text
stringlengths 160
608k
| id
stringlengths 47
47
| dump
stringclasses 2
values | url
stringlengths 13
2.97k
| file_path
stringlengths 125
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 48
145k
| score
float64 1.5
5
| int_score
int64 2
5
|
|---|---|---|---|---|---|---|---|---|---|
Samsung Electronics and SK Hynix have both been hit by unstable yield rates of their 18nm process technologies for server DRAM production, particularly production for high-end server chips, according to industry sources.
With Samsung and SK Hynix encountering technical problems with their 18nm DRAM production for servers, the already-tight supply of server DRAMs particularly high-end ones for data center applications will become even tighter, the sources indicated.
US and China-based vendors have already requested their Korea-based memory suppliers to suspend shipments until their 18nm DRAM process yield rates improve, the sources noted. It may take 1-2 months or even longer for the two DRAM firms to improve their 18nm production yield rates, the sources said.
DRAM prices for the third quarter are likely to fall more quickly than previously expected, as uncertainty emerges about the server DRAM supply, the sources continued.
Nevertheless, some industry observers have suggested that both Samsung’s and SK Hynix’ 18nm process production yields could be relatively low and unstable for server DRAM production but are actually sufficient for notebook and PC, and other consumer use chips, since server DRAMs require relatively high production quality. The issue should not have a material impact on the overall DRAM supply, the observers believe.
In addition, several China-based enterprises including Alibaba, Huawei, Lenovo and Tencent have moved to vie for 20nm server DRAM supplies recently, because of the unstable 18nm DRAM production yield rates, according to sources at IC distributors.
|
<urn:uuid:81836301-a7c3-40d5-8468-4389e8095e84>
|
CC-MAIN-2022-33
|
https://globalsmtseasia.com/samsung-sk-hynix-18nm-dram-production-reportedly-hit-by-unstable-yield-rates/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.940469
| 318
| 1.5625
| 2
|
Forty-six students enrolled for thirteen weeks in Spring 2006. We met twice weekly for an hour and fifteen minutes per class, with a mix of lecture and large- and small-group discussion. Aside from reading the novels, students also had to do secondary assignments, including making and listening to podcasts and reading and evaluating discussion summaries.
This podcast project tied in very well to a literature course, because in addition to teaching students about particular works of fiction, the key skill modeled when students quote and expand on each other’s words is that thinking about cultural works is a collaborative process that happens in dialogue, not only in isolation. Cultural objects (including novels) are not static; they circulate, they are events. We may receive them privately, as when we read or work on a computer, but the process is not complete until we take the next step, which is to re-connect with others. We get ideas about interpretation from others, improve them (we hope) on our own, then place these ideas back into the cultural stream.
Each podcast assignment consisted of a “podcast pair” (two podcasts); students made a five-minute reading of a passage from a novel, coupled with a five-minute discussion of that passage: why the student chose it, what details were most important, what themes and issues the passage raised, and how the passage related to the rest of the novel. These podcasts were posted on a server and all students in the class were required to listen to selected podcasts on what they were reading before coming to class discussions.
The students received two sets of instructions for making podcasts. One, written by the professor, stressed what kind of content was expected. The other, written by Liz Evans of Swarthmore’s Information Technology Services in collaboration with the professor, gave step-by-step technical instructions for recording and posting and subscribing to podcasts.
In order to prepare their MP3 recordings, students were given instructions for basic installation and use of recording software (Audacity or GarageBand) on Windows or Macintosh PC. In most cases, students used their own computers and devices, although additional equipment and assistance was available through Information Technology Services. After recording, students were provided guidance on posting their MP3 files on a weblog page hosted on the college’s OS X web server. This page, in turn, created the URL for subsciption to the podcast in iTunes or other players. Students were required to subscribe and listen to the recordings each week on their computers or portable media players.
A key to the project’s success with a relatively large class was placing the technology in the hands of the students themselves. Though the comfort level of individual students varied, providing good documentation from the outset helped most students handle the recording work independently, and only a very few technical problems with audio quality or file format issues were encountered.
Podcasts are a superb new technology that can be used in any situation where instructors want students to read and perform written material and then discuss it. Beyond literature or theater classes, they can also work well in foreign language courses to help students improve their speaking and hearing skills. Requiring students to post the material before class meant that the performances, passages, and student materials could be one (not the only) focus of the in-class discussions, which greatly enriched the quality of the discussion. Students found that the readings brought the passages and the novels to life—and that when they heard passages aloud, they noticed many more things than when they just read an assignment before class. In addition, students could respond to the interpretations of the selections that the podcasts made—adding their own collaborative insights, arguing with the interpretation, etc. With literature, this new technology encourages close reading, thoughtful interpretation, and student involvement. Also, students love performing works of literature (even excerpts) aloud—it greatly adds to the fun of the class. Students took the assignments very seriously and in general did very high quality work with them.
Student-made podcasts could work well for many other kinds of courses (from history to foreign languages to any of the social sciences) where a premium is placed on texts and careful interpretation.
The one thing I would do differently next time is cut back on the number of podcasts required for each class. For some assignments it was 3-4 podcast pairs, given the popularity of an author and the large number of students in the class. Since the reading assignments were long, most students did not have time to complete both the reading assignments and all the podcast assignments. I made a mid-course correction and had the students listen to just 1 pair of podcasts of their own choosing before most classes, and then we discussed these in class; this worked well. Professors incorporating podcast assignments into their syllabi need to be sure that they are well-integrated and well-balanced with the other assignments.
Aside from giving the students clear instructions about the goals and methods of making podcasts for the course, I recommend that some class time be devoted to discussing the podcasts when they are assigned. Otherwise, the students who make the podcasts for that day won’t get enough feedback from their fellow students, and there will be too big a break between the outside-class and in-class work. Most often I found that beginning with a discussion of the podcasts was a superb way to open a larger discussion of the themes and ideas and interpretive issues of the assigned material for that day. Podcasts also complemented well the lectures that I gave; I often found myself referring to assigned podcasts as part of my lecture on the novelist we were studying.
The student podcasts did not replace traditional writing assignments, such as exams and papers; they were a very successful supplement to them. I gave students written feedback and grades on their podcasts, evaluating both their dramatic readings and the subsequent interpretation they gave of the material.
We discussed in class what the students thought of the podcast assignments, from how clear the instructions were to how they evaluated the results. Many students also gave me their opinions after class, or comments via email later and via the written course evaluations. The vast majority (40+) of my 46 students loved the assignments and put lots of effort and thought into them. They understood right away the learning possibilities in this new medium. They also much preferred making their own podcasts on material relevant to the course, over listening to long podcast lectures by the professor.
Additional measured results: Students were required to evaluate podcast content as part of some of their writing assignments, especially the in-class exams. (I had told the students that the podcast analysis would be required on the exam, so they had to listen to some as part of their exam preparation. The exam was open-book and open-notes for this reason.) In this way, I could judge how well the students were paying attention to the podcasts and using them to supplement their own ideas. Here are two examples:
The first exam essay excerpt below is on Barbara Kingsolver’s novel The Poisonwood Bible. The student transcribed a quotation she liked from a podcast she had listened to ahead of time, then embedded it within her own discussion:
“In his podcast, Dan discusses how [the character] Nathan, ‘by never forgiving himself[,] … effectively prevents God from forgiving him as well, as Christianity requires both penance and acceptance of one’s own flaws, a concept that seems entirely alien to Nathan’s perception of the world…’ Because Nathan retains the characteristic of being ‘more sure of himself than I’d thought it possible for a young man to be,’ as [the character] Orleanna describes him, he can never be forgiven…”
The quotation from the student named Dan shows, first of all, the high level that some of the podcasts achieved as they discussed their chosen passage. This excerpt also hints at how the student taking the exam then proceed to develop Dan’s idea that the two major adult characters seek forgiveness but create only a cycle of self-punishment. She made the idea her own, adding her own nuances and examples and new directions. But clearly the “germ” for her idea was inspired by the podcast.
Another example, from a student writing on Thomas Pynchon’s Vineland, well shows how podcast content can be “quoted” just like any text-based source would be:
“Similar to the blurring of identity found with the Thanatoid characters, there also exists in Vineland a blur between the present and the past. Throughout the novel, the reader is constantly confronted with flashbacks, many times caught unaware where the flashback ends and the present story begins. As Micah states in his podcast, the blurring of the present and past is done to such an extent so that ‘present and past are inseparable.’ The blurring is heightened by Pynchon’s use of media, notably TV and film….” The student then proceeded with discussing examples.
Podcasts are a great new way to communicate. In some ways, though, educators have been slow to explore the possibilities for back-and-forth interaction that the web allows, so that such interchanges can occur outside of the classroom as well as within it. But anything we can do to heighten the intensity and intelligence that students will bring to the classroom conversation is a good thing. Podcasts present fascinating new possibilities for doing just that.
|
<urn:uuid:735a01b4-270d-4633-90ff-52f167763a65>
|
CC-MAIN-2022-33
|
http://academiccommons.org/tag/liz-evans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.973207
| 1,955
| 2.453125
| 2
|
Chilli 'Maui Purple' (Organic)
Stunning vibrant green, purple-tinged foliage forms a neat compact bush making 'Maui Purple' the perfect candidate for growing in a pot. The midnight black shiny chillies turn red when they are ripe and at this stage they are hot enough to turn into mouth tingling salsas. But one of the best attributies of this chilli is that it just keeps giving, producing fruit right through to winter. Getting hotter as it ripens, it is more mild when purple and extremely hot (more than 30,000 Scoville Units) when red.
Within the capsicum family, germination temperatures are generally related to the heat of the capsicum or chilli. The hotter the chilli, the higher the germination temperature required. For this reason, it is always best to germinate chillies indoors, using a heat mat to provide bottom heat directly to the seed and root zone. Water frequently as the higher temperatures can cause the seed raising mix to dry out more quickly, and use a cover to help improve the humidity and surrounding air temperature. Chilli seedlings can be planted out into the garden once the risk of frost has passed. Choose a warm, sunny spot and cultivate it deeply adding dolomite to supply chillies with both calcium and magnesium. Regular harvesting improves the productivity and vigour of the plant. Pick the fruit using secateurs to avoid damaging the plant and wear gloves when harvesting chillies!
|
<urn:uuid:698793aa-1bcc-4a42-8c5f-7eb987d9c5ff>
|
CC-MAIN-2022-33
|
https://www.diggers.com.au/products/chilli-maui-purple-organic
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.882398
| 307
| 1.914063
| 2
|
Here is a very interesting fossil bird track from the Green River Formation of Utah. There is a large water bird track on the plate. This track was probably made by a Sandpiper-like bird. It is very easy to understand how a bird made tracks in the mud along the shoreline of the lake. But it is very rare that tracks actually end up preserved as fossils! This track is very easily seen preserved in the rock. This is a very nice specimen of a large bird track from the Eocene - what a great conversation piece!
|
<urn:uuid:c0b70902-293c-47ab-a6e9-0cf4c71bbf74>
|
CC-MAIN-2022-33
|
http://www.fossilsforsale.com/site_arc/index.cfm?action=item&prod_id=6971&
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.985978
| 110
| 2.5
| 2
|
Everything Tagged "Clojure"
I write a lot of reductions: loops that combine every element from a collection in some way. For example, summing a vector of integers:
(reduce (fn [sum x] (+ sum x)) 0 [1 2 3]) ; => 6
If you’re not familiar with Clojure’s
reduce, it takes a reducing function
f, an initial accumulator
init, and a collection
xs. It then invokes
(f init x0) where
x0 is the first element in
f returns a new accumulator value
acc1, which is then passed to
(f acc1 x1) to produce a new accumulator
acc2, and so on until every
xs is folded into the accumulator. That accumulator is the return value of
In writing reductions, there are some problems that I run into over and over. For example, what if you want to find the mean of some numbers in a single pass? You need two accumulator variables–a sum and a count. The usual answer to this is to make the accumulator a vector tuple. Destructuring bind makes this… not totally awful, but a little awkward:
(reduce (fn [[sum count] x] [(+ sum x) (inc count)]) [0 0] [1 2 3 4 5 6 7]) ; => [28 7]
Previously: Typing the Technical Interview.
Frigitt, vi danser
For et øyeblikk, vi leker
Vi tusen små bladskiper
Gleder oss, på det klare morgenlys
If you want to get a job as a software witch, you’re going to have to pass a whiteboard interview. We all do them, as engineers–often as a part of our morning ritual, along with arranging a beautiful grid of xterms across the astral plane, and compulsively running ls in every nearby directory–just in case things have shifted during the night–the incorporeal equivalent of rummaging through that drawer in the back of the kitchen where we stash odd flanges, screwdrivers, and the strangely specific plastic bits: the accessories, those long-estranged black sheep of the families of our household appliances, their original purpose now forgotten, perhaps never known, but which we are bound to care for nonetheless. I’d like to walk you through a common interview question: reversing a linked list.
First, we need a linked list. Clear your workspace of unwanted xterms, sprinkle salt into the protective form of two parentheses, and recurse. Summon a list from the void.
So there’s a blog post that advises every method should, when possible, return self. I’d like to suggest you do the opposite: wherever possible, return something other than
Writing software can be an exercise in frustration. Useless error messages, difficult-to-reproduce bugs, missing stacktrace information, obscure functions without documentation, and unmaintained libraries all stand in our way. As software engineers, our most useful skill isn’t so much knowing how to solve a problem as knowing how to explore a problem that we haven’t seen before. Experience is important, but even experienced engineers face unfamiliar bugs every day. When a problem doesn’t bear a resemblance to anything we’ve seen before, we fall back on general cognitive strategies to explore–and ultimately solve–the problem.
Earlier versions of Jepsen found glaring inconsistencies, but missed subtle ones. In particular, Jepsen was not well equipped to distinguish linearizable systems from sequentially or causally consistent ones. When people asked me to analyze systems which claimed to be linearizable, Jepsen could rule out obvious classes of behavior, like dropping writes, but couldn’t tell us much more than that. Since users and vendors are starting to rely on Jepsen as a basic check on correctness, it’s important that Jepsen be able to identify true linearization errors.
Until this point in the book, we’ve dealt primarily in specific details: what an expression is, how math works, which functions apply to different data structures, and where code lives. But programming, like speaking a language, painting landscapes, or designing turbines, is about more than the nuts and bolts of the trade. It’s knowing how to combine those parts into a cohesive whole–and this is a skill which is difficult to describe formally. In this part of the book, I’d like to work with you on an integrative tour of one particular problem: modeling a rocket in flight.
Previously, we covered state and mutability.
Up until now, we’ve been programming primarily at the REPL. However, the REPL is a limited tool. While it lets us explore a problem interactively, that interactivity comes at a cost: changing an expression requires retyping the entire thing, editing multi-line expressions is awkward, and our work vanishes when we restart the REPL–so we can’t share our programs with others, or run them again later. Moreover, programs in the REPL are hard to organize. To solve large problems, we need a way of writing programs durably–so they can be read and evaluated later.
A few weeks ago I criticized a proposal by Antirez for a hypothetical linearizable system built on top of Redis WAIT and a strong coordinator. I showed that the coordinator he suggested was physically impossible to build, and that anybody who tried to actually implement that design would run into serious problems. I demonstrated those problems (and additional implementation-specific issues) in an experiment on Redis’ unstable branch.
Antirez’ principal objections, as I understand them, are:
Most programs encompass change. People grow up, leave town, fall in love, and take new names. Engines burn through fuel while their parts wear out, and new ones are swapped in. Forests burn down and their logs become nurseries for new trees. Despite these changes, we say “She’s still Nguyen”, “That’s my motorcycle”, “The same woods I hiked through as a child.”
In Chapter 1, I asserted that the grammar of Lisp is uniform: every expression is a list, beginning with a verb, and followed by some arguments. Evaluation proceeds from left to right, and every element of the list must be evaluated before evaluating the list itself. Yet we just saw, at the end of Sequences, an expression which seemed to violate these rules.
Clearly, this is not the whole story.
In Chapter 3, we discovered functions as a way to abstract expressions; to rephrase a particular computation with some parts missing. We used functions to transform a single value. But what if we want to apply a function to more than one value at once? What about sequences?
For example, we know that
(inc 2) increments the number 2. What if we wanted to increment every number in the vector
[1 2 3], producing
[2 3 4]?
We left off last chapter with a question: what are verbs, anyway? When you evaluate
(type :mary-poppins), what really happens?
user=> (type :mary-poppins) clojure.lang.Keyword
We’ve learned the basics of Clojure’s syntax and evaluation model. Now we’ll take a tour of the basic nouns in the language.
This guide aims to introduce newcomers and experienced programmers alike to the beauty of functional programming, starting with the simplest building blocks of software. You’ll need a computer, basic proficiency in the command line, a text editor, and an internet connection. By the end of this series, you’ll have a thorough command of the Clojure programming language.
Riemann 0.2.0 is ready. There’s so much left that I want to build, but this release includes a ton of changes that should improve usability for everyone, and I’m excited to announce its release.
Version 0.2.0 is a fairly major improvement in Riemann’s performance and capabilities. Many things have been solidified, expanded, or tuned, and there are a few completely new ideas as well. There are a few minor API changes, mostly to internal structure–but a few streams are involved as well. Most functions will continue to work normally, but log a deprecation notice when used.
The Netty redesign of riemann-java-client made it possible to expose an end-to-end asynchronous API for writes, which has a dramatic improvement on messages with a small number of events. By introducing a small queue of pipelined write promises, riemann-clojure-client can now push 65K events per second, as individual messages, over a single TCP socket. Works out to about 120 mbps of sustained traffic.
In the previous post, I described an approximation of Heroku’s Bamboo routing stack, based on their blog posts. Hacker News, as usual, is outraged that the difficulty of building fast, reliable distributed systems could prevent Heroku from building a magically optimal architecture. Coda Hale quips:
Really enjoying @RapGenius’s latest mix tape, “I Have No Idea How Distributed Systems Work”.
RapGenius is upset about Heroku’s routing infrastructure. RapGenius, like many web sites, uses Rails, and Rails is notoriously difficult to operate in a multithreaded environment. Heroku operates at large scale, and made engineering tradeoffs which gave rise to high latencies–latencies with adverse effects on customers. I’d like to explore why Heroku’s Bamboo architecture behaves this way, and help readers reason about their own network infrastructure.
tl;dr Riemann is a monitoring system, so it emphasizes liveness over safety.
Riemann is aimed at high-throughput (millions of events/sec/node), partial-harvest event processing, where it is acceptable to trade completeness for throughput at low latencies. For instance, it’s probably fine to drop half of your request latency events on the floor, if you’re calculating a lossy histogram with sampling anyway. It’s also typically acceptable to have nondeterministic behavior with respect to time windows: if one node’s clock is skewed, it’s better to process it “soonish” rather than waiting an unbounded amount of time for it to check in.
I’ve had two observations floating around in my head, looking for a way to connect with each other.
Many “architecture patterns” are scar tissue around the absence of higher-level language features.
I’ve been putting more work into riemann-java-client recently, since it’s definitely the bottleneck in performance testing Riemann itself. The existing RiemannTcpClient and RiemannRetryingTcpClient were threadsafe, but almost fully mutexed; using one essentially serialized all threads behind the client itself. For write-heavy workloads, I wanted to do better.
There are two logical optimizations I can make, in addition to choosing careful data structures, mucking with socket options, etc. The first is to bundle multiple events into a single Message, which the API supports. However, your code may not be structured in a way to efficiently bundle events, so where higher latencies are OK, the client can maintain a buffer of outbound events and flush it regularly.
Schadenfreude is a benchmarking tool I’m using to improve Riemann. Here’s a profile generated by the new riemann-bench, comparing a few recent releases in their single-threaded TCP server throughput. These results are dominated by loopback read latency–maxing out at about 8-9 kiloevents/sec. I’ll be using schadenfreude to improve client performance in high-volume and multicore scenarios.
I needed a tool to evaluate internal and network benchmarks of Riemann, to ask questions like
- Is parser function A or B more efficient?
- How many threads should I allocate to the worker threadpool?
- How did commit 2556 impact the latency distribution?
In response to Results of the 2012 State of Clojure Survey:
The idea of having a primary language honestly comes off to me as a sign that the developer hasn't spent much time programming yet: the real world has so many languages in it, and many times the practical choice is constrained by that of the platform or existing code to interoperate with.
More from Hacker News. I figure this might be of interest to folks working on parallel systems. I’ll let KirinDave kick us off with:
Go scales quite well across multiple cores iff you decompose the problem in a way that's amenable to Go's strategy. Same with Erlang.
No one is making “excuses”. It’s important to understand these problems. Not understanding concurrency, parallelism, their relationship, and Amdahl’s Law is what has Node.js in such trouble right now.
Most applications have configuration: how to open a connection to the database, what file to log to, the locations of key data files, etc.
Configuration is hard to express correctly. It’s dynamic because you don’t know the configuration at compile time–instead it comes from a file, the network, command arguments, etc. Config is almost always implicit, because it affects your functions without being passed in as an explicit parameter. Most languages address this in two ways:
|
<urn:uuid:2267fff5-756b-4ad8-a2bb-7d10921a24aa>
|
CC-MAIN-2022-33
|
https://aphyr.com/tags/clojure
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.921915
| 2,918
| 1.6875
| 2
|
Dance Theater Workshop aims to present “artists from around the world who are exploring new expressions in contemporary dance and performance” and to “advance the critical role of contemporary dance and performance in local and global culture.” So it is baffling that they chose to present Seattle-based zoe/juniper’s the devil you know is better than the devil you don’t.
Choreographer/dancer Zoe Scofield and video/performance artist Juniper Shuey have been collaborating since 2004 on projects ranging from visual arts to dance. The duo describes the devil as “a world shaped by accumulating, external forces…a haunting physical, sonic, and visual space shaped by brutality and grace.” What surfaces is an amateur-looking dance recital.
Scofield, the lead dancer, and four other company members, along with a “corps de ballet” of Barnard students, pound through an evening of penchés, jetés, and convulsions to sci-fi flick music, adorned in white body paint and Jungle Book-inspired costumes. Scofield, a good mover, does seem possessed by the devil with her tortured writhing and passionately pained open mouth. Her fellow sexy alien beasts yearn and suffer through lots of piqué turns and developés, punctuated by stylized Exorcist moments. There is much reaching towards God, and many So You Think You Can Dance-style eye-locks with the audience.
I am always interested to see how contemporary dance uses ballet, whether the rigorous technique is used to limit or expand expressive range. The former seemed the case here.
In her artist’s statement, Scofield says she “is interested in using the self-command and physical distortion of classical ballet technique: i.e. turned out legs that display pointed feet, placement, and disciplined physical articulation.” The explicitness of her reference combined with the way balletic movement is treated in this piece contributes to a sense of fetishism. There is nothing wrong with beautiful balletic dance for the sake of dance, but this choreography makes the dancers look as if they have something to prove. The endless strings of high jumps and high legs would be suspiciously redundant as is, but the dancers also appear to be straining under demands of virtuosity and are often out of synch.
Then there is the climax at the end, complete with a Nutcracker-style snow scene. As the dancers jeté across the stage to rock music, plumed in peacock tails, shimmering rainbow confetti begins to fall. Sometimes dancers reach upward as though they’re receiving a benediction from on high. The most interesting part about this effect is watching the way mechanized troughs dispense the parti-colored snow, rhythmically dumping it out from above. Instead of being a mere visual effect, it exposes the conscious decision behind it. It is a clear effort to jazz up a dance piece.
Towards the end it all comes together in my mind: the body paint, the animal-inspired costumes, the Space Mountain music, the crowd-pleasing high kicks, the swirling confetti: Disneyland.
zoe/juniper has received numerous grants and touring opportunities. With such a dearth of arts funding in the U.S., how do they pull it off? Could it be the collaborative aspect of this artistic team that makes them attractive to funders? Is it because they’re not New Yorkers? Is it the appeal of the arts-using-technology trend? Could it be Shuey’s video snow projection that opens the piece or the sunburst-through-clouds backdrop that makes it inter-disciplinary?
The audience loved it though, so maybe it is just a question of venue.
ERIKA EICHELBERGER is a dancer and writer based in Brooklyn.
|
<urn:uuid:22ffe1cb-5314-4ead-8263-d5e712c9bb07>
|
CC-MAIN-2022-33
|
https://th.brooklynrail.org/2009/03/dance/zoejuniper-at-dance-theater-workshop
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.935231
| 824
| 1.507813
| 2
|
A draft document shaping post-Brexit relationships between the U.K. and EU has been principally agreed by the parties, European Council President Donald Tusk said Thursday.
“I have just sent to EU27 a draft Political Declaration on the future relationship between EU and UK,” Tusk said on Twitter.
He said EU Commission President Jean-Claude Juncker has “informed me that it has been agreed at negotiators’ level and agreed in principle at political level, subject to the endorsement of the leaders".
The progress came following British Prime Minister Theresa May’s meeting with Juncker in Brussels Wednesday afternoon to finalize negotiations on the final declaration document.
“We have had a very good meeting this evening. We have made further progress, and as a result, we have given sufficient direction to our negotiators,” May said in an interview with local media.
“I hope for them to be able to resolve the remaining issues and that work will start immediately. I now plan to return for further meetings, including with President Juncker on Saturday, to discuss how we can bring to a conclusion this process and bring it to a conclusion in the interests of all our people,” she added.
The prime minister will return to Brussels on Saturday in what will be an emergency meeting to finalize the draft withdrawal agreement and the political declaration it contains.
The emergency meeting was announced after German Chancellor Angela Merkel said she would be unwilling to negotiate with May unless she had a finalized agreement to present at the extraordinary Brexit summit on Sunday.
London and Brussels have signed off on May’s withdrawal agreement, a 585-page document that covers citizens’ rights, the £39 billion (US$49.8 billion) divorce settlement and the contentious Irish border issue.
May finalized her Brexit withdrawal agreement on Nov. 13, and although her Cabinet has reluctantly agreed to support it, it has faced mass criticism from within her party and from the opposition Labour Party, with two of her Cabinet ministers resigning in protest.
Following the summit, the final deal and the non-binding political declaration will face a critical vote in the House of Commons.
The U.K. is set to leave the bloc in March 2019.
|
<urn:uuid:03360105-a8ac-4bb3-9694-ad498ab8ca10>
|
CC-MAIN-2022-33
|
https://worldbulletin.dunyabulteni.net/europe/eu-officials-say-political-declaration-with-uk-agreed-h207442.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.970525
| 459
| 1.679688
| 2
|
About six million women are ‘missing’ each year from the world, of which 2 million are from India alone. This article finds that there are proportionately more missing women in regions with poorer ancestral ecological endowments, both across countries and in Indian districts. It suggests that there was greater gender inequality in terms of command of resources in prehistory in less endowed regions, and the underlying behaviours have been culturally transmitted to the present as norms.
The sex ratio in India continues to be highly skewed in favour of men – there are 1.08 males per female in the total population. This skewed ratio is recorded at birth itself and can be attributed to the son-preference phenomenon. For instance, conditional on the firstborn being a female, the adjusted sex ratio for the second birth in a sample of 133,738 births in 1997 was 1.32 boys per girl. Jha et al. 2006). And if both the first two children were females, the adjusted sex ratio was 1.39 boys per girl. The corresponding numbers were 1.10 and 1.18 respectively if the first two children were boys, indicating that the son preference is a major cause of abortion. Consequently, even by conservative estimates, half a million female births are ‘missing’ every year in India.
Figure 1. Sex ratio in India: 1901-2011
However, this is not just an at-birth phenomenon. Anderson and Ray (2012) find that there are missing women at every age. Figure 1 plots sex ratio, defined as the number of females per 1,000 males, in India since 1901. Ironically, there were more females per 1,000 males in 1901 (and until 1961) than today. Sex ratio in 2011 is roughly the same as 50 years ago in 1961. This is a worrying trend because Indians are, on average, both richer and more educated than they were 50 years ago. Shockingly, it has actually declined in many states despite improvements in literacy rates in those states over the same time period.1 An important question for policymakers then is: Can we identify the factors that determine the cultural norms underlying son preference, and gender inequality in general, that may be responsible for the missing women in India and elsewhere?
Agricultural practices and gender norms
A recent strand of literature studies the role of historical agricultural practices in shaping gender norms regarding the appropriate role of women in the society, which arguably exist even today because of cultural persistence. For instance, Alesina, Giuliano, and Nunn (2013) illustrate Boserup’s (1970) hypothesis that societies whose ancestors practiced plough agriculture have developed less gender equal norms simply because the use of plough led to specialization of labour whereby women made their contribution from home. Consistently, they find that female participation in the labour force, national parliaments, and entrepreneurial activities, are lower in societies whose ancestors practiced plough agriculture. Hansen, Jensen, and Skovsgaard (2015) follow Diamond (1987) in arguing that the move to agriculture itself promoted patriarchal values and beliefs. They argue that these notions have become stronger over time and are more persistent in countries that experienced the Neolithic revolution (agricultural revolution in the Neolithic period2 earlier. They present consistent evidence that gender roles are more unequal in countries with longer histories of agriculture.
Ancestral ecological endowments and missing women
Our recent research (Hazarika, Jha, and Sarangi, forthcoming) furthers this line of inquiry by examining the link between ancestral ecological endowments and sex ratio, both across countries and across Indian districts. We find that there are proportionately more missing women, measured as female-male sex ratios in 2013, in countries whose ancestral ecological endowments were poorer. Note that these sex ratios have been adjusted to account for migrations across countries. We obtain similar results using 2001 Census data at the district-level from India. We argue that there was greater gender inequality in prehistory in regions less endowed with ecological resources. Consequently, the underlying behaviours relating to greater gender inequality over command of resources have been culturally transmitted to the present as norms.
In our study, a country’s ancestral ecological endowment is taken to be the average annual caloric yield per hectare of the crops grown there. Note that we restrict our analysis to crops grown prior to 1500 A.D. or pre-Columbian crops3 since the agricultural landscape was greatly altered by the Columbian Exchange of crops between the New and Old Worlds. The computation of caloric yields is based on a method proposed by Galor and Ozak (2016) that takes into account agro-climatic conditions and population migration. In other words, to better extrapolate into the past when agricultural technology was primitive, our measure of ancestral ecological resources considers potential crop yields based only on rain-fed and low-input conditions. Following Jones and Mann (2004), we argue that this extrapolation of potential crop yield data to the past is possible since the world’s climate has been fairly stable for at least the past one to two millennia.
The link between ancestral ecological resources and missing women is shown to hold even after taking into account a variety of confounding factors like the plough use and years since transition to agriculture. Additionally, our cross-country analysis also controls for current economic conditions, institutions, democracy, and national legal systems, among a host of other factors. Moreover, Carranza (2014) argues that girls have lower economic values in areas with a greater fraction of loamy relative to clayey soils since the former allows for deep tillage and thereby reduces the need for agricultural tasks traditionally undertaken by women. She finds that Indian districts that are endowed with a greater share of loamy soils have a smaller share of female agricultural labourers, and a greater number of missing female children. Our cross-district findings are shown to be robust to the inclusion of district’s endowments of loamy soils.
A potential mechanism
Our research differs from the studies mentioned above in a very important way: Our focus is on gender inequality in well-being, rather than on gender roles. In fact, we find that there is no significant relationship between ancestral ecological endowments and current female labour force participation indicating that the effect of ancestral ecological resource scarcity on missing women is independent of gender roles.4 Our motivation comes from studies that have presented evidence of a connection between resource scarcity and gender inequality in history and prehistory. For instance, there is evidence suggesting that prehistoric women became shorter relative to men during economic scarcity suggesting that scarcity has relatively greater adverse impact on women’s share of nutrition (Cohen and Bennett 1993). Resource environments have also been regarded as an important factor in determining the markedly different gender norms in two very similar species of apes – chimpanzees and bonobos (Wrangham 1986). Finally, anthropologists Hayden, Deal, Cannon, and Casey (1986) find that the lack of subsistence resources is liable to diminish women’s status in the domestic and political spheres. We therefore argue that pre-existing gender inequality in antiquity, gets exacerbated in countries with poor agro-ecological endowments and eventually becomes a cultural norm that persists even today.
Our work suggests that women’s share in resources shrank during times of scarcity not because their bargaining power was adversely impacted, but possibly because theirbargaining power was already lower than men. Essentially, given the strenuous nature of agricultural work, food production was already concentrated in men’s hands (Hansen, Jensen, and Skovsgaard 2015). On top of that, persistent local geography meant that the scarcity born out of poor ecological endowments did not change over time. Consequently, the resulting gender inequality in the division of resources was also persistent and eventually became a cultural norm.
According to a World Bank estimate, 6 million women are missing every year. These women come from every age-group: 23% are never born, 10% are missing in early childhood, 21% in the reproductive ages, and 38% in the age of 60 and above (World Bank, 2011). From the policy perspective, it is important to understand what factors are associated with an improvement in the sex ratio. Our study shows that soil endowments, by determining the yield of pre-Columbian crops, have an impact on missing women in India through the formation of cultural norms. This echoes the finding of Carranza (2014) who shows that presence of loamy or clayey (which require greater strength for tilling) soils can explain a part of the missing women in India.
These findings have important policy implications as the Indian economy remains a significantly agrarian economy as far as employment is concerned.5 It seems that an attempt to increase the economic worth of women for instance, by creating more job opportunities for them may lead to an improvement in the sex ratio. While it takes a long time for the cultural norms to change, awareness programmes that promote the culture of gender equality and empowerment of women is a necessary step in the direction of reducing the number of missing women.
- In Uttar Pradesh, for example, even though female literacy rate jumped by a staggering 17% during 2001-2011, the child sex ratio has declined. Sex ratio has worsened with rising literacy rates even in rich states like Maharashtra and Haryana. In fact, districts with low literacy rates have higher sex ratios in Haryana, the state with the worst sex ratio according to the Census 2011.
- Neolithic Revolution, also called the Agricultural Revolution, marked the transition in human history from small nomadic bands of hunter-gatherers to larger, agricultural settlements and early civilization around 10,000 B.C.
- The phrase ‘pre-Columbian’ refers to the period before the arrival of Christopher Columbus in America in 1492. Some examples of pre-Columbian crops grown in India include rice, sugarcane, millets, black pepper, wheat, coconuts, beans, cotton, plantain, tamarind, etc.
- This is further supported by the fact that the positive relationship between ancestral ecological endowments and missing women is robust to the inclusion of current female workforce participation rate.
- In 2012, 47% of the total employment in India was contributed by agriculture and allied activities while its value added to GDP (gross domestic product) was merely 18%. More importantly, 60% of total employed females were involved in agriculture and allied activities as opposed to 43% of total employed men. Notably, the share of agriculture and allied activities in GDP and employment for most of the developed economies is less than 5%.
- Alesina, Alberto F, Paola Giuliano and Nathan Nunn (2013), “On the Origins of Gender Roles: Women and the Plough”, The Quarterly Journal of Economics, 128(2): 469-530.
- Anderson, Siwan and Debraj Ray (2012), “The Age Distribution of Missing Women in India”, Economic and Political Weekly, 1 December, 87-95. Available here.
- Boserup, E (1970), ‘Woman’s Role in Economic Development’, George Allen and Unwin Ltd., London.
- Carranza, Eliana (2014), “Soil Endowments, Female Labor Force Participation, and the Demographic Deficit of Women in India”, American Economic Journal: Applied Economics, 6(4): 197-225.
- Cohen, MN and S Bennett, (1993), ‘Skeletal Evidence for Sex Roles and Gender Hierarchies in Prehistory’, in BD Miller (ed.), Sex and Gender Hierarchies, Cambridge University Press, Cambridge.
- Diamond, J (1987), The Worst Mistake in the History of the Human Race, Discover, Worthington.
- Galor, Oded and Ömer Özak (2016), “The Agricultural Origins of Time Preference”, American Economic Review, 106(10): 3064-3103. Available here.
- Hansen, Casper W, Peter S Jensen and Christian Skovsgaard (2015), “Modern Gender Roles and Agricultural History: The Neolithic Inheritance”, Journal of Economic Growth, 20(4): 365-404.
- Hayden, Brian, M Deal, A Cannon and J Casey (1986), “Ecological Determinants of Women’s Status among Hunter/Gatherers”, Human Evolution, 1(5): 449-474.
- Hazarika, Gautam, Chandan Kumar Jha and Sudipta Sarangi (2018), “Ancestral Ecological Endowments and Missing Women”, Journal of Population Economics, forthcoming. Available here.
- Jha, Prabhat, Rajesh Kumar, Priya Vasa, Neeraj Dhingra, Deva Thiruchelvam and Rahim Moineddin (2006), “Low male-to-female sex ratio of children born in India: National survey of 1.1 million households”, The Lancet, 367(9506): 211-218.
- Jones, PD and ME Mann (2004), “Climate over Past Millennia”, Review of Geophysics, 42(2): 1-42.
- World Bank (2011), ‘World Development Report 2012: Gender Equality and Development’, World Bank, Washington, D.C.
- Wrangham, RW (1986), ‘Ecology and Social Relationships in Two Species of Chimpanzee’, in DI Rubenstein, RW Wrangham (eds.), Ecological Aspects of Social Evolution in Birds and Mammals, Princeton University Press, Princeton.
|
<urn:uuid:db507360-0ee4-4f4c-b469-40ca49fd0109>
|
CC-MAIN-2022-33
|
https://www.ideasforindia.in/topics/human-development/ancestral-ecological-endowments-and-contemporary-sex-ratios.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.937294
| 2,839
| 3.984375
| 4
|
- Develops a five years sustainable model to accomplish DWAI Missions and Visions within the five years.
- Redefines and churns out new Mission and vision statement to target Goal 2027
- trains its staff and Board on Safeguarding, PSEAH, Child, Financial, and other NGO implementation policies
Deaf Women Aloud Initiative (DWAI) organized a three-day strategic planning meeting to train its staff and Board Members on Safeguarding and other implementation policies. With an expert’s aid, it developed a 5 Years Sustainable Model to accomplish the DWAI target goal in the Five Years timeframe.
Day 1 sees the DWAI Team and its Board engaging in many groups works and individual presentations by identifying the Political, Economic, Sociological, Technological, Legal, and Environmental factors that will shape her targeted 2027 Goal and also by analyzing and building on DWAI’s SWOT (Strength, Weakness, Opportunities, and Threats).
Day 2 sees DWAI redefining its Vision and Mission Statement and mapping out a series of activities in line with achieving its Goal. At the same time, Day 3 focuses on training DWAI Staff and Board on Safeguarding and other Implementation Policies, with Mr. Nweke Solomon serving as the Lead trainer on Safeguarding & Financial Policy while Barr. Uzoma was the lead trainer for PSEAH, & Conflict of Interest Policy, and Child Policy.
To achieve the Goal set for Vison 2027, DWAI Mission and Vison were redefined and overall adopted; they are;
Mission: To Empower Deaf Women and Girls to access Sexual Reproductive Health and rights services for the promotion of an inclusive Society
Vision: A Society where SRHR Information and services are accessible to Deaf Women and Girls without any form of barriers or Exclusion.
The activity formally marks the end of the project “Advancing the rights of Deaf Women and Girls in Abuja, Nigeria,” a project sponsored by the Disability Right Funds (DRF).
|
<urn:uuid:d8eb51b8-704d-45bb-80d6-efd8c8e5b9ec>
|
CC-MAIN-2022-33
|
https://dwai.org.ng/2022/08/06/dwai-organizes-a-3-day-strategic-planning-meeting-for-its-staff-volunteers-and-board-members/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.924058
| 432
| 1.664063
| 2
|
It appears the Zambian Air Force has taken delivery of its two C-27J Spartan transport aircraft, after they were ordered in 2015.
One of Zambia’s C-27Js, registration AF003, was seen at Lanseria International Airport on 21 August, indicating deliveries have been concluded. The first aircraft was spotted in July 2018 in Italy and the second was seen undergoing test flights in December last year at Torino Airport. It was still in Italy in mid-February this year, but in full Zambian colours with registration AF002.
Zambian C-27Js have registrations AF002 and AF003 as the serial AF001 is allocated to the Zambian Air Force’s new Gulfstream 650ER jet that first flew in February 2018 and was delivered to Zambia on 28 February this year. It is believed to have been ordered for $65 million via Israel, where it was fitted with a self-defence system. The G650 takes over from the Challenger 604 (9J-ONE) used by the Zambian government for VIP transport.
In Zambian service, the C-27Js will most likely replace the Air Force’s BAe 748s and supplement its Y-12 and MA60 transport aircraft. They will be based at Lusaka/Kenneth Kaunda International Airport, according to Scramble Magazine.
The Spartan was developed from the G.222/C-27A, using the engines and systems of the Lockheed Martin C-130J Super Hercules to provide 30% lower operating costs than the G.222 and 35% greater range. It first flew on September 24, 1999.
The Spartan offers the ability to carry up to 60 troops in high density configuration and a maximum of 46 paratroopers. In the medical role 36 stretchers and six attendants can be carried. Normal payload is 9 000 kg for the C-27J, although maximum payload is more than 10 tons.
Elsewhere in Africa, Chad, Morocco and Kenya have ordered C-27Js (four, two and three respectively). Chad and Morocco have received their aircraft while Kenya’s aircraft are destined for imminent delivery, with flight testing last year.
Zambia has acquired a number of new aircraft in recent years and is expecting more. In October 2018 Zambian media reported that the government had bought five aircraft from Russia, two from Italy and one from Israel. One of the Russian aircraft is a Sukhoi SuperJet whilst the two aircraft from Italy are the C-27J Spartan transports. Subsequent media reports stated that Sukhoi would only supply a single VIP-configured SuperJet for President Edgar Lungu.
The SuperJet will be delivered this year at a cost of $45-49 million, Sukhoi vice president Yevgeny Andrachnikov said at the Russian Business Aviation Exhibition last year.
Ministry of Defence Permanent Secretary Stardy Mwale last year said the Ministry of Defence through the Zambia Air Force had purchased five aircraft and explained that one would be used for VVIPs, one would be used to maintain airspace and monitor poaching, while the other three would be for commercial purposes.
|
<urn:uuid:cfe056f9-6773-4d00-bbd0-808322e030a0>
|
CC-MAIN-2022-33
|
https://www.defenceweb.co.za/aerospace/aerospace-aerospace/zambian-c-27js-delivered/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.970469
| 651
| 1.539063
| 2
|
With the advent of the 2010 Aluminum Association's Specification for Aluminum Structures, structural engineers will be required to design using new stability provisions. Second-order effects, including P-Δ and P-δ moments, will need to be directly accounted for in the analysis. Factors known to accentuate these effects, such as geometric imperfections and member inelasticity, will also need to be considered. This paper provides an overview of these provisions and describes a study that investigated their effectiveness.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 firstname.lastname@example.org
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 email@example.com
|
<urn:uuid:294616f9-13e2-4189-b31b-f15308f3001f>
|
CC-MAIN-2022-33
|
https://ebooks.iospress.nl/publication/30750
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00064.warc.gz
|
en
| 0.846106
| 241
| 1.78125
| 2
|
If you need some help making your paychecks last longer, CNBC and Bustle have some pointers for you. The two companies have teamed up to launch Young Money, a web series that delivers offers financial advice in the form of short sketches that depict uncomfortable spending-related situations.
In each episode of Young Money, host Akilah Hughes finds herself in a situation where she must decide how stringently to save her money and weigh that desire against any social implications that may result. In one, for example, she must discern the right tone to use while nudging a roommate about rent. In another, she has do decide whether she wants to dive into the world of DIY projects. One of the first clips places Hughes at a restaurant, where her friends want to split the check even though she only ordered a salad. The conclusion of the video is that cash-strapped individuals should have conversations about the check before going out, in order to prevent awkward moments at the table.
Subscribe for daily Tubefilter Top Stories
Young Money is the work of CNBC Make It, a division of the finance-oriented media company devoted to the process of saving money. “Teaming up with Bustle to co-produce Young Money was a no-brainer,” said CNBC Make It Managing Editor Jenna Goudreau in a press release. “The partnership allows us to serve our audiences by offering actionable information on important personal finance topics with a fun twist.”
Episodes of Young Money can be found the websites of both CNBC and Bustle as well as on their respective Facebook pages.
|
<urn:uuid:f1f81b05-53be-43ca-b716-4ef9ce03badb>
|
CC-MAIN-2022-33
|
https://www.tubefilter.com/2017/09/20/cnbc-bustle-young-money/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00064.warc.gz
|
en
| 0.952704
| 325
| 1.585938
| 2
|
At the end of Robert Heinlein’s short story “All You Zombies”, the protagonist, who has managed through gender re-assignment and time travel to be his own mother and father, seems trapped in his own narcissistic circle of causality. After he has completed his cycle of movement and ‘movements’, he speaks to an unnamed other of his loneliness, only to ask of the rest of the world “I know where I came from—but where did all you zombies come from?”
His zombies, it seems, are the agentless walking-living, that teeming mass of people who aren’t causes of their own existence, who look outward for will, meaning, and mission. Zombies, thus, are easy metaphors for the automatic behavior of human beings—the way we mindlessly consume ourselves and the world around us from the moment we’re born until we die. Not being a zombie is, on one hand, a losing battle against appetite and attrition. Not thinking about zombies? Something different altogether.
In the 1990 Christian Slater vehicle, Pump Up the Volume, a wise urban kid moves to a podunk town and sets up his own pirate radio with which he educates and terrorizes the town about music from the Beastie Boys and the Pixies to Leonard Cohen and Ice-T. IN this suburban Phoenix no-town, no threat has been greater since Kevin Bacon stopped dancing than this: the youth’s access to the edgy, alt-music scene that has been eating away at the edifice of corporate cock-rock for several years.
Today is College Radio Day, a day to celebrate and recognize the achievements and contributions of College Radio. While the threat posed by Christian Slater doesn’t really mean that much any more (who’s going to worry about FM Radio when the internet can bring you child-porn and bomb-making instructions?), College Radio is still providing essential and rare service in an increasingly homogeneous and confused radio world. (If not for Public Radio and College Radio, Clear Channel might have ruined everything already).
|
<urn:uuid:ef62052f-edfd-4179-91df-3d7663993163>
|
CC-MAIN-2022-33
|
https://thebrothersj.wordpress.com/tag/the-besties/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.95495
| 433
| 1.609375
| 2
|
Satellite-based sea ice navigation for Prydz Bay, East Antarctica
Hui, F and Zhao, T and Li, X and Shokr, M and Heil, P and Zhao, J and Zhang, L and Cheng, X, Satellite-based sea ice navigation for Prydz Bay, East Antarctica, Remote Sensing, 9, (6) Article 518. ISSN 2072-4292 (2017) [Refereed Article]
Sea ice adversely impacts nautical, logistical and scientific missions in polar regions. Ship navigation benefits from up-to-date sea ice analyses at both regional and local scales. This study presents a satellite-based sea ice navigation system (SatSINS) that integrates observations and scientific output from remote sensing and meteorological data to develop optimum marine navigational routes in sea ice-covered waters, especially in areas where operational ice information is usually scarce. The system and its applications are presented in the context of a decision-making process to optimize the routing of the RV Xuelong during her passage through Prydz Bay, East Antarctica during three trips in the austral spring of 2011–2013. The study assesses scientifically-generated remote sensing ice parameters for their operational use in marine navigation. Evaluation criteria involve identification of priority parameters, their spatio-temporal requirements in relation to navigational needs, and their level of accuracy in conjunction with the severity of ice conditions. Coarse-resolution ice concentration maps are sufficient to delineate ice edge and develop a safe route when ice concentration is less than 70%, provided that ice dynamics, estimated from examining the cyclonic pattern, is not severe. Otherwise, fine-resolution radar data should be used to identify and avoid deformed ice. Satellite data lagging one day behind the actual location of the ship was sufficient in most cases although the proposed route may have to be adjusted. To evaluate the utility of SatSINS, deviation of the actual route from the proposed route was calculated and found to range between 165 m to about 16.0 km with standard deviations of 2.8–6.1 km. Growth of land-fast ice has proven to be an essential component of the system as it was estimated using a thermodynamic model with input from a meteorological station.
|
<urn:uuid:a17d3c0d-0700-453b-9a62-6bc6273386ff>
|
CC-MAIN-2022-33
|
http://ecite.utas.edu.au/124145
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.923263
| 462
| 2.078125
| 2
|
The Polymers Business unit of Total S.A. (“Total”) and Polystyvert, a Montreal-based clean technology startup with an innovative method for polystyrene recycling, today announced the signing of an agreement to work together on the dissolution and purification of household post-consumer polystyrene.
The combination of Polystyvert’s innovative technology and Total’s know-how in industrial-scale dissolution and polymerization technologies should generate high-quality recyclates addressing a broad range of polystyrene market requirements.
Polystyvert has developed an innovative low-carbon-footprint method for recycling polystyrene that is based on a dissolution process. This process produces recyclates which can be used in a broader range of market applications than recyclates produced through mechanical recycling methods. Household post-consumer plastics such as polystyrene often contain contaminants that make mechanical recycling difficult or not practical.
“We are very pleased to collaborate with Polystyvert on this ambitious and exciting journey,” said Jean Viallefont, VP Polymers Europe, Total Refining & Chemicals. “In 2017, Total performed three successful test runs with post-consumer recyclates incorporated in virgin polymer via dissolution and polymerization. Working with Polystyvert to tackle household post-consumer waste is the next logical step for Total.”
‘’We are excited to join forces with Total on the recycling of polystyrene,” stated Solenne Brouard, Founder and CEO, Polystyvert Inc. “Collaborating with Total on household waste will accelerate the industrial development of our technology for global markets and demonstrate its suitability to address any type of polystyrene stream.”
|
<urn:uuid:1a4dabd7-1587-4349-a8ce-4a9a6ca75209>
|
CC-MAIN-2022-33
|
https://www.leanbusinessireland.ie/total-polystyvert-join-forces-recycling-household-post-consumer-polystyrene/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.91284
| 364
| 1.507813
| 2
|
DIY: Masks that help to remove your summer tan
One might resort to different types of treatment to remove the tan from the body. However, not everyone has the time to attend to these treatments. DIYs come here to the rescue.
Honeyand lemon juice:Mix some honey and lemon juice in a bowl and that will help to remove the tan. The honey in the mixture provides moisturisation to the skin while the antioxidant properties of the lemon removes the tan from the skin.
- Oats and buttermilk: Soak the oats in a bowl of water and strain them. Then add buttermilk to it and apply the paste to your to the affected areas. The acidic property of buttermilk helps to remove the tan while the oats help to exfoliate the skin of dead skin cells and other impurities.
Sandalwoodand turmeric: Mix turmeric and sandalwood powder with milk and apply this paste. Sandalwood and turmeric have healing properties which calms the skin and the milk in the mask helps to exfoliate the skin. Coconut milk: Apply coconut milk to the affected areas of your body. Coconut milk has vitamin c in it which helps to remove the tan while nourishing the skin.
- Tomato: Mash a tomato and apply its juice to the affected areas. The acid content in it will help remove the tan. Also, tomatoes help in the collagen production of the skin which helps to keep the skin healthy and firm.
Gramflour: This is a great ingredient which can be used to address different skin issues. When using for tan removal, mix gram flour with olive oil and lemon juice. Apply this paste and let it dry, then wash it off with water. Gram flour and lemon juice help to remove the tan while olive oil helps to provide moisturisation to the skin.
Centre asks states to monitor stocks of tur dal as prices rise
Madhya Pradesh: Three succumbs to poisonous gas after they enter village well in Sagar
Former CJI Ranjan Gogoi creates scholarship fund for law students using his Rajya Sabha salary
Municipal Corporation of Delhi plants 1,300 saplings in a single day; 11 new mini forests to come up
GATE 2023: IIT Madras, NPTEL, Amadeus Labs launch free GATE prep portal
Author Salman Rushdie attacked in New York
Independence Day 2022: Delhi police deploy measures to prevent kites, drones, other flying objects in Red Fort area
Hyderabad: 200 students take part in the National Flag Rally as a part of ‘Har Ghar Tiranga’
|
<urn:uuid:f3d909cf-fc79-4545-804e-105d7e22056d>
|
CC-MAIN-2022-33
|
https://www.timesnownews.com/health/masks-that-help-to-remove-your-summer-tan-honey-tomato-sandalwood-coconut-milk-summer-article-92499499
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.892501
| 548
| 1.601563
| 2
|
Original release date: June 23, 2017
The Federal Trade Commission (FTC) has released an alert on technical-support scams. In these schemes, deceptive tech-support operations offer to fix problems that don't exist, placing calls or sending pop-ups to make people think their computers are infected with viruses. Users should not give control of their computers to any stranger offering to fix problems.
All copyrights for this article are reserved to us-cert.gov
|
<urn:uuid:d24a1b22-f701-4fc9-a405-7632edec6e59>
|
CC-MAIN-2022-33
|
https://blog.igicybersecurity.com/ftc-releases-alert-on-tech-support-scams
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.961632
| 94
| 2.03125
| 2
|
This piece was originally published on March 14, 2014 on Cloaking Inequity.
Each day, I could have up to 10 students in my office, affectionately dubbed the T.O.C., (time out center) by the end of the first period. Students continued to come throughout the day as teachers would simply not allow students to come back to their classroom. Most of the teachers guilty of this behavior were (TFA) Teach for America cohort members who were great hearted individuals, but could not control their classrooms. Most had no sense of cultural competence and frankly felt as if they did not need to know the kids to teach them. When a few teachers attempted to develop relationships with Black students and parents, it seemed disingenuous and painful. Many times, they avoided parent phone calls and conferences because they felt like a confrontation would occur. Students would enter my office daily and say “she put me out for nothing,” “I just got up to sharpen my pencil and she said go to Mr. Griffin, that lady don’t like me.”
Are some charters’ practices new forms of colonial hegemony? When examining current discipline policies and aligned behavioral norms within charter school spaces, postcolonial theory is useful because of the striking similarities between problematic socialization practices and the educational regimes of the uncivilized masses in colonized nations. A number of postcolonial theorists focus on multiple ways that oppressors dominate their subjects and maintain power over them. For example, while working as the Dean of Students for a charter school in New Orleans, it took me some time to realize that I had been enforcing rules and policies that stymied creativity, culture and student voice. Though some of my main duties involved ensuring the safety and security of all students and adults at the school, investigating student behavioral incidents and establishing a calm and positive school culture, I felt as if I was doing the opposite.
My daily routine consisted of running around chasing young Black ladies to see if their nails were polished, or if they added a different color streak to their hair, or following young men to make sure that their hair wasn’t styled naturally as students were not able to wear their hair in uncombed afro styles. None of which had anything to do with teaching and learning, but administration was keen on making sure that before Black students entered the classroom that they looked “appropriate” for learning. As if students whose hair was natural or those whose parents could not afford a uniform tie could not achieve like others who possessed these items.
Most times, teachers and administrators scolded Black students for their appearance before they even spoke in morning. If a student did not have the right shoes, they would be placed in a holding area until their parent could be reached. Sometimes, if their parent could not be reached, those students remained in that area the entire day and given detention. I have absolutely no problem with enforcing school rules or policies, but when schools penalize and prevent Black students from learning and engaging in the classroom because their parents do not have the resources or simply cannot afford the uniforms, I take issue with that and I voiced my displeasure many times.
Each day, I could have up to 10 students in my office, affectionately dubbed the T.O.C., (time out center) by the end of the first period. Students continued to come throughout the day as teachers would simply not allow students to come back to their classroom. Most of the teachers guilty of this behavior were (TFA) Teach for America cohort members who were great hearted individuals, but could not control their classrooms. Most had no sense of cultural competence and frankly felt as if they did not need to know the kids to teach them. When a few teachers attempted to develop relationships with Black students and parents, it seemed disingenuous and painful. Many times, they avoided parent phone calls and conferences because they felt like a confrontation would occur. Students would enter my office daily and say “she put me out for nothing,” “I just got up to sharpen my pencil and she said go to Mr. Griffin, that lady don’t like me.” Teachers regularly abused the mark system we implemented at the school as well.
Students could be sent to my office after receiving 3 marks, but some teachers would focus on certain kids and as soon as they made a sound, they would give them a mark. If I had twenty students sent to me by lunch time, I would have to take those students to lunch duty with me, take them back upstairs afterwards and help teachers manage their classrooms at the same time. Each day, I would average 25-35 students in detention without any follow-up from teachers. Detention became a dumping ground, especially for students exhibiting disabilities (ADHD, ED, etc).
Most Black students with or exhibiting disabilities were pegged as outliers at the beginning of each school year; they were unfairly targeted by some teachers who had deficit attitudes sometimes before even meeting the students. Many times, these students were placed on a “special plan” where their parents had to pick them up early and work would be sent home with them to make it seem like they were learning something. However, the work was never turned in or even requested from teachers. If they were not sent home early, they were given detention. If their behavior was perceived as disruptive in detention, they were given some form of suspension. 98% of the students were Black, but if you happened to be a male and exhibited some form of disability, chances are that you were treated harsher, suspended numerous times and spent several hours a day outside of the learning environment. Many were even sent home for the year after taking the LEAP (Louisiana Educational Assessment Program) standardized tests and treated like throwaways.
When we tried to implement response to intervention (RTI) with students who either possessed or exhibited disabilities, they were immediately moved from tier 1 to tier 3 and some were subsequently placed in special education even though this did not fit the needs of the student. The idea to segregate certain students considered (outliers) was due to administrative convenience and because most teachers perceived them as being unruly, troubled or just plain too academically deficient to be in class with the other students. This allowed teachers to not be held accountable for teaching all kids and prevented Black students from receiving valuable instruction time.
Lastly, everything at the school was done in a militaristic/prison fashion. Students had to walk in lines everywhere they went, including to class and the cafeteria. The behavioral norms and expectations called for all students to stand in unison with their hands to their sides, facing forward, silent until given further instruction. The seemingly tightly coupled structure proved to be inefficient as students and teachers constantly bucked the system in search of breathing room. The systems and procedures seemingly did not care about the Black children and families they served. They were suffocating and meant to socialize students to think and act a certain way. In the beginning, we were teaching “structure,” but it evolved to resemble post-colonialism. Vasquez Heilig, Khalifa, and Tillman (2013) stated that “education was and still is used as a hegemonic form to monitor, sanction, and control civilized people.” Thus, postcolonial theory (Fanon, 1952, 1961; Memmi, 1965; Said, 1978) offers a critical framework through which urban educational policies and practices can be understood and critiqued (DeLeon, 2012; Shahjahan, 2011). They continue their analysis by stating that “at base, post-colonial theorists interrogate the relationship between the legitimized, conquering power and the vanquished subaltern, and ask questions about who defines subjectivities, such as knowledge, resistance, space, voice, or even thought.” Fanon (1961 ) argued, “Colonialism wants everything to come from it.” Essentially, colonizers delegitimize the knowledge, experience, and cultures of the colonized, and establish policy and practice that will always confirm the colonial status quo. In other words, it is important to note that postcolonial studies, though often thought of as relegated to a particular period, are actually also a reference to thoughts, practices, policies, and laws that impact marginalized Black bodies enrolled in charters during the current educational policy era.
|
<urn:uuid:6deb9e13-54a2-4f7d-adcb-beca7daafa9d>
|
CC-MAIN-2022-33
|
https://seattleducation2010.wordpress.com/2016/01/25/colonizing-the-black-natives-charter-schools-and-teach-for-america/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.986564
| 1,708
| 2.671875
| 3
|
By means of the LED energy-saving calculator below, you can quickly and easily see for yourself how much money you can save on your energy bill.
Not only can you see how much money you save, but also what you are saving for the environment. You can namely compare the CO2 emission and sulphur emission from regular light bulbs, HPI lamps, PLC lamps, etc. with that of LED lighting.
You indicate the amount of lamps yourself, as well as which wattage they have, how many hours they burn, and what the price per kWh is. Subsequently the program calculates exactly how much money you can save on your current energy bill!
The calculated values constitute an indication as accurate as possible. For an exact calculation you can of course contact us. We are happy to be at your service!
|
<urn:uuid:cb09eece-927d-4222-b918-ce197d1594c7>
|
CC-MAIN-2022-33
|
https://doublelux.nl/en/lighting-design/calculator/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.962454
| 167
| 1.6875
| 2
|
Afghanistan: Saffron sales dropped between 20 to 30 percent in current solar year compared to the previous year, the Afghan traders said, adding that the prices have also significantly increased.
The traders also called on the Islamic Emirate to facilitate the export of Afghan products.
“We had a 20-30 percent drop in product. Due to less products, the prices have also risen,” said Mohammad Azghar, a trader.
“Last year (1400 solar), the price of one kilo was around 100,000 to 150,000 Afs,” said Shibita Omidwar, a saffron worker.
Meanwhile, traders complained that due to the lack of an air-corridor, the export of saffron abroad has recently dropped.
“We have exports to at least 28 countries. We are facing a lot of restrictions at the moment. One of them is the lack of an air-corridor for saffron exports,” said Nasir Azimi, a saffron trader.
Based on available numbers of the Ministry of Agriculture, Irrigation and Livestock, saffron is being cultivated on more than 8,000 hectares of land across Afghanistan.
The saffron yields of Herat have many times been ranked the world’s top saffron.
|
<urn:uuid:1188bc08-47b7-4d65-8781-aa7002ae3572>
|
CC-MAIN-2022-33
|
https://en.baaghitv.com/afghan-saffron-sales-down-20-30/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.946636
| 279
| 1.796875
| 2
|
“I grew up at my grandmother’s house, and she had a beautiful garden. I used to hate mowing the lawn and weeding, which is what you do when you’re a kid. I loathe gardening, but I love gardens, and I have two beautiful gardens.” – Elton John
A beautifully manicured and maintained lawn is seen by many people across the globe as the highlight of a magnificent garden. Additionally, it is important to note that there are a time and cost price to be paid for the perfect lawn.
According to the quotation mentioned above by Elton John, it takes a lot of hard work to ensure the perfect lawn. Moreover, lawn maintenance is a process that spans all twelve months of the year. This is true even for regions where it snows in winter.
Traditionally, winter is the time where lawn-maintenance plans are reviewed and gardening equipment is cleaned, oiled, and maintained. A critical part of the winter equipment maintenance plan is to ensure that all blades like lawnmower blades are sharpened.
Pest control as part of your garden maintenance
Unfortunately, pests can invade your lawn just like weeds do. A typical example of this is the garden spider, or more specifically the Wolf Garden Spider.
Therefore, the question that must be asked and answered is: “How do you prevent pests from taking over your lawn?”
The simple answer is that you engage with pest control specialists like Boston Spider Control for a comprehensive garden spider, and other common pest, management program.
Before we look at practical tips on how to manage garden pests, it must be noted at this juncture that it is far better to prevent pest infestations from occurring than trying to remove them after they have moved in. Also, while using poisonous chemicals such as pesticides is a common method to remove a spider infestation, these chemicals will kill the good insects and invertebrates like earthworms.
As an aside, the earthworm’s primary role is to aerate the soil allowing air and water to penetrate the soil sufficiently. Finally, the earthworm also helps break down organic matter like compost and grass clippings to fertilize the soil.
Tips to manage and control garden pests
By way of expanding on the question that was asked and answered earlier, here are a few simple tips on managing and controlling garden pests:
Remove the pests’ natural environment
It is vital to ensure that all tree leaves, grass cuttings, and other garden refuse are regularly picked up and put onto a compost heap or disposed of properly. This will prevent pests from making their homes in the piles of garden refuse if it is left lying around. It is safe to say that this is an imperative of pest prevention and control.
Keep your lawn healthy
A dense, lush lawn with healthy grass will naturally repel pests from moving in. Thus, it is extremely important to ensure that your grass is well-looked after to ensure healthy growth. Activities that promote a healthy, well-maintained lawn includes regular cutting, feeding, and watering.
|
<urn:uuid:3b0968c2-0760-4a85-89e0-74d79af28b8c>
|
CC-MAIN-2022-33
|
https://www.onlinepatiolawngardenstore.com/maintaining-a-perfect-lawn-ways-to-control-a-garden-spider-infestation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.95842
| 637
| 2.484375
| 2
|
The House on the Rock is a vacation home turned tourist-attraction experiment in southwestern Wisconsin between Spring Green and Dodgeville. Builder Alex Jordan, Jr., dreamt up and built this retreat, and its peculiarity accumulated interest. Eventually, Jordan reluctantly gave tours for a few quarters and then saw the potential for a tourist trap. He began building wild additions and expanding his collections. In 1960, he opened the House on the Rock to the public.
Displays change from room to room. The world’s largest carousel twirls 269 animals. But none are horses, and visitors aren’t allowed to take a spin. There’s also a 200-foot, whale-like sculpture surrounded by model ships. Each room has its own theme and set of collections. One is even filled with self-playing instruments.
The Infinity Room is a hallway-like sunroom that juts out from the house, almost like it’s running away from the madness inside. The cantilever extends 218 feet with windows all around, reminiscent of the Guthrie Theater’s 178-foot “Endless Bridge.” The Infinity Room overlooks the gardens, providing solace from the overwhelming exhibits.
Knick knacks, figurines, and replicas fill the house. Some are labeled and some simply rest on overflowing shelves. Most of these pieces aren’t authentic. They were created to fill space and overwhelm you with excess. It is purely shock factor, a learning experience of its own—immersing visitors into the mind of Alex Jordan, Jr. To learn more, read this piece by Rachel Hutton.
Eat, Play, Stay
The House on the Rock, once built as a hideaway for Jordan, now has lodging for guests in the The House on the Rock Resort and The House on the Rock Inn. The inn has pools and recreation while the resort offers amenities like a 27-hole golf course.
For more architecture, visit Taliesin, the former home and estate of Frank Lloyd Wright. Other architectural projects like the Romeo and Juliet Windmill as well as the Hillside Assembly Hall are scattered around. A visit to these historical sites shows off the mid-century minimalism that made Frank Lloyd Wright famous.
Tower Hill State Park and Peck’s Landing make perfect spots for nature enthusiasts. Kayak at the landing or hike through the wooded paths of Tower Hill. Saturdays, the Spring Green Farmers Market provides another calm setting and supplies for a potential picnic in the park.
Arcadia Books has shelves stocked full of novels and a cafe of sweets. This independent bookstore will give a feel of the Spring Green local charm. For a sit-down meal, check out Arthur’s Supper Club, boasting juicy steaks and seafood. Nearby, The Old Feed Mill’s name may sound rustic at best, but this restaurant combines delicious food with pre-Civil War history.
Spring Green, Wisconsin, would be a memorable spot even without the House on the Rock. But with this cooky attraction, this town becomes a must-see trip.
|
<urn:uuid:849c021c-9762-48a2-9733-1cec1a9c3be7>
|
CC-MAIN-2022-33
|
https://www.minnesotamonthly.com/travel-recreation/road-trip-the-house-on-the-rock/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.942654
| 638
| 1.554688
| 2
|
Introduction: Arduino - Rotary Encoder Simple Example KY-040
Hello world! This is a example on how to use the KY-040 Rotary encoder.
Its very basic but if your new to arduino or could not find any code, then you have something to start with.
because there is little documentation about the Keyes sensor kit.
Follow the next step for the Code Schematic and Parts List.
Step 1: Schematic Code & Parts List.
- Arduino uno I used the RobotDyn Uno, a chinese copy with 7 analog pins.
- Rotary encoder KY-040.
- RGB Led KY-016 (don't need this can use any leds).
- Set of Jumper wires MM/FF/MF.
|
<urn:uuid:0d8eb5b3-24fb-440b-bf30-eae4ccc744d4>
|
CC-MAIN-2022-33
|
https://www.instructables.com/Arduino-Rotary-Encoder-Simple-Example-KY-040/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.739375
| 170
| 2.4375
| 2
|
A short while ago a friend of mine started volunteering with a local community project* based out of her home town.
My friend owns an organic local produce stall that she runs out of an upscale food market in Boston. She’s also started supporting a local non-profit whose goal is to help law enforcement officers watch their weight.
Apparently there’s an obesity epidemic among law enforcement officers across the United States—and, contrary to what we see on television (who would have thought?), law enforcement officers are far more likely to die from cardiovascular disease than they are from anything a criminal might do to them. So, my friend started running cooking classes for law enforcement officers, showcasing quick and simple recipes that were also good for the heart. She also offered a discount so local law enforcement personnel could buy produce from her store at cost price.
By the time we spoke, she’d run three or four workshops—each with about 10 officers—officers who, by all accounts had a great time at the cooking classes (unsurprising given they got to eat my friend’s food afterwards and she is, without a doubt, the best cook I know).
“How many of the officers have been back into the store to buy produce?” I asked (my cynical evaluator brain fairly sure I knew the answer). She paused, thought for a moment then answered: “You know, not a one.”
The trouble with people…
As an evaluator, this news wasn’t particularly surprising. Many social programs are, at their heart, efforts to change peoples’ behaviour. Teacher training programs, health promotion initiatives: so many social programs rest on changing an individual’s behaviour. And, as pretty much any human will tell you: changing human behaviour is notoriously tricky.
A cooking program like this is no different: this particular program tries to change the way law enforcement officers shop, cook, and eat—the problem being, there’s a lot that goes into converting workshop attendance into kitchen table habits.
What to do?
Two handy heuristics come to mind as helpful ways of thinking about the factors that influence attempts to change behaviour: (1) Michie and colleagues’ Behavior Change Wheel, and (2) Bronfenbrenner’s ecological model of development.
The Behavior Change Wheel
Research on behaviour change says that people need three things to change their behavior.
- They need to be motivated to change [i.e. they need to think the new behaviour is a good idea; that doing it will have positive effects; and, most importantly, they need to wantto make the change]
- Additionally, people need to have right skills [i.e. they need the time, resources and capacity to make the change]
- And finally, they need to be in an environment that the supports the change [i.e. they need to be surrounded by people, institutions, organizations who encourage, expect and support them to make the change].
Initiatives that target only one or two of these three elements often fall short because they overlook the critical levers that make behaviour change possible.
Image source: http://www.behaviourchangewheel.com/about-wheel
In their book The Behavior Change Wheel: A Guide to Designing Interventions, authors Susan Michie, Lou Atkins and Robert West summarize 19 frameworks for behaviour change, extracting these three high level levers as the common thread.
The authors also identify a series of 9 common interventions that are used to target the three levers of change–creating a fabulous resource for program designers and evaluators alike.
Before the Behavior Change Wheel, developmental psychologist Uri Bronfenbrenner wrote that individuals do not exist in isolation.
Instead, we’re like onions, our daily behaviors and beliefs shaped by layer upon layer of influences.
We’re influenced, for example, by our immediate environment (including our families, colleagues, friends). We’re also influenced by the people and institutions that these people interact with, including schools, industries, public transport systems, as well as broader societal influences like state and national culture, the mass media, political systems etc.
Attempts to shift an individual’s behavior are more likely to succeed when they target multiple layers of the onion instead of only one.
In my friend’s case, the law enforcement officers’ families might be the most useful layer to target. A few key questions immediately come to mind:
- Who does the shopping in these households?
- Who does the cooking?
- Are the law enforcement officers the people who do the shopping and the cooking? If not, there’s no clear thread between what they learn in the cooking classes and what makes its way onto the kitchen table.
Looking more broadly—where do our officers live? Can they access the market easily? Or do they need to go out of their way, outside their usual routines to get to her stall to buy the food they need to make the new foods?
Will either of these models guarantee a program designer can create a program that leads to behavior change? Of course not. But using these heuristics might be a way to keep in mind the multitude of factors that shape the way an individual behaves—and therefore the many factors that need to shift in order for us to see sustained change at the individual level.
*Some elements of the project adapted for anonymity.
|
<urn:uuid:de4ae18d-879e-4472-b8b7-372becfea31d>
|
CC-MAIN-2022-33
|
https://cere.olemiss.edu/encouraging-change-a-wheely-big-task/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.953369
| 1,137
| 2.15625
| 2
|
It's a high-stress, demanding life for teens today. Using evidence-based material from a Mindfulness Based Stress Reduction (MBSR), youth will learn skills to help them better manage feeling overwhelmed, anxious, stressed and depressed through the lens of mindfulness. This fun and interactive class will be facilitated by Warren Township Youth and Family therapist Cindy Cardenas, MA, LPC. Please direct any questions to firstname.lastname@example.org.
Grades: 6-8 Day: Thursday Date: 10/6-11/17* Time: 4:30 – 5:15 pm
Grades: 9-12 Day: Thursday Date: 10/6/-11/17* Time: 5:15 – 6:00 pm
*No class on 10/27
Grades: 6-8 & 9-12 Day: T Date: 2/15 - 3/15 2022 Time: 5:00-6:00 pm (6rd-8th) - 6:00-7:00pm (9th-12th) Weeks: 6
Fee: FREE Location: Warren-Newport Public Library (224 O'plaine Rd. Gurnee, IL 60031)
|
<urn:uuid:b7859ca8-8ba7-4547-ae40-8442ff28623e>
|
CC-MAIN-2022-33
|
https://warrentownship.net/CivicAlerts.aspx?AID=64
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.825871
| 251
| 1.960938
| 2
|
|"Rose Arbor" (oil on linen, 8" x 10")|
click here to buy
River Farm in Alexandria, VA used to be owned by George Washington; it is now the headquarters of the American Horticultural Society. It is also beloved by plein air painters who are welcomed to add the artistic touch to the already enchanting landscape. Sara Linda Poly's plein air class met there yesterday on a perfect spring day. I painted "Spring at River Farm" at my favorite spot, looking at the stone statue of a young faun (or satyr, as the ancient Greeks would have called it) through the red-brick pergolas.
As you can see, I have already painted the same scene from a different perspective. What was funny is that my friends also painted their favorite scenes they had painted before: Charlotte painted the white manor house as she did the last year and Alice painted the azaleas against trees likewise. We seemed to be obsessing over the same thing all over again! This is something on which psychologists can shed light.
|
<urn:uuid:fb74d486-95be-4d13-b1c9-577a58dd8bad>
|
CC-MAIN-2022-33
|
https://kimstenbergart.blogspot.com/2011/04/spring-at-river-farm-oil-12-x-12.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.975943
| 230
| 1.671875
| 2
|
Magazines have been around in one form or another for over two centuries. Long before the United States was the country it is today, magazines have been used to express an opinion, give the news, or contain information that caused a small nation to fight to become free from tyranny and oppression. Many famous men one published magazines for the public like Benjamin Franklin. If a business is creating a media contacts list, then it is important that the list contain magazines because there are a lot of benefits to advertising in one that business owners and companies have to consider.
The Benefits of Businesses using Magazines for Marketing
For a long time, magazines have existed, and for some time, they were the one and only source of information. Today, magazines do contain information like news, but they also contain much more like fashion advice, home improvement tips, and many more things that people want to know about such as their favorite hobby or kind of pet. For business owners formulating a media contacts list, here is more information on why advertising in a magazine is a good idea:
- Magazines have a good Distribution:
There are many magazines that are available in a certain region, but there are some that are available across the entire United States and around the world. Businesses who want to advertise with magazines are making a good decision because the advertisement is going to go to every state in America, which can help a business expand their customer base.
- An Advertisement that is kept for a Good Time Frame:
Some magazines come out once a month, but some have a longer time frame like once every few months or even a little as twice a year, which means that the same magazine can literally be on the shelves for three to six months. A business that buys an advertisement for a magazine that is on the newsstand for months can mean that they really get their money’s worth because that advertisement can be seen by a lot of people for anywhere from three to six months at a time.
- A High Quality Advertisement at a Reasonable Price:
Newspapers do not have advertisements that are in color unless they print a separate flyer that is put into the newspaper itself. Magazines do create beautiful high quality advertisements that are part of the publication itself, not just an inset that is put into the folded paper. Businesses who pay for an advertisement will get a high quality one that will give quite an impression to anyone who reads them because clearly the business owner wants only the best and is willing to pay for it.
Magazines should be part of a business owner’s list of media contacts because the publications are considered to be more popular and have been out longer than newspapers. There are many different magazines available, such as for news, fashion, and even different kinds of hobbies. Magazines have shaped the opinion of people for centuries, and businesses should consider them when they are looking for ways to advertise their merchandise.
Simple Ways To Feel More Confident At The Gym
If you are new to the gym, or you haven’t been in a while, sometimes you might not feel completely...
Can You Use Residential Property for Commercial Use
Having extra income, constantly flowing in can make all the difference in the current economy. Getting creative with how you...
Running a Business? How to Minimize Supply Chain Issues
Supply chain issues have always been an issue for businesses but over the last few years, the effect and widespread...
How to Increase Your House Value Before Selling
Increasing home value is the first step to making your place more attractive for future buyers. Whether you are trying...
Why Calorie Control Is Still The Best Way To Diet
There are a great deal of different options when it comes to dieting, every day there seems to be a...
The Benefits Of Trade Credit Insurance For Your Business
Trade credit insurance provides cover for businesses who trade on a credit basis. If the people who owe money for...
5 Charming Restaurant Decor Ideas In 2022
Making your restaurant memorable and stand out is a feat worthy of praise. The sheer pressure of wanting to succeed...
Bank Won’t Fund Your Business? 4 Loan Alternatives To Get You Started
Businesses typically require some sort of collateral or proof of concept before funding their business venture. However, it is possible...
Planning A Stag Do
If you’re a Best Man then you’re in a unique position of responsibility, and before the day itself when you’ll...
What Triggers Eczema | Tips to Reduce Eczema Flare-Ups
Eczema is a skin condition that can induce redness, itchiness, and skin inflammation. Its root cause is not fully understood,...
Women’s Fashion Trends To Expect In 2022
A new year means new fashion trends. We cannot wait for what is in store in 2022. It seems that...
Home Makeover Trends: Insights from The Pros
Are you considering a home makeover but don’t know where to start? You’re in luck! In this article, we will...
Interior Design Trends 2022
We all spend time pining over other people’s interior’s on Pinterest or Instagram, but with these trends, it’s easy to...
Top Commonly Overlooked Car Maintenance and Repairs
Maintaining a car is a huge responsibility. There’s a lot that goes into that given how complicated a machine it...
What Is The Difference Between Strata and Property Manager
Real estate is a diverse market, and as such, it can be hard to determine the differences between various types...
Tech7 years ago
Creating An e-Commerce Website
Tech7 years ago
Design Template Guidelines For Mobile Apps
Business6 years ago
The Key Types Of Brochure Printing Services
Business2 years ago
What Is AdsSupply? A Comprehensive Review
Travel10 years ago
Who Else Wants Also Nfl Hat
General7 years ago
Kobe Bryant With His Unique Nba Jerseys
Tech8 years ago
Why Small Businesses Can't Ignore Mobile Technology
Tech7 years ago
Climb Google Using These Checklists
|
<urn:uuid:df29a5e3-972c-4fdf-9843-c46bb6976703>
|
CC-MAIN-2022-33
|
https://radcity.net/magazines-are-good-for-advertising/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.945494
| 1,297
| 2.234375
| 2
|
A chance meeting at London's Speakeasy nightclub in early 1967 led to Cream guitarist Eric Clapton asking the late Australian ‘pop’ artist Martin Sharp to create the cover to Cream’s psychedelic masterpiece Disraeli Gears.
“I just started chatting to Eric,” Sharp told Classic Rock in 2003, speaking from his art studio in Sydney, Australia. “I told him I had written a poem. He in turn told me he’d written some music. So I gave him my poem. Two weeks later he turned up with it [Tales of Brave Ulysses] on a B-side of a 45 record”.
Clapton moved Sharp into a studio apartment on London’s trendy Kings Road and asked him to create a cover for Cream’s next album.
“Originally Robert Whitaker took some photos from one of their tours,” Sharp said, explaining how the artwork came about, “but they ended being used for the back cover instead.
“So I got hold of a publicity shot and cut it up, along with cut-outs from various books, laid the pieces out and stuck them together as a collage on a 12-inch square. I did some drawing outlines, and then painted all over it with fluorescent inks and paints of the time. I really wanted to capture that warm electric sound of their music in the colours and expression of the cover”.
The inspiration for the Disraeli Gears cover had come to Sharp while he was visiting Cambodia: “On my way to England I’d gone there,” he recalled. “And in one of the towns I visited there were these amazing sculptures with faces on each side, and huge trees growing out on top of these sculptures.
"Over the years these great trees had taken root and grown. I suppose I thought that was a bit like the band, where you could see three of their faces, and the music coming out of their heads”.
Sharp soon received another commission from Clapton, for the cover of Cream’s next record, the half-live/half-studio double album Wheels Of Fire. Sharp continued his art for various other artists over the following years, the bulk of which were spent working with American oddball Tiny Tim. He passed away in 2013.
The original version of this feature appeared in Classic Rock 56, in June 2003.
|
<urn:uuid:dc415662-47f6-45c9-814b-bd018f1a0084>
|
CC-MAIN-2022-33
|
https://www.loudersound.com/features/the-story-behind-the-album-cover-creams-disraeli-gears
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz
|
en
| 0.983101
| 505
| 1.554688
| 2
|
Website Development Best Practice For Form Design
Website development involves complex strategies and skill to create a website that will help business growth. An integral step to achieving that goal is building the forms that companies need on their websites that will attract users, enhance user experience (UX) and help boost conversions. Form design requires a whole lot of ‘know-how’ that the average person doesn’t have.
Form design is the process of creating a web form where site visitors can input and submit their information while keeping the form’s layout, format, appearance, and other factors in mind. From registration forms, surveys, billing or shipping forms, customer feedback forms, email sign up forms and more, professional website development designs web forms that are eye-catching, brand-relevant and easy-to-use.
A best practice is to improve user interface as a way to enhance the user’s experience for inputting information into a web form. Web Form User Interface (UI) is the part of a device (smartphone, tablet, etc) that a user directly interacts with (screen or keyboard). KC Web Specialists follow Google’s best practices for website development of user-friendly forms, including user interface (UI) design, mobile form design, and call to action (CTA) design.
There are three main parts to a form’s user interface that website development focuses on when creating forms: structure, layout, and patterns.
Form structure is the order in which the fields on the form appear, and how the fields and sections flow from one to another. Best practice includes multiple steps and many fields, split into different steps and pages to make the process easier for users to navigate.
When designing the layout of the form fields, website development groups fields together appropriately and organizes them based on the type of information a user is providing.
Website development uses many different design patterns, based on specific needs, such as for creating a password. Patterns work over and over again to improve the form’s UI and ease of use.
Mobile form design is a crucial component of website development that ensures the written and visual content of a form fits every device’s screen.
Most web forms include a call-to-action (CTA) of some kind. The design of a CTA, especially on your landing page, is critical because it can drive prospective customers to convert to leads. Website developers implement CTAs based on the specific enterprise and goals and place them on the form or web page to grab user attention.
No matter what type of business you’re promoting, chances are you need at least one web form on your site. Best practices provide better user experience, user interface, mobile compatibility, and CTA so that visitors to a website will have a reliable and positive experience that helps boost conversions.
At KC Web Specialists, we’ve helped hundreds of Kansas City businesses reach their goals with our website development techniques and strategies. If your website is not performing effectively and generating new leads and new business, think about professional website development that applies best practices, which are a proven way to meet all your business objectives. Contact us today for a FREE website evaluation.
(913) 489-7866, ext. 107
|
<urn:uuid:dbe575e5-4426-49eb-aaec-1662fae5a8ff>
|
CC-MAIN-2022-33
|
https://www.kcwebspecialists.com/website-development-best-practice-for-form-design/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.927188
| 673
| 2.34375
| 2
|
How do you abbreviate seconds?
You can use the following abbreviations for seconds: sec s If you are writing about more than one second, the plural abbreviation is the same as the singular. These examples can help: 1 sec 2 sec 45 sec 1 s
Join Alexa Answers
Help make Alexa smarter and share your knowledge with the worldLEARN MORE
|
<urn:uuid:7729c867-59d2-418a-b57a-53aa11464db5>
|
CC-MAIN-2022-33
|
https://alexaanswers.amazon.com/question/1nmSR6Bo48Np7PO4bomRTU
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.853026
| 77
| 2.125
| 2
|
A fantastic computing system can enable you do excellent things. It is the device that can convey your concepts to everyday living, aid you do your get the job done, and showcase your vision to all people. Fashionable PCs are more quickly, thinner and lighter, and hugely protected, and fit the realm of perfect computing units.Pcs have developed above the final many yrs. From becoming huge dull boxy machines to extremely-light-weight modern day PCs that can get a lot much more carried out, in extremely tiny time. If you’re seeking to buy a new device or improve from an older just one, you need to be hunting at a new contemporary Computer.But what is a modern-day Personal computer?A present day Laptop is a slim and light pc that’s much more effective, a lot quicker, productive, tough and protected than a regular Personal computer, excellent for your house or business office or on the go. Present day PCs occur with Home windows 10, powered by Stable State Push (SSD).Just one rationale why your present-day laptop is gradual is because of that old standard hard drive. Not only are they bulky, but they also slow down your experience. 1 solution is to switch to a fashionable Computer system with a SSD. An SSD is not only thinner and scaled-down, but it’s also significantly more more rapidly than mechanical hard drives.Why pick out a modern Laptop with an SSD?Contemporary PCs that pack SSDs get there in much thinner and lighter styles. This indicates a modern laptop computer that can be your fantastic day by day driver, be it for college, workplace, household, although you are touring, gaming or viewing videos.Apart from generating your modern Laptop slimmer, SSDs also give a velocity increase. You can boot your laptop significantly speedier, and hearth up your favorite purposes in no time, expertise better responsiveness and multi-activity at simplicity. You can even load those people hefty video email attachments considerably quicker with SSD.Contemporary PCs are far more secure than everModern PCs are developed with protection in mind. Trying to keep your private data safe is a lot more essential now than at any time. Fashionable PCs pack the genuine Home windows 10 working technique that arrives with several security instruments that preserve your info harmless and protected.Home windows 10 assists preserve the undesirable fellas absent with an in-crafted set of safeguards that silently do the job in the background although you happen to be finding factors carried out on your fashionable Laptop. Home windows Hi can change your facial area into a password, so you never have to enter those intricate passwords every solitary time you want to log in.But what about battery lifetime?You really don’t want to operate out of juice in your battery even though offering that million-dollar presentation. Modern PCs have you coated with SSD, as these take in considerably less electricity and have much less shifting sections, indicating you get a lot more battery lifestyle.This allows you to get much more essential points carried out, with no stressing about rapidly running out of battery on your notebook.Wait, you can find a lot moreLoaded with the hottest functions* like Cortona, Ink, Hi there, Contemporary PCs are a perfect healthy for your demands. You also get a suite of apps which include Workplace 2019 which incorporates Microsoft Word, PowerPoint, Excel, and additional.When it arrives to receiving items accomplished, there’s no substitute for a contemporary Personal computer. From creative pros to higher education pupils, every person is looking for that ideal computing device that’ll help them get their get the job done done with out slowing them down. With Modern day PCs with Windows 10 and Workplace 2019, powered by SSD, you can prevent worrying and set oneself up for achievements.*The capabilities availability and experience may fluctuate by units and area.
|
<urn:uuid:c5d9933e-5f7d-4d7c-b5af-0919c2727d56>
|
CC-MAIN-2022-33
|
https://techweu.com/how-the-modern-day-computer-can-aid-you-get-far-more-completed-in-less-time-techweu/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.94503
| 783
| 2.359375
| 2
|
I confess that from my perspective, throwing is far more satisfying than slip-casting.
I love the spontaneity and sense rhythm you feel when throwing. The first step is of course to prepare the clay for throwing. This is called “wedging” and is a process of kneading the clay to ensure a regular consistency and to eliminate any trapped air.
The clay is they made into a ball and thrown onto the centre of the wheel head. The next step is to “centre” the clay and it often surprises people how much strength / pressure is required to get that lump of clay running dead centre on the wheel without any wobbles!
The wheel needs to be turning fast and you need plenty of water for lubrication. Once centred you must create an opening in the top and drill down towards the wheel head but leave sufficient thickness for the base of the pot.
The hole is then opened up to create the inside diameter of the pot you want to make thus you have something that looks a bit like a doughnut. The walls of the pot are made by squeezing the clay between the fingers of your left hand (which is inside the pot at 4 o’clock) and the fingers on your right hand (which is outside the pot again positioned at 4 0’clock) as the clay spins. As you apply pressure you slowing lift your hands upwards and the clay pot will grow with your hands – this is the throwing process.
To counter-act the natural tendency for the pot to flare outwards (due to centrifugal force) it’s important for your hands to travel in an upwards and inwards motion – as if drawing a line on a cone.
This is repeated several times until the wall thickness is thin enough and even from top to bottom. By following this ‘cone line’ you should be able to maintain a cylindrical shape until such time that you want to create the final shape.
To create a bellied shape the fingers on your left hand (inside the pot) apply more pressure than the fingers on your right hand. To create a neck / narrower shape, the opposite is true – the fingers on your right hand outside the pot apply more pressure than those on your left hand.
|
<urn:uuid:7f99cc4c-a69c-4a4d-a1e5-b857c2b73701>
|
CC-MAIN-2022-33
|
https://trevordyerceramics.co.uk/throwing-the-pots/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.94686
| 462
| 2.8125
| 3
|
Portable alternative power generations like this one are handy during extended blackouts and can make good starter kits for some tiny houses.
The size of a system depends on what you need to run; for example if you just needs lights and communications a very small system will do. If you need to power a refrigerator, well pump, and/or clothes washer the system will naturally need to be bigger.
You can build solar systems yourself with all the necessary parts or buy prebuilt packages like the one pictured here to help you get started.
To learn how to build your own solar system I’ve linked a few how-to articles from other websites below:
- Eartheasy Blog – Simple DIY Home Solar Power System
- Mother Earth News – DIY Solar Power System Offers Easy Emergency Power Supply
- Off Grid Quest – 4 Videos – A Small Introduction to DIY Solar
|
<urn:uuid:82486d0c-bdfd-432d-bb2b-a10b4241602b>
|
CC-MAIN-2022-33
|
https://tinyhouseliving.com/tag/system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.882596
| 180
| 2.28125
| 2
|
Motor Vehicle Excise Tax
All Massachusetts residents who own and register a motor vehicle must annually pay a motor vehicle excise tax.
The city or town where the vehicle is principally garaged as of January 1 levies the excise.
- Excise bills are prepared by the Registry of Motor Vehicles according to the information on the motor vehicle registration.
- Excise tax bills are calculated with a tax rate of $25 per one thousand dollars of valuation.
- Excise tax bills are prorated on a monthly basis. If a vehicle is registered for any part of a month the tax will be due for all of that month.
- Excise tax is due 30 days from the issue date of the bill. All bills must be paid in full within the 30 days. Partial payments are not accepted.
Remember that when you register a motor vehicle, an excise bill is generated and you are responsible for its payment.
- If the excise tax is not paid within 30 days a demand will be issued with a fee of $15 plus interest.
- If the demand is not paid within 14 days the bill with turned over to a Deputy Collector for collection and additional fees will be added to the bill.
- The final step in the collection process entails the marking to the license and registration of a person for non-renewal.
- If you move within Massachusetts or out of state, if you sell or trade your motor vehicle, or if it is stolen, you need to make every effort to obtain the bill and pay it and then apply for an abatement if you are eligible.
Vehicle values are set by the RMV and are for taxation purposes only.
- Values are based on the manufacturers' list price for vehicles.
- The initial value is set for the designated year of manufacture.
- This value depreciates by a set figure for five years and then levels off as follows:
- In the year preceding the designated year of manufacture - 50%
- In the designated year of manufacture - 90%
- In the second year - 60%
- In the third year - 40%
- In the fourth year - 25%
- In the fifth and all succeeding years of ownership - 10%
If you believe you may be entitled to an abatement of the excise tax bill:
- It is strongly recommended that the bill be paid in full
- Read the Abatement Application Instructions (PDF)
- If you believe you qualify, fill out the Abatement Form (PDF) and mail or bring it to the Assessor's Office
- If an abatement is granted then any remaining tax due must be paid within the original 30 days
All questions regarding abatements should be directed to the Assessor's Office at 781-698-4570.
Excise tax exemptions for vehicles owned by certain disabled individuals and veterans, ex-prisoners of war and their surviving spouses and certain charitable organizations under Massachusetts General Law, Chapter 60 A Section 1. Please contact the Assessor's Office for further details on eligibility.
|
<urn:uuid:36f88351-5d28-45c9-b79c-062ea8621b7b>
|
CC-MAIN-2022-33
|
https://www.lexingtonma.gov/517/Motor-Vehicle-Excise-Tax
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.928414
| 641
| 2.0625
| 2
|
Fundamental CDRs are composed of sensor data (e.g. calibrated radiances, brightness temperatures) that have been improved and quality controlled over time, together with ancillary calibration data.
NOAA CDRs are derived from a variety of satellites and instruments. The launch, maintenance and decommissioning of satellites can be found on the WMO's Observing Systems Capability Analysis and Review Tool (OSCAR) website.
As satellites or instruments change, there will be changes to how CDR data is derived and provided. Information on the impact of each individual CDR will be updated as resources allow. The Fundamental NOAA CDRs are also available via Amazon Web Services (AWS).
|
<urn:uuid:b84be6be-5b92-44cc-80ca-9576f6f3ee3e>
|
CC-MAIN-2022-33
|
https://www.ncei.noaa.gov/products/climate-data-records/fundamental
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.905256
| 140
| 2.4375
| 2
|
Anger is a normal, essential, useful and natural human emotion. It tells us when our boundaries have been crossed and can help us keep ourselves safe. Anger is a problem-solving emotion, it gives us energy and motivates us to act. However sometimes, particularly if we are stressed, our anger can take control of us, causing us problems in our lives.
The report, Boiling Point, by the Mental Health Foundation (MHF) in 2008 and based on a sample of almost 2000 people all over the country, states that more than 1 in 4 people worry about how angry they sometimes feel, 1 in 3 people say that they have a close friend or family member who has difficulty controlling their anger, and 1 in 5 say that they have ended a relationship or friendship because of how the other person behaved when they were angry.
How can one-to-one anger management help?
If you feel that your anger is controlling you, rather than the other way around and you are ready to make changes and do something about it, then we can work together, one-to-one, to help you manage your anger more effectively.
I’m trained to deliver the Citizen Coaching www.Citizencoaching.com anger management programme. They have experience from over 20 years working face to face with anger management and relationship problems. Nearly 9/10 people said taking the course had made a dramatic difference to their lives, with 89.5% saying it was effective in reducing the intensity of their anger and helping them be angry less often.
The course runs over 6 weeks and because we will be working one-to-one, I will be able to tailor it to suit your particular needs. Some of the things the course covers are:
The impact of stress and your environment on your anger
What to do when you feel things could ‘kick-off’ at work or at home
Understanding what your personal (everyone is different) triggers are
How to reduce the amount of anger you’re feeling
Dealing with your anger in a positive way
My anger is not the whole story
Perhaps you are going through a particularly tough time in your life, for example a divorce, custody battle over children, moving house, financial or relationship problems, or bereavement. Whilst you are not normally angry, you find that now you are easily triggered into anger. In this instance it may be more helpful to focus on these issues that are affecting you and your response to them. Before we start, we can discuss how to tailor the course to suit you.
The course runs over 6 weeks and is £60 per session.
If you want to know more, I am based in Seaford and offer Anger Management from comfortable counselling rooms. For a no-obligation 50 minute consultation for £60 on how we might together help you reduce your anger, please contact me.
|
<urn:uuid:13238081-171c-49f9-bd45-620eb6ed4daa>
|
CC-MAIN-2022-33
|
https://www.katherinecrook.co.uk/anger-managemen
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00064.warc.gz
|
en
| 0.961029
| 613
| 2.1875
| 2
|
From the coves and inlets of Maine to the mountains of southwestern Virginia, PEER is fighting to stop habitat loss and protect wildlife, limit water and air pollution, address drinking water contamination, and implement aggressive actions to address climate change and to stop toxic chemicals from entering our environment.
Northeast and Mid-Atlantic PEER represents municipal, state, and federal employees who are trying to protect the environment of the region. While this region has a reputation of being more protective of the environment than other regions of the country, all levels of government are politically susceptible, and employees often find themselves in trouble for upholding environmental laws and regulations. When politics trumps science and laws, employees turn to us to expose this dereliction of duty.
We work on a wide range of issues, from saving the critically endangered North Atlantic right whale from ship strikes and fishing line entanglements to protecting drinking water from lead, PFAS, and other contaminants, Northeast and Mid-Atlantic PEER is helping improve environmental decision making and working to ensure regulatory decisions are based on science, not politics. With climate change increasingly impacting our daily lives and the ecosystems around us, our work with public employees who are on the front lines of the war on the environment is more important than ever.
NEWS FROM THE NORTHEAST AND MID-ATLANTIC
MD Ratepayers Subsidize Polluting Energy at Premium Prices
PEER continues to work to compel Exelon Corp., owners of the Conowingo Dam, to clean it up and mitigate the ongoing risk to the Chesapeake Bay
PEER is launching a Climate Integrity Project to address bogus offsets, keeping clean energy clean and strengthening transparency in climate programs.
High levels of toxic PFAS chemicals have been found in fish in Piscataway Creek in Prince George’s County, a popular waterway for recreational fishing. State officials are warning residents to limit consumption of certain fish from the creek — the first such fish...
The American Chemistry Council is trying to convince federal and state legislators that PFAS isn’t a problem that needs to be addressed.
PFAS laden pesticides being sprayed aerially to control mosquitoes is yet another exposure to this ubiquitous forever chemical.
Dunn Landfill in New York impacts the residents of Rensselaer with problems like truck traffic, odor, dust and leachate.
New NOAA Finding at Odds with Science, Facts, and the Law
Regulatory Loopholes Allow Massive Spread of Toxic “Forever Chemicals”
Final Rule Perpetuates Risk to Minority Communities
“Forever Chemicals” Potentially Spread Over Millions of Acres
Massachusetts communities struggle with PFAS contamination in their water supplies. One source of this contamination could be insecticides.
Federal Action Sought to Stop Sewage Discharges Befouling Sakonnet Harbor
Should we be using pesticides when spraying for mosquitoes that may compromise someone’s respiratory system during a pandemic?
Teachers File Complaint Charging Unsafe Conditions in Re-Opened Schools
Eliminating Targeted Surveys Hampers Ability to Spot Whales in Distress
NOAA’s Past Accommodations of Lobster Industry Come Back to Bite It
New England PEER Director, Kyla Bennett talks to Massachusetts Water Resources Authority (MWRA) on the topic of PFAS.
Scientists Ignored as Agency Delays Entanglement and Ship Strike Relief
Half of Spray Events Kill Zero Mosquitos; No Proof of Disease Reduction
|
<urn:uuid:f0ab9c37-9dd3-4cb0-8793-0de00fb96685>
|
CC-MAIN-2022-33
|
https://peer.org/about-us/regional-offices/nema/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.906107
| 717
| 2.71875
| 3
|
Picture based, accessible document to explain safeguarding.
Series of factsheets safeguarding and legal issues affecting young refugees and migrants
Provides information on what your organisation can do to protect children from harm and resources to keep the children and families you work or volunteer with safe.
Crawley, H. (2009) Innocenti Working Paper No. 2009-18, Florence: UNICEF Innocenti Research Centre
Guidelines for best practice, 2nd edition, March 2012, Heaven Crawley/ILPA
A guide to inter-agency working to safeguard and promote the welfare of children
Doctors of the World factsheet
Housing and education
Short and long-term housing options for homeless refugees and asylum seekers.
Housing and support rights for asylum seekers awaiting a decision.
Joseph Rowntree Foundation
Refugee Council report - How the next Mayor of London can help end refugee homelessness.
To help pay for housing deposits.
Housing Associations Charitable Trust (HACT)
Experiences from partnerships, transforming neighbourhoods (2011).
Toolkit for recruiting and working with refugee volunteers in housing projects.
Understanding bilingualism in the early years. Resources for parents and professionals.
Information on access to compulsory education for migrant children.
Resources on bilingualism, some in different languages.
The Routes Project 2009-13.
Information and advice on private fostering.
Specific protection concerns & barriers to support
AFRUCA: What is Child Trafficking? What is Private Fostering? What is Female Genital Mutilation? What is Witchcraft Abuse? What is Physical Abuse? What is Sexual Abuse?
Children & Young People Now, (2006).
Overcoming barriers to the child protection process. Harran E, 2002. Child Abuse Review Vol. 11: 411–414
Joseph Rowntree Foundation. Research into the nature, scale and scope of forced labour in the UK (2014).
Telegraph interview on child slavery, 2008
Examining the continuum of exploitation. Klara Skrivankova, 2010. Joseph Rowntree Foundation
Carolyn Kagan et al., 2011. Joseph Rowntree Foundation
How best to protect workers employed by gangmasters, five years after Morecambe Bay. Oxfam, 2009.
Ensuring that every child matters. ILPA, 2006
Ueful rights based website, includes sources of legal help and links to organisations that provide practical help to migrants.
European migrant workers and health in the UK. Migrant workers’ experiences and perceptions of local health services and migrant workers’ uptake of and attitudes towards health promotion activities in the UK.
Towards a migrant ethic of care. Datta K, McIlwaine C, Evans Y, Herbert J, May J & Wills J, 2006 (about balancing working hours and childcare)
Towards an understanding of the emotional Lives of economic migrants. Lee-Treweek G. 2010. Journal of Work, Organisations and Emotions, vol.4 no.1, pp.206-226. ssn: 1740-8938
Faith based or spiritual healing
Exploring issues of witchcraft and spirit possession in London’s African communities. Trust for London, 2011
Guidance for those working with children.
Eg: information card: testimonies and signposting
Available in various languages and formats. Contains specific sections on women from abroad and immigration. Women’s Aid.
Better Health Briefing 24.
Children and young people in the asylum system
(For information on adult asylum seekers, see Module 1)
YoungMinds - Resources professionals who are supporting asylum seeking and refugee children across England.
Publications from Children’s Legal Centre.
Guardian, June 2010
Save the Children.
The Independent, 2005
Listening to refugee children, Selam Kidane.
Provides care and rehabilitation to survivors of torture and other forms of organised violence.
Being a child refugee, applying for asylum, living in the UK.
Hodes M, 2008. Published in Journal of Child Psychology and Psychiatry, vol. 49, issue 7, pp. 723-732
A UNICEF UK report into provision of services to unaccompanied or separated migrant children in three local authority areas in England
Negotiating age and identity in the UK asylum system. Crawley H, 2009. pp. 89-106 in N. Thomas (Ed.) Children, Politics and Communication: Participation at the Margins, Bristol: Policy Press
Asylum, Age Disputes and the Process of Age Assessment. Crawley H, 2007. London: ILPA
Experiences of destitution among young refugees and migrants - The Children’s Society (2012).
Destitution and the Asylum System
National network of organisations and charities, working together to end destitution amongst people seeking asylum, refugees and other migrants.
The Association of Visitors to Immigration Detainees.
Telephone: 0207 281 0533
Bail for Immigration Detainees. BID London office for all general queries and detainees Tel: 020 7456 9750 Email: firstname.lastname@example.org
Freephone for detainees: 0800 587 2096
Search for solicitors approved by the Solicitors Regulation Authority.
Tel: 0870 606 6575
Search the directory of members to find an immigration advisor near you.
Provides free legal advice and representation for asylum seekers.
Advice Line: 020 7247 8741; Tel: 020 7377 5123
Provides representation and advice on immigration and asylum law with offices across England, Wales, and Scotland. Tel: 0333 305 9375
Offers free legal advice on immigration, nationality and asylum matters. Irregular migrants helpline: 020 7553 7470
Relevant guides, available online
Free asylum helpline: 0808 8010 503
Supporting LGBTQI+ people through the asylum and immigration system
Tel: 020 7922 7811
|
<urn:uuid:ac4e0aaf-826d-49d8-a84b-351340366cf3>
|
CC-MAIN-2022-33
|
https://ts4se-health-resources.org.uk/index.php/training-toolkit/module7-safeguarding/module8-health-resources-and-links
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.83754
| 1,305
| 2.890625
| 3
|
New Delhi: In an attempt to counter China’s People’s Liberation Army’s aggressive moves along the Line of Actual Control (LAC) in eastern Ladakh, the Indian armed forces have deployed indigenously designed and developed long range sub-sonic cruise missile 'Nirbhay', supersonic cruise missile system ‘Brahmos’ and short-range Surface to Air Missile system ‘Akash’, reports said.
To deal with any Chinese misadventure, the Indian Army has deployed sizeable number of T-90 and T-72 tanks, artillery guns and infantry combat vehicles.
The Indian Air Force (IAF) has deployed its almost entire transport fleet, comprising of C-130J Super Hercules, C-17 Globemaster, Chinook and Mi-17 helicopters. Besides, this IAF has also deployed its fighter aircraft fleet of Sukhoi Su-30MKI, Mirage 2000 and MIGs near the Ladakh sector. In an attempt to give a string signal to China, the IAF fighter jets have been regulary conducting sorties along the LAC.
Brahmos is a universal long-range supersonic cruise missile system that can be launched from land, sea and air. Brahmos has been jointly developed by DRDO, India, and NPOM, Russia. The system has been designed with two variants for Anti-Ship and Land-Attack roles. Brahmos Weapon Systems has been inducted and is operational with the Indian Navy as well as the Indian Army.
Nirbhay is a Long-Range Sub-Sonic Cruise Missile capable of deep penetration into adversary territory to strike high-value targets with precision. India is in the list of select few countries having capability to design and develop this class of cruise missiles.
Akash is a Short Range Surface to Air Missile System to protect vulnerable areas and vulnerable points from air attacks. Akash Weapon System can simultaneously engage multiple targets in Group Mode or Autonomous Mode. AKASH Weapon Systems has been inducted and is operational with the IAF as well as the Indian Army.
Indian and Chinese forces have been locked in a bitter standoff at multiple locations in eastern Ladakh since May 5. Tensions between the two neighbouring countries escalated in eastern Ladakh after Chinese troops "intimidated" Indian troops along the northern and southern bank of Pangong lake area in the last few weeks. On the intervening night of August 29 and 30, the Chinese forces tried to transgress into Indian areas, however, the Indian Army preempted their move and thwarted the attempt.
On September 7, the Chinese soldiers made an unsuccessful bid to close in on the Indian position and even fired shots in the air in the Mukhpari area of Rezang-La ridgeline.
In order to calm down the situation, External Affairs Minister S Jaishankar and his Chinese counterpart Wang Yi in Moscow met on the sidelines of the Shanghai Cooperation Organisation earlier this month and both the leaders reached a five-point agreement to defuse the situation in eastern Ladakh.
Following the high-level talks, the Indian and Chinese armies held the sixth round of Corps Commander talks on September 21.
"The two sides had candid and in-depth exchange of views on stabilising the situation along the Line of Actual Control (LAC) in the India-China border areas," said the statement released by the Indian Army.
"They agreed to earnestly implement the important consensus reached by the leaders of the two countries, strengthen communication on the ground, avoid misunderstandings and misjudgments, stop sending more troops to the frontline, refrain from unilaterally changing the situation on the ground, and avoid taking any actions that may complicate the situation," the statement further read.
|
<urn:uuid:fa6e5c90-50a7-4ba1-a16f-f9aff6b2a7a6>
|
CC-MAIN-2022-33
|
https://www.timesnownews.com/india/article/india-china-border-standoff-brahmos-akash-nirbhay-missiles-deployed-to-counter-pla-threat/659506
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00064.warc.gz
|
en
| 0.949609
| 768
| 1.882813
| 2
|
The US Navy is creating a strike group with hundreds of Tomahawk cruise missiles for a possible attack on Syria.
The USS Donald Cook has already drawn attention to its actions in the eastern Mediterranean where it has reportedly been “harassed” by Russian warplanes.
The USS Carney is also deployed somewhere in Mediterranean, while the USS Porteris somewhere en route to or has already entered it. Another guided-missile destroyer, the USS Laboon is also somewhere near the Mediterranean. These four guided-missile destroyers together can carry up to 240 Tomahawk cruise missiles.
Considering that the USS Georgia and USS John Warner nuclear submarines are also deployed in the region, the US Navy could have about 406 Tomahawks to use for its attack on the Assad government.
On April 11, the USS Harry S. Truman Carrier Strike Group is set to depart Naval Station Norfolk for deployment in the Middle East and Europe. The strike group includes the guided-missile cruiser USS Normandy and the guided-missile destroyers USS Arleigh Burke, USS Bulkeley, USS Forrest Sherman and USS Farragut. The destroyers USS Jason Dunham and USS The Sullivans will join the strike group later.
If the attack on Syria does not take place in the coming days, the USS Harry S. Truman will further strengthen the US offensive capabilities for a possible large-scale invasion against the Assad government and thus Russian and Iranian forces deployed in Syria.
SF recalls that on April 10, US President Donald Trump canceled his trip to South America. According to White House Press Secretary Sarah Huckabee Sanders, he “will remain in the United States to oversee the American response to Syria and to monitor developments around the world.”
It looks like Russia is not happy to see such developments. On April 10, a Russian Su-34 fighter jet armed with what looks like Kh-35 cruise anti-ship missiles was photographed over the Syrian city of Tartus, where the Russian naval facility is located. According to local sources, this was not the only Russian jet armed with Kh-35 cruise missiles flying in the area.
Russia’s envoy to the European Union told Euronews on the same day that “Russia has warned U.S. representatives, publicly as well as through proper channels, over the grave consequences that could arise if these strikes happen and whether deliberately or otherwise Russian citizens are hurt.”
Meanwhile, the UN Security Council failed to approve three draft resolutions on chemical weapons attacks. Russia vetoed a US text, while two Russian-drafted resolutions did not get nine votes to pass.
Russia’s Permanent Representative to the UN Vasily Nebenzya also revealed that the Organization for the Prohibition of Chemical Weapons will send two expert teams to Syria later this week to investigate the April 7 Douma incident, which the US-led bloc seeks to use as a pretext for a military action against Syria.
However, the chances of a military escalation still remain high.
South Front: Analysis & Intelligence (SF) is a public analytical project maintained by an independent team of experts from four corners of the earth. SF focuses on international relations and crises working through a number of media platforms. They provide military operations analysis and other important data where crisis points affect tensions between countries and nations. They dig out truth barely covered by states concerned and their mainstream media. SF does not receive any funding from corporations or governments. They are supported by reader donations.
*All posts on behalf of South Front are made by Gordon Duff
|
<urn:uuid:323c120a-0e94-4df0-aff5-b6a7542cc791>
|
CC-MAIN-2022-33
|
https://www.veteranstoday.com/2018/04/11/syrian-war-report-april-11-2018-us-destroyers-subs-with-hundreds-of-missiles-near-syria/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.942288
| 716
| 1.921875
| 2
|
Michael A. Dunn, Richard P. Vlosky and Todd F. Shupe
Southern yellow pine (SYP) has for many years provided the homebuilding industry with abundant, cost-competitive wood products. Recent research indicates that softwood lumber, including SYP, continues to lose market share in the U.S. residential construction industry to substitute products such as concrete, steel and plastic and that builders remain concerned about softwood lumber quality and price. Further, some studies have reported that different user groups perceive that lumber quality in general has decreased in recent years.
To ascertain homebuilders’ perceptions of SYP lumber quality, a questionnaire was sent to the largest 500 homebuilders in the United States as measured by sales in 2000. Of the 500 homebuilders sent surveys, 198 responses (40 percent) were received and used in the study. Respondents were relatively well-dispersed throughout the United States (Figure 1). The highest region of response came from the southern region (39 percent) and the lowest region of response was the northeast region (14 percent).
Homebuilders responding to the survey perceive that the quality of southern yellow pine (SYP) lumber has changed over the past 50 years. Nearly half (48 percent) stated that they believe SYP quality has declined. Another 15 percent stated that quality has stayed the same, while 9 percent stated that quality has improved. Twenty-six percent responded that they did not know or were unsure.
Those that responded that SYP quality had declined over the past 50 years were further asked their opinions on why the quality had declined. Sixty-eight respondents stated that SYP warps in service, while another 47 stated that SYP trees are grown too fast. Thirty-five stated that it is kiln-dried too rapidly, and 34 stated that SYP has too many knots.
Respondents were asked to rank criteria used in building new houses based on their perceptions of the importance of various items to homebuyers (Figure 2). Respondents ranked each criterion on a scale of 1 to 5, with 1 signifying “not important at all” and 5 signifying “very important.” Respondents ranked all of the seven criteria above the midpoint (3.0) in level of importance. Of the 182 responses, housing cost (4.5), resale value (4.4) and energy efficiency (4.2) were cited as most important. Resistance to flooding (3.2), followed by absence of chemicals (3.5), wind damage resistance (3.7) and insect damage resistance (3.9) were cited as relatively less important.
Respondents were asked to rank on a scale of 1 (“not at all”) to 5 (“significantly”) growing conditions that might influence wood quality. The factors were soil, rainfall, proximity to municipal landfills, growth rate, tree straightness and geographic location. The most important criterion was tree straightness (4.2) followed by rainfall (4.1), rate of growth (3.9), soil (3.7) and geographic location (3.6).
In a related question, 72 percent of respondents stated that wide rings negatively affect lumber quality either somewhat or significantly, while 10 percent thought they had no effect. Another 18 percent did not know whether or not wide rings negatively affect lumber quality. Also, 74 percent of respondents felt that rate of tree growth affects lumber quality, while 10 percent said it did not, and 16 percent did not know.
Respondents were also asked to rate the importance of species selection in specifying projects. Fully 64 percent of respondents replied that species selection was either somewhat important or very important. Twelve percent replied that this criterion was either somewhat unimportant or extremely unimportant.
More than half of the respondents had a somewhat positive (40 percent) or extremely positive (13 percent) perception of SYP. Eight percent of respondents expressed a somewhat negative (6 percent) or extremely negative (2 percent) perception of SYP. Twenty-eight percent of respondents rated SYP as either somewhat superior (21 percent) or extremely superior (7 percent) to other species of lumber, while 15 percent rated SYP as somewhat inferior (11 percent) or extremely inferior (4 percent) to other species of lumber.
Respondents were further asked their willingness to build a house using SYP. Eighty-three percent responded that they would be willing to use SYP in housing construction while 17 percent said they would not. Of the 17 percent that responded negatively, 35 percent stated that it is a poor building material, 24 percent stated that its long-term performance is unknown, 20 percent stated cost and 20 percent stated warp as deterrents.
Respondents indicated a variety of applications where they use SYP (Figure 3). More respondents use SYP for structural components in the construction of a new house than for any other reason. Multiple responses were possible for this survey question. Other popular applications of SYP included decks, landscaping timbers, outdoor structures and interior walls.
Results indicate that homebuilders perceive that homebuyers are most influenced by economic factors associated with construction. In all regions of the country, respondents list cost of the house, resale value and energy efficiency as key factors. Other factors that might be perceived by some to be more important in particular regions (for example, resistance to termite damage in the South or resistance to wind damage in the north central region) were not given significant importance to replace traditional economic factors as top priorities. This indicates that homebuilders are still guided by traditional cost factors in determining the makeup of the constructed unit.
The majority of homebuilders participating in the survey view SYP favorably. Further, a large majority state they are willing to use SYP in the construction of houses. However, there are indications they perceive the quality of SYP products to be declining. As long as SYP remains price competitive with its substitute products and homebuilders perceive it to be a quality product, it will likely maintain a strong market share.
On the other hand, producers of SYP lumber can likely improve market share for their product if they can develop appropriate marketing strategies that tout their product’s performance and price. It is possible that a niche market could be established for dense, slow-grown SYP lumber; however, it is more likely that fast-grown SYP lumber is here to stay.
The industry could be well-served by developing innovative marketing strategies that emphasize how lumber grading rules ensure structural integrity and design reliability for the builder or other end-user. The key is consumer education. When lumber consumers are better educated regarding lumber grade rules, the effects of moisture on basic wood properties, and when and how to select and use preservative-treated lumber, their understanding of lumber’s uses and benefits could lead to an even more positive perception of the product.
Michael A. Dunn, associate professor, Department of Agricultural Economics & Agribusiness; Richard P. Vlosky, professor; and Todd F. Shupe, associate professor, School of Renewable Natural Resources, LSU AgCenter, Baton Rouge, La.
(This article appeared in the winter 2005 issue of Louisiana Agriculture.)
|
<urn:uuid:dbde23ca-6c49-4029-a021-8e86e8f54495>
|
CC-MAIN-2022-33
|
https://lsuagcenter.com/portals/communications/publications/agmag/archive/2005/winter/what-homebuilders-think-of-southern-yellow-pine-lumber
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.964523
| 1,480
| 2.34375
| 2
|
A Pest Control Bondi is the process of a bonding between the management company and the people who will be living in the estate for a fixed period of time. The term ‘Bondi’ is derived from the Hindi word Bhai, which means bravery. In the Bondi areas, where there is plenty of tourism, the Bondi process tends to be quite rigorous as the tourism industry is very important to the locals. This is one of the reasons why a lot of people do not opt for a property in Bondi while looking at buying a house elsewhere. Go this link- https://abcpestcontrolsydney.com.au/bondi/
When you buy a house in Bondi, it is always advisable to take some pest control measures to prevent any problems with the pests in that particular area. It is always a good idea to get some professional help with pest control bondi when the time comes because many of the people who come there are not too familiar with the procedures and this can result in a lot of damage to properties. There are a lot of people who go to Bondi simply to do some shopping, and you won’t find any professionals there who will be willing to help with any pest control problems that may arise.
There are some people who choose to go for pest control bondi on their own. This usually works pretty well because the people who go there know what they are doing, and there is no need to hire a professional pest controller. They often use things like baits and traps, but since they are not professionals they might not be as effective as baits and traps that are used by professionals. If you choose to go for a pest control bondi yourself, it is always important to understand the procedures involved, and to be aware that you may cause more damage than you could ever foresee. Since this kind of bondi is done quite often, the damage can be insured but it is also possible that you could end up paying for the damage you have done to the property.
|
<urn:uuid:aaf98ea8-3daf-46c9-9a39-4d5c906b6bd0>
|
CC-MAIN-2022-33
|
https://perfectedition.win/2021/03/21/all-you-wanted-to-know-about-pest-control-bonds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.975467
| 415
| 1.882813
| 2
|
Tuochao Chen gapes. Then he sneers. Then he grimaces. As he makes faces, he wears a device that looks like a pair of headphones. But instead of playing sound, it points cameras toward his cheeks. The cameras only see the sides of his face. Surprisingly, that’s enough facial real estate to tell a sneer from a smile, or a laugh from a frown. A computer system connected to the headphones can figure out what Chen’s eyes and mouth look like without seeing them directly.
It works even if Chen wears a face mask. The system can tell if he’s smiling or frowning behind it.
Chen studies computer science in the lab of Cheng Zhang at Cornell University in Ithaca, N.Y. Zhang came up with the idea for this system. He calls it C-face. That “C” stands for contour. It’s also a pun because the device can “see” your face.
His team’s goal is to create technology that can better understand people. Right now, our devices are mostly clueless about how we’re feeling or what we need. But over time, more devices will understand us. Zhang hopes that “everything will be smart in the future.” For example, your phone might recognize when your face looks upset and suggest calming music. For your phone to know you’re upset, however, it has to somehow capture that information from you. Such as from a camera.
But it’s not convenient to always have a camera in front of your face. What if you’re exercising, cooking or shopping? “People are more open to wearing devices on the ears or on the wrists,” notes Zhang. His team has already shown it is possible to figure out entire hand gestures from a device worn on the wrist. That made him wonder if he could pick up entire facial expressions from cameras worn on the ears.
The sides — or contours — of someone’s cheeks change as they make different faces. So a certain-shaped contour might match a specific expression. Deep learning, an artificial-intelligence technique, can detect patterns like this. It just needs lots of practice, known as training.
To train C-face, Chen and other team members made funny faces. Meanwhile, headphone cameras captured how the contours of their cheeks changed with each expression. And a camera in front of the face captured the locations of important landmarks around the eyebrows, eyes and mouth. The system learned to match changes in the contours to changes in these landmarks. Once training was complete, the device could look at cheek contours and predict the position of landmarks around the eyes and mouth that corresponded to particular facial expressions.
The researchers then fed those landmark positions into a program that created a matching virtual version of the face that looked happy, sad, puzzled, surprised or something else entirely.
Zhang’s group unveiled its new system in October 2020. The researchers shared details about it at a virtual conference of the Association for Computing Machinery Symposium on User Interface Software and Technology.
Science shaped by roomies and the pandemic
Everyone’s face is unique. So each person who uses the C-face device has to train and test it on their own expressions. To do this, Zhang’s team had to recruit volunteers. But it was spring 2020 at the time. The coronavirus pandemic had sent most of the world into lockdown. It wasn’t safe to bring anyone to a laboratory. So the team got creative.
“We got approval to conduct the study with our roommates,” says Benjamin Steeper, another Cornell student. The situation wasn’t ideal. Steeper converted one room of his apartment into “the science room,” complete with a desk, chair, cameras and everything else he needed.
Meanwhile, Chen set up his bedroom to also use for the study. Chen stars in the video that the team used for training and testing C-face. He makes dozens of different expressions, one after another, for an hour. The volunteers had to watch the video and copy each expression. They thought it was funny to have to stare at Chen making funny faces for so long. One of Chen’s roommates told him afterwards, “I will see you in my dreams tonight!”
The pandemic had another important impact on the team’s research. Face masks suddenly became part of daily life. Other software designed to recognize people’s faces — like FaceID on an iPhone — doesn’t work when someone wears a mask. “I keep seeing everyone opening their mask for iPhone unlock,” says Ilke Demir. “Looking at the contours is a very nice solution.” Demir, who wasn’t involved in the research, is a research scientist at Intel in Los Angeles, Calif.
The team showed that C-face could reveal people’s expressions even when wearing masks. This device could help you communicate more easily with friends while you wear a mask. It would do this by mapping your hidden expression onto the face of a virtual avatar. This digital version of you would match your expressions as you talk, smile or perhaps gasp.
With training, C-face also can turn someone’s real expressions into emojis. It just needs to learn what expression should match which emoji. Then, instead of scrolling through emojis to find the one you want, you just make the face at your device and it will appear on your screen, ready to post or text.
You can’t buy C-face, at least not yet. It uses too much energy and computing power right now. Demir points out that it also “needs more user studies.” The nine volunteers who took part were all researchers and their roommates. That small group does not represent the entire population. Demir points out that the researchers must make sure this device works with all hair types, skin colors, head sizes and more.
Yet Steeper is among those who looks forward to someday using C-face or something like it daily. Right now, when he’s cooking and talking to family at the same time, he puts the phone down on a table. “All they see is my ceiling,” he says. If he were wearing C-face, his family could see an engaging virtual avatar, or digital version, instead. If only they could smell the food virtually, too.
This is one in a series presenting news on invention and innovation, made possible with generous support from the Lemelson Foundation.
|
<urn:uuid:5b4eb548-99e6-4366-a902-73d78125a7f9>
|
CC-MAIN-2022-33
|
https://www.snexplores.org/article/mask-technology-smile-frown-communication?shared=email&msg=fail?shared=email&msg=fail
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.963245
| 1,388
| 3.265625
| 3
|
NEW DELHI: The hacking of several high profile Twitter accounts of top technologists, politicians and multi-billion dollar companies for a brief period on Thursday has put the spotlight on social media companies, with several cyber security experts calling for greater accountability and transparency from these platforms. Experts also asserted the need for closer collaboration between governments, civil society groups and technology companies to protect internet users in case of data breaches.
“Social media plays an essential role in everyone’s lives these days. Hence, there is a moral and social obligation for the platform owners and operators to implement adequate security measures
around it. This is not the first time when a security mishap occurred on Twitter,” said Beenu Arora, founder of Atlanta-based cyber security firm Cyble. Earlier on August 31, 2019, Twitter CEO Jack Dorsey's account was hacked by exploiting the platform's SMS service, following which the company had stopped users from tweeting over text messages.
According to cyber security expert Rakshit Tandon, the hack has raised a big alarm for companies as Twitter admitted that their admin panel had been compromised. “The hackers took hold of handles with millions of followers. They did it with the purpose of a scam and to earn money, but they could have even used different handles to start violence. They could have instigated violence or sparked tensions,” Tandon told TOI, adding that the hack is an indication that companies need to revise their policies and have stricter security measures.
Although it is unclear who executed the hack, cyber security firm RiskIQ, based in San Francisco
, documented a list of all web domains tied to the Twitter hack
. One of them, cryptoforhealth.com, also has a profile on Instagram. The description of the profile reads "It was us". One of the stories posted by the handle claimed that it was a "charity attack" and that the money "would find it's way to the right place."
According to Mohit Kumar, founder of hackernews.com, it appeared that some employee access was abused to reset the passwords of these targeted accounts by changing the email id and phone numbers associated with the Twitter handles. "We know that someone exploited the admin privileges to change the passwords. Once they reset the passwords, the hackers would have been able to access the private message of the targeted accounts as well," he told TOI.
Most experts asserted that companies need to be held to higher standards of accountability and transparency. According to Arora, the fact that people were misled into sending bitcoins to anonymous addresses highlighted that people trust the platform and this can easily be abused by cybercriminals. “Geopolitical agendas are now visible in the cyber world – several nations are expressing their concerns on various third parties' data collection and sharing policies, especially with China,” said Arora.
He, however, cautioned that only favouring home-grown apps and services is not the way forward. “I don’t think the home-grown products and solutions are the answer as every nation has mastered certain aspects of the trade ecosystem through decades of research and learning. We believe the “trust, transparency and collaboration” between the government and the private sector is the ideal way to proceed,” he said.
Kumar, too, said that governments, internet users and social media companies need to solve these problems collectively. “We need a stronger data protection law that puts users in the centre of policies. Social media accounts should be held accountable, but without user awareness, these scams will not cease," he added.
Hackers had targeted several personalities, including US President Barack Obama, Presidential candidate Joe Biden
, Tesla founder Elon Musk
, Microsoft founder Bill Gates
, Amazon chief Jeff Bezos among others and posted similar messages, asking users to send Bitcoins to an anonymous digital address. The tweets were taken down by Twitter minutes after they appeared on the microblogging platform.
Twitter acknowledged the breach through one of it's handles, calling it a "co-ordinated" attack targeting its employees who had "access to internal systems and tools". "We know they [the hackers] used this access to take control of many highly-visible (including verified) accounts and Tweet on their behalf," the company said in a series of tweets. It also stopped many verified handles from tweeting altogether for some time.
|
<urn:uuid:8ef3f340-736a-4e1d-a2ab-3f946a7f8041>
|
CC-MAIN-2022-33
|
https://ciso.economictimes.indiatimes.com/news/twitter-hack-great-accountability-needed-from-social-media-platforms/77011111
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.969732
| 891
| 1.898438
| 2
|
Venezuelan scholar and forestry expert, José Rafael Lozada, is making public a series of videos where he demonstrates that besides the polemic Mining Arc of the Orinoco, there is another mining arc devastating Venezuela’s Canaima National Park, which is a Unesco world heritage site, as well as the Caura National Park and the Southern Bolívar State Protective Zone.
Lozada calls the area ‘Indigenous Mining Arc’ and, according to his review of media stories, interviews with local sources and research trips to the area, it is the product of a series of deals that the Pemón tribe made with both the current Nicolás Maduro regime and the former Hugo Chávez regime.
Besides the archival documentation, the expert analyzes satellite and Google Earth images from different years and shows how massive placer gold mining operations that employ dredges have grown anarchically in protected areas. At least three dozen mines of different sizes appear in the region. However, digging deeper using the Amazon Geo-Referenced Socio-Environmental Information Network, Lozada is able to identify over 1,000 ‘mining spots’ or smaller operations.
Located to the south of the southeastern Bolívar state, Canaima National Park is the area that hosts the region’s most important rivers watersheds. For example, the entire watershed of the right bank of the Caroní River -the one that generates most of the country’s hydroelectric power- is within the park as are two of the highest waterfalls in the world, Angel Falls and the Kukenán falls. The park also hosts the main forest that connects with the Amazon and the plateaus of rock called tepui formations.
According to Lozada, some of the mines detected there occupy more than 150 hectares and are not only close to important freshwater sources but also to Indigenous towns such as Campo Alegre, where a namesake mine is causing methylmercury or acid rock drainage contamination. Such conclusion is based on what Google Earth presents. The app also shows that the operation, which is also next to the Kukenán river, probably started around 2007 and has been growing ever since.
Following the course of the Kukenán river on Google Earth up to the point where it joins the Aponwao river and both rivers ‘give birth’ to the Caroní river, Lozada shows satellite images of mining works which he saw in person back in 2009. Sediments from these mines -he explains- threaten the Guri dam lake, which feeds from the Caroní and the
South of this area, along both margins of the Icabarú river, several mines can be observed. As he shows this, the expert explains that this is an area where there is no road and that is only accessible by
“The riverine forests around the Icabarú river are being intensely destroyed,” he says in one of the videos. “The river shows a brownish colour which is evidence of mine residue contamination.”
Following his examination -which he also submitted to a peer-reviewed publication-, Lozada concludes that there is evidence of numerous extractive activities in the Canaima and
The problem -he says- is that the existence of the Indigenous Mining Arc is being ignored, as is the fact that, by law, Indigenous peoples in Venezuela are obliged to collaborate in the protection of national parks and natural resources.
|
<urn:uuid:a9193311-e04f-4c25-90ae-b738f8cad6b1>
|
CC-MAIN-2022-33
|
https://www.mining.com/venezuela-has-an-indigenous-mining-arc-that-is-destroying-national-parks-expert/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz
|
en
| 0.951366
| 719
| 2.859375
| 3
|
The Times view on arming Ukraine: Weapons For Victory
Biden’s decision to withhold long-range rockets from Kyiv is wrong. The West should give President Zelensky’s armed forces the means to win their just war of self-defence
Russia’s assault on Ukraine, annexing the sovereign territory of an independent state, is a flagrant violation of the UN Charter. Russian forces have pursued this aggressive war by murdering and raping civilians, and looting Ukrainian property and industry. To Vladimir Putin’s consternation, Ukraine’s people and armed forces have not acquiesced but mounted heroic resistance. Their determination to fight back should command the admiration and gratitude of the free world. To cavil about providing Kyiv with the arms and assistance it needs is to collude in the Kremlin’s criminal enterprise. Yet the very determination of Ukrainians to defend their country is causing apparent consternation among western governments.
President Biden exemplified this perverse circumspection on Monday, saying that the United States would not provide Ukraine with long-range
|
<urn:uuid:eebd0bd5-d1b9-4c97-bf66-eebc80633462>
|
CC-MAIN-2022-33
|
https://www.thetimes.co.uk/article/the-times-view-on-arming-ukraine-weapons-for-victory-fb9d9bxtw
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.922061
| 218
| 1.515625
| 2
|
We are an arena of national identity.
NMMZ has a national role in presenting the cultural and natural heritage of Zimbabwe to many publics. Cultural identities are developed, strengthened and celebrated at museums and sites. The NMMZ plays a vital role in forming and strengthening that national identity.
We take care of the heritage that embodies that national identity.
This includes tangible and intangible heritage (spiritual and ritual aspects). NMMZ identifies, documents and conserves the archaeological sites and historic monuments of Zimbabwe. This involves regular annual cycles of work and special projects. NMMZ is also the custodian of the nation’s collections and undertakes regular audits and cycles of conservation. Computerised documentation enhances the security and preservation of the collections.
We are custodians and creators of knowledge of the national heritage .
NMMZ has an establishment of 40 curators whose role it is to undertake research on the collections and monuments and to make that research accessible to a variety of publics. During the period of the new plan a renaissance in publications is planned aimed at national and international audiences so that the organization is firmly positioned as an international research institution.
We fulfill a national and international role by working in partnership to deliver services.
NMMZ emphasizes the importance of working in partnership with public, private and non-governmental sectors. These partnerships strengthen the organization and ensure more efficient and effective delivery of services.
We are committed to developing potential and innovation within our staff.
The staff is the most important resource of the organisation, hence strong commitment to developing and training specialist staff to ensure the achievement of corporate goals.
We are educators.
The underlying purpose of the organisation is the advancement of the education of the publics of Zimbabwe. This education takes place at a variety of levels and it is acknowledged that the organisation must span the spectrum of education from popular to scholarly. Visitors should learn through enjoyment.
We ensure best use of resources and promote good business practice.
NMMZ is a public institution funded mainly through Grant Aid from Central Government. There is also a strong commitment to continuously increase own resources generation by NMMZ through development of a market-oriented and buoyant income generation base. NMMZ remains committed to ensuring that Public resources are effectively and efficiently used.
|
<urn:uuid:0e2a75cb-7f89-4b64-b1d6-76d2430eb3eb>
|
CC-MAIN-2022-33
|
https://www.nmmz.co.zw/about-us/values
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.931341
| 462
| 2.046875
| 2
|
This report presents the findings of a study of 1,085 U.S. parenting adults of 3 to 13 year olds that explored how families experience developmental relationships, how experiences of developmental relationships vary among different families, the extent to which developmental relationships contribute to children’s development and well-being across different types of families and circumstances, everyday interactions in families that facilitate (or interfere with) developmental relationships, strategies that hold promise for engaging families through a focus on developmental relationships, and what families can do together to enhance their developmental relationships. Findings indicate at least seven out of ten parenting adults with children ages 3 to 13 reported that they take the following essential actions in their relationships with children frequently and effectively: Express Care, Provide Support, and Challenge Growth. The two remaining essential actions are taken less often and less effectively: Share Power and Expand Possibility. The study also found developmental relationships were less common for: older children, parenting adults who are stepparents, boys compared to girls, and families that have financial struggles. It proposes six shifts that are needed in the approaches taken to recognize and engage with families as important actors and full partners in nurturing key character strengths and supporting children’s successes in school and life. Tips are and relationship-building activities for families are then offered as a way for schools, organizations, and coalitions to implement the shifts. Numerous references.
Do you have something you think is appropriate for the library? Submit Library Resources.
|
<urn:uuid:ff1575c5-5fd4-466f-91b6-277f3cfda9dd>
|
CC-MAIN-2022-33
|
https://www.fatherhood.gov/research-and-resources/dont-forget-families-missing-piece-americas-effort-help-all-children-succeed
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.960581
| 295
| 3.4375
| 3
|
India’s ever-growing rural market has seen an increase in the adoption of mobile phones from 22% to 38% in the last few years. India has close to 750 million mobile internet users out of which 350 million are from rural India. Hence with the increase of the adoption of mobile phones, comes the demand for mobile apps.
Still, at the nascent stage, people in rural India have started upgrading their featured phones to smartphones for very basic requirements like watching the latest regional movies, listening to music, online shopping, getting local weather updates, etc. Companies like Jivi, Ziox, Swipe are tapping such markets and slowly increasing their market share. Also, mobile video content consumption is many folds higher in Tier2 and Tier3 cities than in Urban India.
Also with the evolution of multi-lingual mobile applications/keyboard applications life has become easy for the non-English speaking rural Indians to get engaged with their smartphones. Beneath are some of the sectors where mobile apps have hugely accepted by rural Indians.
Agriculture: Agricultural mobile apps have been a huge hit among rural Indians. Weather information, Soil quality, Crop advice, and other such key and fundamental information are made through such apps have been well accepted by the farmers.
Education: With the very limited scope and options in the education sector many bright students in rural India were behind the competition compared to their urban counterparts. However, with the rise of educational mobile apps, pupils can download various informative videos, attend various live webinars, solve intellectual puzzles, etc., and thus give themselves the equal chance to stay ahead in the competition.
Entertainment: With persistent power cuts in the rural areas, downloaded content like soap operas, movies, videos, music has become the alternate source of entertainment. Hence Video streaming applications, gaming applications have become very popular among rural Indians.
E-Commerce: Post demonetization of the higher denomination currency notes in the country, rural people have become more adoptive to E-commerce mobile apps. Thus companies are specifically targeting those populations by especially developing mobile applications for them.
Mobile apps are also acting as a platform for social and behavioral change among the rural populations. Apps are helping rural married women understanding various contraceptive choices, apps streaming various videos about family planning, apps showing videos on how to maintain a hygienic lifestyle, etc. In coastal India, fishermen are using mobile apps to understand sea behavior, wave heights, wind speed, weather forecast, etc., which helps them decide whether to go out fishing.
Thus the evolution of mobile apps has largely affected almost every aspect of rural development and will continue to bring in change among the rural population.
Keerti, the author of this article is a freelance writer and loves to write on technology and lifestyle-related topics. She recommends hiring one of the best android/ios app development company.
|
<urn:uuid:b1caca84-7e0e-4988-99fe-8be8fac3b006>
|
CC-MAIN-2022-33
|
https://deepknowhow.com/adoption-of-mobile-apps-in-rural-india/?ref=homepage
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.950368
| 583
| 2.34375
| 2
|
I have several systems that I use throughout my house but, they all follow the same basic strategy:
- daily backups of each computer to a storage device in my home network
- daily backups of my local storage device to a remove location
I use two different tools for the job:
In the following paragraphs, I will provide more details on how I currently backup my main laptop.
My main computer uses Déjà Dup to backup my home directory and saves to a shared network drive via SSH. This gives me the flexibility of backing up to my drive ( at home ) from anywhere where I have network connectivity.
Let's go through this in a bit more detail:
Let's go through this in a bit more detail:
Backup DriveFirst things first. Let's get a drive in which to backup our data. I have a 2TB USB drive attached to one of my servers that I make available via SSH to my local network.
Here are the steps that I took to get the drive connected, partitioned, formatted, mounted and available:
- Connect drive to any available USB port on your server.
- Make sure to turn the power on your USB drive :)
- On my server, the USB drive showed up as /dev/sdd1 as there is an existing partition there
- Let's partition the drive with cfdisk ( Please read the manual for cfdisk BEFORE doing anything with cfdisk. )
- sudo cfdisk /dev/sdd ( notice that I am working with the entire drive here and not just the partition )
- delete any partitions in the drive and create one ext4 partition that uses the entire drive.
- Use the menu items at the bottom to delete the existing partitions
- When you create a new partition, cfdisk will default to create a partition using all available space, keep those defaults
- The linux partition type is 83 ( cfdisk should default to this but, just in case you need it )
- Make sure to Write the changes to disk
At this point, you should have a new partition on your backup drive:
- In my case, my USB drive was recognized as /dev/sdd.
- I created one partition on that drive.
- The above tells me that my partition should be /dev/sdd1
Let's format our partition to get things going:
- sudo mkfs.ext4 /dev/sdd1
Alas! We have a partition ready for use. Let's mount it ( mine is mounted on /media/Backup1 ):
- sudo mkdir -p /media/Backup1
- sudo mount /dev/sdd1 /media/Backup1
If you've made it this far, you should now have a new "mount point" where you can access your backup drive. Let's verify that by checking what partitions have been mounted:
- df -h
- The backup drive should be listed there as one of the partitions. Here is what the relevant part of mine looks like:
- /dev/sdd1 1.8T 466G 1.3T 27% /media/Backup1
The last part on getting the Backup drive ready is to ensure that it can be accessed from your network. In my case, i have a username on all of the boxes that can access the backup server via SSH key. I also ensure that /media/Backup1 is owned by this username:
- sudo chown -R negronjl:negronjl /media/Backup1
- ( Feel free to use whatever username you want for the above )
- I use Ubuntu on my systems so, I already have Déjà Dup installed and only need to configure a few things to get going
- Open the dash ( Super key ) and type backup. Déjà Dup will be in that list under the name of Backup.
- Click on Backup.
- My Déjà Dup configuration looks something like:
- Storage tab:
- Backup location: SSH
- Server: <my backup server>
- Port: 22
- Folder: /media/Backup1/DejaDup
- Username: <negronjl> Use whatever username you used in the previous step
- The Folders tab:
- Folders to back up: <home directory>
- Folders to ignore: Trash, Downloads
- In the above setting, feel free to add any folder already being backed up or that needs to be ignored.
- How often to back up: Daily
- Keep backups: At least 28 days ( This can be changed )
- Close the window ... everything should be up and running now.
I use backupninja to backup my entire machine in case of catastrophic failure. Here is how to set up and configure backupninja:
- sudo apt-get install backupninja
- when = everyday at 01
options = --s3-use-new-style
nicelevel = 19
testconnect = no
tmpdir = /home/backupninja/tmp
sign = yes
encryptkey = <your GPG key>
password = <your GPG key password>
include = /etc
include = /home
include = /opt
include = /usr/local
include = /root
exclude = /home/*/.gvfs
exclude = /home/*/.Private
exclude = /home/.ecryptfs
incremental = yes
increments = 30
keep = 60
desturl = rsync://<backup_username>@<backup_server>//media/Backup1/Backups/backupninja/negronjl-laptop/negronjl-laptop
awsaccesskeyid = <YOUR_AWS_ACCESS_KEY_ID>
awssecretaccesskey = <YOUR_AWS_SECRET_KEY>
Adapt the above file to suit your needs ( usernames, passwords and such ) and save it to /etc/backup.d as something like <number>-<name>.dup Where <number> determines the order of execution of the files in the /etc/backup.d/ directory and <name> is an identifying name for the file ( something that tells you what the file is/does ). As an example, my backupninja configuration file is named:
I'd love to hear your backup strategies ...
|
<urn:uuid:f2ddea4b-0c08-4ddd-82e6-b9755b83e976>
|
CC-MAIN-2022-33
|
http://blog.xtremeghost.com/2013/01/backup-strategies-heres-mine-whats-yours.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.878238
| 1,405
| 1.789063
| 2
|
Returns and Permit Application Process for Canadian Animals, Semen, Embryos, Animal Products, Animal By-Products, and Finished Pet Food
This page is part of the Guidance Document Repository (GDR).
Looking for related documents?
Search for related documents in the Guidance Document Repository
October 28, 2010
Canadian animals, animal products, and animal by-products exported from Canada are sometimes returned by the importer or the authorities of the importing country, or even recalled by the exporting firm itself. The reasons for returns include the following:
- there were changes in market conditions
- the client's specifications were not met
- the importing country's requirements were not met
Animal: Under the Health of Animals Act, Interpretation, section 2, "animal" includes embryos, and a fertilized egg or ovum but not semen or unfertilized ova; it includes regulated animal as defined by the Health of Animals Regulations, part II, section 10.
Animal products: Within this procedural directive, includes semen, animal products, animal by-products, finished pet food, or any other thing that falls under the jurisdiction of the Terrestrial Animal Health Division (TAHD) of the Canadian Food Inspection Agency (CFIA) under the authority of the Health of Animals Act and its Regulations.
Delegated inspector: The inspector or veterinary inspector who is authorized to permit the importation or return of an animal or animal product.
Regulated animal: Under the Health of Animals Regulations, section 10, is a hatching egg, turtle, tortoise, bird, honeybee, or mammal.
Species excluded from the definition of regulated animals are members of the orders Cetacea, Pinnipedia and Sirenia; or members of the order Rodentia, with the exception of the following:
- Prairie dogs (Cynomys sp.); African giant pouched rats (Cricetomys gambianus); and squirrels of the family Sciuridae, from any country; and any members of the order Rodentia from Africa. These latter, members of the order Rodentia, are fully regulated under the Health of Animals Regulations.
Once an application for return is received by the appropriate CFIA office, the request for return will be evaluated by a CFIA delegated inspector (the person who is delegated to authorize or reject the particular return). For returns requiring import permits, the file will be forwarded to the TAHD National Headquarters for review by the delegated veterinary officer, so designated by the director of TAHD. Only after a successful review will the delegated veterinary officer, as authorized by the Director of TAHD, provide the written authorization for the return. This written authorization for return from TAHD National Headquarters is required prior to issuance of an import permit by the inspector or veterinary inspector.
How to return a shipment by a Canadian exporter/re-importer
For animals or animal products that require TAHD import permits, no Canadian export shall be returned to Canada from any country unless authorized in writing prior to the re-importation by the delegated veterinary officer, as authorized by the Director of TAHD.
For animal products, consideration to authorize a return will be given only to Canadian animal products that were legally exported from Canada and that are in their original sealed, clean, and undamaged containers, unless samples or inspection occurred under the control of, or by, the Central Competent Authority of the re-exporting country. Under these circumstances, the Central Competent Authority issues certification describing the testing/sampling and indicating that official control over the commodity was maintained.
The procedural directive Import Procedure for Canadian Semen and Embryo Shipments That Are Returned to Canada (TAHD-DSAT-IE-2010-10-1) provides additional information for returning shipments of semen and embryos.
The procedural directive Pet Food Program provides additional information for returning shipments of pet food.
The following procedural directives provide additional information for returning shipments of edible meat products and by-products from the United States:
- Annex J: Application to return Canadian products exported to the USA
- Annex J-1: Flow chart of application to return a shipment exported from Canada
- Annex J-2: Operating procedures for processing of returns of exported edible meat and meat products
Illegal exports and illegal returns
It is important to note that this procedural directive applies to shipments that are legally exported from Canada, i.e. those that left the country once a duly issued export certificate was obtained, as prescribed under the Health of Animals Act and its Regulations, or other Canadian legislation, if an official export certificate is required by law. Applications for returning shipments not exported as prescribed by applicable Canadian Acts and Regulations will be rejected automatically, and shipments will be denied entry into Canada. In addition, if received by the CFIA, such applications must be forwarded to CFIA Enforcement and Investigation Services (EIS) for appropriate follow-up with respect to their export from Canada.
In the case where these Canadian exports return to Canada, they are to be detained and ordered removed from Canada, under the authority of section 18 of the Health of Animals Act. Canadian exports, legally exported, but returning without proper authorization, are also to be detained and ordered removed from Canada, under the authority of section 18 of the Health of Animals Act, as follows:
- Removal of imports
18. (1) Where an inspector or officer believes on reasonable grounds that an animal or thing has been imported into Canada and that it
- was imported in contravention of this Act or the regulations,
- is or could be affected or contaminated by a disease or toxic substance, or
- is a vector,
- the inspector or officer may, whether or not the animal or thing is seized, require the owner or the person having the possession, care or control of the animal or thing to remove it from Canada.
The importer will be notified in writing when an imported animal or commodity is refused entry into, or ordered removed, from Canada. The Form CFIA/ACIA 5311 – Notice to Remove From Canada will indicate the reason for refusal and the procedures to destroy or remove the commodity under CFIA supervision, according to section 18 of the Health of Animals Act, as follows:
(2) A requirement under subsection (1) shall be communicated by personal delivery of a notice to the person being required to remove the animal or thing or by sending the notice to the person, and the notice may specify the period within which and the manner in which the animal or thing is to be removed.
(3) An animal or thing that is required to be removed from Canada shall be deemed not to have been forfeited under section 17.
Regarding animal products illegally imported into Canada, which are not removed in compliance with a Notice to Remove From Canada, they are to be forfeited, as per section 18 of the Health of Animals Act, and disposed of in accordance with methods detailed in the International Waste Directive (TAHD-DSAT-IE-2002-17-4). Section 18 of the Health of Animals Act directs as follows:
- Forfeiture where non-compliance
(4) Where the animal or thing is not removed from Canada as required under this section, it shall, notwithstanding section 45, be forfeited to Her Majesty in right of Canada and may be disposed of as the Minister may direct.
The importer of animals or animal products illegally returned is responsible for all costs related to the destruction or export out of Canada, as per section 60 of the Health of Animals Act.
Return application process
- Verify document requirements for the return in the Automated Import Reference System (AIRS).
- Fill out Return Application Form (CFIA/ACIA 5609), including Central Competent Authority official certification, as required. If an import permit is required, also complete Application for Permit to Import (CFIA/ACIA 5083).
- Submit the form(s) to the appropriate CFIA office, as follows:
- Animals or animal products not requiring import permits for return – review, and final authorization or refusal for return to Canada, will be handled by the Area Import Veterinary Specialist or the delegated inspector.
- For animals or animal products requiring import permits for return – the file will be forwarded and reviewed at TAHD National Headquarters by the delegated veterinary officer for authorization or refusal for return.
- If all necessary information is provided, authorization or refusal for return will be issued by the appropriate delegated inspector.
- If more information is required, the Canadian exporter, re-importer, or re-exporting Central Competent Authorities will be contacted to provide those details.
- If an import permit is required, and if, after review of the application, authorization for return to Canada has been granted by TAHD National Headquarters, the import permit will be issued within five working days by the Area Import Veterinary Specialist, or delegate.
Wherever an import permit is required for returns, the permit must be issued prior to the arrival of the animal or commodity at the port of entry into Canada.
- Special conditions for the return will be indicated on either Form CFIA/ACIA 5083, parts B and C (reserved for CFIA official use) or the import permit, as applicable. The importer is fully responsible for all associated costs of the return and for abiding by all the specific import conditions, which are detailed within the return authorization or import permit.
- Date modified:
|
<urn:uuid:46d7b972-aa5d-4c01-a9b3-06c92c7363bd>
|
CC-MAIN-2022-33
|
https://inspection.canada.ca/animal-health/terrestrial-animals/imports/import-policies/general/2010-9/eng/1321083659536/1434134370802
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.926199
| 1,969
| 1.578125
| 2
|
Empatica's Embrace smartwatch can monitor and understand your behavior. (Empatica )
Like many health conscious Americans, Dr. Rosalind Picard wears a fitness tracker on her wrist. But hers doesn't just track steps, it has an extra sensor that gathers medical information.
Picard hopes the sensor, which measures the skin's electrical response, will soon save lives by predicting major health events such as epileptic seizures. As a leading engineer at the MIT Media Lab, Dr. Picard researches the autonomic nervous system, which includes heart rate, respiration, digestion, perspiration, and the fight-or-flight response.
Picard’s smartwatch, developed by her company Empatica, records electrodermal (EDA) activity and wirelessly sends the data to a smartphone. The technology isn’t new, versions of the sensors have been used in polygraph tests for decades.
But new, highly sensitive sensor technology can now provide a continuous reading on our emotional states, linking the tiniest increase in sweating to psychological or physiological arousal.
Picard calls this idea of using tech to help bridge the gap between human emotions and technology, ‘Affective Computing’ and she has been driving this field of study for several years.
She takes her research personally, and wears her wristband sensor every day. It shows when she’s stressed, and when she’s calm, and yields surprising insights. When Picard compares her data with other researchers wearing the sensor, she notes that her tolerance of stress is higher than average. “We find individual differences in stress points,” Picard explained. “I tend to thrive on thrill-seeking high stress situations, but other people would go nuts with what I do.”
Using Sensors for Autism
The insight Picard has gleaned from electrodermal sensors go far beyond mood tracking. For people with autism, Picard’s lab has shown that the sensors can reveal emotional episodes that they might not be able to express verbally. “A person with autism gets overloaded and they shut down and retreat into their own little world,” she said.
Picard explained that autistic responses to difficult situations can seem non-intuitive and sudden to observers and might involve head banging, other self-injury, or catatonic behavior. “In some instances, they are doing this to release a neurotransmitter that can quell the pain.” Picard explains, "if an autistic kid is lying on the floor motionless, but his EDA sensor reads that his signals are through the roof, caregivers can make better decisions about how to respond."
Electrodermal sensors also have important implications for youth with epilepsy, which Picard discovered when one of her students placed the sensors on his brother. Twenty minutes before his brother had a Grand Mal seizure, the sensors registered off-the-charts skin conductance.
After further study, Picard and her collaborators were able to show in peer-reviewed scientific publications that EDA sensors could provide reliable warning for seizures in some patients.
During very serious and possibly life-threatening seizures, respiration can be affected and even stopped. Known as sudden unexpected death in epilepsy (SUDEP), this is a risk especially for children, affecting 3 in 100 epileptics, often during sleep. “That risk is a lot higher than other causes of death. SUDEP kills more people than house fires, more than AIDS, and it is very stigmatized,” said Picard. “But we believe it is preventable in most cases.”
Last fall, Picard’s company, Empatica, launched a crowdfunding campaign on Indiegogo and raised over $700,000. The smartwatch, called Embrace, combines technology from fitness trackers with EDA and heart rate sensors to measure stress, epileptic seizures, activity and sleep. The company’s challenge now is to complete the FDA approval process and finish production on the first models that will go to backers of the campaign, many of whom are epileptics.
Get the best of KQED’s science coverage in your inbox weekly.
|
<urn:uuid:fab434c4-1e2c-4d53-8d6d-7c54ec66f935>
|
CC-MAIN-2022-33
|
https://www.kqed.org/futureofyou/3811/a-new-smartwatch-that-detects-seizures-and-emotional-stress
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.951054
| 889
| 3.109375
| 3
|
Soldiers have pulled a man alive from the rubble of a large mosque flattened by an earthquake on the Indonesian island of Lombok, while thousands of homeless locals waited for aid Tuesday and stranded tourists camped at beaches and in the lobbies of damaged hotels.
The north of Lombok has been devastated by the magnitude 7.0 quake that struck Sunday night, killing at least 105 people, seriously injuring more than 230 and destroying thousands of buildings. Two days after the quake, rescuers were still struggling to reach all the affected areas and authorities expected the death toll to rise.
Disaster officials have not said how many people they believe are buried beneath the ruins of the Jabal Nur mosque in Lading-Lading but the village head, Budhiawan, said about 30 based on unclaimed belongings left outside the mosque.
Muhamad Juanda, who narrowly escaped, said 100 people were inside praying when the earth began to roll. Many got out but dozens were trapped, he said.
"When the earthquake happened, I stopped praying with dozens of other people. I stayed during the first shock, but the shock grew stronger and we rolled around trying to run out," he said.
Video shot sometime Monday by a soldier showed rescuers shouting "Thank God" as a man was pulled from a space under the mosque's flattened roof and staggered away from the ruins supported by soldiers.
"You're safe, mister," said one of the soldiers as emotion overcame the man, clad in Islamic robes, and villagers crowded around him.
Disaster agency spokesman Sutopo Purwo Nugroho said he hopes "a lot" of people can be saved from the mosque. Two people were rescued from the debris Monday including a woman with a broken leg, said villager Supri Yono, and three were found dead. An AP reporter saw one body recovered Tuesday.
"We're forced to deal with broken bones in the traditional way at home because the hospital had to deal with hundreds of other injuries," said Budhiawan, the village head.
Rescuers were using heavy duty cutting equipment on Tuesday to prize apart the tangled mound of debris.
Aid organizations, already on Lombok after it was hit a week earlier by a 6.4 quake that killed 16 people, said they were stepping up their humanitarian efforts.
Oxfam said more than 20,000 people were in temporary shelters and thousands more were camping out in the open. It said clean drinking water was scarce because of a recent spell of extremely dry weather in Lombok. Food, medical supplies, tarpaulins and clothes are also urgently needed, it said.
The lush countryside of northern Lombok is pockmarked with collapsed homes and shops and damaged mosques. Thousands of people sat on roadsides outside their houses under blue makeshift tents and tarps, too afraid to stay inside because of aftershocks or their homes now uninhabitable.
In the northern town of Tanjung, rescue workers in orange uniforms spent a second day trying to recover a body from the rubble of a destroyed home as a foul stench rose above it.
The brother-in-law of the dead man complained that authorities have not brought in heavy equipment that it is desperately needed.
"I want him to be pulled out of there immediately. But they're working too slow," said Masin, the brother-in-law, as ambulances passed by, sirens wailing.
Behind him, the rescuers, a dozen of them, were drilling into a flattened concrete wall. They had already used saws to cut a square out of the slab but could not find the body.
"The body is pinned underneath. We brought in sniffer dog and used saws and a drill but we can't figure out where he is," said Aprintinus Titus, a rescue worker from the National Search and Rescue Agency.
"We will not give up until we pull him out of this rubble. We know how hard his family is suffering," said Titus.
Hundreds of tourists and workers were still struggling to get off three outlying resort islands where power was cut off and hotels and hostels were damaged. Nugroho said more than 4,600 foreign and Indonesian tourists had been evacuated from the islands, with ships taking people to ports in Lombok and Benoa, Bali.
British tourist Saffron Amis, who was stranded on Gili Trawangan island, said she spent a second night outdoors as aftershocks rattled the region before finally securing space on a boat.
"We slept in a bungalow until another quake hit us at midnight and then we moved to the beach," she said.
At Lombok's airport, dozens of tourists slept on the floor as they waited for flights off the island. Many hotels closed because of damage but some allowed travelers to camp in their lobbies.
"That was my first experience with the earthquake and it was really terrible," said Lize Reert, a Belgian woman among the several thousand who fled Gili Trawangan. "It was a nightmare in my life."
Like its better known neighbor Bali, Lombok is home to beaches and mountains. Hotels and other buildings in both locations are not allowed to exceed the height of coconut trees.
Indonesia is prone to earthquakes because of its location on the "Ring of Fire," an arc of volcanoes and fault lines in the Pacific Basin. In December 2004, a massive magnitude 9.1 earthquake off Sumatra triggered a tsunami that killed 230,000 people in a dozen countries.
Please click to read our informative text prepared pursuant to the Law on the Protection of Personal Data No. 6698 and to get information about the cookies used on our website in accordance with the relevant legislation.
6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca hazırlanmış aydınlatma metnimizi okumak ve sitemizde ilgili mevzuata uygun olarak kullanılan çerezlerle ilgili bilgi almak için lütfen tıklayınız.
|
<urn:uuid:2792f69f-1d47-4a4c-8ccd-f8e676e67897>
|
CC-MAIN-2022-33
|
https://www.dailysabah.com/asia/2018/08/07/dozens-buried-under-collapsed-lombok-mosque-indonesian-earthquake-survivor-says
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.979877
| 1,281
| 1.585938
| 2
|
Jesus is the Son of God, Friend of Sinners and our High Priest. Do you know what this means? In today’s message, Bruce preaches on the high priesthood of Christ and what this means for us as we continue our Lenten meditations on Jesus.
Bruce preaches on this Second Sunday in Lent. We are all sinners in need of God’s love. Jesus calls us his friends. What does it mean to be friends with Jesus? How are love and obedience connected for those who follow Christ? John 15:1-15
The Gospel Lesson: Mark 1:1-13
Bruce preaches as we begin the season of Lent. In Luke’s Gospel, Jesus tells us about exalting ourselves in comparison to humbling ourselves before God. The story He told about the Pharisee and tax collector invites us to take a closer look at ourselves.
Today’s sermon explores the transfiguration story and the importance of listening
to voice of Christ.
With this message Bruce concludes our month long series on faithful Christian stewardship. God calls us to be faithful stewards of all He has entrusted to our care…and to be honest with Him and ourselves when it comes to our service as baptized ministers of Christ.
Bruce shares his third message in this series on mature Christian stewardship. TheApostle Paul tells us that God loves a cheerful giver…and that we are to “make up our minds” when it comes to our gifts and offerings. God deserves more than leftovers!
II Corinthians 9:6-15
Bruce continues our month long meditation on Christian stewardship.
In our reading from II Corinthians, we learn how the Macedonian Christians were afflicted and stricken with poverty…yet they were known for their abundant joy, overflowing generosity and utmost eagerness in serving the Lord.
II Corinthians 8:1-9
|
<urn:uuid:fb8518dc-dea5-46f0-9ab2-92c95e1f5986>
|
CC-MAIN-2022-33
|
https://wordpress.faithabq.org/type/audio/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.919472
| 418
| 1.65625
| 2
|
Whether you are recruiting staff or looking for a job, it’s important that you understand job descriptions.
Job descriptions (or JDs as they are sometimes called) are crucial documents that help employees and employers understand what is expected of them both during an employment term.
This guide will explain everything you need to know about job descriptions, whether you are a job seeker, recruiter, business owner or HR professional.
This guide contains…
- Job description info
- How to write a job description
- Job description examples
- Job description templates
What is a job description?
A job description is a written document which describes the purpose and responsibilities of a particular job, along with the skills and experience that a candidate would need in order to carry out the job successfully.
Job descriptions are created by employers and shared with candidates during the application process, and kept by employees for the duration of their time in that job.
What is the purpose of a job description?
Job descriptions have several functions which assist businesses, candidates and employees, during the applications process and the duration of the job, including:
- Providing potential candidates and employees with a full understanding of who they will be working for and the main job responsibilities
- Showing candidates the skills, experience and qualifications needed to be successful in the role
- Giving recruiters a detailed brief of which type of candidates to approach when recruiting for the job
- Allowing HR staff and business management to define the job duties, so that new hires can be integrated into the team efficiently and work is disturbed properly across the business with no overlap or gaps
- Providing a benchmark for management to measure the employee’s performance
- Providing a vital reference document for HR or management in cases of employee disputes
Benefits of a good job description include;
- Improved recruitment process and quality of new hires
- Improved employee satisfaction
- Improved staff performance
- Reduction in staff turnover
Negative impacts of a poor job description include;
- Fragmented recruitment process and poor quality of new hires
- Employees becoming confused about what their responsibilities are
- Poor staff performance
- Increased staff turnover
Who writes job descriptions?
Job descriptions will usually be written by a staff member of the employer’s company, but could also be written by an external consultancy.
The following people within an organisation would normally be responsible for writing job descriptions;
- Business owners: In small companies of around 1 – 5 staff, the owner of the business will often write the job descriptions
- Hiring managers: In larger companies, there will usually be a head-of-department for the particular area who are hiring, and that person will be known as the hiring manager
- HR professionals: If a company has a Human Resources department, then it’s possible that a member of the HR team will be responsible for recruitment functions, including the writing of JDs
- Recruiters: Some companies will have internal recruitment teams who sit outside of HR, and are responsible for managing the recruitment of all employees for the company.
How to write a job description
Writing a good job description is essential for attracting and maintaining good staff.
Although job descriptions will vary slightly depending on the job and company, there are a few guidelines you should stick to when writing one, if you want to get the best results.
Format and structure
The document should be around one page of A4 in length and written with a clear font, and broken up into clear sections with bold headings and bullet points for ease of reading.
The colour scheme can differ depending on your company branding, but should remain simple – you may also want to include a company logo at the top.
To ensure all the essential information is included, follow the structure below as closely as possible…
Head the top of the page with the job title in large bold font – keep it short, simple and easy for all to understand.
Quick tip: Avoid gimmicky job titles like “marketing ninja” or “finance guru” – they aren’t cool, and they might make candidates doubt the credibility of your company. Instead use a commonly searched job title like “marketing manager” to stay professional and ensure your job ads get plenty of search traffic.
Provide a brief overview of your organisation, including what services or products they offer, what markets you operate in, and who your customers are. You can also add some details on the company culture and history.
A brief summary of the job’s main purpose and how they fit into the bigger picture of the organisation’s operations.
Department and reporting lines
In larger companies you may need to add a further 1-2 sentences to explain which department the role sits within, and what the function of that department is. In all cases you will need to outline who the job holder will be reporting to (who their line manager will be)
List out the core responsibilities of the job in around 6 – 10 concise bullet points. This points will vary greatly depending on the job, but will include things like; who the employee will communicate, what processes they will manage, what work they will produce, and what results they might be accountable for.
Smaller companies will tend to list more responsibilities than large ones, because their roles will often cross multiple functions (e.g. a junior sales person in a company of 3 staff could also have some administration and marketing responsibilities because the company is not large enough to have an admin and marketing department)
Larger companies will often have smaller lists of responsibilities, because having more staff allows them to have more defined roles, and employees will not normally need to assist the firm outside of their own department.
Expectations and commitments
Detail the commitments required to the role, such as work hours, part-time/full-time, perm/contract and workplace location. Highlight anything that falls outside of normal job expectations, such as travel, overtime, and working evenings or weekends.
Outline the requirements that a candidate must meet to be considered for the job and perform well in it. This should include;
- Hard skills such as software proficiency, languages, industry specific skills etc.
- Soft skills such as communication, attention to detail, problem solving etc.
- Previous experience within industries, working with certain customers or locations etc.
- Qualifications including academic and vocational courses
Call to action
At the very bottom of the page, add a brief note which encourages suitable candidates to apply and how to do so, including a contact name and email address they can send their CV to
This section is only for the benefit of potential candidates who see the job description before they apply for the job. This is likely only to be internal candidates or referrals, as most candidates will apply for the job via an online job advert, before interacting with the recruiter/hiring manager, and being sent the job spec.
However, if you are copying your job description copy into your online job adverts, all applicants will be able to see this info.
Should you include salary?
Whether or not you choose to include salary or salary range in your job description (and job adverts) is entirely optional and will depend on your recruitment strategy.
Some companies choose not to include a salary range to keep their options open and discuss salary with candidates further down the line… Others advertise high salaries in an attempt to attract a larger number of applicants… And there are many more strategies in between those two, so if you’re unsure, then discuss with your team or do some research online and decide what is best for your organisation.
Common job description mistakes to avoid
When writing a job description, avoid these common mistakes which could attract the wrong candidates, provide poor guidance to employees, or even break employment laws.
Jobs should only be awarded on merit via the candidate’s skills, knowledge and experience, and your job description should reflect this.
UK employment law (and many other countries) prevent employers from discriminating against potential employees on the grounds of personal characteristics like:
- Marital status
This can sometimes be done unintentionally, for example writing “handyman” or “young graduates” could just be a slip of the keyboard, so triple check that no parts of your job description appear discriminatory before putting it to use.
Using too many jargon terms or overdoing the “corporate speak” can confuse and annoy candidates, meaning less applications for your role.
For example, writing something like…
“looking for a digital guru to shape our vision and growth hack us beyond our KPIs”
Doesn’t make any sense to most people… Especially those at junior level.
Keep the language simple and professional to deliver the clearest message to all.
Including too many responsibilities
Having an endless responsibility list will overwhelm candidates and make for a horrible reading experience.
If you find yourself going over 10 bullet points, then you may find that you are listing tasks rather than responsibilities. Try to think about the bigger picture of the role, and the functions and results the employee will be responsible for, rather than the smaller tasks they will be carrying out.
How to make a job description more appealing
Aside from the guidelines above, there are a few more tips you can use to make your job descriptions more appealing and attract more of the right candidates…
- Write as if you are talking to a real person (which you will be): Most job descriptions are impersonal, cold and boring. Of course, you have to keep it professional, but try to add a splash of personality and connect with readers
- Put yourself in the candidate’s shoes: If you want to write a job description that will excite candidates and encourage them to apply, think about what potential candidates would want to know about the role, and what elements of the role would interest them most.
- Speak to current employees: If you are hiring into an established team then asking current team members about the role will help you to define it properly and ensure the job description is accurate.
Can my employer change my job description?
Job responsibilities often change over time as the way we work evolves, and slight adjustments to job descriptions are to be expected (this is something that can be covered in the responsibilities section of a JD).
Any major changes in an employees job duties must be discussed and agreed prior to commencing.
Job description examples
Here are a few job description examples for a range of professions and industries, to give you an idea of how a job description should look, and the type of information it should include..
Search the site for further examples, our browse our job description example page.
There are also templates you can download for free beneath the example section.
Project manager job description example
Project manager |The IT project company
At ITPC we deliver word class project management services to high profile clients across the globe, with a focus on IT infrastructure solutions to the banking and insurance sectors.
About the role
We are looking for a project manager to lead large scale IT infrastructure projects for our clients, and ensure they are completed on time and within budget, whilst delivering all project objectives and exceeding client expectations – reporting to the Head of UK Projects
- Determining initial scope of project and setting milestones, deliverables and objectives in accordance with stakeholder requirements
- Mapping requirements of internal resources and securing capable project teams
- Cost forecasting and optimal allocation of resources and budget across projects, making project adjustments and constraints where necessary
- Plan and schedule projects and tasks, track progress and updates project documents using project management tools
- Identify, manage and mitigate project risks and issues
- Regular communication, reporting and progress updates to stakeholders
- Recruiting and managing contractors, vendors suppliers and other external parties
- Managing and allocations all internal resources and ensuring deliverables and milestones are met
Location & commitments
- Permanent full time role based at our London office Monday – Friday (37 hours per week) with regular onsite client visits
- Overtime may be required to ensure client projects are delivered on time
- Weekend work is rare but can occasionally be necessary
- Previous experience leading large projects in professional environments and managing senior stakeholders
- Competence in creating project documentation, tracking projects and using project management tools such as MS Project
- Ability to manage medium sized teams, contractors, vendors and suppliers across remote locations
- Strong written and verbal communication skills, leadership, problem solving, budgeting and mediation abilities
- Recognised project management qualification such as Prince2 or PMP
- Strong knowledge of, or background in IT infrastructure
Contact us to apply
If you’d like to apply for this role, please contact our project team recruiter, Mike Edmund at email@example.com
Attach your CV and tell us why you would be a great fit for our project management team!
Find average salaries, skills, requirements, qualifications and more on our full project manager job description guide.
Sales assistant job description example
Shopzy is looking for a Sales assistant
Who we are
At Shopzy, we are a fun caring brand, looking to deliver the very best in ethical fashion to our millennial customers of all backgrounds and lifestyle choices
What you’ll be doing
We need a talented and friendly sales assistant to help our in-store customers find the best products for their needs and ensure an amazing customer experience, whilst boosting sales and repeat business for the store – reporting to the shop manager.
You will be responsible for…
- Ensuring customers receive an outstanding customer experience, by meeting-and-greeting and answering product questions attentively on shop floor
- Maintain optimal stock levels by assisting in stock checks and ordering stock from head office
- Assessing customer needs and recommending suitable products
- Promoting product offers and shop loyalty card to generate repeat business from customers
- Keeping shop safe and attractive to customers by with regular checks, tidying and assisting with visual merchandising
- Processing customer transactions at the counter, dealing with refunds and handling complaints
- Opening and closing of shop including balancing of cash registers
What we need from you
- Part time role offering flexible hours (minimum 10 hours per week)
- Based in our lively Manchester shop – occasional cover in nearby shops may be required
- Weekend and evening work is highly likely
What skills & experience you’ll bring to us
- Excellent face-to-face communication skills and a willingness to go the extra mile to make our customers smile
- A good grasp of basic mathematics and English language
- A high level of patience and the ability to work in a busy and sometimes pressurised environment
- Ideally you will have experience working in a customer facing role within a retail environment, but this is not essential
- Basic GCSEs are helpful but not mandatory
Want to apply? Get in touch today
If you think you’ve got what it takes to join our passionate and fun-loving team, drop us an email at firstname.lastname@example.org, attach your CV and tell us why you’d love to work here.
Find sales assistant average salaries, skills, requirements, qualifications and more on our full sales assistant job description guide.
Account manager job description example
Account manager – DL Car Rental
We strive to remain Europe’s leading car and van rental provider by offering the highest quality vehicles to our customers, market leading service and insurance provision at affordable prices.
We are looking for an account manager to manage a portfolio of existing UK corporate clients, foster strong relationships, manage service provision and maximise sales opportunities within all accounts.
- Initiate regular meetings with key account contacts to strengthen relationships and assess ongoing client needs
- Act as main point of contact for client queries and complaints, in order to resolve efficiently
- Map out quarterly plans for key accounts, identifying opportunities of poor performance and areas prime for growth – identify key client staff to contact and develop accounts
- Grow revenue streams within client accounts via cross-selling and up-selling on existing plans
- Stay up-to-date with all new products and services and update clients accordingly
- Generate sales forecasts and track progress throughout each quarter
- Develop win-win solutions for both company and client via effective contract negotiation
- Monitor client service provision to ensure customer satisfaction and efficiency
|Permanent role||35 hours per week||Overtime required as necessary|
|Full-time||Reading office||Occasional travel for client visits required|
|Monday to Friday||Reports to: UK sales manager|
Key skills and experience required
- Previous experience in a client facing sales role in a B2B environment
- Proven track record of building relationships and closing revenue-generating deals
- Ability to communicate with senior stakeholders at executive and C-level
- Strong abilities in negotiation, networking, persuasion, presentation and time management
- Experience managing service provision to B2B customers
- Previous experience in corporate care rental is preferred but not essential
How to apply
If you would like to apply for this role, please send your CV to our UK sales team leader Gary Ince – email@example.com explaining your suitability and availability.
Find account manager average salaries, skills, requirements, qualifications and more on our full account manager job description guide
Job description templates
Our job description templates provide you with fully formatted downloadable text documents, with guidance notes for creating your own professional and effective job descriptions.
Simply download one that suits the style of your organisation, fill out the details needed for your job (using our example job descriptions for inspiration if you need to)
Then, save your job description as a non-editable PDF before distributing to the job market.
Basic job description template
Tech firm job description template
Corporate job description template
Writing a job description
Writing a job description can be challenging, but armed with the advice and resources above, you should be able to create a clearly defined job description which attracts quality candidates, keeps them focused and happy, and retains them with your company for a long time.
|
<urn:uuid:5d8e2979-58d7-4e38-8afa-2f049de4922f>
|
CC-MAIN-2022-33
|
https://standout-cv.com/job-descriptions/job-description
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.933805
| 3,798
| 2.515625
| 3
|
SINGAPORE ― Chinese companies have set their sights on the Asia-Pacific region as a potential market for their burgeoning line of armed unmanned aircraft, with the appearance of two such platforms at the Singapore Airshow for the first time.
Both the Chengdu Aircraft Industry Group’s Wing Loong and the larger Wing Loong II were on static display at the air show, which runs Feb. 6-11, along with a suite of mock-up weapons for potential customers to view.
Representatives at the China National Aero-Technology Import & Export Corporation booth were cagey about potential markets in the Asia-Pacific for the Wing Loong II, with one saying that the company is looking at “traditional markets in the region” when asked by Defense News.
China has had recent success in arms sales to the region, with regional countries like Myanmar and Thailand having recently acquired weapons from China. However it would not be beyond the realm of imagination to see countries like Indonesia turning to China to supply armed UAVs if there is a need for such capabilities.
According to marketing literature, the Wing Loong II is a “multi-purpose reconnaissance-strike integrated UAV system” that operates at medium altitude, and it can be used in reconnaissance, surveillance and damage assessment along with real-time attack on time-sensitive targets.
Standard payloads include an electro-optical turret that has infrared, laser rangefinder and designator capabilities as well as a separate synthetic aperture radar. Electronic intelligence, communications intelligence and electronic warfare payloads are also available.
The Wing Loong II was first observed in 2015, with the first flight reportedly occurring in February 2017.
The manufacturer says the type has a maximum takeoff weight of 9,260 pounds, a maximum speed of 230 miles per hour, a service ceiling of 29,500 feet and an endurance of 20 hours.
Six hardpoints on the Wing Loong II carry a total of 1,060 pounds of external stores, which can include various guided bombs and missiles. The type is also fitted with a satellite communications suite for beyond line-of-sight operations around the globe, along with a data link for line-of-sight control.
A company video played at the Singapore Airshow shows the Wing Loong II operating in both desert and littoral environments, with the latter showing it attacking small surface craft using 220-pound YJ-9E anti-ship missiles. The video also boasts that the Wing Loong II can be fully fueled and armed within 30 minutes of landing.
It was reported in January 2017 that the United Arab Emirates was the launch customer of the Wing Loong II, with three UAVs matching the dimensions of the type sighted on satellite imagery of the Qusahwira air base taken in October 2017.
Saudi Arabia and Egypt are also said to have ordered, or are operating, the Wing Loong II, although this has not been confirmed.
|
<urn:uuid:ed22d604-fbe3-450d-99db-e28c12867157>
|
CC-MAIN-2022-33
|
https://www.defensenews.com/digital-show-dailies/singapore-airshow/2018/02/07/chinese-firm-shows-off-two-drones-in-a-first-for-singapore-airshow/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.957771
| 603
| 1.679688
| 2
|
On Wednesday, the Monetary Moments described that Russia and Ukraine had created “significant development on a tentative 15-point peace plan” that would end Russia’s invasion and have to have Ukraine to turn into a forever neutral state with its possess armed service in the mould of Sweden or Austria. Ukrainian officials have presently played down the prospective customers of the system, alternatively calling it a Russian ploy for time and a “draft, which represents the requesting placement of the Russian facet. Practically nothing a lot more.”
Analysts, however, observed that—depending on the final terms—the Russian placement would seem to be to be a significant descent from Vladimir Putin’s first aims when he introduced his brutal campaign three weeks ago with calls for for “the demilitarization and denazification of Ukraine” and the purpose of toppling the democratically elected federal government in Kyiv. As New York Periods worldwide columnist Max Fisher set it:
The pace and extent of Moscow’s climbdown is just head-spinning. Three weeks in the past it termed Ukraine a rightful Russian territory operate by genocidal Nazis. Now it’s voluntarily featuring the Sweden model – a Western ally in all but title – and obtaining instructed no!
The satan is in the particulars, clearly, and a peace offer with Putin will depend on Ukraine’s capability to sustain an army able of defending the region, as effectively as outside the house assurances of protection from other countries. (This is difficult, because the U.S., the U.K., and Russia reported they would assurance Ukraine’s safety if the region gave up its nuclear weapons after the dissolution of the Soviet Union and that deal evidently has not been upheld.) But the Financial Situations described that the “biggest sticking point stays Russia’s desire that Ukraine [recognize] its 2014 annexation of Crimea and the independence of two separatist statelets in the eastern Donbas border location.”
If the Russian climbdown is real—and with the added caveat that there is considerably we never know about the state of negotiations—then Kyiv should nevertheless be leery that Putin does not change these a offer to his lengthy-expression advantage. It is value looking at the classes of one particular previously aborted peace initiative when imagining about how Ukraine can prevent an unfavorable consequence now. That proposal, which would have benefited Putin drastically, arrived from a Russian spy who tried using to get previous President Donald Trump to endorse his system. Looking at the contours of that draft initiative reveals the kind of concessions that need to be prevented now if at all probable.
The strategy of an autonomous Luhansk and Donetsk in the Donbas is barely new. And it was central to the 2016–2018 program we have perception into thanks to the Senate Intelligence Committee’s 2020 report outlining Russia’s interference in the 2016 election. Konstantin Kilimnik, the onetime righthand man to Donald Trump’s 2016 campaign chairman Paul Manafort, proposed and pushed this strategy as section of an work to finish the conflict in Eastern Ukraine to Putin’s final edge. (Kilimnik was explained by the report as a “Russian intelligence officer” supplying information to Russian intelligence, and previous year the U.S. Treasury Division, in issuing sanctions against Kilimnik, reported he was a “known Russian Intelligence Products and services agent employing impact functions on their behalf.”)
Manafort was fired in August 2016 from the Trump marketing campaign following allegations that he had acquired thousands and thousands of dollars for off-of-the-publications operate he did with Kilimnik to put in and prop up former Ukraine President Viktor Yanukovych, the Russian-backed leader whose ouster in 2014 led to Russia’s annexation of Crimea and the separatist war in Eastern Ukraine. Around the program of several months from 2016 to 2018, though, Kilimnik sought to use Manafort’s situation in Trump’s orbit to influence U.S. coverage and thrust what Kilimnik described in e-mails as a Russia-endorsed approach to finish the conflict in Ukraine, seemingly to Putin’s benefit. All through a key August 2016 conference at which Manafort gave marketing campaign polling data to Kilimnik (who then allegedly passed it on to Russia), the two gentlemen mentioned that probable “peace plan.” As the Mueller report described it:
Manafort and Kilimnik talked about a plan to take care of the ongoing political difficulties in Ukraine by developing an autonomous republic in its much more industrialized jap location of Donbas, and obtaining Yanukovych, the Ukrainian President ousted in 2014, elected to head that republic. That plan, Manafort afterwards acknowledged, constituted a “backdoor” implies for Russia to control eastern Ukraine.
Manafort missing his position just before receiving a probability to press his boss to aid employ it as president. But we know that Kilimnik pressed Manafort about it for months following that assembly, even after Trump took workplace and Manafort was currently under indictment for his get the job done in Ukraine.
Also from the Mueller report:
Many months afterwards, soon after the presidential election, Kilimnik wrote an e-mail to Manafort expressing the view—which Manafort afterwards stated he shared—that the plan’s success would have to have U.S. guidance to succeed: “all that is required to begin the procedure is a really minimal ‘wink’ (or slight press) from [Donald Trump].” The email also mentioned that if Manafort were specified as the U.S. representative and began the course of action, Yanukovych would make certain his reception in Russia “at the really top stage.”
“Russians at the really best degree are in theory not versus this plan” that would “start the process of uniting [the two breakaway states] into one particular entity,” Kilimnik wrote. If the program went in advance, “DT could have peace in Ukraine mainly within just a number of months after inauguration.”
The outlines of the program experienced a few elements. Very first, the prepare termed for the “creation” of the “Autonomous Republic of Donbass” that would be fashioned “within the borders of Donetsk and Luhansk oblasts that existed prior to April 2014, when the armed conflict began.” Individuals borders incorporate additional than 10 % of Ukraine’s inhabitants, a vast amount of money of the country’s agricultural land and natural means, and many of the metropolitan areas now below siege and assault by Russian forces. It also involves the city of Mariupol, which has been devastated by Russian bombardment of civilians and is house to a important port. Kilimnik even named his proposal the “Mariupol program.” The next component of the system included Ukraine incorporating this “autonomous republic” into its possess human body politic via a parliamentary vote that would grant the area “reintegration” into the Ukraine and its personal political illustration in the state. The “Autonomous Republic of Donbass” (ARD) would therefore have influence about Ukraine’s political affairs. The 3rd and final position of the approach would grant the location its individual prime minister, who would be “a authentic and plenipotentiary consultant of ARD in talks with intercontinental buildings.”
The essential to the whole prepare, which would give a Russian quisling regulate more than a essential region and ability to influence Ukrainian domestic and international affairs, was Trump’s endorsement. Kilimnik wrote:
Private participation of the US President will guide to stopping the bloodshed, returning political balance and balance in Ukraine, producing a secure and powerful professional-European legislative the greater part, capable of applying powerful reforms.
Trump clearly hardly ever endorsed the strategy, but this episode offers insight into what Putin may well want from the conflict if he has in fact pulled back from his far more outlandish aims. The “Mariupol plan” is a document of how Russia could find to affect Ukraine from within just, with out annexing even more territory. It’s also distinct proof that Mariupol, which features a port and the probable to make a land bridge to Crimea, is vital to even Putin’s most negligible war aims, which is probably why it has been these kinds of a target for Russia in its Ukraine invasion.
As matters stand, Russians however have not obtained regulate of Mariupol, nor most other major Ukrainian cities. But if Putin will not settle for something fewer than a little something like the “Mariupol approach,” Ukraine could be in for a lot more turmoil, even must Russia officially withdraw its forces and depart Ukraine, on paper, with the borders it had before this war.
|
<urn:uuid:181c9332-fb34-4aa9-81e5-605d277388a8>
|
CC-MAIN-2022-33
|
https://www.prs-angola.com/the-trump-era-ukraine-peace-plan-central-to-the-mueller-report.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.959684
| 1,842
| 1.71875
| 2
|
Most parents want to help in the education of their children, but say they just don't know what to do.
Whether they are in kindergarten or middle school, this QuickTip stresses that any interest parents show in their child's learning can make a real difference in their child's education.
The research is clear. Parent involvement in the education of their children makes a big difference in a child's school success—before kindergarten and through middle school. This QuickTips helps parents see how important their influence can be on their children's education and helps motivate parents to see that anytime they get involved they begin helping their child.
Click here to view a sample in English.
Click here to view a sample in Spanish.
For quantities not listed, please email customer service at email@example.com.
|
<urn:uuid:146e9136-60df-4ef3-848f-68534965a94a>
|
CC-MAIN-2022-33
|
https://parent-institute.com/collections/quicktips-for-parents/products/its-never-too-late-to-get-involved-elementary-school-version
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00064.warc.gz
|
en
| 0.937554
| 261
| 2.453125
| 2
|
Scholars committed to industry research know that the kinds of problems they address are multifaceted, and that the perspectives brought by several different academic disciplines often are required for significant advances. The Center for Industry Studies is dedicated to broadening and deepening a multidisciplinary community of scholars who are focused on industry research. By encouraging communication with industry practitioners and recognizing the importance of field-based research, the Center hopes to advance scholarship and have a broad impact on industry and the community.
Our research helps to provide unique educational opportunities for undergraduate and graduate students and serves as a vehicle for helping students gain access to professional opportunities. Through research and education we seek to enhance the well-being of our community and to further its economic development.
Communication between academic research activities and business firms can lead to partnerships that encourage educational opportunities and economic advancement. For students, the results can involve exposure to competitive problems at the cutting edge of economic change. For firms, the results can be the solidification of competitive advantage in a dynamic environment. For communities, the results can lead to a basis for knowledge that will support economic development. After more than a decade of industry research and collaboration, faculty members who lead research in the Center for Industry Studies have established the Center´s credibility and demonstrated its potential. The Center builds on this experience to encourage research on a broad range of industries... from the well-established to the newly emerging, from manufacturing to services and non-profit organizations. Through scholarship we seek benefits in education, competitiveness, and regional economic development.
|
<urn:uuid:466c67bd-5ee4-45a7-80eb-56d343ae43d0>
|
CC-MAIN-2022-33
|
https://www.engineeringx.pitt.edu/Sub-Sites/Centers/CIS/_Content/About/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.953697
| 309
| 1.59375
| 2
|
Bergziegen (Mountain Goats), 1914-16
Maria Marc, Ried.
Otto Stangl, Munich.
Gutekunst & Klipstein, Bern, 1956.
Richard A. Saidenberg, New York, 1956.
Anon. Sale; Christie’s, London, 13 Oct. 1994, lot 136.
Jan A. Ahlers, Herford, acquired at the above sale.
Galerie Arnoldi-Livie, Munich, 2002.
Private Collection, USA, acquired from the above.
A.J. Schardt, Franz Marc, Berlin, 1936, no. 1914/16, p. 168.
K. Lankheit, Franz Marc, Berlin, 1950, p. 48.
K Lankheit, Franz Marc, Katalog der Werke, Cologne, 1970, p. 212, no. 665.
M. Rosenthal, Franz Marc, Munich, 1989, no. 60.
C. Pese, Franz Marc, Aquarelle, Munich, 1990 (illus. p. 37).
A. Hoberg & I. Jansen, Franz Marc: The Complete Works, vol. III, Sketchbooks and Prints, London, 2011, p. 265 (illus. p. 256).
Zürich, Kunsthaus, Neue deutsche Malerei, 21 June – 15 July 1934.
Zürich, Kunsthaus, Marc Chagall, Karl Hofer, Franz Marc, Marianne von Werefkin, 13 Jan. – 13 Feb. 1935, no. 140 (dated 1913).
Bern, Galerie Klipstein, 1935.
Basel, Kunstmuseum, 1935.
Hannover, Kestner-Gesellschaft, Franz Marc: Gedächtnisausstellung, 4 March – 19 April 1936, no. 105; this exhibition later travelled to Berlin, Galerie Nierendorf & Galerie v.d. Heyde, May 1936, no. 60.
Bern, Gutekunst & Klipstein, April 1956, no. 205.
Berkeley, University Art Museum, Franz Marc: 1880 – 1916, 5 Dec. 1979 – 3 Feb. 1980, no. 47; this exhibition later travelled to Fort Worth, Art Museum, 23 Feb. – 13 April 1980 and Minneapolis, Walker Art Center, 4 May – 15 June 1980.
Berlin, Brücke-Museum, Franz Marc, Zeichnungen und Aquarelle, 3 Sept. – 29 Oct. 1989, no. 173; this exhibition later travelled to Essen, Museum Folkwang, 12 Nov. 1989 – 11 Feb. 1990; and Tübingen, Kunsthalle, 29 Feb. – 29 April 1990.
Nürnberg, Germanisches Nationalmuseum, Expressionistische Bilder: Sammlung Firmengruppe Ahlers, 23 Oct. 1996 – 16 Feb. 1997, no. L5.
Laren, Singer Museum, Duitse Expressionisten. Collectie Ahlers AG, 27 March – 14 June 1998.
Dresden, Staatliche Kunstsammlungen Dresden-Albertinum, Expressionistiche Bilder, Sammlung Firmengruppe Ahlers, 2000, no. 14.
Munich, Arnoldi-Livie, Kunst in München 1800 – 1914 und weitere Neuerwerbungen, winter 2002, no. 25.
Bergziegen numbers among a group of drawings, watercolours and oils which attest to the gradual development in Marc’s oeuvre towards abstraction. With the publication of Der Blaue Reiter in 1911, and his visit to Paris in 1912, Marc’s style found a new impetus: ‘By late in 1913 Marc was increasingly organising his vision within an abstract vocabulary. A language largely evolved from Kandinsky, Delaunay, and Futurism, as well as Macke’s colour compositions of 1912, this abstract mode unified his subject matter while reducing the melodrama’ (M. Rosenthal, op. cit., p. 36). Marc’s compositions from this period represent a synthesis of abstraction and representation. In Bergziegen the rounded forms of two mountain goats are set amidst a panoply of force lines and transparent planes. Rectilinear planes of colour converge in parallel lines from the lower edge of the composition, suggestive of a mountainous landscape. The overall organisation of the work, uniting animal to landscape, is a rich interplay of the figurative and the abstract.
In early 1914, as Marc moved more deeply into non-objective painting, the angular, splintered shapes derived from Cubism and Futurism gave way to increasingly curvilinear forms. In his last paintings and drawings, executed after the outbreak of World War I, Marc sought to create an entirely organic, non-referential visual reality that expressed spirit, dynamism and flux, which stemmed from an intense romantic idealism and an optimistically transcendent belief in the breakthrough to a new world. At the same time, however, seen in the context of a global cataclysm, these works possess a sinister quality in which monumental, impersonal forces irrevocably alter the human and natural landscape, purging it of subject and figurative form. One can only speculate on how Marc’s art would have further evolved; tragically, he was killed on the front lines near Verdun on 4 March 1916, at age thirty-six.
The work formed part of Franz Marc’s sketchbook no. SK XXX (1913/14), which belonged to Marc’s widow, Maria Marc, and whose estate was handled by Otto Stangl in Munich. The composition is a study for the oil painting Die kleinen Bergziegen, formerly in the Morton D. May Collection.
|
<urn:uuid:a1f49cc0-1e9a-4794-bb0b-4d01086e2359>
|
CC-MAIN-2022-33
|
https://www.simondickinson.com/artwork/bergziegen-mountain-goats-1914-16/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.78252
| 1,260
| 1.515625
| 2
|
TORONTO, Dec. 10 2010 – With the holidays around the corner it’s easy to get caught up in the hustle and bustle of the season, but safety is still important. Here are some trusted tips about holiday safety from The Dominion – Canada’s Trusted Insurance Company.
For your convenience all of the tips listed below have been tailored for easy social media. Tips consist of no more than 140 characters, so Tweet, Facebook or Blog away!
- Make sure to not overload extension cords with holiday decorations.
- Do not decorate chandeliers with flammable materials. Light bulbs can get hot enough to ignite the flammable material.
- If you own or rent property, prevent a slip and fall situation, salt/shovel walkways and driveways; more guests visit over the holidays.
- If you’re planning on travelling over the holidays, ask someone to watch your house; install automatic light timers as extra precaution.
- If you’re hosting holiday parties; have taxicab numbers on hand or be prepared to have overnight guests!
- Never toss wrapping paper or gift boxes in a wood burning fireplace. These materials increase the risk of a chimney fire.
Christmas Tree Safety:
- If purchasing a live tree, make sure it’s fresh and well watered. Cut approx. 2 inches off the trunk to help the tree absorb water.
- Real and artificial trees should be placed away from any fireplace, radiator or vent – the heat will dry the tree, creating a fire hazard.
- If you plan on purchasing or already own an artificial tree, double check that it comes with a label certifying it’s fire resistant.
- Check tree lights annually. Replace lights if there are broken/missing bulbs, or if wires are frayed/exposed. Check for overheating.
- When shopping, close car windows and lock all doors. Keep purchased gifts hidden in the trunk of your car.
- If you plan to purchase gifts online, make sure the site is secure to protect against identity theft; look for https to verify security.
For more information regarding how you can better protect the items you care about, please visit thedominion.ca.
About The Dominion
Canadian owned and operated since 1887, today The Dominion is one of the country’s largest property and casualty insurers. The Dominion takes pride in providing Canadians with confidence that the cars, homes and businesses they value are protected. A fierce advocate for consumer interests, The Dominion is committed to making sure the insurance system works best for consumers. The Dominion strongly believes consumers should have access to independent, professional advisors, who provide advocacy and choice, which is why they distribute their products exclusively through independent brokers. The Dominion’s priority is to earn and maintain the trust and loyalty of policyholders, employees and business partners. Visit thedominion.ca.
|
<urn:uuid:f4392c00-a0d9-44f9-8321-bcdfaf6f3c17>
|
CC-MAIN-2022-33
|
https://www.insurance-canada.ca/2010/12/10/the-dominion-the-12-tips-of-seasonal-safety/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.885415
| 607
| 1.648438
| 2
|
🍃🌷🌱🌷🌿🌷🍃 NATURE KIDS How these little robin chicks survived is a miracle.
🧡🎙🧡 NEWS – Learn about Robins and what seeing one of them means!
Yvonne, Bubble and #TEAMPricklyHedge
💜🐾🦔🐾💜 BUBBLE SAYS Keep doing what you’re doing #bubblesays#pricklyhedge #wildlifetip29
|💚 📔 💚 BOOK QUOTES “Oh say you’ll come, Squeek.” Who do you think gets excited that Squeek might come for tea? #pricklyhedge #bookquotes #savewildlife|
|🌟 🎨 🐇 🌍 🌟 CRAFTY KIDS How to make pretty snowdrops from a straw and paper|
🍃🌷🌱🌷🌿🌷🍃 NATURE KIDS Early Spring Timelapse narrated by Sir David Attenborough
check out Artur Homan on Youtube. This is a clip from “RHYTHMS OF NATURE IN THE BARYCZ VALLEY” movie. You can watch the full movie here: https://www.youtube.com/watch?v=xCexe…
🧡🎙🧡 NEWS – The Plant of Hope and Renewal
I hope you’ve been checking out the Prickly Hedge page this week and the website as I’ve been more active in getting content out there. If you’ve watched my live video, you’ll understand why I’ve not been on the radar as much for the last 12 months or so. If not, you can check it out HERE
I don’t know about you, but I seem to be playing catch-up everywhere at the moment, I seem to be behind in everything I’m doing. I have soo much to do, I don’t know where the time goes lol. If you’re not so fortunate or live alone, then please do come and check out the page and perhaps learn more about the natural environment and how you can help #teambubble in their quest to save the planet. If we can get out into nature or our gardens, it certainly does lift the spirits.
Talking about saving the planet, we are starting a new group on Facebook, it will primarily be for caregivers of children who want to help their kids engage more with the natural world and showing ways in which we can achieve that. There will be lives, discussions and interviews with eco-warriors who are doing their own thing looking out for what they believe in. Look out for it in February.
Searching around Youtube, I discovered a series on plant meanings, which I found fascinating. Today, Monday and this month, January, is symbolic of our beautiful, and much revered, snowdrop. Your task this week is to find a snowdrop or a crop of snowdrops, take a photo and drop it on our Facebook page @PricklyHedge
You can check out the video here
If you do see Yew Trees on your walks out, please DO NOT touch them, every part of the plant is poisonous from the foliage to the wood. They are gorgeous to look at; we have two here at Prickly Hedge and they feed the birds who are able to process the alkaloids that the tree contains but they are definitely poisonous to humans. You tend to find them in hedging or graveyards, but, beautiful as they are, keep your little ones (and big ones) away from them.
I hope you have a fabulous week doing whatever you are able to at the moment, come and engage with us and let us know what you’re up to in looking after our planet.
With lots of love from Prickly Hedge and #TeamBubble xx
💜🐾🦔🐾💜 BUBBLE SAYS Put birdseed out for wild birds #bubblesays#pricklyhedge #wildlifetip7
|🌟 🎨 🐇 🌍 🌟 CRAFTY KIDS Drawing with Vegetables. Use cut vegetables to create interesting shapes with paint.|
🍃🌷🌱🌷🌿🌷🍃 NATURE KIDS How Does a Seed Become a Plant?
|
<urn:uuid:8d3b91cf-c4fa-449d-87b6-f4720d386d70>
|
CC-MAIN-2022-33
|
https://www.pricklyhedge.com/2021/01/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.92464
| 981
| 1.851563
| 2
|
To receive the Luxiders Newsletter, sign up here.
Rows and rows of flowers spread across the horizon. As tourists flock to various meadows each year, famous for the perfect Instagram shot. Yet, behind the serenity of the scenes are trampled stems and crushed petals. This ‘flower tourism’ is destroying these idealistic habitats.
These beautiful spots are celebrated around the world. Whether it is the tulip fields of the Netherlands or the lavender meadows in Washington DC. Whether it is the tulip fields of the Netherlands or the lavender meadows in Washington DC. These beautiful spaces have become a number one hot spot for online influencers and casual tourists. In California, the famous flower fields receive on average 150,000 visitors each year.
Despite this flower-tourist economy being great for local businesses, it is detrimental to local wildlife. In 2019, the famous flower field Keukenhof in the Netherlands generated €25 million in revenue. Yet, with each tourist giving back to the economy, there are two feet crushing flower stems as they search for perfect lighting.
Every year, super blooms occur across the US, attracting various visitors. One popular destination was the Californian sunflower farm Bogle seeds. But due to various destructive visitors, the farm had to close in 2019, fearing their flower field would be irreparably impacted. This is not the only destination to introduce environmental measures. A famous flower field in Siniy Utes introduced a fence and clear signs after tourism to the area began to threaten research and development for local biologists.
Flower fields are much more than just a pretty space. They are home to a diverse, bustling ecosystem. These vital habitats support a variety of species, from grasshoppers and bees to small mammals and birds. Biodiversity, no matter how small, is something we need to protect.
Yet these spaces are disappearing. Not only tourism, building and infrastructure have also contributed to the loss of wildflowers and meadows. In Germany, species-rich meadows have decreased by almost 83.6% since the 1950s. Wildflowers are also essential as a primary habitat for bees, who are vital to multiple ecosystems as pollinators. Bees are also under threat. The loss of their habitat and increase in pesticide use has resulted in eight bee species being classified as endangered. The more wildflowers and flower farms we destroy through our ignorance, the more bees will be under threat.
WHAT YOU CAN DO
A shift must occur in our tourism. New, conscious tourism needs to be encouraged. Instilling an awareness and appreciation of the environment around us, rather than ignorance of our impact. When visiting flower fields, remain on the paths and behind fences, rather than venturing out to the middle for a 5-second picture, leaving destruction in your wake.
As we explore our world, we must be aware of how delicate our nature is. We can also encourage wildflower preservation, by donating to local and international charities whose goal is to preserve these diverse ecosystems.
|
<urn:uuid:e47927c9-2f11-4388-948b-1862a0aa5604>
|
CC-MAIN-2022-33
|
https://luxiders.com/where-have-all-the-flowers-gone-tourism-killing-our-fields/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.938481
| 636
| 2.59375
| 3
|
Why Are My Iphone Messages Green And Not Sending. Why are my iphone messages green and not delivered.the outgoing message bubble in the iphone message app is either green or blue. Imessages are green because the message was sent as an sms text message instead of imessage which is caused when the imessage is unavailable on the iphone, ipad, or the ipod.
The messages app could have an issue that is causing your iphone not to download any new messages from icloud. If your iphone messages are green, it means that they’re being sent as sms text messages rather than as imessages, which appear in blue. Why are my iphone messages green and blue.
When Sending An Imessage From Your Iphone, Make Sure That You Are Looking At Blue Send Button And Not Green Send Button.
Why are my iphone messages green and not sending.why iphone messages turn green. Imessages only work between apple users. Blue ones have been sent or received using apple's imessage technology, while green ones are traditional text messages exchanged via short messaging service, or.
They Were Getting Ot Hte Recipient, However.
Lastly, how do you know if a green text message was delivered is if the sent text message didn’t show not delivered after few seconds or minutes of sending the text message. Why are my iphone messages green and not sending. Why are some of my messages blue and some green?
To Check If Imessage Is Turned On For Your Device, Go To Settings > Messages > Imessage.
Your iphone messages are green for two reasons: Check your iphone or ipad’s settings (settings > messages), and make sure the imessage slider at the top is green , which means it’s activated.if it’s already on, but still giving you green texts or behaving erratically, turn imessage off, then on again. You’ll always see green when writing to android users, or when you’re not connected to the internet.
Messages On Iphone Are Sent As Imessage Or Sms Messages.
The answer is actually quite simple. Why are my iphone messages green and blue. Why are my iphone messages suddenly green.
Check Your Iphone Or Ipad's Settings (Settings > Messages), And Make Sure The Imessage Slider At The Top Is Green, Which Means It's Activated.
Why are my iphone messages green and not sending. This alone can cause messages to appear as a green chat bubble instead of its iconic blue bubble that allows you to see when the recipient is typing a message or has read your message. Imessages are green because the message was sent as an sms text message instead of imessage which is caused when the imessage is unavailable on the iphone, ipad, or the ipod.
|
<urn:uuid:758a653e-f818-4e12-af4b-7c3bf1de9bbe>
|
CC-MAIN-2022-33
|
https://shuangwen.org/why-are-my-iphone-messages-green-and-not-sending/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz
|
en
| 0.872679
| 613
| 1.78125
| 2
|
Adjustable and “fitting” forms are the two most common variations seen in baseball hats today. Snap-band closures around the crown of an adjustable cap make it simple to choose the size that is the perfect fit for the wearer’s particular head shape. To get a fitted cap that is more fitting to your head, however, requires a little bit more labor. Because of the nature of the materials that are used to make these hats, one of the most common methods for shrinking a fitted baseball cap includes getting it wet and then letting it to shrink on its own as it dries. How To Shrink A Fitted Hat?
The First Method: Submerging a Cotton Fitted Cap in Water to Shrink It
1 Bring a large stockpot of water to a boil. Find a large cooking pot with a deep interior and fill it up with water. It is important that the pot be large enough to accommodate the cap that you are aiming to reduce in size without becoming too full. Allow the pot to begin preheating while you adjust the temperature of the burner on the stove to a medium setting.
Performing this step in a sink is another option; however, doing it in a pot will allow you to have a better amount of control over the temperature of the water.
2 Get the temperature of the water just perfect. Bring the water up to a temperature where it just starts to give off some steam. The temperature of the water should be high enough to cause the cap to contract, but not so high that it will burn you or harm the materials used to make the cap.
It is important that the water not be allowed to boil. Water that is excessively hot has the ability to cause burns, and it also has the potential to cause the bill of the cap to deform and lose its structural integrity.
3 Make sure the cap is fully submerged. Put the cap in the water that’s been heated up. Apply pressure on it until it has a chance to drink enough water to remain submerged on its own. You should be able to submerge the cap in the water by hand; but, if you would rather use kitchen tongs, that option is available to you as well.
If you do not intend to alter the shape of the bill at a later time, you may keep it completely out of the water and merely moisten the top of the cap.
4 Please wait a few minutes before removing the hat from the water. Allow the cap a few minutes to start reacting to the effects of the hot water bath before taking further action. The heat will force the cotton fibers that are used to make the cap to tighten and adhere to one another more tightly, which will have the effect of causing the hat as a whole to shrink.
Soak the cap until the fabric of the crown starts to “billow” a little; this is an indication that it has become loose enough to be replaced when it has been loosened up enough.
5 Put on the hat and continue to wear it until it has completely dried out. Take care while removing the cap from the hot water, and then give it a good shake to get rid of any surplus liquid. After the hat has had time to cool, put it on your head and continue to wear it until it is completely dry. When it’s wet, the hat will be highly flexible, and as it dries, it will mold itself to the contours of your head.
This method of drying a hat is likely going to take the whole day. Warming up the hat early in the day and continuing to wear it throughout the day will provide the greatest possible outcomes.
In order to prevent the hat from expanding or warping as it continues to dry, hang it up by the bill using a clothespin for the whole night.
Showering in a cotton fitted cap is the second method for shrinking a cotton fitted cap.
Step one: Start a steamy shower. You should get into the habit of turning on your home’s shower and waiting until the water reaches a temperature that is tolerable. Again, the water shouldn’t be too hot since it will come into direct contact with the cap, and if the temperature is too high or the cap is left to soak for too long, it may cause the structure of the hat to become ruined.
A tip that has been around for a long time and has been shown to be effective is to take a shower while wearing the cap or boots that you want to break in.
2 Put on the baseball cap with the fitting brim that you wish to shrink. Put on the cap that will be altered once you have taken it off. If you want the hat to loosen up and dry in the correct form, you should arrange it in the position that most closely resembles how you normally wear it.
3 Immediately go into the shower. Get in the shower while still wearing the hat. You may either take a shower like you normally would, or you can just wait three to five minutes for the stiffness of the cap to relax and adopt its new form. In order for the cap to be stretched out evenly, it is necessary to ensure that the crown is completely drenched in water.
If you opt to take a standard shower while wearing the cap, be careful not to get any shampoo or soap on it while it is soaking. If you do get soap or shampoo on it, it will ruin the cap. The cleaning of your hat should be done independently using the appropriate cleaning agents.
In order to prevent the water from possibly damaging the bill, you should direct the majority of it toward the top of the cap.
4 Put on the cap while it is drying out. Maintain the habit of wearing the hat as you go about your day. Before putting on your other clothes, give the cap a good shake to get rid of any excess water. This will prevent it from dripping. Depending on the conditions of the surrounding environment, the cap should be dry in less than a day.
If you want the cap to dry as quickly as possible, it is best to wear it on a sunny, warm day. If it is going to be chilly or wet outdoors, you should not go out wearing the hat. Instead, let it sit right-side-up under a fan or in front of an air conditioning vent, and check on its development on a regular basis.
How exactly does one go about reducing the size of an oversize hat?
One further technique for reducing the size of a cotton hat is to immerse it in hot water. Find a big pot and fill it with just enough water to submerge your cap without the water spilling over the edge of the pot. On the stove, bring the water to a warm temperature, but keep it from coming to a boil or even a simmer. Put on your hat as soon as the temperature rises.
Is it possible to shrink a fitted hat by washing it?
If you have access to a washing machine, you may quickly shrink a cap that is made from polyester or similar synthetic material by using the washing machine. You may throw the hat in the laundry by itself or together with some other items of clothing. When you are through shredding the cap, clean it with a very little bit of washing detergent.
Is it possible to dry a hat in the dryer?
When it comes to drying, you should never put your hat in the dryer unless you want to give it to your nephew Chuckie, who has a very small head. The hat should always be dried in the open air after being washed. To ensure that it maintains its form while it dries, place it on a form of some type, such as a coffee can, a canister, or even your own head.
Is it possible for a fitted hat to shrink in the dryer?
The easiest technique to get a baseball cap that fits precisely is to wear it while it dries so that it may shrink to the exact shape of your head. It’s possible that it may take the whole day, but be certain that it will be well worth it. In the event that this is not possible, you may always try accelerating the process by using a hair dryer. You may also put it in the dryer, but be sure to check on it at least once every ten minutes while it’s in there.
Can the size of a fitted hat be altered?
The rear of a fitted hat is smooth, and it will do a wonderful job of accommodating your hair; but, fitted hats do not allow for changes to be made for those who have heads that are between sizes. Don’t make wearing your hat into a bothersome ordeal. Instead, give your fitted hat a quick run through the dryer to make it more conformable to your head and give you a better overall fit.
How do you shrink a fitted hat that is made of polyester?
Utilize the setting for medium heat on the blow dryer even if the key to successfully shrinking a polyester hat is to use high heat. This will prevent any possible issues from occurring. You may either hold the hat while blow-drying it or wear it on your head while applying heat so that it dries to the shape of your head. Either way, it will dry to conform to the contour of your head.
Are you able to wash and dry your hats in the machine?
Put the hat through the gentle cycle of the washing machine with cold water and wash it. It is NOT a good idea to put the hat in the dryer. Instead, you should let it dry naturally in the air.
Would it be okay to wash my fitting in the machine?
Do not place hats in the washing machine or the dryer while doing the laundry. It is possible that a high-efficiency washer that does not have a center agitating column will be suitable for washing the hat; however, even in this case, the hat must be washed in cold water using the most delicate setting, and you must also be careful that other items of clothing in the load do not distort its shape.
|
<urn:uuid:4a53e060-0a8e-4557-b884-a351dfb9d562>
|
CC-MAIN-2022-33
|
https://billwildforcongress.com/how-to-shrink-a-fitted-hat/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.957551
| 2,088
| 2.375
| 2
|
WINNIPEG (TREATY 1) - With Alberta today joining other provinces and territories in expanding access to a fourth dose of vaccine those 18 years of age and older, the Manitoba Health Coalition (MHC) called on the Stefanson PC government today to recognize the dangers posed by a seventh wave of the COVID-19 pandemic and provide Manitobans with the same opportunity to protect themselves and others.
“Manitoba has had some of the worst outcomes in Canada as a result of cuts to health care prior to the arrival of COVID-19 and poor decision-making throughout the course of the pandemic," said Thomas Linner, Provincial Director of the MHC. “Families, frontline health care workers and vulnerable Manitobans cannot wait while this government to drag its feet yet again.”
Many Manitobans, including frontline workers and immunocompromised people, have passed the sixth-month mark since their last dose of vaccine. They are concerned about the growing seventh wave and are looking for the added protection a booster could bring.
Vaccines are not the only tool in the fight against another wave of COVID-19 variants. In addition to calling on the Stefanson government to expand access to a fourth dose, MHC continues to call for:
- Regular COVID-19 updates for the public and media
- Updated modelling on the potential path of variants in Manitoba
- The re-establishment of PCR testing capacity
- Clear benchmarks for what level of transmission and/or hospitalization would trigger a resumption of indoor mask mandates, vaccine passports and other measures
- Establishing 10-paid sick days per year for Manitoba workers
- An expanded push for vaccination at all levels, from first dose to booster shots
- Urgent action to address the understaffing in our health care system
“The challenges facing Manitoba’s health care system are daunting,” said Linner. “Emergency rooms in Winnipeg are stretched beyond capacity. Rural and northern ERs are struggling to stay open and often unable to do so. An unchecked wave of COVID-19 could push everything past the brink. It’s past time to act.”
Do you like this page?
|
<urn:uuid:c5f0ab90-fb63-4581-97a1-5cddd44daff1>
|
CC-MAIN-2022-33
|
https://www.mbhealthcoalition.ca/immediate_fourth_dose_roll_out
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.944247
| 463
| 1.84375
| 2
|
China’s economic rise means that the world’s largest army now also has the resources of the world’s second largest economy. The security implications of this are discussed in the U.S. Department of Defence’s latest report, which highlights not only the sheer growth of China’s military, but also its sustainability. Although China still spends less on its military than the United States spends on its own defense forces, China’s far higher economic growth suggests it will be able to catch-up rapidly, with relatively little economic burden. This contrasts with America’s economic malaise and raises questions over the credibility of the U.S. security guarantees to Western Pacific allies and its pivot to Asia.
But the economics of growth are not quite so simple. Though China’s economy is indeed growing rapidly, this doesn’t mean you can get more of everything at the same rate. Some things become much more affordable, but other things may become more expensive. In particular, wages tend to rise rapidly and this affects costs in institutions that employ a lot of labour – like the People’s Liberation Army (PLA).
Thus, China’s military is likely to be suffering from what economists call “cost disease.” Rising wage rates mean it will face increasingly large claims on its budget, just to maintain the same number of personnel. Hence, a greater budget is required to supply the same level of services. If not, then the sector will be squeezed in real terms.
Anecdotal evidence that this is happening in China’s military can be gleaned from China’s defence White Papers. While opaque and incomplete, these nevertheless emphasise the need for increasing spending on social security, salaries and allowances to keep track with per capita incomes in the rest of the economy. As an example, defence analyst Dennis Blasko and his co-authors suggested that, in 2006, salary and pension and other labour cost increases may have accounted for half of the entire increase in the military budget.
A sense of the impact of rising wages can also be gained from the graph below, which shows the growth in manufacturing sector wages and in military spending in China and the United States. While China’s military spending is growing much more rapidly than that of the U.S., China has also had much faster wage growth. Thus, much of China’s faster spending growth may just reflect larger wage cost increases.
Symptoms and Causes of Cost Disease
Cost disease is usually associated with service sectors in wealthy countries, such as health care, or with countries undergoing resource booms, where it is known as Dutch Disease. In China, however, the cause of cost disease is the rapid productivity growth in the manufacturing sector.
This productivity growth raises the demand for labour and drives up wages. But it also directly reduces manufacturing costs. On balance, therefore, manufacturing prices remain stable with wage cost push being offset by productivity improvements.
For China’s military sector things are different. It is faced with the same increasing wages on the cost side, but does not necessarily benefit from the manufacturing productivity boom. Thus, the rate of cost increase experienced by the military sector exceeds the economy-wide average rate.
To counter this, the government could increase the military’s share of the budget. But China’s military budget has been a fairly constant fraction of its GDP, suggesting it has been squeezed. Thus the real growth rate of military spending, that is the spending after adjusting for price increases, is likely to be slower than conventionally thought. Likewise the gap between real military spending growth in China and the U.S. should be much smaller than the gap in nominal military spending growth.
Measuring Cost Disease
Unfortunately the usual method of adjusting military spending for price increases does not capture this effect. For example over the last 15 years China’s defense spending grew at approximately 14 percent a year, while military spending in the U.S. grew at approximately 5 percent per year. This implies a rather large difference in the growth rate of spending of 8.8 percentage points per year. But these are nominal spending rates and need to be adjusted for increasing prices.
The size of the adjustment for inflation then depends on which measure of inflation is used. The Stockholm International Peace Research Institute (SIPRI) uses the consumer price index (CPI). But the growth in the CPI is the same in the U.S. and China, about 2 percent per year. This implies that adjusting for inflation makes no difference to the estimated rate of catch-up.
Alternatively inflation can be measured with the GDP deflator. By this measure China’s inflation rate is 2 percentage points higher than America’s, which reduces the real growth gap significantly from 8.8 to 6.8 percentage points per year.
But if there is cost disease, the rate of inflation facing the military will be higher than the economy-wide average. Since both the CPI index and the GDP deflator are economy-wide averages, they will lead to underestimates of military inflation and overestimates of the real growth rate.
The best index to use would be a price deflator for the defense sector. Unfortunately China does not provide this data. Nevertheless, using some publicly available data and economic theory, it is possible to calculate a relative military cost (RMC) index for China and the United States. This uses data on input prices for operations, personnel and equipment, and the expenditure shares of these budget headings, to construct an index of the relative cost of producing military services in each country.
Using this method, I found that the rate of cost increase in China’s military exceeded that of the United States by as much 3.6 percentage points per year over the decade 2000-2010. Consequently, rather than China growing 8.8 percent per year faster than the United States, the RMC index suggests a real growth gap closer to 5 percent per year.
This approach uses very limited data and shouldn’t be considered definitive. But it suggests that the economic burden of rapid military growth on the Chinese economy is much larger than generally thought.
Looking to the future, as long China is growing rapidly, the real relative cost of providing defence services is likely to grow as well. Moreover as China’s urban-rural migration rates slow, the rate of wage growth is likely to increase. Hence, though it is not chronic, the symptoms of cost disease may worsen before they get better.
Military Growth and Perceptions
Needless to say, exaggerating China’s real military spending growth is undesirable in the current climate of rising Asian military spending. China’s military rise is already triggering an escalation in territorial disputes, particularly in the East and South China Seas, and Singapore, India and Japan have all announced substantial increases in defence budgets. Thus, a careful analysis of the underlying costs and real growth of China’s military, and understanding the impact of rising wages on costs, is important for maintaining an appropriate perspective on China’s expansion.
In addition, however, rising wage costs also help explain China’s military modernization. While many aspects of China’s military transformation will reflect strategic decisions, they will also be influenced by price changes that accompany economic growth. One way the military can mitigate cost disease is to substitute away from labour towards equipment. Thus the PLA has reduced its armed forces from 2.5 to 2.3 million since 2000. As wages in China rise toward the same levels as those in the United States, we should expect it’s military to look more like America’s in terms of its relative use of equipment and soldiers.
So while it is possible to see modernization entirely in strategic terms, some aspects of this process will reflect simple economic choices as well.
China’s Peaceful Rise
Concerns about China’s intentions are intensified by the lack of transparency surrounding its growing military capabilities. The usual assumption is that China wishes to “bide its time and its strengths.” But by obscuring the details of its military budget, the only thing China appears to be hiding are cost blowouts.
This may also be a strategic decision as well. But double-digit growth rates in military spending create an image problem for a country that claims to want a peaceful rise. China could therefore do much to allay fears, without revealing any strengths, by being more forthcoming in it budget reporting. In the absence of that, we can help China to help itself, by more careful scrutiny of the economic data and better appreciation of the challenges of managing rapid growth.
Peter Robertson is professor of Economics and the University of Western Australia and has been a visiting Scholar at the University of Otago, The University of British Columbia, Rutgers University and The University of Oxford. His keys areas of research are economic growth, development and international trade, especially for Asian economies. He is the co-author of Measuring Hard Power: China’s Growth and Military Capacity (forthcoming). The author gratefully acknowledges the hospitality of St Anthony’s College, Oxford and the CSAE, Oxford University.
|
<urn:uuid:a6cff2c3-e685-41e1-ab71-1d7d0dfe8e9d>
|
CC-MAIN-2022-33
|
https://thediplomat.com/2015/05/chinas-military-and-cost-disease/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.947758
| 1,878
| 2.265625
| 2
|
RRROLL UP THE RIM TO WIN season starts tomorrow! All over our fair nation, coffee lovers are giving their fingers and teeth a workout rolling rims left, right and centre. With so many people playing RUTRTW, we thought we should lay out some ground rules so everyone knows how to properly Roll The Rim and keep your friends.
Before we get into the etiquette, here are some interesting RUTRTW facts
- Every Coffee counts – There is an equal 1 in 6 chance of winning food or coffee.
- Winning coffee rims can be redeemed for ANY hot beverage
- RUTRTW is available at over 3,500 Tim Hortons locations across the country.
- 36 Million prizes have been handed out.
1) Don’t Roll Your Friend’s Rim
Half the fun of getting a RUTRTW cup is the actual rolling process. Do not rob someone of their basic Canadian right to roll up their own rims. The only respectable situation where you roll up someone else rim is if that person is a child. Even then, they should probably learn to roll their own rims if they want to remain a respectable member of Canadian society.
2) Don’t assume your prize is the only prize you can get!
Did you know that even if your rolled prize says coffee, most Tim Hortons will let you get an alternative beverage, doughnut or muffin instead? Someone has even told me that they rolled a free coffee into a free breakfast sandy. Sounds a little too good to be true, so I’m calling bullsh*t, but let us know if you’ve done it!
3) Do Not Call it a RIM JOB
Please people… RUTRTW is a serious Canadian pastime. Please don’t sully it with your dirty mind…
4) Unrolled Rims in the Garbage are off limits
I have a feeling that if you polled Canadians and asked them the question, “Have you ever pulled a Roll Up The RIM TO WIN cup out of the garbage to roll the rim?” The percentage would be high. I mean, what are the chances that it’s going to be a million dollar cup? Probably not that high… We think the chances of someone seeing you rummaging through the garbage for coffee cups is much higher. Just don’t do it…
5) Whoever Rolls the Rim wins the rim.
This is why #1 is so important. The rules of finders keepers applies, so whoever rolls it stoles it! Even if you bought your co-worker the coffee and they win the grand prize, unfortunately, it’s theirs. Hopefully, they are nice enough to share the winnings with you… If not they weren’t really your friend and you probably shouldn’t have been buying them coffee… You my friend, are a sucker!
6) Don’t Try to use your Roll Up Winnings at McDonald’s
The highly engaged staffed at Mcdicks do not find this funny. We’ve tried this and it just makes things awkward..
7) Have a safe spot for your Roll Up Winnings
The Roll up game is serious. People have been known to steal free coffee and doughnuts off people’s desks, so we suggest getting a specialized case to hold your winning rims. Doesn’t have to be anything fancy… Take out containers work, or find a secret spot like under your desk phone or in your computer’s CD slot (who uses that anyway?)
9) Use Up your Rollups.
Last year I thought I was being smart by saving up the winning rims I didn’t use. The joke was on me though! TIMs changes the colours every year to keep cheapos like me on their toes.
10) Bring the Entire Cup With you if you Win!
We’ve heard from RRROLL UP winners that some winning rims have been rejected because the PIN ( for verification) is on the opposite side of the cup – This really only matters if it’s a prize bigger than a coffee or donut.
|
<urn:uuid:36a7ba19-69ea-4ce6-a012-b5eaa4b6bad0>
|
CC-MAIN-2022-33
|
https://www.styledemocracy.com/rrroll-rim-win-etiquette-properly-roll/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.940837
| 874
| 1.679688
| 2
|
In reference to examples in exemplification documents, they are often special or common. In the instance of writing an illustrative article, one has to be sure essay for you you include things like an comprehensible table of contents and also a outline. In reality, among the primary reasons which were blamed on reduced levels in regards to creating example documents may be the absence of the requisite knowledge in exemplification essay creating. You will likely even feel of other items to raise the essay. Additionally, It offers the potential direction of whatever is included within the essay. Likely yes, because it’s the newest craze in educational article writing. Visit our own article writing company and relish unique and skilled article providers. Doing study may enrich the caliber of your article. Our firm gives you different argumentative essay topics where you could get quality academic paper. Our create my papers providers have certified article writers who’ll enable you to compose research paper.
What Is the Format to get a Reflective Article in APA-Style
You would like to present yourself as a capable expert author online Take a gander at sites (the types which will make the preceding term in what links to domestic violence ), have a look at the collection. It really is the type of papers you’d compose before composing a solution document. You’re required to examine the paper again after you’re done with that. The Harvard style of writing is merely a particular manner of presenting academic documents because it is quite specialist and user friendly. Comprise abovementioned truth into the document. As an alternative to attempting to tackle the issue, this type of papers explores the numerous perspectives of the issue and seeks to comprehend the cultural and social context of the problem. Ascertain where to discover the best information regarding this issue you’re authoring. Additionally, you may control to correct any grammatical mistakes and spelling which was within the evaluation. In a Exploratory paper, you’re requested to assess at night obvious solutions so as to discover other points of view which may on occasion help in fixing the issue.
It is terrible, particularly of material presented on its kind, because for children.
They’re component in their course work and therefore they need to compose quality argumentative essay as a means to obtain much better scores inside their own assessments. An excellent dissertation matter needs to be unique, first and applicable to the industry of research. Were I capable to sit and compose each and every re Search subject on books down, I Would be here very virtually forever. This isn’t the first time I’ve created on the subject of research issues in Language literature. If no study is needed, then believed is where you may discover your replies. I locate even clear-cut,’ stupid’ concerns are excellent queries. Pupils who like to move their assessments shouldn’t use or purchase no price argumentative article.
While substance that is enough was amassed ahead of the screw the shot technique starts.
Most of online essay writing companies were in the market to generate money. Even in case you might have the perfect writing instructor within the world there’ll come a day when you actually need to depart that instructor behind and compose all by yourself. With never-ending chances plus a deadline just across the nook, it’s no question which you have considered Google for just a little motivation and hints on ways to get the best paper topic. Period restriction is, in addition, among the greatest difficulties in dissertation composing.
|
<urn:uuid:c679a4cc-5941-43a3-bf3c-531239dcd58b>
|
CC-MAIN-2022-33
|
http://angelusoakscalendar.com/2019/08/20/what-re-the-very-best-writing-pens/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.949827
| 717
| 1.867188
| 2
|
I wanted to make an interesting map of all U.S. counties that are named after U.S. states. I was able to display the shapes of such counties but was unable to do anything further - following the slides verbatim I couldn't get ST_MakeLine to work (after substituting my own table names). Here's the initial map I created using the following SQL.
SELECT * FROM uscounties_merge WHERE name IN (SELECT state_name FROM uscounties_merge)
From here I was hoping to draw lines connecting the center of each shown county to the center of each state, respectively. There are a ton of counties named Washington and I wanted to show the intensities of the various namesakes. Again, I couldn't make the map, but here's a mockup of what could've been.
|
<urn:uuid:c75aa0d3-5b29-4d13-8b97-1222f6c66bb7>
|
CC-MAIN-2022-33
|
http://itp.abe.sh/2014/10/county-names-state-names-and-map-of-news.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.967073
| 173
| 1.976563
| 2
|
Ebooks by Caroline Wells Healey Dall
books : 333952
Caroline Wells Healey Dall
: download and read ebooks
"Alongside;" being notes suggested by "A New England boyhood" of Doctor Edward Everett Hale ..
A practical illustration of "Woman's right to labor;" or, A letter from Marie E. Zakrzewska, M. D., late of Berlin, Prussia
Barbara Fritchie, a study
Genealogical notes and errata..
In memoriam, Alexander Wadsworth
In memoriam. Susan Wadden Turner. Professor William Wadden Turner, librarian of the Patent office, Washington, D.C. Jane Wadden Turner, recorder of scientific collections and exchanges at the Smithsonian Institution for thirty years, and for twenty years assistant librarian to the Library of Congres
Memorial to Charles Henry Appleton Dall ..
The college, the market, and the court; or, Woman's relation to education, labor, and law
The life of Dr. Ananabai Joshee, a kinswoman of the Pundita
The life of Dr. Anandabai Joshee, a kinswoman of the Pundita Ramabai
What we really know about Shakespeare
William F. Burden, born in Troy, Rensselaer County, N.Y., March 14, 1830. Died at Troy, N.Y., December 7, 1867
England) St. Paul's School (London
1 book in txt format
On August 8, 1694
, Irish philosopher (d.
), was born
, by the rock band
is released. It will become the #1 best-selling debut album in history.,
Most popular books
Cunningham's manual of practical anatomy (Volume 1)
D. J. (Daniel John) Cunningham
If you use materials of the author Caroline Wells Healey Dall you should place a link like
books by author Caroline Wells Healey Dall
Leave us your
Online library ebooksread.com © 2007-2022
|
<urn:uuid:f5ba680a-c2ea-4d37-9503-ce8ed695f3d1>
|
CC-MAIN-2022-33
|
https://www.ebooksread.com/authors-eng/caroline-wells-healey-dall.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz
|
en
| 0.845224
| 565
| 1.710938
| 2
|
Нажимая на кнопку, вы даете согласие на обработку персональных данных и соглашаетесь c политикой конфиденциальности
Let us start!
Promise: no spam, or anything else like that.
Been (Russian version)
Goal: implement the application, that let you mark the places on the world map, where you, actually, been =)
The target is to fill the whole globe, of course!
The key difference from an existing analog is that it has to be "aware" of Russia: if you been in Moscow, it doesn’t mean you saw the whole country.
The original app was focused on the USA, so the customer wanted to have the desired level of granularity for Russia as well.
Full world map
Focus on Russia specifics
Cities and countries specifics
Implementation and tech. stack
To simplify the interface problem, it was decided to replicate an already existing and confirmed to work well "been" application solution, altering the colors and dropping the 3D effect — the users could live without that easily, while that massively reduce the development costs.
The app has to speak good Russian, but it also needs to support good English.
With those questions settled, our next task was to cut the map into many pieces — a very painstaking task, considering the map scale and the size of some countries on it, like Monaco or islands of Greece — a jewelry precision job.
Once the design part was done, implementation took us a few part-time weeks, including the testing.
|
<urn:uuid:ec187bab-268b-4aa0-867c-26a517b46d55>
|
CC-MAIN-2022-33
|
https://robofruit.project.potemkin.co/cases/been_clone/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.906121
| 422
| 1.5
| 2
|
The very first known case of Zika fever was in a sentinel rhesus monkey stationed on a tree platform in the Zika Forest in Uganda in 1947. Population surveys at the time in Uganda found a 6.1% prevalence. The first human cases were reported in Nigeria in 1954. A few outbreaks have been reported in tropical Africa and in some areas in Southeast Asia.
The first major outbreak, with 185 confirmed cases, was reported in 2007 in the Yap Islands of the Federated States of Micronesia. A total of 108 cases were confirmed by PCR or serology and 72 additional cases were suspected. The most common symptoms were rash, fever, arthralgia and conjunctivitis, and no deaths were reported. The mosquito Aedes hensilli, which was the predominant species identified in Yap during the outbreak, was probably the main vector of transmission. While the way of introduction of the virus on Yap Island remains uncertain, it is likely to have happened through introduction of infected mosquitoes or a viraemic human with a strain related to those in Southeast Asia. This was also the first time Zika fever had been reported outside Africa and Asia.
In 2013 another large outbreak was reported in French Polynesia that was thought to be from an independent introduction of the virus from Asia than the Yap Island outbreak.
Figure 1: Countries that have past or current evidence of Zika transmission (as of January 2016). Adapted from CDC. The CDC has a comprehensive site describing countries and areas with active Zika virus transmission.
Genetic analyses of Zika virus strains suggest that Zika first entered the Americas between May and December 2013. It was first detected in the Western Hemisphere in February 2014, and rapidly spread throughout South and Central America, reaching Mexico in November 2015. In 2016 it established local transmission in Florida and Texas. The first death in the United States due to Zika occurred in February 2016. In May 2015, Brazil officially reported its first 16 cases of the illness. Although, a case of illness was reported in March 2015 in a returning traveller. According to the Brazilian Health Ministry, as of November 2015 there was no official count of the number of people infected with the virus in Brazil, since the disease is not subject to compulsory notification. Even so, cases were reported in 14 states of the country. Mosquito-borne Zika virus is suspected to be the cause of 2,400 possible cases of Microcephaly and 29 infant deaths in Brazil in 2015. Before the Zika outbreak, only an average of 150 to 200 cases per year were reported in Brazil. In the state of Pernambuco the reported rates of microcephaly in 2015 are 77 times higher than in the previous 5 years.
On 24 January 2016, the WHO warned that the virus is likely to spread to nearly all countries of the Americas, since its vector, the mosquito Aedes aegypti, is found in all countries in the region, except for Canada and continental Chile. The mosquito and dengue fever have been detected in Chile's Easter Island, some 3,500 km away from its closest point in mainland Chile, since 2002. In February 2016, WHO declared the outbreak a Public Health Emergency of International Concern as evidence grew that Zika is a cause of birth defects and neurological problems. In April 2016, WHO stated there is a scientific consensus, based on preliminary evidence, that Zika is a cause of Microcephaly in infants and Guillain–Barré syndrome in adults. Studies of this and prior outbreaks have found Zika infection during pregnancy to be associated with early pregnancy loss and other pregnancy problems.
In 2016 imported or locally transmitted Zika was reported in all the countries of Asia except Brunei, Hong Kong, Myanmar and Nepal. Serological surveys have indicated that Zika virus is endemic in most areas of Asia, though at a low level. While there was a sharp rise in the number of cases of Zika detected in Singapore after the 2016 Summer Olympics in Brazil, genetic analysis revealed that the strains were more closely related to strains from Thailand than from those causing the epidemic in the Americas.
Zika transmission persists, but has generally been at low levels throughout 2018 to the present. On 21 September 2018, the Ministry of Health and Family Welfare-Government of India (MoHFW) reported a confirmed case of Zika virus infection in a 78 year-old woman in Jaipur, Rajasthan state, India. State health authorities initiated a broad response and central teams were subsequently deployed to support surveillance and control efforts, particularly in and around a 3 km radius of the Shastri Nagar area. As of 2 November 2018, 157 cases have been identified, including 63 pregnant women; all cases have been laboratory-confirmed by RT-PCR.
Video 1. WHO: Zika virus spreading to almost all the Americas.
|
<urn:uuid:e13d5d87-4745-47be-bc9b-75a851bed39f>
|
CC-MAIN-2022-33
|
http://www.zikavirusnet.com/epidemiology/28-zika-virus-epidemiology.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.974972
| 985
| 3.59375
| 4
|
By Claire West
The Chancellor and Wikipedia founder, Jimmy Wales, took part in an open discussion on the digital economy at the global technology festival 02 Campus Party yesterday.
Chaired by Wired magazine editor, David Rowan, the Chancellor and Jimmy Wales discussed the role of government, entrepreneurs, and users in the digital economy in front of an audience of ‘Campuseros’ (Campus Party attendees).
The Chancellor emphasised the government’s responsibility to the digital economy should go beyond infrastructure and education, and make sure people everywhere have to skills to be producers and makers of digital content and technology rather than just users.
To do this, government and businesses must work together to build a culture of participation online, providing people with new skills, new job opportunities and to even create new industries. Jimmy Wales highlighted how of businesses have a vital role to play in making it easy for people to get involved, by creating products that are exciting, accessible and safe.
They cited how the market for apps has grown from thousands of small developers rather than large companies.
This work is supported by the Coalition’s transparency agenda, under which vast amounts of government information is being published as open data. This can be used by developers as a new raw material to create digital products, such as a travel timetable apps built on open transport data.
02 Campus Party is a global technology festival that is designed to enable entrepreneurs, young people and others to nurture their innovative digital ideas, and boost their skills.
While visiting the festival the Chancellor took the opportunity to meet with young coders attending Campus Party as part of the Make Things Do Stuff campaign, designed to mobilise the next generation of digital makers.
Officially launched by the Chancellor at the Roundhouse in May, Make Things Do Stuff has since provided opportunities for 100,000 young people to improve their digital skills.
Prior to their discussion the Chancellor and Jimmy Wales also heard from young makers and coders. Young entrepreneur Nick D’Aloisio, who sold his news summarising iPhone app to Yahoo in March 2013 and 13 year old programmer Amy Mather, who created a project using Raspberry Pi, called “The Game of Life”.
Jutta Frieden spoke about how she participated in a free part-time course, Code First designed to teach female graduates how to code.
Chancellor of the Exchequer, George Osborne said:
The government is determined to create the right environment for entrepreneurs to succeed. That is why we are going to give our young people the very best tech start in life, by investing in our broadband infrastructure, introducing a new coding curriculum and opening up government data so that it can be used by thousands of small businesses to produce innovative new apps and services.
We want Britain to be the best place in the world for tech - from learning to code to starting up and growing your tech business. With government working together with business and entrepreneurs, I believe we can get there.
With this in place we must work closely with business to encourage more people to be producers, not just consumers of digital content. This way we will keep our digital economy is booming, producing the kind of jobs we need to win in the global race.
Wikipedia founder Jimmy Wales said:
We live in an era that was previously unimaginable. People everywhere are now able to develop rather than just consume digital technology. It is important that we, as individuals, take advantage of the opportunities presented to us to deliver high quality digital content that benefits everyone.
There is still a huge amount of potential to be tapped into. So it is exciting to see the latest generation take up this challenge intuitively. The three young people showcased today are all examples of how innovation and the digital economy go hand in hand.
|
<urn:uuid:38af0c2a-b549-4056-a6af-c220aef5ef15>
|
CC-MAIN-2022-33
|
https://www.freshbusinessthinking.com/purpose/digital-producers-and-makers-encouraged-by-chancellor-and-wikipedia-founder/32363.article
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.948322
| 765
| 2.375
| 2
|
Fruit and vegetable intake of primary school children: a study of school meals.J Hum Nutr Diet. 2012 Dec; 25(6):557-62.JH
Despite an increasing focus on the nutritional content of school meals and initiatives such as the School Fruit and Vegetable Scheme, children are not meeting the recommended levels of fruit and vegetable consumption. The present study aimed to examine children's fruit and vegetable consumption in 15 primary schools across the West Midlands region.
A total of 1296 children, aged 4-11 years, were observed for five consecutive days and the consumption of all food items was measured using the weighed intake method. Differences in the mean intake of fruit, vegetables and foods high in fat and sugar between Key Stages 1 and 2 were determined.
Two-thirds of the children in the present study did not consume any fruit at lunchtime and only 3% of children consumed at least one portion as part of their school meal. The proportion of children consuming some quantity of vegetable at lunchtime was more than double that consuming fruit. Children in Key Stage 1 consumed significantly more vegetables on average than children in Key Stage 2 (P ≤ 0.05); however, no significant differences were found for the consumption of fruit.
Despite the introduction of food-based standards for school meal provision; children are not consuming adequate portions of fruit and vegetables at lunchtime. The importance of strategies used by catering staff to promote the consumption of fruit and vegetables should be harnessed to encourage children to taste fruit and vegetables provided. Further research is recommended to increase the evidence base on strategies aiming to promote fruit and vegetable consumption in children.
|
<urn:uuid:c3f9b0b8-1712-421a-bcfd-058a5ccf9b59>
|
CC-MAIN-2022-33
|
https://www.unboundmedicine.com/medline/citation/22958172/Fruit_and_vegetable_intake_of_primary_school_children:_a_study_of_school_meals_
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.965757
| 338
| 3.171875
| 3
|
Most engineers know of the Nyquist-Shannon sampling theorem and frequently use it to justify design decisions. However, a lot of these decisions are misguided due to a lack of understanding of how to apply the theorem in the real world, partly caused by the way it’s taught. Usually these are recent graduates but sometimes these claims come from seasoned engineers who should know better. These claims are generally something along the lines of:
- There’s no need to sample a signal1 at more than twice the frequency of the highest component in the signal (the Nyquist rate, not to be confused with the Nyquist frequency)
- No more information about the signal can be extracted by sampling at a higher frequency than the Nyquist rate
- A sampled signal can be used to reproduce the original signal up to the Nyquist frequency (half the sampling frequency)
These claims would all be true if ideal sampling were possible; however, in the real world ideal sampling is never possible as this would require all of the following, none of which is realisable in practice:
- An anti-aliasing filter that completely removes all frequencies above the Nyquist frequency without affecting any lower frequencies (brick-wall low-pass filter)
- No noise is added to the signal, particularly after the anti-aliasing filter
- No jitter in the sample timing
- Perfectly accurate, instantaneous sampling to infinite precision
So, is the Nyquist theorem of any use in the real world? Well, yes it is, but rather than it informing us of what we can do, as the claims above imply, it actually tells us what we can’t do—we definitely can’t capture all the information in a signal by sampling at less than the Nyquist rate; this is all the theory tells us, not how high the sampling frequency needs to be to capture all the information in the signal2.
Even if ideal sampling could be achieved, for a lot of manipulations and analyses, the original signal needs to be reconstructed at a higher sample frequency (e.g. measuring the peak, which may occur far from any sample for a signal approaching the Nyquist frequency). This adds a fair amount of processor overhead and latency before the reconstructed signal is ready for processing. It is often easier and cheaper to just sample at a higher frequency to start with.
So, what sampling frequency should we use? Well, the answer is application dependant and may require careful analysis for demanding applications. Consideration may be needed of the quality required, circuit cost (particularly the ADC), processor requirements, power requirements and development time and cost. However, where an increased sample rate doesn’t cause any significant problems, a reasonable rule of thumb is five times the Nyquist rate (i.e. ten times the maximum frequency of interest); this allows plenty of overhead for the anti-aliasing filter and adds enough additional information to sufficiently compensate for most sampling imperfections. This sample frequency also captures the shape of the waveform sufficiently well for most processing to be performed directly on the sampled data, rather than having to perform any reconstruction of the signal. If a lower sample-rate stream is needed later, a decimation filter can be used—a digital filter can have a sharper roll-off than an analogue filter. As with all rules of thumb, understanding the reasoning behind it means we can ignore it when it’s not appropriate—e.g. when a faster ADC would be exorbitantly expensive—and invest the extra design effort needed to ensure a lower sampling rate is sufficient.
This principle can be seen in many products on the market:
- Oscilloscopes typically sample at 5-20 times their bandwidth
- Sample rates of 96kHz, 192kHz or even higher are used on professional audio recording equipment
- Sigma-delta ADCs oversample by a large factor, then decimate (along with other processing)
1 To keep things simple, we’ll only consider baseband signals in this article
2 In fact, it’s easy to see that there is no sample frequency that allows us to capture all the information in the signal, as we would need the samples to be of infinite precision
|
<urn:uuid:d522d1b2-040b-4ff3-a6ee-6a29f59d53cb>
|
CC-MAIN-2022-33
|
https://robotae.com/newsroom/are-you-abusing-nyquist/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.941821
| 861
| 3.359375
| 3
|
Otto Kretschmer was the most successful U-boat captain of World War Two. Kretschmer is famous as the captain of U-99 and in total he sank 47 Allied ships before being captured. Kretschmer was nicknamed ‘Silent Otto’ by his contemporaries but was captured in 1941. Kretschmer was one of the more famous POW’s sent to Camp 165 in Caithness after the war.
Otto Kretschmer was born on May 1st 1912. After aca short spell living in England, he learned to speak English fluently. Kretschmer joined the Reichsmarine in April 1930 shortly before his eighteenth birthday. He served on surface ships such as the ‘Köln’ and ‘Emden’ but in 1936 Kretschmer transferred to the submarine service.
When World War Two broke out in September 1939, Kretschmer, commanding U-23, patrolled the North Sea and the British coastline. He had his first success in January 1940 when U-23 sank a tanker near the Moray Firth – though the Admiralty initially attributed this loss to a mine. One month later U-23 sank ‘HMS Daring’, a British destroyer. U-boat captains had been warned about attacking fast moving naval ships like destroyers. The success of this skilful attack was to be matched when Kretschmer moved from U-23 (a Type IIB submarine) to U-99 (a new Type VIIB submarine).
U-99 first went into action in June 1940. Kretschmer attacked convoys at night and while U-99 was on the surface. Kretschmer attacked a ship with one torpedo supplemented by fire from U-99’s gun.
Kretschmer’s most successful patrol was between November and December 1940 when U-99 sank 46,000 tons of shipping.
His nickname ‘Silent Otto’ was a reference to the fact that he maintained radio silence as much as was possible during a patrol. Kretschmer also gained a reputation for treating the crews of destroyed ships with compassion and dignity. On one occasion U-99 came across the lone survivor of a destroyed merchant ship. He was taken on board U-99 and later transferred to a lifeboat. It was not unknown for those in lifeboats to be given the bearing towards the nearest land.
Kretschmer’s last patrol was in March 1941. On March 17th, ‘HMS Walker’ and ‘HMS Vanoc’ attacked U-99. Both were defending Convoy HX-112. A combined depth-charge attack forced U-99 to the surface. Kretschmer scuttled U-99 and lost three of his men. The rest, including Kretschmer became POW’s.
During his time as a U-boat captain Kretschmer sank 47 ships totalling nearly 275,000 tons. He received a variety of awards – the Knights Cross with Oak Leaves and Swords, the Knights Cross with Oak Leaves, the Iron Cross 1st Class, the Iron Cross 2nd Class.
Kretschmer was a POW for seven years. After World War Two had finished in Europe, Kretschmer was transferred to Camp 165. Compound O of Camp 165 was for men considered to be hard line Nazis and Kretschmer was there to be de-Nazified. Kretschmer was allowed to return to Germany in 1947.
He joined the newly formed Bundesmarine in 1955. In 1962 Kretschmer transferred to NATO where he was appointed a staff officer. He became Chief of Staff of NATO Command in the Baltic Approaches in May 1965. He retired in September 1970 as a Flotilla Admiral.
Otto Kretschmer died in 1998 aged 86.
|
<urn:uuid:23d4a479-2052-438b-9b19-a399214e4b1f>
|
CC-MAIN-2022-33
|
https://www.historylearningsite.co.uk/world-war-two/war-in-the-atlantic/otto-kretschmer/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.982168
| 805
| 2.375
| 2
|
Romans 5:12 - 5:20
Rev Richard Matcham begins a short Lent series on different ways to understand the rich biblical witness to the atoning work of Jesus Christ.
12 Therefore, just as sin came into the world through one man, and death through sin, and so death spread to all men because all sinned—13 for sin indeed was in the world before the law was given, but sin is not counted where there is no law. 14 Yet death reigned from Adam to Moses, even over those whose sinning was not like the transgression of Adam, who was a type of the one who was to come.
15 But the free gift is not like the trespass. For if many died through one man’s trespass, much more have the grace of God and the free gift by the grace of that one man Jesus Christ abounded for many. 16 And the free gift is not like the result of that one man’s sin. For the judgment following one trespass brought condemnation, but the free gift following many trespasses brought justification. 17 For if, because of one man’s trespass, death reigned through that one man, much more will those who receive the abundance of grace and the free gift of righteousness reign in life through the one man Jesus Christ.
18 Therefore, as one trespass led to condemnation for all men, so one act of righteousness leads to justification and life for all men. 19 For as by the one man’s disobedience the many were made sinners, so by the one man’s obedience the many will be made righteous. 20 Now the law came in to increase the trespass, but where sin increased, grace abounded all the more,
Scripture quotations are from the ESV® Bible (The Holy Bible, English Standard Version®), copyright © 2001 by Crossway, a publishing ministry of Good News Publishers. Used by permission. All rights reserved. You may not copy or download more than 500 consecutive verses of the ESV Bible or more than one half of any book of the ESV Bible.
|
<urn:uuid:83773600-7bab-419a-a05a-30a1426533f4>
|
CC-MAIN-2022-33
|
https://tauntonbaptist.org/sermon/4012/angles-on-the-atonement-1-recapitulation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.955627
| 426
| 1.640625
| 2
|
My great-grandmother Trientje Maria (Janssen) Ufkes was born 111 years ago today, on 17 April 1895. That’s the date I was always told she was born.
Fortunately that’s the date of birth given for her in the records of the Immanuel Lutheran Church in Basco, Hancock County, Illinois, where she was baptized. Her baptismal entry is on pages 34 and 35 of the church’s register of baptisms (obtained digitally today on Ancestry.com in their ELCA [Evangelical Lutheran Church in America] database).
There were no surprises in the entry. That’s always good. Great-grandma never used the name Trientje (at least that I remember, but my point, but I was always aware that was her low-German name. Her baptism on 28 April 1895 took place within two weeks of her birth. This was typical considering that there was a nearby church with an available pastor.
Great-grandma was named for her maternal grandmother, Trientje (Behrens) Sartorius–her older sister Elske was named for their paternal grandmother Elske (Fecht) Janssen. Trientje’s sponsors were Tjark Janssen and his wife Meta (Flick) Jansen who lived nearby and attended the same church as Trientje’s parents. Bernard Geissler was also the pastor when Trientje was confirmed on 20 March 1910 (confirmation register page 132). The confirmation register gave the same date of birth as in the baptismal register.
If the dates of birth in the baptismal entry and the confirmation entry differed, more credence would be given to the baptismal entry. That entry would have been more contemporary to the birth than the confirmation entry would have.
And fortunately the notation that Trientje was Fredericka’s third child agreed with information I had located from other sources.
When I originally located this entry, the date of baptism and name of godparents were new to me. Neither piece of information was a surprise. After all, Lutherans practice infant baptism and relatives are common sponsors. It’s still idea to locate entries when “you know everything.” That’s because sometimes we don’t know what we think we do and sometimes pastors make notations on records that leave our expectations in the dust. And we don’t see those notations unless we look at the records.
|
<urn:uuid:2039da0e-8508-499b-9fb9-6f20564747af>
|
CC-MAIN-2022-33
|
https://rootdig.genealogytipoftheday.com/?p=2561
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.977159
| 521
| 1.6875
| 2
|
At St Andrew's we are passionate about providing our children with a rich and stimulating curriculum which will enable our children to become confident, independent, resilient learners for life. We are constantly adapting and developing our curriculum in order to foster independent learning in every year group starting with our very youngest learners.
National curriculum subjects are taught thoroughly and systematically with an equal emphasis on both subject knowledge and transferable learning skills. We encourage our children to work collaboratively, ask questions and think deeply about dilemmas and issues arising from their learning.
Strong links are made with home and school through regular homework, a home learning site - SAM learning, and theme based inquiries led by the children themselves through our online learning platform.
Trips are a regular and valued part of the St Andrew's learning experience. This year we have enjoyed visits to: the beach, a sculpture park, the Science Museum, the Stockport Air Raid Shelters, the Imperial War Museum, the local Jewish Museum, the Chill factor climbing wall, Rock and River, and many other fascinating and adventurous places. Our highlight is always getting the whole school to the Pantomime at Christmas where we love to swing and sing together!
At St Andrew’s we believe that all children should have an equal opportunity to have access to a broad and balanced curriculum and to be included in all activities at our school.We try to ensure that we are offering a supportive and engaging place for all pupils, teachers and parents/carers.
St Andrew’s have achieved the recognised standard of becoming a ‘Dyslexia friendly School’, and teaching staff implement the strategies required throughout their everyday practice. When a pupil becomes 8yrs they will complete a screener test on a laptop. This helps us to identify if there are any signs of dyslexia present with each child, which then enables us to meet their needs further in the classroom environment.
Find our subject objectives for each subject in the links section. These detail the schools’ aims for pupils in each year group or key stage.
|
<urn:uuid:69ab7051-52ab-4c04-bd3e-1fefbc913d1b>
|
CC-MAIN-2022-33
|
https://www.standrewsprimaryeccles.co.uk/curriculum/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.951802
| 429
| 2.546875
| 3
|
Share this @internewscast.com
Treasury Secretary Janet Yellen said Sunday a recession is not “at all inevitable,” though she warned economic growth could slow, days after the Federal Reserve hiked interest rates to fight inflation and some experts questioned whether the economy is heading into another recession.
Yellen told ABC’s This Week she expects the economy to slow due to the recovery of the labor market from the Covid-19 pandemic, adding “it’s natural now that we expect a transition to steady and stable growth.”
Yellen added that “clearly, inflation is unacceptably high,” after consumer prices jumped 8.6% year-over-year last month, marking an unexpected 40-year high.
Yellen reiterated that combating inflation is President Joe Biden’s number-one priority, and that Federal Reserve Chair Jerome Powell has said his goal is to bring down inflation while maintaining a strong labor market.
Yellen said Powell’s goal will take “skill and luck,” but she doesn’t think a recession will necessarily follow.
A Wall Street Journal survey of economists released Sunday put the probability of a recession in the next year at 44%, an unusually high figure. Prior to the 2008 recession, the Journal surveyed economists who put the probability at 38%, and in February 2020, economists assigned a 26% probability. A Conference Board business research group survey published Friday also found 76.1% of top C-suite executives believe there already is a recession, and 43.3% believe there will be a recession by the end of the year.
The Federal Open Markets Committee announced Wednesday it will raise the federal funds rate by 0.75 percentage points—the largest interest rate hike since 1994—as it battles inflation. Uncertainty around a possible recession reached a fever-pitch last week when all major stock indexes plunged into bear market territory Monday, and layoffs began at some tech and real estate companies. The Dow Jones Industrial Average is down 18% since the beginning of this year, and the U.S. GDP also shrank 1.4% during the first quarter of 2022. Despite the numbers, Biden echoed Yellen’s sentiment on a possible recession in a Thursday interview with the Associated Press, saying a recession is “not inevitable.”
‘Worst Fears Confirmed’ As Fed ‘Plays Dangerous Game’ With Inflation And Rate Hikes (Forbes)
Fed Authorizes Biggest Interest Rate Hike In 28 Years, As Experts Worry Its Fight Against Inflation Will Spark Recession (Forbes)
Most CEOs Expect A Recession In Next Year, Survey Says (Forbes)
|
<urn:uuid:65aa50ba-3cd9-46d4-937d-2dafe16a4dba>
|
CC-MAIN-2022-33
|
https://internewscast.com/business/treasury-secretary-yellen-says-recession-not-at-all-inevitable-but-inflation-is-unacceptably-high/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.936304
| 578
| 1.734375
| 2
|
Sports have had a long history of being deeply rooted in American culture, and for a while those which were classified as extreme or action sports competed on a national scale of popularity with baseball, basketball, and football. However in the past decade, figures of the Americans both partaking in extreme/action sports as well as viewing them on television has significantly decreased, forcing the industry to consider why.
Some argue that these issues stem from the way in which both the action and extreme sports industries are run financially, while others blame the dip in popularity on the new generation of youth. Although I do agree with certain aspects of these arguments, I feel as if they fail to recognize the larger issue that has always clouded the extreme/action sports industries; the inability to spread these sports across all regions of the country. Less than one percent of Americans listed an extreme sport as their favorite sport to watch on television.
One of the reasons why baseball has been dubbed America’s pastime is that it is arguably the most accessible sport in America. All you need is a ball, or something resembling a ball, and an object to strike it with. Throw in a few natural landmarks for bases and you have yourself some afternoon entertainment. The same mindset applies to football, which can be played in the rain or snow, on dirt or on grass.
However when one tries to apply this mindset to many extreme sports, complications emerge. Skateboarding is impossible in the regions of the country with harsher weather, while snowboarding and surfing are highly dependent upon both snowfall and a large body of water in order to partake in the sports. In reality, although these extreme/action sports may seem just as simple as football or basketball, the conditions which are required is an entirely different factor to consider.
In the end, the industries of extreme and action sports can do as much as they want to attempt to improve their respective financial situations and business models, but at one point they must realize that their dependence upon the natural environments of their consumers is perhaps the most prominent factor. Quite frankly, there is little surfing in the Midwest, and there is no snowboarding in the desert. As a result of these conditions, I would suggest that the only legitimate way in which the popularity of these sports would return to their previous state is if the industry as a whole concentrates their advertising efforts on the regions of the country which have proven to be popular in a given extreme or action sport. Otherwise, efforts will continue to be wasted trying to spread the popularity of a sport into geographic areas which will never support them.
|
<urn:uuid:910e8a49-cfd1-4232-8d0e-462e556987a8>
|
CC-MAIN-2022-33
|
https://extremesportsx.com/2016/11/09/extreme-and-action-sports-struggle-to-keep-pace/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.97266
| 534
| 2.015625
| 2
|
Often, starter motor issues manifest as a single, loud click coming from the starter relay or starter solenoid. Car makes 1 click when trying to start.
If the wires are in place and still your car will not start, then you must replace the starter solenoid.
What causes a car to click when starting. Engine cranks fine, but never fires Dirty or low oil can cause the engine's valve lifter to malfunction, leading to clicking sounds in the engine. Here is a more detailed list of the most common reasons why your car engine clicks when trying to start it.
A dead battery is the most common cause of a clicking noise when trying to start your car. The noise indicates that the starter solenoid or relay is operating, but there isn’t enough battery current to turn the starter motor. I told the person that installed the remote start that i click the fob 2 times and he told me that toyota has something that would cause the car to start up by itself, and i.
Reasons why your car won’t start. This creates heat, and in extreme cases, the heat can cause parts to weld together in inappropriate places in your car. Follow these steps toward a resolution:
If you have a “car won’t start one click noise” condition, this can be due to a failing ignition switch. It can also be caused by a faulty starter or wiring issues. A weak click means there is a loose connection.
I have to click the regular fob 2 times to shut my day running lights off when i go to lock it. Usually, you will hear a rapid succession of clicks. Today's cars have complex systems with many components, many of which can cause a clicking, tapping or rattling noise when they start to fail.
Engine doesn't crank* at all; All you hear is a single click or repeated clicking coming from the engine compartment. Sometimes, if we’re lucky, it does.
Engine cranks, but very slowly; Starter tight engine engine malfunction fuel problems electrical the cause can be isolated using the guide at the right. You could replace just the solenoid, but, for an 11 year old truck, it may be best to replace the entire starter.
In the case of broken wires, electrical current from your battery will not reach the starter. When a car engine makes a clicking noise, it may not have sufficient clean oil to lubricate itself properly, according to 2 car pros. You start up your car, ready to go, and you hear some type of clicking or knocking noise around the dashboard.
Drivers experiencing this unusual sound may have to let a mechanic examine the ignition, climate control, electrical, exhaust or other systems to track down the cause of the problem. The most common reason why your car clicks when trying to start is a dead or drained car battery. It’s natural for us to get a little worried whenever we hear strange sounds, and, indeed, any new noise should always be investigated.
Both could be a result of a corroded or aged relay whose contact points are deteriorated. However, there are some occasions when a damaged starter relay will cause the starter to make a clicking sound when you turn the key. The most common reason is that the starter has failed.
Because the starter is not getting enough electricity to stay powered and crank the engine, the system’s repeated attempts make a clicking sound. Hot starting problems (the car starts ok when cold!) hot starting problems have five principal causes: The other reason is that the battery does not have enough power to turn the starter.
Fuel pumps, especially electrical ones, tend to make a clicking sound when it starts. The sound may be from the valves, piston, or cylinder wall clearance. Check the wires that connect to your starter solenoid and tighten them.
You can also hear an engine ticking noise when cold starting an engine. Examine the battery under the hood. That clicking noise usually comes from the starter, and there are two reasons why a starter makes a clicking noise instead of starting your car.
Usually, this points to a faulty relay or solenoid, or a bad or jammed starter motor. Usually, this points to a faulty relay or solenoid, or a bad or jammed starter motor. I can hear the starter clicking once.
If the pump does not engage when you try to start the car, it means you have a bad fuel pump. In most cases, it’s enough to charge the car battery to fix the issue. The starter relay is a very durable and reliable mechanical part, however it is possible for damage to occur requiring a mechanic to replace the starter relay.
If you notice any of these warning signs, make sure to contact one of. Rock your car back and forth or tap the starter motor with a hammer and try starting the engine again. Try first to rock your car back and forth and see if this works.
The welding of parts leads to the “car won’t start one click noise” condition. Lessor high power could either damage the entire starter system or won’t start the vehicle, accompanied by an annoying clicking sound. Why does my car make a clicking noise?
Starter motor issues can manifest as a single, loud click emanating from the starter relay or starter solenoid.
|
<urn:uuid:ab3bd338-8a1e-4993-98c3-e572562791f3>
|
CC-MAIN-2022-33
|
https://artsdistrictflea.com/what-causes-a-car-to-click-when-starting/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.926213
| 1,098
| 2.453125
| 2
|
As a 22-year-old politically engaged Christian woman, I want to be a part of a church that takes seriously its mandate to protect God’s creation and the vulnerable. For me, one of the most important ways to fulfill this mandate is to address climate change.
I take seriously Numbers 35:33-34, which says, “You shall not pollute the land in which you live. … You shall not defile the land in which you live, in which I also dwell” (NRSV).
Proverbs 31:8-9 also deeply resonates with me when it proclaims, “Speak out for those who cannot speak, for the rights of all the destitute. Speak out, judge righteously, defend the rights of the poor and needy.” For me, a church that fails to do these things is hypocritical and therefore unattractive.
I am not alone but part of a powerful youth movement desiring action on climate change. As the next generation that will inherit the world, young people speak with intense moral authority on the issue of climate change.
If the church wants to remain relevant for students and the youth generation, it should increase and amplify its call to action on climate change. By speaking from a moral perspective on a national level, the church can show young people across the country that it is a relevant place where youth can be supported in their quest to seek an earth restored.
I’ve worked with many student groups -- most from religious backgrounds -- and I see how passionately young people desire to engage with others on climate change. In early February, as part of my job as a program assistant with the Friends Committee on National Legislation, I engaged with students, faith leaders and Quakers across the Research Triangle area on our moral obligation as people of faith to act on climate change.
While in North Carolina, I gathered with Randall Williams, a Carolina Friends School (CFS) teacher, and Susannah Tuttle, the director of North Carolina Interfaith Power & Light, to give training and advice to 10 CFS high school students before leaving for a day of lobbying in Raleigh.
The group of students met with Michael Jones, Sen. Kay Hagan’s regional liaison in Raleigh, and delivered their challenge: “We are here to ask Sen. Hagan to take a moral stand on action regarding climate change. Will she use the recent coal ash spill on the Dan River as an opportunity to take a strong stance supporting renewable energy and the reduction of coal use?”
Their class on climate advocacy inspired the students to create a NC Students for Climate Action group. They planned a massive carpool day and created a “Love Our Climate NC” campaign, complete with a video, information sheets, postcards and a social media package.
These students are serious about working for climate solutions. They are motivated by the science, but also something deeper: they are motivated by their faith and the moral call to conscience on climate disruption.
I returned to Washington, D.C., incredibly impressed at the maturity, passion and fierce desire these students had to seek an earth restored.
Many churches today mourn the loss of young people and are searching for ways to be relevant and engaging places for students and youth. Here is an opportunity for churches to do just that. I believe that the faith community is uniquely situated to make the moral call to action on climate disruption. As people of faith, we have a deep concern for God’s creation. We are called to care for the least of these, who often will experience the effects of climate change most severely. We have an obligation to future generations.
There are concrete ways that faith leaders and pastors can take action. Churches are making environmental stewardship a priority of their congregations -- physically “greening” their church buildings by undergoing energy audits, purchasing energy-efficient appliances and installing solar panels.
Pastors are writing to and meeting with their political representatives, advocating from a faith perspective why stronger environmental policies are needed.
This call to action is already resonating with congregations across the country. In early February, faith communities coalesced around the National Preach-In on Climate Change, hosted by Interfaith Power & Light, to mobilize the faith voice.
Youth movements are rising up across the planet urging action from a moral or faith perspective. A World Wildlife Federation faith project, Sacred Earth, encourages youth to make the connection between their faith and conservation, calling upon them to share their stories of how and why they are environmental advocates.
There is data that shows the importance of climate change to young voters. Eighty percent of voters under 35 support President Barack Obama’s Climate Action Plan, and 73 percent would oppose members of Congress who got in the way of the plan.
A study done by the Yale Project on Climate Change and the George Mason University Center for Climate Change Communication found that 81 percent of 18- to 34-year-old evangelicals trust religious leaders as an information source on global warming. Faith leaders must not abandon the youth generation by failing to communicate boldly the importance of acting on climate disruption.
What a perfect chance for the church to revitalize its relationship with youth by acknowledging, respecting and reciprocating their passion and voice on this issue. By leading on climate change, the church can once again capture the imagination of the youth movement while fulfilling its mandate to love and protect all of God’s creation.
|
<urn:uuid:ebccd06a-4ca6-46dc-b733-b9dd7866e74e>
|
CC-MAIN-2022-33
|
https://faithandleadership.com/emily-wirzba-young-people-seek-earth-restored
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.952341
| 1,112
| 1.671875
| 2
|
Because of the nature of the World-Wide-Web, there is no way you could take an existing FoxPro application and just get it to run over the web. Web browsers receive information in a language called HTML (Hypertext Markup Language) and send information back to servers using HTML forms. In order for FoxPro to communicate with web browsers it must be able to read the input of HTML forms, and format its output as HTML text. For this reason, the input and output routines of existing applications will have to be re-written. Other procedures handling the logic of the application, (e.g. queries, data-updates, etc.) can remain as is.
In some cases existing reports can be used without modification, by re-directing their output to a text file and then sending it to the browser (<PRE> tags have to be added at the beginning and the end of the text). This method works adequately if you have a large number of reports that you want to convert in a hurry, but the output appears just like an ASCII text dump with no formatting. If, on the other hand, you want to have aesthetically pleasing reports that take advantage of the HTML formatting tags, you will need to either include these tags in the reports, or use a different method to create HTML output.
|FoxWeb Support Team
|
<urn:uuid:eda91b4f-1677-45c4-b431-9512a21c437b>
|
CC-MAIN-2022-33
|
http://foxweb.com/ForumStatic/msg-003534.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.891652
| 287
| 1.859375
| 2
|
Nowadays, investing can be considered one of the most profitable businesses in the world. It has made many people rich and its many benefits are well documented. However, having enough to invest is one thing, but knowing what to invest in is another. Here are the top 3 most profitable investments.
The stock market
The stock market has earned its place as one of the most profitable investments and believe it or not, its reputation is not overrated. If you are looking for a good investment that will make you money in the long term, the stock market will certainly not leave you indifferent.
Indeed, the stock market guarantees you a return totalling an average of 8.5% per year. What makes investing in the stock market so special is that it is simple and does not require any financial expertise on your part. Investing in the stock market is notoriously volatile, but this is also what makes it a very profitable investment in the long run.
Investing in real estate is one of the most profitable investments in both the long and short term. You can make your investment in various forms. SCPIs are the most recommended for long-term investment. SCPIs allow you to receive regular rents on your assets.
If you are more interested in a short-term profitable investment, real estate crowdfunding will certainly suit you. Real estate crowdfunding involves borrowing money from a developer to construct a building in order to sell it. At the end of the process, you get your investment back with interest.
BIAU life insurance
BIAU life insurance is different from other standard insurance policies. This life insurance was created by the legendary Stéphane van Huffel, who gives you the opportunity to invest in a different way.
The particularity of this insurance is that it does not remain fixed. In other words, it evolves and adapts to the various market fluctuations. This insurance defends your interests on the market in order to increase the profitability of your investment.
|
<urn:uuid:ea256789-3997-4275-a292-2c52df4fa047>
|
CC-MAIN-2022-33
|
http://www.sgvenglish.com/the-top-3-most-profitable-investments/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.971856
| 399
| 1.578125
| 2
|
Open Signed Edition
Since 1740, the Manufacture de Sèvres has continuously encouraged artists and designers to create decorative porcelain objects. Traditional manufacturing techniques have been placed at the service of innovation, improve existing forms, and create new shapes.
The collaboration between Bakker and Sèvres has resulted in six porcelain objects. These sculptures pour, contain, store, or simply balance on their center. Meandering lines, intertwined forms, and dripping volumes relate to the fluid character of the material. Each object plays with the archetypical characteristics of the pourer: a container, a spout, and a handle. These elements are enlarged, reduced, and merged, resulting in objects which might only give a suggestive representation of the act of pouring.
Available in Light Grey and Dark Grey.
L 9.6 x W 4.3 x H 4.9 in
L 24.4 x W 10.9 x H 12.4 cm
|
<urn:uuid:9e47ab84-f96d-4285-933f-86f7817955b2>
|
CC-MAIN-2022-33
|
https://ateliercourbet.com/artworks/aldo-bakker-artefact
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.90506
| 213
| 1.617188
| 2
|
K Raheja Corp’s landmark commercial offering Mindspace in Airoli East is leading the way with its end to end waste management system. Its work, in tandem with the Swatch Bharat Mission, India’s largest cleanliness drive by the PMOs office, the sustainable practices at the Business Park ensure every single piece of waste from inside of the Park is re-cycled and re-used inside the Business Park itself, with zero contribution to the City’s municipal waste. Reviewing the same on his recent business visit to the city was Vinod Jindal, Joint Secretary Swacch Bharat Mission, along with Dr. N. Ramaswami, Commissioner Navi Mumbai who congratulated the team for their initiatives and hard work.
Amongst its several other initiatives, Mindspace SEZ at Airoli East, has installed OWC units, to compost wet waste generated at the thriving Business Park. With a total capacity of these units at approximately 4 tons per day, it effectively ensures recycling of wet waste. Additionally, Mindspace Business Park also has horticulture shredder machines to process horticulture waste, and multiple active vermicomposting beds along with portable leaf composting units. The manure generated from above facilities is utilised to maintain the green landscape and also in urban farming which sees the cultivation of organic vegetables on ground.
Lauding K Raheja Corp’s initiative, Vinod Kumar Jindal, Joint Secretary Swachh Bharat Mission said “The sustainable concepts used at Mindspace are commendable. I am glad that I have come across such concepts being implemented at a Commercial Business Park. I would like to urge all other companies to put in place such initiatives which will work towards the betterment of our society at large.”
As a prelude to encouraging cities to improve urban sanitation, Minister of Housing and Urban Affairs has initiated the ‘Swachh Survekshan-2018’ survey. The objective of the survey is to encourage large-scale citizen participation and create awareness amongst all sections of society about the importance of working together towards making towns and cities a better place to live in.
|
<urn:uuid:0834c908-6b0c-41f7-b3d3-bfc33b702c04>
|
CC-MAIN-2022-33
|
https://architectureupdate.in/k-raheja-corps-business-park-mindspace-airoli-east-piloting-best-in-class-waste-management-system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.940266
| 442
| 1.726563
| 2
|
In 1847, Brigham Young led his followers out West and allegedly proclaimed, "This is the place!"
Young's proclamation designated the Great Salt Lake basin as a safe location to establish what has evolved into one of the wealthiest churches upon Earth ... per capita, by far the wealthiest church on Earth!
Like most of LDS/Mormon history, Young's statement cannot be verified and substantiated.
Whether or not their religion's history can be honestly verified, the members of the LDS/Mormon Church—who have been commanded by their leaders only to refer to themselves as "Latter-day Saints"—believe what they want to believe.
Try presenting any countering evidence to a member of this church, and see what happens.
(NOTE: To be fair to the Latter-day Saints, hardly anything published as an alternative history or "fact" by anti-Mormon factions can be proven historically sound. No written history, from whatever source before recording devices, is trustworthy.)
What cannot be disputed by either side, or any side for that matter, is that Brigham Young established the eventual physical worldwide headquarters of his church on the Wasatch Fault Line.
The Wasatch Fault Line is one of the most overdue major earthquake zones on Earth.
Science warns ... Okay, let's cede to Utah's own geological scientists:
The Utah Geological Survey made the following statement on Utah’s earthquake risk:
Utah is seismically active and at risk from large, damaging earthquakes. Since pioneer settlement in 1847, Utah has experienced 17 damaging earthquakes greater than magnitude 5.5. Furthermore, Utah has more than 200 active faults, many of which could generate earthquakes up to magnitude 6.5 to 7.5. The Wasatch fault, which extends along the Wasatch Front, is Utah’s most active and hazardous fault. Geologic studies show that over the last 7000 years, a magnitude 6.5 to 7.5 earthquake has occurred somewhere along the central, most active part of the Wasatch fault about every 270 years. The most recent large earthquake on the fault occurred about 300 years ago near Nephi. The remaining segments of the Wasatch fault and other large faults in Utah are less understood but together add significantly to Utah’s earthquake risk. Utah’s highest-risk zone extends in a broad band southward from the Cache Valley-Wasatch Front area to the St. George area and includes about 95% of Utah’s population.
The Real Truth® is: it's not a matter of if a major earthquake is going to occur in Utah, it's when.
A few questions a faithful Latter-day Saint should ask are:
Why in the world would God inspire Brigham Young to establish His kingdom upon the earth in such a risky location?
What would happen if a major earthquake completely leveled Salt Lake City, Utah, and killed most of the LDS General Authorities, along with thousands of LDS members?
How would the world perceive our religion after such an event?
Again, it's not a matter of if.
It's a matter of when!
Now let's talk science.
Through scientific observation and experimentation, firefighters have determined the best ways to fight fires, which include starting backfires that are meant to "stop the spread or change the direction of a wildfire. This is done by burning the fuel (grass, brush, trees, etc.) in front of a wildfire so it has nothing to burn when it reaches that point. Firefighters use a variety of tools to accomplish this."
What if there was a way to cause a "backearthquake" that would prevent a major earthquake from occurring?
Is there any science that has studied this?
Are there any scientists that know about this and can explain how to do it properly?
Yes, there are.
On March 10, 2022, a secretive group of the most intelligent scientists upon the earth contacted the First Presidency and Quorum of the Twelve Apostles of the Church of Jesus Christ of Latter-day Saints and asked for a meeting.
The LDS Church refused to meet with them.
Had the leaders of this church met with these incredible people, and had these leaders not mocked their existence and message, they would have explained exactly how to perform a "backearthquake" that would save Salt Lake City, Utah from the destruction caused by a major earthquake.
It's not a matter of if ...
It's a matter of when.
And these scientists have the knowledge and means to know exactly when.
However, the "wrath of God," as they have presented the term in their new American scripture—which basically means God's non-intervention in the affairs of mortals—will one day consume the pride of the most evil religious institution upon Earth ... all according to prophecy given in their new American scripture, the Book of Mormon.
"For the time soon cometh that the fulness of the WRATH OF GOD shall be poured out upon all the children of men; for he will not suffer that the wicked shall destroy the righteous.
"Wherefore, he will preserve the righteous by his power, even if it so be that the fulness of his wrath must come, and the righteous be preserved, even unto the destruction of their enemies by fire. Wherefore, the righteous need not fear; for thus saith the prophet, they shall be saved, even if it so be as by fire."
(BOM, 1 Nephi 22:16–17; emphasis added.)
"Even if it so be as by fire"?
Think about this carefully.
How can people be saved, "even if it so be as by fire"?
NOTE TO LDS LEADERS:
"[God's] arm is outstretched still."
Contact me and set up a meeting ... before when becomes NOW!
During our meeting, I will explain how your church is the most evil church upon Earth ... BAR NONE!
Do not be like the members of the Church among the Nephites, who, after experiencing great physical destructions and the deaths of millions of people, lamented:
"O that we had repented before this great and terrible day, and had not killed and stoned the prophets, and cast them out [without listening to their warnings]; then would our mothers and our fair daughters, and our children have been spared, and not have been buried up in that great city [of Salt Lake]. And thus were the howlings of the people great and terrible."
(BOM, 3 Nephi 8:25; emphasis added.)
I've warned you about this great physical destruction for the very last time!
If you do not contact us, then, after this great destruction occurs, we will publish this warning for all the world to see!
|
<urn:uuid:9bdb951b-704a-4065-9697-59598ba5cae6>
|
CC-MAIN-2022-33
|
https://www.christophernemelka.com/post/the-imminent-fall-and-destruction-of-the-lds-mormon-church-the-most-wicked-church-on-earth
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.959726
| 1,410
| 2.921875
| 3
|
ORLANDO, Fla. — Residents of the Carolinas work up to a surprise Saturday morning: Tropical Storm Colin had formed overnight.
According the National Hurricane Center, an area of low pressure formed just offshore from Savannah, Georgia, on Friday but became better organized overnight. “As a result, and rather unexpectedly, Tropical Storm Colin has formed near the South Carolina coast, centered just inland a bit to the northeast of Charleston,” the hurricane center said Saturday morning.
At 2 p.m., Tropical Storm Colin was located about 10 miles west-southwest of Myrtle Beach, South Carolina, with maximum sustained winds of 40 mph. Tropical-storm-force winds extended out 80 miles from Colin’s center.
Topical storm warnings are in effect for north of Little River, South Carolina, to Duck, North Carolina, and Pamlico Sound.
“A slightly faster northeast to east-northeast motion is expected during the next day or two. On the forecast track, the center of Colin is expected to move northeastward along or just inland of the South Carolina and North Carolina coasts through Sunday morning, and then emerge over the western Atlantic Ocean late Sunday,” the NHC said.
Meanwhile, Tropical Storm Bonnie continues moving across Central America and it heads from the Atlantic to the Pacific.
At 2 p.m. Saturday, Bonnie was located about 110 miles southwest of Managua, Nicaragua, moving west at 15 mph. Its maximum sustained winds were 40 mph.
A tropical storm warning is in effect for Cabo Blanco, Costa Rica, northward to the border of Nicaragua and Honduras. “Interests along the Pacific coasts of El Salvador, Guatemala, and southern Mexico should monitor the progress of Bonnie,” the NHC said.
And forecasters are still monitoring an area of disturbed weather in the eastern Caribbean that has a 10% chance of developing into a tropical depression over the next several days.
“A tropical wave continues to produce a broad area of disorganized showers and thunderstorms over the Windward Islands and eastern Caribbean Sea,” forecasters said. “Upper-level winds are not conducive for significant development as the system moves west-northwestward during the next few days across the Caribbean Sea.”
|
<urn:uuid:dc76b0d9-bc90-40d1-9284-c87eb426d489>
|
CC-MAIN-2022-33
|
https://www.yahoo.com/now/rather-unexpected-tropical-storm-colin-184100054.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.951001
| 471
| 1.710938
| 2
|
Lifting the top reveals a hidden image.
Shows the Yellow Peril of the time. Inside is a print of Thomas and his wife Tillie. In the background is part of a poster ‘Hip! Hurrah! Chinese Excluded’ with the text repeating, a popular cause for the Chinese Exclusion Act.
Poster reference: Hip! Hurrah! Chinese Excluded by order of Democratic County Central Committee, published by Frandzen, Bumgardner & Co., Steam Printers, 1882.
|
<urn:uuid:eb20aa56-60c0-4f1f-81fe-7d722d5a9af8>
|
CC-MAIN-2022-33
|
https://ch-anpress.com/artwork/5055974-Thomas%E2%80%99%20Domestic%20Life%3A%20Thomas%20%26%20Tillie.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
|
en
| 0.904803
| 109
| 1.75
| 2
|
Metal sorption to ferrihydrite : phosphate effects, X-ray absorption spectroscopy and surface complexation modelling
Sammanfattning: Phosphorus affects the sorption of many metals and arsenate to iron (hydr)oxides. This may influence the mobility and bioavailability of metals and arsenate. Phosphorus therefore plays an important role in, e.g., determining the ecotoxicological risk of contaminants in soils. The overall aim of this thesis was to improve the understanding of lead(II), copper(II), cadmium(II) and arsenate binding to iron (hydr)oxides. The focus was on how phosphate affects the sorption on ferrihydrite and soils in which ferrihydrite is an important constituent. The effect of phosphate on the sorption of lead(II), copper(II), cadmium(II) and arsenate was determined by batch experiments. X-ray absorption spectroscopy (XAS) was performed to identify the binding mechanisms. Geochemical models were developed based on the XAS results and knowledge about the mineral or soil properties. Phosphate enhanced the sorption of lead(II), copper(II) and cadmium(II) to ferrihydrite. The increased sorption was best explained by the formation of ternary complexes including the ferrihydrite surface, the metal and the phosphate ion. Phosphate competed strongly with arsenate for sorption sites on ferrihydrite. The competition was even stronger on poorly crystalline aluminium hydroxide. Zero-valent iron that is mixed into soil rapidly oxidises to ferrihydrite that can adsorb contaminants. It was shown that the immobilisation of copper and arsenic in soils that had been stabilised by zero-valent iron is long-lasting. Copper immobilisation was most effective at high pH (>6) and at low organic matter content. Competition with phosphate needs to be taken into account when modelling arsenate sorption in soils. Otherwise the latter may be greatly overestimated. Metal sorption to some podzolised soils was investigated in batch experiments. Despite the large influence on metal sorption in the pure ferrihydrite systems the addition of phosphate did not affect lead(II), copper(II) or cadmium(II) sorption to the B and C horizons of podzolised soils. The reasons may be strong metal binding to organic matter combined with a relatively small addition of phosphorus in the experiments. In conclusion this thesis shows that phosphate greatly affects the sorption of lead(II), copper(II), cadmium(II) and arsenate to iron (hydr)oxides. To determine the impact of this effect in more complex matrices such as soils, more research is needed.
Denna avhandling är EVENTUELLT nedladdningsbar som PDF. Kolla denna länk för att se om den går att ladda ner.
|
<urn:uuid:9dbd5b42-b87c-4217-8409-9417ba1149b0>
|
CC-MAIN-2022-33
|
https://www.avhandlingar.se/avhandling/e274a9ad7e/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz
|
en
| 0.909346
| 618
| 2.015625
| 2
|
Koedinger Discusses K-12 Data Security with CSO
Cybersecurity threats and opportunities around student data in K-12 was the topic of a recent CSO article, featuring Carnegie Learning Chief Product Architect Steve Ritter and the Human-Computer Interaction Institute's Professor Ken Koedinger. How much data should be collected and for what purpose are questions that Koedinger urges schools to consider as more educational technology tools enter the classroom.
Earlier this fall, the Center for Data Innovation reported that over 93% of teachers regularly use digital tools to assist their instruction, and as much as 6.6 billions dollars are being spent to bring technology into the classrooms.
"Don't collect any information that you don't need," said Koedinger. "You don't need to know gender, race, or if a student is eligible for free or reduced lunch. That's just a matter of being careful. If you get hacked, the consequences should be as minimal as possible."
Koedinger believes schools need to be proactive in the handling of their data and to insist on secure or de-identified data precautions by their educational technology vendors.
"The schools should be demanding that security," said Koedinger. "A school could say to a vendor 'we will use your product, but only you guarantee that the data you keep is fully de-identified'."
Read the complete article on CSO.com.
|
<urn:uuid:6efa8ade-9d50-48f6-af55-ef0f0ba1ef37>
|
CC-MAIN-2022-33
|
https://hcii.cmu.edu/news/koedinger-discusses-k-12-data-security-cso
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.963765
| 288
| 2.1875
| 2
|
Treatment plans will be individualized for each client based on formal and/or informal assessments conducted by the speech therapist, parent/client input, and clinical observations. Evidence-based treatment strategies will be utilized to facilitate results. Therapy should be fun and positive! We will tailor treatment to you/your child's interests.
Every child develops at their own pace. Early intervention (EI) can change the course of your child's developmental delay. If you have concerns about your child's speech, it is best to seek help early. EI is focused on children birth to three and their families. Parent coaching is an integral part of the early intervention process to help parents carry over the strategies learned in sessions. You will learn helpful strategies that will facilitate your child's language development!
PROMPT is an acronym for Prompts for Restructuring Oral Muscular Phonetic Targets. The technique is a tactile-kinesthetic approach that uses touch cues to a patient’s articulators (jaw, tongue, lips) to manually guide them through a targeted word, phrase or sentence. The technique is holistic as it looks at the whole child (physical/sensory, cognitive/linguistic, and social/emotional domains) and embeds therapy targets in to functional activities. Learn more about PROMPT by visiting their website.
Clear Communication does not have contracts with health insurance companies. Invoices will be sent directly to the client(s) on a monthly basis. The fee for Speech-Language Therapy services are in accordance to the standards of the NZA. Fees will be applied from the beginning to the end of a session for assessments, treatment, and parent and or multi-disciplinary meetings. Clients will receive a monthly invoice to be paid within 15 days. All invoices are subject to VAT.
Accent modification is a process of shaping consonants and vowels, learning correct rhythm and stress, and controlling your speaking rate to be better understood while speaking English. As a native American English speaker, I can help you modify your accent to give you confidence when speaking at work, home, and with neighbors or friends. Goals and targets will be assessed using informal assessments and observations. Each session will be individualized and tailored to fit your needs.
Collaboration is a key element to successful speech therapy. Parent, teacher, and specialists' input and implementation will help transfer the skills learned in therapy sessions to other environments where the child/adolescent/adult interacts. Practicing the skills learned in therapy sessions will facilitate greater overall success!
IN PERSON / ONLINE
Flexible services are offered to suit your scheduling needs. If in-person sessions are not possible, online therapy is offered over Zoom.
A free 20 minute consultation is given via phone/video call to determine if services should be pursued.
Evaluations and assessments may include formal or informal testing, parent/client interviews, questionnaires, and clinician observations.
Goals or therapy targets will be agreed upon as a result of the assessments.
Therapy sessions will be delivered at a fixed time, between 1-3 times per week.
Sessions range from 25-60 minutes.
Cancellations: please inform the speech therapist at least 24 hours in advance. If not, you will be charged for treatment.
Clients will be treated with respect! Please trust the professional judgement of the SLP.
|
<urn:uuid:01be40b8-fd6d-4e68-a23b-cef1f084ad97>
|
CC-MAIN-2022-33
|
https://www.clearcommunicationspeech.com/services
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.918541
| 764
| 1.84375
| 2
|
Definition: a tendency to relapse into a previous condition or mode of behavior; especially : relapse into criminal behavior
Below is a cut from an article by Paul Heroux to help explain the reason for
Sanctified Hope Home for Women.
Reducing Recidivism: The Challenge of Successful Prisoner Re-Entry
There is a large percentage of recidivism or returning to prison or jail after release. Life is more difficult because it is hard to find a place to live that will take ex-offenders; difficult to find a job and proper drug treatment and medical care. The public opposes helping these ex-offenders stating facts like: why should we help them, no one helped me. Also, society is afraid these people will bump other people from jobs who haven’t committed a crime. The attitude of society is to just leave them locked up, because they deserved it. But keeping them locked up is so very expensive. We cannot eliminate recidivism totally, but non-profits and religious organizations have proven to be a big help to the re-entry challenges that the ex-offenders face.
Paul Heroux worked in a state prison and a county jail. He holds a Master’s in Criminology from the University of Pennsylvania and a Master’s in Public Administration from Harvard.
|
<urn:uuid:1aed7768-37b6-44a2-b4c7-d33df8ced5a9>
|
CC-MAIN-2022-33
|
https://sanctifiedhope.org/home/recidivism
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.953188
| 270
| 2.84375
| 3
|
The European Central Bank (ECB) was right to push down interest rates to all-time lows and to use unconventional instruments when the euro debt crisis was at its peak. However, the lasting ultra-low interest rates have begun to induce financial stability risks and put savers and financial institutions under increasing pressure. Moreover, it is now the task of governments to tackle the roots of the multiple crises that cumulated in recent years by means of significant structural reforms in many policy fields.
Many important steps have been or are being made to achieve this. Economic conditions have improved. Provided this course stays on track as is widely expected, the Cologne Institute for Economic Research (IW) proposes to start raising interest rates after mid-2015 – and thus earlier than the ECB currently envisages. In order to prevent major turbulence in the financial markets, the ECB should start to raise interest rates only by 0.01 percent on a monthly basis. The steps need to be increased when the upswing gets broader and more dynamic. Moreover, the ECB should clearly and intensively communicate the qualitative conditions which will guide its decision about the start and the further course of interest rate increases.
Economic growth is forecast to reach more than 1.5 percent in 2015. This expectation is underscored by improved economic sentiment indicators. For example, the OECD’s leading indicator has increased considerably since mid-2012. Although it has stagnated recently, it is still above its long-term average.
Why an earlier exit?
It is true that inflation in the Euro area is rather low at 0.4 percent in July 2014. However, the so-called core inflation is higher at 0.8 percent, as energy and food prices have declined considerably. What is more, only short-term inflation expectations have declined while over the medium term they remain anchored at close to 2 percent (figure).
Contained deflation risk.
Many structural reforms have been implemented, particularly in the stressed countries. While more effort is still needed in this respect, the reforms taken should lay the foundation for stronger potential growth. High private debts, which could dampen growth in the near future, should be decreased at a faster but still moderate pace by using - and in some cases reforming - private insolvency regimes. The banking system in the Eurozone is also getting healthier: The “IW Bank Monitor” shows that the risk-weighted core capital ratio of the larger systemic Eurozone banks has improved from 8 percent in 2007 to 13 percent in 2013.
Structural and banking reforms.
Thus, many stress indicators of the Euro banking system have improved considerably, and while problems with non-performing loans still prevail for certain banks, the outstanding Comprehensive Assessment of the ECB will lead to further capital increases. Eurozone banks should be sufficiently healthy by mid-2015 to face some very small interest rate hikes.
Inflation has started to increase, and the return of inflation comes at a time in which economies begin to recover from pandemic-induced and lockdown-induced recessions. This raises questions about how much and how long inflation will go up as well as about ...
The European Central Bank (ECB) is reviewing its strategy. Key pillars are its communication and how monetary policy should address climate change. We advise the ECB to strengthen its communication especially with social groups unfamiliar with monetary policy. ...
|
<urn:uuid:d4bf9462-c0b2-4ac1-a09f-2e8b468cf167>
|
CC-MAIN-2022-33
|
https://www.iwkoeln.de/en/press/iwd/juergen-matthes-smooth-turnaround-allows-for-earlier-exit.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00264.warc.gz
|
en
| 0.963285
| 687
| 2.140625
| 2
|
Global tourism is one of the largest economic generators in the world, with the tourism industry generating over $7.5 trillion in 2014 alone. Although more people than ever are packing their bags and heading to the airport, few consider the environmental and cultural impact of their journeys. As more communities are opening up to visits from foreign travellers, a new consciousness is also growing amongst backpackers in the form of “ecotourism”.
What is Ecotourism?
Ecotourism is, at its core, a respect for local communities and environments while travelling through them. It includes travelling to and learning about ecosystems and communities not normally considered tourism hubs. The idea of ecotourism began in the 1980’s as travellers became more familiar with the diverse cultures and the precarious ecosystems they were visiting.
As the years passed, ecotourism has slowly entered the public conscience and is recognized in most countries globally. In fact, 11.4% of all consumer spending was estimated to be on ecotourism and 2017 was declared the International Year of Sustainable Development by the United Nations.
The Benefits of Ecotourism
Because these destinations are not normally chosen sites for travellers, ecotourism provides a much needed economic boost to local communities. Employment in these areas is able to grow due to new industries that cater to travellers, meaning that your money stays in the community and supports updates in local infrastructure.
In a time where the environment is constantly under threat, ecotourism also allows communities to take ownership of their natural environment and maintain its beauty by controlling tourism avenues. Ecotourism is also important to the travellers themselves, as visiting these regions and learning about communities can provide a more holistic view of the world and the importance of preserving the environment.
At Creed LA, our goal is to combine environmental restoration with economic expansion, a goal that fits perfectly with the ideals of ecotourism. Call us today at (877) 810-7473 or check us out online to find out more about our mission.
|
<urn:uuid:2aabf084-f898-4e1b-b941-977a14201ef5>
|
CC-MAIN-2022-33
|
https://creedla.com/the-environmental-and-cultural-benefits-of-ecotourism/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.956706
| 418
| 2.734375
| 3
|
What is Google Classroom? Why do you need to attend?
I am excited to invite all parents to our first Google Classroom Seminar hosted here at Ascension Catholic School. I urge everyone who has a student enrolled to come Friday, October 9, 2015 to one of our three free sessions that should answer all your questions about the online free platform all our students from 2nd -8th will be engaging with over the course of this school year. Topics that will be discussed is as follows:
1.) What is Google Classroom
2.) How to login
3.) How to navigate the platform
4.) How to submit assignments
5.) How to monitor your child’s account
6.) Explain Google Drive, and Docs.
Please RSVP to the office 323-756-4064 the time that works best for you – 5-6PM, 6-7PM, 7-8PM. The seminar will be held in the school lab. Translation will be available by Miss J. Rueda, and Miss D. Rueda. Each session is limited to 25 parents because there will be activities for parents to complete on the school computers.
OR Signup Here!
I look forward to seeing everyone there!
|
<urn:uuid:eb463a10-873c-4100-89a0-71e28e79a042>
|
CC-MAIN-2022-33
|
https://starkcomp.com/2015/10/04/google-classroom-seminar/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.932716
| 262
| 2.109375
| 2
|
Error 1628/1607 Failed to complete script based install
Updated on 2017-08-24
This error message is often caused when user does not have the administrator right of the computer. To run most installations on Windows XP machines, you are often required to be the administrator of the computer or have some kind of administrative privileges. The reason why installations require administrative privileges is because many times installations access the Windows registry and Windows System folders. If you are trying to install software on a computer in a corporate environment, you need to contact your system administrator to give you administrative privileges on your computer. * You may have insufficient disk space disk space in your computer to install the program. Please erase unwanted files to make room in your computer for installation. Normally you need at least 80MB in your hard drive in order to install the Music software in your computer.
By clicking on the link, you will be leaving the official Royal Philips Healthcare ("Philips") website. Any links to third-party websites that may appear on this site are provided only for your convenience and in no way represent any affiliation or endorsement of the information provided on those linked websites. Philips makes no representations or warranties of any kind with regard to any third-party websites or the information contained therein.
|
<urn:uuid:3b7bf728-010f-4ad1-94cb-ea45c5bef693>
|
CC-MAIN-2022-33
|
https://www.philips.co.uk/c-t/XC000012003/error-16281607-failed-to-complete-script-based-install
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
|
en
| 0.899474
| 253
| 1.65625
| 2
|
The 2005-2006 Zimbabwe Demographic and Health Survey (2005-06 ZDHS) is one of a series of surveys undertaken by the Central Statistical Office (CSO) as part of the Zimbabwe National Household Survey Capability Programme (ZNHSCP) and the worldwide MEASURE DHS programme. The Ministry of Health and Child Welfare (MOH&CW), Zimbabwe National Family Planning Council (ZNFPC), and the Musasa Project contributed significantly to the design, implementation, and analysis of the 2005-06 ZDHS results. Financial support for the 2005-06 ZDHS was provided by the government of Zimbabwe, the United States Agency for International Development (USAID), the U.S. President’s Emergency Plan for AIDS Relief (PEPFAR), the United Kingdom Department for International Development (DFID), the United Nations Population Fund (UNFPA), the United Nations Children’s Fund (UNICEF), and the Centres for Disease Control and Prevention (CDC). The Demographic and Health Research Division of Macro International Inc. (Macro) provided technical assistance during all phases of the survey.
While significantly expanded in content, the 2005-06 ZDHS is a follow-on to the 1988, 1994, and 1999 ZDHS and provides updated estimates of basic demographic and health indicators covered in the earlier surveys. In addition, data on malaria prevention and treatment, domestic violence, anaemia, and HIV/AIDS were also collected in the 2005-06 ZDHS. The primary objectives of the 2005-06 ZDHS project are to provide up-to-date information on fertility levels; nuptiality; sexual activity; fertility preferences; awareness and use of family planning methods; breastfeeding practices; nutritional status of mothers and young children; early childhood mortality and maternal mortality; maternal and child health; and awareness, behaviour, and prevalence regarding HIV/AIDS and other sexually transmitted infections (STIs).
Kind of Data
Sample survey data
Unit of Analysis
- Children under five years
- Women age 15-49
- Men age 15-54
The 2005-06 Zimbabwe Demographic and Health Survey covered the following topics:
- Anemia Questions–Questions or testing assessing prevalence/severity of iron-def. anemia among women or children
- Anemia Testing
- Birth Registration
- Domestic Violence
- Early Childhood Education
- GPS/Georeferenced–Global Positioning System or Georeferenced Data
- HIV Behavior
- HIV Knowledge–Questions assess knowledge/sources of knowledge/ways to avoid HIV
- HIV Testing
- Malaria Module (bednets)
- Male circumcision
- Maternal Mortality
- Men's Survey
- Reproductive Calendar
- TB Questions
- Tobacco Use
- Women's Status–Questions: women's autonomy (household decisionmaking/free movement/access money) & Dom. violence
Producers and sponsors
Zimbabwe. Central Statistical Office (CSO)
Macro International Inc.
Ministry of Health and Child Welfare
Zimbabwe National Family Planning Council
United States Agency for International Development
United States President’s Emergency Plan for AIDS Relief
United Kingdom Department for International Development
United Nations Population Fund
United Nations Children’s Fund
Centres for Disease Control and Prevention
The sample for the 2005-06 ZDHS was designed to provide population and health indicator estimates at the national and provincial levels. The sample design allowed for specific indicators, such as contraceptive use, to be calculated for each of the 10 provinces (Manicaland, Mashonaland Central, Mashonaland East, Mashonaland West, Matabeleland North, Matabeleland South, Midlands, Masvingo, Harare, and Bulawayo). The sampling frame used for the 2005-06 ZDHS was the 2002 Zimbabwe Master Sample (ZMS02) developed by CSO after the 2002 population census. With the exception of Harare and Bulawayo, each of the other eight provinces was stratified into four strata according to land use: communal lands, large-scale commercial farming areas (LSCFA), urban and semi-urban areas, smallscale commercial farming areas (SSCFA), and resettlement areas. Only one urban stratum was formed each for Harare and Bulawayo, providing a total of 34 strata.
A representative probability sample of 10,800 households was selected for the 2005-06 ZDHS. The sample was selected in two stages with enumeration areas (EAs) as the first stage and households as the second stage sampling units. In total 1,200 EAs were selected with probability proportional to size (PPS), the size being the number of households enumerated in the 2002 census. The selection of the EAs was a systematic, one-stage operation carried out independently for each of the 34 strata. The 1,200 ZMS02 EAs were divided into three replicates of 400 EAs each. One of the replicates consisting of 400 EAs was used for the 2005-06 ZDHS. In the second stage, a complete listing of households and mapping exercise was carried out for each cluster in January 2005. The list of households obtained was used as the frame for the second stage random selection of households. The listing excluded people living in institutional households (army barracks, hospitals, police camps, boarding schools, etc.). CSO provincial supervisors also trained provincial CSO officers to use global positioning system (GPS) receivers to take the coordinates of the 2005-06 ZDHS sample clusters.
All women age 15-49 and all men age 15-54 who were either permanent residents of the households in the 2005-06 ZDHS sample or visitors present in the household on the night before the survey were eligible to be interviewed. Anaemia and HIV testing was performed in each household among eligible women and men who consented to either or both tests. With the parent's or guardian's consent, children age 6-59 months were tested for anaemia in each household. In addition, a sub-sample of one eligible woman in each household was randomly selected to be asked additional questions about domestic violence.
Note: See detailed sample implementation summary tables in Appendix A of the Final Report.
A total of 10,752 households were selected for the sample, of which 9,778 were currently occupied. The shortfall was largely due to some households no longer existing in the sampled clusters at the time of the interview. Of the 9,778 existing households, 9,285 were successfully interviewed, yielding a household response rate of 95 percent.
In the interviewed households, 9,870 eligible women were identified and, of these, 8,907 were interviewed, yielding a response rate of 90 percent. Of the 8,761 eligible men identified, 7,175 were successfully interviewed (82 percent response rate). The principal reason for nonresponse among both eligible men and women was the failure to find them at home despite repeated visits to the households. The lower response rate among men than among women was due to the more frequent and longer absences of men from the households.
Note: See summarized response rates in Table 1.3 of the Final Report.
Dates of Data Collection
Data Collection Mode
Data Collection Notes
CSO staff and a variety of experts from government ministries, nongovernmental organizations (NGOs), and donor organizations participated in a three-day training of trainers (TOT) conducted in April 2005. Immediately following the TOT, the pretest training and fieldwork took place in April and May 2005. The pretest fieldwork was conducted in Gweru and surrounding areas, where both Shona and Ndebele households could easily be identified. For two weeks, 16 qualified nurses and Advanced-Level graduates were trained to administer the questionnaires, take anthropometric measurements, and collect blood samples for anaemia and HIV testing. Representatives from the NMRL and CDC/Zimbabwe assisted in training participants on the finger prick for blood collection, and proper handling and storage of the DBS samples for HIV testing. The pretest fieldwork was conducted in two separate six-day phases, covering approximately 200 households. Debriefing sessions were held with the pretest field staff, and modifications to the questionnaires were made based on lessons drawn from the exercise. Pretest interviewers were retained to serve as field editors and team supervisors during the main survey.
Training of field staff for the main survey was conducted during a four-week period in July 2005. Permanent CSO staff, as well as staff of MOH&CW, ZNFPC, the Musasa Project, and Macro International Inc. trained 130 interviewer trainees, most of whom were trained nurses or Advanced-Level graduates. The training course consisted of instruction regarding interviewing techniques and field procedures, a detailed review of items on the questionnaires, instruction and practice in weighing and measuring children, collecting blood samples for anaemia and HIV testing, mock interviews between participants in the classroom, and practice interviews with real respondents in areas outside the 2005-06 ZDHS sample points. Trainees who performed satisfactorily in the training programme were selected as interviewers, while the remainder were retained to assist in office operations. During this period, field editors and team supervisors were provided with additional training in methods of field editing, data quality control procedures, and fieldwork coordination.
Fourteen interviewing teams carried out the fieldwork for the 2005-06 ZDHS. Each team consisted of one team supervisor, one field editor, three or four female interviewers, two or three male interviewers, and one driver. In total, there were 14 team supervisors, 14 field editors, 44 female interviewers, 43 male interviewers, 24 data capture clerks, and 14 drivers. Nine permanent senior CSO staff coordinated and supervised fieldwork activities. Data collection took place over a seven-month period, from August 2005 to February 2006.
The questionnaire for each DHS can be found as an appendix in the final report for each study.
Three questionnaires were used for the 2005-06 ZDHS: a Household Questionnaire, a Women’s Questionnaire, and a Men’s Questionnaire. These questionnaires were adapted to reflect the population and health issues relevant to Zimbabwe at a series of meetings with various stakeholders from government ministries and agencies, nongovernmental organizations, and international donors. Three language versions of the questionnaires were produced: Shona, Ndebele, and English.
The Household Questionnaire was used to list all the usual members and visitors of selected households. Some basic information was collected on the characteristics of each person listed, including his or her age, sex, education, and relationship to the head of the household. For children under age 18, survival status of the parents was determined. If a child in the household had a parent who was sick for more than three consecutive months in the 12 months preceding the survey or a parent who had died, additional questions related to support for orphans and vulnerable children were asked. Additionally, if an adult in the household was sick for more than three consecutive months in the 12 months preceding the survey or an adult in the household died, questions were asked related to support for sick people or people who have died. The Household Questionnaire was also used to identify women and men who were eligible for the individual interview. Additionally, the Household Questionnaire collected information on characteristics of the household’s dwelling unit, such as the source of water, type of toilet facilities, materials used for the floor of the house, ownership of various durable goods, and ownership and use of mosquito nets. The Household Questionnaire was also used to record height, weight, and haemoglobin measurements for children age 6-59 months.
The Women’s Questionnaire was used to collect information from all women age 15-49. These women were asked questions on the following topics:
- Background characteristics (education, residential history, media exposure, etc.)
- Birth history and childhood mortality
- Knowledge and use of family planning methods
- Fertility preferences
- Antenatal, delivery and postnatal care
- Breastfeeding and infant feeding practices
- Vaccinations and childhood illnesses
- Marriage and sexual activity
- Women’s work and husband’s background characteristics
- Women’s and children’s nutritional status
- Domestic violence
- Awareness and behaviour regarding AIDS and other sexually transmitted infections (STIs)
- Adult mortality including maternal mortality.
As in the 1999 ZDHS, a “calendar” was used in the 2005-06 ZDHS to collect information on the respondent’s reproductive history since January 2000 concerning contraceptive method use, sources of contraception, reasons for contraceptive discontinuation, and marital unions. In addition, interviewing teams measured the height and weight of all children under the age of five years and of all women age 15-49.
The Men’s Questionnaire was administered to all men age 15-54 in each household in the 2005-06 ZDHS sample. The Men’s Questionnaire collected much of the same information found in the Women’s Questionnaire but was shorter because it did not contain a detailed reproductive history or questions on maternal and child health or nutrition.
Estimates of Sampling Error
The estimates from a sample survey are affected by two types of errors: (1) non-sampling errors, and (2) sampling errors. Non-sampling errors are the results of mistakes made in implementing data collection and data processing, such as failure to locate and interview the correct household, misunderstanding of the questions on the part of either the interviewer or the respondent, and data entry errors. Although numerous efforts were made during the implementation of the 2005-06 Zimbabwe Demographic and Health Survey (ZDHS) to minimize this type of error, non-sampling errors are impossible to avoid and difficult to evaluate statistically.
Sampling errors, on the other hand, can be evaluated statistically. The sample of respondents selected in the 2005-06 DHS is only one of many samples that could have been selected from the same population, using the same design and expected size. Each of these samples would yield results that differ somewhat from the results of the actual sample selected. Sampling errors are a measure of the variability between all possible samples. Although the degree of variability is not known exactly, it can be estimated from the survey results.
A sampling error is usually measured in terms of the standard error for a particular statistic (mean, percentage, etc.), which is the square root of the variance. The standard error can be used to calculate confidence intervals within which the true value for the population can reasonably be assumed to fall. For example, for any given statistic calculated from a sample survey, the value of that statistic will fall within a range of plus or minus two times the standard error of that statistic in 95 percent of all possible samples of identical size and design.
If the sample of respondents had been selected as a simple random sample, it would have been possible to use straightforward formulas for calculating sampling errors. However, the 2005-06 ZDHS sample is the result of a multi-stage stratified design, and, consequently, it was necessary to use more complex formulae. The computer software used to calculate sampling errors for the 2005-06 DHS is the ISSA Sampling Error Module. This module used the Taylor linearization method of variance estimation for survey estimates that are means or proportions. The Jackknife repeated replication method is used for variance estimation of more complex statistics such as fertility and mortality rates.
Note: See detailed estimate of sampling error calculation in APPENDIX B of the Final Report.
Data Quality Tables
- Household age distribution
- Age distribution of eligible and interviewed women
- Age distribution of eligible and interviewed men
- Completeness of reporting
- Reporting of age at death in days
- Reporting of age at death in months
- Births by calendar years
Note: See these tables in APPENDIX C of the Final Report.
Data and Data Related Resources
Use of the dataset must be acknowledged using a citation which would include:
- the Identification of the Primary Investigator
- the title of the survey (including country, acronym and year of implementation)
- the survey reference number
- the source and date of download
Disclaimer and copyrights
The user of the data acknowledges that the original collector of the data, the authorized distributor of the data, and the relevant funding agency bear no responsibility for use of the data or for interpretations or inferences based upon such uses.
|
<urn:uuid:9d95fe63-c085-4748-9074-7a180f46a848>
|
CC-MAIN-2022-33
|
https://datafirst.uct.ac.za/dataportal/index.php/catalog/383
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
|
en
| 0.936187
| 3,648
| 2.890625
| 3
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.