come from washing stations who send trucks far and wide to collect cherry from thousands of smallholders. Tarp drying is most common, and the daily or weekly lots that come out of these washing stations can be impressive, for many of them are well managed with strict red cherry collection, clean water and careful attention to drying. The other sources of PNG specialty lots are the new generation of coops and small, traceable producer groups.
Coops and other organized farmer groups are now producing impressive qualities, but their numbers are still low. Much of this difficulty in building membership is due to cultural and geopolitical issues between villages. Hundreds of disconnected languages are spoken across the Highlands, and historically there was not a lot of cooperation between villages. The support that agriculture provided was generally limited to each village, and each village is usually comprised of just one or a few families/clans. Further, the countless disparate areas of the Highlands only became connected upon the completion of the Highlands Highway (from the port in Lae to Hagen in the West) in the early 1950s (and “first” contact between Highlands and the coastal areas was not even until 1930!). To this day, access to the secondary valleys off the Highlands Highway is still difficult, and a lot of coffee is still transported by small prop plane from tiny airstrips in the middle of dense forest.
But when you do see coops, they are impressive. The examples of farmer organization we’ve seen in PNG often trump that of many other established producer countries. Coop farmers are often paid by cashless card swipe, and detailed home and family income growth plans are the norm. Traceability has improved as well, and we can now access lots as small as 10-20 bags produced by only one or two families. This has greatly improved our ability to weed out defective lots (which will always be common in such a smallholder context), and, over recent years, cup scores and consistency have followed suit." | <urn:uuid:0408e630-7ebd-47d0-b852-a4b0d3b40908> | CC-MAIN-2022-33 | https://eastalsteadroastingco.com/collections/coffees/products/copy-of-colombia-el-obraje-el-bosque | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.960469 | 1,013 | 1.601563 | 2 |
Here at Muslim Aid, we have a multitude of projects to share blessings and assist vulnerable people in fighting poverty this Ramadan. Although we should be making an effort to donate to charitable causes throughout the year, Ramadan charity is more important than ever. Your Ramadan donations can make the difference between life and death for millions of vulnerable families across the globe.
In addition to the aid that you provide for vulnerable communities, many personal rewards can be reaped from Ramadan giving. Since this is the time in which great focus is placed on making sacrifices in the name of Allah (SWT), donating allows us to adhere to the teachings of Ramadan.
When it comes to finding charities to donate to in Ramadan, Muslim Aid should always be considered.
The first of our projects that you can donate to during Ramadan, or any time of the year, is our Need is Greatest Appeal. By donating to this project, you enable us to deliver relief to the vulnerable, elderly, orphans, and widows in the poorest areas of the world.
As a result of natural disasters, war, and the COVID-19 pandemic, 68 million people have found themselves displaced from their homes. Each of these individuals is struggling to survive, and they rely on your charitable contributions just to get by. Your donations are distributed amongst those who require the most immediate support, from those who have been abandoned to those who are suffering from grief.
Another one of our projects is our Global Emergency Appeal, which allows us to respond urgently to any disasters. In the instance of an emergency, delays can be deadly. Innocent people find themselves scared, injured, trapped, and in danger, meaning that speed is essential in getting help to these individuals.
Your donations allow us to reach these endangered communities within 72 hours to distribute medical care, sanitation, shelter, water, and food. We make it our mission to be wherever we’re needed - regardless of the situation. Despite this, we need your donations to make this happen.
It’s a fact of life that everyone needs clean water to survive, which is why we established our Safe Water Project. Every two minutes, a child dies from a water-related disease, making a lack of safe drinking water one of the biggest threats to those living in poverty. Your Ramadan donations allow us to give water to some of the 2.1 billion individuals that are unable to access safe drinking water.
Water is a basic human right which makes it even more devastating that so many people are forced to go without, leading to disease, dehydration, and death. In order to shelter the vulnerable from hardship, they simply can’t go without water.
Sadaqah Jariyah is a form of Islamic voluntary charity that provides vulnerable individuals with ongoing benefits, such as paying for a child’s education so that they can go on to teach others. Ramadan is the ideal time to pay Sadaqah Jariyah as not only will you supply someone in need with long-term aid, but you’ll be rewarded by Allah (SWT) for your generosity.
There’s no denying that children are the future, and it’s our responsibility to provide them with the foundations to thrive. Your donations can enable a child to reach their full potential, which is why we established our Child Sponsorship Project.
With your charitable donations, we’ve been able to provide almost 50,000 children with an education in the last 14 years. We’re well-equipped in placing children within protected environments alongside caregivers that are able to respond to the complex and ever-changing needs of children. No one deserves security this Ramadan more than innocent children.
Another way in which you can shelter the vulnerable this Ramadan is by donating to our Fight Poverty Project. Instead of providing struggling families with temporary financial relief, our Fight Poverty Appeal is designed to empower communities through the teaching of essential skills to generate income. In doing so, we make it our mission to build brighter futures where individuals can develop and sustain themselves in a dignified manner.
Although monetary donations can provide families with the temporary aid that they need, this eventually runs out and they are forced into feeling reliant on others. The value of independence can’t be matched, which is why we deem our Fight Poverty Project so valuable.
There’s nothing scarier than falling ill and not having the means to help yourself, which is why we established our Medical Aid Project. Despite this, roughly half of the population is unable to access basic medical care, leading to deaths from the likes of malaria and TB. These deaths are completely preventable, and we require your donations to reach these individuals before it’s too late. Similarly, we can use your money to help deliver babies safely and respond to emergency situations.
Medical aid is a human right, not a luxury. Still, the financial situation of millions leaves them incapable of accessing it. This aid is required to shelter the vulnerable this Ramadan.
Without education, poor children across the globe are simply unable to break the vicious cycle of poverty. As a result, we established our Education Project to shelter children from the threats of poverty worldwide. Every child should have the opportunity to learn, grow, aspire, and achieve a bright future. Whether you support one child through their education or empower an entire community, your donations to our Education Appeal are absolutely life-changing.
We accept your donations all year round, but we especially encourage you to contribute to our charitable causes during Ramadan. Fulfil your religious duties and donate to Muslim Aid today. | <urn:uuid:53ff5164-4a11-47dd-a424-b2b6a6fd4254> | CC-MAIN-2022-33 | https://www.muslimaid.org/media-centre/blog/sheltering-the-vulnerable-during-ramadan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.948345 | 1,132 | 2.046875 | 2 |
Some tomato farmers in Asa Local Government of Kwara State have expressed fear over insect attacks in the ongoing planting season. To this end, they have solicited for the provision of herbicides by the state government to curb invasion of grasshoppers and other insects to protect their tomatoes.
Asa is one of the local governments where tomato crops are widely grown in the state.
Speaking on their predicament, the leader of a group of seven female tomato farmers across seven communities in the area, Mrs Taiye Hussein, said the situation was giving them great concern.
“The issue of insects has been a very terrible concern, especially now that we are in the planting season. We have all planted but live in fear of insects, especially grasshoppers. This will not hamper our harvest, except we are supported with capital to buy chemicals for treatment.
“The spraying we did last planting season cost N30,000 for three cans of the product. Already, I have invested N90,000 for both clearing and plowing by engaging services of workers because we lack tractors. We have also tried to cut cost by involving our children to do some clearing and other jobs.
“I want the government to assist us in this regard with at least N5million grant, which we will spend from preparation, planting and harvest,” she added. | <urn:uuid:11ff4a2c-1329-4803-b9f2-3c5c3326392e> | CC-MAIN-2022-33 | https://dailytrust.com/kwara-tomato-farmers-express-fear-over-insect-attacks | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.971042 | 277 | 1.929688 | 2 |
“An’ you ain’t never seen bad luck,” Edwin concluded triumphantly. “You’re just as bad as Granser and his germs. You believe in what you don’t see. Go on, Granser.” Hare-Lip, crushed by this metaphysical defeat, remained silent, and the old man went on. Often and often, though this narrative must not be clogged by the details, was Granser’s tale interrupted while the boys squabbled among themselves. Also, among themselves they kept up a constant, low-voiced exchange of explanation and conjecture, as they strove to follow the old man into his unknown and vanished world. “The Scarlet Death broke out in San Francisco. | <urn:uuid:e785c847-dfbc-4986-aadd-acbb8cca6e6d> | CC-MAIN-2022-33 | https://sites.layerswp.com/rayne/2016/02/08/edwin-concluded-triumphantly/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.978908 | 162 | 1.65625 | 2 |
For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
A Proposal of Novel Synchronous Acquisition Method with an Adaptive Filter in Asynchronous DS/CDMA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/12/25
Print ISSN: 0916-8508
Type of Manuscript: Special Section PAPER (Special Section on Spread Spectrum Techniques and Applications)
asynchronous DS/CDMA, adaptive filter, synchronous acquisition, multiple access interference,
Full Text: PDF>>
This paper proposes a novel synchronous acquisition method with an adaptive filter in asynchronous direct sequence/code division multiple access (DS/CDMA) communication systems. An adaptive filter is used in a single-user receiver, in complete synchronization of desired user's signal, the tap coefficients of the filter are controlled to orthogonalize to all other user's spreading sequences without knowledge of the sequences, amplitude and time delays of the signals. While, in the proposed system for synchronous acquisition, the tap coefficients are controlled to orthogonalize to all user's sequences including desired user's signal. The synchronous acquisition can be achieved by using the difference of cross-correlation function value between desired user's sequence of inphase and the tap coefficients for each phase. The principle and performance evaluation for the proposed method are shown. As a result, compared to an acquisition method of conventional sliding correlator, considerable improvement of the average acquisition time can be achieved in large power multiple access interference environment. | <urn:uuid:296ed02c-c64c-4bc5-8d75-698fd8f6ac77> | CC-MAIN-2022-33 | https://search.ieice.org/bin/summary.php?id=e80-a_12_2382&category=A&lang=&year=1997&abst=/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.844326 | 413 | 1.820313 | 2 |
by Fred Lucas
President Donald Trump’s former campaign manager, Corey Lewandowski, set the tone early Tuesday during what House Democrats billed as a debut impeachment hearing.
“I will be as sincere in my answers as this committee is in its questions,” Lewandowski said toward the end of his opening statement.
It turned out that Lewandowski, who already has testified to Congress three times and met extensively with special counsel Robert Mueller’s investigators, had less to say.
The White House invoked executive privilege so that Lewandowski would say no more about his conversations with Trump than was contained in Mueller’s final report or had been publicly reported.
This outraged House Judiciary Chairman Jerry Nadler, D-N.Y.
“I think we should call this what this is: an absolute cover-up by the White House,” Nadler said.
“We received a letter from the White House yesterday that they will not let you answer any questions beyond what you told the special counsel and beyond what was publicly released,” Nadler said. “The White House’s instruction to you is based on a bogus claim of executive privilege, even though you did not work a single day for the administration, let alone in the executive branch.”
The special counsel’s probe determined that neither Trump nor anyone in his campaign conspired with Russian entities to interfere with the 2016 presidential election.
However, many Democrats say they want to impeach Trump for obstruction of justice.
Mueller did not make a final determination as to whether Trump obstructed his investigation.
One of 10 examples of possible obstruction in his report, however, said that Trump asked Lewandowski to deliver a message to then-Attorney General Jeff Sessions in 2017 to limit the probe only to how to prevent Russian meddling in future elections. Lewandowski never delivered the message to Sessions, the report said.
Unlike in past impeachment hearings, such as those targeting Presidents Andrew Johnson, Richard Nixon, and Bill Clinton, the House has not approved a formal impeachment inquiry. However, Nalder said his committee is conducting impeachment proceedings.
Here are key moments from the opening day of what he called an impeachment hearing, where lawmakers covered little to no new ground.
1. ‘Don’t Have It in Front of Me’
Neither Nadler nor Lewandowski had the Mueller report handy at the hearing. The White House parameters of what Lewandowski could talk about was based in part on what was in the Mueller report.
For Lewandowski, who managed Trump’s campaign during the Republican presidential primary season, this provided a means to delay answering questions. For Nadler, it meant fumbling to ask questions.
“Is it correct that as reported in the Mueller report on June 19, 2017, you met alone in the Oval Office with the president?” Nadler asked.
Lewandowski replied: “Is there a book and page number you can reference to? I don’t have a copy of the report in front of me.”
Nadler knew this much, answering: “Volume 2, page 90. I simply asked you is it correct that as reported in the Mueller report [that] on June 19, 2017, you met alone in the Oval Office with the president?”
Lewandowski responded: “Could you read the exact language of the report, sir? I don’t have it available to me.”
Nadler: “I don’t think I need to do that and I have limited time. Did you meet with the president on that date?”
Lewandowski: “Congressman, I’d like for you to refresh my memory by providing a copy of the report so I can follow along.”
Nadler stopped the clock for the hearing while staffers gave Lewandowski a book. Nadler again referred to volume 2, page 90.
Lewandowski: “Which paragraph, sir?”
Nadler: “I don’t have it in front of me.”
Eventually, the committee chairman asked: “How many times did the president ask you to meet him in the White House?”
Lewandowski said: “The White House has directed me not to disclose the substance of any discussions.”
2. ‘Harassment of This President’
Lewandowski, who turns 46 Wednesday, delivered a stern opening statement about what he said was lawmakers wasting time and money to push a nonexistent scandal.
“As the special counsel determined, there was no conspiracy or collusion between the Trump campaign and any foreign government, either on my watch or afterwards,” Lewandowski said, adding:
Not surprisingly, after the Mueller report was made public, interest in the fake Russia collusion narrative has fallen apart. In conclusion, and it’s sad to say, this country has spent over three years and 40 million in taxpayer dollars on these investigations. And it’s now clear that the investigations were populated by many Trump haters who had their own agenda, who wanted to take down a duly elected president of the United States.
As for actual collusion or conspiracy, there was none. What there has been, however, was harassment of this president from the day he won the election.
We as a nation would be better served if elected officials like yourself concentrated on your efforts to combat the true crises facing our country as opposed to going down rabbit holes like this hearing.
Instead of focusing on petty and personal politics, the committee [should] focus on solving the challenges of this generation—imagine how many people we could help or lives we could save.
3. Invoking Gump
Rep. Steve Cohen, D-Tenn., known for gimmicks and theatrics in questioning witnesses, invoked the Oscar-winning 1994 film “Forrest Gump,” about a man (played by Tom Hanks) who manages to be in the middle of nearly every historic situation during his lifetime.
“Could it be that [Trump] asked you to get the message to Sessions because he thought that you would do whatever he thought he asked, even if was illegal or immoral?” Cohen asked.
Before Lewandowski responded, Cohen went on to quote news articles that referred to him as an “enforcer” and a “right-hand man” for the president.
Cohen also brought up that Lewandowski previously worked for Rep. Bob Ney, R-Ohio, who was convicted in 2007 on corruption charges.
“You are now involved in this,” Cohen said. “Either you were willing to break the law for politics and Mr. Trump, or you’re some kind of a Forrest Gump relating to corruption.”
“Did the president pick you as his enforcer because he thought you would play whatever role you wanted, even if it was illegal? Is that possibly why he chose you to take this message to Sessions?” Cohen asked.
Lewandowski answered: “That would be a question for the president, Congressman.”
4. ‘Packaging’ and ‘Product’
Rep. Doug Collins, R-Ga., the committee’s ranking member, said the Russia story pushed by Democrats fell apart with delivery of the Mueller report. They then had to move on to other anti-Trump topics, in this case seeking impeachment for obstruction of justice.
“I’ve never seen a majority so amazed with packaging in all my life,” Collins said. “You know why? Because they can’t sell what’s inside. They can’t sell the product. So, they just keep packaging it differently.”
Aside from no impeachable offenses, Collins said, Democrats also don’t have math on their side.
“Here’s the problem: Seventeen members of the Judiciary Committee have said that they think the president ought to be impeached,” he said. “So, why are we still investigating it? The problem is, you don’t have the votes. You don’t have the numbers. Even if you got it out of this committee, you don’t have it on the floor. That’s your problem.”
The Georgia Republican said impeachment was a goal for many Democrats ever since Trump was elected.
“For most of them it happened in November of 2016, because they couldn’t believe that Donald Trump won, and they still can’t get over it today,” Collins said, adding:
It’s not investigating. It’s not doing oversight. This is certainly not being fair. But we like issuing subpoenas. We’re setting a world record at that—40 times faster than the previous chairman. We don’t want any answers, because we’re not willing to engage in dialogue to get information from folks.
– – –
Fred Lucas is the White House correspondent for The Daily Signal and co-host of “The Right Side of History” podcast. Lucas is also the author of “Tainted by Suspicion: The Secret Deals and Electoral Chaos of Disputed Presidential Elections.”
Photo “Corey Lewandoski” by CSPAN. | <urn:uuid:a267db4a-f547-42b3-9d8a-73462881065e> | CC-MAIN-2022-33 | https://themichiganstar.com/2019/09/18/four-key-moments-from-house-panels-first-impeachment-hearing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.966465 | 1,957 | 1.59375 | 2 |
Did you know that hackers launch a cyberattack every 39 seconds? This is something all businesses – large and small – should be concerned about. It’s not surprising that the landscape of cybersecurity has changed throughout 2020. The Covid pandemic has been particularly hard on security teams in 2020. Given the shift toward social distancing and remote work conditions for many sectors, cybersecurity has become a top priority. As companies look to transition to a new normal, here are the most common cybersecurity trends you should keep track of in 2021.
1. Ransomware threats will continue to grow
71% of breaches in 2020 are financially motivated, with 52% involving hands-on hacking, not autonomous malware. This means that cybercriminals might actively attempt to breach your servers and database in order to cause financial harm. Ransomware attacks that involve holding a business’ database hostage in exchange for some form of financial compensation have grown at an alarming rate, becoming a threat to thousands of organizations worldwide.
The best way to avoid these attacks going forward is to educate your team on how to treat email and files coming from unverified sources. A single mishandled file downloaded to your business’ intranet can cause critical damage to the business’ financial wellbeing.
2. Cloud threats are on the rise
As remote work and online collaboration intensified during the covid-19 pandemic, cloud adoption was key for enterprises to ensure business continuity. Even though businesses have been migrating to the cloud before the crisis, the pandemic accelerated the transition process. However, rapid cloud migration introduces various new security challenges and threats, including misconfigured cloud storage, reduced control and visibility, incomplete data deletion, and vulnerable cloud-apps. That is why protecting cloud infrastructures against cyber threats needs to be an urgent priority for every company going into 2021.
3. Phishing attacks will continue to evolve
With the shift away from on-premises operations and toward cloud-based services, security teams should be unsurprised at this prediction. Phishing has always been a popular cybercrime tactic, in fact, prior to the pandemic, phishing was one of the most common and effective cyberattacks.
But we saw a surge in phishing emails during the pandemic, taking advantage of victims’ unfamiliarity with remote work applications and the lack of cybersecurity knowledge. In fact, when this attack was combined with fear and the need for Covid-19 information, cybercriminals became even more successful in getting users to click on phishing emails containing Covid-19-related terms such as Coronavirus, Covid-19, Masks, Vaccine, among others.
4. A focus on AI-Powered Solutions
Advances in artificial intelligence (AI) are increasing our ability to detect threats more successfully than ever before. One of the biggest threats to cyber systems is the difficulty in updating and patching in real-time. As new threats become known to the hacker community, technology vendors need to produce repairs to potentially compromised systems rapidly.
These affected systems have often relied on their human counterparts to proceed with the necessary steps to rectify the weaknesses. However, with AI, smart enough networks are able to process their weak points and repair them in live time, leading to less downtime and less stress on IT teams. These solutions will slowly hit the market over the next few years, and this cybersecurity trend will continue to grow. Until then, a good security and maintenance plan for your IT department is necessary to ensure that critical systems remain updated with the latest security patches.
5. An increase in data privacy awareness
Businesses create, collect, and store a lot of data and these digital footprints are only getting bigger each year. Data is now one of the most valuable assets in the world. So, as the data that organizations create, collect, and store increases so does its attractiveness to endpoint hackers. Particularly, when they’re finding easier ways to access remote worker data through their less-protected home networks. That’s why businesses should implement a data protection policy that guides employees on how to keep personal data secure and ensure they have an effective endpoint, network, and email protection.
But that’s not all, according to the General Data Protection Regulation (GDPR), companies that process data, must do so according to seven protection and accountability principles outlined in Article 5.1-2:
Lawfulness, fairness, and transparency — Processing must be lawful, fair, and transparent to the data subject.
Purpose limitation — You must process data for the legitimate purposes specified explicitly to the data subject when you collected it.
Data minimization — You should collect and process only as much data as absolutely necessary for the purposes specified.
Accuracy — You must keep personal data accurate and up to date.
Storage limitation — You may only store personally identifying data for as long as necessary for the specified purpose.
Integrity and confidentiality — Processing must be done in such a way as to ensure appropriate security, integrity, and confidentiality.
Accountability — The data controller is responsible for being able to demonstrate GDPR compliance with all of these principles.
Cybersecurity threats will continue to evolve in 2021
Though cybersecurity trends may be temporary, they are a good sign of the future to come. As technology evolves, we will inevitably encounter a new set of challenges in the IT sector.
We see these trends as some of the most challenging cybersecurity issues businesses face and we encourage all businesses to continue to manage and educate teams on these issues.
When it comes to threats to your business, it’s always best to be one step ahead!
Get in touch!
We developed GetComplied to help companies comply with data protection laws and avoid sanctions. And the truth is… it’s easier than it looks! You can edit your policies, cookies, and user rights on one platform!
If you have any questions or problems, please do not hesitate to contact our team through social media or email: firstname.lastname@example.org
We also have a live chat that you can access on the site by clicking on the icon at the bottom right. | <urn:uuid:47f5fbb3-3d9e-4c2c-ad1e-a697982fa0d0> | CC-MAIN-2022-33 | https://blog.getcomplied.com/5-top-cybersecurity-trends-predictions-for-2021/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00265.warc.gz | en | 0.94449 | 1,256 | 2.015625 | 2 |
With your users dependent on constant network connectivity, a critical piece of your IT infrastructure is the ability to intelligently manage your network loads. Network load balancers let you distribute network traffic across several servers or network nodes. The point of load balancing is to spread the work around so that user requests can be processed faster. Load balancers can also come in handy if your business is distributed geographically, making sure that everyone has speedy access no matter where they are physically sitting.
What does a network load balancer look like?
Most load balancers are a dedicated device, which you plug in to your network. They are usually application agnostic. Because they sit outside of your application servers, they act as a sort of proxy server that then routes client requests to the appropriate physical server for processing. If you are using TCP/IP, your load balancer operates across WAN, if you’re using HTTP, it works across several Web servers providing the same service, and so on.
Load balancing requires a server cluster, two or more servers that operate as a single unit. The server cluster ensures high availability as well as fault tolerance. Because load balancing involves multiple servers, load balancer devices usually include failover and backup features to accommodate system failures. Some also include cool bells and whistles like firewall and network intrusion prevention, too.
What’s the difference between software and hardware load balancers?
While both can be effective, hardware load balancers tend to be richer in features and better at scaling. Plus, hardware load balancers generally come with a service contract, so there is a neck other than your own to choke should something go wrong. However, if the load you are balancing is light and your budget is pretty bare bones, a software load balancer may do the trick.
How does a basic load balancing transaction go down?
In the most basic case, which of course looks nothing like your network, load balancing works something like this:
A user tries to access a service and contacts your load balancer.
Your load balancer decides which server should handle the request and changes the destination IP to match the IP address of this server.
The server accepts the connection and sends back a response to the user via the load balancer.
The load balancer does the work of switching the destination IP back to the virtual IP originally typed in by the user and passes along the response to the user.
The user receives the response, none the wiser that her request was dealt with by some interloper, and continues along happily with her work.
So, from the user’s perspective, she is sending and receiving requests from the same server.
How does a load balancer figure out where to send the request?
Once your load balancer receives a request, how does it decide which server to send it to? Usually, your load balancer employs some sort of balancing algorithm, a formula it uses to determine which server is best suited for the job.
One common algorithm is called round robin. In its simplest permutation, this algorithm uses a prioritized list of available servers. Say your server cluster contains four servers. The first client request goes to the first server, the next one to the second, and so on until you cycle back around to the first server. Another common algorithm is the least number of connections algorithm, where the load balancer keeps a tally of how many active connections each server has and sends the request to the server with the fewest connections.
In addition to using algorithms, your load balancer also keeps a running tab on the health of the server pool, because there’s no point in sending a request to a server that is offline.
What features am I looking for?
Maybe it goes without saying, but here are some of the major features you should be evaluating in your load balancer:
Available load balancing algorithms
Ability to prioritize traffic by type
Support for multiple IP addresses
Quality of Service (QoS) for applications
Tips and hints
When configuring your network to use load balancing, keep in mind a few basic tips:
If your load balancer does not include firewall features, make sure your application and servers are secure and that the load balancer itself can’t be accessed by outsiders
Confirm that your load balancer is logging activities so that you can troubleshoot issues should, heaven forbid, any problems arise
If you are load balancing for an application that makes calls to other servers, configure persistent sessions so that the session stays alive no matter which server is handling the request
Spiceworks Networking Group Join this group to hear all about everything related to networking
Network load balancing by Robert I
Web Filtering/Load Balancing by GBrunson
Need recommendation for a Dual Wan load balancing by SlipStreams7 | <urn:uuid:9196759b-5716-4964-91f3-50f708983a53> | CC-MAIN-2022-33 | https://community.spiceworks.com/networking/articles/2474-it-in-a-nutshell-network-load-balancers | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.930971 | 1,003 | 3.078125 | 3 |
The serving size for both the chili and the macaroni and cheese is 1 cup. The chili contains 2 servings per can, and the box of prepared macaroni and cheese makes 3 servings. Compare a “serving” with how much you eat. You may eat more or less than the listed serving size.
How many calories are in a whole can of chili? (520 calories)
How many calories are in a whole prepared box of macaroni and cheese? (1,200 calories)
These numbers show how many calories are in one serving of food and how many of those calories are from fat.
Which of the foods has fewer calories per cup? (Chili)
Which has fewer calories from fat? (Chili)
Daily Values (DV) are the recommended intakes of specific nutrients for adults. The guide at the bottom of the Nutrition Facts Label shows Daily Values for a 2,000-calorie diet and a 2,500-calorie diet. These guides are general dietary advice.
The % Daily Value (% DV) indicates how much of the daily value you get in a serving of food. The % Daily Value is based on the 2,000-calorie diet, which may be more or less than your family members need. For example, if the label lists 8% for calcium (like the chili label), it means one serving provides 8 percent of the calcium you need each day.
Which food has less sodium per serving? (Macaroni and cheese)
Is macaroni and cheese low in sodium? (No. it would need to have 5% of the Daily Value or less. It has 24% of the Daily Value.)
Which food has more iron per serving? (Chili)
Is a serving of chili an excellent source of dietary fiber? (Yes, because it contains 40% of the Daily Value for dietary fiber.)
Ingredients are listed in order, by weight, from the most to the least amount in the product. For example, the first three ingredients in the chili are water, beef and beans. The ingredients in the macaroni and cheese mix are enriched macaroni product (wheat flour, niacin, ferrous sulfate (iron), thiamin mononitrate (vitamin B1), riboflavin (vitamin B2), folic acid) and cheese sauce mix (sub-ingredients listed).
A list of common allergens is also listed. For the macaroni and cheese, wheat and milk are listed. The chili contains soy and wheat. | <urn:uuid:72e9f585-fac8-4619-8e86-d12fc212bfb1> | CC-MAIN-2022-33 | https://nvsnap-ed.org/xga_accorr_cat/using-the-nutrition-facts-label/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.937173 | 528 | 2.203125 | 2 |
Posted: January 26th, 2016
Ethics and the IT Auditor:
Jill Mathews, an IT audit senior for a global insurance company, was recently asked to perform an IT audit of the company’s new cloud computing and virtualization migration plan. Her Manager asks that she perform the audit in the next four weeks. She is not familiar with these new technologies, and is worried about being able to complete the requirements of this audit. What are the ethical considerations and requirements Jill should consider?
Audit Standards – Independence:
The IT Audit Director is responsible for monitoring the weekly security access control report and can instruct the security administration team to make access related changes to user IDs and profiles based on her risk analysis. Explain why this is or is not an appropriately designed control procedure.
HINT: Think critically about the audit profession’s professional standards regarding independence.
Place an order in 3 easy steps. Takes less than 5 mins. | <urn:uuid:160bc838-35cc-4e48-a086-deb1f1730e27> | CC-MAIN-2022-33 | https://www.thecollegepapers.com/the-it-audit-director-is-responsible-for-monitoring-the-weekly-security-access-control-report-and-can-instruct-the-security-administration-team-to-make-access-related-changes-to-user-ids-and-profiles/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.947689 | 193 | 2.5 | 2 |
Diarrheal diseases are a leading cause of death for young children, accounting for nine percent of all deaths worldwide in children under five years of age, with most occurring in children under two years of age. Now, researchers at the University of Maryland School of Medicine (UMSOM) found that even milder cases of diarrheal diseases can lead to death in young children.
This research, the latest report from the Global Enteric Multicenter Study (GEMS), published in Lancet Global Health, “provides a strong rationale for vigorously acting to prevent or to treat all cases of diarrheal illness, regardless of severity,” according to Myron M. Levine, MD, DTPH, the Simon and Bessie Grollman Distinguished Professor and Associate Dean for Global Health, Vaccinology and Infectious Diseases. Dr. Levine, who served as the overall coordinating investigator for GEMS research, led a large international consortium of investigators from North America, Europe, sub-Saharan Africa, South Asia and Australia.
“Our international team of investigators showed that for the individual child moderate-to-severe diarrheal illness posed a significantly greater risk of death than less-severe diarrhea. However, in the overall pediatric populations in which our team worked, more total deaths derive from less-severe cases of diarrhea because they are more than three times more common than moderate-to-severe cases,” said Dr. Levine.
Since many of the deaths occurred more than 14 to 21 days after the children were enrolled in the study, Dr. Levine suggests that where resources and logistics make it feasible active follow-up visits and interventions for all cases of diarrhea could help reduce fatalities.
GEMS, funded by the Bill & Melinda Gates Foundation, is the largest, most comprehensive study of childhood diarrheal diseases ever conducted in developing country settings. The study, under the direction of Karen Kotloff, MD, Professor of Pediatrics at UMSOM and the Principal Investigator for Clinical and Epidemiological Research in GEMS, enrolled 22,568 children under five years of age in developing country settings including The Gambia, Kenya, Mali, Mozambique, Bangladesh, India and Pakistan. Dr. Kotloff, previously reported that children who were stunted at baseline (a sign of malnutrition) were significantly more likely to die during the two to three months following their GEMS diarrheal illness. The additional adverse nutritional consequences (stunting) that followed GEMS diarrhea cases may further increase the risk of severe or fatal outcomes.
Dr. Kotloff noted that the Lancet Global Health report showed that the risk of death from diarrheal illness was greater among young children in the four GEMS sites in sub-Saharan Africa than in the three sites in South Asia. She further noted that at the one site in Asia (Pakistan) where the risk of death following diarrhea was higher than at the other two Asian sites (India and Bangladesh), the Pakistani children were significantly more malnourished at baseline, providing further proof that malnutrition unfavorably affects the outcome of diarrheal illness.
Leading cause of death in young children
Globally, diarrheal diseases are the second leading cause of death among children under five years after the newborn period, despite the existence of effective treatments such as oral rehydration solutions (ORS) and zinc supplements and preventions such as rotavirus vaccines. This amounts to more than half a million deaths each year globally. Although many different bacteria, viruses and protozoal pathogens cause diarrheal disease, this recent report from GEMS shows that a relatively small number of pathogens were associated with a significantly increased risk of death, including three different categories of diarrhea-causing Escherichia coli, Shigella, Aeromonas, and two protozoans (Cryptosporidium and Entameba histolytica).
Among these pathogens, Shigella can cause both dysenteric (gross blood in diarrheal stools) and non-dysenteric clinical forms of moderate-to-severe diarrhea. Whereas dysentery is an indication for treatment with anti-Shigella antibiotics, non-dysenteric diarrhea is not typically treated with antibiotics. Thus, it was of particular interest to observe that Shigella not only significantly increased the risk of death in children with non-dysenteric moderate-to-severe diarrhea, but it was also quite common when detected by highly sensitive molecular diagnostic techniques.
“CVD’s GEMS research provides important data showing the need to better prevent and treat diarrheal illness. Over the past decade we’ve seen a decline in child mortality linked to diarrheal illness, but certainly more needs to be done,” said Kathleen Neuzil, MD, MPH, the Myron M. Levine Professor in Vaccinology, Professor of Medicine and Pediatrics and Director of the Center for Vaccine Development and Global Health (CVD).
The research is designed to help set a path for better prevention and treatment of diarrheal illness in children.
This research underscores our commitment to take on the most challenging illnesses for the world’s vulnerable populations. Our Global Enteric Multicenter Study research continues to serve as a key guide for policy makers as they move toward preventing child mortality and designing the best interventions for children suffering from diarrheal illness.”
Dean E. Albert Reece, Executive Vice President for Medical Affairs, UM Baltimore, and the John Z. and Akiko K. Bowers Distinguished Professor, University of Maryland School of Medicine | <urn:uuid:f55c64e9-c7d4-4d00-a222-9d56f91e287b> | CC-MAIN-2022-33 | https://familiesdaily.com/childrens-health/umsom-research-shows-even-milder-cases-of-diarrheal-diseases-can-lead-to-child-mortality/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.94861 | 1,144 | 3.21875 | 3 |
Economic Freedom of North America 2021
Economic Freedom of North America 2021 is the seventeenth edition of the Fraser Institute’s annual report. This year it measures the extent to which—in 2019, the year with the most recent available comprehensive data—the policies of individual provinces and states were supportive of economic freedom, the ability of individuals to act in the economic sphere free of undue restrictions. There are two indices: one that examines provincial/state and municipal/local governments only and another that includes federal governments as well. The former, our subnational index, is for comparison of individual jurisdictions within the same country. The latter, our all-government index, is for comparison of jurisdictions in different countries.
For the subnational index, Economic Freedom of North America employs 10 variables for the 92 provincial/state governments in Canada, the United States, and Mexico in three areas: 1. Government Spending; 2. Taxes; and 3. Labor Market Regulation. In the case of the all-government index, we incorporate three additional areas at the federal level from Economic Freedom of the World (EFW): 4. Legal Systems and Property Rights; 5. Sound Money; and 6. Freedom to Trade Internationally; and we expand Area 1 to include government investment (variable 1C in EFW), Area 2 to include top marginal income and payroll tax rate (variable 1Dii in EFW), and Area 3 to include credit market regulation and business regulations (also at the federal level). These additions help capture restrictions on economic freedom that are difficult to measure at the provincial/state and municipal/local level.
Since the most recent data available for the report are from 2019, they do not capture the effect on economic freedom of COVID-19 and government responses to it.
Results for Canada, the United States, and Mexico
The all-government index
The all-government index includes data from Economic Freedom of the World (Gwartney, Lawson, Hall, and Murphy, 2021). These data, available only on the national level, enable better comparisons among Canadian, Mexican, and US subnational jurisdictions that take into account national policies affecting all jurisdictions within each country. Canada and the United States have similar scores in the EFW report; both are typically among the top 10 nations, though Canada fell out of the top 10 this year. Mexico ranks much lower, at 75th this year; this is an improvement over past years.
The top jurisdiction is New Hampshire at 8.23, followed by Florida (8.17), Idaho (8.16), and then South Carolina, Utah, and Wyoming tied for fourth (8.15). Alberta is the highest ranking Canadian province, tied for 33rd place with a score of 8.00. The next highest Canadian province is British Columbia in 47th at 7.91. Alberta had spent seven years at the top of the index but fell out of the top spot in the 2018 report (reflecting 2016 data).
The highest-ranked Mexican state is Baja California with 6.65, followed by Nayarit (6.62), Tlaxcala (6.61), then Jalisco and Chihuahua (tied at 6.60). They are nearly a full point behind those ranking lowest in Canada and the United States, although that gap has been shrinking. The lowest-ranked state is Ciudad de México at 5.63, followed Colima at 5.93 and Tamaulipas at 6.16.
Seven of the Canadian provinces are ranked behind all 50 US states. Prince Edward Island is 60th with a score of 7.58, followed closely by the province of Newfoundland & Labrador (7.60), Nova Scotia (7.61), and New Brunswick (7.62). The lowest ranked of the United States are New York (51st, 7.85), Rhode Island (50th, 7.87), and Hawaii (49th, 7.88).
Historically, average economic freedom in all three countries peaked in 2004 at 7.74 then fell steadily to 7.24 in 2011. Canadian provinces saw the smallest decline, only 0.19, whereas the decline in the United States was 0.51 and, in Mexico, 0.58. Since then average economic freedom in North America has risen slowly to 7.43 but still remains below that peak in 2004. However, economic freedom has increased in the United States and Mexico since 2013. In contrast, in Canada, after an increase in 2014, it has fallen back below its 2013 level.
The subnational indices
For the purpose of comparing jurisdictions within the same country, the subnational indices are the appropriate choice. There is a separate subnational index for each country. In Canada, the most economically free province in 2019 was again Alberta with 6.17, followed by British Columbia with 5.44, and Ontario at 5.31. However, the gap between Alberta and second-place British Columbia continues to shrink, down from 2.30 points in 2014 to 0.73 in 2019. The least free by far was Quebec at 2.83, following New Brunswick at 4.09, and Prince Edward Island and Nova Scotia at 4.20.
In the United States, the most economically free state was New Hampshire at 7.83, followed closely by Tennessee at 7.82, Florida at 7.78, Texas at 7.75, and Virginia at 7.59. (Note that since the indexes were calculated separately for each country, the numeric scores on the subnational indices are not directly comparable across countries.) The least-free state was New York at 4.33, following California at 4.68, Vermont at 4.86, West Virginia at 5.00, and New Mexico at 5.01.
In Mexico, the most economically free state was Baja California at 6.01. Michoacán de Ocampo was second at 5.87, followed by Jalisco at 6.01. The least free Mexican states were Campeche at 2.53, Zacatecas at 2.89, and Tabasco at 2.93.
In addition to the tables found in chapter 3, our new interactive website at www.freetheworld.com contains all the latest scores and rankings for each of the components of the index as well as historical data on the overall and area scores. The full dataset is also available for download at that same website.
Economic freedom and economic well-being at the subnational level
The jurisdictions in the least economically free quartile (one fourth) on the all-government index had, in 2019, an average per-capita income of just US$2,362, compared to US$51,666 for the most economically free quartile. On the subnational index, the same relationship holds, with the least-free quartile having an average per-capita income 1.0% below the national average, while the most-free quartile was over 7.5% above it.
In addition, economic freedom at the subnational level has generally been found to be positively associated with a variety of measures of the per-capita size of the economy and the growth of the economy as well as various measures of entrepreneurial activity. There are now more than 330 articles by independent researchers examining subnational economic freedom using the data from Economic Freedom of North America. (Appendix C lists some of the most recent ones.) Much of that literature discusses economic growth or entrepreneurship but the list also includes studies of a variety of topics such as income inequality, eminent domain, and labor markets. The vast majority of the results correlate higher levels of economic freedom with positive outcomes, such as economic growth, lower unemployment, reduced poverty, and so on. The results of these studies tend to mirror those found for these same relationships at the country level using the index published in Economic Freedom of the World.
Data available to researchers
The full data set, including all of the data published in this report as well as data omitted due to limited space, can be downloaded for free at <https://www.fraserinstitute.org/economic-freedom/dataset>. The data file available there contains the most up-to-date and accurate data for the index published in Economic Freedom of North America. All editions of the report are available in PDF and can be downloaded for free at <www.fraserinstitute.org/studies/economic-freedom>. However, users are always strongly encouraged to use the data from the most recent data file as updates and corrections, even to earlier years’ data, do occur.
More from this study
Subscribe to the Fraser Institute
Get the latest news from the Fraser Institute on the latest research studies, news and events. | <urn:uuid:65f7a619-7551-4bc9-8433-f75b62e5f98e> | CC-MAIN-2022-33 | https://www.fraserinstitute.org/studies/economic-freedom-of-north-america-2021 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.936788 | 1,792 | 2.28125 | 2 |
Shortage of MDs Expected in Most States
Almost all states will have a shortage of primary care physicians by 2020, according to a report released on Wednesday by the American Academy of Family Physicians, the AP/Albany Times-Union reports. According to the report, the U.S. will require 39% more primacy care physicians over the next 14 years to meet increased demand.
Population growth and an increased number of elderly patients in states such as Nevada, Arizona, Florida, Texas and Idaho have increased demand for primary care physicians, Perry Pugno of AAFP said.
Between 1997 and 2005, the number of medical school graduates who enter the primary care field decreased by more than half as more graduates enter specialties with higher pay and more control over work hours, the report finds.
Pugno said, "As Americans age, they need more health care interventions, and primary care is the most cost-effective way to help them maintain their health" (Johnson, AP/Albany Times-Union, 9/27).
According to AAFP President Larry Fields, the expected shortage of primary care physicians likely will prompt some to close their practices to new patients. As a result, patients will have to travel farther to find physicians or might not be able to find a primary care physician at all, Fields said. He added, "People will have a harder and harder time finding the most precious commodity in medicine, a personal medical home."
In response to the expected shortage, AAFP recommends efforts to train more primary care physicians, increased pay and reforms to medical liability law (Ritter, AP/Chicago Sun-Times, 9/27). | <urn:uuid:5f85c952-b083-4b71-8d75-79ac0de1ed58> | CC-MAIN-2022-33 | https://californiahealthline.org/morning-breakout/shortage-of-mds-expected-in-most-states/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.957935 | 338 | 2.34375 | 2 |
Critical Access Hospitals in Rural Areas Lag in Care Quality, Study Says
Critical access hospitals serving rural communities had higher mortality rates and provided lower quality care than non-critical access hospitals, according to a study published in the Journal of the American Medical Association, Modern Healthcare reports (Barr, Modern Healthcare, 7/5).
For the study, Harvard School of Public Health researchers analyzed 2008-2009 data from Medicare, the American Hospital Association and the Hospital Quality Alliance for 4,800 hospitals.
About 1,268 facilities were designated as critical access facilities. These hospitals had a maximum of 25 acute care beds and were located more than 35 miles from the nearest full-service hospital.
The study found a higher 30-day mortality rate for critical access hospitals than for non-critical access hospitals for patients with acute myocardial infarction, congestive heart failure and pneumonia.
Respectively, the mortality rates for critical access hospitals and non-critical access facilities were:
- 23.5% and 16.2% for acute myocardial infarction;
- 13.4% and 10.9% for heart failure; and
- 14.1% and 12.1% for pneumonia.
Researchers also found that critical access facilities were less likely to have basic electronic health records, cardiac catheterization capabilities and intensive care units (Preidt, HealthDay, 7/5).
According to the study's authors, although accepting Medicare patients has improved the financial health of critical access facilities, the findings suggest that efforts to improve access to care "have been insufficient in ensuring high-quality care" (Modern Healthcare, 7/5).
They wrote that the findings highlight a need for more focused efforts to improve care quality at rural facilities "so that all individuals in the United States have access to high-quality inpatient care regardless of where they live" (HealthDay, 7/5).This is part of the California Healthline Daily Edition, a summary of health policy coverage from major news organizations. Sign up for an email subscription. | <urn:uuid:c0ff434a-c380-44f6-9931-063ea85488fa> | CC-MAIN-2022-33 | https://californiahealthline.org/morning-breakout/critical-access-hospitals-in-rural-areas-lag-in-care-quality-study-says/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.936352 | 428 | 2.1875 | 2 |
First, a very quick intro. I'm Steve Kalman, CEH, CHFI and CISSP instructor. I also consult. I've been in online forums since the early days of Compuserve. I plan to be a regular reader and infrequent poster here as I get ready to add wireless certs to my courseload.
Second, the question that brought me here.
I need to supply an "at your own risk" splash page that users in a public area must OK before going on to the internet. Does anyone have any suggestions for me? This is for a community center that will not be generating revenue (Internet access for community members as a courtesy).
Here is a link to a thread that may help you.
Here is an inexpensive product. I have never used it, so at your own risk.
Welcome to the forums!
If you're looking for a, "how can I do this?" kind of thing, then you should look at products that have captive portal functionality like the Symbol WS-2000, Bluesocket WG-400, Airespace 2000, and others. If you're looking for the verbiage for such a splash page, I suggest you visit a few of your favority coffee shops and take a look at theirs. :-)
I'm beginning to think you don't like my suggestions. :) The symbol is just a switch, so the AP is still needed. Spending twice or three times the price just seems a bit overkill in a simple public access environment.
Don't worry Devin, I'm not taking it personally. :)
hehehe. Sorry Gene, I didn't read your post thoroughly - I just glanced at it and thought I'd throw in my $0.02. :-)
If you have some old hardware available, I know some folks that have used ZoneCD. I was planning to do some testing on it. Check it out.
I want to be CEH certified, but i dont know how to do it ( as i m beginner ).So if somebody could help me out how else can i study and get CEH? Please help me out, i shall b really thankful to you for replying.
Well, this forum is about wireless networking and has very little to do with penetration testing. You'd be better off searching for CEH specific forums and study groups. Even then, start a new thread instead of picking up a decade old one.
If you really are a beginner, CEH shouldn't be your first goal. I don't mean that you need to pay for the certifications, but study first CompTIA Security+, Network+ and Linux+. I'd say you'll need more Linux skills, so Linux Foundation's LFCS or RedHat's RHCSA would be on my list as well. After those you should go through the tools in Kali Linux to see what they do and how they do it. After all that you are better prepared to study for CEH. | <urn:uuid:0966a696-1280-4a28-84d5-35d133a922cc> | CC-MAIN-2022-33 | https://www.cwnp.com/forums/posts?postNum=298537 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.953168 | 722 | 1.515625 | 2 |
Thursday 18 March 2021 11:34am
The prevalence of teenage depression in New Zealand has more than doubled since the 1980s, a new University of Otago-led study reveals.
The researchers used a unique two generation study involving 612 children born to 375 members of the Dunedin Multidisciplinary Health and Development Study (known as the Dunedin Study) to investigate mental health problems in both generations.
The study shows that 15-year-olds today are 2.5 times more likely to suffer from depression than their parents were at that age. Children of parents with early onset and persistent depression were found to be more than four times likely to be depressed at age 15 when compared with children whose parents had never been depressed. Children whose parents had only one episode of depression during their lives did not seem to be at greater risk.
Co-author Professor Bob Hancox, of the University’s Department of Preventive and Social Medicine says that the evidence of a rise in mental health problems from the Dunedin study is particularly convincing because both generations were assessed at the same age using the same questionnaires.
“The rise in the prevalence of depression has major consequences for the current generation of young people, but our findings also suggest that it could also affect the mental health of their children and subsequent generations.”
The study shows that more work needs to be done on the causes and prevention of depression in young people and provides further evidence of an increase in mental health problems and psychological distress among young people worldwide, as documented in a report by Menzies and colleagues from Koi Tū in September 2020.
“It is of further concern that the mental health and addiction inquiry, He Ara Oranga, found that our mental healthcare system is struggling to meet people’s needs. This research was conducted before the COVID-19 pandemic and it is likely that young people’s mental health problems are even worse now,” he says.
“This is everyone’s responsibility. Governments need to fund research and follow the science. Health professionals, parents, teachers and everyone else need to be alert to the struggles that some young people are having.
“The finding that children of parents with early onset or persistent depression were more likely to be depressed suggests that effective support and treatment of those with depression would not only reduce the burden of suffering experienced by the individuals, but could also improve the well-being of future generations.”
The study was undertaken by Professor Hancox, Associate Professor Joanne Baxter, Dr Judith Sligo, Dr Helena McAnally and Aroha Bolton, all of the University of Otago and Professor Sara Jaffee, of the University of Pennsylvania.
Early-onset and recurrent depression in parents increases risk of intergenerational transmission to adolescent offspring
Journal of Child Psychology and Psychiatry | <urn:uuid:2b9aaa3a-1b8c-4762-87f8-17b63142c8d1> | CC-MAIN-2022-33 | https://www.otago.ac.nz/study-public-health/news/archive/otago825500.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.971113 | 584 | 2.4375 | 2 |
This chapter provides a non-technical overview of ‘closed population capture–recapture’ models, a class of well-established models that are widely applied in ecology, such as removal sampling, covariate models, and distance sampling. These methods are regularly adopted for studies of reptiles, in order to estimate abundance from counts of marked individuals while accounting for imperfect detection. Thus, the chapter describes some classic closed population models for estimating abundance, with considerations for some recent extensions that provide a spatial context for the estimation of abundance, and therefore density. Finally, the chapter suggests some software for use in data analysis, such as the Windows-based program MARK, and provides an example of estimating abundance and density of reptiles using an artificial cover object survey of Slow Worms (Anguis fragilis).
|Publication type||Book chapter|
|Publication Subtype||Book Chapter|
|Publisher||Oxford University Press|
|Contributing office(s)||Patuxent Wildlife Research Center|
|Larger Work Type||Book|
|Larger Work Title||Reptile ecology and conservation: A handbook of techniques|
|Google Analytic Metrics||Metrics page| | <urn:uuid:5bec472e-a9e6-4c9e-a2cf-88895d367e05> | CC-MAIN-2022-33 | https://pubs.er.usgs.gov/publication/70196351 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.785858 | 323 | 3.328125 | 3 |
(Tap footnote number to read it; tap up arrow (↑) to scroll back up to verse. Old Testament quotations/allusions are underlined.)
- Then Jesus was led up into the wilderness by the Spirit to be tempted by the Accuser.(1)“Accuser” The Greek word used here is “διάβολος” (diabolos), and it’s the root of our English word “devil”. Much like “Christ” (see note on Matt 1:1) “devil” isn’t a name but a descriptive title.
- And having fasted(3)“fasting” doesn’t always refer to a complete denial of food. Long fasts were often done with little or unpleasant food. Jesus might not have forgone food and drink entirely, but rather was living on little or unpleasant food. forty days and forty nights, He was hungry afterwards.
- And having approached, the one who tempts told Him; “If you are God’s Son, command these stones so they become bread.
- But answering, He said; “It is *written: Man shall not live on bread alone, but on every spoken word(2)“spoken word” the Greek word here refers only to words that are spoken, never to words that are written. proceeding from God’s mouth.”(4)quotation/allusion to Deuteronomy 8:3
- Then, the Accuser takes Him to the holy city and stood Him on the pinnacle of the Temple.
- And he tells Him; “If you are God’s Son, throw yourself down. For it is *written: “He will give orders to His angels concerning you.”(5)quotation/allusion to Psalm 91:11 Also, “They will raise you up on their hands, so you don’t stumble when your foot struck against a stone.”(6)quotation/allusion to Psalm 91:12
- Jesus was declaring to him; “Again, it is *written: you shall not test the Lord your God.”(7)quotation/allusion to Deuteronomy 6:16
- Again, the Accuser takes Him to a very high mountain and shows Him all the kingdoms of the world and their glory.
- And he told Him; “I will give you all these things if, having bowed down, you worshiped me.”
- Then Jesus tells him; “Depart Satan! For it is *written: You shall worship the Lord your God, and you shall serve Him alone.”(8)quotation/allusion to Deuteronomy 6:13
- Then the Accuser leaves, and behold; angels came and were serving Him.
- Now, because he heard that John was arrested, He went back into Galilee.
- And having left Nazareth, He came and settled down in Capernaum by the sea in the region of Zebulun and Naphtali,
- so the word which was spoken by Isaiah the Prophet might be fulfilled, saying;
- “Land of Zebulun and land of Naphtali. The way of the sea across the Jordan; Galilee of the Gentiles.
- “The people who sit in darkness saw a great light. And to the men who sat in the land and shadow of death, a light rose on them.”(9)quotation/allusion to Isaiah 9:1-2
Jesus Begins Teaching and Healing
- From that time on, Jesus began to proclaim and say; “Repent!(10)“Repent” this Greek word doesn’t speak of remorse or guilt for wrong actions. Rather, it literally means to “think differently after” or to “reconsider”, with an assumed change in behavior. To both the Hebrews and 1st century Greeks/Romans, a change in mind was synonymous with a change in behavior; you couldn’t have the first without the second. All that meaning is captured by a single Greek word here. or the kingdom of the heavens has drawn near.”
- Now, He saw two brothers while walking beside the Sea of Galilee: Simon who is called Peter, and Andrew his brother. They were casting a net into the sea, for they were fishermen.
- And He tells them; “Come! Follow Me and I will make you fishers of men.”
- And immediately dropping the nets, they followed Him.
- And having gone forward from there, He saw others. Two brothers – James the son of Zebedee and John his brother – were in a boat with Zebedee their father adjusting their nets. And He called them.
- And having immediately left the boat and their father, they followed Him.
- Further, He was going through all Galilee; teaching in their synagogues, proclaiming the good news of the kingdom, and healing every chronic disease and sickness in the people.
- Now, the news about Him went out into all of Syria and they brought Him all the sick: those having various chronic diseases, and persisting torments, and being demon possessed, and having seizures, and paralytics, and He cured them.
- Further, many crowds followed Him from Galilee, and Decapolis, and Jerusalem, and Judea, and beyond the Jordan.
Next: Matthew Chapter 5
Previous: Matthew Chapter 3
Up: BOS Bible Index
Note: If you think a word, phrase, or passage could be better translated - or is wrong - then Please Say Something. This is an open source Bible that's accountable to all Christians. See this link for details.
Legal Use: Please feel free to quote the BOS Bible, but follow the guidelines on the Legal Use page when doing so. They are easy and mostly common sense. | <urn:uuid:aaabac2b-e973-4657-9f9d-20ac56bc6940> | CC-MAIN-2022-33 | https://www.bosbible.com/matthew-chapter-4/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.960473 | 1,278 | 2.90625 | 3 |
South Korean President-elect Yoon Suk-yeol and U.S. President Joseph Biden will hold their first summit meeting in Seoul on May 21. The incoming Yoon administration is expected to take a more active role in the Indo-Pacific region, working together with Washington and other like-minded U.S. allies and partners in the region. What are the prospects and challenges facing the Yoon administration as it seeks to strengthen bilateral and multilateral relationships in the Indo-Pacific? How do different regional players, including the Quad countries, perceive South Korea’s role as a potential Indo-Pacific partner? How will other regional actors such as ASEAN or China respond to South Korea’s more robust foreign policy in the Indo-Pacific?
On May 18, the Center for East Asia Policy Studies at Brookings will host a webinar featuring regional experts for a discussion of what South Korean foreign policy in the Indo-Pacific may look like under new leadership.
Viewers can submit questions via e-mail to [email protected] or via Twitter at #ROKIndoPac.
Reshared from www.brookings.edu
Source: Read More | <urn:uuid:3dfca203-6912-4246-a7de-d68db5102605> | CC-MAIN-2022-33 | https://techchained.com/index.php/2022/05/05/south-koreas-role-in-the-indo-pacific-opportunities-and-challenges-under-the-yoon-administration/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.918904 | 238 | 1.804688 | 2 |
World Bulletin / News Desk
South Korea is preparing to take international legal action against Beijing, according to a government statement Sunday – after a series of Chinese moves apparently aimed at dissuading Seoul from deploying an American anti-missile system, THAAD (Terminal High Altitude Area Defense).
China was condemned by both sides of Seoul’s political aisle after last Thursday’s order to stop major travel agencies from selling packages to South Korea, while Beijing’s official media recently suggested bilateral ties could be cut altogether.
The South’s acting President Hwang Kyo-ahn insisted Friday the THAAD deployment will go ahead as planned, which means the system could be in place as soon as May despite Chinese concerns that it could be abused by Washington as a spying tool.
Seoul is facing the prospect of losing billions of dollars in tourism revenue in addition to Chinese pressure on South Korean firms and growing reports of boycotting popular goods and entertainment products.
South Korean Trade Minister Joo Hyung-hwan said Sunday the government “will seek international legal action against possible violations of the World Trade Organization and the Seoul-Beijing free trade agreement.”
“The South Korean government is keeping close tabs on retaliatory measures taken by the Chinese authorities and (will) deal with any discrimination or damages that South Korean companies are suffering from,” read Joo’s statement carried by local news agency Yonhap.
Seoul’s embassy in China revealed Saturday it had set up a team to help support individuals and companies that might be hurt by Beijing’s anti-THAAD moves.Güncelleme Tarihi: 05 Mart 2017, 14:34 | <urn:uuid:f53c195e-489a-4f27-acca-45fc3727f55d> | CC-MAIN-2022-33 | https://worldbulletin.dunyabulteni.net/asia-pacific/skorea-to-seek-legal-action-against-china-h185792.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.941401 | 352 | 1.8125 | 2 |
A guest post by April Fuller and Laurel Bassett
In her early eighteenth-century recipe, “A Drink for the Gout,” Mary Kettilby’s list of ingredients contain both homegrown roots and objects of empire “pressed into service” for the recovery of the English subject against “Sharp Humours that occasion that dismal Tormenting Distemper.”1 The availability of spices, in quantity and at more affordable prices in the eighteenth-century, made it possible for men and women up and down the social ladder to take familiar English recipes and add an international twist. Even small village groceries would offer “customers a choice of at least half a dozen types of tea, three types of coffee, various types and qualities of tobacco products, several types of sugar, orange peel, confectionery, chocolate and an assortment of spices that included nutmeg, Jamaica pepper, cinnamon, allspice, ground ginger and black pepper.”2 Cures for gout seem to require a stop in all ports of call, yet housewives only had to walk to their local shopkeepers to acquire the ingredients.
In Kettilby’s gout recipe, we find, direct from the English garden (though “candi’d” with plantation sugar) eryngo root and Angelica-root. Imported from Asia, China root and Sweet flag are added to the brew. American Sarsaparilla, via Spanish-controlled areas in Central and South America, join raisons in the pot—raisons, which came courtesy of the triangular trade. Finally, a hybrid ingredient rears its head (or it would, if all the bits were still attached): harts-horn was often made as complete horns were imported and then shaved in England. Together, the ingredients are steeped in small ale for two weeks, then the sufferer is advised to “drink of it constantly.”
Those who consumed remedies for ailments from books such as Kettilby’s implicated themselves in the British imperial project. As Sydney Mintz argues, “when unfamiliar substances are taken up by new users, they enter into pre-existing social and psychological contexts and acquire—or are given—contextual meanings by those who use them.”3 Consumption and suffering carry much social and political weight that people tried to mystify through culinary wonder.
In her recipe, “For the Gout,” Kettilby describes her concoctions as a miracle antidote: “This alone, without any other Medicine, made a perfect Cure in a Person that had been many Year most grievously afflicted; and is effective in the Scurvy, or Rheumatick Pains.” (p.141) Nothing else could cure gout, she implies, and on top of this, her medicine could cure scurvy and rheumatic pains. The “cure,” though, is a placebo effect, or the patients’ belief in the treatment and exotic goods.
By the early 1700s, Britain was importing a range of raw materials, refining them and then exporting them. This even includes items like hartshorn, which one might expect to be utterly homegrown, but portbooks and account books show evidence of the actual deer horn as an import, that was sent to be shaven in England.4 There was also significant experimentation with growing spices on plantations in the West Indies and American colonies, in an attempt to domesticate the exotic. On the homefront, Kettilby does something that takes these physical acts of possession and transformation and brings them into the minds of her readers as “incomparable” cures.
Mary Kettilby’s receipts were widely reproduced by women who kept commonplace books or submitted her receipts to other published cookbooks throughout the eighteenth century. Kettilby herself asserts in her preface: “I can assure you, that a Number of very Curious and Delicate House-wives Clubb’d to furnish out this Collection, for the Service of Young and Unexperienc’d Dames, who may from hence be Instructed in the Polite Management of their Kitchins, and the Art of Adorning their Tables with Splendid Frugality.” (leaf A7r) She insinuates that this collection was created and passed down by “a Number of very Curious and Delicate House-wives.” However, most of Kettilby’s ingredients are internationally sourced: many would not have been economically available for the middling class until the late seventeenth century.
Homecooks looked to recreate her recipes’ wondrous effects; some still attempt to recreate her recipes today.5 Did these well meaning angels of mercy understand what they were stirring up when attempting these cures? Kettilby elides the consequences of her recipes. If one is to take her at her word, her aim is to expose to expose “the World [to] Such invaluable Secrets, as hers of a less generous Temper would have taken a Pride, and made almost a Merit, of Concealing,” leading to a kind of “Heavenly Charity.” (Preface, leaf A4r)
Examining her words closely, though (as seen in the image above), Kettilby’s preface contains a martial tone, one that evokes the flavor of empire that her ingredients exude: “There is nothing so easie, as the raising whole Regiments of Nostrums and Recipes, if we will be admit all the Voluntiers of this kind, as fast as they croud in to be listed; but these forward Ones are generally found to fail us in the Time of Trial, and the Success of the Day most commonly to depend upon such, as with great Trouble and Expence are pres’d and dragg’d into service.” (leaf A4r-v) Kettilby’s language might reflect the imagery of taking men into military service without notice, compelling them to serve. It might also refer to a need for enforced labor on the plantations or in conquered colonies which supply many of her ingredients. Food and medicine are rooted in violence here. Kettilby exemplifies the wonder of her “Heavenly Charity,” while creating a need for brute force to acquire cures—perhaps from the nostrums themselves, more likely from abused and violated people around the globe. Receipts themselves are humanized even as their ingredients represent the dehumanization of people around the globe.
The rhetoric and language of these texts require the readers to believe in the wondrous qualities of the recipes and that their “English” cures are the key to society’s health issues. Wonder was, and perhaps still is, bound to foodstuffs, especially exotic rarities, and many authors of the period blurred the boundaries between English and foreign goods. Does their homeland cure them of voyages of the palate, or do the exotic foods that created their illnesses heal them? Medicinal texts bring domestic and foreign ingredients into strange intimacy with each other, reinforcing the dichotomy between wonder and horror in the marketplace.
“Drink of it constantly” is the final instruction in Kettilby’s gout recipe, a clear call to use foreign ingredients daily to imbue the body with English remedies. Kettilby’s preface and recipes reinforce a need for force and luxury as a part of the daily required activity of eating: developing the flavors of new internationally sourced staples in the British diet. Lines are constantly blurred between what is foreign and English, with such complicated histories entrenched in the colonial project. Studying these recipe books opens up further questions about identity and embodiment as relates to actual ingredients. Do “foreign” ingredients become “British” at the moment of purchase? In the act of consumption? When they appear in popular publications? Do those same ingredients become alien again when overindulging leads to pain and discomfort? And is there ever a point where a consumer can acknowledge the pain and degradation that such ingredients demand(ed)? Whether suffering or salivating over ingredients in hand, are we always ignoring the people “pressed into service” who make such embodied experiences possible?
April Fuller is a doctoral candidate of English literature at the University of Maryland, studying food and disgust in the eighteenth century. She currently serves as Chair of ASECS’s Graduate Student Caucus and is an editorial assistant for The Eighteenth Century: Theory and Interpretation.
Laurel Bassett is a doctoral candidate in the interdisciplinary Language, Literacy and Culture program at the University of Maryland, Baltimore County. She studies forms of and purposes for reading in the eighteenth century. A former teacher, Laurel works with the Sherman Center for Early Learning in Urban Communities at UMBC.
- Mary Kettilby, Collection of above Three Hundred Receipts in Cookery, Physick, and Surgery, 2nd edition, 1719, Folger TX705.K5 Cage; we keep to Kettilby’s original spelling and capitalization.
- Bickham, Troy. “Eating the Empire: Intersections of Food, Cookery and Imperialism in Eighteenth-Century Britain.” Past and Present, no. 198, 2008, pp. 76-77.
- Mintz, Sydney. Sweetness and Power: The Place of Sugar in Modern History. Penguin Books, 1986, p. 6.
- See, for example, household account books such as Folger MS V.b.147 and Z.d.20.
- See the website Colonial Table for blog posts about women experimenting from seventeenth- and eighteenth-century cookbooks, including Mary Kettilby’s. This website details recent open hearth experiments with Kettilby’s recipes. | <urn:uuid:3fba275c-e1ec-4601-9d45-cf38f88afd22> | CC-MAIN-2022-33 | https://collation.folger.edu/2019/09/got-gout/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.954842 | 2,064 | 2.53125 | 3 |
It’s always interesting to see something familiar in a totally new light. This is exactly what photographer Don Komarechka did in the latest video for DPReview TV. In this fun video, Don shows us how insects see the world using a modified camera and ultraviolet light. And it’s incredible how flowers we see every day suddenly become something completely new!
To capture the world from an insect’s perspective, Don uses a camera modified to full spectrum. The camera filter is modified so that it passes through the ultraviolet light that we can’t see with our eyes. For best results, he also uses The XNite 330C, a 330nm filter that passes the UV light but blocks all visible and infrared light.
It’s fantastic how some flowers look different when viewed through a UV camera than through our eyes. Petals of like buttercups and sunflowers look all yellow to us, but in UV light they form a bullseye pattern that attracts pollinators. Little forget-me-nots look like they’re all the same shade of blue, but in the eyes of an insect, some of them look bright while the others are very dark. On the other hand, daisies look very interesting to our eyes, with bright petals and darker center. However, filmed with the UV camera, they look entirely gray and dull.
Don tested another interesting experiment with his UV camera. He smeared some sunscreen onto a white piece of paper. Since sunscreen blocks UV light, it looks black on camera. You can see a similar experiment here, and don’t forget to put on your sunscreen when shooting outdoors in the sun. | <urn:uuid:d71397a1-a203-4ca2-a7b0-ddc44727a0d6> | CC-MAIN-2022-33 | https://www.diyphotography.net/this-awesome-uv-video-lets-you-see-the-world-the-way-insects-do/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00265.warc.gz | en | 0.935537 | 346 | 2.5 | 2 |
Children should now be accessing learning via google classrooms.
We have received some useful information from the Lewisham Outreach Inclusion Support Team. Have a look at the timetable - also a child friendly version of how to explain Covid 19 . Some mindfulness techniques and finally a note on wellbeing.
We have received a letter from The Country Trust with links to a live webcam at Romshed Farm looking at the lambing shed www.countrytrust.org.uk
LEAF Education links schools to farmers through Farmer time chat sessions https://leafuk.org/farmertime/home and
https://www.countrysideclassroom.org.uk/ Countryside Classroom has a wealth of resources - enjoy!
Muddy Puddle has offered free resources for a month to support schools closing. To learn more go to www.themuddlepuddleteacher.co.uk
Another link to follow here re home learning
At Baring we believe that the majority of home learning should be reading daily at home with support and encouragement from an adult.
Baring Home Learning Sacks have been developed to include cross curricular activity packs for Nursery, Reception and Year 1.
From Year 3 onwards children will be expected to practice a particular table/part of a table each week. Teachers in Key Stage 2 (years 3-6) may also send home spellings for the children to learn, plus other tasks to support learning.
Parents will be given information about home learning tasks which will support the curriculum and children’s learning will be via letters home and informal meeting and also through Family Learning activities, Open Evenings and Curriculum Workshops.
Government Advice is that children should spend the following amount of time doing home learning:
Years 1 and 2: 1 hour per week (reading and home-pack or spelling)
Years 3 and 4: 1.5 hours per week (reading, spelling, grammar and punctuation, times tables and occasionally some topic related work)
Years 5 and 6: 30 minutes per day/ 2.5hours per week (reading, spelling, grammar and punctuation, times tables and topic work)
Supporting your child's learning in Mathematics
Want to have some ideas on how help your child's learning in Mathematics?
Have a look at these leaflets!
|Year 1||Year 2||Year 3||Year 4||Year 5| | <urn:uuid:eb13ffe7-35c6-4d41-9ab7-c80441a8355e> | CC-MAIN-2022-33 | https://baring.org.uk/Parents/Home-learning/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.922471 | 494 | 2.9375 | 3 |
How do I add Cinema 4D to After Effects?
To import CINEMA 4D files into After Effects, do the following:
- Choose File > Import > File.
- Select the CINEMA 4D file and click Import. The file is placed in the Project panel as a footage item. You can place the footage item on an existing composition, or create a matching composition.
Does After Effects have Cinema 4D?
Adobe After Effects includes a free installation of Cinema 4D Lite – a limited but feature rich version of Maxon’s award-winning 3D software package. Cinema 4D Lite can be accessed directly from within After Effects in the File ⇒ New menu, or by clicking Edit Footage on a Cinema 4D layer in your composition.
What is the software that allows After Effects and Cinema 4D to communicate?
Since 2013, Cineware has provided seamless integration of Cinema 4D assets into After Effects. Cineware not only lets you drag and drop native Cinema 4D files into After Effects but also gives you the ability to manipulate those 3D elements and render directly from within After Effects.
What is the difference between Cinema 4D and After Effects?
Difference between After Effect and Cinema 4D. Adobe After Effect is software which is used for creating motion graphics, special effect, visual effects, and compositing application and computer animation. Cinema 4D is software that is used for 3D modeling, rendering, animation, motion graphics painting, etc.
Does Adobe Creative Cloud include Cinema 4D?
New Adobe CC Release Features Cinema 4D Lite R21 Software available immediately for download to Adobe Creative Cloud® members. Maxon is pleased to announce the latest release of Adobe After Effects CC includes an updated version of Maxon’s Cinema 4D Lite.
How do I activate Cinema 4D?
Step 1: Go to Maxon Cinema 4D on Academic Software and click on the green ‘Start Procedure’ button at the top right to request your licence. Step 2: Click on ‘Get started at Kivuto’. Step 3: Click on ‘Add to Cart’. Step 4: Click on Register.
Is Cinema 4D used for motion graphics?
What is Cinema 4D? Cinema 4D is a professional 3D modeling, animation, simulation and rendering software solution. Its fast, powerful, flexible and stable toolset make 3D workflows more accessible and efficient for design, motion graphics, VFX, AR/MR/VR, game development and all types of visualization professionals.
How do I activate trial Cinema 4D?
In the Cinema 4D License Manager all you’ll need to do is hit the “Switch To” button on your available license. You will then be prompted with a window asking you to confirm the switch; you will hit “yes”. At this point you should now be using your commercial or educational license.
How do I import a C4d file to after effects?
Find the C4D Composition Import plugin for After Effects. Download and unzip the appropriate AE plugin from the Maxon website. Uncompress the .zip file. Inside you should find two .plugin files: C4DExporter.plugin and Cinema4DAE.plugin. Select them both and copy them (cmd + c)
How do I install plugins in after effects CS6?
Install The Plugin. Open Finder. Navigate to your AE Format Plugins Folder System Drive > Applications > Adobe After Effects CS6 > Plug-Ins > Format. Paste the plugins to install them (cmd + v) If AE is currently open, restart AE.
How do I install the Maxon After Effects plugin?
Download and unzip the appropriate AE plugin from the Maxon website. Inside you should find two .plugin files: C4DExporter.plugin and Cinema4DAE.plugin System Drive > Applications > Adobe After Effects CS6 > Plug-Ins > Format If AE is currently open, restart AE. | <urn:uuid:7dedd5d8-af9b-4db9-ab4c-0a657e1dfb20> | CC-MAIN-2022-33 | https://aliciapyne.com/how-do-i-add-cinema-4d-to-after-effects/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.838401 | 835 | 1.554688 | 2 |
Remember analog car odometers? Back in the day, everything from cassette recorders to pedometers used tumbling counters. In TV and movies, whenever an airplane faced impending doom, there’d be a close-up of the digital altimeter counting down. Never mind that the first two numbers are actually ascending, the Pavlovian response is clear: the passengers are all going to crash and die. Trying to set the time on the Legacy Flight Hours left me with a similar sense of foreboding . . .
“I’m sending you a complicated watch,” TTAW’s Founding Father announced. “Fair warning: I lost the instructions.” I was expecting to receive some sort of multi-functional feature beast. When the Legacy Flight Hours arrived, it didn’t look complicated. The watch displays the minute and the hour, period. How hard can this be? Hang on. Why are there four buttons?
I pressed the lower right button. The rollers sprang to life, spun two full revolutions and landed back at the previous incorrect time display. It was a giggle-worthy moment of surprise and delight. As the laughter subsided, I watched the watch to try and figure out how to set it.
The LFH’s rightmost roller represents single minutes. Easy! Only it rolls backwards, in the opposite direction of its compadres. I suspect it’s designed to foster the illusion that the minutes move faster than the hours, as they are wont to do. Anyway, just so we’re clear, the outer right wheel has just ten numbers, 0 – 9.
The middle roller displays the tens of minutes. It also has ten positions, albeit with the order of the numerals reversed (naturally.) Is there some metric time where it will be 12:71?
The hour hand (roller? drum? wheel? counter? the nomenclature is a little alien here) avoids this confusion by surpassing Spinal Tap’s amplifier. The counter goes all the way to 12, avoiding the need to add another wheel reading zero. It also means that all three wheels are different.
Pressing any of the Legacy Flight Hour’s four pushers led to the same spinning Price Is Right Showcase Showdown demo. All right, partner, keep on rollin’. But how in tarnation do you set the time? The top post on Legacy Watch’s Facebook page offers a calibration guide set to a remix of Tom’s Diner.
Legacy’s not just being poncy using the word “calibrate.” To get all the digits to line up properly, you first set the watch to the 12:00 position. A long press on the top left button is your entry into calibration mode. After that, you press the remaining buttons – in counter clockwise order – to adjust each roller.
It’s not the world’s most difficult programming protocol, but in no way is it intuitive. Or memorable. A week after my initial technological triumph, accidental button presses cocked-up the display. I had to look this all up again.
Only then did I notice the video’s pixelated portion and the words “THE DRUM WATCH.” Ah. It’s a private label microbrand rehash of a watch I’d run across researching weird watches on Amazon. I’d seen the Chinese movement slotted into other cases for under $50.
Watching a properly set Legacy Flight Hours’ single minute counter roll backwards into place is less expensive – if not quite as entertaining – as the discontinued Mondaine Stop2Go’s pause-and-jump routine. The hour changeover is better yet. The middle roller – the tens of minutes – goes from 0 – 9 and uses 0 – 5. So the hour change roller advances five positions, half a revolution. Wheee!
The little wheels limit the size of the LFH’s digits. From normal viewing angles, the center roller/dial/wheel/counter isn’t immediately recognizable as the center. To read the time you have to look at the watch square on and somewhat closely (depending on eyesight). It’s a conscious act with more than one deliberate step.
The digits are painted silver. Their slight reflectivity may be a concession to a lack of low light legibility. Charged luminescent paint would roll out of sight in short order. What about an extra light button, a la G-SHOCK? Nope! The LFH is a battery hog.
Legacy has an app for that. Three press on the lower left pusher parks the display at 12:00, saving battery juice and enabling a quick escape from office drudgery. (“Wow! Is it lunch time already?”) Whack any button and the normal time display returns. Rollin’, rollin’, rollin’! Keep them digits rollin’!
Legacy’s website carpet bombs readers with horological hyperbole. Strangers will run up and compliment you on your bold novelty watch choice!
The Legacy Flight Hours failed to elicit the promised shock and awe. Nobody noticed. Demonstrating the LFH to friends resulted in nearly identical responses: “That’s ridiculous” and “Why do you have this?”
Aside from cost, legibility and thickness issues, the Legacy Flight Hours’ messaging is my number one complaint. I’m afraid that an actual pilot will notice the $159 plastic fantastic timepiece and out me as an impostor.
If you can walk the talk, the Legacy Pilot Hours watch is a fun and tolerably practical timepiece. While the peculiarities of the rolling drum movement will torment anyone who values good product design it’s an interesting watch for a niche audience: aviation-minded buyers who love diabolical Sudoku.
Model: Legacy Flight Hours Watch
$297…TODAY ONLY $159!”
Case diameter: 46mm
Case thickness: 16.1mm
Case lug width: 46mm
Lug to lug: 38.9mm
Weight: 86 grams
Water resistance: 3ATM
Accuracy: +/-15 seconds/month
Case metal: stainless steel
RATINGS (out of five stars):
Design * * *
It wants to look like a cockpit gauge on your wrist. Mission accomplished! Simultaneously derivative and creative. Masculine but not toxically so.
Better than the Mr Jones Step Right Up, but that’s about it. Big watch with little display area, plus flat crystal glare. This is fashion over function.
Comfort * * *
Short lugs and a wide band somehow led to exceeding low expectations. I mean “not as bad as you’d think” in the kindest way possible. Very adequate, but in no way luxurious.
Overall * * *
The Legacy Flight Hours is looking for a very niche audience. As a retro sci-fi prop with a high gee-whiz factor, it’s a win. If action hero costumery isn’t your thing, it’s pretty silly and impractical. It’s well done for what it is, even if the price is a bit steep. | <urn:uuid:0efe5633-dadc-4ebf-a30f-f5ee42f98f79> | CC-MAIN-2022-33 | https://thetruthaboutwatches.com/2021/08/legacy-flight-hours-review/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.878902 | 1,567 | 1.796875 | 2 |
A Communication Plan will be prepared to define the Communication Strategy and fundamental aspects such as:
1. Target audience, covering beneficiaries (RTOs, industry, Public Authorities, key decision makers, etc.) and EU citizens (general public) from the different sectors.
2. The main messages to be communicated to the target audiences, namely:
- Benefits of adopting prevention strategies into other potentially involved industries from related sectors (e.g. food industries beyond the marine origin sources, food manufacturing).
- Benefits of cooperating at territorial level in the project, co-financed by the EU, to build on strategies for the management toxin alert systems.
- Benefits of using the ALETOX-NET Platform and the Alert System.
- Main results of the project.
- The Communication Strategy, combining Online and Offline channels: Conferences and Attendance to Events; Project Website (including the ALERTOX-NET Platform); Project Image and Communication Material; Media Relations, Publications, and Stakeholders´network
- The Channels: partners‘ regional ecosystems, making a strategic use of their network and sites; European related Initiatives, establishing a strategic cooperation to find synergies and participate in related events; publishing news about the project in Social Media and Media.
The MARINE INSTITUTE will coordinate the communication strategy and its different tasks. This communication Plan will specifically state that other industries (with average 3 representatives per region) and Regional administrations (1 per region, signing Intent Letter) will be involved in the REGIONAL WORKING GROUPS (WP3). This will guarantee involvement, beyond the surveillance agencies involved in the consortium (IFREMER, INTECMAR and CEFAS) and the industry associated partners.
All partners will be involved by spreading the results among their networks. | <urn:uuid:a67735a8-ab33-4c3a-82f4-f826c5ca0dcb> | CC-MAIN-2022-33 | https://www.alertox-net.eu/work-packages/wp2-project-communication | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.853129 | 367 | 2.3125 | 2 |
Camp Rural Urban Friendship (RUF), currently on its fifth edition this year, is gearing up to host students from rural and urban areas at Darla, Chhukha on 21 December.
The person leading the camp since last year, Namgyel Wangchuk, said that the weeklong program aims to engage students in inclusive and exciting learning activities. The organizers say the activities are well planned and researched, like story reading sessions, campfire and survival cooking, camp radio, treasure hunts, homestays, various sports activities, lifeskills session, Dzongkha Zumba dance, session on Bhutanese etiquettes, screening of Pemi Tshewang Tashi, field trips.
RUF expects to have almost 96 campers and 8 youth caregivers from different schools. The students pay a registration fee of Nu 2,500 to cover transportation, food, accommodation and refreshment
“However, in order to provide equal platforms to the underprivileged students, the camp also offers the Camp RUF Grant to students from financially disadvantaged backgrounds. This year, 18 students from various schools who’ve displayed academic excellence with the potential to be the future leaders, have been given the opportunity to represent themselves through the Camp RUF Grant,” said Namgyel Wangchuk.
The main aim of the camp is to bring students from rural and urban areas together so as to bridge the differences, and to learn from each other by bonding over the course of time and forging stronger relationship. The camp also provides realistic opportunities for the youth to be compassionate and empathetic, open-minded and curious, honest and appreciative with one another by building a sense of mutual respect and strong teamwork.
Namgyel Wangchuk said that the camp programs are developed to educate the hearts of the young minds through well knit interactions and powerful activities, such as sharing the same food and not giving into any standard norms, exchanging knowledge, instilling basic human values, teamwork, interact with local villagers, and reflection sharing over the camp fires towards the evening.
In order to strengthen the bonds, the organizers said that students from rural setting are paired with student from urban areas. The pairs write letters to get to know each other before the camp and after the camp that helps them to understand their differences and similarities. Handmade gifts are also exchanged. The new friendships are nurtured during the camp so they can become life-long friends. The campers are also grouped into ‘families’ of 12 members to support and care for one another and build strong connections.
The noble idea of the camp sprouted from the founder of the camp, Tenzin Dorji’s late wife Kelzang Chhoden, who passed away before she could realize her dream of planning a winter camp to bridge the vast differences between the students from rural and urban areas, with even a bigger dream to forge strong friendships among the campers. Tenzin Dorji took it upon himself to manifest his wife’s last wish into reality and founded the Camp RUF in her memory
The camp also ensures that the programs are well coordinated and proper safety measures are in place. In order to facilitate and make sure the students get the best of experiences, the camp is managed by camp coordinators, assistant camp coordinators, facilitators, caregivers, youth care givers, mess-in-charge, health supervisors, technician, cooks, procurement personnel and helpers. | <urn:uuid:9b9d2b3e-fcdf-4f71-804c-64df8f0a6569> | CC-MAIN-2022-33 | https://thebhutanese.bt/camp-rural-urban-friendship-ruf-receives-overwhelming-response/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.956595 | 702 | 1.617188 | 2 |
This month’s horoscope by Phoebe with quotes by Osho; “Love is the experience in which all your impurities are washed away and you throw open all your doors.”
Osho concludes his commentaries on the last stanzas: ‘With all its sham, drudgery and broken dreams, it is still a beautiful world. Be cheerful.’
Osho speaks on further lines from the Desiderata, starting with ‘Neither be cynical about love… Take kindly the counsel of the years, gracefully surrendering the things of youth.’
Osho comments on: ‘Avoid loud and aggressive persons; they are vexations to the spirit. If you compare yourself with others, you may become vain or bitter…’
Osho continues with the line in Desiderata: ‘Without surrender, without making any compromise, remain yourself.’
“The new man, he will be complete, entire, acquainted with the outside world and acquainted with the inside world as well,” says Osho. From our series 1001 Tales, compiled by Shanti. | <urn:uuid:56a25c49-8c2e-4bee-bc21-782dd3b32ebb> | CC-MAIN-2022-33 | https://www.oshonews.com/tag/oneself/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.933972 | 239 | 1.6875 | 2 |
For the last four months of the year, a 100% discount will go into effect for commuter and medium-distance trips operated by Renfe, the state-owned rail network.
Prime Minister Pedro Sánchez described the measure as a way to ease the burden of inflation for Spanish residents, but the rail journeys will be free for tourists as well.
Mind you, there are restrictions. Single-trip and long-distance tickets (for travel of more than 300km/186 miles) will still have fares, according to news reports. To ride the rails for free, you'll need to book multi-journey tickets with a bunch of different destinations using the short- and medium-distance network.
For travelers, this option might make the most sense for those who want to see all they can of one of Spain's storied regions, maybe by using one city as a base and piling on the side trips to enticing spots nearby. Frommer's recommends Basque Country in late summer, Catalonia in autumn, and Andalusia in early winter.
Even if your plans don't qualify for free train travel, choosing public transport in Spain is a smart way to cut vacation costs. Earlier this summer, the government decreed that those who do pay to ride trains and buses anywhere in the country will pay 30% less for tickets, effective September 1.
To see train schedules and prices or make a reservation, go to Renfe.com. | <urn:uuid:8ff6f0f7-2e67-421f-98e1-8c7513d9889a> | CC-MAIN-2022-33 | https://www.frommers.com/blogs/passportable/blog_posts/the-train-in-spain-is-free-this-fall-as-long-as-you-don-t-go-too-far | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.94812 | 294 | 1.703125 | 2 |
10 Real-Life People Who Inspired Characters on American Horror Story
American Horror Story (AHS), an anthology horror TV series, has given us nine gory seasons so far. Known for both terrorizing and tantalizing its audience with the most macabre plots and stories, AHS has become something of a cult classic. When things get too disturbing on the show, you might want to comfort yourself by saying that it is all fiction. Nothing so evil or scary could exist in real life, right? Well, you would be surprised to know that many of the characters on the show are based on real people! From Delphine LaLaurie and Marie Laveau to Elizabeth Báthory and John Wayne Gacy, here are 10 real-life people who inspired characters in American Horror Story.
1 In 19th century New Orleans, socialite and serial killer Delphine LaLaurie, tortured and killed several slaves in her home. In public life, she pretended to be polite towards Black people and even bragged about keeping her slaves in good health. She was portrayed by Kathy Bates in American Horror Story: Coven.
Delphine LaLaurie, more commonly known as “Madame LaLaurie,” was a Creole socialite from New Orleans. She was born in 1787 during the Spanish colonial period, and her parents were prominent figures in the European Creole community of the town.
She married three times and was widowed twice. She maintained her social status and was in good standing in her community until April 10, 1834, when officials responded to a fire at her mansion. Upon investigation, they discovered several slaves who were chained and bound in her attic. They all showed evidence of violent and cruel abuse that took place over a long period.
As it turns out, although Madame LaLaurie was seen to be polite towards Black people in public, and she also pretended to care for the health of her slaves, in reality, she was a sadistic serial killer who took pleasure in torturing and killing her slaves.
The tales of LaLaurie’s abuse may have been embellished over the years, but the responders to the 1834 fire claimed to have seen stark naked male slaves chained to the wall with their fingernails pulled out and eyes gouged out.
It was also said that they saw slaves whose lips were sewn together, intestines pulled out, and ears were hanging by shreds.
Despite evidence of abuse and other horrific crimes, LaLaurie was never convicted or punished. There is little evidence of what she did or where she was after the 1834 fire.
However, it is said that she fled New Orleans during the mob violence that took place after the fire and went to Paris. According to French archives, she died on December 7, 1849, although the circumstances of her death are unclear.
In American Horror Story: Coven, the nefarious Madame LaLaurie is played by Kathy Bates. Although the show fictionalizes and sensationalizes LaLaurie’s story, in many instances, it is highly accurate. (1, 2)
2 Kit and Alma Walker were inspired by a real-life couple, Barney and Betty Hill, who claimed that they were abducted by extraterrestrials in 1961. It was the very first highly publicized report of alien abduction in the US.
American couple Barney and Betty Hill claimed that they were abducted by aliens in a rural region of New Hampshire in September of 1961.
The incident later came to be known as the “Hill Abduction.” The couple stated that the aliens came from the Zeta Reticuli system, which is why it was also called the “Zeta Reticuli Incident.”
According to reports and statements given by the Hills, the UFO sightings happened on September 19, 1961. They were driving back from a vacation, and when they reached the south of Lancaster, New Hampshire, Betty claims that she saw a bright point of light in the sky.
While her husband drove the car, Betty claimed that she was witnessing something like a falling star, but it was moving upwards instead of downwards.
When she saw that it was moving erratically and growing brighter and bigger, she urged her husband to stop the car. Upon stopping the car, Betty looked through her binoculars and saw an oddly shaped aircraft flashing multi-colored lights and traveling across the Moon.
She suspected that it might be a flying saucer, but her husband reasoned that it might just be a commercial airliner. However, Barney changed his mind when he saw the aircraft descend in his direction without ever turning. They quickly got in their car and drove towards a narrow, mountainous stretch of road.
The couple kept driving down the isolated road while observing the craft as it came closer and closer. At one point, the craft descended rapidly towards their car, which caused Barney to hit the brakes in the middle of the highway.
The huge and silent craft hovered 80 to 100 feet above them. When Barney stepped out of his vehicle and moved closer to the craft, he claims that he saw 8 to 11 humanoid figures peering out of the window and looking at him.
One of the figures allegedly told Barney to stay where he was and keep watching. Terrified, he ran back to his car and told Betty that the beings were going to capture them. While he drove away at a high rate of speed, Betty kept an eye on the object.
Soon, they heard some buzzing sounds and felt a vibration passing through them. Then they felt an altered state of consciousness and their minds felt dulled. When they returned to full consciousness, they noticed that they had traveled nearly 35 miles with vague memories of how they got there.
After the incident, Betty began having vivid dreams in which she had an encounter with the beings. She claims that she and her husband were taken aboard the aircraft and examined. She also stated that the beings wanted them to forget their experience and wiped their memories, but she insisted that she would one day remember.
The Hill Abduction was one of the most publicized UFO abduction cases in the United States, and Betty’s tapes and notes have been placed in a collection at the University of New Hampshire. When talking about the inspiration behind Asylum’s Kit and Alma characters, showrunners said that they had this incident in mind, although their story does not follow the same premise of the real-life incident. (1, 2)
3 Marie Laveau, a Louisiana Creole Voodoo practitioner, midwife, and herbalist, was one of the prominent figures of New Orleans in the 1800s. She became known as the “Voodoo Queen of New Orleans” for helping people with her magical abilities. In American Horror Story: Coven, the character of Marie Laveau is played by Angela Bassett.
Marie Laveau, who appears in American Horror Story: Coven as played by Angela Bassett, existed in real life. Born in 1801, Marie Catherine Laveau was a midwife, herbalist, and Voodoo priestess who was famous in New Orleans. Later in life, she became known as the “Queen of Voodoo.”
Much like in the show, real-life Marie Laveau opened a beauty parlor. She was a sought-after hairdresser for wealthy New Orleans families.
Although not much is known about her magical career, it is said that she cultivated a good relationship with all of her clients and got to know gossip and personal information about them. Then she used that information to offer magical solutions to their problems.
The show presents a fictionalized version of Marie Laveau to serve its plot better. For example, in the show, the Voodoo priestess is portrayed as a ruefully spiteful woman who holds on to an ancient grudge. In reality, however, Marie Laveau was described as “one of the most wonderful women who ever lived.”
Although Marie Laveau was not the only Voodoo priestess in New Orleans at the time, she was certainly among the most well-known. Sadly, there is a lot of misinformation regarding her practices. However, that has not made her legacy in New Orleans any less impressive.
10 of the Most Dangerous and Banned Dog Breeds in the World
10 Important but Largely Overlooked Women in History | <urn:uuid:721ff350-1d8c-414d-8a7b-496eba12e0c4> | CC-MAIN-2022-33 | https://unbelievable-facts.com/2021/04/american-horror-story.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00065.warc.gz | en | 0.98714 | 1,735 | 2.34375 | 2 |
Death on the roads
Road-traffic deaths and vehicle ownership across the globe over six years
By The Data Team
ROAD traffic accidents kill an estimated 1.25m people a year, according to a new report by the World Health Organisation. The number has remained relatively stable since the WHO's first assessment in 2007, even as the number of people and vehicles rises. Yet most are preventable and poor countries are disproportionately affected. One of the United Nation's Sustainable Development Goals is to halve the number of deaths by 2020. Road accidents kill more men than women, and are the biggest killer of 15- to 29-year olds globally. As well as the human toll, it is an economic burden, costing the global economy an estimated 3% of GDP, and up to 5% in the poor and middle-income countries where 90% of deaths occur but only half the world's vehicles are driven.
Africa is the least safe place for a road user, with 26.9 fatalities for every 100,000 people in 2013 compared with 9.3 in Europe—which has ten times more cars as a share of its population. And Africa's safety record has worsened since 2007, the only region to do so. Of the ten nations with the highest death rates, eight are African. The WHO recommends legislative standards for key risk factors: speed in urban areas, drink-driving, helmets for motorcycle users, and wearing seat-belts and child restraints. African countries fail on nearly all counts. Only Egypt requires vehicles to meet basic international safety standards such as softer bumpers to lessen impacts. Many roads are unpaved and do not have safe space for pedestrians, who account for 40% of deaths of all road users against a global average of 22%. And when people are involved in an accident, the quality of emergency care is dismal. Motorcyclists are also vulnerable. In Thailand, which has the second-worst death rate, around three-quarters of people who die are motorcyclists.
Making the unsafest countries safer will be hard. In the three years since 2010, 16m more motorised vehicles hit the roads, half of them in poorer countries with laxer standards. Tackling road safety in the most dangerous countries is vital, but doing so in the most populous would be a good start. The ten-largest nations account for 700,000 deaths, yet none makes the grade on all five risks (America fails on all of them but has a low death-rate). India faces the biggest challenge; more than 200,000 people die annually according to the WHO, though government figures are lower at 137,000. Change is hard to effect. A new road-safety bill introduced by the Indian government this year has already been criticised by campaigners for puny fines and penalties and is currently languishing in consultation. Until road safety is a priority for governments in developing countries, more people will continue to die than do so from malaria or AIDS.
But repression remains commonplace
It will get harder to provide a timestamp for anything from human remains to aged whiskies
Right-to-carry laws are associated with increases in violence | <urn:uuid:6dca6cdc-26d7-4baf-80b4-a4a28772e584> | CC-MAIN-2022-33 | https://www.economist.com/graphic-detail/2015/10/22/death-on-the-roads | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.961147 | 636 | 2.734375 | 3 |
Psycho Educational Group Essay
The third session of Psycheducational group took place on December 05, 2012, the meeting started approximately 6:10pm, due to heavy snow in the city.
John, Mary and Elizabeth came early, but Lee was 10 minutes late. The members agreed to wait for Lee before starting the group. As usual, the meeting started with opening prayer by Lee that lasted for 2 minutes. Having understood that all the group members hold their Christian faith in high esteem, the writer read the book of Isaiah 43:2-3 “When you pass through the waters, I will be with you; and when you pass through the rivers, they will not sweep over you.
When you walk through the fire, you will not be burned; the flames will not set you ablaze. For I am the Lord your God, the Holy One of Israel, your Savior; I give Egypt for your ransom, Cush and Seba in your stead” (New International Version). The Writer explained to group members that the bible did not promise that Christian will not go through live difficulty, but that in the midst of it all God will be there to make sure that his children survive and triumph over their circumstances.The Writer explained to the group that the focus of session 3 is to exploit ways they can survive the changes they are experiencing in Canada. The Writer explained 18 ways to survive changes (Psychoeducational Group: Session Summaries 3, n.
d), group members were paired into two for dyad exercise and they were asked to compare the list of how they are prepared to overcome challenges and move forward in Canada (assignment from last session) with 18 ways to survive changes. The dyad exercise lasted for 10 minutes. By the time the group came together, the Writer uses round technique to find out the outcome of the dyads.Surprisingly, Elizabeth was the first person to talk, she said she has made up her to remain positive and forge ahead without basing herself dignity on human opinion. The Writer asked if Elizabeth had the thought on improving on the way she speaks in order for Canadian to find it easier to hear her better, Elisabeth said absolutely and that she learned from Lee (during dyad exercise) that there are trainings that can help her improve her accent.
Elizabeth told the group that she would like to improve her line of communication and would appreciate it if anybody in the group can help her find appropriate school or training where she can learn.Members promised to find out and give her the information by next session. John said he asked Mary during the dyad exercise if she could give him a copy of her resume to see how he can use the format to draft a new resume for himself. Lee advised that John should use the public library resume expert hired by Canadian government to help unemployed. The Writer told John to check with the library before next session and should let the group know if he still needs further assistance.As far as Lee is concerned, what he was able to grab from the group is the need to rise to challenge and the importance of not putting limitation on himself, as a professor of mathematics from home country, Lee said he would like to expand his value as a person and instead of seeking to be an employee, he would like to be an employer of labour.
The Writer asked Lee to be specific, Lee said he would like to start tutorial lesson for elementary school and undergraduate students who are having difficulty with mathematic.The Writer asked if it is possible to writer a proposal and bring it to next session, Lee consented. The Writer turned to Mary and asked if she wants to continue in banking sector or would like to pursue her medical career, Mary said she would like to pursue her medical career, but she is not sure if she is ready to cross the hurdles of professional exams she needs to pass before she can start practicing in Canada.
The Writer asked if Mary has attempted the medical exam before, Mary said she has not, but she heard from her friend that they are difficult to pass.The Writer suggested to Mary to check the possibility of seeing past medical examination questions and also find out if there are classes for upgrade or tutorial. This third session is a working stage because it is characterised by delving into personally meaningful material, group member had the opportunity to give feedback and they were also receptive to what others have to say, they also practice new skills in daily life and brought the results to sessions, members also offered challenge and support to one another (Corey, Corey & Haynes, 006). Leader-direct style of leadership was adopted in this session and it was effective because it was structured in such a way that group needs met (Jacobs, Masson, Schimmel, & Harvill, 2012). There was none of the members that appear like a natural leader or trying to take control of the meeting, everyone focus on how their needs will be met and how they can help others. | <urn:uuid:ea66e7b6-d712-4348-899b-2a6fd339b4bd> | CC-MAIN-2022-33 | https://lyceecharlesdegaulle.eu/psycho-educational-group/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.983423 | 1,009 | 1.515625 | 2 |
By Michael Lewyn | July 3, 2018
Many urbanists, especially those who dislike tall buildings, are eager to point out that a city can have dense, transit-oriented development without having lots of tall buildings. And when I visited Europe last month, I saw some excellent examples of low-rise yet compact places. Most of central Paris, for example, is dominated by four- and five-story buildings, yet Paris is actually denser than New York City. The older parts of Berlin and Amsterdam have a similar urban fabric.
Does this mean that American cities will be as walkable and transit-friendly as Paris if they halt the construction of tall buildings? Not exactly.
Here’s why: in the parts of central Paris and central Berlin that I visited, every single block was dominated by mid-rise buildings—not just busy multi-lane boulevards, but quiet residential streets as well. So if you walk through Charlottenberg (an affluent Berlin neighborhood) you will see street after street after street of three-to-five story buildings.
By contrast, no U.S. city outside Manhattan has a similar level of density on its side streets. Even New York’s outer boroughs have some streets with lots of mid-rises, but many others that are dominated by single-family homes or rowhouses. And in less compact American cities, the overwhelming majority of streets are dominated by single-family homes. So to have a European level of density, a city must either rezone all of its side streets to allow lots of multi-story, multi-family low-rise buildings, or allow taller buildings on its main streets.
For example, Charlottenberg has 118,704 people living in about 2,500 acres (that is, four square miles). Thus, it has slightly over 47 people per acre, fairly evenly distributed across the neighborhood’s blocks. Suppose that 2,300 of these acres were magically turned into a walkable American streetcar suburb—for example, Atlanta’s Virginia Highlands, a walkable neighborhood dominated by single-family homes. Virginia-Highlands has 7,800 inhabitants living on 612 acres, or 12 people per acre, so the population of these 2,300 acres would be reduced from 108,000 to just under 28,000. To avoid reducing neighborhood-wide density, the other 200 acres would have to be upzoned to support about 80,000 additional inhabitants—which means that instead of having around 10,000 inhabitants, the neighborhood’s most dense streets would have 90,000 people, or almost 450 per acre, a significantly higher level of density than Manhattan.* Could you have 450 people per acre without having some high-rises? I doubt it.
In sum, you might want a city with Paris/Berlin densities, streets full of single-family homes, and without high-rises. But in fact, you can only have two of the three. You can have a dense low-rise city, but only if almost all of the streets were dominated by multi-story buildings (the European option). Or you can have a city with single-family zoning and fairly high density, but only if you have lots of tall buildings on the multifamily blocks.
*Manhattan has 51 households per acre, or roughly 100-150 human beings per acre. However, some blocks in my Manhattan neighborhood (Murray Hill) have 100-150 households per acre, which is a bit closer to this density level. | <urn:uuid:cab66db4-de78-40aa-a561-aedf6b6d5269> | CC-MAIN-2022-33 | https://www.rapidshift.net/density-learning-from-europe-it-is-indeed-possible-to-have-a-city-full-of-low-rise-buildings-that-is-still-compact-enough-for-excellent-transit-service-but-only-if-most-side-streets-are-used/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.963372 | 716 | 2.59375 | 3 |
Tips for Keeping Your Digital Device
Safe from Cybercriminals
People run their lives on their smartphones, tablets and other digital devices. They make payments on them, transfer money to other people, make dates, deal with appointments and chat to people through various apps and social media. So much information can go through a digital device that a hacker or cybercriminal could soon know every little detail about your life and steal your identity or empty your bank account. However, there are some steps you can take to lower the risk of this happening, and here are a few tips that might help.
The same applies with updates for digital devices as it does for computers. They are often issued because of a security issue, and you should install an update as soon as it appears. A large proportion of hacks happen because they are able to access your data through a hole that has not been plugged, and utilizing updates as they appear will close those holes and make it harder for hackers to get in.
You may also want to consider downloading some free forensic software which includes some of the most commonly used forensic disc tools and data capture tools which will allow you to capture images and data for preservation.
Take Care with What You Install
When you download a new app, you may well be asked if you will grant various permissions such as reading your files or access to your microphone or camera. There can be legitimate reasons for this, but it will also open up your device to hackers. Be careful who you allow these permissions to, especially if your device is android because Google’s vetting processes are not as strict as those of Apple.
You should also avoid installing apps from sites you are not familiar with as you could easily download a rogue app without realizing it. Tools such as McAfee and Avast will alert you if you are downloading an app that could be malicious.
Secure Your Device
If someone steals your smartphone, they could do an enormous amount of damage. You should make it difficult for anyone to access it and change passwords often. There are several options you can take, but some of them might seem a bit drastic. For instance, you could set your phone to automatically erase all data if more than a certain number of attempts to access it are made. Both Apple and Google operate a ‘find-my-phone’ service, where your phone can be located on a map. You can also remotely lock or erase your phone with these services.
Be Someone Else
There is a lot of information about you on your social media accounts. If a hacker gets hold of your date of birth and information such as your mother’s maiden name, they can access things on your devices and change the passwords. This will deny you future access and could let them into bank accounts. One way around this is to use other details on your social media accounts. As long as they are different from your bank accounts and anything else holding your private information, hackers will not be able to use them to their advantage.
Securing your digital devices is as important as securing your computer. Keep the hackers and cybercriminals out of your affairs by following these tips. | <urn:uuid:7ef786d9-11da-4656-8178-f335093cff54> | CC-MAIN-2022-33 | https://thesocialmediamonthly.com/tips-for-keeping-your-digital-device-safe-from-cybercriminals/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.965071 | 639 | 2.671875 | 3 |
Introducing Jack Laidlaw, the original damaged detective. In Laidlaw, the first book in a groundbreaking crime fiction trilogy, we meet Jack Laidlaw, a hard-drinking philosopher-detective whose tough exterior masks a rich humanity and a keen intelligence. Laidlaw’s investigation into the murder of a young woman brings him into conflict with Glasgow’s hard men, its gangland villains, and the moneyed thugs who control the city.
“It’s doubtful I would be a crime writer without the influence of McIlvanney’s Laidlaw.” —Ian Rankin, author of the Rebus novels
William McIlvanney is widely credited as the founder of the Tartan Noir movement that includes authors such as Denise Mina, Ian Banks, and Val McDermid, all of whom cite him as an influence and inspiration. McIlvanney’s Laidlaw trilogy “changed the face of Scottish fiction” (The Times of London), his Docherty won the Whitbread Award for Fiction, and his Laidlaw and The Papers of Tony Veitch both gained Silver Daggers from the Crime Writers’ Association. Strange Loyalties won the Glasgow Herald’s People’s Prize. William passed away in December 2015. | <urn:uuid:53f5f0dd-f674-4905-806e-d10f7db58f6b> | CC-MAIN-2022-33 | https://www.europaeditions.com/book/9781609452124/laidlaw | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.920135 | 282 | 1.695313 | 2 |
News > Blog
Using Evidence to Reduce Poverty in the World’s Poorest Places
Published 09/30/2016 by Global Communities
Using Evidence to Reduce Poverty in the World’s Poorest Places
By Milton Funes, Director of Program Impact and Learning at Global Communities
This article was originally published on Reuters Alertnet.
The first Sustainable Development Goal is to “end poverty in all its forms everywhere.” Underlying that simple call to action is a complex requirement – to be able to understand and measure poverty in all its forms everywhere. A new multidimensional approach to evaluating economic development that looks beyond income to measure education, health and living standards, shows great promise for improving livelihoods in some of Africa’s most vulnerable communities. In fact, analysis using the Multidimensional Poverty Index developed by the Oxford Poverty & Human Development Initiative, found poverty greatly reduced in 30 of 35 African countries during the surveyed period 2005-2014.
While the Multidimensional Poverty Index is undoubtedly useful, as it identifies the sectors where the most impact can be made, it is not novel. Global Communities, a community-based global development organization, has experience using a similar multidimensional approach in Rwanda, a country rated as having a “stellar performance,” in the recently released global index.
Global Communities has been working in Rwanda since 2005 on USAID/PEPFAR-funded programs related to building household resilience, poverty reduction and access to healthcare. This work was designed as an integrated approach to development, tackling multiple challenges. Through this work we learned that in order to address poverty we needed an effective way to measure and understand its changing dynamics.
In 2012, Global Communities developed a household resiliency index, or HRI, to evaluate households’ ability to manage their health, social and financial needs. The index was based on the government of Rwanda’s Ubedehe social economic scale and, by measuring multidimensional poverty, was able to determine into which of three categories of poverty families lived: households ready to grow, households struggling to make ends meet and households in destitution.
We had a baseline study from the beginning of second phase of our work in 2010, but wanted to be able not to just measure the change at the end of five years, but see what was getting better and what might be getting worse for the families with whom we worked.
In 2012, 2013 and 2014, we took a sample of 1,000 households out of more than 71,000 whom we were targeting. By the end of the program 83% of the beneficiary households included in the three-year study graduated to or maintained higher levels of resiliency. Analyzing the findings of the 2014 survey, 9% were categorized in the highest socio-economic category of ‘households ready to grow’; 74% were categorized as ‘households struggling to make ends meet’; and 17% were in the category: ‘households in destitution’. While 2014 saw a decline in household economic resilience compared to 2013, there was still an improvement in resilience over the 2012 results and as measured against the households’ Ubudehe Categories assigned in 2010. See graph below:
Based on follow-up research conducted in late 2014, most of the households that failed to progress out of the lowest socio-economic category (17%) had suffered shocks – the most commonly cited being health shocks, particularly HIV/AIDS, chronic illness and physical or mental disability, and economic related shocks, such as business decline or loss of a household asset. We were able to survey them in more depth and find out some of the causes – family alcoholism or disease, for example, and identify that they needed specialized social protection.
Our program in Rwanda was a holistic approach to poverty reduction. Program services included subsides to access education and health services, agriculture production enhancement through farmer field schools, nutritional improvements through cooking demonstrations, kitchen gardens and Positive Deviance Hearth groups (nutritional and behavioral change), economic growth through saving and lending groups, and, early childhood development and psychosocial support.
Yearly results shown by the HRI helped inform our program design and realign resources to the areas where they were needed. By measuring a broad range of indicators we were able to assess what was no longer as necessary and what was most necessary each year. For example, in the first few years of the program, we focused a lot of resources on providing subsidies for school fees. It became clear through the index that this was no longer as pressing a need, so we began to phase it out – a reduction of 25% the first year, 50% the next, and 75% in the third year. This helped families prepare for the loss of subsidy and develop their own sustainability plans.
This review allowed Global Communities to realign its program funds to address the need for more vocational training opportunities for youth as stated in Rwanda’s revised Economic Development and Poverty Reduction Strategy launched in 2012. Between 2013 and 2014 the program provided technical and vocational education scholarships and life skills training for more than 5,000 youth. Vocational training included trades such as construction, electricity, vehicle mechanics, information and communications technology, hairdressing, plumbing and others.” The vocational training is a viable option for thousands of young Rwandese, offering also a wide range of technical trades for those who suffered of malnutrition during the pre- and post-genocide years.
Today, Global Communities continues to develop the indices we use to be better tools of measurement that can inform project design. The use of regular measurement of multidimensional poverty has helped us to realign our programs to meet the evolving needs of vulnerable communities, and has resulted in helping to move increasing numbers of families out of poverty. We applaud the creation of the Oxford Poverty and Human Development Initiative in helping with project design, alignment of resources and re-alignment. And while doing so, we encourage those who develop such indices to fine tune them as we learn more about effective monitoring and evaluation, to help global development organizations achieve the Sustainable Development Goals.
Milton Funes is Director of Program Impact and Learning at Global Communities, a global development organization focused on community-based development which works in more than 25 countries worldwide. Learn more at www.globalcommunities.org or follow on Twitter @G_Communities. | <urn:uuid:44b8c30b-129b-48cd-a63a-b884e83fd58a> | CC-MAIN-2022-33 | https://globalcommunities.org/blog/using-evidence-to-reduce-poverty-in-the-worlds-poorest-places/?_resource_type=research-and-publications | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.962893 | 1,299 | 2.71875 | 3 |
Writing without bullshit–doesn’t that sound grand?
Unfortunately, it’s often hard to come by. The world is plastered with bullshit, and it’s “a burden on all of us, keeping us from getting useful work done,” writes Josh Bernoff.
To help curb the flow, Bernoff wrote the book Writing Without Bullshit: Boost Your Career by Saying What You Mean. In it, he makes clear that he’s talking to business writers, not general writers, but a lot of the content is relevant and helpful for the general writer.
The book summarizes bullshit writing–“communication that wastes the reader’s time by failing to communicate clearly and accurately”– and explains why it exists, how so many people get into the habit and how to identify it and make a change.
Bernoff’s insight on bullshitting is based on a principle that all writers should live by, which he calls the “Iron Imperative.” And that is:
Treat the reader’s time as more valuable than your own.
“Everything that’s wrong with the way businesspeople today write stems from ignoring this principle,” he declared.
And here are some of the other key points, Bernoff makes:
Why people write bullshit
“Teachers implicitly taught us bullshit was effective.”
“High school and college writing teachers do not prepare students for a world where readers read on screens.”
“By the time your essay-writing ability has gotten you into college, you’ve internalized a few lessons. One is that a longer paper will probably get a better grade. You read academic writing, which is full of passive voice and jargon, and learn to imitate it to sound smart…so you take those skills you learned in school and become part of the corporate bullshit machine.”
“In business, fear generates bad writing habits…You fear taking a stand, being held responsible, being wrong.”
“Insecurity…You say the same thing several different ways since you’re not sure which is best. It takes you a while to figure out what you’re saying. You add words to hedge.”
What bullshit writing looks like
“…writers don’t want to get to the point, they want to show off.”
“Passive sounds sort of sophisticated because it creates distance between the writer and the reader. Consciously or unconsciously, you’ve picked that up.”
“…people write jargon to look and sound smarter. They don’t.”
“It’s common for women, especially those just starting out in the working world, to apologize or soften what they say in situations where a man might challenge those around him. There are far fewer bold women than men at work.”
“If you write the same way as everyone else, it’s hard to get ahead. And if you think you can get ahead by being a bullshitter, you’ll have plenty of competition. There is always someone who is a better bullshitter than you.”
To stand out, your business writing needs to make a direct connection between the writer and the reader. “You,” “I,” and “we” make that connection. A simple change of pronouns forces you to think clearly about what you’re saying.”
“Without “you,” there’s no advice. And without any advice, the reader asks, why did I spend my time reading this?”
“Business writing exists for one purpose: to create a change in the reader. If the reader is no different after reading, then you have wasted the reader’s time and violated the Iron Imperative…”
Stay tuned for Writing Without Bullshit part 2 offering tips to improve your writing.
Also see: Quotes from On Writing Well | <urn:uuid:93d3ee1e-25b6-4a64-b328-63ed5379f6eb> | CC-MAIN-2022-33 | https://knowgoodwords.com/writing-without-bullshit-book-review/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.951427 | 850 | 1.945313 | 2 |
What is Yoga Therapy?
Yoga Therapy (also known as Yoga Chikitsa) is not a new branch or style of yoga – it is yoga as yoga is meant to be: a therapeutic holistic healing discipline that offers a broad range of tools for supporting health, healing and personal transformation.
People are discovering that yoga has a powerful impact in helping individuals face health challenges to manage their condition, reduce symptoms, restore balance, increase vitality, and improve attitude.
Yoga means to yoke, or bring all things into union. Yoga therapy diagnosis takes into account the impacts on 5 layers of the human body when addressing a concern – the breath, the body, the mind, the emotions and the spiritual layer. The purpose of this diagnosis is to then customize a practice to bring the body into a state of harmony, of unity with itself.
The bodybeing functions optimally, only when there is a state of dynamic balance.
How Does Yoga Therapy Facilitate Healing?
- learn how patterns affect choices in life by examing the Yoga Sutras, and its teachings on samskaras and karma
- investigate how deep emotions and experiences are held in energetic patterns in the body and the chakras
- utilize pranayama (breathwork), meditation and asana (physical practice) to learn how to safely release energetic patterns from the tissues
- connect with the five elements and their effects on sleep, appetite, energy level, and mental clarity to attune with rhythms and cycles of our beings, the seasons, our greater planet and universe
- learn to “feel” poses from the inside and restore stabilization and strength to injuries
Yoga Therapy Sessions are individually tailored to your unique being, and are between sixty to ninety minutes long. A session may involve counselling, breath-work, physical movements & sequences, meditative practices, or visualizations to suit your specific needs, capabilities, goals, and life circumstances. A Personal Home Practice is given that can be done independently at home.
As a Yoga Therapist, I work with your family doctor, naturopath and other medical and therapeutic professionals to support your needs. I encourage students to get a medical diagnosis from their healthcare practitioners and/or doctors before coming to see me if there are therapeutic concerns. This medical diagnosis will help me better assess the root cause of the problem, and insure that you are supported by all levels of health care, and that we are working together towards balance and health.
It is my honour to be a witness on your personal healing journey. Together we will co-create a safe, nourishing and empowering space for your soul’s evolution. | <urn:uuid:0d224142-0cc6-4c59-96b3-c92479b52d2a> | CC-MAIN-2022-33 | https://sarahkanewade.com/nourish-yourself/yoga-therapy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.938661 | 541 | 2.1875 | 2 |
The Fair Work Commission (FWC) announced earlier this year that there would be an increase to the minimum wage in Australia, coming into effect on three different dates for different groups of industry awards.
The minimum wage has been increased to $753.80 per week or $19.84 per hour, an increase of 1.75%. This constitutes an increase of $13.00 per week, or 35 cents to the hourly rate. The increase will result in pay rises for more than two million Australians who are paid the minimum wage or have their pay set by awards that increase in line with the decision.
The FWC took a cautious approach in making the decision to increase the minimum wage by 1.75%, taking into consideration the current economic downturn and the significant rise in unemployment in response to COVID-19. Whilst the minimum wage increase did not meet the union’s request of a 4% rise, the FWC recognised that without a rise many low-income householders would be less able to meet their needs and would be at greater risk of poverty.
The FWC decided to implement the increase on three different dates for different industries based on restrictions to contain COVID-19.
When will your award increase?
Group 1 Awards – From 1 July 2020
Group 2 Awards – from 1 November 2020
The National Minimum Wage increase 1.75% for Group 2 Awards should have taken effect from the first full pay period on or after 1 November 2020.
Group 3 Awards – from 1 February 2021
For a full list of awards in each group, click here to view the Fair Work website.
National Training Wage
The operative date of wage increases for employees undertaking a traineeship under the National Training Wage will be in accordance with the operative date minimum wages for the Group 1, Group 2 and Group 3 Awards.
What should you do?
Employers should review their wage arrangements and implement the necessary wage increases to ensure the new minimum wage rates are met for your specific industry award. All minimum payment obligation must be met for each employee, including those receiving the JobKeeper subsidy.
Those paying above-award payments should also review their wage arrangements to ensure they are high enough to accommodate the increases in minimum wage.
If you have any questions or would like assistance in reviewing your wage arrangements to accommodate for the increase to the minimum wage in Australia, please give us a call on 03 5443 0344 or email email@example.com. | <urn:uuid:275db5f3-31ac-429f-bee4-de10bb28c70b> | CC-MAIN-2022-33 | https://www.afsbendigo.com.au/increase-to-minimum-wage-in-australia/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.9508 | 507 | 1.609375 | 2 |
The World's Slowest Popcorn Maker
Sometimes science comes up with convenient and necessary leaps forward in the world of food technology. Imagine your life without the microwave oven, the refrigerator or even the home coffee maker. Other times, however, science comes up with stuff that makes great water cooler talk but is essentially useless.
Check out this ridiculously convoluted popcorn maker. It slices. It dices. Wait, it does none of that stuff. It just makes popcorn in the coolest, and most inconvenient, way possible. Think of it as the Rube Goldberg machine of popcorn makers. Did we mention it only pops one kernel at a time? If you time it right, you can have a bowl ready a few hours after the movie is finished. | <urn:uuid:044f4da4-169c-4ab8-8eee-83eb42b7be54> | CC-MAIN-2022-33 | https://www.cookingchanneltv.com/devour/2012/11/worlds-slowest-popcorn-maker | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.935245 | 150 | 1.765625 | 2 |
The Joys of Jewish Preserving
Taught by Emily Paster
Emily Paster was born and raised in Washington, DC, where her mother was the Director of the Folger Shakespeare Library and her father was chairman of the public relations firm Hill and Knowlton. A graduate of Princeton University and the University of Michigan Law School, she redirected her career from law to cooking and food writing beginning about 10 years ago, when she had her second child. She writes the widely admired blog West of the Loop, primarily about food but with forays into parenting and family life. She is the co-founder of the Chicago Food Swap and is a national leader in the growing food swap movement (community get-togethers where handmade foods are bartered and exchanged). Her previous book is Food Swap (Storey 2016). A resident of River Forest, Illinois, in suburban Chicago, she speaks often in the Chicago area on farm-to-table and garden-to-table provisioning and cooking and she has appeared numerous times on food and cooking segments for the major TV network affiliates in Chicago. Her next book, The Joys of Jewish Preserving will be published on July 15, 2017.
Join Emily Paster, author of The Joys of Jewish Preserving to learn about one of the most vital subtopics in Jewish cooking: preserved foods.
In this class, we’ll explore the history and importance of food preservation, such as pickling and fermenting, in Jewish cuisine, both Ashkenazi and Sephardic. You will learn what makes Jewish food preservation distinctive and how preserving plays a role in many Jewish holiday celebrations.
You will also learn the basics of water-bath canning, an easy and safe method of preserving, through a pickling demonstration. Lastly, we will also sample some iconic Jewish foods that incorporate preserves, like pickled vegetables.
(class size: 15-20, demo + lecture with Q&A and samples) | <urn:uuid:cb3049d3-fac5-4ad5-a7e4-fe6040596491> | CC-MAIN-2022-33 | https://brooklynbrainery.com/courses/the-joys-of-jewish-preserving | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.96231 | 398 | 2.5 | 2 |
Anxiety is such a big issue and our generation is suffering more than any before. Some of us are experiencing anxiety every now and then, others are experiencing it every day.
I am lucky enough to be able to say that anxiety is not a part of my daily routine. In fact, I hadn’t had a real panic attack for a while. My panic attacks started when I was 19 or 20, and lasted about 1,5 years. I thought I’d gotten rid of them. I changed my life, added a lot of happiness, felt way better about everything, and didn’t have that crippling anxiety anymore.
Until I was 25. I let my life slip out of my hands, and the negativity started piling up. This led to me crying for 4 days, having 3 panic attacks in 2 days and being inexplicably exhausted for the last week. I felt terrible and decided it was time for a change. I want to share my tips on how to manage your anxiety like I did mine.
Don’t forget to pin this post!
Tips to manage your anxiety
To me, music is always a good idea. Music is my therapy and I wouldn’t have it any other way. Figure out how music can be most beneficial to you.
Maybe you like to turn it up real loud and get all of your frustration out. Maybe you need to listen to one sad song to feel better. Maybe an instrumental or acoustic song calms you down. Maybe it helps to pick a song and follow one single instrument throughout the whole song.
When you’re calm, make sure you listen to happy, positive songs.
Have you been nourishing your body? My new mantra is; Is this helping or hurting me?
Think about what you’ve eaten in the past 24 hours. Have you already eaten anything today? And were these things helpful or hurtful to your body?
Try to get some food with sugar and vitamins. Fruit is always a good idea. The sugar helps your energy level, and the vitamins are just there cause you need them.
You also know it’s important to drink water, but it’s so easy to forget. Are you properly hydrated? Take a look at the past day and see if there is anything that could be improved immediately.
Take a shower. Get into a hot bath. Brush your teeth. Wash your face. Drown yourself in body lotion/butter/oil. Pamper yourself. Do your nails. Wax your legs.
Basically, take care of your body.
You can also check my suggestions for the perfect self-care day here.
4. Get moving
To continue on the body-trail, get your body moving! Break a sweat, go for a walk, get your blood flowing and get distracted.
A run might be the perfect way to throw off any frustration, anger or even sadness.
A good workout can make you feel stronger and empowered.
Anatomically, it gets more oxygen to your brain which can help you think, but it will also stimulate endorphin production, and legally blonde taught us all that endorphins make us happy.
A good work-out can definitely be one of the most instant fixes to manage your anxiety!
5. Get outside
I don’t know anyone who doesn’t feel better after a little outing in nature.
Whether this is the beach, a big field of grass, a flower garden or a forest, nature is good for the mind.
The quiet of nature can counterbalance the busyness and stress of our everyday lives, lead to a lower risk of depression and stress-related illnesses.
Spending time in nature can also increase our satisfaction with life, and make us happier in general.
6. Focus on one thing
Manage your anxiety by focusing on one thing, and one thing exclusively.
As an exception, you can allow yourself to have some instrumental music playing softly in the background, but ideally, you’d focus on one thing.
This is about being mindful, present, and giving your brain a break.
For me, this always used to be painting my nails. Whenever I’d be restless, annoyed, frustrated and didn’t know what to do with myself, I’d paint my nails.
The precision needed made my brain focus on that small task, and without fail made me feel calmer afterwards.
Find your activity, or activities, and focus on them.
7. Write it down
When your brain feels like a contained tornado, grab a pen and paper and write it all down. You can write it as a story, a to-do list or anything else, but write it down.
Often this calms our brain because it realizes that all the worries are recorded somewhere and will not be forgotten.
It can also be therapeutic when you realize you have something that you have to work through.
Write about it, explore the topic and possible worries in your mind and see if this helps.
8. Talk to someone
Whether it is your mom, your partner or a friend, talking to others can really help manage your anxiety.
They don’t need to come with a solution, however tempted they may be to make you feel better, it’s often more about having someone that listens to you.
You can share your thoughts, your worries, sadness and frustration and they will listen and let you speak.
Find your person.
9. Take a digital break
As I said before, some of our generation’s anxiety is our own fault. We get so caught up in the social pressure of having to look perfect for instagram, and everyone sharing their perfect lives online.
One step is to realize these are only the highlights of their lives, and they too have bad days.
Second is to realize that whatever they have, means it is also open to you. Instead of jealousy, use it as motivation.
Third is to just turn it off for a day or two. Focus on your life instead of theirs and see how you feel.
You can read more on how less social media makes you a happier person right here.
Wow, those are quite a lot of tips on how to manage your anxiety, right?
Mental health is still so underestimated and overlooked.
Never think your mental health is not important or you don’t deserve to feel happy.
If you feel down, go through the list or reach out to someone.
Don’t forget to pin this post! | <urn:uuid:03675134-f622-4957-9d71-8d07b80ff5b2> | CC-MAIN-2022-33 | https://www.livingwithtessa.com/manage-anxiety/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.956423 | 1,378 | 1.609375 | 2 |
Each musical instrument is different, but there are many similarities between many of them. The piano and the guitar are both stringed instruments that require discipline and technique to master. They also need a lot of practice.
The guitar and piano share a similar quality in that they are both chromatic and can reach every note on the chromatic scale. The similarity makes it easy for anyone who wants to switch between the two instruments to do with ease. Learning either can be very easy. However, the teachings can only apply if you switch between the piano and the guitar.
The guitar is a stringed wooden instrument that uses a pick to play the strings.
The movement is known as strumming. To successfully strum your guitar, you will need to keep your elbow out of the way and closer to the base of your guitar. Doing that allows your hand to move freely without blocking any of the strings.
The piano is also a wooden instrument with strings hit by a hammer inside the piano every time you press a key. There are roughly 230 strings in a piano, but this number could change depending on the type of piano. Each key strings three strings, and for base notes, two strings are strung at a time, lowering the string amount as the bass drops. You could quickly tell the difference from the basic upright down to the best baby grand piano.
Pianos use singular key positions for every key and will not have the same sound coming from two different keys simultaneously. The notes are not repetitive and can only be found in one place. Each chord, note, or scale is in its place for that particular sound. To create a harmonious sound, you would have to select a few keys simultaneously.
Guitars are the opposite because you can easily find the same key in different places on the guitar's fretboard. The same key could be repeated several times at once, which gives the guitar its harmonious sound. Even though there are only six strings on the guitar, you can find a multitude of notes, scales, and chords simultaneously while playing the duplicate keys.
Learning between the two instruments
If you think about the piano and the guitar, they could seem like complete opposites. The instrument personalities range from soft and romantic to wild and playful. The music selections for which each instrument is used plays testament to the way the purpose of the instrument. Many people associate rock and roll with guitars, where classical and instrumental jazz is most likely to be heard from a piano.
Learning to play the piano would be easier because there is individuality in the sound of the keys, making it easier to listen to each key that you are playing without getting confused with where it sits on the keyboard.
The guitar is widely used, and because of the instrument’s popularity as the base for many songs, you could master the art of playing it in a few short months. What would make it easier to understand is learning to play the piano first and then transitioning onto the guitar. Once you have learned to understand the piano music sheets, the guitar will be a breeze.
Article by: Broughton Pianos | <urn:uuid:5997fc33-7d92-4149-b75e-6029d7dfc966> | CC-MAIN-2022-33 | https://www.buzz-music.com/post/the-relationship-between-the-guitar-and-the-piano | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.966298 | 643 | 3.15625 | 3 |
Not all women are qualified for president
How depressing is it that, out of the more than a dozen announced or prospective Republican candidates for president in 2016, only one, Carly Fiorina, is a woman. Even more depressing: that Fiorina, as long-shot as her candidacy is, would not be taken even semi-seriously were it not for her gender.
This is a tough and controversial thing to say, but it requires saying. I would love to see a female president, of either party, and expect I will – if not in 2016 then in an election to come. But the female president I would love to see is one who is fully qualified to be president – qualified by dint of experience, not of chromosomes. Carly Fiorina is not that woman.
That assessment has everything to do with biography, and nothing to do with ideology. (If South Carolina Gov. Nikki Haley or New Hampshire Sen. Kelly Ayotte chose to run for president, you might find me disagreeing with their positions, but not questioning their qualifications.) In my view, Fiorina’s background simply does not prepare her to be president.
For the record, I would say precisely the same about neurosurgeon Ben Carson. Politics isn’t brain surgery, but being a brain surgeon doesn’t prepare you for high-level politics, and Carson isn’t prepared. I’m writing about Fiorina because, frankly, as a woman, her candidacy offends me.
I can already hear the sputtering out there: But what about Hillary Clinton, the all-but-certain Democratic nominee? After all, the sputterers will say, Clinton’s road to the White House is paved on gender: She rose to prominence in her spousal capacity, and in part by playing the gender card (women’s rights are human rights, and all that).
Yes, Clinton’s path to power came through her husband; if I were designing the perfect First Woman President, she would not be the daughter or the wife of a prominent politician. Yet Clinton’s history does not negate the current reality of her resume, and her deep grounding in both foreign and domestic policy.
Contrast Fiorina, but first a pause to highlight a positive comparison with Clinton: Fiorina has been answering hundreds of questions from reporters; as of Monday Clinton has taken just eight in the last month. Not a good omen for a Clinton presidency.
But back to Fiorina: She has a checkered, to put it charitably (failed, to put it more bluntly), business career and no political career whatsoever, having lost her previous run for elective office. It is the height of chutzpah to imagine that she is remotely qualified to be president. Or, since it’s the more likely endgame, for vice president either.
I would have serious qualms about any candidate who seeks the presidency without government experience, no matter how much value he or she produced for shareholders.
Business demands different skills than politics; the presidency isn’t the place for on-the-job training. But Fiorina is a particularly problematic would-be transplant from the C-suite to the White House. It’s not simply that she was fired as the CEO of technology giant Hewlett-Packard – but that she did a lousy job.
Hewlett-Packard did grow under Fiorina’s tenure from 1999 to 2005 – but that was due to an ill-advised merger with Compaq that cost HP shareholders $24 billion and bought them a computer business that diluted the value of HP’s printer business. As Yahoo News detailed, HP stock fell by more than half during Fiorina’s tenure, while its technology cohorts performed “not as badly or much better.”
Fiorina stumbled as a campaign surrogate for John McCain in 2008, famously saying that vice presidential nominee Sarah Palin and then the GOP presidential nominee himself weren’t fit to run a company. (She was right.) She failed in her previous bid for elective office in the 2010 California Senate race, losing to incumbent Barbara Boxer by 10 points in a Republican year.
It’s not sexist to criticize Fiorina for being unqualified. What would be sexist is to hold her to a lower standard than a man with similarly paltry credentials.
Ruth Marcus’ email address is firstname.lastname@example.org. | <urn:uuid:a93d93e6-f6e1-4f41-8bfc-c3c5081d24a8> | CC-MAIN-2022-33 | https://www.delawareonline.com/story/opinion/contributors/2015/05/12/women-qualified-president/27198343/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.969035 | 912 | 1.84375 | 2 |
In just a person thirty day period, the globe has been battered by wildfires, torrential flooding and extreme winds. Vehicles have been observed floating down the road in Belgium and China and devastating fires have ripped via Siberia and a great deal of the west coastline of North The usa. In this extract from our Whole Story podcast, Guardian Australia editor Lenore Taylor talks about how these are the scenes local weather scientists have been warning of, and the only silver lining is that all the destruction could ultimately press laggard governments like Australia toward transform.
Subscribe to Guardian Australia on YouTube ►
Our lives are transforming profoundly but we cannot succumb to cynicism and hopelessness | Lenore Taylor ►
Full Story podcast: As weather disasters unfold worldwide, can Australia resist alter? ►
Assistance the Guardian ►
#excessive #extremeweather #lightning #weather conditions #weatherwtf | <urn:uuid:e610d285-b7ab-44f4-bb39-e02c2f030b43> | CC-MAIN-2022-33 | https://www.weather.wtf/wildfires-floods-intense-weather-what-a-person-month-in-the-world-climate-disaster-suggests-for-australia/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.845331 | 203 | 2.015625 | 2 |
Plants can get rid of excess water by transpiration. For other wastes, plants use the fact that many of their tissues consist of dead cells, and that they can even lose some parts such as leaves. Many plant waste products are stored unicellular vacuoles waste products may be stored in leaves that fall off. Other waste products are stored as resins and gums especially in old xylem. Plants also excrete some waste substances into the soil around them. | <urn:uuid:e83bce6e-9741-4f89-8f57-10d8cb3b71cf> | CC-MAIN-2022-33 | https://www.sarthaks.com/661332/what-are-the-methods-used-by-plants-to-get-rid-of-excretory-products | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.978944 | 96 | 3.421875 | 3 |
The community of Griswold, CT had forgotten about the old burying ground used by the Walton family in the 19thcentury until children playing near a gravel mine in 1990 found a couple of skulls that had become dislodged from some old graves. The discovery made international news when archaeologists unearthed the fourth grave and found that the skull and thigh bones had been arranged into a skull and crossbones design on top of the rest of the remains. After running through theories for this sinister skeletal design, the research team agreed that this grave belonged to a “vampire” who had its bones repositioned post-mortem.
The anthropologists who worked on the Walton family cemetery project were not optimistic that they would ever know who this person was because there was no identifying information in or around the grave. The only clue to this individual’s identity was the “JB55” spelled out in brass tacks on the coffin lid (pictured here), thought to be the man’s initials and age at death. The osteological examination, however, shed light on how the person lived and died, and the reason behind the ominous death’s head arrangement.
Forensic anthropologist Paul Sledzik and archaeologist Dr. Nicholas F. Bellantoni, who both worked on the Walton family cemetery project in the 1990’s, published the results of their osteological examination of JB55’s remains in the American Journal of Physical Anthropology. JB55 was a Caucasian male who was between 50 to 55 years old when he died in the early 19th century. The mild osteoarthritis “in most large joints and most lower vertebra” indicated that he was a laborer of some sort, likely a farmer.1
Lesions on his ribs indicated that JB55 suffered from a chronic pulmonary infection like tuberculosis (known as consumption in the 19th century) or a disease with similar osteological indicators, like typhoid or syphilis. The symptoms of this chronic pulmonary condition would have been “coughing exportation of mucous, and aches and pains of the chest.”1 There were also post-mortem injuries to the body that included beheading and rib fractures that forensic anthropologists estimated happened about five years after death.2 The coffin also showed signs of being broken into. The osteological evidence of a lung infection was a critical detail because of its association with vampire or revenant folklore, more on that later.
Next to JB55’s grave were two individuals with the same last initial tacked onto their coffins. There was IB45, who was a 45-55 year-old female; and NB-13, a 13-14 year old juvenile. NB-13 would be critical in discovering the name of the Griswold vampire.1
At the end of July 2019, in an article written by Michael E. Ruane for the Washington Post, a research team comprised of scientists from the Armed Forces Medical Examiner System’s DNA Laboratory, the National Museum of Health and Medicine, and SNA International announced they determined the identity of JB55, 55-year old John Barber from Griswold, CT.3
Scientists took a DNA sample to develop Y-chromosomal DNA profile. The genetic markers from the Y-DNA test were cross-referenced with a genealogy database. Forensic genealogists concluded that the Barber family from Griswold best matched the DNA results.3,4
When researchers checked historical records, they found a death notice for a 12-year-old boy named Nathan Barber who died in 1826. The boy’s father was named in that obituary as John Barber. Nathan Barber closely matches what is known about NB13 buried near JB55.3
Prior to the modern understanding of disease transmission and postmortem decomposition, many European and European immigrants to America believed that a revenant, a sort of proto-vampire, was responsible for widespread sickness. The vampire was thought to prey on surviving family members, either by rising from their graves or through a “spiritual connection,” causing the victim to slowly waste away. When an epidemic of tuberculosis struck the northeastern United States in the 19th century, revenants were blamed for the outbreak and the response was the New England Vampire Panic.2
In order to confirm a case of vampirism, townspeople had to dig up the suspected revenant’s grave to look for signs that their beloved was a vampire. These signs included:1,2,4
- Copper-colored purge fluid around the mouth and nose or clotted blood in organs were the leftovers of a recent, bloody meal.
- A bloated abdomen meant that the decedent recently fed.
- Supposed lengthening of hair and nails was a sign of life after death
- Inexplicable preservation meant that a corpse was rising from its grave
In order to confirm a case of vampirism, townspeople exhumed the suspected revenant’s grave and looked for some of the above signs. If the corpse had any symptoms of vampirism, the body had to be ritually altered in some way to prevent it from climbing out of the grave. These post-mortem mutilations included beheading, pinning down, or turning the body over. Then the heart and internal organs were removed and cremated. By the time John Barber’s body was dug up in the mid-1800’s his body was mostly skeletonized, so townspeople broke open his ribs and removed his decomposing organs. Then they removed his head and placed it and his femurs on top of his chest. To alleviate symptoms, vampiric victims had to ingest the ashes from the cremated organs.1,2
The full text of the DNA test and results published in the open access journal Genes can be found here.
- Sledzik, P.S., Bellantoni, N. (1994). Bioarcheological and Biocultural Evidence for the New England Vampire Folk Belief. The American Journal of Physical Anthropology, 94. http://www.yorku.ca/kdenning/+++2150%202007-8/sledzik%20vampire.pdf
- Tucker, A. (2012) The Great New England Vampire Panic. Retrieved from: https://www.smithsonianmag.com/history/the-great-new-england-vampire-panic-36482878/
- Ruane, M.E. (2019). A ‘vampire’s’ remains were found about 30 years ago. Now DNA is giving him new life. Retrived from: https://www.washingtonpost.com/history/2019/07/31/vampires-remains-were-found-about-years-ago-now-dna-is-giving-him-new-life/
- Daniels-Higginbotham, J., Gorden, E.M., Farmer, S.K., Spatola, B., Damann, F., Bellantoni, N., Gagnon, K.S., de la Puente, M., Xavier, C., Walsh, S., Parson, W., McMahon, T.P., and Marshall, C. (2019). DNA Testing Reveals the Putative Identity of JB55, a 19th Century Vampire Buried in Griswold, Connecticut. Genes, 10 (9). Retreived from: https://www.mdpi.com/2073-4425/10/9/636/htm | <urn:uuid:78791860-0fee-4aa8-bc29-50c2383e7fa8> | CC-MAIN-2022-33 | https://strangeremains.com/2019/12/23/vampire-archaeology-how-scientists-identified-a-200-year-old-vampire/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.962628 | 1,592 | 3.125 | 3 |
Whats The Difference Between Dehydrated And Freeze
Freeze-dried and dehydrated foods look very similar, but theyre made using fairly different processes:
As mentioned earlier, dehydrated foods are made by exposing the ingredients to low level heat for an extended period of time. This allows the water inside to evaporate away.
Freeze-drying is a slightly more complex process. Fresh ingredients are frozen, kept at a low temperature, and exposed to low pressure. The procedure causes water in the food to phase from solid ice to gas, totally evaporating.
Is Dehydrated Dog Food Better Than Kibble
Because it is less processed than kibble, dehydrated dog food is indeed better for your pooch. The only caveat is that removing moisture can affect the nutrients of the food.
As such, you need to make sure to choose a nutrient-rich dehydrated food for your canine.
Your dog may also feel that dehydrated food provides a slightly less delicious meal than kibble.
Or, at least that it is different than what he is used to. That is because dehydration can affect the texture and taste of ingredients.
Grain: The Great Debate
Commercial dry foods are formulated with higher proportions of grain and grain-based products than their canned counterparts. Grain elements such as corn, wheat and rice are necessary for binding the formula into pellets and improving the texture. Grains such as corn, wheat and soy also can partially replace meat as a protein source, thereby trimming cost.
Intense debate wages over whether the ubiquitous grains in dry food belong in a dogs diet. Natural food advocates assert that dogs are carnivores that have no metabolic need for plant matter in their food.3 Others, including those in the pet food industry, assert that wild dogs are scavengers that regularly supplement their meat diet with grasses, berries, roots and other vegetable matter,4 not to mention the digested plant matter they inadvertently consume along with their herbivorous prey.
Recommended Reading: Iams Prostora Max
Lucy Pet Formulas For Life: Sensitive Stomachs
This version of Lucy Pet Formula is for sensitive stomachs and if your pet has a sensitive stomach, youll appreciate this food. There are other brands that hock sensitive stomach formulas, but they are all filler of corn with no nutritional value, so when Lucy Pet came on the market, it was quite an event. Made with four ingredients of salmon, pumpkin, chicken meal with chickpeas and quinoa, this recipe will surely settle your poochs stomach.
Buy: Lucy Pet Formulas for Life: Sensitive Stomachs $99.18
Iams Proactive Health Dry Dog Food
Iams Lamb and Rice Adult formula is one of 15 dry recipes included in our review of the Iams Proactive Health product line.
- First 5 ingredients: Lamb, chicken by-product meal, brewers rice, ground whole grain barley, ground whole grain corn
- Type: Grain-inclusive
- Other recipes: Large breed, small breed, puppy, chicken, turkey, senior weight management and more
- Price: $
- See all 15 available recipes
Iams Lamb and Rice derives a large portion of its animal protein from fresh lamb. Our dry matter label analysis reveals the recipe contains 28% protein, 16% fat and 49% estimated carbs which creates a fat-to-protein ratio of about 56%.
An affordable, classic design offering multiple recipe options. A top selection popular with veterinarians and professional breeders. Highly recommended.
Sample buyer reviewMy bulldog has terrible allergies and colitis, and even with taking allergy medication, so many foods worsened her problems. Even grain free limited ingredient dog foods did not help. This red bag lamb and rice iams formula is one of the very few foods she can eat and once I changed her to this food, along with her continued apoquel, her skin allergies are getting better and her hair is growing back, with no colitis flare ups.
Don’t Miss: Is Iams Dog Food Grain Free
Natural Balance Limited Ingredient Diet
The Natural Balance brand is excellent for dogs who need a specific diet. If your dog frequently gets upset stomachs and it isnt connected to an allergy, finding a protein source they enjoy and mixing it with a limited ingredient recipe may help. Made from one protein source, brown rice, brewers rice, and the protein sources meal base in this case, lamb meal, along with vitamins and nutrients needed to establish a healthy and simple diet. If your dog is picky about what she eats, then try a simpler recipe, it may work wonders for the both of you.
The Difference Between Freeze
Dehydration is one of the oldest methods of preserving food. Dehydrated dog and cat food is generally processed at low heat for a long time to draw out or evaporate any moisture out of the food. Each of the dehydrated food companies that we carry use different methods and temperatures to achieve this. I outline this below. In my research there definitely seems to be more variation and uniqueness in the processes used to dehydrate than to freeze- dry pet foods.
Foods dehydrated at higher temperatures are not considered completely raw, but very lightly cooked as the moisture is removed. Cooking denatures many of these nutrients including delicate enzymes, vitamins, minerals and amino acids, affecting the nutrition of the product.
Dehydrated dog food is usually harder than freeze-dried food and takes longer to rehydrate.
Some of the dehydrated food companies that we carry:
The Honest Kitchen on their dehydration process Most of our raw ingredients are dehydrated below 104 degrees F and are therefore still considered raw and the meats and eggs in our foods are dehydrated at a high enough temperature to kill any pathogenic bacteria that may be present, and the required temperature for this is essentially equivalent to cooking.
They use 100% renewable energy, so they are not contributing to green house gasses. The dehydration temperature never above 125 degrees.
Other companies that some of the stores carry are Addiction , Hurraw , and Wellness dehydrated.
You May Like: Is Iams Dog Food Any Good
When To Consider Dehydrated Dog Food
Dehydrated dog food is sometimes recommended for pups with food allergies or a sensitive stomach. Amazons No. 1 bestseller for dehydrated dog food, The Honest Kitchen Human Grade Dehydrated Grain Free Beef Dog Food, uses high-quality produce and meat to make an easily digestible, nutritious meal.
One review from dog mom and veterinary professional m.badgleypraises this foods nutritional value and whole ingredients. Many reviewers also love having a grain-free option, which may make carbohydrate-based digestive issues less prevalent as well.
From nutritional gain to ease and convenience, pet parents have many reasons to be interested in dehydrated food for their dog. Theres been evidence of many positive changes resulting from this diet, and with the popularity of raw and dehydrated foods still growing, even more are sure to come. When in doubt, you can always ask your veterinarian for guidance thats what theyre here for, after all!
Do I Have To Be An Iron Chef
Heck no! If I can do it, then you can do it. Basically you need a dehydrator, a good knife and mandolin, and something to store the treats in. Making dehydrated foods for cost saving dog treats doesnt require a lot of expertise. You simply need to slice the food to the desired size and allow it to dry in the dehydrator. This is the basic process. Some foods may require modifications, like jerky sticks.
While there are several methods of making homemade dog treats, including baking, we like the dehydration method for its simplicity! And the fast that the treats retain much of their nutritional value and preserves the food for quite some time when properly stored.
Recommended Reading: Where To Buy Pedigree Dog Food
The Honest Kitchen Company Overview
The Honest Kitchen brand started inside owner Lucy Postins kitchen. Postins would regularly cook meals for her dogs while making meals for herself. She would often use the same organic ingredients she used in her own meal, in her dogs meal. Soon she noticed how her Rhodesian Ridgeback, Mosi, started growing stronger, had fewer attacks of skin & ear infection, and was more active.
Seeing this, Postins started commercially creating and selling her kitchen-based dog food in the market, and Honest Kitchen was born a dog food brand that uses wholesome ingredients and honest production practices to create premium-quality dehydrated, dry dog food and wet dog food products.
What Should Dogs Eat Instead
The optimal diet for dogs includes fresh, whole foods made from human-grade ingredients. They should be grass-fed, free-range and organic, if possible.
The optimal diet for your dog also includes healthy fats, high moisture and is a healthy balance of protein, carbohydrates and other nutrients. A great way to feed this balanced diet is with raw food.
A raw diet for dogs includes simply fresh, whole foods that are uncooked and minimally processed. Meats and greens that are fresh, uncooked and wild make up the diet that dogs and cats evolved to eat. Its what canine species in the wild still eat.
Raw food is more easily absorbed and contains vital naturally occurring enzymes and vitamins that cooking destroys. Living foods that are unprocessed, fresh and whole enable our pets to thrive. And its the diet that lets dogs be their happiest and healthiest.
Fun fact: Humans are actually the only species to cook their food and while your loving pups may be like family, that doesnt mean they should eat like we do!
Finally, if you do choose to feed dry food, choose an organic option with no “4-D” meat: This is meat taken from dying, diseased, disabled and dead livestock that is not fit for human consumption. Look for dog food brands that use human grade meats, which contain much more specific meat ingredients rather than generically named meat sources.
Don’t Miss: Can You Buy Dog Food With Food Stamps
How Bad Are They
As a general rule of thumb, owners should avoid dog food formulas with ingredients they wouldn’t consume themselves.
Who wants to eat dead, dying, or diseased meats? This particular ingredient is especially harmful to dogs because owners will never know the exact source.
High-quality formulas contain all-natural protein from healthy animals. However, 4-D meats are often full of chemicals, hormones, steroids, and much more.
Not only that but these rejected and discarded meats may harbor potentially deadly extras. For example, sick and dying animals can contain all kinds of diseases.
The same goes for roadkill that may harbor a slew of bacteria and parasites.
Even seemingly innocuous sources like expired meat from a grocery store may be thrown into the formula without even being removed from the package. Because of the uncertainty with 4-D meats, dogs can be exposed to a lot of harm.
Steroids, insecticides, and growth hormones can affect the way they develop and grow while chemicals and parasites can lead to a variety of health issues like cancer.
Corn and grains are bad for dogs because they aren’t built to consume these ingredients on a regular basis. Dogs are carnivores through and through. They don’t have the right teeth to grind up grains.
As a result, many dogs can develop digestion problems. The influx of GMOs, insecticides, and mold on corn and grain products can also lead to cancer and allergy issues.
The Truth Behind Raw Dehydrated Dog Food: Is It Still Raw
Dehydrated foods may not seem as raw as fresh-raw or frozen-raw foods, but its important to know that they are, in fact, raw. Dehydrating dog food removes so much moisture that it stops meat and produce from the decay process without the need for any preservatives. Dehydrating is also more gentle on biological materials such as enzymes and vitamins, so they remain intact during storage and become extremely shelf-stable. This is good news for you and your dogs.
Don’t Miss: Is Iams Dog Food Grain Free
The Worst Dry Dog Foods
While most owners don’t realize it, bad dry dog food can make dogs sick and unhealthy over time. Cheap ingredients are used to make dog food more affordable.
Unfortunately, the inclusion of many unhealthy ingredients can lead to obesity, cancer, and much more.
Some ingredients are used as filler to replace natural proteins. They add empty calories without much nutritional content.
Other ingredients come from questionable sources and contain harmful additives or chemicals.
Kibble Is Not Better Than Canned
Canned food is preserved by the process of canning but most kibble is preserved artificially.
Kibble begins as a dry cooked meal while canned food is canned fresh. Kibble is exposed to more heat than canned . Worse yet, kibble is linked to bloat, a deadly problem, especially for large, broad-chested dogs. Its also dehydrating. Of course, canned isnt perfect either. Fresh is best, raw or cooked. Next best is frozen pre-made raw food, and then freeze-dried raw, followed by dehydrated foods. These are all available at better pet stores.
Read Also: Iams Response Fp
The Honest Kitchen Dog Food Review
Many dog food brands make unreasonable promises about the health benefits their products offer pet dogs. But not Honest Kitchen. As the brand says, they make only honest promises, and they keep these promises. If youre looking for a dog food option which can bring about positive health results in your beloved pet, then the Honest Kitchen dog food range is a good option to choose.
What To Look For In Kibble
Read the label. Look for a food that has a protein as the first ingredient, not a grain. The best kibbles have a single source of protein, such as lamb or chicken. Grain-free diets exist, but carbohydrates are required for energy, and the choice of grain is important since some dogs have sensitivities to wheat, corn, or soybeans.
Read Also: Who Makes Dr Pol Dog Food
Whole Earth Farms Dry Dog Food
Whole Earth Farms Adult recipe is one of 2 kibble recipes included in our review of the Whole Earth Farms product line.
- First 5 ingredients: Chicken meal, turkey meal, brown rice, oatmeal, barley
- Type: Grain-inclusive
- See both available recipes
This Whole Earth Farms product derives the bulk of its meat protein from chicken and turkey meals. Our dry matter label analysis reveals the recipe contains 29% protein, 16% fat and 47% estimated carbs which results in a fat-to-protein ratio of about 54%.
A quality yet affordable, grain-inclusive kibble made by Merrick. Highly recommended.
Sample buyer reviewI recently switched to this food due to the recent controversy over Grain Free. This was the only affordable food I found with quality ingredients listed. My dogs love it and it will be the only food I fees from now on.
This Holistic Select formula derives most of its meat protein from fresh salmon, as well as anchovy and sardine meal. Our dry matter label analysis reveals the recipe contains 32% protein, 16% fat and 44% estimated carbs producing a fat-to-protein ratio of about 48%.
An exceptional grain-free dog food offering numerous recipe and flavor options. Highly recommended.
Best Budget: Stella & Chewys Freeze
Stella & Chewyâs Freeze-Dried Raw Stellaâs Super Beef Meal Mixers Grain-Free Dog Food Topper
- Lifestage: All Stages | Breed Size: Small Breeds, Medium Breeds, Large Breeds
- Flavor: Chicken | Form: Raw
- Ingredients: Chicken with Ground Bone, Chicken Liver, Chicken Gizzard, Pumpkin Seed, Organic Cranberries
- Protein: 48% | Fat: 28% | Fiber: 5% | Moisture: 5%
- Not Contain: Grain, Gluten, Hormones, Antibiotics, Potatoes
Freeze-dried dog food doesnt have to be expensive. You can get an affordable pack like this Super Beef Meal Mixers from Stella & Chewyâs. The meal is chicken flavored and consists of 95% cage-free chicken meat, which is very healthy.
This meat is blended with chicken organs, bone, organic fruits, and vegetables to give your dog a healthy, 100% balanced mix. As such, it is ideal for supporting healthy growth in all life stages for all kinds of dog breeds.
Feeding can be done in a dry or rehydrated form, in which this requires 1/2 cup of water per cup of food. There is a feeding guide on the pack that clearly shows you the dog weight to cup/scoops to serve, which should be referenced for day-to-day feeding.
The only problem is that the ground bone can pose a risk if they get stuck on your dogs throat.
You May Like: Does Dog Food Taste Good To Dogs
Which Is Better Freeze Dried Or Dehydrated Dog Food
Freeze drying preserves more of the nutritional content of the food than dehydrating, as proteins, vitamins, and minerals stay intact due to freezing before drying. The process of air-drying food, while similar to dehydration, produces an extremely nutrient-dense food with scoop-and-serve convenience.
Muenster Natural Adult Dog Food
This dog food formula is natural, but that doesn’t mean that its necessarily good. The main protein source is chicken meal rather than wholesome chicken.
There’s also ground corn, wheat, corn gluten meal, brown rice, and grain sorghum. It also contains sugary beet pulp and citric acid. In all, the formula can cause weight gain, digestive issues, and more.
Don’t Miss: What Dog Food Is Comparable To Nutro
Dehydrated Or Air Dried Dog Foods
The biggest difference is that when you buy freeze-dried food, its still raw. Thats not really true of dehydrated or air-dried foods.
Freeze drying may sound the same as air drying, drum drying or dehydrating. But theyre different. The non freeze-drying technologies are similar ways of removing moisture from food and they all use heat.
The manufacturers claim the food isnt technically cooked due to low temperatures. But it does get slightly cooked. So the structure of the food changes and there is more nutrient loss.
Most companies are very careful not to tell you what temperatures they use. They want you to think their products are raw or almost. But you can assume they use temperatures between 1400 and 180OF. So I guarantee you that dehydrated or air dried food isnt raw. In fact, I can slow roast a slab of pork ribs at 180o and they definitely come out cooked!
One selling point of these foods is that they have less pathogens than raw or freeze-dried foods. One air-dried food company states that they use temperatures the FDA and USDA consider a kill step.
Another company I asked told me:
Well . thats a bit confusing. But you cant have it both ways. If the food is heated enough to be a kill step, its not raw!
Dehydrated foods are still much better than kibble. Theyre less processed and cooked at lower temperatures so they suffer less nutrient loss. If freeze-dried isnt in your budget, dehydrated or air-dried foods can be a decent option. | <urn:uuid:2fbc9fe2-6f02-443a-9ece-68c77d6b47a1> | CC-MAIN-2022-33 | https://www.dogfoodtalk.net/is-dehydrated-dog-food-good-for-dogs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.942175 | 4,104 | 2.28125 | 2 |
“There is an urgent need to provide housing facilities for sex workers just like all marginalised communities and we are ready to recommend to the government to provide free houses and education for the children of sex workers,” said MG Paly, General Manager, Karnataka Women Development Corporation here on Sunday.
BT Venkatesh, eminent advocate and former State public prosecutor said: “Sex work is work and sex workers deserve respect and dignity for which they are fighting for over 25 years. Now it is important to make sure that the Supreme Court directives are implemented.”
Representing the department at the Symposium on challenges faced by Sex Workers and the current issues of sex workers in the wake of the recent Supreme Court directives, Paly said proper enrolment should be made with the help of other departments like SLSA and NGOs.The programme was hosted by Karnataka Sex Workers Union in collaboration with Solidarity Foundation and National Network of Sex Workers under the aegis of Sangama. Members of 18 different NGOs, CBOs, civil society organisations, progressive movements, farmers’ organisations, labour unions and social work students attended the symposium at the SCM House. About 45 female sex worker delegates from across the State representing more than 10 districts joined 60 others for the three-day event.
The Sex Workers Union leaders demanded the repeal of Immoral Trafficking Prevention Act (ITPA) which criminalises all aspects of sex worker including brothel keeping, brokers (‘pimps’), adult children living on income of sex workers, soliciting et al. Bhagya, a senior sex worker leader said: “We demand full decriminalise of these aspects around ITPA. The archaic law should be repealed.”
Poorna R, Advocate and activist from Alternative Law Forum explained the different aspects of the recent Supreme Court guidelines which directed the National Legal Services Authority to make sure that sex workers are not treated like victims. “The SC order is good for the street-based sex workers but it continues to criminalise brothels and brothel-based workers. But this is a good tool in the hands of sex workers to fight systemic violence,”
Prof Neethi of Indian Institute of Human Settlements and Anant Kamath, who authored a forthcoming book on sex workers spoke about their research and the book.
Earlier in the morning session, at the Sex workers dialogue with other organisations, CS Dwarakanath said that sexworkers are a backward class. When he was the chairperson of the Karnataka Backward Classes Commission, the commission did a detailed study and submitted a report to the Government of Karnataka recommending sex workers to be included in BC 2A category. No action was taken on successive governments in the past 12 years.“
JM Veerasangaiah, a veteran leader of Karnataka Rajya Raitha Sangha extended his support to sex workers movement and spoke about the contribution of a sexworker Shantavva, who built Sulekere, the second largest built lake in Asia in 11th or 15th century. It is located in Channagiri taluka of Davanagere District in Karnataka and irrigates 4,700 acres of land and more than 170 villages are benefited by it.
Nandini of ActionAid said that “we should not be moralistic on matters of sexuality. All of us use some parts of our body for work, sex workers may use some other parts of the body for their work, it should make no difference to us and they should get all rights as a worker.”
KSWU leaders also demanded
- recognise sexwork under labour laws and provide us all the rights and benefits available to other workers
- provide housing for sex workers who don’t own a house
- provide pension and alternative livelihoods to retired sex workers (above 40 years age)
- educational scholarships, hostel facilities for children of sex workers
- care centres for children of sex workers during sex work timings | <urn:uuid:6ca19d3e-8272-4feb-8b58-7ce3590e7ebb> | CC-MAIN-2022-33 | https://newstimenow.com/karnataka-sex-workers-union-symposium/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.95394 | 822 | 1.507813 | 2 |
I’ve been taken to task. When discussing the multi-meaning ‘grand’ here last month I referred to Irish words that have gone on to enrich the English language. Such as ‘Tory’, which I described as “that most offensive word . . . from the Irish ‘toraidhe’, for a plunderer.”
I was, of course, being very political there, not feeling particularly well disposed to Britain’s current Tory or Conservative Party.
A reader disagreed with my translation of the word as 'plunderer'. "Not so, quite the opposite," he said. "In old Ireland cattle raiding, or creach, was very common. The word being 'creach', (for) plunder, creachadoir, for plunderer." My kind interrogator continued that "in actual fact Torai was the owner in pursuit, trying to get them back, the cattle from the toir".
Tories were also known as raparees, as he said, and existed in the 1650s when Leinster and Munster men, who refused to go to hell or to Connacht at Cromwell's bidding, took to the mountains, bogs and forests and harassed the planters and soldiers of the occupiers.
Bless them. Nowadays Leinster and Munster men prefer instead to take lumps out of one another on the rugby pitch, with both sides still resisting attempts to get them to Connacht.
What our reader highlights is the huge significance of perspective when it comes to words, too. One person’s heroic raparee is another’s uncivilised plunderer. Last month I opted for the latter as appropriate for members of Britain’s current Tory party. And I am unanimous in that, as Mrs Slocombe used say in the TV series Are You Being Served?
Further research has allowed me establish that we Irish peasantry used the word Tory as an offensive term well into the 19th century. Why should we stop there?
It was first used in England during the 16th and 17th centuries to describe those of our dispossessed ancestors who took to the woods, formed bands (no, no, no, not like U2!) surviving on wild animals and stuff robbed from settlers who had taken their lands.
What’s not to like, if you’re Irish and not allowed in the parlour?
Indeed, does it not seem offensive to all who went before us that the word is used today to describe Britain’s Conservative party?
What a falling off is there!
Tory, from the Irish toruidhe or toruighe, `to pursue' or `to hunt'. | <urn:uuid:9ef836c1-5e8f-4577-bfaf-b381e2c208c6> | CC-MAIN-2022-33 | https://www.irishtimes.com/culture/in-a-word-tory-1.4880009 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.96617 | 584 | 2.734375 | 3 |
DAWGS philanthropy efforts have touched many lives:
Helping Veterans realize a brighter, better future
Giving a homeless family hope and a new furnished home
Providing opportunities for inner city teenage girls to live happier and healthier lifestyles
Rescuing dogs that have been abandoned
Providing employment opportunities for individuals with developmental disabilities
Alderman Brookins (far left) with Commander Hendricks’ and the Legion Post Veterans
DAWGS donated steel security panels to secure the former home of blues legend Muddy Waters. The former residence is being transformed into Muddy Waters MOJO Museum and cultural center. Its mission is to preserve and protect the Muddy Waters legacy, house, and story through educational experiences, music inspiration and community services.
DAWGS sponsored the 2021 Curb-Ball Tournament for the non-profit Friends of Parkside (FOP), based in East Detroit. The organization provides educational and employment-related resources for children through age 17. As a 2021 sponsor for the tournament, DAWGS provided all the t-shirts for participating children and volunteers.
DAWGS Sponsors COVID-Compliant Halloween Event for Detroit Non-Profit Friends of Parkside
DAWGS recently sponsored a non-profit organization, Detroit-based Friends of Parkside’s COVID-compliant Halloween event. The celebration included reverse trick-or-treating, a costume contest and prizes for the best Halloween decorated porch.
Giving a Family Hope and a Home – DAWGS and Humble Design
DAWGS Day of Service with Humble Design resulted in providing a fully furnished apartment and a new laptop to a deserving mother and her children. A hard working mother, a victim of domestic abuse was able to move out of a shelter and into a safe home for her family.
Enriching Inner City Teenage Girls Lives – DAWGS and Lipstick Saints
DAWGS sponsored the Lipstick Saints annual “No Boys Allowed” workshop. This workshop is a girls empowerment session, centered around the sport of basketball. The event included an inspirational talk from guest speaker Shajaunna Jordan, Owner of the GWGA team, Chicago Breeze.
Providing Employment and a New Legion Post for Veterans – DAWGS and Legion Post #2091
DAWGS has a long history of giving back to those who have served in the US Military. When Chicago’s American Legion Post #2091 was in need of a new location, DAWGS donated time and materials to secure the post during the rehabilitation. In addition to the donation, DAWGS hired veterans to work on the project.
Providing Jobs to Individuals with Developmental Disabilities – DAWGS and Shore Community Services
DAWGS uses Shore Packaging Solutions to sort and re-kit their equipment once it is removed from a property. The relationship has been a win-win for DAWGS and Shore Services. DAWGS receives competitively priced, quality packaging services while Shore is able to provide work for 20 employees through this recurring project.
Securing a Better Future for Local Veterans – DAWGS and Lights of Honor International
DAWGS donated their vacant property security services to a local non-profit Lights of Honor International during the rehabilitation of a property earmarked for veterans in need. Once restored, the property, obtained through the Freddie Mac Home Steps Program, will serve as a new residence for veterans and their families.
DAWGS Rescuing Dogs
DAWGS doesn’t just keep vacant properties secure, they have saved and rescued many dogs while in the field. Paul Schornak, Eastern Regional Manager for DAWGS has himself rescued a total of eight dogs. Some were found roaming the streets or in vacant property he was securing – he managed to coax them into his car and take them to a non-kill animal shelter. | <urn:uuid:cc2f161b-7b23-4f9a-a8a7-3cdf6a38b920> | CC-MAIN-2022-33 | https://www.dawgsinc.com/community-outreach/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.941284 | 795 | 1.617188 | 2 |
Studying Singapore Before 1800
by Kwa Chong Guan and Peter Borschberg
with the assistance of Benjamin Khoo
Historians rely on Singapore’s strategic position to explain its great success as a royal trading port in the 14th century, and as a British colony after 1819. What, then, accounts for the many centuries when it seemed not to thrive, and was seen in the words of John Crawfurd as “only the occasional resort of pirates”? This seeming paradox sits uneasily at the heart of Singapore historiography, and over time historians have suggested a variety of ways to resolve it.
This volume collects studies about Singapore before 1800, bringing together different efforts across the 20th century at reconstructing Singapore’s “missing years”. Some authors have found additional details by scouring ancient and early modern texts for references to Singapore, and by reading well-known classics such as the Sejarah Melayu against the grain. Others have built narratives that bridge pre- and post-1800 perspectives by positioning Singapore within long-term global history.
These efforts have yielded a much richer understanding of Singapore’s changing fortunes before 1800. The articles collected in this volume represent key milestones in this effort. Many are hard to locate, and two pieces are translated from Dutch to English for the first time. They are presented here with an introduction from historian Kwa Chong Guan.
"Kwa and Borschberg have been exploding the myth that Singapore began with Raffles. Now with this fine collection of essays, they not only open up all types of perspective on early Singapore but also show how exciting the writing of history can be." – Anthony Milner, Australian National University
"The editors of this volume have done us a great service by bringing together the learned efforts to uncover Singapore’s early history. The authors of the papers had picked through every record, every story, and exhausted the documentary evidence to explain why the island did not become a success story after the 14th century. I commend Kwa Chong Guan’s masterly introduction that reviews how those who insisted on having Singapore’s history begin in 1819 had put earlier scholarship aside."-- Wang Gungwu, National University of Singapore
“The publication of this work could not have come at a better time. …the book is an important reminder of an older, deeper and longer history that has sometimes been forgotten…” -- Farish Noor, The Straits Times
Kwa Chong Guan is an adjunct associate professor in the Department of History at the National University of Singapore.
Peter Borschberg teaches history at the National University of Singapore. He is also a visiting professor in Modern History at the University of Greifswald.
Publication Year: 2018
600 pages, 254mm x 179mm
15 colour images
48 b/w images | <urn:uuid:73486627-ee12-44ef-9299-e56a0a233144> | CC-MAIN-2022-33 | https://nuspress.nus.edu.sg/products/studying-singapore-before-1800 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.940281 | 620 | 2.21875 | 2 |
Short notes on the structure of a muscle fibre
The muscle tissue is made up of elongated thin cells called muscle fibres and they are held together by areolar tissue. There is no intercellular tissues between the muscle cells and there is also no matrix. The cytoplasm of muscle fibres is called sarcoplasm. Embedded in the cytoplasm are a number of long, fine, parallely arranged protein fibres called Myofibrils. These are arranged along the long axis of the fiber.
The spaces between the myofirbrils are occupied by a large number of mitochondria (sarco- somes) and glycogen granules. These granules provide the energy necessary for contraction. In some instances the muscle fibres may be bounded by a special membrane called sarcolemma. The muscle fibres may have one too many nuclei. | <urn:uuid:b0aa3851-0921-46bd-872f-4d0c1c3c70ff> | CC-MAIN-2022-33 | https://www.preservearticles.com/notes/short-notes-on-the-structure-of-a-muscle-fibre/28014 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.952873 | 186 | 3.703125 | 4 |
Researchers provide multiple lines of evidence to assess the species status of these plovers.
The recent surge in genomic resources allows ornithologists to uncover extremely fine-grained population structure. In a book chapter that I wrote with several colleagues, you can read that “In the past, statistical power from only a small number of genetic markers from distant regions of the genome has often been insufficient to unveil weak population structure, and increasing the number of markers has clearly shown that more markers give better signals.” This rise in resolution raises an important issue: Will a more fine-grained picture of population structure lead to the splitting of more and more species? Several recent papers on plovers (genus Charadrius) highlight this conundrum.
Are the Kentish Plover (C. alexandrinus) and the White-faced Plover (C. dealbatus) different species? Opinions about the species status of these two plovers vary and several researchers have attempted to answer this question using genetic data. In 2011, Frank Rheindt and colleagues used three mitochondrial and seven nuclear DNA markers to describe the genetic situation among these plovers. Despite clear morphological differences, they failed to find genetic differentiation between Kentish and White-faced Plover. They speculated that “diagnostic phenotypic characters may be encoded by few genes that are difficult to detect” or that “gene expression differences may be crucial in producing different phenotypes”.
Fast forward to 2019, when Xuejing Wang, Pinjia Que and co-workers revisited these plovers using three mitochondrial and sixteen nuclear loci. Their analyses revealed a clear genetic difference in the mitochondrial DNA: the species formed distinct groups in the haplotype networks. The nuclear networks, however, could not confidently discriminate between the putative species. This result is in line with the speculation from the 2011 study, namely that diagnostic phenotypic characters may be encoded by few genes.
To really know whether the morphological differences between these birds are encoded by a few genes, there is only one solution: sequence the whole genome! And this is exactly what Xuejing Wang, Kathryn Maher, Nan Zhang and colleagues did. As expected, comparing the genomes of Kentish and White-faced Plover showed low levels of genome-wide differentiation. However, the researchers did find a few differentiated genomic regions (so-called “islands of differentiation”) which might hold the key to the morphological differences. Which genes are in these regions and how they might contribute to species-specific differences remains to be investigated.
Multiple Lines of Evidence
In summary, the genetic differences between Kentish and White-faced Plover are concentrated in a few differentiated islands while the rest of the genome is largely undifferentiated (genome-wide Fst = 0.046). To come back to the question posed in the beginning: Are these genetic differences sufficient to consider these plovers distinct species? As I have argued in other blog posts (see for example here, here and here), the answer is clearly no. Taxonomy has become pluralistic, requiring multiple lines of evidence to justify lumping or splitting species. Luckily, the authors of the papers mentioned above provided some insights into the morphology, ecology and demography of Kentish and White-faced Plover.
There are clear morphological differences between these birds: White-faced Plovers lack the dark eye ring found in Kentish Plovers. Plumage-wise, they show lighter patterns and a brighter cinnamon cap. Moreover, Whiter-face Plovers have, on average, longer beaks, longer wings and a larger body mass. The differences in bill size suggest that Kentish and White-faced Plover use different food sources. This suggestion is supported by a stable isotope analysis which provides insights into the diet of these birds. It turned out that White-faced Plovers probably feed on a higher energy diet compared to Kentish Plovers. Finally, the genomic analyses mentioned above revealed distinct demographic histories. The population size of Kentish Plover increased, while the number of White-faced Plovers decreased during the Last Glacial Period.
Synthesizing all the results (based on genetics, morphology, ecology and demography), we can conclude that Kentish and White-faced Plover can be considered “independently evolving metapopulation lineages” and are thus – according to the General Lineage Concept – distinct species!
De Queiroz, K. (1999). The general lineage concept of species and the defining properties of the species. Species: new interdisciplinary essays. MIT Press, Cambridge, MA.
Ottenburghs, J., Lavretsky, P., Peters, J.L., Kawakami, T. & Kraus, R.H.S. (2019) Population genomics and phylogeography. Avian Genomics in Ecology and Evolution – From the lab into the wild (Edited by Kraus, R.H.S.), pp. 237-265, Springer Nature.
Rheindt, F. E., Szekely, T., Edwards, S. V., Lee, P. L., Burke, T., Kennerley, P. R., et al. (2011). Conflict between genetic and phenotypic differentiation: the evolutionary history of a ‘lost and rediscovered’ shorebird. PLoS One, 6(11).
Wang, X., Que, P., Heckel, G., Hu, J., Zhang, X., Chiang, C. Y., et al. (2019). Genetic, phenotypic and ecological differentiation suggests incipient speciation in two Charadrius plovers along the Chinese coast. BMC Evolutionary Biology, 19(1), 135.
Wang, X., Maher, K. H., Zhang, N., Que, P., Zheng, C., Liu, S., et al. (2019). Demographic histories and genome-wide patterns of divergence in incipient species of shorebirds. Frontiers in Genetics, 10, 919.
These papers have been added to the Charadriiformes page. | <urn:uuid:b501d3ce-fcd1-4a3c-af29-dca680cd100b> | CC-MAIN-2022-33 | https://avianhybrids.wordpress.com/2020/03/14/beyond-genetics-how-different-are-kentish-and-white-faced-plover/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.9066 | 1,275 | 3.890625 | 4 |
Student Rights & Responsibilities
Students shall be treated with dignity, respect, and fairness by other students and staff. Students shall be provided with a learning environment that is free from any type of abuse such as: physical, emotional, and social abuse.
Students and parents shall be informed of the board’s and school’s expectations for student behaviour within the school, the school grounds, and during school activities.
In the event of student misbehaviour, students and parents shall have the right to offer an explanation, and to be informed about consequences of misbehaviour.
Students shall exercise their responsibilities to:
- Use their abilities and talents to gain maximum learning benefits from their school experiences, and participate in their learning
- Contribute to a climate of mutual trust and respect conducive to effective learning, personal development, and school community
- Report threat or risk related behaviours to school staff
- Attend school regularly and punctually; and dress appropriately
Students shall be responsible and accountable for their behaviour and conduct:
- While involved in school-sponsored or related activities
- While on school property
- During any recess or lunch periods on or off school property
- While traveling to and from school
- In vehicles used for the transportation of students to and from school and school activities
- While engaging in electronic communication both on and off school property
- Beyond the hours of school operation if the behaviour or conduct detrimentally affects the welfare of individual students or the governance, climate, or efficiency of the school(s). | <urn:uuid:c59cb2f6-aafa-4ac2-a4bb-5a8a234469af> | CC-MAIN-2022-33 | https://school.cbe.ab.ca/school/JoaneCardinalSchubert/culture-environment/conduct/behaviour/Pages/Default.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.95629 | 310 | 2.71875 | 3 |
Well, you have to listen to your own internal compass.
I’ll be honest with you right now, but I don’t think that is actually great advice if you literally are lost in a forest, but I’m trying to do the whole analogy thing and paint a picture for you, okay?!
Well I’ll stop being all whimsical and get to the point.
Sometimes, when we are totally lost in our lives and we don’t know what advice we should take and which direction we should choose, we really need to take a deeper look inwards. We need to take a look at our feelings and figure out what we really want and start listening to that.
This may seem a bit obvious, but a lot of the time, we are moving on autopilot and just going through the motions of life instead of actually doing what feels right to us. Then one day we realize that we are not where we want to be at all, which can cause stress, disappointment, depression, and the feeling of being completely lost.
First, you will need to do some serious self-reflection. Then, once you have figured out what you want, start taking action.
So let’s start with Self Reflection
Something that might help with this would be to write some of these things down in a journal. Some of the questions can make good journal prompts to get you going.
Step 1 – Figure out what is going wrong.
Ask yourself what is going wrong in your life right now. Why do you feel lost? Is there something missing in your life? What might you have too much of in your life (maybe you have too many stressors)?
Step 2 – Figure out what is going right
Maybe not everything in your life is so bad. There could be some good things too!
It’s important to reflect and see what you are enjoying in your life so that you can start doing more of it and enjoying yourself more.
You can ask yourself some of the following questions:
- What has made you laugh recently?
- What has made you feel energized?
- Who makes you feel good when you are with them?
Tip: Try to do this at the end of each day for a week or so to get a good feel for what might consistently be bringing you a bit of joy.
Step 3 – Imagine Your Ideal Life
When you are feeling lost, a good idea is to remind yourself of what you ultimately want in life. This can help you to inspire you and give you some motivation!
Ask yourself how you want to feel, what you want your career to be, who you want to be surrounded by, etc.
Step 4 – What things are standing in the way of this ideal life?
Are there people standing in your way?
Are there things that you are doing that could be self-sabotaging? Is your career standing in your way?
Is anxiety standing in your way?
There could be many factors, so it’s important to spend some time on this and really assess what is going on.
Step 5 – Remove (or reduce) the negative pressures in your life
This is something that was a major cause of my anxiety for a long time and when I finally answered this question, my entire world changed.
I had spent so long trying to fit this life plan: go to school, get your degree, settle down with someone, work until you’re 65, then be too old to enjoy your time off. And I thought was the “right” way to live life and that it was basically the only option.
This was a combination of social pressure and pressure that I had put on myself.
But, once I started asking myself what I really wanted from life and realized that this expectation of me to live my life a certain way didn’t matter, everything started to change, and I essentially found my direction again.
So are there certain things that you think you have to be doing or things that people in your life are telling you that you should do?
If so, you need to start re-evaluating them to see if you actually need to live your life this way.
Once you have reflected on your current state, it is time to make a plan and take action so you can find your direction and follow it!
Step 6 – Find Your Top 3 Action Steps
Write down some steps that you could take to get what you want.
Reflect on the ideal life you thought about in the first section.
Write down 3-5 steps that you could take to reach that life that you want.
Step 7 – Break tasks from above into smaller task
Basically, you want to be able to have a set of easily actionable tasks that can get you to where you want.
To get to your dream life, this is going to be a huge list. But to arrive at a point where you feel how you want to feel, this list can be a lot shorter.
I’m definitely going to sound cliché here, but you want to enjoy the journey as much as the destination (ugh, ya I know I’m cheesy, but it’s true!), so you want to make sure that you feel great even while you are trying to create your dream life (or at least while you are finding your direction).
Step 8 – Create daily tasks
You can break the tasks you identified in step 7 into even smaller, daily tasks.
The best way to find motivation and get your life back on track is to start doing small things every day. It’s the small things that create BIG CHANGE.
Step 9 – Do one of these steps!
If you just start and make a bit of progress in the right direction, no matter how small, it is still progress. You will feel so much better and you will definitely feel less lost.
Step 10 – Make a plan to work towards your goals/that feeling that you want
Even if you are super busy, you can still spare 5-20 mins per day working towards that life that you want.
So take all of those little steps from step 8 and put them into a calendar – and start getting them done!
Once you have a plan, it will start making things real and you feel like you are back on track with your life again.
That’s what happened with me – I was so lost when I got out of school. I had no idea what I wanted, but I just took a few steps in the right direction by figuring out what I really wanted and it was seriously amazing! And from that point, it took me about 2 years to really start living my ideal life, but I still had a plan and hope, so the journey was honestly not too bad getting there.
Actually, I read this book: The Desire Map by Danielle Laporte and it really helped me find my direction again and get me back on track. She has a great style of writing and she’s very funny and real. It also comes with a workbook to help you dig down into what you really want.
So if you want some extra tips on how I started to make a plan to get my life back on track, you can check out my free Dream Life Goal Planner below! I
t comes with an awesome journaling exercise to figure out what you want (in more detail than this post) and then it gives you some serious concrete ways to start planning your goals and working towards an awesome life! I’m also working towards making a mindset training course – which is going to dive deeper into creating better habits that will keep your mental health on track as well as help you towards any goals that you have! You can sign up below! | <urn:uuid:9813f302-e7a4-4bd2-959a-99fa27d9e62a> | CC-MAIN-2022-33 | https://www.mindaya.com/10-tips-for-motivation-when-you-feel-totally-lost/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.971799 | 1,614 | 1.59375 | 2 |
Is Financial Data the Key to Surviving Record Inflation?
July 12, 2022 | 2 min read
< Back to Blog
August 8, 2018 | 0 min read
NOTE: This article was originally published Aug. 7, 2018 by MX partner FIS, here: https://www.risewithfis.com/keeping-it-clean-the-power-of-clean-data
By Peter Chapman, Vice President – Partnerships, MX (an FIS partner)
Today’s tech-savvy consumers expect highly engaging experiences across all platforms and at every touchpoint. And delivering on their growing demands starts with clean data. It’s at the foundation of everything—from chatbots and analytical reports to targeted marketing and alerts. If the data isn’t clean, chatbots can’t answer even the most basic of questions, analytics dashboards aren’t useful, digital marketing isn’t personalized, and alerts are inaccurate.
When your customers purchase items, their transactions usually show up in a cryptic format. This unintelligible information can leave them frustrated. Consumers can’t distinguish if what they’re seeing is their transaction or a fraudulent charge. Moreover, it makes it nearly impossible for them to create budgets, track spending, and plan ahead. It also makes it hard for you to understand their transaction types, preventing you from offering products that align with customers’ needs. Below are the three steps to clean and actionable data:
1. Cleansing dataThe first step to clean data is cleansing. That means taking transactions like this: “COSTCxx 04ROCHESTER XXX726 XXX-XXX-1189 XXX027” and turning them into this: “Costco | Shopping | Point of Sale.” When your customers can easily understand their financial information, they’re less likely to call in, which reduces call center volumes.
Check out our video reenactment of a customer’s experience trying to decipher their data transaction.
2. Categorizing dataMaking transactions easy to understand is critical to proper data categorization. Once customers can easily understand where their transactions are taking place, they can effectively take control of their finances. Adding the categorization capability to your transaction feeds makes it easy for customers to manage their money, understand spending habits, and set financial goals. And making customers’ transaction and account data actionable reduces friction to budgeting and planning. Customers will begin to actively use your money management tool to proactively stay on top of their finances, ultimately increasing brand satisfaction and loyalty.
3. Classifying dataClassifying your customers’ data gives you insight into their transaction types: POS, bill pay, or direct deposit. With a clear picture of your customers’ financial world, you can create messaging with compelling offers, enabling you to gain a larger share of wallet, and compete more effectively in the market.
It all starts with clean data Cleansing, categorizing, and classifying data is the foundation of artificial intelligence. It helps you provide extremely personalized marketing experiences, offer solutions to specific problems, and get to know your customers on a much deeper level. It also helps your customers proactively manage their finances and reduce the stress of understanding transactional information.
July 12, 2022 | 2 min read
June 23, 2022 | 1 min read
August 20, 2021 | 6 min read
Theo Epstein, named one of the world's greatest leaders by Fortune Magazine and 100 most ... | <urn:uuid:629010ed-785f-4673-88a7-84892692af41> | CC-MAIN-2022-33 | https://www.mx.com:443/blog/keeping-it-clean-the-power-of-clean-data/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.916157 | 725 | 1.765625 | 2 |
The Illyrian Tombs of Selca e Poshtme are located near the town of Pogradec in Albania. On the right bank of the river Shkumbin lie the remains of the ancient city of Pelion and the accompanying necropolis. The Roman Via Egnatia led past it towards Thessaloniki. Though there are traces of human activity in Neolithic times, the settlement proper dates to the Iron Age through to the Illyrian urban period (5th to 2nd centuries BC), and reached its height under settlement by the Illyrian tribe of Enchele in the later Iron Age and was also occupied in the Roman period as traces of a municipal building show. From the 4th to 1st centuries BC the city was the royal residence of Illyrian kings and therefore, also probably an important political and economic centre.
According to excavations, the settlement has five phases of occupation. Selcë I to III are divided into late Neolithic, early Bronze Ageand Late Bronze Age, all represented by different ceramic forms. The settlement was continuously inhabited from the Bronze Age into the Iron Age. During the 6th to 5th centuries BC the settlement developed as a proto-urban center on the road that ran along the river Shkumbin connecting the coast of Albania to Macedonia. From the Iron Age there is a permanent settlement at the site.
Around 570 BC/550 BC the phase of Selcë IV began, evidenced by traces of burnt dwellings, pottery, including imports from Corinth in the lower horizon, and some Ionian wares. In the upper horizon, local, red-brown painted pottery, wheel made pottery with two handles and Ionic and Attic products were found. The local potters copied Greek models and were also influenced by their style. During the 4th century the acropolis was fortified by an encircling wall of well-cut stone.
In the 4th and 3rd centuries BC Selca was an important trading centre and was the administrative centre of the Illyrian region of the Dassaretae. Terraces were created in order to develop the settlement across the hilly terrain. In the 3rd century monumental tombs were cut into the rock around the acropolis, some with Ionic columns. One of these tombs was reused at the end of the 2nd century and a wide array of finds were discovered therein, including weapons, bronze vessels, ceramics and gold jewellery. The construction of the Via Egnatia, which bypassed the city, led to its decline.
During the 4th century AD Selca, as a military and administrative centre, was re-fortified with stone walls bound with mortar. Houses were constructed from reused Roman and Illyrian masonry. On the basis of coin finds two elements phases of construction can be determined. The first from the time of Valentinian I (364-375), the second from the time of Justinian I (518 - 565) to the years 547/548. The city was of economic and political importance before being conquered by the Slavs who destroyed the last remains of the Illyrian city.References:
The Seaplane Harbour is the newest and one of the most exciting museums in Tallinn. It tells stories about the Estonian maritime and military history. The museum’s display, that comprises of more than a couple of hundred large exhibits, revitalizes the colourful history of Estonia.
British built submarine Lembit weighing 600 tones is the centrepiece of the new museum. Built in 1936 for the Estonian navy, Lembit served in the World War II under the Soviet flag. It remained in service for 75 years being the oldest submarine in the World still in use until it was hauled ashore in 2011. Despite its long history, Lembit is still in an excellent condition offering a glimpse of the 1930s art of technology.
Another exciting attraction is a full-scale replica of Short Type 184, a British pre-World War II seaplane, which was also used by the Estonian armed forces. Short Type 184 has earned its place in military history by being the first aircraft ever to attack an enemy’s ship with an air-launched torpedo. Since none of the original seaplanes have survived, the replica in Seaplane Harbour is the only full-size representation of the aircraft in the whole World.
Simulators mimicking a flight above Tallinn, around-the-world journey in the yellow submarine, navigating on the Tallinn bay make this museum heaven for kids or adventurous adults.
Seaplane Harbour operates in architecturally unique hangars built almost a century ago, in 1916 and 1917, as a part of Peter the Great sea fortress. These hangars are the World’s first reinforced concrete shell structures of such a great size. Charles Lindbergh, the man who performed the first solo flight across the Atlantic Ocean, landed here in 1930s.
On the outdoor area visitors can tour a collection of historic ships, including the Suur Tõll, Europe's largest steam-powered icebreaker. | <urn:uuid:a1b2677a-d412-458e-8522-024f3b217932> | CC-MAIN-2022-33 | https://www.spottinghistory.com/view/9293/royal-tombs-of-selca-e-poshtme/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.967225 | 1,042 | 2.984375 | 3 |
The figure shows an equilateral triangle ABC with the incircle O (F is the tangency point on
BC). Circles O1 and O2 are tangent to circle O and
to the sides of angles A and C (D and E are the tangency points on AC).
If FT is tangent to circle O1 at T, prove that FT = DE.
Sketch of problem 1314
post a solution
Kaleidoscope of problem 1314 using iPad Apps | <urn:uuid:72d6c4ce-5770-42ab-88cd-23b251df1334> | CC-MAIN-2022-33 | https://gogeometry.com/school-college/4/p1314-equilateral-triangle-incircle-tangent-congruence.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.752945 | 160 | 2.6875 | 3 |
Around the country, communities are beginning to understand that sites contaminated with toxic industrial chemicals pose another danger to surrounding neighborhoods: vapor intrusion. Families who had contaminated groundwater in their neighborhood–and believed that the problem was taken care of after being connected to clean water–are now being told that the air in their homes might be contaminated by vapor coming from the contaminated groundwater.
It can be a real problem for families living close to Superfund or contaminated sites that were never completely remediated. Many times the original contamination was never cleaned up–especially if it was not considered a serious problem either because neighbors had a different source of water to begin with or had been switched to a safe water supply–and the chemicals were allowed to keep contaminating the groundwater. Those chemicals in the groundwater may now be turning into gases and threatening homes with vapor.
There are several ways that toxic vapor can intrude into the air inside homes and threaten the families who live there. But how does that happen? Here are nine elements that are present in typical vapor intrusion scenarios:
1. Chemicals were dumped, spilled, or buried at or around a factory, dry cleaner, or other business. Sometimes, these chemicals were dumped as many as 50-60 years ago by companies that were careless or lazy or ignorant of the dangers of behaving this way.
2. The chemicals are volatile chemicals (also called volatile organic compounds or VOCs). This means that over time they can volatilize, or turn into a gas. Some examples of these types of chemicals are TCE, DCE, PCE, vinyl chloride, and petroleum-based chemicals.
3. The chemicals were not cleaned up after they were dumped on the ground or were buried on the property. They remained there, sometimes for many years.
4. The soil between the ground surface and the groundwater is porous at the contaminated site. This allowed the chemicals to bleed down through the soil into the aquifer, contaminating the groundwater.
5. The groundwater underneath the contamination is shallow. In most vapor intrusion cases, there is not a great distance between the contaminated groundwater and the basements of buildings or homes above. Usually the distance is between 5 – 40 feet. The shallower the groundwater, the more likely that there will be a vapor problem.
6. The groundwater flows towards homes and businesses. If this is the case, contaminated groundwater can end up directly beneath homes and businesses, turn into a gas and migrate up through the soil and into the homes in a neighborhood. And this can happen even if the family is not (or is no longer) using groundwater to supply water to the home.
7. Homes that are near the contaminated site. Homes that are near the original source of the contamination are most at risk. Most homes that are in danger of vapor intrusion are less than ½ a mile from the contamination source.
8. Older homes are the most vulnerable. These homes sometimes have open crawl spaces, dirt basements, or cracked concrete floors which makes it easier for gas to enter the home. However, even newer homes are at risk. Newer concrete floors can have tiny cracks, and many homes have an opening for a sump pump as well. Volatile chemicals are very persistent and only need a tiny opening to invade a home.
9. Vapors can be present on every level of a home. Do not assume chemicals in vapor form stay in the basement. Gases can travel up through a stairwell or circulate throughout the HVAC system or through spaces behind the walls. For this reason, it is not enough just to test the basement. You need to test every floor for vapor.
Vapor intrusion is being revealed as potentially a major problem all across the country. Superfund sites and other contaminated sites that were not properly cleaned up are still bleeding volatile chemicals into the soil, down to the groundwater and into neighborhoods, potentially in the form of vapors. If you live near one of these sites, demand testing for vapor intrusion in your neighborhood. | <urn:uuid:75cae6a2-a5bf-4c36-b340-62ed8c5b4d78> | CC-MAIN-2022-33 | https://www.collinslaw.com/blog/how-contaminated-groundwater-can-turn-into-vapor-intrusion-is-your-neighborhood-at-risk/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.971657 | 814 | 3.03125 | 3 |
Native to Central Asia, Garlic has been used as seasoning all over the world for thousands of years. A close relative of onions, shallots and leek, White Garlic has approximately 7 to 12 cloves wrapped around a hard, central stalk. Garlic can be used whole, chopped, crushed, or minced. It is most often used fresh, though it is ideal for roasting. One clove of White Garlic can flavor an entire recipe.
White garlic is rich in manganese and vitamin B6 and is a good source of vitamin C and copper. It also contains selenium, phosphorus, vitamin B1 and calcium. It has been valued for centuries as a medicinal plant. In different cultures garlic has been combined with honey and ginger to stave off a common cold, or used as an antibiotic for wounds, intestinal disorders, and even as a cure for cancer.
** 15% DISCOUNT ON 1ST TRY **
|Description :||White Garlic
|Certification :||Demeter Biodynamic
|Size :||A La Carte|
|Min. Weight :||0.1 KG|
|Est. # of Fruits :||1-2|
|Est. # of Unique Fruits||1|
|* # of fruits is only an estimation that may change from time to time. On the other hand, we make sure that minimum weight is respected.| | <urn:uuid:74653231-2fcd-4545-a689-3c57c4f794a9> | CC-MAIN-2022-33 | https://whatsin.hk/products/demeter-biodynamic-white-garlic-100gr | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.936083 | 310 | 2.40625 | 2 |
- Original article
- Open Access
Reducing plagiarism through academic misconduct education
International Journal for Educational Integrity volume 16, Article number: 3 (2020)
Although there is much discussion exploring the potential causes of plagiarism, there is limited research available which provides evidence as to the academic interventions which may help reduce this. This paper discusses a bespoke English for Academic Purposes (EAP) programme introduced at the university level, aimed at improving the academic writing standards of students, reducing plagiarism, and detecting cases of contract cheating. Results from 12 semesters of academic misconduct data (n = 12,937) demonstrate a 37.01% reduction in instances of detected plagiarism following the intervention, but due to limited data, cannot demonstrate a direct impact on reducing detected rates of contract cheating. The results also show a lower than expected proportion of plagiarised assignments (3.46%) among submissions.
Academic dishonesty is not a new problem for higher education service providers. However, the rising availability of information sources which can easily be accessed by student writers, as well as essay-writing services heavily marketed towards university students, has led to an increase in discussions on this topic in both the media and academic journals. One way in which universities have attempted to monitor and control academic integrity is through the use of text matching software such as Turnitin. However, Turnitin and other software packages used to detect similarities between text submissions have been widely acknowledged as far from a perfect solution to ‘solve’ plagiarism (Heckler et al. 2012; McKeever 2006; Scheg 2012) as they do not inherently detect whether plagiarism has occurred.
Aside from cases of plagiarism that can be detected using text matching software, other, more subtle and difficult to detect forms of plagiarism such as contract cheating also need to be addressed. Throughout this paper, we use the term ‘contract cheating’ to refer to any form of plagiarism where a student has contracted another individual or organisation to carry out assessed work on their behalf.
Although student use of contract cheating services are not new (Lancaster and Culwin 2007) and prevalence of this behaviour is low (Rundle et al. 2019), they are becoming more visible, to the point where it is not uncommon to see these services advertised on social media. These services show evidence of being mature, well-established commercial operations, suggesting that there is a substantial demand feeding this supply (Ellis et al. 2018).
In this study, we present and discuss an intervention designed to improve the academic writing skills of students, reduce levels of plagiarism, and provide a tool to assist in the detection of contract cheating, by capturing a ‘fingerprint’ of a writing sample in an offshore international higher education service provider: British University Vietnam (BUV). BUV has operated in Vietnam’s capital city, Hanoi, since 2009. Although the faculty are entirely expatriate employees, almost all the students are Vietnamese, and therefore use English as their second or even third language. BUV faces the same problems as any other university with regards to plagiarism threats. However, due to the suggested negative relationship in the literature between English language ability and the propensity to commit plagiarism (Abasi and Graves 2008; Bretag 2007; Chen and Ku 2007; Goh 2015; Jones 2011; Li 2015; Marshall & Garry 2006; Perkins et al. 2018; Pennycook 1996; and Walker and White 2014), BUV must be more aware of the potential threats of plagiarism in its student body. In this paper we focus specifically on how the use of a bespoke English for Academic Purposes (EAP) programme (referred to internally as the Academic English Masterclass) may improve the academic writing skills of students, assist in reducing overall plagiarism levels within BUV, and specifically, assist in the identification of cases of contract cheating. As proposed by Kakkonen and Mozgovoy et al. (2010), we demonstrate how a final exam for this programme may be used to help identify potential cases of contract cheating by providing ‘fingerprints’ of a writing style which may be checked for consistency against a piece of work submitted later.
Although there are multiple definitions and characterisations of plagiarism (see: Park 2004; Bennett et al. 2011; Mozgovoy et al. 2010), for the purpose of this paper, we refer to plagiarism as an act of submitting a document that belongs partially or completely to somebody else without due reference, and therefore misrepresents the effort that has been carried out by the submitting author. It is important to recognise that plagiarism can also occur unintentionally. We believe that the primary benefit of the initiative we present is that it has the potential to reduce instances of unintentional plagiarism by developing the academic skills of students, whilst also serving as a disincentive to the minority of students who seek to benefit by engaging in one or more deliberate forms of plagiarism discussed above. However, as the analysis presented in this paper uses institutional data on detected cases of plagiarism, we cannot differentiate between deliberate and accidental cases of plagiarism.
The reasons students engage in plagiarism has been well explored in numerous other papers, but as most students at BUV are Non-Native English Speakers (NNES), we wish to highlight the effect that low levels of English may have on incidences of plagiarism. This finding is supported by Bretag et al. (2018) who found that a factor influencing contract cheating prevalence was the use of a language other than English in students’ homes. Studies which have found a generally negative relationship between English language ability and plagiarism include Abasi and Graves (2008), Bretag (2007), Bretag et al. (2018), Chen and Ku (2007), Goh (2015), Jones (2011), Li (2015), Marshall and Garry (2006), Pennycook (1996), Perkins et al. (2018), and Walker and White (2014). However, many studies exploring this relationship are based on self-reported data from both students (Goh 2015; Jones 2011) and faculty (Abasi and Graves 2008; Bretag 2007; Li 2015; Walker and White 2014) which raise methodological concerns about the potential validity of this relationship.
In terms of interventions which may assist in combatting plagiarism, several options have been suggested in the relevant literature. These include an online academic integrity module (Belter and du Pré 2009; Curtis et al. 2013), a web-based module with a blended method on plagiarism (Stetter 2013), an online quiz through Blackboard (O'Donnell 2011), a plagiarism assignment (Davis 2011), an ethics-related module (Guo 2011), computer simulations and games as a preventative measure (Bradley 2015), marker training and the use of novel detection software, (Dawson et al. 2019; Dawson et al. 2019) and student plagiarism workshops (Chen and Van Ullen 2011; Hoanca 2019). Soto et al. (2004), and Levine and Pazdernik (2018) provide clear evidence of a reduction in plagiarism following a combination of initiatives, including structured educational modules, implementation of policies, increasing the difficulty of plagiarism by requiring students to submit drafts, and ensuring there are consequences of plagiarism. The fear of consequences arising from being caught committing plagiarism was also shown to be a strong deterrent to plagiarism by Bennett (2005). Amigud and Lancaster (2019) also identify that in some cases, familial involvement occurs in the process of purchasing contract cheating services, although it is not specified how this takes place. The authors suggest that ultimately, reducing contract cheating should focus on detection rather than attempting to stop it happening in the first place.
Proposals which have been suggested to specifically reduce contract cheating include: collecting writing samples from students (McLafferty and Foust 2004; Jones & Sheridan, 2014); setting assignments that specifically refer to lecture contents rather than generic essays (McLafferty and Foust 2004); improving the teaching and learning environment, including the relationship between staff and students and reducing the turnaround time of assessments (Wallace and Newton 2014); ‘designing out’ plagiarism (Fazel and Kowkabi 2014) by providing alternative forms of assessment such as exams, oral presentation (Lines 2016), internship experience and field trip-based reports, as part of a holistic assessment methodology (Goh 2015); and incorporating assessments that involve critical thinking and personal involvement with the course content (Carroll 2007; Heckler et al. 2012; McLafferty and Foust 2004; Probett 2011).
There is limited research in the field providing evidence of how contract cheating may be detected in the first place. Clarke and Lancaster (2007) present a ‘Six-Stage Contract Cheating Detection Process’ for identifying incidences of contract cheating in computer science assignments. However, this method relies on the availability of public information; in this case, ‘bids’ to an auction site. This ignores a common pathway of students obtaining papers from ‘essay mills’ or from advertisements on private social media groups. Morris (2018) on the other hand, suggests a more holistic model of five considerations for addressing contract cheating, including determining strategy, reviewing institutional policy, developing an understanding of students, edited and revisiting practices for assessment and including areas for staff professional development.
Koppel and Winter (2014) demonstrate how computational linguistic methods can be used to determine whether the author of two documents is the same. Although the results of their study indicate that this method has a good degree of accuracy in determining whether two documents were written by one author, it relies on having access to digital copies of all text being examined. This method is therefore unable to determine whether contract cheating has taken place, as it is not possible to analyse work from authors who are not in the existing database.
Clare et al. (2017) present a method of determining whether contract cheating may have occurred by examining whether unusual patterns exist between the grades received by students for unsupervised work compared to those for supervised work. This approach may be helpful to identify where further investigation could take place, but given the wide range of factors which could also influence differences in grades between different types of assessment (student preferences, differences in grading practices between markers, quantitative vs qualitative assessments, etc.), it cannot be relied upon by itself as a tool to identify contract cheating.
Dawson and Sutherland-Smith (2018) show that experienced markers were able to detect contract cheating 62% of the time in one experiment. However, these papers were all obtained from dedicated contract cheating websites which may be of varying quality, and the study only examined twenty papers from one course.
Harper et al. (2020) demonstrate that staff are generally skilled at detecting contract cheating rates for text-rich assessments, but this reported detection rate was lower for exam-based assessments as opposed to take-home assignments.
Although it is very easy for software solutions to identify text that is already present in its database, the ability of current software is not yet advanced enough to detect the complexities of contract cheating (Kakkonen and Mozgovoy 2010; Mozgovoy et al. 2010). As advances in technologies such as deep learning, neural networks, and quantum computing develop and become available for use in higher education, these difficulties may be eased. It is worth noting that new products from Turnitin such as Authorship Investigate have shown potential in identifying contract cheating cases (Dawson et al. 2019) although are not yet widely available. As software cannot adequately assist with detecting incidences of contract cheating, this is therefore left to faculty. However, studies such as Lines (2016) and Malesky et al. (2016) have shown how these contract cheating services can both be undetected by faculty (despite knowledge of their use) whilst also providing acceptable grades for the students engaging in these practices.
As there have been few reports of studies which have been specifically designed to both reduce plagiarism and identify potential cases of contract cheating, we contribute to the literature by detailing the methods which BUV have taken in order to resolve this problem, whilst at the same time increasing the academic writing capabilities of our students.
Language, plagiarism and context in British University Vietnam (BUV)
BUV is a private educational institution which began operations in 2009. BUV holds a unique position in Vietnam’s higher education system, as the only university to offer entirely British undergraduate programmes which are accredited by and offered in partnership with two UK universities. As of February 2020, BUV has approximately 700 students primarily studying degrees in Business and Management subjects.
The majority of BUV students are NNES and study a programme comprising two semesters of study per academic year. All students who begin a course of study must have achieved an English language proficiency score: either an official IELTS Band score of 6.0 with no sub-skill below 5.5, or an alternative English language qualification equivalent to this level.
BUV is in the process of undertaking rapid expansion and has recently relocated to a suburban campus with a capacity for over 7000 students. This dramatic increase in scale has the potential to give rise to new and increased risks for academic quality and reputation, and so it is imperative that appropriate measures are employed to safeguard the quality and rigour of the programmes offered during this period of growth and in the future. Consequently, the faculty of BUV has been working towards the development of an intervention to detect, reduce, and deter students from voluntarily or involuntarily participating in behaviours which would constitute plagiarism, whilst at the same time improving the key language and study skills required by students studying in an international educational setting.
Prior to the introduction of the BUV intervention in April 2016, faculty had identified that many students in their classes may benefit from additional support in developing their academic study skills. BUV had, by chance, also discovered some challenging cases of contract cheating and were also anecdotally aware that this was more common in the student body than previously thought. Due to the historical reliance in the institution on Turnitin as the key tool to identify instances of plagiarism, a new approach to managing the academic integrity of the university needed to be taken which could further improve the English language ability of students.
As any potential threats to the academic integrity of the BUV programmes need to be taken extremely seriously, and the potential benefits to the English language ability of students were clear, the introduction of an initiative to tackle both issues was required. The highly competitive market of private, international higher education in Vietnam also means that any additional benefits provided to students may act as market differentiators. By developing an initiative which could tackle both issues at BUV, and therefore increase the likelihood of students attaining good degrees, this would likely act as a potential selling point to the fee payers and decision makers (most often the parents of students). In this market, as in many others, a strong reputation is a key decision-making factor in the choice of universities. If there was a suggestion that the academic integrity of BUV was anything other than impeccable, this could cause significant problems with student recruitment, as well as damage our relationships with local and international stakeholders.
This intervention had to address several key concerns. Firstly, students had to be provided with additional academic English classes in order to attempt to reduce feelings of low confidence and improve their overall ability to write in English. Secondly, students also had to receive additional support in terms of time management and fostering motivation. An intervention had to provide a tangible, stringent method of detecting instances of contract cheating. Finally, the intervention had to specify the rules and codes of conduct relating to academic integrity expected in an international university environment, while being careful not to fall into the trap of assuming that Western academic values are a universal constant.
The intervention: Academic English Masterclass
Based upon the analysis presented above, BUV approved the creation of a standalone compulsory module for all undergraduate students, entitled Academic English Masterclass (AEM) which ran for the first time in April 2016.
The module consists of 2 hrs of class-based tuition per week for 12 weeks for all undergraduate students and culminates in a novel final exam, which functions as both a control and benchmark for students’ English writing ability as well as enabling fingerprinting of submitted work to be carried out.
The process of syllabus development was based on a needs analysis, as suggested by Nunan (1988), of a convenience sample of 30 students, targeting their ‘necessities, lacks, and wants’ (Nation and Macalister 2010, p.25) and adapted for the East Asian context based on the research of Cai (2013). This was combined with informal one-to-one interviews with all 30 members of the sample group, and an initial diagnostic test in the form of a written essay. The needs analysis revealed that in terms of composition skills, students required the most assistance with essay planning, paraphrasing, referencing, and finding relevant sources of information. Many final year students admitted to plagiarising when they were unable to put ideas into their own words or were unable to identify the boundaries of utilising others’ material versus academic misconduct. This suggests that although first year students may require more focussed training on academic misconduct policy and basic EAP training, the requirements for final year students may be different. This insight was incorporated into the design of the course.
A final consideration in the design of the programme was the international context of BUV. Academic integrity is far from a universal concept and ignores the Eastern academic tradition of duplicating material as homage (Stowers and Hummel 2011). This is an important consideration in terms of understanding students’ interpretation of plagiarism, and it is possible that the view of reusing material in ‘homage’ is not seen by all students in this cultural context as a breach of academic integrity. However, research on this area is conflicted, and some authors suggest that plagiarism is more frequently linked to individual preference rather than cultural acceptability (Martin 2011). Regardless of this potential cultural paradigm clash, it remains important in this context that the AEM programme explicitly teaches and explains the underlying philosophical foundations of the British academic system, and the conventions that must be followed to avoid committing plagiarism.
The needs analysis led to the development of a multidimensional syllabus with the course goal of raising the awareness of acceptable practices surrounding plagiarism and academic misconduct, whilst at the same time, developing students’ researching and writing skills. This is tested by a final written assessment under exam conditions. Students are provided with a set of multiple-choice questions to assess knowledge about acceptable academic practices, and are also set a writing task. In this task they are given extended extracts from a variety of sources, including academic and non-academic sources of information with differing degrees of bias, and must tackle an essay question in which they utilise these sources. This procedure ensures that the essay written by the student (and subsequently used as a fingerprint) is entirely their own work,Footnote 1 and also provides them with the opportunity to demonstrate their ability in every facet of academic writing, including not only grammatical and lexical accuracy, but also the skills of paragraphing, paraphrasing, referencing, and critical thinking (as text extracts must be analysed for their impartiality). Alongside the original exam script is a companion piece, written by the marker, that contains several key points related to the writer’s ability, along with a band score of 1–9, which is developed based on a rubric and band score system of English proficiency. The rubric and band system scores students on grammatical accuracy, coherence, academic skills (referencing, paragraphing, and synthesis of material), and vocabulary. The marked sample is available for checking by faculty by the time students submit their summative assignments for their academic modules.
Markers must carry out a check using the writing sample on all high scoring assessments (papers scoring 70% and above), as well as a random selection of 10% of papers from each set of assessments, with a minimum sample size of six papers. Although all grading is carried out anonymously, once a paper has been graded, markers are permitted to use the student number to match up with the student name to aid in initial authorship investigation. All markers are trained how to perform these checks, and this process is discussed later in the paper.
Following the introduction of this intervention, all students were reminded of the dangers of plagiarism and new warnings were introduced to all assignment guidelines highlighting the severity of consequences if students were caught plagiarising. All students were made aware that their writing samples obtained during the AEM exam would be made available online for faculty and misconduct panels to check if there were any suspicions regarding their writing. New writing samples are obtained every semester from students, approximately 3 weeks before the assignment submission period begins in order to reduce the likelihood of significant changes being seen in the writing styles of students over time.
Methods and analysis of results
Data collection and screening
If any student submission is flagged by a marker as a potential plagiarism or contract cheating case, a process is initiated by the faculty members which ends in the student being notified by the administration that that they are required to attend an informal meeting to discuss their work. Most cases of plagiarism are resolved at this stage and any penalties recorded. If, after this stage, there are concerns regarding potential contract cheating students are requested to attend an academic misconduct panel and participate in a viva voce of their submission in the presence of both a subject matter expert and a misconduct expert. Following the viva, if this panel has remaining suspicions of contract cheating, then the case is escalated to the most serious university panel for a meeting with the student. This panel will make the final decision as to whether contract cheating has occurred and will use a wide variety of sources of evidence in making its final decision. These include the writing samples obtained during the AEM exam, statements from relevant faculty, the previous marks obtained by the student, results from the initial viva and additional questions which the panel may put to the student. As the typical penalty for a student found to have utilised any contract cheating services is a failure of their award, it is the responsibility of the university to establish proof beyond reasonable doubt in these cases, and no decision is made solely on the basis of the comparison of the fingerprint with the submitted piece of work. The procedures used by BUV are set by the awarding body, and there is an appeal process available to the student.
In February 2020, we conducted an analysis of the plagiarism and contract cheating cases recorded during this process from the semesters of April 2014 through October 2019 to answer three questions:
What is the overall prevalence of plagiarism committed by students at BUV?
Has the AEM initiative been successful in reducing plagiarism cases?
Has the AEM initiative been successful in reducing detected incidences of contract cheating?
Before carrying out the analysis, the data was screened in the following way: Firstly, all recorded cases where a misconduct panel determined that no form of plagiarism had occurred in the flagged submission, and therefore gave a verdict of ‘no case to answer’, were removed. Any incidences where a verdict of ‘poor academic practice’ was given by the panel solely due to poor referencing practices were also excluded from the results. If one student had been punished for several plagiarism violations, each incident was counted separately.
The results of this analysis are shown in Table 1.
Overall prevalence of plagiarism and contract cheating
From a total of 12,937 student submissions, analysis of the data revealed 448 plagiarism offences over the twelve-semesters between April 2014 and October 2019. The percentage of submissions found to have contained some element of plagiarism (excluding contract cheating cases) ranged between 2.35% and 7.08% each semester, with a mean percentage of 3.46% across the period of study. As the dataset covers multiple years, some incidences of plagiarism were from individual students who had committed plagiarism offences over multiple semesters.
With the caveat that it is possible that the study may underestimate plagiarism in the student body (as it would be unwise to believe that any higher education institution detects 100% of plagiarism cases), the first point to note is that the prevalence of detected plagiarised submissions is much lower than described in previous studies examining plagiarism data (as opposed to self-report studies). These studies have revealed mean rates of plagiarism of 26% (n = 182) (Barret & Malcolm 2006), 26.2% (n = 290) (Walker 2010), and 10.8% (n = 74) (Warn 2007) respectively. Within a specifically Vietnamese context, Ba et al. (2016) found that 73% (n = 681) of the submissions tested in their study had Turnitin similarity indexes of over 20%, and Tran et al. (2017) found that in their studies of two Vietnamese universities, there were plagiarism levels (defined by similarity indexes over 24%) of 91.7% and 61.7%.Footnote 2 Our study differs from those cited above due to the longitudinal aspects of the data collection period, meaning that a much larger sample has been obtained for analysis.
The results may indicate that BUV students demonstrate a lower predilection towards plagiarism than the norm, however, they are more likely explained by the large sample utilised in the study. Even though faculty (Andrews et al. 2007) and students (Scanlon and Neumann 2002) alike may consider plagiarism to be a significant problem in their institutions, our results demonstrate that a quantitative analysis of a larger data sample could reveal a lesser problem than initially imagined. Despite the professed increased propensity of non-native English speaking ‘International’ students to commit plagiarism (Walker 2010), the low levels of plagiarism indicated in the set of submissions (even though almost all submitting students are NNES) indicates that this suggestion is not universally accurate, a viewpoint echoed by Soto et al. (2004).
Identified levels of contract cheating were overall very low, with a total number of 19 cases over the period, ranging from 0% to 0.94% of submissions per semester, with a mean percentage of 0.15% of the total number of submissions in the time period. This prevalence rate is significantly lower than the figures reported by Curtis and Clare et al. (2017), of 3.5% of students (not submissions) having committed these offences, and by Harper et al. (2020) of 2.6%. However, as contract cheating cases are more difficult to detect than more ‘traditional’ plagiarism offences (whether intentional or unintentional), we recognise that the detected cases are unlikely to be fully representative of the actual levels of contract cheating in the student body.
Effectiveness of the AEM in reducing plagiarism
Prior to the introduction of the AEM intervention in the April 2016 semester, the mean percentage of submissions found to contain plagiarism was 4.81% (n = 3137) Following the introduction of the intervention, the mean percentage of submissions found to contain plagiarism dropped to 3.03% (n = 9800); a 37.01% decrease from the results prior to the intervention. Although the rates of plagiarism were already low prior to the introduction of the AEM, the further reduction in plagiarism demonstrates that the intervention has achieved one of its stated aims of educating students about appropriate academic standards and reducing levels of plagiarism. These findings are in line with those of Soto et al. (2004), and Levine and Pazdernik (2018), demonstrating that training programmes such as the AEM may help reduce plagiarism.
Effectiveness of the AEM in reducing contract cheating
With regards to the prevalence of contract cheating before and after the AEM intervention, the results do show a reduction in the percentage of contract cheating cases detected, from 0.35% of submissions, to 0.08% of submissions, a 77.14% decrease. With the assumption that the decrease in identified cases is not due to any decrease in the ability of markers to detect these (given the additional training that occurred), this apparent reduction in contract cheating may be due to several factors or a combination of these factors. Firstly, an improvement in student knowledge of appropriate academic standards may have increased the awareness of what is expected of them in a university setting. Secondly, knowing that there will be increased scrutiny of their submissions regarding contract cheating, and the knowledge that samples of their work are available for checking may have increased the perceived risk of contract cheating. Thirdly, any reduction may be due to real improvements in the EAP abilities of the students. As the English language ability of students has been shown to be linked to plagiarism, the increased EAP skills of the students may have reduced the perceived need to obtain contract cheating services.
However, the relative rarity of contract cheating as a percentage of submissions, and the very small total number of cases over the entire period of investigation do not allow us to make any firm conclusions as to the effectiveness of this intervention on the reduction of detected cases of contract cheating. The relatively large number of cases identified in the October 2015 semester compared to other semesters, and the limited periods of data collection prior to the introduction of the intervention have likely made a comparison of contract cheating data before and after the intervention untenable.
Despite this, we believe that continuing with this initiative is important. By continuing to educate students in academic writing skills and expected academic practice, as well as establishing a protocol of collecting and checking student writing samples, we can reduce plagiarism, provide a disincentive for students who may seek to engage in contract cheating, and obtain a valuable data source for the further investigation of any such detected cases.
Although the preliminary results of this intervention are promising, any benefits of an intervention such as the AEM must be considered alongside an understanding of the numerous challenges of any intervention involving the collection and comparison of student writing samples.
Firstly, faculty carrying out marking of assessments must know which submissions are suspicious, and therefore warrant checking against the student fingerprints. In order to do this on an ad-hoc basis, some prior expectations as to the quality of the submitted work must be held. Although some faculty may be aware of the general quality of work they are expecting from a set of assignment submissions, the use of anonymous marking means that as long as the quality of work is generally in line with the entire cohort, markers may not necessarily detect a clear difference between contracted and legitimate assignments. As the size of student cohorts increases, this leads to a wider spread of both marks and writing styles being expected, and the likelihood of faculty having initial suspicions is further reduced, therefore compounding this problem. For institutions which have a high concentration of NNES, an additional challenge which may be encountered is that of fellow NNES students being hired for contract cheating, as opposed to ‘professional’ native English speaking contract cheating services. This sub-type of contract cheating may be more appealing to some students, as fellow NNES students may have similar writing styles and have completed the same, or similar classes. This means that the differences between these submissions and fingerprinted work may not be as apparent when compared to the results obtained from professional contract cheating websites.
Secondly, faculty may not always accurately detect cases of contract cheatings, even if a submission is checked for consistency against the fingerprinted sample. Markers will likely have differing skill levels in their ability to accurately detect differences in writing styles between a submission and a fingerprint and some cases may be missed. Therefore, any institution considering the introduction of fingerprinting must be aware of the potential increase in false negatives occurring due to some submissions not being investigated appropriately and implement training programmes to address this. This method also does not address cases where a writing sample would not be helpful in determining authorship of an assessment, such as computer coding or artwork.
Conversely, the potential risk of false positives must also be considered. If faculty members flag a submission as a possible case of contract cheating due to a change in writing styles between a fingerprint and a submitted assignment, there must be a fair and consistent approach to investigating these cases fully. Markers must also be aware that improvements in English language abilities and writing styles are likely to be seen when comparing what can be produced under timed, exam conditions, compared to a take-home assignment, as students will have had time to proofread, plan, edit, and check their final submission.
Research by Dawson et al. (2019) has indicated that the training of markers can improve their ability to identify contract cheating, therefore to minimise the problems stated above, all faculty members receive training on how to assess work for potential cases of contract cheating, and assessments are only graded by faculty who have completed this training. When checking for potential evidence of contract cheating, markers are asked to investigate several things. The initial step is an overall comparison of the student’s writing in the unsupervised, external assessment with the sample produced under exam conditions. If a student produced a flawless submission in adherence to all academic standards, but during the AEM written exam had received a low score in this area, or the overall standards of English were very different, this might indicate a second or alternate author.
Other techniques based on forensic linguistics are also used. These include comparing the submission with the sample to see if there are mismatches between the writer’s unique choice of words and individual style of writing (idiolect), and their tendency to use certain constructions (coselection and lexical choice) (Coulthard, 2010).
Markers are also trained to identify other potential indicators of contract cheating, either of the whole document, or of partial sections. These indicators include changes in formatting or styles of writing in different sections of the text, as well as examining the document properties for any suspicious elements such as very short editing times (indicative of content being copied into a brand new document before submission), or whether there are inconsistences in the named author of the document. Even the choice of sources used or not used in a submission could raise suspicions: for example, not citing key sources indicated during class sessions. By training all markers how to check for contract cheating, making comparisons between the sample and submissions part of the marking procedure, and carrying this procedure out on a regular basis, it is our hope that we can improve the capacity of markers to identify instances of contract cheating.
Although individually none of the above indicators would ever be considered conclusive evidence of contract cheating, and the fingerprinting method has significant limitations as discussed, all the above can be employed by a panel investigating whether academic misconduct may have occurred.
Reducing and detecting plagiarism and contract cheating requires a holistic approach to be taken (McCabe 2005; Morris 2018). We believe that initiatives such as the AEM programme which aim to improve the English capabilities of students, educate them on expected academic conduct practices, and discourage contract cheating fit this definition, and our results demonstrate how doing so may assist with this goal.
This paper has discussed the introduction of an intervention designed to improve the academic writing skills of students, reduce levels of plagiarism, and provide a tool to assist in the detection of contract cheating by capturing a ‘fingerprint’ of a writing sample.
The data collected over the course of 12 semesters show a 37.01% decrease in the rate of detected plagiarism following the introduction of the AEM intervention, and suggest that the introduction of a programme like this could help institutions with reducing plagiarism.
The levels of detected contract cheating cases did decrease following the introduction of the intervention, however, the very small numbers of detected contract cheating cases both pre and post intervention mean that we cannot make a conclusion regarding the use of collecting writing samples as an effective tool to help detect these cases. We have recognised the limitations of this fingerprinting exercise and suggested potential mitigations to these through faculty training.
Despite using a large database of student submissions (n = 12,937), the data shows surprisingly low levels (3.36%) of detected plagiarism overall, which do not match the high prevalence of plagiarism that has previously been recorded in the literature, however, by analysing detected cases of plagiarism data as opposed to student self-reported data, it is possible that this study may have underestimated plagiarism in the student body. Previous studies have used much smaller samples of student submissions in their analysis, which suggests that different results may be obtained when examining larger sets of data. We therefore recommend that further research should try to use longitudinal university or department wide databases for analysis purposes, as opposed to individual class submissions, as this may give a more accurate representation of the prevalence of plagiarism in an institution.
The issue of academic misconduct is becoming increasingly more visible to the general public. In the United Kingdom, 40 university leaders have written to the Minister of State for Universities, Science, Research and Innovation demanding a ban on companies offering contract cheating services (BBC News 2020), and the Advertising Standards Authority has already banned misleading advertisements from one of these companies (Advertising Standards Agency, 2019). We recognise that the costs required for an intervention strategy such as the AEM may pose a barrier to entry for many institutions, but given the increasing focus on academic integrity, this is not an issue that universities can afford to ignore. We therefore recommend the use of similar initiatives in other institutions as a potential method to educate students about expected academic practice, reduce plagiarism, and believe the potential benefits justify the challenges of introducing such an initiative.
Bretag et al. (2018) demonstrate the widespread nature of cheating in university exams and Harper et al. (2020) demonstrate the lack of ability of markers to detect this, which raises a question regarding this statement. However, given the relatively low stakes of this particular assessment, and that it is the writing style of the student that we are most interested in as opposed to the content, we believe this to not be of major concern.
The authors of these papers suggest that this equates to a high probability of plagiarism having occurred, however text matching software such as Turnitin does not identify plagiarism, it simply identifies similarities in documents which may indicate that plagiarism has occurred in some form. Just because there is a high degree of similarity identified, does not necessarily mean that an author has engaged in plagiarism. This may occur in cases where students have submitted improved versions of papers as part of a continuous assessment initiative.
Academic English Masterclass
British University Vietnam
English for Academic Purposes
Non-Native English speaker
Abasi A, Graves B (2008) Academic literacy and plagiarism: conversations with international graduate students and disciplinary professors. J Engl Acad Purp 7:221–233. https://doi.org/10.1016/j.jeap.2008.10.010
Advertising Standards Authority (2019) ASA ruling on the Oxbridge research group ltd t/a Oxbridge essays. In: Asa.org.uk. https://www.asa.org.uk/rulings/the-oxbridge-research-group-ltd-a18-458914.html. Accessed 17 Mar 2020
Amigud A, Lancaster T (2019) I will pay someone to do my assignment: an analysis of market demand for contract cheating services on twitter. Assess Eval High Educ. https://doi.org/10.1080/02602938.2019.1670780
Andrews G, Smith A, Henzi D, Demps E (2007) Faculty and student perceptions of academic integrity at US and Canadian dental schools. J Dent Educ 71:1027–1039
Barrett R, Malcolm J (2006) Embedding plagiarism education in the assessment process. Int J Educ Integr 2:38–45
BBC News (2018) Unis demand ban on essay-writing firms. In: bbc.com/news. https://www.bbc.com/news/education-45640236. Accessed 21 Mar 2020
Belter R, du Pré A (2009) A strategy to reduce plagiarism in an undergraduate course. Teach Psychol 36:257–261. https://doi.org/10.1080/00986280903173165
Bennett K, Behrendt L, Boothby J (2011) Instructor perceptions of plagiarism. Teach Psychol 38:29–35. https://doi.org/10.1177/0098628310390851
Bennett R (2005) Factors associated with student plagiarism in a post-1992 university. Assessment Evaluation Higher Educ 30:137–162. https://doi.org/10.1080/0260293042000264244
Bradley E (2015) Using computer simulations and games to prevent student plagiarism. J Educ Technol Syst 44:240–252. https://doi.org/10.1177/0047239515617653
Bretag T (2007) The emperor's new clothes: yes, there is a link between English language competence and academic standards. People Place 15:13–21
Bretag T, Harper R, Burton M, Ellis C, Newton P, Rozenberg P, Saddiqui S, van Haeringen K (2019) Contract cheating: a survey of Australian university students. Stud High Educ 44:1837–1856. https://doi.org/10.1080/03075079.2018.1462788
Cai L (2013) Students’ perceptions of academic writing: a needs analysis of EAP in China. Language Education in Asia 4:5–22. https://doi.org/10.5746/leia/13/v4/i1/a2/cai
Carroll J (2007) A handbook for deterring plagiarism in higher education. Oxford Centre for Staff Learning and Development, Oxford
Chen T, Ku TNK (2007) EFL students: factors contributing to online plagiarism. Student Plagiarism in an Online World: Problems and Solutions: Problems and Solutions
Chen Y, Van Ullen M (2011) Helping international students succeed academically through research process and plagiarism workshops. Coll Res Libr 72:209–235. https://doi.org/10.5860/crl-117rl
Clare J, Walker S, Hobson J (2017) Can we detect contract cheating using existing assessment data? Applying crime prevention theory to an academic integrity issue. Int J Educ Integrity. https://doi.org/10.1007/s40979-017-0015-4
Clarke R, Lancaster T (2007) Establishing a systematic six-stage process for detecting contract cheating. The Second International Conference on Pervasive Computing and Applications
Coulthard M (2010) Forensic Linguistics: the application of language description in legal contexts. Langage et société 132 (2):15.
Curtis G, Clare J (2017) How prevalent is contract cheating and to what extent are students repeat offenders? J Acad Ethics 15:115–124. https://doi.org/10.1007/s10805-017-9278-x
Curtis G, Gouldthorp B, Thomas E, O'Brien G, Correia H (2013) Online academic-integrity mastery training may improve Students' awareness of, and attitudes toward, plagiarism. Psychology Learning Teaching 12:282–289. https://doi.org/10.2304/plat.2013.12.3.282
Davis L (2011) Arresting student plagiarism: are we investigators or educators? Bus Commun Q 74:160–163. https://doi.org/10.1177/1080569911404053
Dawson, P. Sutherland-Smith, W Ricksen, M. (2019). Can software improve marker accuracy at detecting contract cheating? A pilot study of the Turnitin authorship investigate alpha. Assessment & Evaluation in Higher Education. Advance online publication DOI: https://doi.org/10.1080/02602938.2019.1662884d
Dawson P, Sutherland-Smith W (2018) Can training improve marker accuracy at detecting contract cheating? A multi-disciplinary pre-post study. Assess Eval High Educ 44:715–725. https://doi.org/10.1080/02602938.2018.1531109
Ba DK, Ba DK, Lam QD, Le DTBA, Nguyen P, Nguyen PL, Nguyen PQ, Pham QL (2016) Student plagiarism in higher education in Vietnam: an empirical study. Higher Educ Res Dev 36:934–946. https://doi.org/10.1080/07294360.2016.1263829
Ellis C, Zucker I, Randall D (2018) The infernal business of contract cheating: understanding the business processes and models of academic custom writing sites. Int J Educ Integr. https://doi.org/10.1007/s40979-017-0024-3
Fazel I, Kowkabi N (2014) Students’ source misuse in language classrooms: sharing experiences. TESL Can J 31:86. https://doi.org/10.18806/tesl.v31i1.1168
Goh E (2015) Exploring underlying motivations behind extreme cases of plagiarism in tourism and hospitality education. J Hospitality Tourism Educ 27:80–84. https://doi.org/10.1080/10963758.2015.1033101
Guo X (2011) Understanding student plagiarism: an empirical study in accounting education. Accounting Education 20:17–37. https://doi.org/10.1080/09639284.2010.534577
Harper R, Bretag T, Rundle K (2020) Detecting contract cheating: examining the role of assessment type. Higher Education Research & Development 1-16. https://doi.org/10.1080/07294360.2020.1724899
Heckler N, Forde D, Bryan C (2012) Using writing assignment designs to mitigate plagiarism. Teach Sociol 41:94–105. https://doi.org/10.1177/0092055x12461471
Hoanca B (2019) Combating plagiarism: a three-pronged approach to reducing prevalence in higher education. In: Scholarly ethics and publishing: breakthroughs in research and practice 532–548. IGI Global, Hershey
Jones D (2011) Academic dishonesty: are more students cheating? Bus Commun Q 74:141–150. https://doi.org/10.1177/1080569911404059
Jones M, Sheridan L (2014) Back translation: an emerging sophisticated cyber strategy to subvert advances in ‘digital age’ plagiarism detection and prevention. Assess Eval High Educ 40:712–724. https://doi.org/10.1080/02602938.2014.950553
Kakkonen T, Mozgovoy M (2010) Hermetic and web plagiarism detection Systems for Student Essays—an Evaluation of the state-of-the-art. J Educ Comput Res 42:135–159. https://doi.org/10.2190/ec.42.2.a
Koppel M, Winter Y (2014) Determining if two documents are written by the same author. J Assoc Inf Sci Tech 65:178–187.
Lancaster T, Culwin F (2007) Preserving academic integrity? Fighting against nonoriginality agencies. Br J Educ Technol 38:153–157. https://doi.org/10.1111/j.1467-8535.2006.00491.x
Levine J, Pazdernik V (2018) Evaluation of a four-prong anti-plagiarism program and the incidence of plagiarism: a five-year retrospective study. Assess Eval High Educ 43:1094–1105. https://doi.org/10.1080/02602938.2018.1434127
Li Y (2015) Academic staff's perspectives upon student plagiarism: a case study at a university in Hong Kong. Asia Pacific J Educ 35:14–26. https://doi.org/10.1080/02188791.2013.835710
Lines L (2016) Ghostwriters guaranteeing grades? The quality of online ghostwriting services available to tertiary students in Australia. Teach High Educ 21:889–914. https://doi.org/10.1080/13562517.2016.1198759
Malesky L, Baley J, Crow R (2016) Academic dishonesty: assessing the threat of cheating companies to online education. Coll Teach 64:178–183. https://doi.org/10.1080/87567555.2015.1133558
Marshall S, Garry M (2006). NESB and ESB students' attitudes and perceptions of plagiarism. International Journal For Educational Integrity, 2:26–37.
Martin D (2011) Culture and unethical conduct: understanding the impact of individualism and collectivism on actual plagiarism. Manag Learn 43:261–273. https://doi.org/10.1177/1350507611428119
McCabe D (2005) Cheating among college and university students: a north American perspective. Int J Educ Integr 1:1–11
McKeever L (2006) Online plagiarism detection services—saviour or scourge? Assess Eval High Educ 31:155–165. https://doi.org/10.1080/02602930500262460
McLafferty C, Foust K (2004) Electronic plagiarism as a college Instructor's nightmare—prevention and detection. J Educ Bus 79:186–190. https://doi.org/10.3200/joeb.79.3.186-190
Morris E (2018) Academic integrity matters: five considerations for addressing contract cheating. International journal for educational integrity 14. https://doi.org/10.1007/s40979-018-0038-5
Mozgovoy M, Kakkonen T, Cosma G (2010) Automatic student plagiarism detection: future perspectives. J Educ Comput Res 43:511–531. https://doi.org/10.2190/ec.43.4.e
Nation P, Macalister J (2010) Language curriculum design. Routledge, London
Nunan D (1988) Syllabus Design. Oxford University Press, Oxford
O'Donnell K (2011) Linking multimodal communication and feedback loops to reinforce plagiarism awareness. Bus Commun Q 74:216–220. https://doi.org/10.1177/1080569911404404
Park C (2004) Rebels without a clause: towards an institutional framework for dealing with plagiarism by students. J Furth High Educ 28:291–306. https://doi.org/10.1080/0309877042000241760
Pennycook A (1996) Borrowing Others' words: text, ownership, memory, and plagiarism. TESOL Q 30:201. https://doi.org/10.2307/3588141
Perkins M, Gezgin U, Roe J (2018) Understanding the relationship between language ability and plagiarism in non-native English speaking business students. J Acad Ethics 16:317–328. https://doi.org/10.1007/s10805-018-9311-8
Probett C (2011) Plagiarism prevention. Bus Commun Q 74:170–172. https://doi.org/10.1177/1080569911404054
Rundle K, Curtis G, Clare J (2019) Why students do not engage in contract cheating. Front Psychol. https://doi.org/10.3389/fpsyg.2019.02229
Scanlon P, Neumann D (2002) Internet plagiarism among college students. J Coll Stud Dev 43:374–385
Scheg A (2012) The impact of Turnitin to the student-teacher relationship. J Interdisciplinary Stud Educ 2:29–38
Soto J, Anand S, McGee E (2004) Plagiarism avoidance. J Coll Sci Teach 33:42
Stetter ME (2013) Teaching students about plagiarism using a web-based module. J Furth High Educ 37:675–693
Stowers R, Hummel J (2011) The use of technology to combat plagiarism in business communication classes. Bus Commun Q 74:164–169. https://doi.org/10.1177/1080569911404406
Tran U, Huynh T, Nguyen H (2017) Academic integrity in higher education: the case of plagiarism of graduation reports by undergraduate seniors in Vietnam. JAcad Ethics 16:61–69. https://doi.org/10.1007/s10805-017-9279-9
Walker C, White M (2014) Police, design, plan and manage: developing a framework for integrating staff roles and institutional policies into a plagiarism prevention strategy. J High Educ Policy Manag 36:674–687. https://doi.org/10.1080/1360080x.2014.957895
Walker J (2010) Measuring plagiarism: researching what students do, not what they say they do. Stud High Educ 35:41–59. https://doi.org/10.1080/03075070902912994
Wallace M, Newton P (2014) Turnaround time and market capacity in contract cheating. Educ Stud 40:233–236. https://doi.org/10.1080/03055698.2014.889597
Warn J (2007) Plagiarism software: no magic bullet!. Higher Education Research & Development 25 (2):195–208. https://doi.org/10.1080/07294360600610438
The authors would like to thank Louise Cotrel-Gibbons for her kind support in offering suggestions for improvement and proof reading of this article.
Availability of data and data materials
Data not available due to confidentiality of student information.
All authors contributed to this work. The percentage of contributions is indicated by the order of authorship provided. The author(s) read and approved the final manuscript.
The authors received no funding for this work.
All authors were employed by the university in question during the time of authorship of the paper.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Perkins, M., Gezgin, U.B. & Roe, J. Reducing plagiarism through academic misconduct education. Int J Educ Integr 16, 3 (2020). https://doi.org/10.1007/s40979-020-00052-8
- Academic misconduct
- Contract cheating
- Academic dishonesty
- EAP intervention, fingerprinting | <urn:uuid:6839dab3-178a-4258-a329-1a5a6872ba25> | CC-MAIN-2022-33 | https://edintegrity.biomedcentral.com/articles/10.1007/s40979-020-00052-8 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.940314 | 11,584 | 2.15625 | 2 |
Wood is still the largest biomass energy resource today. Other sources include food crops, grassy and woody plants, residues from agriculture or forestry, oil-rich algae, and the organic component of municipal and industrial wastes.
What is the source of biomass energy?
Biomass—renewable energy from plants and animals
Biomass is renewable organic material that comes from plants and animals. Biomass was the largest source of total annual U.S. energy consumption until the mid-1800s.
What are 4 sources of biomass?
- Fossil Fuel.
- Power Generation.
Is biomass the largest renewable energy source?
Biomass, a renewable energy source derived from organic matter such as wood, crop waste, or garbage, makes up 4.8 percent of total U.S. energy consumption and about 12 percent of all U.S. renewable energy. Wood is the largest biomass energy source. In the U.S., there are currently 227 biomass plants operating.
What are 3 sources of biomass?
We use four types of biomass today—wood and agricultural products,solid waste, landfill gas and biogas, and alcohol fuels (like Ethanol or Biodiesel). Most biomass used today is home grown energy. Wood—logs, chips, bark, and sawdust—accounts for about 44 percent of biomass energy.
What is biomass and sources of biomass?
Biomass is organic, meaning it is made of material that comes from living organisms, such as plants and animals. The most common biomass materials used for energy are plants, wood, and waste. These are called biomass feedstocks. Biomass energy can also be a non-renewable energy source.
Why is biomass the best energy source?
Correctly managed, biomass is a sustainable fuel that can deliver a significant reduction in net carbon emissions when compared with fossil fuels. … Biomass is a “carbon lean” fuel producing a fraction of the Carbon emissions of fossil fuels.
What is major biomass?
The major biomass sources currently used are sugar cane and corn to produce bioethanol, and rapeseed for biodiesel production. … It uses sugar cane as the main feedstock.
Which of the following are major biomass?
Wood and wood residues is the largest biomass energy source today. Wood can be used as a fuel directly or processed into pellet fuel or other forms of fuels. Other plants can also be used as fuel, for instance corn, switchgrass, miscanthus and bamboo.
What are 5 types of biomass?
Types of biomass include:
- Agricultural residues. Crop residues include all sorts of agricultural waste such as straw, bagasse, stems, leaves, stalks, husks, pulp, shells, peels, etc. …
- Animal waste. Various animal wastes are suitable as sources of energy. …
- Forest residues. …
- Industrial wastes. …
- Solid waste and sewage.
Is biomass conventional sources of energy?
Biomass is another semi-conventional energy source because it is in the process of becoming mainstream. Biomass energy comes from plant material. … Biomass energy can be used for heating and generating electricity, and it is becoming increasingly available as liquid biofuel for powering engines.
What type of energy is biomass energy Mcq?
What type of energy is biomass energy? Explanation: Biogas is renewable energy source. Biomass energy from plants and plant derived materials. Wood is still the largest biomass energy resource today, but other sources of biomass can also be used.
Which is the best renewable energy source?
What Is the Best Renewable Energy Source?
- Wind. The largest source of sustainable energy in the United States, wind power is responsible for about 8.4 percent of all energy sources generated in the country. …
- Sun. Wind and solar power represent the two fastest-growing sources of power in the US. …
- Water. … | <urn:uuid:44760962-7daf-4559-a5e0-8551cf2142d7> | CC-MAIN-2022-33 | https://ssvconference.com/pure-energy/which-is-considered-to-be-the-largest-source-of-biomass-energy.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.919864 | 861 | 3.484375 | 3 |
07. 09. 2019
Mediznische Universität Graz, Institut für Anatomie
Name: Mag.(FH) Sylvia Reischl
Tel: +43 664 925 3869
The AOTrauma Introductory Course Principles in Operative Fracture Treatment is targeted at certified orthopaedic and trauma surgeons who are interested in refreshing the basic knowledge and skills before participating in the AOTrauma Advanced Course Approaches & Osteosynthesis, and is also open for surgical trainees.
The topics will cover basic knowledge of different clinical applications of screws, plate fixation and tension band and will be taught in short lectures and videos followed by practical exercises on artificial bones and anatomical specimens.
During exercises key steps are projected on the monitors.
Each work station is limited to two participants. | <urn:uuid:776a19df-bc9c-4c3b-9384-de3ba939050a> | CC-MAIN-2022-33 | https://www.oegout.at/veranstaltungen-2/aotrauma-course-introductory-to-operative-fracture-treatment/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.771034 | 201 | 1.671875 | 2 |
by ARTE AMAZONIA
This installation is basket sculpture encompassing the entire space with the mythological being, The Cosmic Anaconda. It is an abstraction of the confrontation of the indigenous way of life with that of "modern civilization." Included are 125 authentic Yanomami baskets mounted to the wall (and, can also be suspended from the ceiling) to create a three dimensional sculpture encompassing the space.
The serpent, as manifested here, is a symbol for the "ancient knowledge" of the natural path which has sustained indigenous cultures for thousands of years. Each coil of the snake represented by a basket is uniquely painted geometric forms by the Yanomami encompassing the artistic expressions of their culture with a history dating back nearly 10,000 years. The Cosmic Anaconda takes the viewer into the heart of the Amazonian world, where the indigenous people must draw on the strength of their ancient knowledge, to preserve their ancient symbols, myths and magic. | <urn:uuid:88bbd3f0-63b8-41fb-b2d6-1d2b5ebf9090> | CC-MAIN-2022-33 | https://www.arte-amazonia.com/gallerie/installation/arte-amazonia-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00265.warc.gz | en | 0.947341 | 195 | 2.328125 | 2 |
I guess there is the following difference between ordinal and cardinal numbers: while zero is a cardinal number, there is no ordinal number that corresponds to it: it makes no sense to talk about a (or the) "zeroth" something. Curiously enough, I think that there are many occasions where it is meaningful to talk about negative ordinal numbers. If I am considering a sequence of weeks, for instance, and only the weeks after some moment have some relevant feature, it will probably be reasonable to number those weeks with positive ordinals and to numer the previous weeks with negative ordinals. What do you think?
In physics there is the Zeroth Law of Thermodynamics, a transitivity of temperatures. If A and B have the same temperature, and B and C have the same temperature, then A and C have the same temperature. (A could be melting ice, B expanding mercury, and C bourbon at the correct temperature.) The name for the Law was devised after the names for the three laws of thermodynamics had become standard. | <urn:uuid:7249ca07-2e97-413e-8eb2-043e94200b02> | CC-MAIN-2022-33 | https://www.askphilosophers.org/advancedsearch?content=259&topic=216 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.954501 | 213 | 2.65625 | 3 |
The automobile business has become a technology business with the advent of driverless cars that learn on their own via artificial intelligence. Now we have learned that Ford is involved in working on a cloud-based central monitoring system that will revolutionize transportation. There are privacy implications too, where governments will know where your car is at 24 hours a day.
From a technology standpoint, this cloud system will help prevent accidents, keep traffic moving, enable smart intersections and promote environmental advantages by bringing more efficiency to every transport mile.
Three Transformative Technologies
Ford’s advantage in the future is that it’s got in its hand in three technologies that have been transformative. The first is the nature of propulsion which is moving from gas to electric. It might surprise you that less than 5 percent of the market right now is electric, but it’s estimated to be 30 percent in the near future.
The second technology has to do with robotics. You’ve heard about AI where the vehicle is so smart that it can drive itself in the future. The third technology, which isn’t as public, is the notion of a cloud-based system over the vehicles. The confluence of the three of these technologies means that we can now design transportation systems differently and with a system that enables and empowers a better CO2 outcome.
A New Cloud-Based System Being Developed to Control All Driverless Cars
This cloud-based structure is something that hasn’t been here and what it allows is the vehicle and the city to now have a connection. I was in a discussion yesterday with Prime Minister Trudeau and he asked while we were sitting in a traffic light late in the evening when there is nobody in the intersection, why does the red light stay on. In the future, the vehicle will be mediated through intersections like that with this smart system.
If you are an investor looking at this it will be over an $11 trillion industry. This is why the tech industry is so interested in our business because it’s a systems play of the smart technologies of the vehicle and the environment coming together. It’s talking about building bandwidth so the vehicles can communicate, 5G is really important. It’s also about making smart intersections so that the navigation of the vehicles are safe.
Then a third idea is parking where we can have the vehicle communicate with parking spaces. You lose more fuel efficiency trying to find a parking space than you do being stuck in traffic.
Combination of Vehicles and Technology Now Defines the Car Business
I look at the car business as a combination of vehicles and technology which is what’s defining it in the future, versus just thinking about it as a pure vehicle. Think of it this way, the cars have a number of computers and software in them today but the way they are in the future is really rolling computers. You have to think of the business differently because of that.
Ford Committed to be “In Market” with a Driverless Car by 2021
Ford is committed by 2021 to be in market with a driverless electric car. But this is a marathon, the cars will be super smart and they learn. The way they learn is by being driven. When they hit the market they will be safe, probably have narrow assignments as to what they can do, but over time they will expand.
The great thing is that when you hear about serving the world, this is going to allow us to do things because the vehicle is intelligent, like getting goods to people that couldn’t get it, helping people have jobs that don’t have transportation today or helping take older people to the doctor. This kind of assistance will be available with that technology.
This aspect of the car business is one where there is no profit yet, the technology is new, the design of the systems is emerging, but it’s where all the future will be. | <urn:uuid:74a28597-00eb-47b1-96cb-75b8464564aa> | CC-MAIN-2022-33 | https://www.webpronews.com/ford-ceo-a-new-cloud-based-system-being-developed-to-control-all-driverless-cars/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz | en | 0.965537 | 801 | 2.46875 | 2 |
After 1948, the 370,000 Jews of Romania who survived the Holocaust became one of the main sources of immigration for the new state of Israel as almost all left their homeland to settle in Palestine and Israel. Romania's decision to allow its Jews to leave was baldly practical: Israel paid for them, and Romania wanted influence in the Middle East. For its part, Israel was rescuing a community threatened by economic and cultural extinction and at the same time strengthening itself with a massive infusion of new immigrants.
Radu Ioanid traces the secret history of the longest and most expensive ransom arrangement in recent times, a hidden exchange that lasted until the fall of the Communist regime. Including a wealth of recently declassified documents from the archives of the Romanian secret police, this updated edition follows Israel’s long and expensive ransom arrangement with Communist Romania. Ioanid uncovers the elaborate mechanisms that made it successful for decades, the shadowy figures responsible, and the secret channels of communication and payment. As suspenseful as a Cold-War thriller, his book tells the full, startling story of an unprecedented slave trade.
Radu Ioanid was born and grew up in Bucharest. He studied at the University of Bucharest; at the University of Cluj, where he received a PhD; and at the Ecole des hautes etudes en sciences sociales in Paris, where he received a doctorate in history. He was vice president of the International Commission on the Holocaust in Romania headed by Elie Wiesel from 2003 to 2004. He has been a Starkoff Fellow at the American Jewish Archives and director of the International Archival Program at the Jack, Joseph and Morton Mandel Center for Advanced Holocaust Studies of the United States Holocaust Memorial Museum. He is now Romania’s ambassador to Israel. His books include The Holocaust in Romania and Le Pogrom de Jassy.
Foreword by Elie Wiesel
Preface to the Second Edition
Introduction Lost and Found
1 “The Jews Are Our Misfortune”
2 Voting with Their Feet
3 The Zionist Enemy
5 An Uneasy Relationship
6 The Money Trail
7 The Washington Equation
8 “Why Did You Drain My Soul?”
About the Author
This extraordinary book blew the cover off the secret of a shameful deal that ended up, perversely, in freedom for Jews in Romania, including myself. In 1965, my mother and I were bought by the state of Israel from Ceausescu’s Romania for about $3,000 each. In other words, Israel bought our freedom from the misery of his dictatorship. When the ransom was paid, ethnic Romanian Jews were robbed by the state of all their possessions and allowed to leave the country. The details of this affair are carefully and deeply researched in Radu Ioanid’s splendidly written account of that spectacular Cold War drama. I learned from this book how my fate was decided early in the 1960s in one of the few countries under Soviet control and am both grateful and saddened for those who had to fight decades longer, in the USSR and elsewhere, for the right to travel freely. This book reads like a thriller, but it is journalism at its best.
The suffering of the Jewish people throughout history is no secret to anyone. From persecution and exile to progroms, from forced conversion to genocide, the Jews have experienced it all. Radu Ioanid takes us on a journey into the most unbelievable: The selling of the Jews by the communists in Romania. Pigs, dogs, sheep, money—everything Romania needed—was offered in order to get the Jews to Israel. Ioanid has excavated one of the most incredible stories of the twentieth century from the archives of the Securitate: that after the Holocaust, the worst atrocity humanity had seen, there were people who were willing to buy and sell entire families with a clear price tag on their heads. Only a master of research could accomplish what Radu Ioanid did with this incredible story.
10/4/21, TLV1 Podcasts: Ioanid talked about his book in this podcast episode. | <urn:uuid:98540a35-cfd8-479b-b03c-e69a7e71195e> | CC-MAIN-2022-33 | https://rowman.com/ISBN/9781538140758/The-Ransom-of-the-Jews-The-Story-of-the-Extraordinary-Secret-Bargain-Between-Romania-and-Israel-Second-Edition | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.959486 | 896 | 2.59375 | 3 |
Sen. Murkowski Addresses the Legislature
On Tuesday, U.S. Senator Lisa Murkowski addressed the House and Senate in a joint floor session. In her speech, she highlighted the need for bipartisanship in the Legislature as well as Congress, citing the recent Trump impeachment trial as an example of dangerous factionism that threatens to harm our governmental institutions.
Sen. Murkowsksi also highlighted the need for continued bipartisan efforts to improve public safety in Alaska, particularly in rural communities. She thanked the legislature for our efforts to improve public safety and noted additional efforts at the federal level to address rural public safety issues, stressing the need for continued partnership with tribes to make rural communities safer.
When discussing climate change, Sen. Murkowski remarked that “it’s not about what is happening, it’s about what we plan on doing about it,” and she shared her plans to introduce a clean energy bill soon. Our senior senator also discussed a series of federal-level projects to promote Arctic security and strengthen Alaska fisheries. She continues to support responsible resource development and noted Alaska's comparatively small development footprint and the world's continued dependence on oil and gas. Finally, Sen. Murkowski identified nuclear energy as a viable alternative source of energy with the potential to power rural communities that are currently dependent on oil and gas with zero emissions. | <urn:uuid:a6904ab9-e34a-4fdc-8565-cc1caed63368> | CC-MAIN-2022-33 | https://akhouse.org/claman/021920_newsletter.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00265.warc.gz | en | 0.950504 | 275 | 1.90625 | 2 |
This week, the theme from Tina Schell, for the Lens-Artists Photo Challenge is focused on one of the most well-known and widely used rules of photography, the Rule of Thirds. She said, “For those who would like to study the concept further, there are many online descriptions and examples. Adobe offers an excellent summary here. Basically, the rule is a compositional guideline that encourages placement of your primary subject on at least part of three equal rows and three equal columns as illustrated below.”
The Adobe article entitled: How to use, and break, the rule of thirds
Rule of Thirds Grid
The idea is to place your subject on one (or more) of the grid lines, or even better on the dots, theoretically making the image more pleasing to the eye.
I’ve been taking photos since I was a teenager when there were only Black & White photos. As indicated in the Adobe article, “The more you do it, the more it gets ingrained into your head.” I apply the Rule of Thirds most of the time in my photo compositions.
I learned drawing and painting at a young age, the Rule of Thirds also applies to the composition of drawing, painting, and some other forms of art. I’ll post my photos and two of my paintings in this post.
There are many kinds of butterflies in my garden, Swallowtail, Monarch, Mourning Cloak, and Cabbage butterflies. A Monarch came back from the south early this year and is busy laying eggs. I collected 10 eggs so far. Three are in the chrysalis form, two are growing strong, and five are 1/8″ babies. I’ll post some Monarch photos later. I saw a Nymphalis antiopa, known as Mourning Cloak, a few days ago but didn’t take good photos. I took the following one a while ago.
There are many turtles in the lake within walking distance from home. This colorful turtle was sunbathing when I walked around the lake one day. The entire colorful body is attractive. The reflection of the sunlight made part of his body draw more attention.
I took the following photo in Maui, Hawaii. The crashing waves evoke my imagination. I strive to take photos with droplets dancing in the air as the waves splash the rocks.
The following are my two paintings. Naturally, the tree is the focus of the first painting and the butterfly is in the second painting.
~ ~ ~ | <urn:uuid:de04c31b-801b-462f-b25b-03ff9dfcc37d> | CC-MAIN-2022-33 | https://theshowersofblessings.com/category/painting/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.967416 | 524 | 1.992188 | 2 |
Sentences of 6 months or more a prisoner, on release, has, by law, to dislose to future employers, landlords, insurance companies etc for 10 years. Sentences of more than 30 months – for life. Disclosure results in increased premiums and rents. If the ex-prisoner cannot gain employment, benefits must be the only source of income. If, however, he or she can prove that they have their lives back on track and have gained useful, tax-paying employment, a possible appeal should be in place to cancel the disclosure term(official term 'spent'). After all there is an appeal process against a sentence, a possible early release from prison but no appeal against disclosure, which is an added sentence after release. The slate is not, therefore, wiped clean.
Why is this idea important?
I feel disclosure is a deterrent to ex-prisoners to finding employment and/or gaining self esteem to say nothing of being a burden on the state because 'the tab' must be picked up by the state by way of benefits.
I also feel it is important because I don't think the great British public know about it. It is not just for paedophiles, that is, quite rightly, the sex offenders register, but for all ex-prisoners who received a sentence of 6 months or more. | <urn:uuid:e2dd808c-cf7b-4947-8858-9d4a2ba3dd77> | CC-MAIN-2022-33 | https://www.govyou.co.uk/ex-prisoner-disclosure-spent-on-appeal/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00265.warc.gz | en | 0.972211 | 271 | 1.765625 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.