text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
We often tell people that “solar is simple.”
And from the outside it is. Solar panels go on your roof, there’s one or more inverters connected to your house, and voila you’re solar powered!
So why not go out and pay for a do-it-yourself kit off the internet, spend a week doing your own solar installation, and away you go?
The problem is that doing solar right is much more complicated than that. You have to understand and plan for shading, orientations, tilts, soiling, degradation, efficiency, voltage drops, voltage windows, power shaving, racking, building code, electrical code, permitting, wind loading, roof loading, material compatibility, and on and on and on… And most of these factors will change depending on where you are performing your installation.
Below I’ve listed a few best practices that every installer or installation should adhere to. Of course if you know all of the rules you know when it’s appropriate to bend or break them, but I’ll have to cover that in another post.
- Aesthetically pleasing array for the customer and the installer
- Array edges are parallel to roof edges
- Array is a “single plane” concealing fact that roofs are rarely flat and often have dips, droops, and peaks that can leave an array looking sloppy
- Conceal conduit on the exterior of the building when possible
- Travel in the attic and stay parallel to eaves, gutters, and trim
- Keep balance of system components (inverters, disconnects, etc) tidy
- Sometimes a customer is willing to do really horrendous things to their home to maximize production. Remember you’re not just installing for your customer but for all of their neighbors and their friends that haven’t seen the technology in use yet
- Design for the long-term
- Check the manufacturer warranties of all your materials to make sure you are installing the right material for the right job.
- Understand the lifetime of the materials you choose and their failure points
- Use appropriate materials treated lumber is not a good rooftop racking solution
- Actually read the installation instructions and know local building code to make sure that structurally your array will last for decades
- Understand how homes are constructed so you know the implications of one installation method over another
- Understand panel degradation and how it will affect system operation overtime; not just production but compatibility with inverters and incentives
- Prepare for maintenance
- While unlikely, there may come a time when you need to remove a panel or two to maintain or replace components underneath the array. Leave yourself working room on the roof to work safely if you can.
- Electrical code dictates how much wire can go into a conduit. Don’t shoot yourself in the foot by maxing out the conduit during your installation. Up-sizing your conduit should only cost about another $0.10/ft and will save heart ache when you need to pull wire, add another string, add different wire to appease an inspector, or change technologies in the future
- Don’t over reach when talking about the benefits of solar
- We are still in the process of building an industry here not just individual companies. By over-blowing the benefits we’re going to have customers that are angry about how solar over-promised and under-delivered. Don’t do that.
This is by far an exhaustive list, and I’ll add more as they come to mind. Anyone know of other great practices? | <urn:uuid:5f541346-c957-4389-b5c6-6b00ef702ee7> | CC-MAIN-2022-33 | https://www.a-rsolar.com/blog/best-practices-solar/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.92197 | 747 | 2.015625 | 2 |
GREAT Activity Cards: Older Adolescents
The Gender Roles, Equality and Transformations (GREAT) Project works to improve gender equity and reproductive health in Northern Uganda. GREAT uses radio drama, community mobilization, and small group discussions to promote dialogue and reflection among adolescents, with the goal of facilitating the formation of gender equitable norms and the adoption of attitudes and behaviors that may positively influence health outcomes among boys and girls, aged 10 to 29.
There are three sets of activity cards: one for girls and boys 10 to 14 years of age, one for young men and young women 15 to 19 years of age, and one for newly married and parenting young people from 15 to 19 years of age. Each activity card is meant to be used on its own to stimulate a fun group activity that includes a discussion on equality, reproductive health and safety from violence. A set of fact cards are included for reference.
This set of activity cards covers topics such as contraceptives, sexual decision making, healthy relationships, staying safe, problem solving, and planning for the future.
- Girl Safety Toolkit: A Resource for Practitioners
- Lever les Tabous: La sexualité et les approches promouvant l’égalité des genres pour mettre fin aux unions et aux mariages d’enfants, précoces et forcés
- Love, Children and Family Planning: Seven Discussion Guides for Christian Small Groups
- Community Communication MNCH e-Manual: Participatory Health Promotion Sessions
- GESI Toolkit
- Harnessing the Power of Videos
- IPC for Immunization Toolkit
- Bringing the Community Together to Plan for Disease Outbreaks and Other Emergencies
- The REPLACE Approach: Supporting Communities to End FGM
- Adolescents Living with HIV (ALHIV) Toolkit
March 25, 2019 | <urn:uuid:4596ced1-5f5c-445b-81f3-91eedd3e92a4> | CC-MAIN-2022-33 | https://thecompassforsbc.org/project-examples/great-activity-cards-older-adolescents | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.835102 | 383 | 3.375 | 3 |
In Pursuit of Everyday Creativity
9 Pages Posted: 28 Jul 2017 Last revised: 12 Sep 2017
Date Written: September 10, 2017
Creativity researchers have long paid careful attention to individual creativity, beginning with studies of well-known geniuses, and expanding to personality, biographical, cognitive, and social-psychological studies of individual creative behavior. Little is known, however, about the everyday psychological experience and associated creative behavior in the life and work of ordinary individuals. Yet evidence is mounting that such individuals can be responsible for important instances of creativity and innovation in the world: open innovation, user innovation, and citizen innovation. Research into this phenomenon could do much to advance the study and practice of creativity.
Suggested Citation: Suggested Citation | <urn:uuid:f26978ce-3ac5-410d-8ab0-7ea96ec65f81> | CC-MAIN-2022-33 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3010179 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.91744 | 154 | 2.5625 | 3 |
WASHINGTON – The Howard University’s 1867 Health Innovations Project and Center for Sickle Cell Disease have entered into a new partnership with the U.S. Department of Health and Human Services (HHS) aimed at finding ways to use technology and data to improve the everyday lives of patients with sickle cell disease, or SCD.
“Sickle cell disease is the most common genetic disease in the United States and primarily affects African Americans and other people of African descent,” said James G. Taylor VI, M.D., director of the Howard University Center for Sickle Cell Disease. “It leads to anemia, pain crisis, strokes, and other problems. We are excited to partner with HHS to use technology and data to address the long-standing challenges that patients with sickle cell disease face.”
To kick off the three-year partnership, Howard University and Health and Human Services will hold a new sickle cell disease innovation contest, called the Health+ Sickle Cell Disease Healthathon. The virtual event will take place Sept. 7-25. Patients, advocates, clinicians, researchers, designers, technologists, government employees, payers, policymakers, and members of the public will be invited to participate.
“HHS is working with Howard University to bring data-driven insights to a disease that deserves attention, innovation, and tech solutions. For far too long, people have suffered stigmatization and daily pain from this disease. Together, we can modernize sickle cell treatment and help people live better lives with sickle cell disease," said Admiral Brett P. Giroir, M.D., Assistant Secretary for Health at HHS.
Participants in the Health+ SCD Healthathon will be invited to develop and prototype solutions and ideas in response to specific challenges affecting patients with sickle cell disease, such as barriers in hospital emergency rooms and transition to adulthood. The prototype solutions and ideas will be reviewed by judges and contest winners will be awarded on Sept. 25 during a Healthathon Finale event. Learn more here
“The strategic partnership with HHS will identify and support opportunities for the government and private sector to accelerate meaningful innovation and technology solutions that address the challenges patients with SCD face on a daily basis,” said Michael Crawford, associate dean for strategy, outreach, and innovation at the Howard University College of Medicine.
The new sickle cell partnership will tackle long-standing challenges related to care for individuals and families affected by the disease: patient transition from pediatric to adult medicine, improving care during emergency department visits, enhancing patient and family engagement, and strengthening overall care coordination for sickle cell patients. About 100,000 Americans suffer from some form of the disease.
Under the partnership, the 1867 Health Innovations Project and the Center for Sickle Cell Disease will take the lead in gathering and collecting datasets related to or containing a subset of detail relevant to SCD, securing confirmation of data usage during the Healthathon event, and providing technology, innovation, and SCD expertise to promote the broad interest of the Healthathon.
The Center for Sickle Cell Disease, the Howard University College of Medicine, and Howard University Hospital have long served as a major international center for medical care, research, and other resources for people with sickle cell disease. Howard University’s Center for Sickle Cell Disease was founded in 1972 by the late Roland B. Scott, M.D., and has a distinguished history of leading clinical investigation in sickle cell disease.
Howard University launched the 1867 Health Innovations Project in April. Aptly named after the year the University was founded, 1867 aims to collaborate with innovators, entrepreneurs, researchers, and corporate partners to tackle complex health challenges confronting underserved populations in the Washington, D.C. region and beyond.
For more information about the 1867 Health Innovations Project, contact Michael Crawford, associate dean in the Howard University College of Medicine, firstname.lastname@example.org
About Howard University
Founded in 1867, Howard University is a private, research university that is comprised of 13 schools and colleges. Students pursue studies in more than 120 areas leading to undergraduate, graduate and professional degrees. The University operates with a commitment to Excellence in Truth and Service and has produced one Schwarzman Scholar, three Marshall Scholars, four Rhodes Scholars, 11 Truman Scholars, 25 Pickering Fellows, and more than 165 Fulbright recipients. Howard also produces more on-campus African-American Ph.D. recipients than any other university in the United States. For more information on Howard University, visit www.howard.edu. | <urn:uuid:35c43aca-89d3-4bb8-afc7-eb3569f3bba3> | CC-MAIN-2022-33 | https://medicine.howard.edu/content/howard-university-and-hhs-announce-sickle-cell-partnership-address-patient-care | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.931899 | 942 | 2.5 | 2 |
Posted 10:14 a.m. Monday, Aug. 16, 2021
Students head to rural La Crosse County for COVID safe haven
UW-La Crosse senior Elyse Weber knew the fall semester impacted by COVID-19 would be different. But the exercise science major and art minor didn’t expect it would include an opportunity to paint outdoors amid radiant autumn colors of rural La Crosse County.
While the pandemic closed the door on most in-person educational opportunities, the La Crosse’s Franciscan Sisters of Perpetual Adoration opened the door to 200 picturesque acres in Saint Joseph. The locale, just east of La Crosse gave UWL students an elaborate outdoor classroom of agricultural land, forest and prairie restoration.
“It was just so nice to get a break from all the virtual meetings and be able to enjoy the outdoors,” explains Weber, a Tuscan, Arizona, native. “Drawing from life is also super beneficial to improve your skills. There were countless areas to set up and observe.”
Along with fine-tuning her artistic skills, Weber gained an appreciation for the Coulee Region — among not only the land, but those who care for it.
“They keep the land so well kept,” she notes. “The weather was absolutely beautiful, and the trees were in the perfect condition to draw.”
Weber says the change of scenery gave her a new appreciation for her roots as well.
“I have realized over the past couple years that I always took Arizona's landscape for granted,” she says.
“I now appreciate all sorts of landscapes.”
Art Professor Jennifer Williams sought an inspiring and safe place for Weber and others in her painting classes, allowing them to make art "en plein air," French for “in the open air.” She’s thankful to FSPA for their spirit of collaboration and partnership.
“The site allowed for students to make a personal connection with the land, mindful of its significance to the FSPA community for generations,” explains Williams. “While our work would have taken us outdoors to work en plein air anyway this fall, pandemic or not, being able to connect with a place that others consider sacred brings a special connection to our work, an honoring.”
Williams hopes to bring her students back to site throughout the upcoming academic year, knowing that with Wisconsin’s winters it may be just a short visit.
“Artists benefit from making repeated visits to a place as inspiration for nature-related creative work,” she notes. “A brisk hike can include pauses for photography or quick sketches that inform studio work.”
FSPA Integral Ecology Director Beth Piggush says FSPA is opening the grounds to UWL and the city’s other higher ed institutions, Viterbo University and Western Technical College. She says they hope to introduce faculty and students to the land, along with planting the “seed” for additional research and educational opportunities.
“The visits this fall offered an opportunity to show the potential of the FSPA land on St. Joseph Ridge as a site for collaboration,” Piggush explains. “I was energized following each visit with UWL faculty because they understood our sustainability work to date and shared ideas about potential work together that might benefit the land and their students.”
UWL Community Engagement Coordinator Lisa Klein says one of her favorite parts of the new relationship is that both the FSPA and UWL are entering into the partnership without any particular goal in mind.
“FSPA has beautiful, private land that they would like to make available for future educational opportunities and research, and UWL has experts in many different disciplines who can create meaningful learning experiences for students, as well as develop their own scholarship,” she explains. “This is a unique opportunity for two community organizations to co-create future projects and imagine possibilities together.”
Klein says along with the Art Department, FSPA has welcomed faculty from the Biology, Earth Science & Geography, and Recreation Management & Therapeutic Recreation departments. She and Piggush were first introduced by Alysa Remsburg, an instructor in the UWL Environmental Studies Department who had already cultivated a relationship with FSPA.
Klein says the partnerships are what the Increasing Community Engagement pillar of the university’s strategic plan is all about. She is excited about the tremendous opportunities these relationships mean for UWL faculty and students, as well as the sisters and community.
“They have opened the door for discussion and exploration of how we can work together to maintain the integrity of the land while offering an opportunity for learning, study and research for our students and faculty,” Klein explains. “We are working together to imagine how we can learn from — and give back to — this beautiful property." | <urn:uuid:dcc5d06b-dfc6-43c6-a1fc-5f75be3015d3> | CC-MAIN-2022-33 | https://www.uwlax.edu/news/posts/country-class/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.960221 | 1,026 | 1.804688 | 2 |
The tech industry is usually chasing the most recent excitement phrase, one of which is “value stream administration”. Having said that, value stream administration is just not just a excitement phrase. It truly is a exercise that is enabling some corporations to leapfrog some others.
In accordance to the DevOps Institute, “Price StreamManagement is a new strategic and operational method to the details seize, analysis, planning, and implementation of effective modify in just the main cross‐functional or cross‐company processes needed to accomplish a certainly lean organization.”
Interestingly, it turns out that “lean” is the operative word simply because value stream administration requires value stream mapping. In accordance to GoLeanSixSigma.com, “Value Stream Mapping is a method for identifying and eliminating waste from a course of action [that] visually maps the circulation of steps, hold off, and details needed to deliver a products or provider.”
Almost speaking, value stream mapping and administration bridge the hole in between what an outcome organization would like to accomplish and how that outcome is achieved. It also offers insight into what’s performing, what is just not and why.
“Price stream administration elevates DevOps and DevSecOps into a strategic course of action administration part that complements tactic in a massive way,” said Jeff Kavanaugh, lead writer of The Are living Enterprise. “The pandemic confirmed that the corporations that experienced invested in their source chains and value stream administration were in a position to pivot rapidly simply because they have plenty of composition in spot that they could modify some parameters.”
Parsing the phrase
“Price” is no matter what the small business would like to deliver which advantages the organization, its buyers and/or personnel. Arguably, computer software builders and IT have been striving to assistance the small business satisfy its goals by means of laptop or computer-similar technologies for a long time. Having said that, more than time, it turned apparent that waterfall processes were turning into way too sluggish and inefficient to fit the accelerating speed of small business. As a result, agile computer software improvement, DevOps, and CI/CD emerged with just about every enabling even more rapidly computer software delivery cycles.
While computer software teams and IT have usually attempted to provide small business value by accumulating requirements or making person stories, you can find been a lack of visibility and collaboration in between the products entrepreneurs who reside in the small business and the people making people solutions. So, there was no constant “stream,” only tribes.
Price stream administration permits businesses to prolong agile ideas and an ethos of constant improvement out to the small business, equally of which are crucial in today’s period of digital transformation. With digital transformation, the small business and IT ought to get the job done collectively as a one, cohesive unit.
“In the close, all that issues is final results and final results are a operate of the suitable intersection of small business priorities, technologies capabilities and rising technologies,” said Sanjay Srivastava, main digital officer at international professional services company Genpact. “Price stream mapping enables you to [incorporate] people items so you can do it, replicate it, and scale it. But the underlying part is you’ve obtained to recognize the area of the dilemma set perfectly and you have to be pretty conversant in the rising technologies to discover that intersection.”
Finally, the “administration” piece of value stream administration requires details for selection-producing simply because as administration expert Peter Drucker after said, “If you won’t be able to measure every portion of your small business, you won’t be able to handle or improve it.” Having said that, to start off making use of details correctly, one ought to begin with a speculation to show or disprove.
“It truly is all about connecting folks collectively and producing guaranteed that we have a superior set of metrics that enable us to measure and recognize how effective the small business selection is and how successful we are on the delivery and functions aspect,” said Jean Louis Vignaud, head of ValueOps at semiconductor and infrastructure computer software answers supplier Broadcom. “When you hook up people small business initiatives down to the get the job done builders are executing, builders recognize what they are executing and why they are executing it.”
Enabling small business agility
If 2020 taught corporations everything, it was the need for extreme organizational agility and resilience, equally of which value stream administration can help aid.
“Software program is considerably a lot more strategic to the organization as portion of digital transformation. [As evidence], you hear corporations expressing, ‘We’re not an airline, we’re a computer software corporation,” said Mitch Ashley, CEO and managing analyst at ASG. “If computer software is hugely critical to the small business, but how do we know what’s occurring? How do we know we’re going to get what we imagine we’re going to get?”
Price stream administration enables the small business and IT to recognize what’s occurring as it can be occurring so course corrections can be produced, as important. Meanwhile, details is currently being generated and gathered that can assistance the organization consistently strengthen, whether or not it can be in a position to recognize causes and consequences far better or the price and time it requires to establish a widget.
“In a hyper-competitive planet, you have to just take a lot more dangers,” said Ashley. “Now you can employ items like feature flags simply because of your capability to enable and disable [application capabilities]. You can say in this marketplace, we’re going to go take a look at a new functionality or possibly we’re going to take a look at the same functionality implemented in two or a few diverse ways and measure the value that we’re receiving or not.”
In addition, the shared visibility permits a lot more effective collaboration and shared comprehension during the value chain.
“You want to track exactly where you might be introducing value and hitting bottlenecks or problems during the course of action so you can have an open conversation about exactly where we are these days compared to exactly where we want to be tomorrow,” said Mike Downard, director of functions at Silicon Mountain Systems.
Assistance from the leading ranges of the organization is also critical.
“[Price stream administration] requires a lot of participation so if we failed to have that, I imagine it would have been considerably a lot more challenging for us to accomplish,” said Downard. “Persons are at the middle of any course of action.”
Price stream administration is just not a new idea, but digital transformation has produced it crucial for a lot more kinds of corporations. As 2020 shown, turning into digital is important for survival. The accelerated level of modify necessitates businesses to turn into exceptionally agile, and to do that, the small business and IT ought to function in sync. Price stream administration can help.
Abide by up with these posts on IT tactic and innovation:
11 Means DevOps Is Evolving
Weighing Uncertainties of Transformation in the Experience of the Long run
Electronic Transformation: How Leaders Can Stand Out
Innovation Accelerates For the duration of the Pandemic
Lisa Morgan is a freelance author who addresses massive details and BI for InformationWeek. She has contributed posts, stories, and other kinds of written content to different publications and web pages ranging from SD Occasions to the Economist Clever Device. Recurrent places of protection include things like … View Full Bio
Far more Insights | <urn:uuid:c8e731b0-e50f-4aef-8227-c7af2ef248f6> | CC-MAIN-2022-33 | https://www.ottobonicomputer.com/value-stream-management-fact-or-fiction.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.939792 | 1,599 | 1.6875 | 2 |
Stories about History from February, 2009
The Armenian Observer posts video from 21 years ago showing rioters in Sumgait during an anti-Armenian pogrom which left 26 ethnic Armenians and 6 Azeris dead.
Rebecca Mackinnon from Rconversation discusses the rise of Net power in China: “Will the Chinese people rise above cyber-vigilantism and use the Internet to build a just and fair society governed by accountable leaders?”
“Zardari is doing exactly what Bhutto had done in 1971 – eliminating all challenges that may come in his way to become another “Civilian Martial Law Administrator”, comments Teeth Maestro while discussing the recent “verdict that refuses to give the democratically elected government its right to function.”
As Israeli authorities evict Arab residents and demolish their houses in Jerusalem, Arab bloggers are set on not letting this pass unnoticed. Another blogger calls for designating a week to blog for Jerusalem.
Following on from an earlier post, Sheki, Azerbaijan posts a photograph of a monument dedicated to those killed in the massacre of civilians in Khodjali, an Azeri inhabited town, during the Karabakh war. The blog notes that carnations have now become synonymous with grief and mourning in Azerbaijan and hopes...
Sheki, Azerbaijan marks the 17th anniversary of the massacre of hundreds of civilians in the Azeri-inhabited town of Khodjali during the conflict with Armenia over the disputed territory of Nagorno Karabakh. The blog says that such victims can be found in every war zone where people “become toys in hands...
Fauna from ChinaSMACK translates Chinese netizens’ reactions on the auction of stolen bronze relics in France.
Kaishao introduces (zh) a new google map mashup presented by Center for Geographic Information Science, Academia Sinica. The map combines Google Map with the maps of several counties of Taiwan illustrated by U.S. Millitary information agency back in 1944.
Real Hope for Haiti writes a detailed post about the island's Carnival traditions.
Cuban diaspora blogger Uncommon Sense wants us to remember “the BTTR Four”.
Guyana Providence Stadium posts photos from this year's Mashramani celebrations.
A Tsunami Museum opened in Aceh, Indonesia last Monday to commemorate the 230,000 people who died in the 2004 Asian tsunami. But some have criticized the project since they want the government to prioritize the homeless tsunami refugees.
Up to 70 students from the Amir Kabir University in Tehran were arrested today, Tuesday 24th of February, while protesting against the re-burial of five anonymous Iran-Iraq War martyrs in the grounds of the university. See videos of the protest and the first reactions on the blogosphere.
Georgian Live Music says the country's second largest city of Kutaisi was synonymous with rock and punk bands in the 1990s. The blog posts information and photos of some of them.
Brunei Darussalam celebrated it's twenty-five years of independence yestderday. To celebrate the Silver Jubilee, a grand parade was held at the National Stadium. Brunei blogs are buzzing with colourful photos of the historic occasion and many bloggers are sharing their aspirations for the nation.
In Mutatione Fortitudo decries the destruction of an historic part of the Azerbaijani capital, Baku, to make way for construction of a new boulevard.
Desherchobi posts a photo essay describing how Bangladeshis commemorate the martyrs who gave their lives for their mother tongue Bangla on 21st of February, 1952, now recognized as the International mother language day.
A Yankee-in-Belgrade writes about Belgrade's Museum of African Art.
Itching for Eestimaa writes about the history of WWII and the Holocaust in Estonia.
The recent film "The Milk of Sorrow" by Peruvian director Claudia Llosa was recently awarded with the Golden Bear at an international film festival in Berlin. Even though the film has yet to open in Peru, debate has started whether or not Llosa's portrayal of Andean life is accurate or in some cases racist towards the indigenous communities that figure prominently in her movies.
LJ user jolita (RUS) has posted Henri Cartier-Bresson's 1954-55 and 1973-74 photos of the Soviet Union in the ruguru LJ community. | <urn:uuid:04acbff9-0fee-4675-a328-2af359bc8f1d> | CC-MAIN-2022-33 | https://globalvoices.org/-/topics/history/?m=200902 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.941057 | 917 | 2.125 | 2 |
By Richard Black
Environment Correspondent, BBC News website
Here is a recipe for an explosive news cocktail.
Scientists need more data - and that only comes with time
Take the president of the world's most powerful nation. Add two intense and damaging natural storms which bring destruction to that country; then mix in the widely held view that the same nation's environmental policies are partially responsible for those storms.
In the polarised world of climate change, this cocktail has proved an irresistible temptation to organisations which campaign against President Bush's administration in support of enhanced action to curb greenhouse gas emissions.
The latest to succumb was the British newspaper The Independent, which screamed on its front page: "This is global warming", above an alarmingly portentous graphic of Hurricane Rita's projected path.
But is it global warming? What is the evidence that the growing concentrations of carbon dioxide and other greenhouse gases in the atmosphere are changing weather systems in such a way that hurricanes become more powerful, or more frequent?
Well above average
Certainly, 2005 appears to have been an unusually active year.
The US National Hurricane Center/Tropical Prediction Center comments in its August summary that "thus far in 2005, there have been 12 named storms and four hurricanes.
"These numbers are well above the long-term averages of 4.4 storms and 2.1 hurricanes that would normally have formed by this date."
But a single year's observation does not permit the divination of a long-term trend, or the attribution of that trend to a cause such as climatic warming.
"Based on recent research, the consensus view is that we don't expect global warming to make a difference to the frequency of hurricanes," explains Julian Heming, from the UK Meteorological Office.
"Activity is naturally very variable in terms of frequency, intensity and regional occurrence; in the Atlantic, there are active phases and not so active phases, and currently we're in the middle of an active phase.
"It's very dangerous to explain Rita or Katrina through global warming, because we have always had strong hurricanes in the USA - the strongest one on record dates back to 1935."
Records from the 20th Century suggest that hurricane formation over the Atlantic has changed phase every few decades: the 1940s and 50s were active, the 70s and 80s less so, while the currently active phase appears to have commenced in 1995.
A key factor in the formation of a tropical cyclone - a low-pressure region that can turn into a hurricane - is sea-surface temperature, which has to be above about 27 degrees Celsius.
So anything which changes the sea-surface temperature in the right parts of the world could theoretically affect hurricane formation.
Population growth means there is now more property to damage
The most recent study on the issue, published this month in the journal Science, found that while the incidence of hurricanes and tropical storms has remained roughly constant over the last 30 years, there has been a rise in the number of intense hurricanes with wind speeds above 211km/h (131mph).
The leader of that research project, Dr Peter Webster, believes there may be a link to climate change.
"What I think we can say is that the increase in intensity is probably accounted for by the increase in sea-surface temperature," he told the BBC News website, "and I think probably the sea-surface temperature increase is a manifestation of global warming."
"The problem is," observes Julian Heming, "that we can only look back about 35 years with satellite data; before that the record is somewhat unreliable, and 35 years isn't long enough to draw a definite conclusion.
"Before global satellite coverage, we're pretty sure there are gaps in the record; storms would start at sea and die out at sea, so we never knew about them."
The changing phases of Atlantic hurricane activity are not completely understood; but there appears to be a link to fluctuations in the thermohaline circulation, the global pattern of ocean currents which in western Europe appears as the Gulf Stream.
By causing the sea-surface temperature in the tropical Atlantic to change by even a degree Celsius, these fluctuations can bring major differences to the number of hurricanes generated in a particular year.
Other natural climate cycles such as the El Nino Southern Oscillation and the North Atlantic Oscillation may also play a role.
The other crucial factor with Katrina and Rita is where they landed.
Some hurricanes never reach land; others will hit a sparsely-populated area, causing minimal damage.
This also appears to be determined by weather systems, in particular the location of a region of high atmospheric pressure, the sub-tropical ridge.
"In the Atlantic, storms form in the east and move towards the west," says Julian Heming, "and at some point they turn northwards.
"Where they turn northwards has much to do with the weather conditions further north; 1995, for example, was a very active season with 19 named storms, but the US got away very lightly because the sub-tropical ridge did not extend right across the Atlantic, and many storms turned north before reaching the US.
"Last year it did extend across the Atlantic, and so hurricanes were forced much further west - hence Ivan, Jean, Charlie and Francis all hit the US."
Bigger and bolder
Every time a hurricane comes along - or a flood, or a drought, or a freeze, or a heatwave - the question is now asked "is it linked to global warming?"
A decade ago, that was not the case - a clear signal that climate change is now firmly established in the public mind and in the political arena.
Now that climate scientists are being taken seriously, they are also under pressure to produce instant answers.
One problem is that not all of those answers exist. Another problem is that some scientists - not to mention lobby groups, environmental organisations, politicians, newspapers and commentators - will go much further in their public statements than the data allow.
With such incendiary material, that is unlikely to change; but it is difficult to avoid the conclusion that we would all benefit from people on both wings of the issue looking rather more to research, however laboured its progress, and rather less to screaming headlines and easy quotes. | <urn:uuid:dd5433fc-58b8-40ba-88f8-56ff312b0108> | CC-MAIN-2022-33 | http://news.bbc.co.uk/2/hi/science/nature/4276242.stm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.958031 | 1,303 | 2.953125 | 3 |
Counting is one of the simplest math activity you can do at home. Whether you are cooking, playing outside, harvesting on the land, travelling, there are many things and ways to count with your children.
Here are some simple and fun ways to practice counting.
- How many peanuts are there?
Count & Share
- How many blueberries are there? How many can each of the four of us have?
Guess & Count
- How many pasta do you think there are? Now count them.
- Are there more red blocks or blue blocks?
- Are there less white blocks than blue blocks?
- Can you count them by 2s, by 5s, by 10s?
Count & Group
- How many crayons are there? How many groups of 5 crayons can you make?
Peanuts. By City Foodsters. CC 2.0 Licence. https://www.flickr.com/photos/cityfoodsters/15392253304
Bricks. CC0 Licence. https://pxhere.com/en/photo/1054948 | <urn:uuid:4ec0adc5-e4a0-44d3-b812-448c33d08194> | CC-MAIN-2022-33 | https://nunavik-ice.com/en/c/mathematics/things-to-count-at-home/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.952508 | 242 | 4.1875 | 4 |
When arriving at the airport or port, passengers are controlled by the US Customs and Border Protection (CBP). It is they who decide whether people are fit to enter the United States. To be eligible you must be in compliance with the following:
- Meet the criteria of the Immigration and Nationality Act.
- Be in possession of an authorized ESTA.
- Possess a valid passport under the VWP.
- Do not be a threat to the health, welfare, protection or safety of the country.
- Waive the right to protest against any decision by CBP regarding your eligibility. You will get this agreement by providing your biometric information to the authorities (giving your passport) and providing fingerprints and personal photographs. The only case in which an appeal can be made on a decision made by CBP is during the asylum application.
- To have met these conditions on previous entry to the United States under the VWP.
Example 1: Marc
Marc is known to his friends and family to be particularly paranoid about personal issues. He wants his life and interests to remain private.
Last month, for the first time, Marc arrived in the United States, in Seattle. There, Marc had to do immigration checks, and he was very surprised that the immigration officer, after examining his passport and travel authorization, asked him to give his fingerprints and make a portrait Of identity.
Marc wanted to know why.
As part of the visa waiver program, we are required to provide the biometric data. There is no exception to this obligation.
Immigration officers scrupulously follow the instructions, and they are the ones who make the final decision about your eligibility in the United States. It’s up to you to be serious.
An uncooperative or suspicious attitude can trigger further checks on your person, which may prevent you from entering the country.
Example 2: Shelly
Shelly is a citizen of Singapore who was denied a tourist visa by the US Embassy in 2001. By answering online questions to get her ESTA for her trip to Miami, Shelly had answered no to the question of whether she had ever been denied entry to the United States.
Upon arrival at Miami airport, during immigration checks, Shelly had the unpleasant surprise of being led separately in an office for clarification.
As you can imagine, the US Department of Immigration had a file on Shelly that reported that they were denied a visa in 2001.
After a few hours of waiting and further checks by the authorities, Shelly was granted the right to return, provided that she reported the 2001 incident in the future.
One of the conditions for entry into the United States is to comply with immigration laws, which implies the strictest honesty in answering all ESTA questions. | <urn:uuid:0f2e3610-1a44-4a7a-b093-099c50a3fa29> | CC-MAIN-2022-33 | https://www.esta-formulaire.us/en/esta-faqs/what-are-the-conditions-for-returning-to-the-united-states/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.97333 | 564 | 1.75 | 2 |
Louis (Ludwig) Martin, pioneer Gillespie County settler, was born on November 25, 1820, in Erndtebrück, Westphalia, son of Nicholas and Hedwig (Sinner) Martin. He sailed to Texas with the first shipload of immigrant recruits of the Adelsverein on the Johann Detthard, which landed at Galveston on November 24, 1844. He was among those who moved to New Braunfels in 1845, and from there he proceeded with many of the other German settlers to the area of present-day Fredericksburg, where he helped establish Gillespie County on December 15, 1847. He was chosen the first sheriff in June 1848 and served through 1850. He was also district clerk. Martin married Elisabet Arhelger of Rittershausen, Nassau, who had immigrated to Texas in 1845. They had eight children; the oldest was the first White child born in Fredericksburg. The family were Catholic, and services were held in their home at various times. The census of 1850 listed Martin as a farmer with a net worth of $1,500, a relatively large estate for the time and circumstances. In addition to farming and livestock raising, he provided freight service to area military installations and sold forage and general supplies to the public. He began buying and trading land early in the 1850s.
By 1853 Martin had moved to a site on the north bank of the Llano River in what would soon be Mason County, and settled at what became known as Hedwig's Hill. He was appointed the first postmaster on June 29, 1858. In 1860 his net worth was more than $9,000 and included 900 acres of land and 200 head of livestock. Martin was elected justice of the peace in Mason County in 1861 and 1862. He served with the Mason Minutemen in 1861 and in the frontier troops of Mason County's Company No. 1 under Capt. Alf Hunter. He continued his farming, ranching, and trading and freighting business during the war years, when he shared the pro-Union sympathies of many German Texans. He hauled cotton to various points in Mexico, where it could be traded for merchandise and British gold. He was seized by unknown assailants on one such trip to Eagle Pass on June 16, 1864, and hanged, possibly for the money he was supposed to have, or perhaps by Confederates. His wife was informed of the killing by the culprits and made the journey to recover the body. Martin was buried in the Fredericksburg cemetery.
Is history important to you?
We need your support because we are a non-profit organization that relies upon contributions from our community in order to record and preserve the history of our state. Every dollar helps.
Rudolph L. Biesele, The History of the German Settlements in Texas, 1831–1861 (Austin: Von Boeckmann-Jones, 1930; rpt. 1964). Gillespie County Historical Society, Pioneers in God's Hills (2 vols., Austin: Von Boeckmann-Jones, 1960, 1974).
Law, Law Enforcement, and Outlaws
Activism and Social Reform
Ranching and Cowboys
Patrons, Collectors, and Philanthropists
Ranchers and Cattlemen
The following, adapted from the Chicago Manual of Style, 15th edition, is the preferred citation for this entry.
Delmar J. Hayter,
Handbook of Texas Online,
accessed August 14, 2022,
Published by the Texas State Historical Association.
All copyrighted materials included within the Handbook of Texas Online are in accordance with Title 17 U.S.C. Section 107 related to Copyright and “Fair Use” for Non-Profit educational institutions, which permits the Texas State Historical Association (TSHA), to utilize copyrighted materials to further scholarship, education, and inform the public. The TSHA makes every effort to conform to the principles of fair use and to comply with copyright law. | <urn:uuid:b0f4e8a7-a1c8-49b1-a9f8-0167f4dcd072> | CC-MAIN-2022-33 | https://www.tshaonline.org/handbook/entries/martin-louis | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.97104 | 886 | 2.546875 | 3 |
You probably know that police officers require warrants before searching your body and your immediate environment. However, this is not a requirement in all cases. A police officer can conduct a search on you:
If You Have Been Arrested
If a police officer has already arrested you, then he or she doesn't need a warrant to conduct a search. This is true even if the arrest was made without a warrant. The reasoning is that you may be having concealed weapons, and the search allows the officer to unearth them and protect his or her person, as well as the general public.
This kind of search is only permitted to areas within your immediate vicinity. Therefore, the officer cannot arrest you in the street and take you home to search your house because even if you have weapons in the house, they are not endangering him or her.
If You Have Been Stopped For a Traffic Violation
If a police officer stops you for a traffic violation, then he or she is allowed to search your car without a warrant. However, this kind of search is limited to your body and the vehicle's interior (including the glove compartment), but not the trunk. The law only allows the officer to go through the trunk after he or she impounds the car.
When the Officer Believes that You Are About to Commit a Crime
You shouldn't expect a police officer to produce a warrant of arrest if he or she thinks that you are about to commit a crime. The law allows police officers to stop you if they have reasonable belief that you are about to commit a criminal activity. For example, if an officer sees you entering a shopping mall with a weapon, then he or she is allowed to stop and search. Clearly, it is reasonable for the officer to assume that you are planning to use the weapon to commit a robbery
If There are Exigent Circumstances
Not all situations of warrantless searches are as clear cut as the examples above. An officer of the law can legally search you without any warrant if there are exigent circumstances to support the arrest. For example, if police officers rush to a suspected crime scene after receiving reports of gunshots, then they can legally search any of the persons at the place.
If police officers search, detain or arrest you without a warrant, then you can engage a criminal lawyer like Brian Walker Law Firm, PC to examine the facts of the situation if you believe the search was uncalled for. Proof of illegal searches or arrest may be used to weaken your criminal charges.
We all know that lawyers are professionals who help people interpret and work with the law, but do you know how a law firm works from the inside out? I am a professional paralegal, and I have worked in both large and small law firms during my career. I can tell you that a successful law firm needs more than just lawyers to keep it running smoothly, and sometimes things can get really crazy! Take a tour through a law firm in my blog, and find out what really goes on behind the scenes of an active and successful law firm. | <urn:uuid:98208af9-8814-47d9-8672-14da07c0ee96> | CC-MAIN-2022-33 | https://alphabeticalist.com/2015/01/23/four-situations-in-which-the-police-do-not-need-a-warrant-to-search-you/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.971901 | 621 | 2.15625 | 2 |
The most social of Europe’s vultures, the Griffon Vulture, is making an extraordinary comeback in Europe following its decline in the 20th century, with its breeding population exceeding 35,000 pairs, including over 30,000 pairs in Spain alone. We here at the Vulture Conservation Foundation (VCF) are involved in different reintroduction and reinforcement projects across Europe. Here is the breakdown of this year’s Griffon Vulture conservation highlights that we were involved in.
LIFE Under Griffon Wings
Led by Sassari University, the LIFE Under Griffon Wings project aims to improve the conservation status of Griffon Vultures. Their conservation efforts include improving food availability, establishing a network of farm feeding stations that are managed by the livestock breeders themselves and tackling illegal wildlife poisoning. The project is also carrying out an extensive restocking programme to enhance the small population by translocating birds from wildlife rehabilitation centres in Spain to Sardinia.
The VCF secures and transports the Griffon Vultures from Spain, and up until now, we provided a total of 62 birds, fulfilling the requirements of the project.
Starting in 2016, the five-year LIFE RE-Vultures project was developed by Rewilding Europe, in collaboration with the Rewilding Rhodopes Foundation the Bulgarian Society for the Protection of Birds, WWF Greece, the Hellenic Ornithological Society and us here at the Vulture Conservation Foundation. The aim of the project is to support the recovery and further expansion of the populations of Cinereous and Griffon Vultures in the cross-border region of the Rhodope Mountain by improving natural prey availability, monitoring movements of birds to help understand the threats they face and carrying out activities that will reduce the mortality of the populations from threats such as illegal wildlife poisoning and collisions with electricity infrastructure.
This year, a total of 72 Griffon Vultures successfully fledged in the Eastern Rhodope Mountains, where we are working through the LIFE Re-Vultures project.
The Bulgarian Society for the Protection of Birds(BSPB) coordinated the annual Griffon Vulture census in the Balkans within the LIFE Re-Vultures project this November. Teams from Bulgaria, Greece, Serbia and North Macedonia counted a total of 564-571 Griffon Vultures. More specifically, they counted 336 in Bulgaria, 80-87 in Greece, 122 in Serbia and 26 in North Macedonia.
This summer, the Bulgarian Society for the Protection of Birds (BSPB) and Elektrorazpredelenie Yug EAD continued the provision of bird-related electrical poles in the Eastern Rhodopes within the framework of the project.
Here at the VCF, we monitor vultures using GPS tracking technology, which is a vital tool for conservationists. With GPS trackers, we can track the everyday position and movement of birds anywhere in the world. This data helps understand migration patterns, behaviour and foraging ranges, and helps identify threats. Essentially, trackers can help indicate a specific bird’s health and assist conservationists in carrying out widespread actions that mitigate the threats, safeguard flight paths and support the comeback of these species.
LIFE With Vultures
This year, a new LIFE project was approved and launched in October – LIFE with Vultures. The project aims to preserve the species in Cyprus. To protect the Griffon Vulture population on the island, BirdLife Cyprus, in cooperation with Game and Fauna Service, Terra Cypria and us here at the Vulture Conservation Foundation, will implement this conservation project, funded by the EU’s LIFE Programme. The project “Saving Griffon Vultures in Cyprus through concrete conservation actions” will address the main threats the species face such as poisoning, lack of safe food, collisions with power lines and restock the Griffon Vulture population to the island by transporting birds from Spain.
Learn about the 2019 conservation highlights of the other European vulture species:
- Egyptian Vulture
- Bearded Vulture
- Cinereous Vulture
Thank you for your continuous support. You can donate to the Vulture Conservation Foundation and help us continue our conservation work, protecting Europe’s vultures. | <urn:uuid:8daec494-f74d-4c66-84a1-f9a515274b61> | CC-MAIN-2022-33 | https://4vultures.org/blog/griffon-vulture-conservation-2019-overview/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.899258 | 879 | 2.734375 | 3 |
The pro-Beijing block says the law is necessary for Hong Kong to show appropriate respect for the anthem. Those found guilty of intentionally abusing the “march of the volunteers” would face up to three years in prison and fines of up to $6,450.
Hong Kong's legislature voted on Thursday in favour of a controversial bill that would criminalise abuse of China's national anthem.
The pro-democracy camp sees the anthem law as an infringement of freedom of expression and of the greater rights that residents of the semi-autonomous city have compared to mainland China.
Protests are expected outside the legislature.
What is the law?
Hong Kong’s National Anthem Bill, when passed into law, will govern the use and playing of the Chinese national anthem.
This includes provisions that threaten to punish those who insult the anthem with up to three years in jail and/or fines of up to $6,450.
The bill states that "all individuals and organisations" should respect and dignify the national anthem and play it and sing it on "appropriate occasions". It also orders that primary and secondary school students be taught to sing it, along with its history and etiquette.
Why is it controversial?
Anti-government protests last year were primarily aimed at resisting further integration with mainland China. The Chinese national anthem has been booed at several events, including football matches.
Protesters and anti-Beijing politicians say the bill represents the latest sign of what they see as accelerating interference from Beijing in the freewheeling former British colony.
Britain handed Hong Kong back to Chinese rule in 1997 with guarantees that the city's core freedoms and way of life would be protected under a "one country, two systems" formula, which Beijing says it respects.
The freedoms of speech, press, association and demonstration are explicitly written into the Basic Law, the mini-constitution that guides Hong Kong’s relationship with China, its sovereign power.
Opponents of the bill say those freedoms are now under threat.
More technically, some senior lawyers fear the bill is highly unusual in that it, in part, reflects the ideological aspirations of China's Communist Party that might prove difficult to enforce.
"It is the first Hong Kong law I've seen that looks like it was written in Beijing," one senior judge told Reuters recently, speaking privately. "It will be a nightmare to rule on."
The Hong Kong Bar Association acknowledged the need for such laws but said parts of the bill "deviate from the good traditions" of Hong Kong’s common law system.
It said there was a fundamental difference between that system and the "socialist legal system of mainland China which would include political ideology and conceptual guidance".
The law is coming on the heels of another controversy: China's decision to impose a national security law in Hong Kong.
Where did it come from?
For years, Chinese officials and their pro-Beijing allies in Hong Kong have wanted to instil a greater sense of patriotic pride across its freest, and most restive, city.
Hong Kong's government says the bill reflects the city's own legal system and situation.
"The main spirit of the … bill is 'respect', which bears absolutely no relations to 'restricting freedom of speech' as claimed by certain members of the community and definitely not a so-called 'evil law'," a spokesman said earlier this year.
Protests over the bill's passage are widely expected.
The government, under pressure from Beijing, has prioritised passing the bill into law before the end of this four-year legislative session in July.
Having been mired in a log-jam of legislative procedural battles, voting on the bill got underway on Thursday.
If the bill becomes law and is enforced, constitutional challenges can be expected in courts – both into the bill's content, and the procedural battles through which it passed. | <urn:uuid:5debf30e-758e-4a7f-9940-22e5a0332e17> | CC-MAIN-2022-33 | https://cms.trtworld.com/asia/all-you-need-to-know-about-china-s-controversial-national-anthem-bill-36949 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.960018 | 804 | 2.328125 | 2 |
The summer residence of the count bishops of Cahors, Château de Mercuès immerses guests into the region's medieval history during the time of the French Wars of Religion. Its strategic position overlooking the banks of the Lot River affords a stunning panoramic view over the surrounding countryside and the vineyards of Cahors. This 13th-century site is pervaded by a strange atmosphere connected to its history, which can be read in every room of the château. All of the rooms open onto either the vineyard or the gardens so that guests can live a life of luxury during their stay in Mercuès.
"The renaissance of an ancient grape variety. Cot, Malbec, Auxerrois: three names for a single vine plant. With its round leaves, airy bunches and dark skin, Malbec is a sure-fire hit for the great vineyards. In 25 years, I have never doubted the exceptional potential of this grape. From Cahors, its birthplace, to Mendoza, Argentina, I have tamed soils and vines and I have turned these Malbec juices into polymorphic and polychromatic, profoundly gourmet wines.
Our twentieth-century cellars are in the château: a visit and tasting you will definitely never forget!"
"Did you say Tuber Melanosporum?" A white marbled intense black, subtle and delicious in all its forms. This is actually the scientific name of the black truffle of south west France. 6 years ago, the Vigouroux family decided to plant a thousand truffle trees on its estate of Haute-Serre near Cahors. We aim to produce, harvest and present the black diamond as we would work on a great vintage. You will find it in all its glory in our menus concocted by our expert chef Julien Poisot."
"Visiting the cave is a special moment because it is rare to observe paintings there are nearly 30,000 years old and so well maintained. There are astonishing figures such as the Black Frieze or the punctuated Horses, but also footprints and stencilled hands. In all, the cave contains nearly 800 motifs including 70 of animals. All these figures are in a unique geological setting. The visit of Pech Merle is a real and unique emotion!"
Take off from the château gardens by helicopter, or from the Cahors airfield by light aircraft, and enjoy a bird’s eye view of the most beautiful sights, towns and villages, as well as breathtaking landscapes. Grow wings and take to the skies!
In Cahors, the domes that overlook the Cathedral of St Etienne seem to jealously guard a gem that dates back nine centuries: a Romanesque portal shelters an Ascension of Christ executed so exquisitely that it almost gives the impression that we too can get a little closer to heaven. On the banks of the Lot, the last fortified medieval bridge in France dominates the town for which it serves as an emblem, with its three 14th-century towers. These exceptional monuments are listed by UNESCO as World Heritage sites, just like the Way of Saint James of Compostela, a prestigious label that bears witness to their splendour | <urn:uuid:fccb1698-a2bc-48d0-9026-6e0f4f273593> | CC-MAIN-2022-33 | https://www.relaischateaux.com/us/france/experience/a-chateau-experience-in-the-cahors-region-mercues | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.945498 | 668 | 1.523438 | 2 |
Set in 1872, Abdul-Jabbar’s second novel coauthored with Anna Waterhouse, Mycroft and Sherlock (Titan, Oct.), finds the brothers investigating a series of bizarre murders in London.
The most challenging aspect to writing my Mycroft Holmes novels is that nothing about Mycroft and Sherlock’s world can be taken for granted or assumed. For example, a person living in Newport, Maine, can have a pretty good idea what life is like in Newport Beach, Calif.—in spite of the fact that the places are separated by more than 3,000 miles; that temperatures in one can vary by 60 degrees; or that the other has barely seen snow. In our present day, there is still a sense of commonality, of living the same life. But that sense of commonality goes out the window when you write about the past.
In our case, my coauthor and I are telling stories that take place in Victorian England. Our principal protagonist, Mycroft Holmes, lives in St. John’s Wood, London. When he walks out his door, we have to construct his world nearly from scratch. What does he see? What might he hear? What odors would assail his senses? What’s the protocol for something as simple as greeting a neighbor?
To make it more complex, the two novels have prominently featured Mycroft’s brother, a then-18-year-old Sherlock Holmes. And the original author of these brilliant characters, Arthur Conan Doyle, is not particularly helpful, for his stories take place 20 or 30 years after ours, when the brothers are middle-aged men.
But as fascinating as the many differences are the similarities, especially when they form the root of contemporary problems. For instance, in Mycroft and Sherlock, Victorian England was undergoing an opioid crisis. Opium and morphine were everywhere, as were addicts. And Britain was not only loath to curb consumption: drug use was actively encouraged. Drugs were perfectly legal, and there was very big money to be made. When you research it, it’s easy to see that the scourge of our own addiction in this country has roots dating back several centuries. In the third book, which we’re writing now, we touch on a terrible monetary crisis that engulfed Europe and the U.S., and which mimics both the Great Depression and the more recent economic collapse of 2008. One of the culprits, then as now? Easy loans, badly structured.
So, while the manners and mores have to be investigated with a fine-tooth comb (which was the practice of using a comb with close-set teeth to comb out lice in the late 1800s), human frailty, greed, and gullibility are all strangely consistent. That was something Conan Doyle knew when he first came up with his brilliant characters, and that’s the lesson we recall again and again as we write today. | <urn:uuid:d2c96f4d-cf58-4324-954d-d3dfa6519da4> | CC-MAIN-2022-33 | https://www.publishersweekly.com/pw/by-topic/authors/profiles/article/77667-kareem-abdul-jabbar-s-holmes-brothers-keep-changing.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.96704 | 602 | 1.992188 | 2 |
O FRIEND who passed away while flowers died,
Now that the land bursts into bloom again,
With vivid blossoms o'er the landscape wide,
Purple and white 'mongst, grasses golden-eyed,
In beauteous resurrection o'er the plain,—
My thoughts revert to thee, who liest still,
Under the pulsing, stirring, glowing earth;
Not rising with the lilac on the hill,
Not waking with the sunny daffodil,
Living and breathing with no second birth.
In these sweet days I dream I see thy grave,
A mockery of death, alive with flowers.
The delicate sprays and tender grasses wave,
Blue violets and the hardy crocus brave,
Wooed back to life by sunshine, dew, and showers.
I cannot deem that thou art lying there,
Asleep through all these fervent days of spring;
For I perceive thy spirit in the air,
Around me ever in my dream and prayer,
Enskied and hallowed by thy suffering.
When thou didst walk upon the earth before,
My trivial words and deeds alone were thine;
But now my holiest dreams are evermore
Blended with thoughts of thee, on that far shore,
Where thy pale, girlish face has grown divine.
Through the dark shadows thou must go alone;
And lo! thou hast a dauntless bravery,
A most majestic resignation shown;
A valiant patience, a faith not overthrown
By the dread terror of uncertainty.
The day had fled, from thee for evermore,
Thy soul was ebbing with the waning light,
And still thou asked, aweary and heartsore,
The same pathetic question o'er and o'er,—
'O, I am tired! will I go to-night?'
Aye, thou didst go,— and where? Thou knowest now.
Nature is innocent as well as fair;
Lillies, as well as amaranth, wreathe her brow.
She hath thy soul; because I cannot know
Where it may be, I feel it everywhere.
And thus the spring hath brought me flowers of worth.
O mourners, cease to weep o'er empty graves!
Open them all! no dead come trooping forth,
To fill with ghastly hosts the living earth;
Only the flowers bloom, the green grass waves.
Those ye laid low with solemn rites and tears,
Elude you; while ye weep, they all have flown.
And so I lay aside my doubts and fears;
My friend in day-dreams and at night appears,
And hovers near when I am most alone. | <urn:uuid:4ac51082-a7e7-47ce-9ed5-f75e8713c7b6> | CC-MAIN-2022-33 | https://www.poemist.com/emma-lazarus/in-memoriam | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.885262 | 583 | 1.976563 | 2 |
The Duke and and Duchess of Cambridge have formally registered the birth of their son, Prince George.
Westminster City Council registrar Alison Cathcart travelled to Kensington Palace, where Prince William signed the birth register entry.
The Duke and Duchess gave their occupation as prince and princess of the United Kingdom in the register entry from which the birth certificate is produced.
Prince George was born on 22 July.
His full name of George Alexander Louis was announced two days later. He is third in line to the throne, behind his grandfather Prince Charles and his father, Prince William.
In a statement issued on Friday, Kensington Palace said: "The Duke and Duchess of Cambridge have formally registered the birth of Prince George.
"The Duke of Cambridge signed the birth register at Kensington Palace this morning, witnessed by a Registrar from Westminster Register Office."
The couple's "usual address" was listed as Kensington Palace, and the duchess's place of birth was listed as Reading.
A Kensington Palace spokesman said royal birth certificates conventionally featured the words prince and princess of the United Kingdom, or comparable formulations, as the parents' occupations.
Although Catherine uses the title Duchess of Cambridge, bestowed upon her by the Queen, she is also a princess by marriage and can be called Princess William of Wales. | <urn:uuid:c09b0ee5-4850-4571-9264-524929109e6f> | CC-MAIN-2022-33 | https://www.bbc.com/news/uk-23552087 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.971041 | 266 | 1.8125 | 2 |
Professor of the History and Politics of Modern China, Oxford
Yan P. Lin Centre Annual Lecture with reception to follow.
Register at lincentre [at] mcgill.ca
Rana Mitter is Professor of the History and Politics of Modern China, and a Fellow of St Cross College at the University of Oxford. He is the author of several books, including China’s War with Japan: The Struggle for Survival, 1937-1945 (Penguin, 2013), which won the 2014 RUSI/Duke of Westminster’s Medal for Military Literature, and was named a Book of the Year in the Financial Times and Economist. His latest book is China’s Good War: How World War II is Shaping a New Nationalism (Harvard, 2020). His recent documentary on US-China relations since Nixon, “Archive on Four: The Great Wall” is available on BBC Sounds. He won the 2020 Medlicott Medal for Service to History, awarded by the Historical Association. He is a Fellow of the British Academy and an Officer of the Order of the British Empire. | <urn:uuid:f2b6d0e3-f6c7-422b-bb1d-d7c8002f17e9> | CC-MAIN-2022-33 | https://www.mcgill.ca/lin-centre/channels/event/annual-lecture-rana-mitter-internationalism-identity-and-ideology-shaping-postwar-china-and-legacy-332236 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.914998 | 237 | 1.703125 | 2 |
Strategies shared on how to expand access to early child care in LaGrange County
LAGRANGE COUNTY, Ind. -- Community leaders of LaGrange County met with experts during a summit on Tuesday to further their efforts in expanding local access to early child care.
The county is currently falling short of Indiana’s state score for early learning access. Leaders and experts say the largest issue that is hurting this score is inadequate capacity.
Existing early child care programs in the county are only able to serve about twenty-five percent of children, ages five and younger, who may need these programs.
“We've been doing some work all around the state to really explore what is the state of access and we think about that in terms of four different things. First of all, are there enough seats for children to be in, is there quality to those seats, are they affordable for families,” said Maureen Weber, President and CEO of Early Learning Indiana.
Weber also noted that she hopes her organization’s “Closing the Gap” program will generate $100,000 in grants to improve community access to early child care. | <urn:uuid:50906f2f-6187-4c7e-a669-df76833afc7c> | CC-MAIN-2022-33 | https://www.abc57.com/news/strategies-shared-on-how-to-expand-access-to-early-child-care-in-lagrange-county | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.967817 | 240 | 2.03125 | 2 |
Some technical references but the key point does not need them
This is a contribution to the discussion about models started by Krugman, DeLong and Summers, and in particular to the use of confidence. (Martin Sandbu has an excellent summary, although as you will see I think he is missing something.) The idea that confidence can on occasion be important, and that it can be modelled, is not (in my view) in dispute. For example the very existence of banks depends on confidence (that depositors can withdraw their money when they wish), and when that confidence disappears you get a bank run.
But the leap from the statement that ‘in some circumstances confidence matters’ to ‘we should worry about bond market confidence in an economy with its own central bank in the middle of a depression’ is a huge one, and I think Tony Yates and others are in danger of making that leap without justification. Yes, there are circumstances when it may be optimal for a country with its own central bank to default, and Corsetti and Dedola (in a paper I discussed here) show how that can lead to multiple equilibria.
But just as Krugman wanted to emulate Woody Allen, I want to as well but this time pull Dani Rodrik from behind the sign. In his excellent new book (which I have almost finished reading) Rodrik talks about the fact that in economics there are usually many models, and the key question is their applicability. So you have to ask, for the US and UK in 2009, was there the slightest chance that either government wanted to default? The question is not would they be forced to default, because with their own central bank they would not be, but would they choose to default. And the answer has to be a categorical no. Why would they, with interest rates so low and debt easy to sell.
The argument goes that if the market suddenly gets spooked and stops buying debt, printing money will cause inflation, and in those circumstances the government might choose to default. But we were in the midst of the biggest recession since the 1930s. Any money creation would have had no immediate impact on inflation. Of course their central banks had just begun printing lots of money as part of Quantitative Easing, and even 5 years later where is the inflation! So once again there would be no chance that the government would choose to default: the Corsetti and Dedola paper is not applicable. (Robert makes a similar point about the Blanchard paper. I will not deal with the exchange rate collapse idea because Paul already has. A technical aside: Martin raises a point about UK banks overseas currency activity, which I will try to get back to in a later post.)
Ah, but what if the market remains spooked for so long that eventually inflation rises. The markets stop buying US or UK debt because they think that the government will choose to default, and even after 5 or 10 years and still no default the markets continue to think that, even though they are desperate for safe assets!? In Corsetti and Dedola agents are rational, so we have left that paper way behind. We have entered, I’m afraid, the land of pure make believe.
So there is no applicable model that could justify the confidence effects that might have made us cautious in 2009 about issuing more debt. There are models about an acute shortage of safe assets on the other hand, which seem to be ignored by those arguing against fiscal stimulus. Nor is there the slightest bit of evidence that the markets were ever even thinking about being spooked in this way.
Martin makes the point that just because something has not yet been formally modelled does not mean it does not happen. Of course, and indeed if he means by model a fully microfounded DSGE model I have made this point many times myself. But you can also use the term model in a much more general sense, as a set of mutually consistent arguments. It is in that sense that I mean no applicable model.
Now to the additional point I really wanted to make. When people invoke the idea of confidence, other people (particularly economists) should be automatically suspicious. The reason is that it frequently allows those who represent the group whose confidence is being invoked to further their own self interest. The financial markets are represented by City or Wall Street economists, and you invariably see market confidence being invoked to support a policy position they have some economic or political interest in. Bond market economists never saw a fiscal consolidation they did not like, so the saying goes, so of course market confidence is used to argue against fiscal expansion. Employers drum up the importance of maintaining their confidence whenever taxes on profits (or high incomes) are involved. As I argue in this paper, there is a generic reason why financial market economists play up the importance of market confidence, so they can act as high priests. (Did these same economists go on about the dangers of rising leverage when confidence really mattered, before the global financial crisis?)
The general lesson I would draw is this. If the economics point towards a conclusion, and people argue against it based on ‘confidence’, you should be very, very suspicious. You should ask where is the model (or at least a mutually consistent set of arguments), and where is the evidence that this model or set of arguments is applicable to this case? Policy makers who go with confidence based arguments that fail these tests because it accords with their instincts are, perhaps knowingly, following the political agenda of someone else. | <urn:uuid:87a84a47-c51d-4193-97eb-65cada8e3dce> | CC-MAIN-2022-33 | https://mainlymacro.blogspot.com/2016/01/confidence-as-political-device.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.970502 | 1,119 | 2.296875 | 2 |
You’ve seen the famous characters, but do you know how they all began? The fantastic creations of Marvel and DC Comics have been shaped by history, and we’re taking you through some of the key moments.
1938 – Superman (DC Comics) debuts in Action Comics #1 and superhero comics take America by storm
1939 – Marvel Comics’ predecessor, Timely Comics, is formed by Martin Goodman. A teenaged Stan Lee joins as an assistant
1941 – Batman and Wonder Woman make their DC Comics debut, while Marvel’s Captain America (created by Joe Simon and Jack Kirby) fights America’s enemies – including Adolf Hitler – throughout World War II
1954 – The Comics Code Authority (CCA) is formed following concerns about young people’s morality. It required that ‘in every instance, good shall triumph over evil’. Depictions of ‘excessive violence’ were forbidden, along with ‘lurid, unsavoury, gruesome illustrations’ – including vampires, werewolves, ghouls, and zombies
1956 – The return of The Flash (DC Comics) after a 5-year absence sparks a superhero revival, which includes Golden Age characters like Green Lantern
1961 – Marvel Comics is officially established, with the Fantastic Four later introduced. DC Comics’ Justice League of America also makes its first appearance
1962 – Spider-Man, Thor and the Hulk make their debut
1963 – Iron Man and the X-Men join Marvel Comics
1966 – Black Panther is created by Stan Lee and Jack Kirby, appearing in Fantastic Four #52. He is the first superhero of African descent in mainstream American comics
During this time, the Comics Code Authority’s influence declines as mainstream titles start to tackle societal issues. Black and female protagonists have larger roles, including Luke Cage (1972) and Blade (1973).
1971 – Supernatural themes and horror stories make a comeback following the relaxation of rules
1973 – Plots grow darker as superheroes face higher stakes. Spider-Man’s girlfriend, Gwen Stacey, is killed in the pages of The Amazing Spider-Man
1976 – As Star Wars and Jaws herald the era of the blockbuster, Hollywood studios turn to comic books for inspiration. The 1978 Superman adaptation is a financial and critical success
1979 onwards – Frank Miller’s work on Daredevil: Born Again, Batman: Year One and The Dark Knight Returns defines the ‘grim and gritty’ aesthetic of mainstream comics
Early 1990s – A speculator boom sees comic collectors actively encouraged to purchase comics as collectibles. In 1993, X-Men #1 sells over 7 million copies. This bubble bursts by the mid-90s, causing a steep decline in sales
1992 – 97 – The X-Men animated series debuts on the Fox Kids Network to critical acclaim
1993-98 – Marvel almost collapses due to corporate decisions, fall in comic book revenue and a power struggle between investors
1997 onwards – Big-budget comic book adaptations become an important part of the movie industry. Marvel sells the film rights for Men in Black, X-Men (including Wolverine and Deadpool), the Fantastic Four and Spider-Man
2008 – Marvel launches the Marvel Cinematic Universe
2009 – Disney purchases Marvel for $4.3 billion
2011 – In a push to win new readers, DC Comics restarts all titles at issue #1, resetting the DC universe’s continuity
2015 – Disney, Sony and Marvel Studios agree to share Spider-Man film rights
2018 – Stan Lee passes away in Los Angeles at the age of 95
2019 – Avengers: Endgame becomes the highest-grossing film of all time
22/02/2019The Marvel mastermind's own story is captured in a special commemorative edition of the best-selling American magazine. Join us as we take a deeper look into the life of the man who changed the comic book industry forever.
07/08/2020Wolverine, Spider-Man and Captain America have returned with their fellow Marvel superheroes for this stunning series, hand-signed by the late Stan Lee.
Thank you for signing up to our newsletter.
© Copyright Washington Green Retail Limited trading as Castle Fine Art. First published 2012, last updated 2022. Washington Green Retail Limited acts as a credit broker and offers credit products from Secure Trust Bank PLC trading as V12 Retail Finance.
Washington Green Retail Limited is authorised and regulated by the Financial Conduct Authority. Our registration number is 726395. Credit provided subject to age and status. Terms & Conditions Privacy Cookies V12 Finance | <urn:uuid:0ca482e2-aabf-4552-ae44-ea85194261e1> | CC-MAIN-2022-33 | https://castlefineart.com/blog/a-history-of-comic-books | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.902878 | 943 | 2.859375 | 3 |
As a critical parameter in pharmacokinetics, prediction of clearance is an integral aspect of drug discovery programmes. Since the liver is the major site of xenobiotic biotransformation, accurate prediction of hepatic clearance (CLh) is vital. The use of cellular and subcellular in vitro systems for this purpose is common practice; however, prediction accuracy tends to be poor. The aim of this thesis was to explore potential contributing factors to the underprediction of in vivo clearance, specifically with relation to the in vitro methodology of hepatocyte clearance assays, which is largely unstandardised.Literature data analyses highlighted an overall clearance-dependent trend of underprediction in both human and rat hepatocytes, indicating a fundamental in vitro system bias which is independent of species. During initial investigation of incubation conditions, the format of hepatocyte assays (suspension in microcentrifuge tubes, 96-well plates, 24-well plates and short-term monolayer culture) was demonstrated to influence determined intrinsic clearance (CLint). Differences in midazolam CLint were observed not only between suspended and short-term cultured hepatocytes, but also between suspended hepatocytes in different vessels/plate formats. The applicability of 1 µM as a generic substrate incubation concentration for determination of CLint by substrate depletion was evaluated in rat hepatocytes using nine well-characterised drugs. For seven of the nine drugs, a statistically significantly (p < 0.05) higher CLint was observed in determinations of 0.1 µM substrate as opposed to 1 µM, highlighting the potential for false determinations using current practices.Cofactor depletion in isolated hepatocytes was investigated based on previous speculation as the cause of clearance-dependent underprediction of in vivo clearance. Although moderate increases in CLint were observed with the addition of NADPH to hepatocyte incubations, this was subsequently attributed to the replenishment of NADPH in membrane-damaged hepatocytes. Retained functionality of metabolic enzymes in cells which would generally be considered non-viable by trypan blue exclusion was indicated in comparisons of unpurified and Percoll-purified cryopreserved hepatocytes. This phenomenon was conclusively demonstrated in incubations of permeabilised hepatocytes supplemented with NADPH, revealing a need for re-evaluation of the use of plasma membrane integrity (trypan blue exclusion) as a measure of viability in metabolic studies. ATP content was considered as a potential alternative measure; however no significant correlations were found between ATP content, trypan blue exclusion and the CLint of nine drugs in associated preparations.The effect of shaking on CLint in rat hepatocytes was also examined. For 10 out of 12 drugs, CLint determined at 900 rpm was significantly (p < 0.05) higher than in static incubations. Three potential mechanisms were hypothesised: plasma membrane damage, increased substrate distribution throughout the bulk medium and reduction in the depth of the unstirred water layer (UWL) surrounding cells. Shaking of saponin-permeabilised hepatocytes (supplemented with NADPH to maintain metabolism) also increased the determined CLint of saquinavir, indicating a rate-limitation other than membrane permeation. However, shaking of ultra-sonicated hepatocytes in which the plasma membrane was entirely destroyed (also supplemented with NADPH) did not change the determined CLint of saquinavir, revealing the rate-limitation of UWL permeation in both intact and permeabilised cells. The depth of such an UWL in vitro is likely to be artificially greater than in vivo; therefore reduction of UWL depth through incubation shaking is proposed as a physiologically sound approach by which to increase in vitro CLint. In addition, a framework of experiments and related equations is presented by which intact and permeabilised hepatocytes in static and shaken conditions may be utilised to identify the rate-determining process and contribution of individual processes to the in vitro CLint of a drug. The effects of substrate concentration and shaking were also evaluated in human hepatocytes. Significant increases in determined CLint of drugs with use of 0.1 µM substrate (as opposed to 1 µM) and shaking at 900 rpm were demonstrated, confirming equivalent potential in vitro sources of underprediction between rat and human.These highly significant findings reveal the existing limitations of in vitro assays and potential flaws in current practice in in vitro determinations of CLint. Appropriate consideration of the properties of in vitro systems, including the presence of the UWL, should lead to improved predictions of in vivo clearance. | <urn:uuid:15bd8b40-8396-4573-a8aa-1e89918ac615> | CC-MAIN-2022-33 | https://www.research.manchester.ac.uk/portal/en/theses/optimisation-of-in-vitro-methodology-for-drug-metabolism-studies-to-improve-prediction-of-hepatic-drug-clearance(0786531a-2e10-48a7-9b35-e2e7e1935338).html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.951226 | 936 | 1.648438 | 2 |
Craftsman Drill Bit Sharpening Jig Instructions
Craftsman refers to its drill bit sharpening jig as a drill grinding attachment. The jig is used in conjunction with a bench grinder to grind the correct angles on drill bits to be sharpened. The drill grinding attachment can be used to sharpen drill bits up to 3/4-inch in diameter or grind a new tip on a broken bit. The sharpening attachment can be used against the normal grinding edge of a grinder wheel. If you want to grind on the side of the wheel, a grinder wheel specifically designed for side grinding must be used.
Install the drill grinding attachment onto your grinder bench. Attach the jig to the bench with a single bolt inserted 2-1/4 inches in front of the grinder wheel's grinding surface and through the bench. Thread a wing nut onto the bolt so the nut can be loosened. The bolt goes through the slot in the bottom of the jig so it can be adjusted toward or away from the grinder. Once the jig is in position, tighten the wing nut to hold the sharpening jig securely to the bench.
Set the grind angle on the jig and tighten the adjusting nut. A 59-degree angle can be used for general purposes. A steeper angle, up to 88 degrees, is better for drilling hard substances. A lesser angle of 49 degrees can be used for softer materials, such as copper and plastic.
Place the drill bit to be sharpened into the bit trough, with the end equal to the bit's diameter sticking out of the front of the trough. Adjust the rear slide bracket snug against the back end of the bit.
Adjust the lip rest of the jig up or down until it catches the cutting edge of the drill bit. The lip rest is a piece of metal on the front of the sharpening jig held in place by two small screws. Rotate the drill bit until the drill lip is against the lip rest to hold the bit in the proper position to grind. Finger-tighten the clip at the top of the jig to hold the bit in position.
Adjust the entire jig by loosening the wing nut and bolt that hold the jig to the bench and sliding the entire assembly until the drill bit almost touches the grinder wheel then snugly tighten the wing nut. The jig pivots side to side and sharpens the bit as it passes across the wheel. The screws on the nameplate adjust the friction of the pivot.
Turn on the grinder and sharpen one side of the bit with the side-to-side pivot motion. The knurled feed nut at the back of the jig will push the bit forward in small increments so you can grind a smooth surface on the bit point. A 1/8-turn of the feed nut will move the bit six-thousandths -- 0.006 -- of an inch forward.
Repeat the grinding process for the other half of the drill bit point by loosening the bit clamp and feed nut then rotating it 1/2-turn so the other lip of the bit is against the lip rest. Grind off the same amount of material on the other side.
- After grinding, visually inspect the drill bit tip for an even grind with the two sides proportional.
- These steps are for the most typical bit shape. You may need to adjust your technique for bits with different cutting end profiles.
- Use a couple of older, less important bits for your first attempts at sharpening. Use those bits to develop your technique for using the jig.
- Always used safety goggles or a face shield, along with the grinder shield, when using the drill grinding attachment.
Tim Plaehn has been writing financial, investment and trading articles and blogs since 2007. His work has appeared online at Seeking Alpha, Marketwatch.com and various other websites. Plaehn has a bachelor's degree in mathematics from the U.S. Air Force Academy. | <urn:uuid:328c6236-b494-497d-af47-767ef7d3593b> | CC-MAIN-2022-33 | https://homesteady.com/how-12211105-craftsman-drill-bit-sharpening-jig-instructions.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.895188 | 856 | 2.140625 | 2 |
5 min read
This story originally appeared on NerdWallet
This article provides information for educational purposes. NerdWallet does not offer advisory or brokerage services, nor does it recommend specific investments, including stocks, securities or cryptocurrencies.
Life happens. At some point, you might need quick cash for a down payment or to cover an unexpected expense, but may not be sure whether it warrants raiding your emergency savings. You could sell some of your investments, but depending upon the market, it might not be the best time to take profits. If the market’s up, you’ll raise cash, but probably also acquire a capital gains tax bill. If the market’s down, selling might lock in a loss when you didn’t want to.
But there’s another option to consider: using your brokerage account for financing. Having a securities-based line of credit, or SBLOC, could provide you with access to cash so you can grab on to an investment opportunity or make ends meet when you’re stuck in a jam.
Here’s an example: Let’s say you’re surprised with a sudden high tax bill and would rather not empty out your savings or sell stock to pay it. You also know that your annual work bonus is coming up in a few months’ time. You could tap into your SBLOC to bridge the gap for now, paying the loan off once your bonus hits your checking account.
How securities-based lending works
SBLOCs, also referred to as securities-based lending or portfolio financing, use your taxable brokerage account as collateral to back a revolving line of credit. This means you can choose how much to borrow and pay back without having set payments over a defined period of time.
To qualify, brokerage firms offering this lending solution may require a certain account balance and will calculate the maximum credit available to you — the collateral value — based on the eligible securities (generally stocks and bonds) within your account.
With the volatility of the market, you won’t be given a dollar-for-dollar loan, says Tolen Teigen, certified financial planner and chief investment officer at FinDec, a financial consulting company headquartered in Stockton, California.
“Perhaps you can use 60% to 70% of the value of your securities portfolio as collateral,” he says.
And the amount of assets you have at the brokerage firm usually plays into the interest rate you’ll get. Often, the more assets you hold at the firm, the lower your interest rate will be, which is why SBLOCs often make the most sense for those with larger account balances, Teigen says.
Why use a securities-based line of credit
Though there are some hoops to jump through, establishing a SBLOC has advantages beyond avoiding capital gains tax consequences or undesired losses.
“It allows the investor to continue with their investment strategy without having to liquidate any holdings,” says Daniel Milan, managing partner at Cornerstone Financial Services in Southfield, Michigan. This means you won’t disrupt your portfolio’s asset allocation and can stay invested for the longer term.
“Typically, the investor has quick access to cash when they need to pull money from the line of credit, which creates flexibility,” Milan says.
Once your line is in place, you can usually access funds as needed within a few days. Even if you don’t need it, you can take comfort in having a backup plan. Repayment is also flexible as long as the required collateral value is maintained.
Besides being quick, SBLOCs can also be a cost-effective option, given the current low interest rates, says Stuart Blair, director of research at Canterbury Consulting in Newport Beach, California.
You can’t, however, use your securities-based line of credit to buy other securities or repay margin loans.
What to keep in mind
There are risks associated with securities-based lines of credit. One of the biggest is that the ups and downs of the market will affect the collateral value of your account.
When the value of the securities in your account falls below a certain threshold, the broker will issue a maintenance call, or an order to add more cash or securities to your account. If you’re not able to add more cash, you risk having some of your securities sold to meet the call. And you may face an unpleasant surprise: Your brokerage firm has the right to liquidate positions — the stocks, bonds and other securities you’re currently invested in — without notifying you or asking for your input.
Additionally, rates for SBLOCs are variable, not fixed. So even though interest rates are low now, that won’t always be the case, and your rate could rise over time.
For these reasons, using your securities-based line of credit judiciously is important.
“An investor will need to determine the maximum amount of leverage they are comfortable with and develop a number of worst case scenarios to test their fortitude and mettle,” Blair says.
When taking on any form of debt, it’s important to note a golden rule: Don’t bite off more than you can chew. Teigen and Milan agree that backing your SBLOC with less-volatile securities (like blue-chip stocks or bonds), using your credit line sparingly and having a concrete repayment plan are ways to mitigate the risks and ensure your securities-based line of credit remains a useful tool. | <urn:uuid:027db10b-fc4d-441b-8a60-9f16831e54ea> | CC-MAIN-2022-33 | https://einp.info/need-cash-your-brokerage-account-may-offer-a-handy-solution/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.943015 | 1,150 | 1.664063 | 2 |
[The demiurge] is blind; because of his power and his ignorance and his arrogance he said, with his power, “It is I who am God; there is none apart from me.” When he said this, he sinned against the entirety. And this speech got up to incorruptibility; then there was a voice that came forth from incorruptibility, saying, “You are mistaken, Samael” – which is, “god of the blind.”
-From The Hypostasis of the Archons or The Reality of the Rulers,
Nag Hammadi Library, Codex II,
translated by Bentley Layton.
When you read about The Magician card most booklets that come with the deck invoke creativity, personal empowerment, initiative and motivation. But what does The Magician actually DO? How does one actually become or invoke The Magician? Every Tarot reader I know has their own interpretation, and I’d like to share mine. Not just who The Magician is to me, but how I incorporate that meaning into readings.
My own revelation on The Magician came out during a reading I was performing for someone else. In the reading The Magician came up as the goal for resolving a long series of challenges ahead.
In one of those epiphanous moments, I saw the implements of the minor arcana about him and asked: “Did he (The Magician) find those or did he make them?”
To which my client answered: “He’s a wizard, right? I think he made them!”
Afterwards, I kept thinking about The Magician having crafted the Cup, Sword, Coin and Wand; the very symbols the Minor Arcana are structured around. This lead to the “chicken-and-the-egg” kinda question; which came first? Did the Magician make these symbols after they already existed in the minor arcana, or did did he make them first and the minor arcana followed his example? Being a Major Arcana, it seemed inappropriate to think of The Magician was a mere locksmith who churns out copies of keys that the minor arcana use to fulfill their purpose (in which case, the Ten of Swords should ask for his money back). Nor did it seem right that he was a glorified trinket peddler hawking metaphysical bling outside the stadium of creation. No! This is The Magician! The archetype of mind-over-matter, the embodiment of creation-as-an-act-of-will. He’s the craftsman of the symbols which the minor arcana identify themselves with.
I explained this idea to Anastasia, who said simply: “So the Magician is the Demiurge?”
To detail the lineage of the Demiurge from its modern rebirths back through the Renaissance, muddle the Middle Ages, course Gnostic reconciliation and find its roots in Platonic syncretism would be an essay unto itself. Many a philosophy student has written their Masters’ Thesis on the topic already, so to use one of my favorite movie quotes:
“Let me explain. No, that will take too long. Let me sum up.”
Here’s the short version:
The Greek philosopher Plato first spoke of the Demiurge in his work, Timaeus. The work is the vehicle for his reconciliation the philosophies of his predecessors, Homer and Hesiod, on the origins and structure of reality. According to Timaeus – as revealed via grand monologues – the Demiurge brought order out of the unthinking chaos that was before and instilled both intelligence and the soul into the life thus made. The Demiurge was not the creator of the universe, merely the craftsman who made something from the raw materials already present. Plato’s Demiurge was a benevolent shaper-of-what-is. The word Demiurge translates as “public worker” and commonly refers to a “craftsman,” or “artisan.”
Later Gnostic origins, inspired by Plato’s model, added the twist so common to dark age mythologies: intrinsic evil. In many Gnostic mythologies, the Demiurge was born unaware of his origins or of the higher gods that begot him. This abandoned and feral godling created reality out of a subconscious awareness of the perfection he was born from. But his work was flawed, and thus we have plagues, earthquakes, and taxes. The Demiurge of Gnostic mythology was thus an antithesis of the true creator and an allegory of Satan. Gnostic names for the Demiurge included: “Yaldabaoth,” meaning “the blind one;” “Samael” which means “God of the Blind” and “Saklas” for “the Foolish one.” The cross-pollination of these names into other religions as various devils and demons shows just how negative the concept of the Demiurge was during that era.
What’s this have to do with the Magician of the Tarot? It begins, as things often do, with The Fool.
Evolution of the Fool into the Magician
At the start of the Fools’ Journey through the Major Arcana, the Fool says to himself:
“I know nothing of the world at large.
Thus, I am going to set about experiencing it for myself.”
The Fool finds the world confusing and chaotic because he lacks the tools and language to understand or reason with what he encounters. He knows that there must be patterns to what’s going on. His subconscious awareness of higher orders imposes a desire to force order out of chaos – the spark of divinity in his soul manifesting as subtle wisdom. This is an example of the Logos (Greek for ‘word’) as regards to the Nous (the Mind of God) in Platonic Idealism; that there is an underlying order under the surface of things and that intelligent beings can sense the logos because of their own connection to Nous.
Keeping careful notes, and learning from his mistakes and observations, the Fool begins to discern patterns in the chaos. He creates words to define and encapsulate not just what he sees, but, more importantly, the logic behind the scenes. He makes observations, empirically tests his theories, and revises them as needed. One can easily see The Magician as the model of the scientist employing rational methodologies, even if they are fantastical.
He crafts tools that embody his theories which let him not just observe but affect the world around him.
The Cup for containing the mercurial emotions and feelings of everyday life. The Wand for the passions that burn in our hearts, light our way, and occasionally burden us. The Sword for cutting through the Gordian Knots in our minds, represents the clarity of thought. The Coin for the earthly concerns and demands.
The symbols of the Minor Arcana are his creation and thus define the world for him and bring order out of chaos; everything in the Minor Arcana makes sense because the Fool – now the Magician – sees it in terms of his paradigm.
Thus the Magician is the Demiurge; the artisan who brings order out of chaos; the lens through the rest of the minor arcana fall into place and make sense.
So how do you use the Magician-as-the-Demurge in readings?
The ‘Platonic’ Magician
When The Magician comes up in readings it speaks to me of the opportunity to re-define how the world works, to craft new tools, to make sense of things and to sift chaos into patterns that we better recognize and understand.
When The Magician comes up in a reading space for self, opportunities or goals I think about self empowerment – the opportunity to become our own Platonic Demiurge and shape or reshape what is around us (at least, in our minds). When my querent is confused and looking for help, The Magician means they need to take a step back and define what works for them and to craft or discover the tools they need to succeed. Redefine your paradigm.
When the Magician comes up in the space of the other or outsider, the message can mean that this other actor is playing the Magician; they have their own worldview and tools and may see things differently than you; that they have a role for you to fulfill in their understanding and journey. Knowing that someone else is operating within a different paradigm than you can make interacting with them easier.
The Shadow of the Magician: the Gnostic Demiurge
Of course, we have the power within us to become the Gnostic Demiurge as well. Self-delusion, arrogance, and misjudgment lead to a flawed worldview and malfunctioning toolsets. The shadow of The Magician is about the risk of abuse of power and potentially being blind to the true workings of the world. If your theories are incorrect, the results will not match expectations. Wisdom lies in revising your theory and changing as needed. Insanity is trying the same thing and expecting different results. The warning of The Gnostic Demiurge Magician is: don’t become Yaldabaoth or Samael “The blind” and don’t remain Saklas: “The Foolish One.”
The Magician is one of the most powerful cards in the Major Arcana but it can be hard to understand exactly what that power is or how to use it. Like great wizards of myth and legend, The Magician is not to be trifled with, and their power is seemingly unlimited. They see beyond the veil of matter and know the secrets of the workings of creation. Their power over creation can redefine the world around them, for good or ill. When we embrace The Magician, we’re tapping into our subtle divine insight to bring order out of chaos; not just see the patterns that shape our world, but take hold of them like reins and drive them before us. To invoke The Magician is to define for yourself how your world works, and by that knowledge, know where and how to apply your will. | <urn:uuid:a0e333b5-722e-49c0-a259-1fb77bf1c508> | CC-MAIN-2022-33 | https://www.andrewtarot.com/the-magician-the-demiurge/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.963343 | 2,182 | 1.867188 | 2 |
Pandemic is a worldwide fatal disease that can be spread through numerous mediums. Examples of such diseases are influenza and coronavirus etc. During the wave of a pandemic, the disease can be transferred from patients to healthcare staff, coworkers, and the public in the workplace.
For many people, the COVID-19 outbreak is emotionally draining, altering their daily lives in unprecedented ways. At the same time, it is extremely important to take care of one’s health in this risky and dangerous situation. For this, you should not stop working out and exercise in gyms, but the solution is to do this task securely despite the epidemic. This will not only make your health and immunity strong but also cut your time in quarantine periods.
There are some guidelines, with the help of them we can remain safe and work out safely despite the epidemic.
Risk Assessment While Working Out At Gyms And Parks
Risk assessment plays a key role to remain safe from the pandemic. With the help of risk assessment, we can be aware of the current position of the pandemic, and decisively, we can take necessary measures to control the situation of the epidemic.
The following is the bare minimum required by the Management of Health and Safety at Work Regulations 1999:
- Identify potential sources of injury or disease in your workplace (hazards)
- Determine how likely it is that someone will be harmed and how seriously they will be harmed (the risk)
- Take steps to eliminate the danger or, if that isn’t possible, manage the risk.
Risk assessment is only one step in a larger process of risk management at any type of work whether working out in gyms or working at home.
Usage Of Face Masks
Using a face mask is an important factor to remain safe during the epidemic. The use of a face mask can protect you as well as others from the splash which contains serious pandemic spreading agents.
During pandemic situations, we can only be protected from the disease by using a facemask, social distancing, and remain away from crowded areas. In such situations, working out in outdoor as well as indoor gyms requires strictly following all the necessary safety precautions. So, a face mask for running and working out plays a key role in remaining safe from dreadful situations. It is indeed your moral and social duty to follow safety measures efficiently.
Following Social Distancing At Work Out Places
During the period of the epidemic, we should manage a safe distance of 2m apart but with the use of risk mitigations. Moreover, we should remain away from crowded places. Because people can spread the virus before they even realize they’re sick, it’s important to keep at least 6 feet away from others at all times, even if you or they don’t have any symptoms.
Like in other life activities, we should follow this measure in working out to save one’s own and others’ lives as well. For people who are at a higher risk of serious illness from COVID-19, social distancing is particularly important.
Provide Awareness Among The Masses:
Seminars and workshops should be conducted to educate the masses about the seriousness of the epidemic situations. To minimize safety-related risks, people must be constantly aware of how they workout by using different machines at gyms and be able to identify hazards.
Accepting what we can and can’t control for those we love can be difficult. It’s critical for stressed caregivers to become aware of the draining consequences of their work. To maintain resilience, you must seek solutions, set aside special time for self-care, seek support, and fight isolation. | <urn:uuid:4233a3ce-8798-41dc-a80d-88d31720f411> | CC-MAIN-2022-33 | https://www.paisley.org.uk/2021/04/follow-these-hacks-to-work-out-safely-despite-the-epidemic/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.945766 | 761 | 2.671875 | 3 |
Living in a rental house as a person living with a disability is almost untenable. It is even harder for people whose disabilities limit mobility completely and have to rely on wheelchairs among other devices. This means that many people living with disabilities have to live with relatives or remain home until further notice. The biggest issue, in this case, is accessibility. Accessibility comes in many different forms. Every part of the unit and neighborhood has to be accessible by the person. That means that landlords either have to allow the tenant to make modifications on their own or have to create a unit that is accessible and friendly for a person with a disability. Below are important factors to consider.
Not many people can afford the rent in buildings with elevators. If you can, good for you but if you cannot then you will need a home you are comfortable and happy in. That means that you have to be on the lookout for specific features.
Preferably, the unit should be on the ground floor of the building. Being on the ground floor not only reduces how much effort is used to leave the building but also the time. This is especially important for a building that does not have a ramp. However, if the building has a step at the gate a ramp will definitely be necessary. The ramp should be professionally done. An incline can be dangerous especially for a person on a wheelchair and should therefore, be at a safe angle.
The floor plan of the house is another issue. If the house has steps all over from the bathroom to the kitchen and even the bedroom then there should either be a ramp or the person should find a place that does not have so many steps. If one is using a wheelchair they should find a place with wide doors.
Features and furnishings should be placed low enough for you to reach. That means light switches, sinks, and even doorknobs. The bathroom should have bars that will ensure the safety of the tenant.
You will need to use the hood amenities. What happens when you run out of salt? What happens when you have a hankering for some tea? How about airtime? You will need to be able to nip to the shop for something you need. The terrain in the hood should be supportive of your mobility device. That means that if you are on a wheelchair, living in a neighborhood where you have to skip over wet potholes and crawl over pebbles might not be the best for you. Forget that, how would you get from your house to the bus stage and back? The terrain in the neighborhood should allow you to wheel to the shop and stage comfortably.
If the building you like does not have features to support you then the landlord could allow you to install ramps in the unit and maybe at the building entrance. They could also allow you to install bars in the bathroom. Depending on your disability, you could need a media alert panic system in the house at different points like the bathroom. Speaking of which, you should find a unit that will be accessible by emergency response personnel. In this case, your comfort will be entirely in your hands. That means that the expense will be on you. In most cases, you will also be required to undo everything when you leave. You should therefore, be financially prepared to have all these things installed. The most probable scenario is that you will have to install it. There is not a lot of disability-friendly real estate in Nairobi that is also mid or lower tier. You might have to settle.
Your family and friends will definitely worry about you. Not because you are not perfectly capable of taking care of yourself but because there might be no one else in the hood that could check on you and help out if you need it. It is only natural that people who love you will worry especially if you are renting by yourself for the first time. You should therefore, invite your family and friends to see the new place and to see that you will be well supported. It would not hurt to live close to family and/or friends though.
Renting as a person living with a disability might make you vulnerable to some malicious parties. Some might view you as a weak person and therefor target you. You should put some measures in place to ensure your safety. An example would be to learn some self-defense moves so anyone who messes with you will learn their lesson. You could also get yourself a weapon especially if you keep late nights. If you keep a small knife somewhere on your chair you are at the perfect level to do some real damage. People are ruthless in this city, you should be too.
You should also have a trusted taxi person. One or two people who will pick you up after a night of partying and drop you right to your doorstep. This is Nairobi, there are many stories of taxi guys taking advantage of people in weakened states (read drunk). Such a person would take one look at you and assume you cannot protect yourself.
Many landlords in Nairobi build houses without consideration of all people. Most do not stop to think about people who might not be able to use the stairs or reach high knobs. This means that there is more to be done to promote inclusion for people living with disabilities. Until inclusion is exercised at all levels, everyone does their best to live full unencumbered lives. | <urn:uuid:f72cda4a-e49b-48dd-9c8f-2a7521bec1ac> | CC-MAIN-2022-33 | https://mtamu.com/nairobi-renting-for-people-living-with-disabilities/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.974406 | 1,104 | 1.960938 | 2 |
Informatics Portal - A Prototype using Gamification to Motivate a Greater Study Effort
MetadataShow full item record
The aim of this thesis was to design a system which uses gamification to motivate studyeffort in the long term. Gamification is widely used to create engagement among people.Yet, the use has often been limited to single or short-term settings. There is a lack ofknowledge on how to design gamification for maintained motivation over longer periodsof time. The system was designed for students at the degree program Bachelor of Sciencein Informatics at NTNU, campus Gløshaugen, with a focus on them wanting to use thesystem throughout the life cycle of a bachelor s degree. The design was built upon a literature review of how gamification facilitates short-termand long-term motivation. Furthermore, user investigations consisting of a questionnaireand workshop were conducted to help define user requirements for the system. Finally, aprototype of mockups implementing the user requirements was created and evaluated. The prototype presents a successful skeleton of a system implementing gamification forlong-term motivation of study effort. Results showed that nine out of ten thought thesystem would motivate them in the long term and that nine out of ten thought they wouldwant to use the system over a period of three years. | <urn:uuid:43799ab6-35de-4db9-a8cc-5643c8506ddc> | CC-MAIN-2022-33 | https://ntnuopen.ntnu.no/ntnu-xmlui/handle/11250/2560362 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.950202 | 278 | 2.09375 | 2 |
Press Release: May 13, 2020
Toronto, ON, Canada, May 18, 2020 - The coronavirus pandemic dampened the spring homebuying season but, despite a drop in sales activity, it appears buyers still intend to purchase homes this year and into the near future.
A recent survey by Zolo shows that even with higher unemployment and uncertain business conditions, buyers still intend to find and buy a residential property either this year or in the near future.
According to the survey, which polled over 2,100 North American households between April 15 to 17, 2020, respondents reported no significant change in their plans to buy a home with 47% planning on buying within the next five years, and another 16% planning to purchase this year.
Buyers are interested in this market because they see an opportunity to get into a home at a discounted price, with many expecting a 5% to 10% drop in purchase price if buying this year. In Vancouver, that’s more than $100,000 off the Canadian Real Estate Association’s benchmark price, as of March 2020. In Toronto, the expected price cut is closer to $87,000.
Of the more than 2,100 respondents, more than 51% were millennials (between the ages of 25 and 39). These respondents appear most optimistic about the purchase of a home, with 30% planning on buying a home in two to three years (16% plan on buying in 2020, while 21% plan on buying within four to five years).
The top three reasons for purchasing a home, even during the pandemic, are to stop paying rent (27%) because the home buyer has started or intends to start a family (26%) or a desire for “permanence and stability” (20%).
Prior to the pandemic, 59% of millennials were saving for a home, and 51% of Gen X buyers were saving for a property purchase. After the economic setbacks brought on by COVID-19, 53% of millennials continue to save for a down payment on a home, while only 39% of Gen X buyers continue to sock away cash for a down payment.
Turns out more than half (53%) of the millennial respondents were unwilling to buy a home that would force them to spend more than 30% of their income on housing. Gen X buyers were even more unwilling to exceed this budget constraint with 61% reporting they would not buy a home that forced them to pay more than 30% of their income on housing.
This diligence about saving for a property purchase may be fuelled by greater awareness about the impact of debt and the dangers of being house-rich and cash-poor.
Still, the near-future still holds a number of obstacles for millennial homebuyers. According to survey respondents, the biggest obstacle for millennials buying a home was the need for a larger down payment (33%) followed by the possibility of losing their job (29%).
While Gen X Buyers (those aged 34 to 54) appear to be putting their home-buying dreams on hold, they don’t appear to be as worried about their employment. According to respondents, the largest obstacle to purchasing a home was not having a large enough down payment (42%), while the inability to qualify for a mortgage (30%) was the next big hurdle.
The two biggest reasons Gen X buyers want to purchase property are to “stop renting” (40%) and to establish some “permanence and stability” (25%).
Prior to the pandemic, a few tech-savvy real estate brokerages, such as Zolo, were already making the transition to a mobile-friendly home-shopping experience. This emphasis on virtual and online experiences throughout the process of buying and selling a home was made all the more acute as soon as social-distancing and self-isolation became a requirement in order to slow the spread of COVID-19.
Turns out, buyers were waiting for this nudge into the virtual world, with 52% of the respondents reporting that they would “prefer to complete the entire home buying process using only online tools.”
When searching for a new home, buyers still overwhelmingly preferred the option of working with a Realtor (48%) and many still wanted to attend an open house (35%); however, 38% would use a mobile app, 34% would use virtual tours or pre-schedule video walkthroughs of the property and another 10% wanted access to professional square-footage floor plans (multiple responses allowed).
Real estate sales activity virtually stopped in mid-March and throughout April, however many Realtors and mortgage brokers were reporting an increase in inquiries from buyers and sellers regarding the best approach to enter the market, this year.
“There’s no doubt, the real estate market came to a standstill because of COVID-19 and the resulting economic impact,” says Romana King, director of content at Zolo, and an award-winning columnist and real estate expert. “But it doesn’t appear as if buyers have soured on the idea of homeownership. For many homeownership is still the cornerstone of financial stability.”
It will take a few more months for market data to provide a clearer picture of COVID-19’s impact on home prices — and in that time, market stakeholders could find their feet in this technologically-driven world.
The findings of the Zolo Homebuyers Intentions Survey are based on an online survey conducted by Zolo.ca between April 15 to 17, 2020, of 2,128 respondents who live in North America. The estimated margin of error is +/- 2.12 percentage points, 19 times out of 20.
To download images and raw data, please go to: https://drive.google.com/drive/folders/1lplJG4nJfcV4sHGxZLOU4wDckf73ekVf?usp=sharing
Zolo is one of Canada's most popular online national real estate marketplaces. Each month, more than 9 million buyers and sellers start their real estate search using Zolo. As a tech-disruptor and largest national brokerage, Zolo provides users with the data and resources needed to make better-informed property decisions.
About Romana King
Romana King is an award-winning personal finance writer and real estate expert. She writes for big banks, insurance providers, newspapers along with businesses. Romana speaks on real estate issues, estate planning, property & taxation, as well as personal finance. | <urn:uuid:d50835f4-89e0-49a6-bfd7-2aebdbb50886> | CC-MAIN-2022-33 | https://www.prfire.co.uk/press_releases/despite-impact-of-covid-19-homebuyers-still-intend-to-purchase-property | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.97226 | 1,364 | 1.59375 | 2 |
Free lacking money refers to any money or property that’s unclaimed by the rightful owners. The federal government safeguards that until it’s claimed. But how will you find that money ? Billions of dollars are resting with the treasury as free missing-money. Lacking money is not cash removed lacking, fairly it is money caused by a lost rightful heir, a forgotten investor, surplus charges or fees paid, or an inheritance left for someone who’s unacquainted with the money left behind. Unclaimed dividends, paychecks maybe not cashed, money in neglected bank reports, or matured insurance plans that are unclaimed are ideal examples of lacking money. Though the federal government is waiting to go back that free missing-money to the rightful claimants, it is difficult as people are unaware or have forgotten about any of it money that’s actually theirs.
You will find different causes for free missing money to be accumulated. It could be because of person having transformed their name or place and unsuccessful or forgot to see the us government of the change. When money belonging to such individuals falls due, the federal government is not able to track them to come back their money. An urgent demise or a modify of handle can lead to unclaimed or missing-money.
Legitimately, agencies and the government need to return the money to its rightful owners. But, when they are unable to track the homeowners, the money is remaining with the federal government in the state in which the owner last resided. Non-operation of accounts or inactivity in the records with economic institutions can also cause missing-money.
There are many facets affecting little biotech companies today; however, liquidity takes the first place. You can find two major causes why that is therefore: firstly, original community giving (IPO) has been discarded as an leave means for investors, and secondly, accessible capital is decreasing fast because investors are unable to comply with commitments to existing venture capital funds, and the funds which are accessible are freezing in to current opportunities which for various reasons can’t be remaining behind. The results of the is clear, significant liquidity issues.
When a company involves short-term liquidity it will look for the aid of present personal investors who already have gambled on a company’s future. Doing this during an financial crisis suggests present investors will soon be really influenced in terms of dilution of equity, therefore, they’ll be very enthusiastic about providing bridge loans and other forms of money benefits to supply managers the mandatory time to have straight back on their legs and reposition their companies.
Small biotech organizations could monetize some of their assets. Some specialized economic firms present financing against future royalty payments or against current or potential revenues associated with particular clinical growth programs. Several other firms that focus in giving loans to pharmaceutical organizations may help the small biotech company access credit lines to purchase equipment.
Opposite mergers have grown to be remarkably popular among biotech businesses that need to raised their liquidity. Biotech firms with solid pipelines are joining causes with openly dealt firms with a lot of us money reserve but fewer than fascinating pipelines.
Biotech firms must head out and take advantage of the numerous funding options accessible right now outside the industrial arena. Funding from the us government or charity companies will surely strengthen their money abilities along with their credibility in the market, and as if this is simply not enough, additionally it doesn’t decrease equity.
Public funding has widened notably in fields like stem cell research, regenerative medication, and cancer study, while non-profits are very supporting of places such as the healing field, which will be totally forgotten by the major pharmaceutical companies. There are also the businesses specialized in a certain disease which can be really enthusiastic about funding encouraging research directed towards their field of concern.
The near future prospects for the biotech industry are positive. The customers are still spending money on their items, and the curiosity of large pharma organizations in the newest systems produced by biotech firms is very strong. Living sciences consulting companies agree that the firms that make it through this crisis will enjoy less opposition in the foreseeable future, but first, they’ve to function their way through the hurricane, and it is only going to be achieved when they know the problems and alter their finances and strategy accordingly.
The state tries to raises awareness all through public functions and at public places so persons can become aware and state their Free Moneys. Using websites and examining across public data, they try to locate persons whose money is in the state’s custody. Checks or drafts of states, dividends, and insurance guidelines that remain uncashed are included with the lacking money reserve. In case of change of title and handle and a person isn’t locatable, the money that is because of him or her will soon be registered as free lacking money. | <urn:uuid:84461827-3dbd-4fc9-9c0e-3d0127e76cdd> | CC-MAIN-2022-33 | https://www.leedsstudent.org/making-money-with-mutual-resources/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.965179 | 980 | 2.859375 | 3 |
Open Password – Freitag, den 28. Juni 2019
Dow Jones – Niranjam Thomas – News Data – Actionable Insights – Advanced Analytics – DNA platform – Applications – LexisNexis – Big Data – Smart Data – Checklisten – Sanktionsrisiken – Pharma – Risikominderung – Fashion Indusrry – Forced Labor – Due Diligence Risiko Monitoring – Media Monitoring – Competitive Intelligence – Mindshare – WPP – NeuroLab – Tribune – Bankruptcy – Yahoo Finance Premium – Amazon – TenMarks – Brexit – Oxford University Press – Versicherer – Cyber Risks – Watson – Institut for Brand Marketing
News Data Reveal Actionable Insights
through Advanced Analytics
By Niranjan Thomas, General Manager,
Platform & Technology Partnerships at Dow Jones
Can an aggregated news data set help explain a single catastrophic event and its evolution?
In an era where “data is king,” organizations (both non-profit and for-profit) may be overlooking one of the most powerful types of data available to them: news stories. The aggregation of news data from millions of articles can provide insights that solve meaningful problems, which other data sets struggle to address.
To best understand how news stories can be applied to a wide variety of events for the benefit of greater society (and how the same methodology can provide insights to business situations), we examined if the Dow Jones DNA platform—along with our partners—could show the evolution of impact and responses after Hurricane Harvey (which struck the Gulf Coast of the United States in August 2017) and the resulting network effects.
Analysts used the DNA Snapshot API to extract articles associated with Hurricane Harvey from July 2017 to December 2017, a period that began one month before the event and ended four months later.
The next task was understanding the roles and relationships of the different organizations that participated in the recovery efforts.
Presenting the data in a visual way makes it easier to grasp these relationships. In this case, the graph represented the entities as circles and the relationships as lines. The number of lines through an entity indicated if it had a greater impact during the event. This approach provided a compelling, visual way to identify the major players in the recovery effort immediately. It also was possible to identify which entities were related to each other based on the number of lines that connected them on the graph.
Beginning in August 2017, three topic clusters emerged during the first few days of the hurricane. In the graph, these topics were given different colors to make them easy to identify.
RED represented forecasts:
These were reports of wind speeds and issuing warnings, dominated by the U.S. National Hurricane Center.
PURPLE represented impact:
These were reports about the potential, and actual, impact of the hurricane. The articles were denoted by language such as “pummeled Texas with rain” and “disrupted shipments.”
GREEN represented associations:
These were parallels and comparisons made with Hurricane Katrina in 2005, such as death tolls and recovery efforts. The stories talked about things like “evoking memories of” Hurricane Katrina.
By including the dimension of time, as denoted by the dates on the news stories, the graphs showed how the relationships between entities change as the event unfolded. This provided vital insight into how the organizations worked together in different phases of the relief effort.
DNA analysis of data extracted from the platform was able to identify that the Houston Food Bank played a significant leadership role in the recovery efforts, and later (by identifying major sources of donations to Hurricane Harvey aid) how it could be more effective in future disaster recovery efforts.
If the DNA platform had been used to identify this information—or any of the other secondary impacts it found—as it was being reported, the organizations may have been able to identify and address issues even more quickly.
As this shows, a news data set’s veracity can help people and organizations to understand the long-term and secondary impact of natural disasters.
And while disaster relief assessment is an important undertaking, it is only one of an endless variety of activities and insights that can be drawn from news data. A short list of the business scenarios that news data can be applied to advanced analytics include:
Smart Data, Checklisten,
Risiken am Horizont
8 Phases of Competitive Intelligence
LexisNexis hat neue branchenrelevante Whitepaper veröffentlicht:
Big Data or Smart Data – https://p.widencdn.net/loofey/big-data-vs-smart-data-whitepaper-dach
Recherche Checkliste – Von der Vorbereitung zu unternehmensrelevanten Erkenntnissen – https://p.widencdn.net/etthd2/recherche-checkliste-whitepaper-dach
Checkliste zur Beurteilung von Sanktionsrisiken – https://p.widencdn.net/o5zctk/sanktions-checklist-dach
Pharma im Fokus – Wie der richtige Prozess zur Risikominderung katastrophale Fehlschläge verhindern kann – https://p.widencdn.net/wb1dzm/pharma-risikominderung-whitepaper-de-dach
Committing a Fashion Faux Pas – Identifying Forced Labor Risks – https://p.widencdn.net/ayd4wd/forced-labor-fashion-whitepaper-eng-dach
Risiken am Horizont – Warum Sie Due Diligence und Risiko Monitoring gesamtheitlich betrachten sollten – https://p.widencdn.net/sg8rmo/risiken-am-horizont-whitepaper-dach
How to choose the best media monitoring solution for your needs – https://p.widencdn.net/wp9p9m/choosing-the-best-media-monitoring-solution-whitepaper-eng-dach
Leveraging Media Intelligence for Effective Competitor Analysis – https://p.widencdn.net/x3jzi8/leveraging-media-intelligence-eng-dach
8 Phases of Competitive Intelligence Research – https://p.widencdn.net/g0nle8/8-phases-ci-whitepaper-eng-dach
Erfassung unbewusster Gehirnströme
Launched in the office of Mindshare U.S., the global media agency network of WPP, the NeuroLab uses medical-grade EEG (electroencephalogram) and GSR (galvanic skin response) technology to measure second-by-second, non-conscious neurological responses to brand stories and media. The NeuroLab supplements the data from these neurological responses with pre-and-post Implicit Association Tasks (implicit bias testing), as well as quantitative survey responses.
Ein Buyout, der in die Hölle führte. More than a decade after Tribune Co. went private in a leveraged buyout that saddled the company with $13 billion in debt and led to its bankruptcy, Sam Zell and dozens of former executives have agreed to pay $200 million to settle a lawsuit brought by unsecured creditors. The settlement agreement would close the book for the corporate directors and officers behind what Zell himself called the “deal from hell,” an ill-fated transaction that the plaintiffs alleged doomed the company to insolvency from the outset.
Yahoo Finance Premium für Investoren. Yahoo Finance launched its subscription offering for retail investors, Yahoo Finance Premium. This new service gives investors a deeper look at the data and fundamentals essential to everyday returns, paired with third-party research, enhanced charting with event analysis, and sophisticated company profiles to gain new insights and make smarter investments.
Amazon beendet Bildungsprogramm. The final days are drawing near for TenMarks. Come June 30, operations at the Amazon-owned online education program will cease entirely. School and district users had ample warning about the demise of the adaptive K-12 math and writing software—the company issued a notice on its site 15 months ago—and yet many say that the off-boarding process was not a smooth one.
Brexit erreicht die Kinderwelt. Brexit is the “children’s word of the year”, according to linguists at Oxford University Press (OUP). The department’s lexicographers annually analyse thousands of entries to a children’s short story competition and found a marked change in this year’s entries. Researchers found that the young writers used the word Brexit 418 times in their stories, compared to 89 times the previous year.
Expansion der Versicherer in die Reiche der Cyber-Risiken. Verisk, a data analytics provider, announced the launch of its Cyber Underwriting Report, a new InsurTech solution that can help insurers underwrite a wide variety of risks in the growing cyber market with increased speed and precision. The report is designed to help insurers underwrite policies in a range of industries where cyber risks are constantly changing and historical data is limited.
IBMs Watson gründet Institute for Brand Marketing. Adweek announced it is partnering with IBM Watson’s advertising arm to create a free educational resource called the Institute for Brand Marketing, aimed at helping marketing professionals become fluent in the latest technology upending their field. The six-month program is set to launch this September with one complimentary course per quarter produced by the Adweek editorial team and IBM experts. | <urn:uuid:48fe26df-477c-4a2b-9cb9-9769cb132089> | CC-MAIN-2022-33 | https://www.infobroker.de/password-online/archiv/news-actionable-insights-by-advanced-analytics/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.890153 | 2,085 | 1.703125 | 2 |
The Global Commission on the Stability of Cyberspace (GCSC) issued its final report Advancing Cyberstability, as part of a panel held at the 2019 Paris Peace Forum. Stef Blok, Minister of Foreign Affairs of the Netherlands, Jean-Yves Le Drian, Minister of Europe and Foreign Affairs of France, and David Koh, Chief Executive, Cyber Security Agency of Singapore, launched the report and placed the findings in the context of ongoing global efforts to enhance international security in cyberspace. Commission Co-Chairs, Michael Chertoff and Latha Reddy, along with former Chair Marina Kaljurand, presented recommendations and commented on the strategic approach and work of the GCSC.
The report is available in English, Arabic, Chinese, French, Russian and Spanish. It represents the culmination of the Commission’s work over the last three years, offering a cyberstability framework, principles, norms of behavior, and recommendations for the international community and wider ecosystem.
Read the full report here. For an overview, see the Fact Sheet, Press Release. | <urn:uuid:337f5682-4f6a-4a25-9d52-2cc91a148692> | CC-MAIN-2022-33 | https://cyberstability.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.921747 | 230 | 1.882813 | 2 |
Smartphone-based fluorescence imaging systems have the potential to provide convenient quantitative image guidance at the point of care. However, common approaches have required the addition of complex optical attachments, which reduce translation potential. In this study, a simple clip-on attachment appropriate for fluorescence imaging of protoporphyrin-IX (PpIX) in skin was designed using the built-in light source and ultrawide camera sensor of a smartphone. Software control for image acquisition and quantitative analysis was developed using the 10-bit video capability of the phone. Optical performance was characterized using PpIX in liquid tissue phantoms and endogenously produced PpIX in mice and human skin. The proposed system achieves a very compact form factor (<30 cm3) and can be readily fabricated using widely available low-cost materials. The limit of detection of PpIX in optical phantoms was <10 nM, with good signal linearity from 10 to 1000 nM (R2 >0.99). Both murine and human skin imaging verified that in vivo PpIX fluorescence was detected within 1 hour of applying aminolevulinic acid (ALA) gel. This ultracompact handheld system for quantification of PpIX in skin is well-suited for dermatology clinical workflows.
High positive margin rates in oncologic breast-conserving surgery are a pressing clinical problem. Volumetric X-ray scanning is emerging as a powerful ex vivo specimen imaging technique for analyzing resection margins, but X-rays lack contrast between non-malignant and malignant fibrous tissues. In this study, combined micro-CT and wide-field optical image radiomics were developed to classify malignancy of breast cancer tissues, demonstrating that X-ray/optical radiomics improve malignancy classification. Ninety-two standardized features were extracted from co-registered micro-CT and optical spatial frequency domain imaging samples extracted from 54 breast tumors exhibiting seven tissue subtypes confirmed by microscopic histological analysis. Multimodal feature sets improved classification performance versus micro-CT alone when adipose samples were included (AUC = 0.88 vs. 0.90; p-value = 3.65e−11) and excluded, focusing the classification task on exclusively non-malignant fibrous versus malignant tissues (AUC = 0.78 vs. 0.85; p-value = 9.33e−14). Extending the radiomics approach to high-dimensional optical data—termed “optomics” in this study—offers a promising optical image analysis technique for cancer detection.
This article reviews deep learning applications in biomedical optics with a particular emphasis on image formation. The review is organized by imaging domains within biomedical optics and includes microscopy, fluorescence lifetime imaging, in vivo microscopy, widefield endoscopy, optical coherence tomography, photoacoustic imaging, diffuse tomography, and functional optical brain imaging. For each of these domains, we summarize how deep learning has been applied and highlight methods by which deep learning can enable new capabilities for optics in medicine. Challenges and opportunities to improve translation and adoption of deep learning in biomedical optics are also summarized.
High-resolution microendoscopy (HRME) is a low-cost strategy to acquire images of intact tissue with subcellular resolution at frame rates ranging from 11 to 18 fps. Current HRME imaging strategies are limited by the small microendoscope field of view (∼0.5 mm2); multiple images must be acquired and reliably registered to assess large regions of clinical interest. Image mosaics have been assembled from co-registered frames of video acquired as a microendoscope is slowly moved across the tissue surface, but the slow frame rate of previous HRME systems made this approach impractical for acquiring quality mosaicked images from large regions of interest. Here, we present a novel video mosaicking microendoscope incorporating a high frame rate CMOS sensor and optical probe holder to enable high-speed, high quality interrogation of large tissue regions of interest. Microendoscopy videos acquired at >90 fps are assembled into an image mosaic. We assessed registration accuracy and image sharpness across the mosaic for images acquired with a handheld probe over a range of translational speeds. This high frame rate video mosaicking microendoscope enables in vivo probe translation at >15 millimeters per second while preserving high image quality and accurate mosaicking, increasing the size of the region of interest that can be interrogated at high resolution from 0.5 mm2 to >30 mm2. Real-time deployment of this high-frame rate system is demonstrated in vivo and source code made publicly available.
We conducted a prospective evaluation of the diagnostic performance of high-resolution microendoscopy (HRME) to detect cervical intraepithelial neoplasia (CIN) in women with abnormal screening tests. Study participants underwent colposcopy, HRME and cervical biopsy. The prospective diagnostic performance of HRME using an automated morphologic image analysis algorithm was compared to that of colposcopy using histopathologic detection of CIN as the gold standard. To assess the potential to further improve performance of HRME image analysis, we also conducted a retrospective analysis assessing performance of a multi-task convolutional neural network to segment and classify HRME images. One thousand four hundred eighty-six subjects completed the study; 435 (29%) subjects had CIN Grade 2 or more severe (CIN2+) diagnosis. HRME with morphologic image analysis for detection of CIN Grade 3 or more severe diagnoses (CIN3+) was similarly sensitive (95.6% vs 96.2%, P = .81) and specific (56.6% vs 58.7%, P = .18) as colposcopy. HRME with morphologic image analysis for detection of CIN2+ was slightly less sensitive (91.7% vs 95.6%, P < .01) and specific (59.7% vs 63.4%, P = .02) than colposcopy. Images from 870 subjects were used to train a multi-task convolutional neural network-based algorithm and images from the remaining 616 were used to validate its performance. There were no significant differences in the sensitivity and specificity of HRME with neural network analysis vs colposcopy for detection of CIN2+ or CIN3+. Using a neural network-based algorithm, HRME has comparable sensitivity and specificity to colposcopy for detection of CIN2+. HRME could provide a low-cost, point-of-care alternative to colposcopy and biopsy in the prevention of cervical cancer.
Our review studies how smartphone-based imaging (SBI) systems are designed and tested for specialized applications in medicine and healthcare. An evaluation of current research studies is used to provide guidelines for improving the impact of these research advances. A holistic assessment of SBI systems must include interpretation of their value for intended clinical settings and how their implementations enable better workflow. A set of six guidelines are proposed to evaluate appropriateness of smartphone utilization in terms of clinical context, completeness, compactness, connectivity, cost, and claims. Ongoing work should prioritize realistic clinical assessments with quantitative and qualitative comparison to non-smartphone systems to clearly demonstrate the value of smartphone-based systems.
This work contains a series of clinical studies conducted at a Brazilian cancer hospital to validate a low-cost, portable, high-resolution microendoscope (HRME) for real-time diagnostic evaluation of cervical lesions. Findings from these clinical studies led me to explore two approaches to further improve HRME: 1) improved image analysis algorithms and 2) improved optical instrumentation. In total, five studies are presented: three clinical studies and two technical studies. Taken altogether, these studies provide strong evidence for the potential of HRME to improve cervical cancer prevention in low-resource healthcare settings.
Cervical cancer disproportionally affects women in low- and middle-income countries, in part due to the difficulty of implementing existing cervical cancer screening and diagnostic technologies in low-resource settings. Single-board computers offer a low-cost alternative to provide computational support for automated point-of-care technologies. Here we demonstrate two new devices for cervical cancer prevention that use a single-board computer: 1) a low-cost imaging system for real-time detection of cervical precancer and 2) a low-cost reader for real-time interpretation of lateral flow-based molecular tests to detect cervical cancer biomarkers. Using a Raspberry Pi computer to provide real-time image collection and processing, we developed: 1) a low-cost, portable high-resolution microendoscope system (PiHRME); and 2) a low-cost automatic lateral flow test reader (PiReader). The PiHRME acquired high-resolution (4.4 μm ) images of the cervix at half the cost of existing high-resolution microendoscope systems; image analysis algorithms based on convolutional neural networks were implemented to provide real-time image interpretation. The PiReader acquired and analyzed images of a point-of-care human papillomavirus (HPV) serology test with the same contrast and accuracy as a standard flatbed high-resolution scanner coupled to a laptop computer, for less than one-fifth of the cost. Raspberry Pi single-board computers provide a low-cost means to implement point-of-care tools with automatic image analysis. This work demonstrates the promise of single-board computers to develop and translate low-cost, point-of-care technologies for use in low-resource settings.
Introduction: Cervical cancer mortality rates remain high in low- and middle-income countries (LMICs) and other medically underserved areas due to challenges with implementation and sustainability of routine screening, accurate diagnosis, and early treatment of preinvasive lesions. Areas covered: In this review, we first discuss the standard of care for cervical cancer screening and diagnosis in high- and low-resource settings, biomarkers that correlate to cervical precancer and cancer, and needs for new tests. We review technologies for screening and diagnosis with a focus on tests that are already in use in LMICs or have the potential to be adapted for use in LMICs. Finally, we provide perspectives on the next five years of technology development for improved cervical cancer screening and diagnosis in LMICs. Expert opinion: Innovation toward improved molecular and imaging tests is needed to enable effective, affordable see-and-treat approaches to detect and treat cervical precancer in a single visit. Current molecular tests remain too complex and/or costly for widespread use. Especially with imaging tests, decision support may improve performance of new technologies.
Proflavine is an acridine dye used with high-resolution microendoscopy for in vivo diagnostic evaluation of cervical epithelial cells. However, there are concerns that even short-term exposure of cervical tissue to dilute proflavine may increase cervical cancer risk. We performed a retrospective analysis of women referred for colposcopy to Barretos Cancer Hospital comparing the risk of cervical disease progression in those whose cervical tissue was (n = 232) or was not exposed (n = 160) to proflavine. Patients in both groups underwent treatment and follow-up based on histopathologic results and per the local standards of care. Progression of disease was evaluated by comparing histopathology from the initial visit to the worst subsequent histopathology result from all follow-up visits. Mean duration of follow-up was 18.7 and 20.1 months for the proflavine-exposed and controls groups, respectively. There were no significant differences in disease progression from normal/CIN1 to CIN2/3 or from any initial diagnosis to invasive cancer between the proflavine exposed and control groups overall. Risks of cervical dysplasia progression observed in this study are in agreement with those of the natural history of cervical cancer. Our results suggest that cervical exposure to dilute proflavine does not increase the risk of cervical precancer and cancer.
Cervical cancer is a leading cause of death in underserved areas of Brazil. This prospective randomized trial involved 200 women in southern/central Brazil with abnormal Papanicolaou tests. Participants were randomized by geographic cluster and referred for diagnostic evaluation either at a mobile van upon its scheduled visit to their local community, or at a central hospital. Participants in both arms underwent colposcopy, in vivo microscopy, and cervical biopsies. We compared rates of diagnostic follow-up completion between study arms, and also evaluated the diagnostic performance of in vivo microscopy compared with colposcopy. There was a 23% absolute and 37% relative increase in diagnostic follow-up completion rates for patients referred to the mobile van (102/117, 87%) compared with the central hospital (53/83, 64%; P = 0.0001; risk ratio = 1.37, 95% CI, 1.14–1.63). In 229 cervical sites in 144 patients, colposcopic examination identified sites diagnosed as cervical intraepithelial neoplasia grade 2 or more severe (CIN2+; 85 sites) with a sensitivity of 94% (95% CI, 87%–98%) and specificity of 50% (95% CI, 42%–58%). In vivo microscopy with real-time automated image analysis identified CIN2+ with a sensitivity of 92% (95% CI, 84%–97%) and specificity of 48% (95% CI, 40%–56%). Women referred to the mobile van were more likely to complete their diagnostic follow-up compared with those referred to a central hospital, without compromise in clinical care. In vivo microscopy in a mobile van provides automated diagnostic imaging with sensitivity and specificity similar to colposcopy.
A rapid test to identify patients with sickle cell disease could have important benefits in low-resource settings. Sickle cell anemia (SCA) affects about 300,000 newborns each year, the majority of whom are born in sub-Saharan Africa. Low-cost therapies are available to treat SCA, but most countries in sub-Saharan Africa lack robust neonatal screening programs needed to identify patients in need of treatment. To address this need, we developed and evaluated a competitive lateral flow assay that identifies patients with SCA (genotype HbSS) in 15 minutes using undiluted whole blood. A small volume of blood (0.5 μL– 3 μL) is mixed with antibody-coated blue latex beads in a tube and applied to the strip. Strips are then placed in a well of running buffer and allowed to run for 10 minutes. Laboratory evaluation with samples containing different proportions of hemoglobin A (HbA) and hemoglobin S (HbS) indicated that the test should enable identification of SCA patients but not persons with sickle cell trait (SCT). We evaluated the test using 41 samples from individuals with SCA, SCT, and normal blood. With visual inspection or quantitative analysis, we found a 98% accuracy when differentiating SCA from normal and SCT samples as a group (90% sensitivity and 100% specificity for identifying SCA). This work demonstrates important steps towards making a lateral flow test for hemoglobinopathies more appropriate for point-of-care use; further work is needed before the test is appropriate for clinical use.
Although the effects of ethanol on protein receptors and lipid membranes have been studied extensively, ethanol’s effect on vesicles fusing to lipid bilayers is not known. To determine the effect of alcohols on fusion rates, we utilized the nystatin/ergosterol fusion assay to measure fusion of liposomes to a planar lipid bilayer (BLM). The addition of ethanol excited fusion when applied on the cis (vesicle) side, and inhibited fusion on the trans side. Other short-chain alcohols followed a similar pattern. In general, the inhibitory effect of alcohols (trans) occurs at lower doses than the excitatory (cis) effect, with a decrease of 29% in fusion rates at the legal driving limit of 0.08% (w/v) ethanol (IC50 = 0.2% v/v, 34 mM). Similar inhibitory effects were observed with methanol, propanol, and butanol, with ethanol being the most potent. Significant variability was observed with different alcohols when applied to the cis side. Ethanol and propanol enhanced fusion, butanol also enhanced fusion but was less potent, and low doses of methanol mildly inhibited fusion. The inhibition by trans addition of alcohols implies that they alter the planar membrane structure and thereby increase the activation energy required for fusion, likely through an increase in membrane fluidity. The cis data are likely a combination of the above effect and a proportionally greater lowering of the vesicle lysis tension and hydration repulsive pressure that combine to enhance fusion. Alternate hypotheses are also discussed. The inhibitory effect of ethanol on liposome-membrane fusion is large enough to provide a possible biophysical explanation of compromised neuronal behavior. | <urn:uuid:e9d2c985-902e-4588-8eca-78ec07895d90> | CC-MAIN-2022-33 | https://brady.ai/publications/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.923784 | 3,502 | 1.726563 | 2 |
A healthy spine allows us to move freely in our lives and do fun things like run and jump and dance. Forgetting about spine health can lead to permanent injuries that prevent you from doing the things you love.
Seeing a chiropractor when you experience back or neck pain, like 35 million other people in the U.S. do, prevents issues before they happen. You can also get advice on how to care for your spine properly.
Learn how to keep your spine healthy with the 9 chiropractic care tips below.
1. Exercise Regularly
One of the best things you can do for spine health is to exercise regularly.
The U.S. Department of Health and Human Services recommends at least 30 minutes of physical activity daily. This means doing something within the moderate to intense range like brisk walking, jogging, swimming, mowing the lawn, aerobic dancing, strength training, or rock climbing.
Not only will this improve spinal health, but it also improves your health overall.
2. Work on Core Strength
Concentrate on strengthening your core muscles when exercising. Your core is made of more than just your abdominal muscles. It also includes those in your lower to middle back.
The stronger your core, the less pressure and strain you on your lower back and spine. Core strength also helps you maintain good posture and reduces back pain on the whole.
3. Pay Attention to Your Posture
Poor posture is a major contributor to chronic back problems and spinal issues. Sitting up straight while watching television, working at a desk, or sitting at the table for a meal can eliminate many back and neck issues.
It may feel strange or even hurt at first, but that’s because your body has become accustomed to slouching. You should also get up and stretch at least once an hour if you work at a desk. This will help you better maintain your posture.
4. Sleep Support
The quality of your mattress affects your spinal health as well as your ability to sleep. Be sure your mattress provides enough support that you do not wake up with pain in your neck or back.
If you have a good mattress but often wake up with neck pain, you may need a new pillow.
Listen to your body and sleep in its preferred position. Back sleepers should place a pillow under their knees to support their lower spine. Side-sleepers should place one between their knees to keep them properly aligned with their hips.
5. Wear Good Shoes
Just like your body needs support while you’re sleeping, your feet and spine need support while walking.
Good shoes give you a strong base to help keep your body and spine in alignment. Invest in a high-quality pair of shoes that fit correctly to keep your spine healthy.
6. Stand Properly
Standing all day long puts lots of strain on your lower back and spine. You can relieve this pressure by standing in certain positions rather than others.
Try standing with one foot slightly ahead of the other and keeping your knees bent. You can also shift your weight to your heels instead of your toes or from your left foot to your right foot.
Be sure you keep your head level so that your shoulders and earlobes align. Use those good core muscles and engage your abs to support your spine even more.
7. Reach and Bend with Care
Take care when reaching to get something from up high or bending to pick something up off the ground.
Do not overextend your back when reaching up to a high shelf. Use a sturdy stepladder or stool instead. Ask someone to take the object from you rather than trying to step down with it in your arms, especially if it’s heavy.
When picking up heavy objects off the floor, always bend with your knees and not your back. Try to keep your back straight and supported by engaging your core as you lift the object back up.
Never twist while picking up a heavy object and always ask for help if you need it.
8. Be Present When Using Technology
Try not to space out and start slouching or sitting in an uncomfortable position while on the computer or watching TV.
Bring your cell phone up to eye level when texting so you do not bend your head down and forward to see the screen.
Position screens so you can look at them without needing to move your neck back and forth. If you wear glasses, adjust them so you do not need to move your head to see clearly.
Place your feet on the ground when sitting in front of a screen and keep your knees lower than your hips. Avoid reaching in order to use the technological device.
Use a headset to talk on the phone hands-free rather than pinching the phone between your shoulder and your ear.
9. Don’t Ignore Warning Signs
Finally, if you start to feel a small pain in your back while doing an activity, STOP IMMEDIATELY! Listen to your body and try it again.
The same goes for persistent pain in your back or neck. Even a small, constant pain could indicate much bigger issues. Leaving a small pain untreated can turn it into something more serious. | <urn:uuid:21051972-42ab-406f-9c5b-c1e6feeefa75> | CC-MAIN-2022-33 | http://rosnerchiro.com/the-best-chiropractic-care-tips-for-optimal-spine-health/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.934776 | 1,056 | 2.390625 | 2 |
Mallorca takes its traditional pastry, the ensaïmada, quite seriously. The Balearic island established a denomination of origin, Ensaimada de Mallorca, to differentiate knockoff versions from authentic products, much as winemakers do. Pau Llull’s bakery, Forn Fondo, is one establishment whose ensaïmadas have the stamp of approval from locals and visiting cruisers alike.
Forn Fondo has produced pastries since at least 1742, and it’s been in Llull’s family since 1911, when his great-grandmother and her husband took over. Llull and his sister, Neus, are now fourth-generation Forn Fondo owners.
Naturally, Llull’s most popular pastries are ensaïmadas, which are spiral-shaped and can come with various fillings. However, Llull says, the most traditional ensaïmadas, and the ones that carry the denomination of origin, are “smooth” (sans filling) or filled with cabell de àngel — a sweet mixture of pumpkin and sugar.
Forn Fondo, located in Mallorca’s coastal capital, Palma, is a mere half-mile from the water, so yachtsmen don’t have to go far to taste this island treat.
How did you learn to bake?
I learned from a young age, the art of baking, while working for the bakery after I left school. And since I was 16 years old, I learned more formally from the pastry chefs who worked, doing training courses with other pastry chefs and my father.
What other pastries are popular at Forn Fondo?
In our store you can also find the authentic cuartos embatumats, which are our most popular cake made with sponge cake, yolk, meringue and chocolate.
How does it feel to be part of a long-standing family business?
I can say that I am very proud to have continued with the family tradition of the bakery, where the greatest gratitude is given by customers who visit us daily and value our products.
More on Mallorca
Caves of Drach: These underground caves have a walking path about three-quarters of a mile long and include Europe’s largest underground lake, Lake Martel.
Bellver Castle: Anyone can tour this historic hilltop castle built between 1300 and 1311. It is located about 2 miles from the center of Palma.
The Big Cheese: This popular diving spot has 90 percent of its rock formations underwater. It’s named for Swiss-cheese-like “holes” that house marine life. | <urn:uuid:9a625813-8edf-47b8-a734-1bcd8f013362> | CC-MAIN-2022-33 | https://www.yachtingmagazine.com/island-icon-baker-pau-llull/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.959131 | 567 | 1.523438 | 2 |
Diverse Modernism | Modern Diversity
Towards an European Triennial of Modernism (ETOM)
The story of Modernism is a story about building bridges, not one about claiming borders: The outbreak and development of reform-oriented movements at the beginning of the 20th century was a supra-regional phenomenon that spread on international scale and became particularly visible in Europe and stylistic differentiation after World War II. A fact the upcoming programme of the Triennale der Moderne / European Triennial of Modernism 2022 and 2025 wants to focus with the help of obtaining funding on EU level.
Modernism as an European Phenomenon
At the turn of the 20th century many European cities and regions were facing the same situation: Due to industrialisation people from the countryside moved into the more urbanised areas were a growing number of factories settled. As a result living conditions, society and politics were changing rapidly. Artist and designers created networks and developed new forms of expressions. New paradigms of design and urban planning were needed, especially in the big cities. Just like the German Werkbund and the Bauhaus became driving forces in Germany, other movements like De Stijl, Russian Constructivism or Czech Functionalism – just to name a few – evolved in other parts of the World. Many of the protagonists were global citizens sharing ideas beyond borders. Doing so they created the so-called International Style which laid the foundation for mid and late century modernism worldwide.
The Triennale der Moderne / Triennial of Modernism is aiming to become a supra-regional and multi-national festival and network on building culture (Baukultur) and the ideas of emerging, classic, mid century and late modernism. The goal is to trace back these developments and create a link between different parts of Europe that share a similar history. In order to do so and to draw a more complex and complete picture, the Triennial of Modernism is heading for networking across the borders and different institutional levels and plan to apply for EU funding. Doing so, the organisers looked out for partners on European level which led to the creation of a heterogenous network of highly engaged players in the field of architectural culture, communication, research and heritage preservation.
Back History, Key Facts and Issues
The focus and starting point for the Triennale der Moderne (Triennial of Modernism) in the founding year 2013 were the UNESCO World Heritage sites from the 1920s in the three German cities of Berlin, Weimar and Dessau. The Triennial of Modernism is an initiative of these three core cities and some major institutions there. But at the same time it also incorporates a grassroot movement of various local institutions and initiatives that somehow relate to the spirit of emerging Modernism from the Bauhaus era and far beyond that.
The aim of the organisers is above all to raise public awareness of the built and cultural heritage of the 20th century, to arouse a broader tourist interest and to embed building culture in general contemporary history and transcultural discourses. Since 2013, an extensive programme with around 100-200 individual events has taken place every three years on three consecutive autumn weekends which allows visitors traveling from place to place. The schedules include architectural tours, exhibitions, public events, network meetings, performances, interactive and educational formats, lectures and media presentations, public and scientific symposia and much more.
In order to draw the full picture and to reflect the broad heritage of modernist thinking that revealed again after World War II, the programme of the Triennial of Modernism 2019 started to focus objects and developments that relate to International Style, postwar, mid- and late century modernism too. This extended range also includes shifts in design, architecture and society of similar movements that were inherent throughout Europe and contributed to decades of peaceful coexistence and supra-national cultural and political exchanges and potential co-creation of cultural formats.
At the beginning of 2021, the initiative partners of the Triennial decided a renewed cooperation, with the aim of establishing and sustainably expanding the Triennial in the long term.
Creating Networks on EU Level
As a rule, the German programme and its organisation is financed by state funds, subsidies, third-party funds and/or the project partners‘ own funds.
In addition to this national perspective and back history of the event, a Europe-wide festival and network of Modernism is to be established in the near future. In this network-project cities, local institutions, civil and official and actors from across Europe with similar focus will interact, share interests, join activities and mutually promote each other.
The organisers believe that a format like this seems all the more necessary in view of the current war in Ukraine or the unexpected resurgence of nation-state egoism. The Triennial of Modernism wants to bring the states and people of Europe closer together through mutual exchange, understanding and the stimulation of active cooperation.
The application for funding at EU level is targeting the event years 2022 and 2025. Communal authorities, cultural institutions and civil initiatives from other European countries who would like to participate should contact firstname.lastname@example.org for more information.
Stay tuned via Social Media
The website www.triennale-der-moderne.de will be continuously updated during the next months, so that the variety of formats, institutional, municipal, private and civil partners will become more and more visible. This broad range of different actors and topics provides a basis for future explorations. In the meanwhile, we aim to publish and promote special events and/or news in the field of architecture, design, social and urban planning issues related to the modernist era on our recently launched bilingual Social Media channels. Keep posted and follow the Triennial of Modernism at:
2022 with partners from
(in charge of the CREA-Entry)
- zukunftsgeraeusche GbR (zkg), Berlin
- buschfeld.com; Ben Buschfeld (BB), Berlin
- Goethe-Institut (GI), Munich
By nation in alphabetical order
• National Gallery in Prague (NGP), Prague
• Forum for Architecture and Media (4 AM), Brno
• Estonian Academy of Arts – Institute of Art History and Visual Culture (EAA–EKA), Talinn
• Estonian Museum of Architecture (EMA)
• ICOMOS International Secretariat, Paris
• Hungarian Museum of
Architecture (MEM-MDK), Budapest
• The Hungarian Contemporary
Architecture Centre (KÉK), Budapest
• Museum of Decorative
Arts and Design (LNMM), Riga
• Latvian Design Centre (FOLD), Riga
• Kaunas 2022 (K2022),
Kaunas European Capital of Culture
• DOCOMOMO international
• Contineo 2020 (CONTINEO), Skopje
• University American College Skopje – Privatna Ustanova – Department of Architecture (UACS)
• National Institute of Architecture and
Urban Planning (NIAiU), Warsaw
• Institut of Architecture Foundation (FIA), Cracow
• Asociația Română pentru Cultură,
Educație și Normalitate (ARCEN), Bucharest
• Belgrade International
Architecture Week (ABA-BINA), Belgrade
• ZAVOD – Zavod za zastitu
spomenika kulture grada Beograda
(Cultural Heritage Preservation Institute of Belgrade)
• Slovak Design Center (SDC), Bratislava | <urn:uuid:c9652218-a6e2-4413-bdd4-a529a4e83f7e> | CC-MAIN-2022-33 | https://www.triennale-der-moderne.de/2022/european-triennial-of-modernism-etom/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.909553 | 1,625 | 2.5625 | 3 |
Hole-and-slot tape loom with two sets of holes, one above the other. The loom frame is a rectangular box without a top. The the short sides of the rectangle form the front and back of the box and are taller than the long sides. The warp beam is set into supports at the back of the box. The heddle is inset on the front of the box. The top of the piece of wood forming the back side of the box, behind the warp beam, has some decorative woodwork, as does the top of the heddle board. The cloth beam is mounted behind the heddle board, inside the box on one of the lower side walls. Below the heddle there is a horizontal slot in the front board. The slot is in line with the cloth beam mounted inside the loom frame. The loom is warped and there is a shuttle and partially-woven tape at the front of the loom. The tape is not being fed through the horizontal slot below the heddle. The loom is based on examples from European folk-history museums. Built by Fred Hatton. | <urn:uuid:3e4df3d7-239c-4bfd-8c58-ec0d91fc33f2> | CC-MAIN-2022-33 | https://spwhsl.com/gh-box-loom-009/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.950746 | 234 | 2.984375 | 3 |
Sea Monkey (a dapper, bow-tied brine shrimp) and Bob (a green-speckled puffer fish) both face a worrisome underwater plight—density.
Surrounded by blue water and colorful corals, Sea Monkey is very concerned. What if his tiny but heavier-than-it-looks frame sinks to the bottom of the ocean? It is dark and scary down there. Bob thinks the idea is absurd, but Sea Monkey’s logical list of heavy items such as anchors, tubas, rocks—even dinosaurs—changes his mind. (“You have never seen a dinosaur,” admonishes Bob. “That is true. But I’m pretty sure they sink,” Sea Monkey fires back.) But now Bob is worried. What if his very light frame floats to the top? There is air up there! He begins to list items that float, and terror seizes both oceanic creatures. But just as their worst fears begin to come true (“It is happening! I think I am floating, Sea Monkey!”), a clever solution stops them in their tracks. Sea Monkey and Bob’s wry, deadpan riffs match Ohi’s humorous digital asides. The text is told entirely in color-coded dialogue, Sea Monkey’s lines printed in pink-outlined white letters and Bob’s in green-outlined yellow. The ending feels slapdash given the relaxed pacing of the pair’s banter to that point, but readers’ funny bones won’t mind.
A barrel of giggles, exaltation of friendship, and slight science to boot.(Picture book. 4-8) | <urn:uuid:9ec2e866-0409-46f7-9dac-26d902d84153> | CC-MAIN-2022-33 | https://covers.kirkusreviews.com/book-reviews/aaron-reynolds/sea-monkey-bob/print/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.932529 | 355 | 2.0625 | 2 |
Good behavior is a learning process for children, and we are their roadmap. Children usually behave based on their own emotions and impulses. At the same time, being a parent is also a learning process and sometimes we rely on our own emotions and impulses to teach. Usually, that means we often resort to punishments when a child misbehaves, missing a crucial opportunity to teach them. With that said, I am going to break down how to teach good behavior through discipline vs. punishment.
Let’s compare the two words and what they really mean:
- Punishment – means to inflict pain or suffering as a penalty.
- Discipline – means to teach or provide a learning opportunity.
It’s understandable that we as parents can get frustrated when a child misbehaves, specifically when they make the same poor behavior choices over and over. At the same time, if we have clear goals to teach good behavior skills, then we can respond better. The better we respond, the better the results.
What are our goals for our children when they misbehave?
- Our first goal is to get them to cooperate. This is primarily short-term.
- The second goal that we don’t always consider is more long-term, and that is to make better choices without the threat of punishment or consequences.
- To accomplish this, we need to consider both as often as possible. To accomplish this requires that you are patient, present, and intentional.
Now, let’s look at how punishment and discipline compare when accomplishing our goal of developing good behavior skills…
Punishment vs. Discipline:
- Punishment may shut down an undesirable behavior, but if you teach your child, then they will develop self-discipline skills such as managing emotions and impulses.
- When you discipline, you foster a relationship based on trust and self-confidence.
- When you punish, you build a proverbial wall and decrease one’s trust and self-confidence.
With that said, it makes sense to have a strategy for disciplining a child when they misbehave…
3-steps of discipline:
- CONNECT – this doesn’t mean to be permissible or passive, but to ensure that as you begin to set clear expectations, your child calms down emotionally and feels your loving/caring approach. When a child is upset, they are less likely to hear what you are saying. You must be patient so that you remain as calm as possible during the process, which is the hardest but most stress-free way to discipline.
- RE-DIRECT – list out what the poor behavior choice was as well as what the proper behavior choice is, see my podcast Episode 12: ‘Making Choices’ for more information. This requires you to be present so that you can clearly calculate the desired outcome.
- REPAIR – discuss necessary steps on how to solve the current behavior problem, review better choices, and set ground rules should the poor behavior choices continue. This requires you to be intentional in your actions so that your long-term goals start to take shape.
Of course, this strategy won’t work all the time, so it’s also important to have a backup strategy. For starters, it’s better to say ‘consequences’ instead of ‘punishments’ so that your intentions are more goal-oriented versus pain-oriented.
When are consequences ok?
- Only after you’ve you have worked through the 3 steps of discipline and your child intentionally disobeys the ground rules.
What type of consequences is ok?
- One that matches the behavior. For example: if the child throws her iPad in an impulsive rage, then taking away her iPad for 48 hours is considered a reasonable consequence. (A week is a long period and could potentially trigger more anger and rage. The goal is to teach her, but also empower her to self-correct her behavior in the future. The smaller time frame will teach her that throwing things is not acceptable, but at the same time, you trust that she will re-correct this behavior within the next few days.)
What type of consequences are not ok?
- One that is retroactive. For example: taking away good things isn’t the best consequence, such as Taekwondo lessons, which positively reinforces self-discipline. Although parents may think this is a good move because it’s an activity they enjoy and the pain of losing Taekwondo will teach them a valuable lesson, it’s doing the opposite. Pain infliction based on taking away something they like may cause more misbehavior and instill long-term damage in their trust for you. Also, strongly consider the fact that they lose all the positive benefits karate reinforces such as discipline, confidence, fitness, positive social interaction, and more.
- One that decreases morale. For example: taking away a student’s belt will shame the child, which decreases self-esteem. Public humiliation will leave a permanent footprint in the child’s brain, specifically a negative one. For every negative footprint left, self-esteem and morale decrease. The more children lack self-confidence and moral, the lesser chance you have of them believing in themselves to make proper behavior choices.
So, what do you do if you have a child that is misbehaving all the time with bits of rage, back-talking, and defying the rules?
- You map out a productive strategy that includes a method for developing better behavioral habits along with pre-determined consequences. For example: if you hit someone, then you must write a letter to the person you hit (or if you are younger, you must meet with the person with a specific pre-framed apology).
- If you throw something, then you lose a personal item for 48 hours.
- If you show poor manners, then you must re-enact the proper manner if you are younger, or write a letter about having better manners. All of this should be pre-framed.
- If you wake up late for school because you stayed up late the night before, then you must go to bed an hour earlier for the next two days.
- At the same time, if you want consequences to work then you also need rewards. Reward your child when she goes a week without misbehaving. (This time frame may be shorter or longer depending on the child.) Also, the best rewards are not material things, but more relationship-building rewards. For example, she can pick to go to a family movie or a special place for a family dinner.
- My suggestion is to make a list of rewards and consequences so that you are prepared.
Now, what if you’ve tried this strategy and it doesn’t work?
- For starters, be sure to give it time. If you are struggling with your child, then you must be reasonable on how long it will take to develop better behavior choices. It won’t happen overnight, and at the same time, she may get better and then fall off track again.
- However, if you’ve tried these strategies for a solid month with no success, then the next step is to bring in an expert. Chances are there may be some other underlying reasons for the behavior.
Bottom line, the three biggest takeaways from this are:
- Discipline is the better, more positively-productive method for instilling long-term behavior skills.
- Connect, re-direct, and repair is the 3-step method for developing self-discipline skills.
- When necessary, the consequences are more productive than punishments. Avoid consequences that are retroactive or ones that decrease morale. Be sure to add rewards as well.
I hope this article sheds some positive light on how to help your child make better behavior choices!
To learn more about our powerful Kids Martial Arts/Childhood development program that uses martial arts as the vehicle for growth, or to get your child started at our Midlothian location, click the button below: | <urn:uuid:dcf2b14c-5431-4408-b83e-8e285b472088> | CC-MAIN-2022-33 | https://resilientmartialarts.com/2020/03/03/parenting-tips-punishment-vs-discipline/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.944733 | 1,677 | 3.578125 | 4 |
Sambal is a versatile Southeast Asian chili sauce used to season stir-fries, noodles, meat, eggs, shrimp and vegetables. It is also enjoyed as a sweet, sour and spicy table condiment. In this version, chilies, onions, garlic, lemongrass, vinegar and seasonings are combined in a blender before simmering to meld the flavours.
2 cups (500 milliliters) Coarsely chopped red Fresno chilies
Place all ingredients, except oil, in food processor or blender container; cover. Process until coarsely chopped. Heat oil in large saucepan on low heat. Add the sambal purée; cook 15 minutes or until fragrant and oil floats to the top, stirring occasionally. Store in clean, tightly covered container or jar in refrigerator up to 2 weeks.
• Fresno chilies are similar in size to the jalapeño. When green they have a mild heat level. As they ripen and turn red, they become hotter.
• Chilies contain capsaicin which can burn your skin. Wear rubber gloves when handling the chilies. | <urn:uuid:51715aa2-f630-4f47-9b65-158f8d814c99> | CC-MAIN-2022-33 | https://www.clubhouseforchefs.ca/en-ca/recipes/flavour-forecast/cooked-sambal-sauce | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.871687 | 251 | 1.601563 | 2 |
Chives distributed by an upstate New York company have been recalled for possible listeria contamination. They were sold in Pennsylvania, New Jersey, Maryland and six other states.
The Associated Press reports the chives were packaged in clamshell containers, one-pound bags and twist tie bunches under lot No. 0201111 and dated May 6.
Listeria is a bacterium that can cause fever, abdominal illness and infection for those with weakened immune systems. No illnesses have been reported, and consumers can return the chives to their retailers for refunds. | <urn:uuid:db498a3e-1949-4b0d-b5c6-c5189915308d> | CC-MAIN-2022-33 | https://whyy.org/articles/chives-recalled-for-possible-listeria-contamination/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.973333 | 115 | 1.648438 | 2 |
Danish bureau Unique Models is currently the only agency in the country to include a woman who wears a hijab – 21-year-old Amina Adan – in its catalogue of models, reports broadcaster DR.
Unique Models administrative director Jacqueline Mikkelsen told DR that she saw Adan’s breakthrough as great news.
“I have been in the modelling industry for 30 years and I am so happy whenever we hire a dark-skinned or Asian girl. And Amina is just one of many who will show our diversity,” Mikkelsen said.
“This is not something we have thought about as if we think the new black is someone with a hijab. She is here because she is beautiful, and because she has huge potential as a model,” she added.
The administrative director said that she felt the Danish fashion industry was ready for its clothes to be modelled by Muslim girls.
“I think that this will inspire creativity. I expect the Danish fashion industry in particular to step up to the plate and be creative, and I expect it to see the potential in booking Amina on an equal footing to others. It might need a bit of creativity, but that’s something I believe the Danish fashion industry has,” she said.
Fashion expert and television presenter Chris Pedersen told DR that the use of a model wearing a hijab was “exceptional”.
“Globally, there are very, very few models who have worked while wearing a hijab. In the US there is one young woman who has appeared at shows for many of the large fashion houses and in many of the big department stores, but that is an extremely small segment, and this is something that is very much in its infancy,” Pedersen said.
While much debate on the modelling industry focuses on the ideals models should promote, with many young girls seeing the women as role models, Pedersen said that Muslim women have hitherto been left behind, with discussion focused on weight, gender and skin colour.
“There is no denying that young Muslim women need a role model, and now there are without doubt people in the fashion industry that have seen this and want to promote a role model,” he told DR. | <urn:uuid:efbe95c3-1100-417b-ba2a-9196d62a49d7> | CC-MAIN-2022-33 | https://www.thelocal.dk/20170921/danish-fashion-agency-hires-first-hijab-wearing-model/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.981956 | 465 | 1.53125 | 2 |
China, Gum from China (SKU 0413)
Excellent quality Camphor crystals from China. Produced from wild collected plants.
Family: Lauraceae (Laurel family)
Camphor is the white crystalline substance obtained from the tree Cinnamomum camphora, native to China, Japan and adjunct parts of East Asia. The penetrating, fragrant odour is a well known preventative of moths and other insects such as Woodworm. Indeed natural history cabinets for entomologists are made from the wood. Older Camphor is bought by the Chinese at a great price and used in funeral rites but also embalming, being less volatile than ordinary Camphor.
Other names: Camphor, Laurel Camphor, Camphor Laurel, Gum Camphor, True Camphor, Hon-sho, Japanese Camphor, Formosa Camphor.
Camphor has a big variety of uses. It has been, and still is used in the Mahashiva Ratri celebrations of Shiva, in India. It burns cool without leaving an ash residue. In the 19th century there was a big demand for it in the use of making celluloid. Other modern uses include moth repellent and other anti-insect products, embalming, fireworks. Is is an active ingredient in vapor-steam products.
Camphor trees of the Lauraceae (Laurel family) are found on Borneo, Malaysia, Sumatra, Japan, China and are a close relative of the Cinnamon (Cinnamomum zeylanicum) tree. White Camphor crystals are found in some old trees, whereas other trees produce only oil. The oil can be oxidized into crystals. Also the clippings, roots and wood chips of the tree are steam distilled to produce Camphor crystals and Camphor oil. The sturdy tree has glossy, waxy, dark green aromatic leaves. When mature, the tree can reach a height of 20-30 meters. The wood itself repels insects, moths, flies and is very durable against the erosion of salt air. The tree must be at least 50 years old to produce oil.
Alpha-pinene, camphene, beta-pinene, sabinene, phellandrene, limonene, 1,8-cineole, y-terpentine, p-cymene, terpinolene, furfural, camphor, linalool, bornyl acetate, terpinen-4-ol, borneol, caryophyllene, piperitone, geraniol, safrole, cinnamaldehyde, methyl cinnamate and eugenol.
The fragrance of Camphor is said to increase the flow of Prana, open up the senses and bring clarity to ones mind, and awakens perception. Powerful and penetrating are two words to describe the unique fragrance of Camphor.
Blends well with Rosemary (Rosmarinus officinalis), Basil (Ocimum basilicum), Cajeput (Melaleuca quinquenervia), Chamomile (Matricaria chamomilla), Lavender (Lavandula angustifolia), Eucalyptus (Eucalyptus obliqua), Frankincense (Boswelia carteri), Juniper, Melissa, Wintergreen.
Camphor is poisonous if ingested in large quantities.
This is a natural product, used as incense or in perfumery, or as an ingredient of incense and other perfumery or potpourri preparations.
Some incense plants or products may have some history of other folklore purposes, but we offer this product for its use as incense. Not food grade, not for consumption.
Please read our Terms & Conditions before placing your order. | <urn:uuid:96efac4f-0402-45db-a6da-2dcf8071a0ee> | CC-MAIN-2022-33 | https://maya-ethnobotanicals.com/herbs/incenses/cinnamomum-camphora | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz | en | 0.890945 | 786 | 2.296875 | 2 |
Last Update: 1/7/2019
Yes, Edit: Paste will paste an image that you've copied. It is pasted as an EMF or as a DIB (Device Independent Bitmap), depending upon the value of the following property:
Open the Script Window (Window: Script Window) and set this for the current session:
system.display.pastemeta=1; // paste as an EMF
system.display.pastemeta=0; // paste as a bitmap
For information on the LabTalk system.display object, see system.display.
Note: You can also insert an image into the active graph window with the Insert: Image From Files menu command. The menu command is not affected by the value of system.display.pastemeta.
Minimum Origin Version Required: 8.5SR0 | <urn:uuid:c84f8a66-dac4-4232-9da0-a6ebc8d87b6b> | CC-MAIN-2022-33 | https://cloud.originlab.com/doc/Quick-Help/Paste-img-to-Graph | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.707129 | 198 | 2.0625 | 2 |
We have beginningless unawareness, these two obscurations, and beginningless Buddha-nature, these two networks. On the basis level, because we’re building up positive force with unawareness, naivety, and so on, it just becomes a samsara-building network. In order for these to become pure-building networks, a limited being needs to develop renunciation, or renunciation and bodhichitta, for the first time and then develop them further. Now unlike becoming my mother, developing renunciation and bodhichitta cannot occur naturally without the inspiration and teachings from a Buddha and without individual effort.
Part of our Buddha-nature, another aspect of it, is the ability of our mental continuums to be inspired. It’s referring to a whole set of factors that will transform into the various Bodies of the Buddha or allow for such a transformation to occur. You know the Bodies of a Buddha? The Form Bodies, the Nirmanakaya, Sambhogakaya, Dharmakaya, etc. So one of the factors that will allow that transformation is the fact that, unlike a rock, we can be inspired, uplifted. That word inspiration (byin-gyis rlabs) a lot of people translate as blessing. I think that’s a totally misleading way of translating it. It has nothing to do with being blessed from on high and so on. Inspired through inspiration of a Buddha or a teacher or, in our Western terms, by the sunset – you can be inspired, uplifted.
So we have this as part of our Buddha-nature, and we also have the beginningless mental factors that will allow for effort. We have concentration – we have all these mental factors that are part of the aggregates, but they are again clouded and limited by beginningless unawareness and grasping for truly established existence. So we have the factors that will allow us to become a Buddha, and then we have other factors that prevent them from functioning fully. This is the dynamic that we are faced with that describes samsara, the ups and downs of samsara. It’s the dialectic between these two. So samsara.
The Implications of Time Being Beginningless in Terms of the Development of the Buddha-Nature Factors
Now, again one starts to analyze this and think about it. The important factor, which is quite difficult for us as Westerners to deal with, is no beginning, beginninglessness. If there were a beginning and at the beginning all limited beings were equal in having the same strengths of unawareness and grasping for true existence, then it would be difficult to account for the differences in how this finite number of limited beings develop spiritually. Do you follow that? If we all started out at the same point and we had infinite time, how do you account for the differences? That’s the problem with a beginning, one of the many, many problems with a beginning. And as I said, don’t trivialize the strength of our habitual way of thinking in terms of a beginning. We have that with science with the big bang. We have it with our Western religions with creation. So it’s very deeply embedded in our way of thinking.
If there were a beginning and everybody started out as equal the same, why should some limited beings have developed renunciation and bodhichitta for the first time and gone on to attain liberation and enlightenment while others have not? Unawareness or ignorance is preventing liberation and enlightenment. The opposing force is correct discriminating awareness of voidness. But that by itself is not enough. With a correct conceptual cognition of voidness but without either the force of renunciation or bodhichitta behind it, all that will do will be that it will make us very clever and maybe intelligent within samsara. Without renunciation and bodhichitta behind it, it’s impossible to have a non-conceptual cognition of voidness. You can get a conceptual one.
Do you know what a conceptual cognition and non-conceptual means? That’s not so easy to understand. Again a footnote: Conceptual means that you are thinking in terms of a category, voidness, and we have something that represents that when we focus on it or think about it. Think of a dog. Now everybody has undoubtedly a different picture in their mind – so-called in their mind, the Western way of talking – of what a dog looks like, don’t they? When we think of a dog, either there’s the sound of the word “dog” or we have a mental picture of a dog, but we’re thinking in terms of the category dog. Conceptual doesn’t have to be verbal, you know, and it doesn’t have to be a line of thinking. So when we’re conceptually focusing on voidness, we have the category voidness, we know what it means, and we have something that represents it, like empty space. And so we can be focusing on actual voidness but it’s through the veil, through the category, a mental picture, and then voidness itself. That’s conceptual.
Non-conceptual: without the category and the mental picture. We could give it a name though, and we know what it is. That’s the difficult thing to be able to understand with non-conceptual: it still has understanding. But we won’t go into that. It’s very important to – I mean, we’re always talking about conceptual and non-conceptual – to really understand what that’s referring to. To see a dog, know it’s a dog, without thinking “dog.” And of course we can see it without saying “dog” in our mind; we’re not talking about that simplistic level. Anyway, enough.
So the correct understanding of voidness needs to be held by the force of bodhichitta in order for it to oppose these factors that are preventing liberation and enlightenment. OK, so here’s the difficult situation, and it’s difficult to really, I think, appreciate the ramifications of this next point. Since there’s no beginning and each limited being is an individual with different strengths of unawareness, grasping for true existence, it’s been different forever. No beginning – it’s always been different, different strengths of these two networks, these samsara-building networks, different strengths of karmic aftermath and the tendencies of disturbing emotions and so on. Right? The aftermath of karma, the karmic tendencies, etc., and the different tendencies of disturbing emotions, the tendency to get angry, the tendency to have attachment. That’s been different forever in everybody. And different strengths of the mental factors enabling spiritual growth; it’s always been different levels in everybody – of concentration, discriminating awareness, intelligence, etc. It’s hard to conceive that it’s always been different. There’s no beginning when it started out at zero or started out at level one or whatever. But because of these differences, occasionally some limited beings may develop renunciation and bodhichitta.
Limited being (sems-can) – that’s usually translated as sentient being. Remember, Buddha is not a sentient being. Limited means a limited hardware, limited mind – not in terms of crippled, but limited in that it’s not omniscient – and limited body. Just think about it. If you had the brain of an earthworm, what would you be able to do? Your hardware is limited. Very little that you can do if you have a chicken brain as your hardware and you don’t even have hands. It’s very interesting to think in terms of hardware as in computer hardware. A Buddha’s not a sentient being, so that that’s why sentient, in English at least, is a little bit misleading. And we’re not talking about plants either. It has to be a being that has intention and will experience the consequences of what it does based on intention, so not a plant, not a rock.
There’s no beginning, so all these factors have always been different. Think about that. That really is not easy to digest. And whenever the doubt comes up about that, it’s because we’re still accustomed to thinking of a beginning, a starting point. OK.
So because of these differences, only some of us have developed – let’s just talk about bodhichitta – some of us have developed bodhichitta. But for this to happen it requires a large buildup of samsara-building positive force before that network of positive force, samsara-building positive force, is strong enough so that it ripens into us meeting a Buddha, and receiving teachings, and following them, and developing renunciation and bodhichitta for the first time. All right? And then the three zillion countless eons of more positive force.
Shantideva says it very nicely. He says even developing a positive thought not under the influence of a disturbing emotion is extremely rare. So Shantideva says:
(I.5) Just as a flash of lightning on a dark, cloudy night, for an instant, brightly illuminates all; So, in this world, through the might of the Buddhas, a positive attitude rarely and briefly appears.
(I.6) Thus, constructive (behavior) is constantly weak, while negative forces are extremely strong, and most unbearable. Except for a full bodhichitta aim, can anything else constructive outshine it?
It’s exactly what we’ve been talking about. There’s a lot behind Shantideva’s verses.
Has Everyone Already Attained Enlightenment, But We Just Don’t Recognize It?
Now a doubt arises. Maybe everybody’s already attained enlightenment, but we just don’t recognize it, just as we don’t recognize everyone as having been our mothers despite the fact that they’ve all been our mothers. Isn’t it the same? What’s the difference?
I recognize very clearly that I have disturbing emotions, so there is a difference between not recognizing the mothers and not recognizing enlightenment.
Because of our disturbing emotions? Well, I don’t think that that would explain it. Anyway, we don’t really have time for everybody to give answers, so let me give the answer to this. There may be other answers. Your answer may be correct, but again I have doubts about that. To oversimplify – maybe this isn’t what you mean – but to oversimplify, what you say is just that we’re too stupid to recognize it, but I don’t think that actually is going to answer our question. But as I say, maybe that’s not what you meant.
So there has to be a difference. In the case of all limited beings having been my mother, except for my mother in this lifetime while she is still alive, the state of being my mother of all other limited beings is no longer happening now. Right? But in the case of someone being enlightened, their state of being enlightened continues to be presently happening once it’s attained. Therefore, if for the reason of beginningless time, everybody should have already attained enlightenment, then everybody’s state of being enlightened would still be presently happening, including my own. But this is contradicted by valid cognition of at least my own way of acting, speaking, and thinking: I’m not enlightened.
So it’s not like the case of everybody having been my mother but I don’t recognize them because they’re not my mother in this lifetime. It’s not that everyone has attained enlightenment already but I don’t recognize them as such because they’re not enlightened in this lifetime. Do you follow that? The reason I don’t recognize everybody has been my mother is because they’re not my mother in this lifetime. Whereas in the case of somebody becoming enlightened, they’re still enlightened in this lifetime. So whether I can see it or not, having disturbing emotions is secondary. The point is that they’re still enlightened in this lifetime, so it should be possible to see.
You see, your answer of being disturbed – as I say, it’s oversimplified. Being too stupid would be a reason why we wouldn’t recognize either of these two, somebody having been my mother or somebody being enlightened. So it doesn’t account for the difference. That’s why logic, Buddhist logic – it’s very, very important, very helpful for getting clear our understanding. The whole point of debate is to clear away all doubts so that when you meditate you’re able to focus with single-pointed concentration without doubts or uncertainty coming in. That’s the whole point of the debate. And the point within the debate is not to come up with the right answer. That’s not the point. The exercise is having a position and then being able to defend it and the other person pointing out contradictions or weaknesses in your thinking, because in your own analytical meditation you would never be as critical of your thinking as somebody else will be. So please understand the importance and aim of debate. It’s not an intellectual exercise. It’s all intended to help us with meditation.
The Laws of Probability and the Role of Positive Force and Prayer
So now we can ask the question: How is it that some but not all limited beings have built up sufficient samsaric positive force to have met a Buddha, received teachings, followed them, and developed renunciation and bodhichitta for the first time? How did they do it? How did some people do it? How did it happen? What role did choice and decision-making play in this?
Now we have to analyze. In the case of becoming my mother, positive force was not required for this to happen, and no decision or choice was involved either, was there? It just happens that someone becomes our mother because, over infinite time, everybody will have interacted with each other. This is because all beings are equal in the sense that all beings engage in samsaric activity and all beings undergo rebirth. It’s not that everybody’s just sort of standing still in one position forever. Everything is changing all the time.
Then Buddhist logic: you have to give an example. It’s like the example that all dust particles in a room over infinite time will collide with each other because all of them are equally in motion. So that’s an analogy for why everybody, if there’s no beginning to rebirth, has at some point been our mother. That’s another demonstration of it. With no beginning and the fact that everybody has been reborn all the time, like dust particles colliding, everybody will have met each other, everybody will have been my mother, everybody will have been my father, everybody will have been my child, my enemy, and so on, like dust particles colliding in a room.
So now another doubt arises: But what about meeting my gurus in all my lifetimes? What’s the difference? In order to meet the Dharma and meet and study with spiritual teachers in all our lifetimes, we have to have offered prayers for that and dedicated our positive force for that to happen. See? We’re putting together another piece of the puzzle. No one would ordinarily offer prayers and dedicate positive force to be born as the child of a specific person in all his or her lifetimes. That’s the difference, isn’t it?
OK, so now our scientific background. We want to apply the laws of probability here. So the laws of probability lead to the conclusion that everyone’s been my mother at some time, like the laws of probability predict that all the particles of dust in a room will eventually collide with each other if given enough time. But the laws of probability do not lead to the conclusion that everyone has met a Buddha at some time. Why? So you see how important it is to ask questions. Is it just a matter of probability that at some point we will meet a Buddha? And if it is, then it should have happened already. Why didn’t it happen already? Because a buildup of positive force is required for meeting a Buddha, receiving teachings, and so on. We didn’t have to build up positive force for someone to be our mother. And again if there were a beginning at which point everyone’s network of positive force was equal, then the same line of reasoning as proved everybody has been our mother would prove that everybody has developed bodhichitta and become a Buddha.
So we apply the prasanga argument here by looking at the opposite. If one person had met a Buddha and so on, everyone would have met a Buddha; otherwise, if one person had not met a Buddha, no one would have ever met a Buddha, including Shakyamuni’s personal disciples. So laws of probability don’t apply. That’s a difficult one to accept. And you have to continually come up with doubts, to say, “Well, but…”
What blocks or prevents meeting with a Buddha?
What prevents the meeting with a Buddha is that we haven’t built up enough positive force. And this is what – I hope that we’ll get to it – my whole presentation is leading to. In order to build up positive force, we have to be able to make a choice. When we feel like acting destructively, let’s say yelling at you, and when the feeling is there to not yell at you, to refrain from that, how does the decision occur to choose one and not the other? That’s what it all comes down to. This is where everything is leading to in this discussion. How do you make the decision between yelling at somebody and not yelling? Do you have a choice? Everything comes from that. As I said in the beginning, this is material for you to analyze, to work with, to debate with each other afterwards. This is a big long analysis because this is a very difficult question.
So since there was no beginning, everybody’s network of positive force has always been of different strengths. Always. So the positive force has been always different in everybody, the value of it, the level of it. Because of that, only some limited beings have built up sufficient strength of positive force to have met a Buddha. Not everybody. We need to have attained a precious human rebirth in order to build up more positive force. However, you need the positive force in order to attain a precious human rebirth, so it’s difficult. And as the lam-rim texts all explain, if we’ve built up enough strength of positive force to have attained a fully endowed precious human rebirth, then we have the working basis for developing renunciation and bodhichitta for the first time and going on to become enlightened. So precious human rebirth. It comes down to that. How do we get that?
Summary of the Previous Points
So, in summary, what is it that we’re all equal in? What we have are two sets of opposing factors, and there’s always the dynamic between the two. We have the beginningless Buddha-nature factors that will allow us to become a Buddha, but we have beginningless unawareness of reality and grasping for true existence that prevent it. And we have all the other mental factors that are included in the five aggregates of each lifetime. These are going to be our working materials. They’ll be different strengths all the time, but these are our working materials.
So you have to know the fifty-one mental factors, don’t you? Bring that in. So we have neutral ones – urge, intention, concentration, discriminating awareness, interest, all these sorts of things – that can be used in either direction, positive or negative. And we do have positive ones, constructive ones – we do have those – like a caring attitude that accounts for taking care of the young; survival instinct, taking care of ourselves (so toward self and toward others). That’s instinctive, so that’s part of the hardware. Then we also have disturbing emotions and attitudes, like anger, greed, attachment. You can see that in a dog. So again very important. It’s not that all of these started at “value equals zero” at the beginning. There’s been no beginning, so the strength of each of these has always been different in each being. So we have factors that will let us become a Buddha, we have the factors that hinder it, and we have all the tools and working materials that could work in either direction, and they’re all always at different levels (of strength).
So now the real question is how to overcome all of these factors just working to keep us in endless samsara, uncontrollably recurring rebirth, as the basis for more and more suffering, more and more problems, uncontrollably recurring problems. What are the problems, the main ones? The first two types of suffering. From negative force we’re unhappy. From positive force we’re happy, but that happiness is the usual happiness that never lasts, never satisfies, etc., and if we have too much, like eating too much of our favorite food, it turns to unhappiness. That is samsara, my friends. Up and down – sometimes happy, sometimes unhappy – you never know what’s going to come next, and it’s totally insecure. That’s what we want to overcome. And having the mechanism, the type of rebirth, that will support the up and down – happy, unhappy, happy, unhappy – regardless of what else is happening to us. It’s important to understand that; otherwise it’s very difficult to develop renunciation. Don’t trivialize renunciation – you know, give up chocolate. We’re not talking about that.
What Do We Need in Order to Be Able to Make the Decision to Work toward Enlightenment?
So the question is: When faced with the choice of striving to develop bodhichitta or not for the first time – so we have a choice here – how does the decision-making occur if it’s neither free will nor determinism?
Now we use scientific method to analyze. In my early, earliest things that I studied, I studied organic chemistry. And in that there’s the compound that you want to make. So what comes before that, that you have to make, that it could come from? What comes before that? What comes before that, before that, before that – to get to the most basic building blocks. So you apply the same method of analysis here.
To even be in the position to decide whether or not to aim for enlightenment in order to best benefit all beings, what do we need? The thing that comes immediately before that is confident belief in the existence of the qualities of a Buddha, our ability to achieve them, and an aspiration to attain them ourselves, and that we can attain it. Why aim for something that’s impossible or that doesn’t even exist? You have to be confident that it actually exists, that it is possible.
Unfortunately most people never even think like that who are following Buddhism. They never even really seriously consider is enlightenment possible. And of course you have to know what enlightenment is in order to be able to even ask the question seriously: Is it possible? So often we’re just working for… I don’t know what we’re working for. Basically to improve samsara in this lifetime, to have less problems in this lifetime, if you’re honest with yourself. Which is OK. The Buddhist teachings can help us to improve this lifetime, but don’t reduce Buddhism to only that. Then it just becomes another form of psychology. Buddhism is much, much more than that.
So to develop this – that we actually believe that the qualities of a Buddha are possible, they exist, and so on – to develop that, what comes before that? You have to encounter the teachings of a Buddha. If you’ve never heard of Buddhism, of Buddha, of the Dharma, and so on, how would you ever be able to think and ask the question: Is enlightenment possible? You’ve never even heard of it. You have to have interest in the teachings of a Buddha, and you have to encounter a teacher who teaches them. And in meeting the teachings and in meeting a teacher – when we meet them, that means not to have an antagonistic distorted attitude toward them. We need to have an open mind. And interest. (There’s all these Buddhist centers available now. A lot of people have no interest whatsoever. So it’s not just that the teachings are available.) And we need to have love and compassion to help others too and not just be totally selfish.
So what do we need in order to have that (one step back)? To develop this, we need at minimum a precious human rebirth, so that the teachings and teachers are available, they are supported (like you have this magnificent center here), we’re a human being not a dog or a fly, and we encounter, we actually meet, the teachers and teachings, and we’re receptive to them, and so on – the whole list of the qualities of a precious human rebirth – and we take them seriously. So you need that.
Then what comes before that? What are the causes for a precious human rebirth? See, we’re putting together all these pieces of the puzzle from lam-rim. What do you need? You need ethical discipline – the main cause – ethical discipline and prayer. You have to pray and dedicate positive force, etc. “May I always have a precious human rebirth in all my lifetimes up to liberation and enlightenment.” And these have to be helped by the other five far-reaching attitudes (or perfections, paramitas, however you want to call them). So generosity, patience. We already had ethical discipline. So patience, joyful perseverance. Mental stability. Sometimes it’s translated as concentration. We’re not just talking about concentration; we’re talking about stability, so not emotional up and down and so on, or just mental wandering, or dull up and down – stable. And discriminating awareness. Sometimes people use for this the word wisdom, but that’s too vague.
There are various kinds of ethical discipline, but the main one here is refraining from destructive behavior, based on discriminating awareness of the disadvantages of destructive behavior and the benefits of refraining from it. That’s what we’re discriminating, one from the other. It’s not just refraining from acting terribly because you want to please your teacher or whatever. Well, in a sense it’s to avoid getting in trouble, but not just stiff, mechanically. There has to be understanding behind it.
This is a very interesting question. I spend a lot of time with this with my students. Why don’t you steal or lie? Why personally? And if it comes down to “Because I want to be good. I don’t want to be bad,” where’s that coming from? That’s like – well, your parents are going to say “Bad girl,” “Bad boy,” “Be good.”
I don’t want to go to prison.
You don’t want to go to prison. But usually for most Dharma people it comes down to that it just doesn’t feel right. It’s very interesting to analyze. Why don’t you steal? It just doesn’t feel right to do that. But in the actual Buddhist sense, it should be with full understanding that if I lie, if I steal, these are the karmic consequences (it leads to unhappiness and so on), and if I refrain it leads to happiness, and be convinced of that.
And what is discriminating awareness? Vasubandhu defines it in Abhidharmakosha very nicely. It means intelligent awareness, and that’s defined as the mental factor that decisively discriminates that something is correct or incorrect, constructive or destructive, harmful or beneficial. So it adds decisiveness. It’s a very important factor that we’ll be looking at. Decisiveness to distinguishing an object – distinguish helpful, not helpful – and it could be either correct or incorrect. But we can only develop such discriminating awareness in a precious human rebirth. Everything comes down to the precious human rebirth. | <urn:uuid:c60f3489-38b1-4acd-b59b-b556dc2d6a53> | CC-MAIN-2022-33 | https://studybuddhism.com/en/advanced-studies/lam-rim/bodhichitta/analysis-of-why-aren-t-we-all-enlightened-yet/why-only-some-have-developed-first-time-bodhichitta | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.954779 | 6,075 | 1.71875 | 2 |
Sweet potatoes mature in 90 to 170 days and they’re extremely frost sensitive. Plant in full sun three to four weeks after the last frost when the soil has warmed. Make holes 6 inches deep and 12 inches apart. Bury slips up to the top leaves, press the soil down gently but firmly, and water well.
- 1 How do you grow a sweet potato plant?
- 2 Can you plant a sprouting sweet potato?
- 3 What part of the sweet potato do you plant?
- 4 Can you grow potatoes and sweet potatoes together?
- 5 Can you grow sweet potatoes and regular potatoes together?
- 6 How long does sweet potato take to grow?
- 7 Does sweet potato vine like sun or shade?
- 8 How do you plant sweet potato slips in pots?
- 9 What month is best to plant sweet potatoes?
- 10 How long can sweet potatoes stay in the ground?
- 11 How do you grow sweet potato vines in a jar?
How do you grow a sweet potato plant?
Place the sweet potato in a container of water. Keep the top 1/3 of the potato exposed by placing toothpicks into the sides. The pointed end should be down in the water. In a few weeks a vine with several stems will begin to sprout.
Can you plant a sprouting sweet potato?
No, you should not plant an entire sweet potato that has sprouted. Instead, you should wait for the sprouted parts to grow longer and develop roots. Don’t plant the entire sprouted sweet potato – wait until the sprouts develop roots and turn into slips. Then, you can remove them and plant them!
What part of the sweet potato do you plant?
You want half of the sweet potato under water and the rest not. The part under water will grow roots and the part above water will grow sprouts (known as sweet potato slips).
Can you grow potatoes and sweet potatoes together?
Regular potatoes, though not actually closely related at all, are also good sweet potato companions. Also, aromatic herbs, such as thyme, oregano and dill, are good sweet potato companions.
Can you grow sweet potatoes and regular potatoes together?
Even though they are not related, potatoes and sweet potatoes can be companion planted with some of the same plants and get the same benefits.
How long does sweet potato take to grow?
You can harvest sweet potatoes as soon as they reach a usable size, which takes at least three months. Harvest a few tubers to see if they’re large enough before digging the entire patch. Plan to dig all sweet potatoes before frost.
Does sweet potato vine like sun or shade?
SWEET POTATO VINE FAQ’s Plants are adaptable to varying light conditions from full sun to shade. Foliage color is richest when plants receive at least 6 hours of full sun per day. Leaves will be greener when planted in shade.
How do you plant sweet potato slips in pots?
It is important to have a good soil mix when planting in your containers. Using a container mix amended with compost, sand and a fertilizer high in potash is ideal. Place about four inches of soil in your container, then place the sweet potato slips on top and then add about three more inches of soil to secure them.
What month is best to plant sweet potatoes?
Sweet Potato Planting Time:
- Set sweet potato starts in the garden after all danger of frost is past in spring, usually about 4 weeks after the last frost.
- Sweet potatoes are extremely sensitive to frost and need a warm, moist growing season of as many as 150 days.
How long can sweet potatoes stay in the ground?
You can expect sweet potatoes to retain their quality for six to 10 months, but some cultivars may begin sprouting after six months. They will taste better if you give them a minimum of three weeks in storage to allow their starch to convert to sugar before you eat them.
How do you grow sweet potato vines in a jar?
Grow Sweet Potato Vines Indoors
- Get an organic sweet potato.
- Fill a rooting jar with lukewarm water.
- Take out some sturdy toothpicks.
- Insert the sweet potato in the water, so the tip is submerged.
- Place the sweet potato in a sunny location.
- Maintain clean water.
- Move to a larger jar/vase. | <urn:uuid:9a721423-acf7-40fe-862f-79f05ff2d0b7> | CC-MAIN-2022-33 | https://www.sweeteventsbayarea.com/sweet-potato/readers-ask-how-do-you-plant-a-sweet-potato.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.905196 | 932 | 3.171875 | 3 |
Studies concerning the wellness advantages of a optional blanket are still a couple but they really do point within a positive leadership. One such study documented that weight lifting reduced lower back pain. The participants experienced significant decreases in back pain in weight lifting when compared with people who did not exercise. One other study documented that sleep quality rose from over weight or obese adults being a consequence of weight loss with a weighted blanket. Weighted blankets push the body down into a deeper state of comfort and sleep. This analysis reported that weight raising reduced cortisol levels although grounding the body at the low-stress condition throughout sleep.
Furthermore, a second study noted that laying weightbearing blankets on a mattress paid off sleep disturbance one of teens. The participants underwent significant reductions in sleep onset latency and higher sleep caliber as compared to those who laid on non-weighted blankets. These findings are encouraging as a lot of people suffer from sleeplessness, which is often associated with extra burden and bad slumber. It is well worth noting that kiddies have notably problematic times sleeping and getting weight because to consuming too much sugar and processed foods over the course of your day.
Snooze is essential for a nutritious body also for psychological and physical wellbeing. Latest studies have found that lack of sleep, or bad quality sleep, also leads to depression, anxiety, inadequate focus, and poor memory function. Overweight people today are more inclined to possess disturbed sleep due to excess body mass and inadequate circulation caused by increased human body weight percent. A weighted blanket can add additional excess and additional tension to your back back. Weighted bed sheets may contribute to additional pressure in the spine and could also contribute to other health problems including back ache, inadequate posture, and discomfort in other regions of your whole body.
A well-designed optional blanket may promote much better sleep and also lessen the negative outcomes of sleep issues. There are numerous distinctive types of sleep and blankets processes to be found on the industry nowadays. A simple web search will show the wide range of services and products using distinctive degrees of complicated and technology substances. A number of the products use infrared heating technology to reduce or eliminate the sensation of cool after wrapping your system within it. One particular popular kind of blanket utilizes this technology to create heat that helps to warm the body without adding added layers of warmth into your own skin.
The blanket is usually wrapped to your patient’s side or bed and still left place for 20 minutes. Patients experiencing severe back pain and muscle fatigue may seek respite against the effects of the weighted blankets. Even the additional layers of soft cushioning to help to relieve stress and boost the circulation of blood as a consequence of heat being generated from the warmth element over the quilt.
A number of research have indicated that having a barbell can lessen the effects of estrogen and testosterone, that can be known to contribute to sleeping problems. The endocrine production and discharge during sleep have become crucial to ensuring that a restful and pain-free nighttime’s sleep to get each and every individual. As a result of those research studies, numerous health care professionals, chiropractors and massage therapists regularly suggest the use of weighted blankets for people with problems with sleep. Weighted blankets can be bought online and in regional retailers that market bedding objects for healthy slumber. | <urn:uuid:90f98b0d-2fce-44a9-9951-7d97cff7bce2> | CC-MAIN-2022-33 | http://repetti.org/2017/07/25/ella-jayne-weighted-blanket-ebay/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.941608 | 664 | 2.140625 | 2 |
Pedestrian crossings do not allow older people enough time to cross the road, a report warns.
The study found that for those over the age of 65, 76% of men and 85% of women have a walking speed slower than that needed to use a pedestrian crossing.
This speed is set by the Department for Transport at 4ft (1.2m) per second - an international standard.
The work, published in the journal Age and Ageing, calls for current pedestrian times to be reviewed.
Local transport minister Norman Baker said: "In my experience, the vast majority of people, young or old, get across the road as quickly as they can.
"The department recommends that where a crossing may be used by a large number of older people or those with mobility issues, for example outside residential care homes, this should be taken into account in the timings set by local authorities."
Dr Laura Asher, report leader and public health expert at University College London, said: "Walking is an important activity for older people as it provides regular exercise and direct health benefits.
"Being unable to cross a road may deter them from walking, reducing their access to social contacts and interaction, local health services and shops that are all important in day-to-day life.
"Having insufficient time at a road crossing may not increase the risk of pedestrian fatalities but it will certainly deter this group from even trying to cross the road."
She added: "The groups of people identified in this study as the most vulnerable were those living in deprived areas - those least likely to have access to other, more expensive, forms of transport."
The study used walking speed tests from around 3,000 older adults performed by the Health Survey (HSE) for England in 2005.
The participant's normal walking speed was assessed by timing how long it took them to walk 8ft (2.5m) at their normal pace.
The average walking speed for older men was 3 ft (0.9m) per second and 2.6ft per second for older women.
Dr Asher said: "By testing people in the general population rather than those already using a pedestrian crossing, we have included people who may have difficulty using a pedestrian crossing and are therefore unwilling to use them."
The lights at pedestrian crossing have a number of stages.
On an average road, the green man will stay lit for around 4 seconds. It then has a flashing or blackout stage for around 6 seconds. For roads more than 20ft (6m) wide, an extra second is added for each additional 4ft (1.2m).
After this there are an extra few seconds of an all-red light as a safety margin.
Peter Box, chair of the Local Government Association's economy and transport board, said: "The formula councils use for timings at pedestrian crossings actually gives people far longer to cross the road than this flawed research suggests.
"Timings have to strike a balance between traffic flow and pedestrian safety, but the emphasis is always on safety."
He said timings could be altered to take local circumstances into account, for example if there is a care home nearby.
To help pedestrians cross the road, Transport for London had been introducing "pedestrian countdown" technology to the capital.
This aims to help those crossing the road to be able to better judge whether they have enough time to do so safely - a digital display counts down between the end of the green man signal and the red man appearing, rather than just a flashing green man or blackout period. | <urn:uuid:8fdd2d1e-5513-4fca-9ec9-e1a9c65e7e16> | CC-MAIN-2022-33 | https://www.bbc.co.uk/news/health-18428042 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.961874 | 739 | 2.34375 | 2 |
Wellbeing is one of the significant parts of our life. Others are religion, occupation or business with a sufficient salary, constructing a retirement pay, and claiming a house. Be that as it may, how significant are these? They are significant. So how does individual wellbeing fit into the image?
Unforeseen weakness by and large doesn’t permit full happiness regarding any of the things significant. Explicit medical issues can be brief timeframe and meddle with life happiness. Long time explicit medical issues can be an endless decreasing of life exercises including work and other significant territories.
Simultaneously one wouldn’t like to be tricked into visit specialist visits when there is no genuine issue. Even from a pessimistic standpoint it is called depression. In less sums it tends to be daydreams brought about by TV plugs, and magazines promotions.
A few pointers are:
1. Overlook plugs. On the off chance that you trust you have a genuine issue, or every day schedules are antagonistically influenced by what has all the earmarks of being genuine medical issues, see your family specialist. In any event you would then be able to decide whether the issue is genuine, regardless of whether it is a significant issue or not, and diminish your psyche, and have the option to move on. Be that as it may, don’t permit ads to cause you wellbeing stresses, when in certainty there may not be any.
2. Recollect that there are barely any specialists will instruct you to get lost. The fundamental mentality of specialists is to serve the patient. That is acceptable. In any case, understand that you are burning through your time and cash and the specialists time on the off chance that you don’t have a genuine issue.
3. Physicals. At almost every age standard physicals should get normal. Through these one can get familiar with their general and explicit wellbeing, regardless of whether any zones need consideration and afterward following up on the best plans as per your primary care physician lighten them, gain significant serenity regardless of whether there is an issue since then you realize what it is and what you have to do to mitigate it.
4. OTC Drugs. There are a huge number of over the counter medications the greater part of which you needn’t bother with. Anti-inflamatory medicine is acceptable, a hack drug may work for light hacks or colds. Initial one needs to decide with their primary care physician in the event that they have an issue, and if truly, what is a decent OTC cure. Your primary care physician can let you know additionally, when all is said in done, what OTC medications that are valuable for you. Recollect that you can get wiped out from such a large number of or an excessive amount of OTC medications.
5. Physician endorsed drugs. Specialists have a huge number of decisions while endorsing a medication for a specific medical issue. That is acceptable, however recollect a physician recommended medication would als be able to mess you up, and on the off chance that one notifies your PCP and get an alternate medication.
6. Food. Great food is a basic piece of good wellbeing. Set aside the effort to learn sound nourishments and afterward set your eating regimen as indicated by them. Your primary care physician’s office can kick you off realizing what are solid nourishments and those not bravo. Furthermore, figure out how to understand names. Most markets and eateries mean to sell food, and not look out for your wellbeing. Control of your eating regimen is up to you. Exercise that control. By and large nourishments arranged at home are more advantageous than café menus.
7. Exercise. On the off chance that your way of life is with little exercise, at that point you most likely need work out. Strolling up steps a level or two is superior to taking a lift or elevator, and may demonstrate quicker. Stopping ceaselessly from the store or shopping center and strolling to the store is acceptable exercise. Cutting the yard with a stroll behind trimmer is acceptable exercise. The fact is that there are numerous acceptable activities about in your every day life. A spa or exercise center isn’t important. Anyway exercise centers do give a network of individuals doing likewise and that may engage you. Recollect that conditioned muscles are useful for they additionally speak to heart work out. Protruding muscles look great, however they can present medical issues. Balance is a decent objective when working out.
Each significant everyday issue is better delighted in when wellbeing is acceptable. Pills may turn into a need, yet they are not a substitute for good wellbeing. Specialists can be a major assistance, yet your wellbeing is up to you. In the event that you have great wellbeing don’t squander it. On the off chance that your wellbeing isn’t the place you might want, at that point you have to get taking a shot at it. | <urn:uuid:25d22cf9-8ea0-400c-84db-f6b01e8174d9> | CC-MAIN-2022-33 | https://leadershipinhealthcare.com/7-helps-for-better-personal-health/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.959723 | 1,019 | 2.1875 | 2 |
Range: 0 μm to 800 μm (0 mils to 30 mils)
Accuracy: ±5% or ±5 μm, (whichever is the greater)
Resolution: 1 μm (0.1 mils)
Metric and Imperial switchable
PC interface: RS232C
Measurement speed: >30 (readings per minute)
Power off : 2 modes (Manual off at any time by depressing the
power key till OFF shows on the display or Auto power off after 3
minutes from last key operation.)
Weight: 280 g
Dimensions: 162×65×28mm (6.38" x 2.55" x 2.10")
Operating temperature: 0°C to 50°C (32°F to 120°F)
Case: High impact ABS
Batteries: 4x1.5v (AAA) battery
Carrying case…………1 pc.
Operation manual…….1 pc.
RS232C cable, USB adaptor, Bluetooth interface
* This Digital Surface Profile Gauge is a handheld gauge for fast and accurate measurement of the peak-to-valley height of the surface profile of blast cleaned surfaces.
* It meets the standards of ASTM D 4417-B, IMO MSC.215(82), SANS 5772, US Navy NSI 009-32, US Navy PPI 63101-000. Suitable for the laboratory and for use in harsh field conditions. Accurate, immediate and repeatable results.
* The tungsten carbide tip will last for up to 20, 000 readings and can then be easily replaced by the user in the field.
* Cost per test is significantly lower than other test methods.
* Used the exclusive Micro -computer LSI circuit and crystal time base to offer high accuracy measurement.
* Can communicate with PC for recording, printing and analyzing by the optional software and cable for RS232 interface. USB adaptor and Bluetooth interface can also be used.
* Automatic power off to conserve power.
* Widely used in field of blast cleaned surface measurement. If the profile is too large the amount of coating required to ensure adequate coverage increases, otherwise there is a danger that the peaks remain uncoated - allowing rust spots to occur. If the profile is too small, there maybe an insufficient key to produce adequate adhesion, leading to premature coating failure . Ensuring the correct surface preparation optimises the performance of the coating and material usage. | <urn:uuid:67df2305-859a-4284-bb6a-37915ea2fdd6> | CC-MAIN-2022-33 | http://testequipment.vn/zh_TW/huatecsrt-5100-huatec-srt-5100-cu-cao-du-yi-testequipment-5421/pr.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.818857 | 604 | 1.578125 | 2 |
Positive Thinking can Improve your life.
What is positive reasoning and how might we characterize it?
- Positive reasoning is a psychological and passionate demeanor that spotlights on hopeful and positive considerations and anticipates positive outcomes.
- A mentality looks on the splendid side of life and expects bliss, wellbeing and achievement.
- It is a hopeful perspective.
- Individuals with this demeanor are certain, and accept they can conquer any hindrance or trouble they could confront.
To exploit the force of positive reasoning, you want to rehearse it.
In this article, you will realize what this psychological disposition is and how to carry out it in your life.
How the Power Positive Thinking Works
Does this power truly work? Would changing your life be able?
The accompanying stories show instances of how the force of positive reasoning functions.
Richard’s Negative Attitude
Richard went after another position, however he didn’t completely accept that he will get it. He had low confidence, and viewed himself as a disappointment and dishonorable of achievement.
He had a negative disposition about himself and expected disappointment. This caused him to accept that different candidates were preferred qualified over him.
Upon the arrival of the meeting, Richard got up late in the first part of the day. While sprucing up, he found that the shirt he intended to wear was filthy.
He searched for another shirt, yet the entirety of his shirts required pressing.
As it was at that point past the point of no return, he went out wearing a badly creased shirt and without having breakfast.
During the meeting, Richard was worried, anxious and hungry. His psyche and consideration were diverted , and this made it hard for him to zero in on the meeting.
Richard’s conduct established a terrible connection, and thus, he emerged his dread and didn’t land the position.
Jim’s Positive Mindset
The subsequent story is about Jim, who went after a similar position as well. He had a decent proportion of confidence, and was certain that he planned to land the position.
During the week going before the meeting, Jim frequently envisioned himself establishing a decent connection and landing the position. He additionally and rehashed Positive attestations with that impact.
Jim would have rather not left anything for the latest possible second, and consequently, he arranged the garments he planned to wear, in the evening before the meeting. He additionally nodded off somewhat sooner than expected.
Jim got up promptly in the first part of the day, and in this way, had more than adequate opportunity to have breakfast and venture out from home on schedule. This empowered him to show up to the meeting before the booked hour, revived and quiet.
Jim kept cool-headed and certain during the meeting, established a decent connection, and landed the position.
These accounts show that disposition, conduct and move toward have a significant influence throughout everyday life.
The Benefits of Positive Thinking
What are the advantages of positive Thinking?
- A positive mental demeanor produces positive considerations, which can influence numerous everyday issues in a great manner.
- This sort of disposition works on your physical and psychological well-being, passionate wellbeing, and invulnerability framework.
- This disposition can diminish pressure and uneasiness, and increment certainty and joy.
- Such a perspective makes you more hopeful, well disposed and obliging, and this works on your associations with individuals.
- With this psychological viewpoint, you become more inspired, and can spur individuals to work on themselves and their life.
- You stay away from negative self talk and substitute it with positive self talk.
- A psychological mentality that spotlights on great and positive contemplations stirs positive feelings. It drives away gloomy feelings.
How to Think Positive?
To turn the brain toward the positive, some internal work is expected, since disposition and considerations don’t change for the time being.
The following are a couple of ways to bridle this power and bringing energy into your life:
- Understand books and articles about this theme and frequently consider its advantages.
- Stay away from the organization of individuals who offer pessimistic viewpoints and gloomy sentiments.
- Utilize your creative mind to envision just good and valuable circumstances and try not to envision issues and disappointment. This will set the pattern of good following good into it, bringing positive changes into your life.
- Utilize positive words in your inward discoursed, and while conversing with others. Use words, for example, “it’s conceivable”, “I can” and “I’m capable”.
- Continuously track down motivations to grin. This would assist you feel better and keep up with more amicable relations with individuals.
- Supplant negative considerations with positive ones. Continuously center just around great and cheerful considerations.
- Think emphatically, anticipate just ideal outcomes and circumstances, and conditions will change in like manner.
- Rehash insistences to have a significant impact on your outlook. | <urn:uuid:29841474-75c5-443e-a574-7987fe1cfeed> | CC-MAIN-2022-33 | https://positive-parenting-skills.net/positive-thinking-can-improve-your-life/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.951035 | 1,034 | 2.9375 | 3 |
- RMIT University
This project involved the replacement of the existing façades on 10 different sites across the Bundoora and CBD campuses. The Kapitol team provided design advice and value management to ensure RMIT had the best possible outcome.
The works included Buildings 03, 05, 22, 70, 100 & 108 in the CBD campus and Buildings 203, 209, 213 & 220 at Bundoora.
This project involved the installation of two airlocks and additional adjustments to door mechanisms. Works also included an upgrade to the student kitchen which includes lounge, lighting and automatic door, as well as upgrades to the joinery and lighting installation in the entrance lobby.
This project saw Kapitol tasked with the removal of existing escalators and installation of 8 new ones to RMIT’s Building 56 in Carlton.
“As the client’s Project Manager on the logistically challenging RMIT Building 56 Escalator Upgrade, Kapitol Group worked proactively with the design team and client to resolve issues as they arose whilst maintaining the programme, achieving PC four weeks early,” Mike Phillips, RMIT Project Manager
This project was to uplift student experience in the B57 and Carlton precinct through a renovation of physical space and also renewing the tenancy lease and refreshing the food and beverage offering for occupants and visitors to the building. This includes:
- Refreshed dining area with additional seating
- New activities space for students
- Refreshed kitchen facilities to support the food & beverage tenancy
- New study space and PCs for students
- Two group study space for students.
This project involved the creation of a new facility that allows the Education Portfolio to innovate with future forms of learning and teaching spaces, including prototyping and testing.
The space was fitted out to allow real classes to be timetabled into it, to test the design and technology installed.
The Project consists refurbishment works to both levels of B69 Ground Floor & Level 2. Work included:
- Demolition of existing termite damaged sub-floor and sections of walls and provide new footings, stumps and termite treated sub-floor with particle board flooring over ready for new carpet and resilient flooring
- Removal and replacement of existing fire damaged timber ceiling to Rm. 003and prepare for a new solid ceiling
- Replacement of all doors, timber skirtings and architraves
- Hazmat controls as existing paint on doors, architraves and window frames contained lead
- Painting throughout, new roller blinds and frosted film to windows
- New kitchenette including boiling water unit, fridge and dishwasher
- Upgrading and refurbishing existing external toilet, including external cladding and replacement door, new toilet suite, handbasin, tapware, vinyl flooring and wall tiling
- Works also include the associated alteration works to Electrical, Mechanical, Hydraulic, IT and Fire Services.
This project involved the office refurbishments of RMIT’s Buildings 97 & 98.
This project involved the creation of a 360-degree central control room and observation base, overlooking a bespoke facility involving numerous pods where human behaviour is monitored.
This project involved the delivery of sporting facilities and amenities to RMIT’s Bundoora campus.
This project involved the relocation of RMIT's existing Customer Experience facility to an unoccupied shell in Building 7 situated in the bustling CBD.
As the existing location was an interim solution, RMIT required a bespoke facility to encourage and foster an enhanced learning environment.
This project involved the refurbishment of teaching / office space.
This project involved the construction of a secure enclosed area to accommodate the installation of a flight simulator to support RMIT's Flight Training programs and is located within the Building 8 on the City campus. The scope of works included:
• Installation of new secure gates
• Security swipe card access
• Plinth to reticulate services to simulator
• Relocation of simulator into new location
• Commissioning of equipment
This project involved a 2-level office refurbishment to the upper level of a 1941 red brick building with a plant room upgrade.
Works were being completed in an existing live building and included new staff offices accompanied by single, double and four person pods that provide consultation space on a constricted footprint. | <urn:uuid:a265010b-dc4d-4994-a4d5-24aa9d1364c7> | CC-MAIN-2022-33 | https://www.kapitolgroup.com.au/our-projects/education/rmit-university-portfolio | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.931335 | 885 | 1.515625 | 2 |
Acute kidney injury (AKI) is a common and significant complication in patients with COVID-19. According to Marina Wainstein, MBBS, and colleagues, there are few data available on the incidence and impact of AKI occurring in the community or early in the hospital admission. The traditional Kidney Disease Improving Global Outcome s(KDIGO) definition of AKI may not identify patients whose hospitalization coincides with recovery of AKI as manifested by a decrease in serum creatinine.
Dr. Wainstein et al. conducted a study to test the hypothesis that more cases of PLOS Medicine. doi.org/10.1371/journal.pmed.1003969 in patients with COVID-19 would be identified using an extended KDIGO definition (eKDIGO), adapted from the International Society of Nephrology (ISN) Oby25 studies, and that the cases may correspond to community-acquired AKI with similarly poor outcomes as previously reported in that patient population [PLOS Medicine. doi.org/10.1371/journal.pmed.1003969].
The study included patients who were admitted to 1609 hospitals in 54 countries with SARS-CoV-2 infection from February 15, 2020, to February 1, 2021. The incidence, staging, and timing of AKI were evaluated using a traditional KDIGO definition and an eKDIGO definition. The eKDIGO definition incorporated a commensurate decrease in serum creatinine.
Patients with eKDIGO outcomes, i.e., admission to the intensive care unit (ICU), invasive mechanical ventilation, and in-hospital death, were compared for all three groups of patients (those identified with KDIGO definition, those identified with eKDIGO definition, and those without AKI). Following adjustment for disease severity and AKI susceptibility, survival curves and logistic regression were used to assess the relationship between eKDIGO AKI and in-hospital death.
The final analysis cohort included 75,670 patients. Median length of stay was 12 days. There were twice as many patients with AKI identified by eKDIGO than by traditional KDIGO (31.7% vs 16.8%). Patients in the eKDIGO group had a greater proportion of stage 1 AKI (58% vs 36% in KDIGO patients). Peak AKI occurred early in the admission more frequently among patients in the eKDIGO group than among those in the KDIGO group.
Compared with patients without AKI, patients in the eKDIGO group had worse renal function on admission, more in-hospital complications, higher rates of admission to the ICU and invasive ventilation, and increased mortality. Mortality and rate of ICU admission were lower among patients in the eKDIGO group than among those in the traditional KDIGO group, but were significantly higher when compared with patients in the group without AKI.
In conclusion, the authors said, “An extended KDIGO definition of AKI resulted in a significantly higher detection rate in this population. These additional cases of AKI occurred early in the hospital admission and were associated with worse outcomes compared with patients without AKI.” | <urn:uuid:48575ec2-d78e-4b24-a166-d9ab01649381> | CC-MAIN-2022-33 | https://www.docwirenews.com/nephtimes/nephtimes-diseases-and-conditions/aki/extended-kdigo-definition-to-diagnose-early-aki-in-covid-19/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.952969 | 680 | 2.203125 | 2 |
to the editor: Drs. Frassetto and Kohlstadt provide a useful summary of kidney stone management. However, their discussion of pain control is limited to opioid analgesics and suggests avoiding nonsteroidal anti-inflammatory drugs (NSAIDs) because of their effects on renal blood flow and glomerular filtration rate. Although there are patients in whom NSAIDs should be used with caution or avoided (e.g., patients with chronic kidney disease), there is inadequate evidence demonstrating significant harms from NSAIDs in patients with renal colic.
A Cochrane review concluded that both NSAIDs and opioids provide effective relief from renal colic. Some evidence suggested that NSAIDs were more effective, and that opioid use was associated with more adverse effects, mainly vomiting.1 Trials included in this Cochrane review did not directly assess gastrointestinal bleeding or worsening of renal function. However, these potential adverse effects were infrequent in the Cochrane review and in a previously published meta-analysis of NSAIDs for renal colic.2
Treatment harms are important, and trials designed to show if NSAIDs pose a risk in kidney stone treatment would be helpful. However, based on a paucity of evidence that NSAIDs are harmful in most patients with kidney stones, physicians should not exclude NSAIDs as an option for relieving renal colic. | <urn:uuid:26be9e5a-8c34-4d00-a741-028394b9517d> | CC-MAIN-2022-33 | https://www.aafp.org/pubs/afp/issues/2012/0615/p1127.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.964304 | 270 | 1.914063 | 2 |
1 ½teaspoonssea salt(not fine table salt - it will be too salty)
¼cupfine semolina(semolina flour)
Make the dough by hand
Combine active dried yeast, honey and warm water in a large bowl. Let it stand for 10 minutes until foamy.
Stir in the oil followed by the flour and salt and mix until a rough dough is formed.
Turn the dough out onto a clean surface. It shouldn’t need to be floured but if the dough is sticking excessively and is difficult to manage, flour the surface very lightly.
Knead the dough by stretching it out and folding it on top of itself. Turn the dough 90 degrees and then repeat the stretching and folding motion. At first, it will be sticky and the dough will tear and break but as you continue it will become smoother and more elastic. It can take 8-10 minutes to achieve this.
Make the dough with a stand mixer
Mix the yeast, honey and warm water together in your stand mixer bowl. Allow to stand 10 minutes or so until bubbly.
Add the oil, flour and salt and start mixing slowly with the dough hook until it all comes together.
Continue to knead with the dough hook for about 3-5 minutes until smooth and elastic.
Remove dough and knead a little by hand to bring it together. Don't be tempted to add more flour - the dough shouldn't be dry.
Proving the dough
Place the dough on an oiled surface - either a large cutting board or baking sheet.
Cover the dough with an upturned bowl and allow it to rest for 20 minutes. The dough will rise a little.
Lift the bowl off the dough and with your hands press the dough into a rectangle 12 inches by 8 inches (30 cm by 20 cm) or thereabouts. Rub 1-2 teaspoons of olive oil over the surface and cover with plastic wrap. Allow to rise for 1 hour or until well risen.
In the meantime, preheat the oven to 400ºF (200ºC) and oil two large baking sheets with olive oil or line them with parchment paper.
Shaping and baking the grissini breadsticks
Remove the plastic wrap and sprinkle the dough with semolina.
Using a knife, pizza wheel or bench scraper, cut the dough into 20 strips along the long side of the dough. The strips should be approximately ½ inch (1 ½ cm) thick and 8 inches (20cm) long.
The dough is lovely and elastic so pick up each strip and stretch and pull until you have long thin bread sticks. The dough can be twisted for a different appearance. Roll in more semolina if you like.
Bake in the preheated oven for 20-25 minutes. Turn them halfway for even browning if necessary.
Allow to cool before serving. The grissini will become more crunchy as they cool.
Tips for Success
If the dough is particularly wet, add a little more flour. Don't add too much - this dough shouldn’t be dry.
Proof (or rise) the dough in a warm, draught free place.
Keep all the breadsticks about the same size so they all cook evenly.
For more information, read the tips and FAQ's above. | <urn:uuid:c323390e-d5aa-4309-9464-e3bbea2cf770> | CC-MAIN-2022-33 | https://www.marcellinaincucina.com/wprm_print/recipe/5342 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.912233 | 690 | 1.625 | 2 |
The summer truffle (Tuber aestivum) is a species belonging to the Pezizales order of the Pezizomycetes class, within the Tuberaceae family.
Among the edible truffles, the summer truffle is a less valuable species. Its more or less spherical fruiting body is covered by pyramidal black warts, on average the size of a walnut, but the size of a hazelnut, and sometimes even larger. Inside the mushroom, the hard gray-brown flesh is veined with white. Its characteristic smell is reminiscent of boiled corn, with a delicious nutty taste.
A species living under beech and oak trees. It is widespread in Central and Southern Europe and southern Scandinavia. It usually lives 10-30 centimeters underground, so it is not easy to find.
It is not easy for someone who wants to find the truffle without help. Of course, there are tell-tale signs: fruiting bodies attract fungus gnats, their presence betrays the truffle hiding in the soil. In some cases, the grass above the truffle colony burns out in a large area. It can be a clue that the fungus cracks the soil as it grows, and these cracks become visible when the soil is dug up. Other times, small flies or wildebeests indicate the fungus.
Better results can be achieved with helpers. The traditional, voluntary tracker is the pig. There is no need to teach or discipline him, because he loves truffles. This is also the biggest disadvantage, because you want to eat the mushrooms you find yourself. As a result, conflicts often occur between the pig and its owner. The pig usually gets the short end of the stick here, but not always. Mushroom pickers who work with pigs are often missing a finger or two. The dog, on the other hand, is not interested in truffles, it has to be taught. The Vizsla is used for searching: it searches well, but at heart it would rather hunt. The labrador has less of a hunting instinct, his attention is diverted at most by mouse holes.
Summer truffles on the website of the Miskolc Mushroom Association (MIGE). | <urn:uuid:0e89f74d-b66e-4905-be63-bd5ae59f479c> | CC-MAIN-2022-33 | https://www.blogen.wiki/blog/hu/Ny%C3%A1ri_szarvasgomba | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.902383 | 637 | 2.484375 | 2 |
- 1 What ingredient makes Indian food smell?
- 2 What spice gives curry its smell?
- 3 What is the main spice in Indian food?
- 4 Why do I smell like Indian food?
- 5 Why do I smell after eating Indian food?
- 6 What gives Indian food its flavor?
- 7 Why does curry smell so good?
- 8 What is the most aromatic spice?
- 9 What is the most popular Indian food?
- 10 What are the five main spices used in Indian cooking?
- 11 What are the 7 Indian spices?
- 12 How do I stop smelling like Indian food?
- 13 Why do I smell like the food I eat?
- 14 Why does curry smell like pee?
What ingredient makes Indian food smell?
Indian food, of course, uses many aromatic spices – Jaffrey suggests that some, like methi and hing, are particularly responsible for lingering smells. The tarka process, which is central to so much Indian cooking, specifically involves frying spices to release aromas.
What spice gives curry its smell?
Fenugreek (Methi) This Indian spice is what people say “smells like curry.” Of all Indian spices, this spice may be the most essential. You may use up to a few tablespoons in a family size dish near the end of the cooking process, but start with a teaspoon. Fenugreek seeds also have many health benefits.
What is the main spice in Indian food?
11 Essential Spices for Indian Cooking
- Cardamom. There are two kinds of cardamom used in Indian cooking: green and black.
- Clove. Clove is a common spice in Indian cooking and its anise notes are easily recognizable in many Indian preparations.
- Cassia bark.
- Black pepper.
- Nutmeg and mace.
- Mustard seeds.
Why do I smell like Indian food?
When your body breaks down garlic, onions and herbs and spices like curry and cumin, sulfur-like compounds are produced. These compounds are pretty evident on your breath. They can also react with sweat on your skin to produce body odor. The odor will appear within a few hours.
Why do I smell after eating Indian food?
That distinct Indian-restaurant smell lingering on you after eating a curry? That’s all the cumin — which has a multiplicity of volatile organic aromatic compounds — in the food you just ate. More important, the aromatic compounds have to be fat soluble, so that they dissolve easily in your bloodstream.
What gives Indian food its flavor?
Spices as we Know Them Today It’s the very secret to all the deliciousness that comes with Indian food: the spices! Coriander, cumin, turmeric, black mustard, and cayenne pepper are the primary Indian spices, and in varying ratios, they can create some of the most heightened and delectable flavors known to man.
Why does curry smell so good?
Of all the foods, the sauteeing of onions creates a specific smell, which is essential to any curry. This smell is good in an eating place, restaurant.
What is the most aromatic spice?
Fenugreek adds a bitter yet pleasing taste to a dish. Pebble-like fenugreek seeds are roasted to enhance flavour and aroma. The yellow variety is the most aromatic.
What is the most popular Indian food?
What the Most Popular Indian Dishes?
- Fish curry.
- Lamb vindaloo.
- Dal makhani.
- Korma. A thick, savory curry consisting of meat or vegetables braised with yogurt, cream, and spices.
- Biryani. A meat-and-rice mixed dish that’s a popular staple food in Kashmiri cuisine.
- Kebab. Popular in Punjabi cuisine.
What are the five main spices used in Indian cooking?
The Essential Five Spices are:
- Cumin seeds.
- Coriander seeds.
- Black mustard seeds.
- Cayenne pepper.
What are the 7 Indian spices?
Spices are being used as staple dietary additives since long time in India. The study explores the seven spices that include cumin, clove, coriander, cinnamon, turmeric, fenugreek, and cardamom on the basis of culinary uses as well as medical uses.
How do I stop smelling like Indian food?
Wipe down kitchen surfaces and cooking utensils with an odor-neutralizing solution after cooking with curry. Fill a bucket with equal parts water and vinegar. Use this mixture on your kitchen table, counters, stove range hood, cupboard doors and any other surface in your kitchen.
Why do I smell like the food I eat?
“But that’s not what happens,” Preti says. Your breath might smell like the food you eat, but not your sweat. Body odor is created when the bacteria on our skin metabolize the compounds that come out of our sweat glands.
Why does curry smell like pee?
Curry. The cumin and coriander found in curry maintains its odour-causing chemicals as it’s processed through the kidneys. This can result in a pungent-smelling urine. | <urn:uuid:7f416d47-e26a-487e-a261-871ae88e3c32> | CC-MAIN-2022-33 | https://mabiryani.com/indian-restaurant-food/faq-what-is-the-spice-smells-in-indian-food.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.91717 | 1,145 | 2.296875 | 2 |
(Bern 1853 - 1918 Genf)
Having lost his parents and siblings to tuberculosis at an early age, Hodler apprentices with the veduta painter Ferdinand Sommer in Thun. In 1872, he becomes a student of Barthélemy Menn in Geneva. In 1878–79, he is in Madrid. His painting The Night is exhibited in the Salon du Champ de Mars in Paris in 1891. In 1892, he contributes to the Salon de la Rose+Croix, Paris. His design for the mural The Retreat from Marignano in the Arms Hall at the Swiss National Museum in Zurich sparks a fierce controversy; he executes it in 1900. An exhibition at the Vienna Secession in 1904 meets with wide acclaim. In 1905, Hodler travels to Italy. Over the next few years, he receives major commissions to create murals, including German Students Setting Out to Fight in the War of Liberation in 1813 at the University of Jena (1908–09) and Battle of Murten at the Swiss National Museum (1910, not executed). In 1915, his lover Valentine Godé-Darel dies. | <urn:uuid:3de38fed-f8b3-4f3b-acb7-a09f528de688> | CC-MAIN-2022-33 | https://www.sammlung-im-obersteg.ch/en/artists-and-works/ferdinand-hodler/bio | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.927162 | 239 | 3.125 | 3 |
KIKI Health Body Biotics - 60 VegiCaps
KIKI’s Body Biotics are a symbiotic blend of 8 highly effective friendly bacteria super-strains. Symbiotically blended and pooled in a nutrient-rich host of bacterial cultures.
✔️ Live and thriving SBO’s (soil-based organisms)
✔️ 8 strains of friendly bacteria.
Body Biotics™ mimic nature so closely as to provide the full benefits of true bacterial cultures. GMO-free, toxin-free, chemical-free and naturally dehydrated (not freeze-dried), rendered dormant as in nature, and waiting to be ingested with an aqueous solution so they can, once again, thrive. Once thriving, they provide the same bio-identical health benefits we used to enjoy before the introduction of harsh chemicals into our farming world in the mid-1950s.
Body Biotics™ are dormant, alive and thriving in their own natural Prebiotics ancestral food source. They DO NOT have a finite number. When activated with water or juice, these “alive and thriving” organisms, trained in nature to withstand the harshest of environments, awaken and begin immediately to multiply.
Therefore, listing a CFU amount on the Body Biotics™ label would be inaccurate and misleading. Each individual will experience a multiplication of the number of organisms in one capsule of Body Biotics.
Bacillus Subtilis, Bacillus Licheniformis, Lactobacillus Acidophilus, Lactobacillus Casei, Lactobacillus Plantarum, Lactobacillus Rhamnosus, Lactococcus Lactis, Bifidobacterium Bifidum. Shell Capsule: Hypromellose
Body Biotics contains NO salt, sugar, yeast, artificial colour, preservatives, chemical solvents, artificial additives or fillers of any kind. Suitable for vegetarians and vegans. Naturally free from gluten and wheat. No artificial colours, preservatives, sweeteners or fillers.
Directions Adult Intake
Week 1: Take one capsule a day, 30 minutes before food with juice or pure water. (1 per day)
Week 2: Take one capsule twice a day (2 per day)
Week 3: Take one capsule three times a day (3 per day)
If required increase by one capsule per week up to a maximum of six capsules per day in week six.
Maintain six capsules per day for 6 months or longer, and then reduce to an average of 2 – 3 capsules per day.
Do not take capsules with hot beverages. Not recommended for pregnant or lactating mothers. | <urn:uuid:3387ce24-d606-4899-8e7b-3db77da11a46> | CC-MAIN-2022-33 | https://saunapodstudio.co.uk/products/kiki-health-body-biotics | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.857423 | 564 | 1.601563 | 2 |
The Amazon reviews on Hanya Yanagihara’s The People in the Trees are a mixed bag, and fairly so: It’s a beautiful, fascinating and imaginative book—that can at times be highly unpleasant to read.
TPITT is, most immediately, an imagined memoir from doctor Norton Perina—the story is loosely based on IRL doctor D. Carleton Gajdusek—who in his 20’s stumbles upon a lost tribe on a remote Micronesian island. A portion of this tribe, who come to be known as “the dreamers,” suffer from a unique affliction that allows their bodies to stop aging while their minds continue to. Centuries old, while physically middle-aged and mentally childlike, the dreamers prove a career-making discovery for Perina, who goes on to become hugely famous and to adopt dozens of the tribe’s offspring. And yet Perina’s memoir is filtered through a second party, Ronald Kuboderia, a former lab assistant (the NYT review, perfectly, describes him as “Smithers to Perina’s Mr. Burns”) who we discover has asked Perina to write said memoir from prison, where Perina is serving time for pedophilia charges. Like I said: unpleasant.
As debut novels go, Yanagihara—whose second book, A Little Life, came out last month—conceived for herself an extremely uphill battle here. Not only does TPITT involve an imagined anthropological adventure (including the detailed outlining of a Micronesian tribe’s habitat, appearance, customs and language) but the novel itself is also revealed to us by a narrator who is at best unreliable, and at worst a morally dubious and potentially sociopathic scientific fame whore with a predilection for young boys. Either way, he’s an unlikable man, one who equates professional ostracism with intellectual superiority and describes his first paper on his discoveries as “nothing more than an announcement, the medical equivalent of Martin Luther posting his theses on the church’s wooden door.”
Indeed, there are many times when reading TPITT that one or both of these emotional challenges—the tribe, the narrator—proves almost insurmountable, as when Perina violently kills a turtle sacred to the tribe in the interest of furthering his understanding of the dreamers, or when he stumbles upon a ritual that involves the systematic sodomizing of coming-of-age boys. Yanagihara, to her credit, pulls no punches in the creation of her leading man and the people he’s observing. Neither is particularly easy to swallow, but both are so complete that one (appropriately) is asked to direct one’s discomfort not at the book, but at what the book is suggesting, what it’s asking us to consider. What makes the novel so impactful is not Yanagihara’s deft negotiation of the boundary between tolerable and deplorable, but the fact that the demarcation itself is the point. The tribe are a people untouched by technology, civilization and even time. Who are we to pass judgment on their rituals? Who are we to burst their bubble of isolation? Who are we to interrupt their lives purely for the sake of appeasing our wants, however intellectual in nature?
Sex rituals notwithstanding, it’s worth noting that TPITT is also an [objectively] beautiful book, even through the lens of generally loathsome Perina. A man’s face is described as “memorable for its absences rather than its presences;” the study of disease is characterized as “all delicious secrets, dark oily pockets of mystery.” This eloquence is not only welcome but seemingly necessary: How else are we to picture a place and time worlds removed from our own? How else are we to conceive of a people so different from 21st century civilization that they might as well be aliens? And how else are we to get through some of the otherwise distinctly non-beautiful facets of life among the tribe—their nonexistent approach to child-rearing, their penchant for munching on tiny adorable monkeys, their routine beating to death (admittedly, for food) of quietly objecting sloths.
I’m not sure how one sets about writing a book whose narration inspires both wonder and repulsion in equal measure—and at the same time—but Yanagihara has done it here. There are a lot of people who won’t read The People in the Trees because of the things I’ve mentioned, because they have a knee-jerk aversion to any book that raises topics they find abhorrent. Fair enough. But if you’re not inclined to discount a swath of literature that includes everything from Lolita to The Lovely Bones (also see), then TPITT is worth your time. It’s bold for any novel, let alone a debut. It’s compelling and provocative and artfully executed. You will be thinking about this book for a long time after you turn the final page.
TITLE: The People in the Trees
AUTHOR: Hanya Yanagihara
ALSO WROTE: A Little Life
SORTA LIKE: We Are All Completely Beside Ourselves meets Heart of Darkness
FIRST LINE: “I was born in 1924 near Lindon, Indiana, the sort of small unremarkable rural town that some twenty years before my birth had begun to duplicate itself, quietly but insistently, across the Midwest.” | <urn:uuid:5c5d5f26-4030-422d-8a20-9545035ae46c> | CC-MAIN-2022-33 | https://couldreads.com/2015/04/15/i-still-havent-recovered-from-the-people-in-the-trees/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.955606 | 1,198 | 1.671875 | 2 |
Stedman, Andrew Jackson
20 Apr. 1828–7 May 1884
Andrew Jackson Stedman, journalist, lawyer, minister, and Confederate officer, was born in Gatesville, the fifth son of William Winship (1798–1836) and Rebecca Walton Stedman (1794–1873) of Chatham and Gates counties. His father, a large planter, merchant, and state legislator, was of an old Connecticut family that had settled in North Carolina in the 1780s.
Jack Stedman, as he was familiarly known, probably attended local schools or academies before qualifying to practice law, although no record of his education seems to exist. His name does not appear in the alumni lists of The University of North Carolina, yet secondary sources credit him with "degrees" from the university. He served as a presidential elector in 1848 in the Taylor-Fillmore balloting. In January 1858 he published in Salem, N.C., the initial issue of Stedman's Salem Magazine, a literary magazine intended for circulation throughout the South. Because of problems with the printer—poor correction of proof, failure to meet a deadline, and the use of unsuitable paper—Stedman moved his enterprise to Raleigh where Vol. I, No. 1, of Stedman's Magazine appeared in May 1858. Contributions to both numbers were from writers in various southern states. This, too, was the only issue offered. Stedman cited as reasons for the magazine's failure the unsettled times and the lack of paying subscribers. Nevertheless, both issues contained a variety of material by well-known contemporary writers. Several chapters of a novel that he included appeared later when the author's work was published under a New York imprint. An interest in journalism seems to have been characteristic of the family. Relatives were founders of the Southern Literary Messenger and the Wilmington Star.
On 5 Feb. 1855 Stedman married Susan Catherine (Kathleen) Staples (1836–97), the daughter of Colonel John C. Staples of Stonewall, Patrick County, Va. They became the parents of Mary Walton, who died in infancy; William Winship (1858–1900), an editor and publisher; Malvern Vance (1863–1951); and Sallie Rebecca Roberta (b. 1871), who married Henry Lee Mylton.
Stedman enlisted on 18 Mar. 1862 in the Chatham Cossacks of Pittsboro, a unit that became Company B, Forty-ninth Regiment, North Carolina Troops. Soon elected third sergeant, he was severely wounded at Malvern Hill on 1 July 1862, and, although named to the Roll of Honor for his bravery under fire, he was unable to return to the field. Through the intervention of Governor Zebulon Vance, Stedman on 13 Oct. 1862 was appointed first lieutenant in the newly formed Confederate States Army Signal Corps. Ordered in November to report to General Howell Cobb in southwestern Georgia, Stedman served as chief signal officer to Cobb, Joseph Finegan, William Montgomery Gardner, and James Patton Anderson, successive commanders of the military districts of East and Middle Florida. With his headquarters at Quincy, near Tallahassee, Stedman was responsible for lines of signal posts and observation points, which transmitted messages by flag, torch, and telegraph. He was paroled in May 1865, a month after Appomattox, as part of the general surrender of troops.
After the war Stedman practiced law and with his family lived for a time in Pittsboro, then settled in Danbury. There, beginning on 3 June 1870, he published a weekly newspaper, The Old Constitution, and served as solicitor of the Fifth North Carolina District. He was the author of a forty-page pamphlet, Murder & Mystery: History of the Life and Death of John W. Stephens, State Senator of North Carolina, From Caswell County. Printed in Greensboro in 1870, this is considered to be an unbiased, well-written account of a murder that remained unsolved until 1935, after the death of the last member of the Ku Klux Klan responsible for it. In 1873, after moving to Taylorsville (now Stuart), Va., Stedman edited and published The Voice of the People, the first newspaper in Patrick County, his wife's home.
In Taylorsville he became an ordained Baptist minister about 1874 and preached regularly in the local church. He also participated in local civic organizations and was a Master Mason. In Virginia he continued to practice law, serving as commonwealth attorney, and engaged in agriculture and horticulture. His wife's ancestor, Colonel William Martin, had planted the famous "Old Hardy Apple Tree" in Patrick County in 1790, and her family was interested in growing root stock from this tree. Stedman and a son, Malvern Vance, planted over 150,000 apple trees in the county and established the area's apple industry.
An industrious man of many talents, "Colonel" Stedman, as most knew him in later life, was considered to have deep convictions in politics, religion, and agriculture, and he was a polished speaker. The town of Stedman in Patrick County was named for him. He died in Taylorsville (Stuart) and was buried there.
David W. Gaddy, "Confederate States Army Signal Corps Insigne," Military Collector and Historian (Summer 1973).
Weymouth T. Jordan, Jr., comp., North Carolina Troops, 1861–1865: A Roster, vol. 12 (1990).
Salem, People's Press, 15 May 1884.
Melvin Lee Steadman, Jr., "Our Family-Stedman, Steadman, Steedman" (manuscript, possession of M. L. Steadman, Virginia Beach, Va.).
Stedman's Magazine 1 (May 1858).
Stedman's Salem Magazine 1 (January 1858) (North Carolina Collection, University of North Carolina).
Virginia Biography, vol. 6 (1924).
Makers of America. Biographies of leading men of thought and action: the men who constitute the bone and sinew of american prosperity and life, Vol. I. 1915. Washington: B.F. Johnson. https://archive.org/details/makersofamericab01wash (accessed July 31, 2014).
Makers of America. Biographies of leading men of thought and action: the men who constitute the bone and sinew of american prosperity and life, Vol. II. 1916. Washington: B.F. Johnson. https://archive.org/details/makersofamericab02wash (accessed July 31, 2014).
Makers of America. Biographies of leading men of thought and action: the men who constitute the bone and sinew of american prosperity and life, Vol. III. 1917. Washington: B.F. Johnson. https://archive.org/details/makersofamericab3_00wash2 (accessed July 31, 2014).
Stedman, A. J. 1870. Murder & Myster: History of the life and death of John W. Stephens, state senator of North Carolina, from Caswell County. Greensboro, N.C.: "Patriot". https://www.worldcat.org/title/murder-mystery-history-of-the-life-and-death-of-john-w-stephens-state-senator-of-north-carolina-from-caswell-county/oclc/26428801 (accessed July 31, 2014).
1 January 1994 | Gaddy, David Winfred | <urn:uuid:9824584b-936c-4510-93bd-a550c9ebdd91> | CC-MAIN-2022-33 | https://ncpedia.org/biography/stedman-andrew-jackson | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.962574 | 1,611 | 1.921875 | 2 |
Welcome back to the Scuttlebutt, Coffee is on, have a sit. Let’s talk about swamps.
Calling things swamps has gotten a bad name over the last couple decades, now they’re “wetlands”.
See, a swamp; that’s stagnant water, rotting vegetation, mud and wasted land that would be fertile as hell if not for the several feet of water on top of it. It’s a breeding ground for malarial mosquitos, rats, and other vermin.
Ah, but a “wetlands” that’s a flood control area, and a naturally diverse ecosystem that provides a nursery for all sorts of prey animals that anchor our ecosystem, and ensure the diversity of species.
Why, YES they do mean the same thing, how very observant of you. One man’s blood sucking disease carrying pest, is another’s natural part of the ecosystem and ensures the survival of other species. I think it’s directly related to how far away you are from the object in question, that determines your perspective.
If you make your living off the land, and/ or live near a swamp, so that your children are at risk of getting malaria, bitten by rats, etcetera, your crops and or the food in your house are under threat from the rats, not to mention the other wonderful diseases carried by rodents and the pests that they have… You see a swamp as a bad thing.
If on the other hand, you live far away from the wetland in question, if you’re someone who sees it from the theoretical side, a biologist who only goes into the swamp to perform studies, or a swamp creature yourself, well then, it’s a wetland. You don’t have to deal with the bad parts of it, or you are indeed a part of the badness.
President Biden released a little three minute message to the “career staff” of the federal government though the FED Manager newsletter talking about how he really loves us and how his long (and I mean LONG, 40 plus year) career in politics has given him the deepest respect for us… He also, immediately upon being sworn in, rescinded the Executive order creating “Schedule F federal employees” which FED Manager was also quick to crow about.
What’s a “Schedule F” employee you ask? Well, that was an Excepted service employee who held a position of a confidential, policy-determining, policy-making, or policy-advocating character but are not normally subject to change as a result of a Presidential transition. Under President Trump this schedule was created to control unelected senior management that makes rules having the force of law, and seemingly answerable to no one.
If you’ve been paying attention, it should not be a surprise that there are millions of pages in the Code of Federal Regulations (CFR). These regulations have the force of law. You can get put in jail, your possessions can be confiscated, you can be made a criminal for violating these regulations. Yet they were not made by someone you elected, but by someone who was appointed to that position.
It’s also not a secret that once you’re a federal employee past your probationary period, unless you actually commit a crime, sexually harass or assault someone, or lose your clearance, (and sometimes not even in those cases) you’re just about untouchable. Seriously, you have to REALLY mess up to be fired as a senior manager for the federal government. The last batch I remember getting walked out the gate had been defrauding the government for years, paying employees for stuff they didn’t do, and getting kickbacks of some of that money.
Now, add to this that we’ve been selecting for political correctness, and hiring based on academic credentials for fifty years, and you can figure out the sort of folks that are sitting in those “schedule F” seats. And this, my friends, is “THE SWAMP” as in “I’m going to drain the swamp”.
These are the people that have been indicted and convicted of using their office to further the cause of their political patrons in some cases.
Now the Senior Executives Association, and other organizations that represent the interests of senior federal managers are terribly happy about this. They talk about how our hiring system uses “the Merit System principles” to ensure that we don’t hire based on patronage, etc.
The Merit System is a sound idea, and in theory should ensure that we don’t build a system like the system it replaced: “the Spoils System” where political appointees were given cushy positions for having supported a politician who got elected. (some states still run this way, I have relatives there, it’s a pretty rotten system.) Well, it worked for a while, but humans being humans, it’s not anything like perfect. The people making the hiring and promoting decisions still get to say things like “well, he’s not a good fit, he won’t work within our culture”. I get this, I’ve used that phrase myself for someone that if we had put him on our team would have been a net negative worker. Not only would we not have gotten any production out of him, we would have spent a significant amount of time fixing the sand that he put in the gears.
The problem is that the first time you get someone high up (oh say a secretary for…) who has a significant political bias, they hire, perfectly legally, folks that think like they do, who in turn hire underlings that think the same way, and so on. Ideological purity being one of the trademarks of the left, they are more likely to do this than the right. And so, we get people who may not know fuck-all about farming in charge of the Department of Agriculture. Oh, they have a degree in it, they can spout all the latest theories, but the only farm they ever saw was the college farm where they got their degree. They are sure however that our methods of farming are EVIL because we don’t do it organically, or we drained a wetlands to do it, or we don’t take into account the wants of some guy from china.
I picked on USDA because it was handy, but the truth is the same for all of the various departments, including my own DOD, who has some very senior people that have never seen the inside of a ship except during a fucking two hour tour of a shipyard as part of a photo op, never seen the inside of the wire at a FOB, much less been outside the wire, could not tell you where the fuel goes in the jet when looking at it, but gets to make decisions that affect the lives and survival of the folks on the pointy end. People to whom it’s more important that we have significant diversity, and x% transexual gay left-handed immigrants who are socially aware and able to design diversity training, than that we have ships that can sink other ships and not get sunk themselves.
It also includes the DOJ. You know, the guys that own all the federal law enforcement dudes? (except for the law enforcement folks that work for the Department of Education, the Department of the Interior, the Department of Agriculture, the Department of Defense, and so on, but that’s another rant for another day.) These are the folks that not only get to make various CFRs but also decide what to investigate and what to prosecute.
Schedule F was set up to make those folks no longer “untouchable”. It wasn’t perfect, but it was a good start. It wouldn’t affect anyone except the very senior people who could form “the resistance” which we saw in action during the Trump administration. A group of such senior people can sabotage the shit out of the programs, wants, needs, and desires of elected officials. This way leads to the sort of Mandarinocracy, that China had and for a large point Great Britain has. That’s not the sort of government our forefathers had in mind.
I understand the position of the SEA, and the position of all the other managers associations that were against Schedule F, they exist to further the interests of their members. It’s certainly in the best interests of the members of a Senior Executive Association to ensure that they can’t be fired.
It’s not in the best interests of the country however.
Until next time I remain,
Yours in service. | <urn:uuid:67532fab-70b9-49ef-8aa6-e7f97c899cf7> | CC-MAIN-2022-33 | https://thehashtag.us/the-swamp/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.968497 | 1,841 | 1.65625 | 2 |
Excerpt from Into the World, by Leila Lees
Each landscape has its own gesture and essence. The heart relates to earth, to land, and to landscape.
The heart is the organ with which we connect to the Essence of Landscape and it is through our emotions and our sensory body that we perceive that essence.
I learnt the language of Piripai. The language was in the way the wind cultured the dunes and the power of the river and the plants that grew there. The language was also found in the past, the burial grounds, the farming and the introduction of boxthorn and macrocarpa trees. To discover the language of landscape we must first observe it. Start by looking, then soften your gaze. Allow yourself to let your body sense. From physical observation move to sensing the energy of the place. Your body can act as a divining rod. | <urn:uuid:2776e152-37e3-432d-960f-d34d70b95d3b> | CC-MAIN-2022-33 | https://lasaviahealing.nz/essence-of-landscape/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.95884 | 182 | 2.421875 | 2 |
Studio 174 was founded by Rosemarie Chung in 2006 to serve educational and cultural needs of children and young adults in inner-city Kingston. As a professional artist and art educator with an international background, Ms. Chung has a strong calling to nurture and develop the creative talent evident in often unnoticed communities in Jamaica. The direction of Studio 174 is a broader view of building stepping stones for under educated and underexposed populations in high-risk areas of violence and extreme poverty. Art classes are held on Saturdays free of cost, and are a component of educational services that aim to be explorative, expressive and experimental, working with the genesis of concepts through the manifestations of ideas. Younger students are guided by older and more advanced students, which creates a locally based, inclusive and collaborative industry of the arts. | <urn:uuid:fd778ef8-53c5-4789-a21e-9d14c9b255cc> | CC-MAIN-2022-33 | http://www.spla.pro/file.organization.studio-174.12746.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.963155 | 160 | 1.554688 | 2 |
Manitoba has broken records for the lowest temperature this snap past Saturday. The extreme temperature in the region setting 20 lows.
Although temperatures around this time of the year have often averaged – 20 C, Winnipeg dropped down to -38.8 C, which saw it break an 1879 record by 1 C, according to Brian Luzny, an environment Canada Met.
In the meantime, Shoal Lake broke its 1970 record by close to 6 C, while Norway House registered its recent low of – 44 C, which is lower than its last record by 5 C. Essentially, it is the coldest area in the Province. Luzny noted that they are currently breaking records each day. He added that a few long-standing records have been shuttered by quite a margin.
According to Luzny, Manitoba is seeing a cold snap, which has been the case around January and February. However, this time it seems the Province hit its peak this past Saturday but is possibly going to wind down in the days ahead.
Luzny noted that the Province will soon be making its way back to the temperatures they are used to this week. Most parts of Manitoba, especially Winnipeg, are currently under bone-chilling cold. | <urn:uuid:a0f0a7a4-4fe0-4027-8634-64f90d139588> | CC-MAIN-2022-33 | https://www.westislandblog.com/manitoba-shutters-records-sets-20-new-lows-this-past-saturday/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.98329 | 251 | 2.09375 | 2 |
The first instrument portal is established by placing a 10- to 12-mm cannula using a blunt obturator through a 1-cm skin incision approximately 25 cm cranial to the umbilicus and 15 cm left of the ventral midline. A 25-cm skin incision is made starting 5 cm caudal to the first instrument portal and extending parallel to the ventral midline in a caudal direction. A second instrument cannula is placed 5 cm caudal and 2 cm axial to the long skin incision. A third instrument cannula is placed 8 cm axial to the second. The original description of laparoscopic colopexy (Trostle et al. 1998) had instrument portals axial and abaxial to the caudal limit of the skin incision; however, in some horses, the left thigh of the horse compromised needle holder manipulation.
The left ventral colon is identified and the lateral taenia of the left ventral colon is grasped with an endoscopic Babcock forceps placed through the cranial instrument portal, and the colon is elevated toward the ventral body wall (Figure 24.2). The suture material chosen for the colopexy would preferably be a monofilament with a relatively long-term retention. The author uses size 1 polyglyconate (Maxon, Tyco Healthcare, Norwalk, CT) in a 60-in. strand with a large half-curved needle. After fashioning the needle into a ski-tip configuration, the needle is placed through the abdominal wall at the cranial extent of the large skin incision. The needle is grasped within the abdomen with a needle holder placed through the most abaxial caudally placed cannula. A correct grasp of the needle is facilitated by rotating the needle from outside the abdomen (Figure 24.3). A bite of the taenia is taken and, using an instrument placed through the axial caudal cannula (Figure 24.4), the needle is repositioned in the needle holder and passed out of the abdomen. After the first suture placement, the needle can be placed through the taenia without using the Babcock forceps. The author routinely places a spinal needle through the abdominal wall to give perspective as to where the suture should exit (Figure 24.5). The colon is pulled into contact with the abdominal wall and tied, establishing the cranial end of a continuous suture. The process of suture placement is continued until a 20-cm pexy has been established (Figure 24.6) and the suture is tied off outside the abdomen. The abdomen is deflated and incision closures are routine. | <urn:uuid:a2b1db77-2026-424e-b2ff-fd143647d955> | CC-MAIN-2022-33 | https://veteriankey.com/colopexy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.898004 | 555 | 2.265625 | 2 |
In The News
Vi Lyles, Mayor of Charlotte, is leading a first-in-the-nation clean energy effortMay 2021
Vi Lyles, Mayor of Charlotte, is leading a first-in-the-nation clean energy effort with the Charlotte Area Transit System (CATS) to keep the city on target to meet its ambitious climate action goals. CATS transit buses will become all-electric, supported by a unique energy modeling and financing partnership with Duke Energy. A pilot program to test 18 battery-electric buses of varying manufacturers was approved as a first step to finding the most suitable vehicle for the city's full transition to battery-electric buses. Click here to read more. | <urn:uuid:13abe258-c99f-4549-8f56-cd6e9396a809> | CC-MAIN-2022-33 | https://www.iwfcarolinas.org/news-public/2021-05/charlotte-businesswoman-year-award-queens-university.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.949026 | 139 | 1.648438 | 2 |
Starting with the ABC's of ABA Melinda Henson
The science of Applied Behavior Analysis tells us that behavior is lawfully related to its environment and the effects of that behavior on that environment. In this context, “behavior” refers to actions or skills. “Environment” includes any influence that might change or be changed by behavior. In other words, when presented with a stimulus, we act based upon our history of reinforcement and punishment. How many times have we heard that behavior (both positive and negative) is a form of communication? Since we know that, how do we determine exactly what is being communicated?
Functional Behavior Assessments or Descriptive Assessments are intended to tell us the “why” of behavior. The use of A(ntecedent)- B(ehavior)- C(onsequence) charts and checklists can be helpful tools when collecting information during direct observations. There are many versions of these forms, but all should include opportunities to record the setting location, the antecedents (events which occurred immediately before behavior), a description of the observed behavior, and the consequences (simply put- what happened after the behavior?). A-B-C data should be collected until a pattern is identifiable, typically with at least 10-15 separate instances recorded. The pattern of Antecedents and Consequences gives us a hypothesis about the function of challenging behavior.
When identifying Antecedents, be sure to ask the “Wh” questions:
- With whom?
- What activity?
- What are other students doing?
- What is the teacher doing?
While also considering possible environmental contributing factors:
- Proximity of others
- Noise level
- Group size
Or more distant setting events:
- Medication changes
- Changes or distress in home life
- Health status of student
Before beginning to record data, you should have a clear and concise operationally defined target behavior. This means that each behavior topography is described with clear parameters for what is considered an occurrence. It is often very helpful to include examples and non-examples of behavior following the definition.
When identifying consequences, things may not be as clear as one event following a behavior. Instead, multiple events may follow the behavior of concern (for example- adult provided attention and then removed or modified a task). This is one reason that recording multiple occurrences of ABC data is required, so that the patterns can be evaluated for its influence on behavior while strengthening the confidence in the hypothesis.
Function of Behavior
Behavior occurs for a reason! The function of a behavior refers to the source of environmental reinforcement (events that maintain or increase the likelihood of behavior occurring).
A handy acronym to remember the 4 main functions of behavior is “Everybody EATS”
E = Escape or avoidance
A = Attention
T = Tangibles or Activities
S = Sensory Stimulation
Once the function of behavior is identified, it is time to begin planning behavior support strategies! When moving forward, it is crucial to remember the essential components of a Behavior Support Plan:
- Behavior definitions and data-based decision making
- Preventative strategies
- Teaching & reinforcing replacement behavior(s)
- Reinforcement contingencies
- Reactive strategies
With a firm understanding of behavior and reinforcement contingencies in place, the Behavior Support Plan is ready for the team to implement, collect data, and analyze! | <urn:uuid:c975550a-6e92-49ab-b501-508cd584d7f4> | CC-MAIN-2022-33 | https://www.unl.edu/asdnetwork/starting-abcs-aba | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.91736 | 733 | 3.953125 | 4 |
If you’re an avid gardener or just a plant lover, chances are you have heard about greywater. Those new to gardening might scratch their head when you ask whether they are using greywater for their garden or plants.
Simply put, greywater is the domestic wastewater that comes from sources such as washers, bathtubs, bathroom sinks, and even showers.
However, don’t confuse greywater with sewage water, which is called blackwater.
Since plants are always in need of water to stay hydrated, can you use greywater on your plants? Or, to be exact, is greywater safe for plants?
Greywater is considered safe and can be used to water your plants.
There are two types of greywater: treated and untreated greywater.
Treated greywater can be used for different purposes, including gardening, cleaning your drain or gutter, flushing your toilet, and even washing your laundry. Because it has been treated in a proper greywater treatment system, few bacteria exist in the water. Hence, it is a lot safer to use for a longer period of time.
On the other hand, untreated greywater hasn’t been treated and is lower in quality compared to treated greywater.
What Effect Does Greywater Have on Plants?
To be honest, you can’t compare the quality of fresh, clean water with greywater. However, this doesn’t mean that greywater is bad for plants.
The use of greywater, especially with a pH level of around eight, can lead to an increase in soil pH, but at the same time, it can reduce the availability of some micronutrients that are essential for plant growth.
This conclusion is pretty subjective because the quality of the greywater is highly dependent on the content of any chemicals in the water. Hence, you should always be aware of all the products you use in your house.
There is also a possibility that chemicals in the greywater will kill most of the beneficial bacteria and bugs in the soil. However, the plants and soil will work symbiotically to filter and break down the greywater, removing as many harmful chemicals and bacteria as possible.
The sand, granulated rocks, and substrates will act as a filter by letting the water pass through, leaving the contaminants at the top of the soil. Once the nutrients and biodegradable materials have been filtered and collected, the plants will absorb and use them.
If done correctly, greywater can benefit plants in the following ways:
Maintain Moist Soil
A constant supply of greywater through an irrigation system can create a cool and damp environment. Such an environment will also promote the growth of shade trees and other plant life. In turn, the shade from the plants is more than enough to cover the soil, adding more protection from the scorching sun.
Greywater contains skin cells and phosphorus from soaps. So it can provide plants with enough micronutrients and a beneficial microbiome.
In fact, using greywater can be like using manure. Both products are not visually appealing, but they carry the same purpose: to fertilize the plants. After microbes in the soil have broken down all the chemical compounds in the water, the plants will absorb essential nutrients such as nitrogen and phosphorus before this process is repeated.
So, greywater can act as a mild fertilizer that can improve the growth of plants.
Is Greywater Bad for the Environment?
Choosing to use greywater can be viewed as a “double-edged sword” decision. There is no denying that the water contains beneficial bacteria and micronutrients that promote the growth of plants.
However, you can’t overlook the fact that greywater also contains other chemicals that might be harmful to the soil and environment. Hence, being aware of all the products you use inside the house is imperative in gauging how harmful the greywater is.
Most of the time, excessive greywater use is bad for the environment. Here’s why:
It Can Cause Excessive Algae Growth
Greywater contains one of the micronutrients needed by algae, which is phosphate.
When there is a constant supply of greywater or, to be exact, an excessive supply of greywater, some of the water can flow into streams that lead to lakes and ponds. If enough phosphates accumulate in a lake or pond, an algal bloom can occur.
It Can Oversaturate the Soil
Oversaturation of the soil happens when plants are overwatered. Overwatering itself isn’t a good practice. However, the impact of overwatering the soil using clean water is less harmful compared to using greywater.
Since you can’t store greywater for more than 24 hours without bacteria growing in it, you tend to use all of it at once. This can cause more micronutrients or chemicals to accumulate in the soil.
It Can Alter the pH of the Soil
Untreated greywater can affect soil more than treated water can. In fact, minerals, salts, and chemical compounds found in greywater can alter the pH level of the soil. Most greywater also contains traces of cleaning products that make the water more alkaline than it is supposed to be.
Hence, you should avoid using this water on any acid-loving plants. For instance, rhododendrons, azaleas, blueberries, camellias, and ferns thrive in acidic soil. Trying to irrigate these plants with greywater will only inhibit their growth.
It Can Prevent Water Absorption
Greywater collected from kitchen sinks contains oils and fats. When you water the soil and plants with greywater, the oil will be absorbed into the soil or accumulate in parts of the plants. As more oil and lipids accumulate underground, it can prevent water from penetrating, making the soil lose its conductive properties.
Can I Use Bathwater to Water My Plants?
Bathwater doesn’t fall in the category of sewage or water from toilets. Hence, it can be used to water your plants. You can also reduce the volume of clean water you use by using bathwater on your gardens or plants. Here’s how:
- Mulch the soil surface using wood chips or shredded bark around three to four inches thick. Apply and spread this mulch evenly. Mulch helps in retaining moisture in the soil. It also helps in decomposing toxic materials and filters out contaminants or small particles of solid waste in the water.
- Measure the space of your garden by taking into account its length and width. Divide the number by two to get the volume of water that you can safely use without overwatering or harming the soil and plants. For instance, if your garden measures around 200-square feet, the right amount of bathwater that you should use would be 100 gallons.
- Place the water in large containers or waterers. Remember not to keep the water for more than 24 hours to prevent bacterial growth.
- Water your plants accordingly. If possible, try to apply the bathwater to the base of the plant. Avoid the leaves and stems to prevent them from absorbing the water. Always use the right amount that you calculated in step two.
- Once you’ve watered the plants, use clean water to feed your plants for the rest of the week. This step is important to remove any contaminants or pollutants that might exist in the bathwater.
21 Plants That Thrive on Greywater
Don’t be surprised to know that some plants thrive on greywater. These plants love all the micronutrients that this type of water could offer:
- Hibiscus (Hibiscus)
- Yucca (Yucca)
- Gardenia (Gardenia jasminoides)
- Crimson bottlebrush (Callistemon citrinus)
- Rosemary (Salvia rosmarinus)
- Austrian Pine (Pinus nigra)
- Birds Of Paradise (Strelitzia reginae)
- Wood Iris (Dietes)
- Cottonwood (Populus sect. Aigeiros)
- Honeysuckle (Lonicera)
- Juniper (Juniperus)
- Sumac (Rhus)
- Manilla Grass (Zoysia matrella)
- Paperbarks (Melaleuca)
- Buffalo Grass (Bouteloua dactyloides)
- Italian Stone Pine (Pinus pinea)
- Bermuda Grass (Cynodon dactylon)
- Bearded Iris (Iris germanica)
- Lilyturf (Liriope)
- Rabbit Brush (Ericameria nauseosa)
- Mugo Pine (Pinus mugo)
When watering your garden and plants with greywater, be sure to monitor their growth and how they react to this type of water. Some plants might have a hard time adapting to greywater. So, you will have to take it easy on the amount of water you use until they can adjust accordingly.
Every six weeks, use clean water to flush out any chemicals or pollutants that have accumulated in the soil. And if you can, purchase organic compost to increase the amount of organic material in the soil. | <urn:uuid:a81479ba-24e0-4658-ae2a-2aa90961c621> | CC-MAIN-2022-33 | https://crateandbasket.com/is-greywater-good-for-plants/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.916945 | 2,180 | 2.609375 | 3 |
JUNIOR BIBLE QUIZ (JBQ)
Junior Bible Quiz (JBQ) was created and designed to help children develop a love for the Bible and an understanding that its truth can guide their lives daily. Junior Bible Quiz offers a fun, exciting way to motivate children to understand the all-important truths in God’s Word. Through cooperative learning, children work together on teams to learn and understand the questions and answers from the Bible Fact-Pak. Then using cooperative competition the children meet with other teams for a fun quizzing match.
For more information about JBQ, contact Joni Comer (515)669-1773.
TEEN BIBLE QUIZ (TBQ)
Bible Quiz is a youth discipleship ministry training middle and high school students to make better decisions by learning God's Word. Students in grades 6 - 12 enjoy the benefits of Scripture memorization and relationship development in a forum of healthy competition. | <urn:uuid:3da5f032-2d17-4e15-a28b-8cb0660cb873> | CC-MAIN-2022-33 | https://www.imnag.org/biblequiz | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.923451 | 199 | 1.71875 | 2 |
Even as states like Florida look to return to a degree of normalcy in the age of COVID-19, the pandemic is still a threat and social distancing remains an effective way of preventing the spread. With hurricane season looming, there is always the possibility of a storm wreaking havoc on a property. One insurance company is meeting the unique challenges of this year’s hurricane season by doing things a little differently.
Under normal circumstances, an insurance company would send an adjuster out to evaluate the damage to a home and determine what repairs need to be made. As people prefer to contactless solutions whenever possible, one insurance company is using modern technology to virtually survey property damage without having to step foot into someone’s home. The technology involves a real-time virtual tour where homeowners can communicate with the claims handler as the walkthrough of the damage is being done.
Will this new technology become the norm? Only time will tell. To read more, visit https://finance.yahoo.com/news/mercury-insurance-assists-homeowners-insurance-160000244.html.
This information is provided by Miami insurance attorney Alonso & Perez, LLP. Our areas of practice include bankruptcy, insurance litigation, foreclosure defense, immigration law, and more. Call 305-676-7545 to speak with one of our attorneys or an insurance lawyer Miami and receive a free consultation We look forward to working with you.
This information is provided for educational or informational purposes only and should not be construed as legal advice. The information is not provided in the course of an attorney-client relationship and is not intended to substitute for legal advice. | <urn:uuid:fb1577d7-4f5d-4411-8899-4f01c2149f78> | CC-MAIN-2022-33 | https://alonsoperezlaw.com/virtual-insurance-claims-may-be-the-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.938988 | 340 | 1.617188 | 2 |
Know-How Food Research Help In Building Healthy Lifestyle
Food is one thing that is loved by many individuals out there. The essence of living is with the food itself. Without food, there is no life; survival is zero. When it comes to eating, researchers and media headlines are mostly related to negative aspects of eating. Consuming certain foods while counting calories is not a better option to start. Dieting comes to mind for changing the momentum of fitness. Health intervention efforts include primary prevention campaigns that are mostly based on encouraging consumers to trade-off for the enjoyment and comfort foods regardless of health benefits. It is the perspective of food, as recent research suggests. Habits such as eating more fruits and vegetables might not have physical; they include mental benefits.
Why is Food research crucial nowadays?
With the enhancement in technologies and the growth of people from all over the world, it has been found that individuals must include their lifestyle with healthy habits of eating. An individual should always go for better options and chances of enjoying things on their own. Food being the staple of life in eating holds more value than anything else. However, without eating, an individual can not try to look for more options out there. Energy is the thing that manages all the tasks with the perspective of thinking in a better way. Gradually, challenges are worth every type. Undoubtedly, food is crucial to eat, but subsequent eating may lead to risks, but the best approach is to go for alternatives with chances of enjoyment in a healthy way. If health is good, then the mind will also be good. Approaches might be different for different people, but nutrition is common for everyone. Better to eat food that has many fibres, roughage, and vitamins for better health in the best possible way.
How can an individual take supplements?
It is a common myth among many people that supplements contain crucial nutrients for health. In reality, only some part of nutrition is present in the supplements. They are artificially made for supporting the health of an individual. It just supports everyone in the best possible way. Things might work for different people, but the meaning is the same.
Food research and blogs are a. good habits to start with. Since they mention everything about food types and nutrients in detail, it is better to approach such things. | <urn:uuid:8978fbc8-e387-4bcc-8e20-5bf912cc1918> | CC-MAIN-2022-33 | https://www.books-world.com/know-how-food-research-help-in-building-healthy-lifestyle/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.972709 | 471 | 2.8125 | 3 |
Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs.
Hackers and cybercrooks do the same. The last thing you want if you’re a cyberthug is for your banking Trojan to crash a victim’s system and be exposed. More importantly, you don’t want your victim’s antivirus engine to detect the malicious tool.
So how do you maintain your stealth? You submit your code to Google’s VirusTotal site and let it do the testing for you.
It’s long been suspected that hackers and nation-state spies are using Google’s antivirus site to test their tools before unleashing them on victims. Now, an independent security researcher has caught them in the act, tracking several high-profile hacking groups—including, surprisingly, two well-known nation-state teams—as they used VirusTotal to hone their code and develop their tradecraft.
“There’s certainly irony” in their use of the site, Dixon says. “I wouldn’t have expected a nation state to use a public system to do their testing.”
VirusTotal is a free online service—launched in 2004 by Hispasec Sistemas in Spain and acquired by Google in 2012—that aggregates more than three dozen antivirus scanners made by Symantec, Kaspersky Lab, F-Secure and others. Researchers, and anyone else who finds a suspicious file on their system, can upload the file to the site to see if any of the scanners tag it malicious. But the site, meant to protect us from hackers, also inadvertently provides hackers the opportunity to tweak and test their code until it bypasses the site’s suite of antivirus tools.
Dixon has been tracking submissions to the site for years and, using data associated with each uploaded file, has identified several distinct hackers or hacker teams as they’ve used VirusTotal to refine their code. He’s even been able to identify some of their intended targets.
He can do this because every uploaded file leaves a trail of metadata available to subscribers of VirusTotal’s professional-grade service. The data includes the file’s name and a timestamp of when it was uploaded, as well as a hash derived from the uploader’s IP address and the country from which the file was submitted based on the IP address. Though Google masks the IP address to make it difficult to derive from the hash, the hash still is helpful in identifying multiple submissions from the same address. And, strangely, some of the groups Dixon monitored used the same addresses repeatedly to submit their malicious code.
Using an algorithm he created to parse the metadata, Dixon spotted patterns and clusters of files submitted by two well-known cyberespionage teams believed to be based in China, and a group that appears to be in Iran. Over weeks and months, Dixon watched as the attackers tweaked and developed their code and the number of scanners detecting it dropped. He could even in some cases predict when they might launch their attack and identify when some of the victims were hit—code that he saw submitted by some of the attackers for testing later showed up at VirusTotal again when a victim spotted it on a machine and submitted it for detection.
Tracking the Infamous Comment Crew
One of the most prolific groups he tracked belongs to the infamous Comment Crew team, also known by security researchers as APT1, which was responsible for hacking The New York Times. Believed to be a state-sponsored group tied to China’s military, Comment Crew also reportedly is responsible for stealing terabytes of data from Coca-Cola, RSA and more than 100 other companies and government agencies since 2006. More recently, the group has focused on critical infrastructure in the U.S., targeting companies like Telvent, which makes control system software used in parts of the U.S. electrical power grid, oil and gas pipelines and in water systems. The group Dixon tracked isn’t the main Comment Crew outfit but a subgroup of it.
He also spotted and tracked a group known by security researchers as NetTraveler. Believed to be in China, NetTraveler has been hacking government, diplomatic and military victims for a decade, in addition to targeting the office of the Dalai Lama and supporters of Uyghur and Tibetan causes.
The groups Dixon observed, apparently ignorant of the fact that others could watch them, did little to conceal their activity. However, at one point the Comment Crew did begin using unique IP addresses for each submission, suggesting they suddenly got wise to the possibility that they were being watched.
Dixon got the idea to mine VirusTotal’s metadata after hearing security researchers repeatedly express suspicions that hackers were using the site as a testing tool. Until now he’s been reluctant to publicly discuss his work on the metadata, knowing it would prompt attackers to change their tactics and make it harder to profile them. But he says there is now enough historical data in the VirusTotal archive that other researchers can mine it to identify groups and activity he may have missed. This week he’s releasing code he developed for analyzing the metadata so others can do their own research.
Dixon says it wasn’t initially easy to spot groups of attackers in the data. “Finding them turned out to be a very difficult problem to solve,” he says. “When I first looked at this data, I didn’t know what I should be looking for. I didn’t know what made an attacker until I found an attacker.”
Surreptitiously Watching Hackers Hone Their Attacks
The data provides a rare and fascinating look at the inner workings of the hacker teams and the learning curve they followed as they perfected their attacks. During the three months he observed the Comment Crew gang, for example, they altered every line of code in their malware’s installation routine and added and deleted different functions. But in making some of the changes to the code, the hackers screwed up and disabled their Trojan at one point. They also introduced bugs and sabotaged other parts of their attack. All the while, Dixon watched as they experimented to get it right.
Between August and October 2012, when Dixon watched them, he mapped the Crew’s operations as they modified various strings in their malicious files, renamed the files, moved components around, and removed the URLs for the command-and-control servers used to communicate with their attack code on infected machines. They also tested out a couple of packer tools—used to reduce the size of malware and encase it in a wrapper to make it harder for virus scanners to see and identify malicious code.
Some of their tactics worked, others did not. When they did work, the attackers often were able to reduce to just two or three the number of engines detecting their code. It generally took just minor tweaks to make their attack code invisible to scanners, underscoring how hard it can be for antivirus engines to keep pace with an attacker’s shapeshifting code.
There was no definitive pattern to the kinds of changes that reduced the detection rate. Although all of the samples Dixon tracked got detected by one or more antivirus engine, those with low detection rates were often found only by the more obscure engines that are not in popular use.
Though the Crew sometimes went to great lengths to alter parts of their attack, they curiously never changed other telltale strings—ones pertaining to the Trojan’s communication with command servers, for example, remained untouched, allowing Dixon to help develop signatures to spot and halt the malicious activity on infected machines. The Crew also never changed an encryption key they used for a particular attack—derived from an MD5 hash of the string [email protected])!0. And most of the time, the Crew used just three IP addresses to make all of their submissions to VirusTotal before suddenly getting wise and switching to unique IP addresses. Given the number of mistakes the group made, he suspects those behind the code were inexperienced and unsupervised.
Connecting Attacks to Victims
At times, Dixon could track files he saw uploaded to VirusTotal and connect them to victims. And sometimes he could track how much time passed between the end of testing and the launch of an attack. Most of the time, Comment Crew launched its attack within hours or days of testing. For example, on August 20, 2012 the group introduced a bug in their code that never got fixed. The sample, with bug intact, showed up on a victim’s machine within two days of it being tested.
Dixon tracked NetTraveler in much the same way that he tracked the Comment Crew. The Travelers showed up on VirusTotal in 2009 and appeared to gradually grow more prolific over time, more than doubling the number of files submitted each year. In 2009, the hackers submitted just 33 files to the site, but last year submitted 391 files. They’ve already submitted 386 this year.
They made it particularly easy to track their code in the wild because even the emails and attachments they used in their phishing campaigns got tested on VirusTotal. More surprising, they even uploaded files they’d stolen from victims’s machines. Dixon found calendar documents and attachments taken from some of the group’s Tibetan victims uploaded to VirusTotal. He thinks, ironically, that the hackers may have been testing the files to see if they were infected before opening them on their own machines.
The unknown hacker or group of hackers that Dixon tracked from Iran popped up on VirusTotal this past June. In just a month, the party uploaded about 1,000 weaponized documents to the site and showed considerable skill in evading detection. In some cases, they even took old exploits that had been circling in the wild for two years and managed to tweak them enough to bypass all of the virus scanners. Dixon also spotted what appeared to be members of the PlugX hacking group uploading files to the site. PlugX is a family of malware believed to be from China that started appearing last year in the wild and has evolved over time. The PlugX group has uploaded about 1,600 components to VirusTotal since April 2013, and tends to use a unique IP address each time.
Now that the activity of hacking groups on VirusTotal has been exposed, they’ll no doubt continue to use the site but alter their ways to better avoid tracking. Dixon is fine with that. As long as security companies now have confirmation that some of the code uploaded to the site is pre-attack code, it gives them an opportunity to look for telltale signs and craft their signatures and other defense mechanisms before the code is released in the wild.
Provided from: wired. | <urn:uuid:eb7107b5-fc1c-4ebb-8d0a-699981a7b9d1> | CC-MAIN-2022-33 | https://digital-era.net/a-google-site-meant-to-protect-you-is-helping-hackers-attack-you.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.968936 | 2,221 | 2.140625 | 2 |
Dental veneers are used to correct both color and tooth shape problems. Porcelain veneers are thin pieces of specially-shaped porcelain that are bonded over the front of your teeth. Composite resin veneers are applied directly to your teeth and sculpted to the desired shape. Both procedures can be performed without anesthesia. Veneers require a tooth reduction (where the thickness of the tooth is reduced).
In cases of serious tooth discoloration, dentists recommend dental veneers or crowns as opposed to bleaching.
Like teeth whitening, dental veneers are most popular among patients between 20-50 years of age. This demographic represents a majority of the American workforce. Those in the workforce are becoming increasingly interested in enhancing their looks for both personal and professional reasons.
Since 2000 the amount of patients getting porcelain veneers has increased by 250 percent.
Dental veneers can be a solution for:
- Severely discolored or chipped teeth;
- Misshapen or crooked teeth;
- Teeth with small holes or pits;
- Teeth with unwanted or uneven spaces
Your dentist will take a mold of your teeth, which will serve as the model to create your veneers. These custom veneers are then glued directly onto your teeth. Temporary veneers are worn until the permanent veneers are ready. During the temporary veneer stage, you should advise your dentist of any adjustments or changes you would like made to the size or shape of your veneers.
Your natural teeth are reduced and lightly buffed to prepare for the application of the veneers. The tooth reduction is necessary to accommodate the small added thickness of the veneer. The permanent veneers are first placed onto the teeth without cementation to verify the perfect fit and the color. The color cannot be changed once the veneers are permanently adhered to the teeth. The teeth are then cleansed with chemicals to achieve a durable bond. An ultraviolet light is used to harden the glue or cement between the teeth.
You may want to discuss the possibility of using “try in” veneers with your dentist. “Try in” veneers are secured to your teeth with temporary cement. The temporary cement is the same color cement that is used for the permanent attachment. During this “try-in” phase, you should look at the veneers in natural light in addition to office or home lighting.
Dental insurance typically does not cover the cost of veneers.
Types of Veneers
Composite Resin Veneers
Composite resin veneers, also known as direct veneers, can usually be applied to your teeth within one dental visit. The procedure involves an application of a composite resin material directly to the tooth surface. The resin material is sculpted by the dentist to the fit the desired shape of the tooth. Composite veneers typically last between 5-7 years.
Costs: The composite resin veneer procedure costs approximately $250 per tooth. This cost is significantly less than the porcelain veneer procedure.
Porcelain veneers, also known as indirect veneers, are made of a very thin porcelain material. This procedure requires two visits to the dentist.
In your first visit, your dentist removes part of your tooth enamel to reduce thickness and make room for the veneers.
Next your dentist will make an impression of your teeth. The impression is sent to a dental laboratory where your veneers are custom-made.
On your next visit to the dentist, a mild chemical is applied to your teeth to achieve a durable bond. The veneers are then bonded to your teeth using composite resin cement.
A porcelain veneer procedure requires two or more dental visits at one to two weeks apart.
Porcelain veneers typically last 10-15+ years.
Costs: Porcelain veneers typically range from $900-$2,500 per tooth
Lumineer Porcelain Veneers
Lumineers are a new type of porcelain veneer made from Cerinate porcelain.
Cerinate is a thinner type of porcelain than the porcelain used in standard veneers. Therefore, little or no tooth reduction is required when applying a lumineer. In cases where no tooth reduction is necessary, lumineers are reversible.
Lumineers resist micro-leakage and micro-cracking more than traditional porcelain veneers.
Like porcelain veneers, lumineers require two visits to the dentist.
Lumineers are expected to last as long as traditional porcelain veneers, which is between 10-15+ years.
Costs: Lumineer porcelain veneers typically cost less than traditional porcelain veneers, ranging between $700-$1,000 per tooth.
Pros and Cons of Dental Veneers
Pros: Veneers do not stain, are strong, very durable, can actually strengthen the tooth, last between 5-15+ years, and typically cost less than crowns.
In most cases, veneers do not require the dentist to remove much of the tooth.
The procedure for veneers is typically completed in two appointments.
Aside from follow-up visits to a dentist, and general good oral hygiene, there is no additional maintenance needed for veneers.
Veneers can brighten dark teeth, and are a very popular solution for people seeking a perfect smile.
Cons: In some cases more tooth needs to be reduced. This may increase the risk of trauma to your teeth.
Expect minor sensitivity after your teeth have been prepared for veneers.
A difference in speech may be experienced, usually when pronouncing “s” and “f” sounds. A cosmetic dentist can make adjustments to your veneers to correct this problem.
Bruxism, the clenching or grinding of teeth, can damage veneers.
Ask a Dentist, Dental Q & A – Dental Veneers & Lumineers
How long does it take for a procedure?
The procedure takes several hours. It depends on the oral health condition of the patient. A patient should expect to be in the office for 3-4 hours. The dentist has to perform a thorough exam before starting the procedure.
What are the various things I should keep in mind to get prepared for the procedure?
Difference in look of teeth between the two visits?
What to expect during the procedure?
Does the dentist use a laboratory for the procedure and is the cost of lab included in cost of the procedure?
The impressions of the teeth are sent to the lab to create custom-made veneers. The cost of the lab work is usually included in the procedure cost and is also discussed with the patient.
Are there any prescriptions provided after the procedure?
Usually Advil or Tylenol is recommended to ease the minor aches or pains that a patient may experience following the procedure.
What medical conditions would disqualify a person from getting a certain procedure?
The dentist should be informed of any and all medical conditions. This is necessary to avoid any complications that might occur during or after the procedure.
How long do the results last?
Veneers usually last for up to 12 years. This is the same timeframe for how long a crown will last. The ultimate timeframe depends on the oral health habits of the patient.
Things to keep in mind:
It is strongly recommend that a patient avoid eating sticky foods like gum, caramels, and taffy. Avoid hard candy and definitely do not chew ice cubes! Don’t bite your fingernails or chew on hard objects. Once veneers have been applied, a patient cannot reverse the treatment because a part of the tooth enamel has been removed. And, until the veneers are attached to your teeth, your teeth may be sore and look strange.
1 Christopher A. Jordan, DDS. | <urn:uuid:598e7c0f-1b6b-45d6-bf3e-be83bba37c79> | CC-MAIN-2022-33 | http://topdentists.com/learn/dental-procedures/veneers-lumineers/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.939526 | 1,720 | 2.671875 | 3 |
Browse the CollectionBuy Now >>
Rusting is all about electrons on the move: a piece giving up electrons + a liquid that helps electrons move + a metal that readily accepts electrons. (Anode + electrolyte + cathode: Opposites attracting!) In this composition, those elements playfully interact. Metal, water, rust, and atomic elements abstracted as gears reveal that there's a lot going on. If I were a chemist I could describe it as 4Fe + 3O2 = 2Fe2O3. Being an artist allows more creative description, using visual opposites in juxtaposition to tell the story. Photographic images join monotypes and stencil prints. And color wheel opposites teal and rust-orange define shapes and patterns.
Muslin, sheer polyester, eco-felt, thread, acrylic paint, acrylic mediums
Transfer of original photos (gel medium transfer to muslin), contact rust printing, monotype, relief print, resist print, stencils, direct painting, machine stitching | <urn:uuid:ff68d7ef-7f94-4ab0-a643-1c8888aeebc5> | CC-MAIN-2022-33 | https://www.saqa.com/art/browse-collection/rust-happens | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.850628 | 246 | 2.609375 | 3 |
Technology at 254
P.S.254Q, The Rosa Parks School has a learning environment in which all participants are dedicated to working towards a quality education that includes the integration of technology within our rigorous academic curriculum. Our students will become life-long learners, who will contribute positively, not only to our school, but also to society as a whole.
With computer science education, we envision our students becoming leaders who create and develop their own ideas in this high tech world. We look forward to exposing our students to computer science in the early grades as well as the upper grades, allowing our students to easily adapt and compete in this diverse, high tech world as adults.
Students in all grades will receive computer science in their classrooms by giving them access to laptops, desktops and other technological equipment. Students will have access to computers in the Computer Lab and the Library Media Center. We will include computer science during STEM enrichment programs before and after-school. We envision that all students will have access to a wealth of technological education, experiences, and real world application projects.
The Rosa Parks School strives to maintain equity in all that we do and we will do the same with computer science education. All of our students, including students with special needs, English Language Learners and girls, will become the independent problem solvers and critical thinkers needed in this male dominated field of study. Our students will realize that being a computer scientist or engineer is not just a field for men, but for all motivated, logical thinking, and creative people. We will also offer our parents access to technology by having open access hours in the computer lab after school and we will offer monthly workshops in order to keep parents abreast of the technology their children are learning. | <urn:uuid:c95dd6ab-77f3-406d-aacc-b21f47165050> | CC-MAIN-2022-33 | https://www.ps254q27.com/technology | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.970363 | 352 | 2.5625 | 3 |
If This doesn’t help, then Nothing else Will..
With over 371 million people suffering from Diabetes worldwide, not to mention others with high blood sugar issues like Prediabetes, Insulin Resistance and other conditions, this book, “Diabetes Diet: The Top 100 Diabetic Foods to Eat for a Highly Effective Diabetes Diet and 15 Recipes to Lower Blood Sugar” is a must read. If you, or someone you know, has high blood sugar, you can’t afford not to read this book.
Within the pages of this book, you will find 100 foods that are conducive to the diet of anyone who suffers from high blood sugar. You will also learn how blood sugar works within the body so that you can get a better understanding of the “do’s” and “don’t’s” when it comes to keeping your glucose in check. Equipped with the knowledge, you will not only know what foods are good for you to eat, but the reasons why as well.
This book delivers far more than others that just scratch the surface and merely list foods that are good for Diabetics and those with blood sugar conditions to eat because it goes into detail about each and every food on the list.
Did you know that there is a delicious fruit named Kamu Kamu that comes from the Amazon rainforest full of phytochemicals, amino acids and anti-oxidants that is fantastic to keep your blood sugar under control? Learn more about the Kamu Kamu and other super-berries, fruit, vegetables and other foods that will help you lower your blood sugar plus provide other benefits such as keeping colds and flu away and helping to reduce inflammation as well.
If you are looking for a great list of foods that are good for control of high blood sugar that also tells you what else the foods can do for you, you simply must read this book. And, not only do you get that, this book has 15 tried-and-true recipes that can help you lower your blood sugar too.
When you purchase the ”Diabetes Diet: The Top 100 Diabetic Foods to Eat for a Highly Effective Diabetes Diet and 15 Recipes to Lower Blood Sugar” today, you’ll save $3 off the regular price and get if for a limited time discount of only 99 cents
That’s not all, I’m also giving away a “Free Bonus Diabetic cookbook” that contains Over 500 Delicious Diabetic Recipes and you get this as a free bonus for purchasing this book today.
Please note that this bonus is only available for a limited time!
And to wipe off any doubt you may still have about purchasing this book right now, I’m giving you a 30 days no question ask money back guarantee.
If for any reasons whatsoever, you dislike the content of this book or think it didn’t meet your expectation or help you in any way, please contact us through the email address provided after the conclusion and we will refund you without asking any question.
This is a risk-free $2.99 investment and you must act now. You have nothing to lose. Download your copy now! and if you don’t like the book, let us know and we will give you back your money. | <urn:uuid:05486b01-2414-4c56-aa5d-53d61011d158> | CC-MAIN-2022-33 | https://ohfb.com/book/diabetes-diabetes-diet-the-top-100-diabetic-foods-to-eat-for-a-highly-effective-diabetes-diet-and-15-diabetic-recipes-to-lower-blood-sugar-diabetes-dietsmart-blood-sugarsugar-detox-book-4/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.941196 | 683 | 1.710938 | 2 |
By Aislinn Laing and London
DURBAN, South Africa: Thirteen of the world's hottest recorded years have occurred in the past 15 years and Arctic ice layers were at their thinnest this year, scientists have warned.
This year was also the hottest to coincide with the normally cooling effect of the La Nina weather system in the Pacific, the World Meteorological Organisation (WMO) found.
Without urgent action by all governments, they say, global temperatures could ''very rapidly'' rise to 2 degrees above pre-industrial levels, which it is believed would trigger irreversible changes in the climate.
The statistics were released in South Africa at the United Nations climate-change conference. In the Arctic, last summer saw the disappearance of ice around the north-eastern and north-western corridors.
According to Britain's Met Office, which helped to compile the WMO report with the University of East Anglia, Arctic ice could disappear altogether by 2050. ''Our science is solid and it proves unequivocally that the world is warming and that this warming is due to human activities,'' WMO deputy secretary-general Jerry Lengoasa said.
In Britain, conservative politician Lord Lawson has accused Sir David Attenborough of ''sensationalism'' in the final episode of Frozen Planet, which focuses on the effects of global warming.
During the BBC television program, Attenborough claims the Arctic could be free of ice by the summer of 2020 and that polar bears are already dying.
Writing in Radio Times, Lawson says certain populations of the bears are rising and sea ice cover is increasing in Antarctica.
He adds that an ''objective'' point of view would have pointed out that Antarctic sea ice had expanded over the past 30 years.
However, the series is careful to balance its arguments. Attenborough makes it clear that the polar bears he is seen with are from just one population and the program says some animals, such as killer whales, will benefit from reduced sea ice.
Cambridge University scientists questioned whether Lawson was aware of the latest peer-reviewed research.
Senior researcher at the university's Scott Polar Research Institute Dr Ian Willis said: ''It is indeed the case that, while total sea ice extent in Antarctica over the last three decades has increased slightly, the total sea ice extent in the northern hemisphere has decreased more substantially. So there is now less sea ice on the planet than there was 30 years ago.'' | <urn:uuid:1e98816a-6724-41d5-8118-1b8a352bbb5f> | CC-MAIN-2022-33 | https://www.smh.com.au/environment/climate-change/scientists-say-act-or-lose-all-arctic-ice-20111130-1o761.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.961318 | 501 | 3.28125 | 3 |
Numerology Of Amanda
Expression Number - 7
Soul Urge Number - 3
Personality Number - 4
Life Path Number -
Positive Traits - analytical, intellectual, spiritual, contemplative, focused
Negative Traits - aloof, suspicious, selfish
Careers - clergy, researcher, teacher, philosopher
Your seven baby and child will be very curious. They will enjoy intellectual pursuits and be thoughtful and introspective. Sevens are drawn to seek out the truth in the world around them. Your child will have the ability to study and learn about deep and difficult subjects. To keep them balanced encourage them to become involved with friends and athletic pursuits.
Positive Traits - creative, social, playful, optimistic, happy, motivating
Negative Traits - disorganized, emotional, irresponsible
Careers - writer, actor, musician, entertainer
A child with a Soul Urge of three has the heart of an artist, inventor. Their greatest fulfillment comes from creative endeavors. This can include anything from traditional art, painting, drawing, sculpture, writing, to more explorative or inventive pursuits. Anything which fosters creativity and its ajoining social interaction will make a number thrive thrive.
Positive Traits - organized, methodical, practical, reliable, honest
Negative Traits - rigid, judgmental, too cautious
Careers - banker, accountant, attorney, physician
Personality number fours come across as practical, solid, and strong. They prefer stability and well-proven paths and solutions. Their self-discipline and preference for order help them to be calm and practical in times of crisis. Their innate methodical approach allows them to see details that others miss.
Learn about name meanings, name origins, name popularity, famous namesakes and more on our Amanda Meaning & More page.
Just for fun, see the name Amanda in Hieroglyphics, learn about ancient Egyptian Hieroglyphics and write a Hieroglyphic message.
Learn about nautical flags and see your name or message written in nautical flags, on the Amanda in Nautical Flags page. | <urn:uuid:a4ecd79f-5905-463f-ac74-fd5b90616239> | CC-MAIN-2022-33 | https://www.ourbabynamer.com/numerology-of-Amanda.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.885013 | 442 | 1.6875 | 2 |
By James Petras
Faced with the deteriorating global situation and a wave of popular uprisings breaking away from Western hegemony, NATO powers counter-attacked in the most resolute manner. According to James Petras, the destruction of an independent and secular regime like Libya was meant to send a strong message: any independent Third World regime can be overthrown; colonial puppet regimes can be forced upon a devastated people; colonialism is still thriving; and imperial rule is here again. ~ InfoWars Editor
The conquest and occupation of Libyan is first and foremost a military victory for NATO. Every aspect of the military offensive was spearheaded and directed by NATO air, sea and ground forces. The NATO invasion of Libya was basically a response to the “Arab spring” : the popular uprisings which spread from North Africa to the Persian Gulf. The NATO assault formed part of a general counter-attack designed to contain and reverse the popular democratic and anti-imperialist movements which had ousted or were on the verge of overthrowing US-client dictators.
Political and military considerations were foremost in motivating the NATO invasion: As late as May 2009, the U.S. and European regimes were developing close bilateral military, economic and security agreements with the Gaddafi regime. According the British daily, the Independent (9/4/2011), official Libyan documents found in its Foreign Office described how on December 16, 2003, the US CIA and British MI6 established close collaboration with the Gaddafi government. The MI6 provided Gaddafi with details on Libyan opposition leaders exiled in England and even drafted a speech for him as he sought rapprochement with the outside world.
U.S. Secretary of State Clinton presented Mutassin Gaddafi to the Washington press during a visit in 2009 stating, “I am very pleased to welcome Minister Gaddafi to the State Department. We deeply value the relationship between the United States and Libya. We have many opportunities to deepen and broaden our co-operation and I am very much looking forward to building on this relationship.”(examiner.com2/26/2011).
Between 2004-2010 the largest oil and petroleum service multinational corporations, including British Petroleum, Exxon Mobil, Halliburton, Chevron, Conoco and Marathon Oil joined with military-industrial giants like Raytheon and Northrop Grumman, Dow Chemical and Fluor and signed enormous investments and sales deals with Libya (examiner.com op cit).
In 2009, the U.S. State Department awarded a $1.5 million dollar grant to train Libyan civilian and government security forces. The White House budget for 2012 included a grant for training Libyan security forces. General Dynamics signed a $165 million dollar deal in 2008 to equip Libya’s elite mechanized brigade (examiner.com ibi).
On August 24, 2011 Wikileaks released US embassy cables from Tripoli, which described the positive assessment a group of leading Republican senators had made of US-Libyan relations in during their visit in late 2009. These cables highlighted ongoing security training programs involving Gaddafi’s police and military, as well as the US’ strong support for the regime’s repression of radical Islamists, many of whom are now leading the NATO-backed ‘rebel forces’ now occupying Tripoli.
What caused the NATO countries to shift abruptly from a policy of embracing Gaddafi to launching a brutal scorched-earth invasion of Libya in a matter of months? The key is the popular uprisings, which threatened Euro-US domination. The near total destruction of Libya, a secular regime with the highest standard of living in Africa, was meant to be a lesson, a message from the imperialists to the newly aroused masses of North Africa, Asia and Latin America: The fate of Libya awaits any regime which aspires to greater independence and questions the ascendancy of Euro-American power.
NATO’s savage six-month blitz – over 30,000 air and missile assaults on Libyan civil and military institutions – was a response to those who claimed that the US and the EU were on the “decline” and that the “empire was in decay”. The radical Islamist and monarchist-led “uprising” in Benghazi during March 2011 was backed by and served as a pretext for the NATO imperial powers to extend their counter-offensive on the road to “neo-colonial restoration”.
NATO’s War and the Phony “Rebel Uprising”
Nothing is more obvious than the fact that the entire war against Libya was in every strategic and material fashion NATO’s war. The casting of the rag-tag collection of monarchists, Islamist fundamentalists, London and Washington-based ex-pats and disaffected Gaddafi officials as “rebels” is a pure case of mass media propaganda. From the beginning the “rebels” depended completely on the military, political, diplomatic and media power of NATO, without which the de facto mercenaries would not have lasted a month, holed up in Benghazi.
A detailed analysis of the main features of the conquest of Libya confirms this assault as a NATO war.
NATO launched brutal air and sea attacks destroying the Libyan air force, ships, energy depots, tanks, artillery and armories and killed and wounded thousands of soldiers, police and civilian militia fighters. Until NATO’s invasion the mercenary “rebel” ground forces had not advanced beyond Benghazi and could barely “hold” territory afterwards. The “rebel” mercenaries “advanced” only behind the withering round-the-clock air attacks of the NATO offensive.
NATO air strikes were responsible for the massive destruction of Libyan civilian and defensive military infrastructure, bombing ports, highways, warehouses, airports, hospitals, electrical and water plants and neighborhood housing, in a war of “terror” designed to “turn” the loyalist mass base against the Gaddafi government. The mercenaries did not have popular backing among Libyan civilians, but NATO brutality weakened active opposition against the “rebel” mercenaries.
NATO won key diplomatic support for the invasion by securing UN resolutions, mobilizing their client rulers in the Arab League, procuring US mercenary trained ‘legionnaires’ from Qatar and the financial backing of the rich rabble in the Gulf. NATO forced “cohesion” among the feuding clans of self-appointed “rebel” mercenary leaders via its (“freezing”) seizure of overseas Libyan government assets amounting to billions of dollars. Thus the financing, arming, training and advising by “Special Forces” were all under NATO control.
NATO imposed economic sanctions, cutting off Libya’s income from oil sales.. NATO ran an intensive propaganda campaign parading the imperial offensive as a “rebel uprising”; disguising the blistering bombardment of a defenseless anti-colonial army as “humanitarian intervention” in defense of “pro-democracy civilians”. The centrally choreographed mass media blitz extended far beyond the usual liberal circles, to convince “progressive” journalists and their newspapers, as well as intellectuals to paint the imperial mercenaries as “rebels” and to condemn the heroic 6-month resistance of the Libyan army and people against foreign aggression. The pathologically racist Euro-US propaganda published lurid images of Libyan government troops (often portrayed as “black mercenaries”) receiving massive quantities of “Viagra” from Gadhafi while their own families and homes were, in fact, under aerial assault and blockade by NATO.
The main contribution of the mercenary “conquerors” in this grand production was to provide photo opportunities of rag-tag “rebels” waving rifles in Pentagon-style Che Guevara poses riding around in pickup trucks arresting and brutalizing African migrant workers and black Libyans. The mercenary “liberators” triumphantly entered Libyan cities and towns, which were already scorched and devastated by the NATO colonial air force. Needless to say the mass media “adored” them.
In the aftermath of NATO’s destruction, the “rebel” mercenaries showed their true talents as death squads: They organized the systematic execution of “suspected Gadfafi supporters” and the pillage of homes, stores, banks and public institutions related to the defeated regime. To “secure” Tripoli and snuff out any expression of anti-colonial resistance, the “rebel” mercenaries carry out summary executions – especially of black Libyans and sub-Saharan African workers and their families. The “chaos” in Tripoli described by the mass media is due to the “self-styled liberation” forces running amok. The only quasi–organized forces in Tripoli appear to be the Al Qaeda-linked militants, NATO’s erstwhile allies.
Consequences of the NATO Conquest of Libya
According to “rebel” mercenary technocrats, NATO’s policy of systematic destruction will cost Libya at least a “lost decade”. This is an optimistic assessment of how long “reconstruction” will take for Libya to regain the economic levels of February 2011. The major petroleum companies have already lost hundreds of millions in profits and over the decade are expected to lose billions more due to the flight, assassination and jailing of thousands of experienced Libyan and foreign experts, skilled immigrant workers and technical specialists in all fields, especially in view of the destruction of Libyan infrastructure and telecommunication systems.
Sub-Sahara Africa will suffer a huge set-back with the cancellation of the proposed “Bank of Africa”, which Gaddafi was developing as an alternative source of investment finance and the destruction of his alternative communication system for Africa. The process of re-colonization involving imperial rule via NATO and UN mercenary “peace keepers” will be chaotic given the inevitable strife among hostile armed Islamist fundamentalists, monarchists, neo-colonial technocrats, tribal warlords and clans as they carve up their private fiefdoms. Intra-imperial rivalries and local political claimants to the oil wealth will further enhance the “chaos” and degrade civilian life, in a nation which had once boasted the highest per capita income and standard of living in Africa. Complex irrigation and petroleum networks, developed under Gaddafi and destroyed by NATO, will remain in shambles. As the example of Iraq has vividly proven, NATO is better at destroying than constructing a modern secular state rooted in a modern civil bureaucracy, universal free public education, secular judicial system and modern health services. The US policy of rule and ruin reigns supreme in NATO’s juggernaut.
Motivation for the Invasion
What motivated NATO to initiate a massive, six-month long aerial bombardment of Libya, followed by invasion and crimes against humanity? Civilian deaths and the widespread destruction of Libyan civil society by NATO flies in the face of its claims that the air assaults were meant to “protect civilians” from imminent Gaddafi-led genocide, “rebel” claims which were never substantiated. Bombing Libya’s critical economic infrastructure allows us to categorically conclude that the NATO assault has little to do with “economic rationality” or any such consideration. The primary motivation for NATO’s actions can be found in earlier policies related to a spring counter-offensive against the mass popular movements that overthrew US-EU puppets in Egypt and Tunisia and were threatening client regimes in Yemen, Bahrain and elsewhere.
Despite the fact that the US-NATO were already engaged in several colonial wars (Iraq, Afghanistan, Pakistan, Yemen and Somalia) and Western public opinion had been demanding withdrawal in light of the costs, Western imperial leaders felt too much was at stake and calculated that losses could be minimized. NATO’s overwhelming mastery of the air and sea made short work of Libya’s puny military defense capability, allowing them to bomb the cities, ports and vital infrastructure with impunity and enforce a total economic blockade. They calculated that massive bombing would terrorize the Libyan people into submission and bring about a quick colonial victory without any NATO military losses, the prime concern of Western public opinion, and permit a triumphant “rebel” mercenary army to march into Tripoli.
The Arab popular rebellions were the central concern and the motor force behind NATO’s destruction of Libya. These mass popular uprisings had toppled the long-standing pillars of US-Israel-EU dominance in the Middle East. The fall of the Egyptian dictator Hosni Mubarak and his Tunisian counterpart Ben Ali sent tremors through the imperial foreign offices. These successful uprisings had the immediate ripple effect of inspiring similar movements throughout the region. Bahrain, housing the key naval base for the US navy in the Middle East and neighboring Saudi Arabia (the US key strategic ally in the Arab world), witnessed a prolonged massive uprising of civil society, while Yemen ruled by the US- puppet Ali Saleh, faced mass popular movements and militant resistance. Morocco and Algeria were experiencing popular demands for democracy.
The common thread in the Arab peoples’ movements was their demands to end EU, US and Israeli domination of the region, an end to massive corruption and nepotism, free elections and a solution to wide-spread unemployment via large-scale job programs. As anti-colonial movements grew in breadth and intensity their demands radicalized from political to social democracy, from a democratic to an anti-imperialist foreign policy. Workers’ demands were enforced by strikes and calls for the prosecution of repressive police and internal security and military officials guilty of crimes against their citizens.
The U.S., E.U. and Israel were caught by surprise – their intelligence agencies so deeply embedded in the smelly crevices of their clients’ secret police institutions failed to detect the popular explosions. The popular uprisings came at a critical and inopportune moment, especially for the US where domestic support for NATO wars in Iraq and Afghanistan had declined sharply given the economic crises and major social cutbacks to pay for these wars. Moreover, in Iraq and Afghanistan the US-NATO troops were losing ground: The Taliban was, in effect, the real “shadow government”. Pakistan, despite its puppet regime and compliant generals, faced overwhelming popular opposition to the air war against its citizens in frontier villages and towns. The US drone strikes killing militants and civilians were answered with the sabotage of vital transport supplying the occupation forces in Afghanistan.
Faced with the deteriorating global situation, the NATO powers, decided that they needed to counter-attack in the most decisive and visible manner by destroying an independent, secular regime like Libya and thereby re-affirming their global supremacy, countering the image of defeat and retreat and, above all, re-energizing the “declining imperial power”.
The Imperial Counter-Attack
The US led the way in its counter-offensive in Egypt, by backing the power grab by the military junta led by Mubarak loyalists, who then proceeded to disperse and repress the pro-democracy and workers movements and to end all talk of restructuring the economy. A pro-NATO collective dictatorship of generals replaced the personal autocratic rule of Hosni Mubarak. The NATO powers provided “emergency” billions to float the new regime and “derail” the Egyptian people’s march to democracy. In Tunisia a similar process took hold: The EU, especially France and the US, backed a reshuffling of the ousted regime bringing to the fore a new/old cast of neo-colonial politicians. They plied them with funds, insuring that the military-police apparatus remained intact despite continued mass discontent with the conformist policies of the “new/old regime”.
In Bahrain and Yemen, the NATO powers followed a dual track, unsure of the outcome between the massive pro-democracy movements and the pro-imperial autocrats. In Bahrain, the West called for “reform’”and “dialogue” with the majority Shia population and a peaceful resolution, while continuing to arm and protect the Bahraini royalty – all the while looking for a pliant alternative if the incumbent puppet was overthrown. The NATO-backed Saudi invasion of Bahrain in support of the dictatorship and the subsequent wave of terror effectively showed West’s true intentions. In Yemen the NATO powers continued to support the brutal Ali Saleh regime.
Meanwhile the NATO powers were exploiting internal discontent in Syria by arming and providing diplomatic support to the Islamic fundamentalists and their minority neo-liberal allies in an effort to overthrow the Bashar al-Assad regime. Thousands of Syrian civilians, police and soldiers have been killed in this simmering civil war, which NATO propaganda presents as a case of state terror against “peaceful civilians”, ignoring the killing of soldiers and civilians by armed Islamists and the very real threat to Syria’s secular population and religious minorities.
The Counter-Offensive and NATO’s Invasion of Libya
The destruction and invasion of Libya reversed seven years of accommodation and co-operation with Gaddafi. There were no “incidents” in Libya or elsewhere that had threatened the NATO countries’ economic and military interests. Libya was still an independent country, pursuing a pro-African agenda which had spearheaded and funded the establishment of an independent regional bank and communications system designed to bypass IMF and World Bank control. Libya’s close ties to all the major NATO oil companies and to Wall Street investment banks as well as its ongoing bilateral military programs with the US did not shield it from the NATO’s attack. Libya was deliberately destroyed by a 6-month campaign of relentless bombing by NATO air and naval forces to serve as an example to the Arab popular movements: NATO’s message to the Arab pro-democracy movements was that it was prepared to launch new offensive wars with the same devastating consequences as the Libyan people just endured; the imperial powers were not in decline and any independent anti-colonial regime would suffer the same fate. NATO’s message to the African Union was clear: There will be no independent regional bank organized by Gaddafi or anyone else. There is no alternative to imperial banks, the IMF or the World Bank.
Through the devastation of Libya, the West was telling the Third World that, contrary to the pundits who chattered about “the decline of the US empire”, NATO was willing to use overwhelming and genocidal military power to establish puppet regimes, no matter how backward, vicious and regressive the puppets, because they will ultimately obey NATO and answer to the White House.
NATO’s invasion and destruction of a secular modern republic, like Libya, which had used its oil wealth to develop Libyan society, was a stern message to democratic popular movements. Any independent Third World regime can be rolled back; colonial puppet regimes can be foisted onto a devastated people; the end of colonialism is not inevitable, imperial rule is back.
NATO’s invasion of Libya sends a message to freedom fighters everywhere: There is a high cost to independence; acting outside of imperial channels, even if only to a limited degree, can bring swift destruction. Moreover, the NATO war on Libya demonstrates to all nationalist regimes that making concessions to Western economic, political and military interests— as Gaddafi’s sons and their neo-liberal entourage had pursued full accommodation—does not offer security. In fact concessions may have encouraged imperial penetration. The West’s burgeoning ties with Libyan officials facilitated their defections and promised an easy victory over Tripoli. The NATO powers believed that with a regional uprising in Benghazi, a handful of defectors from the Gaddafi regime and their military control of the air and sea, Libya would be an easy victory on the way to a widespread rollback of the Arab Spring.
The “cover” of an orchestrated regional military-civilian “uprising” and the imperial mass media propaganda blitz against the Libyan government was sufficient to convince the majority of western leftist intellectuals to take up the cudgels for the mercenary “rebels”: Samir Samir Amin, Immanuel Wallerstein, Lowy, Juan Cole and many others backed the mercenary “rebels” … demonstrating the irrelevance and bankruptcy of the remnants of the old left.
The Long Term, Large Scale Consequences of NATOs War
The invasion and conquest of Libya marks a new phase in Western imperialism’s drive to reassert its primacy in the Arab-Islamic world. The ongoing offensive is clearly evident in the mounting pressures, sanctions, and arming of the Syrian opposition to Bashar al-Assad, the ongoing consolidation of the Egyptian military junta and the demobilization of the pro-democracy movement in Tunisia. How far “backwards” the process can be pushed depends on the revitalization and regrouping of the pro-democracy movements, currently in ebb.
Unfortunately, NATO’s victory over Libya will strengthen the arguments of the militarist wings of the US and EU ruling class who claim that the “military option” brings results, that the only policy that “the anti-colonial Arabs” understand is force. The Libyan outcome will strengthen the hand of policymakers who favor a continued long-term US-NATO presence in Iraq and Afghanistan and promote a military offensive against Iran and Syria. Israel has already capitalized on NATO’s victory against Gaddafi via its expansion of huge colonial settlements in the West Bank, increasing bombing and missile raids on Gaza, a major naval and army build-up in the Red Sea region adjoining Egypt and confrontational posturing toward Turkey.
As of early September, members of the African Union, especially South Africa, have yet to recognize the mercenary “transition” regime imposed by NATO on Libya. Aside from the Libyan people, Sub-Saharan Africa will be the biggest immediate loser in the overthrow of Gaddafi. Libya’s generous aid, grants and loans, bought the African states a degree of independence from the harsh conditions of the IMF, World Bank and Western bankers. Gaddafi was a major sponsor and backer of regional integration – including the African Union. His large scale development programs, especially oil and water infrastructure and construction projects, employed hundreds of thousands of sub-Saharan African immigrant workers and specialists who remitted billions to their home countries, helping the balance of payments and reducing deficits and poverty at home. In place of Gaddafi’s positive economic contribution, Africa now faces Tripoli transformed into a colonial outpost, fortifying US military command in Africa and a new push to strengthen military ties with the empire.
However, beyond the present-day celebrations of their imperial military success in Libya, the war only exacerbates the weakening of Western economies by diverting scarce domestic resources to wage prolonged wars with no decisive victories. Ongoing social cuts and harsh austerity programs have undercut any ruling class efforts to whip up phony mass chauvinist celebrations for “democratic victories over tyrants”. The naked aggression against Libya has heightened Russian, Chinese and Venezuelan security concerns. Russia and China will veto any UN Security Council sanctions on Syria. Venezuela and Russia are signing new multi-billion dollar military co-operation agreements, strengthening Caracas’s military defense in the wake of the Libyan invasion.
For all the ruling class and mass media euphoria, the “win” over Libya, grotesque and criminal in the destruction of Libyan secular society and the ongoing brutalization of black Libyans, does not solve the profound economic crises in the EU-US. It does not affect China’s growing competitive advantages over its western competitors. It does not end US-Israeli isolation faced with an imminent world-wide recognition of Palestine as an independent state. The absence of left-wing western intellectual solidarity for independent Third World nations, evident in their support for the imperial-based mercenary “rebels” is more than compensated by the emergence of a radical new generation of left-wing activists in South Africa, Chile, Greece, Spain, Egypt, Pakistan and elsewhere. These are youth, whose solidarity with anti-colonial regimes is based on their own experience with exploitation, “marginalization” (unemployment) and repression at home.
Is it too much to hope that a War Crimes Tribunal could be organized to prosecute NATO leaders for crimes against humanity, for genocide against the people of Libya? Can the brutal link between costly imperial wars abroad and increasing austerity and domestic decay lead to the revival of an anti-imperialist peace movement based on withdrawal of imperial troops abroad and public domestic investments for jobs, health and education for the working and middle class?
If the destruction and occupation of Libya marks a time of infamy for the NATO powers, it also establishes a new awareness that a people can struggle and resist 6 months of intense, massive bombings from all the NATO powers. Perhaps when their heroic example becomes clear and the fog of media propaganda is lifted, a new emerging generation of fighters can vindicate the battle of Libya, as a continuation of the struggle for the definitive emancipation of the Afro-Arab and Islamic peoples from the yoke of Western imperialism. | <urn:uuid:250e4683-2cd4-448b-b5b9-1f63ad09e0cc> | CC-MAIN-2022-33 | https://coto2.wordpress.com/2011/09/14/nato%E2%80%99s-war-crimes-in-libya-sanctions-against-defiance/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00665.warc.gz | en | 0.94505 | 5,182 | 1.539063 | 2 |
Exclusion, behaviour, mental health, happiness and children – a Nightingale moment?
Emotional health in childhood ‘is the key to future happiness
A London School of Economics study “What Predicts a Successful Life? A Life-course Model of Well-being” (Economic Journal 2014) offered “a completely new perspective on which factors contribute most to a satisfying life”, namely wellbeing, challenging “the basic assumption of educational policy in recent years – that academic achievement matters more than anything else”. (Guardian Nov 18 2014)
A basic assumption? It certainly drove former education secretary Michael Gove’s instruction schools to focus on academic excellence, and away form what he termed “peripheral” issues such as children’s moral, social and cultural development. Gove’s successor, Nicky Morgan, pledged to reverse this approach, but despite the pledge if anything the focus since then on academic outcomes has intensified, with these other needs trailing in the dust.
A very recent article in the Guardian reported on UK Ministers piloting New-York-style problem-solving courts, in which judges review the progress of offenders after they are sentenced to try to keep them out of jail. Problem-solving courts use non-custodial punishments and repeat attendance of an offender before a judge for regular assessment. This isn’t a new idea. Michael Gove, in another role as former justice secretary for a year from 2015 to 2016, was enthusiastic about the approach after he’d met some of the US judges who run these courts, but wasn’t in post long enough to make anything happen. The new white paper also contains a plans to review how the justice system supports offenders with conditions such as autism, ADHD and dyslexia.
From our educational perspective, people in these groups are much more likely to be permanently excluded from school and subsequently much more likely to be imprisoned than their peers. In schools we can, or we could, match the court problem-solving initiative with early help for children to reduce the chances they set off along the “pipeline to prison” by displacing exclusion as the so-called “last resort”.
Bearing these things in mind, should we, could we, will we do anything different to what we were did before Covid19?
Let’s look at exclusion from school, the ‘last resort’ punishment of typical Behaviour Management. It’s systematically deployed against children who break school rules too often or too seriously. It targets children with additional educational needs, those with disabilities such as Autism and Attention Deficit Hyperactivity disorder, those from ethnic minorities such as Black teenagers and Traveller children, and children in the Care system. The same ones whom we find later in prison.
In the new world of Covid19, has ‘exclusion’ taken on a new meaning? Millions of children and young people were ‘excluded’ in March this year and have only just been allowed back, under stricter and tighter rules and regulations.
As the most severe sanction permitted in schools, we could assume that period of FTE (fixed term exclusion) paralleling “short sharp shock” judicial sentences, should be a sufficiently adverse experience to guarantee that every erring subsequently follows every rule, error-free.
But we see from school data that children can clock up repeated FTEs, demonstrating the failure of punishment to prevent re-offending in schools as in the courts, eventually getting enough marks on their scorecard to qualify for the ultimate last resort, PEX (permanent exclusion).
And surely, having experienced the apex punishment of a PEX, these errant children should become remodelled to be model citizens of school and the wide world, shouldn’t they?
Apparently not, since the many young people in jails are PEXers. PEX seems as futile as FTE as the way to teach, or coerce, children to behave in ways that keep us and them happy, safe and productive.
So how should we go about forming covid19-shaped schools?
One response to behaviour, strongly favoured by the DfE, is to put everything into the pre-pandemic box, with the routine use of punishment to control ‘bad’ behaviour, hitting children hard with exclusion as the weapon of choice if they go wrong.
A Guardian article (August 31st 2020) “Schools in England and Wales draw up new Covid19 behaviour policies” carried the DfE warning that: “It is likely that adverse experiences or lack of routines of regular attendance and classroom discipline may contribute to disengagement with education upon return to school, resulting in increased incidence of poor behaviour.”
“Schools planning to implement a list of “coronavirus red lines” included the Ark Alexandra academy in Hastings which informed parents that (crossing red lines) could result in fixed-term exclusions for pupils. Breaches would include “deliberate or malicious” coughs or sneezes, “humorous, inappropriate comments or statements” related to Covid-19 and “purposeful physical contact with any other person”.” Is it possible to sneeze deliberately? Is humour to be outlawed? Who’s to judge according, to whose standards? If the consequences of exclusion were insignificant, who cares?
But they’re not. Exclusion and associated social and emotional segregation can be life-changing, as we’re seeing in the rise in mental health issues related to Covid19.
Mental health and happiness
Anne Longfield, the children’s commissioner for England, advocates a different response, in line with the LSE study’s finding that emotional health in childhood is the key to future happiness.
“A ‘Nightingale moment’ for children is needed, providing increased funding, extra training for teachers and counsellors in every school, the children’s commissioner for England has said.
Invoking the gargantuan effort taken to build Nightingale hospitals for thousands of Covid patients in a matter of weeks, and the £35bn furlough scheme to save jobs….” (the £100 billion Covid testing “Moonshot” idea dreamed up by the same person who proposed the failed garden bridge in London had yet to be announced), “ …. Anne Longfield said children’s recovery from missing months of school would take up to a year and would have a profound psychological impact. ….. children had made a huge sacrifice during the pandemic”.
Longfield urged the government to step up support for the most disadvantaged and warned that a generation could be lost without radical intervention and “called for investment in mental health support for children as schools reopen ….. and a focus on vulnerable teenagers who are at risk of never returning to education. ‘The government needs to be bold, and on the sort of scale that saw hospitals built in weeks, and workers paid in furlough, to make sure no child is left behind. If not, they risk losing a generation for good. The stakes are simply that high. Kids have not had their Nightingale moment during the crisis, but if it comes at this stage, where there’s a determination to do things differently for children and help the most disadvantaged fully in life, that would be a great Nightingale moment to have.”
Should we do the same to get the same, or being doing something different in a changing world? The ideas behind the use of punishment come from another time, when teachers could beat children into compliance, when neuroscience and neurobiology were babies, when adolescents were seen as some variety of crazed aliens, beyond reasoning. Excluding children can make things easier in school, for some people; maybe this links to the 44% increase in the exclusion of children with autism between 2011 and 2015 as reported by the charity Ambitious about Autism. But is that justification for running along the same old ruts?
It’s certainly easier in the short term to stick to habits and exclusion can be used to massage school performance figures, if that’s the key measure of school success.
But Option 1 was already running into serious trouble pre-pandemic, with the illegal off-rolling of children and growing numbers of children PEXd with no subsequent educational provision, and no signs of the mythical new wave of ‘alternative’ provision being available in the immediately.
And Option 2 is dependent on imagination and new thinking at the DfE, political will, and a huge amount of cash, none of which are likely to appear at the moment. In principle it’s sound, but it doesn’t answer the need for early help and immediate action.
Mental Health and happiness in schools, in action
Option 3 – see my next blog to find out my vision for schools at the time of Covid19. Problem-solving by not how you know it – by focusing on solutions. | <urn:uuid:c8a2d984-a595-43d5-8233-dacb16c71ef9> | CC-MAIN-2022-33 | https://www.thesolutionsfocusedcoach.com/exclusion-behaviour-mental-health-happiness-and-children-a-nightingale-moment/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.962622 | 1,900 | 2.375 | 2 |
Physical therapy is a type of physical treatment that applies the methods of massage, gymnastics, etc.
Priorities of the physical therapy are prophylaxis and treatment of traumas of locomotor system, rheumatoid diseases, exchange diseases, diseases of nervous system, stress, osteoporosis and hypodynamia.
Physical therapy helps for recovery of muscles, bones and nervous systems by means of heat, cold, massage, hydro massage bath-tubs, ultrasound, exercises and other techniques. It aims to relived pain, to improve strength and mobility.
Physical therapy may be prescribed for recovery of the patient after amputations, arthritis, burns, cancer, cardiac diseases, diseases of the cervix and lumbar dysfunction, neurological problems, orthopaedic traumas, lung diseases, traumas of the spinal cord, brain stroke, brain trauma and other diseases. Physical therapy combines successfully natural and spa factors with the modern therapeutic means. | <urn:uuid:69b9966c-441c-4e8d-a702-b69cea090917> | CC-MAIN-2022-33 | http://dimina-balneo.com/en/therapeutic-centre/physiotherapy | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.877152 | 205 | 2.921875 | 3 |
Helms School of Government
Israel, terrorism, counterterrorism, radical Islamic terrorism, public opinion, intelligence, Six-Day War, Black September, Munich Olympics, Munich Massacre, First Intifada, Beirut Bombing, USS Cole, 9/11, enhanced interrogation techniques, education, ethics, just war, asymmetric war
Defense and Security Studies | Ethics and Political Philosophy | International Relations | Military History | Terrorism Studies | United States History
Keener, Elyse, "A Relentless War: America, Israel, and the Fight Against Terrorism" (2020). Senior Honors Theses. 938.
For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat. Since its birth as a nation, the United States has been involved in numerous conflicts, from the Revolutionary War to World War II and beyond. These wars were fought between nation-states and traditional powers, but since the attacks on 9/11, the United States finds itself in a new kind of conflict against a different kind of enemy. As a conflict between a nation-state and an ideological group, it is unlike anything the United States has participated in before. On the other hand, Israel has spent most of its history battling Islamic extremism, even beyond its time as an official state. Ultimately, this thesis explores the approaches of the United States and Israel take against radical Islamic terrorism and seeks lessons to be learned from Israel to further solidify the United States' dominance against terrorist threats. Military might and diplomacy have been enough for the United States to be successful in the past but those techniques are not proven against an ideology like Islamic extremism, which is so radical that its followers strive to be martyred for it. Until now, the United States led the rest of the world in military and intelligence capabilities but under pressure from this immediate and continuous threat, understanding how to adapt to the everchanging fight against terrorism will be crucial. | <urn:uuid:ea130b52-b583-43af-95a9-1c840f0f3717> | CC-MAIN-2022-33 | https://digitalcommons.liberty.edu/honors/938/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.940952 | 461 | 2.671875 | 3 |
On a very cold afternoon in Cambridge we enjoyed a quality and informed Salon focusing on the role of culture in digital transformation. The lead discussant was Tim Lancaster, AWS Practice Director at Arcus Global. The Salon, chaired by Robin Knowles, had contributions from all attendees.
To start discussions, Tim shared his insights into the key cultural factors important to the successful implementation of digital transformation:
Our lively discussion broadly covered the following areas with the key area of focus being around the concept of change management.
It is a common view that digital transformation is about technology but crucially it’s about people, those implementing, those taking decisions and those affected by change, in short all stakeholders. Organisations undergoing digital transformation have to appreciate, and be mindful of their current culture and how well it supports or undermines what is needed for digital transformation.
A lively discussion was held on the role of leadership and how organisations often take on the personality of a leader. It was also recognised that leaders or champions can exist at all levels in organisations and that lasting change cannot just be led from the top.
Crises can be great for gaining commitment to change but they can also undermine change because people under stress tend to get tunnel vision and not be open to new ideas and new ways of working. Public sector employees tend to look to the private sector for new ideas but shouldn’t feel disempowered by this – wherever you get your ideas it is implementing that makes the difference.
Digital transformation is not about simply changing a paper form into a digital one. It’s often about changing the whole focus and culture of an organisation: Airbnb did not arise from hoteliers, Uber doesn’t own cabs and in the public sector transformation is often about taking power and choice from within the organisation and giving it to the citizen. But be careful; being radical exposes yourself to failure, this is particularly true of those who are elected.
Effective communication is essential and can be particularly challenging in large organisations. Ensuring that key stakeholders understand and support digital transformation and other changes through good communication is fundamental.
Listening to issues
People worry when change is happening and it is not enough to push them to support it. Making the time to listen to concerns and to help people to realise that their reactions are often mixtures of emotions, some positive, some negative, can be really helpful in enabling them to feel more comfortable and adapt more readily.
The biggest block to digital transformation is having to implement radical change at the same time as continuing with the day job. Change often evokes fear and one way to address fear is to start small and pilot change within a small area so that the people involved in the pilot can then reassure their colleagues and encourage them to change. | <urn:uuid:d4fb9f38-f7c0-44be-bc4b-57719471d177> | CC-MAIN-2022-33 | https://digileaders.com/not-technology-role-culture-digital-transformation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.958844 | 579 | 1.554688 | 2 |
Cybersecurity attacks on the payments system, many occurring at merchant endpoints, have cost the industry hundreds of millions of dollars in 2014. Both private and public resources have been mobilized to improve defenses and better manage risks. The best practices described in the National Institute of Standards and Technology’s (NIST) recently issued Cybersecurity Framework though "voluntary" are but one of the results of heightened attention to cybersecurity issues. This panel will focus on the industry’s response to cybersecurity challenges, including challenges surrounding implementation of the NIST standards, privacy issues that are likely to be addressed in future versions, and ways in which FIs, FMUs and other payment system participants need to adapt to an ever-evolving threat environment.
WilmerHale Partner Jonathan Cedarbaum will moderate the panel "Cybersecurity: NIST Standards and Emerging Best Practices," and WilmerHale Partner Franca Harris Gutierrez will moderate the panel "Third Party Risk Management – Due Diligence in the Age of Increased Regulatory Expectations." | <urn:uuid:dbd3dafc-33e0-4baf-bc58-b129272bdb88> | CC-MAIN-2022-33 | https://www.wilmerhale.com/en/insights/events/payments-system-risk-symposium | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.932717 | 208 | 1.609375 | 2 |
The findings are part of a growing body of evidence demonstrating the benefits of palliative care on patient quality of life. This study will be presented at the upcoming 2016 Palliative Care in Oncology Symposium in San Francisco.
To explore the effects of early palliative care, researchers randomly assigned 350 patients, who had been recently diagnosed with incurable lung or non-colorectal gastrointestinal cancer, to receive early palliative care integrated with oncology care or oncology care alone.
“Our research looked at a new measure of a patient’s ability to cope effectively with their diagnosis. What we found was the patients who received early palliative care were more likely to use adaptive coping strategies — meaning they were more likely to take some action to make their lives better as well as to accept their diagnosis,” said lead author Joseph Andrew Greer, PhD, Clinical Director of Psychology and Research Scientist at the Center for Psychiatric Oncology Behavioral Sciences at Massachusetts General Hospital. “Palliative care is a key ingredient to improving a quality of life, which is important to both patients and their families.”
To determine patient coping abilities, researchers used the Brief COPE assessment — a measurement tool examining how people respond to stress. It examines patient-reported measures such as acceptance of diagnosis, positive reframing, use of emotional support, and acceptance. Patients were evaluated at the 12- and 24-week mark. At 24 weeks, patients receiving palliative care were significantly more likely to report using active and engaged coping styles compared to the usual care group.
Researchers used the Functional Assessment of Cancer Therapy-General (FACT-G) to assess quality of life and the Patient Health Questionniare-9 (PHQ-9) for mood at baseline. Patients who received early palliative care reported significantly higher quality of life and lower levels of depression at the 24-week mark, but not at 12 weeks.
In addition, 30% of patients who received the palliative care intervention reported discussing end-of-life care preferences, as opposed to 14% of patients receiving standard care alone.
The authors note that the integrated care model of early palliative care has potential to be expanded to other advanced stage cancers. The American Society of Clinical Oncology (ASCO) recommends concurrent use of palliative care with cancer care early in the course of illness for any patient with metastatic cancer and/or high symptom burden.
This study received funding from the National Institutes of Health (NIH). | <urn:uuid:b02f9669-0bf1-4a4f-81d2-9d2b2e5cc026> | CC-MAIN-2022-33 | http://cancer-facts.info/cancer-news/early-palliative-care-improves-coping-quality-of-life-for-patients-with-incurable-cancers/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.960253 | 523 | 2.21875 | 2 |
What is steroidogenesis, are steroids enzymes
What is steroidogenesis
If you feel your body takes a lot of time to recover between exercises, steroids can help you out. They reduce recovery time dramatically. Steroids often regulate the production of cortisol in the body when the body is under stress. This aids recovery time for injuries and your muscle trauma speeds up. As a result, your stamina increases, what is steroidogenesis. When it comes to the PCT, most of the bodybuilders and athletes will select the two most common types of drugs, what is steroidogenesis.
Are steroids enzymes
Steroidogenesis is a biological process of steroid hormone production. Apart from the natural production by living organisms, various steroids. Acute stimulation of steroidogenesis in corpus luteum and adrenal. Cortex by peptide hormones. Rapid induction of a similar protein in both. Steroidogenesis definition, the formation of steroids, as by the adrenal cortex, testes, and ovaries. Steroidogenesis in the adrenal gland is a complex process of sequential enzymatic reactions that convert cholesterol into steroids,. Bisphenols and testicular steroidogenesis. Effects of bpa on steroid hormone levels. Experimental studies in male animals have shown that. Various enzymes required for adrenocortical steroidogenesis are distributed between two different subcellular compart- ments, the mitochondrion and the. Gonadal and adrenal steroidogenesis regulation by direct or bidirectional communication between the immunologic and neuroendocrine systems has. The meaning of steroidogenesis is synthesis of steroids. How to use steroidogenesis in a sentence. Steroidogenesis is a biosynthetic process by which cholesterol is converted into steroids (fig. Steroid hormones are synthesized mainly. Testicular steroidogenic enzymes and the conversion of pregne- nolone to testosterone. In mammalian species including the human the conversion of. 2005 · цитируется: 566 —. Ehrmann da, schneider dj, sobel be: troglitazone improves defects in insulin action, insulin secretion, ovarian steroidogenesis, and fibrinolysis in women ANVAROL (ANAVAR) Anvarol is a safe legal alternative to Anavar steroid that comes with no side effects, what is steroidogenesis.
Are steroids enzymes, are steroids enzymes What is steroidogenesis, price order anabolic steroids online paypal. Roundup inhibits steroidogenesis by disrupting steroidogenic acute. Regulatory (star) protein expression. Walsh,1 chad mccormick,i clyde martin,2. To date, it is unclear whether sex steroid hormones acting on skeletal muscle are locally produced by steroidogenesis-related enzymes. Because dhea is present. Able to modulate more than one enzyme in the steroidogenesis pathway. Adrenal steroidogenesis and adrenocortical carcinoma and have been used for decades in laboratories worldwide. What is the steroidogenic pathway of cortisol, aldosterone, and sex steroid synthesis in congenital adrenal hyperplasia (cah)? Updated: oct 06, 2020. Chronic steroidogenic capacity is determined by cyp11a1 gene transcription. Star mutations cause congenital lipoid adrenal hyperplasia, with. And genetic variants that alter human ovarian steroidogenesis and the resulting phenotypes. In this study, an in silico genome-scale metabolic model of steroidogenesis was used to investigate the effects of hypoxic stress on steroid. Steroidogenesis is a biological process of steroid hormone production. Apart from the natural production by living organisms, various steroids. Of these receptors, thereby increasing the steroidogenic response to further acth stimulation . This is the rate-limiting step of steroidogenesis in all tissues. At the inner mitochondrial membrane, cholesterol is converted to pregnenolone by the action of. In addition to the brain, gnih may also be produced in gonads and can regulate steroidogenesis and gametogenesis. However, the function of gnih The reason is simple, performance enhancement is not considered a legitimate medical need and the only way you can fulfill this desire is if you buy illegal steroids, what is steroidogenesis. What is steroidogenesis, buy anabolic steroids online visa card. We look forward to doing buisness with you, are steroids enzymes. The human cytochrome p450 enzymes are responsible for metabolizing a variety of substances — from lipids (fats) and steroid hormones to drugs. Clinical status had to allow for tapering of any ongoing steroids to ≤0. Enzyme-linked immunosorbent assay (elispot). For that purpose, the placenta expresses the enzymes 11β-hsd 1 and 2. Steroidogenic enzymes mrna expression profile and steroids production in bovine theca cells cultured in vitro and stimulated with angiotensin ii. From terpenes to steroids part 2: squalene, cholesterol, and steroids. The passage of information from dna to mrna in the nucleus; this is directed by several enzymes. 2 the hydrolysis product of nucleic acids comprising 3 parts: 1. Steroidal compounds are widely used as pharmaceuticals such as anti-inflammatory, immunosuppressive, and anticancer agents (1). Two enzymes are responsible for the cleavage of pregnane side chains. A steroid-inducible oxygenase, in the presence of reduced nicotinamide. Liver damage is often evident from the assessment of liver enzymes and other key markers of liver function. Kidney function test - your kidneys. First must be converted to prednisolone by enzymes in the liver. We investigated age-induced changes in mrna expression profiles of sex-steroidogenic enzymes and sex-steroid receptors in 3-, 12-, Sphingolipid metabolism · steroid hormone metabolism enzymes · steroid hormones · steroid hormone receptors · steroid. To date, it is unclear whether sex steroid hormones acting on skeletal muscle are locally produced by steroidogenesis-related enzymes. Itself post-cycle; causing ast and alt enzymes to return back to normal. Cholesterol is then converted to bile acids and steroid hormones in. This happens via the aromatase enzyme and can cause a bevy of side. Also inhibitors of enzymes involved in steroid hormone synthesis are also highly prescribed. So for example, 5-alpha reductase, are used as steroid inhibitors. Phase ii biotransformation enzymes conjugate xenobiotics using small, organic donor molecules, such as glutathione, udpglucuronic acid, s-adenosyl-l-methio. The human mitochondrial cytochrome p450 enzymes cyp11a1, cyp11b1, and cyp11b2 are involved in the biosynthesis of steroid hormones. Cyp11a1 catalyzes the side-. Most steroidogenic enzymes are forms of cytochrome p450. These are oxidative enzymes, all of which have about 500 amino acids and contain a single heme group . From the book steroid converting enzymes and diseases. Functions of steroids and steroid-metabolizing enzymes. This research concerns steroids involved in hormonal signalling, sex hormone biosynthesis and. The effects of anabolic steroids on men with hiv wasting disease Amazon, Alibaba, e-bay, and many other market places supply legal steroids at your home. Research on Google shows that the term buys anabolic steroid has gained near about 2, what is sustanon steroid. If you do not find a specific drug that you want, contact us and we will do everything to fulfill your order. We know the importance of steroids in having a beautiful body, what is sustanon 300. Their results showed changes in the anabolic-catabolic balance of hormones, what is sustanon 250 good for. Testosterone, for example, increased significantly, showing the involvement of the anabolic process. We'll ship within hours of your order, so you can get your products faster. We also offer products from a variety of different manufacturers including SIS Labs, Pharmago Labs, Pharmacom Lab, Balkan Pharma, Uni Pharma, C4 Pharma, and Pfizer, what is stronger dianabol or anadrol. When this happens, this can result in anabolic steroids that are painful to inject; often when your injected area is very sore or even painful for a few days post-injection contamination is the cause. Know this here and now; the use of anabolic steroids should not hurt; it should not hurt when you inject, and it should not hurt days after the injection, what is test sustanon 250. Other reasons why you should consider opting for natural supplements instead of anabolic steroids: Natural supplements are provided in the form of a pill. There is no need to inject anything into your body, what is sustanon 250 injection does it help with overdose. This means limiting use to preferably no more than 8 weeks, followed by an off period at least half as long as the period of use, what is similar to prednisone over the counter. For example, if Dianabol is used for 6 weeks, then this should be followed by at least 3 weeks without use of any oral anabolic steroid, and more preferably at least 6 weeks. It also promotes the health of your internal organs, regains the muscle after a steroid cycle. You will be safe from any side effects of steroids, what is stock market. If you are losing more than this you should increase your calories, what is stanozolol prescribed for. If you are not losing 1 pound per week then you should decrease the amount of calories you ingest. No one wants to carry a disease inside or live with the medicines. So it is better to leave it or try to use the right ones that have FDA approval, what is similar to prednisone over the counter.<br> What is steroidogenesis, are steroids enzymes By not abusing steroids and not over using them then the answer would be yes, what is steroidogenesis. In order to get the best out of steroids and making them be safe you need to: follow a cycle without getting to much while on steroids. Some steroids should be stacked in order to get the maximum benefit out of it. Acute stimulation of steroidogenesis in corpus luteum and adrenal. Cortex by peptide hormones. Rapid induction of a similar protein in both. Steroidogenic cells lacking the protein retained low levels of steroidogenesis. This explains the secretion of some steroid hormones by the. Steroidogenic factor-1 (sf-1) and liver receptor homolog-1 (lrh-1) belong to the nuclear receptor superfamily and are categorized as orphan. Steroidogenesis in the adrenal gland is a complex process of sequential enzymatic reactions that convert cholesterol into steroids,. And genetic variants that alter human ovarian steroidogenesis and the resulting phenotypes. Because adrenal steroidogenesis is not fully active in preterm babies, steroid precursors, including 17ohp, back up, leading to increased concentrations. The orphan nuclear receptor steroidogenic factor 1 (sf-1, also called ad4bp and officially designated nr5a1) has emerged as an essential regulator of. Gonadal and adrenal steroidogenesis regulation by direct or bidirectional communication between the immunologic and neuroendocrine systems has. We will first discuss the normal physiologic process of steroidogenesis and then the abnormal processes involved with atypical hyperadrenocorticism. To date, it is unclear whether sex steroid hormones acting on skeletal muscle are locally produced by steroidogenesis-related enzymes. Because dhea is present. Ovarian steroidogenesis in pcos affects androgen and estrogen—and possibly progesterone— production. Bisphenols and testicular steroidogenesis. Effects of bpa on steroid hormone levels. Experimental studies in male animals have shown that Related Article: | <urn:uuid:7bcc6c69-264d-4428-951d-9bb5251e9157> | CC-MAIN-2022-33 | https://www.dadimandarin.com/profile/tarao3mdiane/profile | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.896461 | 2,418 | 2.796875 | 3 |
U.S. National Library of Medicine
The National Library of Medicine (NLM), on the campus of the National Institutes of Health in Bethesda, Maryland, has been a center of information innovation since its founding in 1836. The world’s largest biomedical library, NLM maintains and makes available a vast print collection and produces electronic information resources on a wide range of topics that are searched billions of times each year by millions of people around the globe. It also supports and conducts research, development, and training in biomedical informatics and health information technology. In addition, the Library coordinates a 6,000-member National Network of Libraries of Medicine that promotes and provides access to health information in communities across the United States.
Link: History of Medicine
NLM's History of Medicine Division collects, preserves, makes available, and interprets for diverse audiences one of the world's richest collections of historical material related to human health and disease.
Link to Images of the History of Medicine: Poastcards, Posters, Portraits, Caricatures and Photographs
Images from the History of Medicine provides online access to over 70,000 digitized images of the approximate 100,000 items from the U.S. National Library of Medicine’s (NLM) Prints and Photographs collection.
Source: U.S. Library of Medicine
Second photo: U.S. National Library of Medicine | <urn:uuid:b7ebe191-e0ff-4866-be8f-57d77e6fe95b> | CC-MAIN-2022-33 | https://vmps.omeka.net/items/show/555 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.884545 | 305 | 2.90625 | 3 |
Think of the last time you set a goal, started a new venture or new relationship. Think back to the excitement, the enthusiasm. Nothing you did felt like work, because it was all so new and fresh. And then, regardless of whether it happened gradually or overnight, you reached a point at which the new endeavor no longer felt so new. In fact, it felt like a lot of work. Congratulations, you just hit “The Dip”. The Dip is that critical turning point when the joys of starting have faded and yet the proverbial “light at the end of the tunnel” is still out of reach.
“Winners never quit” is terrible advice. Instead, “winners never quit with a short term focus”. Winners definitely quit from dead end paths;
A woodpecker can tap twenty times on a thousand trees and get nowhere, but stay busy. Or he can tap twenty-thousand times on one tree and get dinner.”
Short term pain has more impact on most people than long-term benefits do, which is why it’s so important for you to amplify the long-term benefits of not quitting.
The Dip summary
Every new project (or job, or hobby, or company) starts out fun…then gets really hard, and not much fun at all. You might be in a Dip—a temporary setback that will get better if you keep pushing. But maybe it’s really a dead end. What really sets superstars apart is the ability to tell the two apart. | <urn:uuid:bde7b213-1e73-4f3d-ab63-769a61804d96> | CC-MAIN-2022-33 | https://arandomquote.com/books/the-dip/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.95535 | 323 | 1.867188 | 2 |
Did you know that the black horn-like shapes under Our Lady of Guadalupe’s feet is actually a crescent moon?
The moon appears in Mexico City between the months of December to March at the same angle as depicted in the image from December 1531.
Further, this was the exact lunar cycle in Mexico City in December 12th, 1531!
But WHY is Our Lady standing on a black crescent moon…?
Stay tuned in for our upcoming facebook live retreats and future posts to find out! | <urn:uuid:fea88d15-6fe3-444e-bdaa-600783e43301> | CC-MAIN-2022-33 | https://guadalupemissions.org/2020/05/04/marys-moon/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz | en | 0.968573 | 115 | 3.140625 | 3 |
DELIVERY & RETURNS
✔ Standard international tracked shipping is $12.90
It is included for all orders over $70
✔ International Express delivery starts at $20.90 (depending on the country).
It is included for all orders over $200
✔ Express delivery is only available for products stored in France. If the Express option is not offered at checkout, it means that the order must be made on demand (or part of the order). Full FAQ's
WHY BUY FROM US
✔ You have the guarantee of durability of all our products during 2 years
✔ You benefit from an easy, fast and freereturn
✔ You have the assurance of a fast and available customer service
✔ You benefit from an encrypted and secure payment in your currency
✔ You will be delivered with a tracked package anywhere in the world
REVIEWS Read all reviews!
Smooth Troll Cross Pendant
💎 Iron amulet to protect against malevolent magic and supernatural forces
💎 Developed by Swedish blacksmith Kari Erlands
💎 Linked to the Othala of the ancestors
💎 Handcrafted by expert blacksmiths
What does this jewelry represent?
It is claimed that the Troll Cross was used in ancient Scandinavia to ward off malevolent magic. It is made from iron, which has traditionally been thought to repel the supernatural.
In reality, the earliest references to the symbol date to the 1990s, when blacksmith Kari Erlands from Darlana in Sweden began to make them, saying that it was a copy of a protective rune used on her parents' farm.
The troll cross has become a popular symbol of protection in modern Asatru and represents the security that comes with certainty in one's faith.
Our craftsman creates each of these iron pieces by hand, singing a Galdr, a type of throat song commonly sung during Norse rites.
Color : Iron Weight : 13g Size : 4 x 2.5 cm
Materials : iron
Made In France | <urn:uuid:de327e2d-c9c7-40b6-88ee-e5199513a7f6> | CC-MAIN-2022-33 | https://www.vkngjewelry.com/en-gb/products/smooth-troll-cross | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.944409 | 436 | 1.546875 | 2 |
Cooper Hewitt acquires two emoji that symbolize inclusion
NEW YORK (AP) — The Cooper Hewitt, Smithsonian Design Museum has acquired two emoji that have helped broaden diversity for users of the tiny pictures, becoming the third museum to add emoji to their digital collections.
The New York museum acquired the “person with headscarf” and “inter-skintone couple” emoji for its burgeoning collection of digital assets. The museum plans an exhibition on the significance of the two through interviews and images, but the pandemic has put an opening date in limbo, said Andrea Lipps, Cooper Hewitt’s associate curator of contemporary design.
“The desire to acquire these particular emoji arose from what we were seeing as the desire for inclusion and representation of various groups and communities and couples on the emoji keyboard,” Lipps told The Associated Press in an interview ahead of Thursday’s announcement.
The hijab emoji, as it’s informally known, was submitted in 2016 to the Unicode Consortium, a nonprofit that oversees emoji standards with voting members from the world’s top digital companies. It arrived on phones and computers in 2017. A then 15-year-old Saudi Arabian girl, Rayouf Alhumedhi, attracted worldwide attention as she campaigned for its inclusion. She was selected as one of Time magazine’s most influential teens of 2017.
Roughly 550 million women in the world wear the hijab, Alhumedhi among them, yet there was no emoji to represent them. The same was true of skin tones, and advocates remain vigilant in getting multiracial family emoji on keyboards, beyond the two-person couple options.
The interracial couple emoji was submitted to Unicode in 2018 and arrived on devices last year, giving people their first chance to combine multiple skin tones in a single emoji. It builds on the advocacy work of Katrina Parrott, a Black, Houston-based entrepreneur inspired to create diverse skin tones in emoji after her daughter lamented she couldn’t properly represent herself on keyboards.
As a third-party developer, Parrott was the first to put out multiracial emoji through her own app, iDiversicons, five years ago. She advocated as a non-voting member of Unicode for the consortium to do the same for a wide array of devices. A campaign leading to the inclusion of interracial couples, later spearheaded by the dating app Tinder and others, received a Webby Award last year. Parrott was not involved in development of the couples emoji but noted the significance in promoting greater diversity.
Parrott had no technical experience when she took on her project, but as a former NASA contract worker in logistics, she knew how to put together a team.
“We said we don’t want to do just an app for African Americans. We want to represent the world because everybody was feeling the lack in emojis,” Parrott told the AP of her pioneering app. “We did African American skin tone, we did Asian, Caucasian, folks from India and those who are Latino and Hispanic. We covered all the bases.”
Now 19 and a sophomore at Stanford University, Alhumedhi said she decided to get involved after realizing she had no way to represent herself in a WhatsApp group chat with friends when they switched from photos to emoji in their profiles. She stumbled across a Snapchat story on how to submit a proposal for new emoji to the Unicode Consortium, where heavy hitters like Apple, Twitter, Facebook and more decide what emoji are released for companies to choose from.
Media attention flowed after Reddit co-founder Alexis Ohanion facilitated an Ask Me Anything session for Alhumedhi on his platform to get the word out on her emoji campaign. She also received help from Emojination’s Jennifer 8. Lee.
“We talked about how representation is so important, even if it appears in such a small way,” Alhumedhi told the AP from Vienna, where she’s waiting out her return to her California campus. “We also wanted to trigger a dialogue about the hijab itself and what it means in today’s digital age. I saw a lot of people having very big opinions about the hijab without really discussing it with someone who wears it or doing further introspection into what it means.”
The hijab and interracial couples emoji were designed by Aphelandra Messer, who was working at the time for Emojination, a grassroots group that advocates for more inclusive and representative emoji.
The designs have “impacted billions of keyboards worldwide and reframed how people have seen themselves on the small screen. It’s amazing to see their historic work archived in the nation’s greatest museums for current fans and future scholars,” said Lee, producer of ”The Emoji Story,” a new documentary film out Friday, and co-founder of Emojination.
The Cooper Hewitt announcement follows the 2016 acquisition of the original DoCoMo emoji set by the Museum of Modern Art in New York. DoCoMo is a top mobile phone operator in Japan, where emoji began. In 2018, the Victoria & Albert Museum in London acquired the proposed mosquito emoji design. All are part of a larger effort for museums and cultural institutions to preserve significant parts of digital history and culture. | <urn:uuid:619c0bac-189a-4195-a414-2fe01e6a89f3> | CC-MAIN-2022-33 | https://apnews.com/article/cooper-heweitt-2-new-emoji-inclusion-865f09c1f2934d95f3f1163e130141d7 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00665.warc.gz | en | 0.957073 | 1,109 | 1.796875 | 2 |
Alternation vs. allomorphic variation in old English word-formation: evidence from the derivational paradigm of strong verbs.
Although the philological study of the morphology of Old English in general and its word-formation phenomena in particular have a long tradition (see Lindemann 1970 and the references provided by this author), the derivational morphology of this stage of the English language has been dealt with from a more theoretically based perspective only in relatively recent works. Two main lines have been taken. First, Kastovsky (1986, 1989, 1990, 1992, 2005, 2006) has approached the question from the angle of the typological shift from stem-formation to word-formation, as a result of which the derivation and inflection at the end of the Old English period no longer make use of variable bases but of invariable ones. (2) Second, Martin Arista (2008, 2009, 2010a, 2010b, 2011a, 2011b, 2012, 2013) has explained the derivational processes of Old English within a morphology of structural-functional persuasion by proposing a syntagmatic procedure of word-formation inspired by the layered representation of clause and phrase structure adopted by functional grammars (Foley & Van Valin 1984; Dik 1997a, 1997b; Van Valin & LaPolla 1997; Van Valin 2005). (3)
Along with the analysis of the nature of morphological bases, Kastovsky (1968) has listed an inventory of alternations that can be traced back to the study of Germanic ablaut, which, in terms of word-formation, involves the use of inflectional means for derivational purposes, notably the stems of the present, preterite and past participle of strong verbs. Like the other Germanic languages, Old English has strong verbs organized in seven classes, which result from the vowel contrasts among infinitive, preterite singular, preterite plural and past participle illustrated by figure 1:
Figure 1. The seven classes of Old English strong verbs Infinitive Preterite Preterite Past singular plural Participle I drifan 'to drive' draf drifon drifen II cleofan 'to cleave' cleaf clufon clofen III drincan 'to drink' dranc druncon drunken IV beran 'to bear' basr bxron boren V giefan 'to give' geaf geafon giefen VI standan 'to stand' stod stodon standen VII slsBpan 'to sleep' slep slepon slsBpen
The vocalic contrasts displayed by figure 1 have been largely discussed in the literature as ablaut (or apophony) and the different vocalic value are usually referred to as ablaut grades. Lass (1994: 108) and Ringe (2006: 11) agree that normal and long grades typically appear in accented position, and zero-grades in unaccented syllables followed by an accent. Some of these ablaut grades appear in the derivatives of strong verbs. Palmgren (1904) relates the vowel of some nominal derivatives to the present tense of strong verbs, as in feminines like drege 'drag-net' ~ dragan 'to drag', masculines like beod 'table, bowl' ~ beodan 'to offer' and neuters like gedeot 'howling' ~ deotan 'to howl'. Nominal derivatives can also present the vowel of the preterite singular, as is the case with the feminine teag 'chain' ~ teon 'to draw', the masculine swam 'fungus' ~ swimman 'to swimm'; and the preterite plural, as in the feminine waege 'scales, balance' ~ wegan 'to weigh' and the neuter gesten 'groaning' ~ stenan 'groan'. The past participle shares its vowel with feminines like storfe 'flesh of animals that have died by disease' ~ steorfan 'to die', masculines like blice 'laying bare (of bone through wound)' ~ blican 'shine, be laid bare (of bone)' and neuters like gedwit 'what is shaved off, chip' ~ dwitan 'cut, shave off. By focusing on the morphological class of the weak verb, Schuldt (1905) finds that some weak verbs from class 1 display the vowel of the preterite singular of the strong verb (bastan 'to bridle' ~ bitan 'to bite'). Others contain the vowel of the infinitive but alternate with the vowel of the preterite (missan 'to miss, fail' ~ midan 'to conceal'). Regarding weak verbs of class 2, some share the vowel of the preterite singular of the strong verb (wracian 'to be in exile' ~ wrecan 'to drive, press'). Other weak verbs from class 2 hold a quantity contrast with the past participle of the strong verb (cunnian 'to prove, try' ~ cunnan 'to be or become acquainted with'). Finally, weak verbs of class 2 can also be derived with the vowel of the present or the preterite plural of the strong verb, as is the case with treddian 'to tread, step, walk' ~ tredan 'to tread'. Jensen (1913) carries out a similar analysis of all major lexical classes. In the class of the adjective, he distinguishes those formed with the vowel of the present, like scin 'extraordinary appearance' ~ scinan 'to shine' and reod 'red' ~ reodan 'to redden'; with the vowel of the preterite singular, like hnag 'bent' ~ hnigan 'to bend down' as well as reafol 'rapacious' ~ reaf 'to spoil'; and with the vowel of the past participle, such as aeswic 'offensive' ~ swican 'to move about' and flugol 'apt to fly'~ fleogan 'to fly'. Given these correspondences, which ultimately point to the existence of a common morphological base, Hinderling (1967) remarks that strong verbs constitute the starting-point of lexical derivation in the Germanic languages. (4) Furthermore, the regularity of alternations of vowels in roots and affixes of words that are etymologically and morphologically related has been stressed by linguists like Mailhammer (2007), who attributes to ablaut functional status in Proto-Germanic, given that it can mark grammatical contrasts such as non-past vs. past.
While the motivation of a significant part of the contrast holding between strong verbs and their derivatives is to be found in ablaut, some correspondences between the strong verb and its derivatives clearly fall out of the scope of this phenomenon. In a study in the deverbal formation of nouns by means of zero derivation and the recurrent morphological constrasts that arise throughout the process, Kastovsky (1968: 59) identifies the alternations listed in figure 2. Note that A stands for vocalic, C for consonantal and R for reverse. Phonemes are represented between strokes and allophonic variants between square brackets. PA marks a coincidence with Palmgren's (1904) analysis.
The framework of alternations as put forward by Kastovsky (1968) constitutes a double synthesis: firstly, of contrasts motivated by ablaut and by other phenomena and, secondly, of synchronic and diachronic facts. Beginning with the motivation of the contrasts under scrutiny, some of them can be related, as has already been pointed out, to the ablaut pattern of the corresponding strong verbs, thus A1R /ae/ ~ /a/ stael (preterite singular of stelan) ~ stalu; A4a /e/ ~ /i/ cweden (past participle of cwedan) ~ cwide; A5 /o/ ~ /y/ brocen (past participle of brecan) ~ bryce; A6 /u/ ~ /y/ burston (preterite plural of berstan) ~ byrst; A7 /a/ ~ /ae/ draf (preterite singular of drifan) ~ draef and A9 /ea/ ~ /ie/ hleat (preterite singular of hleotan) ~ hliet. Whereas these alternations reflect ablaut patterns, most of them, like fon 'to take' ~ feng 'to grasp', are largely motivated by i-mutation, which is described by Hogg (1992: 113) as follows: Old English vowels harmonized to an /i/ or /j/ following them in the same word. This caused all back vowels to front and all short vowels (except naturally /i/) and diphthongs to rise when /i/ or /j/ followed in the next syllable. This can be represented as in figure 3:
The reverse alternations of figure 2, however, do not seem to conform to the changes grouped under i-mutation, as presented in figure 3. For instance, A1R /ae/ ~ /a/ stael ~ stalu apparently runs contrary to the predictions of i-mutation. However, what is at stake here is the morphological relation holding between the weak verb and the noun. Unlike strong verbs, weak verbs are mostly derived and select the noun, the adjective or a strong verb as base. That is, given hyscan and husc the verb is derived from the noun, in such a way that i-mutation mediates between base and derivative exactly as in deverbal nouns based on strong verbs.
Eventually, the phonological rules that produced ablaut were morphologized (Lass 1994; Kastovsky 2006; Ringe 2006). All the Old English alternations had originally been phonologically conditioned but they became progressively more opaque and morphologically conditioned until the breakdown of the whole morphophonemic system that took place at the end of the Old English period. As Kastovsky (2006: 171) remarks:
Towards the end of the Old English period, the language was characterized by large-scale allomorphic variation, with most of these alternations being unpredictable. This eventually led to considerable analogical levelling in the Middle English period with the result of eliminating most of these alternations (...) Stem-alternation became a characteristic feature of the irregular part of inflection, whereas it disappeared from word-formation on a native basis except some unproductive cases such as long ~ length.
Given this state of the art, the aim of this research is to contribute to the study of Old English word-formation from the perspective of morphological relatedness by distinguishing morphological contrasts holding between related forms that share a lexemic root from alternations proper, which represent a principled subset of morphological contrasts. The focus is on the strong verb and its derivatives, in such a way that the alternations in which it partakes can be predicted on the basis of phonological principles, whereas allomorphic variation with respect to the strong verb base does not abide by phonological principles and is unpredictable. Vocalic alternations only are analyzed because consonantal contrasts represent allophonic phenomena. Thus, this article addresses the question of the loss of motivation and the subsequent morphologization of alternations, for which Kastovsky (2006) makes no provision, apart from stating that the phenomenon takes place. It is also worth mentioning that the analysis reported in the following sections is mainly synchronic and does not restrict itself to the lexical class of nouns, as Kastovsky (1968) does, but also includes the major lexical classes of the verb (weak and strong) and the adjective.
2. Data of analysis and methodology
We have devised a methodology that consists of the following steps: (i) the retrieval of all records of strong verbs from the lexical database of Old English Nerthus (www.nerthusproject.com); (6) (ii) the identification of all inflectional forms of strong verbs relevant for derivational morphology; (iii) the isolation of basic strong verbs; (iv) the compilation of derivational paradigms; (v) the identification of the vocalic contrasts holding in derivation; (vi) the classification of the contrasts based on ablaut; and (vii) the distinction of phonologically motivated alternations from instances of allomorphic variation.
The most significant decision that underlies the methodological steps we have just described affects the role that strong verbs play in Old English lexical derivation. Strong verbs constitute the starting-point (but not the only base) of Germanic derivation. Therefore we have opted for a compromise solution that consists of analysing the derivational paradigm of strong verbs, but considers the major lexical categories in the recursive and non-recursive derivation and compounding that give rise to the derivational paradigm. By derivational paradigm we mean all the derivatives that can be derived by productive synchronic means or recovered in the diachrony, along with the base of derivation, a basic strong verb. As illustration of the concept of derivational paradigm, consider the class VI strong verb bacan 'to bake' and its derivatives abacan (verb, strong VI) 'to bake', baecere 1 (noun, masculine) 'baker', baecering (noun, masculine) 'gridiron' and baecestre (noun, feminine) 'female baker', all of which are morphologically and semantically related to the strong verb.
From a quantitative perspective this work has analysed 29,937 lexemes (type) beginning with the letters A-W. A total of 4,853 complex (morphologically derived) forms have been identified, which can be broken down by category as follows: 2,639 nouns, 793 adjectives, 329 weak verbs and 1,092 strong verbs. The total of strong verbs dealt with in this research is 1,499, out of which 407 correspond to simplex (morphologically underived) strong verbs. The verbs at issue can be broken down by morphological class as is shown by Appendix 1. Out of the 407 basic strong verbs, 304 derivational paradigms have been grouped.
3. Results of the analysis and discussion
The 407 basic strong verbs have given rise to 304 derivational paradigms, presented by letter in table 1, under which 4,853 derivatives have been grouped.
This makes an average of ca. sixteen derivatives and compounds per paradigm. This distribution, as was predictable, is not uniform across paradigms. To give just two examples, the paradigm of beran consists of 160 derivatives, whereas that of cnedan displays one only. Also, 1,092 non-basic strong verbs have been identified in the paradigms of other strong verbs, from which the former derive. The tendency has been observed throughout this analysis that strong verbs as derivatives from other strong verbs are regularly based on the infinitive form.
All in all, the four inflective forms of the verb (infinitive, preterite singular, preterite plural and past participle) constitute bases of derivation but the most productive forms are the infinitive and the past participle, the preterite singular being the least productive. The figures are presented in table 2.
Nevertheless, in some cases it is the preterite singular form of the verb that provides the great majority of derivatives, as is the case of the verb blican 'to shine'. These figures are consistent with the evolution from stem-formation to word-formation. Indeed, the infinitive has twice as many derivatives as the preterite singular, the preterite plural and the past participle together. On the other hand, the derivatives of the preterite together with those of the past participle outnumber those of the present, which suggests that, although the typological change from stem-formation to word-formation is well under way, it is still in progress. In this respect, we concur with Gonzalez Torres (2010), who addresses this question from the perspective of the existence of multiple bases of derivation and reaches the conclusion that the evolution from stem-formation to word-formation had been completed by the end of the Old English period. As is generally accepted in the field of historical linguistics, variation in the synchrony represents change in the diachrony.
Focusing on contrasts not related to ablaut, this research has yielded 854 instances, which makes an average of approximately three per derivational paradigm. The derivational paradigms of strong verbs with more than ten mutated derivatives include beran 'to bear' (65), drincan 'to drink' (40), faran 2 'to die' (33), hweorfan 'to turn' (33), cwelan 'to die' (29), slean 1/2 'to strike' (28), brecan 'to break' (27), cuman 1/2 'to come' (23), bindan 'to bind' (22), blican 'to glitter' (21), breotan 'to break in pieces' (21), bugan 'to bow' (21), gangan 1 'to go' (21), brinnan 'to burn' (19), biernan 'to burn' (15), ceosan 'to choose' (15), fon 'to take' (14), wrecan 'to drive' (12), buan 'to dwell' (11), calan 'to grow cool or cold' (11), grafan 'to dig' (11), ridan 1/2 'to ride' (11), secan 1 'to seek' (11) and wacan 'to awake' (11). By type of morphological contrast, the highest number of different oppositions between the base and the derivative is shown by class III of strong verbs (eo + /r/h/ + consonant) like beorgan 'to protect', ceorfan 'to cut', hweorfan 'to turn', sweorcan 'to grow dark', weorpan 'throw' and weorpan 'become'. Figure 4 illustrates this point with hweorfan 'to turn', in whose paradigm up to six vocalic contrasts arise:
Figure 4. Morphological contrasts in the paradigm of hweorfan /ae/ ~ /eo/ hwaerfan 'to turn' (hweorfan) /e/ ~ /eo/ onhwerfan 'to turn' (onhweorfan 1) /ea/ ~ /eo/ hwearf 'exchange' (hweorfan) /i/ ~ /eo/ behwirfan 'to exchange' (behweorfan) /ie/ ~ /eo/ hwierfan 'to overturn' (hweorfan) ahwierfan 'to turn away' (ahweorfan) forhwierfan 'to change' (forhweorfan) /y/ ~ /eo/ tohwyrfan 'to overturn' (tohweorfan) efthwyrfan 'to return' (efthweorfan) ymbhwyrft 'rotation' (ymbhweorfan)
Even though the contrasts in figure 4 that do not comprise two glides (/e/ ~ /eo/ and /i/ ~ /eo/) could be disregarded on the ground of alternative spelling (hwerfan and hwirfan can indeed be considered orthographic variants of hwyrfan), there remain four contrasts. This represents the maximal degree of mutation, which has been found in this research with respect to /eo/ in the strong verb base. Although more research is needed before reaching a final conclusion regarding this point, the high degree of mutation with respect to /eo/ might be related to the heterogeneous origin of the diphthong, which originates, at least, in the breaking of /e/ before /r/, /l/ and [h], as well as the back mutation of /e/.
The list of the contrasts not attributable to ablaut that constitute alternations of the type presented in figure 4 is given in figure 5. The number in brackets corresponds to the occurrences, and there is an illustration of each:
Figure 5. Alternations and occurrences A1 /a/ ~ /ae/ faran ~ faer (63) bacan 'to bake'~ baec 3 'baked meats' A1R /ae/ ~ /a/ stael ~ stalu (24) cwael (pret. sg. cwelan 'to die') ~ cwalu 'killing' A2 /a/ ~ /e/ acan ~ ece (=PA1 land ~ lendan) (46) bannan 'to summon' ~ benn 2 'edict' A2R /e/ ~ /a/ sendan ~ sand (12) wrecan 'to drive' ~ forwracned 'banished' A3 /ea/ ~ /ie/ feallan ~ fiell (4) feallan 'to fall' ~ fiell 'destruction' A3R /ie/ ~ /ea/ mierran ~ gemearr (15) biernan 'to burn' ~ bearnan 'to cause to burn' A4a /e/ ~ /i/ gecweden ~ cwide (=PA3 segl ~ siglan) (23) brecan 'to break' ~ eodorbrice 'house-breaching' A4b /eo/ ~ /ie/ weorpan ~ wierp (6) hweorfan 'to turn'~ ahwierfan 'to turn away' A4bR /y/ ~ /eo/ wyrcan ~ weorc (31) onbyrgan 1 'to eat' ~ beorgan 2 'to taste' A5 /o/ ~ /y/ gebrocen ~ bryce (=PA4 bold ~ byldan) (102) belgan 'to be or become angry' ~ bylgan 2 'to anger' A6 /u/ ~ /y/ burston ~ byrst (=PA6 lust ~ lystan) (46) brunen 'to burn' ~ bryne 'burning' A7 /a/ ~ /ae/ draf ~ draef (=PA2 lar ~ laeran) (56) bad (pret. sg. bidan 'to stay') ~ abaedan 'to compel' A7R /ae/ ~ /a/ laeran ~ lar (1) laetan 'to allow' ~ underlatteow 'consul' A8 /o/ ~ /e/ locian ~ lec (=PA5 blod ~ bledan) (8) blotan 'to sacrifice' ~ bledan 'to bleed' A8R /a/ ~ /o/ fedan ~ foda (12) bredan 1 'to produce' ~ brod 'brood' A9 /ea/ ~ /ie/ hleat ~ hliet (=PA8 steam ~ stieman) (5) heawan 'to hew' ~ hiewet 'cutting' A10 /eo/ ~ /ie/ fleotan ~ flieta (11) fleon 'to fly from' ~ afliegan 'to put to flight' A11 /u/ ~ /y/ buan ~ by (=PA7 rum ~ ryman) (13) brucan 'to brook' ~ brycian 'to enjoy'
Regarding figure 5, it must be noted that the most frequent alternations are those that have /y/ as target, as is the case with A5 /o/ ~ /y/ gebrocen ~ bryce (=PA4 bold ~ byldan) and A6 /u/ ~ /y/ burston ~ byrst (=PA6 lust ~ lystan). The alternations having /a/ as source (A1 /a/ ~ /ae/ faran ~ faer and A2 /a/ ~ /e/ acan ~ ece (=PA1 land ~ lendan)) are also remarkably frequent. The frequency of alternations with /y/ as target and /a/ as source can be explained on the ground of i-mutation. Indeed, as has been shown in figure 3, /a/ is the point of departure of this phenomenon (low and back, unrounded), while /y/ is the point of arrival (high and front, rounded). Overall, direct alternations are far more frequent than inverse ones, which is in keeping with the role of the strong verb in derivation. As a matter of fact, four reverse alternations have not been found in the corpus of analysis. This is due to the fact that the derivational paradigms have been gathered around the strong verb and the alternations in question, illustrated in figure 6, select the noun, the adjective, the verb and (far less frequently) the adverb as base of derivation:
Figure 6. Bases of reverse alternations A5R /y/ ~ /o/ spyrian ~ spor bryrdan 'to urge' (brord) scyrtan 'to shorten' (scort) dyld 'patience' (dolian) fyrdran 'to further' (ford 1) A6R /y/ ~ /u/ hyscan ~ husc dyrstan 'to thirst' (durst) fyllan 1 'to fill' (full 1) spyrnan 'to stumble' (spurnan) syndrian 'to sunder' (sundor) A9R /ie/ ~ /ea/ iecan ~ eaca sieman 'to burden' (seam 1) niehsta 'neighbour' (neah 1) iecan to increase' (eacan) A10R /ie/ ~ /eo/ stieran ~ steora stieran 'to steer' (steor 1) geliefan 'to be dear to' (geleof drietan 'to weary; force' (dreotan)
Purely quantitative contrast, including /a/ ~ /a/, /e/ ~ /a/ and /o/ ~ /o/, throw a low figure (10 occurrences) and are disregarded because mutation, which constitutes the governing principle of alternations, does not cause quantity change. The qualitative-quantitative contrasts, which evince a total of 164 occurrences, comprise the vowels and/or vocalic glides /a/ ~ /se/, /a/ ~ /ee/, /a/ ~ /a/, /se/ ~ /a/, /e/ ~ /y/, /ea/ ~ /ae/, /ea/ ~ /e/, /ea/ ~ /o/, /eo/ ~ /e/, /ao/ ~ /o/, /eo/ ~ /y/, /e/ ~ /i/, /i/ ~ /e/, /i/ ~ /u/, /i/ ~ /y/, /i/ ~ /y/, /o/ ~ /e/ and /u/ ~ /y/. They have been disregarded for the same reason as purely quantitative contrasts.
Of the remaining contrasts, those in figure 7 do not conform to alternations as defined by Kastovsky (1968) but correspond to the direction of i-mutation, with which their ultimate motivation, as is the case with the alternations in figure 3, is phonological:
Figure 7. Contrasts based on i-mutation /ae/ ~ /e/ (1) staeppan 'to step' ~ insteppan 'to go in' /u/ ~ /y/ (13) brucan 'to brook' ~ brycian 'to enjoy'
An important group of contrasts reflects the overlapping of the result of the i-mutation of long and short /u/ (long and short /y/) and the long and short diphthongs /ea/ and /eo/ (long and short /ie/) as well as the West-Saxon evolution /ie/ > /i/ > /y/. They are presented in figure 8.
Figure 8: I-mutation and West-Saxon /ie/ > /i/ > /y/. /eo/ ~ /i/ (10) beorgan 2 'to taste' ~ a: birgan 'to eat' /eo/ ~ /y/ (12) breotan 'to break in pieces' ~ brytan 1 'to crush' /eo/ ~ /i/ (4) breotan 'to break in pieces' ~ forbritan 'to crush' /ea/ ~ /y/ (1) feallan 'to fall' ~ ofyllan 'to strike down' /ie/ ~ /y/ (2) gietan 'to get' ~ unandgytful 'unintelligent' /i/ ~ /y/ (21) climban 'to climb' ~ clymmian 'to ascend' /i/ ~ /y/ (1) drifan 'to drive' ~ framadryfan 'to expel' /u/ ~ /i/ (24) bugan 'to bow' ~ biging 'bending'
Although the contrasts in figure 7 and 8 were attributed to phonological evolution, this leaves us with a list of sixteen completely unpredictable contrasts, which are listed in figure 9.
Figure 9. Unpredictable contrasts /a/ ~ /o/ (1) blandan 'to blend' ~ unblonden 'unmixed' /a/ ~ /o/ (1) swapan 'to sweep' ~ swope 'sweepings' /e/ ~ /o/ (3) tredan 'to tread' ~ trod 'track' /e/ ~ /u/ (5) beran 'to bear' ~ burdre 'birth' /e/ ~ /ea/ (15) beran 'to bear' ~ bearn 'child' /e/ ~ /eo/ (9) melcan 'to milk' ~ meolc 'milk' /i/ ~ /e/ (71) bindan 'to bind' ~ bend 'bond' /i/ ~ /a/ (3) ridan 1/ 2 'to ride' ~ rede 'ready for riding' /i/ ~ /eo/ (1) clifon 'to cleave' ~ cleofian 'to adhere' /i/ ~ /o/ (1) singan 'to sing' ~ woosong 'song' /u/ ~ /e/ (1) spurnan 'to strike against' ~ odsperning 'stumbling-block' /u/ ~ /a/ (1) bugan 'to bow' ~ onbegnes 'bending' /u/ ~ /o/ (3) buan 'to dwell' ~ bogian 'to inhabit' /y/ ~ /e/ (1) trym 'step' ~ tremman 'to step' /ao/ ~ /a/ (4) neotan 'to use' ~ naht 2 'useless' /eo/ ~ /se/ (1) hweorfan 'to turn' ~ hwaerfan 'to move'
Considering the evidence presented in figure 9, it must be accepted that the great majority of contrasts are very infrequent. Most of them present less than five occurrences and can be considered exceptional, but at least the following contrasts deserve mention: /e/ ~ /eo/, /e/ ~ /ea/ and /i/ ~ /e/, which clearly stands out for quantitative reasons. In the absence of a phonological explanation, it is not unreasonable to reach the conclusion that these contrasts constitute instances of allomorphic variation that arise in lexical creation. This accords with Kastovsky's (2006: 71) remarks that the phonological conditioning of alternations is lost in diachronic evolution.
To close this discussion, it is necessary to determine whether these instances of alternation and allomorphic variation are still within the bounds of morphology or they belong exclusively in the lexicon. Although the answer to this question largely depends on the theoretical persuasion of the researcher, it seems beyond a doubt that on the face of the evidence gathered in this research (i) there is morphological contrast between base and derivative; (ii) such a contrast is relatively recurrent; and (iii) the change in form is as a general rule paralleled by a meaning modification. On the other hand, the modification of meaning is not systematic and, moreover, is achieved mainly by other means (affixation). All in all, Old English alternations are more widespread and systematic than in the modern language, which has some fossilized alternations (Haspelmath 2002: 193). Garcia Garcia (2012: 26) holds that the alternations applying to jan-causative verbs are lexical because they are lexically conditioned and ready to be levelled out. The solution that we propose in this respect is that the phonologically motivated alternations discussed in this paper are morphological due to the morphological contrast they involve, their relative frequency and, above all, because they are related to the ablaut system of the strong verb. As for allomorphic variation, this phenomenon represents a consequence of the variable character of the bases of Old English morphology and therefore can be considered morphological. Eventually, with the change from variable base morphology into invariable base morphology, the partial replacement of the strong conjugation with the weak conjugation and the associated loss of many strong verbs, allomorphic variants and alternations must have become purely lexical.
This article has analyzed 304 derivational paradigms based on strong verbs, under which 4,853 derivatives have been grouped, and found that 3,944 of them display root vowels based on the ablaut pattern of the corresponding strong verb. The vowel of the infinitive appears in approximately one half of the derivatives, while the other half display the same vowel as the past participle more frequently than that of the preterite. This research has also yielded 854 instances of contrast between the strong verb and its derivatives that cannot be attributed to the ablaut pattern of the verb, 478 of which qualify as phonologically motivated morphological alternations. The most frequent alternations are those that have /a/ as source and those with /y/ as target, because /a/ is the point of departure of i-mutation and /y/ its point of arrival. Direct alternations are far more frequent than inverse ones given the central role played by the strong verb in derivation. Even a very conservative approach has identified sixteen completely unpredictable contrasts, thus instances of allomorphic variation, of which /e/ ~ /eo/, /e/ ~ /ea/ and /i/ ~ /e/ are relatively frequent. The unpredictability and asystematicity of these contrasts indicate a higher degree of variation than a productive procedure can possibly manage. This is so because alternations are recurrent and contribute to the systematic nature of language. However, once the phonological system in which alternations originated no longer exists and the oppositions that gave raise to alternations no longer hold, alternations become morphological. This means that they mark a formal contrast between bases and derivatives of synchronically or etymologically related paradigms, but that such a contrast cannot be repeated productively. Consequently, new unmotivated contrasts, which have been described in this work as allomorphic variants, find their way into the lexicon.
Basic strong verbs by morphological class
Class I: bidan 'to stay', bitan 'to bite', cifan 'to quarrel', cinan 'to gape', clifan 'to cleave', cwinan 'to waste', drifan 'to 'drive', dritan 'cacare', dwinan 'to waste away', figan 'to be or become an enemy', flitan 'to strive', ginan 1 'to yawn', glaedan 'to cause to slip', glidan 'to glide', gnidan 'to rub', gripan 'to seek', grisan 'to shudder', hlidan 'to come forth', hlifan 'stand out', hligan 'to attribute', hnigan 'to bow', hnitan 'to thrust', hrinan 'to touch', hwinan 'to hiss', leon 'to lend', lidan 1 'to go to', lidan 2 'to be bereft of, lidan 4 'to arrive', lifan 4 'to remain', midan 'to hide', migan 'to make water', nipan 'to grow dark', ridan 1 'to ride', ridan 2 'to seize', risan 1 'to rise', risan 2 'to seize', scinan 1 'to shine', scinan 2 'to shine upon', scitan 'to flourish', scridan 'to go', scriban 'to shrive', seon 2 'to strain', sican 1 'to sigh', sigan 1 'to sink', slidan 'to injure', slidan 'to slide', slifan 1 'to slive', slipan 'to slip', slitan 'to slit', smitan 'to smear', snidan 'to cut', snican 'to sneak along', spiwan 'to spit', stigan 'to move', strican 'to stroke', stridan 'to stride', swican 'to wander', swifan 'to revolve', teon 2 'to accuse', pinan 'to grow moist', pwitan 'to cut', pwinan 'to decrease', wican 'to yield', wigan 'to make war', witan 'to guard', wlitan 'to gaze', wreon 'to cover', writan 'to write'.
Class II: bedan 'to command', beodan 'to command', breodan 'to decay', breotan 'to break in pieces', breowan 'to brew', brucan 'to brook', ceosan 'to choose', ceowan 'to chew', cleofan 'to cleave', creopan 'to creep', crudan 'to press', dreogan 'to do', dreopan 'to drop', dreosan 'to fall', dufan 1 'to dive', dufan 2 'to sink', fleogan 'to fly', fleon 'to flee', fleotan 'to float', fneosan 'to sneeze', freosan 'to freeze', geatan 'to say yea', geopan 'to take in', geotan 1 'to pour', greosan 'to frighten', greotan 'to cry', hleotan 'to cast lots', hreodan 'to adorn', hreodan 'to adorn', hreosan 'to fall', hreowan 'to affect one with regret', hrutan 'to make a noise', leodan 'to spring up', leogan 'to lie', lucan 1 'to lock', lucan 2 'to pluck out', lutan 1 'to bend', lutan 2 'to lay down', neopan 'to overwhelm', neosan 'to search out', neotan 'to use', reocan 1 'to emit vapour', reodan 'to redden', reofan 'to break', reosan 'to fall', sceotan 'to shoot', scudan 'to run', scufan 'to shove', secan 1 'to search for', seocan 1 'to search for', seooan 'to seethe', smeocan 'to smoke', smugan 'to creep', sneowan 'to hasten', sprutan 'to sprout', strudan 'to ravage', sucan 'to suck', sugan 'to suck', supan 'to sip', teon 1 'to pull', preotan 'to vex'.
Class III: belgan 'to be or become angry', beorcan 'to bark', beorgan 1 'to save', beorgan 2 'to taste', berstan 'to break', biernan 'to burn', bindan 'to bind', blinnan 'to cease', bredan 1 'to produce', bredan 2 'to move quickly', bregdan 1 'to shake', bregdan 2 'to scheme', bringan 'to bring', brinnan 'to burn', ceorfan 'to cut', ceorran 1 'to creak', climban 'to climb', clingan 'to stick together', crimman 'to cram', crincan 'to yield', cringan 'to die', delfan 'to delve', deorfan 'to labour', feolan 'to cleave', feohtan 1 'to fight', feohtan 2 'to gain by fighting', findan 'to find', frignan 'to inquire', gieldan 'to yield', giellan 'to yell', gielpan 'to boast', ginnan 'to begin', grimman 'to rage', grindan 'to grind', gringan 'to sink down', gyrran 'to sound', helpan 'to help', hlimman 'to sound, resound, roar, rage', hrimpan 'to wrinkle', hrindan 'to thrust', hweorfan 'to turn', iernan 1 'to run', iernan 2 'to get to', limpan 'to happen', linnan 'to cease', melcan 'to milk', meltan 1 'to melt', rinnan 1 'to run', rinnan 2 'to blend', scelfan 'to shake', sceorfan 1 'to scarify', sceorfan 2 'to scrape', sceorpan 'to gnaw', sciellan 'to sound', scrimman 'to shrink', scrincan 'to contract', scringan 'to shrivel up', seordan 'to lie with', sincan 1 'to sink', singan 'to sing', sinnan 'to meditate upon', slincan 'to slink', slingan 'to worm', smeortan 'to smart', sneorcan 'to dry up', spinnan 'to spin', springan 'to jump', sprintan 'to emit', spurnan 'to skick', steorfan 'to die', stincan 1 'to stink', stincan 2 'to smell', stingan 1 'to sting', swellan 'to swell', sweltan 'to die', sweorcan 'to grow dark', sweorfan 'to file or grind away', swimman 'to swim', swincan 'to labour', swindan 'to vanish', swingan 1 'to beat', teldan 'to spread a covering', tingan 'to press against', tringan 'to press', pindan 'to swell', pringan 'to crowd', printan 'to swell', weordan 'to become', windan 'to wind', winnan 1 'to labour', winnan 2 'to conquer', wringan 'to wring', wurpan 'to throw'.
Class IV: beran 'to bear', brecan 'to break, cuman 1 'to come', cuman 2 'to come together', cwelan 'to die', dwelan 'to be led into error', gelan 'to pour', helan 'to conceal', hlecan 'to cohere', hwelan 'to roar', neoman 'to take', niman 1 'to take', niman 2 'grasp', scieran 'to cleave', stelan 'to steal', striman 'to resist', striman, swelan 'to burn', teran 'to tear', pweran 'to stir', pwerian 'to soften'.
Class V: biddan 1 'to ask', biddan 2 'to beg', cnedan 'to knead', cwedan 'to say', drepan 'to strike', etan 1 'to eat', etan 2 'to eat together', feon 'to rejoice', fnesan 1 'to pant', fretan 'to devour', giefan 'to give', gietan 'to get', lesan 'to collect', licgan 'to lie', metan 'to measure', nesan 'to escape from', pleon 'to expose to danger', repan 'to reap', screpan 'to scrape', seon 1 'to see', seon 3 'to provide', sittan 1 'to sit', sittan 2 'to finish', sprecan 1 'to speak', sprecan 2 'to agree', stecan, swefan 'to sleep', tredan 'to tread', wefan 'to weave', wegan 1 'to carry', wegan 2 'to fight', wrecan 'to drive'.
Class VI: bacan 'to bake', calan 'to grow cool', dragan 'to drag', faran 1 'to set forth', faran 2 'to die', flean 'to flay', galan 'to sing', gnagan 'to gnaw', grafan 'to dig', hladan 'to lade', hliehhan 'to laugh', sacan 'to struggle', scacan 'to shake off', scafan 'to shave', sceacan 'to shake', scieppan 'to create, slean 1 'to strike', slean 2 'to strike down', spanan 'to draw on', steppan 'to step', standan 'to stand', swerian 'to swear', pwean 'to wash', wacan 'to awake', wadan 'to wade', wascan 'to wash'.
Class VII: bannan 'to summon', beatan 'to beat', blawan 1 'to blow', blawan 2 'to kindle', blandan 'to blend', blotan 'to sacrifice', blowan 1 'to blow', buan 'to dwell', bugan 1 'to bow', clawan 'to claw', cnawan 'to know', crawan 'to crow', deagan 'to dye', eacan 'to increase', eadan 'to give', fealdan 'to fold', feallan 'to fall', flowan 1 'to flow', flowan 2 'to overflow', fon 'to take', gangan 1 'to go', gangan 2 'to observe', glowan 'to glow', growan 'to grow', hatan 'to command', heawan 'to hew', heofan 'to lament', healdan 'to hold', hleapan 'to leap', hlowan 'to low', hon 1 'to suspend', hropan 'to shout', hwatan, hwopan 'to threaten', hwosan 'to cough', lacan 'to move up and down', lacan 'to leap', laetan 'to allow', mawan 'to mow', saewan 'to sow', sceadan 'to divide', sealtan 2 'to salt', spannan 'to join', spowan 'to succeed', stealdan 'to possess', swafan, swapan 'to sweep', swogan 'to sound', prawan 'to turn', wawan 'to blow (of wind)', waepan 'to weep', wepan 'to weep', wealcan 'to move round', wealdan 'to rule', weallan 'to be agitated', wealtan, weaxan 1 'to wax', wrotan 'to root up'.
Campbell, Alistair. 1959. Old English grammar. Oxford: Oxford University Press.
Dik, Simon. 1997a. The theory of functional grammar. Part 1: The structure of the clause. Berlin: Mouton de Gruyter. Edited by Kees Hengeveld.
Dik, Simon. 1997b. The theory of functional grammar, Vol. 2: Complex and derived constructions. Berlin: Mouton de Gruyter. Edited by Kees Hengeveld.
Foley, William A. & Robert D. Van Valin Jr. 1984. Functional syntax and Universal Grammar. Cambridge: Cambridge University Press.
Garcia Garcia, Luisa. 2012. Old English jan-causatives: Between grammar and lexicon. In Javier Martin Arista, Roberto Torre Alonso, Andres Canga Alonso & Inmaculada Medina Barco (eds.), Convergent approaches to mediaeval English language and literature, 15-28. Newcastle: Cambridge Scholars.
Gonzalez Torres, Elisa. 2010. The bases of derivation of Old English affixed nouns: Status and category. Studia Anglica Posnaniensia 46(2). 21-43.
Haselow, Alexander. 2011. Typological changes in the lexicon. Analytic tendencies in English noun formation. Berlin: Mouton de Gruyter.
Haspelmath, Martin. 2002. Understanding morphology. London: Hodder Education.
Hinderling, Robert. 1967. Studien zu den starken Verbalabstrakten des Germanischen. Berlin: Walter de Gruyter.
Hogg, Richard M. 1992. Phonology and morphology. In Richard M. Hogg (ed.), The Cambridge history of the English language I. The beginnings to 1066, 67-167. Cambridge: Cambridge University Press.
Jensen, John. 1913. Die I. und II. Ablautsreihe in der ae. Wortbildung. Kiel: H. Fiencke.
Kastovsky, Dieter. 1968. Old English deverbal substantives derived by means of a zero morpheme. Tubingen: Eberhard-Karls-Universitat.
Kastovsky, Dieter. 1986. Deverbal nouns in Old and Modern English: From stem-formation to word-formation. In Jacek Fisiak (ed.), Historical semantics - historical word formation, 221-261. Berlin: Mouton de Gruyter.
Kastovsky, Dieter. 1989. Morphophonemic alternations and the history of English: Examples from Old English. In Manfred Markus (ed.), Historical English. On the occasion of KarlBrunner's 100th birthday, 112-123. Innsbruck: Universitat.
Kastovsky, Dieter. 1990. The typological status of Old English word formation. In Silvia M. Adamson, Vivien A. Law, Nigel Vincent & Susan Wright (eds.), Papers from the 5th International Conference on English Historical Linguistics, 205-224. Amsterdam: John Benjamins.
Kastovsky, Dieter. 1992. Semantics and vocabulary. In Richard M. Hogg (ed.), The Cambridge history of the English language I: The beginnings to 1066, 290-408. Cambridge: Cambridge University Press.
Kastovsky, Dieter. 2005. Hans Marchand and the Marchandeans. In Pavol Stekauer & Rochelle Lieber (eds.), Handbook of word-formation, 99-124. Dordrecht: Springer.
Kastovsky, Dieter. 2006. Typological changes in derivational morphology. In Ans van Kemenade & Bettelou Los (eds.), 151-177. The handbook of the history of English. Oxford: Blackwell publishing.
Lass, Roger. 1994. Old English. A historical linguistic companion. Cambridge: Cambridge University Press.
Lindemann, John William Richard. 1970. Old English preverbal ge-: Its meaning. Charlottesville: Virginia University Press.
Mailhammer, Robert. 2007. The Germanic strong verbs. Foundations and development of a new system. Berlin: Mouton de Gruyter.
Martin Arista, Javier. 2008. Unification and separation in a functional theory of morphology. In Robert D. Van Valin Jr. (ed.), Investigations of the syntax-semantics-pragmatics interface, 119-145. Amsterdam: John Benjamins.
Martin Arista, Javier. 2009. A typology of morphological constructions. In Stuart Christopher Butler & Javier Martin Arista (eds.), Deconstructing constructions, 85-115. Amsterdam: John Benjamins.
Martin Arista, Javier. 2010a. Lexical negation in Old English. NOWELE (North-Western European Language Evolution) 60/61. 89-108.
Martin Arista, Javier. 2010b. Adjective formation and lexical layers in Old English. English Studies 92(3). 323-334.
Martin Arista, Javier. 2011a. Morphological relatedness and zero alternation in Old English. In Pilar Guerrero Medina (ed.), Morphosyntactic alternations in English. Functional and cognitive perspectives, 339-362. Sheffield: Equinox.
Martin Arista, Javier. 2011b. Projections and constructions in functional morphology: The case of HREOW. Language and Linguistics 12(2). 393-425.
Martin Arista, Javier. 2012. The Old English prefix ge-: A panchronic reappraisal. Australian Journal of Linguistics 32(4). 411-433.
Martin Arista, Javier. 2013. Recursivity, derivational depth and the search for Old English lexical primes. Studia Neophilologica 85(1). 1-21.
Martin Arista, Javier & Francisco Cortes Rodriguez. From directionals to telics: Meaning construction, word-formation and grammaticalization in Role and Reference Grammar. In Maria Angeles Gomez Gonzalez, Francisco Ruiz de Mendoza Ibanez & Francisco Gonzalvez Garcia (eds.), Form and function in language: Functional, cognitive and applied perspectives. Amsterdam: John Benjamins. Forthcoming.
Palmgren, Carl. 1904. English gradation-nouns in their relation to strong verbs. Uppsala: University of Uppsala.
Ringe, Don. 2006. From Proto-Indo-European to Proto-Germanic. A linguistic history of English. Volume I. Oxford: Oxford University Press.
Schuldt, Claus. 1905. Die Bildung der schwachen Verba im Altenglischen. Kiel: Verlag von Robert Cordes.
Trips, Carola. 2009. Lexical semantics and diachronic morphology. The development of -hood, -dom and -ship in the history of English. Tubingen: Max Niemeyer Verlag.
Van Valin, Robert D. Jr. 2005. Exploring the syntax-semantics interface. Cambridge: Cambridge University Press.
Van Valin, Robert D. Jr. & Randy J. LaPolla. 1997. Syntax: Structure, meaning and function. Cambridge: Cambridge Univeristy Press.
(1) This research has been funded by the Ministry of Science and Innovation through the project FFI2012-29532.
(2) This line has been pursued by Haselow (2011), who deals with the rise of analytic tendencies in English morphology and the productivity of some nominal suffixes. Cf. Trips (2008).
(3) Martin Arista & Cortes Rodriguez (forthcoming) also engage in functional morphology, but from the specific perspective of grammaticalization.
(4) Cf. Garcia Garcia (2012).
(5) Campbell (1959: 71) points out that the i-mutation of diphthongs shows more variation. West-Saxon long and short /ea/ and /io/ were mutated to long and short /ie/, whereas in the other dialects long and short /ea/ were mutated to long and short /e/ and long and short /io/ were not subject to mutation. Regarding long vowels, Campbell (1959: 71-72) notes that West-Saxon /se/ and /a/ in the other dialects do not undergo raising by umlaut.
(6) We have followed the conventions of the lexical database Nerthus regarding homophones with different lexical or morphological features, which are numbered, as in awiht 1 (noun) 'something', awiht 2 (adverb) 'at all' and awiht 3 (adjective) 'of value'.
Carmen Novo Urraca and Laura Pesquera Fernandez
Universidad de La Rioja
Table 1. Derivational paradigms by letter B 34 C 23 D 15 E 3 F 21 G 24 H 27 I 1, L 15 M 6 N 5 P 1 R 9 S 78 T 5 D 13 W 23 Table 2. Derivatives based on ablaut Infinitive 2,786 Preterite singular 213 Preterite plural 235 Past participle 710 Total of derivatives based on ablaut 3,944 Figure 2. Strong verb-noun alternations in Old English (Kastovsky 1968) A1 /a/ ~ /e / faran ~ faer A1R /ae/ ~ /a/ stael ~ stalu A2 /a/ ~ /e/ acan ~ ece (=PA1 land ~ lendan) A2R /e/ ~ /a/ sendan ~ sand A3 /ea/ ~ /ie/ feallan ~ fiell A3R /ie/ ~ /ea/ mierran ~ gemearr A4a /e/ ~ /i/ gecweden ~ cwide (=PA3 segl ~ siglan) A4b /eo/ ~ /ie/ weorpan ~ wierp A4bR /y/ ~ /eo/ wyrcan ~ weorc A5 /o/ ~ /y/ gebrocen ~ bryce (=PA4 bold ~ byldan) A5R /y/ ~ /o/ spyrian ~ spor A6 /u/ ~ /y/ burston ~ byrst (=PA6 lust ~ lystan) A6R /y/ ~ /u/ hyscan ~ husc A7 /a/ ~ /ae/ draf ~ draef (=PA2 lar ~ laran) A7R /ae/ ~ /a/ laeran-lar A8 /o/ ~ /a/ locian ~ lec (=PA5 blod ~ bledan) A8R /a/ ~ /0/ fedan ~ foda A9 /ea/ ~ /e/ hleat ~ hliet (=PA8 steam ~ stieman) A9R /ie/ ~ /aa/ iecan ~ eaca A10 /eo/ ~ /ie/ fleotan ~ flieta A10R /ie/ ~ /eo/ stieran ~ steora A11 /u/ ~ /y/ buan ~ by (=PA7 rum ~ rymari) C1 [non-palatal] ~ [palatal] acan ~ ece C1R [palatal] ~ [non-palatal] pencan ~ panc C2 /short consonant/ tredan ~ tredde ~ /long consonant/ C2R /long consonant/ sellan ~ sala ~ /short consonant/ C3 /k/ ~ [x] taecan ~ getah C4 [g] ~ /j/ dragan ~ draege C4R /j/ ~ [g] wegan ~ wegu C5 [d] ~ /d/ scrad ~ scrad C6 /d/ ~ [d] scridon ~ scride C7 [voiced fricative] delfan ~ delf ~ [voiceless fricative]
|Printer friendly Cite/link Email Feedback|
|Author:||Novo Urraca, Carmen; Pesquera Fernandez, Laura|
|Publication:||Studia Anglica Posnaniensia: international review of English Studies|
|Date:||Jun 1, 2014|
|Previous Article:||Saving the "undoomed man" in Beowulf (572b-573).|
|Next Article:||Uncovering the secret: medieval women, magic and the other.| | <urn:uuid:895204ec-caba-4bf6-9cb4-ef103949055f> | CC-MAIN-2022-33 | https://www.thefreelibrary.com/Alternation+vs.+allomorphic+variation+in+old+English+word-formation%3A...-a0408916502 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.789051 | 12,839 | 3.109375 | 3 |
21-Feb-2002 -- During the second week of the Ḥajj religious holiday a group of expatriates working in Riyāḍ set off on a five-day, off-road camping trip. The route entailed driving south of Riyāḍ on tar roads to Sulayyil, then heading into the Rub` al-Khāliy desert across the gravel plains of Wādī Dawasir to the sand dunes, then north-west across sand/gravel plains, and finally north along the tar road from Laylā to Riyāḍ. The distance was made up of nearly a thousand kilometres of tar road and over six hundred kilometres of off-road driving. Having contracted the degree confluence bug, we managed to visit four Confluence sites during this journey. This was our second Confluence. See 23N 47E, 21N 47E & 22N 47E.
On this part of the 600 kilometre trek from Riyāḍ to Sulayyil, the countryside was very bare of vegetation, as you would expect in a desert. However, what most people do not realize is that Saudi Arabia, like most deserts, is mainly made up of arid, rocky areas. Sure, there is sand as well – mostly, undulating sand plains punctuated with long lines of dunes. Indeed, the Rub` al-Khāliy desert (the Empty Quarter), which covers the south-eastern quarter of Saudi Arabia, is the largest sand desert in the world.
The Confluence was about fifteen kilometres away to the east of the main road. The route was made up of fields of volcanic stones, surrounded by patches of sand. While the sand was a little soft, it was less gruelling on our tyres than the sharp igneous stones. We reached the actual confluence point and tried to photograph the zero N and zero E GPS reading. This is not as easy as it sounds and the GPS reading tends to wander, even when the GPS is not moving. We finally gave up and took the group photograph instead.
After a light lunch we started on the last leg of the day's tar road journey. | <urn:uuid:bde55899-d124-49f0-94f0-f5594941d996> | CC-MAIN-2022-33 | https://confluence.org/confluence.php?visitid=5061 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.967969 | 449 | 2.09375 | 2 |
Year 5: Dragons' Eyes
The Year 5s had an extended art lesson this week while the Year 6s were occupied with SATs. We continued to study the use of value and light in art and began by looking closely at the appearance and structure of the eyes of various reptiles before designing a close-up drawing of a dragon's eye.
The students started their project by drawing a simple outline, taking care to make the eye large enough to fill much of the page.
They then added texture and pattern to their design.
The next stage was to consider how to make an effective use of value through careful shading:
Finally, the students evaluated their work so far and added highlights and colour:
Here is some of the finished artwork: | <urn:uuid:b6b42c46-7939-49d6-9428-d88daa787ea2> | CC-MAIN-2022-33 | https://www.willingham.cambs.sch.uk/blog/?pid=6&nid=6&storyid=242 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.981486 | 152 | 2.984375 | 3 |
Red hair is cool! It’s probably one of the biggest decisions you can make especially if you’re not that fond of dyeing your hair with vibrant colors.
But sometimes, the more vibrant your hair color is, the more you have to keep an eye on it to maintain healthy looking hair. Don’t worry, it’s not rocket science and you can easily learn it with some research and recommendations from fellow red-haired folks!
Come on. Pop the question! Can you use purple shampoo for your red hair? Will it turn your red hair into purple? Let’s answer these questions together through this article.
Can you use purple shampoo for red hair?
If purple hair works perfectly fine with blonde shades, it also works great for red hair! It removes brassiness as much as it does to blonde hair so it’s definitely a perfect maintenance product if you have red hair.
Once your hair is dyed red, it will eventually accumulate orange strands or yellowish tones. Using purple shampoo neutralizes your red hair and prevents it from fading fast.
How does purple shampoo affect red hair?
Purple shampoo does more than just keeping your red hair vibrant all the time. It’s a great agent for keeping your hair healthy despite its vibrant shade.
So how does purple shampoo really affect your red hair? Are you planning to make it a part of your hair care routine? Here are some benefits you can gain from using this product.
It helps prevent or get rid of orange strands.
The last thing you want for your red hair is to turn it into orange. That’s awfully disappointing for someone who aims to achieve a cool, vibrant shade! So it’s important to use the right product to prevent this from happening in the first place.
Purple shampoos are great agents for preventing or getting rid of orange strands. When you put purple shampoo on your brassy hair, it counteracts the orange tones and makes them red again without hurting your hair.
It tones your hair and prevents it from fading.
Sometimes, your hair dye bleeds whenever you wash your hair. But you can prevent this by using the right product. Purple shampoos are perfect for keeping your hair toned and preventing it from fading.
The pigments in this shampoo locks your hair color so it can remain vibrant and healthy looking all the time. This can also save you from recoloring your hair from time to time because it won’t fade anytime soon!
It keeps your hair well-conditioned and vibrant.
Not only will purple shampoo make your hair beautifully vibrant and healthy all the time. It will also make it well-conditioned. When you wash your hair with purple shampoo, it goes straight to your hair cuticles and remains inside after rinsing.
Once your hair is dry, it serves as a protective barrier that locks the red dye in your cuticles to prevent it from fading. Your red hair will stay longer!
How to properly use purple shampoo
If you’ve decided to include purple shampoo to your red hair care routine, you must learn how to use it properly and effectively for maximum results. Whether you’re a beginner or have been dyeing your hair for quite some time already, figure out if you’re doing things the right way for your hair.
Here are the steps for properly using purple shampoo.
Gently apply purple shampoo on your hair.
Of course, start by applying an ample amount of purple shampoo on your hair. Make sure it’s enough for your hair length and lather it thoroughly from your scalp down to your hair ends. By doing this, you’re making sure that you’re spreading the purple shampoo perfectly throughout the entire area.
And most importantly, don’t use a regular shampoo before applying the purple one! This is a common mistake beginners make.
Let it sit for a few minutes.
Don’t rinse it just yet! Wait for a few minutes and let it sit on your hair to give it some time to absorb the shampoo. While waiting, massage your scalp carefully without using your fingernails. If your hair is brassy, let it sit for at least four minutes. But the minimum time you should wait for is about two minutes. After that, it should be good to go.
After rinsing your hair from the purple shampoo, apply a conditioner. This will help prevent hair breakage and make your hair softer and smoother. And don’t worry! Your red hair won’t fade by using a conditioner when washing. A clear, sulfate-free conditioner is perfect for keeping your red hue from fading.
You know it’s a great conditioner just by looking at its ingredients. If it contains antioxidants, it’s perfect!
Let the conditioner sit for a few minutes.
Just like what you did with the purple shampoo, let the conditioner sit for about three minutes. This will allow your hair to absorb the healthy components and antioxidants the conditioner contains.
Rinse it out.
After a few minutes, rinse your hair using lukewarm water. This helps your cuticles to close faster and lock in the pigments so your red hair won’t fade. Then use a soft towel to damp dry your hair.
Final thoughts: Are you doing the right thing for your red hair?
Yes, I know. Even with so much research, you might still ask yourself if you’re doing the proper care for your red hair. But this is just at first. Once you learn the right formula in taking good care of your hair, it will feel more like a routine to you.
So just keep exploring and discovering new ways to keep your red hair looking beautiful and healthy all the time! You have tons of options available in the market, but not all of them will work perfectly fine in your hair.
You just have to learn how to look at it and differentiate them so you can use the proper one for you. It can be hard at first, but it’s not impossible to achieve! | <urn:uuid:29cfcceb-9b00-4e68-ba83-44acaae33ca1> | CC-MAIN-2022-33 | https://hairtruly.com/can-you-use-purple-shampoo-for-red-hair/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.930006 | 1,282 | 1.546875 | 2 |
If the Great Pacific Garbage Patch showcases the disturbing amount of trash in our oceans, then human poop illustrates the accumulation of plastic in our bodies. In a new study, scientists’ results hint that when it comes to microplastics, what goes in may not always come out.
Microplastics are tiny pieces of plastic, less than 5 millimeters (0.2 inches) across, that are either manufactured to be tiny or are worn down from larger pieces. Regardless of how they’re formed, they’re small enough that they can collect in some hard-to-reach places.
Research, presented on Monday at the 26th United European Gastroenterology Week confirms the sobering fact that microplastics are capable of accumulating in the human intestinal tract. Lead study author Philipp Schwabl, Ph.D., of the Medical University of Vienna, worked with Bettina Liebmann of the Environment Agency Austria to show that out of eight individuals from the UK, Austria, Finland, Italy, the Netherlands, Poland, Russia, and Japan, every single one had traces of microplastics in their stool. Schwabl and Liebmann say seafood and water bottles are to blame.
“The results found an average of ten microplastic particles per 10 grams of stool,” Schwabl tells Inverse. “Human hair is around 100 micrometers thick and the microplastic particles we found in the study had a size between 50 and 500 micrometers.”
Plastic and Poop
While all people in this study had plastic in their poop, not all of them were as susceptible as others. Quantities varied wildly among the volunteers in their small sample, ranging between 18 and 172 particles per 10 grams (about one-third of an ounce). Importantly, the fact that some microplastics came out in these stool samples suggests that there’s still some left on the inside. This, says Schawbl, may be early evidence that microplastics can actually build up in the intestine over time, where it can cause inflammation in the gut and lead to cell damage.
“It is a very important question and we are planning further investigations to elucidate the effects of microplastics on human health,” Schwabl says. “Furthermore, in animal studies it has been shown that microplastics may cause intestinal damage, remodeling of the intestinal villi, distortion of iron absorption, and hepatic stress.”
It isn’t just the intestines that are in danger. Some animal models have shown that microplastics are capable of making their way around the body once they’re digested. A review in Current Environmental Health Reports published in August explained this by showing that certain cells in the gut can transport the tiny particles from the digestive system into the bloodstream. From there, they can end up pretty much anywhere in the body.
Two Main Culprits
Schwabl’s work suggests that two major types of microplastics, polypropylene (commonly used for bottle caps and rope) and polyethylene terephthalate (commonly used for drink bottles), get into the body through seafood consumption. Researchers have proposed this possibility before but had not confirmed it through real tests on humans. Now, Schwabl’s work lends powerful evidence to this claim by showing that seafood consumption is correlated with microplastic content found in stool.
“In our study, most participants drank liquids from plastic bottles, but also fish and seafood ingestion was common,” he says. “All participants had PP and PET particles in their stool samples, which are major components of plastic bottle caps and plastic bottles.”
Food packaging materials, like plastic water bottles, are another likely route for microplastics into the human body, but this study alone can’t confirm this, since all subjects both ate seafood and drank an average of 750 milliliters (about 25 fluid ounces) of water a day from plastic bottles. A larger-scale replication of this study will no doubt elucidate its findings, but Schwabl hopes his work will move the field in the right direction. Each day we learn more about microplastics, we realize how little we know about how they impact human health. | <urn:uuid:d087666f-ad75-4f78-b14b-3ebb1471b39c> | CC-MAIN-2022-33 | https://nc.inverse.com/article/50071-microplastics-in-seafood-effects-on-human-health | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00665.warc.gz | en | 0.948176 | 879 | 3.78125 | 4 |
Business Process Management (BPM) requires understanding both the business and technological drivers of change. Sometimes these are independent but often they evolve in parallel one as the result of the other.
Good business processes should be streamlined, have defined input and outputs, be validated, subject to control / audit and add value to the operation. Technology often plays a pivotal role in providing the framework for BPM and the catalyst for implementation of improvements.
This catalyst can be in the form of new technology, technology or business transformation, innovation, re-engineering, automation or a combination of such drivers. IT plays an important role in defining and designing the technology pathway to support improved business process at times of change.
All technology refresh requires an element of business process review and change. With new system implementation this will involve choices that require analysis and design often impacting multiple sub-systems and processes. Experience in navigating technology and business process mapping is essential.
How can we help you?
We have developed and implemented large scale BPM and process re-engineering based on technology innovation and change. Leaders on major ERP system implementation and integration projects we have defined, refined and designed core business process maps. Using technology innovation we have automated existing and created new efficient processes that add value.
- Apply best practice BPM to technology change and transformation programmes
- Identify innovation through technology
- Support re-engineering of existing systems and processes
- Develop business process maps against existing IT portfolio | <urn:uuid:6571a3fe-2806-4b5c-a8b5-a75231f9e35d> | CC-MAIN-2022-33 | https://www.farhorizon.co.uk/disciplines/change/process/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.920599 | 298 | 1.585938 | 2 |
Bullying in childhood is a major public health problem that increases the risk of poor health, social and educational outcomes in childhood and adolescence. These consequences are felt by all those involved in bullying (bullies, victims and bully–victims) and are now recognised to propagate deep into adulthood. Cyberbullying is a relatively new type of bullying in addition to the traditional forms of direct physical, direct verbal and indirect bullying. Children who are perceived as being ‘different’ in any way are at greater risk of victimisation, with physical appearance being the most frequent trigger of childhood bullying. Globally, one in three children have been bullied in the past 30 days, although there is substantial regional variation in the prevalence and type of bullying experienced. The consequences of childhood bullying can be categorised into three broad categories: educational consequences during childhood, health consequences during childhood and all consequences during adulthood. Many dose–response relationships exist between the frequency and intensity of bullying experienced and the severity of negative health consequence reported. The majority of victims of cyberbullying are also victims of traditional bullying, meaning cyberbullying creates very few additional victims. Overall, adverse mental health outcomes due to bullying in childhood most severely impact on bully–victims. Bullying prevention is vital for the achievement of the Sustainable Development Goals, with whole-school cooperative learning interventions having the strongest evidence base for successful outcomes. Clear management and referral pathways for health professionals dealing with childhood bullying are lacking in both primary and secondary care, although specialist services are available locally and online.
- adolescent health
- child psychiatry
This is an open access article distributed in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited, appropriate credit is given, any changes made indicated, and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/.
Statistics from Altmetric.com
If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
Bullying in childhood is a global public health problem that impacts on child, adolescent and adult health.
Bullying exists in its traditional, sexual and cyber forms, all of which impact on the physical, mental and social health of victims, bullies and bully–victims.
Children perceived as ‘different’ in any way are at greater risk of victimisation.
Bullying is extremely prevalent: one in three children globally has been victimised in the preceding month.
Existing bullying prevention interventions are rarely evidence-based and alternative approaches are urgently needed.
Bullying in childhood has been classified by the WHO as a major public health problem1 and for decades has been known to increase the risk of poor health, social and educational outcomes in childhood and adolescence.2 Characterised by repeated victimisation within a power-imbalanced relationship, bullying encompasses a wide range of types, frequencies and aggression levels, ranging from teasing and name calling to physical, verbal and social abuse.3 The dynamics within such relationships become consolidated with repeated and sustained episodes of bullying: bullies accrue compounding power while victims are stripped of their own and become progressively less able to defend themselves and increasingly vulnerable to psychological distress.4
However, only in the last decade have prospective studies been published that reveal the far-reaching effects of childhood bullying that extend into adulthood. There is now substantial evidence that being bullied as a child or adolescent has a causal relationship to the development of mental health issues beyond the early years of life, including depression, anxiety and suicidality.5 As such, addressing the global public health problem of bullying in childhood has received increasing international attention and is vital for the achievement of Sustainable Development Goal 4.6 The impact of the COVID-19 pandemic on child health and education has focused further attention on bullying in its digital form, so-called ‘cyberbullying’, the prevalence of which is feared to be increasing.7
Types of bullying
Participants in childhood bullying take up one of three roles: the victim, the bully (or perpetrator) or the bully–victim (who is both a perpetrator and a victim of bullying).5 Victims and bullies either belong to the same peer group (peer bullying) or the same family unit (sibling bullying),8 although bullying frequently occurs in multiple settings simultaneously, such as at school (peer bullying) and in the home (sibling bullying), representing a ubiquitous ecology of bullying that permeates the child’s life.
Three main types of bullying are observed, the typical characteristics of which are illustrated in table 1.
While traditional bullying has been recognised and studied for many decades9 and is often accepted as an inevitable aspect of a normal childhood,3 cyberbullying represents a relatively new phenomenon in which childhood bullying now takes place through digital modalities. The widespread uptake of electronic devices has reached almost complete saturation among adolescents in high-income countries, with users checking their devices hundreds of times and for hours each day.10 While providing beneficial access to information and social support, this large and growing online exposure of young people renders them vulnerable to exploitation, gambling, and grooming by criminals and sexual abusers, as well as cyberbullying.11 Due to the increased potential for large audiences, anonymous attacks and the permanence of posted messages, coupled with lower levels of direct feedback, reduced time and space limits, and decreased adult supervision, it is feared that cyberbullying may pose a greater threat to child and adolescent health than traditional bullying modalities.12
Factors that influence bullying
Two large-scale international surveys regularly conducted by the WHO—the Global School-based Student Health Survey (GSHS)13 and the Health Behaviour in School-aged Children (HBSC) study14—provide data from 144 countries and territories in all regions of the world. These data identify specific factors that strongly influence the type, frequency and severity of bullying experienced by children and adolescents globally. These factors, which are briefly described in table 2, suggest that children who are perceived as being ‘different’ in any way are at greater risk of victimisation.
Prevalence of bullying
A 2019 report from the United Nations Educational, Scientific and Cultural Organisation (UNESCO)15 examined the global prevalence of bullying in childhood and adolescence using data from the GSHS and HBSC studies along with addition data from the Progress in International Reading Literacy Study16 and the Programme for International Students Assessment.17 It found that almost one in three (32%) children globally has been the victim of bullying on one or more days in the preceding month, and that 1 in 13 (7.3%) has been bullied on six or more days over the same period.15 However, there is substantial regional variation in the prevalence of bullying across the world, ranging from 22.8% of children being victimised in Central America, through 25.0% and 31.7% in Europe and North America, respectively, to 48.2% in sub-Saharan Africa. There is also significant geographical variation in the type of bullying reported, with direct physical and sexual bullying being dominant in low-income and middle-income countries, and indirect bullying being the most frequent type in high-income regions. Nevertheless, bullying is a sizeable public health problem of truly global importance.
Encouragingly, there has been a decrease in the prevalence of bullying in half (50.0%) of countries since 2002, while 31.4% have seen no significant change over this time frame.15 However, 18.6% of countries have witnessed an increase in childhood bullying, primarily among members of one sex or the other, although in both girls and boys in North Africa, sub-Saharan Africa, Myanmar, the Philippines, and United Arab Emirates.15
Since its appearance, cyberbullying has received substantial media attention claiming that the near-ubiquitous uptake of social media among adolescents has induced a tidal wave of online victimisation and triggered multiple high-profile suicides among adolescents after being bullied online.18 19 However, a recent meta-analysis suggests that cyberbullying is far less prevalent than bullying in its traditional forms, with rates of online victimisation less than half of those offline.20 The study also found relatively strong correlations between bullying in its traditional and cyber varieties, suggesting victims of online bullying are also likely to be bullied offline, and that that these different forms of victimisation reflect alternative methods of enacting the same perpetrator behaviour. Recent evidence from England also indicates a difference between sexes, with 1 in 20 adolescent girls and 1 in 50 adolescent boys reporting cyberbully victimisation over the previous 2 months.21
Consequences of bullying
There is a vast range of possible consequences of bullying in childhood, determined by multiple factors including the frequency, severity and type of bullying, the role of the participant (victim, bully or bully–victim) and the timing at which the consequences are observed (during childhood, adolescence or adulthood). The consequences can be grouped into three broad categories: educational consequences during childhood and adolescence, health consequences during childhood and adolescence, and all consequences during adulthood. Each will now be discussed individually.
Educational consequences during childhood and adolescence
Children who are frequently bullied are more likely to feel like an outsider at school,17 while indirect bullying specifically has been shown to have a negative effect on socialisation and feelings of acceptance among children in schools.22 Accordingly, a child’s sense of belonging at school increases as bullying decreases.22 In addition, being bullied can affect continued engagement in education. Compared with those who are not bullied, children who are frequently bullied are nearly twice as likely to regularly skip school and are more likely to want to leave school after finishing secondary education.16 The effect of frequent bullying on these educational consequences is illustrated in table 3.
Children who are bullied score lower in tests than those who are not. For example, in 15 Latin American countries, the test scores of bullied children were 2.1% lower in mathematics and 2.5% lower in reading than non-bullied children.22 Compared with children never or almost never bullied, average learning achievement scores were 2.7% lower in children bullied monthly, and 7.5% lower in children bullied weekly, indicating a dose–response relationship. These findings are globally consistent across both low-income and high-income countries.17
Health consequences during childhood and adolescence
Numerous meta-analyses,2 23–26 longitudinal studies5 27 28 and cross-sectional studies29–31 have demonstrated strong relationships between childhood bullying and physical, mental and social health outcomes in victims, bullies and bully–victims. Some of these consequences are illustrated in table 4. Reported physical health outcomes are mostly psychosomatic in nature. Most studies focused on the impacts on victims, although adverse effects on bullies and bully–victims are also recognised. Many studies identified a dose–response relationship between the frequency and intensity of bullying experienced and the severity of negative health consequence reported.
While there is significant regional variation, the association between childhood bullying and suicidal ideation and behaviour are recognised globally.32 Alarmingly, childhood bully victimisation is associated with a risk of mental health problems similar to that experienced by children in public or substitute care.33 Victimisation in sibling bullying is associated with substantial emotional problems in childhood, including low self-esteem, depression and self-harm,8 and increases the risk of further victimisation through peer bullying. Overall, adverse mental health outcomes due to bullying in childhood appear to most severely impact on bully–victims, followed by victims and bullies.34
Nine out of 10 adolescents who report victimisation by cyberbullying are also victims of bullying in its traditional forms,35 meaning cyberbullying creates very few additional victims,36 but is another weapon in the bully’s arsenal and has not replaced traditional methods.37 Cyberbullying victimisation appears to be an independent risk factor for mental health problems only in girls and is not associated with suicidal ideation in either sex.38 As such, traditional bullying is still the major type of bullying associated with poor mental health outcomes in children and adolescents.21
Consequences during adulthood
A recent meta-analysis39 and numerous other prospective longitudinal studies40 41 that used large, population-based, community samples analysed through quantitative methods suggest that childhood bullying can lead to three main negative outcomes in adulthood for victims, bullies and bully–victims: psychopathology, suicidality and criminality. Some of these consequences are illustrated in table 5.
A strong dose–response relationship exists between frequency of peer victimisation in childhood and adolescence and the risk of adulthood adversities.39 For example, frequently bullied adolescents are twice as likely to develop depression in early adulthood compared with non-victimised peers, and is seen in both men and women.41 Startlingly, the effects of this dose–response relationship seems to persist until at least 50 years of age.33
The impact of childhood bully victimisation on adulthood mental health outcomes is staggering. Approximately 29% of the adulthood depression burden could be attributed to victimisation by peers in adolescence,41 and bully victimisation by peers is thought to have a greater impact on adult mental health than maltreatment by adults, including sexual and physical abuse.42 Finally, these consequences reach beyond the realm of health, as childhood bullying victimisation is associated with a lack of social relationships, economic hardship and poor perceived quality of life at age 50.33
Until not long ago, being bullied was considered a normal rite of passage through which children must simply persevere.3 However, the size and scale of its impact on child health, and later on adulthood health, are now clearly understood and render it a significant public health problem warranting urgent attention.1 While parental and peer support are known to be protective against victimisation, regardless of global location, cultural norms or socioeconomic status,43 structured programmes have been deployed at scale to prevent victimisation and its associated problems.
School-based interventions have been shown to significantly reduce bullying behaviour in children and adolescents. Whole-school approaches incorporating multiple disciplines and high levels of staff engagement provide the greatest potential for successful outcomes, while curriculum-based and targeted social skills training are less effective methods that may even worsen victimisation.44 The most widely adopted approach is the Olweus Bullying Prevention Programme (OBPP), a comprehensive, school-wide programme designed to reduce bullying and achieve better peer relations among school-aged children.9 However, despite its broad global uptake, meta-analyses of studies examining the effectiveness of the OBPP have shown mixed results across different cultures.45–47
Cooperative learning, in which teachers increase opportunities for positive peer interaction through carefully structured, group-based learning activities in schools, is an alternative approach to bullying prevention that has recently gained traction and been shown to significantly reduce bullying and its associated emotional problems while enhancing student engagement and educational achievement.48 Also housed within the educational environment, school-based health centres became popular in the USA in the 1990s and provided medical, mental health, behavioural, dental and vision care for children directly in schools, and have had some positive impacts on mitigating the prevalence and impact of bullying.49 In the UK, school nurses act as liaisons between primary care and education systems, and are often the first to identify victims of bullying, although their numbers in the UK fell by 30% between 2010 and 2019.50
Due to the link between sibling and peer bullying, there have been calls for bullying prevention interventions to be developed and made available to start in the home, and for general practitioners and paediatricians to routinely enquire about sibling bullying.8
While countless cyberbullying prevention programmes, both offline and online, are marketed to educational institutions, only a small proportion have been rigorously evaluated.51 Furthermore, as cyberbullying rarely induces negative impacts on child health independently, interventions to tackle these effects must also target traditional forms of bullying to have meaningful impact.
Addressing the global public health problem of bullying in childhood and adolescence is vital for the achievement of the Sustainable Development Goals. In recognition of this, UNESCO recently launched its first International Day Against Violence and Bullying at School, an annual event which aims to build global awareness about the problem’s scale, severity and need for collaborative action.52 Meaningful progress on this problem is urgently needed to increase mental well-being and reduce the burden of mental illness in both children and adults globally. Suggestions for immediate action are briefly described in box 1.
Actions needed to improve child health through the prevention of bullying
Promote the importance of parental and peer support in the prevention of bully victimisation across families and schools.
Educate health professionals about the consequences of childhood bullying and provide training and resources to allow identification, appropriate management and timely referral of such cases (see further).
Develop and make widely available bullying prevention interventions that tackle sibling bullying in the home.
Create and deploy whole-school cooperative learning approaches to reduce bullying within educational institutions.
Address cyberbullying with evidence-based interventions that also tackle traditional forms of bullying.
Increase awareness of the presentation and impacts of bullying on child health among primary care professionals.
What to do if you suspect childhood bullying
GPs should be prepared to consider bullying as a potential contributory factor in presentations of non-specific physical and mental health complaints from children. While GPs recognise their responsibility to deal with disclosures of childhood bullying and its associated health consequences, they often feel unable to adequately do so due to the constraints of time-pressured primary care consultations, and uncertainty around the specialist services to which such children can be appropriately referred.53
Clear management and referral pathways for health professionals dealing with childhood bullying are lacking in both primary and secondary care. Local, national and online antibullying organisations, such as Ditch the Label54 and the Anti-Bullying Alliance,55 provide free advice for children affected by bullying, and their parents, teachers and health professionals, along with free online certified CPD training for anyone working with children. School nurses continue to act as liaisons between primary care and education systems56 and should be central to the multidisciplinary management of childhood bullying. Finally, if bullying is considered to be contributory to childhood depression, child and adolescent mental health services, along with primary care practitioners and educational professionals, should work collaboratively to foster effective antibullying approaches.57
Contributors RA was the sole contributor to the work.
Funding The authors have not declared a specific grant for this research from any funding agency in the public, commercial or not-for-profit sectors.
Competing interests No, there are no competing interests.
Patient and public involvement Patients and/or the public were not involved in the design, conduct, reporting or dissemination plans of this research.
Patient consent for publication Not required.
Provenance and peer review Commissioned; externally peer reviewed.
Data availability statement Data sharing is not applicable as no datasets have been generated and/or analysed for this study. | <urn:uuid:80289842-39f4-4d35-a3fc-e30a3124351e> | CC-MAIN-2022-33 | https://bmjpaedsopen.bmj.com/content/5/1/e000939 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz | en | 0.953476 | 3,960 | 3.96875 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.