text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
This AU Plug Power Energy Consumption Watt Meter will measure energy and cost of the household appliances. You can monitor which appliances are the killers of the high cost of energy to reduce the power bill and carbon emissions.
- Wide Application, Perfect for measuring Power(W), Energy (kWh), Voltage, Amps, Hertz, Power Factor and Minimum & Maximum Power.
- Low power consumption.
- Large LCD display for your easy reading.
- Simply plug the meter into the wall and then plug your appliance into the meter.
- Overload Protection, LCD will display the OVERLOAD with booming noise to warn the users.
- Built-in cell battery to store electricity and saving setting when power outage.
|Operating Current||Max 10A|
|Wide Voltage Range||150V-240V|
|Timing Display Range||0 second~9999 days|
|Wattage Display Range||0.0W~9999W|
|Voltage Display Range||0V~9999V|
|Current Display (amps)||0.000A~10.000A|
|Wattage Display Range||0.0W-9999W|
|Price display range||0.00COST/KWH~99.99COST/KWH|
|Package Contents||1 x Power Meter
1 x User Manual | <urn:uuid:2ae7d8d2-f6d7-412a-8816-8bb70e241e3b> | CC-MAIN-2022-33 | https://www.fotolog.cl/au-plug-power-energy-consumption-watt-meter/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.662219 | 334 | 1.765625 | 2 |
Davos is an interesting barometer of the conventional wisdom of the day among the global elite. Each year is a new year with a new menu and a short memory. Such is the world at the top. This year included widespread optimism, complex discussions of blockchains and artificial intelligence, enthusiasm for Macron and despise for Trump, alongside some unease for things too good to be true and lip service to the growing debate about inequality. Reasonable, but not earth-shaking.
The year of 2017 has been good for business and finance. Steady global growth and historically high share performance have blessed the Davos-goers with thick incomes. Their concern must be what to do with this bonanza now that shares are expensive. There is that nagging feeling that what goes up must come down, some day. Politically, the year has also been reasonably reassuring. The powerful anti-establishment trend has been broken by elections in France and the Netherlands and Trump has achieved less than what was feared while the Brexit camp has been fracturing.
The combination of good economic conditions and widespread political threats, including major war threats, explains the mood in Davos: times are good but that may not last. The real question is what the elites plan to do about it. We have seen a lot of hand wringing about inequality, probably correctly seen as a driver of populism. A study by Oxfam was published as Davos was starting and even featured on its website. It indicates that the top 1% have captured 82% of world incomes in 2017. Those walking the hallways of the World Economic Forum mostly belong to the top 0.1% who own some 15% world wealth according to the World Inequality Report. Yet, as far as one can tell, they did not have much to suggest about reversing that trend, as if there is nothing that they can do.
Delicate balance between reducing inequality and stifling growth
The standard answer to rising inequality is more progressive taxation. Yet, the entrepreneurs argue that too much progressivity will deter their efforts, ultimately hurting growth and employment. While one may wonder whether they need that much money to work hard enough, it remains that aggressive progressivity is bound to elicit tax avoidance strategies in a never ending race between lawyers and the authorities, where the latter always lag behind the former. At the other end, the authors of the World Inequality Report argue that the trend toward wealth concentration is partly due to the dismantlement of state-owned corporations, implicitly calling for a reversal of this worldwide trend. This view – which is reminiscent of Marx’s call for collective ownership of the means of production – ignores the widespread evidence that state-owned corporations have invariably underperformed everywhere, and those that remain still do.
It may well be that governments do not have that many tools, or that any tool suffers from negative side effects. Yet they are not powerless. Public policies explain why inequality is much lower in Europe than in the United States. Finding the right balance between reducing inequality and stifling growth is extremely difficult but this is also a choice that deserves the kind of debate that Davos is proud to generate but is strangely shy on this topic. The Nordic countries, for instance, have forged a consensus.
More importantly, perhaps, the corporations themselves can do a lot. A well-known feature of the last two decades is that top earners have continuously earned more, often much more, while the middle class has seen its incomes stagnate. The usual explanation for middle class income stagnation is the emergence of fierce competition from Asia and Latin America where labor costs are a fraction of those in the developed countries. This is true but quite disingenuous. According to the Conference Board, in 2002 manufacturing hourly labor costs in China were 2.2% of those in the US. By 2013, the proportion had increased to 11.3%. The difference is so huge that it is hard to believe that a proportion of, say 15%, would have ruined the ability of the US to compete with China. At the other end of the spectrum, the top 0.1% could have voluntarily cut their earnings, which run in the millions of dollars per month, without seeing their standards of living deteriorate in any way. There is a limit to how much one can consume but, apparently, no limit to the wealth that some want to accumulate.
Mending the system and the social contract
The incredible wealth gains of the wealthiest people are the outcome of explicit decisions made within corporations. A grassroot movement is trying to force corporate boards to reveal and justify the earnings of top managers, but it is facing fierce resistance. If the Davos crowd really worries about mounting populism, cutting stratospheric payments is an easy, symbolic gesture. They should not resist moves that are in their best long-term interest, before anti-elite politicians reach power. They should also see to it that all employees share in the prosperity of the corporations that they run. Political competition was reasonably smooth when living standards were rising for everyone and the norm was that children would do better than parents. Absent this optimistic outlook, people turn to populists who promise to restore that golden age without the slightest operational idea of how they would do it.
The financial industry has a special responsibility. The global financial crisis of 2008 was the consequence of excessive risk-taking in many market segments. Since then, a new regulatory approach has been adopted. The new regulations can certainly be improved but the aim should not be to return to the pre-2008 world. To be sure, financial regulation eats into profits but it also aims at making financial market less crisis prone. The crisis had ushered the new era of mistrust toward elites by undermining trust into their management. The financial industry would be well advised to refrain from rolling back regulation as it is currently trying to do in the US.
In his message to the participants, Klaus Schwab said: «If the system is broken and the social contract is failing, business leaders, in Davos and around the world, must play a leading role in repairing them.» Sadly, we have not seen that happening, not yet at least. | <urn:uuid:9e9adfc3-d722-496d-bbdd-9b6912c8d2e9> | CC-MAIN-2022-33 | https://www.fuw.ch/article/davos-and-inequalities | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.974244 | 1,239 | 1.976563 | 2 |
KS3 Assessment Framework
Major changes have taken place to the assessment and reporting of pupils. National Curriculum levels have now been removed and numerical grades, from 9 to 1, are being phased in for GCSEs, replacing the letter grades A* to G.
At Hurstmere School, we will be using the grades 9 to 1 to report on the assessment and tracking of pupils in Key Stage 3 (Years 7 to 9). A brief description of what each grade represents is shown below. It is important to recognise that it is not possible to accurately predict GCSE grades for pupils in Key Stage 3 with this new policy. As such, these grades do not represent predicted GCSE grades, but instead provide an indication of how a pupil is progressing in each subject.
With regards to tracking progress, it is reasonable for a pupil to achieve the same grade throughout Years 7 to 9. Maintaining a grade from Year 7 to Year 9 is a reflection of progress itself, due to the increasing difficulty in content, skill and application, year on year. Equally, it is reasonable for a pupil’s attainment to fluctuate at times. A learning journey is rarely a linear and direct path as individuals develop core skills at different rates. In all instances, staff will ensure that pupils are aware of how to improve and progress, continuing to liaise with parents and guardians accordingly.
8/9 Exemplary and sophisticated subject knowledge, demonstrating personal flair, even in unfamiliar contexts.
7 Consistent demonstration of advanced skills and subject knowledge.
6 Some demonstration of advanced skills and subject knowledge.
5 Consistent demonstration of sound subject knowledge and skills.
4 Demonstrates some subject knowledge and the general ability to apply skills competently
3 There are gaps in subject knowledge and in the application of skills.
2 Significant gaps in subject knowledge and in the application of skills.
1 Fundamental gaps in subject knowledge.
Mrs L. Davis | <urn:uuid:72aefabe-4f42-4d47-b14f-a008b5de6000> | CC-MAIN-2022-33 | https://www.hurstmere.org.uk/1573/ks3-assessment-framework | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.933039 | 403 | 3.546875 | 4 |
A popular question among SOLIDWORKS users is “How do I determine volume marking levels in containers?” Perhaps you have run into a similar scenario in the past. This is easy if the container has a regular shape (like a cylinder or pyramid), but it becomes a bit more challenging when the container has an irregular shape.
When the containers are irregular, the calculations become difficult at best. You must either make approximations with SOLIDWORKS or build a prototype to run physical tests. This is both time-consuming and inaccurate. In this blog, we will show you a method that utilizes Design Studies, with a little assistance from Excel, to get results efficiently and accurately!
Container Section View
Start with a hollow container of any shape. The shape can be regular or irregular, as seen in the section view to the right. Create a section view, this will make visualizing the following steps easier.
Extrude a box that fully envelopes the container. Be sure that you un-check the “merge” result option on the extrude feature. We need two bodies for this technique to work.
Splitting Plane (AKA Fluid Level)
Next, create an offset plane that cuts both bodies. This offset plane will be used to determine the level in the container that corresponds to a given fluid volume.
Create Intersection Regions
Now, we will use the intersect command to split the two bodies into 6 unique sections (2 box bodies, 2 container bodies and two bodies internal to the container representing the “fluid”). The number of resulting sections vary depending on the geometry and intersection plane. Select two solid bodies and the offset plane you created. The plane will split the two solid bodies.
The container will be split into three bodies with one representing the fluid up to the level of the section plane. Now, create a sensor that measures the volume of the internal or fluid body. You will reference this a few times in the next steps.
For my container, I want to find the water levels that correspond to 50, 100, 150… 350 cm^3. Since we don’t know the levels (or the section plane height) that corresponds to these volumes, we will determine the volume for a few known fluid levels first, then use that information to calculate the section plane height that corresponds to our desired fluid volume markings.
Modify the section plane to a height of 10mm (this will be different for your model) and record the corresponding fluid volume. Now, modify the section plane to a 20mm offset. Because my container is 100mm tall, I will create ten steps in increments of 10mm and record the fluid volume at 20, 30, 40… 100mm.
This can be a bit time consuming depending on the number of data points you want to collect. But lucky for you, there is a better way, keep reading!
Design Studies For More Than Just Simulation
We can use the design study to automate the process of geometry modification and report any number of unique results from stresses to weight or in our case, fluid volume.
In setting up the design study, the dimension used for the splitting plane will be our only variable. We set the variation type to “Range with Step” and defined a min/max value along with our step size. In this example, our minimum is 10mm, maximum is 95mm and the step size is five. This results in 18 total scenarios.
Next, we define a volume constraint to track the volume of the fluid body we previously defined. By selecting the “Monitor Only” option, the software simply reports the resulting volume of the fluid corresponding to each scenario.
Finally, click “Run” to execute the design study. The study completes in only a few seconds! This is a significant time saver when compared to the manual method previously described. Additionally, these results can be saved to a CSV, which can be used in the final step.
Interpolate in Excel
Now, create a graph in Excel using the section heights and the calculated fluid volume from SOLIDWORKS. Plot the volume on the x-axis and the height on the y-axis. The graph is not necessary, but it helps ensure you have enough data points.
Next, use the “Forecast” command in Excel and the two columns of data you previously generated to determine the height that corresponds to your desired volume levels. The Forecast command is a method of linear interpolation. This means, the accuracy of your interpolated values will depend on the number of data points. The results are in red in the chart below:
*Note: Because we are using interpolated values the results will not be exact but if you used enough data points, the deviation should be very small.
Want to expand on your knowledge of SOLIDWORKS Simulation? Sign up for a training class! | <urn:uuid:df1c2d23-4189-413b-bffb-cc011e37dd88> | CC-MAIN-2022-33 | https://trimech.com/blog/design-studies-beyond-simulation | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.882092 | 1,022 | 2.96875 | 3 |
Climate change is now one of the major reasons for our move into social media in the attempt to promote the issue to our community and direct political change towards renewable energy and divesting in fossil fuel corporations.
The dangers of fossil fuel use increase is well researched, but the extraction of coal and gas has increased massively in the last 2 years, and the impacts go well beyond the increase in CO2 and higher temperatures to water extraction and pollution, damage to aquifers, dumping on reefs, loss of corals and the whole reef ecosystems as well as acidification of oceans.
Rapid and ongoing outcry is needed:
HEN is undertaking this through its members by supporting a variety of active campaign groups; sending representatives to their meetings, joining their protests, sharing their messages. We also support the use of GetUp, Change.org, and other campaign media to petition governments and parliamentarians.
350.org Global Climate Movement. Climate-focused campaigns, projects and actions led from the bottom-up by people in 188 countries. 350 is a movement more than an organization. We use distributed, grassroots organizing to run adaptive, locally-driven campaigns in every corner of the globe.
Protect Sydney’s Water Alliance Clean water is a critical resource for Sydney’s 4.5 million people. More than 30 community groups from across the region have formed a new alliance to Protect Sydney’s Drinking Water Catchments from irresponsible and destructive mining practices.
Contact: Neha Madhok, Community Organiser, Nature Conservation Council of NSW Phone: (02) 9516 1488 Email: email@example.com
LOCK THE GATE ALLIANCE is a national coalition of people from across Australia, including farmers, traditional custodians, conservationists and urban residents, who are uniting to protect our common heritage – our land, water and communities – from unsafe or inappropriate mining for coal seam gas and other fossil fuels.
RIVERS SOS http://riverssos.org.au/about/ Rivers SOS exists for the protection of the integrity of river systems and water sources from the impacts of mining and other extractive industries
See also article: | <urn:uuid:f75ff74e-b020-4437-b5c6-21b72a028cc0> | CC-MAIN-2022-33 | https://www.hen.org.au/our-programs-activities/activism/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.938874 | 448 | 2.53125 | 3 |
Taking Care of Your Granite Surface
Granite countertops are often the biggest change you can make to your home or office. As long as they are regularly cleaned and maintained, you can make the stone look as polished and beautiful for decades.
There are few things to keep in mind:
- Avoid using acids, acidic products, and acidic materials to prepare food on the countertops
- Avoid cutting anything directly on the surface. Sharp objects can damage the stone and open up the pores in the granite for bacteria to seep in
- Avoid putting meat directly on the granite countertop
- Use soft cloth to wipe surfaces instead of abrasive pads (steel wool) that might scratch the granite
- It is a good idea to reseal your countertop once every six months to refresh its look especially if you have lighter color granite
Cleaning and Good Maintenance
Majority of the time, people opt to replace their countertops with stone because it is the easiest to maintain. However, there are still precautions that you need to take, if you want your granite to last.
Here is an in-depth care and maintenance chart that may be useful when you start your cleaning:
Do NOT use: Vim Cream, Mr.Clean Magic Eraser or any other abrasive cleaners or pads. | <urn:uuid:11c0fa7e-4587-4464-99aa-53869d8ecd1f> | CC-MAIN-2022-33 | http://www.yycgranitecity.ca/granite-care-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.941188 | 264 | 1.679688 | 2 |
This post was updated June 26 at 9:43 p.m.
Hundreds of people gathered in downtown Los Angeles on Friday to protest the Supreme Court of the United States’ decision to overturn Roe v. Wade.
The Supreme Court ruled 5-4 on Friday morning in favor of overturning Roe v. Wade – a 1973 decision guaranteeing the constitutional right to an abortion – allowing individual states to now decide the legality of abortion within their borders, according to Politico.
Dozens of protesters began demonstrating outside the U.S. Courthouse on West First Street, with several activists giving speeches.
Protesters at the courthouse waved signs, including some that read, “Pro life is a lie, you don’t care if women die” and “This is a war on women.”
Protests continued at Pershing Square at 5 p.m., where hundreds of protesters joined demonstrations demanding abortion remain legal nationwide.
Mari Sanchez, an organizer for the event from the Party for Socialism and Liberation, said she hopes to inspire a grassroots movement for dramatic change in government to ensure reproductive rights. She added that her organization had been planning protests against the Supreme Court decision since the leaked draft opinion in May.
Luna Hernandez, an organizer for the event from Rise Up 4 Abortion Rights, said the community should demand that the Supreme Court decision be overturned to better represent the will of the people.
At Pershing Square, protesters waved signs, with some reading “Pro life is a lie,” “We won’t go back, we will fight back” and “SCOTUS: Abortion is a human right.” Demonstrators also chanted slogans such as “Our body, our choice” and “We are free.”
The protesters also heard speeches from activists and later marched to LA City Hall around 6 p.m.
Melina Rodriguez, a public health graduate student at UCLA who was at the protest, said a lack of access to abortion could lead to increased health problems, poverty and more violence later in life for the parent.
Elizabeth Sullivan, a student at Tufts University who attended the protest, said Roe v. Wade being overturned could lead to the reversing of other related civil rights cases, including those for same-sex marriage.
Protesters also expressed concern that abortion legality will now vary between states.
Samira Aguilar, a protest attendee at Pershing Square, said she felt frustrated that she will still have the right to an abortion in California while those in other states such as Texas may not in the near future.
Tef Baker, another protest attendee at Pershing Square, said she felt upset that this could affect the availability of abortions in other states outside of California, such as Florida, where her family and friends live.
“I cry for my friends and my families who I know that their rights can be taken away in a heartbeat,” Baker said. “They can wake up tomorrow, and they can lose complete autonomy.”
In a campuswide email sent earlier Friday morning, Chancellor Gene Block said the decision to overturn Roe v. Wade went against the University of California’s values. UCLA will continue to offer reproductive health services at the family planning division of UCLA Health, he added in the email.
“Our university firmly supports individuals’ ability to access necessary health care services and make decisions about their own care in consultation with their medical teams,” Block said in the email.
The protest at Pershing Square began to subside around 9 p.m. Some protesters also clashed with police officers downtown, with some marching through the streets until police blocked the crowd.
“I’m upset. I’m enraged. I woke up, literally, in 1974. We really just went back in time,” Rodriguez said. “All this progress for what? … It’s ridiculous to me that now my body is not really my choice.”
Contributing reports from Constanza Montemayor and Chelsea Westman, Daily Bruin staff. | <urn:uuid:e40ac706-90aa-4bec-86d3-3d8ae9db4472> | CC-MAIN-2022-33 | https://wp.dailybruin.com/2022/06/25/hundreds-protest-in-la-against-us-supreme-court-ruling-overturning-roe-v-wade/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.962402 | 844 | 1.75 | 2 |
Your Baby’s Hunger Cues:
- Smacking or licking lips
- Opening and closing mouth
- Sucking on the lips, tongue, hands, fingers, toes, toys, or clothing
Active Feeding Cues
- Rooting around on the chest of whoever is carrying him
- Trying to position for nursing, either by lying back or pulling on your clothes
- Fidgeting or squirming around a lot
- Hitting you on the arm or chest repeatedly
- Fussing or breathing fast
Late Feeding Cues (calm baby before feeding)
- Moving head frantically from side to side
“My newborn wants to sleep all the time! Should I wake her to nurse?”
Yes, if she doesn’t wake on her own. Many newborns are very sleepy in the early days or weeks and may not exhibit hunger cues as often as they actually need to eat.
Newborns should be nursed anytime they cue hunger, but at least every 2 hours during the day (normal for a newborn to nurse 8-12 times in a 24-hour period).
Once your baby has established a good weight gain pattern (at least 4 ounces per week, for babies under 4 months), you can stop waking baby to nurse and let him set his own pattern.
“My baby just started sleeping longer at night. Do I need to wake him to nurse?”
If your baby is younger than 4 weeks, then it is a good idea to wake baby at least every 4-5 hours at night to nurse if he does not wake on his own. If your child is older than 4 weeks, you can allow baby to sleep as long as he wants at night as long as he is peeing, pooping, and gaining weight within normal parameters.
“My baby frequently sucks on his hands. Does this always mean that he’s hungry?”
After the newborn period, hand sucking is not as reliable an indicator of hunger. Starting at around 6-8 weeks, baby will begin to gain more control over his hands and will soon begin to explore his hands and everything else using his mouth. It is also common for babies to suck on their hands when their gums become tender in preparation for tooth eruption. Symptoms of teething can sometimes occur weeks and even months before the first tooth erupts.
We Can Help You
Call +1 (212) 749-6613 or Email firstname.lastname@example.org
Let our Postpartum Doulas help you if your baby is not feeding regularly, having difficulties, or you don’t understand the baby’s cues.
A Doula Care Postpartum Doula is trained and certified to help you with all the normal breastfeeding basics, and your newborn care needs. Trained to assess if a further referral is needed to an IBCLC or breastfeeding medicine physician. | <urn:uuid:3625f30e-0b89-44a0-aff3-e6b90ba1c850> | CC-MAIN-2022-33 | https://doulacare.com/blog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.962974 | 614 | 2.375 | 2 |
Publications ArchivePublication Category: General Resources
2016 Impact Report
With your help, in 2016, we:
- Provided free legal services to 1,314 immigrant women and girls and 1,202 of their family members
- Connected 715 clients and family members with vital social services including emergency shelter, food and clothing, and healthcare
- Marshaled an army of 1,976 attorneys in our Pro Bono Network to leverage donated resources and maximize our capacity, turning every $1 donated to Tahirih into $4 of impact
Read our full Impact Report for a snapshot of what we accomplished together!
Tahirih Recommendations for Protecting Survivors of Violence
The Tahirih Justice Center delivered this report to the White House on April 4, 2017, which provides administration officials with a summary of Tahirih’s recommendations on immediate actions to take to protect immigrant survivors of gender-based violence.
Backgrounder on HB 799 / SB 861 to Raise Maryland’s Minimum Marriage Age
This backgrounder provides statistics on Maryland’s child marriage problem and discusses HB 799/SB 861, a commonsense, bipartisan bill to ensure full and free consent to marriage will promote the health and well-being of Maryland’s children.
Summary of February 13, 2017 Asylum Division Lesson Plan
This report analyzes the Updated Asylum Division Officer Training Course Lesson Plans: Credible Fear of Persecution and Torture Determinations, and Reasonable Fear of Persecution and Torture Determinations, issued through a memorandum signed on February 13, 2017, by John Lafferty, Chief of the Asylum Division at the U.S. Department of Homeland Security. The new lesson plans went into effect on February 27.
Review of February 20 Department of Homeland Security Memoranda
This report reviews two memoranda issued on February 20, 2017, by John Kelly, Secretary of the Department of Homeland Security (DHS). These DHS memos not only embrace and uphold the significant policy changes put forth in the immigration executive orders signed by President Trump in January but also add directives that are likely to further impair survivors’ ability to access the protections they need and merit under existing U.S. law.
Statement on the Arrest and Detention by ICE of a Survivor of Domestic Violence at a Courthouse
The Tahirih Justice Center and national organizations dedicated to supporting immigrant survivors of domestic violence join in condemning the arrest and detention of a survivor of violence in El Paso, Texas, by the Department of Homeland Security (DHS) while she was attending a court hearing in connection with her abuse.
Analysis and Statement of Opposition to H.R. 391 Asylum Reform and Border Protection Act of 2017
H.R. 391, introduced on January 10, 2017, would further restrict access to critical, life-saving legal remedies for immigrant women and girl survivors of violence such as sexual assault, human trafficking, and domestic violence. This paper analyzes the bill’s provisions and outlines Tahirih’s opposition to the bill. | <urn:uuid:0b31d4ed-40e4-4228-9c8a-8e9b91115a0f> | CC-MAIN-2022-33 | https://www.tahirih.org/pub_cat/general-resources/page/6/?cpt=pubs | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.928969 | 640 | 1.695313 | 2 |
Romanians will benefit from an eco-voucher worth EUR 6,500 for buying an electric car or vehicle with a zero pollution degree, according to a Ministry of Environment’s draft project which needs approval. The budget covers 100 eco-tickets.
The state also needs to implement in the following years a program which aims to install 10,000 outlets for charging electric cars. Romania has now about 50 such devices, according to Adrian Gearap, president of the Environment Fund Administration.
The number of eco-cars sold in Romania in the first quarter of the year reached 59 units. Only one of these was an electric car, while the rest were hybrids. | <urn:uuid:5ad73bc3-356c-4235-a339-29ce2c1ef97a> | CC-MAIN-2022-33 | https://www.emove360.com/romania-supports-eco-cars-purchase-with-new-voucher-program/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.957203 | 148 | 1.921875 | 2 |
Up until recently, I knew nothing about Yemen. The discourse here in Norway (and in the West in general) focuses on areas that we are highly involved in. That (usually) means areas in which we have a vested interest (Oil. Oiloiloiloiloil).
We’ve have (for instance) attempted to solve several global conflicts and have been part of many peace-negotiations, but we’re not that great at it (If I may say so). We have made multiple attempts at solving the Palestinian/Israeli conflict.
We are clearly master-negotiators!
Yemen however, has never been on our radar. Our trade with Yemen is minimal. Of all the people I have (informally/sneakily/not to their knowledge) surveyed, there has not been a single individual who has any knowledge of Yemen. The same goes for me. I knew nothing about Yemen prior to the arrival of a super-smart, compassionate and clever young Yemenite in my Norwegian language class. This kid is wise beyond his years, super-nice, and he spends about 90% of his time helping others.
As my ignorance became increasingly more intolerable, I finally decided to attend a couple of talks on the subject of Yemen (So, now I consider myself an expert ;)). Prior to the talks (and because I am a super-curious (nosy?) person), I started investigating.
Here’s a bullet-point breakdown:
- The country is large and has a fairly large population as well. It is the second largest country in the Arabian peninsula and the population is estimated to be over 27.000.000
- Yemen has an incredibly rich history. You know, the Queen of Sheba? She was from Yemen! And, Yemen was part of what was known as Arabia Felix, that is, the fertile/happy/fortunate/blessed/flourishing Arabia. The history of the country is remarkable.
- It has been ruled by several dynasties, and was until 1967, a British protectorate.
- There have been several long-running conflicts between the North and the South; the conflicts are not straight-forward though. Alliances shift, and they are often based on tribal belonging rather than the “government vs. Houti” understanding I previously had. This is similar to areas of Afghanistan. To say that someone belongs to “The Northern Alliance” or the Taliban is not accurate. Alliances change based on what there is to gain. It is one of those “my enemy today might be my friend tomorrow”-situations.
- Yemen is currently very poor. The average yearly income is $2400, and it is (as of now) the poorest country in the Middle East. I’ll explain why a little later.
- Maybe the most important problem in Yemen, is that the country has been described as being a kleptocracy. That is, a country governed by corrupt leaders who exploit and steal resources for personal gain. Former President Saleh appears to have been just that.
- Yemen is most definitely a Muslim country. 99.1% are Muslims, and the remaining 0.9% are Jewish, Baha’i, Hindu and Christian. I have found conflicting information about which direction of Islam Yemenites belong to. Some state that they are Sunni, others claim that the majority are Shia. Some say that it is about a 50/50 split between Sunni and Shia. The most reliable sources claims that it is a Shia-leaning-towards-Sunni country.
- Yemen is conservative. There is a substantial number of niqab-wearers among Yemeni women, but it is in no way mandatory.
- The population is young. Approximately 60% of the population is between 0-24 years old, and an additional 32.3% are between 25-54 years of age. The 55-64 year olds only make up 3.94%, and those 65 and older only make up 2.75% of the population. So, the median age (the most common) is about 19 years. I now feel ancient. And a little depressed.
- What might also be interesting is the life-expectancy of Yemenites: it is at about 65 years, which is depressingly low. Keep in mind that there is little to almost no HIV/AIDS and other similar life-expectancy-lowering diseases. In comparison, the Norwegian life-expectancy is about 82 years, and in the U.S, the life-expectancy is at about 78 years (though, if Trump remains President, I expect to see a sharp decline).
- On a more light-hearted note, Yemen has spectacular nature and grand architecture! Just check out the pictures below.
Recently there has been a bit of reporting on the famine in Yemen, particularly so on social media, but we’re not getting much information about why people are starving.
So, what is the problem? Well, I am not sure I entirely understand, and my student told me that even most Yemenites are somewhat confused. As I wrote earlier, there are conflicts between several factions, and the last conflict started with the Arab Spring. To understand how Yemen has remained fairly unstable (but also out of the Western media) one has to know a little about former President Ali Abdullah Saleh. He was the president of northern Yemen from 1978-1990, and the president of a united Northern and Southern Yemen from 1990-2012. Saleh was a strongman in the truest sense of the word. And, according to the lecture I attended last Saturday, he was also a master manipulator and a genius at both building and switching alliances. Saleh was killed in December 2017. It is claimed that Saleh was a behind-the-scenes leader of the Houthi take-over of Yemen. The Houthi/Ansar Allah is a religious, but also political grouping who were initially fighting Saleh, whose allies include Iran and Syria. Saleh managed to maintain a fairly unstable peace, but peace nonetheless. Now that he is gone, it’s anyones guess what will happen next.
There is another faction, Al Hirak, who in the 90’s sought decentralization and independence for the south. They have formed an alliance with the Saudis and have a running conflict with the Houthis. Further, there is Al Islah, whom previously were the enemies of Saudi, but who now are Saudi-backed. To muddle up the picture, there’s also a particularly aggressive fraction of Al-Qaeda active in the region..
Confused? So am I…
Now, in order to keep things (fairly simple), there are two major outside powers involved in the conflict. One being Saudi Arabia and the other being Iran. A third, lesser actor is the United Arab Emirates. Al Isla is a Saudi-backed grouping, and the Houthis are backed by Iran (for now). The Emirates and Saudi are not getting along, and as such, they support different sides in Yemen. Iran appears (again, according to the lectures I attended) to have provided the Houthis with SCUD-missiles. Some of these have been launched in to Saudi, and as retaliation, the Saudis have ensured a blockade on import of food and necessary goods to Yemen. This blockade is responsible for the starvation and suffering of millions of people. Not one of the outside actors are innocent in this scenario. Iran is to fault for supplying weapons, and the Saudi’s are at fault for the blockade. And before one makes a stab at the “why can’t they grow their own produce?” argument, there this: inside Yemen, there’s been a problem with depleting ground water. Why?
Khat is a mild stimulant. The leaves of the plant are chewed in Yemen, Somalia and other places in the region. The WHO does not consider the plant to be very harmful, but use can lead light psychological dependence (keep in mind, coffee-use can lead to actual physical dependence, so.. There’s that. Alcohol is also highly addictive, both physically and psychologically).
So, what we do know is that 3 million have fled the country. Very few have ended up in Europe; many more have ended up in Somalia. When I asked about why they flee to Somalia, I was told that it might be a combination of conservativism and finances/funds (it is prohibitively expensive to travel to Europe/America). We also know that 19 million more are in need of aid. Diphtheria and Cholera runs rampant, and people are dying from starvation and easily preventable diseases.
It is not all that expensive to lend a helping hand either. It will set you back the equivalent of about 6 Starbucks coffees, a pair of jeans or a meal at a mid-priced restaurant (a cheap restaurant if we’re talking Norwegian prices).
Donate here! I promise it will be worth it :) | <urn:uuid:19431533-021d-428b-84a0-785c9a36459f> | CC-MAIN-2022-33 | http://susankhanoom.com/on-yemen-and-a-forgotten-tragedy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.971386 | 1,877 | 1.84375 | 2 |
The guideline advancement normal endeavor parties are the owner, the architect and the venture specialist. The owner requirements are suggested to engineers, who subsequently, guide the owner in the strategy for improvement normal, keeping in view the base prosperity necessities, most concise possible season of satisfaction and lowest cost of advancement normal. A nice suggestion can be achieved by a gathering of improvement designers, sketchers, and general for employ specialist for enlist, maker, materials merchants, gear wholesalers, government bodies and associations.
The advancement primary originator’s fundamental commitment is to rehearse quality control during the execution of the endeavor. Dependent upon the possibility of the work, different kinds of arrangements are used in the construction business. In projects where execution of work is to be finished by the usage of improvement normal stuff, the it are better known to follow three kinds of arrangements In this sort of understanding all of the reasons of the endeavor should be properly arranged and surveyed before the laborer for recruit is drawn closer to fragile his rate. Consequently this is the most ideal sort of the understanding. In this understanding the owner pays a nice measure of money for the complete endeavor. Thusly, expecting a comparable kind of improvement is Vacatures Uitvoerder be repeated time and all important data of the work are open then single sum contract is by and large suitable.
In this understanding, the laborer for recruit is drawn closer to execute the various things of work showed in the schedule at the offered rates. The task specialist gets portion at decided ranges during the execution of the work dependent upon the value of work executed. This sort of arrangement is generally typical since it is plausible to prepare assessed measures of various things of work in view of complete assessment of practically identical Wegenbouw Vacatures. In this understanding, the undertaking laborer is supposed to execute the work as per plans, judgments and drawings which structure the piece of the arrangement bond. The portion is made to the specialist for employ in light of area costs brought about by the laborer for recruit. | <urn:uuid:b61d66a9-bc87-4912-9cfc-d40162dbd2e8> | CC-MAIN-2022-33 | https://www.rosehillmanordayschool.com/general/opportunities-accessible-from-development-civil-contractors-from.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.95351 | 409 | 1.890625 | 2 |
This post was updated to reflect current trends and information. We often get asked questions about EDI (Electronic Data Interchange), so we decided to write this article to answer the most common questions we get. We also provide you with useful links in case you’d like to explore further. 1. What is EDI? (Electronic Data …
This post was updated to reflect current trends and information. To exchange business documents and transactions between business partners via EDI (electronic data interchange), most companies in North America use the EDI ANSI ASC X12 Standards. This overview provides some basic information about the X12 standards for electronic data interchange (EDI). Useful: What is EDI? …
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. | <urn:uuid:440f79a3-e4e3-4a0e-a51f-9264384468be> | CC-MAIN-2022-33 | https://www.edi2xml.com/blog/tag/edi-standardization/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.930531 | 394 | 2.015625 | 2 |
Background: Small bowel involvement in Crohn’s disease (CD) is frequently proximal to the ileocecal valve and inaccessible by conventional ileocolonoscopy (IC). Small bowel capsule endoscopy (SBCE) is among the prime modalities for assessment of small bowel disease in these patients. Intestinal ultrasound (IUS) is an accurate bedside fast and low-cost diagnostic modality utilized in CD for both diagnosis and monitoring. The aim of this study was to examine the accuracy of IUS in patients with suspected CD after a negative IC, and to evaluate the correlation of IUS with SBCE, inflammatory biomarkers and other cross-sectional imaging techniques. Methods: Prospective single center study in which patients with suspected CD underwent IUS and SBCE examinations within 3 days. IUS results were blindly compared with SBCE that served as the gold standard. A post hoc comparison was performed of IUS and SBCE results and available cross-sectional imaging results (computed tomography or magnetic resonance enterography) as well as inflammatory biomarkers if measured. The study cohort was followed for 1 year. In case of discordance between the IUS and SBCE results, the diagnosis at 1 year was reported. Results: Fifty patients were included in the study. The diagnostic yield of both IUS and SBCE for the diagnosis of small bowel CD was 38%. The IUS findings significantly correlated to small bowel inflammation detected by SBCE (r = 0.532, p < 0.001), with fair sensitivity and specificity (72% and 84%). Cross-sectional imaging results significantly correlated to IUS as well (r = 0.46, p = 0.018). Follow up was available in 8 of the 10 cases of discordance between IUS and SBCE. In all of these cases, diagnosis of CD was not fully established at the end of the follow up. Conclusions: The diagnostic yield of CE and IUS for detection of CD in patients with negative ileocolonoscopy was similar. IUS can be a useful diagnostic tool in suspected CD when IC is negative.
- Crohn’s disease
- intestinal ultrasound
- small bowel capsule endoscopy | <urn:uuid:7aac3af9-5e51-43a7-93a0-cc2464ffe836> | CC-MAIN-2022-33 | https://cris.tau.ac.il/en/publications/the-accuracy-of-intestinal-ultrasound-compared-with-small-bowel-c | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.957331 | 465 | 1.59375 | 2 |
Should I Get an MHA/MBA Dual Degree?
| Melissa Sartore Updated on July 18, 2022
Are you ready to discover your MBA program?
An MHA/MBA unites healthcare administration and business content, allowing students to earn both degrees at the same time. A master of healthcare administration (MHA) includes coursework in topics like healthcare economics, health finance, and healthcare organization management. A master of business administration (MBA) emphasizes strategic management, global business, and ethical leadership.
A dual MHA/MBA degree builds business acumen specific to the healthcare industry. The typical program lasts 2-3 years. MHA/MBA dual degree candidates usually hold a bachelor's degree in healthcare administration, business, or related field. Most have experience working in healthcare or business.
MHA/MBA graduates can pursue leadership roles at hospitals, pharmaceutical companies, and healthcare technology businesses. Other roles for people with MHA/MBAs include positions in healthcare consulting and public health.
Why Enroll in an Online MHA/MBA Dual Degree Program?
Healthcare workers who want to focus on the administrative and business side of operations can build the necessary skills through an MHA/MBA program. For business professionals who want to move into the healthcare industry, an online MHA/MBA builds on existing knowledge while putting it into a healthcare framework.
Either way, an MHA/MBA lets students earn both degrees at the same time. Studying online may offer more flexibility and convenience than many on-campus programs.
An MHA includes business coursework while focusing on managerial and organizational aspects of healthcare. An MBA is a general business degree. Unlike a traditional MHA or MBA, the dual MHA/MBA combines content from both fields.
A typical master's degree includes about 30 credits. Learners can complete most master's programs in two years or less. A dual MHA/MBA degree may take three years and require up to 60 credits. An internship or practicum in a clinical setting also makes an online MHA/MBA different from other master's programs.
Students gain both hard and soft skills in an online MHA/MBA program.
What to Expect From an MHA/MBA Dual Degree Program
An MHA focuses on healthcare leadership, while an MBA emphasizes business leadership. A dual MHA/MBA concentrates on leadership in the healthcare business.
In contrast to the two years it usually takes to earn an MHA or an MBA, an MHA/MBA dual degree takes about three years to complete. The program integrates coursework from both programs. Many classes unite healthcare and business principles and practices through activities, projects, and hands-on experiences.
Because both an MHA and an MBA include about 30 credits, a dual degree may require up to 60 credits. Some degrees include fewer credits due to course consolidation and overlap.
MHA or MBA candidates who transfer into an MHA/MBA program may take less time to earn a dual degree. Transferability of credits depends on factors like accreditation, course equivalency, and course performance.
Degree and Concentration Options
Not all schools offer dual MHA/MBA programs, even if they do have separate MHA and MBA options. Degree-seekers may still be able to pursue a degree that includes coursework in both healthcare and business.
MHA candidates can often specialize in areas like health policy analysis, health finance, or health information systems. Many MBA programs offer concentrations in healthcare administration.
The difference between these offerings and an MHA/MBA dual degree rests in the extensiveness of the coursework. MHA or MBA concentrations may include more limited classes that introduce learners to the topics or build expertise in a limited subset of healthcare or business.
For example, an MBA healthcare administration concentration may include single classes in areas like finance and management. An MHA/MBA dual degree may offer several courses in those areas.
Curriculum for MHA/MBA Dual Degree Programs
The curriculum for an MHA/MBA includes core classes for healthcare administration and business administration. Candidates also take advanced courses in both fields. Coursework features opportunities to apply the concepts, practices, and tools to real-world healthcare industry scenarios.
Organizational behavior: Organizational behavior coursework examines how humans behave alone and in groups. Topics include communication, motivation, conflict resolution, and change. Participants learn to manage effectively and efficiently in an organizational environment. Health policy and economics: This course looks at how the healthcare sector, government agencies, and the economic landscape function together. Learners gain insight into how patients, providers, and stakeholders shape the healthcare market. Other topics include insurance, access to care, spending, and healthcare technology. Quantitative methods: A quantitative methods class introduces theories, tools, and techniques for measuring data and testing hypotheses. Students learn to make observations and report data in written and graph formats. Accounting and finance principles for healthcare: This course focuses on the principles and operations of monetary oversight in healthcare organizations. Class topics include budget management and financial data assessment. Enrollees learn to apply financial strategies within the healthcare system. Marketing management: Marketing management classes cover how to plan and execute marketing practices. Coursework explores areas like pricing, promotion, and strategy. Students learn to assess customer needs and wants in a competitive environment. Other topics include market forecasting, collaboration, sales, and distribution. Population health and data analytics: This class teaches participants to gather and analyze data to make health decisions for specific groups. Learners study predictive analytics, model development, and performance measures as they apply to prevention, diagnosis, and healthcare efficacy.
To enroll in an MHA/MBA program, candidates need at least a bachelor's degree. Many programs require previous coursework in business, healthcare administration, or both. Applicants may also need relevant prior work experience. A professional background in healthcare or business may increase chances of acceptance even when it is not required.
Online MHA/MBA application requirements may include a fee, letters of recommendation, and a resume. Applicants also need to submit transcripts from any previous college coursework. Many programs ask candidates to answer questions about their educational and professional goals.
Some schools may set GRE or GMATrequirements. Students should check with each program to allow enough time to complete the exam and submit their scores. Some applicants may receive a waiver based on their GPA or work experience.
The ROI of an MHA/MBA Dual Degree Program
Evaluating return on investment, or ROI, can help you determine the worth of your degree. To calculate the ROI of an MHA/MBA, consider how long the program will take, factoring in tuition costs and other expenses. Include any income losses you may incur during the program.
Next, estimate what gains you can expect from earning a dual MHA/MBA degree. These include expected salary after graduation, potential future earnings and career growth, and personal benefits from continuing your education.
The interactions among these data points can provide an estimate for the ROI of an MHA/MBA dual degree. However, you should also consider time frame and larger social factors. It may take years to see the true value of an MHA/MBA, and economic factors beyond your control can always influence the final outcome.
MHA/MBA Career Opportunities After Graduating
Career opportunities for MHA/MBA dual degree-holders extend throughout the healthcare industry. Graduates can work in the private sector as healthcare managers or executives. They may also qualify for public sector roles in areas like public health and policy.
Nursing home administrators: Nursing home administrators oversee the daily operations of nursing homes and comparable facilities. They manage staff, maintain budgets, and ensure compliance with applicable regulations and laws. According to PayScale, nursing home administrators earned an average annual salary approaching $94,000 as of June 2022. Clinical managers: Clinical managers supervise clinics and medical offices. They coordinate daily operations and work with staff and medical providers to ensure quality patient care. They also evaluate the facility's practices and processes. Their duties may include overseeing budgets and making schedules. Payscale reports that clinical managers earned an average salary of over $73,000 a year as of June 2022. Hospital administrator: Hospital administrators ensure efficient, effective hospital operations. They supervise financial matters, oversee staff, and coordinate with department managers. Administrators also make sure a hospital follows applicable regulations and laws. Payscale reports that hospital administrators made an average annual salary of over $88,000 as of June 2022. Health information managers: These professionals earned an average annual salary of over $58,000 as of June 2022, according to Payscale. Health information managers oversee information systems and record-keeping technologies. They develop and implement healthcare data policies. They may also supervise healthcare information specialists and support staff. Health information managers work with fellow managers to ensure accuracy and confidentiality.
Common Questions about MHA/MBA Dual Degrees
How much does an MHA/MBA dual degree program cost?
The cost of an MHA/MBA dual degree varies by program. According to the National Center for Education Statistics, tuition and fees for a master's degree averaged $19,792 during the 2019-2020 school year. By earning a dual degree, students may save over the cost of earning each separately. An online program can also mean fewer expenses than an on-campus program.
How much money can I earn with an MHA/MBA dual degree?
MHA/MBA graduates can work in many healthcare administration positions. Positions for MHA/MBA degree-holders include hospital administrators and clinical managers. According to Payscale, these professionals earned over $88,000 and $73,000 a year, respectively, as of June 2022.
Is an MHA/MBA dual degree worth it?
If you want to lead in the healthcare industry, an MHA/MBA is often worth it. An MHA/MBA can give graduates the healthcare administration and business acumen to thrive in many healthcare careers.
What can I do with an MHA/MBA dual degree?
With an MHA/MBA, you can work as a manager or executive at a healthcare facility or organization. You can also pursue a career in public health and policy, in the insurance industry, or with a pharmaceutical company.
- Average and percentiles of graduate tuition and required fees (2020).
- Payscale. (2022). Average clinical manager salary.
- Payscale. (2022). Average health information manager salary.
- Payscale. (2022). Average hospital administrator salary.
- Payscale. (2022). Average nursing home administrator salary.
Featured Image: fizkes / iStock / Getty Images Plus
Search Programs by Concentration
View schools and degrees from across the country.
Find the right program to advance your career. | <urn:uuid:67fd4ad4-9a45-4a48-b27a-bc3351ac462e> | CC-MAIN-2022-33 | https://www.onlinemba.com/dual-degrees/mba-mha/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.932436 | 2,401 | 1.828125 | 2 |
The energy industry has truly pushed the boundaries over time, whereby technology has been a true enabler. Yet, despite the undeniable role that technology has played, it is also clear that there is significant room to further accelerate the speed of technology deployment. Including the deployment of technologies to cut emissions.
As a result, many people have been tasked with building a Technology Plan for their organisation; we notice that from the requests we have received since starting TechnologyCatalogue.com in 2018.
For those that have never built such a plan, it can be difficult to determine where to start.
In this blog we give you some practical guidance.
Understanding the business needs
As a starting point, it is a good practice to collect the business needs. This can be done in different ways, e.g. by interviewing people across the organisation, or e.g. by simply asking people to respond to an e-mail with the question what the 3-5 main challenges are that the person faces in his or her job.
The starting point can also be existing information, such as a risk register, the scope & schedule for an upcoming turnaround, or for example a list of closed-in wells, and the reasons for being closed in.
Replicating what has worked for others
Another starting point for building a Technology Plan can be to create an overview of what has worked for others; particularly technologies that worked for companies that operate in the same geographical area and/or have similar type of assets and projects. If something has made money for other companies, it can also be a quick win for your company!
When it comes to selecting technologies that can be relevant to your business, it’s good to keep in mind that very few assets and projects are truly unique. The typical challenges that one UK Oil & Gas Operator faces are often not that different from what other Operators in the UK face; and also not that different from what Operators in the Norwegian or Dutch part of the North Sea face.
TechnologyCatalogue.com can support you with finding solutions that have worked for others. The platform was developed based on first-hand experience that it is often difficult for decision makers to stay up to date on available technology-driven improvement opportunities for their business. Similar to how we use platforms such as TripAdvisor and Booking.com in our daily life to find out about hotels, TechnologyCatalogue.com helps users to see the wood for the trees when it comes to available technologies. Since the launch in 2018, >180,000 unique users have accessed the platform. The platform helps suppliers to create more visibility for their technologies, this way increasing the chances that the technologies get used. It offers additional channels to reach end-users.
Creating a list of technologies
Whenever we support a company with building a Technology Plan, we typically start with a list of ~30-50 technologies per asset or project. This includes digital as well as non-digital technologies. The technologies are selected taking into account the business need, and also taking into account what has worked for others, in line with the paragraphs above.
To aid the selection process, we then provide the following information for each technology, to the extent that the information is available.
- Names of the supplier(s) that can deliver the technology, either directly or through another party
- Brief description of the technology
- Business impact indication
- Summary of technical specifications
- Technology Readiness Level
- Deployment references - overview of companies that have used the technology, including companies in the same geographical area; or companies with assets or projects similar to assets and projects of your company.
- Reviews from independent experts
With the information available, conscious decisions can be taken.
The list of technologies forms the input for a workshop. We recommend to reserve 4-8 hours for such a workshop, depending on the breadth of the challenges that need to be discussed.
Depending on the size of your company, it can be one single workshop in which a technology screening is done for the entire company. It can also be done through a series of workshops.
The workshop can be held face-to-face, but it’s also perfectly fine to do through a series of video calls.
The people to be invited for the workshop need to be directly involved with the challenges, and be in a role where they can take the follow-up action leading to getting the technology used.
The following can serve as agenda for such workshop:
- Safety & Introductions.
- Assessing the Impact versus Do-Ability of technology
- Go through the list of identified opportunities. Rank the technologies based on impact and do-ability.
- Select key opportunities, and estimate the business impact
- Identify a Technology Deployment Lead and Decision Maker for each technology
- Next steps & closure
Let’s go through the agenda items in a bit more detail.
Safety & Introductions
It is recommended that each workshop is kicked-off by a senior leader, to clearly give the message that it is an activity that senior management considers important.
Assessing the Impact versus Do-Ability of technology
A key element of the workshop is to rank the identified technologies in terms of Impact versus Do-Ability.
When we support our customers with assessing the Impact versus Do-Ability, we make use of our Tech Assessment Tool. With the Tech Assessment Tool, a technology is assessed against criteria grouped under 7 themes, through a structured dialogue with key stakeholders. The Tech Assessment Tool provides key insights into the reasons why a technology is difficult or relatively easy to deploy. Also, based on the outcome of the Tech Assessment Tool, specific actions can be defined to increase the chances of success. The outcome of the Tech Assessment Tool is visualised with a spider diagram and an Impact versus Do-ability matrix. The matrix is particularly useful when showing the position of multiple technologies in one graph.
Outcome of the Tech Assessment Tool using an Impact versus Do-ability Matrix
It is important that all workshop attendees reflect beforehand what the key aspects are that determine the Impact and Do-ability of a technology, and to have an open dialogue during the workshop.
Go through the list of identified opportunities
The next agenda item of the workshop is to go through the list of technologies, and assess the position on the Impact versus Do-ability matrix for each technology. The outcome can be summarised using the Impact versus Do-Ability Matrix.
It is key that the workshop facilitator gently challenges the workshop participants where needed, and also holds up the mirror! It is not uncommon that comments such as “this won’t work for us” come up, and these need to be addressed, e.g. by pointing out facts that a technology has already been used X times by other companies operating under similar conditions.
Using the Impact versus Do-Ability matrix to show the position of multiple technologies.
Select key opportunities
Based on the analysis done, a selection can be made of the top opportunities to pursue.
It is important though that your portfolio contains the right type of technologies; not only technologies that can make an impact in the medium- to longer-term, but also technologies that can make an impact right away.
Selecting key opportunities.
The quick wins not only deliver short-term impact; they can also help to pave the path for the next wave of high impact technologies.
As part of the workshop, it is important to make a rough business impact estimate for the selected technologies, in terms of OPEX, CAPEX, Production, CO2 emission reduction, safety improvement, and potentially other measures.
Identify a Technology Deployment Lead and Decision Maker for each technology
It is important that a Lead is identified for every technology that has been selected. This person is responsible for working out a detailed plan, and for getting the technology deployed. For each technology, it also needs to be defined who the decision maker is.
Next steps & closure
The outcome of the workshop should be presented to the same senior leader that kicked-off the workshop. This way immediately highlighting the potential size of the prize to the company! The support from the senior leader will help to build momentum.
Follow-up working sessions & dialogues
Following the workshop, it is important to further determine the specific business impact of the technology.
Also, a detailed action plan needs to be created for each technology. The insights as a result of using the Tech Assessment Tool will help. This programme is based on >600 deployments that we have been involved in over the years, and will help to define specific technical and non-technical actions to be taken to position the technology for success.
Compiling the Technology Plan
Working the steps as described in this blog forms the basis for a Technology Plan for an asset, project, or the entire company.
It requires significant effort to compile such a plan when you do it for the first time. Once it is in place, there are many opportunities to streamline the process.
For example, the moment you keep an evergreen overview of business challenges, and an evergreen overview of technologies that can be relevant to your business, the selection of technologies goes quickly.
Just having a Technology Plan is not sufficient though. It is important to keep in mind all critical success factors for technology deployment, such that you generate the most value for your business through technology deployment! Please see our recent blog, How effective is your company in getting technology deployed?.
There are many opportunities to make a difference with technology. A fit-for-purpose Technology Plan is thereby key. Through this blog, we hope you gained some insights on which steps to take!
We can support you with building a Technology Plan, and also support you with setting yourself up for success such that you can do it yourself in the future with a minimum of external support.
Curious how we can help you? Please contact us at firstname.lastname@example.org!
The founders of TechnologyCatalogue.com led technology deployment activities in support of assets and projects across Shell. Over 600 deployments were successfully delivered, resulting in a very significant impact on safety, production and cost. We understand what it takes to get technology deployed, including all change management aspects related to it. Since starting TechnologyCatalogue.com in March 2018, we have supported tens of companies with technology deployment.
Our platform TechnologyCatalogue.com was developed based on first-hand experience that it is often difficult for decision-makers to stay up to date on available technology-driven improvement opportunities for their business. It was launched in Q3 2018 and is steadily growing in terms of content & functionality. Since the launch, >180,000 unique users have accessed the platform. We’re also developing customised versions of the platform. For example, jointly with National Energy Resources Australia, we have delivered a customised version of the platform for Australia (Nera.TechnologyCatalogue.com)
In addition to TechnologyCatalogue.com, we also support suppliers and end-users with getting technology deployment done, through consultancy & workshops. | <urn:uuid:576244dc-52a1-4a9a-9092-703f97dd40c3> | CC-MAIN-2022-33 | https://www.technologycatalogue.com/blog/how-build-technology-plan-practical-guide-leaders-and-practitioners | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00465.warc.gz | en | 0.946365 | 2,274 | 1.710938 | 2 |
3 edition of Melville"s uses of Shakespeare"s plays found in the catalog.
Melville"s uses of Shakespeare"s plays
Written in English
|Statement||by Roma Rosen.|
|The Physical Object|
|Pagination||iv, 251 leaves|
|Number of Pages||251|
Buy Shakespeare plays books from today. Find our best selection and offers online, with FREE Click & Collect or UK delivery. Reading Shakespeare. To celebrate William Shakespeare ‘s th birthday, I read all of his works and blogged about and rated each play. I also posted a few thoughts after reading all of Shakespeare.. My blogs include a Bard Rating (see explanation below); a few words that capture the message I got from the play; quotes I like. I don’t attempt serious analysis, but my blogs .
The last suggestion is given some credence by the academic style of his early plays; The Comedy of Errors, for example, is an adaptation of two plays by Plautus. In Shakespeare became an actor and playwright for the Lord Chamberlain's Men, the company that later became the King's Men under James I. Note: In compliance with the accepted terminology used within the Shakespeare authorship question, this article uses the term "Stratfordian" to refer to the position that William Shakespeare of Stratford-upon-Avon was the primary author of the plays and poems traditionally attributed to him. The term "anti-Stratfordian" is used to refer to the theory that some other author, or .
plays. Most of the elevated passages and heavy soliloquies are poetry, or, at least, poetic prose. The style is a trifle artificial ; vowels are repeated, alliteration is noticeable, and phrase is balanced against phrase. Many parts of the book could be scanned . First published years ago, Shakespeare's sonnets might never have been put to press had it been left to the author to decide things. As Clinton Heylin, the author of the new book So Long as.
old St. Andrews road
WordPerfect 6 for DOS
Index to the occupiers of property and land listed in the book of Northfield Tithe apportionments, 1840.
Miss Maggie and the doctor.
Drugs and Security in a Post-September 11 World: Coordinating the Counternarcotics Mission at the Department of Homeland Security
Projections of supply and demand for selected agricultural products in Central America through 1980.
Life and journals of Lord Byron
Latin kingdom of Jerusalem
study of the salaries and teaching loads in denominational 4-year colleges and private junior colleges in United States
The soul of Rumi
Municipal financial tools for planning and development.
manual of the common contagious diseases
Municipal land policy and control
The Cat With a Black Ring
Forming a contemporary view of Shakespeare's plays, including plays missing from other lists. Score A book’s total score is based on multiple factors, including the number of people who have voted for it and how highly those voters ranked the book.
out of 5 stars Twelve Plays by Shakespeare. Reviewed in Canada on Verified Purchase. William Shakespeare Convenient and inexpensive, this box set features a dozen of the Bard's most popular dramas. Unabridged texts of Hamlet, Richard III, A Midsummer Night’s Dream, The Merchant of Venice, Romeo and Juliet, Macbeth, The /5(67).
Centuries later, doubts persist that William Shakespeare penned the works that bear his name. Skeptics include not only scholars but also famous folks, ranging from Orson Welles to Mark Twain. Herman Melville was deeply influenced by Samuel Taylor Coleridge’s lecture on has long been established and they allusions Melville makes to Hamlet and other plays by Shakespeare are countless.
I believe that Shakespeare influenced Melville to the point where Moby Dick is a contemporary version of order to illustrate my point, I will list. William Shakespeare is widely regarded as one of the greatest writers in the English language.
He was born on or around 23 April in Stratford-upon-Avon, the eldest son of John Shakespeare, a prosperous glover and local dignitary, and Mary Arden, the daughter of a wealthy : Inappropriate The list (including its title or description) facilitates illegal activity, or contains hate speech or ad hominem attacks on a fellow Goodreads member or author.
Spam or Self-Promotional The list is spam or self-promotional. Incorrect Book The list contains an incorrect book (please specify the title of the book). Details *. A young Venetian, Bassanio, needs a loan of three thousand ducats so that he can woo Portia, a wealthy Venetian heiress.
He approaches his friend Antonio, a merchant. Antonio is short of money because all his wealth is invested in his fleet, which is currently at sea.
He goes to a Jewish money lender, Shylock read full The Merchant of Venice. William Shakespeare - William Shakespeare - Shakespeare’s plays and poems: Shakespeare arrived in London probably sometime in the late s.
He was in his mids. It is not known how he got started in the theatre or for what acting companies he wrote his early plays, which are not easy to date. Indicating a time of apprenticeship, these plays show a more direct debt to. "Stylistically, Melville was influenced by Sir Thomas Browne, the 17th Century writer whose prose impressed many American authors of the 19th le also drew heavily on Shakespeare both for style andfor example, seems to be modeled after the Fool in King defying the fire in Chapter recalls Lear out in the the storm on.
The Plays of Shakespeare, Volume 1 William Shakespeare Full view - That youth and observation copied there; And thy commandment all alone shall live Within the book and volume of my brain, Unmix'd with baser matter: yes, by heaven!.
Who really wrote Shakespeare. As James Shapiro's new book rehearses the loony arguments about our greatest playwright, Robert McCrum asks some of today's finest Shakespearean actors and directors.
This book ascertains what sources Shakespeare used for the plots of his plays and discusses the use he made of them; and secondly illustrates how his general reading is woven into the texture of his work.
Few Elizabethan dramatists took such pains as Shakespeare in the collection of source-material. Frequently the sources were apparently Cited by: Shakespeare was well-read and drew from an extensive range of texts – not all of them written in his mother tongue.
It is often difficult to prove a direct link between Shakespeare’s plays and the original sources, but there are some writers that Shakespeare came back to time and time : Lee Jamieson. A year and a half ago, the novelist Jeanette Winterson got an irresistible offer from a publisher. The assignment: Choose any Shakespeare play she wanted, and adapt it.
The book includes Berryman’s biographical studies on Shakespeare in a series of eight lectures, and his impressions of Shakespeare’s plays in eight short essays (many of them unfinished) on The Sonnets, The Comedy of Errors, King John, 2 and 3 Henry VI, The Two Gentlemen of Verona, Macbeth and 2 Henry IV.
An Approximate Chronological List of the Shakespeare Canon: Date Work 1 Henry VI (revised )* 2 Henry VI (published )*† 3 Henry VI (published )*† The Comedy of Errors* Venus and Adonis (Poem, published ) Richard III ("bad" quarto )*† The Rape of Lucrece (Poem, published ) File Size: 73KB.
Seven years after Shakespeare's death, John Heminge and Henry Condell, his friends and colleagues in the King's Men acting company, collected almost all of his plays in a folio edition, now called the First Folio.
A folio is a large book in which printed sheets are folded in half only once, creating two double-sided leaves or four pages. Folios. Facts, fiction and Shakespeare’s view of history. Posted on Novem His guests included Boris Johnson, who has just published a book on the history of London, and Alison Weir.
It was fascinating to hear how these authors approach the writing of fiction as opposed to fact, though I couldn’t help thinking that Alison Weir protested. First Folio, first published edition () of the collected works of William Shakespeare, originally published as Mr.
William Shakespeares Comedies, Histories & Tragedies. It is the major source for contemporary texts of his plays. The publication of drama in the early 17th century was usually.
Shakespeare's plays are a canon of approximately 39 dramatic works written by English poet, playwright, and actor William exact number of plays—as well as their classifications as tragedy, history, or comedy—is a matter of scholarly debate. Shakespeare's plays are widely regarded as being among the greatest in the English language and are.
Influence of William Shakespeare on Melville’s Moby-Dick Words 14 Pages In in the Edinburgh Review Sidney Smith said: “In the four quarters of the globe, who reads an American book.Shakespeare Study Guides Here you will find a detailed analysis of selected plays, including information on the major characters and themes, study questions, annotations, and the theatrical history of each drama.Understanding Shakespeare’s ‘Problem’ plays requires a brief, general overview of the play types.
Placing any of Shakespeare’s plays into any of the familiar categories, such as tragedy or comedy, is rising them is nothing more than a modern convenience, although Shakespeare himself, or at least the editors of the First Folio, named many of the plays as . | <urn:uuid:ac39f745-58ec-4afc-bff7-beb9fe308bae> | CC-MAIN-2022-33 | https://jebakebuki.greggdev.com/melvilles-uses-of-shakespeares-plays-book-13585lj.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.950801 | 2,081 | 2.421875 | 2 |
Interview with AfDB Manager for Infrastructure Finance, Private Sector Department on Importance of Developing Air Transportation in Africa
21 September 2012
A high-level delegation from the Brazilian Development Bank (BNDES) visited the African Development Bank Group on September 18 in Tunis to share industry knowledge that may help revolutionize aviation in Africa. The workshop entitled “Developing Africa’s Air Transportation” was co-chaired by Tas Anvaripour, Manager for Infrastructure Finance in the Private Sector Department of the African Development Bank.
Question: What is the project about and what developmental impacts are expected?
Answer: The project intends to procure Embraer E-170/190 jets, which are considered to be the world’s most optimal aircraft in their class (70-120 seats; medium-haul), for onward placement in six to seven different African airlines through an Africa-based leasing facility.
The project is expected to: i) serve over 1.15 million passengers every year, ii) result in the creation of over 1,600 direct jobs, and iii) catalyze some US $68 million in additional tax revenues per annum. By lowering operational costs, improving intra-Africa connectivity, promoting competition, and introducing a strong demonstration effect, the project may contribute to lowering airfares, thereby increasing the number of people who benefit from air transport in Africa.
The project is in line with the Bank’s Regional Integration Strategy Papers (RISPs), the Bank’s Medium Term Strategy (MTS) to support Infrastructure and Private Sector Development, and the Bank’s Long Term Strategy (LTS) (draft form). Additionally, the project is aligned with the African Union’s Yamoussoukro Decision and NEPAD’s orientation towards the air industry. | <urn:uuid:34225c52-926a-42ca-b7b6-6b51dcf52c8a> | CC-MAIN-2022-33 | https://www.icafrica.org/en/news-events/infrastructure-news/article/interview-with-afdb-manager-for-infrastructure-finance-private-sector-department-on-importance-of-developing-air-transportation-in-africa-3413/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.90102 | 376 | 1.664063 | 2 |
Authors: Sameer G Kulkarni, Wei Zhang, Jinho Hwang, Shriram Rajagopalan, K. K. Ramakrishnan, Timothy Wood, and Mayutan Arumaithurai and Xiaoming Fu.
Presenter: Sameer G Kulkarni
Presentation: Presenter first motivates by stating that NFV applications are growing and popular and then highlights the problem as they do not scale. These NFs are diverse that require fair scheduling and efficient service chaining. Their diversity stems from their processing and performance requirements. Some middleboxes operate in Mbps speed, while others can only process in Kbps speed. It has been found that these NFs cannot achieve (1) fair scheduling: standard CPU schedulers do not have sufficient information to allocate resources in a way that provides rate-cost proportional fairness. CPU schedulers usually provide fair allocation of processing time, but if computation costs vary between NFs this cannot provide rate-cost fairness. (2) efficient service chaining: Combination of a number of NFs into service chains demands careful resource management across the chain to minimize the impact of bottlenecks. Processing a packet only to have it dropped from a subsequent bottleneck’s queue is wasteful, and a recipe for receive livelock
To address these issues, this paper proposes NFVnice (a user space control framework for scheduling NFV chains). It provides fair and efficient resource allocations to NF service chains. The idea is based on assisted preemptive scheduling, where network functions provide hints to the underlying OS with regard to their utilization. To address efficient service chaining, NFVnice leverages queues between NFs in a service chain to know when NFs in a chain are overloaded or blocked in their operations.
The key components are (1) cgroup: that limits the resources for each user. This paper uses weigh computation algorithm and updates the results every 10ms. (2) Backpressure: that does selective per chain backpressure marking. The proposed mechanism is different from traditional back-pressure in a way that the this paper marks the packet flow (rather individual packets) to drop it at the source.(3) ECN: that signals the congestion, and (4) I/O management library that abstracts implementation complexities from the NF implementation.
The results show that NFVnice can achieve throughput improvement upto 2 times, and avoids CPU wastage through backpressure; and improves resource utilization through scheduling.
No question from audience. | <urn:uuid:769d62a3-4b0f-41b9-b2ac-7c55d3634ca9> | CC-MAIN-2022-33 | http://www.layer9.org/2017/08/session-2-paper-3-nfvnice-dynamic.html?showComment=1586893101612 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.914219 | 511 | 1.570313 | 2 |
The petite and pleasant budgerigar is thought for its outspoken tweedle sounds and lovely persona. Eating regimen is an essential separate of the general well being and life pressure of your fowl. The budgerigar requires a easy food regimen with a number of dietary supplements and treats. fruit makes up a bit of a part of a budgerigar ’ second food regimen, however discovering out which fruits are reliable to feed is essential. Can budgies eat apples ? Sure! Apples are probably the most fashionable fruits for pet birds and completely secure to feed budgies.
However one password of warn : Don’t enable your budgie to eat the apple seeds, that are poisonous to birds. Maintain learn for extra info !
Budgie Eating regimen Information
Budgies are granivores and eat quite a lot of seeds, berries, fruit, and greens. This could make up most of their captive food regimen. Guaranteeing that you just preserve their food regimen different will stability out the vitamins your budgerigar wants for progress, improvement, and life pressure.
about 70 % of the food regimen must be made up of high-quality grains ( mainly eatage seeds ) which is the business separate of the food regimen. 20 % of the food regimen ought to include fruits and 10 % contemporary veggies. The meals roll must be repeatedly crammed as birds are grazers and can eat after they get hungry .
food regimen Abstract :
Business seed combine: 70%
instantly that you just perceive the chief dietary necessities of budgies, it’s time to discover out what particular fruits they’ll eat .
Are Apples Secure for Budgies to Eat ?
Apples are wholly secure for budgies to eat, and they’re fairly wholesome for them. Apples include important vitamins and nutritional vitamins which can be helpful for budgies. Sugar just isn’t dangerous to those birds and may help keep a agency immune system. Apples if ready proper are gladly accepted by budgies and may cursorily change into one among their favourite fruits .
One apple slice comprises a fortune of excellent nutritional vitamins on your budgerigar, a very powerful ones are :
You’ll be able to feed your budgerigar one slice of apple weekly however first verify with an avian grasp in case your fowl can deal with being fed a lot fruit. Some birds have intestine flora issues which sugar will make worse .
What A part of Apples is Unsafe for Budgies ?
Though the pulp operate of the apple is condom for budgies to eat, sure components usually are not. Probably the most poisonous separate of the apple is the seeds. A number of seeds might be damaging to your budgerigar ’ s well being. The seeds include traces of nitrile which is deadly to birds ’ kidneys. By no means depart a full apple in your budgerigar ’ south batting cage since they may assume the seeds are secure for them as seeds are an important a part of their food regimen .
The pores and skin of the apple can moreover be dangerous. Budgies can’t chew the slurred clamber which might trigger choking. Many of the dangerous chemical substances like herbicides or pesticides are situated on the pores and skin which is evenly deoxyadenosine monophosphate dangerous. Most budgies won’t tied try to eat the pores and skin as the feel and style don’t attraction to them .
The way to Put together Apples for Budgies
All apples must be organically develop and secure for human and pet consumption. Some extremely course of apples can include respective emergence hormones which can be dangerous for budgies and different pet birds .
After roughly 2 hours, your budgerigar must be completed consuming the apple and it’s then fourth dimension to scrub up the leftovers. This may be completed by eradicating the plate and neatening the bottomland of the cage .
secure Fruits for Budgies
insecure Fruits for Budgies
Since now we have found that apples are secure for budgies, it’s now time to see in case your small buddy will take pleasure in consuming a slice. Remember to steadily introduce fruits into their food regimen as defective parts could cause diarrhea. We hope this text has helped you identify in case your budgerigar can safely eat apples !
Featured Picture Credit score : pixel2013, Pixabay | <urn:uuid:401963d3-e249-472a-a89f-ff7ccdc2e159> | CC-MAIN-2022-33 | https://massplus.net/can-budgies-eat-apple-1656133441 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.939677 | 956 | 2.46875 | 2 |
Relax with Aromatherapy Massage
Aromatherapy massage is now the latest trend in the field of natural treatment. It is also known as Oriental massage or Oriental medicine. There are a myriad of of massages that each have their own unique effect. To help you gain an understanding of the differences between these types of massages, it is important to understand the various kinds of massage therapy. This article will inform you on this:
Aromatherapy Massage utilizes hands and manipulating soft tissue regions like the lips, scalp and ear, as well as the face to release tension, relax, and increase blood flow. The results can be amazing for some. Massage therapy using aromatherapy can be employed to treat injuries and aid in healing. With the increased interest in complementary and alternative medicine, aromatherapy massage is not only becoming popular across the world's western regions however it is getting very popular in the east. It makes sense then that massage therapy has become a rage all over the world.
When you perform massages that are aromatherapy it is necessary to use specific essential oils. Essential oils are extremely concentrated botanical scents or fragrances. Some essential oils are more potent than others, according to the intended application. Before massage therapy is able to take place, essential oils must be combined by carrier oils. Carrier oils are vegetable oils, such as sunflower oil and coconut oil. Examples of carrier oils are cocoa butter, almond oil olive oil, Jojoba oil.
The benefits of massage therapy using aromatherapy are well-documented. One of the primary benefits is the feeling of relaxation. Studies have shown that relaxation is one of the best and fastest ways to relieve tension and stress. Aromatherapy can help you relax your body and mind, and also your muscles.
A further benefit is decrease of blood pressure as well as an increase in heart rate. This is due to the relaxing effect on your autonomic nerve system. Aromatherapy massage oils can help relax these systems by increasing blood flow, reducing the heart rate and decreasing the blood pressure.
Aromatherapy can be described as the full body massage. This is because you'll be applying the same benefits to all the areas of your body. It is possible to benefit from having a massage that covers your entire body for mental, emotional and physical health. You can increase circulation of blood and nourish your body. It also helps you relax. It can also bring balance back to your hormones, as well as your nervous system.
If you are interested in experiencing these same benefits, then you may be interested in trying a hot stone massage therapy or aromatherapy massage therapy. Massages that use the warm, fiery essential oils to melt away the muscles and tendons, as they stimulate your sense of touch and heat. The oils used for these massages typically are carrier oils that are infused with aromatic compounds that are derived from plants. These oils can provide both physical and mental relaxation as well as the capacity to increase your concentration. It is vital to choose a professional instructor who is qualified who can teach this type of massage therapy.
For instance, if you choose a hot stone massage therapy to ease your body and mind, you may want to smell your instructor's scent so you can smell the essential oil used throughout the session. If you don't wish to smell essential oils throughout the massage, you might prefer to focus your attention on the part you are working on. If you're going to use aromatherapy massages to lessen the discomfort caused by lavender aroma It is recommended to inhale steam that comes from the hot stones when it starts to go out. You could also light some incense to help ease your mind. It's an excellent idea to communicate with your instructor during your massage therapy session as they may have many suggestions for utilizing different scents throughout the massage therapy session. Combining the sensation of burning with the scent of essential oils will give you the relaxing aroma and help you relax from your daily stress.
Aromatherapy Massage Techniques and their Benefits
Aromatherapy massage combines two popular and effective ways to provide pain relief, enhanced capacity for healing, stress reduction, and overall relaxation. Aromatherapy is a traditional therapy that dates back to over 6,000 years. Essential oils were utilized by Ancient Egyptians as perfumes and in ceremonies for religious purposes as well as in religious ceremonies by Indians, Greeks and Romans. The same oils are used to provide the same healing effects.
Aromatherapy massage therapists utilize essential oils extracted from flowers or plants in various combinations to relax and rejuvenate the body. The oil can have the ability to relax depending on its combination. Aromatherapy is also referred to as the "language of plants" due to the fact that certain scents offer therapeutic properties when used conjunction with appropriate verbal cues. It is possible to use plants and flowers, such as lavender jasmine and peppermint, as well like roses, helichrysum, and lavender to ease tension to relax, calm the mind, and ease discomfort. Essential oils work with the patient's own energy to help them relax to improve range of motion as well as improve the sensory experience, improve focus and concentration as well as reduce pain. to stop muscle spasms.
Aromatherapy massage is also the ideal method to take care for your skin. In order to enhance the skin's healing properties and improve its appearance essential oils are applied to the face. It improves the appearance of damaged or sunburnt skin, as well as damaged or tired skin applying it frequently. These carrier oils can be natural scents that impart subtle aromas to the healing properties however, they don't come with strong odors. Common carrier oils include alfalfa oil, eucalyptus oils, rose hip seed oil sweet almond oil, peanut oil, sweet orange oil, thyme oil sandalwood oil, rosemary oil, and wintergreen oil.
Aromatherapy can help 평택출장마사지 relieve tension, anxiety, stress, discomforts and pains, depression, fatigue and insomnia. The benefits of aromatherapy massage make it an increasingly popular option for people who seek healing treatments which are both safe and effective. Aromatherapy stimulates the body's natural healing processes. They work slower and require more attention than traditional treatments. A regular massage using aromatherapy can help to restore the body's natural pain relief system, rid the body of toxins and help reduce anxiety, stress, and depression. All of these can contribute to the aging process.
An accredited and licensed aromatherapy massage therapist should be chosen before you attempt an aromatherapy massage. They'll be able determine the best essential oils to apply to your massage. While some therapists prefer essential oils extracted from plants, other may prefer synthetic oils. The oils must be applied in a dilute form prior to applying to the skin. It is possible to speak with your massage therapist if have sensitive skin or allergies before you apply these oils.
During your aromatherapy massage, you'll enjoy the calming, relaxing scent of rose, lavender chamomile, lemon, peppermint and eucalyptus. Also, bergamot, euca Cypress, as well as others essential oils. Each essential oil comes with its own unique advantages for health and helps to reduce stress, calm your mind, soothe the body and calm the soul. Each of the essential oils has different mood altering properties such as sedation and energy. People may experience a distinct degree of mood-enhancing effects. However, it is typically not evident until after the initial session.
After an aromatherapy massage you can feel relaxed at ease, refreshed, calm and mentally stable. To create a more holistic therapeutic experience, some therapists combine relaxing strokes with massage techniques. But, the majority of therapists adhere to just two or three kinds of strokes for the entire session, concentrating on the needs of the client.
Aromatherapy massage uses special carrier oils, which are mostly extracted from flowers and plants which are then infused into hot water. These carrier oils are called carriers oils. They contain medicinal properties that can be beneficial to the person who receives the therapy. Lavender oil, as an example is very efficient in relieving stress and encouraging relaxation. Rosemary oil is a therapeutic oil for pain relief, and clarysage oil is an uplifting and stimulating effect. | <urn:uuid:6db71d3a-7dea-4cfa-ae6e-1c0b7c9ebd29> | CC-MAIN-2022-33 | http://anma8spencerrwnz704.timeforchangecounselling.com/10-inspirational-graphics-about-pyeongtaegchuljangmasaji | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.950879 | 1,736 | 1.5625 | 2 |
The Colorado Silver Boom was a dramatic expansionist period of silver mining activity in the U.S. state of Colorado in the late 19th century. The boom started in 1879, with the discovery of the lode at Leadville, in which made over 82 million dollars worth silver during the silver boom, was the second great mineral boom in the state, coming twenty years after the earlier and shorter Colorado Gold Rush of 1859.
The boom was largely the consequence of large scale purchases of silver by the United States Government authorized by Congress in 1878. The boom endured throughout the 1880s, resulting in an intense increase in both the population and wealth of Colorado, especially in the mountain valleys. It came to a cataclysmic end in 1893 in the wake of the collapse of silver prices caused by the repeal of Sherman Silver Purchase Act.
Silver had been discovered in Colorado in the 1860s, with early mining in Clear Creek Canyon at Georgetown in 1864. In the early days, the mineral was overshadowed by gold, however, and the low price of mineral meant that most mines were not profitable enough to operate. In 1878, responding to pressure of western interests, the United States Congress passed the Bland-Allison Act authorizing the free coinage of silver. The government demand raised the price of the mineral substantially to the point where many additional mines were profitable.
The discovery of the Leadville lode the following year result in a flood of new emigrant prospectors to many of the same mountain gullies that had been the site of the gold rush. Georgetown eclipsed nearby Golden and became briefly the third most populous city in the state. The resulting opulence was most lavish in Leadville itself, where local citizens briefly entertained the notion of moving the state capital from Denver. The repeal of the Sherman Act in 1893 conversely led to a collapse of silver prices, bringing out a cataclysmic end to the boom as well.
The boom continued unabated throughout the 1880s, a decade that gave the state many of the historic structures throughout its cities and towns. The boom also drove many extensions of the railway network in the mountains, including such lines as the Denver, South Park and Pacific, which built an early narrow gauge line to Leadville. Likewise the extension of the railroad network up the Roaring Fork Valley to the previously failed mining town of Aspen in the late 1880s made the extraction of silver ore there economically feasible, and saved the town from near extinction.
The government purchases of silver were subsequently nearly doubled by the 1890 Sherman Silver Purchase Act, further extending the boom into the early 1890s. The repeal of the act in 1893 resulted in a collapse of silver prices, bringing about an end to boom. After 1893, many mining camps became ghost towns. The accompanying collapse in state-wide economic activity was ameliorated somewhat by the simultaneous emergence of agriculture, previously derided as not feasible, as a large component of the state economy. | <urn:uuid:6430e650-ab64-4cd4-8dbf-93d5bc45189c> | CC-MAIN-2022-33 | https://westernmininghistory.com/library/9/page1/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.973392 | 598 | 3.953125 | 4 |
Watch This Space!
Pray to receive God’s Spirit afresh so that streams of living water may flow into you and out to others.
Read EZEKIEL 47:1-12
The man brought me back to the entrance of the temple, and I saw water coming out from under the threshold of the temple toward the east (for the temple faced east). The water was coming down from under the south side of the temple, south of the altar. He then brought me out through the north gate and led me around the outside to the outer gate facing east, and the water was flowing from the south side. As the man went eastward with a measuring line in his hand, he measured off a thousand cubits and then led me through water that was ankle-deep. He measured off another thousand cubits and led me through water that was knee-deep. He measured off another thousand and led me through water that was up to the waist. He measured off another thousand, but now it was a river that I could not cross, because the water had risen and was deep enough to swim in-a river that no one could cross. He asked me, “Son of man, do you see this?” Then he led me back to the bank of the river. When I arrived there, I saw a great number of trees on each side of the river. He said to me, “This water flows toward the eastern region and goes down into the Arabah, where it enters the Sea. When it empties into the Sea, the water there becomes fresh. Swarms of living creatures will live wherever the river flows. There will be large numbers of fish, because this water flows there and makes the salt water fresh; so where the river flows everything will live. Fishermen will stand along the shore; from En Gedi to En Eglaim there will be places for spreading nets. The fish will be of many kinds-like the fish of the Great Sea. But the swamps and marshes will not become fresh; they will be left for salt. Fruit trees of all kinds will grow on both banks of the river. Their leaves will not wither, nor will their fruit fail. Every month they will bear, because the water from the sanctuary flows to them. Their fruit will serve for food and their leaves for healing.” Scripture taken from the Holy Bible, NEW INTERNATIONAL VERSION. Copyright © 1973, 1978, 1984 International Bible Society. All rights reserved throughout the world. Used by permission of International Bible Society.
ReflectWhat will this river do for the people and land?
There’s an old chorus that goes “I’ve got a river of life flowing out of me.” In this vision, Ezekiel is shown a new river—a river of life—that begins as a small stream under the foundations of the temple (1) but quickly becomes a river too deep to wade across. It flows down from Jerusalem and enters the Dead Sea at En Gedi, where the volume of water is so great it turns the salt water into fresh. Death is replaced by life and fish can live there. Wherever this river flows it brings life!
Could this actually happen? When Jesus returns, could an earthquake release underground springs of water in Jerusalem so that we see a literal fulfillment of this vision (Zech. 14:4-8)? If not, we will have to wait a bit longer until God makes the New Jerusalem, for John also sees the river of the water of life, fruit trees that deliver a crop every month, and leaves for the healing of the nations (Rev. 22:1,2).
At the right time, the symbolic becomes real. What a prospect! Watch and wait eagerly and expectantly! Jesus, our river of life, is flowing and bringing life to all!
What have you learned from this study of Ezekiel that God can use to grow and enrich your life?
Thank You, Father, that You are a God of hope and encouragement, for now and the future! | <urn:uuid:20abf094-0791-43fa-b2c5-08850b6545dd> | CC-MAIN-2022-33 | https://scriptureunion.org/dailydiscovery/watch-this-space/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.964493 | 882 | 1.695313 | 2 |
Whatever it is that you do in business, you need to make sure that you are always sharing information with the other people you work with. With an open office in this way, you can be sure that you and your colleagues’ jobs are going to be made much easier, and your business will be more likely to grow faster too. However, it can be hard to know how you can actually expect to share information swiftly, safely and without any loss of data. The truth is that there are a number of options, and which to go for depends largely on the specific need at the time. Let’s take a look at some of the best ways to consider sharing information in your business from today.
Although it is an old technology, taking screenshots is still very much in use, and in many ways it remains one of the most useful ways to share information around the office. The beauty of taking screen grabs is that you can actually take a picture – or video – of the entire screen, which means this can be especially useful in certain cases, such as training employees to be able to use software, and other things of that nature. Of course, it helps to know how to actually do it, and there are different ways to do it for different platforms. Trying to record screen on Mac is different to Windows, so make sure you know what you are doing first. With that, you should find that you are able to share information this way much more easily and quickly than ever before, so it is definitely worth learning if you don’t already know.
Really, the cloud is just a branded term for ‘server’, but it is one which can be particularly useful for businesses to share information around the office and beyond. The beauty of this approach is that you don’t need to worry about safety or security, as the cloud is one of the safest ways to transmit information anywhere. It also removes the worry you might have about distance, as all you need is a login for the cloud, and then anyone with that login can see the shared information at will. This particular form of information sharing is especially swift, and very useful for keeping things running smoothly within a business.
Word Of Mouth
It is still true that speaking and open communication is one of the very best ways to keep the flow of information open. As long as you are speaking to the people in your office, the people you work with every day, you can be sure that your business is going to be in a much better position than if you do not do this at all. Word of mouth is surprisingly powerful, so make sure that you do not allow technology to overshadow its effectiveness too much in your office or in your business as a whole. If you do, it will be a mistake.
Open Business Council offers resources, Trade Finance, business advice, SME Finance and a forum and directory for businesses! Improve your business and use the best digital, financial and funding tools to grow ROI – return on investment and ROA – return on attention! | <urn:uuid:d303138b-f007-42f3-9774-aa931bf9be88> | CC-MAIN-2022-33 | https://www.openbusinesscouncil.org/business-sharing-information-vital/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.970932 | 621 | 1.710938 | 2 |
Ecological awareness and responsibility, increasingly stringent environmental regulations and the more and more critical supply of raw materials make the application of new metal recovery processes a priority. Today the steel industry produces by-products, which are not fully valued. One of them is the sludge produced by the wet gas cleaning system of the blast furnace, with a high lead and zinc content.
Leaching: During this first step, zinc and lead are selectively leached from the BF sludge using hydrochloric acid under oxidising conditions. The leaching step results in a recyclable sludge, a pure iron carbon by-product that can be reintroduced at the sinter plant, replace a part of the anthracite amount, or returned in the form of briquettes directly back to the blast furnace.
Neutralisation: The subsequent neutralisation allows to produce a thoroughly washed Zn/Pb-concentrate that can be recycled in the non-ferrous industry. The remaining salty water that can be recycled internally or in the salt industry.
After successful laboratory tests and the feasibility of the technology being demonstrated at a mobile pilot plant, ArcelorMittal, in a co-development with Paul Wurth, decided to build in Dunkirk the first industrial CIROVAL plant designed for treating 15’000t/year of BF sludge. | <urn:uuid:71444349-57bf-46bc-9bb8-6c54916a5103> | CC-MAIN-2022-33 | https://www.paulwurth.com/en/technology/residue-treatment/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.907221 | 277 | 2.875 | 3 |
Wedding videography is an audiovisual production that records a wedding live on video. The end product of the videographer’s documentation is most commonly known as a wedding video. It’s also known as a wedding video or even a wedding recording. It may also be referred to as a wedding film or even a digital wedding movie.
Wedding Videographer can create wedding videos in all different styles. Many modern videographers will use traditional film and movie technology to create their masterpieces. Others will use software to produce their recordings. Still, others will record their footage directly to a hard drive and then transfer the files to DVD for replication. No matter which method is used, most wedding videographers use a similar style of filmmaking throughout their project.
There are two ways a videographer will capture your wedding ceremony and reception. The first is with a digital video camera. Today, many digital cameras make it easy to capture professional-quality wedding videos. These cameras capture the action on the video screen and can be viewed on the computer monitor, television, or a DVD player. To get the best effect from your camera, you should try to view the video on a computer monitor and an aerial monitor. This will give you the most accurate representation of your captured images.
When a wedding videographer captures their scenes with a digital video camera, they may also need special equipment. In most cases, a computer monitor or television will not work correctly during a wedding videography shoot due to lighting issues. Since most weddings are recorded with a wedding videographer at a location rather than at the couple’s home, wedding videographers will often use a” Steadicam” to move around the room as needed. This is a wireless, handheld stabilizer that is typically carried by the videographer. It enables them to move freely in each area of the room without the need for a computer or television.
Many professional videographers offer wedding videography packages include sound. If your wedding video includes music, a videographer will need to either rent or purchase a soundboard. Not all locations are equipped with the equipment needed for sound; if the possibility of shooting in a location without sound is acceptable to you, it may be worth your extra cash to hire a soundman.
One of the most common situations that will require the expertise of a wedding videographer may be shooting from outside. It is common for videographers to request permission to use certain locations in their final product. Many venues will not allow videographers to use their facilities for videography unless they have a permit. A videographer may need to negotiate this issue beforehand.
Videographers are often called upon to create a documentary style final product after the vows have been taken. This can be a great way to preserve the love story. Wedding videographers can often make a video montage of the bride and groom’s wedding celebration, beginning at the ceremony and ending at the reception. A videographer may even be asked to document the progress of the couple as they begin their daily routine – beginning with the kiss, moving on to the first dance, culminating with the reception.
Many people also want to share the wedding experience with friends and family members through the medium of video. Instagram is one method that many use to share the joy of the ceremony and reception with family and friends. Many modern-day engagement and wedding videos utilize Instagram. While it may take some research to locate an appropriate influencer, your engagement videographers should be able to create a beautiful Instagram video that you can share with everyone. | <urn:uuid:a006f707-9f5e-40a5-b814-0dd830b968a5> | CC-MAIN-2022-33 | https://www.letsdancetoo.com/how-to-choose-your-wedding-videographer/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.950094 | 725 | 1.71875 | 2 |
This hat dates from the early 20th century and represents a transitional period in millinery history, following the oversize Victorian confections of veiling and stuffed birds, but before the head hugging cloches of the 1920s. Fast and easy to sew, it has a casual and slightly slouchy look, with a modest brim and fabric flowers at center front. There are just three pattern pieces: Brim, Band, and Crown. Each piece is cut twice, out of fabric, or fabric and complementary lining, for a fully lined, easy to wear chapeau. The decorative fabric Rosettes can be fashioned out of the hat fabric, contrasting materials such as lace, tulle, or glittering silk, or entirely replaced by a vintage brooch or dramatic button. Suggested Fabrics: Linens, wools, silks, medium weight cottons, denim, corduroy, fleece. NOTE: For soft, drapey fabrics, lightly interface the Band and Brim to maintain the proper silhouette. | <urn:uuid:3bcb3a58-8116-486a-8735-aedb8a70212a> | CC-MAIN-2022-33 | https://www.isew.co.uk/isew/sewing-buttons/folkwear-patterns-sewing-pattern-metropolitan-hat/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.878242 | 212 | 1.6875 | 2 |
Affordable Housing, Secure Housing, and Community Based Gentrification
Gina Curry is a believer that families need affordable and safe housing. As a young person from Baltimore suburbs Gina’s family struggled at times with consistent housing. Those childhood experiences can be traumatic for families and children. Lack of secure housing can bring developmental issues that lead to life journey struggles.
As a constituent service representative for Senator Tim Kearney, Gina learned the difficulty to find emergency housing for individuals and families in Delaware County. Affordable housing for non-emergency families in Delco seems almost impossible. Affordable housing efforts can take two to three years of delay before housing needs are met. Many feel that our communities believe gentrification is the process for change.
Gina and her husband are also real estate investors. She believes that through creative financing, real estate development grants, and home ownership preparatory training, affordable housing does not have to be life long. Gina also believes that by initiating more Landlords relationships with groups like Community Action Agency. With strategic representation from State Reps, Senators and Municipal leaders families we may find paths to home ownership which can reduce the need for long term affordable housing.
Economic Development is a community plan of action that needs leaders to find strategic initiatives to these problems. The goal is to provide affordable housing, secure housing, and community based gentrification as a plan that can work together from the same side of the coin. | <urn:uuid:31085739-790d-4f8f-be01-2edadf096338> | CC-MAIN-2022-33 | https://www.ginahcurry.com/affordable-secure-housing | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.964551 | 285 | 1.71875 | 2 |
Find the answer below
Bet your knowledge and answer
Benin is a former French colony located in West Africa. The country has around 9 million inhabitants and covers an area of 112,620 km². The capital is called Porto Novo. The country has a short coast line and borders Togo, Nigeria, Burkina Faso and Niger. Benin was governed by France from 1892 until it gained independence in 1960. Until 1975 the country was called Dahomey.
Answer time 0s (0s). 42% have previously answered correct on this question. The question was created 2008-11-27.
What does the abbreviation HTML stand for?
What is the capital city of Germany?
What is the capital city of Australia?
What is the official capital city in the Netherlands?
What is the capital of Turkey?
In what city were the Beatles formed?
What is another name for dentes decidui? | <urn:uuid:6852b7f3-2952-4a3d-aa62-81653e7b4328> | CC-MAIN-2022-33 | https://quizstone.com/en/q1659/what-is-the-capital-of-benin-called/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.970126 | 194 | 2.640625 | 3 |
I’m fascinated on both a personal and professional level with the principles of biophilia, the instinctive bond between human beings and other living systems. Edward O. Wilson introduced this concept in his book, Biophilia (1984). He defines biophilia as “the urge to affiliate with other forms of life.” The implications for our personal physical and mental well-being are profound.
We can use the principles of biophilia and improve our well-being by proactively seeking this connection with nature through things like introducing plants into our work and home environments, taking walks through parks, or encouraging the integration of nature into our everyday urban spaces with elements such as living walls.
This isn’t too hard to do when you live somewhere like San Diego. We can take advantage of beautiful weather and diverse natural surroundings 365 days a year. But there are many places where the weather isn’t so nice a lot of the time, or where access to nature is limited. And for any of us, sometimes there just isn’t enough time in a day!
If this is you, it turns out you can still get some of the benefits of exposure to nature just by looking at nature. A 2009 study for the International Journal of Environmental Research and Public Health, “Biophilia: Does Visual Contact with Nature Impact on Health and Well-Being?” found that looking at photographs of nature can improve your health by decreasing stress, improving focus and attention, and even lowering the number of health-related complaints.
Beauty is defined as visual input that gives pleasure to the mind. Attention Restoration Theory says we can restore focus by taking time away from work tasks to enjoy nature, or even views of nature.
There are many beautiful nature photography books you can read which will fit this prescription nicely. I have a favorite to recommend to you. I admit I’m biased, because the author is someone I know: my father, Robert E. Mumford, Jr.
His book “The Exquisite Birds of Ecuador” features 322 of my dad’s images of Ecuador’s bird life and other nature images. The book was produced as the result of 16 trips to Ecuador. Ecuador is one of the most biologically diverse areas in the world and there are over 1,600 bird species in this one small country, from hummingbirds to Andean condors. So even with 16 trips, my dad captured only a fraction of the region’s bird life. The book is filled with his very best work.
I could tell you it’s a stunning book but I don’t have to. I can let the rave reviews on Amazon do the talking:
“Words do not do justice in describing this stunning display of our Ecuadorian feathered friends in the book by Robert E. Mumford, Jr. … I was mesmerized from the first page… and when I turned the last, I had the feeling I had been to Ecuador myself, so vivid were the images and thorough the descriptions. I am proud to display this work of art which will invite all who see it to enjoy it as well.”
“Robert E. Mumford Jr.’s photos are exceptional. The book is divided into the six regions of Ecuador and also includes scenic photos and close ups of the flowers, animals and insects of each region. We keep this book displayed on our coffee table and every guest has commented on its beauty.”
“I really value artistic photography, and this book is a genuinely artistic achievement … The book serves as a wonderful addition to my coffee table, and guests marvel at the craftsmanship and artistry of the photography. And it has also made a great gift, as recipients always comment on its beauty. Really glad I found this book.”
“Bob has an amazing eye for fine photography and this new book brings out his best. Here, it is not a table book like so many photo books, but one you can pick up now and then and be amazed again how much beauty there is in nature. We have also found it captivates children of all ages once they see the first bird. It was also a big hit with my sister’s nature organizations. Buy one for yourself and one for your local nature group or school.”
“This is a treasure to own and to share.”
Even if he wasn’t my dad, I’d be just as enthusiastic as these reviewers recommending his book to you. Buy it on Amazon.com And while a book can never be a substitute 100 percent for the real thing, both my dad and I would be thrilled if it inspired you to take a hike and look for birds along a local San Diego trail, or plant bird friendly plants in your yard, or try a little nature photography yourself this summer. | <urn:uuid:a46d8c7e-9a15-4c4c-ac40-8931460640f5> | CC-MAIN-2022-33 | https://www.goodearthplants.com/nature-photography-mumford-book/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.958761 | 1,004 | 2.28125 | 2 |
Pool Heat Pumps
Z200 Pool Heat Pump
You want to swim all year round even when the weather gets colder. All you need now is to work out the best way to heat your pool. If you don’t yet know the basic difference of how different heating systems work, reading our Introduction to Heating would be a great place to start.
Which heating option is right for you will depend on the size litres of the pool, how long you are willing to wait, your budget and your preferred energy source. Often, your property location comes into play as well – the ambient temperature and amount of sunlight your pool get each day and if you have a good quality pool cover installed will influence your choice.
If you’re looking for the cheapest way to heat up a pool, then the answer will almost always be a solar pool cover or a minimum 400-micron pool blanket. After the initial purchase, there’s no ongoing energy cost, just an effort on your part to pull the blanket off and back on again after each swim. Remember though, this relies on the radiant sun on and in most locations will only potentially add 1 to 2 months extra to your swimming season.
If you’re looking for something a little less hands-on – and more reliable, temperature-wise – then you should consider either a gas pool heater, an electric heat pump or a solar system. Each one has its own pros and cons, which we’ll investigate below. Pairing any of the options below with a pool blanket will help to entrap the heat and make your pool heating even more efficient.
Solar pool heating is a popular option in Australia. Benefits of solar heating include:
Gas pool heaters are a good option for smaller to medium pools. These heaters use a Natural or ULPG gas source to warm up the water before it is passed back into the pool. Benefits of gas heating include:
Electric pool heaters work on the same principle as a reverse-cycle air conditioner. Operating in tandem with your pool pump or separate circulation pump, they draw in warm air from outside to heat the water. Benefits of an electric heat pump include:
Without a doubt, gas heaters are the fastest way to bring your pool up to a comfortable swimming temperature. A gas heater can raise the temperature of a 50,000-litre pool by around 12 degrees in a day or so. Bear in mind that in most parts of Australia, and uncovered, the unheated pool will usually be around 18-20oC, so depending on your preferred temperature, you might not need to run the gas heater for so long since running a gas heater for prolonged periods can be quite expensive. A heat pump will get your pool to the same temperature, but over a longer period—in the above scenario, you’d probably need to switch it on a day earlier. However, because it works in a similar way to a reverse cycle air-conditioning unit, as long as the outside temperature doesn’t drop too low in your area during winter, a heat pump would be a great solution for keeping the pool warm all year round.
It’s a good idea to think beyond the initial purchase price of a pool heating system, and consider its ongoing running costs and lifespan, too. Decide if you want to just extend the swimming season or you are serious about swimming all year round. As a general rule, if you are going to heat your pool all year round at a consistent temperature then an inverter heat pump is a far more efficient and sustainable way to heat your pool. The inverter technology not only lowers the unit’s speed as it attains the preferred temperature, significantly saves on energy, it’s also quieter to run and faster to heat up compared to its standard counterparts. Certain smart inverter heat pumps can even provide you control over energy consumption ad usage through your smart devices, allowing you to monitor and set your pool’s temperature even when you’re away from home!
Ultimately, the best choice for your pool is what suits you and your situation best. If you need help choosing the best heating option, reach out to your local pool professional by using our dealer locator. | <urn:uuid:ebec8a41-3ff2-4cbf-ac12-f40e66659120> | CC-MAIN-2022-33 | https://www.zodiac.com.au/pool-and-spa-guides/how-should-you-heat-your-pool | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.929848 | 887 | 1.601563 | 2 |
On her whistle stop tour of the Pacific, America’s First Lady Eleanor Roosevelt touched down in New Zealand on Saturday, August 28, 1943. In a surprise broadcast to the New Zealand people, she explained that the reasons for her visit were threefold. She was here to see US troops, to inspect the work of the American Red Cross whose uniform she wore, and she wished to study the contribution New Zealand women were making to the war effort.
In Auckland, she visited military hospitals where local volunteers worked alongside of the American Red Cross nurses, service clubs and even made an appearance at the American Red Cross dance at the Auckland Town Hall, where Artie Shaw and his band were in full swing. She declined an invitation to join the dances as there was no room on the floor to waltz and her only other dance, the Virginia Reel, was rather outdated.
In Rotorua, she met nurses, land girls and Guide Rangi who she described as witty and intelligent.
If the First Lady had been able to come to Warkworth in 1943 she would have found the American Red Cross was also active here. A Service Club was operating in the Patriotic Hut in Mill Lane, run by the American Red Cross with the help of local women. Dancing was a popular activity with the troops and as there were no night clubs in New Zealand in the 1940s, so the clubs provided a venue to socialise. Music was provided by local bands and talented marines who were stationed here.
On one occasion, 60 convalescent US marines from the 39th General Hospital in Auckland were entertained at the Warkworth Club. Ladies from the Warkworth Sub-Centre of the NZ Red Cross provided the food and one soldier remarked that he had enjoyed his first home-cooked meal in three years
In April 1944, 150 guests were invited to the club for a variety show of entertainment. While supper was served, presentations were made to local women by Miss Leota Kelly, Area Superintendent for the American Red Cross. She thanked the ladies on behalf of the mothers, wives and sweethearts back home in the US.
Warkworth Museum has an American Red Cross badge presented to Mrs Lill Davie-Martin of Falls Road, Warkworth. She is remembered as a great cook and tireless worker for the groups to which she belonged.
So who were the other women who were presented with awards in 1944? They should not be forgotten. Museum volunteers would be interested to know if other similar badges or other relics from the years when American forces were stationed here lie hidden among family memorabilia. | <urn:uuid:ec206ce3-df50-477a-9063-fb3c03b1f508> | CC-MAIN-2022-33 | https://www.localmatters.co.nz/opinion/history-an-active-red-cross/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.986955 | 531 | 2.125 | 2 |
2008 Tibetan unrest
|2008 Tibetan unrest|
|Caused by||Mistreatment of Tibetans by the Chinese government|
|Parties to the civil conflict|
|Death(s)||400 killed (Tibetan sources)|
|2008 Tibetan unrest|
The 2008 Tibetan unrest, also referred to as the 2008 Tibetan uprising in Tibetan media, was a series of protests and demonstrations over the Chinese government's treatment and persecution of Tibetans. Protests in Lhasa, the capital of Tibet, by monks and nuns on 10 March have been viewed as the start of the demonstrations. Numerous peaceful protests and demonstrations were held to commemorate the 49th anniversary of the 1959 Tibetan Uprising Day, when the 14th Dalai Lama escaped from Tibet. The protests and demonstrations spread spontaneously to a number of monasteries and throughout the Tibetan plateau, including into counties located outside the designated Tibet Autonomous Region. The arrest of monks at Labrang Monastery increased the tension of the situation. Violence began when Chinese police and People's Liberation Army units used force on non-violent protests by monks and nuns, and spread when protesting Tibetans later clashed with security forces. Clashes also occurred between Tibetans and Chinese Han and Hui residents, resulting in Han and Hui stores and buildings being destroyed and numerous Chinese civilians being injured or killed.
The use of force by Chinese police and military forces during the demonstrations has been controversial, with some deeming it excessive force. The demonstrations in Lhasa were met with electric prods, tear gas, and shootings, according to a report by Human Rights Watch on the use of force by Chinese forces. The International Campaign for Tibet estimates a total of 235 protests occurred from 10 March until the end of October 2009. The Chinese government's Xinhua News Agency estimated that 150 protests occurred between 10 March and 25 March. A casualty estimate according to the Chinese government stated 23 people were killed during the riots themselves, the Central Tibetan Administration stated 203 were killed in the aftermath alone, and the Dalai Lama stated 400 Tibetans were killed in total. Foreign journalists were expelled or forced to leave during the uprising anniversary. Amnesty International reported 1,000 Tibetan protestors remained "unaccounted for" by June 2008, while the Central Tibetan Administration reported 5,600 arrests of Tibetans between March 2008 and January 2009, with 1,294 injuries within the same period.
Protests supporting Tibetans were held in cities in North America and Europe, as well as in Beijing, Australia, India, and Nepal. Many of the international protests also called for a boycott of the Beijing Olympics. On 24 March, the torch lighting ceremony in Greece was disrupted by activists, including some from Reporters Without Borders. At Chinese embassies, protests ranged from pelting the embassies with eggs and rocks to protestors entering the premises and raising Tibetan flags, which was outlawed in Tibet by the Chinese government in 1959.
Protesters in Tibet that were arrested and detained claimed they were tortured and told to admit they were paid to protest by the 14th Dalai Lama. The Chinese government stated the unrest was motivated by separatism and blamed the Dalai Lama for orchestrating it. The Dalai Lama denied the accusation and said that the situation was caused by "deep seated disillusionment and despair" in Tibet, and invited Chinese officials to come to India with its evidence. Representatives of the Chinese government and the Dalai Lama held talks on China's Tibet policies on 4 May and 1 July of the same year.
The protests erupted amidst growing frustrations with China's persecution of Tibetans and of Tibetan Buddhists, which Tibetans assert began after China's annexation in 1950. Unresolved situations remained regarding Tibet's three highest spiritual leaders - the 14th Dalai Lama and the 17th Gyalwang Karmapa both escaped to India, while the 11th Panchen Lama's location remains unknown since his 1995 forced disappearance by the Chinese government. Photographs of the Dalai Lama remain outlawed, as are Tibetan flags. Efforts at brokering agreements on behalf of Tibetans by the Dalai Lama with China had stalled.
The protests and uprisings in Tibet since 1950 include earlier mass protests in Lhasa—the 1959 Tibetan uprising, and the 1987 protests which were likewise led by monks from Sera monastery, Drepung monastery and Ganden monastery.
Of the 1989 bloody suppression in Lhasa, journalist Jim Yardley wrote:
"In the past China has not hesitated to crush major protests in Tibet or to jail disobedient monks. [Former] President Hu Jintao, who [was] also the general secretary of the Communist Party, served as party boss in Tibet during a violent crackdown in 1989. His support for the bloody suppression of unrest that year earned him the good will of Deng Xiaoping, then the paramount leader, and led directly to his elevation to the Politburo Standing Committee and eventually to China’s top leadership posts."
The Dalai Lama and the Central Tibetan Administration (CTA) proposed the Middle Way Approach to address the government of China's policies in Tibet. Specific agreements offered to China include the Five Point Peace Plan in 1987, the Strasbourg proposal in 1988, and the Memorandum on Genuine Autonomy in 2008.
Tibetan loyalty to the Dalai Lama is considered disloyalty to the Chinese Communist Party (CCP), and is viewed by the Chinese government as a crime of separatism and a threat to China's national security and expansionism. Kelsang Dolma wrote, "when the 2008 Tibet protests erupted, fomented by discontent with decades-long repression, the CCP ruthlessly responded by killing and arbitrarily arresting protesters".
As a policy begun by Chairman Mao in 1950, Beijing promotes settlements of Han Chinese within Tibet, which dilute Tibetan culture and identity, as the Dalai Lama and others have stated. The CTA also states, "[u]nder the guise of the economic and social development, Beijing encourages its population to migrate to Tibet with the clear aim to marginalize Tibetans from the economic, educational, political and social life of the region." A railway link opened in 2006 delivers three thousand Han a day to the region. Within Lhasa, Tsering Woeser reports that Tibetans are discriminated against at spiritual sites, and residents were relocated to rural areas, as urban areas were redeveloped for Han residents and businesses. Nomadic Tibetans are forced to build homes and borrow money for construction costs, while their grazing lands are redistributed, as reported by Free Tibet.
According to the Tibetan Independence Movement, Tibetans in Lhasa were angered by inflation that caused the prices of food and consumer goods to increase. Prices also continued to rise in other parts of the country, while Tibetan youth stated that equal access to jobs and education is another economic issue related to the mass settling of Han Chinese.
According to the Central Tibetan Administration, environmental concerns also motivated the protests. Some of Asia's most important rivers flow from the Tibetan plateau, and "are being polluted and diminished by careless industrialisation and unplanned irrigation" as stated by the Dalai Lama.
Protests in Tibet
On 10 March near midday, a group of 300–400 monks from Drepung monastery marched to Lhasa's center demanding religious freedom according to a report by the Human Rights Watch. According to eyewitnesses in the report, a sitting protest began after Chinese police blocked their route. According to witness accounts in the report, monks were kicked and beaten with batons and 60 monks were arrested that day. Journalist Barbara Demick's account of the demonstrations did not mention any violence occurring that day, however.
The next day on 11 March as 300–400 monks from Sera monastery departed in a line to demand the release of the arrested Sera monks. An eyewitness told the BBC that around 300 monks from Sera monastery moved onto the street and were kicked and beat by 10 to 15 plainclothes Chinese police officers in what he described as "gratuitous violence". Outside the monastery, the monks began a sitting protest and were surrounded by riot police and armed military units. Radio Free Asia reported that an eyewitness saw tear gas being fired into the crowd. The Human Rights Watch report stated hundreds of monks and nuns from Ganden Monastery and Mani Nunnery also began marching into Lhasa on 11 March. According to the report, participants claimed that they were stopped by police and returned to their monastic centers, which were promptly cordoned off.
On 14 March, a group of monks preparing to depart from Ramoche Temple in the center of Lhasa to demand the release of monks from Drepung and Sera were barred from leaving by police. They began throwing stones at the police, some of which were hard enough to break their shields. As the police withdrew, the enraged crowd began targeting ethnic Chinese passersby. According to the Toronto Star, businesses that had Chinese markings were targeted to be burned, smashed or looted. Fires were spread to buildings, and Han and Hui Chinese people were beaten, while a building's fire killed four Han women and a Tibetan woman hiding in same building.
When Chinese police and military units reentered Lhasa on 14 March, reports state tear gas canisters were launched and shootings began. Amnesty International reports that machine guns were used. State hospitals were reported by Human Rights Watch as closed to protestors by Chinese authorities, and reports of wounded and killed Tibetans were suppressed.
Police cars, fire engines and other official vehicles were reportedly set on fire. Reports state Tibetans attacked Han and Hui passerby using stones, and an eyewitness stated from their hotel window, "It seems like it's ethnic—like they want to kill anyone not Tibetan." The witness also said he saw a group of 20 armed men firing guns, and that he was unsure if they were police officers or armed rioters. Chinese state media reported non-Tibetan-owned businesses and banks were robbed and houses were attacked and burned down, including government buildings and schools. Police used tear gas and cattle prods. According to Chinese state media, 18 civilians were killed by rioters.
A crowd tried to storm the Lhasa Great Mosque and set fire to the front gate. Shops and restaurants in the Muslim quarter were destroyed. A Chinese businessman reported that many Hui Muslim stores were burnt. Also burnt were stationery shops, banks, and a wholesale market at Tsomtsikhang, where many shops are owned by Han Chinese and Hui Muslims.
Throughout Lhasa, raids, security sweeps and arrests by Chinese security forces reportedly continued for several days. Tsondru, a monk, is reported to have died after being thrown off a roof while under arrest by Chinese security forces. An early official statement by Tibet Autonomous Region Chairman Pema Trinley reported, "Only three law-breakers died during the pacification of the Lhasa unrest, no participation from the PLA" was revised to add that another person "jumped from a building" to avoid arrest.
On 14 March, 200 Labrang Monastery monks led a crowd of 300 people in demonstrations outside of their monastery in Gansu. The Guardian reported witness accounts of security vehicles being set on fire and Tibetan mob violence.
On 15 March, 4,000 Tibetans gathered near the Labrang Monastery and clashed with Chinese forces. The clashes centered around the Gelug school's Labrang monastery, one of the largest Buddhist monasteries in Tibet. Demonstrators marched through the streets of Xiahe. There were reports of government offices being damaged by the protesters, as well as reports of police using tear gas and shooting at protesters.
In Machu on 16 March, rioters set a government building on fire, while clashes continued on 18 March.
In Hezou on 19 March, footage emerged showing protestors tearing Chinese flags and raising Tibetan flags in their place.
The Tibetan government-in-exile stated that 19 Tibetans were shot and killed on 18 March.
Chinese authorities arrested twelve Tibetan monks after an incident in the historic region of Rebkong, which is located in the Huangnan Tibetan Autonomous Prefecture in Qinghai (known to Tibetans as Amdo). Chinese security forces surrounded the Ditsa monastery in Bayan County.[dubious ] Qinghai province borders the Tibet Autonomous Region.
In the capital city of Xining, a journalist with Neue Zürcher Zeitung reported that residents were receiving intimidating calls from the Public Security Bureau. A call received by a Tibetan professor was reported as having said "Take good care of yourself" in a threatening manner.
During special classes for students in the region, videos of Tibetan demonstrators demolishing stores and attacking police were shown. The sessions have been deemed propaganda by some. Tibetan students at the Medical University of Xining held demonstrations to express their solidarity with the protestors, as well as a vigil for killed protestors in Lhasa.
Passports belonging to Tibetans were confiscated to prevent returns to India and the delivery of reports on events to Tibetan exiles. Tourists and foreign residents were surveilled and informed about their possible expulsion in case they got involved in Tibetan protests.
Kham & Amdo/Sichuan
On 16 March, Tibetan monks and local residents clashed with police in Ngawa after monks held a protest at the traditional Tibetan grounds of Kham and Amdo. A witness told the BBC that approximately 17 Tibetans were killed, including a school girl. By 18 March, the town was "teeming with police and soldiers".
The India-based Tibetan Centre for Human Rights and Democracy reported that at least seven people were shot. There are other reports that police shot between 13 and 30 protesters after a police station was set on fire, reports of at least one policeman being killed, and the burning three or four police vans. Reports on the exact number of deaths were difficult due to the expulsion of journalists. The Chinese government stated that it opened fire on protestors in self defense on 20 March, reporting that four were wounded.
In Ngawa Town, after days of protests by 3,000 monks and 300 nuns, 27 of the nuns at the Kirti monasteries and nunneries were arrested by Chinese police forces on 20 March. Photographs of killed protestors near Kirti were circulated.
Neue Zürcher Zeitung reported that phone calls into the region from Zurich were intercepted, and exiled Tibetans were harassed during the calls. The arrested nuns were not heard from afterwards. During a telephone call, a nun stated she and the other nuns had no regrets, and that "the road of liberty is long and arduous".
A wave of arrests occurred in Sertar on 21 March, where police shot and killed a protestor. Chinese army troops blocked roads in Sertar, and many Tibetans were arrested. The London-based Free Tibet Campaign reported that troops had been sent to the county after residents used explosives to destroy a bridge near the village of Gudu.
Radio Free Asia reported demonstrations in Kardze on 23 April, and on 11–12 May when 14 of the nuns demanding the release of two arrested in April were beaten and detained. The report states nuns were from nearby nunneries, and armed Chinese forces continued to patrol the area. Other protests were held in Chori.
The TCHRD reported that three people were killed by Chinese forces on 15–16 March.
Chinese and Dalai Lama responses
CNN Beijing reported Chinese Premier Wen Jiabao "blamed supporters" of the Dalai Lama for the recent violence in Tibet. During a televised news conference, he claimed, "there is ample fact and we also have plenty of evidence proving that this incident was organised, premeditated, masterminded and incited" by them. A spokesman for the 14th Dalai Lama said the accusations were "absolutely baseless".
Contrastingly, Tibetan news website Phayul reported the protests were spontaneous and not orchestrated by the Dalai Lama. It claimed the younger generation of Tibetans were impatient with the Middle Way diplomatic approach and chose action instead.
The Dalai Lama said pacifism is the only path to stop the "ethnic genocide", caused by migrating Han Chinese and by religious restrictions. The Dalai Lama has also stated that Tibetans are treated by China as second-class citizens in their own land, which has caused simmering resentment, and has repeatedly denied any involvement in organizing or inciting the unrest, and proposed to resign as the political leader if the violence continued.
A reporter for The Economist, James Miles, when asked in an interview if the Dalai Lama was responsible for the riots, responded that he "didn't see any evidence of any organized activity", opining that "it's more likely that what we saw was inspired by a general desire of Tibetans both inside Tibet and among the Dalai Lama's followers, to take advantage of this Olympic year, but also inspired simply by all these festering grievances on the ground in Lhasa." He noted in another report that the rioting "seemed to be primarily an eruption of ethnic hatred".
On April 1, rhetoric increased when the Chinese Public Security Ministry alleged that Tibet's supporters were planning suicide attacks, but provided no evidence or details. Samdhong Rinpoche, prime minister of the Tibetan government-in-exile, denied these allegations, stating "Tibetan exiles are one-hundred-percent committed to nonviolence. There is no question of suicide attacks. But we fear that Chinese might masquerade as Tibetans and plan such attacks to give bad publicity to Tibetans".
On 14 April, Chinese forces claimed that they had found semi-automatic firearms hidden throughout a temple in Ngawa. Chinese police officers told Chinese reporters, "they were modified semi-automatic weapons."
China responded by deploying the People's Armed Police. The BBC reported seeing over 400 troop carriers mobilizing into Tibet, which would represent a deployment of up to 4,000 troops. The Chinese authorities ordered all Hong Kong and foreign journalists to leave Lhasa. According to General Yang Deping, regular military troops from the People's Liberation Army were not deployed.
Chinese authorities were also reportedly concerned that the Tibetan protests could "embolden activists in restive Xinjiang province" to organise street protests as well. The Chinese government's People's Daily reported a statement by Gyaincain Norbu, which condemned the unrest, stating
"the rioters' acts not only harmed the interests of the nation and the people, but also violated the aim of Buddhism [...] We strongly condemn the crime of a tiny number of people to hurt the lives and properties of the people."
In addition to sealing off monasteries, an eyewitness at Sera Monastery claimed, "they [Chinese authorities] were grabbing monks, kicking and beating them." In Ngawa, police fired at the crowd after protestors reportedly burned down government buildings including the local police station, destroyed vehicles including police vehicles, stabbed police officers with swords, and attempted to take firearms from the police, during which the police fired warning shots to no avail. The government stated that the police acted in self-defense. According to the Chinese government, four protesters were wounded, and 18 civilians, along with a police officer, were killed. The Tibetan government-in-exile claimed there were at least 99 deaths across the region.
PRC and Dalai Lama dialogues
On March 19, Premier Wen Jiabao condemned the Dalai Lama's alleged role in the riot, but said the possibility for a dialogue remained open if he renounced Tibetan independence, and if he "recognizes Tibet and Taiwan as inalienable parts of the Chinese territory". The Dalai Lama has repeatedly stated he seeks autonomy, not independence, citing the need for Tibet to develop as a modern nation.
On May 4, two representatives of the PRC government, Zhu Weiqun and Sitar met with two representatives of the Dalai Lama, Lodi Gyari and Kelsang Gyaltsen, in the southern Chinese city of Shenzhen. The two sides exchanged views and agreed that a further round of talks should be held at an appropriate time.
This was the first high-level dialogue between the Dalai Lama's representatives and the PRC government since the March unrest, and was the continuation of a series of talks between the Chinese government and the Dalai Lama's representatives, including his immediate family and close aides.
Casualties and fatalities
China's state media Xinhua News Agency reported on early Saturday, 15 March, that 10 people had been burned to death by Tibetans, including two hotel employees and two shop owners. It also reported that the victims were all innocent civilians and that most of them were business people. The state-run People's Daily reported on 21 March that, according to the Tibet regional government, 18 civilians and 1 police officer had been confirmed dead in the unrest by the night of Friday, 14 March. It also reported the number of injured civilians rose to 382 from 325, 58 of whom were critically wounded. 241 police officers were injured, 23 of whom were critically wounded.
On 17 March, Tibet Autonomous Region governor Champa Phuntsok announced that 16 had been confirmed dead over the weekend's violence and dozens injured. Other sources published after the same press conference indicate that China put the death toll in Lhasa at 13. The Associated Press later reported that the Chinese government's official death toll from the previous week's rioting in Lhasa had risen to 22. Accordingly, the death toll reported by Xinhua had risen to 19.
The 14th Dalai Lama said China was causing a cultural genocide in Tibet, and the Central Tibetan Administration reported by 16 March to have confirmed at least 80 deaths of Tibetans, then increased the death count by Chinese forces to more than 140 people, as reported on 5 April. The Central Tibetan Administration's number of Tibetans killed since increased to 220, including subsequent deaths through to January 2009.
A month after the unrest began on 10 March, the Dalai Lama stated that since the beginning of the demonstrations in Tibet at least 400 people had been killed, and thousands of others arrested.
Foreign tourists and Chinese eyewitnesses in Lhasa said "they saw and heard repeated gunfire there on Friday", 14 March. Although Phuntsok claimed that Chinese police did not fire their guns or use anti-personnel weapons against the Tibetan protesters, additional reports from BBC, Central Tibetan Administration, Tibetan Review, Human Rights Watch and Amnesty International contradict Puncog's claim and state "indiscriminate shootings" by Chinese forces occurred, and that leaked evidence of machine gun use has been documented. Puncog also states Tibetans wounded 61 police officers, including six seriously, and reported that 13 civilians had been killed. According to reporter James Miles, the police fatalities included both Tibetans and the Han Chinese.
A blockade by China of monasteries was reported by an Indian newspaper and Phayul, a news source affiliated with Central Tibetan Administration. The police had blocked off water, electricity, food and health facilities in Sera Monastery, Drepung monastery, Ganden monastery and at other monasteries active in the demonstrations. As a consequence, monks were suffering starvation, and on 25 March one monk died from starvation at Ramoche Temple.
On 28 March, the International Herald Tribune reported 5 female retail workers had been burned alive when Tibetan rioters set fire to the Yishion clothing store where they worked. The article noted one of them was Tibetan.
In October 2009, four Tibetans were executed in connection with their involvement with the unrest. According to the Tibetan Centre for Human Rights and Democracy, "the executions were not announced by the Chinese news media, and a woman who answered the phone at the Lhasa Municipal Intermediate People’s Court hung up when asked to confirm the accounts provided by the exile group.
Arrests and disappearances
The BBC, sourcing information from a Human Rights Watch report, reported that "witnesses recounted that monks who initially tried to go through the police lines were thrown to the ground, kicked, and taken away." The arrest of 15 monks from Sera Monastery was confirmed by state-run China Tibet News, which added 13 of the monks were prosecuted. The Human Rights Watch report stated that "up to 60 monks were arrested" on 10 March in Lhasa.
The first non-monastic Tibetans were reportedly arrested in Barkhor Square on 11 March.
Another report on the Kardze area from Radio Free Asia in May 2008 states at least 200 people were detained after 24 March, while 7 nuns were sentenced to prison and 107 nuns were detained. The Tibetan Centre for Human Rights and Democracy reported that three nuns from Dragkar Nunnery detained in Kardze were tortured, reportedly leading to the death and disappearance of one of the nuns.
Amnesty International reported in June 2008 that over 1,000 Tibetan protesters detained by Chinese authorities were "unaccounted for", while more than 1,000 monks, nuns, students and citizens had disappeared by 2008. Another report from Amnesty International stated 5,600 Tibetans were arrested through to January 2009.
By 5 April, the Tibetan Centre for Human Rights and Democracy reported that the Chinese authorities had arrested over 2,300 Tibetans from various parts of Tibet, and claimed that "Tibetans are sometimes secretly killed in detention".
The TCHRD also reported that a 38-year-old Tibetan woman, who was involved in peaceful protests on 16 and 17 March in Ngaba County, died after reportedly being tortured in a Chinese prison. Following her release, the government hospital had reportedly refused to admit her.
According to a 10 October 2009 report by the U.S. Congressional-Executive Commission on China, at least 670 Tibetans had been imprisoned in 2009 for activities that included peaceful protest or leaking information to the outside world.
On 7 November, the state-run Lhasa Evening News reported a retired doctor was sentenced in Lhasa to 15 years imprisonment on espionage charges for passing information to the Central Tibetan Administration. The sentencing corresponds to the PRC's concealment of hospital records, as Human Rights Watch reported.
During the protests and demonstrations, Chinese authorities prohibited foreign and Hong Kong media from entering Tibet and expelled those already there. Two German reporters, Georg Blume of Die Zeit and Kristin Kupfer of Profil, left Tibet on March 18 due to pressure from the authorities, and James Miles, a correspondent from The Economist, said that China "insisted however that when my permit did expire on the 19th that I had to leave. I asked for an extension and they said decisively no." Domestic Chinese media initially downplayed the riots, but this changed relatively quickly as they began to focus on the violence against Han citizens. There was speculation that the violence would affect attendance at the 2008 Olympic Games, particularly amid pressure for leaders to boycott the games, but the calls for boycott went largely unheeded.
Tania Branigan of The Guardian reported the Chinese government blocked foreign broadcasters and websites, and denied journalists access to protest areas. Websites such as YouTube, The Guardian website, portions of the Yahoo! portal, and sections of The Times website had been restricted.
The Chinese media accused Western media of reporting with inaccuracy and little independent cross-checking. The Chinese state-run newspaper China Daily claiming Western media deliberately misrepresented the situation. The newspaper stated that The Washington Post used pictures of baton-wielding Nepalese police in clashes with Tibetan protesters in Kathmandu, claiming that the officers were Chinese. The article stated that Chinese citizens had been angered by what they saw as biased and sometimes dishonest reporting by Western media. There was also criticism of CNN's use of a cropped picture that shows only the military truck but not rioters who were attacking it. John Vause, who reported this story, responded to the criticism saying, "technically it was impossible to include the crashed car on the left". The CNN image was later replaced with one that was cropped differently. On 24 March, the German TV news channel RTL Television disclosed that a photograph depicting rioters had been erroneously captioned. Separately, another German station, n-tv, admitted that it had mistakenly aired footage from Nepal during a story on Chinese riots. The Agence France-Presse reported that Chinese students abroad had set up the website Anti-CNN to collect evidence of "one-sided and untrue" foreign reporting. Media accused of falsified reporting include CNN, Fox News, The Times, Sky News, Der Spiegel, and the BBC. Der Spiegel has rejected the accusations in an article. According to The New York Times, CNN apologized on May 18 over some comments made on April 9.
Riots against non-Tibetans began on Friday, 14 March. Chinese TV channels aired hours of anti-Chinese riots in Lhasa and the aftermath. Employees at the state television service CCTV's English service were instructed to keep broadcasting footage of burned-out shops and Chinese wounded in attacks.[dubious ] As of 18 March, no footage of demonstrators acting peacefully was shown. China's Communist Party newspaper, the People's Daily, called on the government to "resolutely crush the 'Tibet independence' forces' conspiracy and sabotaging activities". The People's Daily also accused the Dalai Lama and the Central Tibetan Administration of orchestrating the protests in its commentary. Yahoo! China published "most wanted" posters across its homepage to assist Chinese police in apprehending protestors; 24 Tibetans are believed to have been arrested as a result.
On 17 March, the Toronto Star reported the accounts of various Canadian witnesses who were caught up in the violence. One Canadian witnessed an attack by a mob on a motorcyclist, others recounted how the violence of the riots forced them to escape with help from taxi drivers and guides, and another described how they intervened to save a Han Chinese man from a mob.
Foreign reporter group
After expelling foreign journalists, the Chinese government selected a group of foreign journalists which were given restricted access to the region. The Agence France-Presse and Deutsche Welle reported on the decision by the Chinese government, which allowed a small group of reporters to tour Tibet. The journalists allowed to tour Tibet included those from The Wall Street Journal, USA Today, Financial Times, Kyodo News Agency, the Korean Broadcasting System, Al-Jazeera, and the Associated Press. The journalists were kept under close control while in Lhasa. Chinese authorities said the limited number of journalists permitted to attend and the restrictions on their movements were based on logistical considerations.
On 27 March, the media tour through Lhasa was disrupted by a group of detained monks from Jokhang Monastery. Reports from Taiwanese journalists also invited on the tour stated that the Jokhang monks told them that they had been locked down in the temple even though they had not participated in the riots, and implored the journalists to report the information. Padma Choling, the vice-chairman of the Tibetan Autonomous Region, stated that they were locked down pending police interviews in relation to the riots, and that they were released once interviewed. He also promised that the monks involved in the protest would be "dealt with" according to law. The Tibetan activist group International Campaign for Tibet stated on 28 March that it feared for the welfare and whereabouts of the monks which spoke out during the media tour, specifically those monks from Sera Monastery, Drepung Monastery, Ganden Monastery and Ramoche Temple. The group did not explain why it identified four monasteries when the protest involved only monks from Jokhang. Choling later told reporters the monks would not be punished. Detained monks at Labrang Monastery also reportedly spoke to the journalists on tour, and likewise implored them to report their detainment. Subsequent reports of blockades by Chinese authorities at Sera, Drepung, Ramoche and Labrang monasteries reportedly led to starvation conditions.
According to Wen Jiabao, the Premier of the People's Republic of China, attacks on between ten and twenty Chinese embassies and consulates occurred around the same time as attacks on non-Tibetan interests in the Tibet Autonomous Region and several other ethnic Tibetan areas.
According to an article by Doug Saunders published in The Globe and Mail, the protests were loosely coordinated by a group of full-time organizers hired by two umbrella groups that were loyal to the Tibetan government in exile. Documents were sent to more than 150 Tibet support groups around the world giving them detailed notes on how to behave when organizing similar disruptions as the Olympic flame made its six-month trip around the world. This included advice on maintaining non-violence and following the Dalai Lama's opposition to Tibetan national independence. Protesters were to advocate a more autonomous Tibet within China. However, many of the protestors did not follow this advice. Doug Saunders further stated that the torch-relay protests had no relationship with the unrest in Tibet.
Impact on the 2008 Summer Olympics
There were rumors that some athletes were considering boycotting the 2008 Summer Olympics over the unrest. The vice-president of the International Olympic Committee discouraged this, as well as the European Union and the Olympic Committees of Europe and Australia, who condemned politicizing sport. The 14th Dalai Lama also reiterated that he was against any boycott.
The attendance of government leaders at the 2008 Summer Olympics opening ceremony was watched by the media, because some groups called for a boycott of the ceremony on both human rights and Tibetan violence grounds. Nonetheless, by the end of July 2008, the leaders of more than 80 countries had decided to attend the opening ceremony of the Beijing Olympics, more than in any of the preceding Olympics. All but one leader of the countries that did not attend the opening ceremonies emphasized that it was not to boycott the Olympics; one German chancellor said that there was "no link to Tibet". Prime Minister of Poland Donald Tusk was the one European head of government to boycott the opening ceremonies because of the violence in Tibet.
On 20 March, the U.S. Department of State issued a warning to U.S. citizens attending the Beijing Olympics, stating that "Americans' conversations and telephones could be monitored and their rooms could be searched without their knowledge or consent".
On March 26, a small group of foreign journalists were taken by bus into Tibet, in a move that appeared calculated to bolster government claims that authorities were in control and that the protests which began peacefully were acts of destruction and murder. The heavily armed police presence indicated Lhasa remained under lockdown. Reporters were guided to burned streets in Lhasa hung with a red banner that read, "Construct a Socialist Harmonious Society", a catchphrase from the Chinese president's efforts to deal with social unrest created by an increasing gap between an urban middle class and the poor. The Dalai Lama called the trip "a first step", provided that reporters were given complete freedom.
The Open Constitution Initiative, operated by several Weiquan lawyers and intellectuals, issued a paper in May 2009 challenging the official narrative and suggesting that the protests were a response to economic inequities, Han Chinese migration, and religious sentiments. The OCI recommended that Chinese authorities better respect and protect the rights and interests of the Tibetan people, including religious freedom.
- Buddhism and violence
- Censorship in China
- Human rights in Tibet
- Protests and uprisings in Tibet since 1950
- Persecution of Buddhists § Tibet
- Sinophobia § Tibet
- The 2008 uprising and the Olympics, (22 June 2018), Tibetan Review, https://www.tibetanreview.net/the-2008-uprising-and-the-olympics/ Archived December 26, 2018, at the Wayback Machine
- Tibet protests, (14 March 2008), https://www.theguardian.com/world/gallery/2008/mar/14/1 Archived March 21, 2016, at the Wayback Machine
- "Tibetan riots spread outside region". The New York Times. March 16, 2008. Archived from the original on February 25, 2020. Retrieved January 7, 2011.
- "Transcript: James Miles interview on Tibet – CNN.com". CNN. April 11, 2008. Archived from the original on April 11, 2008. Retrieved March 26, 2018.
- Accounts from Lhasa and beyond Archived July 30, 2010, at the Wayback Machine, BBC.
- "'I can't just let this guy die on the ground'" Archived October 17, 2012, at the Wayback Machine, Toronto Star, World News, March 17, 2008
- Yardley, Jim (March 15, 2008). "Violence in Tibet as Monks Clash With the Police". The New York Times. ISSN 0362-4331. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- BBC News, China accused of excessive force over Tibet unrest, (22 July 2010), https://www.bbc.com/news/world-asia-pacific-10723140 Archived December 21, 2019, at the Wayback Machine
- "Tibetan riots spread outside region". The New York Times. March 16, 2008. Archived from the original on February 25, 2020. Retrieved January 7, 2011.
- I saw it with my own eyes: Abuses by Chinese security forces in Tibet, 2008-2010, (21 July 2010), Human Rights Watch, https://www.hrw.org/report/2010/07/21/i-saw-it-my-own-eyes/abuses-chinese-security-forces-tibet-2008-2010 Archived September 14, 2020, at the Wayback Machine
- International Campaign for Tibet, 2008-2009 Protest Logs, https://savetibet.org/archived-research/2008-2009-protest-logs/ Archived September 12, 2020, at the Wayback Machine
- "达赖和"西藏人民大起义运动"脱不了干系_新闻中心_新浪网". news.sina.com.cn. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- "China's Forbidden Zones". Human Rights Watch: 32–33. July 7, 2008. Archived from the original on March 2, 2010. Retrieved March 11, 2010.
- Tibetan protestors missing, Amnesty says, (19 June 2008), CNN International, http://edition.cnn.com/2008/WORLD/asiapcf/06/19/oly.tibet.torch/ Archived February 24, 2020, at the Wayback Machine
- Stratton, Allegra; agencies (March 24, 2008). "Tibet protesters disrupt Olympic flame ceremony". the Guardian. Archived from the original on March 27, 2018. Retrieved March 26, 2018.
- "TIMELINE: Day-by-day record of Tibet protests". Reuters. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- Kumar, Hari (April 1, 2008). "Tibetans Protest in Delhi, but March Is Off". The New York Times. ISSN 0362-4331. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- Reuters Editorial. "Nepal police break up Tibet protests, 284 held". U.S. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- "Eggs, flags and tempers fly at Chinese consulate". The Age. March 17, 2008. Archived from the original on March 27, 2018. Retrieved March 26, 2018.
- Reuters Editorial. "Tibetan protesters attack London's Chinese embassy". U.K. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- Reuters Editorial. "Tibetans protest near China embassy in Nepal". U.S. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- "Tibetans storm Chinese Embassy in Paris". Phayul.com. Archived from the original on March 27, 2018. Retrieved March 26, 2018.
- "Tibetans activists try to storm Chinese embassy in Delhi". News18. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- "China Accuses Tibetan Protesters of Killing Innocent People". Voice of America. October 27, 2009.
- "Dalai Lama Calls Again For Crackdown Probe". Phayul.com. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- "Dalai Lama calls for end to anti-Olympic protests". The Guardian. September 2, 2013. Archived from the original on September 2, 2013. Retrieved March 26, 2018.
- "China, Dalai Lama's envoys resume talks". Reuters. July 1, 2008. Archived from the original on March 13, 2009. Retrieved July 1, 2008.
- Tibetan protests 2008 Central Tibetan Administration, https://tibet.net/wp-content/uploads/2014/10/tibetprotest2008.pdf Archived September 27, 2020, at the Wayback Machine
- Dolma, Kelsang (August 31, 2020). "Tibet Was China's First Laboratory of Repression, Xi Jinping is bringing methods honed in Xinjiang back to the Himalayas". Foreign Policy. Archived from the original on September 26, 2020. Retrieved September 26, 2020.
- Wong, Edward (July 24, 2010). "China's Money and Migrants Pour Into Tibet". The New York Times. ISSN 0362-4331. Retrieved March 18, 2022.
- Jonathan Watts, Protests in Tibet erupt into violence, (14 March 2008), https://www.theguardian.com/world/2008/mar/14/tibet.china1 Archived October 2, 2020, at the Wayback Machine
- "URGENT Chinese Block Roads, Arrest Monks After Protest". Associated Press. October 5, 1987.
- 30 years of resistance: The legacy of the 1987 Lhasa protests, (20 September 2017), https://www.tibetwatch.org/30-years-of-resistance Archived November 21, 2020, at the Wayback Machine
- Jim Yardley, Violence in Tibet as Monks Clash With the Police, (15 March 2008), https://www.nytimes.com/2008/03/15/world/asia/15tibet.html Archived March 26, 2018, at the Wayback Machine
- Tsewang Gyalpo Arya, The 17-point Agreement – What China promised, what it really delivered and the future?, (23 May 2019), https://tibet.net/the-17-point-agreement-what-china-promised-what-it-really-delivered-and-the-future-2/ Archived August 10, 2020, at the Wayback Machine
- Tsering Topgyal, Identity Insecurity and the Tibetan Resistance Against China, Pacific Affairs, University of British Columbia, September 2013, https://www.jstor.org/stable/43590713 Archived July 1, 2019, at the Wayback Machine
- I saw it with my own eyes: Abuses by Chinese security forces in Tibet, 2008-2010, (21 July 2010), Human Rights Watch, https://www.hrw.org/report/2010/07/21/i-saw-it-my-own-eyes/abuses-chinese-security-forces-tibet-2008-2010 Archived September 14, 2020, at the Wayback Machine
- Julian Borger, Tibet could be 'swamped' by mass Chinese settlement after Olympics, says Dalai Lama, (24 May 2008), https://www.theguardian.com/world/2008/may/24/tibet.china Archived October 31, 2020, at the Wayback Machine
- International Commission of Jurists, 1997, https://www.icj.org/wp-content/uploads/1997/01/Tibet-human-rights-and-the-rule-of-law-thematic-report-1997-eng.pdf Archived February 21, 2021, at the Wayback Machine
- Beijing sends new flood of Han migrants to Lhasa: Tibetans risk disappearing, (27 January 2015), http://www.asianews.it/news-en/Beijing-sends-a-new-flood-of-Han-migrants-to-Lhasa:-Tibetans-risk-disappearing-33294.html Archived September 20, 2020, at the Wayback Machine
- Ségolène Malterre, "Lhasa's Tibetans will soon be nothing but decorations for tourists" , (21 May 2013), https://observers.france24.com/en/20130521-lhasa-tibetans-nothing-decorations-tourists Archived June 10, 2020, at the Wayback Machine
- Destruction of Lhasa revealed in new images, (20 May 2013), International Campaign for Tibet, https://savetibet.org/destruction-of-lhasa-revealed-in-new-images/ Archived November 22, 2020, at the Wayback Machine
- Is development killing Tibet's way of life?, (15 July 2010), https://www.bbc.com/news/world-asia-pacific-10638506 Archived March 24, 2021, at the Wayback Machine
- Two Tibetan nomads arrested following their resistance to land ownership confiscations, (04 September 2020), https://www.freetibet.org/news-media/na/two-tibetan-nomads-arrested-following-their-resistance-land-ownership-confiscations Archived September 27, 2020, at the Wayback Machine
- Gavin Rabinowitz (March 18, 2008). "Protests expose rifts among Tibetans". Phayul.com. Phayul. Archived from the original on October 19, 2017. Retrieved October 18, 2017.
- Hillman, Ben. Rethinking China's Tibet Policy Archived April 13, 2013, at the Wayback Machine in The Asia-Pacific Journal: Japan Focus, August 2008
- "REASONS FOR UNREST ARE ANCIENT". Tampa Bay Times. Archived from the original on January 15, 2021. Retrieved January 14, 2021.
- "Fire on the roof of the world". The Economist. March 14, 2008. Archived from the original on May 26, 2009. Retrieved March 19, 2008.
- "Sie haben sich am heftigsten beklagt, dass sie nicht die gleichen Stellen oder die gleiche Schulbildung bekommen wie die Chinesen, dass die Chinesen mehr Geld haben.""Die Jugend will mehr". Neue Zürcher Zeitung (in German). March 23, 2008. Archived from the original on March 27, 2008. Retrieved April 9, 2008.
- Barbara Demick (March 22, 2008). "Tales of horror from Tibet". Los Angeles Times. Archived from the original on November 9, 2020.
- Eyewitness: Monk 'kicked to floor' , (14 March 2008), BBC, http://news.bbc.co.uk/2/hi/asia-pacific/7296134.stm Archived March 18, 2008, at the Wayback Machine
- Radio Free Asia, (12 March 2008), http://www.rfa.org/english/news/2008/03/12/tibet_march/ Archived March 30, 2008, at the Wayback Machine
- Bill Schiller, "Canadians caught in Tibet's violence", Toronto Star, March 17, 2008. Accessed 2009-07-17. Archived 2009-07-23.
- Barbara Demick (June 23, 2008). "Tibetan-Muslim tensions roil China". Los Angeles Times. Archived from the original on June 22, 2010.
- David Barboza, Putting Faces on 5 Victims of Tibetan Riots, March 28, 2008, https://www.nytimes.com/2008/03/28/world/asia/28victims.html Archived March 10, 2021, at the Wayback Machine
- Shai Jiang, Leaked internal document shows China used machine guns to kill Tibetans in March 2008 protest, (22 Aug 2014), https://www.amnesty.org.uk/blogs/countdown-china/leaked-internal-document-shows-china-used-machine-guns-kill-tibetans-march Amnesty International, Archived February 24, 2020, at the Wayback Machine
- Eyewitness account of violence between protesters and police in Tibet Archived August 26, 2016, at the Wayback Machine. The Guardian, 15 March 2008. Retrieved on 4 Aug 2016
- As long as there are separists, there will be 3-14 event again Archived October 6, 2017, at the Wayback Machine (Trad Chinese) China Review News Agency, 22 June 2008
- Accounts from Lhasa and beyond, 18 March 2008, BBC, http://news.bbc.co.uk/2/hi/asia-pacific/7302319.stm Archived July 30, 2010, at the Wayback Machine
- Ministry of Foreign Affairs of the People’s Republic of China, Materials on the March 14 Incident in Tibet (I), Beijing: Foreign Languages Press, 2008, p. 32.
- Jonathan Watts, Tibet gripped by violent clashes, (14 March 2008), https://www.theguardian.com/world/2008/mar/14/tibet.china3 Archived October 24, 2020, at the Wayback Machine
- Jim Yardley, Chinese Forces Say They’ve Secured Tibet’s Capital, (15 March 2008), https://www.nytimes.com/2008/03/15/world/asia/15cnd-tibet.html Archived November 9, 2020, at the Wayback Machine
- Spencer, Richard (March 15, 2008). "Tibet riots continue after day of violence". The Daily Telegraph. London. Archived from the original on March 19, 2008. Retrieved March 15, 2008.
- Spencer, Richard (March 15, 2008). "Q&A: The showdown in Tibet. Why would Tibet boil over right now". Chicago Tribune. Archived from the original on March 18, 2008. Retrieved March 16, 2008.
- Key places and events in Tibet unrest, (19 March 2008), http://news.bbc.co.uk/2/hi/asia-pacific/7305288.stm BBC News, Archived October 19, 2020, at the Wayback Machine
- "Key places and events in Tibet unrest". BBC News. March 19, 2008. Archived from the original on October 19, 2020. Retrieved January 14, 2021.
- "Questions, answers about casualties, damages of recent riots". Xinhua News Agency. March 25, 2008. Archived from the original on March 30, 2008. Retrieved March 26, 2008.
- "Dalai Lama calls for calm in Tibet". Al Jazeera. March 19, 2008. Archived from the original on March 19, 2008. Retrieved March 19, 2008.
- ""Take Care": Control like in Mao's Days in Tibetan Territory". Neue Zürcher Zeitung (in German). March 28, 2008. Archived from the original on March 31, 2008. Retrieved March 28, 2008.
- Accounts from Lhasa and beyond, (19 March 2008), http://news.bbc.co.uk/2/hi/asia-pacific/7302319.stm Archived July 30, 2010, at the Wayback Machine
- "Tibet protests spread to other provinces". Yahoo! News. March 16, 2008. Archived from the original on March 18, 2008. Retrieved March 19, 2008.
- Watts, Jonathan; Branigan, Tania (March 18, 2008). "Tension rises as armed police mass in capital". The Guardian. London. Archived from the original on March 18, 2008. Retrieved March 19, 2008.
- "川阿壩警開槍自衛 四暴徒受傷 (Sichuan, Ngawa police fire in self defence; four rioters wounded)". Hong Kong: Da Kung Pao. March 21, 2008. Archived from the original on March 28, 2008. Retrieved March 30, 2008.
- "Beijing deploys army against nuns". Neue Zürcher Zeitung. March 23, 2008. Archived from the original on June 26, 2008. Retrieved March 23, 2008.
- "China blankets Tibetan areas with troops". Yahoo News. 20 March 2008. Archived from the original on 24 March 2008. Retrieved 2008-03-25.
- Tibetan Nuns Jailed, Detained, (12 May 2008), https://www.rfa.org/english/news/tibet/tibet_nuns-05122008160846.html?searchterm=None Archived November 20, 2020, at the Wayback Machine
- "Report: Over 100 surrender, admit involvement in Tibet clashes". CNN. March 19, 2008. Archived from the original on March 18, 2008. Retrieved March 19, 2008.
- "An Appeal to the Chinese People". Archived from the original on April 1, 2008. Retrieved March 29, 2008. An Appeal to the Chinese People
- "Transcript: James Miles interview on Tibet". CNN. March 20, 2008. Archived from the original on April 11, 2008. Retrieved April 9, 2008.
- Bodeen, Christopher (April 1, 2008). "China Alleges Tibet 'Suicide Squads'". Archived from the original on April 12, 2008.
- "China finds firearms in Tibetan temple". The Sydney Morning Herald. April 14, 2008. Archived from the original on October 19, 2017. Retrieved October 18, 2017.
- "China says firearms found in Tibetan temple". Reuters. Reuters. April 14, 2008. Archived from the original on October 19, 2017. Retrieved October 18, 2017.
- "China steps up Tibetan crackdown". BBC News. March 20, 2008. Archived from the original on March 25, 2008. Retrieved March 26, 2008.
- "Tibet media ban damages Beijing's cause". South China Morning Post. March 19, 2008. Archived from the original on December 14, 2018. Retrieved March 19, 2008.
- Yardley, Jim (March 16, 2008). "Tibetans Clash With Chinese Police in Second City". The New York Times. Archived from the original on April 11, 2009. Retrieved March 19, 2008.
- "11th Panchen Lama condemns Lhasa riot". People's Daily. March 16, 2008. Archived from the original on March 21, 2008. Retrieved March 19, 2008.
- "Eyewitness: Monk 'kicked to floor'". BBC News. March 14, 2008. Archived from the original on March 18, 2008. Retrieved March 26, 2008.
- Agence France Presse, "Defiant China rejects dialogue, vows to smash Tibetan protests," March 22, 2008
- "Premier: ample facts prove Dalai's role in Lhasa riot, door of dialogue still open". Government of the People's Republic of China. March 18, 2008. Archived from the original on December 1, 2008. Retrieved March 20, 2008.
- "Premier: Door of dialogue still opens to Dalai". Government of the People's Republic of China. March 18, 2008. Archived from the original on March 22, 2008. Retrieved March 24, 2008.
- "China's central gov't officials meet with Dalai Lama's private representatives". Xinhua News Agency. May 4, 2008. Archived from the original on May 8, 2008. Retrieved May 6, 2008.
- "China's decision to meet Dalai's representative receives positive responses". Xinhua News Agency. April 26, 2008. Archived from the original on May 1, 2008. Retrieved April 26, 2008.
- "China to meet Dalai Lama aides". Sydney Morning Herald. April 26, 2008. Archived from the original on April 29, 2008. Retrieved April 26, 2008.
- "China says door 'wide open' on Dalai Lama talks". Australian Broadcasting Corporation. July 26, 2007. Archived from the original on September 26, 2020. Retrieved May 11, 2009.
- Zacharia, Janine (April 26, 2008). "China's Tibet Talks May Skirt Autonomy Demands of Dalai Lama". Bloomberg L.P. Archived from the original on September 26, 2020. Retrieved April 26, 2008.
- "Tibet, China talks postponed after quake – Dalai aide". Reuters. June 6, 2008. Archived from the original on August 21, 2008. Retrieved June 12, 2008.
- China denies claims hundreds were killed, (17 March 2008), https://www.france24.com/en/20080317-china-denies-claims-hundreds-were-killed-china-tibet Archived February 13, 2011, at the Wayback Machine
- Tania Branigan and Randeep Ramesh, Gunfire on the streets of Lhasa as rallies turn violent, 15 March 2008, The Guardian, https://www.theguardian.com/world/2008/mar/15/tibet.china1 Archived February 20, 2021, at the Wayback Machine
- "Chinese security forces swarm Tibet". Yahoo! News. March 15, 2008. Archived from the original on March 18, 2008. Retrieved March 19, 2008.
- "The victims are all innocent civilians". Independent Online. March 15, 2008. Retrieved March 19, 2008.
- "Ten people killed in Tibet riots". Channel NewsAsia. March 15, 2008. Archived from the original on March 18, 2008. Retrieved March 19, 2008.
- "18 civilians, 1 police officer killed by Lhasa rioters". People's Daily. March 22, 2008. Archived from the original on July 6, 2008. Retrieved March 22, 2008.
- "Tibet governor promises leniency, says death toll is 16 as protests spread". Yahoo! News. March 17, 2008. Archived from the original on March 20, 2008. Retrieved March 19, 2008.
- "China and Dalai Lama face off over Tibet unrest". Reuters. March 18, 2008. Archived from the original on April 3, 2008. Retrieved March 21, 2008.
- "13 civilians burned or stabbed to death in Lhasa riot". Xinhua. March 17, 2008. Archived from the original on March 4, 2016. Retrieved March 26, 2008.
- "China official paper: crush protesters". Free Republic. Associated Press. March 22, 2008. Archived from the original on September 26, 2020. Retrieved October 17, 2017.
- "Arrest warrants issued for 29 suspects in Lhasa riots". Xinhua. March 25, 2008. Archived from the original on April 22, 2008. Retrieved March 26, 2008.
- "Dalai Lama: China causing 'cultural genocide'". CNN. March 17, 2008. Archived from the original on March 16, 2008. Retrieved March 19, 2008.
- http://news.bbc.co.uk/2/hi/uk_news/7330295.stm Archived April 6, 2008, at the Wayback Machine BBC News. Burning debate over relay boycott. April 5, 2008
- Le dalaï-lama, la Chine et Hitler Archived April 22, 2008, at the Wayback Machine, Radio-Canada.ca, Citation: Selon lui, depuis le début des manifestations au Tibet, il y a un mois, au moins 400 people ont été tuées et des milliers d'autres arrêtées. Il déplore que les armes l'emportent maintenant sur la raison.
- Central Tibetan Administration, https://tibet.net/leaked-documents-chinese-security-forces-used-machine-guns-to-kill-tibetans-in-2008-protest/ Archived September 26, 2020, at the Wayback Machine
- Tibetan Review, https://www.tibetanreview.net/internal-report-shows-china-used-lethal-force-during-08-lhasa-repression/ Archived April 20, 2020, at the Wayback Machine
- "China's premier blames Dalai Lama 'clique' for violence in Tibet". CNN. March 18, 2008. Archived from the original on March 19, 2008. Retrieved March 19, 2008.
- "UN calls for restraint in Tibet". BBC News. March 17, 2008. Archived from the original on March 21, 2008. Retrieved March 19, 2008.
- "Ramoche monk dies from starvation as tight restrictions continue in Monasteries". Tibet.net. March 25, 2008. Archived from the original on April 3, 2008. Retrieved March 25, 2008.
- "China tightens monastery blockade, monk dies of starvation (1st Lead)". Monsters and Critics. March 26, 2008. Archived from the original on April 3, 2008. Retrieved March 26, 2008.
- "Monk in Lhasa monastery died of starvation". Thaindian News. March 26, 2008. Archived from the original on April 1, 2008. Retrieved March 26, 2008.
- "For victims of Tibet riots, a complex fate – International Herald Tribune". Iht.com. Archived from the original on May 29, 2008. Retrieved September 1, 2008.
- Jacobs, Andrew (October 23, 2009). "Group Says China Has Executed 4 for Roles in Tibet Riots". The New York Times. Archived from the original on September 27, 2011. Retrieved November 11, 2009.
- Reports of Tibetan nuns arrested, (21 March 2008), https://freetibet.org/news-media/pr/reports-tibetan-nuns-arrested Archived November 21, 2020, at the Wayback Machine
- Tibetan nun disappeared since 2008 died of torture in Chinese police custody, (30 June 2016), https://tchrd.org/tibetan-nun-disappeared-since-2008-died-of-torture-in-chinese-police-custody/ Archived November 8, 2020, at the Wayback Machine
- Nirmala Carvalho, More than a thousand monks and many civilians have disappeared since the March crackdown, 29 September 2009), http://www.asianews.it/index.php?l=en&art=13322&geo=6&size=A Archived November 20, 2020, at the Wayback Machine
- CNN, Tibet protesters missing, Amnesty says Archived January 26, 2012, at the Wayback Machine, June 19, 2008
- China arrests over 2300 Tibetans in Tibet Archived April 8, 2008, at the Wayback Machine
- Andrew Jacobs, Group Says China Has Executed 4 for Roles in Tibet Riots, (23 October 2009), https://www.nytimes.com/2009/10/24/world/asia/24china.html/ Archived September 27, 2011, at the Wayback Machine
- "A Tibetan woman succumbs to torture". Tibetan Center for Human Rights and Democracy. Archived from the original on May 13, 2008. Retrieved May 5, 2008.
- Congressional Executive Commission On China, Annual Report 2009 (October 10, 2009) Archived November 3, 2009, at the Wayback Machine
- (www.dw.com), Deutsche Welle. "China Expels Last Foreign Journalists From Tibet | Germany| News and in-depth reporting from Berlin and beyond | DW | 20.03.2008". DW.COM. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- "HK journalists thrown out of Tibet". The Standard. March 18, 2008. Archived from the original on April 8, 2008. Retrieved March 19, 2008.
- Transcript:James Miles interview on Tibet, (20 March 2008), CNN, http://edition.cnn.com/2008/WORLD/asiapcf/03/20/tibet.miles.interview/ Archived March 3, 2020, at the Wayback Machine
- "China's Forbidden Zones: Shutting the Media Out of Tibet and Other "Sensitive" Stories: V. The Closure of Tibet". www.hrw.org. Archived from the original on July 30, 2019. Retrieved March 26, 2018.
- Yardley, Jim (March 30, 2008). "Nationalism at core of China's angry reaction to Tibetan protests". The New York Times. ISSN 0362-4331. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- Reuters Editorial. "China says storm of bad publicity may hurt Olympic turnout". U.S. Archived from the original on October 13, 2018. Retrieved March 26, 2018.
- "A sporting chance". The Economist. March 27, 2008. Archived from the original on March 26, 2018. Retrieved March 26, 2018.
- Walt, Vivienne (July 16, 2008). "Why Nobody's Boycotting Beijing". Time. ISSN 0040-781X. Archived from the original on March 13, 2018. Retrieved March 26, 2018.
- Cutler, David; Murdoch, Gillian (August 6, 2008). "World leaders to attend Olympics opening in Beijing". Factbox. Reuters. Archived from the original on September 26, 2020. Retrieved July 31, 2010.
- Richards, Jonathan (March 17, 2008). "China blocks YouTube, Yahoo! over Tibet". The Times. London. Archived from the original on May 9, 2008. Retrieved March 19, 2008.
- "Lhasa riot reports show media bias in West". China Daily. March 22, 2008. Archived from the original on March 25, 2008. Retrieved March 23, 2008.
- "China bars foreign journalists, tourists from Tibet". IBN. March 21, 2008. Archived from the original on March 25, 2008. Retrieved March 24, 2008.
- "Earth Times: show/194241,german-tv-channel-admits-film-error-in-tibet-coverage.html". www.earthtimes.org. Archived from the original on August 29, 2012. Retrieved March 26, 2008.
- http://www.spiegel.de/netzwelt/web/0,1518,542545,00.html Archived March 23, 2008, at the Wayback Machine Spiegel Online: Schlachtfeld der tausend Wahrheiten (in German)
- The caption under the Spiegel online picture in question reads "Chinesisches Sicherheitspersonal im Steinhagel. Das Militär reagiert mit Härte". anti-cnn.com translates only the second sentence, to "army responded with cruel act". [sic] In fact, "Härte" has been routinely used in German media and by German police to describe robust measures in the past: Archived April 8, 2008, at the Wayback Machine Archived April 8, 2008, at the Wayback Machine Archived April 8, 2008, at the Wayback Machine.
- Barboza, David (May 16, 2008). "China: CNN Apologizes Over Tibet Comments". The New York Times. Archived from the original on July 23, 2016. Retrieved February 21, 2017.
- Branigan, Tania (March 18, 2008). "State TV switches to non-stop footage of Chinese under attack". The Guardian. London. Archived from the original on March 20, 2008. Retrieved March 19, 2008.
- "Crush "Tibet independence" forces' conspiracy, People's Daily urges". People's Daily Online. March 22, 2008. Archived from the original on March 26, 2008. Retrieved April 2, 2008.
- "Yahoo and MSN helping to root out Tibetan rioters". France24. March 21, 2008. Archived from the original on March 24, 2008. Retrieved March 22, 2008.
- Foreign press taken to Tibet, China says 660 surrendered, AFP, March 26, 2007
- China escorts foreign press to Tibet Archived April 8, 2008, at the Wayback Machine, Deutsche Welle, March 26, 2007
- Hutlzer, Charles (March 26, 2008). "Foreign journalists allowed in Tibet". Yahoo! News. Archived from the original on March 28, 2008. Retrieved March 26, 2008.
- "Mönche stören Journalistenbesuch in Lhasa". Neue Zürcher Zeitung (in German). March 27, 2008. Archived from the original on April 8, 2008. Retrieved March 27, 2008.
- "Tibet Monks Disrupt Tour by Journalists". Associated Press. March 27, 2008. Archived from the original on July 1, 2012. Retrieved March 27, 2008.
- Huang, Jikuan (March 27, 2008). "拉薩大昭寺僧侶要求向世人傳達真象 (Lhasa Jokhang monks request truth be told to the world)". Central News Agency (in Chinese). Taipei. Archived from the original on April 10, 2008. Retrieved March 29, 2008.
- Wu, Ningkang (March 27, 2008). "大昭寺抗議事件 新華社和親中媒體口徑一致 (Jokhang protest incident: Xinhua and pro-China media say the same thing)". Central News Agency (in Chinese). Taipei. Archived from the original on July 20, 2011. Retrieved March 29, 2008.
- "Activists fear for Tibetan monks who protested at media tour". CNN. March 27, 2008. Archived from the original on March 29, 2008. Retrieved March 28, 2008.
- "Police shut Muslim quarter in Lhasa". CNN. March 28, 2008. Archived from the original on April 2, 2008. Retrieved March 28, 2008.
- "温总促达赖停止西藏暴力 (Premier: ample facts prove Dalai's role in Lhasa riot, door of dialogue still open)" (in Chinese). Hong Kong: Wen Wei Po. March 31, 2008. Archived from the original on September 14, 2008. Retrieved March 31, 2008.
- "How three Canadians upstaged Beijing". The Globe and Mail. March 29, 2008. Archived from the original on April 1, 2008. Retrieved April 3, 2008.
- "Beijing has become the guardian of the Chinese brand". The Globe and Mail. April 19, 2008. Retrieved April 20, 2008.
- "Olympic official: athletes mulling Beijing boycott". The Straits Times. March 17, 2008. Archived from the original on March 19, 2008. Retrieved August 6, 2010.
- "China vows to protect its territory, blames Dalai Lama for attacks on embassies". Yahoo! News. March 18, 2008. Retrieved March 19, 2008.[permanent dead link]
- "Dalai Lama against Olympic boycott". ABC News. March 18, 2008. Archived from the original on September 6, 2018. Retrieved October 18, 2017.
- "Olympic Torch Draws Buenos Aires Protests for Boycott". Bloomberg News. April 11, 2008. Archived from the original on September 26, 2020. Retrieved March 4, 2017.
- "Brazilian president will not attend Olympic ceremony: official". turkishpress. April 2, 2008. Archived from the original on April 5, 2008. Retrieved April 2, 2008.
- "Harper says Olympics boycott would be ineffective: report". CTV.ca. April 8, 2008. Archived from the original on April 10, 2008. Retrieved April 8, 2008.
- "Greens call for Olympic boycott". NZCity News. April 11, 2008. Archived from the original on July 16, 2011. Retrieved April 12, 2008.
- Lungescu, Oana (March 28, 2008). "Call for Olympic boycott rejected". BBC News. Archived from the original on March 29, 2008. Retrieved March 29, 2008.
- "Polish government to boycott opening of Olympics". Warsaw Business Journal. Warsaw. March 27, 2008. Archived from the original on April 5, 2008. Retrieved March 27, 2008.
- Berkes, Howard (March 23, 2008). "Tibet Activists Plan Olympic-Relay Protests". NPR. Archived from the original on April 8, 2008. Retrieved March 26, 2008.
- ABC News: Headed for Olympics? Beware of Big Brother: https://abcnews.go.com/Politics/story?id=4492008&page=1 Archived February 25, 2019, at the Wayback Machine
- "Schools in SW China ethnic Tibetan area resume classes after riots" Archived April 10, 2008, at the Wayback Machine, People's Daily Online
- Congressional Executive Commission. 2009 Annual Report Archived November 3, 2009, at the Wayback Machine. Oct 10, 2009.
- Muni, S.D. The Third Tibetan Uprising: India's Response in ISAS Background Briefs, Issue: 61, Mar 24, 2008. Singapore: Institute of South Asian Studies (ISAS).
- Zellen, Barry. Tibetans Rise Up, as Hope Overtakes Fear on China’s Western Front in Strategic Insights, Volume VII, Issue April 2, 2008. Monterey: Center for Contemporary Conflict (CCC).
- Hillman, Ben. Rethinking China's Tibet Policy in The Asia-Pacific Journal: Japan Focus, August 2008.
- 2008 Uprising in Tibet: Chronology and Analysis (CTA)
- Tibetan Centre for Human Rights and Democracy (TCHRD)
- Uprising Archive: photos, videos, and documents of the 2008 Tibetan Uprising
- Eyewitness accounts of the Tibet unrest from foreign travelers, Christian Science Monitor
- BBC News Special report: Tension in Tibet
- BBC News: In pictures: Protests in Tibet
- BBC News: In pictures: Tibet aftermath
- BBC News: Eyewitness accounts: Tibet clashes
- Wikileaks defies Chinese "Great Firewall" with 120 pictures and videos
- "Tibet, the 'great game' and the CIA", Richard Bennett, Asia Times, March 26, 2008
- Crackdown on Tibet
- Dubious politics behind anti-Chinese protests
- After Tibet, protests reported in China's Xinjiang
- Real Reason For Tibet Protests
- The Olympic Torch Relay Campaign
- China's Forbidden Zones (Human Rights Watch) | <urn:uuid:d7a30cab-d73c-4cf9-a980-e6fabfc9c6c8> | CC-MAIN-2022-33 | https://atozwiki.com/2008_unrest_in_Tibet | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.942412 | 16,330 | 3.265625 | 3 |
Are you looking to start a new career in the medical field? If so, phlebotomy should be one of your top choices. At Acadiana Area Career College, we offer a 10-week phlebotomy technician training program. This course teaches students everything they need to know about drawing blood safely and preparing blood for lab testing. The class costs $2,875 with optional payment plans. We also offer a program bundle-take 2 programs back to back and receive a special rate of $4,000 for the bundle.
As part of this 200-hour program, students will benefit from both in-class learning opportunities and hands-on training. The first seven weeks will be in class. Weeks 8-10 will be in a medical facility.
Call 337-896-9776 now to apply for the phlebotomy technician course.
The phlebotomy technician program covers the following topics and trainings: | <urn:uuid:856841a8-e9b3-4642-8c5b-9b71c8864412> | CC-MAIN-2022-33 | https://acadianaareacareercollegela.com/phlebotomy-technician | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00465.warc.gz | en | 0.925289 | 190 | 1.585938 | 2 |
Global Volcanism Program | Image GVP-00788
Gunung Abang forms the 2152-m high point along the eastern wall of Batur's outer caldera. The boundary of an inner caldera, within which Batur volcano (out of view to the left) was constructed, is obscured on its SE side beneath the surface of the caldera lake. Lava flows from Batur volcano extent into the lake at the left.
Copyrighted photo by Katia and Maurice Krafft, 1971.
Copyrighted image used with permission. All Rights Reserved. Contact photographer for any usage requests. | <urn:uuid:120cf367-9fc7-437e-a386-d3f52a20c9b4> | CC-MAIN-2022-33 | https://volcano.si.edu/gallery/ShowImage.cfm?photo=GVP-00788 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.895474 | 128 | 2.5625 | 3 |
Spring Budget 2017: Madano Overview and Analysis
Headline Statements and Announcements
- The Office for Budget Responsibility’s (OBR) growth forecast was upgraded for this year from 1.4% to 2%, but GDP was downgraded to 1.6% for 2018, 1.7% for 2019, 1.9% in 2020, and 2% in 2021.
- Borrowing is forecast to be lower than previously predicted, expected to fall from £58.3 billion in 2017-18 to £16.8 billion in 2021-22; however, public debt is forecast to peak as a proportion of GDP at 88.8 % in 2017-18.
- The Government is continuing with austerity and reducing public sector debt; Mr Hammond stated that he will remain “undistracted” by short term factors or the “reckless policies” suggested by Labour when pursuing this agenda.
Madano Comment: The Budget was light on policy, particularly when compared to previous years. This is likely due to the restructured form for Annual Budgets announced at last year’s Autumn Statement, which will see a Spring Statement and the Budget in the autumn from 2018. The Chancellor was criticised by opposition MPs for making only brief reference to major issues such as Brexit and climate change.
Impact on specific sectors:
Energy and Environment
- In response to calls for tax relief for late-life oil and gas assets, the Chancellor announced that the Government will publish a discussion paper examining permitting tax history transfers between buyers and sellers of oil and gas assets.
- Government remains committed to carbon pricing to help decarbonise the power sector. Further details on carbon prices for the 2020s will be set out at Autumn Budget 2017.
- The Levy Control Framework will be replaced by a new set of controls, to be outlined later this year.
Madano Comment: Environmental groups criticised the Government for promising further support to oil and gas companies while failing to address concerns on climate change, the future energy mix or the Green Investment Bank. The omission of reference to the solar industry when discussing business rate reforms could elicit a negative reaction from the renewables sector.
- The Chancellor announced that the Industrial Strategy Challenge Fund (ISCF) will provide an initial investment of £270 million in 2017-18 for the development of disruptive technologies.
- This will include areas such as batteries and robotics systems to operate in extreme and hazardous environments, including off-shore energy and nuclear power.
- Through the National Productivity Investment Fund (NPIF), £740 million will be invested in digital infrastructure by 2020-21.
- The Government will also invest £200 million to fund a programme of local projects to test methods of accelerating market delivery of full-fibre broadband networks.
- New ‘T Level’ qualifications, supported by maintenance loans, will bring parity of esteem to technical education and include a three month work placement for every technical student.
- The Northern Powerhouse Investment Fund (NPIF) will invest £250 million over the coming four years in high-skilled research talent.
- This will include £90 million for an additional 1,000 PhD places, of which 85% will be in STEM disciplines and 40% will strengthen collaboration between business and academia.
- A further £160 million will support new fellowships for early and mid-career researchers in areas aligned to the Industrial Strategy.
Madano Comment: The Chancellor focussed on skills, but has faced criticism for failing to match ambition with appropriate resources. Labour Party Leader Jeremy Corbyn led calls for far greater funding for skills and ensuring that workers are able to retrain for the jobs of the future.
Regions and Devolution
- The Chancellor announced that a ‘Midlands Engine Strategy’ will be published on Thursday 9th March.
- In addition to City Deals for Edinburgh and Swansea, the Government has begun negotiations for a Stirling City Deal and is looking at proposals for a Tay Cities Deal and North Wales Growth Deal.
- A Memorandum of Understanding on further devolution to London, including a pilot scheme on a new approach to infrastructure funding, has been signed with the Mayor of London.
Madano Comment: The Government’s devolution agenda was firmly grounded in ensuring there is better engagement with business. Despite this, there was no mention of the proposed Swansea Bay Tidal Lagoon amid references to continuing work on the Swansea City Deal. | <urn:uuid:391242fe-ab88-4d82-8b28-ddd454f506d5> | CC-MAIN-2022-33 | https://madanonarrative.azurewebsites.net/2017/02/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.941693 | 912 | 1.507813 | 2 |
“Chimney Tower” is also called “Torch Tower”. It is mainly used to burn oil, petrochemical, refining, refining, natural gas, chemical fertilizer, chemical and other enterprises in the production process, can not be or can not be recycled, and often toxic and harmful, A flammable gas with a certain degree of danger such as flammable or explosive, which is converted into a non-hazardous gas and discharged into the atmosphere.
1. High altitude torch:
The height is generally tens of meters or even more than 100 meters. At present, the highest altitude torch in the country with a height of 180 meters is put into production.
According to the established form: elevated torch (tower type torch), self-supporting torch, pull rope type torch.
2. Ground Torch:
Mainly refers to the closed exhaust gas combustion device that is installed on the ground and around the burner. The high-altitude torch is low in cost but covers a lot of land, and the ground torch is just the opposite.
Chimney tower product technical parameters:
Design wind speed: 30 m / sec
Earthquake resistance: level 8
Wrapped ice: 5-10 mm
Suitable temperature: -45C-+45C
Anticorrosion treatment: hot galvanizing | <urn:uuid:9893859d-3d0c-488a-92bc-6a695a803ecd> | CC-MAIN-2022-33 | http://www.steeltowerchn.com/chimney-tower/chimney-towertorch-tower/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.928384 | 287 | 2.78125 | 3 |
In the roofing industry, a roofing square refers to 100 square feet of roof. When calculating the size of a roof, a contractor will divide the roof’s total square footage by 100 and round up to 16 squares. The square size has a significant impact on the cost of a new roof, because it will determine the materials used and the labor required to complete the project. This article will discuss the differences between square and rectangle measurements, as well as what they mean for you. metal roofing suppliers
Although a roofing square is generally used by the construction industry, homeowners can use them for their own home projects as well. It is important to know how much roofing squares equal a roof’s area, but it is still best left to the professionals, since a square is tricky to measure and can lead to wasted materials and wasteful projects. A square roof is just that, a square – a 100-square foot area.
The term roofing square has no connection to square feet, meters, yards, or miles. Roofing squares refer to the area of 100 square feet. Whether you’re using asphalt shingles or tarp, a roofing square is the equivalent of 100 square feet of roof area. Using a roofing square makes the calculation of materials easier, because you’ll know exactly how much to order per square. This also simplifies the process for hiring a contractor, as it’s not rocket science.
If you’re calculating the cost of a new roof, you’ll want to figure out the square footage. Typically, a 15-by-30-foot roof will require one hundred square feet of roofing felt. When you’re calculating the cost, you’ll want to add on about fifteen percent of the roofing square area to the project. When calculating the total area of a roof, always take into account the waste factor.
There are several steps involved in determining a roofing square. The first step is to measure the roof’s width and length, and then multiply those two numbers together. To convert squares to square feet, multiply the two totals. Once you have this figure, you need to divide the total square footage by 100 to get the amount of squares needed for the project. You can also find online calculators and guides to help calculate your square footage.
In addition to the square, you also need to determine the roof’s pitch. This measurement is more complicated than measuring the surface area of a flat surface, but can yield a much more accurate result. You can use the square to determine the roof pitch, as well as to estimate the width. You’ll also need to know the pitch of your roof in order to get an accurate square footage. This is a step that should be taken carefully as different roofs will have different pitches.
In the construction and roofing industry, the roofing square size is an industry-specific measurement. However, it’s a good idea to seek a professional for assistance when calculating the cost of a new roof. Then, if you’re comfortable measuring your own roof, you can follow these steps before hiring a roofing contractor. The steps for measuring a roof will help ensure the accuracy of the measurements. | <urn:uuid:17e376ee-793f-43f0-b743-0c6d97b34632> | CC-MAIN-2022-33 | https://davisroofingohio.com/what-is-a-square-in-roofing-measurements/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.945001 | 670 | 2.59375 | 3 |
The stability of twisted straight rods is described within the framework of the time dependent Kirchhoff equations for thin elastic filaments. A perturbation method is developed to study the linear stability of this problem and find the dispersion relations. A nonlinear analysis results in a new amplitude equation, describing the deformation of the rod beyond the instability, which takes the form of a pair of nonlinear, second-order evolution equations coupling the local deformation amplitude to the twist density. Various solutions, such as solitary waves, are presented.
ASJC Scopus subject areas
- Physics and Astronomy(all) | <urn:uuid:eeefbd61-3175-4f84-a144-9f1b426d1904> | CC-MAIN-2022-33 | https://experts.arizona.edu/en/publications/new-amplitude-equations-for-thin-elastic-rods | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.880858 | 125 | 1.882813 | 2 |
Orationes Quatuor contra PhillipumVenice, Paulus Manutius, 1551
4to. ff [lii]. Roman letter; title with anchor and dolphin device surrounded by cornucopiae and cherubs, early ms underlinings and and marginalia in at least two hands, contemp. 8 line note praising Paulus’ translation on last leaf. Marginal worming to final ll. without affecting text, a little foxing affecting some edges, occasional light oil splash or minor mark, t-p repaired in gutter. Generally a good, well-margined copy in modern vellum over boards. French embossed library stamp, repeated, to blank outer margin of verso of t-p.
Reprint of the valuable 1549 edition dedicated to Jean Morvilliers of the four Philippics of Demosthenes (384-322 BC), orations made to rally the Athenians against Philip of Macedon who was beginning his conquest of Greece, translated by Paulus Manutius.
The first (351-350BC) centred on the need for resistance, financial reform of the theoric fund in order to adequately prepare for war, acting fast to avoid defeat. The second (344-343BC) was a vehement attack against Philip and his Athenian supporters, delivered in the wake of the unsatisfactory Peace of Philocrates, which saw Philip’s increasing powers for the most part uncombatted. Nonetheless it errs on the side of caution, perhaps indicative of Demosthenes’ own fear of the King, before whom he is said to have fainted. The third (341) is considered to be the best of Demosthenes’ political orations, he contrasts the ancient spirit of Athens with her present degeneracy. Having risen by his oratory to become the most influential politician in Athens, Demosthenes was able to weaken the pro-Macedonian factions within the Athenian political arena, formulating alliances with other small states to increase resistance to Macedon. He demands resolute action against Philip and called for a burst of energy from the Athenian people and the immediate dispatch of forces. The fourth is the subject of some controversy, with Demosthenes’ authorship called into doubt, although the sentiment is similar to the third, the style is different. It has been suggested that the surviving text is descended not from his carefully honed speeches, but from notes for a spot oration, thus explaining its unusual lack of finesse.
Described by Cicero as “the perfect orator” and extolled as “lex orandi” by Quintilian, Demosthenes has long been regarded as one of the great minds of the Classical era, and his works remain a benchmark of eloquence and erudition. This copy has been the subject of careful study.BM STC It. 213. Ren 151:8 and 146:6. "Cette traduction est élégante et estimée: les exemplaires en sont rares ainsi que ceux de la réimpression de 1551." Not in Dibdin, Adams or Brunet. Graesse II 359. | <urn:uuid:d2fcea83-b126-4336-8abe-4965cf6d5a95> | CC-MAIN-2022-33 | https://sokol.co.uk/stock/demosthenes-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00465.warc.gz | en | 0.934292 | 678 | 2.25 | 2 |
BEIJING: India-China relations saw high- level engagements in 2015 and the two sides look to 2016 to step up cooperation in counter-terrorism and efforts to resolve their boundary dispute as they moved towards more interactive and less confrontationist relationship.
This year saw a series of high-level visits from both sides, including Prime Minister Narendra Modi’s trip to Beijing, External Affairs Minister Sushma Swaraj and Home Minister Rajnath Singh’s visits to China and Chinese Vice President Li Yuanchao’s trip to India.
Signing off the most engaging year in recent history, Northern Area Commander Lt Gen D S Hooda travelled to Beijing this month on an invitation from China. Hooda’s visit was significant as his predecessor Gen BS Jaswal was denied a visa on the ground that Northern Command covered the “disputed” Jammu and Kashmir, which sparked angry reactions from India.
Officials say Gen Hooda’s visit restores military ties between the two countries, removing a major irritant.
Modi’s visit like that of Chinese President Xi Jinping’s trip to India last year focussed more on do-ables while stepping engagement to resolve boundary dispute and measures to deal with issue of incursions.
The Prime Minister’s visit resulted in $22 billion in business-to-business pacts, hotline connection between the two military headquarters and opening of more border points for interaction of local commanders, formation of task force for address widening trade deficit which touched $46 billion and granting of E-visas for Chinese tourists.
Consequently Chinese officials say that there is a steady rise of Chinese investments in India which so far reached about $3 billion with a prospects of more on the way into India’s infrastructure projects. China promises to open more for Indian IT and Pharmaceuticals to improve India’s exports.
During Singh’s visit, the two countries for the fist time agreed to step up anti-terrorism cooperation in the region.
China expressed willingness to crackdown on some of the rebel groups in the North East as part of anti-terror drive.
But the two countries had serious differences over China’s increasing engagement with Pakistan and its $46 billion China-Pakistan Economic Corridor. India objected to it as it goes through the Pakistan-occupied Kashmir (PoK).
The corridor connects China’s Muslim-majority Xinjiang with Pakistan’s strategic Gwadar port and provides it access to the Arabian Sea and facilitates speedier imports of oil from the Middle East.
Differences also remain on China’s ambitious Maritime Silk Road as India has concerns over its impact in the Indian Ocean.
China this year opened a new, “safer” and “more convenient” route for Indians undertaking the arduous Kailash- Manasarovar Yatra in addition to the existing Lipulekh Pass.
The opening of the second route through the Himalayan pass of Nathu La in Sikkim, 4,000 metres above sea level, was officially announced during Modi’s visit to China and will allow more Indians to undertake the pilgrimage.
The new route reduced the pilgrimage time from more than 20 days to about eight and enabled pilgrims to travel the 1,500 km-long route from Nathu La to Kailash by buses.
India and China this year held 18th round of talks in New Delhi to resolve the contentious boundary issue. India asserts that the dispute covered about 4,000 km, while China claims that it was confined to about 2,000 km to the area of Arunachal Pradesh, which it refers as Southern Tibet.
The two sides agreed to maintain peace and tranquillity in the border areas which was a “pre-requisite” for continued growth of bilateral relations as also to enhance cooperation in key areas, including counter-terrorism, maritime security and civil nuclear energy sector.
Offering highly concessional loans, Japan this year bagged India’s first bullet train project worth $12 billion connecting Mumbai-Ahmedabad, much to chagrin of China which looks to get other routes like Chennai-Delhi and Mumbai-Delhi.
Indian officials say the routes are open for China if it offered matching concessional loans.
Also, India expressed concern over the current round of tensions between the US and China over an American guided- missile destroyer sailing through artificial islands in the South China Sea (SCS) built by Beijing.
China had raised vociferous protests and warned the US against sending naval vessels and military jet to the area.
China has been wary about India’s ‘Act East’ Policy under which New Delhi sought to expand its relations with the South East Asian countries in Beijing’s backyard, specially India’s fast-developing ties with Vietnam and the Philippines.
Beijing opposes India undertaking oil exploration off Vietnam’s coast, asserting that the area falls within the disputed area of the SCS.
India, however, took up Vietnam’s invitation, stating that it is undertaking only a commercial activity which has no bearing on the dispute.
About the freedom of navigation, China has maintained that there is no threat to commercial shipping and civilian overflights but considers naval vessels and military aircraft travelling through the area as violation of its sovereignty.
China claims almost the whole of the resource-rich SCS. Its claim, however, is strongly contested by the Philippines, Vietnam, Malaysia, Brunei and Taiwan.
China is also apprehensive about increasing India-Japan and India-US engagement. It has expressed apprehensions over India’s move to include Japan in India-US Malabar Naval exercises on regular basis during Japanese Prime Minister Shinzo Abe’s recent visit to India.
Despite such apprehensions shown by China, officials say 2015 will be remembered as year of in-depth Sino-Indian engagements as the dialogue between them to restore relations on all fronts including the military-to-military ties has set the stage for a more interactive and less confrontationist relationship. | <urn:uuid:d8189548-84d8-4fce-bae9-69b0901e7997> | CC-MAIN-2022-33 | http://www.brics-info.org/2015-india-china-sign-off-most-engaging-year-in-ties/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.946724 | 1,250 | 1.828125 | 2 |
Members of the St. Charles High School JROTC presented the quilt blocks for the AIDS Memorial Quilt at the St. Charles High School Gymnasium during an opening ceremony on Monday. The JROTC spread blocks across the gym floor for public viewing this week.
Linda Fenlon, program coordinator at the Charles County Department of Health, told the audience the AIDS quilt is an educational tool to inform about the lives lost to AIDS and the growing problem of HIV. She said there are 34 million people living with HIV and AIDS, which have no cure. “It’s a visual reminder of the AIDS pandemic,” she said.
Several HIV-positive speakers talked about living with HIV and students read letters written by those who created quilt panels in memory of a family member or friend. The AIDS Memorial Quilt is a handmade tapestry containing more than 150 panels in memorial to more than 94,000 individuals lost to AIDS. Each panel is testimony to someone who has lost their lives to AIDS and panels come from every state in the nation and from around the globe.
The quilt is available for public viewing at St. Charles High School Tuesday, April 21 and Wednesday, April 22, from 3 to 8 p.m.
The Charles County Department of Health HIV Program, Charles County Public Schools, St. Charles High School and G.S. Proctor Associates are sponsoring the project. For more information, visit http://www.charlescountyhealth.org/.
Charles County Public Schools provides 26,500 students in grades prekindergarten through 12 with an academically challenging education. Located in Southern Maryland, Charles County Public Schools has 36 schools that offer a technologically advanced, progressive and high quality education that builds character, equips for leadership and prepares students for life, careers and higher education.
The Charles County public school system does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identity, age or disability in its programs, activities or employment practices. For inquiries, please contact Dr. Patricia Vaira, Title IX/ADA/Section 504 Coordinator (students) or Pamela K. Murphy, Title IX/ADA/Section 504 coordinator (employees/ adults), at Charles County Public Schools, Jesse L. Starkey Administration Building, P.O. Box 2770, La Plata, MD 20646; 301-932-6610/301-870-3814. For special accommodations call 301-934-7230 or TDD 1-800-735-2258 two weeks prior to the event. | <urn:uuid:ba425083-ae19-4d1c-b395-7c7b0bc9c03a> | CC-MAIN-2022-33 | https://www2.ccboe.com/pr/st-charles-high-school-displays-aids-quilt/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.936178 | 537 | 2.0625 | 2 |
Outsourcing and managed services are appealing options for many companies at a time when workforces are stretched thin. But don’t be fooled—these terms aren’t interchangeable. Both involve receiving business services from a third party but determining which of the two options is the better fit could make the difference between a thriving company versus just staying afloat.
What is outsourcing?
Although managed services and outsourcing both involve hiring a partner organization, they encompass different levels of work. Outsource firms provide services for narrowly defined business processes. For instance, a company may want to outsource specific tasks such as handling payroll or tier 1 help desk calls to a partner. With outsourcing, business leaders select specific services and business needs that can be handled by an external partner. There are also different types of outsource partners including onshore, offshore, and nearshore partners.
What are the top reasons to use outsourcing?
Outsourcing business processes and tasks can free up employees to focus on more complex or valuable work; it can extend resources, such as sales support, for targeting new or underserved markets; support new product and service rollouts; and provide expertise within a specific industry focus. An outsource partner can also give companies access to digital systems and software services without paying for maintenance fees.
What are managed services?
In comparison to outsourcing, managed services offers a more holistic approach to supporting a company’s business needs. A managed services outsourcing model offers a comprehensive range of services within one or several areas, such as IT or ERP. Instead of supporting a few business processes, a managed services provider provides end-to-end operational support and enhancements for a seamless end-user experience.
For example, Customer Experience as a Service (CXaaS) is a cloud-based customer solution for planning, designing, and executing activities that encompass all parts of the customer experience. CXaaS operations are typically managed by a third-party partner on behalf of a brand. A CXaaS managed services provider offers end-to-end management of CX and employee experience operations and continuous optimization for global talent (e.g., recruiting, onboarding and training), technology, consulting and implementation services.
What are the top reasons to work with a managed services provider?
For companies that are looking to integrate different solutions, service providers, and technology platforms with a unified plan, a managed services provider is the better choice. A good managed services provider will perform an assessment of the current infrastructure and operations to understand the pain points. The partner will determine whether any operations are compromising performance and create a plan for immediate improvements and long-term enhancements, in addition to providing skilled staff to support the company’s business needs. A skilled managed services provider will also proactively share best practices and suggest ways to increase savings and trouble-shoot problems before they arise.
Whether you are looking for an outsource or managed services provider, working with the right partner can propel a business forward faster and more effectively than doing it alone. The key is to define your business needs: do you want to outsource a specific business process or do you need extensive support? Next, find an external organization that always has your back. Look for a partner with in-house specialists in a wide range of technologies and skillsets, an extensive partner ecosystem of their own, various support models, and the flexibility and scalability to meet your enterprise needs.
More outsourcing and managed services outsourcing resources:
We hope you enjoyed this blog post exploring the similarities and differences between managed services and outsourcing. To explore these topics in more detail, here are additional thought leadership resources from our CX and managed services outsourcing experts.
4 reasons why you should use the right CX partner for outsourcing needs: Working with an outsourcing partner provides numerous cost and innovation benefits while improving the customer experience. By leaning on an expert who knows customer management inside and out, companies will be able to offer great customer care experiences with less risk and more reward. In this strategy guide, learn how an end-to-end outsourcing services provider can help you improve customer experience and operational KPIs.
11 ways to grow your business with sales outsourcing: In this strategy guide, learn how outsourcing inside sales can help keep your business agile and innovative.
4 questions to decide if contact center outsourcing is right for you: If done right, outsourcing customer care and outsourcing managed services is an opportunity to gain specialized knowledge and resources, as well as quick access to a flexible workforce and innovation ideas. In this article, we look at four questions your company should ask to determine if contact center outsourcing is right for your brand.
CCW market study on the state of contact center industry, featuring TTEC: The contact industry is in a constant state of evolution. What’s really happening in contact centers, and where is the industry going? Get this market study for exclusive research and insights about the state of the industry when it comes to technology, employee engagement, omnichannel strategy, and artificial intelligence.
Digital Transformation Best Practices: Customer service is not the same as it once was. To keep up with customers’ growing expectations, it’s important for brands to accelerate digital transformation in the contact center. Cloud computing, omnichannel orchestration, and automated technology services are just some ways that the contact center of tomorrow is closer than you think. | <urn:uuid:2a3faa9a-8433-4e91-98a8-bafed780df5b> | CC-MAIN-2022-33 | https://www.ttec.com/blog/outsourcing-vs-managed-services-knowing-difference-will-save-you-time-and-money | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.951333 | 1,090 | 1.78125 | 2 |
A moisture barrier is used when installing floors or walls in areas prone to dampness or excess moisture, such as basements, ceilings, or crawl spaces. There is a reason why you should be concerned about ground moisture in your home. Ground moisture can lead to problems that can be costly to your wallet and your health. Things like mold are born from moisture in the ground. This is probably the most well-known reason why moisture is dangerous, but there are many other factors that play into this too. Discover the reasons why being concerned with ground moisture is important to keeping your home safe and what safeguards you can use to protect your property.
The Effects of Ground Moisture
Problems start to arise when the ground consists of porous materials like wood and soil. The presence of these two elements creates a perfect opportunity for moisture to become trapped in your infrastructure. This can lead to an infestation of fungi, molds, mildews, and pests. Termites and carpenter ants are known to build colonies that cause additional wood damage to infrastructure with excess moisture.
These nuisances can then spread throughout the entire home causing significant damage. Things like black mold not only affect your house, but also the health of those living inside!
Common Causes of Ground Moisture
Common problems can be caused by the following factors:
Incompetent Drainage Systems
A lack of proper drainage has the potential to leave some of the ground in your home constantly retaining moisture.
Heavy Rain and Snow
Excessive rain and/or snow can cause flooding that can moisten the ground in your crawlspace and damage your foundation.
Extended Dry Periods
During long dry periods in the weather, soil shrinks and contracts. This causes the foundation to become uneven and absorb moisture at a much faster rate once it has an opportunity to do so.
Earthquakes can expand existing cracks in the foundation. These cracks can lead to water leakage.
Faulty pipes can leak into the ground, which can transfer the ground moisture to your infrastructure.
Solutions for Ground Moisture
Ventilating your crawlspace can be an intense task to accomplish, but it will be all worth it in the end. There are a few ways you can ventilate your crawlspace.
- Transfer a small supply of heated air from the HVAC system into the crawlspace
- Use an exhaust fan to move air from the crawlspace to the outside
- Install an air intake or dehumidifier system
No matter which one of these methods you choose, you’re going to need to cover the floor with vapor retardant plastic sheeting in order to control ground moisture.
Even in dry climates, sealing a crawlspace can lead to energy savings. If you have a bare crawlspace and want to cut energy use, sealing your crawlspace is a great way to achieve this.
The most common vapor barrier material is polyethylene sheeting. The most popular crawl space vapor barrier is the reinforced polyethylene plastic sheeting, due to its durability and extended service life, and best value.
A waterproofing system isn’t complete without proper drainage. From the ground surface to the foundation, drainage is essential to a dry crawl space and the overall performance of your waterproofing system.
At the ground surface level, you want to collect water from the roof in gutters and send it at least 10 feet away from the foundation wall and compact fill soils before placing footings or slabs on them. It’s also important to compact backfill next to footings and foundation walls.
Another approach to waterproofing is installing a sub-grade drainage system with a 6 mil plastic sheet, perforated drain pipe, and clean well-graded gravel. In addition installing drain boards like Delta Drain and Enka Drain create air space next to the concrete foundation to allow the water or condensation to trickle down to the foundation drains, and reduce intermittent hydrostatic pressure.
Trusted by Growers, Builders, and Distributors
Americover is the smart source for plastic and polyethylene sheeting. Trusted by contractors and distributors across construction and agriculture industries, our American-made products combine reliability with quality and innovation.
As an Americover customer, you will receive the personalized support of a dedicated account manager to simplify the ordering process and ensure the best solution for every one of your projects. Our friendly, knowledgeable staff is here to answer your questions and fulfill orders Monday-Friday from 6 a.m. to 6:30 p.m. Pacific Standard Time. If you would like to speak with a representative, call us at 760-388-6294 or email us at email@example.com. | <urn:uuid:ce3d5a57-651f-4f74-bc7d-e6cdaab3e4b7> | CC-MAIN-2022-33 | https://www.americover.com/blog/why-you-should-be-concerned-about-ground-moisture/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.922785 | 986 | 2.765625 | 3 |
Inspiring elementary students in STEAM+ EDUCATION.
SpaceKids National Essay Competition
We are excited to announce the winners of the 2022 National Essay Competition today on National Space Day, May 6, 2022. The competition opened on February 15, 2022 and was open to United States students ages 8– 12, enrolled in public, private, parochial or home schools. We received essays from 22 states and 46 cities across the country, and the winners are Milan of Los Angeles, CA, and Brian of Hamburg, NY. Their complete essay submission is available on their links below.
Each SpaceKidet wrote an essay about “Why I Want to Go to Space'' and all essays were reviewed by a minimum of four judges from top space industry organizations. Half of the submissions were from girls, a promising result as women today only make up 27% of all STEAM+ workers nationwide.
The two recipients will each receive a flight on the Zero-G Experience® ($8,200+ value), which takes place on a Boeing 727 airplane specifically designed for the zero-gravity adventure. Follow us on social media for up to date details on their flight.
At SpaceKids Global, we are incredibly thankful for the investment from Zero-Gravity which made this competition possible, and for the time and expertise of our esteemed panel of judges.
Meet the Winners
*ZERO-G family members are not eligible to participate.
Send a Postcard to Space
Write or draw your ideas on a postcard about why humans need to go to space for the benefit of Earth—or any other message you'd like to send to space. Your postcard will be placed in a payload box and loaded into the crew capsule of a Blue Origin New Shepard rocket launched from the West Texas desert. The capsule carrying the postcards separates from the booster in space and returns to Earth under parachutes. Your postcard will then be returned to you stamped "Flown to Space." Send as many postcards as you like—we'll fly them all. All kids are welcome from 1 to 106, join the fun!
Click on postcard to download printable template.
On the blank side Write or draw your ideas on a postcard about why we need to go to space for the benefit of Earth—or any other message you'd like to send to space.
On the other side write your name and return address and add a stamp.
Place the postcard in a stamped envelope addressed to:
Club for the Future
PO Box 5759
Kent, Washington 98064 USA
Be a SpaceKid
Be a SpaceKid is a multidisciplinary education program, aimed at inspiring elementary school students to pursue careers in the fields of STEAM+ Environment.
SpaceKids Global Founder and CEO Sharon Hagle shares her journey to space in a 30-minute multimedia presentation and engages students through interactive stories, videos and activities.
In 2022, SpaceKids Global is partnering with a global satellite manufacturer and will be announcing a “Name the Satellite” contest in Q3.
To date, SpaceKids Global has reached over 96,500 kids.
How You can be a SpaceKid
3.5 million STEM jobs by 2025
"Why I Want to go to Space"
If you can see it, you can be it"
Making Space for Girls
Making Space for Girls (MS4G) was launched in 2019 as a partnership between two nonprofits when Sharon Hagle, Founder & CEO of SpaceKids Global and Maryann Barry, CEO of Girl Scouts Citrus Council, merged their passions for inspiring girls in STEAM+ education through their shared interest in space exploration. The goals of the educational outreach activities seek to encourage all girls to consider space industry careers, to understand the fundamentals of a science experiment, and to compare and learn from the results of the control group on earth to the experimental group in space. All girls are welcomed.
Making Space for Girls will host annual challenge competitions and programs to continue to inspire girls in grades K - 12 from across the country to engage in space exploration and technology opportunities.
The inaugural 2020 Mission Challenge to the International Space Station national science competition invited Girl Scouts from around the country to participate. The science experiments were included in a Faraday box aboard SpaceX headed for the International Space Station. Art designs and essays were included in a media package on the same mission that launched on August 29, 2021. A total of 680 girls from 95 councils, 46 states, two territories and two countries registered for this exciting opportunity. The 24 winners from 12 cities include science experiments, art designs and essays for each program level. https://gsinspace.allthingsgirlscouts.com/
What Kids Want to Know
What Kids Want to Know is a video Q/A series produced by SpaceKids Global (SKG). In these three to five minute video episodes, SKG Founder and CEO Sharon Hagle interviews high profile experts, educators and celebrities in the space industry. Kids from around the globe can submit a video of them asking the question through SKG’s social media platforms.
The questions that are selected are answered by the special guest, and the series is available on the SKG YouTube site.
The pilot episode features former NASA Chief Astronaut Commander Peggy Whitson, answering a series of questions about her career and space. Upcoming episodes will feature guests from a variety of space careers including astronauts, executives, engineers, chefs, flight suit designers, medical professionals, architects and more.
What Kids Want to Know believes in the idea that “if you can see it, you can be it.” The more opportunities young children have to interact with professionals in STEAM+ Environment careers, the greater chance they have of pursuing those careers. | <urn:uuid:8b63609c-9b51-4fb1-8c4d-a8ffdcb5c984> | CC-MAIN-2022-33 | https://www.spacekids.global/programs | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.937196 | 1,199 | 2.15625 | 2 |
Colorado is one of 45 states that have adopted the Common Core State Standards (CCSS) for Math and English/Language Arts beginning with the 2013-14 schools year. The Colorado Academic Standards (CAS) in math, reading, writing and communicating incorporate the entire Common Core while addressing components that are unique to Colorado, including personal finance, literacy, 21st Century skills, prepared graduate competency and preschool expectations. The CAS are aligned with college and work expectations and include rigorous content and skills.
The Common Core State Standards provide a consistent, clear understanding of what students are expected to learn, so teachers and parents know what they need to do to help them. The standards are designed to be robust and relevant to the real world, reflecting the knowledge and skills that our young people need for success in college and careers. With American students fully prepared for the future, our communities will be best positioned to compete successfully in the global economy.
No. The CCSS were not developed by the federal government. Parents, teachers, school administrators and experts from across the country together with state leaders, through their membership in the Council of Chief State School Officers (CCSSO) and the National Governors Association Center for Best Practices (NGA Center) are leading the effort to develop a common core of state standards. Teachers have been a critical voice in the development of the standards. The National Education Association (NEA), American Federation of Teachers (AFT), National Council of Teachers of Mathematics (NCTM), and National Council of Teachers of English (NCTE), among other organizations have been instrumental in bringing together teachers to provide specific, constructive feedback on the standards.
All of the Common Core State Standards are in the Colorado Academic Standards. The Common Core State Standards are the foundation for the Colorado Academic Standards in English Language Arts and Mathematics. Colorado has the option to include up to 15 percent more content standards in English Language Arts and Mathematics. The Common Core State Standards represent at least 85 percent of the Colorado Academic Standards in English Language Arts and Mathematics.
Source: Colorado Adopts Common Core
There are a number of reasons, but first and foremost, districts, schools, parents and community members now will be able to judge how students are doing in meeting world class standards in academics. Having one set of common standards will make it easier for states to evaluate student progress (between those that choose to adopt) through higher quality tests. The goal is not to have more tests, but to have smarter and better tests that help students, parents, and teachers. The common core state standards will enable participating states to work together to:
English-language arts and math were the first subjects chosen for the common core state standards because these two subjects areas establish the foundation upon which students build their skill sets in other subject areas. They are also the subjects most frequently assessed for accountability purposes.
The standards have been developed with the following criteria:
There are four strands in the English-Language Arts subject area:
Math changes and benefits
Studies of mathematics education in high-performing countries have pointed to the conclusion that the mathematics curriculum in the United States must become substantially more focused and coherent in order to improve mathematics achievement in this country. To deliver on the promise of common standards, the standards must address the problem of a curriculum that is “a mile wide and an inch deep.” These standards are a substantial answer to that challenge. Here is an example of changes from the old Colorado Model Content Standards to the new Colorado Academic Standards.
What the standards do NOT define:
Beginning in 2015, Colorado’s state assessment, TCAP, will be replaced by the national PARCC assessment, which was developed by the Partnership for Assessment of Readiness for College and Careers, a partnership of 23 states, including Colorado.
Because the new CAS and the new PARCC test will be different from the old Colorado Model Content Standards and currently used TCAP tests, we won’t be able to directly compare the new scores with the old, and it may appear at first that scores have dropped. This is a brand-new system, however, with a new way of scoring. The first year results will establish a baseline from which to compare subsequent years going forward to show how students are doing on the new assessments. | <urn:uuid:9daa25a8-da9a-4063-89cd-8e664363cecd> | CC-MAIN-2022-33 | https://brown.dpsk12.org/academics/core-subject-curriculum/common-core-standards/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.951287 | 867 | 3.328125 | 3 |
The customer experience shouldn’t happen by accident. It should be planned and thought out well in advance of the success you hope to have with your customers.
I recently had a conversation with someone who helped focus my long term strategic plans. We talked about the success I had in the past and what I hoped would be continued success in the future. I am very goal-oriented and shared my goals for the upcoming quarter, for the year, and even for ten years. These included the number of speaking engagements I wanted to do, the number of training dates our trainers would book, the growth in our online university and more. While she seemed impressed, she asked me how I planned to make those goals a reality. I told her what had been successful in the past, and how it should continue to take me into the future.
Her response took me by surprise. She informed me that I had been successful by accident. While I had my goals, the detail about how I planned to achieve these goals was minimal.
That made me think about how many organizations go about delivering great customer service. In effect, they do it by accident. They hire good people and hope they will deliver based on their past experience. Some companies take it a step further and have some training. Still they are just hoping to achieve what the customer would consider to be a great customer service experience.
Customer service doesn’t happen by accident. It starts with hiring the right people and training them, but that still may not be enough. The best companies don’t take a chance. They actually design the experience. So here are a few steps in the process to help you move from accidental to purposeful amazing customer service.
- Already mentioned is hiring and training. By the way, training should be ongoing – not a one-time thing. Training isn’t something you did. It’s something you do. It doesn’t always have to be a big training session. If you have a weekly meeting, take several minutes to highlight customer service and share a tip.
- Create the customer journey map. This is plotting out all of the touch-points that the customer has with your organization. This shows the obvious places where the customer can form an impression, and where the opportunities are to make that impression a Moment of Magic®.
- When you are looking at the journey map, determine what goes on behind the scenes that drives the experience at any particular touch-point. For example, a server at a restaurant may take the customer’s order and five minutes later come back with the food. There is a lot that happens behind the scenes to ensure that food comes out in a timely manner and is prepared the way it is meant to be. What are the friction points that could hurt the front line touch-point? How can they be mitigated or even eliminated? What can you do to enhance or make the frontline touch-point better?
- Train people on how to deal with mistakes and complaints. It’s not a matter of if you will ever have one of these Moments of Misery™, it’s when. The best companies make mistakes and have complaints, but they have trained their people and have a system that turns that Moment of Misery™ into a Moment of Magic®.
Don’t rely on chance or luck to make you successful. Be purposeful. Plan with detail. A long term successful customer service initiative doesn’t happen by accident.
This article was syndicated from Business 2 Community: A Purposeful Customer Experience Shouldn’t Happen By Accident
More Sales & Marketing articles from Business 2 Community: | <urn:uuid:2d2734ae-077a-46f5-9133-91f12d986543> | CC-MAIN-2022-33 | https://www.verizon.com/business/small-business-essentials/resources/customer-success-the-customer-experience-shouldnt/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.972246 | 754 | 1.570313 | 2 |
Can you put chicken directly on a baking sheet?
Place the chicken in a single layer on the baking sheet and drizzle with the olive oil. Rub the oil all over each chicken breast. Season the chicken with the dry rub on both sides. Bake for 20 to 26 minutes or until the internal the internal temperature reached 165 degrees Fahrenheit.
How long do sheet pan meals take to cook?
As a general rule, fish filets will cook in 5 to 15 minutes on a sheet pan, depending on oven temperature, while whole fish can take anywhere from 10 minutes to 45 minutes.
Choosing a Protein.
|Cut of chicken, skin-on||Approximate cooking time at 400 degrees|
|Whole chicken breast, bone-in||30 – 40 minutes|
Can you cook chicken breast on a baking tray?
You can easily bake dark chicken meat, like leg and thighs straight on the tray, or on top of a bed of vegetables. It will come out tender with a crispy outer skin. If you want to cook lean meat, like chicken breast or pork tenderloin, it will cook quicker so you’ll want to ensure that it doesn’t dry out.
Is it better to bake chicken covered or uncovered?
You never have to worry about covering chicken while baking, as it’s fine to bake it uncovered, and once your chicken is in the oven, it’s hands-free until you need to check the temperature. So you can whip up a no-cook appetizer, side dish, or dessert if you’re feeling ambitious.
Do you need baking sheet for chicken?
The secret is cooking the chicken in parchment paper.
Parchment paper protects the breasts, allowing them to baste in their own juices. To get started, pat the chicken dry, season it and transfer it to a casserole pan or baking sheet.
How do you keep a sheet of chicken from drying out in the pan?
To start, brine your chicken in a mixture of water and a few tablespoons of salt for about 20 to 30 minutes. This will boost the natural flavor and moisture of the chicken breasts and will leave you with a super tender piece of meat. This is the one step that will really ensure your chicken won’t be dry or tough.
Do you Line sheet pan?
Not only are they delicious, but they’re versatile for meal prep, quick dinners and fridge cleanouts. And while they’re easy enough to make, there’s a foolproof way to ensure your roasted vegetables come out of the oven crispy and caramelized every single time: Don’t line your sheet pan.
What temperature do you cook sheet pans?
Toss the sweet potatoes with oil, salt, and pepper, then roast at 400 degrees F for 10 minutes. This gives them a head start. While the sweet potatoes bake, toss the chicken and remaining vegetables with oil, lemon zest and juice, and seasonings.
What is the difference between a sheet pan and a cookie sheet?
Although cookie sheets are often referred to as “baking sheets,” there is a difference. Baking pans have rolled edges, and cookie sheets do not. … But their lack of edges limits their uses: Roasting, for example, is impossible on a cookie sheet, because juices will run off the pan.
What kind of pan do you bake chicken in?
You’ll need a pan in which to roast the chicken. A roasting pan with a rack is nice, particularly one with upright handles, which is easy to move around in the oven. But a rimmed sheet pan or oven-proof skillet (like cast-iron) works just as well.
Is it better to Bake chicken at 350 or 400?
There are two options for baking chicken: Baking at 350°F: This is the traditional method whereby a 4-oz boneless, skinless chicken breast is roasted at 350°F (177˚C) for 20-30 minutes, according to the USDA. Baking at 400°F: Baking for less time at a higher temperature is a great way to get juicier chicken!
Is it better to bake chicken in glass or metal?
Because metal heats up faster than glass, it contributes to a better rise and crisper, browner edges. But whatever you’re baking, it’s important to remember that not every metal pan is a great metal pan. … “[Metal] is the most nonstick, which is hard not to love, and does the best job of conducting heat.”
Do you have to use aluminum foil when baking chicken?
Preheat the oven: For boneless chicken breasts, we recommend baking them in foil at 400°F for 25–30 minutes, depending on the size of your chicken and packet. … You’ll do the same for each piece of chicken. Be sure to lightly spray or oil your foil to prevent sticking. You can also use non-stick foil.
When you bake chicken do you cover it with foil?
The concept to making juicy, perfect chicken breasts in your oven every single time is with a high temperature, little baking temperature, covering the chicken breasts in foil, and then allowing them to rest for 5-10 minutes. That’s it. | <urn:uuid:862547ec-8414-4274-8f1d-78f61e55979e> | CC-MAIN-2022-33 | https://solefoodkitchen.com/frying/best-answer-how-do-you-use-a-chicken-baking-sheet.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.904952 | 1,110 | 1.523438 | 2 |
Video Intelligence Forum Explores how AI will Supercharge Surveillance2018 October 30
The 3rd annual Huawei Video Intelligence Forum recently took place in Trinity College Dublin in collaboration with the ADAPT Centre. The forum, titled ‘Impact of AI on Computer Vision Surveillance and Camera Technology’, focused on how artificial intelligence (AI) is evolving to enable surveillance cameras analyse live video with no human input necessary.
The event highlighted how digital surveillance has both positive and negative connotations: it can help police and first responders react quicker resulting in better public safety; but it also raises serious questions about privacy and poses new risks to social justice.
Computer vision is a combination of several technologies combined to form a new tool that can process and analyse images, and then automate using machine learning techniques, what human visual analysis can perform. With each image that is processed, the algorithms that underpin the computer vision platforms refine the technique and improve, leading to better results with the more content it has.
The forum presented a unique mix of experts at the interface of video and computer vision who discussed how technology and responsible innovation can augment human analysts. Through panel discussions and keynotes, the event explored how computer vision has the potential to reshape a range of industries. The talks featured the ADAPT Centre’s Professor Rozenn Dahyot looked at people search, sensing and understanding the world with AI, and Professor Luc Van Gool of ETH Zurich, a world-renowned leader in AI and Machine Learning, who discussed the impact it has on society.
The annual event aims to position Ireland internationally as one of the best countries for video, media, and surveillance research by featuring leading academics and innovative start-ups working in the space. In 2016 Huawei announced the opening of their video research lab in Dublin, a decision that was based on the surrounding environment and the world-class talent.
Posted by: Catherine O'Connor, Head of External Relations, School of Computer Science and Statistics, Trinity College Dublin
catherine.oconnor at tcd.ie | <urn:uuid:dc8ff242-706e-4778-aaa4-b6fc47c6f672> | CC-MAIN-2022-33 | https://www.scss.tcd.ie/news/item.php?id=167 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.915209 | 413 | 2.21875 | 2 |
Get Your Drains Clean With Hydro-jetting
Hydro-jetting is the procedure of utilizing a high pressure stream of water through the sewer line to unclog the blockage. If this procedure wasn’t available, you could face some costly repair bills. This process makes use of multiple sprays of water that clean the drains with the force of the water. During the process, one spray of water clears the path and allows the pipe to move down the path while the other sprays shoot backward. The back sprays loosen all the debris and soil which is stuck inside and blocking the pathway and carries it down the path along with the water, leaving it clean, so the flow is faster. This process is extremely efficient and can be a great help especially when blockages are a common problem.
Hydro-jetting or Snaking?
Two popular options for drain cleaning are hydro-jetting and snaking. The force of the sprays used in hydro-jetting is greater than that used in snaking. It helps to get rid of the tougher material that may be stuck inside, and it may also clean the drain better in some cases. For those who want to clean drains that are smaller or more fragile, snaking is a better option since it will not damage any delicate attachments. The best solution would be to call a professional plumber and ask them which would be the better option for your particular case.
Uses of Hydro-jetting
Hydro-jetting is often used by restaurant owners and in industries where they need to get their drains cleaned from grease and oil that gets collected. However, this process has also become increasingly popular with homeowners since it helps to get rid of anything that may be stuck. Some of the common things that block drains and can be removed by hydro-jetting include: • tree roots • grease and oil • debris which has collected • build-up of toilet paper • other materials that have been flushed down instead of being discarded in the trash • chemicals disposed of by industries and homeowners.
Hydro-jetting is completely environment-safe, and it can be used in large establishments as well as small homes. It is very useful in old houses as well as in new establishments. This process can be used as often as necessary and it will help your drains to work better and keep your drainage system clean and well-maintained.
If you are planning on getting your drains cleaned, the best option is to call a professional plumber. Processes like hydro-jetting can completely ruin your system if not done by someone who has experience and knows how to do it properly. Calling a professional plumber will also help you get the best advice on how to maintain your drainage system to prevent clogs in the future. | <urn:uuid:d7911ad7-490e-4b79-89cf-32d6a449c155> | CC-MAIN-2022-33 | https://abetterchoiceseptic.com/tag/hydrojetting/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.969293 | 566 | 1.695313 | 2 |
Your image of weeds may be the dandelions growing in a lawn, the clover nudging your vegetables aside, or poison oak displaying its fall colors. Weeds can be any plant type – tree, shrub, vine, grass, perennial, or annual plants. Marin has some BIG weed plants – blue eucalyptus and black acacia, Scotch broom and bamboo, and pampas grass, or along with some rather pretty but unwelcome plants like wild onion and blue periwinkle. For some, these may be desirable plants, while for many, they are considered weeds, and even worse, invasive plants. Learn more about what invasive plants are and why they’re a problem. And some ways to prevent them from getting into your yard. | <urn:uuid:cf963359-4925-4b42-b8e8-9fea65c4c7ec> | CC-MAIN-2022-33 | https://www.yardsmartmarin.org/blog/dont-plant-a-pest-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.925032 | 155 | 2.5 | 2 |
ESP compounds have different sizes and can be assembled in a variety of combinations. These combinations must be carefully determined to operate the ESP with production requirement, downhole conditions, material strength and temperature limits, etc. to select the optimum size of compounds.
To determine the required number of stages of the pump to produce the anticipated capacity; just divide the Total Dynamic Head (TDH) by the Head developed by Stage.
The Head developed per stage is deducted from the published performance curve which shows the discharge head developed by the pump. It is an experimental curve given by the manufacturer and obtained with fresh water at 60 F under controlled conditions detailed in API R11 S2. Refer to the articles “Pump Performance Curves – part 01” and “Pump Performance Curves – part 02” for more details.
Once calculated, divide the TDH by the Head developed per stage to get the Total Number of Stages required to produce the anticipated capacity.
In order to select the most suitable pump, Refer to the pump selection data table in the manufacturer’s catalog for pump type, range and pump performance curve. Based on expected fluid production rate and casing size, select the pump type which will be operating within the recommended operating range and nearest to the pump’s peak efficiency.
When two or more pump types have similar efficiencies at the desired production rate, the following recommendations should be considered to select the most adaptable pump to the well conditions:
The shape of the pump performance curve:
The ability of a pump to adapt to changes in well performance depends on the characteristic shape of the pump performance curve. A pump with a steep characteristic (i.e. large change in head with respect to flow rate) is less suited to a well with poorly defined inflow performance (IPR), especially if it is intended to produce with a fixed drawdown. For such pumps, a small loss in IPR translates to a large fall in pump intake pressure and may result in gas locking. Conversely, the head produced by a pump with a flatter characteristic will change less for a given change of flow rate and can therefore be used over a wider variety of IPR’s with limited changes in intake pressure.
The presence of free gas in the tubing above the pump changes the fluid density, consequently reduces the required discharge pressure. Also the performance of centrifugal pumps is considerably affected by the presence of free gas in the pumped fluid. The pump starts producing lower than normal head as the produced GLR (Gas to Liquid Ratio) at the pumping conditions increases beyond a critical value. The critical value of the ratio or percentage of free gas present at the pump intake to the total volume of fluid depends on the pump impeller design (typical critical values are shown in the article “ESP: Gas handling device “). Therefore, it is essential to determine the percentage of free gas by volume at the pumping conditions in order select the proper pump and gas handling device (if required).
Percentage of free gas by volume:
Assuming that Solution GOR (Rs), Gas Volume Factor (Bg) and Oil Formation Volume Factor (Bo) are known, the total volume of fluids and the percentage of free gas released at the pump intake should be calculated. | <urn:uuid:0618c76e-4c1c-4f94-97b0-c98341366630> | CC-MAIN-2022-33 | https://production-technology.org/tag/free-gas/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.93066 | 670 | 2.453125 | 2 |
SBA Loan Scams
SBA Loan Scams: How They Work
The Small Business Administration (SBA) has been extremely busy during the pandemic, but so did the criminals. Beware of many SBA loan scams occurring this time of the year. There are many, and they are dangerous.
To protect yourself from these financial scams, it is necessary to get acquainted with how they work. Let’s take a look and educate ourselves.
Typical SBA loan scams come as emails claiming to be from the US Small Business Administration to take personal information from them. Hopefully, you are not one of the recipients.
In these messages, you can find a link leading to a web page that is not a real SBA website. Crooks use this bogus page to gather victims’ credentials, impersonating federal, state, and local government officials. The email looks like it is coming from an official Small Business Administration account. You can notice the subject line “SBA Application — Review and Proceed.”
Of course, the call-to-action for these SBA loan scams could be different, but you get the idea. Let’s look at more information. For example, what happens if you open the bogus SBA application.
Fake SBA Economic Injury Disaster Loan Portal
Those who regularly read cybersecurity news and follow the fraud reports made by the SBA inspector general would know that these messages are perpetrating fraud. Still, those less tech-savvy will click on a link in the email.
Once they do that, they log into the “SBA Economic Injury Disaster Loan Portal” using their email address and password. Indeed, this provides criminals the information they need to use for further fraudulent acts.
The suspicious web address is “leanproconsulting.com.br,” which is the website of a Brazilian business called LeanPro Consulting. However, it could be any other domain name, so beware. SBA loan scams change their websites as soon as one is reported as fraud.
What people can expect from these scammers is malware disguised as SBA documents, which you can find in the email. Do not open this email. If you have already opened it, it’s not too late. Do not click on the link.
There were also many instances when criminals included a form asking their victims to provide banking information and personal details.
Small Business Administration Scams: How To Avoid
The main target of these Small Business Administration scams is business owners. They occasionally apply for a loan through the SBA’s Paycheck Protection Program (PPP) or Economic Injury Disaster Loans (EIDL) program.
Hundreds of billions of dollars are in question, which is very attractive to scammers. They focus on finding ways to trick these people concerned about the loan. They easily trick them into willingly giving them business information, bank account numbers, SSN (see here a bunch of Social Security scams), thus taking their money.
Here is how to get money from the Small Business Administration and avoid SBA loan scams.
How To Get an SBA Disaster Loan
If you apply for a small business loan (SBA disaster loan), here are things that you should and should not do.
First, you should get information about SBA loans directly from the SBA’s website, sba.gov/coronavirus. When you visit this page, you should go to the “Funding Options” button and do what is required by following the exact instructions.
If you are still unsure about it, you can look for more information about the PPP and EIDL programs at the U.S. Treasury Department’s website.
On the other hand, never pay for information as the SBA does not charge fees for information at their official website sba.gov/coronavirus.
Also, nobody will ask you to pay for a government loan, and nobody will call you, send emails or texts to you to find out sensitive information related to the applicant or his/her business.
Getting an email or text that asks you these things, you can be sure that it is a scam and the best thing you can do is to delete it.
The critical step to take before getting a loan is to verify the lender. You will get a loan only from SBA-authorized lenders, and they can be found by using the Small Business Administration tool.
The last advice is related to every scam you may get, not only to SBA loan Scams. You should not click on links that you get in emails or text messages from a person you do not know.
By clicking on the links, malware is downloaded to your computer, enabling a scammer or hacker to use it as his/her tool for getting data or money.
SBA Loan Scams: How to Protect Yourself
The SBA’s Office of Inspector General wanted to warn people about fraud, so the announcement is related to the following:
- Having in mind that the SBA will not contact people if someone keeps getting you claiming to be from the SBA, you need to know that it is a criminal act.
- Also, the approval of an SBA loan does not require payments.
- It would be best to get acquainted with possible charges that you may be asked to pay by the SBA. Those are 3% for loans $50,000 or less and 2% for loans $50,000 to $1,000,000.
- There is also an additional ¼% on amounts over $1,000,000. If you are asked to pay more, you are dealing with Small Business Administration scams.
- There were cases of cyberattacks with the usage of the SBA logo. This does not guarantee that the email comes from the SBA, so be aware of this and never provide your personal information.
People who are already applying for an SBA loan and a suspicious email are sent to them, in which they are asked for PII, they must compare the referenced application number with the actual application number, which must match.
The real SBA email accounts end with sba.gov.
SBA Loan Applications: How To Report a Scammer
There are numbers and links which people find useful when they want to fight against these cybercriminals. Feel free to report the fake SBA loan applications.
For all the questions related to getting an SBA disaster loan, people can call 800-659-2955 or send an email to firstname.lastname@example.org.
In case you have any questions about other SBA lending products, you can call SBA’s Answer Desk at 800-827-5722. Alternatively, you could send an email to email@example.com.
You can also take a look at the list of emerging SBA scams HERE.
The SBA OIG hotline at (800) 767-0385 allows you to report if you think you are a victim of SBA loan scams.
People who believe that they are not victims but have experienced an attempted fraud involving SBA loans and COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud Hotline 866-720-5721 or via the NCDF Web Complaint Form.
Warn your friends and family about these SBA loan scams by sharing this article on social media. You could also officially report criminals or any other suspicious activity to the FTC (Federal Trade Commission) using the link below:
How To Protect Yourself More
If you want to find out the most notorious scams weekly, make sure to subscribe here to the Scam Detector newsletter. You’ll receive periodic emails – no spam at all.
Meanwhile, educate yourself with some other fraud-related materials under this paragraph. Finally, use the Comments section below to expose other SBA loan applications scammers:
- How to stop scam calls
- How to report phone scams
- Loan Text Scam
- How to block Scam Likely calls
- How to report scam emails
- How to report a scam website
Verify a website below
Are you just about to make a purchase online? See if the website is legit with our validator: | <urn:uuid:514a615e-6468-4e19-ad30-e42b384280df> | CC-MAIN-2022-33 | http://www.travelbydarts.com/sba-loan-scams/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.948163 | 1,718 | 1.8125 | 2 |
Every student goes through a hectic schedule for an entire day. Most of the time, students do not get the time for themselves. It brings about adverse changes in their behaviour and also affects their performance in academics. As a student, you might be facing similar challenges. Managing online classes for the school in addition to private tuitions, completing your homework on time and preparing for class tests all in just 24 hours. All this can become overwhelming for a student. Sometimes, you might also feel the need to take a break. But, cannot because of the constant pressure of studies. As we ascend to higher levels the pressure builds up consequently. If a student is unprepared for this pressure it may turn out to be difficult for him.
Important Tips to Prepare a Timetable
So what can a student do to manage every single activity? Whether it is academics or taking time off for himself. He can prepare a timetable. Making a timetable that suits the goal of students can be one of the best ways to manage time. Nothing can stop a student from excelling in his studies if he can manage to construct an efficient schedule for himself. The following paragraphs will guide you through building a timetable according to your goals.
1. Understand your Present Schedule
The first and foremost thing that a student should do is understand his present schedule. If he is aware of the fact that his schedule is hectic and needs to be managed only then he can make a time management plan for himself. He should be familiar with his contact hours. Contact hours are hours scheduled for instruction. The time that a student spends interacting with teachers and tutors, should also be taken into account before making a timetable. A student should also be acquainted with the amount of time that he spends doing other activities apart. Thus, understanding the schedule will make one focus on their requirements. It will motivate the student to make a proper schedule for himself.
2. Plan Your Goals
A student must plan his goals before he embarks on a journey of making a timetable. If he doesn’t, he may find himself engulfed in the vicious cycle of just remaking a timetable and not being able to follow it. As a student, you will be aware of your academic goals.
MCQ Questions for Class 1st to 10th Chapter by Chapter
MCQ Class 1 Evs | MCQ Class 2 Evs | MCQ Class 2 Evs | MCQ Class 4 Evs | MCQ Class 5 Evs | MCQ Class 5 Evs | MCQ Class 6 Science | MCQ Class 7 Science | MCQ Class 8 Science | MCQ Class 9 Science | MCQ Class 10 Science
3. Make a Checklist
It is advisable to make a checklist of your targets and commitments. You can make a checklist of the dates and deadlines of your projects, assignments and tests. Doing this will help you to maintain a competitive spirit with yourself. Once these deadlines are over, you can tick them or cross them off. Checking off your list will give you an immense amount of satisfaction. You will feel a sense of accomplishment too. Make sure to priorities your list accordingly so that you do not miss out on any important task that needs completion.
We often prepare a timetable in our diaries and copies and keep them away. The habit of making a timetable and forgetting about it is common in students. Therefore, when you prepare a set-up, ensure that it is readily available to you. Write your programmes in a medium font to make them visible. Retain it in place from where you can see it. An evident and eye-catching timetable acts as a reminder to complete your task according to its requirements.
Free Math Worksheet for Class 1 to 10
CBSE Math Worksheet 1st | CBSE Math Worksheet 2th | CBSE Math Worksheet 3rd | CBSE Math Worksheet 4th | CBSE Math Worksheet 5th | CBSE Math Worksheet 6th | CBSE Math Worksheet 7th | CBSE Math Worksheet 8th | CBSE Math Worksheet 9th || CBSE Math Worksheet 10th
5. Avoid Overburdening
Do not overburden your timetable. Ensure that you have enough time for a break in between your studies. An adequate schedule makes your work easy and smooth without overwhelming you. Add and remove study time according to your mental and physical health. All work and no play will make you a dull student. Give enough importance to your hobbies and creative pursuits. Learn to balance life when creating a balanced schedule for yourself.
6. Follow Religiously
Once your timetable is ready according to your plans and requirements, follow it religiously. One needs to be consistent. We can achieve success through perseverance. So strictly adhere to the number of hours you have dedicated to your studies and other recreational activities. If you find it arduous to keep up with your timetable ask for guidance from your parents or elders. It will just take you fourteen days to adjust to the daily routine that you have prepared for yourself. Do not compare your timetable with other students. Every student is unique and requires a different amount of time for a particular topic or activity. Believe in yourself and be confident enough to be persistent towards your timetable.
Every student is striving for success. A perfect timetable will ultimately help you to reach your goals. They can be academic or non-academic. Students should remember that the schedule they have prepared will change once they complete their goals. So it is recommended that you keep updating your timetable from time to time. Give importance to your mental health.
Do not compromise with your sleeping hours. A sound mind and a healthy body is the most important thing that a student requires. If you know any other ways in which you can make an effective timetable, you can adjust accordingly. Also, share the same with your peer and friends that will also be a help to them. | <urn:uuid:1008ceea-b887-4a5e-a645-f6cbbb864209> | CC-MAIN-2022-33 | https://www.justtutors.com/blogs/tag/child-to-prepare-timetable | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.956497 | 1,202 | 2.609375 | 3 |
Actress Tala Ashe will join DC's Legends of Tomorrow on the CW as Muslim-American Zari Adrianna Tomaz, a new member of the core characters' team. According to a press release, Zari is a “grey hat hacktivist” whose combative attitude will probably lead to some juicy conflicts with the other strong-minded characters.
Here's more about Ashe's character, per a CW press release:
A Muslim-American woman from the year 2030, Zari lives in a world of contradictions. Technology has brought about incredible change in her future — too bad human nature hasn’t kept pace. Fear, prejudice, and a lack of care for the planet have forced Zari to become a “grey hat hacktivist.” A computer nerd with a wry, combative attitude. A woman living a double life who doesn’t realize that she has secret, latent powers derived from an ancient, mystical source.
In the original comics, Zari fights against Black Adam (who's on his way to the big screen) and goes on to become a hero named Isis.
Yeah...that last part may have to change.
While this is the first Muslim-American superhero on screen, printed comics are way ahead of the game in terms of diversity and representation (and possibly to atone for being historically white, straight, and male). There's Riri Williams as Iron Man, Miles Morales as Spider-Man, Jessica Cruz fighting alongside Baz as Green Lantern, Amadeus Cho as the New Hulk. Wonder Woman is now canonically bisexual, and DC's Batwoman is a Jewish lesbian.
As for Muslim representation, the current Ms. Marvel, Kamala Khan, was a breakthrough character introduced in 2013 and written by a Muslim writer, G. Willow Wilson. In 2012, Simon Baz appeared in comics as a Muslim Green Lantern; depending on who you ask, the current Robin in DC Comics is from the Middle East (the son of Batman and Talia Al-Ghul). The X-Men universe introduced Monet St. Croix back in 1994, and Sooraya Qadir as Dust in 2002 -- who appeared wearing a full niqab.
Ashe will appear in Season 3, due later this year. | <urn:uuid:dec79a6c-9e81-4436-ab69-6447b3224b26> | CC-MAIN-2022-33 | https://mashable.com/article/legends-of-tomorrow-zari | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.951689 | 468 | 1.507813 | 2 |
BY LORETTA HOUBEN
Did you know that a theatre was located at 488, then 4926 Joyce Road, now Joyce Street, from 1914 until 1934, according to the BC Directories? I’ve been researching this mystery for a while and recently located a few clues. One of them was discovered in the Greater Vancouver Chinook newspaper, courtesy of the University of B.C. Archives online (see photo 1).
The second clue was discovered when I placed a photo from the Vancouver archives in my photo editor and enlarged and clarified it, discovering a building that I believe to be the Collingwood Theatre (photo 2). You can’t see it until you zoom in, and I was startled to find it when I’d never noticed it before.
The theatre was near Wellington Avenue and Joyce Street, and by looking at another image (photo 3), I have deduced that this picture shows a view of Wellington and Joyce that was taken in 1913 and is from the collection of Mrs. Walter S. Baird, courtesy of the Vancouver Archives. If it weren’t for Mrs. Baird, we wouldn’t have any scenes of Joyce Road from the 1910 era. You can see a house on the left side of the photo that stood beside the theatre. I assume it was built in 1913 as it appears in the 1913 photo, and it appears in the directories the following year.
The Collingwood Theatre is mentioned rarely in newspapers of the time. It was managed by Cecil R. Hall, who lived on Aberdeen Street, as shown in the 1930 directory. However, by 1932 the theatre was no longer operating, according to the directory. Cecil Hall had moved to North Vancouver and became the operator of the Lonsdale Theatre.
The property on which the Collingwood Theatre once operated for 19 years is now for sale for a hefty price. Things are always changing in Collingwood!
Loretta Houben enjoys solving mysteries in the Collingwood area, where she has lived for 55 years.
Copyright 2021 Renfrew-Collingwood Community News | <urn:uuid:b197e5c0-08bf-46fd-91b0-3c68a863d931> | CC-MAIN-2022-33 | https://renfrewcollingwoodcommunitynews.com/tag/collingwood-theatre/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.980516 | 430 | 1.5 | 2 |
It’s easy for a conversation to turn into a fight when you’re distracted or multitasking. Body language and eye contact are a huge part of communication, and when you’re not able to fully use them on the conversation at hand, it can often lead to a fight. Keep this from happening in your relationship with the “eye contact” rule: only have serious discussions when you’re both able to make eye contact.
My premarital counselor suggested this tactic after I told her my fiance and I bicker in the car a lot for some reason. She said that’s actually pretty common among couples, because when you’re driving, you’re not (and you shouldn’t be) fully engaged in a serious conversation. You’re not facing the person, and more importantly, you’re not making eye contact with the person. So it’s easy to take things the wrong way and let them get out of hand. She suggested we adopt a rule to only have serious conversations when we’re able to make eye contact—so not while driving, doing something on the computer or phone, cooking, or whatever. Simply put, you want to make sure you’re focused on the conversation.
Don’t get me wrong, driving can also be a time for great conversations, too. Some of the best discussions I’ve had were on road trips. But the idea here is: when you’re discussing a sensitive topic, it’s easy to take things the wrong way; there’s a sense of distance. You want to make sure you’re fully engaged in the conversation so you can read each other well and empathize.
Photo by Huskyherz. | <urn:uuid:4d22b3b9-e0f7-49f1-9994-67d8a25b1086> | CC-MAIN-2022-33 | https://lifehacker.com/avoid-fights-with-your-partner-using-the-eye-contact-o-1746321021 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.940862 | 371 | 1.695313 | 2 |
On the occasion of International Women’s Day (8th of March), the Euro Mediterranean Human Rights Network (EMHRN) published today its regional report “Violence against women in the context of political transformations and economic crisis in the Euro-Mediterranean region; trends and recommendations towards equality and justice”.
This report alerts that violence against women has dramatically increased in the Euro-Mediterranean region during the recent years, showcasing key patterns of violence against women, through case studies from Egypt, Syria, Tunisia, Libya, France, Cyprus and Spain.
The report also underlines the alarming increase and severity of sexual violence in countries such as Libya, Syria and Egypt mounting to sexual terrorism. In Egypt, women protestors were subjected to systematic and seemingly planned harassment and gang rapes in Tahrir Square. In Syria, women and are subjected to trafficking and sexual exploitation girls in refugee camps.
The Global Gender Gap Index seeks to measure one important aspect of gender equality: the relative gaps between women and men, across a large set of countries and across the four key areas of health, education, economy and politics. | <urn:uuid:36787101-e2ed-454e-9584-9bf9acf37479> | CC-MAIN-2022-33 | https://projects.iq.harvard.edu/violenceagainstwomen/publications/international-law-categories/economics | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.948475 | 225 | 2.6875 | 3 |
Volume 21 - April, 2022
April - National Poetry Month
Check out this poetry list of lists! That's right....poetry lists, curated by our awesome partners at IndyPL using Bibliocommons. The list feature in Bibliocommons is fantastic!
Earth Day is Approaching
Try going a day without plastic. In this touching and often flat-out-funny film, we follow "everyman" Jeb Berrier as he embarks on a global tour to unravel the complexities of our plastic world. What starts as a film about plastic bags evolves into a wholesale investigation into plastic and its effect on our waterways, oceans, and even our own bodies. We see how our crazy for plastic world has finally caught up to us and what we can do about it. Today. Right now. (Reel Thing Films)
Check out the trailer, below, and then read on to learn how to watch the entire show for FREE.
Watch Bag It for FREE, on Kanopy with your INDYPL card!
See the film in its entirety (79 minutes) at no cost with your IndyPL card....find the steps below:
- Navigate to the eBooks and streaming page at IndyPL.
- Click Kanopy
- Sign in with your IndyPL card
- Create a free account with Kanopy
- Search Bag It - enjoy!
*Note: Access Kanopy Kids by clicking "GO TO KANOPY KIDS" at the top right side if you would like to share Kanopy with your "Littles".
The Choice Academy is once again selling t-shirts to promote Earth Day. Make your orders here by Wednesday, April 6th.
Final RosieCon Session
Shaun David Hutchinson - Author - Brave Face
To find out more about the book, request a copy, or check out the ebook, visit the IndyPL catalog, or click here.
Can't catch the panels LIVE? Events are recorded and posted to YouTube. Educators and Librarians can view and use each session after it airs LIVE. Go to RosieCon YouTube Channel HERE.
Mindy McGinnis Comes to Indy!
A Favorite Comes to Town!
Mindy McGinnis has made multiple appearances on our Indiana Eliot Rosewater nominee list, some of which are pictured below. McGinnis's writing is edgy, engaging, and real - YA audiences and adults alike flock to her chilling and thought provoking tales.
- Date: Tuesday, April 26
- Time: 6:30 - 7:30 PM
- Location: Indianapolis Public Library Central Branch (downtown Indy)
- REGISTER HERE
PSSST....Teachers: There will be a session earlier in the day for schools who can take students on a field trip!
The Female of the Species
Edgar Award-winning author Mindy McGinnis delivers a riveting contemporary YA novel that examines rape culture through alternating perspectives. A stunning, unforgettable page-turner.
Three screws in her hip. Two months until spring training. One answer to all her problems.
A Madness so Discreet
Murder, madness, and mystery combine in a beautifully twisted gothic historical thriller.
The Female of the Species
Axis 360 News/Update
We would like to draw your attention to one change in particular. The New Books list was removed and replaced with four narrower lists:
- Ebooks for Kids
- Audiobooks for Kids
- Ebooks for Teens
- Audiobooks for Teens
Let us know whether your students like these lists or would prefer a list of fiction and another of nonfiction.
The following collections are live. Titles are still being added to all of them, so check back in a few days to see what's new. They all have plenty in them to start off.
- World Water Day (New)
- Muslim Voices for Ramadan (Updated) (April is also Arab American Heritage Month, so that is included in this list)
- Eid Mubarak!: Ramadan 2022, April 2 – May 2 (New)
- 15 April 1912…10th Anniversary of the Sinking of the Titanic (New)
- Passover, April 15 – April 23, 2022 (New)
- Bunnies and Eggs, Oh My!: Easter 2022 (Updated)
- Reading Through Spring (Updated)
- How Does Your Garden Grow? (Updated)
- Caring for Our Earth and Her Creatures… (Updated)
Still coming will be a collection of Neurodiverse titles to celebrate Autism Awareness Month in April.
At the very top of the screen, both in the browser and on your device, you can set goals for the number of minutes you want to read or listen to each day, and the number of books you hope to read each month and each year. Note that this will (obviously) keep track only of ebooks and audiobooks in Axis 360, but it's still kind of cool. It also keeps track of your streaks - how many days in a row you meet your goal.
Hot Jazz for Cool Kids
Attention budding musicians everywhere! It's the ninth season of Hot Jazz for Cool Kids at Central Library.
Sunday, April 10 at 3pm
The Gene Markiewicz Band will perform the music of jazz legends to celebrate Jazz Appreciation Month! Drummer Gene Markiewicz brings together an “A+” group of musicians who will lead the audience on a musical journey to some of the high points of jazz history.
A Few Updates
- We still continue to work through issues with our new virtual reality goggles.
- Our 3D projector computer is "in the shop", but we are confident that our vendor will have us up and running soon.
- Book Club in a Bag - we are ready to get you started using our kits! Reach out for a planning session!
Decatur Central High School Library Media Center
The Decatur Central High School media center strives to support the curriculum of the school, provide 21st century resources to all learners, and the skill development to use those resources.
The DCHS media center has a unique relationship with the Indianapolis Public Library (INDYPL). As a "Shared System Partner", DCHS students use their own INDYPL library card to borrow items not only from the DCHS media center but from any INDYPL branch. INDYPL also provides wonderful research tools for us, including online databases and eBooks. Free music and eMagazines are another added bonus.
Our goal is to motivate learners to be independent users of information, encourage critical thinking and problem solving, and to promote good digital citizenship. | <urn:uuid:891b5f46-8e48-479e-9d0f-96f2dbf98743> | CC-MAIN-2022-33 | https://www.smore.com/2c8hw-beecher-feature?embed=1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.9245 | 1,412 | 1.648438 | 2 |
We often hear that the court system is clogged by too many frivolous lawsuits. Yet researchers at the Harvard School of Public Health found that 97% of malpractice cases are actually meritorious.
Are the state disciplinary organizations doing enough to protect the public from doctors who have a bad track record? How is a doctor allowed to claim 282 victims, like Mark Weinberger who was finally convicted after 5 years, of performing unnecessary surgeries and billing for operations never actually performed? What would proponents of “tort reform” say in response to this?
While most hospitals claim to do their own “Morbidity and Mortality” conferences, it is often difficult for a doctor to label a colleague’s performance as substandard. Is this the best way to correct medical errors? According to the Journal of the American Medical Association (JAMA), medical negligence is the third leading cause of death in the U.S. following just behind heart disease and cancer. In light of this, should we really be making it more difficult to file a medical malpractice lawsuit?
A study of Perfusionists (a specialized healthcare professional who uses the heart-lung machine during heart surgery) showed that 55% of them had used a smartphone during the performance of a procedure. Is this any better than a teenager texting while driving?
State Boards can sanction doctors for a range of problems including substance abuse, sexual misconduct, criminal convictions, incompetence and substandard care. But in too many cases action isn’t taken until it is too late, if action is taken at all. This is why it is so important to protect yourself, and thoroughly vet any physicians you or your family plan to visit.
One method is to check with your State’s Medical Board to get information regarding disciplinary actions or malpractice awards. Note that each state differs on what is made public, frequency of updates, and disciplinary actions.
You can also look up other sites for doctor reviews such as <span “”=””>American Medical Association<span “”=””><span “”=””>, HealthGrades.com, LifeScript.com, RateMDs.com and DoctorScorecard.com.
If we cannot rely on State Disciplinary Boards to protect us, we must make sure we are our own best advocate, and do the research ourselves. | <urn:uuid:457fb219-cef8-4889-9d6d-bb2968610222> | CC-MAIN-2022-33 | https://mitchellhoffmanwolf.com/2015/02/are-we-doing-enough-to-prevent-medical-errors/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.959405 | 495 | 2.046875 | 2 |
Looking out from the road
to Matelot, casting imagination
over the indelicate hump around us,
the Northern range became the stone-axed
rim of a chasm cut deep enough for a history
to make its catacomb.
Before we descended
like idle corbeaux to the shore, we might have
understood what it was that drove the people
inland, from Gasparee to the west, those caves
yawning lazily for curious tourists
with cameras and Old World love of story,
and Carrera’s arrogance—
prison without walls to pen the brave
and criminal, their fate almost burlesque—
misplaced and forgotten as history.
Bocas. Angry swell that made the islands,
broken off the tip of Trinidad.
Crumbs from unleavened bake left on the counter.
Serpent’s Mouth. Dragon’s.
It swirled, open, like a madwoman, to thrash
and swallow pirogues—bows pointed
skyward like the aristocracy, sterns half-sunken,
undignified, for the drowning poor—
their displacements heavy with fear and lore
for ones who lost the belly, and too many
stubborn brothers, to it.
They know how to mourn that honest mourn:
lovers and family, diluted blood,
martyrs still there in the ocean, bones
rebellious with age, scattered and gray
in silt and thirst for breath.
But, always. The water.
I could tell you if you want to know.
Real men find their death in them waters, oui.
Even some partners of mine and all, who swear they know the sea.
How long I have to wait for this rum,
for me to tell the story right?
Earl! Call Earl for me there!
Those waves rolling a rhythm steady
as the mile-markers that looked like
Scarborough. Crown Point. Speyside,
Buccoo from The Gelting at dusk.
There, like instinct, present. A macume.
Pervading as culture, lunatic water breaking legends
on wave crests.
The Bocas, the Bocas—
that word come from the—
must be some damned bad word
to take them heroes and them.
But, really, it comes from the Spanish,
from words separated with nods and smoke,
damp with pity for us, who felt
we knew the language,
but even cigarettes knew what we could never, here.
They crackled, embers jumping off their tongues, hurdling
twice-broken and unset fingers like dogs hunting in the bush.
Smokers, with every drag, flicking hard before ash could grow.
Because you have to.
Because the sea was always
like that: impatient, impatient,
not given to lingerers or crowds,
a ruthless mimic
of time bored with itself, wagering
on the strokes of fools, spawning
widows and orphans, and leaving its shorebound
with only grief for pole, sorrow for tackle,
hands wrung like duennes cracking calabash
and song notes.
You have to work fast, boy,
before the ash could grow.
It could only take you on for a little while
before it get tired of you, and just so! It take you!
You think you could be more vexed
than them waters, boy?
Of what to stand with brush
and color, or anxious poet’s hand
or glassed, flattering eye to marvel at, then?
Of quiet efficiency, unceremonious, with
glistening ebony men, their own gods, casting
nets wide for dolphin, as Gasparee slept.
Had they not trawled
for vagrant dead when honor, too, sank?
Where had mothers wished
to hide, before graying breasts held fast
beneath blended cotton braziers rushed
here to burst, wild and untuned, from them –
wrinkles cut deep across their chests
like drying muck – calling their children to land?
Before we saw the horizon again,
since invading the hills, there was the smell,
wild ocean that buoyed restless on the wind.
Those who prayed bound their petitions in sackcloth,
the unfound dressed for nobility at sea, obituaries
straining recall from each resident soul.
And it, rumbling mercurial,
a vast cemetery, too vain for a scene
beleaguered with gravestone and epitaph. | <urn:uuid:6088c834-a8b9-4568-8ea4-d7a6da06ff28> | CC-MAIN-2022-33 | https://drbrowne.me/the-bocas/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.909973 | 992 | 1.695313 | 2 |
The rolling elements of Needle Roller bearings are cylindrical in shape with the roller’s length being far greater than its diameter. These bearings are used where limited space is available between shaft and housing.
Needle Roller Bearings are:
•capable of carrying radial loads
•suitable for low and medium speed applications
•mainly used in gearbox, steering, clutch, differential, engine, UV joints, etc. in automobiles
We can offer the following variants:
•Drawn Cup Needle Roller Bearings
•Needle cage assemblies
•Needle Thrust Bearings (ASX series)
Many other special types of Needle Roller Bearings can be developed to meet specific application requirements. Technical information for bearings not appearing in our production program is available on request. | <urn:uuid:c39f7a8d-7744-43e5-b3d1-122f9ad2eb7f> | CC-MAIN-2022-33 | http://focusbearing.com/product/Roller_Bearings_64706/16087.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.885277 | 169 | 2.25 | 2 |
public class PipelinedApproximateSubpartition extends PipelinedSubpartition
|Modifier and Type||Method and Description|
To simply the view releasing threading model,
abortCheckpoint, acknowledgeAllDataProcessed, add, addRecovered, alignedBarrierTimeout, bufferSize, finish, flush, getAvailabilityAndBacklog, getBuffersInBacklogUnsafe, getChannelStateCheckpointId, getNumberOfQueuedBuffers, getTotalNumberOfBuffersUnsafe, getTotalNumberOfBytesUnsafe, isReleased, release, requestBufferBuilderBlocking, setChannelStateWriter, toString, unsynchronizedGetNumberOfQueuedBuffers
add, getSubPartitionIndex, getSubpartitionInfo, onConsumedSubpartition
clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
public PipelinedSubpartitionView createReadView(BufferAvailabilityListener availabilityListener)
releaseView()is called only before creating a new view.
There is still one corner case when a downstream task fails continuously in a short period of time then multiple netty worker threads can createReadView at the same time. TODO: This problem will be solved in FLINK-19774
Copyright © 2014–2022 The Apache Software Foundation. All rights reserved. | <urn:uuid:76cdceca-fe77-4ad1-b024-868451fb56e9> | CC-MAIN-2022-33 | https://nightlies.apache.org/flink/flink-docs-master/api/java/org/apache/flink/runtime/io/network/partition/PipelinedApproximateSubpartition.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.652893 | 299 | 1.59375 | 2 |
Care from the "Home Care" industry, housecleaninig, companionship, etc, is trying to move into the Hospital at Home space, but…
Give me a basic overview of NHIN Direct.
NHIN Direct is a project to expand the set of services that are available on the NHIN, but to expand them in a way that is accessible to the majority of providers. Particularly, the majority of the primary care providers practice in practice sizes of five or fewer. The lingua, the interchange, the health information exchange/interchange for those providers currently is fax. The major aims of this project are to create a set of standards that enable those providers to essentially replace the fax with electronic forms of interchange.
There’s really nothing new in the kind of health information exchange that we’re trying to do. We’re not trying to break new ground so much as standardize existing ground. A lot of HIOs get their start in provider-to-provider or lab-to-provider direct communication. Essentially, what we’re trying to do is standardize that and make it easier to plug in EHRs into exchanges and make it easier for HIOs to develop standard services for that kind of direct communication.
I’d also note that level of direct communication aligns very well with the criteria for Meaningful Use; particularly the requirements to exchange information at transitions in care, as well as receive lab data electronically and provide electronic information to the patients.
How would you characterize the differences between NHIN and NHIN Direct in terms of who will use them and for what purpose?
I’m going to carefully separate NHIN, as in the NHIN Exchange, from NHIN, as in the set of standards and services that are available. There’s some confusion about what’s what.
Both define the NHIN Exchange as the network of networks, as the network in the middle with standards that enables large, national health information organizations to exchange data with each other. A great example of where the NHIN Exchange would be useful is in coordination of care between a provider who’s using a state HIO and a patient treated in the VA system or in the DoD system.
All three of those organizations are, essentially, extraordinarily large IDNs. They are nationwide health information organizations because they cross and transcend state boundaries. That’s the core use case for the NHIN Exchange — coordination of care and information discovery across large, nationwide health information organizations. The core standards that are in use are common standards that can also be deployed within an HIO context, so if I wanted to discover where else a patient has been and what information is available about that patient, I would use the core NHIN services. They’re essentially the IHE interoperability stacks, particularly the XDS, XCA; that stack.
The way that I describe it, I’m going to paint two pictures. Picture one says that I’m a provider who is in an exchange that offers both services and I’m referring to a provider who only gets the simpler kinds of services, the direct services. As a provider with access to both services, when a patient presents, I may do a query to find out where that patient has been seen since the last time I saw them, and discover information with the patient’s consent that helps me inform the care of the patient.
Then at the end of that encounter, I might publish the updated physician information into the repository in the sky for future care providers to discover information. Those are great uses of the NHIN specifications and services.
Then, at the conclusion of that encounter, I want to refer the patient over for care. Let’s say it’s for care that isn’t served on the same EHR, where I can’t rely on the EHR’s capabilities to have the chart available. So I want to push a referral transaction over to, let’s say, the cardiologist. Then at the conclusion of the cardiologist’s care, I really want them to push me an update to what happened to the patient.
That transaction, by its very nature, just doesn’t fit the “publish something in the sky and then grab something from the sky” model. I mean, you could do it that way, but the semantics of that transfer are directional. I want to give the referral over to that provider and that provider expects to receive it in his or her inbox. Same thing for a lab. You might publish the lab to a lab repository in the sky so that all people can have access to it, but the ordering provider wants to get that lab result in his or her EHR directly as well. So you’ve got both publish semantics and push-to-provider semantics.
Pretty much all we’re about at the NHIN Direct project is to create the standards, the specifications for that push-to-address case in ways that allow an HIO or lighter weight organization to be able to provide an address for a provider or for a patient, and for the routing of a transaction to go to that address. So, there’s a lot.
Many of the HIEs created their business models around charging for that type of service. Will they use some aspect of NHIN Direct or is this a replacement or a competitor for it?
A lot of HIOs, I think for very good reasons. It drives a lot of business value. You get started with simple direct services. Nothing that NHIN Direct is doing should, or does, conflict with that desire. NHIN Direct will, hopefully, make those services easier to deploy because there will be a set of standards around them, and EHRs, hopefully, will have their standards embedded within the EHR so it will be easier to get services up and running.
Now if your business model is, “Well, this stuff is hard, and so our business model is to do it because nobody else can and we don’t want any competition and anything that makes it easier to do is a threat to our business model,” then sure, it could be a threat to the business model. I don’t believe that. I believe that making it easier, making it more scalable, actually makes it easier to offer those services at a profit for exchange sustainability.
As I said, I think if you look at the example of successful HIOs, they pretty much all solved this problem at the cost of some blood early on, and they’re able to offer these services. NHIN Direct is going to give them a way of scaling that service offering more, but I don’t think they think it’s a threat to their business. I think if you look again, if you look at the example of HIOs that are up and running and doing well, I don’t think any of them are scared by NHIN Direct. In fact, I think they think of this as something that makes their work easier to do.
What about those EHR vendors that have their own exchanges?
A lot of the EHR vendors — and you can go to the NHINDirect.org website and look at the implementation group to look at the current members of the implementation group and you’ll see a number of the leading EHR vendors out there — many of them are participating in this effort. I can’t speak for them, but if you look at the strategic situation, I think many of them would like to offer a set of value-added services on top of their EHRs for simple connectivity.
Many of them are in context where if you look at the state of HIT in the United States, very few providers operate in a service area where it’s all one vendor and where you can mandate and lock down a single vendor model. So, many of these EHR vendors have customers — oftentimes large health systems — who are asking them to enable interoperability within their products, but also across other products.
I think many of these EHR vendors see this as a way to fulfill their customer’s business needs in a way that is standard, and allows them to offer standardized services. I think the EHR vendors, by and large, have looked at this as an opportunity much more than they look at this as a threat.
John Halamka likes the idea of a health URL where individual data can be pushed. Would this support that, or is anybody working on that?
Absolutely. The notion of an address that you can route information to is a core principle of the NHIN Direct project. In fact, John’s recent blog post describes the work of the addressing working group in NHIN Direct. He’s a participant of the implementation group and he references, explicitly, the health URL concept in the context of what we’re trying to do.
What about privacy and security?
I’m going to back up. If you look at the record locator kinds of transactions — where has this patient been, what information is available about this patient — those are the transactions for which specifications and standards currently exist. There is a significant set of policy issues around that because the information holder is receiving a transaction basically requesting information and needs to decide, on the fly, whether that’s an appropriate information request, and whether the PHI disclosure that’s associated with that is proper and legal. Any of those systems that are up and running have put in place consent models and put in place policy models that ensure that data is only provided when it’s legally appropriate to.
In the set of push transactions that NHIN Direct is all about, the information holder and the initiator of that transaction are one in the same person or organization. The best way to think about the NHIN Direct kinds of transactions is that the data are going to flow, regardless. I’m going to send the summary of care to the provider via fax. I’m going to send it via paper. I’d love to be able to send it electronically.
The legal responsibility is pretty clear for this. It’s the information holder’s responsibility to determine whether the disclosure that they’re making is appropriate. Appropriate is defined by any of the HIPAA exemptions, as well as by explicitly getting patient consent to do the transaction.
What we need to make sure of in the transactions and in the policy framework around health information exchange is that if there is a disclosure along the way, that we know exactly where that disclosure originated from, we know who the legal entity responsible for the disclosure was, and also that we protect the health information and make it secure all along the way so it doesn’t inadvertently get exposed. We’ve got a privacy and trust working group that’s focused on those exact issues.
I think John’s post mentioned that it will be the same framework that’s used by the full-scale NHIN, not a lightweight version.
Exactly, so we’re going to be using TLS on both ends. We’re going to be ensuring that all the data are encrypted in transit. We would recommend that HIOs encrypt it at rest as well, and ensure that they’ve got the appropriate security policies.
The other part of this is that we’re just doing the transaction semantics. We’re just doing the specification. Somebody’s got to take those specifications and run them. The organizations that run them need to run those transactions within a policy framework. That policy framework needs to have much more in it than just transaction-level security rights. You absolutely have to encrypt the data in transit, but then you also have to make sure the exchange has the security policies in place; does security audits and remediation, has good quality assurance policies in place; has good operational controls in place to make sure that … you’ve got to secure the entire system and not just the transactions.
There’s a lot of policy work to be done. We’re closely coordinating the technology work that we’re doing with the policy work that’s being done, both at ONC as well as within the NHIN workgroup and the HIT Policy Committee.
Maybe you can expand on that thought because I’m not sure I understand. What you have is a set of policies and practices, but someone has to actually run it.
Exactly. The metaphor that I’ve used is that you’ve got cake? Cake is good stuff. You want to eat cake. Cake adds value.
We’re not making cakes in the NHIN Direct project. Somebody’s got to run a bakery to bake some cake. What we’re doing in the NHIN Direct project is creating a recipe for cake, and we’re making sure that recipe is well-tested and making sure it works across a variety of settings. That you can use a small bakery or a big bakery to make your cake and the cake’s going to taste just as good, regardless of where you bake it.
But, as an organization, our project is to create a recipe. You’re not going to get any cake from the NHIN Direct project. You’ve got to get your cake from a bakery.
Is there any centrally hosted infrastructure or services?
Not so far as we’ve discussed. There has been some belief — which we’re still going to need to explore this — that there are a couple of potential services that the federal government may end up hosting. One might be a central certification body, as well as a certificate authority to make sure that people who operate on the exchange are carrying correct policy frameworks. That’s the one potential role for the federal government.
They are, essentially, assuring trust. That’s a role that the federal government’s already taking on and is actually legally responsible to take on with respect to the NHIN Exchange, to the extent that the NHIN Direct services get incorporated into the NHIN Exchange. The federal government and ONC have a legal responsibility to create a policy framework for that. That’s one role that the federal government could play.
There are potential other roles the federal government could play, particularly around potentially using some of the information that we have around NTI; as well as that CNS is going to have to have a lot of paying providers for Meaningful Use as a way of making directory services that people might offer more valuable. But, we still have yet to explore or decide on those capabilities.
By and large, the NHIN Direct project will exit with a recipe and not so much with infrastructure.
Do you think the EMR products that are out there will be ready to share data once the platform is available?
With everything else in software, there’s a software development life cycle. There’s a set roadmap on capabilities. What I’m encouraged by is that so many of the EHR vendors are participating in the project and have committed to do real-world implementations. Not necessarily full-scale, real-world implementations, but have committed to doing real-world implementations. That encourages me that by 2011 we’ll have exchange capabilities at a broader scale to support.
What this is all about is supporting providers, both in terms of their obligations to get the money for Meaningful Use as well as supporting providers and patients in the quality and efficiency goals that we’ve set out for the HITECH Act. My hope is that given the participation that we’ve got that we’ll get a good amount of support for providers in 2011.
How would you turn all this technology concept into something that patients would understand? What would you say the outcome would be and when will they begin to see it?
As a patient, what we would hope to see is that a patient has interoperable access. Again, I think John Halamka’s posts on the health Internet address called the health URL are as good a place to start in understanding what this is all about. As a patient, I should be able to get a health Internet address. I should be able to give that health Internet address to my provider and say, “Hey, I want my information posted here.” The provider should say, “OK, no problem. I’ve got all the capabilities for doing that.”
As for when that will happen, I expect it will be in essentially limited operations by the end of this year. I would expect us to be in wider-scale operation by the end of next year.The way that I would judge this project being a success would be the number of providers who’ve got an address.
The other side’s the patient experience. That when I get referred over for care, get treated by a specialist, and then go back over to primary care, that the thing that I expect to happen — which is that specialist knows why I’m there and knows my health information necessary for treating me and that my primary care provider knows what happened when I went to the specialist — that all that exchange has happened behind the scenes with my consent, appropriately.
I think those two outcomes would be the way that I would judge the success of this project. My beliefs and hope would be that we’ve got a decent amount of availability to service it by the end of 2011, and then rolling on to wider scalability in 2011-2012.
What also makes me feel good about this is there are a lot of organizations that can do parts of this, and really all we’re doing is taking the best practices that a lot of these organizations are doing, and saying, OK, that’s great. We know how to do it. We know how to do it, even at scale. Well, we don’t know how to do it and do it interoperably so that you can share information between systems, so let’s focus on that.
Any final thoughts?
I think that if you’re asking about the fact that we’re not hosting, we’re not running any services. I think that’s the thing that people get extraordinarily confused by, and understanding that is real useful.
Another common question that comes up is, “What are you doing about content?” The project itself is focused on transport, but we’re sitting and working with all the other work that’s being done around content to make sure that the payloads that people exchange are interoperable payloads; and all the good work that’s in the IFR to help us constrain down to CCR and CCD, but also constrain down to terminology. We’re relying on that work getting better and more stringent over time so that we can share information, but then we can also understand the payloads. | <urn:uuid:4bc5ada5-479f-41c1-bc75-91cb00091426> | CC-MAIN-2022-33 | https://histalk2.com/2010/04/28/histalk-interviews-arien-malec/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.964692 | 3,954 | 1.695313 | 2 |
This video is a must-see—just look at the difference between what a monkey called Nick Nack deserves and what he actually endures every day:
As a baby, rhesus macaque Nick Nack should have been cherished by his family and other troop members—he should’ve spent a year being nursed by his mother, staying by her protective side. Instead, he was born in captivity and likely torn away from his mother within a few months. He never got to know his family.
Now, as a young male macaque, Nick Nack should be free to band together with other males his age—if he were free, he and his friends would forage for food, fend off predators, and build relationships with new monkeys.
This powerful video shows macaques living in their natural home doing all that and more, and it contrasts their lives with the way Nick Nack has been forced to exist—imprisoned and alone.
The differences are heartbreaking.
At the time this video was recorded, Nick Nack was entering his prime, but all he knew was a metal cage that he barely had room to turn around in. He had no friends to groom with—he didn’t even have the opportunity to decide what to do with his days. All he could do was stare into a corner and incessantly bounce up and down, stiff-legged—a sign that he’s in extreme psychological distress.
Monkeys like Nick Nack need us to save them from National Institutes of Health (NIH) animal experimenter Elisabeth Murray.
In her government laboratory, Murray saws open her victims’ skulls and injects toxins to burn brain cells or suctions out parts of the brain. She then places the monkeys in a small cage and deliberately provokes their worst fears with fake spiders and snakes, just to see how they’ll react. When she’s through with them, she kills them. And she does it all with millions of your tax dollars.
For Nick Nack, We Must #ShutDownMonkeyLabs
In the past 13 years alone, Murray’s laboratory has received more than $36 million in taxpayer money—our money—for these “emotional responsiveness” tests. So while we wait for cures for deadly diseases, NIH is sucking out parts of monkeys’ brains and then scaring them with “snakes” and “spiders.”
Click below to urge NIH to shut down this horrific laboratory; redirect the funds to superior, non-animal research methods that actually benefit humans; and retire all surviving monkeys to sanctuaries. | <urn:uuid:03f60e8c-0c45-4811-b94c-9f394d442178> | CC-MAIN-2022-33 | https://www.peta.org/blog/nick-nack-monkey-nih-laboratory-video/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.977269 | 546 | 2.046875 | 2 |
In the fable of The Tortoise and the Hare, Aesop cautioned us to temper our “need for speed,” because “slow and steady wins the race.” In the case of the Horseshoe Bend Overlook, slow and steady doesn’t necessarily win any race, but taking a gradual, more mindful approach to this now-iconic symbol of the American Southwest will give the viewer a better appreciation for the true complexity of the area’s geology. And that, in our book, is definitely one for the “win” column!
As you exit your vehicle in the newly-expanded Horseshoe Bend parking area just South of Page, Arizona, your will make your way around a newly paved walkway that avoids the original mildly steep incline that included sometimes unwieldy sand.
About 200 million years ago, a massive sea of sand dunes covered the landscape from Arizona to Wyoming. Known to geologists as “ergs,” they eventually became petrified (turned to stone) by water and minerals, solidifying into a uniform layer of sandstone over 2,000’ thick in some areas. After the bedrock of Navajo Sandstone formed, other sedimentary layers of sandstone, mudstone, calcite and limestone settled on top of it, then began to wear away under the constant scouring of relentless winds, flash floods, and extreme heat and cold. Today, the Navajo sandstone is once again exposed, and its top layer turning to sand. So this hill that makes you go “erg” is what remains of a gigantic sand dune that actually saw dinosaurs walk upon it. Indeed, there is a small, but hard-to-find dinosaur track about 50 yards from the end of the trail. Tell us the GPS coordinates if you happen to find it!
As you crest the hill, the trail begins to undulate and you’ll notice the tone of the landscape has taken on more jagged, sloping characteristics. Whitish gravel and chunks of sand also make an appearance. These are remnants of the calcite, or limestone layer that was once here. The diagonal stripes in the rock formations tell the story of how the sand dunes were petrified, yet retained their former shape as minerals, rain and snow changed their molecular composition over the course of 20 million years.
As you get closer to Horseshoe Bend Overlook, you’ll notice that some of the rock formations sport dark, sandy nodules. These are known as “iron concretions.” Because it was heavier than sandstone, iron tended to cluster up into small spheres during the process of petrification. As the sandstone erodes away, these concretions are becoming exposed to the elements once again. Occasionally, they will break away from the sandstone bedrock. When they do, they become what are known as “Moki Marbles.” If you find one – or more – please don’t pocket them. Remember, take only pictures and leave only footprints!
If all this sounds pretty amazing so far, wait until you see what’s ahead of you: the very thing you came here for – Horseshoe Bend! A geologic masterpiece sculpted by the Colorado River, Horseshoe Bend is an example of what happens when water takes the path of least resistance. Approximately 5 million years ago – or what a geologist might describe as “just the other day” – the Colorado Plateau abruptly uplifted. The rivers that flowed across this ancient landscape were suddenly trapped in their beds. Seeking a new natural level, with the help of gravity, the Colorado River began cutting through rock layers deep and fast. Here at Horseshoe Bend, an unstoppable force met an immovable object, namely, a sandstone escarpment. Since this rock formation wasn’t going to budge anytime soon, the river did the most logical thing it could: it went around it. The result is the 270° bend in the river (called an “incised” or “entrenched meander”) you see before you. Who knows, in a few million years, the stubborn promontory might finally decide to give way to the river’s whims, and future tourists could be viewing an attraction that bears a resemblance to Rainbow Bridge!
But, that’s in the realm of sheer speculation for now. What’s in the realm of absolute certainty is that this is one of the most intimate views of the Colorado River you’re likely to experience on your Northern Arizona vacation. At this viewpoint, you can see the waters of the Colorado River in all their sparkling, blue-green glory as they drift along toward the Grand Canyon. Where else can you take a selfie with this timeless, majestic waterway in the background? Certainly not at the Grand Canyon – from the South Rim, there is only a handful of viewpoints that the Colorado River can be seen from, and then only a small stretch before it disappears again behind a butte or plateau. So pause for a few minutes to breathe in the fresh air and appreciate this magnificent view for how powerful and miraculous it truly is!
Now, wasn’t it worth the walk? For best results photographing Horseshoe Bend, you’ll need a wide angle lens to get the entire scene in the picture. If heights freak you out a little, try sitting or even lying down to take in the view from a more secure perspective. Seeing little blue dots on the river? Don’t worry, that’s not the altitude messing with your mind, those are rafts rounding Horseshoe Bend on the Half-Day Glen Canyon Float Trip. If you take one look at that first hill and still say “no way,” consider flying over Horseshoe Bend to get an incredible bird’s eye view without breaking a sweat. | <urn:uuid:e7ef1d3a-90b9-4aad-ac22-0b2e3c8a002c> | CC-MAIN-2022-33 | https://horseshoebend.com/horseshoe-bend-the-initmate-grand-canyon-experience/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.945665 | 1,233 | 2.265625 | 2 |
The SSH Training Discovery Toolkit provides an inventory of training materials relevant for the Social Sciences and Humanities.
Use the search bar to discover materials or browse through the collections. The filters will help you identify your area of interest.
|CESSDA Resource Directory||
The Directory gathers resources which are already available across various institutional websites.
|Consortium of European Social Science Data Archives|
Data Archiving and Networked Services (DANS) is the Netherlands institute for permanent access to digital research resources.
|Data Archiving and Networked Services|
|Data Observation Network for Earth (DataOne)||
DataONE is a community driven project providing access to data across multiple member repositories, supporting enhanced search and discovery of Earth and environmental data.
|Digital Curation Centre||
The Digital Curation Centre (DCC) is a centre of expertise in digital curation with a focus on building capability and skills for research data management.
|Digital Curation Centre|
|EOSC Hub Project Training Materials||
This source provides a list of training materials being developed and used during the EOSC-hub training events.
|EGI Foundation, Data Archiving and Networked Services, SURF, Ruder Boskovic Institute|
|National Coordination Point Research Data Management: RDM Advice and Tips||
National Coordination Point Research Data Management (LCRDM) is a national network of experts in the field of research data management (RDM).
|National Coordination Point Research Data Management|
|Open Book Publishers||
At Open Book Publishers we are changing the nature of the traditional academic book.
|Open Book Publishers|
|OpenAIRE Training and Support||
OpenAIRE wants to shift scholarly communication towards openness and transparency and facilitate innovative ways to communicate and monitor research.
|UK Data Service: Manage Data||
Online data management guidance and resources for researchers, developed by the UK Data Service.
|UK Data Service|
|The Library Advisory Group (LAG) at the University of Essex||University of Essex|
|Data management support for researchers||
The University of Glasgow has a range of resources to support researchers seeking to manage their research data.
|University of Glasgow|
|University of Huddersfield Library Services||
University of Huddersfield’s Library holds over 330,000 book and journal items, and provides access to around 750,000 electronic resources.
|University of Huddersfield| | <urn:uuid:e362601e-b140-47a3-91a6-aed76decd334> | CC-MAIN-2022-33 | https://training-toolkit.sshopencloud.eu/entities?search=&f%5B0%5D=content_type%3Asource&f%5B1%5D=format_taxonomy_term_name%3ABook&f%5B2%5D=format_taxonomy_term_name%3AGame&f%5B3%5D=format_taxonomy_term_name%3AReport&order=organisation_name&sort=asc | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.820529 | 563 | 2.0625 | 2 |
Several countries in Asia, including India, have been struggling with mounting cases of the coronavirus disease (Covid-19) even as the threat of the Delta variant is looming large over the continent as well as the entire world. The first case of infection from Delta was identified in India and now the Delta Plus variant of coronavirus is ringing alarm bells across Asia. The pace of Covid-19 vaccination, which experts say is one of the measures to tackle the pandemic, has been slow in the whole of Asia. Along with this, the risk of Delta variant is rising in the entire continent including India.
World Health Organization director general Tedros Adhanom Ghebreyesus has warned that the world is witnessing a very “dangerous period” compounded by the rapid transmission of the Delta variant. The WHO chief said on Friday that the Delta variant has been detected in at least 98 countries and is quickly becoming the dominant strain in many of them. “Compounded by more transmissible variants, like Delta, which is quickly becoming the dominant strain in many countries, we are in a very dangerous period of this pandemic,” Ghebreyesus said during a press conference.
Here are seven Asian countries hit hard by the coronavirus pandemic:
1. India: In terms of Covid-19 cases, India has the most number of infections in Asia and the second-most in the world. So far, a total of 30.5 million people have contracted Covid-19 and more than 400,000 have died. There are currently 485,350 active cases of Covid-19 in the country and 29.6 million people have recovered. The recovery rate in the country has increased to 96.97%. The weekly positivity rate remains below 5 per cent. In terms of vaccination against Covid-19, so far more than 350 million doses have been administered in the country.
The first case of the Delta Plus was found in India on June 11 and more than 50 cases of the variant have been reported in the country so far.
2. Turkey: Turkey is the second-most affected country after India in Asia. So far, more than 543 million cases of Covid-19 have been reported in the country and 49,829 people have died. At present, there are 80,146 active cases and 530 million people have recovered from Covid-19. So far, 51.2 million doses of the Covid-19 vaccine have been given in Turkey. Turkey banned flights and all direct travel from Bangladesh, Brazil, South Africa, India, Nepal and Sri Lanka recently in view of the danger of the Delta variant.
Also read | Delta variant spreads to 98 nations, Europe struggles to ramp up vaccination
3. Iran: Iran is battling the deadliest outbreak of the coronavirus in the region and has warned it could be hit by yet another wave of infections. “It is feared that we are on the way to a fifth wave throughout the country,” President Hassan Rouhani told a meeting of Iran’s anti-virus taskforce. He also warned people to be careful as “the Delta variant has spread” in southern provinces.
The country has reported more than 3.2 million cases of Covid-19 and 84,516 people have died. There are currently 246,000 active cases of Covid-19 and more than 2.9 million people have recovered. So far 5.72 million doses of the vaccine have been administered in Iran.
Also read | Who are ‘highly protected’ against Delta variant of Covid? ICMR study reveals
4. Indonesia: The Delta variant of the coronavirus is spreading rapidly in Indonesia and the government has imposed a lockdown in many parts of the country till July 20. Indonesia is the fourth country in the continent of Asia, where corona cases have been found the most. Indonesia’s tally to date stands at 2.25 million cases and 60,027 deaths — making it one of Asia’s worst-hit nations. Only about five per cent of the country’s people have been fully vaccinated with two jabs so far.
5. The Philippines: The Philippines government has said that so far no case of the Delta variant has been reported in the country. There are 142 million people who have contracted Covid-19 in the Philippines and 24,973 have died. There are more than 55,000 active cases in the country and 134.4 million people have been cured. So far, 10.7 million doses of the Covid-19 vaccine have been administered in the country. The government has extended travel restrictions till July 15 for all people coming from India, Pakistan, Sri Lanka, Bangladesh, Nepal, Oman and the United Arab Emirates (UAE).
Also read | China urges nations to construct a ‘great wall’ against Covid-19
6. Iraq: A slow pace of vaccination against Covid-19 has compounded the problems of the country, which has reported 1,340,000 people have been infected and of these, 17,256 have died since the start of its outbreak. There are currently 87,377 active cases in Iraq and 1,255,203 people have been cured so far. Only 805,000 doses of the vaccine have been administered in Iraq, which is is less than 2.5% of the 40 million of its population. Cases of the Delta variant are rising in Iraq.
7. Pakistan: Pakistan is at number 7 in terms of Covid-19 cases in Asia and 961,085 people have been infected and 22,379 have died. There are currently 32,319 active cases in the country and 906,000 people have recovered from Covid-19. Pakistan has administered 16.3 million vaccine doses. Pakistan has also warned its citizens about the possibility of a fourth wave in view of the Delta variant. The first case of the delta variant was reported in Pakistan on May 28 and in the next week, the country saw more infections in travelers coming from the UAE. Recently, this variant was also found in people who have returned from other Gulf countries. | <urn:uuid:7024f214-aa6a-4d49-b67a-c5b02358aff5> | CC-MAIN-2022-33 | https://www.times24h.com/covid-19-in-asia-fears-of-third-wave-over-india-heres-how-others-are-doing-world-news/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.970711 | 1,268 | 2.453125 | 2 |
Polar bears are a powerful iconic symbol of the strength and endurance in the great white north. With the celebration of International Polar Bear Day today, let’s learn about the magnificent species!
1. About 60% of polar bears live in Canada, from Labrador to the Yukon and from Ellesmere Island to James Bay.
2. Its Latin name,Ursus maritimus, means ‘sea bear.”
3. Sea bear seems like a pretty apt name for a species that live and hunt mainly on the Arctic sea ice! They mainly eat seals, but will also catch and eat seabirds and even small whales.
4. Typically, an adult male polar bear is an astonishing 6-10 feet long and weighs between 780 and 1,500 pounds!
5. Polar bears are good swimmers, their body fat help them float and they use their large forepaws to paddle and sometimes use their hind legs as rudders.
6. Polar bears thick under-fur, guard hairs, and ability to store significant fat keep them warm and powered up over the cold winter months. Their massive paws spread their weight evenly to keep them from falling through snow and thin ice.
7. Polar bears have three eyelids, the third helps protect the bear’s eyes from the elements.
8. Polar bears have translucent fur that appears white, but underneath their fur, their skin is black. They also have a blue tongue!
9. They have 42 razor sharp teeth. With jagged back teeth and canines larger than grizzly teeth!
10. Climate change is causing sea ice to melt much earlier in the year and return later, meaning polar bears have less time on ice to hunt seals, their favourite prey. This can lead to thinner bears, reduced cub survival, and a decrease in the overall polar bear population.
Our work depends on your support and right now you can have double the impact. Donate now and a generous donor will match your gift (the first $130,000 in donations will be matched).
Learn more about WWF’s important arctic work at wwf.ca/polarbearweek. | <urn:uuid:a444782c-b179-4319-afdc-235890290c14> | CC-MAIN-2022-33 | https://wwf.ca/stories/ten-cool-facts-international-polar-bear-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.951867 | 447 | 3.59375 | 4 |
New project is set to turn Liu Cixin’s stories into an international series of graphic novels
Zhang Xiaoyu’s comic presentation of Liu Cixin’s novella The Village Teacher tells the story of an alien civilization and its threat to Earth. (PHOTO PROVIDED TO CHINA DAILY)
Author Liu Cixin’s stories will be turned into comic strips and published as graphic novels in China and France starting in March.
In Japan, The Three-Body Problem, the first book in Liu’s science-fiction trilogy, won the 2019 Booklog Award as the best foreign novel. Some 2 million copies of the books have been sold in 25 languages, according to the Chinese publisher.
During the China Science Fiction Convention in November, critics and researchers agreed that Chinese science-fiction works are gaining more international attention than ever before.
“Science fiction is a reflection of society being transformed by progress in science and technology. It tells the story of the Chinese Dream while encouraging us to pursue the dream, and offers insight into the future, or at least people’s expectations of the future,” writer Han Song said at the convention.
“Chinese sci-fi writers are seeking answers to the problems the world is facing, and are trying to offer their own solutions,” Han said, adding that it represents a new channel for China to communicate with the world.
FT (For Transcendence) Culture Beijing Co Ltd, a Chinese company, has invited 20 artists from France, Spain, Argentina, Italy, Belgium and the United States, as well as domestic artists, to turn 15 of Liu’s works into a series of comics and graphic novels into a work titled Graphic Novel Collection of Liu Cixin’s Classics, which contains the novel Ball Lightning and his other novellas and stories.
French publisher Guy Delcourt, founder of Groupe Delcourt. (PHOTO PROVIDED TO CHINA DAILY)
The first five titles will be published by China CITIC Press in March, followed by the French editions by Groupe Delcourt.
“It’s the first time my works have been adapted into a comic series. The series includes some familiar works, like The Wandering Earth and Ball Lightning. And it will be translated and published in at least eight countries,” Liu said in a video promoting the publications.
The Wandering Earth will be adapted by French screenwriter Christophe Bec and drawn by Italian artist Stefano Raffaele. The duo have been working together on comics such as Promethe and Olympus Mons since 2007.
French artist Thierry Robin is now in Shanghai and working on Ball Lightning. He has published the four-volume Rouge de Chine with Groupe Delcourt based on previous trips he made to China. His works include Petit Pere Noel (The Little Santa) and La Mort de Staline (The Death of Stalin). Robin is due to publish another historical epic based on Ming Dynasty (1368-1644) war stories.
The project will span three years and try to seek ways to convey Chinese people’s imagination, emotions and values through the international medium of comics.
French artist Thierry Robin. (PHOTO PROVIDED TO CHINA DAILY)
Guy Delcourt, 61, started Groupe Delcourt when he was 28 years old. He told China Daily during his first visit to China that he is enthusiastic about the project for many reasons.
“It’s an ambitious project with good-quality stories. It’s an international project that is unified in writing and diversified in terms of artwork,” Delcourt said.
“Liu Cixin is an undiscovered genius in France. I see great possibilities for him.”
Delcourt said science fiction is the strongest genre in his field, with 9,500 comic books or graphic novels being published since 1986, including 600 new titles annually, such as The Walking Dead and Little Vampires.
A fan of the Shaw Brothers Studio movies known for their kung fu fights and historical epics, he is attracted to stories about the detective Di Renjie from the Tang Dynasty (618-907). At the age of 7, Delcourt’s parents accidentally took him to watch a Frankenstein film which opened a new door for Delcourt.
Raised in the 1960s in northern France, Delcourt said he grew up wanting to be part of something different from the culture of the previous generations. He started collecting comic books in the 1970s. He went to business school, worked as a financial analyst in Los Angeles and returned to France as a journalist. He set up a publishing company specializing in comics as a “means to an end”, because he always wanted to edit comic books.
“Comics are an excellent way to discover the world, as they are a form of language where you can do anything you want,” he said.
A comic strip adapted from The Wandering Earth drawn by Italian artist Stefano Raffaele. (PHOTO PROVIDED TO CHINA DAILY)
His group has grown as comics have become more diverse in recent years, attracting wider audiences, especially female readers. He said Chinese society is dynamic and full of energy. “Hopefully, the Liu project will help us find more good artists and storytellers here, and attract more Chinese readers to international projects like this.”
Zhang Xiaoyu, 44, has spent 18 months turning Liu’s novella The Village Teacher into a 96-page comic book. The Chengdu-based comic artist told China Daily in a telephone interview that he took up the story because of its special connection to him. Zhang, a top Chinese comic creator, is known worldwide for works such as Crusades, Savage Highway and The Take-off.
Zhang graduated from college with a major in fine arts. He started illustrating comics in 1995 and became an art editor with Science Fiction World magazine, where many of Liu’s stories debuted. When The Village Teacher first appeared in the magazine, it was Zhang who created the illustrations for the story.
“The dual plotlines in the story present an imaginative world in which there is a huge contrast between the highly developed alien civilizations and an impoverished village on China’s Loess Plateau,” Zhang said. “But it’s hard to tell which one is the most disadvantaged.”
A comic strip adapted from Liu’s work Sea of Dreams by Argentinian artist Diego Horacio Coglitore. (PHOTO PROVIDED TO CHINA DAILY)
Zhang was touched and shocked by Liu’s depictions of the wisdom of teachers in a wider universal sense. Zhang understands the role of teachers in terms of progressing human understanding and civilization, because both his father and sister are teachers.
Zhang prepares each of his works by planning his sketches and designs like storyboards used in movies. He also reads and researches his subject, before moving on to use his “passion” through long hours of drawing.
“Both skills and language are important to my comics, and I hope each of my creations has a different style. Now, I’m pursuing more simplicity and less complexity in my visual presentations,” he added.
Chinese traditional art has been an important inspiration for him and he is working on a comic series entitled The Twin Lotuses.
Graphic Novel Collection of Liu Cixin’s Classics will be published in print and digital forms, and made into audio books and online lectures. Related cultural products will also be produced.
HONG KONG NEWS | <urn:uuid:e60b93c4-496a-47fd-824b-da1798e379b3> | CC-MAIN-2022-33 | https://www.chinadailyhk.com/articles/137/103/105/1578283284369.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.960488 | 1,617 | 1.710938 | 2 |
For this Manfred there are 9718 different names on Yasni.
Most common last names for Manfred are: Speck, Bartz
In the ranking of the most common first names Manfred is on position 722.
During the last seven days Manfred was searched for 72 times.
Meaning of "Manfred"
Male first name (German, English): Manfred, Old High (two-part name); man = the man; Fridu = peace, protection, security, old German two-part name, known by the Hohenstaufen King Manfred of Sicily (13th century) | <urn:uuid:6e71ab57-804f-4b62-a7be-8b856610c2da> | CC-MAIN-2022-33 | http://www.yasni.com/manfred/forename+directory | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.911479 | 129 | 2.390625 | 2 |
On September 21, 1942, the U.S. B-29 Superfortress makes its debut flight in Seattle, Washington. It was the largest bomber used in the war by any nation.
The B-29 was conceived in 1939 by Gen. Hap Arnold, who was afraid a German victory in Europe would mean the United States would be devoid of bases on the eastern side of the Atlantic from which to counterattack. A plane was needed that would travel faster, farther, and higher than any then available, so Boeing set to creating the four-engine heavy bomber. The plane was extraordinary, able to carry loads almost equal to its own weight at altitudes of 30,000 to 40,000 feet. It also sported the first radar bombing system of any U.S. bomber.
The Superfortress made its test run over the continental United States on September 21, but would not make its bombing-run debut until June 5, 1944, against Bangkok, in preparation for the Allied liberation of Burma from Japanese hands. A little more than a week later, the B-29 made its first run against the Japanese mainland. On June 14, 60 B-29s based in Chengtu, China, bombed an iron and steel works factory on Honshu Island. While the raid was less than successful, it proved to be a morale booster to Americans, who were now on the offensive.
Meanwhile, the Marianas Islands in the South Pacific were being recaptured by the United States, primarily to provide air bases for their new B-29s—a perfect position from which to strike the Japanese mainland on a consistent basis. Once the bases were ready, the B-29s were employed in a long series of bombing raids against Tokyo. Although capable of precision bombing at high altitudes, the Superfortresses began dropping incendiary devices from a mere 5,000 feet, firebombing the Japanese capital in an attempt to break the will of the Axis power. One raid, in March 1945, killed more than 80,000 people. But the B-29's most lethal missions would come in August, as it was the only plane capable of delivering a 10,000-pound bomb—the atomic bomb. The Enola Gay and the Bock’s Car took off from the Marianas, on August 6 and 9, respectively, and flew into history.
READ MORE: Atomic Bomb History | <urn:uuid:8aa85559-23d2-4db8-ae2c-5f162ffda27c> | CC-MAIN-2022-33 | http://qa.history.com/this-day-in-history/the-superfortress-takes-flight | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.979853 | 488 | 3.984375 | 4 |
- Testosterone should not be considered a contraceptive. Testosterone may lead to amenorrhea and cessation of ovulation. However, although testosterone may reduce fertility, fertilization is possible despite prior or active use of testosterone and while amenorrheic from testosterone use.
- Testosterone is not currently recommended during pregnancy owing to possible irreversible fetal androgenic effects. An optimal interval between discontinuing testosterone and conceiving is unknown at this time.
- Although transgender and gender-diverse people previously on testosterone may adjust well to pregnancy, lack of testosterone use during fertilization and pregnancy may lead to or exacerbate gender dysphoria.
- Testosterone may be excreted in small quantities in human milk and may affect milk production. Currently, it is not recommended to use testosterone while chestfeeding, until more information is known about the effects of testosterone use on human milk.
Pregnancy in transgender men and other gender-diverse people who were assigned female sex at birth is an experience that has gained visibility in medical literature over the past decade.1–3 Gender-affirming treatment for transgender and gender-diverse people may include psychosocial support, hormone therapy, surgery, and other interventions aimed at aligning their bodies and daily physical experiences with their gender identities.4,5 Common gender-affirming treatments for transgender people include testosterone, chest binding, and masculinizing chest surgery.5 Although some gender-affirming treatments such as hysterectomy or oophorectomy eliminate fertility, transgender men may retain or desire reproductive capacity, even in the case of prior testosterone use.2 Studies indicate that transgender people have experienced pregnancy after undergoing gender-affirming processes and treatments (be it social, medical, or surgical), and some desire future pregnancy.3,6,7 Only 8% of transgender people who were assigned female sex at birth have undergone hysterectomy, many engage in sexual activity that could result in pregnancy, and there is evidence to support that there is an unmet contraceptive need in this community.6,8,9 Studies indicate that transgender people have experienced intended and unintended pregnancy after undergoing gender-affirming processes and treatments, and many desire future pregnancy and parenthood at different ages and stages of transition.3,7,10,11 For transgender and gender-diverse people who desire pregnancy, there is little clinical guidance for fertilization and prenatal, intrapartum, and postpartum care.
Given the dearth of perinatal guidance for transgender and gender-diverse people, we share our experience caring for a transgender man during his pregnancy. With the goal of creating an inclusive, compassionate, and equitable health care experience for him and his partner and other gender-diverse people, the team worked in collaboration with multiple stakeholders throughout the health care system to create new systems and transform existing systems to assure patient-centered care.
The patient is a 20-year-old healthy transgender man who initiated gender-affirming testosterone therapy with his primary care physician 5 months before pregnancy. Before starting testosterone therapy, he was clear that he desired the option of future pregnancy and had not undergone any other gender-affirming medical or surgical treatments. He was counseled on contraceptive and fertility-preservation options and the risks and benefits of testosterone therapy. His gender nonbinary partner was assigned male sex at birth and was living with human immunodeficiency virus (HIV). They received standard care for a serodifferent couple during pregnancy, including the use of preexposure prophylaxis for the patient as well as coordination and support for his partner to maintain a consistently undetectable HIV viral load to reduce the risk of sexual HIV transmission within the couple.
The patient's primary care physician sought advice on testosterone use in pregnancy through consultation with TransLine,12 an expert clinical consultation service, which recommended stopping testosterone before fertilization given the potential androgenic effects of testosterone on a developing fetus. After consultation, the patient subsequently decided to discontinue testosterone therapy while attempting pregnancy. Two months after discontinuing testosterone therapy, the patient achieved pregnancy through penis-in-vagina intercourse. He was referred to San Francisco General Hospital's multidisciplinary perinatal HIV care team for prenatal care at 7 weeks of gestation.
During prenatal visits, the patient was asked preferred terminology for anatomic parts and functions (some transgender men prefer terms such as frontal pelvic opening) (Klein A, Golub SA. Sexual healthcare experiences and needs among a national sample of transgender men and non-binary individuals [abstract]. Ann Behav Med 2018;52:S614.)13; his preference was medical terminology (eg, vagina, uterus). Individual health care provider and systems changes were undertaken to consistently use the patient's correct pronouns—from registration, to intake with medical assistants, to health care provider visits. We notified staff and health care providers of the patient's appropriate gender and pronouns by posting a “clinical alert” in the patient's electronic medical record (EMR) chart. This information was also communicated to the entire care team during preclinic huddles.
Trainings on culturally appropriate care provision for transgender patients were conducted with prenatal clinic and labor and delivery clinical staff. Ultrasonographers were trained to use gender-neutral language and techniques to assure an inclusive and welcoming experience during ultrasound examinations for this patient and all patients who follow. A social worker provided intensive case management and psychosocial support, including assisting in aligning the patient’s identity documents with his affirmed gender, and confirmed with the hospital’s birth certificate office that the patient and his partner could be listed as coparents, including their preferred names and gender identities. Attempts to change the patient's EMR to reflect his gender identity were unsuccessful as a result of technical limitations of distinguishing sex and gender within the EMR system and were further complicated by the inability of the EMR system to register an admission of a nonfemale patient to the labor and delivery floor.
At the end of the second trimester, the patient and his care team began proactively discussing future fertility, contraception, and options for resuming gender-affirming testosterone therapy postpartum. He expressed a desire to restart testosterone therapy once he finished chestfeeding (chestfeeding is common gender-neutral term used in the transgender community rather than breastfeeding) and was unsure whether or when he might desire pregnancy again. Given that testosterone therapy likely significantly reduces, but does not eliminate, the chance of pregnancy,14 he decided on a postpartum etonogestrel subcutaneous implant for contraception. Before delivery, the patient and his partner were offered a private tour of the labor and delivery unit as well as labor and chestfeeding preparation workshops by a health educator who had been trained in transgender-inclusive health education.
The patient had an uncomplicated labor and vaginal delivery after spontaneous onset of labor at 40 weeks of gestation. The healthy male newborn had no signs of androgenizing effects from in utero testosterone exposure. The patient's postpartum course was uneventful. He initiated successful chestfeeding immediately postpartum with support from lactation consultants and nursing staff. The patient and infant attended joint postpartum and well-child visits at a family-oriented primary care clinic affiliated with the county hospital with the family physician who also served as his prenatal care provider. At approximately 12 weeks postpartum, the patient discontinued chestfeeding and resumed testosterone therapy.
Many transgender and gender-diverse people have the capacity to become pregnant either through sexual intercourse or assistive reproductive interventions.2,6 This case highlights the utility of engaging in discussions pertaining to reproductive autonomy and taking a comprehensive sexual history, including desire for pregnancy and pregnancy prevention, to guide appropriate medical interventions and motivate necessary system changes as part of primary care and supporting gender affirmation.
This case also highlights the need for supporting care providers to access and use information regarding the effect of testosterone on ability to conceive, maintain a healthy pregnancy, have healthy offspring, and chestfeed successfully. In a cross-sectional study of 41 transgender men who became pregnant, 61% reported using testosterone before becoming pregnant and 20% became pregnant while still amenorrheic from testosterone use.2 Transgender and gender-diverse patients who retain a uterus and ovaries may maintain reproductive capacity after initiating testosterone, and testosterone does not always reliably prevent unintended pregnancy.2 There are no well-powered human studies examining the use of exogenous testosterone in pregnancy. It is generally theorized that testosterone may androgenize the fetus based on limited animal models.15 A small study of 147 cisgender women found that increases in levels of endogenous testosterone were negatively correlated to fetal length and weight.16 Lastly, very limited data suggest that increased levels of endogenous testosterone production have been associated with delayed and decreased milk production17,18; though a case study found no adverse effects at 5 months of age on an infant who was breastfed by a mother who received a low-dose (100 mg) subcutaneous testosterone pellet while breastfeeding.19 Currently there are insufficient safety data to recommend the use of testosterone during pregnancy and chestfeeding, and the drug is classified as pregnancy category X by the U.S. Food and Drug Administration.20
Transgender and gender-diverse individuals routinely face stigma and discrimination navigating the health care system, including gender insensitivity, denial of services, and verbal abuse in medical visits.21 In a national survey, 23% of respondents reported avoiding seeking care owing to fear of mistreatment as a transgender person.21 Prenatal care for transgender men may be further complicated by cultural beliefs of pregnancy as a “woman-only” experience. Feelings of gender dysphoria may be pronounced in the absence of testosterone use during the fertilization and peripartum period.15 Practices to mitigate stigma and promote gender affirmation throughout the perinatal process include staff trainings; query for and use of appropriate names and pronouns in patient interactions and in all documentation, including the EMR and birth certificate; and gender-neutral, transgender-inclusive language for patient care spaces. Please refer to Table 1 for a summary of recommendations.
1. Obedin-Maliver J, Makadon HJ. Transgender men and pregnancy. Obstet Med 2016;9:4–8.
2. Light AD, Obedin-Maliver J, Sevelius JM, Kerns JL. Transgender men who experienced pregnancy after female-to-male gender transitioning. Obstet Gynecol 2014;124:1120–7.
3. Ellis SA, Wojnar DM, Pettinato M. Conception, pregnancy, and birth experiences of male and gender variant gestational parents: it’s how we could have a family. J Midwifery Womens Health 2015;60:62–9.
4. Center of Excellence for Transgender Health. In: Deutsch MB, editor. Guidelines for the primary and gender-affirming care of transgender and gender nonbinary people. San Francisco, CA: University of California; 2016:199.
5. Reisner SL, Radix A, Deutsch MB. Integrated and gender-affirming transgender clinical care and research. J Acquir Immune Defic Syndr 2016;72(suppl 3):S235–42.
6. Cipres D, Seidman D, Cloniger C, Nova C, O’Shea A, Obedin-Maliver J. Contraceptive use and pregnancy intentions among transgender men presenting to a clinic for sex workers and their families in San Francisco. Contraception 2017;95:186–9.
7. Hoffkling A, Obedin-Maliver J, Sevelius J. From erasure to opportunity: a qualitative study of the experiences of transgender men around pregnancy and recommendations for providers. BMC Pregnancy Childbirth 2017;17(suppl 2):332.
8. Scheim AI, Bauer GR. Sex and gender diversity among transgender persons in Ontario, Canada: results from a respondent-driven sampling survey. J Sex Res 2014;52:1–14.
9. James SE, Herman JL, Rankin S, Keisling M, Mottet L, Anafi M. The report of the 2015 U.S. transgender survey. Available at: https://transequality.org/sites/default/files/docs/usts/USTS-Full-Report-Dec17.pdf
. Retrieved January 21, 2019.
10. Wierckx K, Van Caenegem E, Pennings G, Elaut E, Dedecker D, Van de Peer F, et al. Reproductive wish in transsexual men. Hum Reprod 2012;27:483–7.
11. Chen D, Matson M, Macapagal K, Johnson EK, Rosoklija I, Finlayson C, et al. Attitudes toward fertility and reproductive health among transgender and gender-nonconforming adolescents. J Adolesc Health 2018;63:62–8.
12. TransLine: Transgender Medical Consultation Service. Available at: https://transline.zendesk.com/hc/en-us
. Retrieved June 10, 2019.
13. Potter J, Peitzmeier SM, Bernstein I, Reisner SL, Alizaga NM, Agénor M, et al. Cervical cancer screening for patients on the female-to-male spectrum: a narrative review and guide for clinicians. J Gen Intern Med 2015;30:1857–64.
14. Light A, Wang LF, Zeymo A, Gomez-Lobo V. Family planning and contraception use in transgender men. Contraception 2018;98:266–9.
15. Dean A, Smith LB, Macpherson S, Sharpe RM. The effect of dihydrotestosterone exposure during or prior to the masculinization programming window on reproductive development in male and female rats. Int J Androl 2012;35:330–9.
16. Carlsen SM, Jacobsen G, Romundstad P. Maternal testosterone levels during pregnancy are associated with offspring size at birth. Eur J Endocrinol 2006;155:365–70.
17. Betzold CM, Hoover KL, Snyder. Delayed lactogenesis II: a comparison of four cases. J Midwifery Womens Health 2004;49:132–7.
18. Hoover KL, Barbalinardo LH, Platia MP. Delayed lactogenesis II secondary to gestational ovarian theca lutein cysts in two normal singleton pregnancies. J Hum Lact 2002;18:264–8.
19. Glaser RL, Newman M, Parsons M, Zava D, Glaser-Garbrick D. Safety of maternal testosterone therapy during breast feeding. Int J Pharm Compd 2009;13:314–7.
20. National Library of Medicine. LactMed: a TOXNET database: testosterone. Bethesda (MD): National Institutes of Health; 2016. Available at: https://www.ncbi.nlm.nih.gov/books/NBK501721/
. Retrieved September 23, 2019.
21. Kosenko K, Rintamaki L, Raney S, Maness K. Transgender patient perceptions of stigma in health care contexts. Med Care 2013;51:819–22.
22. Transgender Law Center. ID please: a guide to changing California & federal identity documents to match your gender identity. Available at: http://transgenderlawcenter.org/wp-content/uploads/2012/05/ID_Please_FINAL_7.25.14.pdf
. Retrieved November 10, 2018.
23. Stroumsa D, Wu JP. Welcoming transgender and nonbinary patients: expanding the language of “women’s health.” Am J Obstet Gynecol 2018;219:585.e1–5.
24. Fenway Institute. Available at: https://fenwayhealth.org/the-fenway-institute/
. Retrieved November 10, 2018.
25. Association of American Medical Colleges. Sexual and Gender Minority Health Resources. AAMC videos and resources. Available at: https://www.aamc.org/initiatives/diversity/431388/videos.html
. Retrieved November 10, 2018.
26. Birthing and breast or chestfeeding trans people and allies. Available at: https://www.facebook.com/groups/TransReproductiveSupport/
. Retrieved November 10, 2018. | <urn:uuid:5c0c11e3-b3e8-4430-b7d1-12cd829276dc> | CC-MAIN-2022-33 | https://journals.lww.com/greenjournal/Fulltext/2019/11000/Providing_Patient_Centered_Perinatal_Care_for.9.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.906011 | 3,432 | 2.875 | 3 |
400 photos. 11 minutes. That’s what it took to create this time-lapse of the Earth and stars as the International Space Station over Namibia toward the Red Sea. NASA astronaut Christina Koch captured these images.Continue reading “Time-lapse Captured from the International Space Station”
Africa is home to 7 out of 10 of the world’s fastest-growing economies. It’s population is also the “youngest” in the world, with 50% of the population being 19 years old or younger. And amongst these young people are scores of innovators and entrepreneurs who are looking to bring homegrown innovation to their continent and share it with the outside world.
Nowhere is this more apparent than with the #Africa2Moon Mission, a crowdfunded campaign that aims to send a lander or orbiter to the Moon in the coming years.
Spearheaded by the Foundation for Space Development – a non-profit organization headquartered in Capetown, South Africa – the goal of this project is to fund the development of a robotic craft that will either land on or establish orbit around the Moon. Once there, it will transmit video images back to Earth, and then distribute them via the internet into classrooms all across Africa.
In so doing, the project’s founders and participants hope to help the current generation of Africans realize their own potential. Or, as it says on their website: “The #Africa2Moon Mission will inspire the youth of Africa to believe that ‘We Can Reach for the Moon’ by really reaching for the moon!”
Through their crowdfunding and a social media campaign (Twitter hashtag #Africa2Moon) they hope to raise a minimum of $150,000 for Phase I, which will consist of developing the mission concept and associated feasibility study. This mission concept will be developed collaboratively by experts assembled from African universities and industries, as well as international space experts, all under the leadership of the Mission Administrator – Professor Martinez.
Martinez is a veteran when it comes to space affairs. In addition to being the convener for the space studies program at the University of Cape Town, he is also the Chairman of the South African Council for Space Affairs (the national regulatory body for space activities in South Africa). He is joined by Jonathan Weltman, the Project Administrator, who is both an aeronautical engineer and the current CEO of the Foundation for Space Development.
Phase I is planned to run from Jan to Nov 2015 and will be the starting point for Phase II of #Africa2Moon, which will be a detailed mission design. At this point, the #Africa2Moon mission planners and engineering team will determine precisely what will be needed to see it through to completion and to reach the Moon.
Beyond inspiring young minds, the program also aims to promote education in the four major fields of Science, Technology, Engineering, and Mathematics (aka STEM). Towards this end, they have pledged to commit 25% of all the funds they raise towards STEM education through a series of #Africa2Moon workshops for educators and students. In addition, numerous public engagement activities will be mounted in partnership with other groups committed to STEM education, science awareness, and outreach.
Africa is so often thought of as a land in turmoil – a place that is perennially plagued by ethnic violence, dictators, disease, drought, and famine. This popular misconception belies very positive facts about the growing economy of world’s second-largest and second-most populous continent.
That being said, all those working on the #Africa2Moon project hope it will enable future generations of Africans to bridge the humanitarian and economic divide and end Africa’s financial dependence on the rest of the world. It is also hoped that the mission will provide a platform for one or more scientific experiments, contribute to humankind’s knowledge of the moon, and form part of Africa’s contribution to global space exploration activities.
The project’s current list of supporters include the SpaceLab at the University of Cape Town, The South African Space Association, Women in Aerospace Africa, The Cape Town Science Centre, Space Commercial Services Group, Space Advisory Company, and the Space Engineering Academy. They have also launched a seed-funding campaign drive through its partnership with the UN Foundation’s #GivingTuesday initiative.
Further Reading: Foundation for Space Development
Remove All Ads on Universe Today
Join our Patreon for as little as $3!
Get the ad-free experience for life
In 1986, Halley’s Comet captivated a teenager living in a small South African town. Curious about what his nation does in astronomy, he scoured books at the local library and asked questions of his teachers.
It was, however, a tough time to learn about it. Under apartheid, African science was seen as “nothing of merit” until the Westerners colonized the continent two centuries ago.
This tale, told in African Cosmos: Stellar Arts, portrays part of the difficulty of reporting on African science. Turn back to when Egyptians built the pyramids, and you can understand that astronomy goes back thousands of years on the continent. Yet, Africa is under-represented in discussions about popular astronomy. Language, scattered cultures, and distance from the Western world are all barriers.
Creating this volume must have been daunting for Christine Mullen Kreamer and her collaborators, who gathered 20 essays about African astronomy.
But you can see for yourself, as this book is available for free on iPad, and you can download it here.
Africa is a large continent with humans living anywhere from crowded cities to sparse grassland. There are at least 3,000 ethnic groups on that landmass, according to Baylor University, with many of these cultures having separate views in astronomical culture and history.
It’s hard to gather all that information into a single book, but the Smithsonian National Museum of African Art does its best.
The book opens with lengthy explanations of the Egyptian and Babylonian contributions to astronomy. The Babylonians, for example, observed the strange backwards motion of Mars when our planet “catches up” in our smaller orbit to Mars’ larger one. The Egyptians used the sky to develop a 12-month calendar to track important feasts and the time for harvests.
This information is readily accessible elsewhere, but the art makes it stand out. Flip the pages, and you’ll gaze at period art, maps and even astronomical tables that were on display at the museum for a 2012 exhibition.
Perhaps the most fascinating historical chapter is Cosmic Africa, which traces the development of a film of the same title. Anne Rogers and her film team did field research in seven countries to narrow down which tribes to focus on. Eventually, they settled on the Ju/’hoansi in Namibia, the Dogon in Mali and (through archaeology) the area of Nabta Playa in Egypt.
There aren’t many explanations of these peoples in the historical record, so it’s neat to see how their culture is shaped by the stars and nebulas they see. Adding to the interest, the team deliberately visited the Ju/’hoansi during a partial solar eclipse to learn how the tribe reacts to more rare astronomical events.
You’ll see a lot of tribes in this large volume, and will also get hints of the latest art and science surrounding African astronomy. The most current astronomical information is sparse, perhaps out of recognition that the information would go out of date very quickly. It might have been interesting nevertheless to include more information about the Square Kilometer Array, the world’s largest telescope, that is under development in both Africa and Australia.
For more information on the book, check out the online exhibition from the Smithsonian.
This latest portrait of Earth from NASA’s Suomi NPP satellite puts the icy Arctic in the center, showing the ice and clouds that cover our planet’s northern pole. The image you see here was created from data acquired during fifteen orbits of Earth.
In January of this year Suomi NPP images of Earth were used to create an amazing “Blue Marble” image that spread like wildfire across the internet, becoming one of the latest “definitive” images of our planet. Subsequent images have been released by the team at Goddard Space Flight Center, each revealing a different perspective of Earth.
See a full-sized version of the image above here.
NASA launched the National Polar-orbiting Operational Environmental Satellite System Preparatory Project (or NPP) on October 28, 2011 from Vandenberg Air Force Base. On Jan. 24, NPP was renamed Suomi National Polar-orbiting Partnership, or Suomi NPP, in honor of the late Verner E. Suomi. It’s the first satellite designed to collect data to improve short-term weather forecasts and increase understanding of long-term climate change.
Suomi NPP orbits the Earth about 14 times each day and observes nearly the entire surface of the planet.
Image credit: NASA/GSFC/Suomi NPP
Here’s a quick but lovely little gem: a time-lapse video taken from the ISS as it passed above central Africa, Madagascar and the southern Indian Ocean on December 29, 2011. The nighttime flyover shows numerous lightning storms and the thin band of our atmosphere, with a layer of airglow above, set against a stunning backdrop of the Milky Way and a barely-visible Comet Lovejoy, just two weeks after its close encounter with the Sun.
This video was made from photos taken by Expedition 30 astronauts. The photos were compiled at Johnson Space Center and uploaded to The Gateway to Astronaut Photography of Earth, an excellent database of… well, of astronauts’ photos of Earth.
The site’s description of this particular video states:
This video was taken by the crew of Expedition 30 on board the International Space Station. The sequence of shots was taken December 29, 2011 from 20:55:05 to 21:14:09 GMT, on a pass from over central Africa, near southeast Niger, to the South Indian Ocean, southeast of Madagascar. The complete pass is over southern Africa to the ocean, focusing on the lightning flashes from local storms and the Milky Way rising over the horizon. The Milky Way can be spotted as a hazy band of white light at the beginning of the video. The pass continues southeast toward the Mozambique Channel and Madagascar. The Lovejoy Comet can be seen very faintly near the Milky Way. The pass ends as the sun is rising over the dark ocean.
There are lots more time-lapse videos on the Gateway as well, updated periodically. Check them out here.
Video courtesy of the Image Science & Analysis Laboratory, NASA Johnson Space Center. | <urn:uuid:5319c315-ceaa-4007-a112-35e0dc8d39da> | CC-MAIN-2022-33 | https://www.universetoday.com/tag/africa/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.935491 | 2,238 | 2.625 | 3 |
There are loads of websites and videos online about cycling; bike maintenance, safety, buying a bike, etc. So instead of reinventing the wheel, we have pulled together some of the ones we think are most useful and relevant to cyclists in Northland.
Why ride a bike?
It makes you feel good, it is good for your health and wellbeing, it is environmentally friendly, it is fun, it takes you places you may not otherwise go…. The list is endless. But if you need some more convincing check out these articles below.
- Life changing benefits of cycling every day
- Top 40 reasons why you should ride a bike
- Why ride a bicycle? Ten reasons and counting
Buying a bike
Obviously, what sort of bike you buy will depend on what you want to use it for. Start with your local bike shop, go and meet them and have a chat about what you want to do, how much you want to spend, etc. You may want to visit a few shops if you have them, as most bike shops will be associated with set brands. Do you want to consider electric?
Here are some useful websites to help
- Things to consider when buying a bike (NZTA)
- Consumer buying guide to electric bikes
- The complete guide to buying a bicycle (bicycling.com)
- Best bike: our buyer’s guide to which bicycle type you should buy in 2020 (bike radar)
How to teach your kid to ride a bike?
There are lots of snippets of advice and videos on how you should teach your kids to ride online. What ever you do it needs to be fun and safe. Be realistic about how long you should spend at each ‘lesson’. You want your kids to embrace riding for life. Make sure they are on the right size bike and they must have a helmet that fits. And once they are riding ok plan some biking adventures. Having a friend along can often help make the harder bits more fun, (and little boosters in the way of jet planes always help). Lastly make sure you are enjoying it too!
Fitting a helmet
Some simple diagrams and explanations can be found here
These kids understand the importance of wearing a helmet, check out this very cool video.
If you are going to be riding more you need to understand the rules for cyclists be it on the road, mountain bike trails, shared paths etc. There is an official New Zealand code for cyclists which covers the rules for cyclists on the road, including the required equipment, rules and responsibilities for the cyclist.
If you have not ridden before or have not ridden for some time you may want to complete a cycle skills workshop. These are aimed at improving your confidence and competence riding on the road. Grab a couple of friends and spend a few hours with a cycle instructor to brush up on your cycle skills. It will only cost you your time, will improve your riding and be fun. Check out the details about the programme here or contact Bike Northland directly.
Mountain bikers too have a code; Respect the track, respect others and respect the rules. DOC have a code for riding on trails within DOC land. Good trail etiquette goes a long way to ensuring all trail users are safe, and improving the chances of more trails being made available to mountain biking in the future.
Looking after your bike
So you have bought yourself a bike. Now you need to look after it to ensure that it is safe to ride, and continues to operate for as long as you want it to. You should carry out a basic A, B, C check before every ride. This page from Waka Kotahi/NZTA has some good basic guidelines and videos.
Where to ride
Once you have your bike, helmet, and are confident to get riding check out where to ride in Whangarei and Northland. There are also loads of trails, (primarily for mountain bikers), on trailforks.com, a free app you can download.
Commuting to work is a fantastic way to avoid traffic queues, maintain health and well-being, its good for the environment, and it makes you feel great. There are some great little tips and guides on the Bike Auckland website Biking to work | <urn:uuid:55055967-8d0f-45c3-b624-132465d6e611> | CC-MAIN-2022-33 | https://bikenorthland.co.nz/knowledge-hub/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.953833 | 878 | 2.515625 | 3 |
Side-band Inequivalence: The Unexpected Symmetry Breaking.
In this letter, the recently predicted Side-band Inequivalence in quantum optomechanics is analyzed to the full order. It is shown that not only frequency shifts due to blue- and red-scattered (Stokes and anti-Stokes) mechanical side-bands are counter-intuitively inequal, but also there exists a maximum attainable side-band inequivalence which may be expected at an optimal operation point. The mathematical method employed here is a combination of operator algebra equipped with harmonic balance, which allows a clear understanding of the associated nonlinear process. This reveals the existence of three distinct operation regimes in terms of pump power or intracavity photon number, two of which have immeasurably small side-band inequivalence. Examples from Raman scattering data of various materials unambiguously confirms existence of a previously unnoticed side-band inequivalence.
Publisher URL: http://arxiv.org/abs/1811.00939 | <urn:uuid:1373fe5d-6cfb-4f0a-a038-f03588db07b5> | CC-MAIN-2022-33 | https://www.researcher-app.com/paper/1951900 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.900167 | 232 | 1.671875 | 2 |
by SAVIOUS KWINIKA
JOHANNESBURG – SOUTH Africa’s participation in the Fourth Industrial Revolution (4IR) is potentially under threat as local information and communications technology (ICT) service providers shun the latest version of the Internet Protocol (IPv6).
This is according to South Africa’s Internet Service Providers’ Association (ISPA), which noted IPv4 addresses had already run out in every region other than Africa.
Africa is projected to run out of addresses in March 2020.
IPSA stated while there were technical workarounds which could help to mitigate potential adverse consequences, there was ultimately no alternative but to adopt IPv6 across the board if South Africa was going to benefit from technological advances such as 5G, the Internet of Things (IoT) and smart cities.
Alarmingly, however, figures published by Google reflect South Africa’s IPv6 adoption at 0,4 percent.
This is substantially behind such as Zimbabwe (6,01 percent) and Gabon (14,38 percent).
South Africa’s adoption is well below the global average of 29,44 percent.
Its adoption is the lowest in the Brazil, Russia, China, India and South Africa (BRICS) bloc.
“IPv6 compliance needs to come out of the basement and into the light so that it can be made SA’s Internet issue of the day until it is resolved,” said Andre van der Walt, ISPA chairman.
“It’s that serious because we cannot let the ICTs that should be the vehicles for positive socioeconomic change slip away due to a simple nuts and bolts compliance issue,” he added.
According to ISPA, World IPv6 Launch Day on June 6, 2012 highlighted the need for network operators, ISPs, equipment manufacturers and others to help keep the worldwide web accessible to end users.
Van der Walt lauded AfriNIC, the regional Internet registry, for running a comprehensive series of planning and transition workshops to ensure local network engineers and systems administrators were comfortable implementing and managing IPv6 networks.
“AfriNIC’s IPv6 awareness and capacity-building initiatives are to be applauded as they specifically aim to train an impressive 600 network engineers per year,” van der Walt said.
IPv6 is the most recent version of the IP, the communications protocol that provides an identification and location system for computers on networks and routes traffic across the internet.
The Internet Engineering Task Force developed IPv6 to deal with the long-anticipated problem of IPv4 address exhaustion.
– CAJ News | <urn:uuid:6a1b9e3a-4e6f-4aca-b099-49c456c3b6a7> | CC-MAIN-2022-33 | http://www.mpguardian.co.za/2019/10/30/lax-operators-threaten-south-africas-4ir-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.932047 | 545 | 2 | 2 |
The Ministry of Commerce, Industry and Investment Promotion (MoCIIP) has invited business owners to invest in waste recycling activities to enhance the local added value in the Sultanate of Oman.
According to the statistics available at the MoCIIP the number of waste exports for the years 2020 and 2021 reached more than 230,000, where paper waste topped the highest percentage with 59, then came copper waste by 24%, and iron waste reached 9%. As for the Sultanate’s imports of waste for the same period, more than 680,000 tonnes, non-iron waste came in first place by 57%, then copper waste by 34%, and in third place was plastic waste by 6%,” Times of Oman states.
Engineer Sami bin Salem Al Sahib, Director General of Industry at the MoCIIP said: “Based on the available statistical data, the Sultanate is ready to attract many industries related to recycling.”
The ministry organized at the Oman Chamber of Commerce and Industry a workshop on regulating the export of waste, to shed light on the challenges facing the industrial sector and the proposed initiatives to solve these challenges regarding the export and import of industrial waste and its recycling, under the patronage of His Excellency Dr. Saleh Bin Saeed Al-Masn, Undersecretary of the Ministry of Commerce, Industry and Investment Promotion for Commerce and Industry, in the presence of a number of concerned authorities and participation from Bee’ah Company, Environment Authority and the Royal Oman Police.
The workshop aimed to discuss how to localize industries based on waste recycling, and the decision of the Environment Authority regarding the presentation of fees for the export of waste. During the workshop, solutions to maximize the added value and ways to organize the export of waste to supplement the national economy and improve performance, efficiency and effectiveness levels.
Engineer Sami bin Salem Al Sahib, Director General of Industry at the Ministry of Commerce, Industry and Investment Promotion, stressed that recycling industries are among the most important projects that should receive attention from investors, as with the increase in environmental awareness and the measures taken by countries around the world to protect the environment and the rising costs of raw materials.
Al Sahib also indicated: “Oman Vision 2040 aims at economic diversification, including enhancing the contribution of the industrial sector to the GDP through the sustainability and development of existing industries and the creation of new investment opportunities in the industrial sector. To implement this goal, the General Directorate of Industry prepared the Industrial Strategy 2040. Which focused on 30 priority industrial sectors, including the recycling industries.” | <urn:uuid:cb0b418d-d180-4899-89df-e698948b7a8f> | CC-MAIN-2022-33 | https://ecolife.ae/oman-ministry-invites-business-owners-to-invest-in-waste-recycling-activities/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.928062 | 530 | 1.734375 | 2 |
It has been another educating year in my garden and kitchen. Now I’m back at the keyboard with the questions I’ve been mulling all summer.
If you’ve read HOW NOT TO DIE by Michael Greger, you are familiar with his Daily Dozen. If you are not familiar with his work, here is a link to an invaluable tool to help vegans make sure they get their daily nutrients.
After a year of eating a vegan diet, and eleven months of being cancer free, I’m pretty sure I’m vegan for life. The Daily Dozen has helped me stay on track, but I still have questions. And a new insight: No matter what eating lifestyle you subscribe to, you have to be flexible. The pandemic has made that perfectly clear.
No, I’m not eating animal products, except for an occasional spoonful of honey. But I’m able to get a B-12 shot twice a month. At my clinic, the nurse comes to the parking lot, checks my temperature and other vitals, and brings the shot to me. What if I didn’t have an accommodating healthcare provider? What if?
This morning, I made a decision. If I am ever in a place where I can’t get my bimonthly shot, I will choose to eat a boiled egg two or three times a week. B12 is a necessary nutrient, and meat eaters’ best defense. I won’t shame anyone’s choices. I just want to make good choices for myself.
If getting a shot is harder during a pandemic, so is stocking fresh produce. Lucky for me, I have a garden and so do my friends. We trade and share, so we’ve all had enough squash, okra, tomatoes, and cucumbers. Green beans were hard to come by, though, and no one had fresh lettuce. No cabbage, either! Cruciferous vegetables are hard to grow here. We’ve eaten well, but even if my day includes 15 servings of fruits and vegetables, I haven’t always hit every item on the Daily Dozen.
What if I sprout seeds to replace greens? Do broccoli sprouts count as greens or are they cruciferous? Are bean sprouts beans or greens?
Berries are another issue. I have Goji berries and blackberries in the back yard, but not enough to keep me through the summer, much less the year. And because the food chain has been broken in places, there were times this year when there were no frozen berries in the grocery store freezer case.
Do tomatoes count as berries? How about raisins?
How do you classify potatoes? Sure, they’re a root vegetable, but they are starchy. Is sweet corn a vegetable or a grain?
Maybe all I need to do is eat as many colors as I can and as many fruits and vegetables as I can grow or find close to home. Maybe I need to learn how to forage for wild greens. I know they’re out there because I pull them for my chickens.
Yeah, I know! A vegan with chickens and a whole lot of questions! | <urn:uuid:f4c4ed68-3e38-4217-91cc-e64ed5a4aca0> | CC-MAIN-2022-33 | https://apocalypsefarm.us/2020/10/14/vegan-questions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.961532 | 674 | 1.5 | 2 |
Isochronic Tones – Pulses of Sound!
‘Isochronic Tones’ are those single tones that are being turned on and off quickly; they’re designed to generate sharp, unique pulses of sound. According to the professional scientists, “They’re actually the proven form of brainwave entertainment technology…”
These days, these tones are the on-demand talk; they’re the hot-new thing, as people perceive that they’ve a vital role in the future technology, and the experts from all the faces of life (doctors and scientists) are relying on it to improve the levels of their facilitation.
Now, you may ask, “How do these tones work?”
Well, in a nutshell, Isochronic Tones stimulate the thalamus in your brain and impel it to produce same frequency as the tone. In the scientific term, it’s known as ‘frequency following response’. However, it’s not that simple either. Since, a human ear doesn’t respond to frequencies below about 20Hz and most brainwaves are between 0.1 and 30Hz.
For that reason, Isochronic Tones are made using audible frequencies and spaced out at precise intervals to induce the desired brainwave state. This is why, rather than spending an hour in questioning, opt for a reputable source of Isochronic tones, as these days a lot of faux experts are attempting to throw dust in the eyes of the consumers, and deceiving them with unreal tones, because it’s a complex thing, and people don’t comprehend it well.
Today’s research shows evidence of beneficial outcomes, for instance, anxiety reduction, and increased concentration. Therefore, these days, it’s an increasingly promising method that introduces ideal mental state for eradicating harmful issues.
Allow me to give you some examples…
A study of the 30 participants found that brain’s info. Processing speed and visual motor coordination increased 4% with the facilitation of Isochronic Tones. Next, the visual short-term memory and sequencing ability also elevated 2.2%. Besides, the arithmetic and number abilities were also boosted 2.1%. These aren’t the small percentages. If you assess them from a brain’s point of view, they bring significant changes in a human’s life.
In addition, believe it or not, the overall Attention/Focus improves 81%. This thing not only advances the quality of life, but also improved academic achievement, and assists a person to achieve higher goals – efficiently. With the help of Isochronic Tones, during a study, the university students made some significant progress in exams, and got higher marks too.
Is this just for the Attention, or Focus? No. There is a reduction in anxiety and stress too. The experts reveal that Isochronic Tones reduced the levels of anxiety 8 to 9 percent, and became one of the greatest reasons for recovering humans’ health.
From attention to stress, from emotional stability to mood support, from motivation to deep meditation, these tones are now writing the new chapters in the books of medical history.
Unlike other tones or beats, you don’t require wearing headphones, since the interference pattern creates outside of the brain. Therefore, it’s not necessary. However, if you want, you can wear them; there isn’t any obligation. Apart from this, in 1999, scientists discovered that the Isochronic Tones effects can be heightened further with visual entertainment. However, this requires special equipment (light and sound machines). | <urn:uuid:938136f2-6deb-4674-bc2e-c953ceb168b8> | CC-MAIN-2022-33 | https://www.unexplainablestore.com/blog/isochronic-tones/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.926066 | 767 | 2.34375 | 2 |
How does a Web page work? Well, the odds are you're sitting at your computer looking at this Web page through a browser. Most likely you're using a browser called Microsoft Internet Explorer, Google Chrome, Opera, Firefox, or Safari. A browser is a computer software program that can take you to different places on the Web by typing in the URL of a Web page and clicking "go" or "enter" on your keyboard. A browser also looks at the HTML tags on a site and translates those tags into what you're looking at now, a Web site. Different browsers interpret HTML tags a little differently, so what you see on one browser is not necessarily what you will see on another browser. Your browser asks the Web server of the URL you're trying to reach to send the information (Web site) that you requested. The Web server sends the information back to you and you see it on your browser.
It doesn't matter which browser you use, as long as you're happy with it. I use Opera, Internet Explorer, Firefox, Google Chrome and Safari. I view my site in all of the browsers to make sure it looks decent in every browser. My favorite browsers are Firefox and Chrome. I like Chrome because, for me, it's the fastest browser. I like Firefox because of the adblock feature, but sometimes when you remove the ads from a site, it looks strange. I don't like the other ones that much, especially Opera because it tends to be slow on my computer.
What is HTML? HTML (hypertext markup language) is the computer language that is used to create documents on the
Web. It can be kind of confusing to understand at first. HTML documents are text files that consist of HTML tags (which can place the text or images wherever you want to place them), and text you can place between the tags so that the text will show up on your page when you publish it on the WWW. Tags are instructions that tell your browser what to show on a Web page. They break up your document into basic sections. All tags start with a < (left bracket) and end with a > (right bracket). You can see my HTML code by right clicking on this site, and choosing view page source (depending on your browser).
What is a URL? URL stands for "uniform resource locator." It's the standard address that can take you to a document, or a specific place on a document, anywhere on the WWW. My URL is "http://www.lissaexplains.com."
What do I need to get started? You need these 4 things:
- Editor: an editor is basically just a place to type in your HTML code so that you can send the file to your Web host. This can be the editor that comes with your Web space. If you're using a Mac, Simpletext or TextEdit are good choices. Most free Web hosts come with an editor. You can also use a plain text editor, I use Notepad for Windows. There is a complete tutorial for using Notepad here. There are other, more complicated editors that you can use that will basically do everything for you, and you don't need to know any HTML at all. You just drag the images onto your page, and the editor writes the code for you. I really don't recommend these. You can build a Web page very quickly with a "drag and drop" editor, but you learn nothing about HTML, and when you want to add something more complicated to your page, you won't even know how to get started. I would recommend sticking with the advanced editors of the free Web hosts, or using Notepad to write your HTML.
If you would like to see how HTML editors work, you can try my free online HTML editor. It's a fun tool that shows you how plain text can be converted into HTML code.
- Web space: you need this so that other people can view your Web page. There are several free Web space providers listed here. Choosing a Web host is very important. Some hosts have large pop-up ads that you have to deal with, and the editors that come with some Web hosts are not very flexible when it comes to building your page. The most important thing you need to look at when trying to find a Web host is the editor that comes with it. You need to be able to write straight HMTL, a lot of Web hosts don't provide editors that do this. I have heard a lot of complaints about various hosts, and the free host that most people find very reliable is Bravenet. They have good support for their Web services, and they respond pretty quickly to problems. They have been around for years providing reliable, free hosting. Bravenet also has many free tools for you to use, such as guestbooks and polls. Choosing the right host first will save you a lot of problems in the long run, because it takes a while to transfer Web sites from one host to another if you're not happy with your first host. Choose carefully!!!
- Graphics: it's nice to add graphics to your page. You can find some links to free graphics for kids here. Please don't take graphics from other people's Web sites unless you have permission. If you use graphics from someone else's page (with their permission) you should always acknowledge where they came from, this makes your page look more professional and it's just the right thing to do. After you learn enough HTML to make a Web site, you might want to invest in a graphics program so you can make your own graphics. Making your own graphics makes your page look original, and makes it stand out from all the other sites on the Web. You can purchase Jasc Paint Shop Pro, it's a great program. If you can't afford something like PSP, try downloading a free program here. Nothing is better than a site that looks like no other. It keeps me interested and makes me want to see what you have on the inside.
- Ideas: you need to come up with something original to make a really great page, something that no one else has done before, something that you present in a completely original way. It's really great to have something original, and when you're finished you can at least be proud of what you've accomplished if you've done it yourself. Coming up with something on your own will help you get lots of visitors. Maybe you can write about what you like to do, music, sports, whatever. Being original is definitely the key!!
Copyright 1997-2016 Lissa, All rights reserved | <urn:uuid:6fd2484b-1bde-485b-a90d-cadcd8f0d222> | CC-MAIN-2022-33 | http://www.lissaexplains.com/basics.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.949138 | 1,351 | 3.5 | 4 |
Ballroom Troubleshooting: Part Three
Welcome back for our final(?) article in the ballroom troubleshooting series! Most beginner dancers have encountered at least one of the previous challenges. This time however, we’re looking at some issues that dancers with a little more experience might face.
1. ‘I can’t get around my partner on reverse/natural turns.’
The issue: You find yourself taking huge steps to get past your partner. Often you under-turn, taking you off your line of dance.
What to do about it: The easy fix is to make sure your partner takes smaller steps when you travel around them, and vice versa when it’s your turn. Picture yourself and your partner like the rim and the hub of a wheel respectively; the rim must always travel more to get around than the hub. The more permanent solution is to begin rotating your body a step before you move past. This shifts your partner out of the way, allowing you to pass through the space they occupied and get to the final position directly. When it’s their turn, think of stepping backwards and just off their track, so they barely miss you.
2. ‘I overbalance on my rise and fall.’
The issue: The rising and falling action makes you feel like you’re rolling off your feet.
What to do about it: First, make sure your knees don’t fully straighten – the rise happens primarily by pointing the toes and stretching the spine. Next, practice your rise and fall in place, aiming for smooth, continuous movement – rising too quickly can make you ‘tip over’. Finally, on the fall, lead with your leg before you shift your weight. Your core should initially lower in place, like the downward part of a rollercoaster.
3. ‘The lead to a promenade position makes my partner’s shoulder pop forward.’
The issue: When you shift to promenade, your partner’s left side gets pulled towards you, which breaks their frame.
What to do about it: A common misconception is that the lead to promenade is a rotating action, when actually it’s a pulling action. Imagine you are holding a bow, with your right hand on the string. To shift your partner to promenade, you must pull back on the bowstring, which means extending your right elbow slightly further rightwards. This should ‘open’ your partner, while still keeping space between you.
4. ‘The music is too fast for me to keep up my footwork!’
The issue: It feels too fast, and it feels like work.
What to do about it: Assuming it’s actually ballroom music, the first possibility is you need to shorten your steps. Faster Latin/rhythm dances, like east coast swing or mambo, take much smaller steps than say, a tango. Check your weight transfers using the suggestions in #1 from this article. You might also want to go over the step slowly to check places where you lose momentum. Finally, you might just need to keep practicing! Many steps will feel insanely fast at first, until you grow familiar enough to dance them efficiently.
5. ‘I can’t seem to get into outside partner position.’
The issue: Your partner seems stuck in front of you. The only way you can shift them sideways is by manhandling them with your arms.
What to do about it: You most likely need to work on your contra body movement, which is a fancy way of saying ‘face one way, but travel another way’. Your belly button is a searchlight that tells your partner where to be. That means you need to rotate your torso if you want to position them on the appropriate side. Alternatively, you can keep your torso forward, but step diagonally right or left to create the same effect. If you get tightness in your lower back, stretch it out before you practice.
About the Author
Ian Crewe has been dancing ballroom for over 18 years, and has a Licentiate in American smooth and rhythm. His passion for dance and his endless seeking for ways to reach new audiences eventually led him to blogging and the World Wide Web. Ian currently teaches at the Joy of Dance Centre, Toronto, ON, Canada. | <urn:uuid:14d06111-d945-4dbd-bd8d-382cecf54363> | CC-MAIN-2022-33 | http://www.joyofdance.ca/blog-posts/ballroom-troubleshooting-part-three/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.937115 | 914 | 1.695313 | 2 |
RIGHT TO PROTEST, ITS LIMITATIONS AND RESPONSIBILITIES
Author: Abhishek Parmar, III year of B.A.,LL.B.(Hons.) from Jagran Lakecity University, Bhopal
People's voices are important. They have the right to express themselves, share information, and call for a better world. They also have the right to agree or disagree with those in power and to peacefully oppose their views. Living in an open and fair society, where people can seek justice and enjoy their human rights, requires exercising these rights without fear or unlawful interference.
Dr. Martin Luther King Jr has rightly said that - "The ultimate tragedy is not the oppression and cruelty by the bad people but the silence over that by the good people."[i]
In a well-ordered society, every individual has a prima facie obligation to obey the law and to oppose or protest laws that are incompatible with the citizen's fundamental rights.
A protest is a gathering of people who come together to openly express their feelings about a social issue. Protests against the Citizenship (Amendment) Act (CAA) of 2019 at Delhi's Shaheen Bagh or farmers' year-long protest against the three farm laws from 2020 to 2021 are examples of recent protests across the country. The right to peaceful protest is guaranteed by India's constitution. In this post, we'll look at the Constitutional Right to Protest, its limitations, its importance, and various Supreme Court rulings on the subject. [ii]
Fundamental Rights are guaranteed in Part III of the Indian Constitution. The Supreme Court hasconstrued the freedoms protected by Part III of the constitution in several rulings. The goal was to put citizens in the driver's seat and hold the government accountable.
The seeds of protest, such as satyagraha, were sowed deep during India's independence movement, making protest a vital and indelible chapter in the country's history, leading constitutional writers to conclude that the right to protest is an essential aspect of human life.
The right to protest, to publicly criticize the government and attempt to persuade it to respond, is a fundamental political right of the people that arise directly from a democratic interpretation of different parts of Article 19. Although the Right to Protest is not expressly stated in the Fundamental Rights, it can be inferred from Article 19's Right to Freedom of Expression and Speech.
Right to Freedom of Speech – Article 19(1)(a)
The right to free speech and expression entails the ability to publicly express one's views on government actions.
Right to Freedom of Association- Article 19(1)(b)
The ability to build political organizations is essential. These can be organizedto raise collective objections to government actions.
Right to Freedom of Assembly – Article 19(1)(c)
Individuals have the right to peacefully assemble to question and object to government activities through demonstrations, agitations, and public assemblies, as well as to organize long-term protest movements.
People's right to protest means that they can function as watchdogs and constantly scrutinize the actions of governments. It gives governments feedback on their policies and actions, after which the concerned government identifies and corrects its mistakes through consultation, meetings, and discussion.
When these rights are united, anybody can peacefully congregate and demonstrate against the government's actions or inactions. The demonstrations are in support of democracy, with the goal of protecting the integrity of the country's flaws.
Under the strong leadership of Babasaheb Ambedkar, the authors of the Constitution put their hearts and minds into writing an inclusive Constitution for a varied India. As chairman of the Drafting Committee, Ambedkar was crystal clear on one point: the Constitution's purpose. He stated, “the Constitution is not a mere lawyer’s document; it is a vehicle of life and its spirit is always the spirit of the age”.
The fact that our Constitution balances citizens' rights and responsibilities is one of its most important features. These are societal constructs that have evolved over time, via tradition, and through use. The Constitution's citizens' obligations are essentially a codification of tasks that are fundamental to the Indian way of life, focusing on tolerance, peace, and communal harmony. A detailed examination of Article 51A's clauses reveals that several of them pertain to principles that have long been a part of Indian mythology, religion, and traditions.
The Constitution's Fundamental Rights chapter recognizes the importance of obligations. One is the right to free speech; however, Clauses 2 to 6 of Article 19 provide for reasonable limitations on the use of such rights. This means that when exercising one's rights, one must keep in mind one's responsibilities to these constitutional ideals.
Today, it is vital to stress the necessity of remembering our constitutional responsibilities for the sake of our country's growth. Democracy will not be able to take root in society unless citizens strike a balance between their natural rights and their basic responsibilities.
Restriction[iii] on Right to Protest
The right to freedom of speech and expression is subject to reasonable restrictions under Article 19(2). These reasonable restrictions are in place for the following reasons:
Sovereignty and integrity of India, Security of the State, friendly relations with foreign States,Public order, Decency or morality, Contempt of court, Defamation, and Incitement to an offense. Further, resorting to violence during the protest is a violation of a key fundamental duty of citizens.Enumerated in Article 51A, the Constitution makes it a fundamental duty of every citizen “to safeguard public property and to abjure violence”.
Importance of Right to Protest for Democracy
The active exercise of one's right to protest ensures that citizens function as watchdogs, always scrutinizing the government's acts and ensuring that they are carried out fairly.
The protests have significance because:
Protests have traditionally sparked positive social change and the progress of human rights, and they serve to encourage the identification and defense of civic space around the world.
Human Rights Advancement: Protests encourage citizens to become more involved and aware.
Contributing to all sectors of life: Protests play an important role in civic, political, economic, social, and cultural life in all societies.
Empowers Marginalized Groups: This is especially important for persons whose interests are neglected or ignored in other ways.
Strengthen Democracy: They aid in the promotion of representative democracy by permitting direct participation in public affairs.
Increases Accountability: They enable individuals and organizations to express their dissatisfaction and complaints, communicate ideas and opinions, expose governance flaws, and publicly demand that governments and other powerful institutions address issues and hold themselves accountable for their actions.
Supreme Court’s Judgements on the Right to Protest
The Supreme Court stated that while "democracy and dissent go hand in hand," "demonstrations expressing disagreement must be held only in specified venues." The Constitution protects the right to demonstrate and voice opposition, but it is accompanied by Fundamental Duties such as Article 51A, which declares that every citizen has a fundamental responsibility to defend public property and refrain from violence.
In Himat Lal K. Shah v. Commissioner of Police, Ahmedabad & Anr. (1972), the rights provided under Section 33(1)(o) of the Bombay Police Act, 1951 were used to challenge the Commissioner of Police, Ahmedabad's rules. Before having public meetings, one of these restrictions required that prior authorization be acquired. The Supreme Court concluded that the state can only pass laws that promote each citizen's freedom to assemble and that reasonable limits can only be imposed for the sake of public order. The freedom to hold meetings on public streets was subject to the control of the relevant authorities over the time and venue of the meeting, as well as issues of public order, in evaluating whether these rules infringed Article 19(1)(b) of the Indian Constitution.
Ramlila Maidan Incident vs. Union of India's Home Secretary (2012)[v]: Citizens have a fundamental right to peacefully congregate and demonstrate, according to the Supreme Court, which cannot be taken away by arbitrary administrative or legislative action.
The Supreme Court of India held in Beenu Rawat v. Union of India (2013) that rights and obligations must be balanced. While everyone has the right to criticize unjust government action, protesting against police activity (or inaction) is particularly risky since fundamental rights are more likely to be infringed. At the same time, protesters were unable to bring the state's machinery to a halt. People had the freedom to demonstrate, but they also had a responsibility to follow the law. The role of the police was to keep peace. In this sense, there must be a balance because "rights without responsibilities tend to develop into a license for the misuse of rights."
In another decision, Anita Thakur v. the State of J&K (2016), the Supreme Court ruled that there is a basic right to protest and organize peaceful assemblies using freedom of speech and expression. Force could only be used to disperse these assemblies if they became illegal. The Court did warn, however, that the use of force must be reasonable and not excessive.
Mazdoor Kisan Shakti Sangathan v. Union of India & Anr. was cited in the Shaheen Bagh decision (2018) The key point of argument here was whether the resulting disturbances to residents were a wider public interest for which the freedom to protest in that location might be limited. There had to be a balance between everyone's rights. In this case, the court determined that the contested demonstration was causing substantial harassment to the residents. Simultaneously, the protest site, Jantar Mantar, was a regular spot for protests and was also recognized by the authorities. As a result, the Court ordered the authorities to develop suitable and necessary standards for regulating protests in the region.
The court upheld the right to peaceful protest against laws in the Shaheen Bagh decision of 2019 but clarified that public roadways and public areas cannot be occupied indefinitely. Fundamental freedoms do not exist in a vacuum. The protestor's right must be balanced against the commuter's right, and both must coexist in mutual respect.
In Anuradha Bhasin v. Union of India (2020), the Supreme Court distinguished between "law and order" and "public order," stating that public order limitations require a higher bar for activation. A minor annoyance cannot be considered a credible threat to the public's safety. However, the Court did not explain why the inconvenience was a proper premise for reasonable limits to be implemented in this case.
“When it gets down to having to use violence, then you are playing the system’s game. The establishment will irritate you – pull your beard, flick your face – to make you fight. Because once they’ve got you violent, then they know how to handle you. The only thing they don’t know how to handle is non-violence and humor.”― John Lennon
Protesting against injustice is not only a fundamental right provided by the Indian Constitution, but it is also a moral obligation. By now, we've established that the right to protest is protected by the constitution. It is regarded as 'precious' in some cases to secure the right to free expression and peaceful protest, and it should be maintained in all circumstances. However, these rights are not absolute in nature and should be subjected to reasonable constraints, as stipulated under Article 19(2), which is critical in the interests of the country's sovereignty and integrity. Fundamental rights do not exist in a vacuum, and the rights of protestors and commuters should be balanced. The court's main point is that peaceful protest is a basic right of protestors and should be tolerated. However, if a protest infringes on the rights of others, generating serious concerns for the general public, such as the possibility of a blockade, discomfort, or a protest that interrupts daily life, the right to protest can be prohibited.
[i]Birminghamtimes.com, https://www.birminghamtimes.com/2018/01/some-of-dr-martin-luther-king-jr-s-profound-quotes/. [ii]India.com,https://www.india.com/news/india/year-ender-2020-from-anti-caa-in-shaheen-bagh-to-farmers-protest-top-10-plights-of-modi-government-in-2020-4288984/. [iii]Byju;s, https://byjus.com/free-ias-prep/freedom-of-speech/. [iv] Ipleader, https://blog.ipleaders.in/shaheen-bagh-judgment-right-protest-india/. [v]Legalserviceindia, https://www.legalserviceindia.com/legal/article-7887-right-to-protest-in-india.html. | <urn:uuid:40b1230f-3c10-4178-9e96-f39a952df7c1> | CC-MAIN-2022-33 | https://www.brainboosterarticles.com/post/right-to-protest-its-limitations-and-responsibilities | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.946312 | 2,696 | 3.515625 | 4 |
Taken from The Bible Treasury Number 335 - April 1884
The "charge" here clearly, connects itself with ver. 3 and 5, which refer to the same thing, not to 15 in particular however momentous; the practical purpose follows to the end of the chapter. The man of God must be prepared to war the good warfare.
"This charge I commit to thee, child Timothy, according to the prophecies on thee going before, that by them thou mightest war the good warfare, holding faith and a good conscience; which some having thrust away made shipwreck concerning the faith; of whom is ΗymenŠus and Alexander, whom I delivered to Satan that they may be taught not to blaspheme" (ver. 18-20).
As the Holy Spirit said, Separate me Barnabas and Saul for the work whereunto I have called them (probably through one of the prophets at Antioch), so it appears that Timothy had prophecies leading the way to his work. Indeed in the case of the apostle the Lord had revealed his mission from his conversion. That the prophecies were uttered over Timothy at his ordination is absolute assumption. It was certainly not a part of the service whence the first and greatest of those sent to the Gentiles went forth recommended to the grace of God by the laying on of their brothers' hands. The prophecy preceded and led to that separation for gospel work; and so analogy, if not express intimation here and in chap. iv. 14, compared with 2 Tim. i. 6, might give us to infer.
It is no mere battle but a campaign that the apostle puts before his "child" and fellow-labourer. He must war the good warfare, but he is not asked to go at his own risk. The Master had given the word: if ever so gentle, sensitive, timid, he might trust Him, who by His servants had prophesied about Timothy. There is no necessity, nor sufficient reason, to understand with the grammarian Winer that in these prophecies lay his spiritual protection and equipment, the armour as it were in which he was to wage his good warfare. This is to narrow and emphasize unduly the force of the preposition. The English Authorised and Revised Versions seem to me more simple and correct. So again the transient form of the verb (adopted by Tischendorf and Tregelles on the meagre authority of the first hand of the Sinaitic and the Clermont MSS.) does not commend itself in comparison with the ordinary text (as in all other copies) which has the present. Observe also that "faith" as an inward state is different from "the faith" or truth believed.
But condition of soul has much to do with warring the good warfare. Faith must be kept up, bright and simple and exercised, the eyes of the heart ever on the things unseen and eternal. Withal a good conscience is imperative. For if faith bring God in, a good conscience judges self and keeps sin out. This, of all moment for every christian, is pre-eminently needful for him who is devoted to the service of Christ. There is nothing which so hardens the heart as the continual giving out of truth apart from one's own communion and walk. Take the extreme case of Judas falling under the power of the Devil; but look also at Peter, who was far from a traitor, himself betrayed into the denial of his Master. Here, however, it is the maintenance not only of faith, but also of a good conscience, "which some having thrust away made shipwreck concerning the faith."
Rarely, if ever, does the heterodox soul maintain a good conscience; and as there cannot be a good conscience without faith, so on the other hand, where the conscience becomes practically bad, the faith is lowered, and it is well if it be not at last wholly perverted. A man is uneasy at continuing burdened with the sense of his own inconsistency. He is thus tempted to accommodate his faith to his failure, and what he likes he at last believes to the destruction of the truth; or, as the apostle puts it here, "some, having thrust away" a good conscience, "made shipwreck concerning the faith."
The apostle gives examples then living; "of whom is HymenŠus and Alexander, whom I delivered to Satan that they may be taught not to blaspheme."
This is not ecclesiastical discipline, or excommunication pure and simple, but the apostle's own act of power. Indeed it is questionable whether the assembly ever did or could, without an apostle, hand over to Satan. Certain it is, that in 1 Cor. v. the apostle connects himself with a similar exertion of power:
"For I, as absent in body and present in spirit, have already judged as present as to him that so wrought this thing, in the name of our Lord Jesus Christ (ye and m,; spirit being gathered together with the power of our Lord Jesus Christ) to deliver him, being such an one, to Satan, for destruction of the flesh, that the spirit may be saved in the day of the Lord Jesus."
So another apostle exercised the power given him of the Lord, to deal extraordinarily with Ananias and Sapphire when they sinned unto death. The Lord, it would seem, thus by His servant judged them by so solemn a chastening, that they might not be condemned with the world.
But if, according tπ scripture, the assembly be not invested with such power, it is none the less under obligation to purge out the old leaven, "that ye may be a new lump, according as ye are unleavened." The standing is the ground of responsibility. If unleavened by and in Christ, we are bound to tolerate no leaven. Practice must be conformed to principle, and so the Spirit works by the word; not high or heavenly principle brought down to low and earthly practice. "For also Christ, our passover, was sacrificed for us; wherefore let us keep the feast, not with old leaven, neither with leaven of malice and wickedness, but with unleavened bread of sincerity and truth." If the assembly cannot and will not judge those that are within, it forfeits its character as God's assembly. Hence, even in the lowest condition, that which claims to be God's assembly is bound to put away the wicked person from among them. Responsibility to put out of church communion is the inalienable duty of the christian assembly, whenever a professed member of Christ can be justly designated as a "wicked person." But this is a distinct thing from the apostolic power of delivering over to Satan, which might or might not accompany that extreme act of the assembly.
It is well, however, to notice that even the apostle's act of delivering over to Satan, here spoken of, apart from the assembly, had the merciful as well as holy object in view, "that they may be taught not to blaspheme." It is a consoling thought, that even such evil-doers are not irrecoverably beyond the reach of divine grace. The terrible sentence which befel them was, on the contrary, t π teach by discipline those who refused to be taught by the truth, whose unjudged evil led them to depart from the faith which condemned them. Even Satan's power in dealing with the outer man, and perhaps in the infliction of anguish of mind, may be used under the hand of God to bring down the haughty spirit and make past blasphemy to be seen in all its offensive pride and opposition to God.
It is singular that Calvin, on this passage, chooses rather to explain it as relating to excommunication, of which not a word is said, though probably this may also have been the fact. But the opinion, as he calls it, that the incestuous Corinthian received any other chastisement than excommunication, he ventures to say, is not supported by any probable conjecture. Now this confusion we have seen to be in direct opposition to the plain declaration of 1 Cor. v., which distinguishes the apostolic energy and its effect from the inalienable call of the assembly to put away those who cast deliberate and manifest affront on the Lord's name. It is only when Paul joins himself to the assembly that he speaks of delivering to Satan. When he treats of their purging leaven that had entered, he speaks of putting out, and not a word more.
In short, then, delivering over to Satan was not a form of excommunication from the church, but an act of apostolic power, which might or might not accompany the act of putting out, and manifested its effect in bodily pains or even death itself. The distinction is of importance for this reason among others, that we can see clearly how the obligation abides to purge out the leaven that has got in; whilst it would be unbecoming to arrogate to the assembly that which scripture never speaks of apart from au apostle's power. Those who have Christ that was sacrificed as their centre cannot escape from the holy responsibility of keeping the feast with unleavened bread of sincerity and truth, purging out what practically denies and dishonours Him. Power is another element, and as distinct from form as from duty; and, power or no power, we are bound to do our duty, as in the end of 1 Cor. v. it is no less obvious than momentous, if indeed we lire Christ's. | <urn:uuid:cda235e7-8e52-4792-a9bc-95d731709bbd> | CC-MAIN-2022-33 | http://www.swartzentrover.com/cotor/Bible/Bible/NT/Pauline/1%20Timothy/On%20the%20First%20Epistle%20to%20Timothy/On%20the%20First%20Epistle%20to%20Timothy%20-%2001.18-20.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.972805 | 1,995 | 2.03125 | 2 |
Dead Sea Salt
- Ingredients Rich in over 21 minerals, including Sodium, Calcium, Magnesium, Potassium, Bromide, Iodine and Zinc
- Origin Israel
- Therapeutic Dead Sea Salts have a high natural mineral content that imparts a relaxed feeling, nourishes the skin, eases rheumatic discomfort and is believed to help in the treatment of Psoriasis and other skin disorders. Contains over 21 minerals including Calcium, Magnesium, Potassium, Bromide, Iodine and Zinc.
- Bath Dissolve from half a cup to two cups of Dead Sea salt in warm bathwater, stirring to distribute evenly, and soak for 15 to 20 minutes or longer. While you are soaking, if the granules have not dissolved, rub the salt into your skin in smooth circular motions to remove dead skin cells and stimulate blood flow. When done, dry off, do not need to rinse salt off, and moisturize. It is also helpful to drink more water when enjoying a salt bath as salt can soak some of the moisture from your skin and have a dehydrating effect.
- Foot Scrub Do the same for your feet! Add a handful of salt to a foot bath for a relaxing foot soak. Use the grains to scrub away dirt and dead skin for fresh, smooth feet.
- Caution: This is not food grade, do not consume. Avoid soaking in bath salts if you have an open wound. | <urn:uuid:c4c261b9-ea4b-4306-82a4-0676465de77e> | CC-MAIN-2022-33 | https://www.thesoapdispensary.com/products/dead-sea-salt | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.877336 | 299 | 1.601563 | 2 |
The collision of a container ship with a U.S. Navy destroyer off the coast off Japan last weekend has highlighted the fact that the open waters can be pretty busy places. Most internationally traded goods are transported on container ships and the total number of active vessels stands at close to 6000 worldwide, according data provided by shipping information portal Alphaliner. That fleet can move close to 21 million standard containers (TEU).
As the infographic below shows, the biggest container shipping company by number of chartered and owned ships in its fleet is headquartered in the small European country of Denmark. APM-Maersk has currently 636 ships in service. The second largest fleet is run by the Mediterranean Shipping Company (MSC) which was founded in Naples in Italy, but is now headquartered in Geneva in landlocked Switzerland.
You will find more statistics at Statista | <urn:uuid:0047d02a-3e50-4834-94ae-e5280d21ce73> | CC-MAIN-2022-33 | https://www.thedenverchannel.com/news/national/infographics/the-largest-container-ship-fleets-worldwide | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.949026 | 173 | 2.140625 | 2 |
Five out of the six Rocky movies were shot in Philly and the Rocky statue at the foot of the steps of the Museum of Art is Philly’s biggest tourist attraction. Philadelphia and Rocky really do go hand in hand.
The bronze statue was originally a prop from Rocky 3 and in the movie, Philadelphia honours Rocky with the statue at the top the Museum of Art steps. These were the steps that Rocky ran up in the famous scene in the first Rocky movie when he was training for the big fight and he ended up being joined by all the kids in the city running along with him. After shooting, Stallone left it there as a gift, unfortunately to the abject horror of the museum’s officials who did not consider it proper art in any shape or form.
They insisted on having it removed and it was put into storage for a while. Thousands of visiting tourists however wanted to know where it was, so the City took it out of storage and placed it in the Spectrum Sports Complex. Well guess what, with thousands of tourists regularly converging onto the complex to have their picture taken with the statue, officials then argued that the character was not a real sportsman but a fictional character, so they didn’t want it there any more!
After countless arguments and alternative solutions where it was moved all over the city (with crowds of tourists following it wherever it went) it has now finally returned to the Museum of Art but resides at the base of the famous steps. Thousands still flock there to run up the steps like Rocky and get a picture next to him, and perhaps at the end of the day the Museum officials realised that they could get plenty of those tourists actually coming into the museum too. It might not be art but it is good business. By the way, it took me 22 seconds to run up all 72 steps, not as fast as Rocky but not bad eh? | <urn:uuid:ae762bb6-1ddb-4243-8c4a-2938aa144d7a> | CC-MAIN-2022-33 | https://www.tripreporter.co.uk/philadelphia-and-rocky-balboa/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.983302 | 385 | 1.515625 | 2 |
Unintended Consequences of the War on Drugs
This week in my local newspaper, Florida’s Lieutenant Governor Jeff Kottkamp wrote an op-ed reporting that a drug known as “Spice” is becoming “... a nightmare for law enforcement, because it is sold and used openly as a so-called legal alternative to marijuana. Currently, there is no way to test for the use of Spice—making it that much more attractive to would-be users.”
Kottkamp reports, “Spice is, in fact, more potent and more dangerous than marijuana.”
I am very out-of-touch with the drug scene, so maybe unsurprisingly, this was the first I’d heard of Spice. I do have a son who is a senior in high school, so I figured I could ask him and get some information about Spice, but he claimed he’d never heard of it either. Could be he’s a Spice-head trying to hide his habit, but (parents can be so naive) I think he was telling me the truth.
If any readers know anything about Spice, feel free to speak up and inform the rest of us! (When I Google “spice drug” some information does pop up.)
Kottkamp goes on to say, “Just two weeks ago, I was speaking with our community anti-drug organizations gathered at the annual drug prevention conference, and they asked for help to stop this new drug from infiltrating their neighborhoods.”
I can give Kottkamp a sure-fire way to stop Spice in its tracks: Legalize marijuana. Kottkamp claims Spice is more dangerous than marijuana, so surely this would be a step in the right direction.
The issue here is not about Spice; it is about alternatives to marijuana. Making Spice illegal would simply open the door for drug entrepreneurs to develop other recreational drugs that are “more potent and more dangerous than marijuana.”
We’ve been fighting a war on drugs for 30 years, and the drugs are winning. There is ample evidence that the harm from illegal drugs comes more from the fact that they are illegal than that they are drugs.
I am no advocate of recreational drug use. Following Nancy Reagan, if someone offers you some, my advice would be to “Just Say No!” But there are two strong arguments in favor of legalization. One is that this used to be a free country, and freedom has to mean the freedom to make what people in the government think are bad choices. Another more utilitarian argument is that the harm from their illegality is greater than the harm from the drug use itself. | <urn:uuid:5f7d4492-5829-4002-a6e0-3cdcdfb8c506> | CC-MAIN-2022-33 | https://blog.independent.org/2010/11/05/unintended-consequences-of-the-war-on-drugs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.971181 | 555 | 1.75 | 2 |
Baltimore Workers’ Compensation Lawyers: Workplace Violence Towards NursesJuly 11, 2016
Thousands of nurses across the country go to work every day with the intention of providing dedicated, compassionate medical care to their patients. What they do not expect is to be physically attacked, verbally abused, or threatened by the very patients that are under their care. Sadly, workplace violence particularly in hospital and psychiatric facilities has been growing at a rapid rate.
More than 20 percent of non-fatal workplace injuries and illnesses occurred in the healthcare and social assistance industry. While violence in the workplace in other industries has gone down over the last 25 years, it has increased by over 100 percent in the healthcare and psychiatric industries, with the majority of the victims being women.
The problem of workplace violence among healthcare works seems to be two-fold. The patient population at these facilities tends to display more violent, aggressive behavior than patients in other facilities. Secondly, healthcare workers do not always report these types of incidents, so the actual numbers are likely much higher. In addition to injuries, the rate of fatal injury among nurses due to violence is high, accounting for 16 percent of traumatic workplace deaths in 2014.
Addressing the Problem
Legislation was passed in 2000 that addressed workplace violence in the healthcare industry. It required mental health facilities to provide employees with training in violence prevention at least once a year and established protocols for reporting physical and verbal assaults. In an effort to better understand the factors that contribute to workplace violence in psychiatric settings, Safety & Health Assessment & Research for Prevention (SHARP) conducted focus groups, as well as individual interviews, focusing on the following objectives:
- Find out what the staff and managers’ perceptions are regarding workplace violence, potential solutions and any changes that have been made.
- Gain a clear understanding of the organization, its culture, scheduling conditions, physical and psychological demands of the job, and whether staff is exposed to workplace violence.
- Review the organization’s current policies on workplace violence, including reporting and scheduling procedures, and assault prevention training programs.
Based on participant interviews, the researchers found two key themes.
- Schedule Control: This addresses concerns over low staffing, long hours and voluntary overtime, inconsistent staffing, constraint on vacation, and unscheduled absences. The combination of these factors leads to high levels of stress and exhaustion. By implementing an increased schedule control, it will likely reduce the incidence of workplace violence. SHARP made the following recommendations for schedule control:
- Limit mandated and voluntary overtime
- Avoid moving staff from one ward to another in order to maintain stable work teams
- Create a pool of employees who are willing to function on an as-needed basis
- Identify ways to make schedules more flexible for direct care nurses
- Establish a system of schedule control
- Supervisor/ Co-Worker Support and Incivility:Supervisor Support:When employees perceive that they are valued by their employer, it can have a positive impact on the organization’s culture. Support and positive leadership can have a direct impact on the safety of staff and patients. In the psychiatric ward, the ability to work together as a team is a crucial skill, one that supervisors should encourage and foster. When a patient is agitated, teamwork can prevent a situation from escalating.
Incivility: This type of behavior, which includes things like hostility, negative nonverbal gestures, failure to share information, intimidation, and gossiping, is intended to harm the recipient. Any individual who engages in this behavior is in violation of workplace norms for mutual respect. The following recommendations can help resolve incivility:
- Train directors, supervisors, and management on how to foster a culture of support and non-violence in psychiatric settings.
- Develop a clearly defined “Respect in the Workplace” policy that includes how the organization will respond to incivility and bullying.
Baltimore Workers’ Compensation Lawyers at LeViness, Tolzman & Hamilton Represent Victims of Workplace Violence
If you are a healthcare worker and you have been a victim of workplace violence, the experience can leave you physically injured and emotionally scarred. Baltimore Workers’ Compensation lawyers at LeViness, Tolzman & Hamilton are on your side and will fight hard on your behalf to ensure that your rights are protected and that you receive the financial compensation you deserve. For a free case review, call us today at 844-556-4LAW (4529) or contact us online. | <urn:uuid:9b7d24c5-b33b-4569-8961-d41a49f7cb70> | CC-MAIN-2022-33 | https://www.bestmarylandworkerscompensationlawyers.com/2016/07/11/baltimore-workers-compensation-lawyers-workplace-violence-nurses/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.944952 | 912 | 1.898438 | 2 |
Tips On How To Keep Your Windows In A Good Condition
One of the links that you should know when it comes to windows is that windows has truly the best friend of a home. Windows help you cut on the call when it comes to electricity because they usually let in a lot of light into the house meaning that you will not have to use a lot of electricity because there will be light in your house and this is the other thing that you should know about windows since they why does my mouth taste sweet usually left in a very beautiful and natural light. The other thing that windows do is that they usually give us a lot of access to a nice cooling breeze.
This is usually during the summer and apart from this they also help to keep a lot of warmth when winter comes. There are very many times that you will find that people are not attentive and caring to their windows as they should be and you will find that people are not really thinking about their windows as much as they should be thinking saliva tastes sweet about them. The reason why people are not attentive to their windows google chrome helper is because they find themselves worrying about many other things apart from the fact that windows need to be cleaned.
However it really does not matter whether you have vinyl windows, double hung or even wooden how to disable google chrome helper frames. In order for you to make sure that our window has been kept in a very good condition usually need to take care of it and to maintain it on a regular basis when it comes what is google chrome helper to windows. If you do not take care of your window in the best way possible and if you do not maintain it in the best way possible using some couple of measures that should be improvised when it comes to maintaining your windows he was definitely realise that this windows will deteriorate over a period of time.
You shall be able to know how to take care of your windows and also how to maintain them the moment you continue reading this article up until the end because it has got all the right steps outlined below for you that have to do with the proper maintenance of windows. When you want to make sure that you are maintaining your windows very well the very first thing that you should make sure that you have done is that you have cleaned your windows thoroughly. The other window maintenance tips will be a little bit hard to complete if you do not first of all take the first maintenance tip which is to clean the windows. | <urn:uuid:fdfddd05-13fb-47b2-b0d8-c0eda78a3939> | CC-MAIN-2022-33 | http://k504.org/2019/04/28/discovering-the-truth-about-5/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.97334 | 490 | 1.78125 | 2 |
The Johnston-Hastings House is an excellent representative of the prolific design portfolio of L. Jane Hastings—one the most significant, if still relatively unknown, architects of Washington and the Pacific Northwest. Known principally for her design efforts to reduce energy consumption several decades prior to its popularity on the architectural stage, Hastings was cited by the International Archive of Women for a “concern for energy efficiency [which] predates the energy crisis era of alarm….” With passive solar gain, regional materials, and site sensitivity, the Johnston-Hastings residence, completed in 1977 and credited to Hastings’ newly founded firm, The Hastings Group, Architects, is an early architectural example of sustainable design in the Pacific Northwest.
The residence is located in the Laurelhurst neighborhood of Seattle, north of the Montlake canal and east of the University of Washington. The Johnston-Hastings House was the home of architects L. Jane Hastings and her husband Norman Johnston, yet the design is wholly attributed to Hastings, the eighth female architect licensed in the state of Washington. The 2,780-square-foot dwelling has three levels, a basement, and a roof deck, forming a tall, narrow composition whose materials and connections to the natural environment suggest a modern regionalism characteristic of the Pacific Northwest. It is platform-framed and covered with gray painted shingles, including protruding bays with plate glass windows and a split gable roof with a projecting roof monitor. Hastings also used the form of the building to respond to the environment, bringing in light from a two-story southwestern window wall. This window wall bypasses living space on two stories, with an open kitchen adjacent to a dining area on the first floor and living room above. The window wall allows natural light to penetrate deep into the interior spaces of the house while providing a thermal chimney for passive heat regulation.
The overall design can be seen in a larger architectural context, as well, for the house bears formal and material resemblance to the early West Coast regionalism exhibited by Joseph Esherick and Moore, Turnbull, Lyndon and Whitaker (MLTW) in 1965 at Sea Ranch along the rural Sonoma County coast in Northern California. Unlike MLTW’s conscious effort to connect to the pre-existing regional architectural vernacular of the barn, however, Hastings’s house features more of a functional ecological approach. Its multi-directional shed roofs, shingles, minimal eave overhangs, and asymmetrical design can be more easily attributed to site conditions that necessitated particular architectural choices. The residence received a Seattle AIA Honor Award in 1977. The award jury noted that it was “a highly manipulated regional residential statement done with respect for a unique site.”
Hastings received her Bachelor of Architecture degree from the University of Washington in Seattle in 1952, where she was the lone female graduate amongst a 200-person class. While in school in 1951, she was elected to the Tau Sigma Delta Honorary Fraternity. Following graduation, she worked for the Boeing Airplane Company, and later served the U.S. Army in Germany as a Special Services Recreation Director. From Germany, she traveled extensively throughout Europe and into Northern Africa. She later became the principal of what is now considered Washington's oldest woman-owned firm: The Hastings Group, Architects, founded in 1959. Of over 500 total projects, her firm produced several prize-winning residential designs in Seattle and the Puget Sound region. Of 30 total Hastings-designed residences that appeared in Seattle Times and Seattle Post-Intelligencer pictorial sections from 1963 to 1996, ten were selected as “Home of the Month,” and the Quam Residence (1968) and the Stevens Residence (1973) were both selected for the Home of the Month annual award. The Karrow Residence (1971) won a national award from the American Institute of Architects (AIA) in conjunction with House and Home magazine.
Hastings also became involved with the AIA both nationally and locally at an early stage, and was later recognized by the organization for her contributions to the profession. She joined the AIA in 1953 and, after attending international conferences such as those of the Paris-based International Union of Women Architects, eventually helped develop the AIA’s international policies and programs through the AIA International Committee. Hastings was the first woman to serve as AIA Seattle president in 1975; she accepted advancement into the AIA College of Fellows in 1980; and was the first woman to serve as chancellor of the AIA College of Fellows in 1992. In 1995, she was presented the AIA Seattle Award for an “unusually active and extensive commitment to AIA.”
The Johnston-Hastings House remains a private residence.
“A.I.A Honors Architects and Citizens Here.” Seattle Times, November 20, 1977.
Hancock, Marga Rose. “Hastings, L. Jane (b. 1928) – Architect.” Essay 9046. HistoryLink.org: The Free Online Encyclopedia of Washington State History, July 24, 2009. Accessed October 26, 2015. www.historylink.org.
Hancock, Marga Rose and Kate Krafft. “L. Jane Hastings.” In Shaping Seattle Architecture, edited by Jeffrey Karl Ochsner, 340-345. Seattle: University of Washington Press, 2014.
“Hastings L. JaneMs. 2004-04.” Virginia Tech International Archive of Women in Architecture. Accessed November 27, 2016. https://imagebase.lib.vt.edu/.
L. Jane Hastings Architectural Papers, Ms2004-004 - Special Collections, Virginia Polytechnic Institute and State University.
“Lois Jane Hastings (Architect) Female, born 1928.” Pacific Coast Architectural Database. Accessed October 28, 2015. http://pcad.lib.washington.edu/.
Houser, Michael C. “Hastings, Lois Jane.” Docomomo WEWA: Embracing Northwest Modernism. Accessed October 28, 2015. http://www.docomomo-wewa.org/.
“Parcel number 072300-0226.” King County Department of Assessments. Accessed July 8, 2017. http://blue.kingcounty.com/. | <urn:uuid:22d6c4f7-0481-4faa-bfd7-16e84de1eb4e> | CC-MAIN-2022-33 | https://sah-archipedia.org/buildings/WA-01-033-0070 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.944615 | 1,319 | 2.5 | 2 |
GEORGE J. HIGGINBOTHAM
For over sixty years of his life, George J. Higginbotham was a dedicated worker in Biloxi’s seafood industry. Born in Youngsville, Louisiana in 1921, he was the second son of Nelson and Edna Delcambre Higginbotham. The family was of French decent. They moved to Biloxi in 1929 to find work in the thriving seafood industry, and George began working at a very young age. He worked in both the factories and aboard boats until he and two of his brothers joined the United States Marine Corp during World War II.
While serving in WWII, George was shot and wounded in action. For this sacrifice he was awarded the Purple Heart Medal. After returning home from war, he owned and operated his own seafood factory, Seaway Seafood. He served as president of the company for ten years. He and his cousin later merged their businesses into Del Seaway. He owned his own fishing vessel, North America. George and his wife Jewel were parents to eleven children.
In 1998, George was honored by being selected as Shrimp King for the Biloxi Blessing of the Fleet. In a double honor, his granddaughter, April Higginbotham, was chosen as Shrimp Queen that same year. Throughout his life he was a devout Catholic and member of St. John Catholic Church. He was a member of several civic organizations including: the French Club, Biloxi Elks Lodge, the Purple Org., and Knights of Columbus. Because of his deep respect for all who were wounded in service to the United States, George was instrumental in the building of Biloxi’s Purple Heart Monument located in Glennan-Guice Park, adjacent to the Biloxi Small Craft Harbor.
George J. Higginbotham passed away on July 28, 2014. He was known as a very generous and caring man, always willing to lend a hand to anyone in need. This generosity was evident in everything he did, from bravely serving his country in war, to his work in the seafood industry. George J. Higginbotham did not seek fame and fortune but merely success for his family and his fellowman. | <urn:uuid:83aa0097-763c-4380-ac04-21b92c4fa885> | CC-MAIN-2022-33 | https://msimhalloffame.org/george-j-higginbotham.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.993119 | 457 | 1.75 | 2 |
Share This Author
Microsporidian Biochemistry and Physiology
This chapter focuses on keratin filaments found in two domains: within the spore stage, the microsporidian sporophorous vesicle, and keratin in the host cell cytoplasm domain but situated at its interface with the parasite.
Analogs of the Golgi complex in microsporidia: structure and avesicular mechanisms of function
It is suggested that the intracellular transport of secreted proteins in microsporidia occurs by a progression mechanism that does not involve the participation of vesicles generated by coat proteins I and II.
Secretion of Antonospora (Paranosema) locustae Proteins into Infected Cells Suggests an Active Role of Microsporidia in the Control of Host Programs and Metabolic Processes
Results suggest that microsporidia possess a broad set of enzymes and regulatory proteins secreted into infected cells to control host metabolic processes and molecular programs.
Activities of Enzymes of Carbohydrate and Energy Metabolism of the Spores of the Microsporidian, Nosema grylli
The results suggest the catabolism of carbohydrates in microsporidia occurs via the Embden‐Meyerhof pathway, and glycerol 3‐phosphate dehydrogenase may reoxidize NADH which is produced by glyceraldehyde 3‐ phosphate dehydration in glycolysis.
Energy metabolism and its evolution in Microsporidia and allied taxa
Recent data about functioning of the energy metabolism system in microsporidia and closely related organisms are reviewed, and possible evolutionary pathways in the group are discussed.
Evolution of the endoplasmic reticulum and the Golgi complex.
- A. Mironov, V. Banin, I. S. Sesorova, V. Dolgikh, A. Luini, G. Beznoussenko
- BiologyAdvances in experimental medicine and biology
It is concluded that all eukaryotic cells have either Golgi complexes or remnants of these complexes, and several indispensable molecular machines are always present in secreting eukARYotic cells.
Light and electron microscopic observations on life cycle stages of Adelina grylli Butaeva 1996 (Sporozoa, Adeleidae) from the fat body of the cricket Gryllus bimaculatus
New data on the ultrastructure of life cycle stages of Adelina grylli is provided, aimed to additional diagnostic criteria for Adeleina species.
Fractionation of Different Life Cycle Stages of Microsporidia Nosema grylli from Crickets Gryllus bimaculatus by Centrifugation in Percoll Density Gradient for Biochemical Research
ABSTRACT. A new method of fractionation and purification of different life cycle stages of microsporidia Nosema grylli, parasitizing the fat body of cricket Gryllus bimaculatus, by centrifugation in…
Immunolocalization of an Alternative Respiratory Chain in Antonospora (Paranosema) locustae Spores: Mitosomes Retain Their Role in Microsporidial Energy Metabolism
- V. Dolgikh, I. Senderskiy, O. Pavlova, A. M. Naumov, G. Beznoussenko
- BiologyEukaryotic Cell
- 4 February 2011
Small amounts of enzymes of an alternative respiratory chain in merogonial and early sporogonial stages, alongside their accumulation in mature spores, suggest conspicuous changes in components and functions of mitosomes during the life cycle of microsporidia and the important role of these organelles in parasite energy metabolism, at least at the final stages of sporogenesis.
Heterologous expression of Paranosema (Antonospora) locustae hexokinase in lepidopteran, Sf9, cells is followed by accumulation of the microsporidian protein in insect cell nuclei. | <urn:uuid:9b9e819c-cb92-4d84-9988-3a077eddec48> | CC-MAIN-2022-33 | https://www.semanticscholar.org/author/V.-Dolgikh/70029766 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.841274 | 884 | 1.796875 | 2 |
Widgets dropped in sidebars (widget areas) created via the Sidebar & Widget Manager can be arranged vertically or horizontally depending on what you choose form the settings for each sidebar you create.
- Vertical widget alignment
This is the default WordPress widget alignment. The widgets in sidebars (widget areas) with vertical alignment are arranged in a column bellow each other.
- Horizontal widget alignment
The widgets in sidebars (widget areas) with horizontal alignment will be arranged in a row next to each other (lined up on the same line). Such widget areas are fluid and very flexible. The widget area width will be equally divided between all widgets in this widget area. Horizontal alignement is usually used in widgetized pages or footer widget areas, but can practically be used anywhere. | <urn:uuid:29e0b6cd-9850-494d-9297-e45220617416> | CC-MAIN-2022-33 | http://otwthemes.com/horizontal-or-vertical-widget-alignment/?utm_source=wp.org&utm_medium=page&utm_content=docs&utm_campaign=psw | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.809326 | 162 | 1.632813 | 2 |
Disruption of the blood-brain barrier triggers a cascade of events that results in autoimmunity and brain damage characteristic of multiple sclerosis.
A new study from the Gladstone Institutes shows that a single drop of blood in the brain is sufficient to activate an autoimmune response akin to multiple sclerosis (MS). This is the first demonstration that introduction of blood in the healthy brain is sufficient to cause peripheral immune cells to enter the brain, which then go on to cause brain damage.
A break in the blood-brain barrier (BBB) allows blood proteins to leak into the brain and is a key characteristic of MS, a disabling autoimmune disease of the brain and spinal cord. However, it was unclear whether the BBB disruption caused the autoimmune response or resulted from it.
In the current study, published in Nature Communications, the scientists created a new animal model of disease to determine if BBB leakage can cause autoimmunity. They discovered that injecting just one drop of blood into the brain set off the brain’s immune response, kick-starting a chain reaction that resulted in inflammation and myelin damage. Myelin is the protective sheath that insulates nerve fibers in the brain, and it is the primary site of injury in MS. What’s more, the scientists were able to pinpoint a specific protein in the blood, the blood-clotting factor fibrinogen, as the trigger for the disease-causing process.
“These findings offer a completely new way of thinking about how the immune system attacks the brain–it puts the blood in the driver’s seat of the onset and progression of disease,” says senior author Katerina Akassoglou, PhD, a senior investigator at the Gladstone Institutes and professor of neurology at the University of California, San Francisco. “This opens up the possibility for new types of therapies that target blood coagulation factors, upstream of autoimmune processes.”
Fibrinogen activated the brain’s immune cells, called microglia, and caused them to send out signals summoning peripheral immune cells from other parts of the body to the brain. When these peripheral immune cells–macrophages and T cells–entered the brain, they attacked myelin.
“Our results provide the first evidence that blood promotes T cell responses against the brain,” says first author Jae Kyu Ryu, PhD, a staff research scientist at the Gladstone Institutes. “Not only did we confirm that the presence of blood in the brain recruits peripheral immune cells to the area, which is sufficient to cause myelin destruction, we also identified fibrinogen as the critical protein driving this process.”
To confirm their findings, the scientists deleted the fibrinogen receptor (complement receptor 3 or CD11b/CD18) on microglia, thereby preventing fibrinogen from activating the cells. Inhibiting this interaction blocked the autoimmune process, stopping the microglia from signaling to the peripheral immune cells and averting myelin damage and inflammation. The researchers are now attempting to block fibrinogen using biological and small-molecule approaches as potential new therapies to suppress autoimmunity directed against the brain, dampening inflammation caused by microglia and T cells.
“These findings question a long-held paradigm that myelin-specific T cells initiate inflammation in the brain through activation of microglia and brain macrophages,” says Scott Zamvil, MD, PhD, a professor of neurology at the University of California, San Francisco and co-author on the paper. “This study demonstrates that the original paradigm may also occur in reverse. Namely, initial activation of microglia and brain macrophages may activate T cells.”
The scientists say that having a model of blood-induced brain inflammation is a valuable tool, as it can be used to screen new drugs. These mechanisms may occur not only in autoimmune disorders, but also in other brain diseases that involve inflammation or a break in the BBB, including traumatic brain injury, stroke, Alzheimer’s disease, and other dementias.
About this neurology research
Scientists from the Medical University of Vienna and the University of Cincinnati College of Medicine also took part in the research.
Funding: Funding was provided by the National Institute of Neurological Disorders and Stroke; National Multiple Sclerosis Society; American Heart Association; National Heart, Blood, and Lung Institute; Pediatric Scientist Development Program; and the Howard Hughes Medical Institute Medical Research Fellowship. Additional funding sources include the University of California San Francisco-Gladstone Institute of Virology and Immunology Center for AIDS Research; the Mouse Pathology Core of the UCSF Helen Diller Family Comprehensive Cancer Center; the Guthy Jackson Charitable Foundation; and the Maisin Foundation.
Source: Dana Smith – Gladstone Institute Image Credit: The image is credited to Roadnottaken and is licensed CC BY-SA 3.0 Original Research: Full open access research for “Blood coagulation protein fibrinogen promotes autoimmunity and demyelination via chemokine release and antigen presentation” by Jae Kyu Ryu, Mark A. Petersen, Sara G. Murray, Kim M. Baeten, Anke Meyer-Franke, Justin P. Chan, Eirini Vagena, Catherine Bedard, Michael R. Machado, Pamela E. Rios Coronado, Thomas Prod’homme, Israel F. Charo, Hans Lassmann, Jay L. Degen, Scott S. Zamvil and Katerina Akassoglou in Nature Communications. Published online September 10 2015 doi:10.1038/ncomms9164
Blood coagulation protein fibrinogen promotes autoimmunity and demyelination via chemokine release and antigen presentation
Autoimmunity and macrophage recruitment into the central nervous system (CNS) are critical determinants of neuroinflammatory diseases. However, the mechanisms that drive immunological responses targeted to the CNS remain largely unknown. Here we show that fibrinogen, a central blood coagulation protein deposited in the CNS after blood–brain barrier disruption, induces encephalitogenic adaptive immune responses and peripheral macrophage recruitment into the CNS leading to demyelination. Fibrinogen stimulates a unique transcriptional signature in CD11b+ antigen-presenting cells inducing the recruitment and local CNS activation of myelin antigen-specific Th1 cells. Fibrinogen depletion reduces Th1 cells in the multiple sclerosis model, experimental autoimmune encephalomyelitis. Major histocompatibility complex (MHC) II-dependent antigen presentation, CXCL10- and CCL2-mediated recruitment of T cells and macrophages, respectively, are required for fibrinogen-induced encephalomyelitis. Inhibition of the fibrinogen receptor CD11b/CD18 protects from all immune and neuropathologic effects. Our results show that the final product of the coagulation cascade is a key determinant of CNS autoimmunity.
“Blood coagulation protein fibrinogen promotes autoimmunity and demyelination via chemokine release and antigen presentation” by Jae Kyu Ryu, Mark A. Petersen, Sara G. Murray, Kim M. Baeten, Anke Meyer-Franke, Justin P. Chan, Eirini Vagena, Catherine Bedard, Michael R. Machado, Pamela E. Rios Coronado, Thomas Prod’homme, Israel F. Charo, Hans Lassmann, Jay L. Degen, Scott S. Zamvil and Katerina Akassoglou in Nature Communications. Published online September 10 2015 doi:10.1038/ncomms9164 | <urn:uuid:3b3cac6e-0edf-471c-bd94-76b3caab5381> | CC-MAIN-2022-33 | https://neurosciencenews.com/bbb-ms-immune-system-myelin-2861/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.873058 | 1,618 | 3.0625 | 3 |
Goldfish were found as a genetic mutation during the Tang Dynasty.
Pond carps began displaying gold, or yellowish orange, rather than the standard silver coloration. This 'gold' variety began to be bred more often than the silver, and the gold fish began being displayed in smaller containers instead of large ponds.
As more mutations of this gold fish occured, more color variations were produced, and different (fancy) types of goldfish were developed. Recorded in 1276 was the occurance of other colors in goldfish. The Fancy Tailed goldfish first occurred during the Ming dynasty. In 1502, the Ryukin and Tosakin varieties were developed after gold fish were introduced to Japan.
Continuing in 1611, goldfish were intoduced to Portugal and then spread into different parts of Europe. Not until 1874 were gold fish introduced to North America, where they quickly became popular in the United States.
Goldfish care can be a simple process, or a complicated undertaking, it all depends on how in depth you want to go. If your interests are goldfish breeding, or just goldfish feeding, Desktop goldfish has the Goldfish Care Tips you need.Goldfish Care
A goldfish tank is everything to a goldfish, and if this is your first time goldfish tank set-up there is a lot to think about. The goldfish aquarium size, and the water inside are the most important element a goldfish need to survive.Tanks & Aquariums
Prevention is the best medicine against Goldfish diseases. Knowing how to diagnos a goldfish disease as well as treat the disease is important to the health of the goldfish. Most goldfish will die before their time because nobody knew goldfish diseases.Goldfish Diseases | <urn:uuid:77281599-0866-436e-8bc5-c45c1b06147f> | CC-MAIN-2022-33 | http://desktopgoldfish.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.974535 | 375 | 3.015625 | 3 |
In a Yale laboratory, researchers managed to revive the cells in the brain, heart, liver, and kidneys of pigs that had been dead for more than hour. The technique involved pumping a fluid of a synthetic protein hemoglobin and other compounds through the corpses. Six hours later, some of the organs' functions had turned back on. Eventually, the research could enable surgeons to retrieve human organs for transplant much longer after a donor has died, saving countless lives. From the New York Times:
"We did not know what to expect," said Dr. David Andrijevic, also a neuroscientist at Yale and one of the authors of the paper [published in the journal Nature]. "Everything we restored was incredible to us."
Others not associated with the work were similarly astonished.
"It's unbelievable, mind blowing," said Nita Farahany, a Duke law professor who studies ethical, legal and social implications of emerging technologies.
And, Dr. Farahany added, the work raises questions about the definition of death.
"We presume death is a thing, it is a state of being," she said. "Are there forms of death that are reversible? Or not?" | <urn:uuid:c51fcadf-dde1-4f31-b08c-6c9f9484b5b5> | CC-MAIN-2022-33 | https://boingboing.net/2022/08/04/scientists-revive-brain-cells-and-other-organs-in-dead-pigs.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.970673 | 243 | 3.03125 | 3 |
Report: Levi’s, Wrangler, Lee seamstresses harassed, abused
Women sewing blue jeans for Levi’s, Wrangler, Lee and The Children’s Place faced sexual harassment and gender-based violence and some were coerced into having sex with supervisors to keep their jobs in African factories, labor rights groups say.
In response to the revelations, the brands have agreed to bring in outside oversight and enforcement for more than 10,000 workers at five Lesotho factories, according to a report from the Washington-based Worker Rights Consortium released on Thursday.
The labor rights group investigated Taiwan-based Nien Hsing Textile factories in Lesotho — a poor, mountainous kingdom encircled by South Africa — after hearing from a number of sources that women who sew, sand, wash and add rivets to blue jeans and other clothes were facing gender-based violence.
Managers and supervisors forced many female workers into sexual relationships in exchange for job security or promotions, the report says. In dozens of interviews, the women described a pattern of abuse and harassment, including inappropriate touching, sexual demands and crude comments.
When the workers objected, they faced discrimination and retaliation, the report says. The factory managers also fought union organizing, it says.
While most of the employees are from Lesotho, managers were both locals and foreign. And female workers told investigators even male colleagues were molesting them.
“Male workers like touching females in a way that is not appropriate,” one worker said.
“The foreign national managers slap women’s buttocks and touch their breasts. They sometimes take them home for sex,” another worker said.
Their testimony in the report is anonymous to protect their privacy.
Levi Strauss & Co. vice president of sustainability Michael Kobori said that as soon as the company received the Worker Rights Consortium report it told Nien Hsing “that this would not be tolerated and required them to develop a corrective action plan.” A spokesperson for The Children’s Place said it informed the firm that their ongoing relationship “depends on effectuating significant and sustained changes.”
Levi’s, The Children’s Place and Kontoor Brands, maker of Wrangler and Lee jeans, said in a joint statement they want all workers, especially women, to feel “safe, valued and empowered.”
The U.S. companies are funding a two-year program, in collaboration with the U.S. Agency for International Development, that establishes an independent investigative group where factory workers can raise concerns.
Factory owner Nien Hsing has agreed to work with Lesotho-based unions and women’s rights organizations to develop a code of conduct and enforcement actions.
“We strive to ensure a safe and secure workplace for all workers in our factories,” Nien Hsing Chairman Richard Chen said in a written statement.
Besides its mills and manufacturing facilities in Lesotho, the company also has facilities in Mexico, Taiwan and Vietnam.
About 80 percent of garment makers around the world are women, according to the Global Fund for Women.
As awareness of sexual harassment and abuse has soared with the #MeToo movement in recent years, women’s rights groups have pressured apparel makers in Asia to end gender-based violence.
The Global Fund has been working for several years in South Asia to improve workplace conditions at apparel makers in Bangladesh, Cambodia, India, Myanmar and Vietnam, teaching female garment workers about their workplace rights.
Rola Abimourched, a senior program director at the Worker Rights Consortium, said the Lesotho agreement should serve as a model for the rest of the apparel industry to prevent abuse and harassment.
“Hopefully this is something others will see and build on, so we can collectively make an impact far beyond any single country,” she said. | <urn:uuid:935d1758-6519-4fa6-9142-5e037a2c392a> | CC-MAIN-2022-33 | https://apnews.com/article/8b438186cc154eb399d3af632f1e380b | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.96246 | 802 | 1.929688 | 2 |
The Edwin Markham House
A historical San José landmark, The Edwin Markham House is a Victorian home where the famous poet Edwin Markham lived in the late 1800s. The house was moved from its original site on Eighth Street across from the San José State University campus to the grounds of History Park. On Country Lane, this historic building is now the headquarters of Poetry Center San José.
The newly refurbished home was dedicated in 2002 with a ceremony led by Dana Gioia, chair of the National Endowment for the Arts; Bay Area poets Jack and Adelle Foley, and Francico X. Alarcon, California Poet Laureate nominee.
The Markham House was the center for an all-day Festival of Poetry at History Park.
History Park's Markham House offers an opportunity to gather with others for an informal time of writing the second Sunday of most months from 1 to 4pm with Poets@Play. This playhouse of poets is a way to connect with the local poetry community through writing, reading, and listening. Markham House is also generally open Tuesday afternoons from 1 to 3pm for docent-led tours.
The Markham House Libraries
The Edwin Markham House contains a collection of poetry books, now over a thousand donated, along with anthologies, reference books, and small press publications. The library is located on the second floor, which also has a reading/writing room equipped with a copier. Downstairs, a resource room contains Markham’s original bookcase, now holding poetry books for children—classics, new publications and reference books for those interested in teaching poetry to their classes. This section has television, DVD’s, and magnetic boards for writing.
Our catalogue of books is online and can be accessed by visiting The Naomi Clark Libary through LibraryThing. Books are to be used as reference at the house; they are not available for borrowing.
The children’s library was made possible by a grant from Air Systems Foundation, Inc. Both libraries are open to book donations; we ask that you go through your own library and set aside what you can spare. We are particularly interested in California poets and readers who have appeared at Poetry Center San José in past years.
The Yuki Teikei Haiku Society library and archives are also housed here.
PCSJ members have access to these libraries and open time to use the house for study and writing. Contact firstname.lastname@example.org for more information.
The Edwin Markham Exhibit
History San Jose CEO and curator Alida Bray has installed a display of artifacts that includes Markham's poems, his cane, The Lark first edition of his poetry, and a 1920s miniature book. The display highlights Markham’s career and his place in the annals of poetry. In the entry parlor is an original signed copy of Markham’s world-renowned poem, “The Man with the Hoe,” which was inspired by Jean-Francois Millet’s painting of the peasant in his deep abyss of labor. Another framed photograph pictures his good friends Jack London, Joaquin Miller, and Ina Coolbrith. Shawn McAllister of Florida has willed his collection of Markham artifacts to History San Jose and to PCSJ, feeling that it has found a home at History Park.
The Building and Grounds
History San José is the primary caretaker of the Edwin Markham House. Our Markham House chair, Dennis Noren, oversees the use of the house. The Markham House garden, designed by Middlebrook Gardens, was planted and mulched the first of 2009 thanks to an army of volunteers that donated, along with the Compton Foundation, funds for the plants, turning the garden into a native plant haven. PCSJ’s membership in the California Native Plant Foundation has made this possible.
The grounds that encompass History Park are used for tours, concerts, picnics, parties and Family Days. Poetry Center San José participates throughout the summer, engaging children in poetry activities. The Empire Firehouse is also available for PCSJ's use for readings and events. The Museum Store and O’Brien’s ice cream parlor and soda fountain are open Tuesday through Sunday from 11am to 4pm. Visit History Park
Poetry Center San José could not exist without volunteers. PCSJ is seeking volunteers to help at Markham House. Docents keep the house open on Tuesdays from 12 to 3pm. This also allows the them time to write and to reference the library and or catalog Markham’s own book collection.
If you are interested in volunteering, please email us at email@example.com. | <urn:uuid:130f3f85-42e5-4ecd-92c5-975b857a7b09> | CC-MAIN-2022-33 | http://www.pcsj.org/markham.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.950231 | 987 | 1.882813 | 2 |
Tap Into Freedom
Freedom of pain, freedom of suffering, freedom of dis-ease.
Being free to do anything and fully live as one self.
Emotional Freedom Techniques, Tapping, Energy Psychology or ‘Acupuncture without the needles’.
This non-invasive technique is a wonderful blend of ancient medicine and modern psychoanalysis. It uses end points of specific Meridians (Energy Pathways of the body). These points are stimulated through tapping or rubbing while a Mantra-like phrase that addresses the issue is repeated.
Emotional Freedom Techniques was established in the 1990’s by Gary Craig. Based on Thought Field Therapy by Dr Roger Callahan, where EFT is a simplified version of TFT. In the 80’s Callahan had a client named Mary who had a strong phobia of water, which made even walking in the rain a traumatic event for her. After 18 months of trying various therapies Callahan gave the 5,000 year old Chinese knowledge a go and tapped on the end points of the affected area’s Meridian. Mary got instant relief from her phobia and ‘Tapping’ was born.
When looking up EFT’s reputation in the realms of ‘acknowledged’ science you will find it still doesn’t score too well, as many years of so called ‘anecdotal’ evidence had the result of EFT being dismissed as not credible.
Yet scientific proof is increasing continuously and even large health organisations are taking more and more notice of EFT as effective therapy. It is used in schools, for PTSD with war veterans, eating disorder, depression and other mental issues. The areas where tapping helps people and its popularity is constantly growing.
EFT is also used in a modality of memory reconciliation called ‘Matrix Reimprinting’.
Click to read more about this technique. | <urn:uuid:bf278792-9658-44ee-8e7b-76a59d27c30c> | CC-MAIN-2022-33 | https://tapintofreedom.net/about-eft/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.955637 | 392 | 1.601563 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.