text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
div epub:type=”chapter” role=”doc-chapter”>
13. Valvular Insufficiency
13.1 Chronic Mitral Insufficiency (CMI)
Chronic mitral valve insufficiency (CMI) is the most common cause of congestive heart failure in small breeds of dogs. It may lead to mitral regurgitation (MR) in long-standing cases. CMI is characterized by back flow of blood from the left ventricle to left atrium during ventricular systole leading to forward failure, backward failure, and volume overload. Its clinical severity is classified as functional heart failure class I, II, III, and IV. Clinically CMI is characterized by various grades of cardiac murmurs, fatigue, polydipsia, tachycardia, orthopnea, tachypnea, infrequent cyanosis, jugular pulse, hepatojugular reflex, arrhythmias, and dyspnea.
Etiology of CMI varies from genetic predisposition (especially in small and medium breeds of dog), arrhythmias, dilated cardiomyopathy, chest trauma to tumors. Diagnosis of CMI poses challenge in routine practice and requires a systematic approach employing detailed clinical examination, radiological examination, electrocardiographic examination, and echocardiographic examination.
13.1.1 Diagnostic Profile
Murmurs of various grades are detected on chest auscultation. Soft, blowing and an early systolic murmurs over mitral valve in the left chest may arise suspicion of mitral valve insufficiency.
Clinical manifestations are not very much specific. These are of general nature such as marked exertion, weakness, polydipsia, tachypnea, orthopnea, tachycardia, or cyanosis depending on the class of functional heart failure. In many cases there is a chronic productive or nonproductive cough. Cough is easily elucidated by tracheal palpation if tracheal collapse is coexisting. Therefore clinical signs may arise clinical suspicion especially in aged dogs of small breeds. The dogs with clinical suspicion of CMI should be thoroughly investigated.
Echocardiography is of vital importance in the diagnosis of CMI as status, and functioning of the heart valves can only be evaluated by echocardiography.
The echocardiographic changes in the mitral valve, left atrium, or left ventricle depend on the class of functional heart failure. Echocardiography in dogs with CMI may reveal mitral value thickening (Fig. 13.1) and change in its shape, increase in chamber size (atrium, ventricle) and/or contractility force of ventricles, etc.
Doppler echocardiography can detect retrograde flow of blood (from the left ventricle to left atrium during systole). Echo- and Doppler echocardiography are the only means to confirm chronic mitral insufficiency.
Electrocardiography is not of diagnostic value in confirming CMI. But it may detect some changes associated with different class of heart failure (class II, III, and IV functional heart failure). The following changes have generally been observed in cases of CMI:
P wave in lead II may be broad (duration more than 0.04 s) and notched, and its amplitude may remain between 0.35 and 0.4 mV suggesting left atrial enlargement.
Amplitude of R wave may increase in different leads. It may be more than 2.5 mV in lead II, more than 3.0 mV in lead CV6LU, and 1.0 mV in lead CV5RL.
Amplitude of S wave may be more than 0.5 mV in standard bipolar leads (lead I, II, III).
QRS may be broad (more than 0.06 s).
There may be frequent depression of T wave.
There may be changes in S-T segment (depression or elevation).
Atrial fibrillation, supraventricular premature beats, ventricular premature complexes, and ventricular tachyarrhythmia may be detected in electrocardiogram.
In class IV heart failure, low-voltage complexes may be evident.
Radiography may be helpful in detecting the changes in the size of left atrium. Enlargement of the left atrium (Fig.13.2) and/or left ventricle is a common radiographic finding in cases of CMI. In advanced cases pulmonary edema in dorso-caudal hilar region, enlargement of pulmonary vasculature, and dorsal displacement of trachea (suggesting left heart failure) are also evident. When mitral valve insufficiency is complicated with pulmonary hypertension, hepatomegaly and ascites (suggesting right heart failure) can also be visualized in radiographs.
Cardiac biomarkers- Levels of cardiac biomarkers (Cardiac troponin-I, NT pro-BNP) have been found elevated in cases of chronic mitral valve insufficiency.
No medical treatment provides complete cure. Nevertheless, treatment of chronic mitral valve insufficiency is directed as per degree of heart failure. It is outlined below:
Dogs with CMI showing class I heart failure generally do not require any treatment. But their excitability can be controlled with phenobarbital (@ 1–2 mg/kg given orally twice or thrice daily) and diazepam (@ .5–2.2 mg/kg orally). Isosorbide dinitrate can be given @1–2 mg/kg twice daily orally for reducing heart load and improving coronary circulation.
Dogs with CMI showing class II heart failure should be treated to prevent deterioration. The purpose of using phenobarbital, diazepam, and isosorbide is same as described under class I heart failure. Use of propranolol (@ 0.3–1.0 mg/kg orally twice or thrice daily) is to control associated tachycardia. To prevent or delay the onset of congestion, use of captopril (@ 0.25–0.5 mg/kg orally twice or thrice daily) is recommended. Enalapril (@ 0.25–0.5 mg/kg orally twice or thrice daily) can also be used in place of captopril. Furosemide (@ 2–4 mg/kg orally twice daily) is recommended as a diuretic to control congestion. Its dose should be reduced/discontinued when the dog is stabilized.
Dogs with CMI showing class III heart failure can be managed with the use of furosemide, nitroglycerine, isosorbide dinitrate, hydralazine, enalapril/captopril/prazosin, and digoxin as per clinical need. Furosemide (@ 4–5 mg/kg orally, IV, IM, twice or thrice daily until pulmonary edema is reduced followed by once daily dose) and spironolactone (4–5 mg/kg orally twice daily) are recommended for reducing the pulmonary edema. Nitroglycerine ointment (2%) is applied on skin area (0.5–3.0 cm) in groin region or on inner ear flap of dogs having problem in oral administration of diuretics. Isosorbide dinitrate can be given @1–2 mg/kg twice daily orally for reducing heart load and improving coronary circulation. If furosemide is less effective, its efficacy may be improved by using hydralazine (@ 1–3 mg/kg orally twice daily). Enalapril (0.25–0.5 mg/kg orally twice daily) or prazosin (1.0 mg/15 kg orally twice or thrice daily) is used to delay congestion and manage arrhythmias. ACE inhibitors like enalapril and diuretics like spironolactones should not be used together as electrolyte imbalance may occur. Digoxin (@ 0.005–0.008 mg/kg PO BID) is recommended in the management of supraventricular tachycardia. | <urn:uuid:73f7e759-8929-4fc2-8fa2-19acf508fe4c> | CC-MAIN-2022-33 | https://veteriankey.com/insufficiency/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.863973 | 1,761 | 2.453125 | 2 |
Thomas Merton was a mystic and an intellectual. He wrote many well received books during his lifetime as a Trappist monk at the Abbey of Gethsemane in Kentucky, America. The best known is the ‘Seven Story Mountain’. His books on spirituality and social justice drew in a wide range of supporters, one being the Dalai Lama. In his later years, he became a recluse in the monastery and gave more of his life in devotion to God. He died in 1968.
Thomas Merton is a first ray Master, the blue ray of Gods Will and Power. His aura is a light blue centre fading out to a mid-blue with a violet overlay on the outer blue. The power of the first ray is very evident in his energy. Thomas has taken on the role in the Ascended Masters portal as guide and doorkeeper. His innate inner power is needed in this position as he mixes with some of the vast Cosmic Beings who work in the portal. | <urn:uuid:b38da3a2-9980-4d25-87e5-a47dea3eec82> | CC-MAIN-2022-33 | https://alphaimaging.co.nz/thomas-merton-ascended-master/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.986104 | 201 | 2.296875 | 2 |
PubMed: Simulated microgravity contributed to modification of callogenesis performance and secondary metabolite production in CannabisIndica
Plant Physiol Biochem. 2022 Jul 14;186:157-168. doi: 10.1016/j.plaphy.2022.07.012. Online ahead of print.
In vitro plant culture paves the way for meeting the industrial demand of pharmaceutically valuable secondary metabolites. This study intends to monitor how callus cells of Cannabis indica respond to the simulated microgravity (clinorotation; a Man-made technology). Callus initiation resulted from the culture of the leaf explant in a medium supplemented with kinetin (0.5 mgL-1) and 2, 4-D (2 mgL-1). Calli were treated with microgravity at three exposure times (0, 3, and 5 days). The microgravity treatments increased callus biomass about 2.5-fold. The clinorotation treatments transcriptionally induced the olivetolic acid cyclase (OAC) and olivetol synthase (OLS) genes about 6.2-fold. The tetrahydrocannabinolic acid synthase (THCAS) and cannabidiolic acid synthase (CBDAS) genes displayed a similar upward trend in response to microgravity. The applied treatments also stimulated the expression of the ethylene-responsive element-binding proteins (ERF1B) and WRKY1 transcription factors by an average of 7.6-fold. Moreover, the simulated microgravity triggered epigenetic modification in the DNA methylation profile. The HPLC-based assessment validated the high efficacy of the clinorotation treatments to increase the concentration of cannabinoids, including Cannabigerol (CBG) and Cannabidiol (CBD). However, the clinorotated calli contained a lower concentration of Tetrahydrocannabinol (THC) than the control group. The microgravity treatments increased concentrations of proline (79%), soluble sugars (61.3%), and proteins (21.4%) in calli. The biochemical assessment revealed that the clinorotation treatments slightly increased H2O2 concentration. The upregulation in the activities of peroxidase, catalase, and phenylalanine ammonia-lyase enzymes resulted from the microgravity treatments. Both HPLC and molecular assessments validated the significant efficacy of microgravity to enhance the production of cannabinoids.
#CBD #Hemp https://pubmed.ncbi.nlm.nih.gov/35849945/?utm_source=Chrome&utm_medium=rss&utm_campaign=None&utm_content=1jYCQzi_o_qLYr-oQfnMhShgOXkvGma3vcnBGJtrBhuJMOvEVJ&fc=None&ff=20220719162130&v=2.17.7 July 19, 2022 10:00 am | <urn:uuid:e53c2319-03bb-4530-a9c2-4e6ee2ade6ef> | CC-MAIN-2022-33 | https://therichardrosereport.com/pubmed-simulated-microgravity-contributed-to-modification-of-callogenesis-performance-and-secondary-metabolite-production-in-cannabisindica/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.845902 | 622 | 2.109375 | 2 |
With contactless payments well and truly established as an everyday method of paying for low-value good and services, it’s unsurprising to see banks like Barclays try to expand market share in the area through the introduction of new devices that can make payments.
However, Barclays has notably shunned Apple Pay, leaving it as the only major UK bank not to support Apple’s payment service. Clearly, it wants to build out its own, rather than integrating with another company’s more popular option.
This month, it launched three new ways of making contactless payments – a wearable wristband, a fob to attach to your keys and an NFC sticker you can attach to your phone.
The devices aren’t provided for free (the wristband is £24.99, fob is £19.99 and the sticker is £14.99), but once you have one, loading money onto your account and the transactions are all fee-free.
First things first, technophobes need not look away – you’re being charged for these devices, but they are by no means ‘high-tech’.
Depending on which you opt for, you’ll get an NFC chip that looks like about the size of an old SIM card.
If you have a wristband, you just need to pop the card in the holder. If you have the fob, you just press in the little button section and it will pop apart, allowing you to insert the card.
If you go for the sticker option, it’s all self-contained, so you just stick it on your phone or wallet and away you go.
I didn’t have one, and was setting it up via my phone, so managed to introduce a few errors into my details, which caused a few minor problems.
With my name entered as ‘Bem’ and an incorrect personal email address registered, I wanted to correct this before continuing on with my test. Unfortunately, I’d already loaded the chip in my wristband with some credit, else I’d have just created a new account.
To make things slightly trickier, the website – which I switched to when I couldn’t change my name in the app – wouldn’t accept my password. Of course, I’d normally go through the password reset option and change it, but with an incorrect email address registered, this wasn’t possible either.
If you find yourself in the same ridiculous situation (the app should really verify your email address before allowing you to load it with credit), then what you’ll need to do is change the email address registered in the app – and then create a new password via the usual method.
Once this self-inflicted problem had been dealt with, using the bPay band was straightforward and quick. Even though the name on my account is now ‘Ben’, the devices are still registered in my account as ‘Bem’s [device name here]’.
Thankfully, as a non-Barclays customer, the service isn’t restricted to specific banks or payment cards, and as it’s a pre-pay system, you won’t be able to run up huge bills and spend lots of money (in small transactions, of course) without first loading it with cash.
There is an auto top-up option though, which you can set at £5 or more (up to £200). Auto top-ups can be set to kick-in at a level you choose, so that could be as soon as you fall below £100 or £200, or it could be as you’re scraping the bottom of the barrel at less than £5.
Through the app, you can also check back over your purchase history and manage which devices are connected to your bPay account.
If you lose any of the fobs or wristbands, you can report them lost or stolen via the app, which blocks further transactions.
As I said at the start, contactless payments aren’t exactly new in the UK or many other countries.
Generally, I’d just use a contactless-enabled bank card to make payments but with any of these bPay devices that just got a whole lot more convenient – there’s no need to fumble around in your pocket as you stagger onto a bus loaded down with shopping, and there’s no need to hold up queues in shops.
The first place I used it was a coffee shop in central London, and as I swiped the band over the reader to pay for my drink, the server asked if it was an Apple Watch.
Not quite. But then it doesn’t have the same price tag either.
Ultimately, the bPay works well and is a simple enough introduction to mobile payments to appeal to a mainstream audience. You might wish Barclays supported Apple Pay, but I’m pretty sure that these bPay devices would be more use (and hold more appeal) to my mum.
For me, none of the three devices quite make sense for long-term use – I want something integrated into devices I already use, not another one to wear or carry around. With an Android Wear watch, Jawbone UP3 and now this bPay wristband, I’m starting to run out of free space on my arm.
“But why not just use the fob or sticker?” I hear you ask.
The fob would require me to root around and find my keys in a pocket or bag, thereby eliminating its key appeal for me, while the sticker is designed to be attached to a phone or wallet. The irony of attaching it to a wallet is too much to bear – I’d just use my contactless payment card if I’m opening my wallet, and I don’t really like the idea of sticking an authentication-free payment method to my phone. Phones tend to get lost.
That said, if you’re looking for an inexpensive, low-tech way of making contactless payments, then Barclays’ bPay bands are one option, provided you have enough room on your arm.
➤ Barclays bPay [Barclays]
Read next: Apple Pay is coming to the UK next month | <urn:uuid:0265a4c0-e59d-47fa-b91a-57d65a473020> | CC-MAIN-2022-33 | https://thenextweb.com/news/barclays-bpay-band-convenient-contactless-payments-if-youve-got-the-wrist-space | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.949712 | 1,323 | 1.617188 | 2 |
A proper management and control over costs is crucial to maintain and grow profits which is the primary objective of every commercial business. The first step in achieving this is to understand the nature of costs that a business incurs while carrying out its operations as well as the factors affecting those costs.
Variable cost is one key categorization of total costs incurred in a business unit. Every cost that explicitly changes with a change in the level of output or another business activity qualifies to be a variable cost. Within variable costs as well, there are different cost categorizations based on their relationship with level of output.
The article “true variable vs step variable cost” looks at meaning of and differences between these two types of variable costs – true variable cost and step variable cost.
Definitions and meanings
True variable cost
True valuable costs are those variable costs that have a direct and one to one relationship with output levels of a business. In other words, these costs are directly proportionate to output and change with every change in output level. So, if for every single unit increase in output, a particular cost element also increases by a specific quantum then this cost would qualify as a true variable cost.
As these costs vary directly in proportion to the level of production, they would not be incurred in situations where production level is zero.
Example: Direct materials is a classic example of true variable cost. Suppose, for example, a corporation named ABC Inc. manufactures commercial vehicles. A large part of its costs includes direct material costs such as metal frames, tyres and car accessories. Every commercial vehicle manufactured requires a specific amount of these direct materials. Hence for every additional vehicle manufactured, these direct material costs will also increase proportionately. Conversely, if no vehicles are manufactured, these costs would not have to be incurred.
Step variable cost
Step variable cost is also a subtype of variable cost that remains the same up to a particular level of output and increases once that particular output level is breached. These costs also vary with the level of output but they have a staggered relation with the level of output.
For example, a cost can be say $100 up to 500units, increase to $185 for 501 to 1,000 units and to $260 if output crosses 1,000 units. The cost with such a pattern of increase would be classified as step variable cost. This means that the cost would remain the same whether 1 unit or 500 units are produced, it would increase once the 501st unit is produced till 1,000 units and would increase further once the 1001st unit is produced. This behavior of such cost give it its name “step variable cost”.
Example – (continuing the above example of ABC Inc. under the true variable cost explanation): ABC Inc. also incurs maintenance cost on its machines. These are contractual costs that are incurred on output milestones, as follows:
Maintenance costs will thus increase with every 10,000 unit increase in production levels. This is thus an example of step variable cost.
Difference between true variable and step variable cost:
Some main points of difference between true variable and step variable cost have been listed below:
- True variable costs are costs that increase or decrease in direct proportion to increase or decrease in the level of production/activity of an entity.
- Step variable costs are costs that are incurred at a particular amount up to a specified level of output and increase only once output levels exceed the specified level.
2. Cost behavior
- True variable costs are directly proportionate to output levels and thus behave only as pure variable costs.
- Step variable costs on the other hand have characteristics of both fixed and variable costs. These costs are fixed at an amount up to a particular output level and behave like a variable cost once particular output level is breached.
3. Graphical presentation of cost behavior
- True variable costs have a linear graphical representation as they are directly proportionate to output levels.
- Step variable costs represented graphically, remain horizontal up to a specific level then increase after this level. This behavior repeats at each output threshold level giving the graphical representation a step like appearance.
4. At zero level of production
- True variable costs are not incurred at zero levels of production. For example, if production is halted, materials will not be required and hence this cost will not be incurred.
- Step variable costs may continue to be incurred at zero levels of production. For example, even if production is halted, minimal maintenance cost for upkeep of machines may need to be incurred.
5. Increase quantum
- True variable costs increase on a per unit basis; hence every increase is in a smaller and systematic proportion.
- Step variable costs increase only on increase in outputs beyond certain levels hence they increase by larger lumpsum amounts.
6. Impact on per unit costs
- The per unit cost of true variable costs remain the same irrespective of the level of output.
- The per unit cost of step variable costs keep decreasing up to a certain level of output, once this level is crossed the per unit cost can increase significantly and once again starts decreasing as the output levels rise.
- Examples of true variable costs include raw material costs, transport costs etc.
- Examples of step variable costs include maintenance costs, cost of shop floor supervisors, cost of employees servicing customers in hospitality industry etc.
Conclusion – true variable vs step variable cost:
Understanding the nature and behavior of a particular cost element is much important for managers in exercising their decision making function. Once a cost is correctly categorized, effective cost control and cost management policies can be devised and implemented successfully.
A certain cost may have a key impact on overall profitability. For example, a step variable cost may have a considerable impact on profitability if production increases across a certain level which can significantly increase costs without a commensurate increase in sales. This understanding and analysis of cost behavior is of great importance for management to take decisions regarding production and other activities that may have a core impact on cost. | <urn:uuid:2377976f-8f20-444e-b57d-ec64bc4aa538> | CC-MAIN-2022-33 | https://www.termscompared.com/true-variable-vs-step-variable-cost/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00465.warc.gz | en | 0.922877 | 1,228 | 3.5 | 4 |
A calendar is only one of many very important document or tool employed by individuals, companies, and organization to stay informed about their work activities. For that, you should put in a calendar initially and then abide by the standard print out method to have a print out. A moon calendar is very beneficial in Astrology. You can also utilize the calendar to see date and day or perhaps schedule your day-to-day program. In only a few of straightforward clicks, then it is easy to print your calendar readily. Therefore, in the event that you make the choice to produce your own calendar, ensure you factor in the cost of all things! If you wish to produce your own printable calendar, we are able to aid you!
Universal Orlando Crowd Calendar 2021 January – Around The Universe-Disney Crowd Calendar 2022 Touring Plans – 34231
Universal Orlando Crowd Calendar 2021 January – The Best Time To Visit-Disney Crowd Calendar 2022 Touring Plans – 34224
If you are searching for 2018 templates, then you may possibly visit here 2018 calendar web templates page. The template will allow you to know the vacation and festivals you can plan and can delight in different test of the life. If you’re looking for any kind of calendar template, and that’s not available here then please inform us. An editable calendar template is likely to be a fantastic tool that can help you at the custom of managing your work activities in an organized and skilled way.
A number people are really creative in regards to designing and making calendars. If you merely need an easy calendar to publish, then you’ve attained the correct place. You can also create your personal calendar utilising the calendar customization button. A printable calendar is rather convenient to take simply because they’re in the printed form. Printable Calendars are a great method to keep organized and stay on top of everything you want to accomplish. A calendar can be an rather handy tool in regards to track and manage work activities. A holiday calendar differs for every nation, so make sure to examine holiday calendar depending on your country only.
Photos: Renovated All-Star Music Family Suites Quick Photo Tour-Disney Crowd Calendar 2022 Touring Plans – 34233
Busch Gardens Tampa – Crowd Calendar – January 2021 – Touring Central-Disney Crowd Calendar 2022 Touring Plans – 34229
Legoland Florida Crowd Calendar 2022 – March 2022 Calendar-Disney Crowd Calendar 2022 Touring Plans – 34232
Busch Gardens Tampa – Crowd Calendar – June 2020 – Touring Central Florida-Disney Crowd Calendar 2022 Touring Plans – 34230
Kenny The Pirate Crowd Calendar 2022 – April 2022 Calendar-Disney Crowd Calendar 2022 Touring Plans – 34225
Busch Gardens Tampa Crowd Calendar June 2022 – January Calendar 2022-Disney Crowd Calendar 2022 Touring Plans – 34228
Universal Orlando Crowd Calendar 2021 January / Disney World 2021 2022-Disney Crowd Calendar 2022 Touring Plans – 34227
Disney Cruise Line News – Week Of November 16, 2019 – Touringplans Blog-Disney Crowd Calendar 2022 Touring Plans – 34226
You are even allowed to customize a calendar only the direction you want to buy. Now the calendar isn’t only a system to provide information about days but additionally utilized like a private secretary where you could be ready to combine your very own personal and professional programs. A clean calendar is thought of among the most popular substances for all those. It enable you manage your everyday life tasks in a efficient way. You may want to down load a few more calendars for unique uses.
There are many different type of calendars offered in lots of formats and design which allow people to essentially manage their job or another task in a manner that is efficient. They’re among the most effective promotional products which any business can put money into. The wall calendar is also very prized for you thus must have to learn how a calendar work. Wall calendars are somewhat so-named as they have been designed to be displayed to a wall. Today you might also download most of calendars of 2019 and also we are here using calendar of July 2018 which you are able to download in any moment but there is only one condition that for downloading the calendar that you’ll require a powerful online connection for the document cannot interrupt between your downloading of the calendar because of poor connection to the internet. Creating a straightforward calendar is actually pretty easy, all you should do is download a complimentary template from above, produce a few changes inside it according to your own requirement, which is it. Possibly for you to download as much printable calendars as you would like. | <urn:uuid:3bf68670-ca56-4992-8ff2-472e1b3c8219> | CC-MAIN-2022-33 | https://oyungurup.com/disney-crowd-calendar-2022-touring-plans/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.91446 | 931 | 1.585938 | 2 |
Teaching Kids About Money, Ways to Help You Raise Financially Wise Children
When you pay bills with a click of a button or buy food with a swipe, what are your kids learning about money? It is getting challenging to teach our kids about finance and money in the digital globe since there is just not as much opportunity to interact with money.
In a globe of neat budgeting apps and debit cards stick with the basics when it comes to kids at least initially. You can start your kid with three piggy bank systems, use one to teach them how to save, another for sharing, and another one for spending. You can use simple, clear jars where they can see the money growing.
Kids also learn about money by observing their parents. While swip[ing a debit card at the store makes sense to you, children do not concretely see that transaction as spending money. So try to expose your children to real money whenever you can. This guide will show you how to teach kids about money in the digital age.
Introducing money to young children
Teaching your kids about money establishes a foundation for lifelong success. The earlier you start, the better. Most experts recommend adding basic money concepts around age three to four.
While today’s technology world provides perks, a cashless society especially challenging for teaching young kids about money, kids under seven can not yet think logically or mentally manipulate info, making physical props such as dollar bills and coins essential at this age, together with hands-on experiences vital to their learning.
- Try to use cash when buying things as much as possible, even if you do not make sure you:
- Visit the bank with your kid and discuss how banks work
- Go with your kid to the store and explain how you make purchase decisions
- Begin a change jar to illustrate how savings accumulate
- Count coins to support necessary math skills and familiarize your child with various coins and values
- Play store together, with real or play money with a cash register
- Teach your kid about real money at home.
- Start with smaller purchases such as lunch or coffee at a restaurant. Show your kids the bill, assist them in counting out the cash for payment, and ask them to check if they got the correct change.
- Start explaining the differences between what payment method you are using- Cash, the credit card, and debit card. The kids ar4e not going to understand everything initially; however, you will make them comfortable with the product.
- After you feel your child has an understanding of money basics and has had plenty of interaction with physical cash, opening a bank account for your kid can serve as a great transition to working with digital transactions and online tools and help your kids understand how interest works.
How to teach tweens about money?
Kids age eight to twelve portray new skills and thought patterns. By the end of this development stage, they should attain the milestone of logical thought, enabling them to comprehend the concept of cashless money transactions. Since tweens are eager to learn, pre-teen years are a prime time for financial learning, particularly from you. Seize this chance with wise parenting and technology.
- Develop a custodial bank account with basic online functionality
- Select family-friendly budgeting and saving app to use together
- Make sure you limit online purchase opportunities
- Choose financially-centered websites, apps and online games for your kids to enjoy
Probably, your tween has moved beyond the egocentric focus of earlier years. And that he or she can now understand different opinions and enjoy more cooperative, enriched social interactions.
- Center on philanthropy includes different ways of giving, such as skills, time, and money (both cash and online).
Increased language, reasoning skills, and math allow for rapidly expanding financial learning.
- Assist your pre-teen in establishing a basic budget
- Transaction towards bi-weekly allowances, paid by electronic transfer to your tween’s custodial account
- A greater understanding of the time concepts enables your pre-teen to define and start saving for both short and long term financial goals
Teaching kids about money through pocket money and chores
While parents have been applying pocket money and chores to teach children about budgeting for decades, it remains an invaluable instrument. Giving your kids pocket money in return for small duties can assist children in understanding the relationship between time spent doing work and money. A weekly pocket money allowance can also help develop your kids’ budgeting skills. If you give them a weekly amount of money which they require to use for daily routine activities together with some personal luxury money, it can teach them to prioritize between wants and needs.
Note it is never too late to provide money lessons for kids
When it comes to financial mistakes, exposing your kids to money at an early age enables them to make mistakes when they are young enough that the consequences are not too weighty.
They could spend their money on a trendy gadget that turns out to be a default, or they give in an impulse purchase that sets them back to save for something they need. The fallback from those choices is not as devastating as not having any savings when an emergency pops up as an adult.
If you have missed out on teaching your children about money in kindergarten, and now they are in their teenage years, it is not too late to begin having personal finance discussions. By age thirteen, your child’s mastered the ability to reason deductively, think abstractly, and mentally manipulate information. They also enjoy being early adopters of the digital era. These new skills make teenage years suitable for digital money management.
Money management applications can promote budgeting skills. Some enable parents to maintain ultimate control over the funds, whereas others come with a debit card of sorts. Online banking can encourage saving by offering convenient and easy access to real-time data on account balances.
Greater personal independence translates into increased financial responsibility.
- Adjust the allowances, relative to your teen’s income and increased financial responsibility
- Consider having your teen establish a savings account for college and beyond, with online viewing to facilitate monitoring savings progress
- Transition saving and spending responsibilities to your teen
- Explain how taxes work, and how to file an electronic tax return
- Your teen can work part-time, automatic wage deposits will now be possible
- Digital banking supports financial autonomy; however, it still offers you some control, such as viewing rights.
- Use their first job as a money learning moment. If your teen is old enough for a part-time job, you have got yourself an opener for a whole slew of money conversations. Even better if the kid is old enough to work a real legal job since they can start to access joint accounts and linked accounts. Please take the opportunity to begin teaching them how the economy works, and have money conversations around, taxes, rates of pay, and superannuation. Make sure the teens have a basic understanding of the concept of tax- the fact that when you work, you become a contributor to society.
Kids can be justify unexposed to transactions and money for years to misconstrue their opinions about how money works and how to use it responsibly. While they might not see you using cash for each purchase, remember that frequent conversations about how money works are the best strategies to assist children with a good foundation for understanding personal finance. Talk to your children about money frequently to assist them in making the invisible cash real. Remember that helping your kid to develop a healthy relationship with money is critical to future life and financial success. | <urn:uuid:ee37d23f-8625-48b3-85f3-873eebcb2e9a> | CC-MAIN-2022-33 | https://www.topfinancialresources.com/blog/how-to-help-your-kid-develop-good-money-habits-in-the-digital-age/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.946176 | 1,546 | 3.765625 | 4 |
Culture is central to the study of mind and behavior. This course will provide students with an introduction to theory and research on culture in psychology. We will discuss what culture is, the methods that psychologists use to study culture, and how much of our behavior is universal or culture-specific. We will explore how culture influences how we think, feel, and behave.
||Gen Ed Area Dept:
|Course Format: Lecture / Discussion||Grading Mode: Student Option|
||Fulfills a Major Requirement for: (PSYC)
||Past Enrollment Probability: 75% - 89%
|Major Readings: Wesleyan RJ Julia Bookstore
|Examinations and Assignments: |
|Additional Requirements and/or Comments: |
This is a column 3 breadth requirement course in psychology.
|Instructor(s): Perez,Michael James Times: .M.W... 02:50PM-04:10PM; Location: TBA|
|Total Enrollment Limit: 35||SR major: 8||JR major: 9|| || |
|Seats Available: 4||GRAD: X||SR non-major: X||JR non-major: X||SO: 14||FR: 4|
|Drop/Add Enrollment Requests|
|Total Submitted Requests: 5||1st Ranked: 2||2nd Ranked: 1||3rd Ranked: 2||4th Ranked: 0||Unranked: 0| | <urn:uuid:dca5b784-fd4e-48f8-bd74-d7c1d8c6a4ed> | CC-MAIN-2022-33 | https://owaprod-pub.wesleyan.edu/reg/!wesmaps_page.html?stuid=&crse=012336&term=1229 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.744191 | 381 | 2.84375 | 3 |
Year : 2022 | Volume
: 7 | Issue : 2 | Page : 40--46
Associated clinical factors of diabetic complications in Chinese patients with Type 2 diabetes
Xiaojing Wang1, Wenying Zhao1, Meihua Ji2, Dong Zhao1
1 Center for Endocrine Metabolism and Immune Diseases, Beijing Luhe Hospital, Capital Medical University, Beijing, China
2 Department of Adult Nursing, School of Nursing, Capital Medical University, Beijing, China
Background: The prevalence of the metabolic syndrome (MetS) is high among Chinese patients with type 2 diabetes. There is limited evidence in understanding the relationships between individual-level clinical indicators of MetS and diabetes complications among Chinese patients with Type 2 diabetes.
Aims and Objectives: This study described the characteristics of patients with Type 2 diabetes in terms of the prevalence of MetS and clinical factors related to the common diabetes complications.
Materials and Methods: Patients (n = 402) with Type 2 diabetes admitted to a tertiary hospital in Beijing were included in the study. Using patients' retrospective data, logistic regression was applied to determine the associated clinical factors of common diabetic complications.
Results: In this sample, the prevalence of MetS was 84.3%, with the prevalence of diabetic peripheral neuropathy, microvascular, and macrovascular complications being 59.7%, 63.4%, and 61.7%, respectively. Our results showed that the diastolic blood pressure was significantly associated with diabetic retinopathy, while the levels of C peptide and fasting glucose were significantly related to diabetic nephropathy. Meanwhile, the regression also showed that the waist to hip ratio (WHR) is a significant indicator for the development of macrovascular complications. A 0.1 increase in the WHR will increase the chances of having carotid artery disease by 1.29 folds.
Conclusion: The current study demonstrates that the prevalence of MetS and the common diabetic complications are relevantly high in this sample. Our findings suggest that reducing the WHR, controlling blood pressure, and improving glycemic control following clinical guidelines are essential to prevent or slow the progression of diabetes complications among patients with Type 2 diabetes.
Professor, Center for Endocrine Metabolism and Immune Diseases, Beijing Luhe Hospital, Capital Medical University, 82, Xinhua South Road, Tongzhou District, Beijing
Associate Professor, School of Nursing, Capital Medical University, 10 Youanmen-Wai Xi-tou-tiao, Fengtai District, Beijing
|How to cite this article:|
Wang X, Zhao W, Ji M, Zhao D. Associated clinical factors of diabetic complications in Chinese patients with Type 2 diabetes.Environ Dis 2022;7:40-46
|How to cite this URL:|
Wang X, Zhao W, Ji M, Zhao D. Associated clinical factors of diabetic complications in Chinese patients with Type 2 diabetes. Environ Dis [serial online] 2022 [cited 2022 Aug 12 ];7:40-46
Available from: http://www.environmentmed.org/article.asp?issn=2468-5690;year=2022;volume=7;issue=2;spage=40;epage=46;aulast=Wang;type=0 | <urn:uuid:953979cc-0da6-40f0-9fba-ff8a3f0209c8> | CC-MAIN-2022-33 | https://environmentmed.org/printarticle.asp?issn=2468-5690;year=2022;volume=7;issue=2;spage=40;epage=46;aulast=Wang;type=0 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.88604 | 707 | 1.632813 | 2 |
A mechanical seal is a device which helps join mechanisms or systems together using pressure. This type of seal can be used in plumbing systems to prevent leakage in the tubes and pipes. A mechanical seal can also be used for manufacturing and other high pressure applications.
Mechanical seals offer the required reconciliation and sealing between a compressor housing or stationary pump, and a spring shaft. They generally contain a key area such a bushing or ring that is mounted, and has a stationary seal brought about by a spinning shaft or an o-ring. Another portion is affixed to the stationary housing which also carries an o-ring seal. | <urn:uuid:ea0e0f07-c501-46ee-977e-e0c8ff0fd7f2> | CC-MAIN-2022-33 | https://www.tisun-seals.com/i-News-199814/what-is-mechnical-seals-296599.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.954652 | 124 | 2.890625 | 3 |
- What: Poetry and song concert
- Date: Sunday 26 June 2022
- Time: 4pm to 5.30pm (please arrive at 3.45pm for a 4pm start)
- Where: Cambridge Corn Exchange, Wheeler Street, Cambridge, CB2 3PQ
- Cost: Free (no need to book in advance). Voluntary donations will be taken for the Cambridge Refugee Hardship Fund
- Suitable for children from Key Stage 2 onwards. We suggest that children under the age of nine only attend at the discretion of adults
Voices of Hope and Healing is a free poetry and song concert taking place at 4pm on Sunday 26 June at the Corn Exchange in Cambridge, to mark Refugee Week and Holocaust Memorial Day.
HistoryWorks and Michael Rosen present Voices of Hope and Healing in partnership with DoSoCo Foundation and composer Andrea Cockerton. ‘Voices of Hope and Healing’ is to mark Refugee Week and Holocaust Memorial Day on behalf of Cambridge City Council. Holocaust Memorial Day is marked each year on 27th January, the date that Auschwitz was liberated, but the annual civic event for 2022 had to be postponed in January due to COVID-19 so it is fitting to commemorate instead during Refugee Week this year.
The event is not ticketed, so there is no need to book in advance. Everyone is invited to come along to show and share empathy and support for refugees and asylum seekers.
Please come along to hear poems performed by Michael Rosen, with many of the poems from Michael's volume of poetry On the Move. Poems about Migration. New songs have also been composed by Andrea Cockerton to Michael Rosen's lyrics, and will be premiered at the event, sung by the DoSoCo Foundation Choir and CAP Singers. There are also performances inspired by primary, secondary and sixth form schools in Cambridge, with more than 3,000 children involved behind the scenes composing poems and songs, dances and dramas to empathize with refugee experiences.
There will be dance and drama performances inspired by Michael Rosen’s words and storytelling about his family who went missing at the end of World War II. The poems and stories reveal Michael’s journey to discover they were murdered at Auschwitz.
These pieces, including new work Tracing, are performed to Michael Rosen's words by Youth Elevation Dance Company with choreography by Helen Garner and music composed by Alex Cook. Further pieces of physical theatre will be performed by the Cambridge Academic Partnership Drama Group with choreography led by Russell Burgees. Michael will use his own words to tell the story of Oscar and Rachel as they were captured by the Nazis, followed by a powerful drama about those who were on the same convoy but who escaped from the train.
The concert is suitable for children from Key Stage 2 onwards. However, we suggest that children under the age of nine only attend at the discretion of adults in their family to follow-up and guide their children to discuss issues they will hear and learn about during the event.
For more information about the concert or to find out more about Michael Rosen’s poetry and work with local schools, please visit the HistoryWorks community project website.
Although the event is completely free to attend, attendees who wish to make a donation at the event will be welcome to do so. This year collections will be taken for the Refugee Hardship Fund which is administered by Cambridge Ethnic Community Forum (CECF) Refugee services, supporting refugees, especially newly arrived refugees from Afghanistan and Ukraine, and destitute asylum seekers.
Please visit the CECF website’s donations page to make a donation to the Cambridge Refugee Hardship Fund.
You can find out more about the appeal on the CECF Facebook page.
A text donation service is also in place through Donr and anyone who would like to donate in this way can do so by texting the word REFUGEE to 70560.
Your donation will help provide vital assistance for mobile phone credit, emergency food, toiletries and other necessities for asylum seekers and refugees, including Afghans and Ukrainians as they arrive in Cambridge. | <urn:uuid:075bed62-bdc9-4633-b721-9fac8b101724> | CC-MAIN-2022-33 | https://www.cambridgelive.org.uk/city-events/news/2022-commemoration | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.964597 | 841 | 1.523438 | 2 |
Cooking is an art form. It’s a marriage between salt, fat, sweetness, and heat. A typical way of adding heat to our food is through the humble chili. Chili peppers come in various shapes, sizes, tastes, heat levels, and even sweet levels.
There are many types of chilis, but they all add their own type of spice and uniqueness to any dish depending on which type it is. From the moreish jalapeno to the California Reaper, the different taste sensations feel limitless.
What do you do, however, when your favorite chili is nowhere to be found? Let’s have a look at 9 different substitutes for chili that you can incorporate into your cooking and probably already have to lurk in your spice cupboard.
What popular substitutes can I use for red chili pepper? Serrano peppers, cayenne peppers, cumin seeds, Pequin chili pepper, or Tien Tsin chili peppers work very well as substitutes for red chili pepper.
Finding a replacement for your favorite food can feel like the end of the world. But we’ve got you covered! If you’ve got a recipe that calls for a hot, smoky flavor, but all you have is milder peppers on hand—don’t worry! There are plenty of alternatives out there to get the same effect.
If you are new to using chilis in cooking and are looking for a sweet and spicy chili pepper flavor without any heat, try using fresh poblano or New Mexican green varieties; both add some spice while still having those sweet notes.
Or, if your dish needs more sweetness than spiciness, use Anaheims, which will be slightly less potent in terms of how much capsaicin they contain (a compound found in chilies). If this isn’t enough kick for everyone, then go with canned chipotle peppers instead, as these pack a sizable punch and bring a certain smokiness.
Below is our list to help find an appropriate chili substitute. You should know that knowing how much heat, sweetness, and smokiness you want in your dish will affect what type of chili pepper works best with different recipes, so make sure to keep in mind these qualities when selecting one below!
What Are Red Chilli Peppers?
The red chili pepper comes from capsicum plants. They provide us with carbs, and they also offer a small amount of protein and fiber, but we don’t eat them in large enough quantities to make them an important part of our diet.
You can use chili peppers to spice up dishes like fajitas or pasta sauce. You can even add some heat to your seafood dish by adding chilies to dishes like paella or spicy seafood pasta.
Not only do these fruits help give flavor, but they also add depth and complexity to the flavor profile of the dish. The fiery flavor is just one way these hot peppers add zesty sweetness and a unique smokiness too.
1) Serrano Pepper
Fiery, green serrano peppers are harvested while still young and provide a spicy substitute for red chilies. They have a mildly hotter flavor than the more popular jalapenos or other chili varieties. Make sure not to overdo it with these spicier peppers because their heat level varies wildly from pepper to pepper!
OliveNation Smoked Serrano Powder is an ideal brand to use as their chili powders range from 8’000 to 42’000 on the Scoville Heat Scale, packing in a lot of heat into just a little powder, making it very affordable and long-lasting.
2) Cumin Seeds
Cumin seeds are a great substitute for red chili pepper because they have a similar flavor and can be used in the same way. You need to know that cumin has earthier undertones than chili, so you may want to use more of it if your dish is on the mild side or add some additional ingredients to add richness.
If you are looking for high-quality, certified USDA organic cumin seeds, look no further than Jiva USDA Organic Cumin Seeds. The seeds are of the highest quality, the bag they come from is perfect for long-term storage, and if you decide to purchase through this link, Jiva will donate a complete meal for a child in need with every purchase.
3) Chipotle peppers
Chipotle peppers are a fantastic option for people who want to enjoy their favorite Mexican dishes but don’t have any red chili pepper varieties in the house. They provide an enjoyable, spicy taste that can be used with black beans or refried beans and paired perfectly well with rice.
If you’re looking to spice up your dish, then these spicy little morsels will do the trick! These peppers tend to be spicier than red chili peppers, so use sparingly.
Chipotle peppers are also typically used in Mexican dishes and are infamous for adding earthy richness to Adobo Sauce.
For authentic cooking, I recommend you use dried Chipotle Morita Chile Peppers, and these have been grown and cultivated in Mexico to give you that authentic flavor.
4) Cayenne Peppers
Cayenne pepper is a unique type of chili that can range from mild to hot and is chili with an iconic shape with one pointed end. It depends on what type and conditions of its growth to determine how spicy they are.
These peppers are typically found in spice sections of grocery stores, usually dried or ground up into powder form for easy use later. This makes them a good substitute for recipes calling for red chilis both ground up and whole.
Ground cayenne pepper is a smart ingredient to buy. McCormick Ground Cayenne Red Pepper is my recommendation as they start with whole, ripe peppers, which are then dried and milled under strict conditions, making this a high-quality and enduring purchase for your pantry.
5) Pequin (PIQUIN) Chili Peppers
The Pequin Chili Pepper is an interesting chili because it has a rectangular shape and is shorter than other peppers. They are usually about an inch long and are fire-engine red in color.
The most important thing to know about these chilies is that their cultivation is limited due to environmental conditions. The fact that there’s so little of this pepper makes it hard for people who love spicy food to find them!
When farmers harvest Pequin peppers, they are smoked over a wood fire that provides its signature taste and unique flavor profile. These chilis are good substitutes for any recipe which calls for a smoky, fruity flavor, such as Southern BBQ-style foods. Boiling sauces and salsas.
These peppers should be used in moderation as a small amount will add a good amount of heat to even a large portion of food.
Another way of storing your chili is in a light pickling, such as the San Pedro Chile Piquin chilis. These give you the versatility of whole chilis with the long shelf life of dried chilis—the perfect blend of both worlds.
6) Jalapeño Peppers
The ever-popular Jalapeño pepper is undoubtedly one of the most well-known chili peppers throughout the world. These chilis vary in color from dark green to red and range from medium hot to very spicy. Jalapenos can be found in many Mexican dishes and featuring in many other dishes across the world.
They have a uniquely flavorful taste that so many people love. These chilies are also known for their health benefits and add nutritional value to any meal with plenty of vitamins such as vitamin C and E.
There is no need to think twice about substituting them into any dish that calls for whole red chili peppers because they are just as delicious, though do add with caution as they can be incredibly spicy.
If you want a slightly milder jalapeño for your sumptuous meal, then I highly recommend Jeff’s Naturals Sliced Tamed Jalapeño Peppers. Another high-quality brand with a focus on offering the best products to you.
7) Tien Tsin Peppers
Tien Tsin peppers are perfect for those looking to add a little spice and flavor without the intense heat of some other fiery chilis. This is a chili pepper from the northern part of China, and they’re also known as Chinese Red Peppers. They are ideal to be substituted into dishes like Szechuan or Kung Pao Chicken.
These Chinese Red Peppers have low yields, meaning they’re a little harder to find than other varieties. They pack less heat than your favorite jalapeno but still retain that fire you crave when eating out at a spicy restaurant with friends on Friday night! Just remember to use less when substituting for these peppers if you don’t want your dish too spicy.
What better way to add the best authenticity to your dish than using genuinely authentic ingredients? This Sichuan Chinese Chili Powder is imported from Sichuan, China, and is perfect for making chili oil or used as a powder directly to your dish while cooking.
Paprika is a wonderful substitute for red chili peppers and has an exciting flavor profile that will work well in most recipes. Paprika is a colorful spice derived from ground peppers. It has many health benefits and carries Vitamin A, capsaicin, and carotenoid antioxidants.
Paprika ranges from sweet and mild to hot and fiery depending on the peppers ground up to make it. When experimenting with a new variant of paprika, do so sparingly whilst you adapt to the flavors. Paprika is wonderful to add to meat dishes and makes pork taste delicious and fresh vegetables on the side. A great brand to use if you want premium paprika powder McCormick Culinary Paprika is pure paprika and nothing else. Perfect.
9) Dried Poblano (ANCHO) Peppers
When substituting dried red chili peppers, there is one more that I would recommend, and that is the poblano pepper. They are usually low in the heat with a sweet flavor; because they have such little heat, they’re perfect to subtly spice up meats or soups so your meal won’t be too hot and can cater to a broader range of palates!
Poblano peppers are wonderful to cook with because they have a deep, rich flavor and stand up well in cooking. They’re also perfect for stuffing or making sauces out of.
Dried poblano peppers are the perfect substitute for any recipe that calls for dried chili peppers and can be used in like-for-like quantities.
Once again, it pays to be as authentic as you can with recreating cuisine when using ingredients. I would highly recommend purchasing Natural and Premium Poblano or ANCHO Dried Mexican Peppers to get the best from your dish when using Mexican Poblano peppers.
We have come to the end of our list of substitutes for chili that you can use in your cooking. You might be surprised at how many different substitute options are out there and probably already in your spice cupboard!
If not, try experimenting with some new flavors to see what’s most exciting to you today. Which one is the best? Let us know below! | <urn:uuid:495785b0-112f-4540-84fd-9d0c1e2b7277> | CC-MAIN-2022-33 | https://foodsalternative.com/substitutes-for-red-chili-pepper/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.934283 | 2,341 | 1.859375 | 2 |
Transient Effects in Conditional Mean Model Simulations
When you use automatically generated presample data, you often see some transient effects at the beginning of the simulation. This is sometimes called a burn-in period. For stationary processes, the impulse response function decays to zero over time. This means the starting point of the simulation is eventually forgotten. To reduce transient effects, you can:
Oversample: generate sample paths longer than needed, and discard the beginning samples that show transient effects.
Recycle: use a first simulation to generate presample data for a second simulation.
For nonstationary processes, the starting point is never forgotten. By default, all realizations of nonstationary processes begin at zero. For a nonzero starting point, you need to specify your own presample data. | <urn:uuid:139226ab-7a24-4a47-91fc-da681ff7f77c> | CC-MAIN-2022-33 | https://ch.mathworks.com/help/econ/transient-effects.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.829874 | 164 | 2.3125 | 2 |
In early 2021, a few months before the Taliban took over Kabul, Samuel Hall partnered with the World Bank to assess the impact of outmigration on women remaining in Afghanistan. One woman who took part in the research, Zeenat, lived in a rural village where job opportunities have always been sparse (names from the research have been changed). Zeenat’s husband had been working in construction in Saudi Arabia for almost a decade, sending home the equivalent of between USD 260 and 540 every two months. The remittances had allowed Zeenat to send their children to school, avoid loan sharks, and buy essential winter goods for the house. She was not alone: other interviewed women whose husbands were in Gulf countries (mostly Saudi Arabia and the United Arab Emirates) received monthly or bi-monthly remittances ranging from USD 160 to USD 580 each time, an amount usually to be shared with the extended family of up to 30 people.
Together, remittances sent by Afghan communities abroad form part of a vast financial ecosystem. In 2020, formal remittances into Afghanistan totalled upwards of USD 788 million — approximately 4 per cent of Afghanistan’s total GDP. According to the 2016-2017 Afghanistan Living Conditions Survey (ALCS), remittances represent an income source for almost 1 in every 10 Afghan households. The money Zeenat’s husband sent back formed part of the flow of finances that allowed people within Afghanistan to buy food and pay rent.
“He sends money through hawala”
With Western Union and Moneygram temporarily halting services in Afghanistan and the operations of banks imperilled in the wake of the Taliban takeover, users had to find other means to get money into the country. But those official channels had never been the most important transfer mechanism. Before the Taliban regained authority in Afghanistan, only 15 per cent of Afghans had bank accounts and even fewer used their bank accounts regularly. Access to formal finance was also already highly gendered: Only 7 per cent of women across the entire country had access. While the formal banking system had been expanding in Afghanistan prior to the Taliban’s takeover, the informal sector and hawala system still dominated. The hawala system is an informal method of transferring money, including across borders, through a network of money brokers referred to as “hawaladars”. Some estimates suggested that 90 per cent of Afghanistan’s financial transactions ran through hawala, with over 900 providers operating across the country.
A few hours’ drive from Zeenat’s village, on the outskirts of a major city recently overtaken by the Taliban, Sana’s husband in Iran too had been sending remittances through the hawala system. “He sends money through hawala,” Sana explained, referring to her husband. “My brother-in-law or father-in-law collects the money from the city centre. I give them a list of items that I need at home, they purchase them, and give me the remaining money.” The hawaladars use their personal networks, based on trust, to transfer value between countries, charging commission and adjusting exchange rates to make money.
Before the Taliban takeover, the hawala system occupied a grey zone in Afghanistan — not entirely licit, nor illicit. Hawala has been linked to crime, money laundering and terrorism financing in Afghanistan and globally, but it is also crucial in remittances and money transfers where Afghans would not otherwise be able to access financial services. An Afghan returnee explained in a separate Samuel Hall study focused on the financial inclusion of displaced persons: “Hawaladars have many offices in all the provinces, and also internationally. You can find Hawala brokers in all the bazaars. Most remittances from migrants are transferred to Afghanistan this way, especially for the migrants who don’t have official documents to access banks or other transfer agents”. The use of informal channels to send remittances were impacted in many countries across Asia as pandemic-related restrictions meant informal, hawala-type money transfers were much less accessible or available as a channel to financial consumers and these restrictions pushed previously informal transfers toward more formal, or digital channels. It remains to be seen, however, how the Taliban takeover will impact these channels.
Hawala underpinned the livelihood strategies of so many Afghans reliant on income from abroad. By its inherent nature, it is difficult to enforce network compliance with regulatory obligations. Indeed, most hawala transfers pass under the radar since no records of transactions are kept, with Skype, Viber or WhatsApp messages usually destroyed upon completion of transactions. For this reason, its use was discouraged by the Western-backed government. While it seems unlikely that the Taliban would try to shut down the all-important system, it seems likely that they will aim to exert greater oversight and may seek to extract taxes from it. But it is unclear whether the hawala system, which still relies on hard currency, can continue to function properly amidst the wider economic crunch. The lack of cash means Hawaladars may not be able to disburse funds as they did previously, in a similar fashion to cash-strapped formal banks. Those Afghans who do manage to leave the country may face difficulties finding work, while those left behind may face difficulties withdrawing funds sent their way.
This is (more) grave news in light of pressing humanitarian needs and drought-like conditions across much of the country. The United Nations warns Afghanistan could soon start to run out of food. As the need for remittances increased, the COVID-19 pandemic had already greatly reduced their frequency and amount. In a rapid Samuel Hall survey on the impacts of COVID-19, three quarters of the interviewed households receiving remittances had reported that this vital source of finance had dwindled as potential senders abroad were struggling themselves.
Zeenat’s husband was not able to send money for three months from Saudi Arabia during their lockdown, leading Zeenat to borrow money from a family member until her husband resumed work — and resumed sending remittances.
Working through uncertainty
Remittances are vital for many Afghans but many aspects of remittances into the country are not fully understood.
There is a need for higher quality data on the many different dimensions of remittances in Afghanistan. This includes data on remittance flow volumes, remittance corridors, remittance costs, average transaction size and channels utilized. Tracking the Taliban’s approach to Hawala, mobile money, and other financial services is also critical. There is a need for data on the dependency and uses of remittances as the situation in Afghanistan evolves, including the changing economic situation, the unfolding humanitarian crisis, the impacts of COVID-19, and any other issues influencing remittance flows and utilization.
There was already a lack of disaggregated data on remittances and financial services before the Taliban takeover of the country. Now, a better understanding of how Afghans can safely and sustainably access basic financial services such as savings and remittance transfers is even more pressing. What is the role of digitization during this time of turbulence? What are the main barriers to financial services, such as remittances, and how might they be overcome – whether it is for formal financial services or the widely used Hawala system?
More research on remittance-senders is also required. How will the outflow of refugees to neighbouring countries, and further afield, affect those Afghans who are already abroad, and the funds they can send home? What is the size of Afghan diaspora residing abroad and its willingness to engage in livelihood and humanitarian support to families in Afghanistan? If the scarcity of available cash continues, what could be the impact on cross-border mobility?
The emergency response can already better coordinate with Afghans who are abroad. The Afghan diaspora have been playing an essential role in supporting relatives and networks in Afghanistan for decades. In work with DEMAC in 2018, Samuel Hall analysed the role diaspora organizations play in contributing to emergency responses in crisis settings. How the Afghan diaspora continue to support their families in need back in Afghanistan, and how organizations can reinforce this support, will be a vital area of work moving forward.
Finally, integrating financial inclusion into the humanitarian response will support both agendas. United Nations agencies and non-government organizations have previously worked with mobile money platforms in Afghanistan to distribute cash quickly and securely. Afghans have also previously been able to use IOM and UNHCR documents to access low-risk, low-balance financial accounts and mobile money services. It is not clear at this point how the arrival of the Taliban will impact fragile gains in the use of formal and digital channels – indeed, some experts suspect that cash and informal channels may take on more importance in light of regulatory issues associated with the new regime. Adapting to the new circumstances, supporting Afghan families to send and receive money will be crucial during the unfolding economic troubles — with financial strains related to housing, food, and fuel already apparent. Many Afghans will need to be able to access humanitarian support and affordable financial services, including savings and remittances, to avoid predatory loans and negative coping strategies.
For Zeenat, her husband in Saudi Arabia, and her family, along with millions of others, what comes next for remittances is an essential question during Afghanistan’s swirling uncertainty.
Nicholas Ross is a Senior Project Lead for Samuel Hall, focusing on Afghanistan.
Stefanie Barratt is the Samuel Hall Pillar Lead for Data Standards and Analytics.
This blog was first published on the Migration Data Portal.
Disclaimer: The opinions expressed in this blog are those of the authors and do not necessarily reflect the views of the International Organization for Migration (IOM) or the United Nations. Any designations employed and the presentation of material throughout the blog do not imply the expression of any opinion whatsoever on the part of IOM concerning the legal status of any country, territory, city or area, or of its authorities, or concerning its frontiers and boundaries. While the Portal has been made possible with funding from the Federal Department of Foreign Affairs (FDFA) Switzerland, its content does not necessarily reflect its official policy or position.
To know more about IOM's response in Afghanistan, click here. | <urn:uuid:b030e932-cd79-46de-b81f-a6d0844b6c33> | CC-MAIN-2022-33 | https://weblog.iom.int/remittances-afghanistan-are-lifelines-they-are-needed-more-ever-time-crisis | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.957847 | 2,109 | 2.828125 | 3 |
How Hospital Bottlenecks Cause A Healthcare Gridlock
The healthcare industry is complex and interdependent. Much like a highway interchange, it relies on multiple players and processes to flow smoothly.
But just like in an interchange, a single roadblock can bring the system to a grinding halt—leading to serious consequences for all involved.
The Healthcare Silos
In healthcare, there are three primary players, each with their own priorities. However, they stay in their own lane and rely on independent software systems to achieve their goals.
|Healthcare player||Main priority||System used|
|Patients||Seek an engaged and personalized experience||Digital technologies
- Example: mobile health, wearables
- Provide constant monitoring and instantaneous updates
|Providers (Doctors, nurses, and more)||Provide the highest quality of care||Electronic health records
- A comprehensive record of a patient’s medical history
|Payers (Insurance companies)||Balance the cost and quality of care||Claims database
- Information on medical appointments, bills, and more (some claims can take 60 days to process)
This leads to frustrations for all parties, including poor communication and uncoordinated care.
A Not-So-Patient Journey
What factors lead to a less-than-desirable experience? Challenges arise from the moment a patient walks into a hospital
- Entering the Emergency Department (ED)
Overcrowded EDs are often the first point of contact for a patient. On average, 43.3 per 100 people visit the emergency department annually in the United States for everything from fevers to injuries. Of these, 6 out of 10 must wait longer than 15 minutes before they can be seen by a provider.
- Playing the Waiting Game
Patients are willing to endure up to 2 hours in the emergency department, but wait times often surpass that. The average wait time in 2017 was upwards of 352 minutes, or almost six hours. As a result, up to 9% of patients leave without being seen (LWBS).
There’s simple psychology behind why some people aren’t able to wait it out. According to former Harvard professor David Maister, unoccupied time that is compounded with anxiety makes a wait feel longer.
These long waits also affect a patient’s perception and satisfaction of the care they eventually do receive.
The True Cost
After they’re admitted, inconsistent processes and flows continue to plague patient experiences.
A typical hospital stay can rack up a single patient close to $12,000 across 4.6 days. With these costs climbing every year, uncoordinated care adds to these receipts by extending the stay.
Uncoordinated care also creates a dire strain on resources, including the humans behind all the work. The resulting physician burnout costs the U.S. health system $32 billion annually. While lost productivity causes over half ($18 billion) of this amount, another $8.5 billion is due to poor experiences, which impacts patient satisfaction which leads to falling margins for hospitals.
Severe bottlenecks compound these issues, forcing the healthcare system into a gridlock.
What’s Causing the Jam?
Disjointed communication and a lack of visibility across systems are the major reasons for these costly standstills. This is analogous to using a paper map to navigate:
- No updates based on the current situation
- Time-consuming to figure out specific route to a destination
- Show multiple routes, but not the fastest way to get there
What if there was a smart GPS to help the healthcare industry overcome roadblocks?
- Real-time, dynamic updates on the current situation
- Knows where you are, and where you need to go
- Filters only the appropriate and relevant information
The Leidos careC2 Command Center solves healthcare traffic jams.
The coordinated technology suite rapidly identifies and reduces bottlenecks and delays in the care process. This improves the operational flow of hospitals—so that patients, providers, and payers all reach their destinations safely and efficiently.
You may also like
Mining2 years ago
More Than Precious: Silver’s Role in the New Energy Era (Part 3 of 3)
Long known as a precious metal, silver in solar and EV technologies will redefine its role and importance to a greener economy.
Sponsored6 years ago
The History and Evolution of the Video Games Market
Everything from Pong to the rise of mobile gaming and AR/VR. Learn about the $100 billion video games market in this giant infographic.
Sponsored6 years ago
The Extraordinary Raw Materials in an iPhone 6s
Over 700 million iPhones have now been sold, but the iPhone would not exist if it were not for the raw materials that make the technology...
Sponsored7 years ago
The Industrial Internet, and How It’s Revolutionizing Mining
The convergence of the global industrial sector with big data and the internet of things, or the Industrial Internet, will revolutionize how mining works. | <urn:uuid:d777f874-4abb-498b-a70f-3f7e6490644f> | CC-MAIN-2022-33 | https://www.visualcapitalist.com/sp/the-healthcare-gridlock/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.917037 | 1,060 | 2.09375 | 2 |
The rise in the governmental spending has been around $10 billion per annum for the aged care sector only. Two thirds of this is directed to residential aged care. Aged care providers have argued that subsidy provided is not enough to meet the requirements. They are essentially working at a loss based on truly altruistic tendency. There is absence of benchmarking and costs of the aged care sector are operating at a loss. There are considerable issues in raising the capital infrastructure and increasing the quality of care for the people. An increase in the vigorous opposition for increase in spending impedes the progress.
A number of proposals are being discussed to meet the changes in this sector. The main issue that pervades the system is the creation of the proper regulation and planning. The regulations are very high in this sector. This is considered to be an unnecessary burden. The Commonwealth regulates the planning ratio, setting of subsidies and allocation of licenses. These were initially developed to maintain controlling expenditure and enabled in managing supply. There are many choices in place that competes the growth in this sector.
This is used for the assessment for aged care and ensuring that the safety of care is maintained. The workforce is found to be ageing and considerable anxiety is prevalent in the policy makers and different service providers. They want to retain staff and bring in newer staff to the sector. The rise in the Informal careers plays an significant role in the provision of the aged care. Owing to this, the demand is expected to surpass the supply in the next few decades (Cameron and Brownie, 2010).
This is the case irrespective of where the aged care is provided. Australia would face serious workforce shortage. Unless a holistic plan is derived, there cannot be maintenance of the quality of care to the people. Added to this, there are certain barriers and conflicts that exist between the medical community and the social work sector.A holistic plan for the quality of care is needed in this scheme. This cannot be achieved with the current trends. some ideas for future research have been detailed in the following section. | <urn:uuid:55b7963e-61d6-4323-adf7-6e5e64d4357a> | CC-MAIN-2022-33 | https://www.essaytimes.com/ying-guo-lun-wen-dai-xie-tui-jian-dui-an-lao-fu-wu-de-kan-fa/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.728381 | 1,837 | 2.28125 | 2 |
10 Real Estate Trends Upon The Wake Of The Covid-19 In Jordan
While this doesn't mean "all bets are off," it's clear that priorities have changed for both residential and commercial real estate professionals since the arrival of COVID-19.
Forbes made a bold statement. “Now that hundreds of millions of people have gotten a new taste of how important “home” actually is—as a safe haven, a de facto schoolhouse, an impromptu remote office, and a forced, familial psychological petri dish—the spaces we live in, and more importantly what we demand of them, stand to look profoundly different in the post-coronavirus world.”
Let us look at trends that may be spawned by COVID-19 and the impact it caused in the Jordanian real estate market:
- Technology is taking over
Yes, you read that right. Technology has become a necessity during the corona virus world. From school closures to business shutdowns, technology has made it easy to connect virtually while maintaining social distancing and staying safe. Now more than ever, companies seek smart office environments and ensure all safety measures are set to keep up with the new world we live in
- Commercial spaces have been brutally impacted.
Commercial real estate from hotels, restaurants to retail spaces have been brutally impacted, with a domino effect as these tenants struggle to pay rent or, in the case of large retail chains, attempt to re-negotiate the terms of their leases due to the decline in traffic to brick-and-mortar stores as consumers shop safely from home.
- Bigger gaps in construction supply chain
Gaps in the construction supply chain are getting bigger due to business closures, social distancing measures, and increased competition for transportation and delivery services. This is having an impact on new construction and renovations for the residential and commercial properties.
- Interest Rate Reduction
The central bank of Jordan lowered its benchmark interest rate by 100 bps to 2.50% on March 10. Majority of Jordanian banks are also helping citizens by expanding their loans and lowering the interest rate in some of the cases.
- Jordanian government is helping
The Jordanian government announced recently that it is reducing sale taxes and property fees in addition to exemptions on fines until December 31, 2020 to help citizens get though the unfortunate events the country is going through.
- Expatriates are coming back home and staying home!
We can all agree that the year 2020 was an unfortunate year. However, it was the worst on expats and students studying abroad. As a result of the ongoing pandemic, expats were kept away from their families or let go from their jobs. Therefore, the return of more than 20,000 Jordanians caused a high demand on real estate market in Jordan, which created excellent opportunities for real estate investors in the market
- Homeowner’s needs vastly differ in the post-coronavirus world
The house feels smaller when you are quarantined … doesn’t it? Homeowners start to revise their home plans in the post-coronavirus world. The two-month quarantine period implemented by the Jordanian government made citizens realize the things they lack or would like to add to their homes. This created a new interest for homeowners to shop for bigger properties with balconies, views or a garden. This realization has also stirred up new opportunities for real estate developers and investors.
- Stability of Property prices
The reason why the coronavirus crisis does not seem to have had much impact on property prices at the moment is relatively simple: real estate does not lose its attractiveness for investors in these times. A home can still be considered a stable investment in times of crises. Experts on the field had predicted for property price rates to go up by midyear 2020 then stabilize with minor or no increase until the end of 2020. There has been more than 52 new investment projects between March and June during the Covid-19 pandemic as confirmed by Dr.Khalid AlWazani, head of Jordan investment commission (JIC). Dr.Mohammad AlEses, Minister of Finance, has also assured that Jordan has taken all required financial measures and policies so it can maintain its financial stability.
- Higher unemployment rates
The unemployment rate in Jordan increased to 23 percent in the second quarter of 2020 from 19.2 percent from last year due to the pandemic. It is the highest jobless rate since at least 2005. The unemployment rate rose for both males (21.5 percent from 17.1 percent) and females (28.6 percent from 27.2 percent).
- Owners & occupiers will face varying impacts
During the pandemic, owners with long term lease agreements will have less impact than owners with short term lease agreements, depending on tenant liquidity capacity. On the other hand, occupiers will be focused on liquidity needs and operating effectively with a reduced or remote workforce. Occupier’s short-term impact may be offset by tax relief or other government incentives during this period.
Do you want to stay on top of emerging trends and boost your insights about real estate in Jordan? Click here to visit our website to check out the latest real estate apartments and lands available on the market. | <urn:uuid:06099d50-008b-480e-9640-28aad058f71e> | CC-MAIN-2022-33 | https://www.kalutiproperties.com/View_Article.aspx?type=2&ID=1718 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.962491 | 1,070 | 1.609375 | 2 |
Why did you choose that method for this particular research?
Please complete Task 2, Task 1 has already been completed, I have attached a copy so you can see it as well. Please use primary and secondary research, quantitative and qualitative.
TASK 2 – Produce a Journal Article (weighted 75%)
Based on your placement practice or work related experience, identify a subject for research relevant to working in the Health and Social Care Sector and produce a journal article that could be submitted for publication.
• Shows evidence of engagement in a period of work-related research.
• Uses scientific models of research to produce a Journal Article.
• Demonstrates competence in academic writing, by applying critical analysis in the form of a Journal Article.
• Synthesise the recommendation for service improvement.
Produce a Journal Article (weighted 80%) 2000 words.
During the completion of at least 45 hours of placement practice or work-related experience
Identify a subject for research relevant to working in the Health and Social Care Sector to produce a journal article that could be submitted for publication.
Show evidence of engagement in a period of work-related research.
L02. Apply scientific models of research to produce a Journal Article.
LO3. Demonstrate competence in academic writing by applying critical analysis in the form of a Journal Article.
LO4. Synthesise a recommendation for service improvement.
Journal Article Structure Outline
• Research Topic / Title- Your chosen topic /title
• Executive summary
• Introduction / Background of the Study
• Rationale of the Study
• Research Aim
• Objectives of the Study
• Research Question.
• Literature Review
• Research Methodology
• Findings and Analysis
• Recommendations and Conclusion
• This section should provide some of the subject’s background that forms the principal themes of your report i.e., the key words in your chosen topic, examples are “Physical wellbeing”, “Mental wellbeing” and “Emotional wellbeing”. Also, your chosen disease is a key word as well, example “dementia”, “diabetes”, “Asthma”, “stroke” etc .
• If the report is designed to solve a perceived ‘problem’, you start by explaining the history of the ‘problem’(Your chosen topic is regarding as a problem) can be reviewed here, culminating in the situation that prompted the report to be written- meaning stating your reason for investigating or writing your topic.
• You should also provide some key information about the organisation in which your research is based without mentioning the specific name of the setting.
Example: “This research is to explore the interrelationship of Insomnia on the physical, mental and emotional wellbeing of residents in a care home setting”
• Context (Chosen setting) should be – anonymised (e.g., your health and social care setting .e.g., Hospital, care home, nursing home, residential home etc.)
Rationale Issue or problem for enquiry
• What topic did you choose to investigate, and why? -this means why you have chosen your topic (Examples of topic are: Dementia, Diabetes, Arthritis, Insomnia, Stroke, Asthma etc.)
• What is your research question ?
Literature Review (Secondary Research)
• Conduct a literature review using a range of sources relating to your research topic.
• What is already known about your topic?
• You need to know what the key literature is related to the research objective in order to plan a research study to explore the phenomenon (Your topic).
• Your report discusses the sources of literature found and how they relate or otherwise to the research topic.
• Method / Methodology-Evidence Based Practice L02. Apply scientific models of research to produce a Journal Article.
• This section is needed for the reader to judge the authenticity of the ‘evidence’(The sources where you get all the information about your topic) that comprises the report’s main body.
• All the sources used that relates to your topic and research objectives should be mentioned.
• How did you investigate the issue?-explain your data collection method- Example: Secondary research using qualitative method?
• Why did you choose that method for this particular research?
• If any published documents were studied, this should be mentioned here.
• Your report will include the critical analysis of data and the advantages and disadvantages of the research methods and approaches taken to data collection.
Method / Methodology Example for secondary:
When it comes to research methods, there are qualitative and quantitative methods. These research methods or approaches are important to discuss because these can drastically alter the way data is gathered and analysed.
“The method used in the research is the secondary method that involves using existing data”. This method chosen can also be categorized into qualitative and quantitative data because it is a method that can be quickly summarized and organized making it even cheaper than primary research as it makes use of already existing data.
Qualitative method permits researcher to collect and analyse data in a thematic manner. In order to understand the dynamic reality or human behaviour, this approach is used because it is hard to measure intangible factors statistically (Alavi & Hąbek, 2016).
In the qualitative approach, researchers use observations, interviews etc. as the data collection strategy as these strategies serve the purpose of the getting qualitative data.
Data collection and analysis -Thematic analysis. LO3. Demonstrate competence in academic writing by applying critical analysis in the form of a Journal Article.
• What kind of data did you collect?
• What did you do with the data / what method of analysis did you use and why? .
• If qualitative data, you can present themes and illustrative examples.
o Having presented your findings, what do they show in relation to your aim/research question?
o What difficulties or limitations did you encounter / are relevant (e.g., validity)?
LO4-Synthesise a recommendation for service improvement.
• Your recommendations should clearly spell out your ideas to enable them to be acted upon.
• Critically reflect on how you have conducted the project, the lessons learned and the alternative you would consider in the future with recommendations for actions to be taken forward.
• In this section you should say what your facts or findings mean i.e., discuss the key implications arising from the wealth of detail you may have collected.
• The conclusions should not incorporate any new facts.
• What, overall, have you gained from carrying out the action research?
• What can you conclude about your research question?
References and Bibliography
• All references in the report should be listed in the correct Harvard format in a References list. Other materials used but not referred to in the Research Project should be included in a Bibliography.
• Alphabetical order, Harvard method.
• All detailed statistical tabulations, graphs, lists, etc. should be organised into separate appendices.
• Include a list of references (sources that are actually cited in the report itself)
• Nothing should be included that is not referred to in the main body of the report. | <urn:uuid:006a44ad-98c9-49fd-b214-087bfd73b0e2> | CC-MAIN-2022-33 | https://masterswriters.com/2022/02/09/why-did-you-choose-that-method-for-this-particular-research/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.906998 | 1,547 | 1.84375 | 2 |
The cover story on today’s New Scientist is about recent efforts to determine what people are thinking by viewing their brain scans.
Although you may think this is what neuroscientists already do, in most brain-scanning experiments the researchers will know exactly what the participants are experiencing in the scanner, and they just link the measured brain activity to the known task.
Recently, researchers have been able to work out what the participants are viewing by only looking at their brain scans.
Although these experiments are quite simple so far – the researchers typically know that the participant is viewing one of several simple options and just have to work out which – the idea that mental states can be ‘read’ is causing some excitement. Not least because this has been the subject of many science-fiction novels and films.
The accuracy of these experiments is typically much better than chance, although it is far from perfect and so far has largely relied on very simple tasks (viewing lines and the like):
In published results, Tong and Kamitani were able to predict correctly 56 per cent of the time which of eight orientations of lines people were seeing, compared with 12.5 per cent for chance. When subjects were shown a grid of criss-crossing lines, the researchers predicted correctly 80 per cent of the time which lines were being attended to (Nature Neuroscience, vol 8, p679, pdf).
Unsurprisingly, this has sparked some neuroethical concerns. For example, the technology might advance to the stage where it could be used to narrow down what people were thinking regardless of whether they consented (e.g. in interrogations).
The article isn’t freely available online, but your local library or newsagent should have a copy. | <urn:uuid:77eb85aa-f0e7-4ccc-9def-1706b148125e> | CC-MAIN-2022-33 | https://mindhacks.com/2006/05/04/newsci-on-reading-the-mind-by-measuring-the-brain/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.969948 | 356 | 3.125 | 3 |
Temperatures for the next few days are expected to be in the low 90s.
Frederick, Md. (NS) – Temperatures will be around 90 for the next few days in Frederick County, and that can be dangerous.
Dr Clifford Mitchell with the Maryland Department of Health said people who are outside need to take action if they feel sick to the stomach, have unusually dry skin, feel hot and dizzy, slightly off, or are hot but not sweating.
“Any of those things that are happening, you should absolutely get yourself to a cool place, seek medical attention. Those are things that are early warning signs of serious problems,” said Dr Mitchell.
He added that this also applies to young and fit people who are playing sports.
“So, whether you are in an organized activity where there’s somebody supervising who should absolutely stress rest periods, breaks, etc. or you’re just with a group of friends, anybody who feels a little bit off, or who looks a little bit off, that’s a person who needs to get into the shade, get off the field, get something to drink,” Dr Mitchell explained.
Dr Mitchell added that if someone who is hot shows a changed mental status, has dry skin, or a thready pulse, then they need urgent medical attention.
He said residents should also check in on their elderly neighbors during high heat, especially ones who live alone.
Maryland has had 1 reported heat-related death this summer. | <urn:uuid:60f30aa6-4223-466a-a03b-5357d7827138> | CC-MAIN-2022-33 | https://www.wfmd.com/2022/08/05/todays-hot-summer-heat-can-be-dangerous-in-frederick-county-region/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.971343 | 315 | 1.929688 | 2 |
Use of mobile stroke units improves clinical outcomes
STEMOs (Stroke-Einsatz-Mobile) have been serving Berlin for ten years. The specialized stroke emergency response vehicles allow physicians to start treating stroke patients before they reach hospital. For the first time, a team of researchers from Charité – Universitätsmedizin Berlin has been able to show that the dispatch of mobile stroke units is linked to improved clinical outcomes. The researchers’ findings, which show that patients for whom STEMOs were dispatched were more likely to survive without long-term disability, have been published in JAMA*.
The phrase ‘time is brain’ emphasizes a fundamental principle from emergency medicine, namely that after stroke, every minute counts. Without treatment, the brain will lose two million brain cells every minute. When dealing with stroke caused by an arterial blockage in the brain, prompt dissolution of the blood clot – known as thrombolysis – is essential.
Ten years ago, a team led by Prof. Dr. Heinrich Audebert (Center for Stroke Research Berlin (CSB) and Charité’s Department of Neurology and Experimental Neurology) set itself the aim of further reducing time to treatment by bringing the necessary diagnostic and treatment procedures to the patient rather than the other way around. They did so with great success: Berlin’s first purpose-built mobile stroke unit, developed in conjunction with the Berlin Fire Department and MEYTEC GmbH, was launched in February 2011. Following years of research, the team was able to confirm that STEMO-based stroke treatment is safe and, more importantly, reduces time to treatment. Today, the Berlin Fire Department operates three STEMO vehicles. As part of a collaboration between Charité, Vivantes - Netzwerk für Gesundheit GmbH and Unfallkrankenhaus Berlin, these vehicles cover most of the Berlin area. Data from the now-published B_PROUD study show that dispatch of STEMO mobile stroke units is associated with improved outcomes in patients with stroke.
Berlin currently has three STEMOs, mobile stroke units which help reduce time to treatment.
Photo: S. Haase / Berliner Feuerwehr
“In our study, dispatch of a mobile stroke unit was linked to increased survival and reduced risk of disability,” says Prof. Audebert. He adds: “The relative odds of these patients having significant disabilities three months after stroke was 29 percent lower than in patients cared for by the conventional emergency medical services. STEMO dispatch therefore results in significantly more stroke patients returning to an independent life after stroke.” A selection of voices and opinions on the STEMO initiative – from Michael Müller (Governing Mayor of Berlin and Senator for Higher Education and Research), Prof. Dr. Heyo K. Kroemer(Chief Executive Officer of Charité), as well as the initiative’s partners and other supporters – can be found here.
Prof. Dr. Heyo K. Kroemer, Charité’s Chief Executive Officer: “STEMO is a wonderful example of the way in which the practical application of research findings delivers benefits for patients. We are in no doubt as to the potential of early treatment in time-sensitive medical emergencies. At Charité, this area of research will therefore remain the focus of intensive study – as seen current efforts within the NeuroCure Cluster of Excellence.”
Under the leadership of Prof. Audebert and the study’s first author, Prof. Dr. Dr. Martin Ebinger (Medical Director of the Medical Park Humboldtmühle Rehabilitation Hospital), the team studied cases of stroke emergencies which occurred in Berlin between February 2017 and May 2019. Whether a STEMO mobile stroke unit was dispatched was effectively decided by chance: if one was available within the relevant area, it was dispatched at the same time as the conventional ambulance, enabling the patient to receive treatment before their arrival in hospital. A STEMO mobile stroke unit was dispatched in 749 of a total of 1,543 cases analyzed as part of the study (49 percent). If no STEMO was available at the time of the emergency call, only a conventional ambulance was dispatched to ensure transport to a specialist hospital. In 794 cases (51 percent), patients were cared for within the conventional emergency medical system. Using a standardized protocol, the researchers then determined survival at three months post-stroke and the extent of any neurological impairment affecting the patients.
Results from their comparison of the STEMO and control groups were unequivocal. Not only did a greater number of STEMO patients receive thrombolysis (60 percent vs 48 percent in the control group), they received this treatment on average 20 minutes earlier than controls. After three months, approximately 7 percent of patients in the STEMO dispatch group had died. This figure compared with 9 percent in the conventional ambulance group. Similarly, while approximately 51 percent of patients in the STEMO group reported no stroke-related impairments in day-to-day functioning, the corresponding figure in the control group was only 42 percent. Patients in the STEMO group also scored significantly better on quality-of-life measures.
Source: Charité Press Release
Originalpublication:*Ebinger M et al., Association Between Dispatch of Mobile Stroke Units and Functional Outcomes Among Patients With Acute Ischemic Stroke in Berlin. JAMA 2021;325(5):454-466. doi: 10.1001/jama.2020.26345
Prof. Dr. Heinrich Audebert
Department of Neurology with Experimental Neurology
Campus Benjamin Franklin
Charité – Universitätsmedizin Berlin
t: +49 30 8445 2276 | <urn:uuid:b6ccd325-c881-4edf-a12b-aa5b4424e5bc> | CC-MAIN-2022-33 | https://neurocure.de/118/better-functional-outcomes-when-mobile-stroke-units-are-in-charge.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.936756 | 1,193 | 2.515625 | 3 |
CDC Says Vaccinated People Don't Have to Wear Masks Indoors
In another major step toward normalcy, the Center for Disease Control and Prevention on Thursday further relaxed mask mandates for fully vaccinated people, who may now safely stop wearing masks indoors in most cases, according to an initial report from AP News.
Vaccinated people can go maskless in most indoor areas
The new CDC guidance still requires everyone to wear masks in crowded indoor areas, including hospitals, buses, prisons, planes, and homeless shelters, but this is a significant step toward reopening workplaces, school, and many other entities across the country, enabling most who've received the vaccine to go maskless in public indoor spaces. "We have all longed for this moment — when we can get back to some sense of normalcy," said Director CDC Rochelle Walensky, according to the AP News report.
Additionally, the CDC no longer recommends that people who've received a full vaccination must wear masks outdoors in crowds. This announcement comes amid mounting pressure on the Biden administration to relax restrictions on people who are fully vaccinated against the COVID-19 coronavirus, partially as a way to spread awareness that getting a shot has serious social benefits. Director Walensky made the announcement during a White House briefing, declaring that the long-awaited easing of mask mandates is due to the voluntary vaccination of millions of people in the U.S. — in addition to new scientific reports on how successful the vaccines have become.
"Anyone who is fully vaccinated can participate in indoor and outdoor activities — large or small — without wearing a mask or physically distancing," said Walensky during the briefing. "If you are fully vaccinated, you can start doing the things that you had stopped doing because of the pandemic." The timing is apt, since the campaign to vaccinate everyone in the U.S. is just now beginning to prove its use-value, with cases at their lowest rate since September 2020, deaths at their lowest point since April 2020, and the COVID-19 test positivity rates at their lowest since the very beginning of the pandemic's landfall on the country.
The evidence shows that vaccines are 'strongly protective' against coronavirus and variants
As of writing, roughly 154 million Americans — consisting of more than 46% of them — have already received at least one dose of a COVID-19 vaccine — with more than 117 million already fully vaccinated. In the last few weeks, the rate of new vaccinations has slowed, but with a new authorization on Wednesday for the Pfizer vaccine to be given to children aged 12 to 15, officials expect a new surge in vaccine rates to show up in the coming days.
This also comes two weeks after the CDC's initial recommendation for fully vaccinated people to ease mask mandates while outdoors, but with the temporary proviso for fully vaccinated people to continue wearing masks in large crowds and indoors. During a Tuesday virtual meeting with a bipartisan assembly of governors, President Joe Biden emphasized a need for his nascent administration to do a better job of modeling the benefits of receiving a vaccination. "I would like to say that we have fully vaccinated people; we should start acting like it," said Republican Governor of Utah Spencer Cox, to Biden. "And that's a big motivation [to] get the unvaccinated to want to get vaccinated."
"Good point," replied the President. "We're going to be moving on that in the next little bit." But it's not all great. This new relaxed guidance might enable more confusion, since there's no known way businesses or other entities can distinguish fully vaccinated people from everyone else. Regardless, Walensky argued that the evidence from the U.S. and Israel shows the vaccines are extremely effective, and even work on some very concerning mutated variants of the COVID-19 coronavirus — which are rapidly sweeping the world.
This was a breaking story and was regularly updated as new information became available. | <urn:uuid:fdb3fa69-3ea6-4d75-8da2-b116e2dd77dc> | CC-MAIN-2022-33 | https://interestingengineering.com/health/cdc-says-vaccinated-people-no-masks-indoors | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.973117 | 805 | 2.140625 | 2 |
The Barong dance is the classic story of good (The Barong) triumphing over evil ( The evil witch Rangda). The Barong is a large lion type creature played by two men, Rangda is the epitome of evil with long fingernails and droopy breasts. The Barong is going about his business until he is interrupted by Rangda. Ultimately a battle ensues and the Barong’s followers begin attacking Rangda with their Keris (daggers). Rangda,
being a witch, is able to use magical powers to turn the daggers against their owners, who fall into a trance and try to stab themselves.
In Balinese dance the movement is closely associated with the rhythms produced by the gamelan, a musical ensemble specific to Java and Bali. Multiple levels of articulations in the face, eyes, hands, arms, hips, and feet are coordinated to reflect layers of percussive sounds.
The Barong dance is performed when there is illness or misfortune in the village and there is therefore intended to dispel this "evil forces". People gather together at the mortuary temple, Pura Dalem. Women
are carrying the offerings. At the temple beautiful umbrellas are used. If illness or adversity prevails in the village, the dance is performed. Evil spirits and demons come from the direction of the sea to the village.
By replaying the story of the widow Rangda and Barong again, the harmony is confirmed in the cosmos.
The fight will end undecided.
In every part of the island of Bali residents ask the spirit to protect the land and forests. There are different types Barongs. The name of the dance depends on the mask, the Barong, the main character wears. The Barong is defined in each different region as a different animal:
a wild pig
The Barong is a figure which is used to expel evil.
The Barong is usually played by two men, wearing a creepy mask lion. He rattles constantly from his mouth and embodies the good. His opponent is the wicked witch Rangda with frightening eyes and hair. The dance is meant to dispel evil.
There's not a good explanation of the meaning of the word Barong. However, the Barong has a second name, namely Banaspati Raja (King of the jungle). The classic Barong is the Barong Keket. This does not correspond to any animal.
Besides, there are two other forms: Barong Berutuk (young men, wrapped in banana leaves with a mask) and Barung Landung (two giant puppets, performing a dialogue and singing folk songs).
The story goes that Rangda, the mother of Erlangga, the King of Bali in the tenth century, was condemned by Erlangga's father because she practiced black magic. After she became a widow, she summoned all the evil spirits in the jungle, the leaks and the demons, to come after Erlangga. A fight occurred, but she and her black magic troops were too strong that Erlangga had to ask for the help of Barong. Barong came with Erlangga's soldiers, and fight ensued. Rangda casted a spell that made Erlangga soldiers all wanted to kill themselves, pointing their poisoned keris into their own stomachs and chests. Barong casted a spell that turned their body resistant to the sharp keris. At the end, Barong won, and Rangda ran away.
About the origin of the Barong people don't agree. There are several legends about it, I will tell you two versions:
1) The first Barong version, where we known a little about, is related to Bedulu, which was probably the capital of Bali. The gods ordered the people to make a Barong to free the island of the plague.
On Galungan (the largest Balinese holiday) the Barong had to go around to receive offerings and money.
2) In another story, the Barong is connected to the demon Jero Gede 'Mecaling. This demon came like a Barong with his followers to destroy everything on Bali. A priest said that only a similar Barong with followers could dislodge them. This was done and the Barong could therefore be used to chase sickness and evil forces away. | <urn:uuid:6e62b284-e0da-44e1-98fc-b19952089079> | CC-MAIN-2022-33 | https://www.balitourism.nl/barongeng.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.961683 | 942 | 2.125 | 2 |
While in church this Sunday, we were studying Mark chapter 10, which contains one of the many instances where a person in scripture refers to the history of Genesis. In this case, it was Jesus Christ, God Himself, who stated in Mark 10:6
“But at the beginning of creation God ‘made them male and female.”
This is Jesus talking, the savior. Often times during debates, or listening to testimonies, I hear that people have come across pastors, elders and the like who have dismissed the Genesis account as ‘just a story’. I’m sure everyone reading this has had experience with that; how they just teach us lessons; how it isn’t the main focus; how it doesn’t matter, as long as you believe Christ.
So, you are telling someone who is searching for reasonable, legitimate hope in this crazy world, no don’t believe this over here, but you have to believe this over here. And then that journeymen comes across Mark chapter 10 and what happens? Christ says, in the beginning God made them male and female.
In evolution theory, the beginning of life begins with one celled organisms around 4 billion years ago, the unfathomable magic of time to influence students that given enough of it, the physically impossible can take place. But sexual reproduction does not evolve until 1.1 billion years. That isn’t people, mind you. It is simply the first sexual reproductive event. Man and woman, well they arrive on the scene much later, between 1 and 5 million years ago, depending on who you ask.
But Christ said they were male and female at the beginning. This is a rather large disparagement, wouldn’t you say? A difference of about 3,995,000,000 years between when Man and Woman appear and the “beginning”. So clearly Christ was lying, yes? Clearly He also was just telling stories? No, I’m afraid not. Christ was pointing to the historicity of the Genesis account, and based on that actual history, was applying it to our lives today. It is clear from Christ here, along with many other verses, that the New testament writers fully respected the historical accuracy of the venerated Torah, Moses’ account of the beginning.
Keep in mind that Christianity has many theories on how to conform with man’s proposed timeline, ways to compromise the biblical account in order to acquiesce to evolutionary theory. There is theistic evolution, gap theory, day-age creation, and several others. But as we have learned in Timothy All scripture is given by inspiration of God, and is profitable for doctrine, for reproof, for correction, for instruction in righteousness. And taken as a whole, every one of these bible-compromising theories falls short. Does your salvation depend on it? No. But you’d better be able to explain the inconsistencies when you approach a non-believer who is searching. Because if they don’t believe the beginning, there is really no reason for them to believe the rest.
And in the case of Mark chapter 10, you either have an All Powerful Creator God who disagrees with materialism’s theory of molecules to man, or you have a very confused deity, who likes to speak in fables, and folktales, to issue his opinion on how best to live; who is flummoxed by real science, real history, and has chosen to deceive His followers in order to make a point. He didn’t know man would eventually find out the truth, and that he would be 4 billion years off in His assessments about time. He chose to take old testament patriarchs at their word, and either didn’t know or didn’t care that His views would eventually be outdated religious ramblings.
Christ never allowed for the compromising of the Word. Ever. He fulfilled it. It is a sword. The watered down, take-parts-you-like version of the word of God is not intellectually honest, and atheists know it. We must stand with conviction and courage on the word of God. If they disagree with part of it, make them disagree with all of it. But if Christ didn’t allow for the compromising of scripture, then we shouldn’t either. If you allow for the beginning to be false, you inadvertently throw all of its doctrines into question, and that is thorny ground. | <urn:uuid:d09171e1-4bc3-4013-ab0e-46e4cf6f3cfb> | CC-MAIN-2022-33 | https://jrcooper.org/2016/08/08/jesus-the-creationist/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.970728 | 922 | 2.21875 | 2 |
A new seminar on the effects of Canada’s residential schools gives students a chance to contribute to something bigger than themselves
Talking about Canada’s past with Indian residential schools – and how to move forward – can be a sensitive subject, but one Erica Baker refuses to shy away from.
The UBC student is the course coordinator for a student-directed seminar on reconciliation, a first for the First Nations Studies program.
“As a non-Indigenous person in First Nations studies, I’ve always been interested in figuring out what my place is and what my role is as an ally,” says Baker.
The course, The Politics of Indigenous-Settler Reconciliation in Canada, starts in September and will see students lead discussions on the topic. The course is open to students from any discipline. A student at UBC is allowed to take one student-directed seminar during their four-year degree.
Learning from history
The current reconciliation movement stems largely from Canada’s Indian residential school system that forced thousands of First Nations children from their homes and placed them in strict boarding schools where many were physically and sexually abused. Some were also used as test subjects in research experiments.
According to Baker, who is entering her final year at UBC, the course is a chance for students to understand and contribute to something bigger than themselves.
“As a non-Indigenous person in First Nations studies, I’ve always been interested in figuring out what my place is and what my role is as an ally.” -Erica Baker.
Those enrolled in the course will conduct research for Indigenous Foundations, a website providing information and resources to the UBC community and the public on Aboriginal-related issues.
“Indigenous people are often still seen through a lens of deficiency or lack rather than being seen as having a really significant role to play in major issues of concern, such as climate change, governance, economic and environmental justice,” says Daniel Justice, associate professor of First Nations Studies and English and the seminar’s faculty sponsor.
A day of reconciliation
This fall, The Truth and Reconciliation Commission of Canada is hosting the last of its National Events in Vancouver from September 16 to 21. The group collects testimonies from residential school survivors. UBC is suspending classes on its Vancouver campus on Sept. 18 to encourage the campus community to participate.
“I hope people utilize what the day presents,” Baker says. “It’s a significant event in our lived history and an important opportunity to be a witness and actively engage with what’s happening.”
A part of the course’s requirements is having students attend three events in the city, which could include the National Event. Justice says this will allow for students to gain a more sophisticated understanding of reconciliation as a concept, offering a glimpse of what efforts towards reconciliation look like on the ground.
For Baker, mending the relationship between Aboriginal and non-Aboriginal communities in Canada is not the responsibility of any single group.
“It takes non-Indigenous and Indigenous people to work together to create a shared practice of decolonization that leads to long-term change, to move towards a future that fosters meaningful co-existence.”
To learn more about why UBC has suspended classes on Sept. 18, click here. | <urn:uuid:baf04bfc-ac39-4d5d-8e37-505cf11b1bff> | CC-MAIN-2022-33 | http://irsi.aboriginal.ubc.ca/2013/09/12/confronting-the-past-looking-to-the-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.959848 | 697 | 2.640625 | 3 |
An number that is increasing of are employing cannabidiol (CBD) to enhance their health and wellness and well-being. in some instances, this plant-based ingredient might be a powerful treatment plan for particular conditions, such as for instance epilepsy, 1 anxiety, and sleeplessness, however it seems that CBD could also avoid infection 2 and improve skin, digestive, and organ wellness.
CBD users in Missouri, nonetheless, are confronted by a complex and apparently contradictory appropriate framework because they make an effort to see whether or perhaps not the ownership and make use of with this substance are permitted under state and federal legislation. In this guide, we’ll clean up some typically common misconceptions surrounding making use of CBD hemp oil in Missouri, and we’ll provide some history info on this promising alternative treatment.
Is CBD Oil Legal in Missouri?
Individuals throughout the nation are often confused regarding whether or not it’s appropriate to make use of CBD within their home states, however the legislation surrounding this topic is in fact quite straightforward. In 2014, Congress passed the Agricultural Act of 2014 into legislation, and also this bit of legislation makes unique conditions for the cultivation of industrial hemp under area 7606. 3
This area theoretically makes CBD obtained from hemp federally appropriate, but until recently, the U.S. Drug Enforcement Agency (DEA) still considered CBD to be a form of cannabis, and, consequently, a Schedule we medication. Continue reading | <urn:uuid:df22b88a-03dd-478c-9b04-e9adbfc2617e> | CC-MAIN-2022-33 | https://hf-d.com/category/what-is-cbd-oil/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.952661 | 297 | 2 | 2 |
“The Jilting of Granny Weatherall” By Katherine Anne Porter
Katherine Anne Porter • Born May 15, 1890 • Indian Creek, Texas • Educated in convent schools in the south • Converted to Catholicism • First Published Work: Flowering Judas in 1930
Katherine Anne Porter • Her stories are known to dramatize her political and social liberal beliefs. • Demanded much of herself and her work • Many works were never published because they did not live up to her standards
Type of Work Short Story Told with Stream of Consciousness * Stream of thoughts as they occur, regardless of sequence or sense
Setting Bedroom in the home of Granny Weatherall’s daughter, Cornelia Late 1920’s Flashbacks: 1860’s
Symbols Look for the use of Symbols What do they mean?
Look For Alliteration-Repetition of a consonant sound Irony-The opposite of what is expected Metaphor-Comparison of unalike things without using like, as, or than Onomatopoeia-Word that imitates a sound Paradox-Contradictory statement that is actually true Simile-Comparison of unalike things using like, as, or than
Helpful Links and Presentation Sources • http://www.deathdyinggriefandmourning.com/Death-Dying-Grief-Mourning/83-Katherine-Anne-Porter-Jilting-of-Granny-Weatherall-Pale-Horse-Pale-Rider-Ship-Fools.htm • http://www.yale.edu/ynhti/curriculum/units/1985/3/85.03.01.x.html • http://www.cummingsstudyguides.net/ • http://people.morrisville.edu/~whitnemr/html/The%20Jilting%20of%20Granny%20Weatherall.htm | <urn:uuid:3b4c6512-819b-4089-b956-fc3fd851e120> | CC-MAIN-2022-33 | https://www.slideserve.com/bailey/the-jilting-of-granny-weatherall-by-katherine-anne-porter | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.811684 | 419 | 1.96875 | 2 |
The full statement can be read at EDA Cafe, click here.
The Big-3 EDA companies point out in the statement the work within Accellera to create an interoperability guide and kit to ensure verification IP and testbenches written in either the Verification Methodology Manual (VMM) or the Open Verification Methodology (OVM) can work together. This preserves the investments made to date by users of those two methodologies.
The joint statement also says the Accellera Universal Verification Methodology (UVM) is based on OVM 2.1.1 and firmly rooted in SystemVerilog. While we know today UVM is OVM 2.1.1 with a few small changes or additions, it is made clear that Accellera has just begun. What happens next is the topic of the Accellera breakfast meeting. (Have you registered yet for it?)
The joint statement asked these questions:
- If we fast forward by a year, what would UVM base class release X look like?
- What features should it have to solve the problems faced a year from now? 3 years from now?
- Are we looking at adding more of the same or make a quantum leap in our ability to deal with much larger and significantly more complex designs?
- What specifically are we doing to improve our ability to find bugs in the design and then fix them?
What questions do you have? If you want to share them here, please do. If you cannot attend the breakfast in person, I’ll bring your questions along to ask and report back after DAC on what happened at the Accellera breakfast. | <urn:uuid:df24e1b7-4781-4b7d-a115-bd044610c78f> | CC-MAIN-2022-33 | https://blogs.sw.siemens.com/verificationhorizons/2010/06/09/uvm-joint-statement-issued-by-mentor-cadence-synopsys/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.951036 | 341 | 1.609375 | 2 |
A FRAME WITHOUT A NAME
The series A Frame Without a Name is about the social consequences caused by the fear of terror. Belgian based photographer Guus Bakker (b. 1989, NL) started the project in reaction to the terrorist attacks in Paris on November 13th 2015, when he noticed that beyond the fear of being a victim of terror, there were collective changes that this fear caused on society.
The fear that Bakker experienced during the terrorist attack changed his perception of the meaning of certain objects and locations. Bakker explains that when he visited the cinema, he realised something had changed, and he was aware that he was interpreting the space differently than before the attacks. He travelled to several locations immediately following the attacks, like the border between France and Belgium, which had been closed, and photographed the things that appeared to him to be different because of the events that had transpired. Through his series, he aims to translate the collective fear caused by terror in a symbolic and poetic way. | <urn:uuid:e574b42d-8a32-48f7-94c6-0f17b227fcae> | CC-MAIN-2022-33 | https://gupmagazine.com/portfolios/a-frame-without-a-name/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.982808 | 230 | 1.867188 | 2 |
Definition of a Paralegal:
Paralegal shall mean a person who is qualified through education, training or work experience and is employed or retained by a lawyer, law office, governmental agency, or other entity to work under the direction of an attorney in a capacity that involves performance of substantive legal work that, in most instances, requires a sufficient knowledge of legal concepts and would otherwise be performed by the attorney in the absence of the Paralegal. The term "Paralegal" and "Legal Assistant" are interchangeable and used synonymously.
2022 CPPA Membership Application .doc
Benefits of Membership:
Networking, access to job bank, access to quarterly newsletters as well as archived newsletters, information about upcoming events, CLEs, social functions, seminars and conferences as well as discounted fee for monthly lunch & learns.
Membership Categories & Qualification:
Any person who is employed as a paralegal or legal assistant who, in the course of their employment, performs substantial paralegal functions and meets one of the following criteria:
Bachelor's degree in Paralegal Studies (minimum 24 semester hours must be in Paralegal courses.)
Bachelor's degree in Paralegal Studies and/or another course of study PLUS a Paralegal Certificate
Associate's degree in Paralegal Studies
Associate's degree in another course of study PLUS a Paralegal Certificate
Paralegal Certificate PLUS one (1) year of work experience as a Paralegal
A minimum of two (2) years of Paralegal work experience
Written Verification of Employment from Current Employer indicating educational background, number of years of current work experience and verification that applicant performs substantial Paralegal functions in the course of his/her employment OR Written Verification of Non-Traditional Paralegal demonstrating at least twenty (20) hours of substantial paralegal functions within the three (3) month period preceding application.
STUDENT: ($35) (non-voting)
A person currently enrolled in an ABA approved program or a program which meets AafPE institutional membership standards AND
provides written verification of enrollment by Director of Paralegal Program
ASSOCIATE: ($55) (non-voting)
Any person (1) who is employed as a Paralegal educator; (2) who was previously employed as a paralegal or paralegal educator; (3) who has completed a formal course of paralegal study, but who is not employed as a paralegal at the time of application for membership; (4) who was previously a Voting member of this Association, but is not employed as a paralegal at the time of the annual renewal of membership; or (5) who is currently employed as a paralegal, but who does not meet the educational and/or work experience requirements for a Voting member.
SUSTAINING: ($85) (non-voting)
Individuals, Partnerships, Associations or other entities interested in supporting the Paralegal profession. | <urn:uuid:2f35d97a-9e39-4e67-a0d1-a5cba45792b3> | CC-MAIN-2022-33 | https://www.centralpaparalegals.com/Membership | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.93661 | 645 | 1.671875 | 2 |
ISLAMABAD: National Command and Operations Centre (NCOC) on Saturday discussed the need for restrictions on movement, non-pharmaceutical interventions (NPIs), amid a surge in COVID cases especially the Omicron variant, ARY NEWS reported.
According to details shared after the NCOC meeting headed by Asad Umar, the forum reviewed the disease s trends in the country and discussed the epidemic curve chart data, disease prevalence and proposed NPIs in wake of rising disease trends in the country, especially in the urban centers.
The NCOC decided to extensively engage with provinces especially with the Sindh government for necessary measures to tackle the rising disease.
The forum that is at the centre of devising a strategy to deal with the COVID situation in Pakistan reviewed existing NPIs and called on provincial health and education ministers session on 17 January 22.
The session was convened to suggest the new set of restrictions focusing on the education sector, public gatherings, marriage ceremonies, indoor and outdoor dining and transport sector.
Read More: SCHOOLS TO STAY OPEN AS SINDH ANNOUNCES NEW COVID RESTRICTIONS
The NCOC also directed the provinces to conduct surveys on oxygen stock and other medical facilities needed to deal with emergency response in case of a COVID surge.
It also directed the Civil Aviation Authority (CAA) to strictly implement COVID SOPs during travel besides also banning any sort of foodservice. The provinces are also directed to implement SOPs on transport and education sectors, restaurants and marriage halls. | <urn:uuid:8ef3ab65-734f-478a-8323-32b199ffafa2> | CC-MAIN-2022-33 | https://www.pakistantoday.org/ncoc-proposes-covid-restrictions-in-urban-centres-amid-omicron-spike/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.943902 | 317 | 1.53125 | 2 |
Leapfrog 462003 200 Words Activity Book, Multicoloured
- More than 30 replayable activities engage kids through audio and animations when played with LeapStart systems with a screen.
- Trigger audio and animations by using the stylus to tap on the pictures and words to help kids better understand the learning concepts.
- Play and learn more than 200 vocabulary words in both English and French.
- Explore manners, emotions and more with the adorable Learning Friends.
We believe that a child’s development is a continuous journey that happens one spark, one discovery, one success at a time. Every adventure, every lesson, every curious moment expands a child’s knowledge and imagination, building to a greater confidence and passion for what comes next. | <urn:uuid:b90670da-0fbe-4e71-b1ff-2ffa15cf1ecd> | CC-MAIN-2022-33 | https://rotanya.com/product/leapfrog-462003-200-words-activity-book-multicoloured/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.892528 | 155 | 2.671875 | 3 |
Recent technological developments, the availability of speech-to-text APIs and of course the COVID-19 pandemic have combined to have a HUGE impact on a key and often time-consuming stage of qualitative and mixed-methods research: transcription.
I have been working with CAQDAS developers, colleagues and others to try and document what’s available and create step-by-step guidance for the leading packages to enable researchers to take advantage of these new opportunities.
The key posts are linked below, and updates will be flagged on this page.
Overview and details – creating and preparing auto-transcripts
Working in specific CAQDAS packages with auto-generated transcript files (SRT or VTT):
Currently ATLAS.ti has the simplest, most robust and I consider most seamless integration for bringing in auto-transcripts and synchronising them with the media files to correct and code. it’s a joy to work with – detailed here.
NVivo has its own transcription service (which is a piaid-for service) which is in my testing less accurate than the APIs used by Teams or Zoom but has good and clear multi-language support. Importing has improved with Release 1 and support for tab separated values and some free engines help. however it requires patience and often needs some fiddly problem-solving to import if you get errors. NVivo is detailed here.
Working with Microsoft Word Online
You can also create transcripts – with speaker labels and timestamps – for free using Microsoft Word online. Working with Word is detailed here and includes information on importing into different packages. There are some limits (e.g. 5hrs audio per month) and again the process of importing is a bit varied.
Presentations and Seminars
Qualitative Transcription for the 21st Century: combining automated transcription with human interpretation using CAQDAS packages.
Dr. Steven Wright, Learning and research technologist at Lancaster University, UK
The 17th CAQDAS networking webinar had me – Dr Steve Wright – discussing automated transcription with human interpretation using CAQDAS packages.
I also did a seminar for the Centre for Technology Enhanced Learning in the Dept. Educational Research at Lancaster University for their Show and TEL seminars:
Technologies for qualitative analysis, transcription and mixed methods
Discussion with Steve Wright
Overview: Speech-to-Text and CAQDAS (from Teams, Zoom and other systems) | <urn:uuid:f0232f26-31d7-48da-b681-f1955fee364d> | CC-MAIN-2022-33 | https://caqdasblog.wordpress.com/auto-transcription-and-caqdas/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.906096 | 507 | 1.859375 | 2 |
This survey was a follow-up to an earlier survey carried out by the ILO in 2010, to analyse changes of public attitudes towards migrant workers in Malaysia, Singapore, and Thailand, and adding Japan, given its emergence as an important destination country for low-skilled migrant workers in Asia. The study reveals that support for migrant workers in destination countries has decreased overall in the past nine years. The study also provides data evidence for policy making and campaign organizing to promote a more inclusive and supportive environment for migrant workers. The focus on women migrant workers’ issues in the report uncovers topics with high support from the public that can be leveraged as entry points. Where there is considerable public support for addressing violence as well as bolstering working conditions for domestic workers, policy change might be easier, with reforms that can ensure positive migration outcomes for women migrant workers. | <urn:uuid:ba5649f9-be78-4ffd-aedd-eff38be6a4a9> | CC-MAIN-2022-33 | http://www.ilo.org/asia/publications/issue-briefs/WCMS_766634/lang--en/index.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.967718 | 172 | 2.171875 | 2 |
One of the most common health problems in Maltese and many other toy dogs is luxating patella (LP), a condition where the kneecap literally slips out of the groove, becoming dislocated.
Luxating patellas are considered primarily an inherited congenital disorder. Usually within the first year, the patellas will begin slipping out of place. A luxating patella can also occur from a trauma or injury. An injury will generally involve just the one knee. If both knees are affected, one should suspect an underlying genetic component.
There are several things that can cause patellas to become loose with time: The ligaments, which hold the patellas in place, begin to weaken or the groove holding the patella is too shallow. Or, the tibia and/or femur could be improperly curved and not aligning properly, causing the patella to become unstable. It can be gradual process where the owner does not notice anything, or it can be a sudden dislocation where the puppy will yelp and become lame. Sometimes this sudden luxation is mistaken for an injury when in fact it is not.
Luxating patellas are graded from I to IV. Grade I is the mildest. The patella can be pushed out but will immediately “pop” back into the groove on its own. Grade IV is the most severe with the patella being permanently dislocated.
Fortunately, for the vast majority of Maltese with luxating patella(s), they tend to be in the milder category with Grade I or II.
A dog with a mild grade of LP usually does not require surgery. Keeping the weight down, avoiding slippery surfaces and preventing the dog from doing a lot of jumping (e.g., on and off the furniture) will all help lower stress on the joint. Despite this, arthritis is a likelihood in the later years of life. Severe LP, or a patella that has been forced to dislocate by trauma, will normally necessitate surgical repair. A veterinarian or orthopedic surgeon can determine the best course of action.
All Maltese should have their patellas palpated manually by their veterinarian. For breeders, this should be mandatory. No breeding should take place without knowing the status of the patellas of the potential parents.
Because of the complexity of inheritance (polygenic) and the fact that LP is “in” the breed, it is impossible to guarantee a breeding won't produce offspring that develop LP. However, by breeding two parents with tight patellas, the incidence will be greatly reduced. Likewise, breeding two dogs with LP will greatly increase the chance of the offspring developing the condition. Common sense would dictate not to breed together two dogs with LP.
The Orthopedic Foundation for Animals (OFA) offers patella certification. X-rays are not required and any experienced veterinarian can do the palpation for the certification. With time, it is hoped that more Maltese breeders will utilize the OFA service just as breeders of larger dogs prone to hip dysplasia do.
The American Maltese Association is proud to include OFA certification for patellas as one of our CHIC breed requirements. | <urn:uuid:072e7b1c-6e73-414c-b9d5-4d70be543cf0> | CC-MAIN-2022-33 | http://www.americanmaltese.org/ama-health-information/luxated-patellas-0 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.941464 | 672 | 2.59375 | 3 |
1st of May 2017 marked as a revolutionary date in the history of Real Estate sector as on this date “The Real Estate (Regulation & Development) Act” had come in force. Where on one side this Act strikes out all unambiguous deeds of doing business in real estate sector, another side there has been a mixed response from state in adhering to the stipulated timeline, the urban development ministry’s thrust on the matter clearly indicates the central government’s push towards increasing transparency and making the sector structured and organised.
Before RERA there were lots of complaints about property buyers and the major concern was the deception from developers in delivering oneself promises. There was no regulatory authority or provision regarding protecting the interest of Buyers in real estate sector. Now after RERA Implementation, the developers must submit authenticated documents related to the project to the authority.
But here also in comparison with central REDA Act, many states have diluted a few crucial aspects of the Act, or have given insufficient emphasis to its provision in their rules. Now, if the RERA is not verifying the documents then how it will approve the project registration?
Major points of disconnect are the definition of on-going projects, penalties for non-compliance with the Act, payment schedule, and liability in case of structural defects.
Despite all the regulations and administration, Centrik received lots of mail from builders regarding the cost of administration and from where all these costs are to be charged?
Note – Please note that the above article is part of our continuous research on the related matters. It is based on our interpretation of related regulations which may differ person to person. Readers are expected to take expert opinion before relying on above. | <urn:uuid:814c4804-d507-47b2-ba69-bd6cd99cbce2> | CC-MAIN-2022-33 | https://www.centrik.in/blogs/what-rera-is-about-safeguarding-the-interest-of-buyers-or-developers/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.959154 | 346 | 1.632813 | 2 |
The Ericaceae are a family of flowering plants, commonly known as the heath or heather family, found most commonly in acidic and infertile growing conditions. The family is large, with c. 4250 known species spread across 124 genera, making it the 14th most species-rich family of flowering plants. The many well known and economically important members of the Ericaceae include the cranberry, blueberry, huckleberry, rhododendron (including azaleas), and various common heaths and heathers (Erica, Cassiope, Daboecia, and Calluna for example).
|Over 120 genera|
The Ericaceae contain a morphologically diverse range of taxa, including herbs, dwarf shrubs, shrubs, and trees. Their leaves are usually evergreen, alternate or whorled, simple and without stipules. Their flowers are hermaphrodite and show considerable variability. The petals are often fused (sympetalous) with shapes ranging from narrowly tubular to funnelform or widely urn-shaped. The corollas are usually radially symmetrical (actinomorphic) and urn-shaped, but many flowers of the genus Rhododendron are somewhat bilaterally symmetrical (zygomorphic). Anthers open by pores.
Michel Adanson used the term Vaccinia to describe a similar family, but Antoine Laurent de Jussieu first used the term Ericaceae. The name comes from the type genus Erica, which appears to be derived from the Greek word ereíkē (ἐρείκη). The exact meaning is difficult to interpret, but some sources show it as meaning 'heather'. The name may have been used informally to refer to the plants before Linnaean times, and simply been formalised when Linnaeus described Erica in 1753, and then again when Jussieu described the Ericaceae in 1789.
Historically, the Ericaceae included both subfamilies and tribes. In 1971, Stevens, who outlined the history from 1876 and in some instances 1839, recognised six subfamilies (Rhododendroideae, Ericoideae, Vaccinioideae, Pyroloideae, Monotropoideae, and Wittsteinioideae), and further subdivided four of the subfamilies into tribes, the Rhododendroideae having seven tribes (Bejarieae, Rhodoreae, Cladothamneae, Epigaeae, Phyllodoceae, and Diplarcheae). Within tribe Rhodoreae, five genera were described, Rhododendron L. (including Azalea L. pro parte), Therorhodion Small, Ledum L., Tsusiophyllum Max., Menziesia J. E. Smith, that were eventually transferred into Rhododendron, along with Diplarche from the monogeneric tribe Diplarcheae.
In 2002, systematic research resulted in the inclusion of the formerly recognised families Empetraceae, Epacridaceae, Monotropaceae, Prionotaceae, and Pyrolaceae into the Ericaceae based on a combination of molecular, morphological, anatomical, and embryological data, analysed within a phylogenetic framework. The move significantly increased the morphological and geographical range found within the group. One possible classification of the resulting family includes 9 subfamilies, 126 genera, and about 4000 species:
- Enkianthoideae Kron, Judd & Anderberg (one genus, 16 species)
- Pyroloideae Kosteltsky (4 genera, 40 species)
- Monotropoideae Arnott (10 genera, 15 species)
- Arbutoideae Niedenzu (up to six genera, about 80 species)
- Cassiopoideae Kron & Judd (one genus, 12 species)
- Ericoideae Link (19 genera, 1790 species)
- Harrimanelloideae Kron & Judd (one species)
- Styphelioideae Sweet (35 genera, 545 species)
- Vaccinioideae Arnott (50 genera, 1580 species)
- See the full list at List of Ericaceae genera.
Distribution and ecologyEdit
The Ericaceae have a nearly worldwide distribution. They are absent from continental Antarctica, parts of the high Arctic, central Greenland, northern and central Australia, and much of the lowland tropics and neotropics.
The family is largely composed of plants that can tolerate acidic, infertile conditions. Like other stress-tolerant plants, many Ericaceae have mycorrhizal fungi to assist with extracting nutrients from infertile soils, as well as evergreen foliage to conserve absorbed nutrients. This trait is not found in the Clethraceae and Cyrillaceae, the two families most closely related to the Ericaceae. Most Ericaceae (excluding the Monotropoideae, and some Styphelioideae) form a distinctive accumulation of mycorrhizae, in which fungi grow in and around the roots and provide the plant with nutrients. The Pyroloideae are mixotrophic and gain sugars from the mycorrhizae, as well as nutrients.
In many parts of the world, a "heath" or "heathland" is an environment characterised by an open dwarf-shrub community found on low-quality acidic soils, generally dominated by plants in the Ericaceae. A common example is Erica tetralix. This plant family is also typical of peat bogs and blanket bogs; examples include Rhododendron groenlandicum and Kalmia polifolia. In eastern North America, members of this family often grow in association with an oak canopy, in a habitat known as an oak-heath forest.
Some evidence suggests eutrophic rainwater can convert ericoid heaths with species such as Erica tetralix to grasslands. Nitrogen is particularly suspect in this regard, and may be causing measurable changes to the distribution and abundance of some ericaceous species.
- Angiosperm Phylogeny Group III (2009). "An update of the Angiosperm Phylogeny Group classification for the orders and families of flowering plants: APG III". Botanical Journal of the Linnean Society. 161 (2): 105–121. doi:10.1111/j.1095-8339.2009.00996.x.
- Christenhusz, M. J. M. & Byng, J. W. (2016). "The number of known plants species in the world and its annual increase". Phytotaxa. 261 (3): 201–217. doi:10.11646/phytotaxa.261.3.1.
- Stevens, P.F. (2001 onwards). "Ericaceae". Angiosperm Phylogeny Website. Retrieved 29 December 2014.
- Kron, Kathleen A.; Powell, E. Ann & Luteyn, J.L. (2002). "Phylogenetic relationships within the blueberry tribe (Vaccinieae, Ericaceae) based on sequence data from MATK and nuclear ribosomal ITS regions, with comments on the placement of Satyria". American Journal of Botany. 89 (2): 327–336. doi:10.3732/ajb.89.2.327. PMID 21669741.
- Patterson, Patricia A. (1985). Field Guide to the Forest Plants of Northern Idaho. United States Department of Agriculture Forest Service. pp. 37–47.
- Watson, L. & Dallwitz, M.J. (19 August 2014). "Ericaceae Juss". The families of flowering plants: descriptions, illustrations, identification, and information retrieval. Retrieved 30 December 2014.
- "Flowering Plant Families, UH Botany".
- Jussieu, A.-L. de (1789). Genera plantarum ordines naturales disposita. Paris: Herissant & Barrois. pp. 159–160.
- Stevens (1971).
- Craven, L.A. (April 2011). "Diplarche and Menziesia transferred to Rhododendron (Ericaceae)". Blumea. 56 (1): 33–35. doi:10.3767/000651911X568594.
- Kron, K.A.; Judd, W.S.; Stevens, P.F.; Crayn, D.M.; Anderberg, A.A.; Gadek, P.A.; Quinn, C.J. & Luteyn, J.L. (2002). "Phylogenetic Classification of Ericaceae: Molecular and Morphological Evidence". The Botanical Review. 68 (3): 335–423. doi:10.1663/0006-8101(2002)068[0335:pcoema]2.0.co;2. S2CID 35699816.
- Keddy, P.A. (2007). Plants and Vegetation: Origins, Processes, Consequences. Cambridge University Press.
- Cairney, J.W.G.; Meharg, A.A. (2003). "Ericoid mycorrhiza: a partnership that exploits harsh edaphic conditions". European Journal of Soil Science. 54 (4): 735–740. doi:10.1046/j.1351-0754.2003.0555.x. S2CID 84611260.
- Liu, Z.; Wang, Z.; Zhou, J. & Peng, H. (2010). "Phylogeny of Pyroleae (Ericaceae): implications for character evolution". Journal of Plant Research. 124 (3): 325–337. doi:10.1007/s10265-010-0376-8. PMID 20862511. S2CID 38665814.
- "The Natural Communities of Virginia Classification of Ecological Community Groups (Version 2.6)". Virginia Department of Conservation and Recreation. July 2013. Retrieved 30 December 2014.
- Thomas, C. D. (1 August 1985). "Specializations and polyphagy of Plebejus argus (Lepidoptera: Lycaenidae) in North Wales". Ecological Entomology. 10 (3): 325–340. doi:10.1111/j.1365-2311.1985.tb00729.x. ISSN 1365-2311. S2CID 86813755.
- Keddy, P.A. (2010). Wetland Ecology: Principles and Conservation (2nd edition). Cambridge University Press. pp. 103–104.
- Stevens, P.F. (1971). "A classification of the Ericaceae: subfamilies and tribes". Botanical Journal of the Linnean Society. 64 (1): 1–53. doi:10.1111/j.1095-8339.1971.tb02133.x.
- Cafferty, Steve; Jarvis, Charles E. (November 2002). "Typification of Linnaean Plant Names in Ericaceae". Taxon. 51 (4): 751–753. doi:10.2307/1555030. JSTOR 1555030.
- Stevens, P.F.; Luteyn, J.; Oliver, E.G.H.; Bell, T.L.; Brown, E.A.; Crowden, R.K.; George, A.S.; Jordan, G.J.; Ladd, P.; Lemson, K.; McLean, C.B.; Menadue, Y.; Pate, J.S.; Stace, H.M.; Weiller, C.M. (2004). "Ericaceae". In Kubitzki, K. (ed.). Flowering Plants. Dicotyledons: Celastrales, Oxalidales, Rosales, Cornales, Ericales. The families and genera of vascular plants. Vol. 6. Springer. pp. 145–194. ISBN 9783540065128.
- Ericaceae at The Plant List Archived 23 May 2019 at the Wayback Machine
- Ericaceae, Epacridaceae Archived 11 October 2012 at the Wayback Machine, Empetraceae, Monotropaceae, and Pyrolaceae at The Families of Flowering Plants (DELTA)
- Ericaceae at the Encyclopedia of Life
- Ericaceae at the Angiosperm Phylogeny Website
- Ericaceae at the online Flora of North America
- Ericaceae at the online Flora of China
- Ericaceae at the online Flora of Pakistan
- Ericaceae at the online Flora of Chile
- Epacridaceae at the online Flora of New Zealand
- Epacridaceae Archived 4 July 2013 at the Wayback Machine at the online Flora of Western Australia Archived 4 July 2013 at the Wayback Machine
- Ericaceae at Ericaceae.org
- Ericaceae at Australian Tropical Rainforest Plants
- Neotropical Blueberries at the New York Botanical Garden | <urn:uuid:629e37b7-0e97-48b1-a43f-bdfa9f835ee2> | CC-MAIN-2022-33 | https://en.m.wikipedia.org/wiki/Ericaceae | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.726462 | 2,971 | 3.5625 | 4 |
The world's manufacturing economy has been transformed by the phenomenon of globalisation, with benefits for economies of scale, operational flexibility, risk sharing and access to new markets. It has been at the cost of a loss of manufacturing and other jobs in western economies, loss of core capabilities and increased risks of disruption in the highly interconnected and interdependent global systems. The resource demands and environmental impacts of globalisation have also led to a loss of sustainability. New highly adaptable manufacturing processes and techniques capable of operating at small scales may allow a rebalancing of the manufacturing economy. They offer the possibility of a new understanding of where and how design, manufacture and services should be carried out to achieve the most appropriate mix of capability and employment possibilities in our economies but also to minimise environmental costs, to improve product specialisation to markets and to ensure resilience of provision under natural and socio-political disruption. This proposal brings together an interdisciplinary academic team to work with industry and local communities to explore the impact of this re-distribution of manufacturing (RDM) at the scale of the city and its hinterland, using Bristol as an example in its European Green Capital year, and concentrating on the issues of resilience and sustainability. The aim of this exploration will be to develop a vision, roadmap and research agenda for the implications of RDM for the city, and at the same time develop a methodology for networked collaboration between the many stakeholders that will allow deep understanding of the issues to be achieved and new approaches to their resolution explored. The network will study the issues from a number of disciplinary perspectives, bringing together experts in manufacturing, design, logistics, operations management, infrastructure, resilience, sustainability, engineering systems, geographical sciences, mathematical modelling and beyond. They will consider how RDM may contribute to the resilience and sustainability of a city in a number of ways: firstly, how can we characterise the economic, social and environmental challenges that we face in the city for which RDM may contribute to a solution? Secondly, what are the technical developments, for example in manufacturing equipment and digital technologies, that are enablers for RDM, and what are their implications for a range of manufacturing applications and for the design of products and systems? Thirdly, what are the social and political developments, for example in public policy, in regulation, in the rise of social enterprise or environmentalism that impact on RDM and what are their implications? Fourthly, what are the business implications, on supply networks and logistics arrangements, of the re-distribution? Finally, what are the implications for the physical and digital infrastructure of the city? In addition, the network will, through the way in which it carries out embedded focused studies, explore mechanisms by which interdisciplinary teams may come together to address societal grand challenges and develop research agendas for their solution. These will be based on working together using a combination of a Collaboratory - a centre without walls - and a Living Lab - a gathering of public-private partnerships in which businesses, researchers, authorities, and citizens work together for the creation of new services, business ideas, markets, and technologies.
|Effective start/end date||29/04/14 → 31/12/17|
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint. | <urn:uuid:7ab8d023-2439-40ea-aca6-a275550b51e3> | CC-MAIN-2022-33 | https://researchportal.bath.ac.uk/en/projects/collaborative-ou-proposal-stories-of-change-exploring-energy-and- | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.93673 | 700 | 2.453125 | 2 |
BASE Electrolyte Salt Single
BASE Electrolyte Salt - Single
Electrolytes are a conductor of energy and are involved in every muscle contraction during training. If the body is low on electrolytes then muscle contraction cannot occur with the same force. When our electrolytes are combined with water the minerals that are inside the electrolytes can be released into ions, both positive and negatively charged. By doing this we are able to give the body a substantial boost of energy through these ionized minerals.
BASE Electrolyte Salt provides athletes with superior electrolyte replenishment, enabling them to maximize performance, stay hydrated and fight fatigue. More than just sodium chloride, BASE Salt’s all natural formula contains 84 essential minerals needed to maintain proper energy and fluid balance and avoid musclecramps. BASE Salt’s unique crystalline form is very easily digested, rapidly absorbed and available in the bloodstream to replenish the electrolytes lost in sweat. Not only does it work quickly, it also prevents the gastrointestinal distress caused by many other electrolyte products. Add BASE Salt to your nutrition regime to take your training and competition to the next level.
- Sodium regulates fluid balance, blood pressure and acid-base balance in the body. It also facilitates the transmission nerve impulses in skeletal muscle, brain and heart tissue. Since it is lost in sweat, it must be replenished during strenuous or prolonged exercise to prevent potentially life-threatening hyponatremia.
- Potassium also plays an important role in fluid and acid-base balance, and it is particularly important for cardiac muscle contraction. It is also lost in sweat. Low potassium causes muscle weakness and severe depletion can induce heart arrhythmias.
- Magnesium actives the enzymes required for energy production. It also plays a role in skeletal muscle contraction and bone structure. Even small deficits impair performance and increase damage from exercise. Magnesium facilitates potassium absorption from the gastrointestinal tract and helps balance electrolytes.
- Chloride helps regulate fluid and acid-base balance in the body. Combined with hydrogen, it comprises the primary digestive acid in the stomach required to break down and absorb nutrients, and it may help the liver clear toxins. As the prominent negative ion in the body, it is commonly coupled with sodium and lost in sweat.
- Calcium in addition to promoting bone structure and repair, calcium enables heart muscle contraction, nerve transmission and regulates certain hormones. When depleted, the body usurps calcium from the bone, so supplementing helps protect bone health and integrity.
- Also includes trace amounts of the following: actinium, aluminum, antimony, arsenic, astatine, barium, beryllium, bismuth, boron, bromine, cadmium, carbon, cerium, cesium, chlorine, chromium, cobalt, copper, dysprosium, erbium, europium, fluorine, francium, gadolinium, gallium, germanium, gold, hafnium, holmium, hydrogen, indium, iodine, iridium, iron, lanthanum, lead, lithium, lutetium, manganese, mercury, molybdenum, neodymium, neptunium, nickel, niobium, nitrogen, osmium, oxygen, palladium, phosphorus, platinum, plutonium, polonium, praseodymium, protactinium, radium, rhenium, rhodium, rubidium, ruthenium, samarium, scandium, selenium, silicon, silver, strontium, sulfur, tantalum, tellurium, terbium, thallium, thorium, thulium, tin, titanium, uranium, vanadium, wolfram, yttrium, ytterbium, zinc and zirconium.
Typical Values: Per Serving
- Sodium: 290mg
- Chloride: 442mg
- Calcium: 3mg
- Magnesium: 12mg
- Potassium: 2.6mg | <urn:uuid:07dc4df9-a09b-4a2d-aa33-472172525120> | CC-MAIN-2022-33 | https://www.insideoutsports.com/nutrition/capsules/base-electrolyte-salt-single.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.841869 | 853 | 3.0625 | 3 |
YINZI theater welcomes back Anne Rochat for a research residency in Chongqing. In three weeks’ time, she will collaborate with Swiss director François Bovy to create a film called “Doris Magico’s Nose is Facing Chongqing”. After Chongqing, Anne foresees a coproduction with Tarik Hayward at Beijing’s Inside-Out Art Museum.
As an artist with rich experience and great tension, the inspiration for this collaboration came from her previous research trip around China and a short visit to YINZI Theatre in March 2019. The unique black box space of YINZI theater, the mixed and lively Huangjueping area, and the bustling, modern and natural landscape of buildings in the central area of Chongqing all indicate that there will be a great change here, but these elements seem to be quite challenging. Who will occupy the city? Nature or man?
Doris Magico’s Nose is Facing Chongqing (2019)
“Doris Magico’s Nose is Facing Chongqing” is the continuation of her previous video performance “Doris Magico”, recorded into 100 short videos during her journey in Switzerland, India, Italy, Cambodia, and China (Hic & Nunc Project) from 2009 to 2017. “Doris Magico” was also shown at the extra ball avant-garde art festival in CCS in Paris in April 2017.
This creation will take Doris Magico as the main character. Anne will invite François Bovy to walk in the city every day to collect ideas and atmosphere to understand people’s daily perspectives. They will see a series of vivid paintings – a poetic look at this eternal mega-city. The challenge they will face will be to reflect on how human beings, cities and nature coexist from the perspective of art in the disproportionate landscape!
Doris Magico’s nose is watching and being watched at the same time. She is experiencing the vastness and madness of the world’s largest city which is “devouring” the rich nature or being “anti-swallowed” by rich nature. Who or what is the dominant factor? How can we live in this giant city machine?
Anne Rochat graduated from the Lausanne University of Art and traveled around Asia. Between 2011 and 2012, she stayed in Varanasi, India. She has won many prestigious awards, including the Prix Irne Reymond in 2013, the Prix Kiefer Hablitzel in 2012, the Bourse Culturelle du Canton de Vaud in 2011, the Bourse Culturelle de la Fondation Leenaards and Swiss Awards, Art Basel in 2010.
(Banner image from Anne Rochat’s exhibition “Medium is the Message”, 2019, provided by Luxelakes A4 Art Museum in Chengdu.) | <urn:uuid:3d712cd2-9ff7-490d-981e-befa14d4a26f> | CC-MAIN-2022-33 | https://prohelvetia.cn/en/2019/11/18/anne-rochats-nose-faces-chongqing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.918159 | 622 | 1.601563 | 2 |
It’s been a tortuous journey for Francisca Awah. Last month, the 35-year-old from Cameroon spoke in front of an audience that included Ivanka Trump and the US Secretary of State, when she was honored for her contribution to the fight against human trafficking.
But just three years ago Awah was living in modern slavery, trapped and abused as a domestic worker in Kuwait.
In the spring of 2015, Awah answered an advertisement for an English-teaching job in Kuwait. The pay was good, better than anything she could earn in her home town of Kumba, in south-west Cameroon, even though she had a Masters degree and spoke fluent English. She had a two-year-old son to support, and when she was offered the job, she accepted.
The reality, it turned out, was very different.
‘Sick and exhausted’
When she arrived in Kuwait she says she was immediately taken to work as a maid in a private home, employed through an agency. She says she was moved between homes for a few weeks, and then eventually ended up with a Kuwaiti family, who she says took her passport.
Awah says the family forced her to work long hours, sometimes in the blistering Kuwaiti sun, with very little sleep.
She says she got sick and exhausted and suffered from back pain from the constant cleaning.
When she asked to leave she says the family told her she would have to repay the $3,000 they had given the agency for her, and she would also have to pay for her flight home.
She says she was paid 75 Kuwaiti dinars (about $250) a month for the two months she was with the family.
Stories of hope
Awah says she plucked up the courage to turn on the television while she was working. She found herself watching The CNN Freedom Project, which reports on all forms of modern slavery.
“Sometimes they show people that they have saved,” she later told CNN. “I was having hopes.”
One report, profiling Katie Ford, the former CEO of a modeling agency, who now runs anti-slavery organization Freedom for All in the US, struck a particular chord.
Awah says she had a cell phone and used it to find Ford’s details on the internet. She contacted Ford, who coached her through her eventual escape to a friendly embassy, and then paid for her flight to Cameroon.
The family deny they prevented Awah from leaving or asked her to pay back the $3,000. They say she was not overworked, and that she worked no more than eight hours a day as stated in the contract from the agency, but they did admit that she did not sign that contract.
Vulnerable to forced labor
There are more than 600,000 migrant domestic workers in Kuwait, in a population of 4 million people.
The 2018 US State Department Trafficking in Persons (TIP) report says that migrant domestic workers in Kuwait are particularly vulnerable to forced labor inside private homes.
It also says that “Kuwait’s sponsorship law – which ties a migrant worker’s legal residence and valid immigration status to an employer – restricts workers’ movements and penalizes them for leaving abusive workplaces.” It adds that employers often confiscate passports, although it’s illegal.
But the report notes that the Kuwaiti government is making significant efforts to tackle the problem.
It has introduced a law guaranteeing domestic workers one day off per week, a maximum 12-hour workday, a minimum wage paid monthly and paid annual leave. It has also set up “a government-run central recruitment company intended to reduce recruitment costs and combat illegal recruiting fees.”
In the months after Awah made it back home she started to share her story, to try to raise awareness about the risk of trafficking.
She was keenly aware that if people found hardship when they returned home, they could be re-trafficked. “If you rescue someone and the person is not self-sufficient what do you expect?” she told CNN.
Awah eventually set up a non-profit organization called Survivors’ Network. She says it provides interim employment for trafficking survivors on a poultry farm, as well as microfinance, so women can set up their own businesses.
She also champions women’s education and teaches people to spot the signs of trafficking, getting the word out through churches, schools, local radio stations and social media. Awah says her organization has advised more than 500 African women trapped in domestic servitude in Kuwait and Lebanon on how to return home.
In June, Awah was named by the U.S. State Department as a TIP report “Hero” – an individual who has made a particular contribution to the fight against human trafficking.
“A few years ago, I could have only dreamt of such an honor” she told the audience of State Department officials at the TIP report launch ceremony, in Washington DC.
And she shared her message with them, that rescue is not enough: “To prevent trafficking, people need vocational training to build skills so that they can work and become self-sufficient in their home countries.”
Awah admits it can be hard to keep telling her story, but doing so has become one of her most powerful tools.
“We can all talk about this issue in our schools and workplaces and over dinner with our families,” she told the State Department audience. “The more people who know and care, the more people we will save.” | <urn:uuid:6c72202a-09cd-498b-99f9-9443abb77b1f> | CC-MAIN-2022-33 | https://www.cnn.com/2018/07/30/world/francisca-awah-tip-report-hero/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.986169 | 1,186 | 1.929688 | 2 |
After the ceasefire in 1965 Pakistani's continued to encroach on Indian territory in Kalidhar area. L.t. Col Nandagaopal of the Sikh Light infantry led the attack to occupy two strategic hilly points but the launched two counter offensives with heavy artillery firing.
In the third counter attack , Pakistani's reoccupied one of the hills though both sides lost several men in the skirmish. On October 3 , L.t. Col Nandgaopal took the help of the Mahar battallion to win back the lost positions. Despite the difficult terrain and heavy firing , not ony was the position recaptured but three others as well . The enemy was repulsed in daring and hand to hand fighting during which Nandgopal sustained grievous hatchet injuries on his hand and face. On October 5, an exhausted Nadgopal led the depleted battallion in an final assault on the Kalidhar Trig point. It was captured and al the other intruders were evicted.
L.t. Col Nandagaopal was decorated with the Mahavir Chakra for his devotion of duty. | <urn:uuid:fdf80454-a659-4801-aed9-d0237d9f300f> | CC-MAIN-2022-33 | http://www.prideofindia.net/33.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.977405 | 233 | 2.171875 | 2 |
We elevate nature through exceptional stewardship
Based in Georgia, the Southern Conservation Trust is a US 501 (c)(3) public charity, EIN 58-2036727 that elevates nature through exceptional stewardship through over 65,000 acres of conserved land and public lands throughout the southeast, including 6 public nature areas in Fayette County, Georgia and the Fayette Environmental Education Center. We don’t just believe in protecting land, we believe people should have equal access to enjoy it.
Our History and Future
Founded in 1993 in Fayette County, Georgia, the Southern Conservation has grown from a local community land trust to a nonprofit leader in conservation, environmental education, and public nature areas in the southeast.
Land & Wildlife conservation
Based in Georgia, we protect over 75,000 acres of working farms, forests, scenic and historic landscapes, rivers, and vital wildlife habitat in 13 states throughout the southeast.
We provide environmental education through our Fayette Environmental Education Center (FEEC) and encourage meaningful interaction with nature.
public nature areas
We operate The Ridge Nature Area, Sams Lake Bird Sanctuary, Morgan Grove Nature Area, Nesmith Preserve, Wildcat Woods, and the Fayette Environmental Education Center.
Integrity and openness in financial practices are our highest priorities. SCT pledges to wisely steward entrusted resources by using every dollar to its fullest potential.
We protect and conserve land in 13 states
The Southern Conservation Trust currently conserves land in 13 states throughout the United States with a focus on the southeast. This map shows where our conservation easements are located.
The secret of success, our team!
The Southern Conservation Trust is one of the fastest-growing Land Trusts on the East Coast. Our innovative team works hard to conserve over 75,000 acres, manage six public nature areas and provide environmental education through our very own Fayette Environmental Education Center. Learn more about our staff and board.
Transparency is everything.
The Southern Conservation Trust is governed by a responsible and engaged Board of Directors. The Board establishes policies, sets budgets, oversees operations, and reviews organizational accomplishments.
Financial statements are prepared in accordance with generally accepted accounting principles (GAAP). Contributions to the Southern Conservation Trust are tax deductible to the full extent allowed by law.
SCT receives professional tax services and obtains an annual audit in accordance with generally accepted auditing standards from Fulton & Kozak LLP, an independent public accounting firm.
Contact information: name, complete address, phone numbers, email address. Relationship information: employer, business name, civic association relationship, how you heard about the Trust, another person you referred to the Trust. Payment information: We collect your card number and expiration date at the time you make a credit or debit card donation, but maintain that information in our files only if you sign up for an ongoing monthly donation. To be clear: we do not keep your card information in our database unless you authorize us to do so. Information you wish to share: comments, suggestions.
How we use your information
Southern Conservation Trust uses your information to support our conservation mission at your direction, and to provide you with the information you request. Credit/debit card numbers are used only for donation or payment processing and are not retained. We use the comments you offer to provide you with information requested, and we take seriously each recommendation as to how we might improve communication.
Occasionally the Trust will publish the names of our donors, for example in a newsletter or annual report. The specific amount donated is not made public, unless you authorize such upon our request. Listing your name could very possibly help increase donations from your personal or business network. However, if you wish, you may request a specific donation, or all donations, be anonymous.
No sharing of personal information
Southern Conservation Trust will not sell, rent, or trade your personal information to other organizations, period. Use of donor information will be limited to the internal purposes of the Trust and only to further the nonprofit activities and purposes of the Trust.
Remove your name from our mailing list
From time to time the Trust distributes periodic mailings or emails related to news about our conservation program, educational and fundraising events, specific fund-raising appeals, and newsletters. It is our desire to not send unwanted mail. Please email us if you would like to be removed from our mailing list.
Contact us with any questions or concerns
Press & News
We’re on a mission to elevate nature. Find the latest news and updates on our work, our initiatives, and the causes that need our help the most. | <urn:uuid:8c3488de-28e7-4a9e-979b-7ca7d8384a00> | CC-MAIN-2022-33 | https://sctlandtrust.org/about-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.902909 | 1,065 | 1.742188 | 2 |
How far into the periodic table could you get? Would you be breaking any laws? At what point would your periodic table start killing you?
If you’re willing to spend $1,700, you could actually buy a ready-made set of the elements online. But where is the fun in that if you can make your own collection from scratch?
Scrape off the layer of copper on a penny minted after 1982 – and you’ll get pure zinc. Take apart a few batteries for carbon rods. Tear down smoke detectors for americium.
In the end, you could even pull some pure gold from your old cell phone. No matter how you collect your elements, you should always keep them in their sealed bottles. But what if you didn’t?
What if out of curiosity you decided to put all 118 elements together to resemble the actual table without any glass barriers?
There are seven rows in the periodic table. Starting on the first row, hydrogen and helium wouldn’t cause you any trouble, aside from them rising upward and dispersing right away.
These elements are just like your introvert friend who always leaves the party before it gets good. Next, the second row. If you weren’t careful enough, you’d start coughing and have difficulty breathing.
That’s what beryllium poisoning looks like. At this point you should consider wearing a gas mask, since you’d also have yellow fluorine gas spreading on the ground and burning everything it touches. Other elements of the second row are harmless.
Neon would simply float away, while oxygen and nitrogen would be drifting around until they disperse. You wouldn’t stop at just two rows, would you? No. So, let’s move to the third one. It would burn you with fire.
Sulfur normally doesn’t do anything bad other than stink. But with fluorine and chlorine by its side, it would immediately catch fire.
On top of that, white phosphorus would spontaneously burst into hot flames that would be very hard to extinguish. Maybe you ought to just stick to doing chemistry class experiments… Instead, with your lab on fire, you’d decide to go on and stack the fourth row. Fine.
Adding potassium to the mix would set the arsenic on fire, too, releasing large amounts of arsenic trioxide. You sure don’t want to inhale that toxic stuff. There would be some interesting effects though.
As the elements on your periodic table were reacting to each other, aluminium would become as soft as wet paper.
Sulfur would stop smelling so bad. But if you weren’t careful, exposure to toxic smoke would have already killed you. These toxic elements would “eat” your body – and your mask too! You could sue your gas mask producer.
But you’re too smart to die so early in the experiment… you’d be watching from a safe distance – and you’d live to stack the fifth row.
This row would be much like the fourth, except for one thing – say hello to the first radioactive element in your collection – technetium. You still alive over there? Well, the next row of the table would fix that, no matter how far or how careful you were.
Because the sixth row contains radon, polonium, promethium and astatine – all radioactive elements that you don’t want anywhere near you.
Ever. Stacking them together would result in a massive explosion and a cloud of toxic fire and dust. In a matter of milliseconds, you’d get a lethal dose of radiation.
You and the city that might’ve sued you for conducting such an experiment. At that point, there would be no one left to add the seventh row to your periodic table.
That’s probably for the best, since most of its elements are so unstable they can’t exist longer than a few minutes. They would radioactively decay into elements that also decay. Wonder what that looks like?
The reactions from adding the 7th row would be like a nuclear bomb exploding over and over again.
A mushroom cloud would rise over the area. It wouldn’t be just radioactive fallout, it would leave the radioactive footprint of thousands of Chernobyl disasters.
So, if you want to pick a new hobby, keep in mind that there are a lot better things to collect.
- Munroe, Randall. What If? Serious Scientific Answers to Absurd Hypothetical Questions, Periodic Wall of Elements. London: John Murray, 2015.
- Theodore Grey, How to Get Your Own Element Collection
- Instructable by Hulkguild, Start an Element Collection – How to Find Samples in Everyday Places
- 10 Periodic Table Facts
- 20 Things You Didn’t Know About The Periodic Table
- FUN Facts About Periodic Table
- PERIODIC TABLE
- Periodic Table Facts | <urn:uuid:f10cc307-5270-4e9e-b9de-5ec64db94d01> | CC-MAIN-2022-33 | https://whatifshow.com/what-if-you-made-an-actual-model-of-the-periodic-table/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.93913 | 1,042 | 3.359375 | 3 |
Mozilla Firefox recently launched ‘Spark’, a global mobile phone campaign that celebrates Firefox going mobile. Working with New York City’s The Barbarian Group, the savvy campaign encourages mobile users to play a game in which they “pass the Spark,” sharing the mobile app with other users via social media and QR codes.
Here’s how it works: Android users can share the mobile app with other users via social media and QR codes. To get started, download the Firefox app in the Android Market or scan the QR code to the right.
While there is no iOS app available, iPhone users can participate by logging on to the Spark website and grabbing a custom QR code and url to share with friends.
Throw in a little game mechanics and Mozilla is really getting the spark passed around. As each mobile user completes levels or reaches certain breakthroughs such as passing the flame between countries or continents, he or she will earn rewards such as badges. Users can also “watch the spark change, grow and travel” around the world through Spark’s Global Visualizer. Since its launch, Spark has spread through 150 countries and 6 continents, with 21, 000+ badges unlocked.
The Barbarian Group says that “the concept of ‘Spark’ echoes Mozilla Firefox’s mission to making the Web better by emphasizing principle over profit and keeping the Internet open, free and accessible to all.”
[Read our interview with Benjamin Palmer, the CEO of Barbarian Group on Humanizing Brands.] | <urn:uuid:fec77148-9a9c-458d-9ece-c298e928451b> | CC-MAIN-2022-33 | https://thenextweb.com/news/the-spark-campaign-celebrates-firefox-going-mobile | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.910618 | 315 | 1.539063 | 2 |
BRAIN CENTER Partners with Le Bonheur
Providing mental health counseling to trauma patients and their families
Dr. Eraina Schauss and colleagues from the BRAIN CENTER at the University of Memphis were recently awarded funding from the Urban Child Institute in partnership with the Trauma Center at Le Bonheur Children's Hospital. This project will establish integrated mental and behavioral counseling services within the Trauma Center and Emergency Department at Le Bonheur Children's Hospital. The initiative was spearheaded by Schauss, alongside Dr. Regan Williams, MD., Medical Director of Trauma Services at Le Bonheur Hospital, who recognized the need to heal the emotional wound in addition to the physical wounds of trauma. The Covid-19 pandemic has highlighted the connection between physical health and mental well-being and the enormous mental health impact the pandemic has had upon vulnerable populations, specifically children. Through this joint initiative, any patient or family member receiving services at the Trauma Center or Emergency Department at Le Bonheur Hospital will be eligible to receive free mental health counseling services provided by advanced graduate-level students in the Clinical Mental Health Counseling program at the University of Memphis under the supervision of Dr. Schauss and BRAIN CENTER colleagues. | <urn:uuid:c6f20774-6b04-4c3c-824e-8eb4dc5dfc36> | CC-MAIN-2022-33 | https://www.memphis.edu/research/newsletter2021/braincenter.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.939298 | 252 | 1.84375 | 2 |
This section of the Building A Home In New Zealand series is an introduction into different building materials and why you may be interested in looking at both traditional and newer building materials. There is a lot of content to discuss so the Building Materials has been broken into Windows, Thermal And Noise Wall Insulation, Attic Venting And Moisture Control, and Heating. We recommend reading all of these before Choosing A Builder as some builders may not be comfortable with something that they don't have experience with.
Throughout time, building materials generally didn’t change that much over short periods of time. The technology of earthen bricks stayed the same with an area over hundreds or thousands of years. All, until recently. Now, building practices are changing extremely rapidly because of significant and frequent advances in technology and studies in material science and engineering. Sometimes, improvements in technology are due to a better understanding of previously used inferior building practices. Examples of recent changes in building practices in NZ include increasing insulation, the prevalence of LED over incandescent lighting, and the resurgence and importance of vented attics.
However, this isn’t the limit of the technology that is out there. Other countries apply more advanced building practices and newer technology in some aspects that NZ still hasn’t heard of and aren’t required by our building code. An international investigation of NZ building code showed NZ building code is so outdated compared to other countries that even the newest NZ houses don’t meet OECD countries’ building codes. An OECD report (2017) said the NZ Government "should consider modernising the Building Code – its standards are less stringent than those of many OECD countries". And the IEA report said the New Zealand Building Code is "below the standards required of most IEA countries with comparable climates".
We don’t believe that any one country has all the answers and by no means are all of the practices of one country better than all of the practices of another. However, it would be naïve and foolish to ignore improvements that can have significant benefits for your home and directly improve your comfort or energy efficiency. It is possible today to build houses that are warm, dry, quiet, and secure without spending significantly more. The initial cost will then be recouped in reduced energy, water, and maintenance costs.
We built our house in 2014. We were familiar with US building practices and made efforts to understand NZ building practices. We noticed that the US does some things better like windows, ventilation, and insulation; while we preferred the NZ sewage return and roofing materials. We were able to combine the best of the international building practices with the best of NZ building practices and created a home that was better than either countries building practices alone. This has resulted in a very warm and dry home that is comfortable all year around, especially in winter.
In the winter of 2015, our family was having dry sinuses at night because of the low humidity in our warm house. Our inside temperature would get down to 18°C at night (we don’t use our heat pumps or electric heating) and our hydrometer was stating the relative humidity would be 30-40%. Having a warm home with lower humidity is normal in the US, so we went to Mitre 10 to get a humidifier to increase the relative humidity in our home, just as we would have gone to a similar hardware store in the US. A summary of our conversation with the Mitre 10 employee is below:
Us: Good morning. Can you please show us to the humidifiers?
Employee: Sure. We have a wide selection of dehumidifiers right over here.
Us: I’m sorry, we are looking for a humidifier, not a dehumidifier.
Employee: No you aren’t, you need a dehumidifier.
Us: Our home has a low relative humidity and we need to add water to the air. Our current humidity is 30% and is drying out our noses. We need to add more humidity. Where are your humidifiers.
Employee: I’m sorry, we don’t carry those. There is no need for those in NZ. I still think that you mean you’re looking for a dehumidifier.
Note – I was eventually able to find a humidifier in a pharmacy in the baby section.
This is a great summary on the effects the different building practices in NZ. The US equivalent of Mitre 10, Home Depot, sells humidifiers for winter use and only small canister desiccants for closets, but not large electric dehumidifiers. The US building practices are intended to keep excess moisture out of the home, so excess moisture isn’t a problem. Ironically, I passed a stand for a Karcher window squeegee / water vacuum designed to collect the condensation on windows in NZ as I exited the Miter 10 store. We don’t have or need those with US windows either.
In this section, I will share some of the differences in the building code that may have the largest impacts on the comfort of homes in NZ. Some are very simple and can be very inexpensive to implement as well. However, one option may not be the best solution for every build. We mention topics here to prime your thought processes so you can research them and discuss them with your builder. Though there may be some huge performance advantages, the below isn’t a direct endorsement for any specific technology.
One thing needs to be stated though concerning newer technologies. Many builders may be hesitant to use something that they are unfamiliar with. We noticed that the bigger building corporations seemed to be more hesitant about new technology than the smaller ones. If you have something new that you would like to implement, bring it up with your builder when interviewing them. Some will be happy to learn from newer technologies; others won’t. Also remember that everything that goes into your home needs to prove that it meets NZ standards. Some NZ standards may be so outdated that newer materials don’t fit the mold of what has been previously accepted, and you will need to work with your builder and the supplier to provide what is needed for council approval.
This brings to a close the introduction section of Building Materials. The next step is to look at the first topic in new Building Materials - Windows. This topic has had a revolution outside of New Zealand starting after WWII, but lack of education has prevented Kiwis from enjoying the benefits of more recent technology. | <urn:uuid:df5cebbb-9428-4db8-a088-60fea4f11290> | CC-MAIN-2022-33 | http://thermascreen.co.nz/faq/building-materials-introduction/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.951187 | 1,341 | 3.015625 | 3 |
The Lackawanna County Department of Planning and Economic Development is the administering agency for the Community Development Block Grant Program in the County. The CDBG Program consists of federal funds from the United States Department of Housing and Urban Development which are administered by the Pennsylvania Department of Community and Economic Development.
In Lackawanna County there are 11 entitlement communities. In order to be determined to be an entitlement community, the community must have a population of 4,000 or more and be listed on the Department of Housing and Urban Development’s List of Distressed Communities. Lackawanna County is provided with yearly allocations CDBG funds on behalf of each of the 11 entitlement communities. The 11 entitlement communities include: the Boroughs of Archbald, Blakely, Clarks Summit, Dickson City, Dunmore, Jessup, Old Forge, Olyphant, Taylor, Throop and Scott Township.
In Lackawanna County there are 27 nonentitlement communities. In order to be determined to be a nonentitlement community, the community must have a population of less than 4,000 and/or are not listed on the Department of Housing and Urban Development’s List of Distressed Communities. Lackawanna County is provided with a yearly allocation CDBG funds which will benefit the 27 nonentitlement communities. The 27 nonentitlement communities include: the Townships of Benton, Carbondale, Clifton, Covington, Elmhurst, Fell, Glenburn, Greenfield, Jefferson, LaPlume, Madison, Newton, North Abington, Ransom, Roaring Brook, South Abington, Spring Brook, Thornhurst, Waverly, and West Abington; and the Boroughs of Clarks Green, Dalton, Jermyn, Mayfield, Moosic, Moscow, and Vandling. Community Development Block Grant
–The Community Development Block Grant (CDBG) program is a flexible program that provides communities with resources to address a wide range of unique community development needs.
–The CDBG program works to ensure decent affordable housing, to provide services to the most vulnerable in our communities, and to create jobs through the expansion and retention of businesses.
–Administer approximately $1.5 million per year in grant funds across 11 entitlement communities ($4.4.mil project improvement investment over last 5 years) and 27 non-entitlement communities ($1.0.mil project improvement investment over last 5 years).
2022 Project status
6 projects completed; 4 projects in construction phase, 1 project to be awarded – all projects are estimated to be completed by end of 2022.
Notice of Fair Housing Officer and Complaint Process for Lackawanna County
FUNDABILITY REQUIREMENTS FOR COMMUNITY DEVELOPMENT BLOCK GRANT PROJECTS
In order for an activity to be considered fundable, it must first be an activity which is eligible under CDBG Program requirements.
The project must then meet one of the Three National Objectives of the CDBG Program in order to be considered fundable. These are:
1. Benefit to Low to Moderate Income (LMI) Persons
Direct Benefit to LMI Persons- CDBG funds will directly benefit LMI persons, such as in a housing rehabilitation program where LMI homeowners receive funds directly to address health and safety problems in the home.
Indirect Benefit to LMI Persons- CDBG funds will indirectly benefit a majority of at least 51% LMI persons, such as a sanitary sewer line reconstruction project in a given area where a minimum of 51% of the persons hooked up to the sewer line are LMI.
Assumed Benefit to LMI Persons- CDBG funds will be assumed to benefit LMI persons, such as a Senior Citizen Center project which benefit Senior Citizens, or a architectural barrier removal project which increases access for handicapped/elderly persons; these projects are assumed to meet LMI requirements according to CDBG regulations.
Limited Clientele- Public Service projects limited to a specific group of people, such as a senior citizens, disabled, or homeless, of which 51% are LMI.
Economic Development- Projects to create or retain permanent jobs, where at least 51% of the jobs involve the employment of LMI persons.
2. Prevention or Elimination of Slums or Blight
In an area where a substantial number of deteriorated, dilapidated structures, a project to address this condition may qualify under this National Objective. Activities may include acquisition of structures for demolition, relocation activities, or rehabilitation of structures. Applicants must define specific boundaries of blighted areas and quantify the “substantial” number of deteriorated, dilapidated structures in accordance with CDBG requirements.
3. Immediate Threat to the Health and Safety of the Community
Under this National Objective, the applicant must clearly demonstrate a threat to the health and safety of residents. The condition must have developed and become critical within 18 months of the application for funds. In addition, the applicant must demonstrate that it is unable to finance the activity on its own and no other sources of funding are available for this purpose. ELIGIBLE CDBG ACTIVITIES
The following is a list of Eligible Activity Categories which may be assisted with Community Development Block Grant Program Funds
Water/Sewer Improvements Storm Water Improvements Street Improvements Parks, Recreation Facilities Senior Center/Facilities Fire Station/Equipment Public Facilities – Other Parking Facilities Rehab: Single-Unit Residential Rehab: Publicly or Privately Owned Comm/Ind. Direct Homeownership Assistance Construction of Housing Acquisition – for Rehabilitation Acquisition of Real Property Relocation Clearance and Demolition Disposition
Non-Residential Historic Preservation Interim Assistance ED Direct Financial Assistance Planned Repayment of Section 108 Loan Principal Public Services Senior Centers Handicapped Youth Programs Child Care Code Enforcement Planning and Capacity Building, such as: Comprehensive Plans Zoning Ordinances Subdivision/Land Development Ordinances Building Codes Program Administration Costs
INELIGIBLE CDBG ACTIVITIES
The following is a list of Ineligible Activity Categories which may not be assisted with Community Development Block Grant Program Funds
Buildings or portions thereof, used for the general conduct of government
General Government Expenses
Operating and Maintenance Expenses
Purchase of Construction Equipment
Purchase of Fire Protection Equipment
Purchase of Furnishings and Personal Property
Peggy Piccotti Community Development Manager Department of Planning and Economic Development Scranton, PA 18503 570.963.6830 x1356 Email: Contact Me
Mark Mercanti Fiscal Manager Department of Planning and Economic Development Phone: 570-963-6830 Ext. 1368 Fax 570-963-7596 Email: Contact Me
Valerie Calpin Business Consultant Department of Planning and Economic Development Phone: 570-963-6830 Ext. 1372 Fax 570-963-7596 Email: Contact Me
Joe Rovinsky Compliance Manager Department of Planning and Economic Development Phone: 570-963-6830 Ext. 1374 Fax 570-963-7596 Email: Contact Me
Location Lackawanna County Government Center 123 Wyoming Avenue, 5th Floor Scranton, PA 18503
The Document Center provides easy access to public documents. Click on one of the categories below to see related documents or use the search function.
Categories always sorted by seq (sub-categories sorted within each category)
Documents sorted by SEQ in Ascending Order within category | <urn:uuid:a885b553-aebb-43d1-b633-6a274d860a27> | CC-MAIN-2022-33 | https://lackawannacounty.org/government/departments/economic_development/community_development.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.875997 | 1,540 | 1.539063 | 2 |
There is a syndrome that perplexes both patients and doctors alike -- one where weakness is the primary complaint but there is absolutely no identifiable reason why this should exist at all. The key word here is "identifiable" -- for there is most likely some kind of reason, but it is not overt. A full physical and neurological examination has been done to no avail. And the symptoms cannot simply be due to fatigue or pain even if these are present. What is this syndrome and how can we begin to think about this?
Earlier this year, a group of researchers in Edinburgh, Scotland defined a syndrome called "functional weakness " . They sought to identify how common this was and what distinguished this group of people from those who were similar, but whose weakness could be explained by neurological illness. This second group were referred to as the controls. They found that there were 3.9 new cases per 100,000 people per year -- comparable with prior statistics that were around 5 per 100,000 and even higher in new neurology patients.
These researchers then compared the patients with "functional weakness" with the control subjects. They found that people with functional weakness had more pain and a higher frequency of depression, generalized anxiety disorder, panic disorder and somatization disorder (a psychiatric term for physical symptoms without identifiable physical cause). However, both groups were similar in their self assessments of depression and anxiety. Much of this was not that remarkable and up to this point, informational and interesting.
However, what was remarkable was the following finding: People with functional weakness were less likely to agree that stress was a possible cause of their illness but twice as likely as controls to report that they were not working because of their symptoms. Both of the latter findings were statistically significant. While people with functional weakness appear to be every bit as disabled as people with weakness due to neurological disease, why would they be so much less likely to attribute their symptoms to psychological factors?
The paradox here is that people with neurologic disease recognize psychological causality whereas those with psychological disease do not. The literal possible reasons are manifold, but the possibility of psychological denial of symptoms is intriguing. This study concluded that denial was more likely than secondary gain -- that is, that people with functional weakness were not likely to be missing work because it suited them, or seeking attention because they wanted it. There seemed to be other factors at play.
One important factor was the greater panic disorder in people with functional weakness. This group of patients appeared to have non-fearful panic -- that is, their anxiety may have been largely unconscious. Several studies have now shown quite convincingly that fear can be registered outside of conscious awareness in the brain and I have dedicated a chapter to this phenomenon in my book "Life Unlocked: 7 Revolutionary Lessons To Overcome Fear" .
One intriguing parallel not mentioned in this article is that of the similarity between psychological denial and physical denial. When people have a stroke in the parietal region of the brain, and if you ask them to move the paralyzed leg, they are unaware that they cannot move the leg because they are paralyzed. They may even answer: "I have arthritis" or "I don't feel like it" . They are completely in denial of their physical paralysis.
Similarly, some people who have functional weakness may also be in denial of their psychological illness. I believe that this could be due to the unseen effects of panic disorder. For one, people with panic disorder have brain abnormalities that are similar to those with somatoform disorders (physical symptoms due to psychological vulnerabilities) . Secondary, deficits in the parietal lobe have been reported in patients with panic disorder [6-8]. This same region has been implicated in denial of physical symptoms.
Thus, if you have weakness, fatigue and pain with no identifiable physical or psychological cause, your unconscious brain may be wreaking havoc on your insight due to the anxiety that you cannot feel as anxiety, but which nonetheless impacts your brain in very significant ways.
1. Stone, J., C. Warlow, and M. Sharpe, The symptom of functional weakness: a controlled study of 107 patients. Brain, 2010. 133(Pt 5): p. 1537-51.
2. Whalen, P.J., et al., Masked presentations of emotional facial expressions modulate amygdala activity without explicit knowledge. J Neurosci, 1998. 18(1): p. 411-8.
3. Pillay, S., Life Unlocked: 7 Revolutionary Lessons To Overcome Fear. 2010, New York: Rodale.
4. Ramachandran, V.S., The evolutionary biology of self-deception, laughter, dreaming and depression: some clues from anosognosia. Med Hypotheses, 1996. 47(5): p. 347-62.
5. Koh, K.B., et al., Shared neural activity in panic disorder and undifferentiated somatoform disorder compared with healthy controls. J Clin Psychiatry, 2010.
6. Lai, C.H. and Y.Y. Hsu, A subtle grey-matter increase in first-episode, drug-naive major depressive disorder with panic disorder after 6 weeks' duloxetine therapy. Int J Neuropsychopharmacol: p. 1-11.
7. Hasler, G., et al., Altered cerebral gamma-aminobutyric acid type A-benzodiazepine receptor binding in panic disorder determined by [11C]flumazenil positron emission tomography. Arch Gen Psychiatry, 2008. 65(10): p. 1166-75.
8. Eren, I., et al., Evaluation of regional cerebral blood flow changes in panic disorder with Tc99m-HMPAO SPECT. Psychiatry Res, 2003. 123(2): p. 135-43. | <urn:uuid:c968fceb-254f-4e6e-8f63-abc0770cdc65> | CC-MAIN-2022-33 | https://www.huffpost.com/entry/it-may-not-be-chronic-fat_b_778716 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.960659 | 1,206 | 2.78125 | 3 |
Achieving our common goals to avert dangerous climate change requires a dramatic acceleration of progress towards clean growth and resilience. More than 120 countries have so far announced their intention to reduce their emissions to net zero by the middle of this century. As we look forward to COP26, this growing political consensus is grounds for optimism about the world’s ability to meet the goals of the Paris Agreement. Considerable work is now necessary to achieve the ambitions.
In this spirit, Canada, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, the Netherlands, Poland, Portugal, Slovak Republic, Spain, Sweden, Switzerland, United States The United Kingdom and the United States welcome the following seven key principles for the implementation of Net Zero, and We encourage the IEA Secretariat and members to consider how the IEA, building on its main strengths, can best support the implementation of these principles, in close partnership with other relevant institutions:
Sustainable recoveries can provide a one-time down payment in a generation to reach net zero: As countries boost their economies and rebuild after the Covid-19 pandemic, they also have a historic opportunity to jump-start progress towards achieving net zero emissions. The IEA can further help governments harness the transition to sustainable net zero energy systems as an engine of clean and sustainable growth and job creation.
Clear, ambitious and achievable roadmaps aligned with net zero to 2030 and beyond are essential: Governments can increase international confidence in the transition by establishing national roadmaps for action over the vital next 10 years, which incorporate the diverse circumstances of each country and utilize a variety of low-emission technologies and options. of carbon to improve regular implementation. The IEA can further support the governments of the IEA family in developing aligned net zero roadmaps to 2030 and beyond, and provide the necessary advice and assistance to facilitate the Implementation.
Transitions will go faster when learning is shared: A wide range of real-world implementation challenges are delaying transitions, including meeting the energy needs of underserved populations and improving access to secure and sustainable energy for the poorest and most vulnerable groups. vulnerable. The IEA Clean Energy Transition Program helps governments in the IEA family to manage technical and economic transition risks and chart a course towards a sustainable and inclusive energy system. Improving mechanisms to share best practices, collaborate on technology, and provide targeted advice to the entire IEA family can help accelerate the pace of transition in the global energy system.
The net zero and innovation sectors are essential to achieve global net zero: Current technologies will likely have to contribute almost half of the emissions reductions needed to put the world on an ambitious path to net zero. The development and large-scale deployment of a range of climate-neutral energy technologies, coupled with energy efficiency, can enable rapid, sustainable and profound energy transitions in all major sectors of energy use – many of which involve complex value chains that cross national borders. Stronger and consolidated public-private mechanisms for international coordination are needed to accelerate innovation and deployment within sectors. The IEA can further improve and improve its analysis of innovation and decarbonisation of the sector, and promote common strategies and approaches within the IEA family, including coordination with other relevant international forums. .
The mobilization, monitoring and benchmarking of public and private investments can be the fuel to achieve net zero: There is an urgent need to change course on climate-neutral energy investments to put the world on the right path to net zero. By 2030, the amount of investment required in electricity (generation and grid / storage) must rise to more than $ 1.6 trillion per year to be on track for net zero emissions by 2050. Major international efforts are needed to increase capital flows for climate neutrality and energy in emerging markets and developing economies. Public and private sector actors must come together to create the enabling environments necessary to further catalyze sustainable and socially acceptable energy investments. The IEA can improve its provision of analysis and practical advice to both governments and the financial community, including through partnerships with other relevant organizations.
People-centered transitions are morally necessary and politically necessary: As countries seek to advance their transition to clean energy technologies, the success of these efforts will depend on the ability of citizens to take advantage of transition opportunities and manage disruptions. This includes social, environmental and economic impacts on individuals and communities, as well as issues of accessibility and equity. It is also essential to focus on training and skills development to enable all citizens to participate in the net zero economy. Governments should continue to share best practices and, where appropriate, explore and scale up new ways to share best practices for the design of climate neutral, people-centered and inclusive energy policies, including within the framework of the Commission. IEA People-Centered Cleanliness Global. Energy transitions.
Net zero energy systems must also be sustainable, secure, affordable and resilient: Maintaining energy security during transitions is essential. Governments, businesses and other key players must both anticipate and manage existing and emerging energy security challenges, including ensuring uninterrupted energy flow, even as variable energy sources increase. This will require guaranteeing a diversified, sustainable and socially acceptable energy and technological mix; make the most of existing infrastructure; and address emerging challenges such as climate resilience, cyber risks, and the availability and security of critical minerals. Governments should work together to analyze where new mechanisms can help to further strengthen the security and resilience of the global energy system alongside a rapid net zero transition, which can be underpinned by the IEA’s provision of analytical expertise, best practices and effective security mechanisms.
United by the high level of their ambitions, countries at all stages of development will need to determine their own unique path to implement net zero based on the diversity of national circumstances and the wide range of technologies. | <urn:uuid:9401948e-3eb6-4780-add7-397117d2e217> | CC-MAIN-2022-33 | https://skrine-vestavene.com/virtual-dialogues-on-the-ocean-2021-to-focus-on-climate-food-and-nature/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.923035 | 1,171 | 2.796875 | 3 |
Egyptian officials expressed their disagreement with Ethiopia since it started building the Great Ethiopian Renaissance Dam on the Blue Nile. That frustration kept gaining in intensity and it has now reached the level of mutual military threats. So can external mediation stop the escalation?
As a desert country, Egypt relies on the Nile for its drinking water, agriculture, industry, transport, etc. Because of the Pharaonic civilization and subsequent strong political systems that appeared in Egypt over centuries, the Nile is often seen by outsiders as an Egyptian property. Moreover, Egypt exploited the Nile exhaustively, as exemplified by building the Aswan Dam in the 1960s. However, the river is shared with eleven countries, and one of its major tributaries -the Blue Nile- originates in Ethiopia and crosses Sudan. Yet Ethiopia and Sudan spent decades fighting political instability, foreign intervention and internal dissent, which decreased their ability to use the Nile the way Egypt did.
But while Sudan could not get over its problems, Ethiopia has been living an economic boom since the 1990s, which also resulted in demographic explosion. Consequently, the country’s leadership turned to the Nile: mastering nature would increase Ethiopia’s economic and diplomatic power. So when Egypt seemed in a position of weakness, i.e. during the transition and crisis of 2011-2013, Addis Ababa jumped at the opportunity to hasten the work on its Renaissance Dam. Egypt reacted by calling for dialogue at moments, and by sending threatening messages at other moments, but the threats reached their climax in recent months.
This situation is a reminder of the importance of strong multilateral institutions. Such escalation should have been monitored by the United Nations (UN) or the African Union. Egypt should not be the dictating force on the Nile, but Ethiopia cannot do as it pleases. And the current threats could have been contained by a peace process as well as mediation efforts that would offer both sides guarantees and advantages. Moreover, the hegemonic power which in the past would replace -or undermine- the UN, i.e. the United States of America (US), is withdrawing from the global stage. It is here that Russia is carving a place for itself.
Moscow’s relationship with Ethiopia and Egypt follows a similar trend: the Soviet Union was at some point an ally, but the two countries then joined the US axis, especially after the end of the Cold War. Since 2013, Egypt is trying to get closer to Russia again. And Ethiopia, which feels the burden of another power, China, is also looking for new partners. Russia is therefore well placed to be the mediator and the new ally, using its historic connections, military and nuclear industry, and good relations with all sides. Furthermore, the issue between Cairo and Addis Ababa did not reach a point of no return, as it is only rhetorical at this point. Additionally, both countries have their share of social and economic problems and would prefer avoiding war.
The October Sochi meetings between the Russian, Ethiopian and Egyptian leaderships, if they lead to agreements about the use of the Nile water, would improve the future of the nations of Ethiopia, Sudan and Egypt. They could also consolidate Russia’s role as a global mediator, which it started building through the Astana Process regarding Syria. Finally, if successful, such action would give Moscow a symbolic aura it needs as it attempts to reenter Africa. | <urn:uuid:932e76a4-de9c-4e82-9063-7cd0c0a1f4fb> | CC-MAIN-2022-33 | https://valdaiclub.com/a/highlights/ethiopia-egypt-blue-nile-and-russia/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.96941 | 691 | 2.90625 | 3 |
How do I scan thick or special paper?
If you are scanning a book or other thick document, you can remove the scanner cover.
- Press the power button to turn off the scanner.
- Disconnect the cover cable.
- Open the scanner cover.
- Pull the scanner cover straight up and off of the scanner.
- Press the power button to turn on the scanner.
- Place your document facedown on the scanner glass.
Note: Press down on your document to flatten it and hold the document down as you scan.
- When you are finished scanning, replace the scanner cover in the reverse order that you removed it.
Note: Always turn off the scanner before connecting or disconnecting the cover cable.
Published: Oct 31, 2014 Was this helpful? Thank you for the feedback! | <urn:uuid:67065b0b-3f82-4467-81d4-b81e90be66be> | CC-MAIN-2022-33 | https://epson.com/faq/SPT_B11B223201~faq-268101?faq_cat=faq-topFaqs | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.831164 | 171 | 1.679688 | 2 |
Quinn will be nine months old in two weeks.
I have never loved anything so much as I love this baby. I thought for sure that when he came home from the hospital, I would have gained a third child, a sibling in my affection to our existing two cat children.
Nope. From the moment he was born, I had one kid and two cats.
Parenthood is hard.
I knew it would be hard, but, damn, it is hard. It’s hard in a new way because as soon as we’ve hit a rhythm, he grows a new arm or a leg or all of a sudden starts puking small amounts of food all over all my clothes. And we have to roll with the punches. And they just keep coming.
Despite how hard it is — how hard it’s been — I’ve spent a lot (A LOT) of time staring at Quinn with little hearts in place of the pupils in my eyes. “Oh you darling, boy… oh how cute it is when you puke… how adorable you suckle… how hilariously you throw Mama’s phone on the floor!”
And you know why??
Oxytocin. “The Bonding Hormone.”
- During pregnancy, your brain actually grows tons of new receptors for the surge of oxytocin that is to come. These receptors grow in a specific part of the brain responsible for maternal behaviors.
- The very act of giving birth to your baby causes a surge of oxytocin.
- Any and all subsequent contact with your baby causes the brain to produce more oxytocin.
All of this adds up to hearts in place of pupils and a life that immediately rearranges itself to center around your newborn. You also feel loving and relaxed. All told, it feels pretty good. So you continue cuddling your baby because it feels good which leads you to love your baby even more.
Because a Hundred Billion Teeny Tiny Robots Told You To
“Our brains are made of a hundred billion neurons….[tiny] robots that respond to chemical signals.” (BBC.com.)
Teeny Tiny Robots that Respond to Chemical Signals. Like Oxytocin.
So that new feeling in my chest? The about-to-explode-with-a-love-that-cannot-be-contained feeling?
That’s a thousand or so teeny tiny robots talking to another thousand or so teeny tiny robots elsewhere in my body. The cuddles we’re sharing before bedtime cause a cascade of oxytocin in my brain and I instantly have hearts instead of pupils again.
Take right now, for instance. Quinn is asleep for the night. And all I want to do is to scoop him up and cuddle him. You know why? It’s probably a thousand or so teeny tiny robots that need their next oxytocin fix.
My brain is addicted to cuddling my baby. To nursing him. To gazing at him lovingly.
“No, that’s me. I love him!!”
We think of ourselves as making choices. Of having control.
“…Cognitive scientist Daniel Dennett considers our very consciousness to be ‘no more real than the screen on your laptop or your phone.’
“The geeks who make electronic devices call what we see on our screens the ‘user illusion.'” (BBC.com)
My user illusion is thinking that I have a choice in whether or not to cuddle Quinn. That I’m exercising free will when I rush from my last meeting to pick him up from day care, counting the seconds until we’re reunited and oxytocin floods my brain again.
No, from a biological perspective, that feeling of my heart bursting out of my chest was fated from the moment the sperm met the ovum.
My user illusion protests, “But it was I who made the decision to try for a baby in the first place!”
But was it? Or was it that hundred billion teeny tiny robots in your head?
“BAH!! Screw you. I’m going to have a beer and watch Nashville.”
Good choice, hundred billion teeny tiny robots. Good choice. | <urn:uuid:4126b97a-d1ca-4ee1-aa9e-018d6da1423e> | CC-MAIN-2022-33 | https://www.jenniferheller.com/2017/09/where-does-my-brain-end-and-do-i-begin/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.941558 | 923 | 1.882813 | 2 |
Now that the weather is warm, folks are flocking to the outdoors. Between visiting a national park, state parks, and local trails, there are tons of places to get out and enjoy nature. If you're a pet owner, hiking with a dog is a great way to get some exercise in for both you and your furry friend.
But before we can say happy trails to you and your pups, read up on some common pre-hike precautions to take, and learn more about the best dog hiking gear we've tested and approved ahead of your next outdoor adventure.
How to go hiking with your dog
Check the trail or park website for dog restrictions. Many national and state parks have strict rules on where dogs can be. Some only allow pups on paved roads, in campsites or in parking lots, while others have designated trails that dogs can be on. Trails that allow dogs usually have a six foot leash rule, so don't show up without a lead or with a long line, even if your pup is trained.
Check the weather and prepare accordingly. If it's going to be over 85 degrees Fahrenheit, plan to bring dog boots. The ground gets significantly hotter than the air temperature, so your pup can burn their paws on almost any surface — even dirt — during the summer months. You'll also want to pack enough water for you and your pup to stay hydrated, and bring sunscreen for both of you if you'll be in direct sun. Dogs can get sunburn too!
Bring plenty of water, treats, and food if you'll be out for a long time. This one is pretty self-explanatory, but be sure to bring plenty of dog treats, food, and water to keep your hiking buddy going for the full hike.
Get your dog accustomed to their gear ahead of time. If you'll be using boots, a new harness, or a dog backpack, make sure you get your dog used to their gear in the weeks leading up to your hike. Practice positive association games with tasty treats so they learn to love their boots and backpack.
Start out slow. If your dog has never hiked before, plan to do an easy, short hike for your first go. You'll be able to build up length and difficulty the more you hike together, but don't go too hard the first time, or you might end up carrying a tired pup back to the car.
Does my dog need boots to go hiking?
As we noted in our Best Camping Gear for Dogs roundup, your pooch doesn't need boots to head out on the trail, but they can help greatly reduce the risk of paw injuries and help with traction on slippery sections of the hike. For dog owners who want to hike during the summer, remember that if the air temperature is over 85 degrees Fahrenheit, most surfaces, even dirt, will be too hot for your dog's paw pads. Hot ground temperatures can cause blisters on dog's paws if exposed for too long, so play it safe and opt for a pair of dog boots.
A pair of boots will also protect from paw injuries that are common for outdoorsy dogs. Pups can rip paw pads, step on sharp sticks, rocks, or stray glass, and can even break their nails while hiking, so protecting their feet with boots will save you the stress of dealing with a paw injury later on.
Don't plan on busting out the dog boots for the first time before a long hike, though. Not all dogs take to boots quickly, and your pup may refuse to walk or try to take their boots off the first time you try them out. Practice wearing the boots in the weeks leading up to your first outdoor outing, and be sure to bribe, I mean, desensitize your dog to boots with lots of tasty snacks.
Leave no trace when hiking with a dog
This might be a no-brainer, but adhering to leave no trace principles is of utmost importance when you're in the outdoors with a dog. Every dog owner needs to remember that dogs can disrupt the natural flow of nature, so be sure to pick up any dog poop, keep your pup away from wildlife, and don't allow them to dig anywhere on the trail. Following leave no trace and being a responsible pet owner keeps outdoor recreation spots beautiful and accessible for future generations of pets and hikers.
How we came up with this list
As an avid hiker, Miso (that's my dog) helped me test every single piece of dog hiking gear in our list of the best hiking gear for dogs. Read on to get our gear review for each and see what we have loved the most after hitting the trail again and again: | <urn:uuid:12b96eaa-74da-46a7-8ff6-b79b4f03c6b2> | CC-MAIN-2022-33 | https://mashable.com/roundup/best-dog-hiking-gear | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.961606 | 958 | 1.789063 | 2 |
FAQs About Suspension and Debarment
6 Min Read
When you enter into a contract with the federal government such as a GSA Multiple Award Schedule (MAS), you might be wondering—what are the consequences if something goes wrong, and how do I prevent anything bad from happening? We get these concerns a lot, and you’re not alone. While there are different ways the government deals with violation of contract terms, suspension and debarment is often used if there is fraud involved or a falsification of records, among other reasons.
Suspension and debarment is something GSA contractors want to avoid at all costs. If you clicked on this blog, you might be worried this could happen to you. Don’t panic—yet. We’ll break down what suspension and debarment is, what it means for contractors, and how you can implement good business practices to avoid it.
What is Suspension and Debarment?
Just like your company may have internal procedures and ethics to keep everyone in check, the federal government wants to eliminate fraud, waste, and abuse in the procurement process. This can be achieved through the suspension and debarment process which is outlined in Federal Acquisition Regulation (FAR) 9.4. Although the two terms are lumped together, they each have their own separate definitions.
Suspension is a temporary exclusion used only when the government needs immediate protection. Suspension is an intermediate action and is used when facts about possible wrongdoing are still being developed through an investigation and court proceedings.
If a contractor is suspended and is found to have willfully and maliciously defrauded the government, they will be debarred. Debarment is an exclusion that lasts for a specific period of time. When the government issues a debarment, they will let a contractor know for how long. Debarment is used as a final action and is issues when an investigation or legal proceedings have finished.
How Long Can Suspension and Debarment Last?
This is a common question among contractors, because it can greatly affect their contract. The answer is, it really depends. Suspensions can generally last up to 12 months before court proceedings are initiated and can stay in effect until the proceedings have concluded. So, they can go on for as long as an investigation or court lasts which can be an undetermined amount of time. Debarments are generally 3 years long, but they can be longer or shorter depending on each case. The time period is ultimately decided by the Suspension and Debarment Officer (SDO) assigned to the case.
What Does Suspension or Debarment Mean for GSA Contractors?
What are the consequences of suspension or debarment? We won’t sugarcoat it, it’s not good and can greatly affect your ability to do business with the government. If you are suspended or debarred:
- Your company will be marked as ineligible on the System for Award Management (SAM).
- You cannot receive new offers or contract awards, and your existing contract cannot be renewed. Subcontracts requiring government approval will also not be approved, unless the government has a compelling reason otherwise.
- You cannot conduct business with the federal government as a representative of other contractors.
- Government contractors cannot award you a subcontract greater than or equal to $35,000 unless there’s a compelling reason.
- Your affiliation with any organization doing business with the government will be examined.
So, to prevent this from happening to you, what are the causes of suspension and debarment and how can you avoid it?
What Are the Causes of Suspension and Debarment?
The causes for suspension and debarment are as follows:
- Commission of fraud, embezzlement, theft, forgery, bribery, falsification or destruction of records, making false statements, tax evasion, violating Federal criminal laws, receiving stolen property, an unfair trade practice
- Violation of antitrust statutes
- Willful, or a history of, failure to perform
- Violation of the Drug-Free Workplace Act
- Delinquent Federal taxes (more than $3,000)
- Knowing failure to disclose violation of criminal law
- Any other cause that affects present responsibility
The most common cause for debarment with GSA contractors is fraud. A close second is false statements/falsification of records.
How is a Contractor Notified of Suspension or Debarment?
A contractor will be notified of a suspension or debarment through:
- A Suspension Notice
- Notice of Proposed Debarment
- Debarment Notice
All 3 of these notifications have the same effect—immediate governmentwide exclusion from federal contracts and grants.
What Do You Do When You Find Out You are Suspended or Debarred?
If you receive a suspension or debarment notice, you will have 30 days to respond and submit arguments with supporting documents against the action. GSA suggests you ask for the administrative record so you can find more information pertaining to the action. You can respond on your own or hire legal counsel, and if you need more time to respond, you should contact the agency immediately.
Your response should center around present responsibility. What does this mean? Present responsibility helps the Suspension and Debarment Officer (SDO) determine that despite your prior misconduct, you can be trusted to perform in accordance with contract requirements, government law, and overall conduct yourself ethically. To verify this, the SDO will focus on your:
- Other case-specific features
You should also request a meeting with the SDO and bring all relevant individuals. Even if you are represented by legal counsel, the contractor in question should do most of the talking. The SDO will want to hear from the contractor and people who work for the contractor.
Who Can Be Suspended or Debarred?
According to the FAR, contractors can be suspended or debarred. But what does the definition of “contractor” mean in this situation? A contractor is any individual or organization that:
- Directly or indirectly submits offers or is awarded a government contract or subcontract
- Conducts business, or reasonably may be expected to conduct business with the government as a representative of another contractor.
- People directory or indirectly involved in the wrongdoing or alleged wrongdoing
- Individuals or organizations not directly involved in the wrongdoing by Affiliation (connections to individuals and companies) or Imputation (connection to wrongdoing)
How Can You Avoid Suspension and Debarment?
We know—all of this sounds scary, messy, and just all around something you want to stay far away from. There are things you can do to avoid this happening to you. The first thing you can do is establish a strong ethics and compliance program. This includes written policies, procedures, and standards of conduct such as a Code of Ethics and Business Conduct. You’ll also want to identify high risk areas based on your industry, location, and activities you engage in and routinely conduct audits in these areas.
Other things you can do to prevent suspension and debarment include:
- Designate a Compliance Officer and train them on your company’s ethics and procedures.
- Conduct background checks on all new hires and check SAM.gov to make sure they are not listed as excluded.
- Set up a method for employees to be able to report concerns.
- Ensure misconduct is properly addressed.
- Choose Contractor Teaming partners and Subcontractors carefully.
Best Practices for Your GSA Schedule
While avoiding suspension and debarment may seem like an extreme measure, it’s definitely a good business practice to implement some of the procedures above so you can ensure your company has a strong background in ethics and compliance. There are also other things you can be doing to make sure you are remaining compliant with your GSA Schedule such as properly reporting your sales, submitting modifications whenever there’s a change to your contract, and preparing for Contractor Assessment Visits (CAVs).
If you want to learn more about keeping up with your GSA contract, check out our blogs, “Don’t Lose Your GSA Schedule Contract,” and “How to Maintain Your GSA Schedule: An Essential Checklist.” If you have questions about suspension and debarment, or you need help managing your contract, you can reach out to one of our consultants and they would be happy to assist you.
About Stephanie Hagan
Stephanie Hagan is the Content Writer and Digital Editor for Winvale where she helps the marketing department continue to develop and distribute GSA and government contracting content. Stephanie grew up in Sarasota, Florida, and earned her Bachelor's of Arts in Journalism and Rhetoric/Communications from the University of Richmond. | <urn:uuid:072099db-5f5e-4cdd-a664-967892f4fe59> | CC-MAIN-2022-33 | https://info.winvale.com/blog/faqs-about-suspension-and-debarment | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.937189 | 1,841 | 2.1875 | 2 |
I am wondering the exact number of survivors from 1st Airborne Division after it was withdrawn from its landing site around Arnhem during Market Garden. Does anybody have an exact figure ? Cornellius Ryan writer of A Bridge Too Far mentions 2.163 remaining British airborne troops and 150 Poles and 75 Dorsets from 43rd Infantry crossed Rhine back by boat in 26 September therefore concluding Operation Market Garden. In coming weeks some remaining airborne troops trapped around Arnhem and Ooesterbeek evaded capture and crossed Rhine and managed to return Allied lines. Does anybody have exact figure how many personel from 1st British Airborne Division survived and returned back to Allied lines ? | <urn:uuid:c883ea60-bf09-4a44-b3a0-8493c855ff76> | CC-MAIN-2022-33 | https://www.ww2talk.com/index.php?threads/number-of-survivors-from-arnhem-landing.47931/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.961486 | 135 | 1.703125 | 2 |
“Does my HVAC need maintenance?” While it might not seem to be the most obvious question behind your flare-up of allergies, it is one well worth asking. It could very well be making you sick – according to the Occupational Safety and Health Administration (OSHA), poor air quality is most commonly caused by a faulty HVAC system. Here are some ways to know if your HVAC may be causing problems and what to do about it.
The Filter Is Dirty
Image via Flickr by Mike Linksvayer
The leading cause of HVAC-related illness is a dirty filter. More than just dust accumulates in the filter – it can become a breeding ground for bacteria, black mold, and other fungi. These in turn can cause symptoms such as breathing problems ranging from asthma to Legionnaires’ Disease, a potential fatal form of pneumonia. To fix a dirty filter, replace it with a clean one at least once every three months, and more frequently if you live in an environment with excess hair, pets, and smoke.
There Is Poor Air Circulation
The more time you spend in an air-conditioned space, the dryer your skin could become. This can be due to poor temperature control (more on that in a bit), but also poor ventilation. Simply put, air needs to circulate or it becomes stale and dries out your skin, which can be a problem for people with eczema or psoriasis. Consider adding a humidifier if your HVAC unit doesn’t have one, and drink plenty of water. To soothe irritated skin, try a moisturizer.
It’s Too Cold
Have you ever heard of “sick building syndrome”? According to the International Journal of Epidemiology, people who worked in a building with central air conditioning were more likely to show symptoms of an illness, such as headaches or fatigue, than people who worked in naturally maintained environments. In addition, Oxford Journals reports that people who spend a lot of time inside need more healthcare for a cold than those who don’t. Both of these problems can be traced to the HVAC not keeping a set temperature, such as being too cold. If turning up the thermostat doesn’t solve the problem, it might be time to call an HVAC technician.
There Are Holes in the Ductwork
If your allergies are suddenly giving you trouble, you might want to check the ductwork. Holes can allow unfiltered air into your house, and this can cause runny nose or itchy, watery eyes. Holes in the ductwork also allow small animals such as mice to get into the ducts, and this can be a problem for people with allergies to animal dander.
The air you breathe is vital to your health, so if you suddenly feel sick for no apparent reason, you may want to call an HVAC technician. Remember, it’s not always dry eyes, runny nose, and sneezing that manifest. Other causes of HVAC-related health problems include hypertension and weight gain. To prevent these problems, you should have your HVAC system serviced at least once a year and whenever you suspect there’s a problem with your unit. | <urn:uuid:5d0ff16a-deea-4e18-8f9c-377e9f8c5e80> | CC-MAIN-2022-33 | https://healthyvoyager.com/does-my-hvac-need-maintenance/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.952494 | 678 | 2.3125 | 2 |
Christian Ulrik Andersen & Søren Pold
Center for Digital Urban Living, Digital Aesthetics Research Center, Aarhus University
Abstract: This article proposes and introduces the concept of ‘scripted space’ as a new perspective on ubiquitous computing in urban environments. Drawing on urban history, computer games, and a workshop study of the city of Lund the article discusses the experience of digitally scripted spaces, and their relation to the history of public spaces. In conclusion, the article discusses the potential for employing scripted spaces as a reinvigoration of urban public space.
The computer is moving out into physical and urban reality. Since Mark Weiser’s call for a ‘computer for the 21st century’ in 1991 a migration from the screen and the desktop towards integrating computers and networks into our surroundings has been a part of contemporary computer science research; for example, in augmented reality, ubiquitous computing (ubicomp), and pervasive computing. A number of technological developments (such as big screens, new smart materials, GPS, RFID tags, and ever faster and cheaper wireless networks) have helped carry the research agendas out into ordinary reality.- 2 -
This article will discuss how we experience the urban space of ubicomp. It will do so by introducing the concept of ‘scripted space’ in order to discuss how ubicomp is related to new developments in public urban space. Focusing on the experience of the urban we will argue that scripted space is a concept that highlights the written, coded quality of ubicomp. As opposed to that suggested by such titles as ‘The Disappearing Computer’ (Streitz, Kameas and Mavrommati, 2007), we believe that embedding the computer into the environment will not render it transparent or invisible. Rather, computing will continue to be an important part of our conscious experience. Furthermore, we will concentrate on the present rather than speculating on future potentials, technologies, and uses. As argued by Genevieve Bell and Paul Dourish, ubicomp has arrived; the future is here, though it looks different than originally envisioned by the IT designers and technologists (Bell and Dourish, 2007). It is especially remarkable that ubicomp is predominantly a ‘messy’ cultural interface and not, as envisioned, a ‘seamless’ tool for work. The many parallel technologies, networks, gadgets, and software developments have become part of ‘cultural scripts of many sorts’ – for example, via the cultural developments surrounding mobile phones, social software, and web 2.0 (Bell and Dourish, 2007: 141).- 3 -
Scott McQuire discusses whether this development has the potential to change public space and reverse its demise. In continuation of the work of Paul Virilio, Richard Sennett, and Jürgen Habermas he argues that public space has lost to the public image consumed in private at home, and that the urban has lost to the suburban. McQuire quotes Philip Kasinitz, writing that suburban spaces ‘are notably rich in private spaces and poor in public ones’ (McQuire, 2006: p. n.p.). But this might be changing: ‘With the emergence of mobile devices, media consumption is increasingly occurring in public. It could be argued that the ‘media event’ is in the process of returning to the public domain’ (McQuire, 2006: p. n.p.).- 4 -
Drawing on a workshop study of digital layers in the midsized Swedish city of Lund, the article will consider how this might happen. It will conclude by discussing the potential of scripted space as a new public domain by mapping out a matrix and suggesting writerly scripted spaces as a way of furthering this development.
Scripted Space- 5 -
The concept of scripted space has been suggested by Norman M. Klein (Klein, 2004) but he does not elaborate on the concept in relation to ubicomp. Etymologically, the term ‘script’ refers to something written. It is mostly understood in a literary sense as either a ‘manuscript’, meaning the handwritten original, or a set of instructions and dialogue for a performance. In IT and software, drawing upon these connotations, scripting refers to the user’s own writing of instructions for the computer. In an operating system, experienced users may add scripts that overwrite certain files, for instance, or mount net volumes. These scripts can later be activated automatically by clicking on an icon. In authoring software like Adobe Flash, users may add ‘action scripts’ which determine dynamic behaviours of objects in an animated drawing (e.g., in a game where the score is increased whenever a ball hits a hole). In the written set of instructions, scripts have a semiotic attribute. The signs, however, are rarely read but are experienced as a performative attribute. The meaning of scripts is established in the performance of the instruction and not in the coded, incomprehensible instruction itself.- 6 -
Our understanding of scripted space is based on the fact that ubicomp literally means adding scripts to the space surrounding us by programming smart things, architecture, infrastructure, and PDAs, and by connecting the scripts of these devices through wireless networks. Ubicomp adds simultaneously a semiotic and a performative attribute to the urban space. Recognising ubicomp as a scripted space highlights how digital scripts are added to the coupling of space and signs already carried out through urban planning, architecture, advertising, street signs, and so forth. As such, the scripted space of ubicomp does not result in an entirely new configuration of urban space, but is seen as continual development of the urban experience, which gets intensified by the adding of scripted environments and objects. The scripted space is in other words related to earlier developments of the spectacular modern city (McQuire, 2006; Pold, 2004) and denotes an urban experience scripted through architecture, visual media, signs, and semiotics (figure 1).- 7 -
- 8 -
- 9 -
Besides being a continuation of the ways urban space has been planned, scripted space also has a more contemporary dimension which is linked to the computer. Scripted space has a non-visual, coded, encrypted side to it and suggests that there are computed transactions and control structures behind the facade, surface, or interface of the city.- 10 -
This aspect has also been described by Bruno Latour and Emilie Hermant. They describe and photograph the development of Paris from ‘la ville lumière’ to ‘la ville invisible’ – from the illuminated, spectacular city that we still visit and cherish to an invisible city with an informational layer folded into its spectacular surface (Latour, Hermant and Shanon, 1998). The invisible city is a city where computers and information workers are constantly working to describe and script the city; Latour and Hermant document processes where the elements of the city (cafés, monuments, streets, etc.) are constantly under surveillance and correction, described and prescribed by networks of computers and information workers. What becomes clear from their detailed description of Paris (published before the current surge of ubicomp) is that the city is constantly being produced (re-engineered and mediated) by computers in complex networks and that it takes considerable amounts of work and material infrastructure as well as large numbers of highly skilled workers to maintain this.- 11 -
Subsequently, the scripted space as the info-layer of the city is a complex and networked software structure where algorithmic scripts organise and control the city and our experience of it. As expressed by Nigel Thrift, the computer is ‘extending its fugitive presence through object frames as diverse as cables, formulae, wireless signals, screens, software, artificial fibres and so on’ (Thrift, 2004: 584).- 12 -
Following Scott McQuire, it is this mediation and scripting that holds the potential return of an urban public space. When the ‘media event’ returns to the urban public domain via ubicomp one should not merely consider it as disappearing into the city, invisibly and transparently embedded in the experience of the urban. Rather, the coded, scripted, or essentially written quality of ubicomp should be highlighted. Of course the scripts of ubicomp are hidden behind screens, devices, and interactions. In this way, they are not as accessible or readable as the texts in books or on signs. They are (as scripts or code in general) first and foremost experienced in their execution. The scripts of ubicomp add new layers to the already multilayered urban scripted space – which is already more or less impossible to read in its entirety, but is nevertheless experienced through urban daily life. But how is the urban scripted space experienced? And how does it relate to a public domain?
The Experience of Scripted Spaces- 13 -
Obviously, a scripted space is experienced in many different ways, but an important aspect is the feeling that something is going on behind the facade and that there are powers controlling and structuring what is seen and experienced. The immediate experience of the urban is disturbed by the feeling that there is something unreadable, but still scripted, programming the space.- 14 -
In the novel The Crying of Lot 49, Thomas Pynchon describes the narrator’s panoramic view of a southern Californian sprawling suburb in ways that illustrate this experience quite well. The narrator watches a dull suburb, where ‘nothing was happening,’ and she thinks of ‘the time she’d opened a transistor radio to replace a battery and seen her first printed circuit. The ordered swirl of houses and streets, from this high angle, sprang at her now with the same unexpected, astonishing clarity as the circuit card had.’ Since the novel was first published in 1966, Pynchon uses a radio circuit board, rather than a computer, as a metaphor for the hidden information structure. Elsewhere in the novel, though, computers are remarkably present, and the novel revolves around hidden information structures, networks and almost paranoid investigations of these. The urban space is hardly identifiable, but simultaneously it seems to communicate a hidden plot – a concealed information infrastructure. The space is not remarkable and cannot be read in spite of its ‘intent to communicate’ and ‘hieroglyphic sense of concealed meaning’: ‘There’d seemed no limit to what the printed circuit could have told her (if she had tried to find out); so in her first minute of San Narciso, a revelation also trembled just past the threshold of her understanding’ (Pynchon, 1979: 14-15).- 15 -
This ‘hieroglyphic sense of concealed meaning’ is an essential part of the experience of the scripted space, and the novel describes a very early example of an informational urbanity which is experienced not as readable signs, but as ‘signs of signs,’ as hieroglyphs that the urban dweller knows are readable for those with the right code but that cannot be accessed by outsiders. One feels that there is something going on beyond the surface, but it is difficult to see or read the scripts. Rather than becoming ‘natural’, the scripted space maintains a highly mediated character, even though the urban dweller does not necessarily see through it. A similar view is found in Norman Klein’s description of the experience of scripted space in places such as Las Vegas, Disneyland, and the entertainment architecture of The Jon Jerde Partnership (e.g., malls like San Diego’s Horton Plaza and urban areas like the Universal City Walk in Los Angeles). Spaces where ‘each square foot must pay off’ and that bring on an effect of ‘happy imprisonment’ and ‘ergonomic control’ (Klein, 2004: 332). Again, the urban dweller feels the control and the imprisonment – she knows that she is being manipulated but still enters freely and enjoys the user-friendly ergonomics.- 16 -
The urban dweller’s experience of concealed meaning, happy imprisonment or ergonomic control is comparable to other experiences of scripted spaces. Computer games seem to offer an important contemporary exploration of this experience of a scripted space. The player can interact with scripts in different ways. On a functional level, a script can be activated logging in to a computer game, setting control menus, etc. However, the player’s most dominant experience is of course the aesthetic experience. On an aesthetic level the player activates scripts to play with them. As suggested by game theorist Ted Friedman the ‘way computer games teach structures of thought – the way they reorganise perception – is by getting you to internalise the logic of the program’ (Friedman, 1999: p. n.p.). In this internalisation the computer’s scripts simultaneously work in two ways. At once, they are they are an ally helping the player in controlling the environment and an obstacle to be overcome, an opponent. The player must collaborate with the computer in order to find a way to overcome it. A game experience on an aesthetic level is essentially about playing with and against the scripts as long as it remains a compelling activity.- 17 -
A third option is however also possible in the computer game. Friedman’s description of an internalisation of the computer’s scripts has a distinct political level. Winning a game can only happen by accepting the terms of the game. In Friedman’s case, the game Civilization II (1996), the player can only win by assuming the role of a colonising nation state; art and religion serve a purely functional role: to keep the people pacified and so forth. The game thus addresses controversial historical and ideological assumptions. To Friedman, the player must submit to this political level but experience from other games suggests different strategies. Working as a designer for Maxis on their game Sim Copter (released the same year as Civilization II), the artist and founding member of The Yes Men, Jacques Servin (a.k.a. Andy Bichlbaum) illegally incorporated an easter egg into the game. Triggered by a cheat code or on certain dates, Servin’s secret script will flush the game world with men in trunks kissing both each other and the pilots in the game. Servin’s easter egg indicates a political response to the ideology of the scripted space. Here, the scripted space is subject to debate and will be reconfigured, used in unintentional ways or even hacked.- 18 -
How do these functional, aesthetic and political levels and experiences of the urban scripted space manifest themselves? We took part in a workshop exploring such issues in the mid-sized Swedish city of Lund.
Scripted Spaces in Lund- 19 -
The forefront of scripted spaces might be more or less ‘virtual’ spaces, such as computer game spaces, which are heavily commercialised and ‘themed’, or it might be post-urban spaces, such as Las Vegas and Los Angeles, or high-tech spaces, such as Singapore or Tokyo. But as demonstrated by Latour and Hermant, this mediation of space also spreads beyond the technological ‘sci-fi’ spaces to affect the experience and quality of space in more ordinary cities (Latour, Hernant and Shannon, 1998). Ubicomp is increasingly becoming part of an everyday urban life – also outside the techno-sci-fi capitals, at least in the richer parts of the world, where the population is readily equipped with ubicomp technology and networks. Lund is an example of this.- 20 -
In general, Lund consists of many layered traces of history, culture, commerce, personal and social narratives. We see ways of using and mis-using the urban space, and we see signs of transactions and interactions whose full meaning eludes us. We see signs of class and ethnic struggles, signs and sign systems that make people feel welcome or alienated, safe or threatened. Of course, our interpretation of and reaction to these signs depend on who we are and what we want – for example, whether we are residents or non-residents, our purpose, and our financial and cultural capital. Hence, a native to Lund who knows her way around will read the city scripts differently from a tourist. She will be able to read and interpret more of the scripts and normally also be less conscious of her readings and perhaps unconsciously overlook the stuff she is not able to interpret. However, this changes neither the basic hieroglyphic nor the everyday-like quality of the scripted space.- 21 -
As in the computer game, we found behaviour that indicated the importance of staying connected to the scripted space, scriptory control, and the potential for renegotiating the scripts themselves. Focusing on the digital layers of Lund, we saw three different interrelated ways of using public space. First, IT is used to create what we will label a log-in space, often designed to keep unauthorised access out. The digital layers are primarily visible as gateways under surveillance so as to restrict access. Only those able to locate the access points, who also know the passwords and have the keys to log in, can access the gated areas and hidden scripts. We find many traces of surveillance, encrypted and secured information structures, and keypads for logging in. Sometimes we find traces of information structures that appear enigmatic to us as unauthorised foreigners but that are still clearly communicating ‘a hieroglyphic sense of concealed meaning’, such as signs indicating hidden infrastructures, security alarms, and surveillance cameras. We find many physical structures guiding and welcoming us, combined with electronic layers sorting and disciplining the clientele – for example, the signs in alluring shop entrances indicating the credit cards accepted, in this way welcoming those with the right cards and excluding those without money (figure 2). Another example of a log-in space could be the list of available wireless networks on a laptop or PDA, which often require log-in passwords and authentication (figure 3).- 22 -
Second, IT is used to create what we will call a mobile personal computing space. We observed many laptops, media players, mobile phones, and other devices allowing people to carry their private data, soundscape, media- and communication-devices with them in public space (figure 4). Accessing, configuring, and inhabiting public space through personal interfaces thus compete with, for instance, newspaper reading, which previously defined public life in a café as a private behaviour in public space. Also, text messages setting up social encounters can be considered to play an important role in the way both non-residents and residents make their way around urban space. When we add to this websites advertised on stickers or posters, virtual maps, and other web 2.0 services, it becomes clear that the mobile personal computing space is not only about the isolated individual (figure 5). It is the individual’s interface to the public space. However, as implied by, for instance, Apple’s successful range of ‘iProducts’ (iBook, iPod, iPhone), this interface is still privileging the individual and delivers personalised views and configurations of urban, social space.- 23 -
Third, IT is used for a hypertextual connectivity and linking of local nodes (people, places) to other nodes and the network. It is important to be well-connected, to be on-line, and to be accessible. In this fashion, most of the urban dwellers we passed in Lund probably had mobile phones in their pockets, as well as credit cards and other keys allowing them access to the scripted space. Cafés and shops have websites and email addresses, and some even provide wireless internet access, thereby offering the possibility to connect and get on-line (figure 6). Many urban dwellers probably also have their own networks of social links, favourite sites, and perhaps even exchange tags and preferences. In this way, an urban space and its dwellers are connected to each other, and to other spaces. Compared with earlier ways of congregating and inhabiting urban space, this social formation is thus often strangely invisible to outsiders in physical urban space.
The Scripted Space as the New Public Domain- 24 -
The advent of digitally scripted objects in an urban setting can be seen as a movement of the public domain from the private home back into the urban setting. Log-in space, mobile personal computing space, and hypertextual connectivity each suggests a different approach to the scripted space as a new public space. Mapping out the observations from Lund, we find a matrix of different potential approaches to the scripted space (table 1).
|Individual interface||Desktops & internet||iPhone, laptop, PDAs, etc.
- 25 -
(the digital urban café)
|Public interface||Weblogs, WIKIs, etc. (web 2.0)||Urban screens, media facades with public interaction, e.g. integrated with laptops, PDAs, etc.
- 26 -
(the digital urban agora)
Table 1: A matrix of different potential approaches to the scripted space.
In a home (or an office) setting, individual access to a scripted space takes place via the desktop and the internet – whose historical predecessor could be either the reading or the inscription of the personal notebook, manuscripts, letters, and the like. Today, the movement of this activity into an urban setting takes place via PDAs, laptops, phones, media players, and so on, all of which are made for individual use in an urban setting – creating a personal reading and inscription of space. Using an MP3-player, a laptop in a café, or hypertextual connectivity and linking via an iPhone; getting a personal schedule, information about a future meeting point in town, the opening hours of a store; receiving messages, and participating in an urban game – all of this contributes to creating an individualised, personal space within the urban setting. Though this kind of public behaviour could be seen as purely functional, it should also be seen as an individualisation of the urban setting where public space becomes a playing field for private activities – an ‘individual game space’. A historical predecessor to this kind of public participation is the café, where city dwellers read newspapers, are situated behind glass windows to see and be seen, or plan their city activities through immediate access to city information (through city magazines such as TimeOut, gallery and movie lists, etc.).- 29 -
A public variant of access to the scripted space is nevertheless also evident. Quite often, the data accessed is not merely controlled and static but dynamic and open. In other words, hypertextual connectivity and linking is not just about accessing information but also about actively contributing information – as labelled in the web 2.0 paradigm (O’Reilly, 2005). Interfacing to the scripted space is not merely individual but also collective and public. A historical predecessor to these cultural forms could be a participatory newspaper culture, the writing of chronicles, letters to the editor, and so forth. This reflects an idea of public space as not just a setting for individual performative activities but also a space for debate and knowledge dissemination – a political level of scripted space equivalent to the idea of the agora.- 30 -
What is striking about the observations from Lund is the emphasis on using digital technologies for personalised access and interfaces to the urban space and the public domain. Most often, digital technology in urban space is predominantly exclusive. This is of course the case with the creation of log-in space, but also to some extent with the mobile personal computing space. However, the hypertextual connectivity and linking seem to suggest a desire to connect to the social. Surprisingly, today, we usually see participation in weblogs, WIKI-editing, and so on as a participatory culture that does not involve the urban setting. Though WIKIs and weblogs may be accessed and read from an urban setting, there has been little effort to actively promote the urban setting as a context for active participation. Surely, examples can be found – such as user-generated content of urban screens and media facades, and video and textual tagging of the cityscape (e.g., as in WIKI maps) – but in the context of an average urban setting, they are in no way dominant. This of course signifies an area open to new forms of digital civic participation and will probably develop into new ways of creating social relations and potentially new ways of developing cultural interfaces in scripted spaces.
Conclusion: Writerly Scripted Space- 31 -
The digital urban and scripted space is at once a functional, aesthetic and political space. It manifests itself not as a grand spectacle but most often as a space where one can log-in (or be left out), a space for mobile personal media consumption and local/global connectivity. Beyond being able to operate the urban scripts for functional use (logging in, configuring network settings, activating links, etc.) the ability to play and emancipate the digital scripts is crucial for the experience of the scripted space. The digital, scripted layer of the urban can be accessed to serve as the point of departure for individual experiences of the city as a personal, public playground (a borderless café) or, less frequently, the basis of social encounters, communication, and debate (a borderless agora). This activity that defines participation in the urban public domain depends on the ability to access and internalise the scripts. It is, however, not the only way to participate in the public, scripted space of the city.- 32 -
The city dweller may implement, experience, and use urban scripts, but what happens when she is not satisfied with the foundation of participation in urban public life, the scripts themselves? This experience is a call for action where the city dwellers take control of the urban scripts and become ‘writerly’ by creating, hacking, and rewriting the city.- 33 -
’Writerly’ (or ‘le scriptible’) is the term Roland Barthes used to characterise the particular way of reading associated with the open texts of modern literature. Writerly texts address the reader as an active producer of meaning rather than merely a passive consumer reconstructing the text’s ‘proper’ meaning through a way of reading predetermined by the author – as in the classical characterisation of ‘readerly’ texts (Barthes, 1970: 10). In certain interpretations, hypertext itself is equivalent to this liberation of the reader (e.g. Landow, 1992). It seems, however, more accurate to evoke a digital writerly, open text as a textual corpus where the reader is enabled to not just experience the effect of the script but also to affect the script (by e.g. programming). Following Barthes, the German media theorist Florian Cramer thus advocates a ‘writerly computing’ where the user is transformed from a consumer whose use is staged by the software interface to a producer who actively takes control of the scripts and has read and write access (Cramer, 2003: 100).- 34 -
Open, writerly texts/computing is the basis of all experimental digital artistic practices. This is where the computer is not merely seen as a medium for messages but as open to interpretation, imagination, and further production by the user. Though often not a regular sight in average cities, such practices that critically explore the new public domain of scripted spaces are numerous and include the inversion of city surveillance (‘sousveillance’) or other ways of rewriting or ‘hacking’ the city (Greenfield and Shepard, 2007; Fuller and Haque, 2008). Turning users from consumers to producers of scripts may challenge existing hierarchies of meanings, roles, and experiences that differentiate acceptable from unacceptable practices in urban scripted space. This will also mean a return of an urban public domain and a new paradigm of computing remarkably different from the dominant ideas of the disappearing computer.
Acknowledgements- 35 -
This research has been funded by the Danish Council for Strategic Research, 09-063245, (Digital Urban Living).- 36 -
Thanks to Stacey Cozart Madsen for English proof reading.
Biographical Note- 37 -
Christian Ulrik Andersen is Ph.D., Associate Professor and chair of Digital Aesthetics Research Centre at Aarhus University, Denmark. He researches within digital aesthetics, software cities and computer games. Together with Søren Pold he recently edited the book “Interface Criticism – aesthetics beyond the buttons” (2011). He is also a researcher at the Centre for Digital Urban Living, Aarhus University.- 38 -
Søren Pold is Ph.D. and Associate Professor of digital aesthetics at Aarhus University, Denmark. He has published in Danish and English on digital and media aesthetics – from the 19. c. panorama to the interface – e.g. on electronic literature, net-art, software art, creative software, digital culture and digital urban living. Together with Christian Ulrik Andersen he edited the anthology “Interface Criticism – Aesthetics Beyond the Buttons” (2011).
Notes- 39 -
The workshop was part of the ACM conference NordiCHI 2008, a conference on Human-Computer Interaction, held on 19 October 2008. (https://www.nordichi2008.org/index.php?option=com_content&task=view&id=66&Itemid=90). The workshop, attended by IT researchers, was organised by the Digital Urban Living Research Center, Martin Brynskov, Peter Dalsgaard, Christian Dindler, Jonas Fritsch, Kim Halsskov, and Ole Sejer Iversen. All participants went to the centre of Lund and were asked to look for and take photos of three different layers in the urban space (social, digital and physical) and organise these with reference to three different dimensions (information, services, aesthetics) on a printed map of Lund. The participants were asked to focus on a transitional, mainly pedestrian space with shops, hotels, cafés and bars.
References- 40 -
Barthes, Roland. S/Z (Paris: Éditions du Seuil. 1970).- 41 -
Bell, Genevieve., and Dourish, Paul. ‘Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision’, Personal and Ubiquitous Computing, 11.2 (2007): 133-143.- 42 -
Cramer, Florian. ‘Exe.cut[up]able statements: The Insistence of Code’, in Ars Electronica: Code – The Language of Our Time, eds. G. Stocker and C. Schöpf (Ostfildern-Ruite: Hatje Cantz, 2003), 98-103.- 43 -
Friedman, Ted. ‘Civilization and its discontents: Simulation, subjectivity, and space’, in Discovering discs: Transforming space and genre on CD-ROM, ed. G. Smith, (New York: New York University Press, 1999), 132-150- 44 -
Fuller, Matthew., and Haque, Usman. Urban Versioning System 1.0 (Vol. 2). (New York: The Architectural League of New York, 2008).- 45 -
Greenfield, Adam, and Shepard, Mark. Urban Computing and its Discontents (Vol. 1). (New York: The Architectural League of New York, 2007).- 46 -
Klein, Norman M. The Vatican to Vegas (New York: New Press, 2004).- 47 -
Landow, George P. Hypertext the convergence of contemporary critical theory and technology (Baltimore, Md: Johns Hopkins University Press, 1992).- 48 -
Latour, Bruno, Hermant, Emilie and Shannon, Susanna. Paris ville invisible (Paris: La Découverte, 1998).- 49 -
McQuire, Scott. ‘The Politics of Public Space in the Media City’, First Monday Special Issue #4 (2006), https://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1544/1459- 50 -
O’Reilly, Tim. ‘What Is Web 2.0 – Design Patterns and Business Models for the Next Generation of Software’, https://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html- 51 -
Pold, Søren. Ex libris medierealistisk litteratur, Paris, Los Angeles & cyberspace (Odense: Syddansk Universitetsforlag, 2004).- 52 -
Pynchon, Thomas. The crying of Lot 49 (London: Pan Books, 1979).- 53 -
Streitz, Norbert A., Kameas, Achilles and Mavrommati, Irene. The disappearing computer : interaction design, systems infrastructures and applications for smart environments (Berlin: Springer, 2007)- 54 -
Thrift, Nigel ‘Movement-space: The changing domain of thinking resulting from the development of new kinds of spatial awareness’, Economy and Society, 33.4 (2004): 582-604. | <urn:uuid:5a31cad1-3d9d-4e0b-9d35-a10c02a662ae> | CC-MAIN-2022-33 | https://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.921842 | 6,965 | 2.171875 | 2 |
How to protect against unlawful wage (and bonus) deductions
In this column, Beth Hale, partner and general counsel, and Holly Buick, trainee, at CM Murray, lay down the law on unlawful deductions in wages, including bonuses.
There may be a route to recover an unpaid bonus to which an employee believes they are entitled, under the provisions on unlawful deductions from wages, found in the Employment Rights Act 1996.
A recent incident at a Wahaca restaurant involving the chain reportedly deducting the unpaid bill of a “walk-out” customer from an employee’s pay generated public outcry and discussion around the circumstances in which businesses can reduce their staff’s pay.
While accountants are unlikely to be subject to these types of one-off deduction, it is worth understanding the protection against unlawful deductions from wages, in particular in relation to bonuses. As LLP members will normally qualify as “workers” for the purposes of the legislation, the protection may be equally relevant to partners in accountancy firms as employees.
Senior professionals frequently have some element of performance-related pay; at higher levels total remuneration is likely to have a significant bonus element. This is highlighted, for example, by analysis of the figures released by accounting firms under the new gender pay reporting obligations.
Employers may not make any deduction from a worker’s wages unless required or authorised by law (for example, tax deducted through PAYE), through a provision of the employment contract, or where the worker has consented in writing. Otherwise, the deduction will be unlawful and the worker may bring a claim in the Employment Tribunal to recover the sum. Wages means any sum payable to the worker in connection with their employment and includes both contractual and non-contractual bonuses.
In order to bring a claim under the unlawful deductions provisions, the employee will need to show that they have a legal (but not necessarily contractual) entitlement to a specific sum.
This will be more straight-forward in the case of a contractual bonus, for example where the terms of employment include a clear entitlement and formula for calculating the amount. Even where a bonus is described as “discretionary”, the courts will look at all the circumstances, and may find for example that a contractual obligation has arisen through a statement made to employees or can be implied through custom and practice.
Most bonuses will have a discretionary element: the employee has a right to participate in a bonus scheme, with the employer deciding whether to award a bonus, and the amount, timing and conditions.
There are limits on the exercise of this discretion – employers must act in good faith and not capriciously, arbitrarily, irrationally or in breach of the implied term of trust and confidence. Where the dispute is over the amount awarded under a discretionary scheme, an unlawful deductions claim is unlikely to be suitable, because of the difficulty in showing a legal entitlement to a precise amount.
However, once the employer has decided to award a bonus, it will be treated as being owed to the employee, giving rise to a potential unlawful deductions claim if not paid. In the case of Farrell Matthews v Hansen, Ms Hansen was awarded a one-off bonus to be paid in instalments, and successfully challenged the firm’s decision to stop the payments after she resigned.
The unlawful deduction from wages provisions are designed for straightforward claims where the employee can point to a specific amount and are traditionally used in relation to relatively small claims. Where calculating the amount is more complex, a worker may have a claim for breach of contract, which can be heard by the Employment Tribunal if the employment has ended (with a maximum award of £25,000), or brought as a civil claim in the county court or high court.
However, there is nothing to prevent a larger claim also being brought under the unlawful deductions legislation and this may be possible even where the level of bonus is said to be at the employer’s sole discretion. In Tradition Securities and Futures SA v Mouradian, the Court of Appeal found that in practice the employee broker determined the level of his bonus himself using a formula. As it was possible for a court to quantify the amount, an unlawful deductions claim was possible.
Claims for unlawful deductions from wages are more straightforward (and less costly) to bring than high court proceedings for breach of contract. Firms should be aware that these provisions can sometimes be used to recover a disputed bonus.
Authors: Beth Hale, partner and general counsel at CM Murray, and Holly Buick, trainee. | <urn:uuid:35b7a7ec-4bb0-4d7f-b1ea-130a72019d06> | CC-MAIN-2022-33 | https://www.accountancyage.com/2019/07/03/how-to-protect-against-unlawful-wage-and-bonus-deductions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.957775 | 929 | 1.5 | 2 |
An increasing number of Victorians are falling very ill with nasty bouts of influenza, leaving them bedridden for up to 10 days as hospitalisations and intensive care admissions for the disease rise.
The Age can reveal 99 Victorians have been hospitalised with the flu so far this year, including 43 children. At least seven Victorians, including one child, were so ill with influenza they required ICU admission.
Royal Australian College of General Practitioners Victorian chair Dr Anita Munoz said the speed and severity at which influenza was circulating so early in the year had GPs on high alert.
“The flu is very virulent, and it seems to be quite aggressive this year. People are getting very, very sick and their illness is lasting a long time, about seven to 10 days in most cases,” Munoz said.
“Certainly, we are even seeing people who are ironically vaccinated for coronavirus, but they are going into hospital or ICU with influenza.”
Victorian medical practices are now treating about 30 new influenza patients each day as cases more than triple nationally. Infections surged to 7034 across the state this week.
Munoz said many people were unaware they had the flu until making an appointment with their doctor following several negative tests for coronavirus.
She said it had also stoked fears our immunity to influenza has waned after the disease all but disappeared for two years, with COVID-19 pandemic border closures, mask-wearing and social distancing pushing the flu down to record lows.
“It will be some months before we can make a comparison of this year with pre-pandemic flu season, but anecdotally speaking, all we are hearing is that people are getting really, really sick with the flu, and it appears more so than previous years,” Munoz said.
“It makes sense given we expected there would be less immunity following two years without the flu circulating in Australia.”
Of growing concern is a fast-moving outbreak in children, which triggered a 500 per cent increase in flu cases detected in the Royal Children’s Hospital lab in the past two weeks. Some children have also been hospitalised with the flu.
The flu is also tearing through Victorian schools, with school-aged children making up almost half the total reported number of flu cases so far this month.
The outbreak prompted an extraordinary move by the state government to amend regulations, paving the way for pharmacists to administer flu jabs to Victorian children five years and older for the first time to ease the pressure on doctors.
Professor Ian Barr, deputy director of the WHO Collaborating Centre for Reference and Research on Influenza, said reported cases were likely the tip of the iceberg and that infection numbers could be more than 10 times than those notified on surveillance databases.
“Clearly we are going to have a significant flu season,” Barr said. “Whether it will be a prolonged and severe season or whether it will have a shorter run remains to be seen. But we should be prepared for the worst.”
Asked whether people will get more sick from the flu this year due to being shielded from it for two years, Barr said it was difficult to say.
“Certainly, people’s immune levels will be down because they haven’t seen influenza for a few years and some kids won’t have seen influenza at all, so they may have more severe or longer periods of infection,” Barr said.
“It is a little hard to tease out whether the two [flu] strains that are co-circulating are radically different to previous strains.”
But Barr said it was typically the size of the outbreak, rather than the emergence of a new strain, that determined whether a flu season would be severe.
“The more people infected, the more people who may do poorly,” he said.
During Australia’s last flu season in 2019, more than 950 people died, including a one-year-old child. At least 378 Australians aged between one and 100 died with influenza in 2018.
Mukesh Haikerwal, who runs a medical practice and respiratory clinic in Melbourne’s west, said his staff were detecting between 20 and 30 new influenza cases a day, compared with just a handful a week in March.
Some patients were very ill, he said, but others experienced milder symptoms and recovered within a week.
“The real worry is we are not even close to the peak yet,” he said.
Geelong GP Bernard Shiu estimates his clinic was treating about 30 new influenza patients a day. Cases were far surpassing coronavirus infections in children, he said.
“There’s been a very sharp rise in flu cases the last three weeks,” Shiu said.
The GPs joined a growing chorus of health experts urging all Victorians to get vaccinated against the flu, with immunisation rates down compared with pre-pandemic years.
They said those who were susceptible to adverse outcomes from the flu – including people aged over 65, pregnant women and children under five – should get vaccinated as soon as possible.
Only about 15 per cent of Australians have had this year’s flu vaccine, compared with 49 per cent of the population at the same time last year.
This week, the Australian Medical Association called for voluntary mask-wearing in settings with a high chance of spreading influenza and coronavirus, amid crippling demand on the state’s hospitals and ambulance services.
A state health department spokeswoman urged Victorians to ensure their vaccinations were up-to-date to protect them against coronavirus and the flu.
“By getting vaccinated against both highly contagious infections, you’re not only protecting yourself and those around you, but you’re also helping to ease pressure on our health system,” she said.
“You can also protect yourself further from infectious diseases by avoiding interacting with others if you are unwell or if they are unwell.”
Stay across the most crucial developments related to the pandemic with the Coronavirus Update. Sign up for the weekly newsletter. | <urn:uuid:f9996e92-963f-49f9-ad8c-bf24f82ba3c6> | CC-MAIN-2022-33 | https://www.watoday.com.au/national/victoria/very-very-sick-hospitalisations-on-rise-as-doctors-warn-of-nasty-flu-season-20220520-p5amzs.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.972831 | 1,281 | 1.992188 | 2 |
It is mandatory to establish database connection when you are working on a dynamic application. Create a db.class.php file at the root and write a class with functions (connect, getOne, getAll etc. In newer versions of PHP mysqli functions are recommended to connect, retrieve or save data to database. In this tutorial, learn how to use MySQLi Extension and PHP Data Objects to connect to MySQL.Traditional legacy mysql_ functions are deprecated and we will not cover them in this guide. I use this database connection system for this website. Prepared Statements protect
MySQLi extension basic examples. broken until PHP 5.2.9 and 5.3.0. It is a MySQL-exclusive extension that adds new features to a MySQL database’s interface.MySQLi is both procedural and object-oriented, with the former being the attribute inherited from the older version of MySQL. If the connection establishes it returns “Database connected successfully” otherwise returns connection error. Both are object oriented but MySQLi also offeres procedural API. extension was deprecated in 2012. We need to declare this code into PHP script. The below code is used to create a MySQL database connection in PHP. Syntax: PHP Data Objects (PDO) way. Its very easy to create a new MySQL database. to use another database, PDO makes the process easy. Every PHP process is using its own mysqli connection pool. In newer versions of PHP mysqli functions are recommended to connect, retrieve or save data to database. This is a best and standard way that you are creating a PHP file for the connection. Next, create config.php that will be used to set up the connection between the PHP app and the database. Required fields are marked *. $mysqli = new mysqli ("localhost","my_user","my_password","my_db"); // Check connection. Here we have the example for establish connection by PDO. Before connecting to a MySQL database, you have to specify the following information: MySQL data source name or DSN: specifies the address of the MySQL database server.You can use IP address or server name e.g., 127.0.0.1 or localhost MySQL database name: indicates the name of the database … Please be sure to answer the question.Provide details and share your research! 22–23. PHP provides mysql_connect function to open a database connection. Both MySQLi and PDO have their advantages: PDO will work on 12 different database systems, whereas MySQLi will only
Example - Object Oriented style. You only have
If the database connected successfully returns the “Database Connected successfully” message otherwise gives a connection error. | <urn:uuid:ff33599f-3ab4-437b-8655-ccbd9a4c1eaa> | CC-MAIN-2022-33 | https://scorpiones.pl/bhftoayf/database-connection-in-php-with-mysqli-example-d4be0b | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.835955 | 555 | 2.78125 | 3 |
California Penal Code Section 415 PC: Disturbing The Peace
A person can be charged with disturbing the peace under California Penal Code Section 415 PC for a number of disruptive activities, including fighting, loud or unreasonable noise violations and using offensive words. Each variation of disturbing the peace requires a prosecutor to prove a unique set of factors.
To prove that a defendant disturbed the peace by fighting or challenging someone to a fight, a prosecutor must establish the following elements:
- The defendant willfully and unlawfully fought or challenged someone to fight.
- The defendant and the other person were in a public place when the fight occurred or the challenge was made
- AND the defendant did not act in self defense or in the defense of others.
To prove that a defendant disturbed the peace by causing loud and unreasonable noise, the following elements must be present:
- The defendant maliciously and willfully disturbed another person by causing loud and unreasonable noise
- AND there was a clear and present danger of immediate violence
- OR The noise was used for the purpose of disrupting lawful activities, rather than as a means to communicate.
For someone to be guilty of disturbing the peace by using offensive words, a prosecutor must be able to show the following elements:
- The defendant used offense words that were inherently likely to provoke an immediate violent response
- The defendant said something that is reasonably likely to provoke someone else to react violently
- When the defendant spoke, there was a clear and present danger that the other person would immediately erupt into violence.
A man at a bar continues to receive dirty looks from another man throughout the course of a night. After a few hours, the man walks up to this other person and challenges him to a fight outside. This man could be prosecuted for disturbing the peace by challenging another to fight in a public place (the bar).
In another example, a political group reserves a section of a public park for a rally. The group obtains all necessary permits for this engagement. Because it is a large group, speeches are made on a stage over a loudspeaker. During the rally, other people at the park complain about the noise. The group could not be charged with disturbing the peace, as the noise was not malicious and the loud volume was required to communicate with the group at large.
In another example, a man approaches another man and calls him a racial slur. This other man becomes enraged and attacks the first man. This first man could be charged with disturbing the peace because he used words that were likely to provoke a violent outburst, whatever his intentions may have been.3. Related Offenses
Other similar or related offenses include:
- Disturbing a Public Meeting - California Penal Code Section 403 PC
- Disturbing a Religious Meeting - California Penal Code Section 302 PC
For those who engaged in fighting or similar activity in response to a viable threat of immediate harm to themselves or to someone else, they could legitimately claim self defense if they are ever charged with disturbing the peace.
In addition, this offense requires a willful violation. If someone disturbs the peace because they have a voice that carries or they did not realize another person was present, he or she would not be criminally liable for this offense.5. Penalties
Disturbing the peace is a misdemeanor-level offense that can be punished by up to 90 days in jail, expensive court fines and any conditions of probation that a judge may find to be appropriate. Disturbing the peace may be charged as an infraction, in which the defendant would have a non-criminal offense that would only result in a fine.6. Criminal Defense for Disturbing the Peace Cases
If you or someone who know have been charged with disturbing the peace, it is crucial that you speak with an experienced Los Angeles Criminal Defense Attorney right away. The early involvement of an experienced and effective attorney may make the difference between criminal charges being filed altogether. As a former Deputy District Attorney with over 14 years of prosecutorial experience, Los Angeles Criminal Defense Attorney Michael Kraut is highly regarded as an attorney who fights hard to ensure his clients get the best defense possible.
For more information about disturbing the peace, and to schedule your free consultation, contact Los Angeles Criminal Defense Attorney Michael Kraut at the Kraut Law Group located at 6255 Sunset Boulevard, Suite 1520, Los Angeles, CA 90028. Mr. Kraut can be reached 24/7 at 888-334-6344 or 323-464-6453. | <urn:uuid:1493d244-b3b3-463f-87bf-8c1b666cb56d> | CC-MAIN-2022-33 | https://www.losangelescriminallawyer.pro/california-penal-code-section-415-pc-disturbing-the-peace.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.958924 | 909 | 1.828125 | 2 |
Do Trinidadians need a visa to go to Guyana?
Is Guyana visa required for Trinidad and Tobago citizen? Trinidad and Tobago citizens don’t need a visa for travelling to Guyana.
How much is Guyana visa?
The visa fees for Guyana are as follows: Guyana tourist visa fee: USD 25. Guyana employment visa: USD 140. Guyana student visa: USD 140.
How long can US citizen stay in Guyana?
The maximum duration of stay any visitor will be granted by Guyana Immigration, will not exceed thirty days.
Do I need a Covid test to enter Guyana?
Entry and Exit Requirements:
Anyone entering Guyana must present results of their PCR COVID-19 test (taken within 72 hours of the scheduled flight) The results must indicate the test is a “PCR Test.” Travelers must be prepared to provide proof of vaccination in order to enter Guyana.
Which country can Guyanese go without a visa?
|Country||Visa requirement||Allowed stay|
|Dominica||Visa not required||6 months|
|Dominican Republic||Visa not required|
|Ecuador||Visa not required||90 days|
Where can a Trinidadian go without a visa?
Visa free countries
- Albania. Stay: 90 daysgrenada. Andorra. Stay: N/A. Austria. …
- Antigua and Barbuda. Stay: 6 months. Argentina. Stay: 90 days. Bahamas. …
- Botswana. Stay: 90 days. Eswatini. Gambia. Stay: N/A. …
- Fiji. Kiribati. Stay: 30 days. Micronesia. …
- Indonesia. Israel. Stay: 3 months. South Korea.
Do Nigerians need visa for Guyana?
Guyana tourist visa is required for citizens of Nigeria. Unfortunately, at this time VisaHQ does not provide service for tourist visas to Guyana. Take advantage of our extensive embassy and consular database to find the nearest one.
Can foreigners work in Guyana?
Immigration services only offer one type of permit for employment in Guyana. The standard work permit covers any non-national wishing to work for a company in the country, and it lasts for three years. … Guyana also offers a business visa.
How much is a visa from Guyana to America?
The visa application and processing fee for most visa classes (B1, B2, C1, C1/D, F, M, J) is US $160.00. Fee information for other classes of visas can be found at travel.state.gov. Scotiabank Guyana will stamp one copy of the deposit slip as “paid.” You will need this copy to schedule your appointment.
What country owns Guyana?
It was governed as British Guiana, with a mostly plantation-style economy until the 1950s. It gained independence in 1966, and officially became a republic within the Commonwealth of Nations in 1970.
|Co-operative Republic of Guyana|
|Vernacular language||Guyanese Creole|
|Other languages||show 6 languages|
What is the average income in Guyana?
Gross national income per capita in Guyana from 2011 to 2020 (in U.S. dollars)
|Characteristic||Income per capita in U.S. dollars|
How can I get permanent residency in Guyana?
To receive a residency visa, expats must first arrive in Guyana as a visitor on a tourist visa. They can then approach the Ministry of Home Affairs, requesting a new visa or an extension to their current visa.
What is the crime rate in Guyana?
Guyana crime rate & statistics for 2018 was 14.25, a 3.95% decline from 2017.
Guyana Crime Rate & Statistics 1990-2021.
|Guyana Crime Rate & Statistics – Historical Data|
|Year||Per 100K Population||Annual % Change|
Can I travel to US without Covid test?
Yes, at this time all air passengers traveling to the US, regardless of vaccination or antibody status, are required to provide a negative COVID-19 test result or documentation of recovery. | <urn:uuid:c7219ced-484f-4242-beb7-8a1ac76fdf2b> | CC-MAIN-2022-33 | https://curacao-now.com/landmarks/do-i-need-a-visa-to-go-to-guyana.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.807935 | 1,000 | 1.515625 | 2 |
A step-by-step methodological reference that presents the critical steps to plan, design and implement latge-scale surveys to collect data on the use of ICT in education that will serve to improve policy decision-making.
During this global education crisis, the need has never been greater to develop education policies to help sustain learning in the event of future school closures so that learning never comes to a standstill. The development of policies to support the use of distance learning in particular will need to be informed by robust data on information and communication technologies (ICT) use in and out of schools so these skills can be instilled in learners and teachers. To aid in the effort to collect adequate and relevant data, the UIS and the Regional Center for Studies on the Development of the Information Society, Brazil (Cetic.br) have jointly developed the Practical Guide to Implement Surveys on ICT Use in Primary and Secondary Schools. The Guide is a step-by-step methodological reference that presents the critical steps to plan, design and implement a survey to collect data on the use of ICT in education. In essence, this publication offers practical guidelines to plan and conduct large-scale surveys on ICT use in education that will serve to improve policy decision-making – an especially relevant step amidst the current widespread launch of online learning platforms in the context of COVID-19 related school closures. Ultimately, this Guide represents a joint effort by Cetic.br and the UIS to support the production of relevant and robust quality data on ICT in education in developing countries, which will be both locally relevant and enable international comparability. | <urn:uuid:f9674fbb-3baf-479b-99fb-861044150390> | CC-MAIN-2022-33 | https://uis.unesco.org/en/news/launch-practical-guide-survey-ict-use-schools | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.922091 | 328 | 2.609375 | 3 |
We all run into this problem for one reason or another
Teeth whitening technology has undergone various improvements and developments throughout the years, with current popular methods listed below:
1) Zoom Whitening - This teeth whitening procedure is performed in a cosmetic dental office by a certifies team member . It requires the application of whitening gel containing a high concentration of a derivative of hydrogen peroxide such as Carbamide proxide. The gel works together with a Whitespeed light to loosen up stains deep within the pores of teeth. Excellent results can be seen in just an hour session.
2) Professionally Prescribed Whitening - The take-home dental kit is prescribed by a dentist as a maintenance regimen after a Zoom Whitening procedure.
3) Professionally Designed Teeth Whitening Molds - This includes teeth whitening gels with dental molds developed to fit each patient's teeth. It is prescribed by a dentist for regular teeth whitening procedures. The procedure is time consuming, messy and it takes a longer time to see good results
4) Over the Counter (OTC) Products - These products include whitening pens, strips and toothpaste. Results of teeth whitening from OTC products do not produce very white teeth and take a very long time to see results.
In Ladera Ranch, Dr Marzvaan performs a thorough dental exam prior to the teeth whitening process to determine whether or not it will be beneficial for the patient. This is based on the health and present condition of the patient's teeth, gums and habits, age etc.. Depending on other dental treatments necessary, the Ladera Ranch cosmetic dentist may recommend delaying Zoom Whitening until the patient has undergone other procedures such as dental cleaning, bonding , porcelain veneers, periodontal treatment, laser gum treatment , bonded fillings to remove diseased tooth or gum tissue.
The actual Zoom Whitening process takes only an hour, during which all areas of lips and gums have been covered. A Zoom Whitening gel containing peroxide is applied onto the exposed teeth. The gel, combined with a special light, penetrates deep into teeth pores to loosen stains and restore its natural whites. This process is repeated at 15 to 20 minute intervals while patients relax by watching TV, listening to music or simply fall asleep. Afterwards, patients awake to beautiful white smiles for the world to see.
Dr. Marzvaan has over 20 years of experience as a cosmetic dentist serving patients from Ladera Ranch, Mission Viejo, Rancho Santa Margarita, Coto de Caza, Dove Canyon, Laguna Niguel and throughout Orange County, California. Contact the Orange County Cosmetic Dentist office at 1-888-599-1703 for an appointment and find out about our | <urn:uuid:55537a94-b962-4ad8-b155-33e8c481b65c> | CC-MAIN-2022-33 | https://www.enjoywhite.com/we-all-run-into-this-problem-for-one-reason-or-another | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.903077 | 580 | 1.640625 | 2 |
Experts say being hit by lightning is extremely rare in the United States, but strikes overall are on the rise.
Roughly 40 million lightning bolts touch down in the country every year, according to the Centers for Disease Control and Prevention – with the odds of being struck less than 1 in a million.
Less than 250 people are injured by lightning every year, according to the National Weather Service. And a little bit more than 10% of those people actually die as a result.
Among those who are hit, about 90% survive the ordeal, the CDC says. The country counted 444 deaths from lightning strikes from 2006 through 2021.
According to the NWS, a person has a 1-in-15,300 chance of getting struck by lightning in their lifetime.
It’s said you are four times more likely to get a perfect score on your SAT than getting struck by lightning.
Texas and Florida were the states with the highest count of lightning in 2021 and therefore present the highest risk of being struck.
Not a single person has been killed by a lightning strike in Washington state and New Hampshire in the last 15 years,
Scientists say that climate change is increasing the likelihood of lightning strikes across the U.S.
Lightning is hotter than the surface of the sun and can reach temperatures around 50,000 degrees Fahrenheit.
Although most lightning occurs in the summer, people can be struck at any time of year, according to the NWS.
The NWS warns there is no safe place outside when thunderstorms are in the area so, “When Thunder Roars, Go Indoors.“
Reuters contributed to this report. | <urn:uuid:0ea6f49a-0977-4606-98d2-9b99493c3de7> | CC-MAIN-2022-33 | https://www.newsnationnow.com/weather/struck-by-lightning-odds/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.960441 | 337 | 3.21875 | 3 |
Los Angeles County has an array of organizations that offer services to the homeless, and ways people can help the thousands of people on the streets on any given night.
You can help them reach the people they serve with donations of clothing, food and money or by volunteering your time.
Here are some options:
• Downtown Women’s Center: The Center was founded in 1978 by Jill Halverson after developing a friendship with a homeless woman named Rosa. This center, focusing solely on women in Skid Row, uses a five-point approach to help: housing, medical and mental health services, social networking and financial security.
– 442 S. San Pedro St., Los Angeles, 90013. 213-680-0600. www.downtownwomenscenter.org
• Dare to Care For the Homeless: The Long Beach-based organization helps the homeless with clothing, food and hygiene products. The grass roots coalition, founded in 2008, is currently focusing on families, seniors and veterans who are homeless.
– 4508 Atlantic Ave., Long Beach, 90807. 562-2971. www.d2c4h.org
• East San Gabriel Valley Coalition for the Homeless: Provides help with emergency and transitional shelter, food and other basic needs, referrals for health care, housing and jobs. The organization was founded in 1990.
– Office at St. Martin de Porres Center at St. John Vianney Parish, 1345 Turnbull Canyon Road, Hacienda Heights. 626-333-7204. esgvch.org
• Emmanuel Baptist Rescue Mission: The rescue mission, founded in 1953, gives clothing, food, shelter and the gospel message.
– 530 E. Fifth St., Los Angeles, 90013. 213-626-4681. www.ebrm.org
• Homeless Healthcare Los Angeles: The organization, founded in 1985, focuses on finding housing for the homeless and helping them stay housed. A second goal is to set up a realistic health and mental health plan for their clients to follow.
– Office, 2330 Beverly Blvd., Los Angeles, 90057. 213-744-0724.
– Center for Harm Reduction, 512 E. Fourth St., Los Angeles, 90013.
• Lamp Community: The outreach to homeless adults with mental illness was started in 1985 by homeless advocate Mollie Lowery and philanthropist Frank Rice. Originally called Los Angeles Men’s Place, the drop-in center started helping women in 1987 and adjusted it’s name to Lamp Community.
– Frank Rice Access Center, 627 San Julian St., Los Angeles, 90014. 213-488-9559.
– Email for services help: [email protected]
– Mailing address: 526 San Pedro St., Los Angeles, 90013. www.lampcommunity.org
• Long Beach Rescue Mission: The faith-based organization, founded in 1972, operates two facilities, the Samaritan House for men and Lydia House for women and their children. The rescue mission offers a public lunch, noon Monday-Thursday, public dinner, 6 p.m. daily and a nightly chapel service.
– 1335 Pacific Ave., 90813. 562-591-1292.
– Mailing address: P.O. Box 1969, Long Beach, 90801.
– Email: [email protected] lbrm.org
• Los Angeles Homeless Services Authority: The organization coordinates city, county, federal and state funds to provide services to the homeless in Los Angeles County. The agency was created in 1993 by the Los Angeles City Council and mayor and the Los Angeles County Board of Supervisors.
– Office, 811 Wilshire Blvd., 6th Floor, Los Angeles, 90017. 213-683-3333.
– Shelter hotline for individuals: 800-548-6047.
– Homeless services: 213-225-6581 (7:30 a.m.-4:30 p.m. Monday-Friday).
– Help for ages 12 to 25 on cell phone: download the free app WIN (What I Need).
– Los Angeles County referral line for families: call 211 or 211la.org
• Lutheran Social Services of Southern California: The agency was founded in 1944 in San Diego.
– Canoga Park: 21430 Strathern St., Canoga Park, 91304. 818-901-9480.
– Thousand Oaks: 80 E. Hillcrest Drive, 91360. 805-497-6207.
– Pasadena: 60 North Daisy Ave., 91107. 626-564-0191.
– Long Beach: 1611 Pine Ave., 90813. 562-599-1321.
• MEND: Formally Meet Each Need with Dignity, MEND, opened its doors in the 1970s from a small garage, and since has grown into what it says is the largest poverty agency in the San Fernando Valley.
– 10641 N. San Fernando Road, Pacoima, 91331. 818-897-2443. mendpoverty.org
• The Midnight Mission: The Midnight was founded in 1914 by businessman and lay minister Tom Liddecoat. According to their website, a meal would be served after church services around midnight (church services and religious affiliation ended in 1933). The Midnight’s goal is to be a bridge to self-sufficiency by offering programs that include a 12-Step approach to recovery, emergency services for men, women and children, education and job training.
-601 S. San Pedro St., Los Angeles, 90014. 213-624-9258. www.midnightmission.org
• PATH: People Assisting the Homeless was founded in 1983 to help both the homeless and those at risk of becoming homeless. Their statement on the problem: “Homelessness is a housing problem. People can’t get off the streets if they don’t have somewhere to go.”
-340 N. Madison Ave., Los Angeles, 90004. 323-644-2200. Email: [email protected] www.epath.org
• St. Vincent de Paul of Los Angeles: The international organization of Catholic volunteers was founded by Frederic Ozanam, a 20-year-old student, in 1833 in Paris, France. Bishop Thomas Conaty, of the Roman Catholic Archdiocese of Los Angeles, welcomed the society in 1904. The society runs the Cardinal Manning Center, a shelter for homeless adult men in Skid Row, and the St. Vincent’s Family Housing program. There is an outreach in Ventura County and two thrift shops, in Long Beach and Los Angeles.
– Main office is at the Los Angeles Thrift Shop, 210 N. Ave. 21, 90031. 323-224-6280.
– Cardinal Manning Center: 213-229-9971. Email: [email protected]
– St. Vincent Family Housing: 213-229-9966. Email: [email protected]
– Long Beach Thrift Store, 2750 E. Pacific Coast Highway, 90804. 562-494-9955.
– Ventura County Center: 805-754-2089. Email: [email protected]
– Assistance hotline: 888-552-7872.
– Donations: 800-974-3571. svdpla.org
• San Fernando Valley Rescue Mission: Founded in 1998 from a program that served meals to the Valley’s homeless.
– 8756 Canby Ave., Northridge, 91325. 818-785-4476. sfvrescuemission.org
• Union Rescue Mission: The Mission was founded in 1891 by Lyman Stewart, founder of Union Oil Co. It offers emergency services, the Hope Gardens Family Center (for women with children, and also senior women; located in Sylmar), clinics, a learning center, the Gateway Project (a 30-day program, with a fee, for single adults) and the Life-Transformation Ministry.
– 545 S. San Pedro St., Los Angeles, 90013. 213-347-6300. Email: [email protected] urm.org
• West Valley Food Pantry: The pantry began in 1975 in a closet in the kitchen of Prince of Peace Episcopal Church in Woodland Hills. The pantry, now in its own building but still on the church campus, expanded its services to the hungry in 1985 when it became a coalition of churches and synagogues in the West Valley.
– 5700 Rudnick Ave., Woodland Hills, 91367. 818-346-5554. www.westvalleyfoodpantry.org | <urn:uuid:645c8161-1a47-4b5f-bf2d-1dde82c2ac79> | CC-MAIN-2022-33 | https://www.lascandal.org/help-homeless-la-county/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.880388 | 1,847 | 1.648438 | 2 |
November 27, 2007
The White Elephant
“Dear children, let us not love with words or tongue but with actions and in truth. This then is how we know that we belong to the truth, and how we set our hearts at rest in his presence.” 1 John 3:18-19 (NIV)
‘Tis the season for parties. The invitation reads, “Bring a white elephant gift.” A white elephant gift doesn’t require much thought or money. It can be an inexpensive trinket, a used household item or a gag gift. These white elephant get-togethers create laughter and light-hearted camaraderie.
However, there exists another kind of “white elephant” social gathering—the type where everyone knows there is a relational conflict that exists within the group, but no one acknowledges it. This pachyderm problem might occur within families, between co-workers, or in a neighborhood. The more everyone pretends the white elephant issue isn’t there, the bigger the unseen problem grows. The denial is like feeding peanuts to a live elephant—it grows larger and larger.
Do you anticipate this type of white elephant intruding on one of your upcoming festivities? Do you dread being in the same room with a particular person? To my own distress, I usually attend at least one event where the unwanted guest arrives, blowing its silent trumpet and begging for peanuts. However, God does not intend for us to ignore the problem. He wants us to seek His wisdom and guidance. The Lord wants us to pray and consider carefully how we might apply the following scriptural principles to help prevent or dissolve the uninvited intruder of tension from our personal relationships:
- Let us not love with words or tongue but with actions and in truth. (1 John 3:18, NIV)
- Pursue the things which make for peace and the building up of one another. (Romans 14:19, NASB)
- If it is possible, as far as it depends on you, live at peace with everyone. (Romans 12:18, NIV)
Let’s decide beforehand how God would have us handle any uncomfortable situation that might steal away the joy and peace of a Christmas festivity. If the white elephant isn’t gift-wrapped, it doesn’t belong at the party. So don’t pack any invisible peanuts in your holiday attire, but love as Jesus loves—with action and truth.
Dear Lord, I anticipate at least one party where a “white elephant” sits in the room. I ask that You teach me how to handle any situation like this with love, truth and action. Reveal to me if I contribute to the issue in any way. Lord, help me to reach out to everyone in Your love and compassion. In Jesus’ Name, Amen.
Perplexing Proverbs by Susanne Scheppmann
The Five Languages of Apology by Dr. Gary Chapman and Jennifer Thomas
Consider your upcoming holiday events. Identify any potential “white elephants” that might be present. Pray over the event and ask the Holy Spirit to direct your words and actions. Ask God to evaporate the “elephant” and to resolve the relational conflict that might be residing in your heart.
Does the same “white elephant” return every year?
How do I play a part in feeding it and allowing it to grow larger?
Is it possible that I could be the cause of the white elephant?
Psalm 40:10, “I do not hide your righteousness in my heart; I speak of your faithfulness and salvation. I do not conceal your love and your truth from the great assembly.” (NIV)
3 John 1:3-4, “It gave me great joy to have some brothers come and tell about your faithfulness to the truth and how you continue to walk in the truth. I have no greater joy than to hear that my children are walking in the truth.” (NIV)
Proverbs 31 Ministries
616-G, Matthews-Mint Hill Road
Matthews, NC 28105 | <urn:uuid:bb2a9b74-5fc5-4bd3-9507-36732a1e3477> | CC-MAIN-2022-33 | https://www.crosswalk.com/devotionals/encouragement/encouragement-for-today-nov-27-2007-11560310.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.928334 | 902 | 2.015625 | 2 |
Preparing for its third year, the MATHletes challenge for 2016 is now open under a new name – LearnStorm – for registration for Irish students, with a prize fund of €20,000 being made available to the competition’s best mathematicians.
The MATHletes challenge was first started back in 2014 by entrepreneur Sean O’Sullivan and the Khan Academy to develop a better understanding and appreciation of maths among students in the country, which has so far culminated in more than 13,000 students completing more than four million minutes of maths skill tests.
This year’s edition is particularly special given that the competition has been re-named LearnStorm following the event’s milestone last year when it went international, with an event hosted in the US under the LearnStorm name.
The free event is not location-based and is accessible from anywhere online and, starting on 29 January, students can earn recognition for themselves and their schools by mastering maths skills on Khan Academy.
Aiding future third-level students
Open to students across the island of Ireland, the LearnStorm Ireland event has a total prize fund of €20,000 and is open to all students from fourth class to fifth year in the Republic of Ireland and from year six to year 13 in Northern Ireland.
With funding provided by The O’Sullivan Foundation and Camara Ireland, global partnerships lead at the Khan Academy, James Tynan, said of the event: “We know that the more you grapple with something, the more your capacity expands. LearnStorm is for everyone as it rewards students for hard work and mastery, no matter if they’re learning basic arithmetic or advanced calculus.”
The need for higher standards in maths education at primary and secondary level would appear apparent given the recent news that a “considerable minority” of third-level students struggle with the mathematical elements of their courses and are becoming reliant on learning support.
Disclosure: SOSV is an investor in Silicon Republic | <urn:uuid:b59650af-c9c1-49f8-98e3-7dad159c48d6> | CC-MAIN-2022-33 | https://www.siliconrepublic.com/careers/mathletes-registration-2016 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.95778 | 408 | 2 | 2 |
Acupuncture is one of the oldest, most commonly used medical procedures in the world. Originating in China more than 2,000 years ago, acupuncture began to become better known in the United States in 1971, when New York Times reporter James Reston wrote about how doctors in China used needles to ease his pain after surgery.
The term acupuncture describes a family of procedures involving stimulation of anatomical points on the body by a variety of techniques. American practices of acupuncture incorporate medical traditions from China, Japan, Korea, and other countries. The acupuncture technique that has been most studied scientifically involves penetrating the skin with thin, solid, metallic needles that are manipulated by the hands or by electrical stimulation.
In the past two decades, acupuncture has grown in popularity in the United States. The report from a Consensus Development Conference on Acupuncture held at the National Institutes of Health (NIH) in 1997 stated that acupuncture is being "widely" practiced--by thousands of physicians, dentists, acupuncturists, and other practitioners--for relief or prevention of pain and for various other health conditions. According to the 2002 National Health Interview Survey--the largest and most comprehensive survey of complementary and alternative medicine (CAM) use by American adults to date--an estimated 8.2 million U.S. adults had ever used acupuncture, and an estimated 2.1 million U.S. adults had used acupuncture in the previous year.
Acupuncture needles are metallic, solid, and hair-thin. People experience acupuncture differently, but most feel no or minimal pain as the needles are inserted. Some people are energized by treatment, while others feel relaxed. Improper needle placement, movement of the patient, or a defect in the needle can cause soreness and pain during treatment. This is why it is important to seek treatment from a qualified acupuncture practitioner.
The U.S. Food and Drug Administration (FDA) approved acupuncture needles for use by licensed practitioners in 1996. The FDA requires that sterile, nontoxic needles be used and that they be labeled for single use by qualified practitioners only.
Relatively few complications from the use of acupuncture have been reported to the FDA in light of the millions of people treated each year and the number of acupuncture needles used. Still, complications have resulted from inadequate sterilization of needles and from improper delivery of treatments. Practitioners should use a new set of disposable needles taken from a sealed package for each patient and should swab treatment sites with alcohol or another disinfectant before inserting needles. When not delivered properly, acupuncture can cause serious adverse effects, including infections and punctured organs.
According to the NIH Consensus Statement on Acupuncture, there have been many studies on acupuncture's potential usefulness, but results have been mixed because of complexities with study design and size, as well as difficulties with choosing and using placebos or sham acupuncture. However, promising results have emerged, showing efficacy of acupuncture, for example, in adult postoperative and chemotherapy nausea and vomiting and in postoperative dental pain. There are other situations--such as addiction, stroke rehabilitation, headache, menstrual cramps, tennis elbow, fibromyalgia, myofascial pain, osteoarthritis, low-back pain, carpal tunnel syndrome, and asthma--in which acupuncture may be useful as an adjunct treatment or an acceptable alternative or be included in a comprehensive management program. An NCCAM-funded study recently showed that acupuncture provides pain relief, improves function for people with osteoarthritis of the knee, and serves as an effective complement to standard care. Further research is likely to uncover additional areas where acupuncture interventions will be useful.
Acupuncture is one of the key components of the system of traditional Chinese medicine (TCM). In the TCM system of medicine, the body is seen as a delicate balance of two opposing and inseparable forces: yin and yang. Yin represents the cold, slow, or passive principle, while yang represents the hot, excited, or active principle. Among the major assumptions in TCM are that health is achieved by maintaining the body in a "balanced state" and that disease is due to an internal imbalance of yin and yang. This imbalance leads to blockage in the flow of qi (vital energy) along pathways known as meridians. It is believed that there are 12 main meridians and 8 secondary meridians and that there are more than 2,000 acupuncture points on the human body that connect with them.
Preclinical studies have documented acupuncture's effects, but they have not been able to fully explain how acupuncture works within the framework of the Western system of medicine that is commonly practiced in the United States. It is proposed that acupuncture produces its effects through regulating the nervous system, thus aiding the activity of pain-killing biochemicals such as endorphins and immune system cells at specific sites in the body. In addition, studies have shown that acupuncture may alter brain chemistry by changing the release of neurotransmitters and neurohormones and, thus, affecting the parts of the central nervous system related to sensation and involuntary body functions, such as immune reactions and processes that regulate a person's blood pressure, blood flow, and body temperature.
Health care practitioners can be a resource for referral to acupuncturists. More medical doctors, including neurologists, anesthesiologists, and specialists in physical medicine, are becoming trained in acupuncture, TCM, and other CAM therapies. In addition, national acupuncture organizations (which can be found through libraries or Web search engines) may provide referrals to acupuncturists.
A practitioner should inform you about the estimated number of treatments needed and how much each will cost. If this information is not provided, ask for it. Treatment may take place over a few days or for several weeks or more. Physician acupuncturists may charge more than nonphysician practitioners.
Acupuncture is one of the CAM therapies that are more commonly covered by insurance. However, you should check with your insurer before you start treatment to see whether acupuncture will be covered for your condition and, if so, to what extent. Some insurance plans require preauthorization for acupuncture. (For more information, see NCCAM's fact sheet "Consumer Financial Issues in Complementary and Alternative Medicine")
During your first office visit, the practitioner may ask you at length about your health condition, lifestyle, and behavior. The practitioner will want to obtain a complete picture of your treatment needs and behaviors that may contribute to your condition. Inform the acupuncturist about all treatments or medications you are taking and all medical conditions you have.
Complementary and alternative medicine (CAM): A group of diverse medical and health care systems, practices, and products that are not presently considered an integral part of conventional medicine. Complementary medicine is used together with conventional medicine, and alternative medicine is used in place of conventional medicine. Some health care providers practice both CAM and conventional medicine.
Conventional medicine: A whole medical system practiced by holders of M.D. (medical doctor) or D.O. (doctor of osteopathy) degrees and by their allied health professionals, such as physical therapists, psychologists, and registered nurses. Other terms for conventional medicine include allopathy; Western, mainstream, and orthodox medicine; and biomedicine.
Fibromyalgia: A complex chronic condition having multiple symptoms, including muscle pain, fatigue, and tenderness in precise, localized areas, particularly in the neck, spine, shoulders, and hips. People with this syndrome may also experience sleep disturbances, morning stiffness, irritable bowel syndrome, anxiety, and other symptoms.
Meridian: A traditional Chinese medicine term for each of the 20 pathways throughout the body for the flow of qi, or vital energy, accessed through acupuncture points.
Placebo: An inactive pill or sham procedure given to a participant in a research study as part of a test of the effects of another substance or treatment. Scientists use placebos to get a true picture of how the substance or treatment under investigation affects participants. In recent years, the definition of placebo has been expanded to include such things as aspects of interactions between patients and their health care providers that may affect their expectations and the study's outcomes.
Preclinical study: A study done to obtain information about a treatment's safety and side effects when given at different doses to animals or to cells grown in the laboratory.
Qi: A Chinese term for vital energy or life force. In traditional Chinese medicine, qi (pronounced "chee") is believed to regulate a person's spiritual, emotional, mental, and physical balance, and to be influenced by the opposing forces of yin and yang.
Traditional Chinese medicine (TCM): A whole medical system that was documented in China by the 3rd century B.C. TCM is based on a concept of vital energy, or qi, that is believed to flow throughout the body. It is proposed to regulate a person's spiritual, emotional, mental, and physical balance and to be influenced by the opposing forces of yin (negative energy) and yang (positive energy). Disease is proposed to result from the flow of qi being disrupted and yin and yang becoming unbalanced. Among the components of TCM are herbal and nutritional therapy, restorative physical exercises, meditation, acupuncture, and remedial massage. | <urn:uuid:0ee81cb7-b15b-41ff-b651-56053c82ea2b> | CC-MAIN-2022-33 | https://www.gettinginshapeguide.com/index.php/resources/alternative-medicine/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.935863 | 1,909 | 3.015625 | 3 |
“Thank you for the sghetti,” my daughter prayed. Her little fingers entwined into a ball were folded against the edge of the kitchen table. Her forehead puckered and her eyes squinted. Through narrow open slits she spied the set table in front of her.
“Thank you for the plate.” Her cheeks twitched from the concentrated effort of nearly but not completely closed eyes.
“Thank you for the knife.”
“Thank you for the sfoon.”
“Thank you for the fork.”
I opened one eye and met one slim peek from my husband. We squeezed down laughter that threatened to boil over.
As we enter the season of thanksgiving, I love the emphasis on remembering, being aware of the little things, the spoons and forks of life. But beyond the surface, true gratitude embraces a profound spiritual significance.
“…As He entered a certain village, there met Him ten men who were lepers, who stood afar off. And they lifted their voices and said, ‘Jesus, Master, have mercy on us.” (Luke 17:12-13; NJKV)
There were ten lepers that Jesus healed. Only one returned to thank Him. It’s a great passage to open the month of November, not just because of its reminder to be thankful, but because of our constant need to recognize a Sovereign God in everyday life.
Ten lepers had so much in common. Yet in their similarities, each had a different story, some likely lost families, jobs, prestige and respectability. They became outcasts of society, set aside, with a future that looked grim.
They must have known of Jesus’ reputation. Perhaps they’d heard he’d fed 5,000 with five loaves and two fish, or that he raised a little girl to life. Maybe they knew he calmed waves and cast out demons.
“Jesus, Master, have mercy on us,” they shouted from a distance.
And Jesus, “when He saw them…”
Can you imagine their hope as He turned toward them, where they stood grouped aside, their own little leper colony, unable to get too close?
“Go,” He instructed, “show yourselves to the priests.”
They immediately obeyed, undoubtedly overcome with the joy of the command. They knew what it meant, because by the religious law they needed a priest to declare them clean. Their lives were about to change, a return to normalcy, health, family and society awaited. And they ran toward it.
As they went, obeying Christ, healing occurred.
The putrid skin of their companions cleared. Their own turned smooth. I can picture ten former lepers, lifting limbs, looking, shouting and pointing at the miracle, hurrying on their way to the temple.
And I imagine one who stopped. One who who stooped to look at his feet, his hands, to turn palms up and over, up and over. I imagine him looking ahead to where the others ran to freedom and turning to look behind at the figure of Christ, where the healing originated. I picture overwhelming gratitude that made him want to shout, but also the wonder of the moment which made him want to whisper. He may have called to the others, it’s not written in the passage, but while nine became smaller in the distance ahead, that one man “when he saw that he was healed, returned and with a loud voice glorified God.” Luke 17:15 (NKJV).
He glorified God, Sovereign over sickness and health, events and occurrences, nature and time. The magnitude of God in the man Jesus brought him to his knees.
“…And fell down on his face at His feet…”
True gratitude inspires worship.
“…Giving Him thanks.”
True gratitude recognizes the Person as greater than the miracle. It is possible to get that confused, to seek an experience but not a Savior, to be distracted by temporary and neglect eternal.
Only one recognized a larger reality and returned to give glory to God. And he was a Samaritan. His status even before the disease was less, his acceptance among men iffy.
The other nine, so enamored with returning to normal life and society forgot to bow before The One Who had the power to heal not just physical bodies, but give spiritual life as well.
“…Your faith has made you well.” Jesus said. But weren’t they all healed?
Without Christ our souls are diseased and without hope. We are like the Samaritan leper, needing spiritual healing to remove the stain of sin from corrupted hearts.
Thanksgiving is a great time to count our blessings and name them one by one, all those little pieces of life over which God sovereignly reigns but we take for granted.
True thanksgiving overflows in grateful humility.
Let your attitude of gratitude lead you back to the feet of Jesus.
(From Luke 17:11-19 NKJV) | <urn:uuid:f5f92e96-bcc4-4742-b957-739cc03b24d0> | CC-MAIN-2022-33 | https://sylviaschroeder.com/sfoons-forks-and-miracles/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.971902 | 1,076 | 1.648438 | 2 |
Fun and fascination .
. . the easy way
for children to lear
n basic skills.
Little Maestro can
help your child
learn about the dif-
ferences in musical
tones (pitch) and
how they work
together in simple
And it’s fun!
There are 10 note-keys on a musical staff, so Little
Maestro can be played like an instrument . . . and there
are 10 sing-along songs in an electronic memory. Your
child’s own compositions can be recorded in the memory
and played back again and again. There are sound
effects, too. Games like “Hi/Low” and “Follow Me” add
to the fun and the learning . . . and a friendly electronic
“voice” provides simple instructions.
Speak & Music
can help your child
discover the magic
in making music
fun! Three educational games challenge
children to repeat note sequences, melodies,
and rhythms. A pleasant electronic “voice”
gives instructions and encouragement. A
piano-type keyboard covers the full
chromatic scale for IV 2 octaves.
So children can learn to play—and
record and replay their own tunes*
Youngsters change tempos, select tone
colors, add sound effects
songs prerecorded for
games and sing-alongs.
Spelling B™ *
Designed to provide
hours of learning fun,
the Spelling B™ helps
teach the basics of
spelling and reading.
Five entertaining games
practice and recognition
activities for over 250
Two of the Spelling B
games are based on the concept of word-picture associa¬
tion. Children practice naming, spelling, and reading
using the brightly colored activity book. Other activities
encourage logical and strategic thinking.
Spelling B keeps score and provides positive reinforce¬
ment for right answers. Three learning levels challenge
children with progressively more difficult words.
Math Star ™
The Math Star™ can
help children master
the basic skills that
build important founda¬
tions for advanced
mathematics ... Quick
recall of basic
and logical response.
Designed to provide hours of
learning fun, Math Star™ has
seven different fast-action activi¬
ties for one or more players.
Flashing stars provide posi¬
tive reward and encourage¬
ment, and different levels of
challenge children to keep
learning. The colorful activity
book is filled with math games.
Using brightly colored, inter-
changeable picture panels (2
panels, 4 different pictures) on a touch-sensitive surface,
Touch Sl Tell gives preschoolers the kind of educational
challenge they can enjoy. They learn to recognize and
name a variety of colors, shapes, letters, numbers and
familiar animals and objects. When a child touches a pic¬
ture on one of the panels, a friendly voice identifies the
object, asking the child to find other pictures. And to
keep very young imaginations interested, musical tones
and special sound effects add involvement. There is also a
selection of additional topics for you to choose from.
Optional Touch & Tell™
Picture Panel Library
Helps children learn to identify letters of the alphabet
and objects that begin with those letters. Also demon¬
strates the difference between small and capital letters.
Lions really roar and turkeys go gobble-gobble as your
child learns the names and “voices” of farm animals,
wild animals and baby animals like kittens, puppies,
piglets and lambs.
All About Me
Adds important words to young vocabularies by
teaching the identification of articles of clothing,
several types of toys, and parts of the body such as eye,
ear, and nose.
Teaches the recognition of numbers up to 30—and the
concept of quantity for numbers from 1 to 8. Helps
build a vocabulary capable of distinguishing between
“two cats” and “four cats.”
Develops greater knowledge of nature by introducing
the names of small animals and their “houses”—in
parks, woods and oceans. Teaches such associations as
nest/bird and hive/bee.
The fire truck’s siren and the rocket’s rattling roar
invite an exploration of methods of transportation—by
land, sea, air, and space—from motorcycles to message¬
A Dog On A Log
Rhyming words such as log, dog, pig, big.
Plural endings such as boxes, watches,
hats, and trees.
On The Track
Consonant blends such as bl, br, cl, cr,
dr, fl, fr, gr, pi, pr, sc, sh, si, sk, sm, sp, st,
The Seal That
Sound-alike vowel combinations such as
ay and ai, ea and ee. Words ending in er
The Third Circle
R-controlled vowels such as ir, ar, er, ur,
or; and words with the suffixes ful and ly.
Who’s Who At
The contraction n’t (don’t, didn’t, wasn’t,
isn’t). Verbs ending in ed, er, s and es.
Compound words such as shipmate, sun¬
burn, seafood; words ending with er and
est; and syllables.
The Millionth Knight
Silent letter combinations such as chalk,
phone, limb; and suffixes less, ous, and
Speak & Read uses a
friendly electronic voice and
carefully planned activities to help children build reading
More than 250 basic words are introduced through
activities like “Word Zapper” and “Hear It,” helping
young children recognize letters and words alike. “Picture
Read” develops vocabulary skills and establishes a sound
appreciation of word meanings. “Read It” is a fun way
to aid reading comprehension and logical thinking.
Speak & Read™ Cartridge Library
Speak & Spell tackles
the usually dull, repetitious
chores of spelling drills and turns them into lively,
exciting games. Speak & Spell keeps children involved—
and learning—three ways, using the senses of sight, touch
Progressing at their own pace, children “play” their
way through a primary vocabulary of over 150 frequently
used words which don’t follow normal spelling rules.
There are four levels of challenge.
Speak & Spell™ Cartridge Library
Words like if, how, and as can be big
problems. They can’t be spelled
Vowel sounds are often irregular and
create pronunciation as well as spelling
Silent letters, “dropped” letters, y/i
changes and double consonants.
Adding s, ed, and ing to verbs that
require doubling a consonant or changing
y to i.
Vowels can be troublesome—with so
many alternate spellings.
Advanced practice with silent letters,
irregular spellings, multiple spellings.
Using more than 100,000
random and preprogram¬
med problems, Speak &
Math gives students
valuable practice in addi¬
tion, subtraction, multipli¬
cation and division. It uses
numerical and word prob¬
lems to keep students in¬
terested and involved,
motivating them to find
the correct answer.
Math games such as “Number Stumper” help stim¬
ulate logical thinking. “Greater than/less than” exercises
build the ability to compare number values. And each
type of learning activity has three levels of challenge to
grow with the child’s ability level.
TI’s Little Professor mathe¬
matical tutor is a lively, kid¬
sized learning aid that helps
youngsters practice addition,
subtraction, multiplication and
The Little Professor’s 50,000
preprogrammed problems work
the same way math flash cards
do, presenting problems at four
selectable levels of challenge.
An animated liquid crystal display rewards correct
answers with a wiggle of the Professor’s mustache and
shooting stars, as well as displaying the problems and
Interactive educational products
make it easy and fun for
your child to learn the basics.
From preschool to junior high ♦ . *
Each TI educational product brings a bright, fun
approach to learning—and each is based on specific
learning objectives that can support your child’s progress
in the basic skills.
This combination of solid educational concepts and
electronic fun and excitement interacts with children
and keeps them intrigued and challenged. It’s a unique
opportunity to help build a firm foundation in spelling,
pronunciation, vocabulary, reading, grammar, arithmetic,
music, logical thinking, problem solving, and more.
TI’s family of educational products includes a wide
variety of optional plug-in cartridges ... so your child
can begin at the proper level and proceed at his or her
Solid State Speech™ technology reproduces human
speech electronically. So a friendly voice can reward the
© 1987 TI Printed in U.S.A. 1058159-0201 | <urn:uuid:44cfa4bc-f756-4944-ad05-92fd0b6b713e> | CC-MAIN-2022-33 | https://www-tracey.archive.org/stream/texas-instruments-educational-products/Texas%20Instruments%20Educational%20Products_djvu.txt | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.84433 | 2,314 | 2.859375 | 3 |
Great Britain’s withdrawal from the European Union (EU) without a formal agreement will finally take place at exactly 11 p.m. London time on January 31, 2020. Thereafter, during an 11-month transition period, the entire United Kingdom will temporarily abide with the EU rules, whilst moving forward without any representation in the EU organization. The period of transition is set to expire on December 31, 2020.
During the transition term, negotiations for a formal agreement governing trading and diplomatic relationships between Great Britain and the EU will continue until December 31, 2020. In the event that a formal Brexit deal has not been reached by the end of the year, the No-Deal Brexit status continues with still uncertain trade arrangements and agreements, including rules governing aviation standards, data sharing and security, supply of electricity and regulation of medicines.
Although certain barriers and potentially higher costs are anticipated, the formality of the Brexit move, will enable Great Britain to propose and enter into trading negotiations with other nations, starting February 01, 2020. That is why UK Prime Minister Boris Johnson has expressly stated that as much as possible, he prefers not to prolong the negotiation process nor agree to any legislation that would extend the deadline for the negotiation of a Brexit deal at the end of the 11-month transition period.
However, since the ministers of the European Union are set to reconvene in Brussels in February 25, 2020, negotiations for the Brexit deal will still be on hold. The start of the negotiation process will have to wait until the EU Commission re-confirms its approval of French diplomat Michel Barnier as the official EU representative in the negotiation process. This means that the earliest by which talks regarding Brexit move will start, will be in March 2020.
Calls for Extension of Transition Period Rejected
At this early stage, the Labour and Liberal Democrats in Parliament are already calling for the extension of the December 31, 2020 end of the transition period; arguing that the 11-month time frame is much too short within which to negotiate a favourable deal. As it is, a great many are sceptical that a Brexit deal could be finalized within a short time, considering that trade agreements typically take years to reach finalisation.
Nonetheless, EU negotiator Michel Barnier said they intend “do the maximum” in finalising a Brexit deal within the current time frame. The French politician opines that Britain is entitled to reject any calls for extension, saying that the British government has the right to choose whatever procedure it deems fit in moving forward with the No-Deal Brexit. | <urn:uuid:5a497db4-156d-4adb-b4d8-243868d1ab52> | CC-MAIN-2022-33 | https://www.markfieldmp.com/great-britain-to-move-forward-with-eu-withdrawal-without-a-formal-brexit-deal | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.954437 | 517 | 1.984375 | 2 |
In a new report, E3 inventoried 2018 emissions in New Mexico and estimated the impact that current state climate policies will have as the state aims to hit its 2030 (and potential 2050) GHG emissions targets. The report showed that while state and federal policies will drive down greenhouse gas (GHG) emissions in New Mexico, there remains a gap between the emissions reductions in current policies and the emissions reductions required to reach potential 2050 targets.
The report contributes to recent efforts by New Mexico and Governor Michelle Lujan Grisham to achieve GHG reductions. In 2019, Governor Lujan Grisham issued an Executive Order for the State of New Mexico to join the United States Climate Alliance and set an economy-wide greenhouse gas (GHG) emissions target of 45% below 2005 levels by 2030 (EO 2019-003). In this Executive Order, she also established a Climate Change Task Force to evaluate policies and strategies to achieve the target, including increasing the ambition of the state Renewable Portfolio Standard (RPS), implementing Low Emission Vehicle (LEV) and Zero Emission Vehicle (ZEV) standards, updating building codes, and developing a comprehensive, statewide, enforceable regulatory framework to reduce oil and gas sector methane emissions and prevent waste from new and existing sources. In 2019, the Climate Change Task Force published its first report detailing initial recommendations for policies and actions to reduce emissions across the state. E3’s new report, commissioned by Colorado State University’s Center for the New Energy Economy (CNEE), supported and was cited by the 2020 New Mexico Climate Strategy Report, the task force’s second report.
E3’s analysis provided data and metrics to help New Mexico analyze the scope of statewide GHG emissions and target policies to reduce emissions. Working closely with representatives from various state agencies, especially the Energy, Minerals and Natural Resources Department of New Mexico (EMNRD), E3 gathered data for the inventory and forecast. E3 based inventory data on publicly available federal and state sources and used a PATHWAYS model for New Mexico for forward-looking scenario analysis. E3 analysis provided an inventory of New Mexico emissions in 2018, which highlighted the significant recent growth of oil and gas emissions as a key state emissions source. E3 found that existing statewide policies contribute significant carbon reductions but are not sufficient to meet 2030 carbon goals. Given the recent growth of the oil and gas sector, E3 found that additional policy action is necessary to address some combination of vehicle electrification, building efficiency and electrification, and advanced biofuels. | <urn:uuid:70ddccc3-03cc-45e5-ae2e-12a0d0036fee> | CC-MAIN-2022-33 | https://www.ethree.com/e3-forecasts-new-mexico-emissions-and-contributes-to-2020-new-mexico-climate-strategy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.913144 | 519 | 2.546875 | 3 |
As user support professionals, we all have access to users’ data, oftentimes personal in nature, especially if you support home users. We’re trusted to respect a person’s privacy, and users have a right to be outraged when that trust is violated. Here’s one user’s story about one such violation.
I was recently browsing through the Techrepublic off-topic discussions (hanging around the TR water cooler), and I saw a discussion started by a TR member who sent his computer into the manufacturer to have the motherboard replaced. When his computer was returned, he was horrified to learn that not only was his privacy violated but his personal data was actually copied from his computer.
Now as a disclaimer, I’ve not discussed this incident with the TR member who started that discussion, and of course, I can’t verify the claims made, but it sure sounds like it’s on the up-and-up to me. Nonetheless, it does illustrate something that all users probably think about in the back of their minds — how safe is their data and how respected is their privacy?
This particular user had keylogger installed on his computer, so he was actually able to retrace the steps taken by the support technicians, and he even had screen shots of the devious deeds that were done. He discovered that the support tech working on his computer changed settings, snooped around the hard drive, and actually copied pictures, music, and videos onto an external storage device. And based on the accounts as described by the user, it’s obvious that the file transfer was not for the purpose of backing up data. What a total and gross violation of trust this was, not to mention a possible crime. If this had happened to me, to say that I would be outraged is an understatement.
I support corporate users, not home users, and as such my circumstances are vastly different than those who do support home users. Regardless, I still make it a personal policy to respect the privacy of my users. Heck, we all have personal pictures, music, and such on our computers, and I would also suppose that most of us might send a personal e-mail on occasion. I would never dream of snooping into someone’s personal space, even if it is of the cyber variety and even if it is on corporate computers. (Note: My company might be different than others that might have stricter policies against these things.)
I would hope that no user support professional would violate a user’s trust in such a way, although it’s probably inevitable that it does happen. Just like I’ve had loose change lifted from the console of my car by an unscrupulous valet, I suppose there’s also such people working as user support techs who would lift personal data from a computer.
I’m not sure what I would have done if I were in this person’s shoes. In the very least, I think I would have demanded that the dirty deed be acknowledged and that the tech be severely reprimanded. If I were brushed off, I would have probably threatened more formal action, either through their corporate channels or even law enforcement. But I would have wanted proof that something was done, and perhaps even a personal apology from the tech in question.
Maybe I’m too forgiving, and I think that our zero-tolerance world takes some things too far. (Like the kid expelled from school for bringing a water pistol to class.) Not everything is always so black and white. This might have been a young person who needed no more than a good scare and embarrassment to set him/her onto a straighter path. Heck, some young kids think it’s perfectly okay to copy data, share music, and so on, and maybe this is a case of gross ignorance gone too far. But I suppose I can’t say for sure what I would ultimately have done, except that I would have vigorously pursued something, and how I was treated would probably have determined my future actions, if any.
Take the poll. What would you have done?
And please leave your thoughts and comments in the following discussion. | <urn:uuid:da4397f0-ed34-47a7-99fb-c4db4af99921> | CC-MAIN-2022-33 | https://www.techrepublic.com/article/a-gross-violation-of-user-support-trust-what-would-you-do-take-the-poll/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.985387 | 873 | 1.734375 | 2 |
Links on Android Authority may earn us a commission. Learn more.
Check out this new, sort of creepy teaser for the Huawei Mate 10
According to the video, the upcoming flagship from Huawei is “not a smartphone.” It also says the device will be so smart that it’ll “think for us.”
As we approach October 16, we are learning more about the upcoming Mate 10-branded smartphones day by day. So far, we’ve seen what seemed like leaked slideshows, purportedly showing images of the Mate 10 and the Mate 10 Pro. Rumors suggest that the Pro version could sport a bezel-less design, 4,000 mAh battery, all-new camera sensors, and of course, advanced AI features.
The AI part is where things get interesting. The Chinese electronics giant has previously stated that its upcoming flagship – presumably called the Mate 10 – will be “more powerful” than the recently-released iPhones. It even made fun of the Face ID technology found inside the iPhone X, claiming that the Mate 10 will be the “real AI smartphone.” These are certainly bold claims, but one thing is for sure: Huawei is not taking AI lightly. The company has already discussed its plans to launch an application processor that combines CPU, GPU, and AI functions, and although it’s unclear whether that’ll debut with the Mate 10, from the latest teaser, it’s clear AI is going to play a big role in the upcoming device:
Delivering the ultimate experience, going beyond smart, using the transformative power of #AI. Welcome to intelligent. #HuaweiMate10 pic.twitter.com/u9yD1mhdYy— Huawei Mobile (@HuaweiMobile) September 29, 2017
Huawei says that the Mate 10 “is not a smartphone” but rather “an intelligent machine.” Then it proceeds, “This sees, thinks, learns like us [and] for us.” On one hand, I can’t wait to see what Huawei has in store for us. My guess is that the AI here is mainly referring to the Neural Processing Unit that the company has been talking about and photography-related features (Apple seems to be taking a similar approach). On the other hand, however, I’m a little creeped out by the fact that I’m so excited for a phone that’s going to “think for me.”
I’m a little creeped out by the fact that I’m so excited for a phone that’s going to 'think for me.'
What are your thoughts on the new teaser? Excited for the October 16 event? Let us know by leaving a comment below! | <urn:uuid:83c828df-841d-4eb0-b6a3-a3642348145c> | CC-MAIN-2022-33 | https://www.androidauthority.com/new-creepy-teaser-huawei-mate-10-803748/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.948972 | 581 | 1.640625 | 2 |
CVC utilization in critically ill children
We aimed to describe utilization and indication(s) for long-term central venous catheters (CVCs) in a pediatric intensive care unit (PICU) and identify potential strategies to decrease CVC utilization.
Methods: We conducted a single-center prospective quality improvement initiative at a 30-bed PICU in a large, freestanding, academic children’s hospital. We created an electronic report to identify patients with an indwelling CVC for 7 days and older (defined as long term). We discussed the ongoing need for each long-term CVC with PICU clinicians at weekly interdisciplinary structured “CVC stewardship rounds.” We then made recommendations around expedited removal of CVCs. We conducted multiple Plan-Do-Study-Act cycles to categorize CVC indications, identify modifiable factors, and educate PICU clinicians. We hypothesized that CVC stewardship rounds would decrease long-term CVC utilization in our PICU.
Results: From October 2016 to September 2017, 607 long-term CVCs were eligible for the stewardship intervention. Compared to the preintervention period, we recorded a significant increase in peripherally inserted central catheters and a decrease in nontunneled CVCs (P < 0.001). Most patients had single- or double-lumen CVCs in both the preintervention and intervention periods (86% and 91%, respectively). The utilization of overall long-term CVC devices, and those with modifiable indications, decreased during the intervention period.
Conclusions: A single-center QI intervention focused on PICU CVC stewardship was associated with a decrease in CVC utilization.
Blumenthal JA, Ormsby JA, Mirchandani D, Petti CA, Carpenter J, Geller M, Harding SN, O’Brien M, Sandora TJ, Kleinman ME, Priebe GP, Mehta NM. Stewardship Intervention to Optimize Central Venous Catheter Utilization in Critically Ill Children. Pediatr Qual Saf. 2021 Feb 12;6(2):e389. doi: 10.1097/pq9.0000000000000389. PMID: 34963999; PMCID: PMC8701869. | <urn:uuid:16554848-1cbd-4564-8d73-1a6ea4bf3ec9> | CC-MAIN-2022-33 | https://www.ivteam.com/intravenous-literature/cvc-utilization-in-critically-ill-children/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.875671 | 492 | 2.09375 | 2 |
How sleep helps us process and consolidate memories
Why do we sleep? Why do we dream? How do sleep and dreams shape our memories?
On this episode of River to River, host Ben Kieffer talks to neuroscientist Ted Abel — the founding director of the Iowa Neuroscience Institute at the University of Iowa. For decades, Abel has been studying sleep in humans, how sleep aids in storing memories and keeping the brain, and body, healthy. Listeners also share their questions about the intersection of sleep, dreams and memory
- Ted Abel, Roy J. Carver Chair in Neuroscience, Director of the Iowa Neuroscience Institute and Chair of the Department of Neuroscience and Pharmacology in the Carver College of Medicine at the University of Iowa | <urn:uuid:e1cfafeb-ba6d-47c9-8b81-95bd3fce0b57> | CC-MAIN-2022-33 | https://www.iowapublicradio.org/podcast/river-to-river/2021-11-17/how-sleep-helps-us-process-and-consolildate-memories | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.907693 | 151 | 2.671875 | 3 |
Explore the Mortgage101 Library
Check Local Mortgage Rates
Loan Program Choices
Use our calculator to find out your estimated monthly payment in advance: Enter the loan amount, interest rate, and length of mortgage.
Try our Mortgage Payment Calculator
The Federal Housing Administration (FHA) makes it easier for consumers to obtain affordable HUD home improvement loans by insuring loans made by private lenders to improve properties that meet certain requirements. This is one of HUD's most frequently used loan insurance products. By the end of fiscal year (FY) 1996, it had insured almost 35 million loans totaling $43.6 billion.
The Title I program insures loans to finance the light or moderate rehabilitation of properties, as well as the construction of non residential buildings on the property. This program may be used to insure such loans for up to 20 years on either single or multi family properties. The maximum loan amount is $25,000 for improving a single family home or for improving or building a non residential structure
For improving a multi family structure, the maximum loan amount is $12,000 per family unit, not to exceed a total of $60,000 for the structure. These are fixed rate loans, for which lenders charge interest at market rates. The interest rates are not subsidized by HUD, although some communities participate in local housing rehabilitation programs that provide reduced rate property improvement loans through Title I lenders.
Only lenders approved by HUD specifically for this program can make loans covered by Title I insurance. While most lenders and contractors use this program responsibly, HUD urges consumers to use caution in choosing and supervising home repair contractors conducting Title I repair/renovation work. A recent HUD review of Title I uncovered many instances of unscrupulous contractors performing shoddy work falsifying documents overcharging homeowners and using deceptive advertising. HUD encourages homeowners to work directly with their lender in selecting a home repair contractor in order to prevent inflated estimates.
- FHA Eligibility with Bankruptcy and Foreclosure
- What Lenders Don't Reveal About Home Equity Loans
- Alternatives to Getting a 2nd Mortgage
- Second Mortgages: Advantages and Disadvantages
- 3 Warning Signs of Loan Modification Scams
- How to Get Approved for an FHA Loan despite Bad Credit
- Home Equity Loans for People with Bad Credit
- FHA Loans for a First-Time Home Buyer
- Should You Refinance? Make Sure the Timing is Right | <urn:uuid:5c5ddf0c-4501-4cb3-835f-e1cc83dc3864> | CC-MAIN-2022-33 | https://mortgage101.com/article/fha-property-improvement-loan-insurance-title-i/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.936625 | 518 | 1.609375 | 2 |
The hexadecimal color code #000ceb is a shade of blue. In the RGB color model #000ceb is comprised of 0% red, 4.71% green and 92.16% blue. In the HSL color space #000ceb has a hue of 237° (degrees), 100% saturation and 46% lightness. This color has an approximate wavelength of 464.49 nm.
Buy paint matching this color
One can have no smaller or greater mastery than mastery of oneself.
<p style="color: #000ceb">…</p>
An artist never really finishes his work; he merely abandons it.
<p style="background-color: #000ceb">…</p>
I saw the angel in the marble and carved until I set him free.
<p style="text-shadow: 0.1em 0.1em 0.15em #000ceb">…</p> | <urn:uuid:a88c43ff-1870-4889-b06c-bbeb3d604fd8> | CC-MAIN-2022-33 | https://encycolorpedia.com/000ceb | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.853142 | 206 | 1.695313 | 2 |
Search and compare thousands of words and phrases in American Sign Language (ASL). The largest collection online.
How to sign: pool that provides a facility for swimming "`swimming bath' is a British term";
Your browser does not support HTML5 video.
Similiar / Same: swimming pool, swimming bath
Categories: athletic facility, pool
Upload your sign now.
Add this video to your website by copying the code below. | <urn:uuid:249e5b7f-2472-4f5a-af64-e84befd670da> | CC-MAIN-2022-33 | https://www.signasl.org/sign/natatorium | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.92669 | 92 | 1.875 | 2 |
In 1920 the Texas Federation of Women’s Club recommended the Mockingbird become the Texas symbol as the state bird. The Texas State legislature agreed that the mockingbird was the most appropriate species for the state bird of Texas as a fighter for the protection of his home, like any true Texan. On January 31, 1927, Governor Dan Moody approved the measure and Texas became the very first state to choose a state bird.
Now the mockingbird is ingrained in Texas’s heritage and the bird’s melodies can be heard from the streets of Dallas to the mountains in west Texas. Texans agree that the mockingbird has the prettiest song of any bird native to North America. Known scientifically as the Mimus Polyglottos which means “many-tongued mimic” in Latin, the song of the Mockingbird is a medley of the calls of many other birds. Each imitation is repeated two or three times, then another song is started, all in rapid succession.
The mockingbird imitates the sounds and chirps of 35 different bird species and even mimic sirens and crickets. Scientists believe that male mockingbirds learn these songs to show off for potential mates. Most mockingbird couples remain monogamous for life and continue to breed and build nests of twigs, sticks, grass, and leaves together year after year.
The Mockingbird diet depends on the season and location but it is primarily fruit, seeds, berries and small insects such as beetles, earthworms, and moths. Spread out throughout Mexico, most of the United States, and parts of Canada, the mockingbird is able to thrive in diverse environments, climates, and habitats. They’ve made a name for themselves around the world as a bird that sweetly serenades passerby’s all day with complex melodies and sometimes continue singing into the night.
Why is the mockingbird the state bird of Texas?
In short, the Mocking bird is the Texas state bird because it is a fighter for the protection of his home, just like any true Texan.
The long version of the story starts in 1920 when the General Federation of Women’s Clubs had an idea that each state should have a bird mascot. The Texas Federation of Women’s Club nominated the Mockingbird to represent Texas. This nomination was extremely popular and the Texas State legislature noted that the mockingbird was “the most appropriate species for the state bird of Texas, as it’s found in all parts of the state, in winter and in summer, in the city and in the country, on the prairie and in the woods and hills, and is a singer of a distinctive type, a fighter for the protection of his home, falling, if need be, in its defense, like any true Texan.”
On January 31, 1927, Governor Dan Moody approved the measure and Texas became the very first state to choose a state bird. Since then, Tennessee, Florida, Mississippi, and Arkansas have followed in Texas’s lead and have also adopted the Mockingbird as their official state bird. The admiration of the Mockingbird among state legislatures has left many wondering why the modest-looking bird is so popular. While its appearance is less than spectacular, the Mockingbird is one of the only birds that can bless our ears with up to 200 different songs.
Is it illegal to own a Mockingbird in Texas?
It is illegal to own or capture a Mockingbird in any part of the United States. Under Title 16 of the U.S. Code, sections 703 and 707a, it is illegal to “pursue, hunt, take, capture, kill, attempt to take, capture or kill, possess… at any time, or in any manner, any migratory bird… or any part, nest, or egg of any such bird.”
Sadly, the beautiful songs of the Mockingbird nearly led to its extinction in the 19th century when populations plummeted due to citizens capturing the bird in hopes of making it a pet. In 1828, Mockingbirds were sold in major cities such as Philadelphia, St. Louis, and New York for as much as $50 or $1300 today when adjusted for inflation.
While everyone would love to hear the bird’s enchanting melodies daily, capturing it as a pet could put the survival of the entire species at risk. This is especially significant as Northern Mockingbird populations have declined by about 21% percent from 1966 to 2015, according to the North American Breeding Bird Survey. Despite these losses, mockingbird populations are still common and have slowly rebounded in some areas.
Is it illegal to shoot a Mockingbird in Texas?
Yes, it is illegal to kill a mockingbird in Texas. The Northern Mockingbird has been protected by state and federal laws for more than seventy years.
Shannon Dwayne Mischke, a Texas local, quickly learned of this law when he took out his .410 shotgun and killed a mockingbird that was pecking at his vegetables and contaminating feed troughs for his livestock. Only a few hours later, a deputy showed up at his house and issued a Class C misdemeanor citation and $500 dollar fine. While the punishment might seem like only a slap on the wrist, corporations have fared much worse than individuals.
Jim Noble, assistant U.S. attorney, brought charges against the Spindletop Drilling Corporation in 20017 after they concealed evidence that they had killed 12 mockingbirds. The matter was settled in the U.S. District Court of Texas where Spindletop president Chris Mazzini accepted a plea agreement for two years probation and a $10,000 restitution paid to the National Fish and Wildlife Foundation. Facing a six-month prison sentence and the possibility of a $15,000 fine, Mazzini was lucky to not have to serve time. While this may seem harsh, the Mockingbird is an essential part of Texas’s ecosystem and the protection of the bird ensures that future Texans will enjoy their breathtaking songs.
Where is the northern mockingbird found?
The northern mockingbird’s habitat is exceptionally versatile, which has allowed the species to quickly spread and thrive in many parts of the world. Originally found in the South, the bird populations began expanding northward in the 19th century to Maine, Vermont, Massachusetts, Ohio, Iowa, and New York as well as provinces such as Novia Scotia and Ontario.
The mockingbird is usually a yearlong resident of its area, but some of the northernmost populations occasionally migrate south over winter. You can also spot the bird in Hawaii, Alaska, Barbados, St. Helena, Socorro Island, the Cayman Islands, and Tahiti. The most remarkable part of the mockingbird is its ability to live in rural, suburban, and urban areas without issue. The bird has taken a liking to parks and gardens in suburban areas and frequently nests on top of mowed lawns. In rural areas, the bird nests by forest edges, desert scrubs, and chaparrals.
Are mockingbirds aggressive?
Mockingbirds are known to be territorial species, especially around the mating season and when protecting their nests. Although the mockingbird is only 8.2-10 inches in length, it is known to attack snakes, ravens, hawks, and even cats who come too close to the nest.
When faced with a particularly large attack, mockingbirds can sometimes even solicit help from neighbors by singing a persistent alarm call which can recruit several other adults to the area. When other mockingbirds enter their territory uninvited, it will typically involve a violent fight between males battling male mockingbirds and females trying to run off other females. But don’t fear, unprovoked mockingbirds rarely attack humans unless there is a direct threat to their nest or children.
If you do anger a mockingbird, you may create a lifelong enemy. According to a recent study, mockingbirds can remember people who have threatened them and even start dive-bombing them if they see the person again. The extraordinary behavior, reported in the US journal Proceedings of the National Academy of Sciences, is thought to be the first published account of wild animals in their natural setting recognizing individuals of another species.
Another unfortunate study showed that aggressive behavior among mockingbirds might be due to high lead levels in the soil. In a study published in Science of the Total Environment, scientists looked at the aggression of mockingbirds compared with high and low levels of lead in the soil. The results were staggering, and it was found that aggression was several times higher among birds living in areas with high lead levels. This is especially concerning because more aggression means using more energy, and that could mean that mockingbirds have less energy left to feed their young or protect nests from predators. | <urn:uuid:39e430a4-cd66-4b5e-af36-937aa7774176> | CC-MAIN-2022-33 | https://texasproud.com/texas-state-bird-mockingbird/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.96385 | 1,822 | 3.75 | 4 |
A key to success is to examine your ability to achieve your goals. The Community Training and Assistance Center (CTAC) helps by conducting a comprehensive organizational assessment that provides the insights needed to help your community group set a new trajectory.
Organizational assessment is a developmental process that builds a constituency and the capacity for change. Working closely with organizational leaders, as well as internal and external stakeholders, CTAC assesses the capacities needed to bring an organization to the next level of operational and programmatic effectiveness. This provides an essential building block for having greater impact in the community.
Using CTAC’s Organizational Assessment Rubric™, we examine such areas as mission and vision, board roles and responsibilities, understandings of community conditions and systems, communications, resource management and systems, and leadership and impact. This information then makes it possible to identify:
- Organizational development, community organizing, and campaign development needs
- Workable plans for building capacity
- Technical assistance, training, and policy development needs
- Changes needed to respond to community and funder demands
- Resources and support system needs
- Opportunities to adjust and strengthen organizational practices in order to have a greater community impact
We customize the assessment process to fit the specific needs and goals of your organization or coalition, with cultural sensitivity and integrity.
CTAC has conducted hundreds of assessments for organizations across the country. Our staff brings years of knowledge and expertise in working directly with communities and organizations.
Organization members we’ve worked with have expressed the positive, lasting impact of the assessment process:
“It provided an important opportunity to identify commonalities through a participatory dialog.”
“It improved our communication and it’s making us more efficient, working smarter.”
“Our organizational assessment is preparing us for the future.” | <urn:uuid:50adbd8c-17d2-418c-9072-53a875a8fa8b> | CC-MAIN-2022-33 | https://ctacusa.com/community-development/organizational-assessments/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.935777 | 378 | 1.78125 | 2 |
I first heard about Grandma Gatewood several months ago on Sharon King’s blog, Midlife Moments. Emma Gatewood, better known as Grandma Gatewood, was the first woman to thru-hike the entire length of the Appalachian Trail (AT), alone, in one continuous journey.
In 1955, at the age of 67, she hiked 2,050 miles wearing canvas shoes and carrying a small sack of sparse supplies over her shoulder. I immediately had to know more about this remarkable woman and I’m so glad I discovered her story.
A Brief Overview of Grandma Gatewood’s Life Before the Appalachian Trail
A little internet research revealed some basic background information about the remarkable woman who came to be known as Grandma Gatewood. Emma Gatewood was born in Ohio in 1887, one of 15 children. She was married at the age of 19 to PC Gatewood and had 11 children of her own.
Unfortunately Emma was a victim of violent abuse at the hands of her husband. She would retreat to the woods to find solace and healing after the abusive episodes. She eventually divorced PC in 1940. The book goes into a lot more detail about her years before she tackled the trail.
Watch the Documentary – Trail Magic: The Grandma Gatewood Story
Digging a little deeper into the internet leads me to the documentary about her which was recently released. Here’s a trailer for Trail Magic: The Grandma Gatewood Story.
Read the Book – Grandma Gatewood’s Walk
In an emotional essay, author Ben Montgomery tells about the year he spent working on the Grandma Gatewood story and how deeply connected he felt to her as he wrote his book, Grandma Gatewood’s Walk. Seeing how strong his strong feelings for her were made me want to read the book. I wanted to know more about her too.
After waiting on the library holds list for a few weeks, it was finally my turn. I was headed out on a trip the next day so I brought the book along with me. I couldn’t get started on the flight out – too much first-ever-college-drop-off stress going on – but on the return flight, college drop-off complete, I was ready for a distraction and I started reading. By the time I landed in Dallas, I had finished over 100 pages. Before I landed back in Virginia, I had finished the entire book.
Such a great story! So well-written and absorbing. It made me briefly consider hiking the Appalachian Trail (AT) myself or even a similar long trail (a notion I occasionally entertain). Then I remembered how much I hated backpacking at Girl Scout camp that one summer and I once again reconsider such a notion.
(Don’t get me wrong – I loved Girl Scout camp and was lucky to go every summer until eventually I became a counselor. But I did not particularly enjoy the backpacking unit. Can you see why?)
What messages did I find in the Grandma Gatewood story?
Emma Gatewood was a remarkable woman for many reasons. Her life wasn’t easy and her marital situation was awful. But she didn’t let this stop her. She took care of herself and taught her children how to do the same. She followed her dreams despite setbacks and experienced many things along the way.
A famous quote of hers is “Because I wanted to.” There’s a lesson to be learned there. Grandma Gatewood didn’t have special equipment or training but she had desire in spades and that’s all we really need in a lot of cases.
Walking is a lost art
In the 1950s, the popularity of cars rose rapidly. Walking consequently decreased significantly. Doctors and scientists began to see a correlation between the rise of cars and the decline in the general health of the nation’s children. The nation began to transition from a pedestrian society to one of automobiles. Suburban development and highways continued this trend away from walking towards driving.
Things were built to suit automobile travel and pedestrians were left to fend for themselves.
Reading about the trend toward development for automobiles reminded me of an article I read a few years ago about a man who walked from Washington, DC to his home in Fairfax County along Highway 50.
This road had originally been a Native American footpath oh so many years ago. His experience along the same route was quite different. Noisy, lonely, and dangerous, he faced automobiles, litter, and saw hardly another soul along the path. Eight hours later he arrived home.
Despite the less-than-optimal conditions of his trip, his takeaway was that “Walking brings us back to our senses.” I have driven on this road and definitely wouldn’t want to attempt the same walk. It’s true, though, that walking has many benefits and we would be wise to do more of it.
The other person I thought of when reading about how cars have taken over was John Sears, also known as Mule. I saw Mule and his mules walking down the sidewalk in Arroyo Grande one day. Arroyo Grande is a more rural area so it’s not unusual to see an occasional horse here and there but the mules had a website on their packs so I looked them up.
3 Mules live outside. They migrate north and south through California following the seasons. Mule brings his manifesto to every city hall that he passes, dedicated to his message that the Megatropolis has grown out of control and is interfering with man’s right to walk freely on the earth. Look him up. He knows what he believes and he lives it.
While I don’t see myself following his path, I absolutely agree with some of his views on the Megatropolis. You can follow him on Facebook for regular updates. Just a simple guy living his beliefs day in and day out. Inspiring.
Other Famous Walkers
A few other famous pedestrians through the years:
- Old Leatherman – In the late 1800s, an old man began walking clockwise on a 365-mile route that took exactly 34 days to complete. He walked the route continuously for more than 30 years.
- Edward Payson Weston – He lost a bet and walked 500 miles from New York to Washington, DC for President Lincoln’s inauguration in 1861. His pro walking career began soon afterwards and he earned money and fame with many long cross-country walks.
- Random Texan – found walking backwards in Berlin in 1932 in an attempt to walk around the world backwards.
- America’s Walkingest Couple – in 1951 they claimed to have walked thousands of miles covering every street in the 5 boroughs of New York City as well as several other Eastern cities.
Attitude is everything – a lesson worth learning from Grandma Gatewood
“Because I wanted to.”-Emma Gatewood
Attitude is one of the most important factors in getting through life’s highs and lows. Your attitude determines your coping ability and ultimately your success. There are many ways that Grandma Gatewood’s life could have gone differently if her attitude had been less positive and determined.
7 Ways to Maintain a Positive Attitude
An article by Dr. Travis Bradbury gives the following 7 ways to maintain a positive attitude, also called a growth mindset.
- Don’t stay helpless.
- Be passionate.
- Take action.
- Then go the extra mile(s).
- Expect results.
- Be flexible.
- Don’t complain when things don’t go your way.
A recent study by Stanford Research Institure found that success is 88% attitude and 12% education. In other words, a good attitude is priceless.
Grandma Gatewood’s good attitude propelled her to become the country’s most famous pedestrian. She hiked the Appalachian Trail multiple times; she also walked the nearly 2,000-mile Oregon Trail one summer. Grandma Gatewood walked more than 14,000 miles all because she just wanted to.
An unexpected personal connection
On our trip last summer we hiked to Ash Cave in Hocking Hills State Park in Ohio. After reading Grandma Gatewood’s Walk, I realized that the cave we hiked to is the same cave that she hiked to during the annual winter hike that she started. It’s like a brush with celebrity and it also brings the book even more to life knowing that I have walked through some of the same woods hiked by Grandma Gatewood.
Every January, starting in 1967, Grandma Gatewood donned her red beret and led a six-mile hike through Hocking Hills, down by Old Man’s Cave to Ash Cave. The tradition continues even today. 2019 will be the 54th Annual Winter Hike.
Full disclosure – because Hocking Hills was only one of several stops for the day we opted for the much shorter 1 mile loop to Ash Cave from the parking lot. It was a beautiful place though and it was Bella’s favorite stop on the entire trip. Hocking Hills is a nice park and I would definitely return if given the opportunity.
Grandma Gatewood is a folk hero and a legend.
A line from the book that made me laugh came from Grandma Gatewood’s decision to walk the Oregon Trail. She said, “I was looking for something to do this summer and a walk to Oregon seemed like the best thing.” The reaction I had to that statement was similar to the reactions I get from people when I tell them that I like to drive thousands of miles around the country with my kids every summer. It’s crazy.
But, it’s not crazy to us.
Follow her lead…
Want to follow in the inspirational footsteps of Grandma Gatewood and find the magic of being outside? Even if it’s only a few minutes a day, going outside has many positive effects — reduced stress, better mood, and improved cognitive performance for starters. Sounds good, right? Click the banner to join my one-week challenge to get outside.
Spread the word…
Would you like to share the story with a younger audience? There are two children’s books written about her. My library only had one of them and it was a good introduction to her story.
If your library doesn’t have the book, you can find a copy on Bookshop (affiliate link).
Grandma Gatewood’s Walk by Ben Montgomery
Sharing is Caring!
Help me share this story far and wide – Grandma Gatewood deserves it!
- Wikipedia page about Grandma Gatewood
- Grandma Gatewood blog
- Grandma Gatewood story on Midlife Moments
- Grandma Gatewood’s Walk author story
Montgomery, Ben. Grandma Gatewood’s Walk: the Inspiring Story of the Woman Who Saved the Appalachian Trail. Chicago Review Press, Incorporated, 2016.
Houts, Michelle, and Erica Magnus. When Grandma Gatewood Took a Hike. Ohio University Press, 2016. | <urn:uuid:792e62c9-a266-4339-8ba7-41a12db41855> | CC-MAIN-2022-33 | https://behindeveryday.com/grandma-gatewood/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.972127 | 2,343 | 1.757813 | 2 |
The Book of Joshua will take the student through fascinating events and spiritual truths revealed in this time period of Israel’s journey with God. We are living in an age where all those professing Christ do not accept the Bible as being the inspired Word of God. This is true regarding the book of Joshua. Two commentaries, JOSHUA An Introduction; Commentary from the Tyndale Old Testament Commentaries series [which is the primary commentary] and JOSHUA Inheriting the Land from the International Theological Commentary series [which is a supplemental commentary] were used for this course.
Syllabus for this course:2020-03-16-B344-B544-B744-Course-Syllabus
Syllabus Download – PDF | <urn:uuid:ad666401-ddba-4349-8651-30199dbc8764> | CC-MAIN-2022-33 | https://online.chesapeakebiblecollege.com/courses/b-544-joshua/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.906906 | 154 | 2.3125 | 2 |
You’re leasing it from the domain registry and they have complete control over what occurs with your domain name. You may have seen, I stated conventional domain name due to the fact that a business’s working on a brand-new type of domain name that you can own outright. – So Unstoppable Domains constructs domain names on blockchains and this is different than a conventional domain because the domain name is kept by you, the user inside of your cryptocurrency wallet.
– Right now, when you go to purchase a domain name you don’t in fact own it. You’re leasing it from a domain registrar like Namecheap and they’re renting it at wholesale rates from the domain pc registry. If it’s a.com domain you’re relying on the pc registry not to change prices or take the domain away from you in the future.
But if you were to like, you know envision what things are going to be like in five to ten years. Yeah, there should be lots of various sellers and resellers and things like that. – Of course a new type of domain name means that you can’t register.com,. co,. net or any of the standard TLDs you’re utilized to seeing. Now Unstoppable Domains is starting with.crypto. Not a TLD you ‘d consider being a perfect suitable for your blog or company but we could see some generic TLDs being used in the future. For now, Unstoppable Domains is accommodating crypto lovers. It’s a completely different domain system, indicating you can’t type craylor.crypto into your internet browser and load it or can you? See these crypto domains are NFT items. You have actually most likely seen this term appear all over recently. Non-fungible tokens are systems of information on a ledger, that is the blockchain and they represent a special digital item.
In this case, a domain name. Now I’m not declaring to understand all the technical specifics of this new domain name system. To be honest, I still battle with a few of the principles of cryptocurrency, and I’m not a specialist in this area. Today we’re not focusing as much on the technical side of NFT domains but more on what it means for the future of the web. The most significant bottleneck is that web web browsers Google Chrome, Safari, and Microsoft Edge have not yet executed support for NFT domains. Unstoppable Domains has a solution for this, thanks to Cloudflare adding assistance for their domains. | <urn:uuid:c14f7d9b-203d-4c63-9232-5ae7e466baef> | CC-MAIN-2022-33 | https://afinkeywallet.io/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.923147 | 540 | 1.890625 | 2 |
[from] Subjects from the ‘Liber Studiorum’ after J.M.W. Turner [T04873; T05042-T05074; complete]
Thirty-four etchings and mezzotints comprising various states of twenty-eight subjects; on laid paper, various sizes
Purchased (Grant-in-Aid) 1988 (T 04874-T05074); see individual entry for T04873
Prov: ...; Craddock and Barnard, from whom bt by Tate Gallery (T04874-T05074; see individual entry for T04873)
Lit: F.C. Strange, The Etched and Engraved Work of Frank Short, 1908; A.J. Finberg, The History of Turner's Liber Studiorum, 1924; M. Hardie, The Liber Studiorum Mezzotints of Sir Frank Short, R.A., P.R.E., after J.M.W. Turner, R.A., Print Collectors' Club, vol.17, 1938
Short's involvement with Turner's Liber Studiorum began when he was a student and lasted for most of his adult life. In 1888, when his first series of reproductions of the Liber was published by Robert Dunthorne, he explained in the accompanying leaflet how, while studying at the Stourbridge School of Art, his enthusiasm was caught first by the autotype reproductions in the Revd Stopford Brooke's Liber Studiorum of J.M.W. Turner (3 vols., 1882–4), and then by a proof of the original plate of the ‘Devil's Bridge’ (see T05043). He continued: ‘Well, that started it. It is hard for young people to believe that things once accomplished by men now dead cannot be done in these days; and yet it is a fact that all who had wrought upon the Liber Studiorum were dead, and their craft had died with them.’ Encouraged by the distinguished printer Frederick Goulding, Short resolved to try to recreate it by first attempting a copy of the Liber plate ‘Procris and Cephalus’ (see T05047). Having sought Ruskin's advice on this plate and his suggestions for others he might tackle afterwards, Short received ‘the kindest of replies and offers of all help, and a list of the plates he would have me do. That valiant publisher, Mr. Robert Dunthorne, said, “We'll do it!” and so it came about’.
Short's efforts to recreate the Liber were prompted by a passionate love of Turner-fostered by early reading of Ruskin - and an urge to enter his mind and creative process; by an equally profound respect for the engravers who had first interpreted the Liber drawings with such skill and sensitivity; and by a sense of mission in reviving the lost art of mezzotint. Despite initial difficulties and rebuffs, his enterprise soon met with generous encouragement from Turner collectors like Stopford Brooke, John Edward Taylor, Henry Vaughan and W.G. Rawlinson besides Ruskin himself, all of whom made available Turner's original drawings or proof impressions of the original plates. Ruskin, writing from Brantwood on 25 January 1885, recommended: ‘Twelve carefully - and not hurriedly - finished plates, would represent all that's best in the Liber, and, I hope, become a Standard Art School Work’. Soon he suggested ‘You might perhaps go up to twenty, if the public encouraged you’, but Short and Dunthorne kept to twelve for their first series. Having received some proofs early in 1887, Ruskin wrote on 10 February:
Are these lovely things really for me to keep? Any one of them would have been a dazzling birthday present to me; but, above all gifts, the pleasure of seeing such work done again, and of knowing that the worker is as happy as he is strong in it, lights the spring of the year for me more than the most cloudless sunshine on its golden hills. You are doing all these things simply and well as they can be done - and I believe Turner has got through Purgatory by this time, and his first stage in Paradise is at your elbow.
The first twelve plates were proved at the National Art Training School, now the Royal College of Art. Goulding, or his foreman, S. Cope, were the printers (Cope's son took over for Short's later plates). Dunthorne announced fifty etched impressions at 5s. each, and 400 impressions of the mezzotint states at 2 guineas, on specially made English waterleaf paper of Colombier size. This first edition of twelve subjects, completed by 1888, included those described below, T05043-T05054, and was accompained by a variant of Turner's original frontispiece, designed by Short himself (T05042). The success of the enterprise encouraged Short and Dunthorne to embark on a larger project, sixteen new plates which would posthumously complete Turner's Liber, from rare early trial proofs or unpublished drawings. In 1897 Dunthorne accompanied an exhibition of Short's Liber with what were described in the catalogue as ‘New Mezzotints by Frank Short, completing the Book as arranged by Turner, with an Introduction and Notes by W.G. Rawlinson’. These plates were again printed by Goulding, who ‘took a great interest in the later plates’. In 1911 Dunthorne issued another catalogue, printed by the Chiswick Press, which listed two further subjects, not in the Tate Gallery collection, reproducing Turner's unpublished plates; T05059-T05069 were also made from unpublished plates. Later still, Short undertook an even more ambitious project of historical reconstruction, a series of nine plates from subjects existing only in Turner's drawings; T05070-T05074 belong to this group.
In later years, Short reflected as follows on his long devotion to the Liber:
It has often been said to me: ‘Why do you do reproductive or interpretative engraving instead of always your own?’ Well, all I can say is that I feel there is something scholarly in such engraving-in good work soundly (I hope) done; and looking back some fifty years I think I have got more joy out of the work in connection with this immortal Book than from all my other activities in engraving and etching. And it brought me into contact with many lovers and collectors of Turner's work, and I would not have missed that. Especially I might mention Ruskin, J.E. Taylor, Henry Vaughan, W.G. Rawlinson, Percy Horne, Stopford Brooke, Dr. Pocock, Mr. Bullard, Mr. A.A. Allen, and many collectors whom I have not met but who have written to me about the plates, and whose words I valued.
He added that he had, whenever possible, worked from original proofs in the finest impressions available; when depending on Turner's drawings he ‘considered that my duty was to translate them into the richer quality of mezzotint, as nearly as I could to the effect of the drawing, without inventing or intruding anything of my own’ - a somewhat disingenuous statement that drew Martin Hardie's comment that ‘To turn a vaporous watercolour by Turner into a mezzotint is about as easy as to translate ancient Hebrew into modern Czechoslovak’. When working from preliminary etchings, which in many cases were the work of Turner himself, Short concluded, ‘I followed when possible every pen line of Turner, only adding a few lines here and there to connect up anything missing’.
Short's devoted study and ‘completion’ of the Liber is an important episode in the historiography of Turner, and, in so far as it contributed to a revival of the mezzotint medium, in the history of English printmaking. Although more recent critics have dealt somewhat coolly with Short's Liber, his plates won the sincere admiration of his own generation of collectors, connoisseurs and fellow printmakers, especially of F.L. Griggs and Hardie, who together had conceived the 1938 volume of the Print Collectors' Club devoted to these prints, although, following Griggs's death, Hardie alone contributed the highly appreciative essay that precedes the catalogue proper. ‘All of Short's work from the unpublished prints and from drawings’, Hardie considered, ‘ranks worthily with the published portion of Turner's monumental work, and would have gladdened his mighty heart’.
Hardie prefaced his catalogue with words of caution that remain very relevant. Short had pulled many trial proofs of his Liber plates, which had been widely dispersed; Hardie had worked from ‘about 200’ that he could trace in the time available. The impressions acquired by the Tate Gallery include a number of trial proofs, not all of which appear to conform exactly to the states tentatively identified by Hardie - who had in any case, as he further explained, often only been able to guess at the sequence from state to state despite his close friendship with Short himself. Subtle differences between successive pulls could be confusing, and Hardie had seen ‘in Short's studio, proofs just printed successively from the same plate, which anyone in fifty years from now might well describe as different states. In the case of impressions printed many years ago the artist himself is often in considerable doubt as to their exact order’. It is thus rarely possible to assign dates to individual states, if states they are, and the modern cataloguer is likely to be able to offer few advances on Hardie's categorisation. A final qualification is that the publication dates given by Short in his lettering are not necessarily the dates of production, and it will be seen from the following notes that a period of years sometimes elapsed between the production of an etching and its completion as a mezzotint. The technical comments by Short himself quoted here may be found in Hardie's catalogue entries, having been transcribed by him, very often from conversations with the artist. Hardie also preserved the commentaries by Rawlinson that had appeared in Dunthorne's catalogue of 1897.
T05048 Chain of Alps from Grenoble to Chamberi pub.1887
Etching 178 × 259 (7 × 10 3/16) on laid paper 275 × 403 (10 13/16 × 15 7/8); plate-mark 216 × 292 (8 1/2 × 11 1/2)
Inscribed ‘Frank Short’ below image b.r. Etched and engraved inscriptions; ‘FS’ in monogram b.l. of image, ‘FRANK SHORT SCULP. AFTER J.M.W. TURNER’ below image b.r.
Lit: Strange 1908, no.43; Hardie 1938, no.7
The published state of the etching. One of the first twelve Liber subjects issued by Dunthorne. The original plate (Finberg 1924, pp.195–6, no.49) had been etched by Turner himself and engraved by William Say. It was published in 1812. Turner's drawing for it in the Tate Gallery (D 08150; TB CXVII V) was developed from a coloured study he had made during his Swiss tour in 1802, in his ‘St Gothard and Mont Blanc’ sketchbook, also in the Tate Gallery (D04618; TB LXXV 26): Short's mezzotint version passed through two states and was published in 1887.
Tate Gallery: Illustrated Catalogue of Acquisitions 1986-88, London 1996 | <urn:uuid:24f9ee47-c0c1-4243-baed-daf564394659> | CC-MAIN-2022-33 | https://www.tate.org.uk/art/artworks/short-chain-of-alps-from-grenoble-to-chamberi-t05048 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.973356 | 2,482 | 1.726563 | 2 |
Sacramento County fined for labor code violations
Employee says safety concerns ignored
The California Division of Occupational Safety, better known as Cal-OSHA, has cited Sacramento County and levied fines totaling $3,370 for failing to follow safety procedures.
A county employee told KCRA 3 that a water leak in a downtown Sacramento building exposed other workers to asbestos following an incident in August 2012.
Jeff Rommel is a safety specialist for Sacramento County and contacted KCRA 3 on his own volition as a whistle-blower.
He said he filed his complaint with Cal-OSHA because he believes safety concerns were being ignored.
The water leak started in the mechanical room up on the fourth floor of the county's old administration building on Seventh Street and spread to offices below.
"The bulk samples did show asbestos," Rommel told KCRA 3.
Rommel provided pictures to KCRA 3, showing the damage to ceilings and walls where employees worked on the third floor.
Rommel wasn't present when the water leak occurred, but told KCRA 3 he got involved because fellow workers told him asbestos was left on the floor with fans blowing.
"I tried taking this up the chain of command like I was supposed to. I was written up," Rommel said. "The policies were not followed."
Cal-OSHA cited Sacramento County for failing to report the incident to state regulators.
The county was also sanctioned for failing to adequately train its workers in emergency asbestos removal and how to properly fit respiratory equipment.
Sacramento County is now appealing the $3,370 in fines and told KCRA 3 it could not comment on the violations.
But in a letter to Cal-OSHA, county officials stated they removed the debris and insisted it did not contain asbestos.
Michael Landy, a senior safety specialist stated, "The response to this incident was both immediate and effective."
The union president for the county's engineers told KCRA 3 that several of their members are concerned about potential exposure to asbestos.
"They haven't been successful in getting any answers, and I think that's why we've scheduled an appointment with Cal-OSHA," said Sonia Hernandez.
The water leak has since been repaired, but the internal fighting within the ranks is still ongoing.
"Overall what do I want people to know?" asked Jeff Rommel. "That it happened."
Sacramento County engineers are hoping to know more after their meeting with Cal-OSHA on Oct. 9. | <urn:uuid:99655b2f-768d-449f-86fd-1949a80b2074> | CC-MAIN-2022-33 | https://www.kcra.com/article/sacramento-county-fined-for-labor-code-violations/6408152 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.978557 | 513 | 1.765625 | 2 |
Recently we gave you a look down the 155 mm barrel M109 Howitzer. Now it’s time for something similar, yet different.
Böker Knives, from the City of Blades Solingen (Germany), have been making blades since 1869. Some 150 years later TFB is happy to report about a knife with some pretty cool ingredients: Barrel Steel from the Leopard Main Battle Tank.
Boker takes the gun barrel steel of the legendary Leopard Main Battle Tank. The steel is then forged by hand into a Damascus steel. The quality of the steel is said to be excellent, but I have a feeling most of these knives will remain unused in collectors hands.
According to Boker, this specialty steel was never available to the open market as it was only used for the military. Boker added a chromium-manganese and vanadium tool steel alloy, which is said to create an extremely wear-resistant steel. The result is a high hardness for Damascus steel (61-63 HRC).
Leopard-Damascus II – The successor of our first knife with a Damascus blade forged out of the barrel of the German battle tank Leopard I. The edge holding ability is much higher compared to what other steel can achieve. A hardness of 61-63 HRC gives you an indication what to expect.
The Leopard-Damascus II uses a Damascus pattern called Large Pyramid. The handle material is hard-coated 6061-T6 aluminum with Ziracote wood inserts. The clip can be switched for tip-up or tip-down carry.
The knife includes a certificate of authenticity and a wooden presentation box.
Unfortunately, there are zero Leopard Main Battle Tanks in this video, but a lot of knives made from some of it.
The third generation of the Boker Leopard-Damascus knife is entirely manufactured by hand with over 300 layers of Damascus steel. The three different steel types can clearly be distinguished in every blade, and one of the layers will be from the Leopard MBT.
In case that is too much, you can still own a piece of a Leopard’s barrel for about 65 USD, with the Boker Leopard Damascus Bottle Opener. | <urn:uuid:f8690a69-9a9f-4122-b5e2-2b89b84bd410> | CC-MAIN-2022-33 | https://www.thefirearmblog.com/blog/2019/02/06/leopard-main-battle-tank-knives/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.931531 | 446 | 1.804688 | 2 |
Welcome to the Museum Page. Here you will be able to view various antique porcelain and English Staffordshire pottery,and civil war era shipwreck antiques and collectibles. All the artifacts were recovered fully intact from the 1866 shipwreck “Baltic” which sunk in the great Bahamian hurricane of October 1st 1866 loaded with antique porcelain and English Staffordshire pottery while enroute from Europe and New York to Galveston Texas at the end of the Civil war.
Our research indicates that the majority of the cargo loaded onto the brig Baltic was ordered by a Mr. Lent Munson Hitchcock, owner of the Tremont Hotel on the corner of Post Office and Tremont Streets in Galveston. The Tremont was considered to be the most impressive and distinguished hotel in the Republic of Texas at the time. Some of the guests included Texas President Anson Jones and various dignitaries from Europe including foreign ministers. Sam Huston gave his last public speech during the Civil War at the Tremont Hotel.
Many wounded Confederate soldiers were quartered in the Tremont until a fire destroyed the Hotel and much of the Strand District on June 21st of 1865.
The Baltic cargo included all the necessary supplies for rebuilding and restocking the Tremont Hotel and Mr. Hitchcock’s general store and ships chandlery such as a portable saw mill, a large consignment of window plate glass, shoe shine kits, food stuffs, medical supplies and equipment, Staffordshire china and porcelain dinnerware, a large array of glassware, Cathedral pickle bottles and snuff jars and luxury items including ornate porcelain inkwells from Germany. Also included were hand made Reed Stem Clay Smoking Pipes manufactured in Pamplin Depot,Virginia as well as Enemas and Vaginal Syringes marked as patented by Goodyear in 1851 and Bleeder hoses marked as patented by Davidsons 1n 1857.
After the loss of the Baltic in the great Bahamas hurricane of 1866, Galveston was struck by another hurricane in 1867 which further delayed the rebuilding of the Tremont Hotel. Mr. Hitchcock passed away in 1869 and it was not until 1870 that a group of fellow Galveston businessmen decided to continue with the rebuilding. The new Tremont Hotel opened its’ doors in 1872 a full seven years after the great fire.
Twenty four American, English Staffordshire, and German manufacturers have been identified dating from early 1845 through late 1865 including William Adams IV, Jacob Furnival, John Maddock, Meakin, Edward Clarke, Bridgewood & Clarke, Hughes & Bennett, T&R Boote, Old Hall Earthenware, Wooliscroft, William Cookworthy, William Ridgway and Pinder,Bourne & Co.
Also included in the recovered cargo were porcelain inkwell figurines which had the numbers relating to the Ducal Real Porcelain Factory owned by Duke Carl Eugen Von Wurttemberg established in 1758. In 1816 his successor sold the molds to Edward Kick in Amberg, Bavaria where they were called Kronenburg porcelain.
We have also identified several American manufacturers including Morrison and Carr New York of the New York City Pottery, several glass manufacturers including the Cohansey Glass Works and F&JN. Bodine of Bridgeton New Jersey, and The Cape Cod Glass Co. of Sandwich, Massachusetts, and J.J. Mapes of 61 Front Street New York.
The original molds were owned by The Ducal Real Porcelain Factory founded in 1758 by the Duke Carl Eugen Von Wurttemberg. On his death in 1816 the molds were sold to Eduard Kick of Amberg, Bavaria and later called Kronenburg Porcelain.
Click to enlarge
Click to enlarge
Inkwell Shepherd With Goat is marked 982.
Click to enlarge | <urn:uuid:9200e62c-2bd5-42ac-9396-a31e60a74c7a> | CC-MAIN-2022-33 | https://www.historicsitesandshipwrecks.com/museum/nggallery/page/20 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.958342 | 819 | 1.890625 | 2 |
Africa is undergoing impressive urban growth. This continent is likely to be the fastest urbanizing continent in the world. The continent who was alongside Asia one of the least urbanized in the world back in 2014, is now demonstrating fast urbanization rates and is envisioned to reach a 2.4 billion population within the next decades favoring cities over rural areas.
It’s no secret that megacities across Africa are increasingly popping up. In fact, it is expected that 6 of the world’s 41 megacities will be African, the cities being Cairo, Lagos, and Kinshasa joined by Johannesburg, Luanda, and Dar es Salaam. Some of these cities are among the most developed cities in Africa.
Similar to all other megacities in the world, Africa’s largest cities are dealing with challenges such as traffic, pollution, inadequate housing, and public spaces. To fix the megacities inefficiencies, different countries in Africa are coming up with innovations and ideas to solve the problem and one of the best solutions they came up with is building smart cities.
Maybe it was an unreachable dream to think of having smart cities in Africa, but as the countries in this continent are constantly improving, it’s not hard to see African versions of Singapore, Dubai, and New York City. In this post, we’ll introduce you to the smartest cities in Africa, but first, let’s see what the term ‘Smart City’ in Africa means.
According to Wikipedia, the term ‘smart city’ refers to an urban area that uses different types of electronic methods and sensors to collect data. Insights gained from that data are used to manage assets, resources, and services efficiently; in return, that data is used to improve the operations across the city.
The purpose of the Smart Cities Mission is to drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology, especially technology that leads to Smart outcomes.
The main features of a smart city are:
- Adequate water supply
- Assured electricity supply
- Sanitation, including solid waste management
- Efficient urban mobility and public transport
- Affordable housing, especially for the poor
- Robust IT connectivity and digitization
- Good governance, especially e-Governance and citizen participation
Some of the main reasons why Africa is the best continent for building smart cities are:
- Limited Urban Infrastructure: Since many African cities haven’t been previously urbanized and have little to no infrastructures in the cities, there’s no cost for renewing old amenities which makes building smart cities in Africa cheaper and faster.
- A growing African middle class: About 170 million out of Africa’s 1.3 billion people are now classified as middle class. For example, according to WorldData, in Ethiopia alone, the middle class is set to explode over the next decade and will grow from approximately 716 thousand people today to over 9.6 million by 2030, a growth of over 1,200%.
- Fast urbanization: Africa is officially the fastest urbanizing continent in the world, especially in the East Africa region. The continent’s population is projected to double between now and 2050.
- African Entrepreneur spirit: African entrepreneurship is central to Africa’s future prosperity. The biggest business opportunities in the coming decade will be created by Africans who start businesses, generate jobs and wealth, and capture growth opportunities. Across Africa, necessity is the mother of invention.
- Mobile connectivity: According to the UN, there are 650 million mobile users in Africa, surpassing the number in the United States or Europe. In some African countries more people have access to a mobile phone than to clean water, a bank account, or electricity, the agencies add.
1- Cape Town, South Africa
Cape Town’s city hall has launched a four-pillar project in an effort to establish itself as a Smart City and has been hailed as the smartest city in Africa in 2021. From its real-time data efforts to improve emergency response, including fire and rescue, law enforcement, and disaster risk management to digital inclusion via free wifi enabled on city buses, Cape Town is the most developed city in Africa and also on its way to becoming one of the smartest cities in the world in near future.
Also, the city’s remote utility meter reading, part of South Africa’s IoT has eliminated manual data-capture errors and has already helped to reduce water usage and energy consumption by 10%. The benefits of real-time data can extend across farming optimization, to traffic management by informing travelers of congestion, crime management by using sensors that detect gunshots in crime zones, and waste management, in which metros are automatically informed by sensor-equipped bins when refuse needs to be collected.
2- Konza Technopolis City, Kenya
Located 60km from the center of Nairobi, Konza Techno City in Kenya is already famous as the “Silicon Valley of Africa”. The Kenyan government plans to complete the techno city sometime after 2030. The proposed satellite city will gather data from smart devices and sensors embedded in roadways and buildings, enabling optimization of traffic and infrastructure, smart communication services, and improved citizen participation.
According to its Smart City plan, Konza’s population will have direct access to collected data, including things like traffic maps, emergency warnings, and energy and water consumption. The availability of data will enable Konza’s population to participate directly in the operations of the city, practice more sustainable living patterns, and enhance overall inclusiveness. The site, spread across 5,000 acres, will not only be a center of technology and education but will provide new homes and leisure activities with shopping malls and other amenities. Kenya’s ICT sector continues to grow and is a world leader for mobile tech. The country wants this new “technopolis” to be a catalyst for the economy.
With all the efforts and plannings for it, Konza Technopolis City is one of the smartest cities in Africa.
3- Eko Atlantic City, Nigeria
Being built on the 10 square kilometers of reclaimed land from the Atlantic Ocean, Nigeria’s Eko Atlantic City is officially an International Commerce city in Nigeria and one of the smartest cities in Africa. Eko Atlantic is a privately funded project in partnership with the Lagos State Government. Once finished, it plans to be home to a quarter of a million people. The new city is connected off Victoria Island, a district in Lagos.
This ambitious tech-forward hub is underway following closely in the footsteps of predecessors like Dubai and Singapore. This is the reason why Eko Atlantic City is known as the “Dubai of Africa”. This city is bringing a new model in Africa where urban governance is shared between the private and public sectors.
The city has already become an active venue for popular afro-concerts and sports events like the Lagos City Marathon and Copa Lagos. Billed as the largest real estate project in Africa, Eko Atlantic is being built on tons of sand dredged from the Atlantic Ocean off the coast. According to Bloomberg, Eko Atlantic City’s completion year is 2023. But with 2 and 3 bedroom apartments being priced at $800,000 and more, it’s not yet clear when the Eko Atlantic City residential units are going to become fully occupied with the quarter of a million population capacity that it has.
Eko Atlantic City is one of the smartest cities in Africa.
4- Tatu City, Kenya
Tatu City, The 5,000-acre development is among the largest private foreign direct investments in Kenya. Tatu City has grown to be one of the most promising urban developments in Africa with its long-term goal of de-congesting the crowded capital of Nairobi. It aims to be a new urban center outside the capital Nairobi, and businesses are already located in the locality. In an attempt to lure companies, the city has a special economic status providing lower business taxes.
Home to more than 150,000 residents, Tatu City was initiated by Rendeavour, “Africa’s largest property developer.” This city offers amenities such as homes, schools, offices, a shopping district, medical clinics, nature areas, a sport and entertainment complex, and a manufacturing area. Tatu City represents a new way of living and thinking for all Kenyans, creating a unique live, work, and play environment that is free from traffic congestion and long-distance commuting.
Tatu City is one of the smartest cities in Africa.
5- Hope City, Ghana
Hope City is designed as a vertical city (acronym of Home, Office, People, Environment) composed of towers linked together by a system of bridges at different heights, including common activities and amenities. Made up of six towers, the hub will include a hospital, university, housing, and recreational areas.
Hope City is intended to promote – through Architecture – the sense of community, sharing common values in a common space. This city is supposed to be a completely new city, and as a new worldwide cultural anchor, it will attract international tourists, investors, and trades, by hosting the largest Pan-African Contemporary Art Foundation and the Science Center.
Hope City is among the smartest cities in Africa.
6- Waterfall City, South Africa
Located between Pretoria and Johannesburg, Waterfall City, the largest mixed-use development ever in South Africa is proudly one of the smartest cities in Africa. Waterfall has everything you would expect from a vibrant, modern city—from eight secure residential developments and two retirement villages, So far it has 9 notable residential estates; each tailored to different lifestyles and price points.
Waterfall City in South Africa has received several international awards so far; including two CNBC International Property Awards for “Best International Retirement Development in the World” and “Best Retirement Development in South Africa” in addition to the Globals 2011 Award for “World’s Best Retirement Resort”.
Waterfall City is one of the smartest cities in Africa.
7- Vision City, Rwanda
Just outside of Rwanda’s capital Kigali is Vision City, the country’s largest housing project. It is part of the government’s strategy to embrace “smart cities.” The town square will have free wifi and the street lamps will be solar-powered.
Vision City is the largest residential housing project in Rwanda’s history and among the smartest cities in Africa.
8- Kigali, Rwanda
Rwanda’s capital city is transforming. The 2020 Kigali Conceptual Masterplan plans to remodel Kigali into a high-rise, modern and tech-orientated city. Kigali has already been changed a lot in the last few decades, trying to make a successful African story, making itself one of the smartest cities in Africa. For example, Kigali is the cleanest city in Africa, also one of the most developed cities in Africa.
9- King City, Ghana
King City, developed by Rendeavour, is a mixed-use development in western Ghana. The site is near the country’s mining region and hopes to capitalize on the growth of the sector. It’s located near Ghana’s third-largest city, Takoradi. King City will accommodate residential and commercial growth associated with the region’s mining and energy sector boom.
King City is supposed to be among the smartest cities in Africa.
10- Modderfontein, South Africa
Initially established as a mining town, Modderfontein is undergoing a process of infrastructure development for residential, industrial, and commercial purposes. The development is situated on 1 600 hectares of land north of Johannesburg. Modderfontein is already famous as the “Manhattan of Africa.” This city is among the smartest cities in Africa. | <urn:uuid:8ca7384a-0c6e-406d-97aa-c347aa07d34b> | CC-MAIN-2022-33 | https://delusionalbubble.com/top-10-smartest-cities-in-africa-this-year/?noamp=mobile | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.939803 | 2,493 | 2.734375 | 3 |
Tradition & Travel
Judaism is a way of life on the road no less than at home. Kosher food and a Sabbath-friendly place to stay are essential considerations for Jewish travellers. Tefillin worn by observant Jews during weekday morning prayers, prayer books, psalms, and the Hebrew Bible are familiar travel companions.
For millennia, Jews journeyed for commerce and pilgrimage. Travellers connected far-flung communities whilst bridging between and amongst other civilisations.
Travel could be difficult and perilous. Embarking on a journey – whether by land, sea, or nowadays air, Jews recite a travel prayer appealing to Divine providence to guide them safely to their destination and back.
It is an ancient prayer cited in the Talmud with emendations made over time and according to rite:
“May it be Thy will, O Lord my God, to lead me forth in peace and direct my steps in peace and uphold me in peace, and deliver me from the hand of every enemy and ambush by the way, and send a blessing on the works of my hands, and cause me to find grace, kindness, and mercy in Thy eyes and in the eyes of all who see me. Blessed art Thou, O Lord, who hearkenest unto prayer.”
Jewish travellers could reasonably expect hospitality from co-religionists. Study halls might serve as makeshift hostels. A friendly welcome is a biblically-grounded virtue recalling Abraham’s embrace of the stranger. The dictum “let all who are hungry come and eat” – is hallowed in Talmud and enshrined in the Passover Haggadah.
During the Middle Ages, European communities provided meals and lodgings for itinerant Jews. It is commendable to have a table guest – especially on the Sabbath – ideally, one who is religiously erudite, displays business acumen, and enjoys engaging in matrimonial matchmaking.
Finally, when our traveller was safely home, it was time to recite the Benediction of Deliverance in the synagogue before a Torah scroll. | <urn:uuid:35323b24-d581-4528-b3f6-3b5da1e54c48> | CC-MAIN-2022-33 | https://journeys.nli.org.il/story/tradition-travel | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.933428 | 435 | 2.8125 | 3 |
I’ve been thinking about this quote the entire week: “All of humanity’s problems stem from man’s inability to sit quietly in a room.” This has never been more true than today. As 2020 blurred lines between ‘work’ and ‘life’, we were literally stuck in, a, room. Yet, as a society, we were more active than ever.
In April 2020, this is how our Zoom usage spiked:
And this is how we coped with social distancing in April 2020:
This oddity, though, is the new normal now.
As our problems still stay the same (or are exacerbated with this), it’s useful to think about the quote above and reflect on when productivity itself becomes ‘unproductive’.
We sacrifice leisure for future productivity
Bertrand Russell wrote that our society is guided by “continually fresh schemes, by which present leisure is to be sacrificed to future productivity.” This is exactly why we prefer to work a bit more than what’s required.
We cannot sit idle
This is also exactly one of the reasons why we have “problems”: We have lost the ability to sit idle. In her book Open House for Butterflies, Ruth Krauss writes: “Everybody should be quiet near a little stream and listen.”
We have redefined leisure
One article that particularly struck me was this one from Brainpickings, that reminded me of how our relationship with ‘leisure’ as a thing has fundamentally changed. Today, we think of leisure only in the context of work. We think of leisure as a “break” from work, but that is not true leisure.
The simple “break” from work — the kind that lasts an hour, or the kind that lasts a week or longer — is part and parcel of daily working life… Nobody who wants leisure merely for the sake of “refreshment” will experience its authentic fruit, the deep refreshment that comes from a deep sleep.
Leisure has a much deeper meaning, which, Josef Pieper puts very well:
This is why the ability to be “at leisure” is one of the basic powers of the human soul. Like the gift of contemplative self-immersion in Being, and the ability to uplift one’s spirits in festivity, the power to be at leisure is the power to step beyond the working world and win contact with those superhuman, life-giving forces that can send us, renewed and alive again, into the busy world of work…
This is true leisure, independent of work.
When Productivity becomes (un)productive
With this context in place, note that when you’re not able to sit quietly in the room that you’re working from, then:
- You have sacrificed leisure for future productivity, or
- You cannot sit idle and listen, or
- You have misunderstood leisure as a “break” from work.
This understanding has greatly helped me, quite ironically, supercharge my productivity. The reason is simple: Productivity multiplies when you give yourself a ‘fun factor’, or better, a ‘leisure factor.’
I’ve been in quite a few rabbit holes this week, but this, in particular, was the best. Dive deep into this gem of a resource, to understand complex ideas explained in a visually appealing way. 😊 | <urn:uuid:b4f06470-a1b6-4e74-b81a-fe82c8dcb310> | CC-MAIN-2022-33 | https://www.abhinavkejriwal.com/when-productivity-is-unproductive/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.957145 | 742 | 2.015625 | 2 |
Maybe that title should read future “imagineer” since that’s what Jonathan Bopp wants to be one day. Today Jonathan and the Westminster Cyborg Cats will be at the FIRST Robotics National Championship. They won the Rookie All-Star Award at the regional competition, which advanced them to the national competition.
Lisa Harding, Jonathan’s science teacher, said he introduced her and the school to FIRST Robotics. He helped start the school’s first science club. Within six months that club was building robots and holding its own FIRST-like competitions.
Jonathan designed the robot in NX. He had learned the CAD program last Spring. Siemens PLM employee Jeff Schultz teaches NX at Westminster. Here’s a closeup of the robot in NX.
More on Jeff and the NX course at Westminster in another blog post. And more to come on the Cyborg Cats as I’m headed out the door to go watch them compete. In the meantime I’ll leave you with a video the students at Westminster put together.
Good luck to all the FIRST Robotics teams! | <urn:uuid:8d072cab-4433-4fea-8a0d-2b7a37d44590> | CC-MAIN-2022-33 | https://blogs.sw.siemens.com/news/meet-future-engineer-jonathan-bopp/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.952858 | 229 | 1.84375 | 2 |
Increasing demands on mobility and transport, but limited space above ground, lead to new traffic routes being built, even more underground in the form of tunnels. In addition to improving the traffic situation, tunnels offer the possibility of contributing to climate-friendly heating by indirectly serving as geothermal power plants. In this study, the geothermal potential of the future longest railway tunnel in the world, the Brenner Base Tunnel, was evaluated. At the Brenner Base Tunnel, warm water naturally flows from the apex of the tunnel towards the city of Innsbruck, Austria. In order to estimate its geothermal potential, hydrological data of discharge rates and temperatures were investigated and analyzed. The investigations indicated the highest geothermal potential in the summertime, while the lowest occurs during winter. It could be shown that these variations were a result of cooling during discharge through areas of low overburden (mid mountain range), where the tunnel atmosphere is increasingly influenced by the air temperatures outside the tunnel. Nevertheless, the calculations showed that there will be a usable potential after completion of the tunnel.
- geothermal energy
- geothermal potential
- sectional discharges
- water inflow
ASJC Scopus subject areas
- Chemical Engineering (miscellaneous)
- Process Chemistry and Technology | <urn:uuid:dfebb8d5-7ed3-4e14-81bd-6c1590fed3db> | CC-MAIN-2022-33 | https://graz.pure.elsevier.com/en/publications/geothermal-potential-of-the-brenner-base-tunnelinitial-evaluation | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.931914 | 277 | 3.546875 | 4 |
The Shell Graduate Programme is a rigorous development framework of specific competences, business-critical capabilities, and critical experiences that will enable you to become a competitive professional by the end of your 3-year programme.
Right from the start, you will be given a challenging hands-on role, working in a diverse, global environment. You will be supervised and mentored with frequent reviews as part of a structured development programme. You will also be learning alongside brilliant people from all over the world, with the resources and support to explore new ways of thinking and working – all in all, an unbeatable experience.
Shell is vertically integrated and is active in every area of the oil and gas industry, including exploration, production, refining, transport, distribution and marketing, petrochemicals, power generation, and trading. Shell has operations in over 99 countries, produces around 3.7 million barrels of oil equivalent per day and has around 44,000 service stations worldwide. As of 31 December 2019, Shell had total proved reserves of 11.1 billion barrels (1.76×109 m3) of oil equivalent. Shell USA, its principal subsidiary in the United States, is one of its largest businesses. Shell holds 44% of Raízen, a publicly listed joint venture with Cosan, which is the third-largest Brazil-based energy company. In addition to the main Shell brand, the company also owns the Jiffy Lube, Pennzoil and Quaker State brands.
Shell was formed in 1907 through the merger of Royal Dutch Petroleum Company of the Netherlands and The “Shell” Transport and Trading Company of the United Kingdom. The combined company rapidly became the leading competitor of the American Standard Oil and by 1920 Shell was the largest producer of oil in the world. Shell first entered the chemicals industry in 1929. Shell was one of the “Seven Sisters” which dominated the global petroleum industry from the mid-1940s to the mid-1970s. In 1964 Shell was a partner in the world’s first commercial sea transportation of liquefied natural gas (LNG). In 1970 Shell acquired the mining company Billiton, which it subsequently sold in 1994 and now forms part of BHP. In recent decades gas has become an increasingly important part of Shell’s business and Shell acquired BG Group in 2016.
Shell is a constituent of the FTSE 100 Indexand had a market capitalisation of £156 billion at the close of trading on 11 February 2022, by far the largest of any company listed on the LSE. Until its unification in 2005 as Royal Dutch Shell plc, the firm operated as a dual-listed company, whereby the British and Dutch companies maintained their legal existence and separate listings but operated as a single-unit partnership. From 2005 to 2022 the company had its headquarters in The Hague, its registered office in London and had two types of shares (A and B). In January 2022, the firm merged the A and B shares, moved its headquarters to London, and changed its name to Shell plc. The Shell logo is known as the “pecten” after the sea shell Pecten maximus; the current version was designed by Raymond Loewy in 1971.
Eligibility Requirements for the Shell Graduate Programme
Applicants from all approved Universities with a bachelor’s degree in related subject; Not more than 3 years post-graduation
Minimum of a 2:1 class of degree (Second class upper)
Must have completed the mandatory 1-year National Youth Service Corps (NYSC)
Be eligible to work in Nigeria.
Join the Shell Graduate Programme and Power Change from Day One.
For More Information: | <urn:uuid:f2fe604c-c9de-4349-bd39-cb3f048c5df5> | CC-MAIN-2022-33 | https://osscylot.com/2022/07/08/2022-shell-graduate-programme/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.96095 | 750 | 1.539063 | 2 |
Application Deadline: August 20, 2022
AWOLA (Africa Women Leaders in Agro-ecology) is a leadership career development initiative of the PELUM network, with the aim of equipping women working on agroecology, sustainable agriculture and food systems with leadership skills. Through the AWOLA initiative, the PELUM network envisions strengthening leadership capacities and the active participation of women in agro-ecology institutions.
PELUM association, the initiative owner, is a regional network of over 250 civil society organizations in 12 countries in East, Central and Southern Africa founded in 1995 and working in the area of participatory ecological land use management. The Association works to improve the livelihoods of small-scale farmers and the sustainability of farming communities, by fostering ecological land use management. With country chapters in several African countries.
AWOLA aims to put women at the heart of transforming African agriculture. The 3 year leadership program aims to create high level women leadership in agroecology, sustainable agriculture and food systems transformation, who will influence and negotiate for the space of agroecology in policies and programs across African countries.
- Mentorship: The actual mentorship will entail a process where mentee and mentors who are at different scales and career levels develop supportive relationships around their professional and personal capacities. The process will entail a matchmaking session based on the gaps and skills across mentees and mentors.
- Training: AWOLA will support mentees in a 1 year program (through virtual and face to face sessions), who will be trained to become leaders and effective negotiators, in influencing policies and programming while building collaborations with different stakeholders for desired outcomes. Through AWOLA mentees and mentors will be supported to participate in structured learning to build up on the agroecology and leadership knowledge base.
- Development of leadership innovation ideas: The mentees and mentors will be supported to develop networks and work on innovation ideas. The innovation ideas will be shared with PELUM networks for integration across programs, where possible the coalition members will be encouraged to fundraise and further supported through the PELUM network to implement their ideas with the aim of supporting transformation of agriculture and food systems.
- The AWOLA mentees and mentors will be identified through a competitive selection process that will include assessing their experience and leadership potential in agroecology, agriculture, and food systems development.
- Potential mentees and mentors will respond to an open call for application that will require them to demonstrate their suitability (application here)A selection panel of experts in agroecology, agriculture, food systems and leadership will review the applications.
- The final selection will be carried out by the AWOLA advisory panel.
- July 25th – Application Open
- August 20th – Deadline for Application Submissions
- August 31st – Final Round Top Candidates Notified for Interviews
- September 16th – Final Round Interviews Conducted
- September 30th – Public announcement of Awardees
For More Information: | <urn:uuid:80221496-bc07-4fed-87e8-f0d6aebc1c06> | CC-MAIN-2022-33 | https://www.opportunitiesforafricans.com/africa-women-leaders-in-agro-ecology-awola-call-for-mentors-mentees/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.911813 | 629 | 1.929688 | 2 |
The hexadecimal color code #001a77 is a dark shade of blue. In the RGB color model #001a77 is comprised of 0% red, 10.2% green and 46.67% blue. In the HSL color space #001a77 has a hue of 227° (degrees), 100% saturation and 23% lightness. This color has an approximate wavelength of 466.93 nm.
Buy paint matching this color
If a man devotes himself to art, much evil is avoided that happens otherwise if one is idle.
<p style="color: #001a77">…</p>
The longer you look at an object, the more abstract it becomes, and, ironically, the more real.
<p style="background-color: #001a77">…</p>
It is a widely accepted notion among painters that it does not matter what one paints as long as it is well painted. This is the essence of academicism. There is no such thing as good painting about nothing.
<p style="text-shadow: 0.1em 0.1em 0.15em #001a77">…</p> | <urn:uuid:f120c337-e8aa-440e-8817-891686119ee2> | CC-MAIN-2022-33 | https://encycolorpedia.com/001a77 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.914895 | 251 | 1.601563 | 2 |
|A Patience game|
Carpet is a solitaire game where the object is to discard all cards to the foundations where the aces are already dealt.
The game starts with the aces separated from the deck to form the foundations. After the remaining 48 cards are shuffled, 20 cards are laid out on the tableau in a 5x4 grid fashion to form "the carpet." The remaining 28 cards make up the stock.
All cards from "the carpet" must be moved to the foundations up by suit (i.e. 2♠ over A♠). Any "holes on the carpet," i. e. gaps left behind by the cards that are moved to the foundations, are filled by cards from the waste pile or, if the waste pile is empty, the stock.
The stock cards are dealt one at the time on the waste pile and can be moved to the foundations or to the carpet if necessary. Once the stock is used up, all cards on the waste pile cannot be used as a new stock. Only the top card of the waste pile can be played.
The game is won when all of the cards are moved into the foundations. | <urn:uuid:57270c7f-0faa-4408-b6d5-3c9255ba53ee> | CC-MAIN-2022-33 | https://gambiter.com/solitaire/Carpet_solitaire.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.957994 | 262 | 2.234375 | 2 |
Bradley Tebo, professor of marine microbiology at Scripps Institution of Oceanography, University of California, San Diego, has been elected a fellow of the American Academy of Microbiology (AAM). Tebo is associated with Scripps' Marine Biology Research Division and Center for Marine Biotechnology and Biomedicine.
AAM recognizes "excellence, originality and creativity in all subspecialties of the microbial sciences." Fellows are elected through a highly selective, peer-reviewed process, based on scientific achievement and original contributions to microbiology.
Tebo's research focuses on geomicrobiology, marine biotechnology, environmental microbiology and the biogeochemical cycling of metals in the environment.
"Brad has been a pioneer in establishing and understanding the role of microbes in mediating metal transformations in the environment," said Ronald Burton, director of the Marine Biology Research Division at Scripps. "His work has encompassed both basic science-including the biochemistry, biophysics and molecular biology of manganese oxidation-as well as more applied aspects of heavy metal detoxification. Brad's work contributes to our basic understanding of biogeochemistry and is also directly applicable to bioremediation. The election to AAM recognizes the strength of these contributions."
Tebo is a member of the American Geophysical Union, the Geochemical Society, the American Chemical Society, the Oceanography Society, the American Association for the Advancement of Science and Sigma Xi.
AAM is the honorific leadership group within the American Society for Microbiology, the world's oldest life science organization. Based in Washington, D.C., AAM has more than 2,000 fellows in 37 countries. | <urn:uuid:978fb8f9-d2c7-4d6f-9a28-97a68e13b8ea> | CC-MAIN-2022-33 | https://scripps.ucsd.edu/news/scripps-oceanography-microbiologist-elected-fellow-american-academy-microbiology | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.911561 | 348 | 1.984375 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.