text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
Attending the M&S Flower Workshop taught me loads about arranging flowers. My mum is actually a florist who loves what she does as she’s been doing it for over a decade now and she’s also the amazing person who did my very own wedding flowers; which you can see here. Firstly, it was held at the very beautiful Greenhouse in London. It was a pleasure to walk into such a bright place full of a botanical garden and a super quirky hanging basket that I simply HAD to climb into… 😉 Once we got settled down we were introduced to Simon Richards. He’s actually working for M&S; him and his team were the ones who created the beautiful Chelsea Flower show arrangement. Simon gave us lots of tips about flowers and roses in particular. He also showed us, step by step, how to create a fun, summer table arrangement using brilliantly bright flowers from M&S – it was so much fun. Anyway, here are all the things I’ve learnt from the workshop below. Florist Flower Tips & How to Make Flowers Live Longer - Roses are thirsty flowers - Thirsty flowers need to be standing with most of the stem in the water to last longer - Thirsty flowers especially need to be cut diagonally at the very bottom to encourage the stem to drink - Use the flower feed to encourage the flowers to continue to bloom - Peonies do not last a long time and prefer to stand without other type of flowers - Keep all flowers out of direct sunlight if possible How to Create a Flower Table Arrangement for Summer - Use a colourful plastic picnic set to contrast your flowers against. - Cut your flowers to size, so I’ve cut roses to fit in a large plastic glass. - Use larger flowers to decorate shallow bowls or cups. I partnered a beautiful blue hyacinth and a lovely large sunflower within a shallow pot. - Be creative and go ombre! Using a pink plate and a yellow plastic cup I’ve created a collage by adding petals around the cup in a circular design starting with yellow then adding orange then red until the circle was finished. Be patient with this as it took me a while 🙂 - Test and learn. Try adding flowers together and if you don’t like it, change it and try something different until you do Once we had loads of fun arranging these boldly coloured flowers (or in my case taking them apart…) we tried out making our very own bouquets. How to Arrange a Pink Flower Bouquet using the Spiral Technique: - Collect 15 roses in the colours of your choice - Hold one rose firmly more than half way from the bottom - Add one rose at a time to the bouquet, alternating the flowers and in a diagonal way - Ensure that your first rose sits a little higher than the other roses so it’s your centre point - Continue to hold the bouquet high up and move it around as you add more to it - Once you’re happy with how it looks tie it using a plastic band or ribbon - Then, cut your bouquet to the size of your vase! Do, after this awesome workshop I felt I learned a lot. I’ve even put my new skills to the test and bought more M&S roses after my other ones had to be thrown away (this made me sad as they were so beautiful!) and I created a VIDEO tutorial to help you arrange your own spiral bouquet like above. Have fun arranging and don’t forget to subscribe to my channel for more tutorials and how to’s. ***In Collaboration with M&S
<urn:uuid:e40ea2da-6f9f-4c92-9478-f7a700493b04>
CC-MAIN-2022-33
https://fairytaleprettypicture.co.uk/m-and-s-flower-workshop-a-guide-on-how-to-arrange-flowers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.943951
775
1.6875
2
Дворец изящных искусств в Лилле — один из самых крупных и известных музеев Франции, крупнейший за пределами французской столицы. This UNESCO heritage site dominates Lille with its 104 meters! Climb its 100 steps, take the elevator and enjoy the amazing 360° view. Лилльская фондовая биржа — бывшая биржа во Франции, располагавшаяся в городе Лилль. Объединилась с Парижской биржей в 1991 году. Собор Нотр-Дам-де-ла-Трей — католический собор в городе Лилль. Being so close to Belgium, the Flemish influence here is undeniable. You can see it in all the picturesque streets of Lille's old town. The Citadel of Lille is a pentagonal citadel of the city wall of Lille, in France. It was built between 1667 and 1670. This romantic English-style garden offers charm and serenity. It has many trees, ponds, large lawns and a remarkable rotunda. The Église Saint-Maurice is a church on rue de Paris, in the historic centre of Lille, northern France. One of the most important markets. Buy spices, vegetables and products of oriental cuisine. One of the busiest place in Lille. This vibrant square lined with beautiful buildings and lively cafés is a truly fun place to be. The house where Charles de Gaulle was born is today a museum. It shows his military and political career, and also covers his personal life. Built in flamboyant Gothic style in the 15th century, this large church is completely refurbished. It has 3 vessels and beautiful windows. The jardin des plantes de Lille is a municipal botanical garden located on the rue du Jardin des plantes, Lille, Nord, Nord-Pas-de-Calais,… The main shopping street of Lille. It features fashion stores, souvenirs shops and lots of opportunities to window shop. Лилль-Фландрия — главная железнодорожная станция Лилля, фактической столицы Французской Фландрии. An imposing building with the facade surmounted by two pinnacles. Its architecture is a blend of tradition and oriental style - really worth… Lille-Saint-Sauveur is a former goods station of Lille with some of the buildings has been converted into recreational areas and exhibition… The Musée d'Histoire Naturelle de Lille, or Lille Natural History Museum, was founded in 1822. This former city gate with three arcades dates back to 1617. Each side is different - one is decorated with motifs and the other is quite… The Opéra de Lille is a neo-classical opera house, built from 1907 to 1913 and officially inaugurated in 1923.
<urn:uuid:e194656e-1015-4ffe-936e-1607432831ba>
CC-MAIN-2022-33
https://travel.sygic.com/ru/list/lill-dostoprimecatelnosti-city:402
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.758033
948
1.84375
2
What is the purpose of the System class? System class is provided with useful fields (static members) that are pertaining to the environment. Standard input/output and error output streams are provided with System class. These are used to access the externally defined properties and environment variables.Example System.in - external property for input device. System.out – external property for output device Other useful methods that interact with external system / environment are: – Returns the current time in milliseconds - Terminates currently running JVM - Invokes the garbage collector - Returns the system properties. The System class can not be instantiated.
<urn:uuid:6df0ecd0-789f-4b89-a239-ec042a2090d5>
CC-MAIN-2022-33
https://www.careerride.com/Java-class-purpose-of-system-class.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.735614
155
2.75
3
Like all parents, your first goal is to get your baby to smile. The second is to keep them smiling for as long as possible. In addition to the tips below, we have also included a few recipes for meals that are perfect for making sure your baby stays happy and healthy. Tips For Getting Your Baby To Smile: 1.) Make Silly Faces: One of the best ways to get your baby’s attention is by making funny faces. Once you have their attention, make some silly sounds or start clapping. Your baby will be so surprised they won’t be able to help but smile. 2.) Sing A Song: Singing a song is another great way to get your baby’s attention. Try singing one of the songs that you learned when you were a child. This will help them recognize familiar music and will also help encourage them to sing along. 3.) Give Them A Funny Name: Your baby may not be able to speak yet, but they can definitely understand sounds and recognize certain words better than others. Try giving them a funny name like “Rascal.” They’ll love it! Quick And Easy Meals For Babies: 1.) Banana And Oatmeal Pudding: Mash up 2 bananas and add 1/4 cup of Getting a baby to smile for the camera can be a very challenging affair. Here are some tips for getting your baby to smile: 1. Smile at your baby yourself, and make funny faces. Babies tend to respond to the emotions of those around them. 2. Talk to your baby with a silly voice, or sing songs, especially when you have a camera in hand. 3. Play peek-a-boo with a blanket or other object, or cover their eyes and then uncover them again (make sure they don’t get startled though). 4. Place your baby next to mirrors so they can see their own reflection; most babies will find this very amusing. 5. Wear silly clothes in front of your baby, such as a large pair of sunglasses or floppy shoes (you could even dress up as Santa Claus or the Grinch if it is close to Christmas). Here’s my tip for getting your baby to smile when you want: After bathing your baby, take him to the kitchen. Put him in a high chair and give him his own special bowl and spoon. Put some food in the bowl and let him try to feed himself. This is a really fun time for the whole family. Even if your baby doesn’t get any of the food into his mouth, he will get plenty of practice moving his arms, hands and fingers. And he will love holding the spoon! When you are feeding your baby, hold his head with one hand and give him the spoon with the other hand. This gives him a sense of security so that he is not afraid of falling off the high chair. If he starts to fall forward or back, take away the spoon. There is no secret to getting your baby to smile. It is all about being patient, having fun and making silly faces. However, there are a few tips that can help you get your baby smiling in no time! Make Silly Faces** Your baby’s first smiles will be at around two months old. These early smiles are mostly due to gas. Once your baby is around three months old, their smiles will become more intentional and meaningful. You can make silly faces or blow raspberries on their belly until they burst out laughing. Your baby enjoys the sound of your voice and it will make them smile as well. Try singing simple nursery rhymes such as “Twinkle Twinkle Little Star,” “Mary Had A Little Lamb” and “The Wheels On The Bus.” If you do not know any nursery rhymes, just make up a song about your baby’s day or about how cute they are! Give Them Toys** Toys are a great way to get your baby smiling. Rattles, squeaky toys and stuffed animals are all sure to get a smile out of your little one. Let them grab onto the toy and shake it until they My mother has always told me to cook for my baby, and that has always been her principal advice. She says that if you cook for your baby, then he or she will not just be dependent of the taste of the food but will also love you more. My mother is right most of the time and I have tried it on my own baby. My little one loved it so much that I started making it a habit. It was very hard at first as I had to make everything by hand, but eventually I learned how to make some simple food in my kitchen. I took the recipe from a book that I bought online and then tweaked it a bit. I found out that I could use a blender instead of whisking the ingredients by hand and that made the job easier. You can easily make a healthy and delicious meal for your baby by pureeing or mashing fresh or cooked fruits and vegetables. Fruits can be served raw or cooked, canned or fresh. Vegetables should be cooked until they are very soft. For added nutrition, you can add breast milk, formula or yogurt to the food when you puree it. You will want to start out with single-ingredient foods so that you can identify any potential food allergies. Pureed bananas, pears and apricots are good first foods since they have a sweet taste that most babies like. You can also try green vegetables such as peas and spinach and red vegetables like beets and sweet potatoes. Try to feed your baby at least three times a day, but remember that at this age he will still get most of his nutrition from breast milk or formula. Using a blender, processor or baby mill will make it easy to prepare large quantities of food for your baby. Puree the food in batches and then freeze some of the portions in ice cube trays for use over several weeks. We all want our children to eat healthy, and the best way to ensure that they do is to get them involved in the cooking process. Having your child help you prepare meals is a great way of teaching them about good nutrition, and it allows them to be creative and express themselves through food. By involving your child in meal preparation, you are encouraging their creativity and engaging them in what they will be eating later. You can ask your child to help you choose recipes, decide which vegetables to buy at the store and even help you prepare the meal. This will encourage your child to try new foods because they will feel invested in the meal preparation process.
<urn:uuid:d5e1bd0f-cbce-40ce-afd4-d18b47eaeea7>
CC-MAIN-2022-33
https://www.costumemailer.com/blog/tips-for-getting-your-baby-to-smile/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.966991
1,394
1.710938
2
In the shadow of Helvellyn, Wythburn’s lonely position attracted the attention of the Romantic Poets. Hartley Coleridge described this little church as Wythburn’s ‘humble house of prayer’, Wordsworth described it as ‘Wythburn’s modest house of prayer’. It was formerly the spiritual centre of a small farming community, destroyed with the creation in 1894 of Thirlmere reservoir. The church was built in 1640 and restored in 1872. In the apse one of the stained glass windows is by Henry Holiday. At the west end are two simple but good windows depicting Celtic saints – St Cuthbert, and St Herbert, who both lived in the 7th Century. St Herbert was the Lakeland saint who brought Christianity to the region, and lived on an island on Derwentwater. There is some bronze work by the Keswick School of Industrial Arts. Outside is a stone erected by Canon Rawnsley commemorating two walks which inspired poems by Matthew Arnold. Go to Menu :
<urn:uuid:1141de0f-62a7-46e5-8c32-8774862048f0>
CC-MAIN-2022-33
https://www.visitcumbria.com/cm/wythburn-church/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.963409
228
2.78125
3
Any methodology like, for example, Agile may be introduced into a company but lead to zero result. Even if the hands-on skills have been molded: how to hold retrospectives, how to form scram-board, or how to assess the tasks by the terms; the magic of Agile may not show itself. The most frequent reason for it is that the employees lack the necessary communicative flexibility (the so-called soft skills). You should be “Agile” yourself to use this methodology. In 2013, I worked as a remote employee for a company that dealt with innovations and implemented Agile. I was invited to be the manager of one of the projects. Shortly after I started off, I realized that Agile did not work there: the company employees were too conservative. The methodology itself was implemented as if “in a manual” — there were all the roles and all the actions but permanent conflicts in the team could not find resolution which kept the projects from developing. It was then that a thought occurred to me that you cannot just embed a methodology as wonderful as Agile. For a qualitative implementation, you should not only have technical knowledge of that philosophy, but also a certain mindset — a type of brainwork that will allow the methodology to work at its best. It does not mean that there is only one type of brainwork capable of working with that methodology or only one correct way of its implementation. It is useless to transfer the team to Agile for the sake of Agile itself. It is necessary to become Agile yourself — to be flexible enough. The understanding of what things from “Agile culture” you can use in your company and in what way will give the company and individuals an opportunity to be visioners, become innovators and leaders in their fields. For example, the Cisco company, which is in the top 100 of Forbes best companies, implemented the Scaled Agile Framework (SAFe) in 2015. As a result, they registered: 40% decrease in the number of crucial and serious flaws, 16% decrease in the flaw level, 14% increase in troubleshooting due to good cooperation among international teams and elimination of overtime with no harm done to the product. The same thing happened to Lego which started using Agile methodology in 2015. Firstly, the company implemented Scram as part of Agile methodology, but having assumed that it was not enough, they added SAF. It reshaped all their work. The managers enthusiastically reported cutting out on excessive paperwork and other inefficient practices, saying goodbye to the army of “managers with electronic tables”. As for the developers, they are giving more exact assessments, and the results became more predictable. However, when I got to know more companies that implemented Agile, I kept taking notice of one and the same problem: frequent conflicts within the team. The reason for this, as I saw it, was lack of flexibility both on the side of team members and team leadership. It came clearer and clearer to me that the method itself was not a panacea. Agile is a wonderful methodology, but it won’t work out if the team members do not possess enough soft skills, and brain flexibility in particular. However, to possess is not be born with these skills. Nowadays it is not a secret for anybody that soft skills are those that one can acquire. You can develop them and level them up if you keep on practicing. Of course, you can do it on your own, struggling to search information on the Internet or books. But it’s more beneficial, I deem, to get structured knowledge and practice with me as a coach. I put all my five-year experience of learning soft skills into it beginning with 2013 when I studied Agile and soft skills basics at Hyper Island school in Great Britain. On my trainings, I will show you how to use different techniques to develop empathy, brain flexibility, listening skills, feedback skills. On completing the set of five trainings, you will be equipped with a set of instructions on what you should do every day to keep your soft skills taking roots and developing in you. Every week we will send you one letter with our best articles and news about the project so your team can make co-operation better and better. By clicking on the “Subscribe” button, you agree to the processing of personal data and agree with the website policy regarding the processing of personal data.
<urn:uuid:35719de8-7405-48e7-a7d1-be9ec87c3be5>
CC-MAIN-2022-33
https://crewcoop.org/en/lack-of-flexibility-in-agile-companies/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.965808
914
1.898438
2
Learn making a unique crochet heart keychain by following this easy pattern. You can make this beautiful accessory in a few hours. THE CROCHET HEART KEYCHAIN If you’re searching for something to make as a gift and take no time to finish, this is the right place. All you need to finish this lovely crochet heart keychain is to follow this pattern. This crochet keychain was made from a simple heart with a simple border then attached a tassel to the base of the heart. Flowers Related Posts: Keep reading for the crochet heart keychain pattern and video tutorial. To create this pattern, you will need a crochet hook of 4 mm and any sport weight yarn and a ring. - Chain(s) = Ch - Treble crochet = Tr - Double crochet = Dc - Slip Stitch = Sl st - Stitch = st Pattern of Crochet Heart Keychain – Using 2 strands of yarn, Make a slip knot, ch6, sl st to 1st ch to form a ring, ch4. – Working into the ring (4tr, 4dc, ch1, tr, ch1, 4dc, 4tr), ch3, sl st into the ring. – Sl st to the next ch-4 space, ch1, sl st in the same space, ch1, sl st in the same space, *ch1, sl st in the next st*, repeat * until reach the ch-1 space, ch1, sl st in the next ch-1 space, ch1, sl st in the next st, ch1, sl st in the next ch-1 space, repeat * until reach the last ch3 space, (ch1, sl st to the space) 3 times, sl st to the first st to join. – Fasten off, leaving a long tail. – Cut 12 pieces with 35cm length, using tapestry needle, insert the strands in the needle, pass the needle through the base of the heart, cut another 2 pieces of yarn, wrap one of them 2cm down and tie, wrap the second one 2cm down and tie, secure them, fasten off. Trim ends evenly. – Using the long tail left before and the tapestry needle, insert tapestry needle on the wrong side, leave a loop to insert the ring into it. Tutorial and photos of this crochet heart keychain pattern by: Lanitas y colores.
<urn:uuid:10227c13-7202-4a46-a1fa-946157fb259c>
CC-MAIN-2022-33
https://www.crochetbeja.com/crochet-heart-keychain-pattern-and-tutorial/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.828367
531
1.515625
2
Traditional Indigenous Australian Use – Lillipilly (Riberry) were a core food source. While children thought of the berries as delicious sweet treats, adults commonly referred to them as “remedy berries”. Riberries provided essential vitamins and minerals to fight against colds and keep the immune system healthy and strong. The pulp was also used to treat ear infections. Modern Day Use – Lillipilly (Riberry) has three times the folate of a blueberry. Folate is needed for healthy growth and development and is essential for the healthy development of a baby during pregnancy. Rich in manganese and an important plant source of calcium. Contains high levels of anthocyanin, a potent antioxidant that is thought to improve cognitive function. Chocolate on Purpose® use sustainable cocoa only from suppliers who are members of the ‘Cocoa Horizons’ Foundation. Belgian chocolate is used including Cocoa Butter which provides health benefits & and has anti-oxidant properties. Carbon Credits from the Aboriginal Carbon Foundation (AbCF) is purchased to offset their personal & business carbon footprint. Chocolate on Purpose® are Members of the First Nations Bushfood and Botanical Alliance Australia (FNBFBA) to support them in their mission to return custodianship of the Australian native food industry to our First Australians.
<urn:uuid:c8ec1b18-814d-4ee2-b1cb-48c875f44e7d>
CC-MAIN-2022-33
https://goods4good.com.au/product/milk-chocolate-with-riberry-daguba/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.949807
277
2.71875
3
All 11-year-old Jaylene Prime really wanted for Christmas was more signatures on a petition she hopes will force PharmaCare coverage for a drug that will remove or at least minimize her chronic pain. The Aldergrove youngster lives with a rare and painful form of juvenile arthritis that requires daily injections to keep her arthritis symptoms in control. She dreads it every single day of her life, describing them as fire under her skin. The family, in fact, teams up every single day at injection time to help distract Jaylene from the pain. Her younger and older sisters (Claire and Anika) often sing, dance, perform skits, tell jokes, or just hold her hand and talk to her in efforts to help her get through one more treatment. Even though they try to freeze the area, Mom said, Jaylene is always left screaming and crying because of the unbearable pain caused when the needle is injected into her arm or abdomen. Now, there’s a drug called canakinumab on the market that only requires a shot once a month, and it is reportedly showing great results for the kids suffering with this often disabling disease, said Charlene Prime, Jaylene’s mom and a vocal advocate for the funding of the drug. “No child should have to go through this,” Mom added, noting that Jaylene is one of only five kids in the province she knows of living with this severe form of the arthritis and in need of this expensive drug. It’s not something required by every child living with arthritis, Mom explained. “At the price tag of $20,000 monthly, PharmaCare is not covering the drug for these children and they are, therefore, enduring immense pain,” Charlene said. While it would obviously be a large upfront cost to the medical system, she said it would ultimately save the health care to ensure these kids are receiving this treatment. All the other kids like Jaylene, who are on the drug now, are showing considerable improvements. They’ve been taken off all or most other drugs (at present Jaylene is taking 12 different medications a day), and most of the recipients have seen their disease go into complete hibernation, Charlene explained. “If you base it on what we’ve seen of this drug… she could regain her childhood again,” Mom added. “How can I not do everything in my power to make that possible, not just for my own child, but for the others.” That’s why Charlene is working with a B.C. charity called Cassie+Friends to lobby the government, to encourage a letter-writing campaign, and to collect signatures on an online petition demanding the province take action immediately. The petition was started about a year ago, and they’ve gathered more than 7,000 signatures online, as well as hundreds more on paper pledge forms. But so many more signatures are needed in an effort to have the NDP government give funding approval for the drug, Charlene said. She is anxious to bring education and awareness to the disease and what she calls a shortfall in the medical system. If it was a child with cancer or another better-recognized life-threatening disease, that child would have access to and full coverage for all the “vital medication” necessary, Mom emphasized. But since arthritis and other rheumatic diseases are not well recognized and not understood as the life-threatening disease it is, these kids are being left to suffer unnecessarily. “Come on, we can’t make this one drug available to them?” Mom queried. Despite all attempts to reach the health ministry and others in government, Charlene said neither she nor Cassie + Friends have ever heard anything back. Owning their own business and only having basic medical coverage, the Prime family – like the other five families – are not in a position to afford the drug. “It’s just too expensive… this shouldn’t be allowed,” Mom added. Doctors who specialize in this field are recommending the drug. Charlene said she’s lost as to why, then, the government won’t recognize it, and would rather leave these children suffering.” Diagnosed three years ago Jaylene is a Grade 6 student at Peterson Road Elementary. She was diagnosed with Systemic Juvenile Arthritis on Jan. 8, 2015, and was in and out of BC Children’s Hospital (both stay overs and outpatient visits) 57 times in that first year. The hospital visits have slowed up a bit, but she was back in hospital again a week before Christmas with what Mom described as a flare up. Because it’s systemic, it attacks her liver, heart, and skin. Two or three times a year, for instance, she ends up with a rash all over her body that burns and itches. The rash can only be mitigated slightly by cold baths and weeks (sometimes months) of additional drugs. The little girl lives with chronic pain and constant tiredness. She also lives with frequent emotional distress, Mom explained. While she loved being physically active, that’s no longer as possible for her. She longs to be like most kids, to ride her bike, to go hiking with her family, and to play baseball again. “These are the kinds of things so many of us take for granted,” Charlene said. Thanksfully, Jaylene has discovered some enjoyable hobbies that are more compatible with her physical limitation, such as music (she’s learning the guitar, playing saxophone at school, and singing with the Langley Children’s Choir), but she knows she’s missing out on much more. “She’s being deprived of her childhood,” Charlene said. “None of these kids have a childhood. It’s not fair.” As a mother, she added, “I want her to have a good quality of life… I’m doing this so my child can live a normal childhood.” Jaylene just turned 11 in November, and she’s already lived through more pain and suffering than any adult eight times her age. “I don’t know how she does it. I don’t know if I could do it,” Mom said. “I just want to help my daughter,” Charlene said. This medication is “vitally important in the treatment of this severe form of childhood arthritis.” Is there more to this story? Charlene’s account of Jaylene’s diagnosis: The Christmas season was heartbreaking. Jaylene was unable to lift her head off her pillow and was unable to move. Her dad was carrying her daily up and down the stairs. Christmas morning was the worst… she awoke with severe stiffness and eventually made it slowly down the stairs in tears. She saw that Santa had brought her a new bike. Her Christmas wish. She cried and laid on the floor asking for everyone to give her 15 minutes so she could feel well enough to open the rest of the gifts. She was unable to ride her bike that day and for the first two month that she owned it. Another trip to our local hospital on Dec 29 proved to us that nobody knew what was happening to our daughter. Sent home again with no answers. January 8th we woke up. Jaylene couldn’t go back to school and life was far from normal. That morning I had her dad carry her to the van and I told him I was not coming home until someone would listen to me and that they were going to find out what was wrong with Jaylene. I captured the attention of the first doctor that walked in the room and she listened. I was a mother on a mission. Within 30 minutes Jaylene was being looked at by a team of doctor. Within the next hour our lives changed. Our daughter was diagnosed with Systemic Juvenile Idiopathic Arthritis. Treatment began and steroids were started. This initially didn’t help and she got worse over the next 2 weeks. We began intravenous treatments at the end of January. Tociluzimab was the first biologic we started on. Soon after we added methotrexate. Over the next few months we tried different ways to reduce the inflammation in her skin and nothing stopped the rash. Some of these medications even caused her to have very poor behaviours. These were stopped. The intraveneous treatments continued ever 2 weeks until October when we opted to stop treatment of the biologic to allow Jaylene’s body to increase levels of CRP. We did this in hopes to qualify for a research program with canikunimab. By January this had not happened and the rash still continued getting worse to the point that it would burn and itch as the day progressed. In February we started IVIG and had 4 rounds of that with no changes to her rashes and fevers. These treatments brought on migraine headaches. In Jaylenes words her life was miserable. There was no quality of life. She scratching daily and the burning was impossible to defeat. On June 3 we had the first injection of Anakinra. These daily injections have more than changed our lives. It effects our whole family in many ways. These injections are described by Jaylene, as “ fire burning under my skin.” The best part is we have our daughter back. She is her old self with a toughness now and a loss of innocence that only families that suffer this understand. We tackle this injection battle every day as a team where everyone in our family plays a part. We will survive and give this child the life she deserves. As Jaylene tells us “I may have arthritis but arthritis doesn’t have me.” – Charlene Prime
<urn:uuid:ca081bfb-6e19-424a-9227-c47540cdf5fc>
CC-MAIN-2022-33
https://www.mapleridgenews.com/news/langley-child-in-excruciating-pain-pleads-for-pharmacare-to-cover-drug/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.975315
2,106
1.664063
2
Cricklewood Blogger’s link with gangsta rap is a tenuous one, but the story begins with an event organised by our local youth charity, Amal Trust. In the last fortnight he has learnt about Bloods and Crips, and this man they call 2PAC Shakur…. The first induction was at Amal Trust’s happy and raucous Eid Party and Qur’an recitation prize giving ceremony, this year held at Porchester Hall in West London. The second was further away from home, in Bethnal Green, at a meeting organised by BLYDA – the Brick Lane Youth Development Association. The star turn at both events was the presence of ex-Rappers from the US who had something to say about gang culture. Both Abu Jafar and Mutta Abu Salek had traveled a million miles from their past lives, embracing Islam on the way and now with a mission to reach out and warn youngsters. Both these young men spoke with authority and tremendous sincerity. It was only when Mutta Abu Salek tugged his sleeve, revealing a large tattoo, that one could experience the connection with their past. Abu Jafar’s tale was about his childhood and teenage years in a Los Angeles area dominated by the two gangs, the Bloods and the Crips. They had marked out their territories through graffiti and other signs, and woe betide if you were found on the wrong side without allies. He told us the horrific tales of abject poverty and racism – how the grocery trucks were always laden with the fresh stock in the front and the old and rotten goods in the back – because when deliveries were made, these began with the rich, white affluent neighbourhoods on the hills, only arriving in the Black areas – Arab, Hispanic and Afro-American – till later. The gangs initially started out as vigilante groups to protect local communities from police racism, the KKK and Aryan Brotherhood, but then were taken over by criminals and turned to in-fighting. Abu Jafar and his sister ended up in rival groups – and she stabbed him in the shoulder. Every trip to school was a journey through danger land because he had to leave his Bloods territory and enter Crips land. His ticket out came when he was detained in a car involved in a drive-by shooting. Because of his age he was offered the choice of youth detention or an educational programme. He took the latter, and after finishing college in the US he is now completing Islamic studies in Nottingham. His message: “the music your children listen to is a product of the US gang culture…gangsta rap is one of the most satanic, demonic things that has arisen, so keep your kids away from it”. When Cricklewood Blogger turned up at the hall in Bethnal Green for the BLYDA event there were young lads out on the pavement because the hall was full. He decided to hang around and try his luck – he only just managed to slip in and take up one of the chairs marked ‘Reserved’ after a special plea to the organizers. Mutta Abu Salek was a crowd puller – who knew him as ‘Napolean’ and member of the famous gangsta rap group of ‘2PAC Shakur’ called the Outlaws. Napolean became Mutta Abu Salek about four years ago, alhamdu lillah. Mutta’s message to the youngsters was direct and emotional: your parents have worked hard to look after you, and it now your duty to respect them and “make them proud”. He himself grew up without parents, because they were killed when he was three years old. He joined the Outlaws in the footsteps of his elder brother – who was killed by his cousin. Like Abu Jafar he too was dead against gangsta rap music and its drug culture. The rap stars were laughing all the way to the bank and all that they cared about was getting out of the ghetto themselves. They said to themselves, “look at the geeks trying to be something they ain’t. Mutta had other choice turns of phrase: he called on the audience to get real and “smell the coffee”. He knew people walking around with bullets in their bodies – so “this is not a game; it is not PS3; this is not playstation. Everything you do you will have to pay. You are supposed to wake up. Have respect for yourselves, for your body. Be with the brothers – when you are together you are strong. He added, “a lot of people I grew up with were dying… I found Islam when I was 17 and it has taught me discipline…it was something that hit my heart…I had three houses but wasn’t happy at all”. He also had a clear message to his young audience about terrorism – this has nothing to do with our deen, “if we don’t know our deen we will be caught up in this stuff”. Many of the questions that were put to him later reverted back to 2PAC Shakur and whether he was still alive. Muta assured them: “I have seen his ashes”. In his view, “2PAC was a good guy; he had a good heart…after I became Muslim, I don’t hate him, but what he stood for”. Cricklewood Blogger had been an avid reader in his teenage years of James Baldwin, Stokely Carmichael and Eldridge Cleaver and he left the hall wondering on their legacy. It had been ostracized by the establishment and forced into exile. Some prominent individuals and families of the civil rights movement were coopted by the establishment and are today part of a comfortable bourgeoisie. True leaders like Malcolm X were eliminated by the FBI. Many of the Black Power clique ended up in prison or exile. It seems the majority were left with their status unchanged, in the city dumps and a jungle governed by Bloods, Crips and Outlaws. Alhamdu lillah for the Abu Jafars and Mutta Abu Saleks, who are continuing the struggle for freedom and dignity. Cricklewood Blogger was wrapped up in his thoughts and as he went on to the pavement almost ran into a hoodie. There was a Chinese gang selling contraband computer games on the corner. Welcome back to reality.
<urn:uuid:ac367215-57a2-459c-8f04-19dd2ba69f3d>
CC-MAIN-2022-33
http://www.salaam.co.uk/discovering-2pac-shakur/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.987777
1,335
1.617188
2
The ox is the second symbol in the Japanese zodiac. Legend has it that although the scheming rat snatched the first place in the race to God, God appreciated the patience and determination of the ox, who arrived in the second with a slow but steady pace. This symbol represents “loyalty” and “patience”. Oxen are calm, good-tempered, and trustworthy. They do things steadily, and do not spare any effort in achieving their goals. On the negative side, they can be quite stubborn and lack the flexibility to adapt to drastic changes. You can identify an ox if they: - Like to wear plain clothes. - Think too much before taking action. - Do not listen to others once they set their mind. Compatibility with other signs Oxen are most compatible with snakes and roosters. If these three come together, it generates a great positive power. Oxen also have a mutually beneficial relationship with rats. Sheep are the least compatible with oxen. In Japanese, an ox is “ushi” in romaji and is written as “牛” in kanji. In the Japanese Zodiac, however, an ox is written as “丑”.
<urn:uuid:1a93a21c-131f-4999-bba6-aad80f19ea61>
CC-MAIN-2022-33
https://japanesezodiac.com/japanese-year-of-the-ox
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.954827
268
2.78125
3
Startup America to Accelerate Innovation and Entrepreneurship Point: Entrepreneurs in high-growth companies can influence the federal government to increase their company’s access to capital, people, and markets. Story: Accelerating high-growth entrepreneurship Background: The Startup America Partnership, an initiative launched by President Obama in 2011, seeks to accelerate high-growth entrepreneurship. One step is to reduce the barriers entrepreneurs face when starting high-growth businesses. To accomplish this step, senior Obama Administration officials convened roundtables in eight US cities to hear from entrepreneurs and local leaders about what the federal government can do to help high-growth entrepreneurs. Event: Congressman Jared Polis kicked off the event, along with panelists Phil Weiser (White House National Economic Council), Don Graves (Department of Treasury & President’s Council on Jobs and Competitiveness), Michael Fitzpatrick (Office of Information and Regulatory Affairs) and local leaders like venture capitalist Brad Feld (Managing Director & Co-founder of The Foundry Group) and Kathy Rowlen, (CEO and founder, InDevR). After the short panel presentations, the 150 invited attendees from Boulder’s entrepreneur community divided into four groups to discuss possible short-term improvements of federal government regulations and procedures that affect high-growth entrepreneurial companies. Startup America will prioritize the suggestions, distribute them to respective federal agencies, and implement them as quickly as possible. Definition: Startup America focuses its efforts on entrepreneurial high-growth companies as distinct from both small business and larger, more established companies. These high-growth companies differ from small local businesses (e.g., local restaurants and service providers) in that high-growth companies push the limits in their efforts to scale new innovative products, services, and business models. High-growth companies hire hundreds of employees as the entrepreneur pursues national or global scale. Unlike small businesses, high-growth companies often aspire to be the next Fortune 500 company that defines new and innovative industries. Discussions in the breakout sessions suggested that creating scale means gaining access to three key resources: capital, people, and markets. Changes at the federal level could markedly improve access to these resources, spur economic growth, and create jobs. Issue: Improving Startups’ Access to Capital - Exemptions that let banks extend loans to entrepreneurs. (Some participants cautioned, however, that even if regulators let traditional banks lend to high-growth entrepreneurs, the banks wouldn’t make the loans due to cultural mismatches — they see startups as too risky.) Venture capitalist Brad Feld recommended focusing efforts on venture banks that do understand entrepreneurial companies, such as Comerica, Silicon Valley Bank, and Square One. - Tax-code changes that encourage equity investment in start-ups rather than investments in more established firms that can borrow from banks. - Expanding the government’s SBIR program for funding innovators and startups. One problem with today’s SBIR grant rules is that SBIR funds can only be applied to prototyping ideas, not commercializing them. The rules assume that entrepreneurs can find private capital once their ideas are ready for commercialization. But in these times of limited access to private capital, many innovation-focused companies can’t find the money they need to convert their SBIR-developed innovations into products. Attendees suggested more funding for SBIR grants and liberalization of SBIR-related regulations to increase job creation. Issue: Improving Access to Talent The problem is that many regulations assume — or almost mandate — a traditional workaday paycheck relationship between company and labor. In particular, IRS tax code elements (e.g., contractor/employee tax rules and Section 409A deferred compensation) and SEC regulations (e.g., on secondary markets of shares in private companies and stock-option accounting rules) stymie the kind of flexible access to skilled talent and gain-sharing that high-growth companies need. - Exemptions to some of these regulations during the early stages of a company’s founding, so startups could have both arms-length and sweat-equity relationships with people. - Immigration reform to retain foreign-born college graduates and to encourage both entrepreneurs and investors to come to the United States. US colleges and universities profit from full-tuition foreign students, but the country loses that educational investment when current immigration rules force the graduates to leave the US. - Move forward on “Start-up Visa” programs that enable early-stage, high-growth entrepreneurs to come to the US and start their companies here. Attracting and retaining both talent and capital will help create innovative future companies that create future jobs. Issue: Improving Access to Markets Regulations designed to protect consumers can backfire if the approvals process is so cumbersome or takes so long that entrepreneurs run out of resources before they get approval. Waiting months to hear back on SBIR funding or years for regulatory approvals can exhaust startups’ resources. The root cause of the problem is unbalanced incentives on government. Regulators and politicians face high penalties for under-regulation (i.e., they worry about “what if someone gets hurt by permitting X”). But, these same government officials experience little or no counterbalancing penalties for over-regulation of innovation (the millions of people awaiting healthcare or environmental solutions that are delayed or stymied due to over-regulation). The problem is that everyone can see the failure of lax regulation but few can see the lost opportunity when a regulator says “no.” Problems like economic underperformance — or disease and death caused by a lack of entrepreneurial solutions — aren’t as noticeable. As one participant said, the regulator’s motto that “failure is not an option” all but implies that innovation is not an option, either. - Pinpoint and cut out as much paperwork and unnecessary regulation as possible. - Remove delays from grant-approval and regulatory approval processes - Opt for self-policing solutions or data reporting rather than up-front regulation. As Go Entrepreneurs, So Goes America To me, the most distressing stories I heard at the event were from entrepreneurs who felt that their only option was to leave America for more growth-friendly countries like the UK and China. Excessive regulatory demands and delays, combined with high legal costs, are driving entrepreneurs to go overseas, and countries are offering incentives and capital to attract them. These entrepreneurs aren’t just thinking about outsourcing a few low-skill jobs, but taking the whole company — along with the innovation, business growth and new jobs — overseas. Phil Weiser noted that America’s venture capital environment does have a unique quality of allowing entrepreneurs to fail and resurrect themselves to produce later greatness. Yet despite this “permission to fail,” some participants feared that the government-imposed limits in the U.S. on access to capital, people, and markets mean that high-growth companies aren’t permitted to succeed. And if they can’t succeed in the U.S., they can too easily move. In today’s competitive world, more countries have the resources and motivations to host the best and brightest. Today’s mobility of capital, people, goods, and information mean that high-growth companies can readily relocate and take their energy, innovation, and success with them. At the same time that some entrepreneurs felt that the U.S. government may have failed their high-growth companies, those in government see that these entrepreneurs have failed government, too. Panelists urged the attendees to participate in government. Although entrepreneurs focus on telling and selling their ideas to customers and investors, they have not spent sufficient resources telling and selling to government. If citizens, including high-growth company entrepreneurs, are the customers of government, then government can only succeed with timely and useful feedback from high-growth company entrepreneurs. - (Note for our international readers: Although this particular post focuses on the U.S., I’m sure your country has analogous means for improving your government’s understanding of the value of innovation and high-growth entrepreneurship.) - Think about what regulations and government processes create needless obstacles to innovation and growth for your high-growth business. - Post your ideas or vote on the Startup America’s open innovation forum - Track and comment on pending regulations at Office of Regulatory Affairs - Lobby your senators and congressional representatives for more entrepreneur- and innovation-friendly laws Author of more than 450 company case studies and contributor to 28 books, Andrea Meyer writes & ghostwrites about innovation, IT and strategy for clients like MIT, Harvard Business School, McKinsey & Co., and Forrester Research. Follow her at www.workingknowledge.com/blog and twitter.com/AndreaMeyer. NEVER MISS ANOTHER NEWSLETTER! When sustainability is on the agenda, you’re likely to hear many terms mentioned that you may or may not be…Read More Photo by NordWood Themes on Unsplash Working remotely became a part of everyday life for many people all over the…Read More
<urn:uuid:72828fa2-9f5c-4abd-9659-d2f6499723a8>
CC-MAIN-2022-33
https://www.disruptorleague.com/blog/2011/05/28/startup-america-to-accelerate-innovation-and-entrepreneurship/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.939629
1,905
2.25
2
201 Polished Stainless Steel Strip 2B Finish Cold Rolled SS |Processing Service||Welding, Punching, Cutting, Bending, Decoiling||Surface Finish||NO.1 2B BA NO.3 NO.4| |Delivery Time||15-21 Days||Product Name||201 Stainless Steel Strip| |Technique||Cold Rolled||Port||Shanghai Port| Polished Stainless Steel Strip Cold Rolled, Stainless Steel 201 Strip, 2B Finish Stainless Steel Strip 201 Polished Stainless Steel 2B Finish Strip Cold Rolled SS Strip Type 201 is an austenitic chromium-nickel-manganese stainless steel that was developed in the 1950's due to worldwide nickel shortages. In the Type 201 composition, manganese and nitrogen are partially substituted for nickel. |201 Polished Stainless Steel 2B Finish Strip Cold Rolled SS Strip| |3mm-2000mm or as required| |0.1mm-3mm or as required| |Hot rolled / cold rolled| |NO.1 NO.2D NO.2B BA NO.3 NO.4| |Packing||Industry standard packaging| |It is widely used in high temperature applications, medical devices, building materials, chemistry, food industry, agriculture, ship components.| |Payment terms||L/C T/T (30% Deposit)| What is the difference between stainless steel 201 and 304? 201 stainless steel is a substitute for 304 steel. And 304 stainless steel contains 18% chromium and 9% nickel in standard. In comparison, the content of nickel and chromium in 304 is higher than that in 201, so the rust resistance of 304 is much better than that of 201.
<urn:uuid:7ffefb77-2a6d-4fff-9e03-48d17b3fb4c5>
CC-MAIN-2022-33
https://www.coldrolledstainlesssteel.com/sale-31359171-201-polished-stainless-steel-strip-2b-finish-cold-rolled-ss.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
en
0.77954
501
2.125
2
Evergreen Park School District 124 has a rich tradition of parents, teachers, and administration working together to build a foundation for success for our children. Supported by adults who love, nurture, and care for them, our children’s potential for success is bound only by the limits that they would place on themselves and their own learning. One of the most important things that we can do to help create this solid foundation is to model the high expectations for academic achievement, effort, and citizenship that we hold for ourselves and want for our children. I invite you to take some time to review, with your child, the information in this handbook. The procedures and guidelines that the district has developed and included here will help all our children have a safe, happy, and productive school year.
<urn:uuid:e679e990-e882-4cab-b1cf-c8e19156b1e0>
CC-MAIN-2022-33
https://northeastelementaryschool.d124.org/apps/pages/index.jsp?uREC_ID=441465&type=d&pREC_ID=953263
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.968021
157
2.359375
2
Now In-Network with TRICARE Insurance We utilize the latest FDA-Approved TMS Therapy to treat Service Members, Retirees, and their Families. Call (949) 370-0771 Today! TMS for Anxiety TMS has proved to be 2-3 times more effective in resolving Generalized Anxiety than anti-depressant medications and/or talk therapy. Our San Diego Clinic specializes in providing TMS for Anxiety disorders. Anxiety is the most common of the mood disorders — over 40 million American adults, alone, suffer from some form of anxiety disorder. Proper anxiety disorders differ, substantially, from the transient anxiety caused by a stressful event or situation, such as public speaking, taking an exam, etc. In Generalized Anxiety, symptoms are customarily open, unrestricted, broad anxieties that seem relentless. As a result, those who suffer from GAD feel incapable of living a normal day-to-day life. Anxiety disorders include: - General Anxiety Disorder - Post-Traumatic Stress Disorder (PTSD) - Obsessive-Compulsive Disorder (OCD) - Panic Disorder - Social Anxiety Disorder Anxiety disorders frequently accompany other mental health disorders, like depression and other mood disorders, and addiction — 60%+ of sufferers experience both anxiety and depression, together. Many symptoms of anxiety are similar to those of depression: difficulty concentrating, fatigue and problems sleeping. - Chronic and/or disproportionate worry - Perpetual sense of apprehension - Inability to relax - Difficulty or inability to make decisions - Fixation on disruptive, negative thoughts - Avoidance of common situations - Physical symptoms (fatigue, sweating, shakiness, muscle aches, nausea, and headaches) Untreated, Generalized Anxiety often results in inhibited social and professional growth, damaging physical effects, loneliness, negative self-image, emotional distress, and feeling a loss of control of one’s own life. TMS Treatment for Anxiety At Brain Therapy TMS, we use the electroencephalogram or EEG to evaluate the patient before TMS treatment. The purpose of the EEG evaluation is to examine the patient’s alpha brain waves, which are essential to determining how many Hz to give the patient. Alpha brainwaves are those that require little to no effort to emit. A perfect example would be when someone is first waking up. They are simply getting their muscles warmed up and are not doing any type of problem-solving whatsoever. On average, TMS for Anxiety merits 1-20 Hz burst of magnetic pulses to stimulate the right (or left) dlPFC part of the brain which takes roughly 15-20 minutes. Keep in mind, these numbers are on average, meaning they can be different according to each patient’s EEG evaluation. Anxiety is complex and acts between multiple neural pathways. So, other parts of the brain may be targeted as well, depending on EEG assessment results. A new study done by Translational Psychiatry in February of 2020 explores the use of inhibitory rTMS on the parietal cortex. The parietal lobe plays a role in processing sensory information such as touch, visual input, taste, hearing, spatial awareness, language processing, etc. This area can be especially useful in cases where sensory information and stimulus trigger anxiety — notably seen in phobias or PTSD. TMS therapy has proven to be a highly effective and safe treatment for all forms of Anxiety. Clinical studies evidence that as high as 70% of anxiety sufferers have a significant improvement response to TMS – 68% achieve remission from their anxiety. If you’d like to learn more about the treatment process at our TMS Center, please visit our TMS Procedure page. TMS benefits include: - High Success Rate – considerably higher success rate than any other treatments - Non-Invasive – the treatment is entirely external to the body - Non-Sedative – it requires no sedation and is relatively painless - Minimal to No Side Effects – it has no side effects in the vast majority of patients Call or Email us to schedule a free consultation for Anxiety: Take a GAD-7 Self Test TRICARE Insurance For Anxiety Treatment Brain Therapy TMS is now in-network with one of the largest US service providers in the United States, TRICARE. TRICARE’s mental health benefits cover a wide range of anxiety treatments, one of which is Transcranial Magnetic Stimulation. Those who serve in the United States armed forces may suffer from specific, career-related anxiety disorders. In certain circumstances, their family members may develop anxiety disorders and other mood disorders as well. Fortunately, TMS offers a viable solution for those whom either other anxiety remedies did not work, or would prefer another method of treatment. No matter what type of anxiety disorder someone has, they may find TMS helps more than any other treatment. Reach out today to discover whether your TRICARE plan has you covered. Does TMS work for anxiety? A meta-analysis of multiple studies on the effectiveness of TMS in anxiety or trauma-related disorders confirms its safety and therapeutic potential. There are a number of satisfactory results of TMS treatment for anxiety, though larger trials are still needed to validate this. Can TMS worsen anxiety? When TMS is used specifically for anxiety disorders, targeting the prefrontal cortex, a study noted patients seeing an improvement of their symptoms. When used on the left prefrontal cortex during the manic phase of a bipolar disorder, some patients saw a slight worsening of manic symptoms. But, the same study also mentioned that PTSD patients saw improvement in hyperarousal symptoms, suggesting that TMS may have an anxiolytic and calming effect when used appropriately. Is TMS FDA approved for anxiety? TMS is not approved by the FDA for treatment of anxiety, though it is FDA approved for medication-resistant depression. As larger, ongoing studies confirm its effectiveness for the treatment of anxiety disorders, we may eventually see an FDA approval. Current studies suggest these larger studies will prove its therapeutic benefit. Scholarly Research and Publications
<urn:uuid:237ca526-a7d3-4965-a0b4-ce977a3a4afd>
CC-MAIN-2022-33
https://braintherapytms.com/anxiety/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.925399
1,283
1.992188
2
S2 E15 - Princess on the Glass Hill - Part 2 of 2 The King told everyone in the kingdom about the contest. Ash and his two brothers also heard about it. The two brothers joined the contest, but they told Ash to stay home. They said Ash wouldn't be able to do it. So the brothers left home. But Ash really wanted to join the contest. So he left home too. On the day of the contest, there was a big crowd riding horses. Everyone tried to go up the hill of glass. But only one horse could run up the hill. On the horse was a knight covered in armor. So no one could see who it was. The armor was very shiny and the horse ran so fast. The Princess was very impressed. When the knight arrived at the top of the hill, the Princess threw a golden apple to him. The knight rode the horse down the hill with the golden apple. That evening, the King invited everyone to a party to meet the winner who had the golden apple. But the knight was not at the party. No one could find him. So everyone went home. At home, Ash’s two brothers told Ash about the knight. They said he was wearing shiny armor and his horse rode so fast. The next day, the brothers joined the contest again. But they didn’t allow Ash to go with them to the contest. Again, everyone tried to ride their horses up the hill of glass. But the glass hill was too slippery. Only one horse ran up the hill. On the horse was the knight in armor! He quickly rode up the hill. Then he stopped his horse in front of the Princess. She was very impressed with his skill. She threw the second golden apple to him. And the knight rode his horse back down the hill. But then he disappeared. No one could find him. So the King continued the contest to the third day. Again, Ash’s brothers went to the contest. Everyone tried to ride their horses up the hill. Still, they could not do it. Only the knight in shiny armor rode his horse up the glass hill. The Princess gave the knight the last golden apple. Then the knight rode his horse away quickly. The King asked, “Where is the knight in shining armor?” But no one could find him. So the King called everyone in the kingdom to the castle. He asked each one if they had one of the three golden apples. But no one did. Finally, the King asked Ash’s two brothers. They told the King their younger brother Ash was still at home. The King said, “You must bring him to the castle!” The brothers laughed. The brothers could not believe Ash had one of the golden apples. So Ash went to the castle. The King asked Ash, “Do you have a golden apple?” Ash said, “Yes, I have three golden apples.” Then the King and the Princess were so happy. They had found the knight in shiny armor. The King held a big party for Ash. And Ash became a Prince. The end.
<urn:uuid:df6357ee-6962-4076-a78c-fb612ac55456>
CC-MAIN-2022-33
https://www.katrinahao.com/blog/s2-e15-princess-on-the-glass-hill-part-2-of-2
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.98871
649
1.796875
2
This selection of tools (PDF Format; 2006) can be used to develop Restorative Justice practices in a prison – and to check the quality of the work being undertaken. The purpose is to provide materials that can be dipped into when required. Click here: Restorative Justice in Prisons: A Guide to Making it Happen to order the book The toolkit is organized a follows: To view these files you will need the free Adobe Reader available from www.Adobe.com If you have problems view the toolkit, please install the latest version of the Adobe Reader and try again. If you still have problems, please use our Contact page to request the files via email. Downloading the toolkit You can download the compressed archive (.zip) at the bottom of this page, or each of the sections individually: 1. Principles, set out in different formats 2. Organisational self-assessment of the quality of restorative work 3. Questions to help map the cultural web at a prison 4. Report on the Restorative Justice in Prisons Project (by Tim Newell) 5. Guidance on working with crime victims 6. A protocol for working with victims of crime 7. Pamphlet about prisons for victims of crime 8. Questions for assessing the prison’s work with victims (victims, victim contact officers, staff, prisoners) 9. Things you can do to resolve conflicts 10. Guide to restorative methods of responding to incidents 11. Checkpoints for violence prevention 12. Restorative practices in prisons list 13. Pennsylvania Prison Society Restorative Justice Program ZIP (containing all 13 toolkit PDFs) Download the entire toolkit as a .zip using the link below.
<urn:uuid:87318c3d-a1d3-406c-9e05-135fdff48da3>
CC-MAIN-2022-33
https://www.watersidepress.co.uk/restorative_justice_in_prisons_toolkit/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.833195
369
2.359375
2
Sponsor: Do you build complex software systems? See how NServiceBus makes it easier to design, build, and manage software systems that use message queues to achieve loose coupling. Get started for free. Entity Services are services that are centered around an Entity. For example, a CustomerService or a ProductService. Most times these services focus on data and CRUD operations. These services can cause low cohesion and in turn cause high coupling. Instead, focus on capabilities of services, the data encapsulated and owned by the service. Focusing on capabilities will increase cohesion and lower coupling. Check out my YouTube channel where I post all kinds of content that accompanies my posts including this video showing everything that is in this post. I believe that the default way that systems are built and designed today in 2021 is still revolving around large data models. This can be illustrated by a question on Reddit, which was asking if a microservices architecture where each table represented its own microservices was the best approach. The answer is no. Absolutely not. I don’t blame the user for posting this question. There is so much content around creating CRUD apps that it’s not really surprising. Also, when creating a large monolith, having a large schema is also typical. So the idea to split a large monolith and schema into microservices, would seem like you would create services around tables/data. Also, I would guess most developers relate Entities to tables. This is likely because of ORMs like Entity Framework. For my example throughout this post, I’m going to use the concept of a product in a warehouse. This entity has a few different properties that would probably be managed by CRUD. If you’re talking about an HTTP API, it would probably follow a CRUD to HTTP Methods. For example, if you wanted to create a product you would call: Or if you wanted to update a product you would call the route: These are the typical examples you’ll find in blogs/tutorials/videos. If you’re looking at an API, it would contain just CRUD type methods: The alternative is to focus on the capabilities of your service. Instead of grouping your entities by their data, rather group them by the capabilities they provide that relate to each other. A service is the authority of a set of business capabilities. If you look at the entity, which properties relate to each other? What are the actions users would take in order that would change those properties? If the quantity on hand of a product is changing, why is that? What would a user be doing that would change the QuantityOnHand? Does the QuantityOnHand have any relation to the cost? Would QuantityOnHand ever change at the same time as the price? If you decompose the capabilities that you need to expose to users, they are driven by commands/actions/tasks. What are the things users are trying to do? Moving away from CRUD and exposing explicit capabilities will then expose which capabilities are concerned with what pieces of data. The QuantityOnHand is affected by shipping and receiving products. The capabilities of shipping and receiving products belong to the warehouse. The Name, Description, Price, and Cost have nothing to do with shipping and receiving products. So why are the other properties on the product entity? If you do this to the other properties, you will realize that the capabilities define the data they own. Group related capabilities together into their own service/boundary, then you will realize that you do not have a single entity, but multiple concepts of the same entity that reside in multiple services. The concept of a product now lives in multiple different boundaries/services. They all share the common SKU, but each service owns a set of capabilities. Behind those capabilities are the relevant data it owns. Focusing on capabilities will increase cohesion and reduce coupling. Coupling is reduced because of increasing cohesion. You do not need to call other services to get/change data because you have the required data within a service for the capabilities that it owns.
<urn:uuid:ee7728af-9459-43a9-9256-244731bb95a7>
CC-MAIN-2022-33
https://test.codeopinion.com/avoid-entity-services-by-focusing-on-capabilities/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.954278
884
2.453125
2
A series of case histories describing how various industries have conserved energy by using ceramic fiber. In addition to the energy savings, other advantages are achieved, such as better working conditions and increased production. Documented figures obtained by these companies indicate the percentage or dollar value saved. Domst, Ronald E., "Reducing Heat Losses with Ceramic Fiber" (1978). UMR-MEC Conference on Energy / UMR-DNR Conference on Energy. 434, pp. 650-653. 5th Annual UMR-DNR Conference on Energy (1978: Oct. 10-12, Rolla, MO) Article - Conference proceedings Industrial Energy Conservation II © 1978 University of Missouri--Rolla, All rights reserved. 12 Oct 1978
<urn:uuid:b4a4a372-fd40-4c3b-9a86-4c5accf09796>
CC-MAIN-2022-33
https://scholarsmine.mst.edu/umr-mec/434/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.819416
215
1.953125
2
Have you been in meetings where topics keep looping around and around? More often than not, we’re missing important information, because we’re waiting to express our own opinion instead of paying attention to where the conversation is going. Without listening, no meaning is created and without meaning, no action is taken… Practicing active listening is challenging, but the reward is great. This skill boosts your ability to influence people around you and deepens the understanding between you and others in a unique way. - improve your ability to maintain your listening focus - make yourself heard in conversations and discussions - approach and achieve agreement in difficult situation …exercises with challenging topics and negotiating examples I would love to help you find your Right Kind of Loud. Get in touch at +44 (0)757 032 3650 or [email protected]
<urn:uuid:4adc7f27-91c5-47b9-856f-b8771af68e62>
CC-MAIN-2022-33
https://rightkindofloud.com/active-listening/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.939785
177
1.875
2
8 Best IELTS vocabulary books to get 7+ bands in the IELTS exam Guys, if you are struggling to achieve a good band score in the IELTS exam and always stuck at 6 or 6.5, it means you need to improve your English vocabulary. Vocabulary is very important, Also very difficult to improve without a good vocabulary book and guidance. There are many vocabulary books available but I have chosen 10 best vocabulary books, by reading them you can achieve a perfect band score in the IELTS exam. 1.English vocabulary in use, book series. The best thing about this book series is that there are books or all levels of students. one can start learning vocabulary from a basic level and then can cover elementary, pre-intermediate, intermediate, upper-intermediate, and advanced levels. This book has five versions. - English vocabulary in use basic - English vocabulary in use elementary - English vocabulary in use, pre-intermediate and intermediate - English vocabulary in use upper intermediate - English vocabulary in use advanced Above mentioned all books are very important. students can start from the basic version and finish at the advanced level. Also, use other ways to improve your vocabulary along with these books. 2. 4000 essential English words: This is the second-best book series for vocabulary, a total of 6 books, and is the best vocabulary book for all types of students. those who are new to the IELTS and have very little knowledge of vocabulary can use this book and improve their vocabulary. this book can help you to reach an advanced level of vocabulary from an elementary level. This book contains a total of 4000 words and 3.Oxford word skills: This is a series of three vocabulary books containing the most common English vocabulary books. the three books are categorized according to the difficulty level of the words. - Oxford word skills Basic: Elementary and pre-elementary - Oxford word skills Intermediate: intermediate and upper-intermediate - Oxford word skills Advanced: Advanced level Read all the features of this book and how to use this book to achieve a high band score in the IELTS exam. Click on the link below to download all the series of this book 4. IELTS vocabulary booster IELTS vocabulary booster is at fourth position in the term of best IELTS vocabulary books. This book has only one part and is only for those students those are at an advanced level and have a good knowledge of English vocabulary: 5. Cambridge Vocabulary for IELTS Cambridge is a well-known and credible publisher of IELTS books. the vocabulary book by the Cambridge university press is also a very good choice to learn new vocabulary words, read the full features of this book by clicking on the link below: 6. Collins Vocabulary for IELTS. Collins Vocabulary for IELTS is also a good book, but if you want to broaden your vocabulary, then use this book along with other vocabulary books like Cambridge and others; 7.Barron’s essential words for IELTS Barron’s essential words for IELTS is one very helpful book. there are a total of ten units that contains important vocabulary words related to the most important writing and speaking topics. this book is especially for the writing and the speaking module: 8.IELTS band nine vocab secrets: The last and the most important book for learning advanced level of vocabulary is Band nine vocab secrets. this book is really very helpful and can help you to achieve a perfect band score of nine in the IELTS speaking exam: Above mentioned books are the top 8 best IELTS vocabulary books to improve your vocabulary. you can blindly trust any book from them and I sure this will really help you to achieve your dream band score in the IELTS exam:
<urn:uuid:3aa314fd-b885-4724-807c-0f55c539a72b>
CC-MAIN-2022-33
https://www.ieltsdates.in/list-of-best-vocabulary-books-achieve-7-bands-ebooks/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.930245
797
2.5625
3
Socio-economic Inequalities and Healthcare Utilization in Ghana Keywords:Healthcare Utilization, Generalized Logit, Socio-economic inequities, Ghana. AbstractA socio-economic inequality in the use of healthcare services in Ghana is investigated in this paper. The data employed in the study were drawn from Global Ageing and Adult Health survey conducted in Ghana by SAGE and was based on the design for the World Health Survey (WHS, 2003). The survey was conducted in 2007 and collected data on socio-economic characteristics and other variables of the individuals interviewed. Using generalized logit model, the study found that health status is a very strong determinant of the type of healthcare services Ghanaians look for. In Ghana, there are still important socio-economic gradients in the use of some healthcare services. These differences may be due to socio-economic inequities but could also indicate that the existing health facilities are not always used in an optimal way. Patient factors may be more important than supply factors in explaining the differential use of health services. Authors who publish with this journal agree to the following terms: - Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. - Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. - Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
<urn:uuid:a226fa06-9b65-4453-8918-9a881405024d>
CC-MAIN-2022-33
https://thejournalofbusiness.org/index.php/site/article/view/88
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.943183
427
1.53125
2
The British Coatings Federation has been to Parliament to launch a new interim report with recommendations on how to create a circular economy for paint. The British Coatings Federation’s (BCF) PaintCare report details plans on creating a more circular economy, including how to deliver the target of removing 50% of unused decorative paint from the waste stream. It says that removing this waste could lead to the creation of a new sector based around remanufacturing paints. If you are interested in finding out more about the circular economy, it is one of the central themes of The Manufacturer’s Annual Leadership Conference (TMALC) – November 25 – 26, The ICC – Birmingham. You can find out more information here. Department for Environment, Food and Rural Affairs(Defra) Minister Rory Stewart gave a speech to delegates that included representatives from trade associations; retailers; paint manufacturers; local and national government, and other third-party organisations. Stewart, who has responsibility over waste, commented: “Every year , 55m litres of decorative paint is leftover in the UK, so I welcome PaintCare’s initiative. “It is vital that we encourage innovation and make better use of our resources if we are to reduce the amount of waste going to landfill and create new markets.” Chief executive of the BCF, Tom Bowtell added: “I’m thrilled that the event was so well attended and we were delighted that the Minister could attend and support PaintCare. “In order for PaintCare to succeed we need the Government’s backing, and I’m excited about the project’s next stages.”
<urn:uuid:a9c480b1-48dd-4ca5-84c5-55738777a04d>
CC-MAIN-2022-33
https://www.themanufacturer.com/articles/painting-a-picture-of-the-circular-economy/?change_country=LAT
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.939641
350
2.078125
2
Reaching out to the children of Betesda orphanage December is not only the last month of the year; it is the month of Christmas, the time of the year particularly dedicated to children! Santa, gifts, magic, family, are just a few words describing the particular atmosphere of this time of the year. But today, let’s talk about other, more important values and actions: compassion, generosity, peace, and the spirit of sharing and giving back. Let’s think about the thousands of children around the world who don’t have the chance to celebrate Christmas with their families. As Esi and I just had a baby when we started our home décor business, we immediately thought of the Betesda orphanage, based in Batam, an Indonesian island located right next to Singapore, which is where we live. We already had had the opportunity to visit this orphanage in May 2016. It had been a great experience, with many memories to cherish. We had been deeply touched by the maturity and the joie de vivre of the kids who live there and thought we would further contribute to their well being through our business, Kulturë. Charles with the kids and other volunteers So for this last blog post of the year, we decided to talk about the Betesda orphanage and the amazing work done over there by Pastor Zebua and the caretakers to give those children education, support and most importantly, love. In 2005, the third most powerful earthquake since 1965 in Indonesia devastated the region and particularly Nias (150 km west of Sumatra), causing a humanitarian disaster. Pastor Bishop Zebua organized a Relief Mission to Nias. Additionally, and through his Christian Foundation (Bahtera Misi Foundation), he created Betesda orphanage in Batam as a response to this tragic event. Later on, in 2012, more children joined the orphanage after a tsunami hit the Indonesian island of Mentawai. Today, no less than 48 children are living in the orphanage also called “Children House”. During our visit, Esi and I were impressed by the positive attitude of the children. Despite the difficult events they faced, they managed to keep their smile on and were very happy to interact with us. We could also tell that they were well aware of what happiness meant and gave us back a lot of positive feelings. We knew that they all endured a lot in the past, but they also deeply cared about one another. This was the biggest lesson that we took away. Esi (far right) with two young residents of the orphanage With regards to the objectives of the orphanage, in addition to welcoming abandoned children, Pastor Zebua gives a high importance to: - The protection of children rights: protecting them against all form of exploitation, violence and various forms of abuse. - Providing a decent environment: after the electric fire that occurred in the orphanage in 2015, all necessary measures were taken to rebuild the structure. Thanks to a high mobilization, the reconstruction was completed in only one and half years. Various parties were involved in this porject, including Mme Tussaud Singapore: the famous institution decorated all the rooms of the house following the children’ wishes. - Offering them the opportunity to empower themselves: every day the school bus of the orphanage picks up and drop off all the children to local schools (ranging from kindergarten to university level). Additionally, many cultural, artistic, IT and sportive activities are organized by volunteers to open their minds. - Ensuring medical follow up (vaccinations, medical check-ups etc.) Providing a decent quality of life and good education for all those kids requires a lot of funding and volunteers. This is why Pastor Zebua and the caretaker always rise donations. Their humanitarian call does not remain unanswered. Groups of people are visiting the orphanage regularly. One person involved on a regular basis is Sophie Leneveu, a French woman living in Singapore. For the past seven years, a group of ten persons join Sophie every two or three months to bring help, money, clothes and many other things which can contribute to maintain a good quality of life for the 48 young residents. Additionally, they prepare a big meal for all the kids every time they visit the orphanage. This expedition is now a regular event which the children look forward to. Esi and I, through Kulturë, are proud to contribute to enhancing the children’s living conditions and education. As such, we commit to giving 5% of our annual profits to the foundation. We would like to thank our clients without whom this contribution wouldn’t be possible. By buying our Balinese paintings, wall decors, wood carvings, bamboo baskets etc., you help us to reach out to the kids and slowly improve their lives! Please check the orphanage’s Facebook page https://m.facebook.com/OrphanageOutreachBatamIndonesia for more information regarding the trips to Batam. You can also message us if you wish to take part in this activity or contribute in your own way. We wish a Merry Christmas to all the kids and their caretakers!
<urn:uuid:623d2fd4-53f7-4c18-9fa0-48e5efd15022>
CC-MAIN-2022-33
https://kulturedeco.com/en-id/blogs/news/reaching-out-to-the-children-of-betesda-orphanage
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.963748
1,092
1.601563
2
Most of us do not wash our hands enough. It's gross but it probably won't kill you. For children under five, it's a different story. Over half a million kids die every year from diarrhea - largely preventable by simply washing hands with soap. HappyTap, a social business in Vietnam, designed the LaBobo - a playful sink that inspires handwashing. It's working in homes. Now, we want to help schools. This project equips 100 schools in Vietnam with LaBobo sinks and a fun, kid-friendly curriculum. Diarrhea is the second leading cause of death among children under five. It is responsible for half a million child deaths per year and irreversible developmental damage. This is a frustrating reality because handwashing with soap can cut the death rate in half. Governments and NGOs have focused on teaching people how to wash their hands. Today, families know how and when to wash their hands, but they're still not doing it. HappyTap saw the opportunity to turn this knowledge into practice. Designed with Vietnamese mothers, the LaBobo makes handwashing with soap easy for rural families without indoor plumbing. It is also toy-like so kids find it fun and love using it. An easy and fun task has a much better chance of becoming a habit. In rural schools, LaBobos have proven to be effective teaching aids and much needed sinks. We call LaBobo a behaviour change tool - much more than just a sink, designed to motivate children and adults to form lifelong habits. In the immediate future, this project serves 5,000+ students to make hygiene lessons come alive with practice and fun. As a social enterprise, HappyTap sells the Labobo to consumers to achieve the social goal of preventing disease and the business goal of sustainability. The HappyTap team partners with teachers and schools to encourage families to adopt the LaBobo and soap in the home, towards the critical long term impact of influencing a generational change in life-saving hygiene habits.
<urn:uuid:bd6eefd5-d727-482d-a496-3a5d0084faff>
CC-MAIN-2022-33
https://www.globalgiving.org/projects/handwashing-100-schools-in-vietnam/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.94406
451
2.8125
3
Teaching critical 21st century skills through experiential learning January 26, 2022 For two decades, digital technology has revolutionized classroom learning. According to the 2019 Gallup pre-pandemic study, Education Technology Use in Schools, 65% of teachers in the United States were using digital technology to teach every day and 53% had their students using digital tools to learn before COVID. When asked why educators were using digital technology in the classroom, learning the technology itself was not one of the top 15 reasons. In the current workforce, there are few ways to earn a living without being able to use some type of digital technology. With this becoming more increasingly evident, educators should focus on teaching digital technology not just to learn in the classroom but to prepare students for 21st century careers. Realistically, no matter what their career path, students will work in an environment super-saturated with rapidly evolving digital technology. Much of the technology they will work with every day has not even been imagined yet. Teaching digital skills means teaching students the ongoing reskilling processes that a lifetime of digital competence will require. In the classroom, digital technologies are at the service of learning content or completing work and educators teach digital aptitude as a set of concrete skills. In the real world that people work in, most digital skills are acquired through experience. Most digital skills are acquired on an ad hoc, need-to-know basis rather than planning and following a comprehensive curriculum. Learning digital skills experientially That same experiential approach can be used to simultaneously teach students current digital skills and how to learn new skills. To succeed, learning through experience requires three basic methods: - Exposure to a broad array of technologies across a multitude of contexts, - Experience with technology involving challenges, problem-solving, trial and error, and experimentation, and - Reflection and analysis on both what was learned and the processes used that can then be applied to future learning. As with all experiential learning, developing digital skills requires a broad exposure to digital tools across a wide variety of contexts and uses. The question goes beyond how well a digital resource can help teach content. It should include what digital skills are being learned or reinforced. There are all kinds of ways of introducing new digital tools to a classroom. Nearly everything a student does in a classroom can be done digitally. For example: - A language arts class for younger students may have an assignment in which students draw a character or situation. Rather than using conventional drawing tools, this could be done using a drawing program, allowing students to explore drawing or vector art tools. Many of these tools are part of the standard toolset of word processing, spreadsheet, photo editing, and presentation programs, but largely go unused and unappreciated. - A mathematics class at any level can have students use spreadsheet formulas to solve math problems. Formulas, one of the most commonly used tools in spreadsheets, can do anything from simple addition in first grade to trigonometry in the 12th year. - An elementary art class can use photo editing software to teach color and color relationships instead of crayons, pencils, or paints. Digital color tools allow students to play with and experiment not only with colors but with the digital tools themselves, comprehending through play the complexities and wonders of light and color. Higher-level courses in math or computer science could use these very same color tools to teach the base 16 number system on which digital color and many other types of digital information are based. No matter what the course, it always helps to outline what digital skills the assignment or project is meant to develop and what work will contribute to the mastery of the process of learning digital skills. Concrete skills such as using computers or applications are often taught in a comprehensive, step-by-step manner, leaving little room for problem-solving and experimentation. However, problem-solving and experimentation are fundamental to learning from experience. In this spirit, when assigning digital work, teachers should consider challenging students with the technology itself, just as they challenge the students with the assignment content or effort. Here are some examples: - Researching online is a standard component of digital assignments. At the beginning of an assignment, divide the class into two groups: Boolean search students and regular keyword search students. At the conclusion, compare search results. Not only do students learn a powerful tool for searching databases, but they also get a chance to experiment using keywords and search operators to improve the quality and accuracy of their search results. - Design assignments to spotlight underutilized resources in common digital tools, such as pivot tables in spreadsheets, drawing tools in word processors, or animation tools in presentation software. Underutilized digital resources always reward the students willing to play, experiment, and invent. The point is not to teach new technologies or functionalities as it is for students to learn how to explore and experiment with technologies both familiar and strange. Reflection and analysis As with most lessons, students need an opportunity to think about, analyze, share, and write down what they have learned. Many teachers hand out reflection questions and have students write out their answers and submit them digitally or written on paper. Others use social media or collaboration software so that students interact with each other when reflecting on the experience. No matter what format you use, reflection and analysis should answer three questions: - What did I learn? - How did I learn it? - What would I do differently the next time? Just as there is no age limit for experiential learning or for reflection on the experience. The youngest and oldest learners alike all benefit. Digital classroom management Among the critical elements of experiential learning is the role of a facilitator to guide student experience and intervene. In facilitating digital work, educators can leverage a broad range of robust digital classroom management tools to maximize experiential learning. Look for functionalities that allow teachers to view student screens at both a thumbnail and full-screen view. LanSchool features such as Share Screen or Push Website will allow a facilitator to share their screen or direct students to a Web resource to demonstrate critical steps in using a digital tool. Finally, a chat function allows teachers to help one or more students who are stuck or struggling with a digital tool. While experience is a great teacher, learning from experience is a skill that needs to be taught. Teaching students how to learn digital skills through experience unlocks their potential to develop digital skills. The elements are simple: expose students to a broad array of digital tools in many contexts, challenge them to master those tools through problem-solving and experimentation, guide them through that experience, and help them transform that experience through reflection. This process will help build a foundation for the challenges of a yet-unknown technological future. To learn more about how LanSchool Air can help teachers facilitate digital work, request a no-obligation free trial. Get in Touch Contact us today to learn more about LanSchool licenses, features, and benefits. Try LanSchool for Free Ready to see how LanSchool can transform your school or district?
<urn:uuid:10a1b369-2e1b-4ee8-b5d3-b15ebe1cb586>
CC-MAIN-2022-33
https://lanschool.com/blog/education-insights/teaching-critical-21st-century-skills-through-experiential-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
en
0.941562
1,462
3.78125
4
Who's Behind Listverse? Jamie founded Listverse due to an insatiable desire to share fascinating, obscure, and bizarre facts. He has been a guest speaker on numerous national radio and television stations and is a five time published author.More About Us 10 Facts On The History Of Breastfeeding And Baby Food Today, a mother can go to the local shop and buy a bottle of baby food or a tub of formula or breastfeed her child herself if possible. Historically, however, a parent’s only two options for feeding a baby were to breastfeed or employ a wet nurse. Often, it was society that would make up parents’ minds for them, as beliefs on how best to feed babies changed many times over thousands of years. Advertising was a major factor, and the safety of a given food choice was paramount. Here is an overview of what people decided to feed their children over the last several thousand years. 10 Wet Nursing The use of a wet nurse was common before feeding with formula or bottles was introduced. It began as early as 2000 BC and continued up until the 20th century. Throughout this period, whether a mother decided to use a wet nurse or not was determined by either need or choice—some mothers had no alternative, as they couldn’t produce milk themselves. Wet nursing was a profession that involved contracts and legalities to regulate the practice. The introduction of the feeding bottle in the 19th century as an alternative helped to do away with the practice of wet nursing. In Israel around 2000 BC, children and breastfeeding were considered a blessing, and the act was even viewed as a religious ceremony. In the Papyrus Ebers, an ancient Egyptian medical papyrus, advice for failed lactation in mothers included “warming the bones of a sword fish in oil” and rubbing it on the back of the mother. Alternatively, she may sit with crossed legs eating bread “soused in durra” (a kind of millet) while rubbing her breasts with the poppy plant. 9 Classical Antiquity Women of higher status demanded wet nurses with great frequency in Greece around 950 BC, and after a time, the wet nurses held positions of higher accountability and even had some authority over the household slaves. The Bible refers to a few examples of wet nurses, probably the most famous being the nurse who was hired by the pharaoh’s daughter to breastfeed Moses, who was found in the bulrushes. In the Roman Empire from 300 BC to AD 400, contracts were written up for wet nurses to care for abandoned children, usually girls, who were purchased as future slaves by the wealthy. The wet nurses, also slaves, would feed the infants until they were three. 8 The Middle Ages In the Middle Ages, advice on how to be a wet nurse came from a 13th-century Franciscan friar named Bartholomeus Anglicus. He recommended that the nurse behave like a mother: “She picks him up when he falls, gives the little one milk when he cries . . . washes and cleans the little one when he makes a mess of himself.” Thank goodness for the advice of Franciscan friars. In the Middle Ages, childhood was once again seen as a fragile and special time, and breast milk was thought to hold almost magical qualities. Once again, mothers were encouraged to feed their own babies breast milk as part of their saintly duty, as it was supposed that breast milk could pass on psychological and physical characteristics to the child. In the Renaissance, this attitude to mothers nursing their own children continued, as they feared infants might prefer the wet nurse to the mother. 7 No Redheads In 1612, French surgeon and obstetrician Jacques Guillemeau stated in The Nursing Of Children that wet nurses with red hair should not be used because their breast milk could pass on their fiery temperaments. Nurses should instead be “mild, gentle, courteous, patient, sober, chast, not quarrelsome; not chollericke, neither proud or covetous, nor a blabber.” 6 The Later Years From the 17th to the 19th centuries, wet nursing continued, being favored by the wealthy, who considered breastfeeding their own children unfashionable and feared it would ruin their figures. The clothing of the time prevented breastfeeding and made life harder for those who wanted to continue with socially acceptable pastimes, such as card-playing and attending the theater. Even those in lower classes, such as the wives of doctors, lawyers, and merchants, employed wet nurses, as it was cheaper to do so than to hire someone to run their husband’s business or to run the household in their place. In the Industrial Revolution that followed, many families moved from rural to urban areas, where peasant wet nurses were commonly employed. William Buchan’s Domestic Medicine (1779) displays a clear mistrust for wet nurses who appeared to favor home remedies, especially their use of opiates like Godfrey’s Cordial to give to the baby to induce “quietness.” 5 Early Bottles In the 19th century, wet nursing began to die out as a profession as animal milk and preferences for bottle-feeding gained momentum. The use of bottles for feeding was popular in ancient times, it should be noted, and vessels have been discovered that are thousands of years old. Grecian terra-cotta feeders from 450 BC were used to feed children a mixture of wine and honey. Many of the containers found were tested and showed traces of milk products, so archaeologists concluded that animal milk or other substitutes were used as far back as the Stone Age. Problems developing around cleaning the bottles are listed in literature from Roman times, the Middle Ages, and the Renaissance. The Industrial Revolution paved the way for bottles to become hygienic and safe for baby-feeding. 4 Bubby Pots And Pap Boats Before the modern style of baby bottles was designed, there were many alternatives to chose from. Some were made of ceramics or wood, but the most popular type of feeding device was made from a cow’s horn, perforated to allow the milk to flow through. In the 1700s, pewter and silver were favored, with the most popular being a device called the bubby pot (left above), invented by a physician from London named Hugh Smith. Unfortunately, the spout was nearly impossible to clean and often led to infection and mortality. Pap boats (right above) were just as dangerous, filled with pap, which was bread soaked in water or milk, or panada, which were cereals in broth. Sickly, malnourished babies were given this strengthening food, but as the vessels were so hard to clean that nearly a third of the children died in their first year. 3 19th-Century Bottles Glass bottles were introduced for feeding in the mid-19th century, and some were very elaborate, blown into cones or gourd shapes, replacing the porcelain that had come before. Many of the new and elaborate designs were subsequently called “murder bottles,” as they became a kind of Petrie dish for bacteria to grow since cleaning the rubber tubes and pipes was very difficult. In one case, an artificial breast was invented that could be filled with milk and worn by the mother all day and night to keep it warm for her child. In 1863, an inventor named Matthew Tomlinson designed a “coloured glass pear-shaped bottle called The Cottage,” which he sold for a shilling and thought was very well adapted to a working man’s household. 2 Early Formulas In today’s culture, breastfeeding is considered the best source of nutrition for infants, but when formulas were introduced, they did not have current standards of research practices and often fell short of adequate nutrition. Advertising grew public interest toward alternative milk sources, and throughout the 19th century, animal milk was preferred and added to pap and panada when the baby was sickly. Comparisons between animal and human milk were studied in the 18th century according to what animal was available to a community, such as horses, pigs, camels, donkeys, sheep, and goats. Cow’s milk was preferred overall. In 1865, a “perfect” infant milk composite was designed to mimic the content of human milk. Called Liebig’s formula, it consisted of cow’s milk, malt, and wheat flour, with potassium carbonate. 1 Improvements And Increased Safety By the end of 1883, 27 patented varieties of formula had become available following Liebig’s brand, but many were not nutritionally adequate, although sugar was added to increase caloric intake. Over time, knowledge regarding vitamin fortification allowed for the formulas to be more effective. Formula was most popular during the summer, when milk would spoil, and infant mortality rose, alleviated only with the acceptance of germ theory between 1890 and 1910. Alexa is a writer and clog dancer living in Dublin, Ireland.
<urn:uuid:1ebdb86d-2d24-48fe-a031-5c5bbceba710>
CC-MAIN-2022-33
https://listverse.com/2019/03/01/10-facts-on-the-history-of-breastfeeding-and-baby-food/?utm_source=more&utm_medium=link&utm_campaign=direct
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.984647
1,911
3.328125
3
Creating circles of protection for men, women, and children to find refuge. Helping women and children out of trafficking into lives of dignity. Equipping at-risk men and women with the skills to gain economic freedom. Investing in lives by giving those at risk a “hand up” toward sustainability. Empowering people through knowledge to give them hope for a better future. Embodying true religion by caring for “the least of these.” Walking red-light districts to meet victims where they are and help them out of lives of darkness. Promoting healthy bodies and minds as integral aspects of healing and prevention. Acting on short notice when there is an immediate need.
<urn:uuid:8c7dbd80-66e7-4b8b-8089-e107e22670fa>
CC-MAIN-2022-33
https://warinternational.org/donate/?designation=war-chest-relief-fund
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.926992
190
1.5625
2
Top best answers to the question «Can tuberculosis be cured with antibiotics» With the proper treatment, tuberculosis (TB, for short) is almost always curable. Doctors prescribe antibiotics to kill the bacteria that cause it. You'll need to take them for 6 to 9 months. What medications you take and how long you'll have to take them depends on which works to eradicate your TB. Treatment for tuberculosis (TB) usually involves taking antibiotics for several months. While TB is a serious condition that can be fatal if left untreated, deaths are rare if treatment is completed. Most people do not need to be admitted to hospital during treatment. 4 other answers Yes, you can cure tuberculosis with antibiotics(only which can be used for TB treatment such as Isoniazid, Rifampin, etc…), and the shortest duration of treatment (TB) is for 5 to 6 months depending upon the severity. Tuberculosis is a bacterial infection that can be cured with antibiotics. Tuberculosis ( TB ) infection is caused by a bacteria called Mycobacterium tuberculosis . It mostly affects your lungs but it can also affect other parts of the body including the lymph glands, brain, kidneys, bowels or bones. For active tuberculosis, you must take antibiotics for at least six to nine months. The exact drugs and length of treatment depend on your age, overall health, possible drug resistance and where the infection is in your body. If you With treatment, TB can almost always be cured. A course of antibiotics will usually need to be taken for 6 months. Several different antibiotics are used because some forms of TB are resistant to certain antibiotics. If you're infected with a drug-resistant form of TB, treatment with 6 or more different medications may be needed.
<urn:uuid:677a68a4-4ba5-4be2-8ad3-54b9e7f984c7>
CC-MAIN-2022-33
https://www.doctorwhoblog.com/can-tuberculosis-be-cured-with-antibiotics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.941967
363
2.734375
3
According to a new study from Acre, most businesses these days are protecting themselves with cyber security to mitigate risks posed by international internet criminals, but the findings show that a staggering 70% of EMEA organisations have little to no risk strategies set in place to prevent insider data leaks. Here, Acre looks at today’s cyber security landscape and highlights the importance of internal cyber security training as a key part of a business cyber security strategy. The people out in cyberspace that invade your privacy are usually the ones we prepare to protect ourselves from. Still, what if those people weren’t the only threats we need to be wary of? According to a recent report from Forrester, this is the case more often than we think. Insider threats at security firms caused 59% of data security incidents over the last year, typically consisting of accounts being misused by internal employees or business associates, resulting in data leaks that would-be online criminals are looking to take advantage of. Suppose insider risk is such a prominent issue in the cybersecurity industry. Why are companies failing to take action against this problem? According to Forrester, around 39% of organisations experiencing trouble with insider data leaks cited a lack of budget, and 38% cited a lack of internal expertise as the reason behind insider risks in their organisations. In addition to this, 29% claimed that they do not see employees of the company as a significant threat to their company’s data, making it a bit easier to speculate why the number of organisations without a risk strategy is as high. So it seems then, that some organisations aren’t taking the risk of insider data leaks as seriously as they probably should, but what can we do to fix this? According to a report from Forrester, 65% of respondents cited staff training as a solution, 50% cited manual monitoring of employee activity, and 47% cited improved encryption as a potential tactic to quell insider risk. Acre stresses the importance of education in the cybersecurity industry, not only for customers looking to protect themselves online but also for employees in the industry. By adequately educating employees and training them to manage accounts accordingly, we can all try to ensure that we remain among the cybersecurity firms with insider risk strategies that exceed expectations. The idea of physical and cyber security convergence is not new and has been a discussion amongst industry leaders for many years. It’s been proven that organisations with combined physical and cyber security operations are better prepared and more robust, enabling them to easily define risks, prevent, mitigate, and respond to threats plaguing the organisation. Convergence also allows data sharing and unified growth of security best practices across security departments. Cyber security needs to be at the forefront to stop attacks like phishing or false authentication, and mitigate threats. Upwards of 90% of cyber security incidents are not as a result of IT infrastructure weaknesses, such as weak firewall policies, but actually as a result of a lack of employee cyber security awareness, resulting in people making ill-informed decisions in their day to day activities, and ultimately facilitating a security incident. Best practices in an organisation include encouraging employees to view cyber security as a necessity for themselves and the organisation. Suppose the heads of the organisation care deeply about these policies. In that case, it will lead to a better overall organisational culture, and utilising cyber security solutions while promoting best practices will become the norm across the organisation. Acre suggests that individuals simply assigning or attempting to create passwords with letters, numbers, or characters is no longer a sustainable security option for most devices. Those seeking harm will try to crack passwords with highly sophisticated programmes and have been known to use all types of brute-force attacks to get what they want. Multifactor authentication is vital in this day and age, and its importance is not spoken about enough. Even if it can cause a bit of a setback, the amount of security it provides is well worth the minor inconvenience of two or three logins.
<urn:uuid:631a2651-8696-401d-a35d-80bc898ba14b>
CC-MAIN-2022-33
https://securityupdate.in/cyber-security-begins-inside-the-business-boundaries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
en
0.956699
810
2.078125
2
The Business Collateral Act B.E. 2558 (2015) (BCA) was passed into law on November 5, 2015. The majority of its provisions will come into effect on July 1, 2016, 240 days after publication in the Royal Thai Government Gazette. The BCA aims to establish a robust legal system that allows borrowers in Thailand to use their assets as collateral to secure their loans. This system provides Thai borrowers with greater access to credit, which should promote investment in domestic ventures. The key points under the BCA are the following: Prior to the enactment of the BCA, borrowers could not retain possession of movable assets pledged as collateral for the duration of the security period. Out-of-court enforcement options were also limited. The BCA removes these prohibitions and therefore provides borrowers with greater access to credit. These significant developments should improve Thailand’s system of secured transactions and increase investment in domestic ventures. If you have any questions about the Business Collateral Act or other corporate and commercial matters in Thailand, please contact Cynthia M. Pornavalai at [email protected] or +66 2653 5559.
<urn:uuid:3683db83-81af-4ed2-9f52-323cbc9b5362>
CC-MAIN-2022-33
https://www.tilleke.com/ja/print-insight/?post_id=36617&print=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.942266
231
1.570313
2
Take a look at the beta version of dw.com. We're not done yet! Your opinion can help us make it better. Militias in Libya's west say they are determined to stop a bid by military strongman Khalifa Haftar to seize the capital. The escalation of tensions has raised prospects of renewed civil war in the country. Militias from the western Libyan cities of Zawiya and Misrata said on Friday that they would resist an advance on the capital by rival army commander Khalifa Haftar, with reports that his forces had been pushed back from a key checkpoint near the city. The push toward Tripoli by Haftar, who leads the self-styled Libyan National Army, comes amid growing fears of a renewed civil conflict in Libya. The country has been bitterly divided since rebels and a Western military intervention ousted and killed longtime dictator Moammar Gadhafi in 2011. What is happening in Libya? Read more: Khalifa Haftar: Libya's military strongman Russia denies involvement Kremlin spokesman Dmitry Peskov said on Friday that Moscow supported a negotiated political resolution to the situation in Libya. "Of course, we consider that the most important thing is that operations there do not lead to bloodshed. The situation should be resolved peacefully," he said, while also saying that the Russian government was not backing pro-Haftar forces during their advance. Ahead of a planned meeting with Haftar, UN Secretary-General Guterres also said on Twitter that there was "no military solution for the Libyan crisis, only a political one." A torn country: Libya has been without a stable government since the NATO-backed uprising toppled Gadhafi in 2011. Since then, dozens of militias have fought for control of the oil-rich country. Although a Tripoli-based interim government, the Government of National Accord, was set up with UN backing in 2015, it has been unable to enforce its authority in the entire country. Haftar's so-called Libyan National Army backs a parallel administration in the east that has emerged as a major rival to that in Tripoli. Read more: Libya: The road from revolution to civil war What happens next: The UN reconciliation conference is to convene in the Libyan desert town of Ghadames from April 14-16 and is aimed at outlining a plan for achieving peace in the country, including setting a date for holding long-delayed elections. tj/jil (AP, AFP)
<urn:uuid:8521dd8e-d87e-4f3b-9227-492503e0e2a5>
CC-MAIN-2022-33
https://www.dw.com/en/libyan-militias-resist-advance-of-pro-haftar-forces-on-tripoli/a-48216699
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.966743
513
1.601563
2
Move the Money Op-Ed in Milwaukee Journal-Sentinel Great job by Peace Action Wisconsin Program Director Mike Helbick, who got help on this from our friends at the Coalition for Human Needs. This year alone, Milwaukee taxpayers will contribute $695 million to the U.S. Department of Defense. That would be enough to provide Milwaukee with 10,700 elementary school teachers, 10,500 police officers or medical care for 96,400 veterans. Instead, Milwaukee’s hard-earned tax dollars are paying for foreign military interventions and ineffective weapons systems at a time when Milwaukee desperately needs these funds here at home. The implications of this budget choice are even worse when you consider that money spent on domestic priorities such as education, health care, housing and clean energy creates more jobs than military spending. For example, when Congress spends $1 billion on the military, it creates 11,200 jobs, but when it spends the same amount on education, it creates 26,700 jobs. So it’s easy to see why last September, Milwaukee’s Common Council unanimously adopted a “Move the Money” resolution calling for the United States to redirect federal spending from foreign military interventions to investing in programs to address critical domestic and urban needs. What’s difficult to understand is how last week Congress could make life even harder for Milwaukee residents. On March 1, Congress allowed indiscriminate across-the-board cuts to go into effect. These cuts are harming thousands of Wisconsin residents. We may not see the results yet, but we will soon. Because of the cuts, people in our state will go without food, lose jobs and income and get pushed toward homelessness. The cuts are dangerous. They are also unnecessary. And they come on top of $1.9 trillion in spending cuts and interest savings that have already happened. Wisconsin has lost 8.3% of its federal funds since 2010. We can’t afford to lose more. The U.S. Senate considered, but failed to pass, legislation to replace these cuts in February. The Democratic leadership offered a proposal that would prevent cuts to education, public health, nutrition and other vital services by replacing them with more gradual cuts to the Pentagon, ending some farm subsidies, setting a minimum tax for millionaires and closing other tax loopholes. This is a balanced, sensible approach to reducing the deficit that will protect Wisconsin’s economy and residents. It is supported by most Americans. Sen. Tammy Baldwin (D-Wis.) voted for this pragmatic approach, but Sen. Ron Johnson (R-Wis.) did not. While the March 1 cuts affect a broad range of services touching the lives of most Americans, many reductions will hit low-income people particularly hard. For example, according to a new report by the Coalition on Human Needs, 8,100 low-income young children and mothers in Wisconsin will lose access to nutritious food. An estimated 1,377 low-income families will lose rental housing vouchers – for most, that probably means they will lose their homes. Nationally, nearly 5 million people have been out of work at least six months, but unemployment benefits for the long-term unemployed will be cut 9.4%. In Wisconsin, 900 children will lose their place in Head Start and 500 will lose the help they need to pay for quality child care. These cuts will slash education, meals for low-income seniors, mental health treatment, environmental cleanup, food safety protections and much more. The cuts also will harm our fragile economy, eliminating 700,000 jobs nationwide just when the economy is finally beginning to recover. Milwaukee will be hit even harder than the rest of Wisconsin. Because nearly one out of three Milwaukee residents lives below the poverty line ($23,550 for a family of four), Milwaukee has more residents in need of help with basic needs such as nutrition and housing, and less local funds to help meet their needs. Pushing more families and seniors into poverty and reducing our investment in education even further is simply not necessary. Instead of this self-inflicted wound, we should reduce bloated, wasteful Pentagon spending and move the money we save to job creation, education, health care and other priorities. We should ask millionaires and top corporations to pay more of their share. A 5.6% surtax on income over $1 million could raise more than $450 billion over 10 years, which would replace most of the next decade’s domestic cuts. Options to tax offshore profits of corporations would raise hundreds of billions more. When the Common Council passed the “Move the Money” resolution, it called for our nation to change its priorities and put domestic challenges first. Congress needs to give the balanced approach a second chance, in order to prevent real harm to Wisconsin’s people and economy. Mike Helbick is program director with Peace Action-Wisconsin. Email email@example.com
<urn:uuid:37376af1-c9c9-404c-b99b-9552b61ffac3>
CC-MAIN-2022-33
https://www.peaceaction.org/2013/03/07/move-the-money-op-ed-in-milwaukee-journal-sentinel/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.94275
1,000
1.585938
2
Time to meet the erector spinae muscle group If there are any muscles that are truly “back muscles”, it is the erector spinae muscles! This thick dense group of muscles runs the entire length of the spine. Surprisingly, this muscle groups is often overlooked when someone has back pain. Often, they are overlooked in favor of more popular muscles such as psoas, gluteals, or the abdominals. There is a lot to learn about this group of muscles. What does the name of the erector spinae muscles mean? The name, erector spinae, refers to the function of these muscles. They are a powerful group of muscles. And, their job is an important one, to keep the spine erect, or upright. So, the word erector then refers to erect, or upright. And, the word spinae refers to the spine. The erector spinae muscles are really three muscles: spinalis, longissimus, and iliocostalis. To get more specific, anatomists subdivide each of these three muscles into smaller muscles based on the region of the spine they are in. Spinalis comes from the Latin word spina which means “thorn”. It refers to the bumpy projections that you can feel along the length of the spine, the spinous processes. Longissimus is the Latin word for “longest”. The word iliocostalis comes from the Latin words ilium, which refers to the large pelvic bone, and costa which means “rib”. Where do the erector spinae muscles attach? Spinalis is the most medial of the erector spinae muscles. It can be further subdivided into three sections, the spinalis thoracis, spinalis cervicis, and spinalis capitis. The longissimus is the middle muscle of the erector spinae group. It can be further subdivided into three muscles: the longissimus thoracis, longissimus cervicis, and longissimus capitis muscles. Iliocostalis is the most lateral of the muscles in the erector spinae group. It can be further subdivided into two smaller muscles, the iliocostalis lumborum and iliocostalis cervicis. Spinalis thoracis originates on the spinous processes from about T10 – L3. However, you’ll find that spinalis cervicis originates on the lower part of the nuchal ligament and spinous processes of C6 or 7. Longissimus thoracis originates on the sacrum and the spinous and transverse processes of all lumbar and thoracic vertebrae. But, longissimus cervicis originates on the transverse processes of T1 – T5 and longissimus capitis originates on the transverse processes of of T1 – T5 and the articular processes of C5 – C7. The three iliocostalis muscle sections vary in their origins as well. Iliocostalis lumborum originates on the medial aspect of the iliac crest, the sacrum, and spinous processes of the lumbar vertebrae. But, iliocostalis thoracis originates on the superior border of the lower 6 ribs, just medial to the iliocostalis lumborum. Finally, iliocostalis cervicis originates on the angle of the ribs 3 – 6. Spinalis thoracis inserts on the spinous processes from about T2 – T8, however, spinalis cervicis inserts on the spinous processes of C2 and sometimes C3 and C4. Longissimus thoracis inserts on the transverse processes of all the thoracic vertebrae. But, longissimus cervicis inserts on the transverse processes of C2 – C6 and longissimus capitis inserts on the posterior part of the mastoid process. You’ll find that iliocostalis lumborum inserts on the inferior borders of the lower 6 or 7 ribs. However, iliocostalis thoracis inserts on the superior border of the upper 6 ribs and the transverse process of C7. Finally, iliocostalis cervicis inserts on the transverse processes of C4 – C6. What actions do the erector spinae muscles do? Spinalis thoracis and spinalis cervicis function bilaterally to extend their sections of the spine. The three longissimus muscles all function bilaterally to extend their portions of the spine and/or head. Additionally, longissimus thoracis and longissimus cervicis laterally flex the spine to the same side. Longissimus capitis can rotate the head to the same side. The three iliocostalis muscles all function bilaterally to extend the spine. Unilaterally they function to laterally flex the spine to the same side.
<urn:uuid:7f904674-6ab7-4688-bff2-27d4ebe56a4f>
CC-MAIN-2022-33
https://www.yoganatomy.com/erector-spinae-muscles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.841173
1,068
3.125
3
So, you are a complete fitness-freak, who doesn’t miss her workout even for a single day. Well, you are actually ‘harming’ yourself. Surprised? Well, whether you are a beginner in the fitness world or have enough experience about exercising, you should try relaxing at least for one whole day by taking a break from your workout. Otherwise, your body won’t get its recovery time and will stop cooperating with you. Why Should You Take One Whole Day Break From Workout? Let us dig deeper and find out why everyone should enjoy a ‘rest day’ by skipping exercise: 1. To Maintain Physical Health: - Repair, Growth and Strengthening of Muscles: Exercising actually means breaking down the muscles. You probably don’t know that your muscle fibers develop tiny wear and tear during workouts. When you take rest for a whole day, the process of muscle building starts. This stimulation allows your muscle fibers to recuperate, grow and get stronger for the subsequent workout sessions. - Restoration of Glycogen (Glycogenesis): Your body stores glucose (a certain type of carbohydrate) as glycogen in your liver and your muscle fibers. This stored glycogen is broken down (glycogenolysis) and used up during workout as the primary source of energy. It is crucial to let your body replenish this source of carbohydrate by relaxing an entire day instead of consuming lots of carb-rich foods. It will help immensely in the restoration of glycogen (glycogenesis). - Prevention of Injury: If you do not relax at least one day in a week, you will end up overtraining yourself. It will put excessive stress on your body and weaken your immune system, increasing the risks of developing severe injuries and that too quite frequently. - Upholding Joint Health: While rest of your body manages to survive the injuries caused by over exercising, the bone joints, including the tendons and ligaments, find it extremely difficult to deal with the trauma as they do not have enough ‘padding’. If you do not give yourself breaks, the joints will not get the time to recover, which may lead to aching and swelling. - Cure of Amenorrhea: Excessive working out can cause a huge drop in the amount of estrogen present in the body, which results into abnormal menses and sometimes even no period at all. This condition is extremely bad for your body and you can also lead to infertility. - Treating Insomnia: Troubled sleeping is another common reason to take a break from your workout. Remember, exercising eats up your energy to a great extent. And if you do not give yourself enough time to recover, you will become exhausted gradually. It will take a toll on your lifestyle as you will remain tired the whole day, but still can’t have a good night’s sleep. - Reduction of Soreness: Incessant working out can make your whole body hurt. You can understand it easily as there are certain signals for it, such as body soreness, especially in the neck and waist; heavy limbs (arms and legs); comparatively higher heart rates during resting time; etc. If you are suffering from these for the last few days, it is definitely time to take a break. 2. To Maintain Emotional Health: Apart from the aforementioned physical issues, there are certain mental or emotional factors that you need to consider when it comes to relaxing one whole day without workout. Take a look: - Over exercising may make you feel mentally drained out. As your health gets affected day by day, you start feeling lack of energy to do work. - You may find yourself extremely de-motivated. It has been seen that exercising without taking proper breaks influences the performances as well as the outcomes, which can gradually lead to disinterest and frustration. - It will cause irritability and restlessness in you. Your stress level and anxiety will go up significantly. You will also experience difficulty in concentration as well as frequent mood swings. - As you reach the state of burnout through overtraining, it becomes almost impossible for you to balance your health and work, which can mess with your life. Aren’t these factors providing enough reasons for you to give yourself a one-day break from scheduled workout and relax? How do you enjoy your rest day? Share with us and comment below.
<urn:uuid:dae35cb0-f1d4-4102-a112-ca18e239d836>
CC-MAIN-2022-33
https://timesqure.com/11-amazing-effects-of-one-day-relaxing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.95175
922
2.578125
3
The application of HACCP in the fish processing industry in Southeast Asia, 2000-2003: Indonesia MetadataShow full item record Consisting of a total of 17,500 islands with a coastal length of about 81,000 km, Indonesia has land areas of over 2 million square km and 5.8 million square km of marine waters. Of this, 3.1 million square km is classified as archipelago and territorial waters. The remaining 2.7 million square km is Indonesia’s Exclusive Economic Zone (IEEZ). About 775,000 sq. km of marine waters are coastal areas of less than 200 meters deep. With this vast area of inland, coastal and marine waters, fisheries have been playing an important role in the socio-economic life of Indonesia, in particular in coastal communities. The sector provides employment for more than 4.5 million fishermen/ fish farmers. Currently, while most sectors suffer from the current economic crisis, fisheries have demonstrated its ability to sustain contribution to national economy. In 2000, fisheries generated about US$ 1.675 billion from more than 500,000 metric tonnes total fish export and in 2002, US$ 1.7 billion from more than 600,000 metric tonnes. [Extract] Mangunsong, S. (2003). Indonesia. In S. E. Yeap & I. Hariono (Eds.), The Application of HACCP in the Fish Processing Industry in Southeast Asia 2000-2003 (pp. 14-25). Singapore: Marine Fisheries Research Department, Southeast Asian Fisheries Development Center. Showing items related by title, author, creator and subject. Proceedings of the Twentieth Anniversary Seminar on Development of Fish Products in Southeast Asia, Singapore, 27 - 31 October, 1987 Southeast Asian Fisheries Development Center, Marine Fisheries Research Department (Marine Fisheries Research Department, Southeast Asian Fisheries Development Center, 1988)Abstracts of the various country reports, resource papers and case histories presented at the Seminar are cited individually. Technical Compilation of Heavy Metals, Pesticide Residues, Histamine and Drug Residues in Fish and Fish Products in Southeast Asia 2004-2008 Southeast Asian Fisheries Development Center, Marine Fisheries Research Department (Marine Fisheries Research Department, Southeast Asian Fisheries Development Center, 2008)The technical compilation contains the findings of the survey on the heavy metals, pesticide residues, histamine and drug residues in fishes and fish products in Southeast Asia. The project aims to obtain an understanding ...
<urn:uuid:d6787815-3651-4c4d-8ac1-3056cd8a186c>
CC-MAIN-2022-33
https://repository.seafdec.org/handle/20.500.12066/4736?locale-attribute=en
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.830551
534
2.46875
2
The number of people who lost their lives rose to five, after strong earthquake that shook southern Iran in the early hours of Saturday morning, with the country’s media reporting that there are also 20 injured. “Five people were killed due to the earthquake (…) and so far 12 have been admitted to hospitals”Merdad Hassanzadeh, the head of the emergency response agency in the Gulf-lined province of Khormuzgan, told Iranian state television. “Rescue efforts have been completed and we are now distributing tents for temporary shelter” the earthquake victims, he added. According to Iran’s state news agency IRNA, two earthquakes of magnitude 6.1 and 6.3 were recorded after the first, of magnitude 6.1, leveled the village of Sayeh Khosnear the Iranian coast in the Gulf. Earlier, the Euro-Mediterranean Seismological Center (EMSC) estimated the initial quake to be a magnitude 6.0 and that it occurred at a small focal depth of only 10 kilometers. For its part, the US Seismological Institute (USGS) he spoke of a 6.2 magnitude earthquake centered on an area about 100 km southwest of the port of Bandar Abbas. “All the victims were killed in the first earthquake, nobody suffered anything in the next two big ones because people had already left their houses”Fouad Murandzadeh, head of local authorities in the Bandar Lenge district, told IRNA. The Iran, located in an area where tectonic plates intersect, has experienced several devastating earthquakes. In 2003, a magnitude 6.6 earthquake in Kerman province killed an estimated 31,000 people and leveled the ancient city of Bam. The deadliest earthquake in Iran’s history occurred in 1990, with a magnitude of 7.4 and claimed the lives of 40,000 people in the northern part of the country. Source: News Beast
<urn:uuid:19994a0f-243b-4a77-8b33-7c134fa7d17e>
CC-MAIN-2022-33
https://www.worldstockmarket.net/at-least-five-dead-from-the-powerful-earthquake-in-iran/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.962361
403
2.03125
2
Changing Career Patterns. ERIC Digest. by Brown, Bettina Lankard Choi Joon Seo, a 31-year-old Korean who worked as regional marketing manager for Nike in Hong Kong, resigned his job so he could pursue his dream of building his own sports marketing company. (Jung et al. 2000) Heidi Miller of Citigroup and Mary Cirillo of Deutsche Bank, two of the most senior women in U.S. banking, resigned their jobs to look for new career challenges in e-commerce. (Currie 2000) Alan Goldstein, in response to his growing interest in computer technology, resigned from his career as trauma surgeon at Kings County Hospital in New York, and, at age 49, formed his own software company. (Mottl 1999) Glenn Gainley, after working his way to vice president in charge of business units at Symbios, Inc., quit his job at age 40 and returned to school to pursue a teaching career. (Black 1999) These examples of career changes reflect a common trend--increased job mobility. The linear career path that once kept people working in the same job, often for the same company, is not the standard career route for today's workers. Today, many workers are pursuing varied career paths that reflect sequential career changes. This set of ongoing changes in career plans, direction, and employers portrays the lifetime progression of work as a composite of experiences. This Digest explores how changing technologies and global competitiveness have led to redefinition of interests, abilities, and work options that influence career development. INFLUENCES ON CAREER MOBILITY Job mobility no longer carries the stigma once associated with job change, although it can be emotionally stressful. Corporate upheavals of the early 1990s and low unemployment rates during the last part of the decade have caused changes in job search and hiring practices. Companies, especially those in technology fields that are in dire need of qualified, skilled, and experienced employees, are driven to recruit workers away from their current employers. Workers, who see job mobility as a way to find work that is appealing, challenging, and offers growth potential, are viewing career change as a way to progress through the uncertainties of the workplace. Job mobility is most prevalent among individuals who are first entering the labor market. According to data from the National Longitudinal Survey of Youth, high job mobility characterizes the initial decade of a person's work experience (Keith and McWilliams 1999). Neal (1999) reports that "men make two-thirds of their lifetime job changes during their first 10 years of work experience" (p. 255). Most of this mobility is the result of job-to-job transitions rather than unemployment and reflects the worker's desire to find a good career match, often through lateral movement within the company. As first-time workers are quick to discover, the reality of a job doesn't always reflect a worker's expectations regarding salary, responsibilities, and potential for professional development. This may be one reason that approximately 33 percent of the college graduates who elect to pursue a teaching career leave the profession within the first 5 years (National School to Work The propensity toward job mobility is not unusual for workers of any age or experience in a society where new jobs and job roles are created regularly as a result of technological advances and global competitiveness. As global changes influence the way we live, they also have strong implications for how we work. Employment security is no longer tied to an organization, but rather to the individual's career management and resilience skills. "You must be prepared to live in an uncertain work world, where the only certainty is your skills, your flexibility, and your capacity to adapt to change. That requires optimism and belief in yourself" (Moses 1999, "Radical job changes are becoming a model for some (workers) and a strategy for those who are forced from their previous employment" (Sterrett 1999, p. 251). Sterrett defines radical job changes as "career changes that occur when leaving one field and moving to a job quite different from the previous job" (ibid.). Most successful transitions of this kind involve a two-stage process in which the worker first searches to find a suitable career match and then begins to look for a suitable employer. Although these transitions are typically associated with the early years of employment, radical job changes occur in midlife as well, as evidenced in the examples at the beginning of the Digest. Workers who know their strengths, interests, and values and are able to view themselves independently from their organizations experience the greatest success. Typically, these workers are positive, confident, forward looking, continually learning, and flexible. QUALITIES THAT ENHANCE MOBILITY Self-efficacy and a positive attitude toward job potential are characteristics of adults in a study conducted by Career Education Corporation of Hoffman Estates, Illinois. Results showed that "almost half of the working adults said they would consider changing careers and one in four said that they expect to make such a shift in the next 12 months" (Dolliver 1999, p. 40). Although money was given as the prime motive for change, personal happiness was close behind. Confident in his ability to build his own sports marketing company with a worldwide brand name, Choi Joon Seo left his job at Nike in Hong Kong and, with two partners, launched HooChoo, a Korean-language online magazine about Korean sports. Choi plans to use the website to develop HooChoo's brand name, which he hopes will lead to the development of a full-time sports marketing company. "Physically and emotionally, I am exhausted," said Choi, "but it feels so good that I am doing what I like" (Jung et al. 2000, p. 44). Foresight prompted Heidi Miller to direct her attention to e-commerce, where she sees potential for growth. Now working at priceline.com, Miller believes the company has excellent prospects for cross-selling products and services over the Internet, a potential she is not sure most insurance and banking conglomerates realize (Currie 2000). Alan Goldstein was an early user of a portable computer, which he used to write his fellowship papers and record his research data while in medical school. Soon Goldstein was the computer guru for the surgical unit at Kings County Hospital, where he later "oversaw a patient-registry database project and an instruction program for surgical residents" (Mottl 1999, p. 123). When a relative who owned a family business asked for his technical help with computers, Goldstein became so interested that he took two 3-month leaves of absence from his prestigious position as trauma surgeon and acting director of surgery to set up the family business's computer system. He enjoyed this work so much that he resigned from his medical position to seek a new job. Goldstein is now chief technology officer of Ultimate Software Group, Inc., a company that develops human resource management applications. Experience can be a predictor of successful career transition, as evidenced by Goldstein's success. His medical position gave him experience in developing team structures, assessing people and skills, and communicating with staff. His computer experiences provided him with new technological skills. In his own way, Goldstein was an active participant in lifelong learning, able to transfer his learning to a new environment. The ability to be flexible and readjust his goals to accommodate his values and personal interests made it possible for Glen Gainley to make his move from business to education. While working at the chipmaking firm, Symbios, Inc., Gainley became increasingly aware that his prime interest was in helping children and his community. Because he had set aside money for retirement and the college education of his three children, Gainley was financially and emotionally able to quit his job and return to school for a teaching certificate (Black 1999). He was willing to accept the entry-level salary that often accompanies a midcareer change and engage in teaching--a career that some workers leave because salaries don't meet their economic Kidd (1998) suggests that career counselors give attention to the roles of emotion in the career development. She reports that it is often the sequences of feelings and behaviors that one experiences in his/her work role that affect the next career transition in the path to career development. "Feelings of success spur action" (ibid., p. 280). Eric Watson, who worked for 21 years for a giant insurance company, had become vice president for global diversity. Having a great interest in the advantages of diversity, Watson attempted to bring a new view of diversity to his organization: "The new diversity is about differences of all kinds, even those that come from within a company itself" (Galagan and Salopek 2000, p. 52). As he broadened his thinking about diversity, Watson came to realize how diversity tools could help an organization deal with radical organizational change. Looking for an opportunity to embrace this challenge, Watson left the insurance company to become executive director of work force capability for an oil and natural gas business. Watson contends that he will have company leaders modeling the behaviors of a diverse company within 5 years. His commitment to diversity and experiences of success were strong motivations for his career move. Although changing careers may seem overwhelming to many, the examples presented in this Digest show that changes are possible--and probable. Employment will be increasingly characterized by sequences of decisions and work/role transitions. Similar sequences of behaviors, experiences, and judgments will influence ever-changing career patterns. For workers who seek continued and rewarding employment, career management skills will become increasingly important. Workers will need to be able to identify their strengths, goals, and skills; conduct ongoing assessments of their values and goals; monitor themselves and their job situation; and develop the interpersonal and negotiating skills needed to manage organizational career systems (Kidd 1998). Life changes and career changes often go hand in hand, offering the skilled and flexible worker opportunities to use these changes to personal advantage. Black, P. "Go to the Head of the Class." BUSINESS WEEK, no. 3650 (October 11, 1999): 174. Currie, A. "We Gotta Get Out of This Place." EUROMONEY no. 371 (March Dolliver, M. "Maybe It's Not Too Late to Become a Fireman." ADWEEK 40, no. 36 (September 6, 1999): 40. Galagan, P. A. and Salopek, J. J. "Thinking Differently about Differences." TRAINING AND DEVELOPMENT 54, no. 5 (May 2000): 52-54. Jung, S.; Dolven, B.; Dawson, C.; and Saywell, T. "Lured by the Net." FAR EASTERN ECONOMIC REVIEW 163, no. 19 (May 11, 2000): 44-46. Keith, K., and McWilliams, A. "The Returns to Mobility and Job Search by Gender." INDUSTRIAL AND LABOR RELATIONS REVIEW 52, no. 3 (April 1999): Kidd, J. M. "Emotion: An Absent Presence in Career Theory." JOURNAL OF VOCATIONAL BEHAVIOR 52 (1998): 275-288. Moses, B. "Career Intelligence: The 12 New Rules for Success." THE FUTURIST 33, no. 7 (August-September 1999): 28-35. Mottl, J. N. "Different Career Paths Lead to IT." INFORMATIONWEEK no. 763 (November 29, 1999): 123-126. National School to Work Office. SCHOOL TO WORK AND PROFESSIONAL DEVELOPMENT FOR TEACHERS. RESOURCE BULLETIN. Washington, DC: National School to Work Office, 1997. (ED 416 394) (http://www.stw.ed.gov/factsht/bul0306b.htm) Neal, D. "The Complexity of Job Mobility among Young Men." JOURNAL OF LABOR ECONOMICS 17, no. 2 (April 1999): 237-261. Steen, M. "A Career Change to IT from a Different Field? Difficult, But Not Impossible." INFOWORLD 21, no. 38 (September 20, 1999): 84. Sterrett, E. A. "A Comparison of Women's and Men's Career Transitions." JOURNAL OF CAREER DEVELOPMENT 25, no. 4 (Summer 1999): 249-259.
<urn:uuid:c789db4e-b352-405d-ba1a-83f0bda9c9bc>
CC-MAIN-2022-33
https://www.ericdigests.org/2001-2/career.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.948554
2,759
2.25
2
Ever since 2016, when the International Olympic Committee (IOC) decided to include climbing in the 2020 Olympics the format has been a hotly debated subject. The IOC is combining the three main forms of competitive climbing—speed, boulder, and sport—into one event and only offering one set of medals. I’ve covered the format before, interviewing chief executive officer of USA Climbing, Marc Norman for the specifics. Now that we’ve gotten the first round of Olympic qualifiers and the second round is rapidly approaching, I’ve put together a quick recap of that format, a list of the current qualified Olympians, and what we can expect to see in the next few months. The 2020 Olympic format requires every climber to compete in all three disciplines—this means climbers who specialize in just one are at a disadvantage (ex: Adam Ondra). Twenty men and twenty women will be in the event and each country gets a max of two spots per gender. All the athletes will go through one qualifying round, then the top six for each gender will move onto the finals. According to the International Federation of Sport Climbing’s (IFSC) website, the order will be speed first, then bouldering, and lead last for both rounds. Speed climbing is the most controversial of the three disciplines. The competitors basically do a 15-meter vertical sprint going head-to-head on a standardized wall. The winner of the pairing moves to the next round and the loser gets knocked out. In an article for Outside Online, professional climber Sasha DiGiulian wrote, “speed climbing has very little to do with more conventional rock climbing, beyond the fact that it involves a person vertically scaling a wall.” At the same time, speed climbing is fast paced and easier to follow for non-climbers. For the bouldering, both genders get three unique and challenging boulder problems (all four meters high) to attempt. Each climber has four minutes for each problem and will be scored on how high they get or how many tries it takes to complete. The lead climbing will happen on one route per gender over 15-meters high. Each climber will have six minutes to get as high as they can without falling. The Climbers Going to the Olympics So Far The first Olympic qualifying event (the Combined World Championship) happened this August in Hachioji, Japan where the seven highest-placed athletes of each gender earned invitations to the Olympics. After taking into account the two athletes per country per gender restriction (Japan had four athletes in each gender in the top seven), this is the list of athletes who have secured their place for the 2020 Olympics. Women’s Qualified Athletes - Janja Garnbret (SLO) - Akiyo Noguchi (JPN) - Shauna Coxsey (GBR) - Aleksandra Miroslaw (POL) - Miho Nonaka (JPN) - Petra Klingler (SUI) - Brooke Raboutou (USA) Men’s Qualified Athletes - Tomoa Narasaki (JPN) - Jakob Schubert (AUT) - Rishat Khaibullin (KAZ) - Kai Harada (JPN) - Mickael Mawem (FRA) - Alexander Megos (GER) - Ludovico Fossali (ITA) The next qualifying event is the IFSC Climbing Combined Qualifier in Tournefeuille-Toulouse, France from 28 November to 1 December 2019. For this event, the top twenty athletes from the world cup series will be invited to compete and the six highest-placing climbers will go to the Olympics. Five more spots will then go to the first-place winners from five continental championships held between February and May 2020. Finally, one spot per gender will be awarded through the tripartite commission—a group of committees decide on a nation to give an invitation to based on special circumstances. The last spot for both male and female go to the host nation (Japan). However, since Japan already has two qualifiers for both genders, that spot might go to the next qualifying competitor from the Combined World Championship. [I’m honestly not sure about this one] The 2024 Olympics In June 2019, the IOC unanimously voted to include climbing in the Paris 2024 summer Olympics. The provisional decision includes an additional set of medals per gender so speed climbing will be a separate event, while lead and bouldering will stay combined. The number of athletes will also increase from 40 to 72 total climbers. This arrangement is still unconfirmed and the final decision will be made in December 2020, after Tokyo 2020.
<urn:uuid:e83029dc-ad11-4684-a7aa-1b86bed0d441>
CC-MAIN-2022-33
https://www.aspiring.co.nz/author/jayflash0gmail-com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.939085
992
1.851563
2
About this artwork As an influential professor at the Royal Academy, Boucher taught life drawing. A savvy businessman, he realized the potential of producing etchings after his studies from life so that there might be instruction in provincial centers as well. This drawing—a dazzling demonstration of his technique of comingling red, black, and white chalks—was one of those reproduced. - Currently Off View - Prints and Drawings - François Boucher - Academic Study of a Reclining Male Nude - Black chalk, with stumping and touches of red chalk, heightened with white chalk, on cream laid paper, laid down on cream laid paper - Inscribed on an eighteenth century mount, verso, in pen and brown ink: "fragile / à Madame (Verger)/ à Dèves / fragile" - 356 × 448 mm - Regenstein Endowment Fund
<urn:uuid:2725b8e6-a7cb-4a9c-ab7d-1ad3b8182abd>
CC-MAIN-2022-33
https://nocache.www.artic.edu/artworks/196175/academic-study-of-a-reclining-male-nude
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.854152
281
2.546875
3
Don’t Blame Bats for COVID-19, Israeli Biologists Say (VIDEO REPORT) Researchers at Tel Aviv University’s Bat Lab attempt to rehabilitate winged creature’s much-maligned public image Since the start of the COVID-19 pandemic, the public image of bats has taken a massive hit. So far scientists have not been able to find any evidence linking bats to the virus, but the connection has proven to be nearly impossible to dispel. A recent study led by Maya Weinberg, a veterinary doctor and PhD candidate at the Bat Lab in Tel Aviv University’s I. Meier Segals Garden for Zoological Research, and Tel Aviv University postdoctoral researcher Dr. Kelsey Moreno, could have far-reaching implications for discovering the origins of COVID-19. For a full print report, see COVID-19 Not Connected to Bats, Israeli Biologists Say (with VIDEO).
<urn:uuid:c450085d-27b9-41b3-a5fc-4c1ca097750e>
CC-MAIN-2022-33
https://themedialine.org/life-lines/dont-blame-bats-for-covid-19-israeli-biologists-say-video-report/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.860366
196
2.6875
3
The world today is interconnected than ever before with the combination of digital devices and the software systems that make them operational. The future calls for further interactions through latest phenomena such as the internet of things (IOT). Hence, the need for skilled Software Engineers in a multitude of specializations is on the rise. Our students are trained to meet these multifaceted software engineering needs. They learn programming skills, analytical skills, database design and development, mobile and enterprise application development, gaming software development, computer security and professional practice to name a few areas. The degree programme from UCLan is designed to equip students with technical, analytical and soft skills that are needed to build, operate and manage software systems successfully. Progression Pathway For Completion Of The Degree The degree is designed for four (4) years in total1, inclusive of the option of a work placement year. However, students who wish to complete the degree faster may do so in three (3) years, without going through a placement year. The work placement is usually 48 weeks long and offers 120 credits and will be noted in the transcript. The BSc (Hons) Software Engineering degree requires 360 credits, hence, students will do well to utilize the work placement year to gain industry exposure and equip themselves with skills that will make them highly employable following graduation. BSc (Hons) Software Engineering with Work Placement (4 Years) BSc (Hons) Software Engineering (3 Years)* Year 1 (Level 4) ▪ The Computing Challenge ▪ Games Concepts ▪ Introduction to Programming ▪ Introduction to Networking ▪ Computer Systems and Security ▪ Systems Analysis & Database Design Year 2 (Level 5) ▪ Software Development ▪ Advanced Programming ▪ The Agile Professional ▪ Computational Thinking ▪ Computer Security ▪ Mobile Computing Year 3 (Level 6) ▪ Advanced Software Engineering Techniques ▪ Object Oriented Methods in Computing ▪ Distributed Enterprise Systems ▪ Honours Degree Project (Double Project) ▪ One module fromt ▪ Wireless and Mobile Networks ▪ Data Science There are possibilities to transfer to UCLan, Preston Campus in UK, after completing the 1st Year. *Subjected to completing 360 credits. Subjected to availability Each module will have its own assessment structure. The assessment guidelines may be collected from lecturers once the student is registered in a particular year. Assessments may vary from identifying user requirements, conceptualizing, designing and developing software and showcasing to an audience to, writing online or paper based exams. Each module may have one or more forms of assessments to match the learning outcomes specified in the module descriptor. Each assessment will have a marking rubric that defines how marks are offered. The UCLan BSc (Hons) Software Engineering degree programme comes with carefully selected subject areas to match the current needs in the software industry, hence positioning our students with an advantage. Moreover, our students are encouraged to take up the opportunity of working in the industry during the work placement year. While the students themselves may find a position suitable for their work placement, a dedicated career guidance team at UCL will assist in identifying potential employers. Our students are fit to apply for an array of positions in areas such as, but not limited to, Networking, Mobile application development, Gaming software development, Database administration, Enterprise application development and Computer security. The work placement not only allows the students to practice their learnings, but also assists in building the much-needed industry links and acquiring work experience prior to graduation. This module offers an immersive experience designed to equip students with a foundation of study skills necessary to be successful in Computing. Students will be introduced to a broad range of computing concepts and how to apply them to design and develop a small software concept. This module presents a broad range of basic games development concepts and provides foundation for further study in the field. Students will develop an understanding of commercial practices in game development and will be introduced to methods and technologies for game development. The module will also cover mathematical concepts needed for computer games development. In this module students learn how to write simple programs. No prior programming experience is required. Students will develop the ability to analyse a simple problem with a view to implementing a software solution. Students will learn the core skills of programming, debugging and writing readable code using an industry standard programming language such as C# or other. This module builds directly on the Introduction to Programming module. Students will gain the ability to further analyse, design, implement, test and debug more complex programs using an appropriate programming language. Key skills related for logical thinking, code design and alternative ways to code and debug will be explored in this module. This module will introduce students to the fundamentals of networking and networked systems and will develop the understanding they need to investigate relevant computer network standards and protocols. Students will learn the necessary about skills to set-up and configure a Local Area Network through lab work, by handling devices and using simulators. Gradually, we are becoming more and more dependent on computing systems in our daily lives. The services provided by these systems, such as online shopping, social networking, mobile banking and so forth represent the backbone of modern communities. This module will introduce the key security concepts, access control mechanisms and tools to protect the computer systems from harm. This module introduces student to interact between the stakeholders and analysts to develop requirements to store and manipulate data, techniques of information gathering and representation using appropriate tools and techniques and the role of database design using normalization. Students will learn how to design and implementation a robust database using SQL and related tools. This module will focus on the software development lifecycle, with students learning how to identify requirements, analyse, design, code and test a software application. Students will also learn alternative styles used in the industry and which ones are suitable for a given context. This module will enhance the student’s programming competence and ability to use a range of programming techniques necessary for the development of effective and quality software. Students will learn how to select and apply appropriate data structures and algorithms to implement a software solution to a complex problem. Object-oriented and event-driven programming paradigms will also be introduced in this module. This module will teach students the agile way of designing and developing solutions. Since this is fast becoming an industry recognized way of developing solutions, students will get an opportunity to learn how to apply theory to practice and develop agile software by having regular meetings, monitoring progress and refining the solution as the project moved along. The module will develop core skills among students to think and develop computational solutions. Since problems may have many alternative solutions, students will learn the pros and cons of each and which type of solutions are most suitable for a given system or application. In this module, student will learn to examine a range of vulnerabilities and attacks on computer systems and networks. This module will help develop an understanding of advanced methods for protecting communication and computer systems, and the need to have a systematic approach to computer security. This module aims to develop an understanding of contemporary mobile development platforms and skills required to develop applications for mobile devices (phone and tablets). Students will explore a range of technical problems and solutions inherent in developing software applications for mobile computing: connectivity, security, data storage. Interactive mobile application: gestural input, location awareness, on-board-sensing (e.g. accelerometers) will also be taught. The module takes a rigorous approach to software development. It examines the use of formal methods for the specification, development and verification of software. It presents a range of techniques for the analysis and implementation of real-time solutions. The student will investigate the theory and problems of concurrent systems. Object-oriented methods are popular in programming, analysis and design. This module will develop the student’s understanding of the underlying object-oriented concepts and techniques. Students will learn how to apply them to system design and program development using languages such as C# .NET or Java. This module aims to teach students how systems and applications can be built for distributed environments. Since data and clients using the applications are likely to be spread over geographical and system boundaries, it is important to learn if a centralized or a distributed type of system is more suitable. This module will introduce the theory and key concepts to develop such distributed systems. The double module project will involve research, independent study and the production of a substantial report, which will be based on the investigation of a problem and the development of a solution. This project will be the culmination of the student's study and will draw substantially on the material and skills developed during the course. Wireless and mobile networks systems have become an essential part of the modern world. Technologies such as 802.11, GPRS, and Bluetooth are being used in ever increasing numbers of businesses and homes. This module focuses on these technologies in depth, covering both the theory and practical applications of the same. Large volumes of data, commonly known as ‘big data’ are generated and stored by retail stores, online-shopping websites, or other transaction systems. This big data is now considered a very rich resource for information, especially for the strategic and commercial growth of a company. This module will teach students how to apply formal concepts to extract and analyse meaningful information from such large datasets, find hidden patterns, measure similarity etc.
<urn:uuid:8805ee15-4785-4fa6-bbff-2cd548814005>
CC-MAIN-2022-33
https://ucl.lk/UCLan_BSc(Hons)Software_Engineering.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.906073
1,957
1.75
2
Sec. Biogeography and Macroecology Toward a global platform for linking soil biodiversity data - 1Terrestrial Ecology, Netherlands Institute of Ecology (NIOO-KNAW), Wageningen, Netherlands - 2German Centre for Integrative Biodiversity Research (iDiv) Halle-Jena-Leipzig, Leipzig, Germany - 3Global Biodiversity Information Facility, Copenhagen, Denmark - 4Institute of Biology, University of Leipzig, Leipzig, Germany - 5Joint Research Center—EU, Ispra, Italy - 6The Gladstone Institutes, University of California, San Francisco, San Francisco, CA, USA - 7Department of Ecology and Evolutionary Biology, Cooperative Institute for Research in Environmental Sciences, University of Colorado, Boulder, CO, USA - 8Department of Soil Ecology, Helmholtz Centre for Environmental Research, Halle/Salle, Germany - 9Department of Biology, University of Western Ontario, London, ON, Canada - 10Plant Ecology, Institute of Biology, Freie Universität Berlin, Berlin, Germany - 11Berlin-Brandenburg Institute of Advanced Biodiversity Research, Berlin, Germany - 12Senckenberg Museum of Natural History, Görlitz, Germany - 13J.F. Blumenbach Institute for Zoology and Anthropology, Georg August University, Göttingen, Germany - 14Agriculture and Agri-food Canada, Eastern Corn and Oilseed Research Centre, Ottawa, ON, Canada - 15Faculty of Life Sciences, The University of Manchester, Manchester, UK - 16Laboratory of Nematology, Wageningen University, Wageningen, Netherlands - 17School of Global Environmental Sustainability, Colorado State University, Fort Collins, CO, USA Soil biodiversity is immense, with an estimated 10–100 million organisms belonging to over 5000 taxa in a handful of soil. In spite of the importance of soil biodiversity for ecosystem functions and services, information on soil species, from taxonomy to biogeographical patterns, is incomplete and there is no infrastructure to connect pre-existing or future data. Here, we propose a global platform to allow for greater access to soil biodiversity information by linking databases and repositories through a single open portal. The proposed platform would for the first time, link data on soil organisms from different global sites and biomes, and will be inclusive of all data types, from molecular sequences to morphology measurements and other supporting information. Access to soil biodiversity species records and information will be instrumental to progressing scientific research and education. Further, as demonstrated by previous biodiversity synthesis efforts, data availability is key for adapting to, and creating mitigation plans in response to global changes. With the rapid influx of soil biodiversity data, now is the time to take the first steps forward in establishing a global soil biodiversity information platform. Soils are increasingly recognized as crucial components of ecosystems and biodiversity (Wardle et al., 2004; Bardgett and Wardle, 2010), and they represent unique compartments of terrestrial ecosystems by comprising components of the atmosphere, biosphere, hydrosphere, and lithosphere. Soil biodiversity supports many terrestrial ecosystem functions (Wall et al., 2012) and delivers important ecosystem services such as food and fiber production, carbon sequestration, and degradation of pollutants (Wardle, 2002; Wall et al., 2010). However, the data and information regarding diversity that lives in soil remains insufficiently cataloged and coordinated, and this limits our ability to fully assess the key role soil biodiversity plays in supporting terrestrial systems and ecosystem services. In contrast to soil systems, greater effort has been put toward cataloging global diversity in marine and other terrestrial systems (Appeltans et al., 2012; Jetz et al., 2012; Canhos et al., 2014; Hudson et al., 2014) and into making these data free and open access (Guralnick et al., 2007; Wieczorek et al., 2012). Global efforts to synthesize biodiversity data have proven highly successful in the transfer of information, have improved our understanding of species ecology and distribution patterns, and allows for better monitoring and response plans to global change effects (Hampton et al., 2013; Dirzo et al., 2014). Given that we are facing unprecedented environmental alterations through climate change, land use change, soil erosion, invasive species, desertification, and pollution, a better understanding of the global distribution and drivers of soil biodiversity is urgently needed to forecast functional changes of terrestrial ecosystems and to develop appropriate management practices. Therefore, here we review the rationale behind and the benefits of bringing together soil biodiversity data and information through a single global data platform. Although it is known that soils are extraordinarily diverse, the scale of soil biodiversity is not yet fully understood (Wall et al., 2010). Global patterns of soil biodiversity are at most weakly documented (Decaëns, 2010; Tedersoo et al., 2014), and the locations of many soil biodiversity hotspots have not been identified. Part and parcel to the plethora of hyperdiverse taxonomic groups, global patterns of soil biodiversity are thought to differ significantly from what is reported aboveground (Maraun et al., 2007; Decaëns, 2010; Tedersoo et al., 2012; Ramirez et al., 2014). For example, soil microorganisms do not respond to large-scale environmental gradients in the same way as metazoans and belowground biodiversity hotspots do not necessarily mirror aboveground biodiversity patterns (Fierer and Jackson, 2006; Wu et al., 2011) Further, many species residing in soil remain taxonomically, phylogenetically, and functionally undescribed. This is most notable for microorganisms (McDonald et al., 2012) but it is also true for soil fauna (Behan–Pelletier, 1999; Rougerie et al., 2009; Bik et al., 2012). Therefore, categorizing species into discrete taxonomic units represents a challenge for soil biodiversity documentation where many of the species' characteristics and phylogenies are not yet available (Bardgett and van der Putten, 2014). Regardless of these challenges, soil biodiversity research has dramatically increased over the last three decades, and the scope of soil biodiversity data is immense. Soil biodiversity data types range from classical specimen based collections (Burkhardt et al., 2014) to molecular and genomics samples (Gilbert et al., 2014). In between are a wide spectrum of community-aggregated data (i.e., trophic levels to relative abundances) organism attributes (e.g., abundance, biomass, and traits), and environmental measurements (e.g., georeference coordinates, biome type, soil characteristics, and climatic variables). Like other biodiversity information, soil biodiversity data can be digital and available online, though much data remains “dark”—not digitized or not available (Heidorn, 2008). Whether in a national repository, stored on a personal computer, or found in a museum drawer, the first step in any data synthesis project is to make dark data digitally accessible (Box 1) (Hill et al., 2012). Next is to establish a mechanism to link digitally available data globally (such as an online portal). Box 1. Digital soil biodiversity information is currently stored in a wide array of databases, warehouses, catalogs, and other repositories, and contains various types of data (see Supplemental Table 1 for a more extensive list of examples). • Catalogs: Taxonomy lists with descriptions of the organism. May have occurrence data and may contain images, videos or other media. (Example: Encyclopedia of Life) • Data Warehouse: An information system that links taxonomy (morphology and/or annotated sequences) and ecological information across databases and individual studies. (Example: Edaphobase) • Public or Private Databases: Species lists for a given study, experiment or location. May include any number of additional measured parameters such as soil environment measurements and climate information. (Example: Earth Microbiome Project) • Sequence Archives: Nucleotide sequences that provide valuable information on relevant organisms. These can be useful for determining phylogenies and functional characteristics of organisms. May follow standards of Genomic Standards Consortia. [Example: European Nucleotide Archive (ENA), National Center for Biotechnology Information (NCBI)] Here we present an independent initiative to assess and store information on global soil biodiversity; to link species, environmental, and other data and make data accessible at a global level. Our goal was to propose a system that could be linked to other biodiversity and ecosystem relevant databases, accommodate new and future methods and technologies, be useful to a wide array of end users (from the public to scientists to policy makers), and be free and open access. It is now commonplace to concurrently survey soil biodiversity and explore the role these organisms play in ecosystem functions and global sustainability (Wall et al., 2012; Bardgett and van der Putten, 2014). However, we still lack baseline values for soil biodiversity as well as reference values (either abundance ranges or occurrence) that may prove critical in assessing the current status of soils and implementing management and policy efforts to keeping soils and soil biodiversity in a so-called “normal operating range” (Jackson et al., 2007; Koch et al., 2013). This will be particularly important as we continue to understand the impact of certain global changes on soil biodiversity and their interactions within functioning food webs (Blankinship et al., 2011; García-Palacios et al., 2015). For example, agricultural intensification reduces the abundance of soil fungi relative to bacteria, reduces earthworms, mycorrhizal fungi, and increases the numbers of plant parasitic nematodes (Tsiafouli et al., 2015). Less is known on effects of incipient changes, or changes that encompass temporally complex and indirect feedback effects, such as consequences of global warming, biological invasions, or habitat fragmentation (Blankinship et al., 2011; Lindo et al., 2012; Dickie et al., 2014). Reference values can be an important tool for determining the success of ecosystem restoration and comparing data across time scales (Frouz et al., 2004; Kardol and Wardle, 2010) and for detecting subtle trends in temporal soil biodiversity assessments (Bardgett, 2005). Specific indicators that can be accessed from a global platform, such as disease-suppression (Mendes et al., 2011) and nutrient retention capacity of soil (De Vries et al., 2013), can also be used by land managers in order to calibrate and further improve sustainability of production methods, or used to develop rapid and economic soil biodiversity assessment tools for use by policy makers and end users (Wall et al., 2012; Bone et al., 2014). As demonstrated by the Global Biodiversity Information Facility (GBIF) and other global data synthesis efforts (Otegui et al., 2013), access and availability of data has helped to predict the impact of climate change (Warren et al., 2013), monitor invasive species (Gatto et al., 2013) and inform on issues like human health (Daszak et al., 2013) and food and farming (Vincent et al., 2013). Further, the efforts by GBIF and Map of Life (MOL) support the work of the CBD, IPBES, GEO-BON, and many others (see GBIF.org). The inclusion of soil biodiversity data in such global assessments is a highly important and necessary next step. Theoretical and Research Advances The prospect of accessing global soil biodiversity information through a single portal will create novel opportunities to develop, refine, and test underlying ecological theory. The synthesis of biodiversity data across larger spatial scales and greater taxonomic breadth may uncover emergent properties that cannot currently be foreseen (Brose et al., 2012) and will give better insight into species' ecological preferences and geographical ranges (Brose et al., 2004; Fierer et al., 2013; Tedersoo et al., 2014). Here we identify five topic areas that, while not exhaustive, will be enhanced by a global data platform effort: (1) Macroecology and biogeographical patterns: Characterizing global patterns is of paramount importance for conservation of soil biodiversity and global change scenarios on the functioning of soil systems in a future world. A comprehensive view of biogeographic patterns will be critical to reveal important scientific questions, to discover where and why there are hot spots of biodiversity, to identify the drivers of belowground diversity, and will ultimately boost the use of macroecological approaches in soil ecology research (Fierer et al., 2013; Tedersoo et al., 2014). (2) Biodiversity maintenance and loss: A synthesis of soil biodiversity data will help identify drivers and mechanisms underlying both the maintenance and loss of biodiversity in soil and dependent terrestrial systems. The support that belowground diversity gives to aboveground diversity is drastically underestimated, and by overlaying belowground and aboveground biodiversity patterns we can better assess the impact of biodiversity losses. Further, these efforts may prove especially important in terms of invasion ecology, identifying which groups are prone to invade (e.g., earthworms, Hendrix et al., 2008), and the mechanisms facilitating invasion (e.g., Dickie et al., 2014) and prevention efforts. (3) Ecosystem functions and services: Soil organisms co-determine a plethora of provisioning and regulating ecosystem services (Wardle et al., 2004; Lavelle et al., 2006), but the appreciation of their functional significance remains deficient due to their cryptic nature and overlapping functions (Setälä et al., 2005). While conventional anthropogenic land management practices often have aimed to optimize certain (single) ecosystem functions or services (Cardinale et al., 2012), soil biodiversity exemplifies the value of multifunctional ecosystems (Setälä et al., 2014; Wagg et al., 2014). Recent evidence shows that the structure and composition of the soil community and the presence of specific functional groups, is key to delivering a range of ecosystem services, such as N retention and C storage (De Vries et al., 2013; Lange et al., 2015). (4) Community ecology: Soil communities are notoriously complex and conventional community ecological theory may be challenged by the spatially complex habitat soil organisms live in (Ettema and Wardle, 2002). Multitrophic soil biodiversity assessment may help to refine existing soil food web models (Digel et al., 2014). Further, global-scale information on the co-occurrence of different taxa in soil will shed light on the relative significance of trophic vs. non-trophic interactions in soil, top-down vs. bottom up forces and their interplays (Moore et al., 2004) and ecological network perspectives may provide useful tools to clarify interactions among the different soil functional groups and to certain ecosystem functions (Barberán et al., 2011; Morriën and van der Putten, 2013). (5) Aboveground-belowground interactions: As our knowledge of belowground communities increases, so too does our awareness of the important, complex interactions between soil organisms and aboveground biodiversity (Hooper et al., 2000). By revealing belowground biodiversity patterns, we can gain better insight into the linkages between above- and below-ground systems. Plus, soil biodiversity data will be made more valuable if it can be clearly linked to with data pertaining to aboveground communities (such as through the MOL or GBIF). A Proposed Framework Our ability to address a range of applied and theoretical questions, or to assess biogeographical patterns, is to a large extent limited by access and integration of the available data. Currently, there is no single repository or platform that allows access to soil biodiversity information, across all species, or at a global scale. Therefore, we propose a framework to initiate linking different databases and repositories via the internet (Figure 1). The end platform will be both a database and a free, open access portal to link various national and local data sources around the world. Linking data from existing databases is not trivial, nor is it a new challenge (Jetz et al., 2012). Previous efforts such as GBIF and MOL have demonstrated that because there are no required guidelines or consistency between studies or pre-established databases, minimum standards, and classifications must be identified. Soil biodiversity standards must then be harmonized with the global standards already in place (e.g., Yilmaz et al., 2011; Wieczorek et al., 2012). While applying even simple standards will lead to the omission of some studies and data, quality of the data will be valued over quantity, ultimately resulting in a higher quality synthesis. Figure 1. Integration and access to soil biodiversity data will be accomplished in three phases: (I) discovery, (II) standardization, and (III) a final user interface, and the timing of these phases will be directly related to the effort and resources put in to the framework. Integration and access to soil biodiversity data will be accomplished in three phases: discovery, standardization, and a final user interface: Phase I—“Discover” where soil biodiversity data is housed: This phase will be two-fold; first to establish a taxonomy list—a list of organisms living in the soil, and second to inventory soil biodiversity information. The taxonomy list will be shared with the GBIF to tag pre-existing soil related biological observations that can thereon be searched and queried [much like the Global Mountain Biodiversity Assessment (GMBA) (gmba.unibas.ch)] and allow for easier integration of new data. The “taxonomy list” and an inventory of soil biodiversity information will be made available through the Global Soil Biodiversity Initiative (GSBI). It is in this stage that data quality will be also assessed, a complicated issue all biodiversity data studies must deal with. We propose to follow guidelines set forth and established by GBIF. Phase II—Establish a standardization framework by which to link past, present, and future data: Besides taxonomic synonyms it also will be necessary to develop and implement thesauri for the various information fields (i.e., regarding habitat or climate parameters, methods etc.). Standardized ontologies are necessary to link between different data sources and into GBIF (Supplemental Table 1) and other global data centers (such as MOL, ISRIC, EOL, Genebank, and others). Furthermore, to allow data comparability from the individual data sources, standardization of numeric (abundances, pH values, etc.), and nominal (i.e., habitat types, soil types) data will be crucial. Concurrently, we must also establish the minimum set of parameters needed, and formalize data copyright privacy and licensing rules. Together these efforts will provide the critical foundation and quality criteria on which to build the platform. Short read sequence data: In the case of microbial marker gene sequence data (either 16S, 18S, ITS or similar) it is difficult to extract taxonomic information for a number of reasons (otu picking methods, chimeras, read length, Orgiazzi et al., 2014). Plus due to the enormous amount of sequence data, reprocessing the full datasets would not be tractable. Therefore, we propose to link short read sequence data by location, rather than by taxon identification. This is based on the fact that there is currently no consensus on the correct protocol for handling these data, and integrating processed sequence data would introduce substantial methodological artifacts (Caporaso et al., 2010). Instead, our approach allows convenient access to these data linked to geography and allows users to process the data of interest using a consistent protocol based on individual research questions. Phase III—Establish a user-friendly interface that allows for the integration and comparison of soil biodiversity data—here called “Soil Portal”: The portal will be designed specifically for manipulation and analyses of the data in order to address the theoretical questions outlined above and to provide stakeholders with the type of information needed for management and policy decisions. It is in this phase that we would finally be able to combine collection data across taxonomic groups, spatial scales and research experiments. As demonstrated previously (Hill et al., 2012), users are reluctant to use any interface that costs time, therefore, we propose a platform that would offer researchers a set of tools, rewards for contributing their data to the community- such as data analyses tools, DOIs for data publication, and a link to other initiatives and data portals. In order to progress this project, first, buy-in from the community of soil biologists is required; our goal is to galvanize and guide soil ecologists to make their data available. Researchers can continue to upload data from their home repositories, data will not have to be uploaded more than once, and there is no need to support a single, comprehensive database—a monetarily expensive and time consuming task. The framework is designed so that participation in the effort to liberate individual datasets will only require minor changes to how researchers work (i.e., time for data input and training for students and young scientists), but has the potential for great individual rewards such as more publications (e.g., “data papers”), increased exposure leading to invitations and collaborations, as well as reciprocal access to a wealth of data from colleagues. Admittedly, in addition to the technical challenges outlined in the introduction, the main limiting factor of this proposal will be resources. Specifically, time and funds must be invested upfront to move this effort forward in an efficient way. In response to unprecedented global environmental changes and the drastic impacts on biodiversity (Sala et al., 2000), there is a sense of urgency to bring together global biodiversity information that will provide the basis to determine the species and communities that are particularly vulnerable to change and extinctions (Scholes et al., 2008; Cardinale et al., 2012; Jetz et al., 2012) and focus conservation and management practices (Turner et al., 2015). The organisms that live in the soil are no exceptions. The focus of the outlined framework goes beyond species information, and therefore a major challenge and goal will be to integrate the different information types whereby a range of ecological questions can be addressed. Soil biodiversity information is of broad interest to other disciplines, including plant ecologists, agriculturalists, invertebrate ecologists, carbon and climate modelers, and would open new unique opportunities for collaboration between the groups. As such, we have designed a framework that will interface with other disciplines through GBIF and the like. In addition to data access and standardization, a priority of this effort will be analytical and visualization tools for end users. Beyond progressing scientific research these tools should help to communicate results and bring the interest of a larger, more general audience. Altogether, access to rapidly accumulating soil biodiversity information across the globe has the potential to improve research and elevate soil ecology to be on par with our understanding of aboveground systems. Conflict of Interest Statement The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. We thank Marten Winter for his contribution to the ideas presented here. This was a joint effort of the Global Soil Biodiversity Initiative (GSBI) and working group sOILDIV, and was kindly supported by sDiv, the Synthesis Centre for Biodiversity Sciences of the German Centre for Integrative Biodiversity Research (iDiv) Halle-Jena-Leipzig (DFG FZT 118). This work was also supported by an ERC grant [ERC-Adv 260-55290 (SPECIALS)] to WP. The Supplementary Material for this article can be found online at: https://www.frontiersin.org/article/10.3389/fevo.2015.00091 Appeltans, W., Ahyong, S. T., Anderson, G., Angel, M. V., Artois, T., Bailly, N., et al. (2012). The magnitude of global marine species diversity. Curr. Biol. 22, 2189–2202. doi: 10.1016/j.cub.2012.09.036 Barberán, A., Bates, S. T., Casamayor, E. O., and Fierer, N. (2011). Using network analysis to explore co-occurrence patterns in soil microbial communities. ISME J. 6, 343–351. doi: 10.1038/ismej.2011.119 Bik, H. M., Porazinska, D. L., Creer, S., Caporaso, J. G., Knight, R., and Thomas, W. K. (2012). Sequencing our way towards understanding global eukaryotic biodiversity. Trends Ecol. Evol. 27, 233–243. doi: 10.1016/j.tree.2011.11.010 Bone, J., Barraclough, D., Eggleton, P., Head, M., Jones, D. T., and Voulvoulis, N. (2014). Prioritising soil quality assessment through the screening of sites: the use of publicly collected data. Land Degrad. Dev. 25, 251–266. doi: 10.1002/ldr.2138 Brose, U., Dunne, J. A., Montoya, J. M., Petchey, O. L., Schneider, F. D., and Jacob, U. (2012). Climate change in size-structured ecosystems. Philos. Trans. R. Soc. B Biol. Sci. 367, 2903–2912. doi: 10.1098/rstb.2012.0232 Burkhardt, U., Russell, D. J., Decker, P., Döhler, M., Höfer, H., Lesch, S., et al. (2014). The Edaphobase project of GBIF–Germany—a new online soil–zoological data warehouse. Appl. Soil Ecol. 83, 3–12. doi: 10.1016/j.apsoil.2014.03.021 Canhos, V. P., Souza, S., Giovanni, R., and Canhos, D. A. L. (2014). Global Biodiversity Informatics: setting the scene for a “new world” of ecological forecasting. Biodivers. Inform. 1, 1–13. doi: 10.17161/bi.v1i0.3 Caporaso, J. G., Lauber, C. L., Walters, W. A., Berg-Lyons, D., Lozupone, C. A., Turnbaugh, P. J., et al. (2010). Global patterns of 16S rRNA diversity at a depth of millions of sequences per sample. Proc. Natl. Acad. Sci. U.S.A. 108(Suppl. 1), 4516–4522. doi: 10.1073/pnas.1000080107 Daszak, P., Zambrana-Torrelio, C., Bogich, T. L., Fernandez, M., Epstein, J. H., Murray, K. A., et al. (2013). Interdisciplinary approaches to understanding disease emergence: the past, present, and future drivers of Nipah virus emergence. Proc. Natl. Acad. Sci.U.S.A. 110, 3681–3688. doi: 10.1073/pnas.1201243109 de Vries, F. T., Thébault, E., Liiri, M., Birkhofer, K., Tsiafouli, M. A., Bjørnlund, L., et al. (2013). Soil food web properties explain ecosystem services across European land use systems. Proc. Natl. Acad. Sci. U.S.A. 110, 14296–14301. doi: 10.1073/pnas.1305198110 Dickie, I. A., St John, M. G., Yeates, G. W., Morse, C. W., Bonner, K. I., Orwin, K., et al. (2014). Belowground legacies of Pinus contorta invasion and removal result in multiple mechanisms of invasional meltdown. AoB Plants 6:plu056. doi: 10.1093/aobpla/plu056 Digel, C., Curtsdotter, A., Riede, J., Klarner, B., and Brose, U. (2014). Unravelling the complex structure of forest soil food webs: higher omnivory and more trophic levels. Oikos 123, 1157–1172. doi: 10.1111/oik.00865 Fierer, N., Ladau, J., Clemente, J. C., Leff, J., Owens, S. M., Pollard, K. S., et al. (2013). Reconstructing the microbial diversity and function of pre–agricultural tallgrass prairie soils in the United States. Science 342, 621–624. doi: 10.1126/science.1243768 Frouz, J., Ali, A., Frouzova, J., and Lobinske, R. J. (2004). Horizontal and vertical distribution of soil macroarthropods along a spatio–temporal moisture gradient in subtropical Central Florida. Environ. Entomol. 33, 1282–1295. doi: 10.1603/0046-225X-33.5.1282 García-Palacios, P., Vandegehuchte, M. L., Shaw, E. A., Dam, M., Post, K. H., Ramirez, K. S., et al. (2015). Are there links between responses of soil microbes and ecosystem functioning to elevated CO2, N deposition and warming? A global perspective. Glob. Change Biol. 21, 1590–1600. doi: 10.1111/gcb.12788 Gatto, F., Katsanevakis, S., Vandekerkhove, J., Zenetos, A., and Cardoso, A. C. (2013). Evaluation of online information sources on alien species in Europe – the need of harmonization and integration. Environ. Manag. 51, 1137–1146. doi: 10.1007/s00267-013-0042-8 Hampton, S. E., Strasser, C. A., Tewksbury, J. J., Gram, W. K., Budden, A. E., Batcheller, A. L., et al. (2013). Big data and the future of ecology. Front. Ecol. Environ. 11, 156–162. doi: 10.1890/120103 Hendrix, P. F., Callaham, M. A. Jr., Drake, J. M., Huang, C.–Y., James, S. W., Snyder, B. A., et al. (2008). Pandora's box contained bait: the global problem of introduced earthworms. Annu. Rev. Ecol. Evol. Syst. 39, 593–613. doi: 10.1146/annurev.ecolsys.39.110707.173426 Hill, A., Guralnick, R., Smith, A., Sallans, A., Gillespie, R., Denslow, M., et al. (2012). The notes from nature tool for unlocking biodiversity records from museum records through citizen science. Zookeys 209, 219–233. doi: 10.3897/zookeys.209.3472 Hooper, D. U., Bignell, D. E., Brown, V. K., Brussard, L., Dangerfield, J. M., Wall, D. H., et al. (2000). Interactions between aboveground and belowground biodiversity in terrestrial ecosystems: patterns, mechanisms, and feedbacks. Bioscience 50, 1049–1061. doi: 10.1641/0006-3568(2000)050[1049:IBAABB]2.0.CO;2 Hudson, L. N., Newbold, T., Contu, S., Hill, S. L. L., Lysenko, I., De Palma, A., et al. (2014). The PREDICTS database: a global database of how local terrestrial biodiversity responds to human impacts. Ecol. Evol. 4, 4701–4735. doi: 10.1002/ece3.1303 Lange, M., Eisenhauer, N., Sierra, C. A., Bessler, H., Engels, C., Griffiths, R. I., et al. (2015). Plant diversity increases soil microbial activity and soil carbon storage. Nat. Commun. 6:6707. doi: 10.1038/ncomms7707 Lindo, Z., Whiteley, J. A., and Gonzalez, A. (2012). Traits explain community disassembly and trophic contraction following experimental environmental change. Glob. Change Biol. 18, 2448–2457. doi: 10.1111/j.1365-2486.2012.02725.x McDonald, D., Price, M. N., Goodrich, J., Nawrocki, E. P., DeSantis, T. Z., Probst, A., et al. (2012). An improved Greengenes taxonomy with explicit ranks for ecological and evolutionary analyses of bacteria and archaea. ISME J. 6, 610–618. doi: 10.1038/ismej.2011.139 Mendes, R., Kruijt, M., De Bruijn, I., Dekkers, E., Van der Voort, M., Schneider, J. H. M., et al. (2011). Deciphering the rhizosphere microbiome for disease–suppressive bacteria. Science 332, 1097–1100. doi: 10.1126/science.1203980 Moore, J. C., Berlow, E. L., Coleman, D. C., de Ruiter, P. C., Dong, Q., Hastings, A., et al. (2004). Detritus, trophic dynamics, and biodiversity. Ecol. Lett. 7, 584–600. doi: 10.1111/j.1461-0248.2004.00606.x Morriën, E., and van der Putten, W. H. (2013). Soil microbial community structure of range-expanding plant species differs from co-occurring natives. J. Ecol. 101, 1093–1102. doi: 10.1111/1365-2745.12117 Orgiazzi, A., Dunbara, M. B., Panagosa, P., de Groot, A. G., and Lemanceau, P. (2014). Soil biodiversity and DNA barcodes: opportunities and challenges. Soil Biol. Biochem. 80, 244–250. doi: 10.1016/j.soilbio.2014.10.014 Otegui, J., Ariño, A. H., Encinas, M. A., and Pando, F. (2013). Assessing the primary data hosted by the Spanish node of the Global Biodiversity Information Facility (GBIF). PloS ONE 8:e55144. doi: 10.1371/journal.pone.0055144 Ramirez, K. S., Leff, J. W., Barberán, A., Bates, S. T., Betley, J., Crowther, T. W., et al. (2014). Biogeographic patterns in belowground diversity in New York City's Central Park are similar to those observed globally. Proc. R. Soc. B. 281:20141988. doi: 10.1098/rspb.2014.1988 Rougerie, R., Decaëns, T., Deharveng, L., James, S., Porco, D., Chang, C. H., et al. (2009). DNA barcodes for soil animal taxonomy. Braz. J. Agric. Res. 44, 789–801. doi: 10.1590/S0100-204X2009000800002 Sala, O. E., Chapin, F. S. III, Armesto, J. J., Berlow, E., Bloomfield, J., Dirzo, R., et al. (2000). Global biodiversity scenarios for the year 2100. Science 287, 1770–1774. doi: 10.1126/science.287.5459.1770 Scholes, R. J., Mace, G. M., Turner, W., Geller, G. N., Jürgens, N., Larigauderie, A., et al. (2008). Toward a global biodiversity observing system. Science 321, 1044–1045. doi: 10.1126/science.1162055 Setälä, H., Bardgett, R. D., Birkhofer, K., Brady, M., Byrne, L., de Ruiter, P. C., et al. (2014). Urban and agricultural soils: conflicts and trade–offs in the optimization of ecosystem services. Urban Ecosyst. 17, 239–253. doi: 10.1007/s11252-013-0311-6 Setälä, H., Berg, M. B., and Jones, T. H. (2005). “Trophic structure and functional redundancy in soil communities,” in Biological Diversity and Function in Soils, eds R. Bardgett, M. Usher, and D. Hopkins (Cambridge: Cambridge University Press), 236–249. doi: 10.1017/CBO9780511541926.014 Tedersoo, L., Bahram, M., Toots, M., Diédhiou, A. G., Henkel, T. W., Kjøller, R., et al. (2012). Towards global patterns in the diversity and community structure of ectomycorrhizal fungi. Mol. Ecol. 21, 4160–4170. doi: 10.1111/j.1365-294X.2012.05602.x Tsiafouli, M. A., Thebault, E., Sgardelis, S. P., de Ruiter, P. C., van der Putten, W. H., Birkhofer, K., et al. (2015). Intensive agriculture reduces soil biodiversity across Europe. Glob. Change Biol. 21, 973–985. doi: 10.1111/gcb.12752 Turner, W., Rondinini, C., Pettorelli, N., Mora, B., Leidner, A. K., Szantoi, Z., et al. (2015). Free and open-access satellite data are key to biodiversity conservation. Biol. Conserv. 182, 173–176. doi: 10.1016/j.biocon.2014.11.048 Vincent, H., Wiersema, J., Kell, S., Fielder, H., Dobbie, S., Castañeda-Álvarez, N. P., et al. (2013). A prioritized crop wild relative inventory to help underpin global food security. Biol. Conserv. 167, 265–275. doi: 10.1016/j.biocon.2013.08.011 Wagg, C., Bender, S. F., Widmer, F., and van der Heijden, M. G. A. (2014). Soil biodiversity and soil community composition determine ecosystem multifunctionality. Proc. Natl. Acad. Sci. U.S.A. 111, 5266–5270. doi: 10.1073/pnas.1320054111 Wall, D. H., Bardgett, R. D., Behan-Pelletier, V., Herrick, J. E., Jones, H., Ritz, K., et al. (2012). Soil Ecology and Ecosystem Services. Oxford, UK: Oxford University Press. Available online at: http://www.amazon.com/Soil-Ecology-Ecosystem-Services-Diana/dp/0199575924 (Accessed November 5, 2013). Wardle, D. A., Bardgett, R. D., Klironomos, J. N., Setälä, H., Van Der Putten, W. H., and Wall, D. H. (2004). Ecological linkages between aboveground and belowground biota. Science 304, 1629–1633. doi: 10.1126/science.1094875 Warren, R., VanDerWal, J., Price, J., Welbergen, J. A., Atkinson, I., Ramirez–Villegas, J., et al. (2013). Quantifying the benefit of early climate change mitigation in avoiding biodiversity loss. Nat. Clim. Change 3, 678–682. doi: 10.1038/nclimate1887 Wieczorek, J., Bloom, D., Guralnick, R., Blum, S., Döring, M., Giovanni, R., et al. (2012). Darwin Core: an evolving community–developed biodiversity data standard. PLoS ONE 7:e29715. doi: 10.1371/journal.pone.0029715 Wu, T., Ayres, E., Bardgett, R. D., Wall, D. H., and Garey, J. R. (2011). Molecular study of worldwide distribution and diversity of soil animals. Proc. Natl. Acad. Sci. U.S.A. 108, 17720–17725. doi: 10.1073/pnas.1103824108 Yilmaz, P., Kottmann, R., Field, D., Knight, R., Cole, J. R., Amaral–Zettler, L., et al. (2011). Minimum information about a marker gene sequence (MIMARKS) and minimum information about any (x) sequence (MIxS) specifications. Nat. Biotechnol. 29, 415–420. doi: 10.1038/nbt.1823 Keywords: soil ecology, belowground biodiversity, biogeography, data synthesis, taxonomy, sequence data, ecological theory Citation: Ramirez KS, Döring M, Eisenhauer N, Gardi C, Ladau J, Leff JW, Lentendu G, Lindo Z, Rillig MC, Russell D, Scheu S, St. John MG, de Vries FT, Wubet T, van der Putten WH and Wall DH (2015) Toward a global platform for linking soil biodiversity data. Front. Ecol. Evol. 3:91. doi: 10.3389/fevo.2015.00091 Received: 24 May 2015; Accepted: 17 July 2015; Published: 30 July 2015. Edited by:Angela McGaughran, Commonwealth Scientific and Industrial Research Organisation, Australia Reviewed by:Katy Morgan, University of New Orleans, USA Sara Sanchez Moreno, Instituto Nacional de Investigación y Tecnología Agraria y Alimentaria, Spain Copyright © 2015 Ramirez, Döring, Eisenhauer, Gardi, Ladau, Leff, Lentendu, Lindo, Rillig, Russell, Scheu, St. John, de Vries, Wubet, van der Putten and Wall. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. *Correspondence: Kelly S. Ramirez, Terrestrial Ecology, Netherlands Institute of Ecology, Droevendaalsesteeg 10, 6708 PB Wageningen, Netherlands, firstname.lastname@example.org
<urn:uuid:b707e434-4ecf-45e1-a7cd-5a5a7fd496d7>
CC-MAIN-2022-33
https://www.frontiersin.org/articles/10.3389/fevo.2015.00091/full
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.775511
9,393
2.84375
3
“The Constitution does not prohibit the citizens of each State from regulating or prohibiting abortion. Roe and Casey arrogated that authority. We now overrule those decisions and return that authority to the people and their elected representatives.” These concluding words from Justice Samuel Alito’s majority opinion in Dobbs v. Jackson Women’s Health Organization unequivocally affirmed the return of democracy’s role in molding abortion policy. Sadly, state and federal judiciaries are comprised of activist judges who won’t let the Supreme Court of the United States frustrate their efforts to protect elective abortion. The judicial resistance has begun. Dobbs was never going to be the finale of the Pro-Life movement. Returning abortion policy to the democratic processes merely ignites animated battles in legislative chambers across the nation. And even where abortion is fully banned—like in Texas, or elsewhere in the South and Midwest—the struggle to build a fully Pro-Life culture and legal regime persists. Addressing the needs of families, constructing strong enforcement mechanisms, and combatting an increasingly underground abortion industry have become immediate and acute concerns. Rather than being the end of the line, Dobbs was instead a necessary precondition to transition to the next phase of the Pro-Life movement. For 49 years, the judiciary preempted our ability to pursue justice for preborn children and their mothers. Tragically, the Supreme Court can’t erase that sort of corruption in one sweeping ruling. For decades now, the progressive legal establishment’s disdain for fair and neutral procedures has ballooned. Law students have developed, absorbed, and come of age in this environment. They’ve since become associates and partners, clerks, and litigators. And when the opportunity arose, they ran for office or obtained a prestigious appointment as a judge responsible for adjudicating the legal controversies that arise out of our most heated culture wars. Now-deceased Stephen Reinhardt, who served on the United States Court of Appeals for the Ninth Circuit, put it succinctly: “If [the Supreme Court]want[s]to take away rights, that’s their privilege. But I’m not going to help them do it.” One-time activists now populate the benches in the most critical civil courthouses nationwide. Is Dobbs really going to quash their ambition? The answer, of course, is no. They have no desire to help the Supreme Court give states the power to ban abortion. They have no plan to respect the duly enacted state laws against abortion. To do so would be to subvert their own worldview of justice—irrespective of what the Supreme Court might say. And they are already jumping into action. In Louisiana, a state district judge granted a temporary restraining order (TRO) against the state’s trigger bans, which banned all elective abortions once the Supreme Court reversed Roe v. Wade, as it did in Dobbs. The judge, Robin Giarrusso of the New Orleans Civil District Court, determined Louisiana’s law had an ambiguous effective date and therefore did not adequately provide proper notice to the affected parties. This determination is rather curious. First, the plaintiffs, by filing the lawsuit just after the law went into effect, seemed to understand precisely when the law went into effect. They made that transparent simply by filing the lawsuit in the first place. Second, the language of the bill is pretty straightforward. Is there any person who works in the abortion industry who does not comprehend what “any decision of the United States Supreme Court which reverses, in whole or in part, Roe v. Wade”—the exact language of Louisiana’s trigger law—means? Likewise, is there a single person who works in the abortion industry who does not know the Supreme Court fully reversed Roe in June? The answer is obvious, but so too is the reason why the judge entered the TRO. The same is happening at home in Texas. Last week, state district judge Christine Weems in Houston blocked the enforcement of the State’s pre-Roe prohibitions on elective abortion. She theorized that Texas repealed these laws by implication because the Texas Legislature has since passed other restrictions on elective abortion. This theory—in which Texas never repealed explicitly the pre-Roe laws but otherwise meant to—is, to put it charitably, absurd and ad hoc. The Texas Legislature had every opportunity to repeal these laws but chose not to. It could have done so under Democratic rule. It could have done so under Republican rule. It could have done so under a divided government. But it did not, instead choosing to pass an array of abortion restrictions that were plausibly enforceable under the Roe and Planned Parenthood v. Casey regime. Further, the very same government that the abortion industry and judge assert repealed the pre-Roe laws by implication passed a bill (the Texas Heartbeat Act) that in part read, “the legislature finds that the State of Texas never repealed, either expressly or by implication, the state statutes enacted before the ruling in Roe v. Wade, 410 U.S. 113 (1973), that prohibit and criminalize abortion unless the mother’s life is in danger.” These words, unlike the “implied” effects of other laws, are quite clear. Yet, Judge Weems doesn’t want Texas to ban abortion, so she had to invent some pre-textual rationale for the TRO. Fortunately, two factors dampen the impact of the TRO. First, Texas’ prohibitions against homicide make abortion illegal, and the TRO was limited to the pre-Roe statutes. Second, while the abortion industry could cherry pick a favorable venue at the district level, they won’t be able to do so as Texas appeals the decision. The Supreme Court of Texas—to which Attorney General Ken Paxton appealed the decision—is the final arbiter of state civil matters, and uniformly Republican. The Supreme Court of Texas has already shown their unwillingness to bend the law as grotesquely as Judge Weems did, overturning the TRO and allowing the pre-Roe statutes to remain in effect and enforceable while the case proceeds. Still, the brazen acts of Judge Giarrusso in Louisiana and Judge Weems in Texas are not isolated enigmas. They are part of a larger pattern of progressive judges imposing their beliefs by fiat—even when it appears external events have deprived them of all of their favorite legal tools. Dobbs may have endeavored to remove the courts from abortion policy entirely. But with an unscrupulous cohort of judges waiting in district courts nationwide, we can’t retreat entirely to the state legislatures just yet.
<urn:uuid:03701105-899c-4162-868c-27e8665245d3>
CC-MAIN-2022-33
https://texasrighttolife.com/the-judges-trying-to-give-abortionists-a-free-pass/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.954035
1,391
1.632813
2
The prospect of the first new runway in south-east England since 1946 edged closer today after the UK Government finally backed proposals for a third runway at London Heathrow. The Airports National Policy Statement now goes to a Parliamentary vote in the next few weeks and up to 75 per cent of MPs are expected to back it. But even if that is the case, it doesn’t mean it’s a done deal as a complex round of legal, housing and environmental challenges will need to be overcome. Today’s decision at least marks progress in a long-standing debate, and it has been warmly received by airlines, trade unions and the business community. Craig Kreeger, CEO Virgin Atlantic, applauded the Government’s decision. “Heathrow expansion is a once-in-a-generation opportunity that must not be squandered,” he said. Adrian Parkes, CEO, GTMC, said its research with Oxford Economics found just a one per cent increase in international air business travel – which can only be achieved by airport expansion – will deliver £400m in knock-on economic benefits. But will the regions benefit? While Heathrow is indisputably the transfer heartbeat of UK aviation, it’s equally true that many regional airports have grown, and continue to grow, on the back of point-to-point services. Passengers in Glasgow, Manchester, Birmingham and Cardiff can now fly to the Gulf and beyond without transiting Heathrow.
<urn:uuid:01c3c582-948c-40f3-acb9-98fd7c34a143>
CC-MAIN-2022-33
https://www.businesstraveller.com/business-travel/2018/06/05/uk-government-backs-heathrow/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.946461
310
1.546875
2
A novel WIPO program brings IP owners and researchers together to facilitate scientific research into neglected diseases, with the aim of bringing royalty-free treatments to least developed countries. 50 voluntary collaboration agreements have been signed in the 2 years of operation. The existence of IP rights is most commonly justified on the grounds that IP protection promotes innovation. Giving inventors (or their employers) exclusive rights to their inventions for a period of time means that they have an opportunity to recover research and development (R&D) costs. If other people can use an invention immediately, the inventor will not be adequately compensated for its effort and is less likely to invest in R&D. (The same rationale is applied to copyright and designs.) IP protections do not facilitate research into some diseases However, IP rights don’t encourage innovation in all circumstances. One of the most obvious gaps relates to diseases that disproportionately affect poor or marginalised populations – including malaria, tuberculosis, and the World Health Organization’s list of 17 neglected tropical diseases (including leprosy, scabies, snakebite, dengue and rabies). These diseases affect more than 1 billion people. Clearly, drugs for these diseases have enormous potential public health benefits. However, the affected people have limited capacity to pay for treatments. There are several disincentives for a commercial organisation to focus its (usually limited) R&D spend on neglected diseases, including that: - The retail price of a new drug must recover the R&D costs for the successful product, as well as subsidise R&D for unsuccessful products and make a profit for the company. If a consumer can only afford to pay the cost of manufacture then even potentially life-saving products with large markets may not be commercially attractive. On the flip side, products which address the needs and wants of wealthy consumers (such as anti-ageing and baldness treatments) may be commercially attractive even though the potential market is smaller and the public health benefits may be much lower. - Researchers need to be careful not to infringe existing IP rights owned by other entities. If the owner chooses not to grant a licence or if the researcher can’t afford to pay a licence fee, R&D may be blocked until a patent expires. In 2011, WIPO and BIO Ventures for Global Health launched a novel, cooperative initiative which works around some of these barriers and facilitates research into drugs, vaccines and diagnostics for neglected tropical diseases, malaria and tuberculosis – WIPO Re:Search. The program connects researchers with the owners of existing IP relating to neglected diseases. The IP owner and researcher sign a collaboration agreement, in which the IP owner agrees to give free access to resources for non-commercial research purposes. - The IP owner is advantaged through receiving access to research results at no out of pocket cost, and through reputational benefits. There is no additional cost to the IP owner because the licensed assets already exist, and because the licensed IP will not be used commercially there is no impact on the market for the IP owner’s products. - The researcher benefits because it can piggy-back off existing research without having to pay. - People with the diseases benefit by increasing the chances that improved treatments will become available. Any resulting products will be licensed on a royalty-free basis in least developed countries, enabling affordable access to treatments by those people most affected by the diseases. Although WIPO Re:Search addresses some of the same policy aims as compulsory licensing of patents (which we wrote about here, here and here), this program is quite different. WIPO Re:Search is a voluntary scheme, and the program is complementary to the rights of the IP owner, rather than competitive. WIPO has just announced that WIPO Re:Search has facilitated 50 collaboration agreements in the two years it has been operating. Approximately 40 of these were signed since February 2013. While the figures are encouraging and the program seems like a possible win for everybody involved, the success of WIPO Re:Search will ultimately be judged by whether it leads to new drugs, vaccines or diagnostics.
<urn:uuid:d4dbe1ee-0ef2-4db7-a138-a3c72f404a47>
CC-MAIN-2022-33
https://ipwhiteboard.com.au/wipo-program-encourages-research-neglected-diseases/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.963059
850
2.921875
3
According to research by Stellenbosh University, the findings are extremely concerning with losses indicating that learners in 2021 had fallen more than a year of learning behind learners in the same grade in 2019. As per the report, two policy areas require special attention: The first is to find more time for Mathematics, to overcome the deficit that has accumulated during the Covid years. For instance, Grade 9 learners in 2021 are performing more than a year behind Grade 9 learners two years earlier, so they must catch up a full year before they write matric. This requires that they progress more than four years in the three years before they write matric. In Language, the big challenge is to ensure that reading has been mastered in the Foundation Phase, while at the same time giving urgent attention to ease the language transition. Weak reading skills and English vocabulary can inhibit all further learning for the majority of learners who have to make this language transition. Education expert Aunyana Moloisane has this to say on the matter: “We at Optimi feel strongly about assisting learners and teachers in bridging the gap caused by the unforeseen effects of Covid. We believe that we owe it to our learners to ensure that they are not left behind, as this may have a negative snowball effect later in their learning journey. Optimi would like to partner with schools and provincial education departments to redress the learning gaps. Our learning solutions, particularly diagnostic testing, will benefit teachers and learners immersely.” A crucial gauge in measuring learners’ understanding is a diagnostic assessment performed by individual teachers to test learners’ proficiency. Optimi Classroom has become the benchmark educational institution to actively unlock this door to both testing and assessing both teachers and students. These diagnostic assessments serve as a barometer for how much prior knowledge a student has about a topic and helps both the teacher and student understand how much they know, and don’t know. This is key in a teacher’s lesson planning and learning objectives, and in identifying areas which may require special attention. “The result of Optimi's Diagnostic Test includes a detailed list of the assessed content areas as well as their subdivisions,” said Optimi Academy Coordinator, Reinhardt Venter. He added: “This detailed breakdown assists teachers and parents to facilitate targeted intervention with regards to problem areas, ensuring that such interventions are manageable and do not overwhelm the learner. Not only do Optimi's Diagnostic Tests give detailed feedback, but the tests are self-marking, freeing up time the teacher would have spent marking. Tests can also be done more than once, allowing a learner to go back and see whether specific interventions are effective.” On par with the 17 sustainable development goals that clearly define the world we want to live in, leaving no one behind; The reality is that the future of South African learners’ lies in the balance. The truth is that the rules have changed. The outcome is that it’s time to do things differently.
<urn:uuid:4cf035ec-01ff-4350-bc24-8f9e75a4fb08>
CC-MAIN-2022-33
https://test.bizcommunity.com/Article/196/371/229169.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.966677
617
2.828125
3
At some point you will ask yourself what is Linux? Well, Linux is a combination of Linus Torvalds’s Linux kernel and other programs to make it an open source operating system which was designed for personal computer users at a very low-cost or even free. The heart of Linux called Linux kernel, created by Linus Torvalds when he was a student at the University of Helsinki in 1991. Linus Torvalds or Linus Benedict Torvalds, a software engineer now is the Linux kernel project’s coordinator. How does operating system work? The operating system (OS) relays instructions from programs/software to the computer’s processor, the processor then performs the instructed tasks, and finally the computer processor (CPU) sends back the results to the programs/software via the OS or operating system. Unlike computer programs like word processor or text editor, Linux is an interface between computer’s hardware and the programs run on it. Linux is a great alternative operating system to Windows, Mac OS, Solaris, MS-DOS and others. You might think Microsoft Windows or Mac OS are popular, think again, you will be surprised Linux is more popular than you think. In the server world, according to W3Techs, Linus has 38.6% market share vs 32.6% for Windows in February 2014. You should heard a lot about Android (based on Linux) lately if you have a smart phone, according to Gartner, Android had 79% market share vs 14.2 for iOS vs 3.3% for Windows in 2nd quarter 2013. Did you know most of your home networking hardware (routers/switches) even your favorite game consoles run on Linux? In my humble opinion, Linux is way better than Microsoft Windows in term of security and stability. Here are what Linux look like Debian 7 Wheezy with Xfce Ubuntu 14.04 with Xfce Debian 7 Wheezy with Gnome First, let’s talk about Linux kernel, which original created by Linux Torvalds. Linux kernel is released under the General Public License (GNU), means you are free to study, copy, change, and redistribute it. Started in 1991, Torvalds invited developers and users to contribute to the project. Since then thousands of developers, companies, and users have been developing and enhancing Linux kernel, and that community has grown rapidly. Linux kernel is the central core of a computer operating system. The kernel provides basic services for all other parts of the OS, including memory management, process management, file management, input/output management. Linux is not a product of any specific company, but it’s a product being developed collaboratively by many companies and developers over the world. Linux OS is a core component, companies or group of developers then can branch it off into many different products called distributions. Linux distribution (people call distro for short) is a complete operating system (a collection of programs) developed on top of the Linux kernel, each Linux distro can have different look and function for different purposes. Today most Linux Distro should have these features as standard - 32 bit and64 bit supported operating system - TCP/IP networking support (to connect to Local Network and the internet) - Full support for X Windows - GUI – Gnome, KDE, Xfce, LXDE, Cinnamon - Web Browser – Firefox, Iceweasel, Chromium - Office Suite – LibreOffice, Google Docs, Calligra Suite, Ability Office - Multimedia – VLC, Banshee, Miro, MPlayer - Graphics Software – GIMP, Inkscape Tux – Linux’s mascot Did you know Linux has its own logo/mascot named Tux. Tux is a penguin character, was born in 1996 after a logo contest. Linus Torvalds picked a penguin logo because “Linus likes penguins”, simple as that. Why Tux? Some people say Tux stand for “Tuxedo” because the penguins look like they are wearing tuxedo. Many companies develop their own Linux Distro based on Linux kernel which under GNU license. Because of the GNU license, they can’t charge or sell their product; most companies make profit by selling support, service, and software update. Linux distros for servers needs to be stable, reliable and scalable to run web servers, database servers, and application servers. Enterprise Linux Distros usually come with paid support from well-known companies like SUSE, Red Hat who have the partnership with IBM, HP, DELL, Cisco… to make sure all the software/hardware work well together. Some of most popular Linux distros for server are Centos, Debian, Red hat, Ubuntu Server, SUSE. Linux distros for home user and small office home office (SOHO), usually comes with multimedia suites, office programs, web browser, and some sort of easy to use graphical user interface (GUI) like Gnome or KDE. Some of the most popular home/SOHO Linux Distros are Ubuntu, Fedora, Linux Mint. Linux distros for laptop/netbook usually requires lightweight applications and graphical user interface because laptop/netbook generally are less-powerful than desktop/server. For example Abiword and Gnumeric are lightweight office programs compare to full featured LibreOffice, XFCE or LXDE are very lightweight graphical user interface vs resources hungry like Unity, Gnome, or KDE. Lightweitght programs and GUI will use less resource, means longer battery life. Some good Linux distros for laptop/netbook are Xubuntu, Lubuntu, or Fedora with LXDE/Xfce desktop.
<urn:uuid:d0c7ef4c-458a-44b1-87d8-907c8d960051>
CC-MAIN-2022-33
https://itbeginner.net/what-is-linux/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.917921
1,205
2.78125
3
A buckeye in your pocket will bring you good fortune. The buckeye, like a rabbit's foot, a horseshoe, or a four-leaf clover, draws good fortune. The buckeye is smooth and spherical when you first put it in your pocket in the fall, immediately after the nut-like seed has developed. But when spring comes, the buckeye tree produces flowers that are pollinated by bees, so the story goes, thus perpetuating the myth that bringing a buckeye root home will bring you good luck. The first written reference to this tradition appears in A Woman's Own Book of Lucky Signs by Elsie Whitley. In this book, which was first published in 1930, Mrs. Whitley writes that buckeyes "are said to bring good luck because they are hard to find even near homes where people live." She continues that the "tradition says that if you pick one and keep it with you until the spring, then your luck will change for the better." Buckeyes are not actually a fruit but rather a vegetable, belonging to the gourd family. The edible part of the plant is its small, round, blackish-green pod that contains several seeds within it. The word "buckeye" comes from the Iroquois language and means "white oak". According to some sources, the original name for Ohio was "the place where there are plenty of buckeyes". Perhaps for your convenience. For good luck, simply reach into your pocket and massage or spin it between your fingers. If you misplace it, there's typically a spare laying around somewhere. Except, maybe, in the summer of 2014, when the gaming commission began airing a commercial extolling the virtues of buckeyes. The agency that approved the ad claims it lost more than $10 million in less than two hours. One theory behind this odd coincidence is that the loss made news around the world, causing people to wonder if removing buckeyes from their pockets would bring them good fortune. The original ad featured an actor wearing a suit and holding a handkerchief over his mouth as he looked down at what appears to be a wad of cash. He then reaches into his pocket and removes a buckeye. Other versions include an actor wearing a jacket with the right-hand pocket missing. In one version, the actor is standing next to a tree; when he takes out his hand, the root system has grown through the space where his pocket used to be. In another variation, the actor is sitting in a chair with his hand inside his jacket. When he pulls it out, his wedding ring falls off his finger into his open palm. All of these variations were approved by Ohio's advertising agency before they were shown in television commercials that ran from July 23 to August 5, 2014. The first version aired during The Voice broadcast on NBC. Horse chestnuts and buckeyes have both been used as good luck charms since Colonial times. The buckeye earned its name from Native Americans who thought it looked like a deer's eye. Actually, the tree's seed pods are more oval than spherical. Chestnuts are the fruit of the castor bean plant; they are round, with a hard shell covered in prickles. They are considered a symbol of prosperity because they are edible seeds inside a shell. There is some evidence that ancient Romans associated chestnuts with health and happiness. They anointed themselves with oil of chestnuts to help keep their muscles strong. At religious ceremonies, priests would wear clothes embroidered with the image of a chestnut spire - this was to bring them good fortune. In medieval England, people believed that if you threw a chestnut shell after someone, it would bring them bad luck. This is why we throw nuts after someone when wishing them bad luck - it's a way of keeping them away from us. In China, where horses are important to society, they believe that eating horse chestnuts on New Year's Day will bring you wealth all year long. This is why people put out plates of sliced chestnuts on New Year's Eve - they want good luck for the new year. Rabbit's foot and horseshoes are more classic good luck symbols. However, the birds' feces is also seen as "lucky." Because it is uncommon for one of the countless birds in the sky to poop on you, winning the lottery is regarded to have greater odds. When something unusual does happen, people say that it is because the birds have taken pity on them. Birds have been used for navigation since ancient times. They provide information about danger or opportunity that we can't see with our eyes. They help us find our way home after a long journey or show us where food is available far away from any human settlement. Therefore, it isn't surprising that people have tried to use this information for their own benefit. By understanding how birds behave, we can learn to predict future events such as weather conditions or changes within the landscape. This knowledge can then be used to improve our survival rates or choose suitable places to live or work. Birds have been associated with good fortune for as long as people have been able to write down their experiences. In some cultures they even play an important role in rituals related to marriage, death, and other life events. Despite this, there are very few species of bird that are not threatened with extinction. This shows that humans do not need these beautiful animals to survive. Buckeyes will also frequently fall off the tree once ripe, so starting buckeye hunting on the ground is a fantastic place to start. Look for spiky brown bunches hanging from the tree if they aren't on the ground. If they are more green and yellow, it is frequently an indication that the buckeye has not yet matured. Buckeyes were originally called "honies" or "honeys". The word "buckeye" comes from the Indian language and means "little bear". Although today we usually think of the fruit as being like a nut, it is in fact a pod that contains two seeds. It is estimated that only one in every hundred thousand buckeyes becomes mature enough to become a fruit under natural conditions. The flavor of the buckeye is similar to that of an apple but with a slightly sweet taste that some people find addictive. They are rich in vitamin C and potassium, both of which help control blood pressure and heart function. Buckeyes have been found to contain small amounts of calcium and phosphorus. No other food provides such a wide range of nutrients in such a small package. Buckeyes are native to North America and there are several species of trees that produce them. The most common variety is called "red bud", but blue bud, white bud, and blackjack are also available. Lucky buckeyes, also known as horse chestnuts, are derived from the Ohio buckeye (Aesculus glabra) or the horse chestnut tree (Aesculus hippocastanum). Both trees' nut casings are huge, dark brown spheres with a lighter brown blotch. The taste of the meat is similar to that of a pecan; it has a soft texture and sweet flavor. A mature buckeye can grow up to 20 feet tall with thick gray bark and leaves about the same size as those of a maple tree. Under the right conditions, such as deep soil with adequate water and fertilizer, a lucky buckeye can produce nuts annually without pollination from insects or other plants. Buckeyes were once popular in Europe as an edible fruit. Today they are most often used in crafts or as decoration because of their attractive shape and color. Buckeyes are believed to bring good luck to schools, businesses, and athletes alike. They are sold in grocery stores and specialty food shops across the country and worldwide on Internet auction sites like EBay. Buckeyes are also given as gifts on Christmas trees and at Halloween parties. In Pennsylvania, Maryland, and West Virginia, tossing buckeyes into running waters is said to ensure a successful fishing trip. It is believed that if you are unable to find any waters to do this, then no luck is in store for you!
<urn:uuid:2c30fbd0-f86f-49f7-ad1e-59361d22b007>
CC-MAIN-2022-33
https://spiritualwander.com/do-buckeyes-bring-good-luck
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.975313
1,694
3.09375
3
Established in 1931, the Silver Beaver Award is presented by the National Council for distinguished service to young people within a local council. More than 50,000 recognitions have been conferred to date. The awards are bestowed at the annual Council Recognition Dinner. Awarded to registered members of BSA, Silver Beaver Awards are presented to Scouters on the basis of the number of units within a council. Between 1971 and 1974, women Cub Scouters of merit were recognized with the award of the Silver Fawn. After 1974, they joined their male counterparts with the award of the Silver Beaver. Click here to learn more about the Silver Fawn Award.
<urn:uuid:a39af03c-c881-425c-94ae-f95a68536c1e>
CC-MAIN-2022-33
https://www.ctyankee.org/programs-and-activities/resources/awards/silver-beaver-recipients/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.967708
133
1.78125
2
In the wake of the spectacular footage of champion surfer Mick Fanning’s recent shark encounter in Jeffreys Bay, South Africa, and his good fortune in emerging without physical injury, sharks are back on the radar. Many people are probably scratching their heads wondering how we can avoid such dangerous incidents. Some have suggested that “shark attack” is on the rise, and therefore that risk is increasing. But the risk of dangerous interaction with a shark is incredibly low. In fact, a recent study found that in California shark-related fatalities have decreased significantly since 1950. Collecting statistics on shark incidents is more fraught than it might seem. The Global and Australian Shark Attack Files collect data on all reported interactions. But “risk” is fiendishly difficult to calculate because we don’t have good data on numbers of people using the ocean or types of activities people undertake. Terminology adds to the confusion: “shark attack” is highly emotive and often misleading. More precise terms like “sighting”, “encounter” and “bite” do more to describe an interaction, develop public understanding of shark behaviour, and reduce the chance of reaction motivated by fear. Learning from ocean-users Our research recently published in the journal Marine Policy (and previously in Australian Geographer) focuses on the experiences and attitudes of the people most likely to encounter sharks; that is, ocean users. We have talked with surfers, ocean swimmers, paddlers, divers, fishers, and others who use the ocean regularly for recreation, professional or volunteer purposes. Two findings strike most: Almost 70% of the 557 people surveyed have encountered or sighted a shark while undertaking ocean-based activities. This could be a shark of any species, and includes those listed in Australia as potentially threatening to humans, namely great white, tiger and bull sharks. The lesson here is that most of the time people and sharks co-exist without ill effect. The most strongly supported strategies for managing risks associated with shark encounter are those that involve people adapting their behaviour. In particular, improving public education, and encouraging ocean users to understand and accept risks associated with entering the ocean. In contrast, the most strongly opposed strategies are those that involve killing sharks. Efforts to manage shark-related hazards by killing sharks, through lethal strategies such as the baited drumlines rolled out in Western Australia last year and the shark nets currently under review in New South Wales, have been met with loud protest. The time seems ripe to reassess how we understand and manage our relationships with sharks. Although frightening, the footage of Fanning at Jeffreys Bay is a reminder that sharks are present in the oceans, and that the vast majority of interactions between people and sharks end without fatality or injury. As the latest State of the Climate report reaffirms 2014 to be the “the hottest on record”, the NSW Liberal Party is pressing ahead with plans for a “Carnival of Coal” in August. The party’s upper house whip, Peter Phelps, has appealed to members to download a sticker for MP office doors in support of the upcoming carbon love-in. It says: I loved carbon before it was coal. The Liberal paleo-love for coal, which Tony Abbott has declared “good for humanity”, is at least a point of differentiation with Labor. Labor does not promote such slogans at all – even if, in Victoria, the Andrews Labor government is still issuing coal exploration licences. Both parties are capable of romancing the coal industry. But Liberal parties around the country have had much more success in convincing voters that either coal is more important than climate, or have decided that – with a population drip-fed on attention-deficit-consumerism and its reality television advertorials – their connection can be comfortably sublimated. Whatever its form, the love for coal in Australia is going to end badly, like all relationships based on fantasy. To slightly misquote a 19th-century philosopher: the demand to give up the illusion that coal is good for humanity is the demand to give up a condition which needs such an illusion. The condition I am referring to is the way our half-formed social democracy has become so captive to the ugliest form of corporate-servicing statism. It is not that the state has completely merged with corporate interests. Australia still has incredibly strong and progressive civic institutions such as its public broadcaster, its schools, universities, bureaus, museums and aspects of the legal system that do not serve capital’s interests. It is that our governments have become servile – not to voters, but to a conjunction of multinational mining, energy and media interests, who have as their dating agencies the far-right silos of the capitalist class, such as the Institute for Public Affairs, which do not disclose their corporate donors. Many believe, including perhaps Abbott himself, that he retains his power base at the pleasure of an ageing octogenarian who is well known for obtaining amusement from playing the Freudian Fort-Da game with entire democracies – the power to give and take away power – as long as he has also received something in return. The same newspaper group that managed to squeeze a “toxic” “carbon tax” through the consciousness of millions of tabloid readers by means of slogan and cartoon did so when it was threatened by the Australian Tax Office (ATO) with having to repay almost A$900 million it had received on the eve of the last federal election. The infamous “Kick this Mob Out” election blitzkrieg on Labor that started on August 5, 2013, was launched precisely at decision time for the ATO to appeal the Federal Court ruling on the windfall payout News Corp reportedly received by titanic-scale profit-shifting. Global profit-shifting activities are routine for multinational empires such as Murdoch’s. But, not all have the ability to pressure governments at election times. And it is clear that at least the two major political parties believe they need a media mogul to gain office. The examples are quite grotesque. Fuel rebate subsidies that mining companies receive run at A$2.2 billion per year. Meanwhile, the Clean Energy Finance Corporation (CEFC) is asked to cancel its A$2.1 billion in subsidies directed exclusively to windfarms – which have the ability to hurt coal. Before it moved to neuter the CEFC, the Coalition has proposed what has been dubbed the ”Dirty Energy Finance Corporation” for Northern Australia. It will bewilderingly make up to A$5 billion available to subsidise infrastructure projects in northern Australia and Queensland in particular. A source has suggested to me that the fund is actually an elaborate financial smokescreen to helping out the coal mines in the Galilee basin – particularly the Adani Enterprises mine, but also the GVK Alpha Coalmine. GVK Alpha, the largest coal mine in Australia, was approved 2 months after the Coalition assumed power, is part-owned by Gina Rinehart – and also stands to benefit from billions in taxpayer-funded subsidies. Ms Rhinehart attracted satire in 2011 for flying liberal MPs to India to attend the wedding of the granddaughter of mine co-owner GV Krishna. With the coal price diving worldwide, the mines – are unlikely to be economically viable without a huge subsidy. They might also surpass the viability threshold if they were able to sell the coal to a nearby newly proposed coal-fired power station that has been endorsed by Abbott personally. However, competition from renewable energy company Windlab for an adjacent 1.2 mw combined solar and wind farm would be an enormous threat to Alpha and Adani. It is pledging to undercut the price of the coal station by $30 per megawatt hour. Time for my readers to draw a diagram to figure out which proposal will get funded. A diagram might picture the coincidence that the CEFC was directed to cease subsidising windfarms – for which it actually returns a profit to Australian taxpayers – just as it was realised the Windlab proposal posed a threat to the coal-fired power station. It is worth considering that, according to Bill McKibben from 350.org, the Galilee basin alone has so much coal that if it is all burnt, it would take the world 30% of the way to getting to 2 degrees. You couldn’t invent a more tragic case study on how destructive the Abbott government is on climate. But then there is Direct Action. This is a government marketing exercise that disguises a further A$2.5 billion giveaway to corporate Australia that works with targets so small as to guarantee Australia’s status as having fallen off the climate action map. Detailed analysis shows that Direct Action won’t even meet its miniscule targets. It has led to a demonstrable increase in Australias Co2 emissions since the carbon tax was repealed, according to the government’s own figures. Given the Abbott government’s ongoing love affair with coal, it is little wonder that Australia was publicly scrutinised at climate talks held in Bonn last month about the impact of its domestic policies. The UN talks, attended by representatives of 190 countries, were an important stepping stone to the much-anticipated Paris summit to be held in December. While the Coalition’s reckless disregard for addressing climate change may not get scrutiny by the tabloid media in Australia, it certainly will in Paris. Our solar system’s shadowy ninth (dwarf) planet was the subject of furious speculation and a frantic search for almost a century before it was finally discovered by Clyde Tombaugh in 1930. And remarkably, Pluto’s reality was deduced using a heady array of reasoning, observation and no small amount of imagination. The 18th and 19th centuries were thick with astronomical discoveries; not least were the planets Uranus and Neptune. The latter, in particular, was predicted by comparing observed perturbations in the orbit of Uranus to what was expected. This suggested the gravitational influence of another nearby planet. John Couch Adams and Urbain-Jean-Joseph Le Verrier calculated the orbit of Neptune by comparing these perturbations in Uranus’ orbit to those of the other seven known planets. Neptune was hence discovered in the predicted location in 1846. Soon after this, French physicist Jacques Babinet proposed the existence of an even more distant planet, which he named Hyperion. Le Verrier wasn’t convinced, stating that there was “absolutely nothing by which one could determine the position of another planet, barring hypotheses in which imagination played too large a part”. Despite that lack of evidence for perturbations in Neptune’s orbit, many predicted the existence of a ninth planet over the next 80 years. Frenchman Gabriel Dallet called it “Planet X” in 1892 and 1901, and the famed American astronomer William Henry Pickering proposed “Planet O” in 1908. Comets, the law of vegetable growth and a conspiracy In addition to the perturbations of known planets there were other hypotheses that foretold unknown bodies beyond Neptune. In the 19th century, it was understood that many comets had highly elliptical orbits that swung past the outer planets at their farthest points from the sun. It was believed that these planets diverted the comets into their eccentric orbits. In 1879 the French astronomer Camille Flammarion predicted a planet with an orbit 24 times that of Earth’s based on comet measurements. Using the same method, George Forbes, professor of astronomy at Glasgow University, confidently announced in 1880 that “two planets exist beyond the orbit of Neptune, one about 100 times, the other about 300 times the distance of the earth from the sun”. Depending on how the calculations were done, the results predicted anything from one to four planets. Other predictions were based on what can be described as numerical curiosities or speculations. One of these was the now-discredited Bode’s law, a sort of Fibonacci sequence for planets. The American mathematician Benjamin Pierce was not a fan, claiming that “fractions which express the law of vegetable growth” were more accurate than Bode’s law. As well as these earnest astronomers, the trans-Neptunian planet idea attracted cranks and visionaries. An interesting contribution came in 1875 from Count Oskar Reichenbach, who accused Le Verrier and Adams of conspiring to conceal the locations of two trans-Neptunian planets. The early photographic searches Theories and calculations were all well and good, but many hoped to actually see the hitherto invisible planet(s). From the late 1800s new powerful telescopes equipped with the latest dry-plate photographic technologies were employed to search for undiscovered planets. Amateur astronomers such Isaac Roberts and William Edwards Wilson used the predictions of George Forbes to search the skies, taking many hundreds of photographic plates in the process. They found no lurking trans-Neptunian planets. The professionals fared no better. Edward Charles Pickering, director of the Harvard Observatory and William’s brother, spent around ten years from 1900 searching using his own data and those of earlier astronomers such as Dallet, all to no avail. In 1906 a new approach was introduced by the veteran astronomer Percival Lowell. Although best known to us for his (mistaken) observations of canals on Mars, Lowell bought a new rigour to analysing the orbit of Uranus based on observational data from 1750 to 1903. With these improved calculations, hope for a visual fix on the elusive planet was renewed. With the aid of the brothers Vesto and Earl Slipher, Lowell spend the rest of his life scanning photographic plates with a hand magnifier and finally with a Zeiss blink comparator. In September 1919 William Pickering kicked off another search for “Planet O” based on deviations in Neptune’s orbit. Milton L Humason, from the Mount Wilson Observatory in California, started a search based on these new predictions as well as Lowell’s and Pickering’s 1909 predictions. This search again failed to find any new planets. Pickering continued to publish articles on hypothetical planets but by 1928 he had become discouraged. This was grim, unglamorous work. Each plate was exposed for an hour or more, with Tombaugh adjusting the telescope precisely to keep pace with the slowly turning sky. Today a computer would make the comparisons, but in 1929 they were made by eye, manually flicking between two images. Stars would remain motionless while other bodies would seem to jump between views. Some images would have 40,000 stars, others up to 1 million. Nearly a year had elapsed when, on February 18, 1930, two images fifteen times fainter than Neptune were found among 160,000 stars on the photographic plates. The discovery was confirmed by examining earlier images. On February 20 the planet was observed to be yellowish, rather than bluish like Neptune. The new planet had revealed its true colours at last. Announcing a discovery Slipher waited until March 13 to announce the discovery. This was both Lowell’s birthday and the anniversary date of the discovery of Uranus. The announcement set off a worldwide rush to observe and photograph the new planet. Now that astronomers, amateur and professional alike, knew what they were looking for, it turned out that Pluto had been hiding in plain view. Re-examination of Humanson’s plates showed four images of Pluto from his 1919 survey, and there were many others. On March 14, an Oxford librarian read the news to his 11-year old granddaughter Venetia Burney, who suggested the name Pluto. It was also suggested independently in a letter by William Henry Pickering. To complete the circle, some of Clyde Tombaugh’s remains are in a canister attached to the New Horizons spacecraft. Most people alive today would not remember a universe without Pluto. And from 2015, its patterned surface will enter our visual vocabulary of the planets. Once seen, it can never again be unseen. Planet X, welcome to our world.
<urn:uuid:a4d4192b-d622-48ea-a7fa-6c271f5acaf0>
CC-MAIN-2022-33
https://kevinswildside.wordpress.com/2015/07/20/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.965276
3,361
3.1875
3
MORE than 900 bodies have so far been dug up in Malaga in what is, so far, Spain’s largest civil war mass grave. Last month, investigators announced that they have begun looking for at least six more burial sites at the San Rafael cemetery in Malaga city. Over a dozen volunteers have already found 12 communal graves within the cemetery, which was formerly a sweet potato plant. But last week the team of investigators found a document that mentions “grave number 18” so further digging continued. Among victims of Franco’s firing squads during the civil war, they have found a larger than normal percentage of youths and women. Alarmingly, this also includes a number of babies and small children. According to the chief of the local Association against Silence and the Recovery of Historical Memory, Francisco Espinosa, 50 children’s remains have so far been exhumed. “But it is yet impossible to confirm whether they were shot, or perhaps died from an illness such as typhoid,” he said. New bodies are found each week and most correspond to paperwork of those shot in 1937, as Franco’s forces finally seized the city from its Republican defenders. It is understood that at least 4,100 bodies are buried at the site on the outskirts of Malaga. The work, organised by the Junta de Andalucia regional government, is being carried out with collaboration with Malaga University. So far, 300 mass graves have been found across Andalucia, of which 49 are in Malaga. One Malaga-raised woman, Prioleau Huellin, 69, who was evacuated to the UK during the war, said such graves were “no surprise.” “Everybody knew there were a number of places in the city where people were taken out and shot, we just didn’t talk about it. “My mother used to say; ‘leave the quiet alone,’ and we got on with our lives.” The former Málaga airport announcer, who lives close to the parador, continued: “We always knew the cemetary as La Batata – the sweet potato factory. It was on the outskirts of town and it was common knowledge that people were shot there.” She continued: “My grandfather was shot in another place on the road up towards the Montes de Málaga. We never found his body and he was buried in a similar mass grave. “It is a tragic part of our history.”
<urn:uuid:5b454360-f734-4cd6-8cf8-4ce66818cc1d>
CC-MAIN-2022-33
https://www.theolivepress.es/spain-news/2007/09/04/malaga-mass-graves-grow/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.98168
539
2.53125
3
The population development of Brus as well as related information and services (Wikipedia, Google, images). Source: Statistical Office of the Republic of Serbia (web). Explanation: The 2011 census was affected by the boycott of the Albanians in the municipalities Preševo and Bujanovac (both located in the District of Pčinja) and partly affected in Medveđa (District of Jablanica). Further information about the population structure: |Gender (E 2020)| |Age Groups (E 2020)| |Age Distribution (E 2020)| |Country of Birth (C 2011)| |Religion (C 2011)|
<urn:uuid:3f4467f8-dc1d-4b03-9344-3647ce422183>
CC-MAIN-2022-33
https://citypopulation.de/en/serbia/admin/rasina/M15093__brus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.682391
497
2.140625
2
The cloud has come a long way since the days of storing your data on a bunch of servers scattered around the world. Today, with the rise of virtualization, the cloud is a new term for the same concept: storing your data on one server, but instead of storing it in a physical space, it is kept somewhere your computer can see. Think of it as a database for all the functions on your computer, which makes it easy to do tasks such as keeping track of your files or backing up your computer. Over the past several years, there have been many new ways to look at what cloud computing can do for your business. Cloud computing can be helpful in many ways, such as helping manage bandwidth and storage, improving security, and enabling scalability. However, many new options are now available, which can make choosing a cloud-based server difficult. Here is some cloud-based server that you should use. • IBM Cloud • Amazon Web Services • Oracle Cloud Infrastructure Cloud-based servers are growing in popularity for a variety of reasons. Cloud-based servers allow for virtual infrastructure managed rather than purchased and then maintained, eliminating the headache of managing servers. In addition, they are easy to maintain and can be scaled up or down as needed. Cloud computing is all the rage these days, and it can make an enormous difference in your organization. The biggest benefits come to companies looking to break into new markets, as it’s easier to market a service that is always available, available worldwide, and continually updated. In addition, the ability to develop and quickly deploy a new service is another benefit to cloud-based servers. When deciding to open up a server to the world, you have several choices. You can choose a cloud-based server, a service that runs on top of the internet and uses internet protocols with a server cluster. You can choose a virtual machine server based on the standard for running computers on a server. You can choose a bare-metal server, which has the bare minimum resources of a server and is not based on the standard for running computers on a server.
<urn:uuid:3df04ce8-29f9-435b-84e2-b8ee57475f04>
CC-MAIN-2022-33
https://xenresources.com/category/servers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.950479
431
2.734375
3
Good Day to you, sweet friends. I for one, love the old hymns, and think they have a lot to say to us in this new, fast paced world of the love of generations gone by for our Lord and King. Some of the words are amazing, and so perfect for certain situations, as is this one today as SW MN is bracing for 15 inches of snow and howling winds that will shut down this area for days right around the Christmas holidays. See what you think of this beautiful hymn written in 1900 by a woman named Frances Whitmarsh While: All Beautiful the March of Days….. All beautiful the march of days, as seasons come and go; the Hand that shaped the rose hath wrought the crystal of the snow; hath sent the hoary frost of heaven, the flowing waters sealed, and laid a silent loveliness on hill and wood and field. O’er white expanses sparkling pure the radiant morn unfolds; the solemn splendors of the night burn brighter than the cold; Life mounts in every throbbing vein, love deepens round the hearth, and clearer sounds the angel hymn “Good Will to Men on Earth”. O Thou from Whose unfathomed law the year in beauty flows, Thyself the vision passing by in crystal and in rose, day unto day doth utter speech, and night to night proclaim, in ever changing words of light the wonder of Thy name.
<urn:uuid:6a3cbd01-d8d8-44cf-941c-76d5dffb75c8>
CC-MAIN-2022-33
https://thewelcominghouseblog.com/all-beautiful-the-march-of-days/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.918734
313
1.71875
2
A stunned Leeds father has spoken out over his daughter and her classmates allegedly walking along train tracks for school PE lessons. When he asked how she hurt her knee, Geoff was shocked by his 12-year-old daughter's response. Speaking to LeedsLive , Geoff said: "She told me that for her PE lesson, her and her classmates had left the school grounds to walk along the railway lines at Middleton railway. "Apparently they walked up to a wooded area and walked back. "I could not believe what I was hearing. Why on earth are they leaving the school grounds for PE and why are they teaching children to walk up a railway line?!" After speaking to other student's parents, Geoff claims they have confirmed his daughter's story. In the video above, Geoff's daughter claims that when she hurt her knee, the teacher told her to 'be careful as her as it's un-level on the railway tracks, which are only used during weekends. He said: "If it's not level then why are they making kids walk on it - why would they make kids walk on railway tracks anyway?!" Cockburn John Charles Academy told LeedsLive that the school is currently investigating the issue and is unable to comment at this stage.
<urn:uuid:05be334d-4ef2-42a4-b9f0-94c6f37c9f9b>
CC-MAIN-2022-33
https://www.leeds-live.co.uk/news/leeds-news/stunned-leeds-dad-hits-out-20200220
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.992322
258
1.820313
2
Device drivers allow your devices to work properly on your computer. And the latest driver keeps your TP-Link Bluetooth adapter in great condition while making the most out of the hardware. There are two ways you can install or update the TP-Link Bluetooth adapter driver: Option 1 – Automatically (Recommended) – You don’t need to be tech-savvy to keep your drivers up to date. All you need are a few clicks and a computer with Internet. Option 2 – Manually – This requires some computer knowledge. You need to visit the official website and search for your model. Then download the wizard that needs additional configuration during installation. Option 1: Install or update your driver automatically If you don’t have the time, patience or computer skills to update your Bluetooth driver manually, you can, instead, do it automatically with Driver Easy. Driver Easy will automatically recognize your system and find the correct drivers for your exact Bluetooth adapter, and your Windows version, and it will download and install them correctly: - Download and install Driver Easy. - Run Driver Easy and click the Scan Now button. Driver Easy will then scan your computer and detect any problem drivers. - Click Update All to automatically download and install the correct version of all the drivers that are missing or out of date on your system. (This requires the Pro version – you’ll be prompted to upgrade when you click Update All. If you don’t want to pay for the Pro version, you can still download and install all the drivers you need with the free version; you just have to download them one at a time, and manually install them, the normal Windows way.) Once you’ve updated all your drivers, restart your PC for it to take full effect. Option 2: Install or update your driver manually If you’re familiar with computer hardware, you can use these steps to install or update your TP-Link Bluetooth adapter driver manually: Windows 7 or XP - First you need to visit the TP-Link official website. - In the top menu, click the magnifier icon. - Click the input area and type your device model. Then press Enter. Here we’ll use UB400 as an example. - In the search results, find your device and click Support. - Click Driver. Then click the download link in the form below. - Once downloaded, open the installer and follow the on-screen instructions to install or update the driver. Windows 11, 10 or 8 - On your keyboard, press Win+R (the Windows key and the r key) to invoke the Run dialog. Type or paste devmgmt.msc and click OK. - In the pop-up window, click Bluetooth to expand the list. Right-click your Bluetooth adapter and select Update driver. If Windows can’t find the latest driver for your Bluetooth adapter, check out the automatic update method below. Hopefully, this post helped you get the latest driver for your TP-Link Bluetooth adapter. If you have any ideas or questions, feel free to tell us at the comment section below.
<urn:uuid:c9a80bfe-9b99-414f-a44a-2e19432a4116>
CC-MAIN-2022-33
https://solved.brokehatre.com/knowledge/tp-link-bluetooth-adapter-driver-download-update/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.829102
651
1.554688
2
Download a PDF copy of this management sheet: [download_button url=”/wp-content/uploads/2015/08/Mgmt-tallgrass.grazing.pdf” bulletin_id=”Profitable Tall Grass Grazing”] For several years, we have been urging our grazing clients to let their grass pastures get a little taller before turning in and not graze them shorter than four to six inches. This has a number of benefits to the grass plant that make it more productive. With most plants, root mass mirrors vegetative growth; therefore, taller plants have deeper roots which access more moisture and nutrients. Maintaining a leaf canopy preserves soil moisture and keeps the soil surface cooler. These factors are critical to the productivity of cool season grasses in the summer. It is equally important to remember that grass plants store energy reserves in the lower, leafless part of the stem. As grass plants increase in height, this area also extends, storing greater reserves. Completely defoliating a grass plant (either by overgrazing or mowing too low) reduces its energy reserves, destroys its photosynthesis factory, and causes many deeper roots to die off. This stress together with adverse weather or inadequate fertility result in slow recovery, prolonged dormancy, and possible stand loss. To maximize the yield and longevity of a grass pasture, it is critical to adopt a taller grass management strategy. Grazing height also influences clover growth. Having a highly productive white clover, like Alice, in a pasture fixes a significant amount of nitrogen for the grass; however, overgrazing a mixed pasture in the summer often leads to an extreme proliferation of the clover, which under certain circumstances can cause bloat. Generally, dairy cattle fed on pasture are considered to have considerably fewer health issues than confined cows, yet the high protein levels in less mature grass can cause health problems related to elevated Blood urea Nitrogen (BUN) and Milk Urea Nitrogen (MUN). While many producers and nutritionists choose to balance the diet of cows on high protein pasture with grain, dry hay, or silage, there is another method – tall grass grazing. Improved cool season forage grasses that are 10-18 inches tall, but have not headed, have a more ideal protein level (16-20%) together with two to four times the tonnage compared with the same stand grazed at six to ten inches tall. Palatability, digestibility, and energy content can be maintained at high levels with adequate nutrition. To balance a feed ration for animals on high quality pasture without adding grain, hay, or silage, it is necessary to allow the pasture to mature, but not head. So if tall grass grazing is better for the grass and better for the cow, why isn’t everybody doing it? Profitable tall grass grazing requires three things: - Late-maturing, forage genetics that are capable of remaining vegetative for up to 35 days; - Healthy, biologically active soils with balanced fertility that will support “tall” vegetative growth; - Foliar fertilization to maintain optimal growth rate, nutritional quality, and slow down the senescence or hardening-off of mature plants. In addition, management techniques such as “Mob” grazing (ultra high stocking rate and moving the break wire often) are essential to maximize consumption and minimize trampling loss in a tall grass pasture. While beginning to adopt these principles will likely benefit every grass farmer, not every farm is ready to support it. We recommend working with your local FSM dealer to develop a systematic plan for building your soil, improving your grass genetics, and fertilizing your forages to maximize high quality production. Drawn from the combined experiences of Kevin Fowler (Fowler Seed Marketing), Gary Campbell (Agri-Energy Resources), and Reggie Destree (Dramm Fish)
<urn:uuid:e527dfa5-5b04-44b8-9965-d4a17e6c7ff1>
CC-MAIN-2022-33
http://fowlerseed.com/profitable-tall-grass-grazing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00264.warc.gz
en
0.918218
810
2.671875
3
What is the Difference Between cliché and stereotype? The words cliché and stereotype have a good deal in common. Both come from French, both were originally printers’ terms, and both have come to take on somewhat negative meanings in modern use. Their original meanings are essentially synonymous, referring to printing blocks from which numerous prints could be made. In fact, cliché means stereotype in French. Their modern meanings, however, are quite distinct. Cliché is today overwhelmingly encountered in reference to something hackneyed, such as an overly familiar or commonplace phrase, theme, or expression. Stereotype is most frequently now employed to refer to an often unfair and untrue belief that many people have about all people or things with a particular characteristic. Examples of cliché in a Sentence Non-Amateur writers avoid industriously the word Orwellian, because even years ago it became an overused and underdefined cliché.— William F. Buckley, Jr., National Review, 1 May 2000FILM "I Like It Like That": It has every cliché of the 'hood genre, elevated by a strong woman protagonist and a few comic moments.— Bell Hooks, Ms., September/October 1994I'd never been out with a model before, so I hadn't even bargained on the cliché of the rock star and the model as being part of my life.— David Bowie, quoted in Rolling Stone, 10 June 1993Time has been the best healer for the pain of loss, just as the old cliché says, but letting go is still difficult.— Lynn McAndrews, My Father Forgets, 1990… don't seek the ultimate, general solution; find a corner that can be defined precisely and, as our new cliché proclaims, go for it.— Stephen Jay Gould, Natural History, July 1987 a speech filled with clichés about “finding your way” and “keeping the faith” The macho cop of Hollywood movies has become a cliché. See More Recent Examples on the WebNetflix El is being bullied by a walking cliche of a Mean Girl (Elodie Grace Orkin). Jennifer Ouellette, Ars Technica, 17 July 2022 Even as Paul’s life changes mid-novel, Wayne patronizes his protagonist, reducing him to a cultural cliche which, while rooted in truth, stays flat on the page. Hamilton Cain, Washington Post, 12 July 2022 Embracing foreign policy as an attempt to jumpstart a presidency mired in domestic discord is practically a cliche at this point—Richard Nixon, Bill Clinton, and Donald Trump have all done it. Alex Shephard, The New Republic, 21 July 2022 New Jersey politics are so rough and tumble that jokes about its crooked politicians are a cliche. Mark Shanahan, BostonGlobe.com, 22 June 2022 So what was your favorite L.A. cliche during the time here that inspired the song? Steve Baltin, Forbes, 28 June 2022 The box was like this cliche of what prom is supposed to look like in the catalogues and movies. Janay Kingsberry, Washington Post, 21 May 2022 Every ending is a new beginning, as the consoling cliche goes; but in this book, every mention of new beginnings is immediately qualified and drained of any potential for hope. Washington Post, 4 Nov. 2021 But as the old cliche goes, fan is just short for fanatic. Jerry Beach, Forbes, 30 Aug. 2021 See More These example sentences are selected automatically from various online news sources to reflect current usage of the word 'cliché.' Views expressed in the examples do not represent the opinion of Merriam-Webster or its editors. Send us feedback.
<urn:uuid:0cea884b-aca0-490a-9486-4b03d7c08b17>
CC-MAIN-2022-33
https://www.merriam-webster.com/dictionary/cliche
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.948015
775
3.171875
3
ORIGINAL RESEARCH article Sec. Infectious Agents and Disease IL-1R and MyD88 Contribute to the Absence of a Bacterial Microbiome on the Healthy Murine Cornea - 1Vision Science Program, University of California, Berkeley, Berkeley, CA, United States - 2School of Optometry, University of California, Berkeley, Berkeley, CA, United States - 3College of Chemistry, University of California, Berkeley, Berkeley, CA, United States - 4College of Pharmacy, Touro University California, Vallejo, CA, United States - 5Department of Molecular and Cell Biology, University of California, Berkeley, Berkeley, CA, United States - 6Howard Hughes Medical Institute, University of California, Berkeley, Berkeley, CA, United States - 7Graduate Groups in Vision Sciences, Microbiology, and Infectious Diseases & Immunity, University of California, Berkeley, Berkeley, CA, United States Microbial communities are important for the health of mucosal tissues. Traditional culture and gene sequencing have demonstrated bacterial populations on the conjunctiva. However, it remains unclear if the cornea, a transparent tissue critical for vision, also hosts a microbiome. Corneas of wild-type, IL-1R (-/-) and MyD88 (-/-) C57BL/6 mice were imaged after labeling with alkyne-functionalized D-alanine (alkDala), a probe that only incorporates into the peptidoglycan of metabolically active bacteria. Fluorescence in situ hybridization (FISH) was also used to detect viable bacteria. AlkDala labeling was rarely observed on healthy corneas. In contrast, adjacent conjunctivae harbored filamentous alkDala-positive forms, that also labeled with DMN-Tre, a Corynebacterineae-specific probe. FISH confirmed the absence of viable bacteria on healthy corneas, which also cleared deliberately inoculated bacteria within 24 h. Differing from wild-type, both IL-1R (-/-) and MyD88 (-/-) corneas harbored numerous alkDala-labeled bacteria, a result abrogated by topical antibiotics. IL-1R (-/-) corneas were impermeable to fluorescein suggesting that bacterial colonization did not reflect decreased epithelial integrity. Thus, in contrast to the conjunctiva and other mucosal surfaces, healthy murine corneas host very few viable bacteria, and this constitutive state requires the IL-1R and MyD88. While this study cannot exclude the presence of fungi, viruses, or non-viable or dormant bacteria, the data suggest that healthy murine corneas do not host a resident viable bacterial community, or microbiome, the absence of which could have important implications for understanding the homeostasis of this tissue. Diverse communities of resident microorganisms on host tissues (microbiomes) play important roles in maintaining health and development of a functional immune system (Turnbaugh et al., 2007; Consortium, 2012; Gevers et al., 2012; Thaiss et al., 2016; Blacher et al., 2017). Furthermore, it is becoming increasingly evident that alterations in abundance and diversity of these bacterial constituents are associated with inflammation and disease (Frank et al., 2007; Koeth et al., 2013; Scher et al., 2013; Corrêa et al., 2017; Halfvarson et al., 2017). Much work has been done to decipher the role of microorganisms within the nasal and respiratory tract, oral cavity, urogenital tract, gut and skin (Gillan, 2008; Grice et al., 2009; Ravel et al., 2011; Consortium, 2012; Liu et al., 2015; Mark-Welch et al., 2016). However, the location and role of bacteria that normally colonize the ocular surface, and the implications for ocular health and immunity, is only beginning to be appreciated (Doan et al., 2016; Kugadas et al., 2016). Standard microbiological culture methods and molecular techniques have both been used to demonstrate a conjunctival microbiome. Culture methods revealed small numbers and infrequent growth of bacteria on the human conjunctiva, typically ∼100 or less colony-forming units (CFU) per swab (Fleiszig and Efron, 1992; Willcox, 2013). However, 16S rRNA gene sequencing suggested far more bacterial genera were present on the conjunctiva than indicated by culture results (Graham et al., 2007; Dong et al., 2011; Doan et al., 2016; Ozkan et al., 2017). Still, significantly fewer bacteria are thought to inhabit the conjunctiva compared to other mucosal surfaces, e.g., ∼0.06 bacteria per cell in the human conjunctiva versus 12 and 16 bacteria per cell in the oral cavity or on the skin, respectively (Doan et al., 2016). Culture and sequencing methodologies used to demonstrate conjunctival microflora each have limitations. Nucleic acid sequencing does not equate to viable bacteria, and is therefore prone to false-positive results, while culture methods can miss viable microbes, e.g., bacteria with fastidious nutritional requirements or those undergoing stress responses, thereby prone to false-negative results (Oliver, 2005; Epstein, 2013; Kawai et al., 2015). Moreover, the lower biomass at the ocular surface can also lead to false-positive results due to contaminants from the environment or reagents (Schabereiter-Gurtner et al., 2001; Salter et al., 2014). Importantly, neither culture nor sequencing provides spatial information on bacterial location at the ocular surface. To that end, scientific publications often do not appear to distinguish the cornea from conjunctiva in reporting the “ocular surface” microbiome (Dong et al., 2011; Lu and Liu, 2016; Ozkan et al., 2017). Thus, our understanding of the bacterial landscape on the eye remains unresolved. The cornea of the ocular surface is critical to vision, and unusual among body surfaces in its remarkable resistance to infection. The cornea is protected against colonization by pathogenic bacteria by multiple defenses which were originally thought to be due to blinking, and the antimicrobial and aggregative components of tear fluid (Masinick et al., 1997; Kwong et al., 2007; Evans and Fleiszig, 2013). It is now known that tear fluid plays much more complex roles and that epithelial-expressed mucins, tight junctions and antimicrobial peptides are also involved (McNamara et al., 1999; Yi et al., 2000; Blalock et al., 2007; Kwong et al., 2007; Augustin et al., 2011; Mun et al., 2011; Tam et al., 2012; Evans and Fleiszig, 2013; Li et al., 2017). Indeed, the opportunistic bacterial pathogen Pseudomonas aeruginosa will not colonize the healthy corneal surface. Susceptibility to bacterial adhesion requires the introduction of some form of compromise to the surface epithelium (Alarcon et al., 2011) or to innate defenses such as MyD88-deficiency (Tam et al., 2011). Deliberate inoculation of healthy corneas with P. aeruginosa results in rapid clearance of the bacteria without colonization or pathology (Mun et al., 2009; Augustin et al., 2011). Thus, the murine cornea appears inhospitable to P. aeruginosa, a bacterium unusual in its capacity to survive in a diverse array of conditions. This could have led to an assumption among some researchers in the field that the cornea is inhospitable to bacteria in general, albeit a notion not actually proven. The aim of this study was to determine if the healthy mouse cornea hosts a resident bacterial microbiome, and whether it is able to clear other deliberately inoculated bacteria as effectively as P. aeruginosa. We utilized a novel approach to overcome obstacles and limitations of traditional culture and sequencing methodologies. An alkDala probe was used to label only viable, metabolically active, bacteria in situ. This reagent utilizes the ability of peptidoglycan metabolic enzymes to take up natural and unnatural D-amino acid substrates to insert into the stem peptides of cell wall peptidoglycan if bacteria are metabolically active (Siegrist et al., 2013, 2015; Shieh et al., 2014). Bacteria that have incorporated the probe are then detected using an azide-fluorophore via copper-catalyzed click chemistry, and imaged by fluorescence microscopy (Siegrist et al., 2013). AlkDala labeling has previously only been used to label bacteria in vitro (Siegrist et al., 2013, 2015; Shieh et al., 2014). FISH of a universal 16S rRNA gene probe was also used to detect viable bacteria for which peptidoglycan metabolism was absent, inactive, or at a very low level (Vaishnava et al., 2011; Mark-Welch et al., 2016). Results showed that healthy murine corneas are broadly inhospitable to bacteria, a constitutive state requiring the IL-1R and MyD88, and that consequently they lack a resident viable bacterial community, or microbiome. Materials and Methods Pseudomonas aeruginosa (strain PAO1), Staphylococcus aureus (isolated from a human corneal infection), and a Coagulase-negative Staphylococcus (CNS) species (sp.) isolated from a mouse eyelid (this laboratory) were used in the clearance experiments. CNS sp. were confirmed using standard biochemical diagnostic tests. P. aeruginosa strain PAO1 expressing d-Tomato on plasmid p67T1 (PAO1-dtom) was used for experiments to validate bacterial labeling methods (Singer et al., 2010). Inocula were prepared from overnight cultures grown on TSA plates at 37°C for ∼16 h before suspension in phosphate-buffered saline (PBS) to a concentration of ∼1010 or ∼1011 CFU/mL. PAO1-dtom was grown on TSA supplemented with carbenicillin (400 μg/mL). Viable counts of bacterial suspensions were performed by serial dilution in PBS as needed (typically from 10-6 to 10-9) and plating in triplicate onto TSA plates, followed by incubation for ∼18 h at 37oC to determine CFU. Bacterial Isolation and Identification To culture bacteria from the corneas of wild-type and IL-1R (-/-) mice, the corneal epithelium was collected using the Algerbrush II, placed in 500 μL 0.25% Triton + PBS, then vortexed. An aliquot (100 μL) of lysate was inoculated onto TSA, blood agar, or chocolate agar and incubated at 37°C in aerobic and anaerobic conditions for up to 7 days. Isolated bacterial colonies were identified by direct colony PCR of the 16S ribosomal RNA gene using universal primers P11P (5′-GAGGAAGGTGGGGATGACGT-3′ and P13P (5′-AGGCCCGGGAACGTATTCAC-3′ (Widjojoatmodjo et al., 1994). Reaction mixes (50 μL) were set up as follows: 1X Q5 Reaction Buffer (New England BioLabs), 1X Q5 High GC Enhancer, 200 μM dNTPs, 0.5 μM Forward Primer, 0.5 μM Reverse Primer, and 0.02 U/μL Q5 High-Fidelity DNA Polymerase. A sterile toothpick was used to touch a bacterial colony on an agar plate and inserted directly into the PCR reaction tube. The reaction mixtures were subjected to the following thermal cycling sequence on a Bio-Rad Thermal Cycler: 98°C for 3 min followed by 30 cycles of 98°C for 10 sec, 63°C for 20 sec, 72°C for 45 s, followed by a final extension of 72°C for 2 min. Molecular grade water was included as a negative control, and a known strain of P. aeruginosa (PAO1) used as a positive control. Following amplification, samples were examined by electrophoresis in 1% agarose gels in 1× TBE buffer. Amplicons were purified using PureLinkTM PCR Purification Kit (Invitrogen) and sequenced at the UC Berkeley DNA Sequencing Facility. Sequences obtained were identified using NIH BLAST Search Tool1. All procedures were carried out in accordance with a protocol approved by the Animal Care and Use Committee, University of California, Berkeley. Six to 12 weeks old male and female wild-type C57BL/6 mice (from Charles River or Jackson Laboratory), mT/mG knock-in mice (bred in house), IL-1R gene knockout (-/-) mice (bred in house), and MyD88 gene knockout (-/-) mice (bred in house) were used. Corneas of C57BL/6 mice have an area of ∼ 5.3 mm2. Both male and female mice contributed to the results since no differences were observed between them. Anesthesia was induced by intraperitoneal injection of ketamine (80–100 mg/Kg) and dexmedetomidine (0.25–0.5 mg/Kg) before inoculation with bacterial suspensions (5 μL). At 1 h, or other times post-inoculation, the anesthetic antidote atipamezole (2.5–5 mg/Kg) was administered, and mice were allowed to recover with food and water. Mice were euthanized by intraperitoneal injection of ketamine (80–100 mg/Kg) and xylazine (5–10 mg/Kg) followed by cervical dislocation. All experiments involved at least three animals per group and were repeated at least twice. Ocular Clearance of Bacteria Wild-type C57BL/6 mice (6–12 weeks) were used. After induction of anesthesia, 5 μL of bacterial inoculum containing ∼108 or ∼104 CFU was applied to the healthy ocular surface. At 24 and 72 h post-inoculation, tear fluid was collected from the ocular surface, and the numbers of viable bacteria determined. Tear fluid was collected by capillary action using a 30 μl glass capillary tube from the lateral canthus after 10 μl of PBS was added. The conjunctiva and cornea were then extracted and homogenized in 500 μl of PBS. Viable bacterial counts were determined by 10-fold serial dilution of the homogenates in PBS from 10-1 to 10-4 before plating in triplicate onto on TSA plates, followed by incubation for ∼18 h at 37 oC to determine CFU. In other experiments, whole eyes were enucleated and subject to FISH ex vivo after inoculation with bacteria as above. AlkDala (Alkyne-Functionalized D-Alanine) Labeling Labeling of live bacteria using an alkyne functionalized D-alanine (alkDala) biorthogonal probe (Siegrist et al., 2013; Shieh et al., 2014) was adapted for use on the murine ocular surface. Enucleated eyes were incubated in a solution of alkDala (10 mM) in Dulbecco’s Modified Eagle Medium (DMEM) at 37°C for 2 h. In other experiments, eyes of IL-1R (-/-) and MyD88 (-/-) mice were first incubated in an antibiotic cocktail of gentamicin (300 μg/mL), ofloxacin (300 μg/mL) and vancomycin (5 mg/mL) in DMEM. After alkDala incubation, all eyes were transferred to pre-chilled 70% EtOH and fixed for 20 min at -20°C. After rinsing, eyes were permeabilized in PBS with Triton-X100 (0.5%) for 10 min with shaking at room temperature (RT), then washed 3 times for 5 min each in PBS with Triton-X100 (0.1%) and BSA (3%) with shaking at RT. Eyes were then transferred to the click-labeling cocktail [in PBS, TBTA (100 μM), CuSO4 (1 mM), sodium ascorbate (2 mM), 488 nm azide-fluorophore (10 μM), BSA (0.1 mg/mL)] for 1 h with shaking at RT. Fluorescence in Situ Hybridization Enucleated eyes were fixed in paraformaldehyde (2%) for 1 h with shaking at RT. Bacterial hybridization was performed using a universal 16S rRNA gene [Alexa488]-GCTGCCTCCCGTAGGAGT-[Alexa488] (Eurofins Genomics) as previously described (Vaishnava et al., 2011; Mark-Welch et al., 2016). Briefly, fixed eyes were washed in 80% EtOH, 95% EtOH, and then PBS for 10 min each with shaking at RT. Eyes were then placed in a hybridization buffer solution [NaCl (0.9 M), Tris–HCl (20 mM, pH 7.2) and SDS (0.01%)] and incubated at 55°C for 30 min. The probe was added to final concentration of 100 nM and incubated at 55°C overnight. Eyes were then transferred to wash buffer solution [NaCl (0.9 M) and Tris–HCl (20 mM, pH 7.2)] and washed three times for 10 min each with shaking at RT. DMN-Tre (4-N,N-Dimethylamino-1,8-Naphthalimide-Trehalose) Labeling A DMN-Tre conjugate was used to label bacteria specific to the Corynebacterineae suborder (Kamariza et al., 2018) in conjunction with alkDala-labeling. Conjunctival tissue, aseptically obtained from healthy mouse eyes, was homogenized in 500 μL of DMEM then centrifuged at 14,000 ×g for 2 min. Liquid was aspirated and the pellet suspended in alkDala (10 mM) and DMN-Tre (100 μM) in DMEM and incubated at 37°C for 2 h. Samples were processed as described above except that a 647 nm azide-fluorophore was used in the click-labeling cocktail. Then, 10 μL of conjunctival homogenate was spotted on microscope slide with coverslip on top. Conjunctival tissue pieces with alkDala (647 nm) and DMN-Tre (488 nm) fluorescent labels were imaged using a Nikon ECLIPS Ti microscope with a 60× oil-immersion objective. Eyes were rinsed with PBS after the induction of anesthesia as described above. For wild-type mice, one eye was blotted with a KimwipeTM tissue paper. Eyes of IL-1R (-/-) mice were not blotted. A drop (5 μL) of fluorescein solution (0.02%) was then added to the ocular surface, and corneal epithelial integrity examined using a slit lamp and confocal microscopy. Antimicrobial Activity of Corneal Lysates The antimicrobial activity of murine cornea epithelial lysates was assessed as previously described (Sullivan et al., 2015). Corneas of wild-type or IL-1R (-/-) mice were left untreated or exposed to 5 μl of P. aeruginosa antigens [supernatant of a PAO1 culture (Maltseva et al., 2007)] for 3 h. Corneas were extracted and homogenized in distilled water (two corneas per 350 μL of water) and centrifuged at 14,000 ×g for 2 min to remove cell debris and stromal tissue. Crude lysates were confirmed to have equal protein concentration with a BCA (bicinchoninic acid) assay kit (Pierce Biotechnology, Inc., Thermo Fisher Scientific, Rockford, IL, United States). P. aeruginosa (∼106 CFU/mL) in lysate or water were incubated in triplicate at 37°C with shaking for 3 h. Viable bacterial counts of samples were then determined by 10-fold serial dilution in PBS as described above, plating in triplicate onto MacConkey Agar, followed by incubation for ∼18 h at 37°C to determine CFU. Percentage survival at 3 h was determined as follows: (viable counts from cell lysates at 3 h/viable counts from distilled water at 3 h) × 100%. Murine eyeballs were imaged ex vivo as previously described (Tam et al., 2011). Briefly, eyes were fixed to a 12 mm glass coverslip with cyanoacrylate glue with cornea facing upward. The coverslip with eyeball was placed in a 47 mm Petri dish and filled with PBS to cover the eyeball completely. Confocal imaging was performed using an Olympus FV1000 confocal microscope [Olympus BX615Wi upright microscope with Olympus FluoView 1000 detection system equipped with Laser Diodes (LD) 405, 440, 559, 635, and an Argon Laser 488/515]. The 488 nm laser (emission filter: 500–545 nm) was used for detection of bacteria labeled with alkDala or FISH, or corneas stained with fluorescein, the 559 nm laser (emission filter: 570–670 nm) used for detection of red-fluorescent bacteria (PAO1-dtom) or red fluorescent cell membranes, and the 635 nm laser used to obtain ocular surface reflectance (excitation and emission at same wavelength). Three or more randomly chosen fields of each eye (∼0.04 mm2) were imaged from the corneal surface through the entire epithelium in 1.0 μm steps as previously described (Tam et al., 2011). Three-dimensional images were reconstructed from z-stacks using IMARIS software (Bitplane). Images were compared to controls to determine threshold for each emission filter and held constant for all images. Bacteria were identified and quantified using the surface generation feature on IMARIS. Data were expressed as mean ± standard deviation (SD). Statistical significance of differences between means was determined using an unpaired Student’s t-Test or Mann–Whitney U-test for two group comparisons. For three or more groups, the Kruskal–Wallis test was used with Dunnett’s multiple comparison test for post hoc analysis. P-values < 0.05 were considered significant. AlkDala-Labeling Shows the Absence of Metabolically Active Bacteria on the Murine Cornea To explore whether the cornea hosts a microbiome composed of viable bacteria we used alkDala, a reagent that incorporates into the peptidoglycan of any metabolically active bacterium. Bacteria that have taken up alkDala can then be detected with an azide-fluorophore attached via click chemistry (Figure 1A). Prior to use in the mouse eye, these reagents were tested for specificity and efficacy in the presence of host tissue. This was done first using cultured HeLa cells incubated with either P. aeruginosa strain PAO1 or S. aureus (clinical isolate). The results showed that viable bacteria, but not the inoculated HeLa cells, labeled with the reagents (Figure 1B). As expected, heat-killed bacteria or bacteria treated with D-alanine alone (i.e., no alkyne group) did not label (Figure 1B). Moreover, environmental fungi did not label with alkDala in vitro (Supplementary Figure S1). Next, we explored if the reagent is also able to detect live bacteria in the context of murine corneas. Eyeballs freshly excised from mice were incubated in ∼1011 CFU/mL of PAO1-dtom ex vivo for 5 h. As shown in Figure 1C, bacteria that attached to the corneal surface (visible via dtom), were also detectable by alkDala. FIGURE 1. Alkyne-functionalized D-alanine (AlkDala) detects metabolically active bacteria inoculated onto cell culture and the murine cornea. (A) Schematic of alkDala (shown as a red X) labeling of bacteria. AlkDala is added to a bacterial suspension to allow incorporation into the cell wall peptidoglycan followed by a copper-catalyzed click-chemistry reaction with an azide-fluorophore (shown as a y-star symbol) to detect bacteria with incorporated probe. (B) AlkDala labeling was tested on Pseudomonas aeruginosa (PAO1) and Staphylococcus aureus (clinical isolate) in the presence of HeLa cells, and labeled all live bacteria (green, arrows) (Lower Left). Heat-killed bacteria were not detected (Lower Middle), nor were live bacteria detected if incubated with D-alanine without an attached alkyne (Lower Right). (Upper) show the phase-contrast images of respective fields. (C) To determine if bacteria on the murine ocular surface could be labeled with alkDala, whole eyeballs were incubated in ∼1011 CFU/mL of red fluorescent P. aeruginosa (PAO1-dtom) for 5 h, and then labeled using alkDala (green). The same fields of view are shown with different emission filters. Inset shows zoom of the white box with merge. Scale bar, 50 μm. Having shown that alkDala can distinguish viable bacteria in the context of the eye, we next used it to explore if uninoculated wild-type murine corneas harbored viable bacteria. Three random fields were selected to count the number of visible bacterial forms, the size of each field being ∼0.04 μm2. Very few alkDala-labeled bacteria were present on the healthy murine cornea (Figure 2A). In contrast, the conjunctiva displayed numerous alkDala-labeled forms (Figure 2B), supporting the existence of conjunctival-associated bacteria as previously reported by us, and others, using culture and sequencing methods (Fleiszig and Efron, 1992; Schabereiter-Gurtner et al., 2001; Graham et al., 2007; Dong et al., 2011; Doan et al., 2016). Surprisingly, the alkDala-labeled forms existed in long filamentous and tangled states, not previously reported (Figure 2B). Use of D-alanine alone, without an alkyne, confirmed that fluorescent labeling was specific to alkyne incorporation into bacterial cell walls (Figure 3A). Furthermore, transgenic mice with red fluorescent cell membranes demonstrated that these alkDala-labeled forms were not host tissue, suggesting that these filamentous structures were microbial (Figure 3B). FIGURE 2. The healthy murine cornea is nearly devoid of viable bacteria. (A) AlkDala labeling revealed very few viable bacteria on the healthy corneas of C57BL/6 mice. Representative fields shown from four different labeled corneas (two male and two female mice). (B) AlkDala labeling of the conjunctiva of C57BL/6 mice revealed numerous viable bacteria, many in a filamentous form. Representative fields of view are shown from seven different eyes (three male and four female mice). Scale bars, 50 μm. FIGURE 3. Filamentous structures identified on conjunctiva are not host tissue. (A) Mouse eyes incubated in D-alanine, without an alkyne, resulted in no fluorescent labeling. (B) Wild-type transgenic mice with fluorescent red cell membranes mT/mG knock-in mice (Muzumdar et al., 2007) were used in conjunction with alkDala labeling to determine if the filaments identified on the conjunctiva colocalized with host tissue. Filamentous structures on the conjunctiva (Upper) did not colocalize with host cell membranes (denoted Mem-dtom). Conversely, when filament-like structures were present in host tissue, alkDala labeling was not present (Lower). Images shown on the left and right are of the same fields of view with different emission filters. (C) Imaging of murine conjunctival epithelial tissue shows that DMN-Tre, a probe specific for Corynebacterineae (red), labeled most of the same conjunctival forms as alkDala (green). All images are from the same field of view with different emission filters. We hypothesized that the filamentous forms belong to the Corynebacterium spp., which are known to inhabit the conjunctiva, and exist in filamentous forms in dental plaque (Mark-Welch et al., 2016; St Leger et al., 2017). To test this, a novel DMN-Tre labeling probe, specific to the Corynebacterineae suborder, was used together with alkDala on murine conjunctival tissue. The DMN-Tre reagent metabolically incorporates into the outer mycomembrane of Corynebacterineae (includes Mycobacterium spp. and Corynebacterium spp.) as trehalose mycolates (Kamariza et al., 2018). The fluorescence signal is activated upon entry into the hydrophobic mycomembrane. Results showed that the alkDala-labeled filamentous forms (green) tangled in conjunctival tissue also labeled with DMN-Tre (red) (Figure 3C) suggesting that they belong to the Corynebacterineae. FISH Supports the Absence of Viable Bacteria on Healthy Murine Corneas To account for the possibility of viable bacteria without peptidoglycan-metabolic processes, or for which peptidoglycan metabolism was inactive or at very low levels, we employed FISH using a universal 16S rRNA gene probe. Unlike alkDala, FISH does not require probe incorporation into bacterial cell wall peptidoglycan, allowing the detection of viable bacteria independently of peptidoglycan metabolism. FISH labeling on the murine cornea was validated by incubating excised whole mouse eyes in ∼1011 CFU/mL of red fluorescent P. aeruginosa (PAO1-dtom) for 5 h ex vivo. After one PBS wash, bacteria remaining on the cornea were detected with FISH (green), and consistently colocalized with red fluorescent P. aeruginosa (Supplementary Figure S2). Fluorescence in situ hybridization labeling was then applied to healthy wild-type mouse corneas. Results revealed very few bacterial forms were present on the murine cornea (Figure 4A), consistent with previous results with alkDala (Figure 2A) and suggesting that the cornea was free of viable bacteria. A comparison of quantitative alkDala-labeling (0.53 ± 0.76 bacteria/field of view, ∼60 bacteria per cornea) with results obtained from FISH labeling (0.88 ± 0.35 bacteria/field of view, ∼100 bacteria per cornea) revealed no significant difference between methods (Figure 4B, P = 0.40, Student’s t-Test). Thus, on rare occasions that bacteria were detected on healthy murine corneas, they mostly existed in viable, metabolically active states. FIGURE 4. Fluorescence in situ hybridization (FISH) labeling confirms that healthy murine corneas are nearly devoid of viable bacteria. (A) FISH labeling confirmed C57BL/6 mouse corneas host very few viable bacteria. A representative field of view is shown from four different corneas (two male and two female mice). (B) Quantification of viable bacteria on healthy murine corneas using alkDala or FISH expressed as mean ± SD per field of view. One field of view is ∼0.04 mm2. ns = there was no significant difference between number of bacteria detected by either method (P = 0.40, Student’s t-Test). Murine Corneas Efficiently Clear Multiple Species of Inoculated Bacteria Previously we reported that P. aeruginosa was rapidly cleared from the healthy mouse cornea and tear fluid after deliberate inoculation (Mun et al., 2009). Here, we expanded those studies to determine if P. aeruginosa, S. aureus, or a murine eyelid commensal (CNS), could gain a foothold in any region of the murine ocular surface after inoculation (Figure 5). Thus, healthy wild-type animal eyes were inoculated in vivo with ∼108 CFU bacteria, and the number of viable bacteria remaining at multiple locations examined after 24 h. Very few bacteria were recovered from the eyewash/tear fluid of eyes inoculated with the eyelid CNS commensal (∼100 CFU, 6-log reduction compared to inoculum). Bacteria could not be recovered at all from the tear fluid of eyes inoculated with S. aureus or P. aeruginosa. Corneas and conjunctival tissue each harbored between ∼102 to ∼103 CFU culturable bacteria for all three species, representing a clearance rate of >99.99% of the original inoculum (Figure 5A). We next explored if the few bacteria remaining at 24 h could persist on the ocular surface for longer time periods. Thus, experiments were repeated using a 72 h time frame. At this later time point, bacteria were no longer detected in any of the eye washes, and negligible (∼10 CFU) or no bacteria were detected on the cornea and conjunctiva (Figure 5B). In case the large inoculum used had activated innate defenses not otherwise involved, experiments were repeated again using a much smaller inoculum (∼104 rather than ∼ 108 CFU). The results revealed even fewer bacteria recovered after 24 h than were recovered after the larger inoculum (Figure 5C). No ocular pathology was observed in any of the experiments. FIGURE 5. Bacterial clearance from the murine ocular surface. Eyes of C57BL/6 mice were inoculated in vivo with P. aeruginosa, S. aureus, or a CNS sp. previously isolated from a mouse eyelid, to determine if bacteria could persist on the ocular surface. Data was expressed as the mean ± SD of viable bacteria recovered from the cornea, conjunctiva, or eye wash (see section “Materials and Methods”). The dashed line represents initial inocula. (A) After 24 h, the vast majority of inoculated bacteria (∼108 CFU) were cleared from the cornea, conjunctiva, and eye wash. (B) By 72 h (3 days), virtually all bacteria were cleared from the ocular surface. (C) A lower inoculum (∼104 CFU) resulted in few remaining bacteria after 24 h. In each instance, P < 0.05 compared to the initial inoculum (Kruskal–Wallis test, with Dunnett’s multiple comparison). To determine if some additional remaining bacteria had escaped detection by transitioning into a non-culturable state, we also used the FISH label to detect viable bacterial forms. This was done 24 h after inoculation with ∼108 CFU of P. aeruginosa, S. aureus, or CNS. In all instances, the number of bacterial forms visible on corneas using FISH was similar to numbers obtained by viable counts (Figure 6). These results further illustrate the in-hospitability of the corneal surface to bacterial colonization and show that bacterial clearance from the healthy corneal surface involves complete removal of bacterial forms, not simply neutralization of viable bacteria. FIGURE 6. Cornea-associated bacteria remain culturable. Number of bacteria detected per cornea using viable counts compared to FISH labeling at 24 h after uninjured mouse eyes were inoculated in vivo with ∼108 CFU of P. aeruginosa, S. aureus, or CNS. Data were expressed as the mean ± SD of bacteria identified per cornea. ns = No significant difference was found between methods used (P > 0.05, Mann–Whitney U-test). Corneas of IL-1R (-/-) and MyD88 (-/-) Mice Host Metabolically Active Bacteria Mucosal surfaces are normally colonized by a significant number of commensal microbes, which as an aggregate is termed a microbiome. The above results confirmed the notion that the healthy murine cornea differs in this respect by being virtually clear of viable bacteria. To begin to understand the mechanisms by which the cornea maintains this condition, we tested the hypothesis that innate immune defenses that normally detect and respond to microbes are required. Thus, we explored if the IL-1R was involved using knockout mice, given that it plays an integral role in regulation of innate immunity at mucosal surfaces, including the eye (Pearlman et al., 2008; McDermott, 2009). AlkDala labeling revealed that metabolically active bacteria were present on uninjured corneas of IL-1R (-/-) mice (Figure 7A). Since we had previously shown that MyD88 was critical for protecting the murine corneal epithelium against penetration by P. aeruginosa (Tam et al., 2011), and MyD88 is an important adaptor molecule for IL-1R signaling, MyD88 (-/-) corneas were also examined. AlkDala labeling revealed that uninjured corneas of MyD88 (-/-) mice also harbored metabolically active bacteria (Figure 7B). FISH showed similar numbers of bacteria to alkDala labeling confirming that most detected bacteria on IL-1R (-/-) and MyD88 (-/-) murine corneas were viable (Figure 7C). Comparison of bacterial numbers on IL-1R (-/-) mice (76.00 ± 152.19 bacteria/field of view, >10,000 CFU per cornea), MyD88 (-/-) mice (87.87 ± 81.29 bacteria/field of view), with wild-type (<1 bacteria/field of view) revealed significant increases in viable resident bacteria in each gene knockout mouse (P < 0.05 and P < 0.01 for IL-1R- and MyD88-gene knockout mice respectively, versus wild-type corneas, Kruskal–Wallis test with Dunn’s multiple comparison) (Figure 7D). Antibiotic treatment reduced the number of alkDala-detected bacteria to wild-type levels for both IL-1R (-/-) and MyD88 (-/-) mice. For IL-1R (-/-) mice, antibiotics reduced bacterial numbers to 1.00 ± 1.00 bacteria/field of view, and for MyD88 (-/-) mice to 1.75 ± 1.75 bacteria/field of view (P = 0.88 and P = 0.66, respectively versus WT, Kruskal–Wallis test with Dunn’s multiple comparison) (Figure 7D). FIGURE 7. Corneas of IL-1R (–/–) and MyD88 (–/–) C57BL/6 mice harbor significantly more viable bacteria than wild-type. (A) AlkDala-labeling revealed many metabolically active bacteria (white arrows) on the corneas of uninjured IL-1R (–/–) mice. A representative field of view is shown from seven different corneas (three male and four female mice). (B) MyD88 (–/–) mouse corneas were also colonized with metabolically active bacteria. A representative field of view is shown from six different corneas (two male and four female mice). (C) AlkDala and FISH detected similar numbers of viable bacteria on Il-1R (–/–) or MyD88 (–/–) corneas (ns, not significant, Mann–Whitney U-test). (D) Quantification of viable bacteria detected per field of view using alkDala. Mean ± SD viable bacteria on the murine cornea was significantly higher in IL-1R (–/–) and MyD88 (–/–) mice versus wild-type, ∗P < 0.05, ∗∗P < 0.01 (Kruskal–Wallis test with Dunn’s multiple comparison). Antibiotic treatment reduced bacterial detection to wild-type levels for IL-1R (–/–) and MyD88 (–/–) corneas (P = 0.88 and P = 0.66 versus wild-type, Kruskal–Wallis test with Dunn’s multiple comparison). Scale bar, 50 μm. Next, we sought to determine which bacterial species inhabited the corneas of these immune-compromised mice. Corneal lysates of wild-type and IL-1R (-/-) mice were inoculated onto various agar media, and cultured bacteria identified by direct colony PCR of 16S rRNA (Table 1). Wild-type murine corneas revealed few, if any bacteria, consistent with previous results. Only one genus, Streptococcus spp. was identified in one of eight eyes with low bacterial numbers (7 CFU). In contrast, bacteria were isolated from seven of eight IL-1R (-/-) corneas with many more bacterial CFU compared to wild-type (Table 1). The most common bacteria identified were CNS spp. (five of eight eyes) and Propionibacterium (two of eight eyes). A Bacillus spp. was also identified in one eye (Table 1). It should be noted that the nature of the bacterial genera colonizing IL-1R (-/-) corneas will likely vary according to environment, e.g., differences between animal care facilities would likely affect culture results. Moreover, the limited number and diversity of bacteria isolated in the present study demonstrates the limitations of viable culture techniques and emphasizes the need for multiple methods when characterizing bacterial communities. IL-1R (-/-) Corneas Exhibit Epithelial Junction Integrity but Reduced Antimicrobial Activity A potential mechanism for microbial colonization of corneas in knockout mice would be if there was disruption of epithelial tight junctions, which would reduce epithelial barrier function and loss of cell polarity, thereby enabling bacterial colonization of surface epithelial cells (Fleiszig et al., 1997; Alarcon et al., 2011; Tam et al., 2011). To explore that possibility, uninjured corneas of IL-1R (-/-) mice were treated with fluorescein, and compared to corneas of wild-type mice, either uninjured or blotted with a KimwipeTM to induce superficial injury (Tam et al., 2011). While extensive fluorescein staining was observed in wild-type corneas after superficial injury, uninjured corneas of IL-1R (-/-) mice were similar to uninjured wild-type with little or no staining (Figure 8A), suggesting epithelial tight junctions were intact. FIGURE 8. Uninjured IL-1R (–/–) murine corneas do not exhibit fluorescein staining, but show reduced antimicrobial activity. (A) After tissue paper blotting, wild-type (WT) corneas were susceptible to fluorescein staining suggesting the disruption of epithelial integrity. Non-blotted (uninjured) WT and IL-1R (–/–) corneas showed little or no fluorescein staining. (B) IL-1R (–/–) corneal epithelial lysates showed reduced antimicrobial activity against P. aeruginosa strain PAO1 compared to WT lysates. A similar result was obtained in a separate set of experiments in which corneas were exposed to bacterial antigens prior to lysate production. ∗P < 0.05, ∗∗∗∗P < 0.0001 (Students t-Test). Previously, we showed that MyD88 (-/-) mouse corneas also resist corneal staining (Tam et al., 2011), but that corneal lysates from these corneas have reduced antimicrobial activity compared to wild-type (Sullivan et al., 2015). Thus, we examined lysates of IL-1R (-/-) corneas and found that they too were significantly less antimicrobial (2.46-fold) against P. aeruginosa PAO1 compared to wild-type mice (P < 0.05, Student’s t-Test) (Figure 8B). Prior exposure of the mouse corneas to bacterial antigens did not impact that outcome, with IL-1R (-/-) lysates remaining less antimicrobial (3.85-fold) than wild-type (P < 0.0001, Student’s t-Test) (Figure 8B). The ocular surface is constantly exposed to a diverse array of microbes from the environment. In this study, we addressed the question of whether commensal bacteria can inhabit the cornea, similar to the conjunctiva and other mucosal tissues. To do this, we applied metabolic labeling of peptidoglycan using an alkDala probe to directly detect viable bacteria in situ using confocal imaging (Vaishnava et al., 2011; Siegrist et al., 2013). Used in conjunction with FISH to identify viable bacteria independently of peptidoglycan metabolism, alkDala has an advantage over traditional culture or 16S rRNA gene sequencing, which are indirect methods with potential for numerous false-negative and false-positive results, respectively. Our results show that the healthy murine cornea is generally inhospitable to bacteria, a condition that requires constitutive function of the IL-1R and MyD88. The results also suggest that, in contrast to the murine conjunctiva and other mucosal surfaces, the healthy murine cornea does not support a resident viable bacterial community (or microbiome). Having ruled out a natural microbiome in wild-type mice, we explored if we could establish one through deliberate inoculation. We tested pathogens of both Gram-types, and a commensal from the mouse eyelid. These were each rapidly cleared from all regions of the ocular surface (cornea, conjunctiva, and tears), the timing dependent on the initial inoculum size, and the methods used ruled out the possibility that the bacteria had transitioned into a non-culturable viable state. These results also support the notion that the cornea is an inhospitable environment for bacteria. The results showed that the gain of bacterial colonization in IL-1R and MyD88 (-/-) corneas did not correlate with a loss of barrier function to fluorescein, but was instead associated with a lack of antimicrobial activity in corneal lysates (Sullivan et al., 2015). Thus, local antimicrobial activity is a potential mechanism by which the wild-type cornea maintains its amicrobiomic status. Indeed, IL-1β and toll-like receptor agonists are known to regulate the expression of various antimicrobial peptides, including human beta-defensin 2 (hBD2) and the cathelicidin LL-37, by human corneal epithelial cells (McDermott et al., 2003; Redfern et al., 2011). Possibly related, the murine equivalent of hBD2 (mBD3) is involved in the ocular surface clearance of P. aeruginosa after deliberate inoculation under healthy conditions (Augustin et al., 2011). Other potential mechanisms include ocular surface mucins, that can inhibit bacterial adhesion to the cornea (Fleiszig et al., 1994). While we recently showed that glycosylation patterns on the murine ocular surface can be dependent on IL-1R (Jolly et al., 2017), that was not the case for MyD88, and did not necessarily influence bacterial adhesion. Thus, any role for surface glycosylation in maintaining the amicrobiomic status of the cornea is likely to be complex. Our laboratory has also recently shown that uninjured IL-1R (-/-) mouse corneas were significantly more susceptible to P. aeruginosa adherence after challenge, and that protection of the cornea against P. aeruginosa adhesion involved IL-1R associated with both corneal epithelial cells and CD11C+ cells (Metruccio et al., 2017). Similar mechanisms may play a role in constitutively keeping the cornea free of a bacterial microbiome. It has also been shown that MyD88 (-/-) murine corneas exhibited reduced constitutive levels of cytokines, chemokines, and the matrix metalloproteinase MMP-9 (Reins et al., 2017), which may also contribute to allowing bacteria to colonize the corneas of these mice. Thus, further studies will be needed to delineate factors downstream of IL-1R and MyD88 critical for constitutively keeping the healthy cornea free of resident bacteria under normal conditions. Contrasting with the cornea, the conjunctiva appeared to be colonized by metabolically active bacteria. Conjunctival-associated alkDala-labeled bacteria appeared mostly as filamentous forms. Controls determined that this labeling was specific to alkDala, and that the filamentous structures did not co-localize with host structures, suggesting that they were indeed microbial. Subsequent imaging experiments showed that DMN-Tre, a probe specific for Corynebacterineae (e.g., a bacterial suborder including Mycobacterium and Corynebacterium spp.) labeled the same conjunctival filamentous forms as alkDala providing more evidence of their identity. This result was perhaps not surprising since the human conjunctiva is well known to support CNS spp., Corynebacterium spp., and Propionibacterium spp. (Turnbaugh et al., 2007; Dong et al., 2011; Doan et al., 2016). Moreover, in mice, resident conjunctival-associated bacterial flora contribute to protective ocular immune responses via IL-1β-dependent mechanisms, and local antibiotic treatment reduces corneal immune responses to P. aeruginosa infection after scarification injury (Kugadas et al., 2016). Another recent study, using a similar infection model, also implicated resident conjunctival Corynebacterium mastitidis in protecting murine corneas from Candida albicans and P. aeruginosa via IL-17-driven mucosal immune responses (St Leger et al., 2017). In our study, we detected the filamentous bacterial forms on the conjunctiva of mice obtained from both Charles River and Jackson Laboratory. However, we were unable to culture these filamentous bacteria from the conjunctiva of mice used in our study, nor identify C. mastitidis from the conjunctiva of mice from Jackson Laboratory, or from other mice in our facility. Further studies will be needed to identify the filamentous bacterial forms and determine their role in ocular surface homeostasis or immune responses. Many different types of bacteria, including Corynebacterium spp., become filamentous when encountering stressful environments, such as in the presence of antibiotics or low nutrients (Wright et al., 1988; Justice et al., 2006, 2008). Possibly, adoption of this morphology represents a deliberate strategy to avoid removal from the ocular surface. For example, filamentation can be used by bacteria to avoid phagocytosis (Horvath et al., 2011). The conjunctiva is not the only place where filamentous bacteria have been identified. Indeed, filamentous Corynebacterium spp. are a part of dental plaque and segmented filamentous bacteria (SFB) are commensal inhabitants of the gut (Farkas et al., 2015; Schnupf et al., 2015; Mark-Welch et al., 2016). Unlike other commensals in the gut, SFB are the only bacteria that directly interact with epithelial cells and have been shown to play an important role in modulating the host immune system (Talham et al., 1999; Vaishnava et al., 2011; Farkas et al., 2015). Some bacteria respond to adverse environmental conditions by entering into a physiological state in which they remain viable, but are not culturable using standard laboratory methods (Oliver, 2010). These are referred to as VBNCs. Since VBNCs retain metabolic activity (Ramamurthy et al., 2014), they would be expected to label with the universal 16S rRNA gene probe used for FISH in our study. While further VBNC-specific detection methodologies would be needed to conclusively exclude VBNCs, our data suggest that they are not present on the healthy murine cornea. A caveat to the present study, is that we cannot exclude the presence of fungi, viruses, or non-viable bacteria on the corneal surface since alkDala did not label these microbes in our studies. Moreover, FISH may not have detected non-viable or dormant bacteria, e.g., if ribosome content was low. Nevertheless, the results of this study support the conclusion that the healthy murine cornea contrasts with the conjunctiva in lacking a resident viable bacterial microbiome. Demonstrating that healthy murine corneas do not host a resident viable bacterial community, commonly present on the conjunctiva, or that are part of other microbiomes, addresses a long-standing knowledge gap in the field, and provides a foundation for a better understanding of corneal homeostasis and disease pathogenesis at the ocular surface. The details of how MyD88 and IL-1R constitutively modulate the absence of a bacterial microbiome on the cornea, and how this is impacted by the environment at the ocular surface, remain to be determined. SW, AS, and PS conducted the experiments. SW, AS, PS, MM, DE, CB, and SF contributed to the data analysis, writing the manuscript, and research design. This work was supported by the National Institutes of Health; EY011211 (SF), EY007043 (UC Berkeley Vision Science Training Grant), and GM058867 (CB). Conflict of Interest Statement The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Our thanks to Dr. John Singer (The University of Maine) for the plasmid construct p67T1 (dTomato), Dr. Greg Barton (University of California, Berkeley) for the gene knockout mice, Dr. Arne Rietsch (Case Western Reserve University) and Dr. Dara Frank (Medical College of Wisconsin) for the P. aeruginosa strains and plasmid constructs, and the UC Berkeley DNA Sequencing Facility. The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fmicb.2018.01117/full#supplementary-material AlkDala, alkyne-functionalized D-alanine; CFU, colony forming units; DMN-Tre, 4-N,N-dimethylamino-1,8-naphthalimide-trehalose; FISH, fluorescence in situ hybridization; IL-1R, interleukin-1 receptor; MyD88, myeloid differentiation primary response gene 88; TSA, trypticase soy agar; VBNC, viable but not culturable. Alarcon, I., Tam, C., Mun, J. J., LeDue, J., Evans, D. J., and Fleiszig, S. M. (2011). Factors impacting corneal epithelial barrier function against Pseudomonas aeruginosa traversal. Invest. Ophthalmol. Vis. Sci. 52, 1368–1377. doi: 10.1167/iovs.10-6125 Augustin, D. K., Heimer, S. R., Tam, C., Li, W. Y., Le Due, J. M., Evans, D. J., et al. (2011). Role of defensins in corneal epithelial barrier function against Pseudomonas aeruginosa traversal. Infect. Immun. 79, 595–605. doi: 10.1128/IAI.00854-10 Blalock, T. D., Spurr-Michaud, S. J., Tisdale, A. S., Heimer, S. R., Gilmore, M. S., Ramesh, V., et al. (2007). Functions of MUC16 in corneal epithelial cells. Invest. Ophthalmol. Vis. Sci. 48, 4509–4510. doi: 10.1167/iovs.07-0430 Corrêa, J. D., Calderaro, D. C., Ferreira, G. A., Mendonça, S. M., Fernandes, G. R., Xiao, E., et al. (2017). Subgingival microbiota dysbiosis in systemic lupus erythematosus: association with periodontal status. Microbiome 5, 1–13. doi: 10.1186/s40168-017-0252-z Doan, T., Akileswaran, L., Andersen, D., Johnson, B., Ko, N., Shrestha, A., et al. (2016). Paucibacterial microbiome and resident DNA virome of the healthy conjunctiva. Invest. Ophthalmol. Vis. Sci. 57, 5116–5126. doi: 10.1167/iovs.16-19803 Dong, Q., Brulc, J. M., Iovieno, A., Bates, B., Garoutte, A., Miller, D., et al. (2011). Diversity of bacteria at healthy human conjunctiva. Invest. Ophthalmol. Vis. Sci. 52, 5408–5413. doi: 10.1167/iovs.10-6939 Farkas, A. M., Panea, C., Goto, Y., Nakato, G., Galan-Diez, M., Narushima, S., et al. (2015). Induction of Th17 cells by segmented filamentous bacteria in the murine intestine. J. Immunol. Methods 421, 104–111. doi: 10.1016/j.jim.2015.03.020 Fleiszig, S. M., Evans, D. J., Do, N., Vallas, V., Shin, S., and Mostov, K. E. (1997). Epithelial cell polarity affects susceptibility to Pseudomonas aeruginosa invasion and cytotoxicity. Infect. Immun. 65, 2861–2867. Frank, D. N., St Amand, A. L., Feldman, R. A., Boedeker, E. C., Harpaz, N., and Pace, N. R. (2007). Molecular-phylogenetic characterization of microbial community imbalances in human inflammatory bowel diseases. Proc. Natl. Acad. Sci. U.S.A. 104, 13780–13785. doi: 10.1073/pnas.0706625104 Gevers, D., Knight, R., Petrosino, J. F., Huang, K., McGuire, A. L., Birren, B. W., et al. (2012). The Human Microbiome Project: a community resource for the healthy human microbiome. PLoS Biol. 10:e1001377. doi: 10.1371/journal.pbio.1001377 Graham, J. E., Moore, J. E., Jiru, X., Moore, J. E., Goodall, E. A., Dooley, J. S., et al. (2007). Ocular pathogen or commensal: a PCR-based study of surface bacterial flora in normal and dry eyes. Invest. Ophthalmol. Vis. Sci. 48, 5616–5618. doi: 10.1167/iovs.07-0588 Grice, E. A., Kong, H. H., Conlan, S., Deming, C. B., Davis, J., Young, A. C., et al. (2009). Topographical and temporal diversity of the human skin microbiome. Science 324, 1190–1192. doi: 10.1126/science.1171700 Halfvarson, J., Brislawn, C. J., Lamendella, R., Vázquez-Baeza, Y., Walters, W. A., Bramer, L. M., et al. (2017). Dynamics of the human gut microbiome in inflammatory bowel disease. Nat. Microbiol. 2:17004. doi: 10.1038/nmicrobiol.2017.4 Horvath, D. J., Li, B., Casper, T., Partida-Sanchez, S., Hunstad, D. A., Hultgren, S. J., et al. (2011). Morphological plasticity promotes resistance to phagocyte killing of uropathogenic Escherichia coli. Microbes Infect. 13, 426–437. doi: 10.1016/j.micinf.2010.12.004 Jolly, A. L., Agarwal, P., Metruccio, M. M. E., Spiciarich, D. R., Evans, D. J., Bertozzi, C. R., et al. (2017). Corneal surface glycosylation is modulated by IL-1R and Pseudomonas aeruginosa challenge but is insufficient for inhibiting bacterial binding. FASEB J. 31, 2393–2404. doi: 10.1096/fj.201601198R Justice, S. S., Hunstad, D. A., Seed, P. C., and Hultgren, S. J. (2006). Filamentation by Escherichia coli subverts innate defenses during urinary tract infection. Proc. Natl. Acad. Sci. U.S.A. 103, 19884–19889. doi: 10.1073/pnas.0606329104 Kamariza, M., Shieh, P., Ealand, C. S., Peters, J. S., Chu, B., Rodriguez-Rivera, F. P., et al. (2018). Rapid detection of Mycobacterium tuberculosis in sputum with a solvatochromic trehalose probe. Sci. Transl. Med. 10:eaam6310. doi: 10.1126/scitranslmed.aam6310 Kawai, Y., Mercier, R., Wu, L. J., Domínguez-Cuevas, P., Oshima, T., and Errington, J. (2015). Cell growth of wall-free L-form bacteria is limited by oxidative damage. Curr. Biol. 25, 1613–1618. doi: 10.1016/j.cub.2015.04.031 Koeth, R. A., Wang, Z., Levison, B. S., Buffa, J. A., Org, E., Sheehy, B. T., et al. (2013). Intestinal microbiota metabolism of l-carnitine, a nutrient in red meat, promotes atherosclerosis. Nat. Med. 19, 576–585. doi: 10.1038/nm.3145 Kugadas, A., Christiansen, S. H., Sankaranarayanan, S., Surana, N. K., Gauguet, S., Kunz, R., et al. (2016). Impact of microbiota on resistance to ocular Pseudomonas aeruginosa-induced keratitis. PLoS Pathog. 12:e1005855. doi: 10.1371/journal.ppat.1005855 Kwong, M. S. F., Evans, D. J., Ni, M., Cowell, B. A., and Fleiszig, S. M. (2007). Human tear fluid protects against Pseudomonas aeruginosa keratitis in a murine experimental model. Infect. Immun. 75, 2325–2332. doi: 10.1128/IAI.01404-06 Li, J., Metruccio, M. M. E., Smith, B. E., Evans, D. J., and Fleiszig, S. M. (2017). Mucosal fluid glycoprotein DMBT1 suppresses twitching motility and virulence of the opportunistic pathogen Pseudomonas aeruginosa. PLoS Pathog. 13:e1006392. doi: 10.1371/journal.ppat.1006392 Liu, C. M., Price, L. B., Hungate, B. A., Abraham, A. G., Larsen, L. A., Christensen, K., et al. (2015). Staphylococcus aureus and the ecology of the nasal microbiome. Sci. Adv. 1:e1400216. doi: 10.1126/sciadv.1400216 Maltseva, I. A., Fleiszig, S. M., Evans, D. J., Kerr, S., Sidhu, S. S., McNamara, N. A., et al. (2007). Exposure of human corneal epithelial cells to contact lenses in vitro suppresses the upregulation of human β-defensin-2 in response to antigens of Pseudomonas aeruginosa. Exp. Eye Res. 85, 142–153. doi: 10.1016/j.exer.2007.04.001 Mark-Welch, J. L., Rossetti, B. J., Rieken, C. W., Dewhirst, F. E., and Borisy, G. G. (2016). Biogeography of a human oral microbiome at the micron scale. Proc. Natl. Acad. Sci. U.S.A. 113, E791–E800. doi: 10.1073/pnas.1522149113 Masinick, S. A., Montgomery, C. P., Montgomery, P. C., and Hazlett, L. D. (1997). Secretory IgA inhibits Pseudomonas aeruginosa binding to cornea and protects against keratitis. Invest. Ophthalmol. Vis. Sci. 38, 910–918. McDermott, A. M., Redfern, R. L., Zhang, B., Pei, Y., Huang, L., and Proske, R. J. (2003). Defensin expression by the cornea: multiple signaling pathways mediate IL-1β stimulation of hBD-2 expression by human corneal epithelial cells. Invest. Ophthalmol. Vis. Sci. 44, 1859–1865. doi: 10.1167/iovs.02-0787 Metruccio, M. M. E., Tam, C., Evans, D. J., Xie, A. L., Stern, M. E., and Fleiszig, S. M. (2017). Contributions of MyD88-dependent receptors and CD11c-positive cells to corneal epithelial barrier function against Pseudomonas aeruginosa. Sci. Rep. 7:13829. doi: 10.1038/s41598-017-14243-w Mun, J. J., Tam, C., Kowbel, D., Hawgood, S., Barnett, M. J., Evans, D. J., et al. (2009). Clearance of Pseudomonas aeruginosa from a healthy ocular surface involves surfactant protein D and is compromised by bacterial elastase in a murine null-infection model. Infect. Immun. 77, 2392–2398. doi: 10.1128/IAI.00173-09 Ozkan, J., Nielsen, S., Diez-Vives, C., Coroneo, M., Thomas, T., and Willcox, M. (2017). Temporal stability and composition of the ocular surface microbiome. Sci. Rep. 7:9880. doi: 10.1038/s41598-017-10494-9 Ramamurthy, T., Ghosh, A., Pazhani, G. P., and Shinoda, S. (2014). Current perspectives on viable but non-culturable (VBNC) pathogenic bacteria. Front. Public Health 2:103. doi: 10.3389/fpubh.2014.00103 Ravel, J., Gajer, P., Abdo, Z., Schneider, G. M., Koenig, S. S., McCulle, S. L., et al. (2011). Vaginal microbiome of reproductive-age women. Proc. Natl. Acad. Sci. U.S.A. 108(Suppl. 1), 4680–4687. doi: 10.1073/pnas.1002611107 Redfern, R. L., Reins, R. Y., and McDermott, A. M. (2011). Toll-like receptor activation modulates antimicrobial peptide expression by ocular surface cells. Exp. Eye Res. 92, 209–220. doi: 10.1016/j.exer.2010.12.005 Salter, S. J., Cox, M. J., Turek, E. M., Calus, S. T., Cookson, W. O., Moffatt, M. F., et al. (2014). Reagent and laboratory contamination can critically impact sequence-based microbiome analyses. BMC Biol. 12:87. doi: 10.1186/s12915-014-0087-z Schabereiter-Gurtner, C., Maca, S., Rölleke, S., Nigl, K., Lukas, J., Hirschl, A., et al. (2001). 16S rDNA-based identification of bacteria from conjunctival swabs by PCR and DGGE fingerprinting. Invest. Ophthalmol. Vis. Sci. 42, 1164–1171. Scher, J. U., Sczesnak, A., Longman, R. S., Segata, N., Ubeda, C., Bielski, C., et al. (2013). Expansion of intestinal Prevotella copri correlates with enhanced susceptibility to arthritis. eLife 2:e01202. doi: 10.7554/eLife.01202 Schnupf, P., Gaboriau-Routhiau, V., Gros, M., Friedman, R., Moya-Nilges, M., Nigro, G., et al. (2015). Growth and host interaction of mouse segmented filamentous bacteria in vitro. Nature 520, 99–103. doi: 10.1038/nature14027 Shieh, P., Siegrist, M. S., Cullen, A. J., and Bertozzi, C. R. (2014). Imaging bacterial peptidoglycan with near-infrared fluorogenic azide probes. Proc. Natl. Acad. Sci. U.S.A. 111, 5456–5461. doi: 10.1073/pnas.1322727111 Siegrist, M. S., Swarts, B. M., Fox, D. M., Lim, S. A., and Bertozzi, C. R. (2015). Illumination of growth, division and secretion by metabolic labeling of the bacterial cell surface. FEMS Microbiol. Rev. 39, 184–202. doi: 10.1093/femsre/fuu012 Siegrist, M. S., Whiteside, S., Jewett, J. C., Aditham, A., Cava, F., and Bertozzi, C. R. (2013). d-amino acid chemical reporters reveal peptidoglycan dynamics of an intracellular pathogen. ACS Chem. Biol. 8, 500–505. doi: 10.1021/cb3004995 Singer, J. T., Phennicie, R. T., Sullivan, M. J., Porter, L. A., Shaffer, V. J., and Kim, C. H. (2010). Broad-host-range plasmids for red fluorescent protein labeling of Gram-negative bacteria for use in the Zebrafish model system. Appl. Environ. Microbiol. 76, 3467–3474. doi: 10.1128/AEM.01679-09 St Leger, A. J., Desai, J. V., Drummond, R. A., Kugadas, A., Almaghrabi, F., Silver, P., et al. (2017). An ocular commensal protects against corneal infection by driving an interleukin-17 response from mucosal γδ T cells. Immunity 47, 148.e5–158.e5. doi: 10.1016/j.immuni.2017.06.014 Sullivan, A. B., Tam, K. P., Metruccio, M. M. E., Evans, D. J., and Fleiszig, S. M. (2015). The importance of the Pseudomonas aeruginosa type III secretion system in epithelium traversal depends upon conditions of host susceptibility. Infect. Immun. 83, 1629–1640. doi: 10.1128/IAI.02329-14 Talham, G. L., Jiang, H. Q., Bos, N. A., and Cebra, J. J. (1999). Segmented filamentous bacteria are potent stimuli of a physiologically normal state of the murine gut mucosal immune system. Infect. Immun. 67, 1992–2000. Tam, C., LeDue, J., Mun, J. J., Herzmark, P., Robey, E. A., Evans, D. J., et al. (2011). 3D quantitative imaging of unprocessed live tissue reveals epithelial defense against bacterial adhesion and subsequent traversal requires MyD88. PLoS One 6:e24008. doi: 10.1371/journal.pone.0024008 Tam, C., Mun, J. J., Evans, D. J., and Fleiszig, S. M. (2012). Cytokeratins mediate epithelial innate defense through their antimicrobial properties. J. Clin. Invest. 122, 3665–3677. doi: 10.1172/JCI64416 Vaishnava, S., Yamamoto, M., Severson, K. M., Ruhn, K. A., Yu, X., Koren, O., et al. (2011). The antibacterial lectin RegIIIgamma promotes the spatial segregation of microbiota and host in the intestine. Science 334, 255–258. doi: 10.1126/science.1209791 Keywords: bacteria, microbiome, murine cornea, AlkDala, DMN-Tre, IL-1R, MyD88, homeostasis Citation: Wan SJ, Sullivan AB, Shieh P, Metruccio MME, Evans DJ, Bertozzi CR and Fleiszig SMJ (2018) IL-1R and MyD88 Contribute to the Absence of a Bacterial Microbiome on the Healthy Murine Cornea. Front. Microbiol. 9:1117. doi: 10.3389/fmicb.2018.01117 Received: 11 March 2018; Accepted: 11 May 2018; Published: 29 May 2018. Edited by:Hui Wu, The University of Alabama at Birmingham, United States Reviewed by:Maria de los Angeles Serradell, Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Argentina Holly M. Simon, Oregon Health & Science University, United States Copyright © 2018 Wan, Sullivan, Shieh, Metruccio, Evans, Bertozzi and Fleiszig. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. *Correspondence: Suzanne M. J. Fleiszig, firstname.lastname@example.org †Present address: Carolyn R. Bertozzi, Department of Chemistry, Stanford University, Stanford, CA, United States
<urn:uuid:a8ec89ad-7a63-48f3-9fd0-51a83ee39ada>
CC-MAIN-2022-33
https://www.frontiersin.org/articles/10.3389/fmicb.2018.01117/full
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.85826
16,597
2.328125
2
Skip to Main Content It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results. AMA Style Citation Tips What are the latest changes in referencing internet language? As of the 11th edition, AMA recommends - lowercase internet and website - remove the hyphen from email. - Other e- compounds retain their hyphen, e.g. e-cigarette and e-book. Capitalize the word that follows e- in title case, e.g. "State Restrictions on e-Cigarette Use." AMA: Web sites - Author(s) - (or, if no author is available, the name of the organization responsible for the site). - Title of the specific item cited (if none is given, use the name of the organization responsible for the site). - Name of the website. (use "website" not "Web site") - Published date (if available) - Updated date (if available) - Accessed date - URL [provide URL and verify that the link still works as close as possible to publication]. Tip: Include as much relevant information as possible Rainie L. The rise of the e-patient. Pew Research Center Internet and the American Life Project. October 7, 2009. Accessed January 11, 2012. https://www.pewresearch.org/internet/2009/10/07/the-rise-of-the-e-patient-2/ Example: (no author) Air Quality. Centers for Disease Control and Prevention. Updated June 28, 2021. Accessed July 28, 2021. https://www.cdc.gov/air/default.htm
<urn:uuid:48f8e324-6f5f-4acf-9069-989262db1f68>
CC-MAIN-2022-33
https://guides.himmelfarb.gwu.edu/AMA/websites
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.849018
394
2.140625
2
Spencer, Browning & Rust 18th-19th Century British instrument maker (active 1784 - 1840) View the objects by this artist. Spencer, Browning & Rust made navigation instruments in London from the mid-18th century until 1840. The firm had both predecessors and successors in the instrument business, supplying sailors, explorers and surveyors on several continents. Your current search criteria is: Artist is "Spencer, Browning & Rust".
<urn:uuid:1f9a2d22-0ecc-4b7e-bbaa-886eba3c89a6>
CC-MAIN-2022-33
https://arcticcollections.bowdoin.edu/artist-maker/info/250?sort=3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.902712
106
2.046875
2
Hypertension, also known as high blood pressure, is a very common and serious condition that can lead to and/or complicate many health problems. These include coronary heart disease, stroke, kidney failure and heart failure. About one in three adults in the U.S. have hypertension, according to the National Heart, Lung and Blood Institute. There are three general types of hypertension. Essential hypertension occurs when the condition has no known cause. When hypertension is caused by another condition or disease process, it is called secondary hypertension. When only the systolic blood pressure number (the top number) is high, it is called isolated systolic hypertension, which is common in older adults.
<urn:uuid:902ef55c-35d8-4646-8263-0bd30bab5441>
CC-MAIN-2022-33
https://www.dnatube.com/video/5023/Hypertension-Part-2
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
en
0.97269
138
3.75
4
One of the games that offers you a lot of fun not only for creating and building worlds, but also for the various characters that you can find in it is Minecraft. In this tutorial we will explain in a very simple way, what you should do to heal villagers in Minecraft- transform zombies into villagers. The variants of this game are totally amazing and we will tell you that they exist normal zombies and they have turned other villagers into zombies. And they can be perfectly differentiated between each other because the villagers have their head the same as the others but with a slight greenish hue and mostly you will find it in the villages. For the transformation from villagers to Zombies, the latter must attack a villager to death, and this is the main cause of the transformation. It is undoubtedly a very interesting aspect of the game and that makes it so amazing where you can find Zombies and also carve pumpkins for Halloween. How to heal villagers in Minecraft – Transform zombies into villagers The things that happen in this game are very interesting, which is not like what you think they should be. Since if a villager who is dedicated to farmer for example. After being attacked by a zombies will transform, but he will keep the same profession, until he is healed and returns to being a normal villager. Many times you have come across some of these villager zombies in your house or farm and never imagined that you could return them to normal. So you can without major inconvenience cure him and have him imprisoned to torture him if you want or do with this villager what you want. Well then, let’s see what you should do to heal villagers in Minecraft – transform zombies into villagers. You may also be interested in: Steps to heal villagers in Minecraft To heal a villager turned into zombies you need to use a golden apple and a passion of weakness. Of course, this last option should be a throwback. For you to understand better, you must first throw the potion of weakness at him. Once they are weak, because you know that you cannot approach him because of his violence. You will administer the golden apple, for this reason it is advisable that this zombie villager have him locked up or caged, to avoid setbacks. But surely you are wondering and how do I get these objects. Well, we have the answers and then we are going to present it to you. You must create the throwing weakness option and for this you must first create the Fermented Spider Eye, with the following materials Eye of spider, that you can get them from spiders that you have killed or from witches. The next ingredient is Sugar, which you will get from sugar cane and witches and finally Brown mushroom, this you can collect it in shady places. Once you have these ingredients, place them on the crafting table and ready you will have the fermented Spider Eye. Now you can prepare the potion of weakness, for this use a Distiller, also Flask of water, which you will obtain by creating a glass flask with the crafting of three V-shaped crystals. After you have the bottle, fill it with water wherever you can, you will also need the Blaze powder from the Blaze bars and finally the Fermented Spider Eye that you already created. But as this option of weakness is thrown it will be necessary that you do it in the still. Then we will place in it the potion of weakness, the blaze powder and get gunpowder, which is obtained as loot from the Creepers. Ready now we only need the golden apple, which you will create with eight gold bars from the mines and a normal apple. To make it, you must place the apple in the middle and the ingots around and voila. Now you just have to throw the potion of weakness and then give him the golden apple. You may also be interested in: If it begins to roar and tremble, the healing process is taking effect and you should only wait about five minutes for the zombies to become villager again. I'm sorry this content was not useful for you! Let me improve this content! Tell me, how can I improve this content?
<urn:uuid:8278b7c6-71b8-41cf-b801-2f9da0b37c1a>
CC-MAIN-2022-33
https://tdftips.com/blog/how-to-heal-villagers-in-minecraft-transform-zombies-into-villagers-example/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.967584
852
1.914063
2
Bertha has weakened back to a tropical storm with maximum sustained winds at 65 mph Bertha is centered about 475 miles west of Bermuda and moving North-Northeast at 22 mph. The storm is expected to make a northeast turn today, passing about midway between the East Coast and Bermuda. Gradual weakening is expected to continue over the next 48 hours. Tropical storm force winds extend outward up to 125 miles, primarily to the east of the center. Locally, we can expect high risk for rip currents and increased wave action today. Expect waves between 3 and 4 feet for Virginia Beach and Currituck and 6 to 8 feet for Dare. 5:00 AM EDT Tue Aug 4 Location: 33.4°N 72.9°W Moving: NNE at 22 mph Min pressure: 1005 mb Max sustained: 65 mph
<urn:uuid:6c220e4f-864d-4b9f-ad44-71694b3c8d74>
CC-MAIN-2022-33
https://www.wtkr.com/2014/08/01/tropical-storm-bertha-forms-in-the-atlantic
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.925337
179
1.640625
2
Associates are or have been active participants in the life of Communitism through the use and care of shared spaces and/or shared competencies They can present an idea or suggest to host a temporary project to Communiteam at the Social-Thursday Meeting. Like in-house projects, temporary hosted projects are expected to follow Communitism principles and values, and coordinate with the Communiteam. An associate that has collaborated in projects with Communiteam and shows interest in becoming a Communiteam member, may be invited to follow the Communiteam meetings for a period of 2 months, during which the Communiteam and the Associate can assess this person’s incorporation into the Communiteam. The uniqueness of our organisation lies in the social experiment that is being performed in the specific socioeconomic circumstances for the first time. A society that has lost collective memory in commoning, is being called to consciously cooperate towards a specific goal: The revival of an abandoned cultural heritage building in Athens. The process has attracted people with diverse cultural backgrounds and needs. Together they reverse the damaging factors that have caused decay in the building by keeping it in use, in collaboration with numerous communities of the local creative ecosystem. This exchange is producing rich outcomes on self-regulation dynamics developed within the organisation. The sustainability of the experiment is a measuring factor, as well as the establishment of common ethics. The state of maintenance of the building is a mirror of the community residing in it. The methodological principles of the project lies on the following approaches: The initial lack of financial means makes the process slow enough to ensure the organic and participatory development of the organisation and the building. The experiment initially had 3 targeted groups: Creative audiences (people that are not artists but feel the need to express themselves), local artists and international artists. However, as the project evolved , there was more of a targeted common ethics rather than specifically targeted groups of people. Statistically, we have attracted local people that might be active in social or cultural issues, travellers and newcomers (voluntary or displaced). The age span of the audience varies from 12- 50 ( average) and includes people of the arts, education, researchers and practitioners of the Commons. During the development process, the Communiteam members have engaged in defining their common practice , now expressed through their constitutional texts: the Statement of practice and the Statute. They have developed legal tools and economic models that can keep the idea viable. They are consistently proceeding in making the Communitism concept a model to be outsourced to as many teams possible, as the vision is that of a strong functioning network.
<urn:uuid:e6550e59-d9ef-4ba6-960a-0a6bd1ecd183>
CC-MAIN-2022-33
https://communitism.space/about/associates-amp-methods/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.96501
533
1.851563
2
Strategic Study on Communication Infrastructures and Paperless Administration Madrid, 31 May 2012 Spain can reap more value from ICTs, says OECD Better use of information communication technologies (ICTs) can help Spain unlock governmental efficiencies and help prepare the country for future economic growth, according to a new study from the OECD. The report "Reaping the Benefits of ICTs in Spain - Strategic Study on Communication Infrastructures and Paperless Administration", examines recent achievements in two key areas – communication infrastructures and e-government - and proposes policies to help Spain better leverage ICT investments. "The difficult economic challenges faced by Spain require attention from several perspectives", says Mr. Rolf Alter, director for the OECD Public Governance directorate. "A focus on the added value of ICTs – to lever investments in growth as well as to promote higher efficiency and enable expenditure reductions in the public administration - is an important contribution for Spain's sustainable recovery." Documents in English Documents in Spanish Spain has already undertaken a number of measures towards improving communication infrastructure. It has adopted an ambitious approach for guaranteeing broadband availability by including broadband service at 1 Mbps in the universal service obligations. Several measures in the areas of spectrum and in-building wiring regimes can be considered OECD best practice. Spain auctioned a total of 310 MHz of spectrum in 2011 and raised EUR 2 billion. Nonetheless, Spain still needs to specify how and when it will meet the targets of the European Digital Agenda, particularly on broadband connectivity. The European broadband targets are: In terms of ICTs in the public administration, Spain has achieved an impressive supply of online public service delivery but needs to implement effective measures to support a greater user uptake in order to benefit from returns on previous investments. Data and evidence should be used to ground business cases with a clear focus on the value of ICTs – both in decision making and project implementation. Additionally, governance measures should be put in place to ensure national-regional alignment of e-government policies and implementation. The report has been presented to key members of the Spanish government and to the High-Level Committee Group of Experts of the Spanish Digital Agenda. Information contacts for Journalists More information on OECD work Follow us on :
<urn:uuid:e9ea0894-39c2-4786-8833-d89fea43b42f>
CC-MAIN-2022-33
https://www.oecd.org/governance/reapingthebenefitsofictsinspain.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.911698
483
1.609375
2
Welcome back, everyone! It always feels like it takes forever for the kids to show up and it was so exciting to see them all with big smiles this morning as they arrived. I am nearing the end of week three back in Beijing. It has been a busy three weeks welcoming new teachers and getting ready for the start of school. There is always a bit of a lull for us at this time of year, we work hard to get things ready and support teaching and learning as you come back to school, but then once the kids are back…you are busy and we are always a bit at loose ends as we wait for things to settle down. As we welcomed new teachers back this year we made a shift in how we spoke about some of our work here at ISB. One thing that is always clear when we are working with new teachers is that ISB has a lot of systems and structures and acronyms…we love acronyms. This year in an effort to be less overwhelming, we thought…we have all these systems and structures to create alignment and consistency to our curriculum, but why? What are the core values that underpin the work we do in the Office of Learning to support student learning? Why do we have things like the curriculum review, common formative assessments, data meetings etc. For us, it was easy to answer the question about why we have the systems and structures we do at ISB: equity, purpose and deep, relevant learning. The goal is to bring clarity to what we do at ISB. Equity is achieved by: - Consistent learning goals at grade-levels and in shared courses - Consistent level of challenge so that students have consistent expectation across grades and courses - Students with varying needs are provided what they need to succeed - Experiences will vary from classroom to classroom, that is the art and craft of teaching and what you were hired for, and the quality fo the education you receive at ISB should not depend on who your teacher is. - Although we’re a highly mobile community, we don’t change our curriculum just because a particular teacher happened to leave—we make purposeful decisions about curricular change. - We aim for purposeful increases in challenge from grade level to grade level. - Our decisions are researched-based and intentional. If we cannot answer why and back it up, we should not be doing it. Deep, Relevant Learning: - Students should spend their time inquiring, solving problems, analyzing, and creating, not only memorizing. - Students have voice and choice in their learning as we seek to deepen our work and understanding around personalized learning. - We are working on integration because the world we live in does not present us problems in silos. They are complex and sticky, requiring a multi-disciplinary approach to understand them and think about solutions. - We have a focus on design because we feel this is a vehicle by which we can engage our students in these deeply relevant learning experiences As we work together this year, these values around our work and learning together will come up again and again. We are excited for another year of collaboration and support and looking forward to seeing and learning form you as you deliver amazing learning experiences to your students. Let the year begin!
<urn:uuid:509caac3-6ab8-4c01-aa99-84d530292c33>
CC-MAIN-2022-33
https://www.learn.isb.bj.edu.cn/2019/08/19/what-do-we-value/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.967625
678
1.875
2
Regenerative medicine utilizes the body's own cells to heal and regenerate damaged tissues in acute and chronic conditions. Therapies of Regenerative Medicine include: - Platelet Rich Plasma (PRP) - Bone Marrow Aspirate Concentrate (BMAC) Stem Cells What can regenerative medicine be used for? - Acute and Chronic Soft Tissue Injuries - Tendon Injuries - Ligament Injuries - Muscle Injuries - Certain Spinal Conditions What is Platelet Rich Plasma? Platelet Rich Plasma (PRP) is a highly concentrated blood sample that contains isolated cells (platelets) and the fluid portion of blood (plasma). When used as a therapy, PRP can help regenerate and heal tissues by: - Recruiting cells to an area of injury to clean up dead and injured cells - Releasing proteins called "Growth Factors" which are responsible for tissue regeneration. What's involved with PRP therapy? If your veterinarian has determined that PRP therapy is right for your pet, he/she can process and treat your pet with PRP during an office visit. A small amount of blood is taken from your dog and is processed using a specialized system that concentrates the platelets and the plasma. Once the PRP processing is complete, it is injected directly into the area of injury. What results can be expected from PRP therapy? Many veterinarians have noted therapeutic effects to last between 6-12 months for dogs with mild to moderate osteoarthritis. What are Stem Cells? Stem cells have the ability to differentiate into any type of cell. They can also activate other surrounding stem cells and recruit additional cell types to aid in wound healing and tissue repair. What's involved in Stem Cell therapy? If your veterinarian has determined that your dog is a candidate for stem cell therapy, he/she can process and inject the stem cells during an office visit. A small amount of bone marrow is collected from the femur while the dog is under general anesthesia. It is then processed using a specialized system that isolate and concentrates teh stem cells. Once teh processing is complete, the stem cells are then directly injected into the area of injury.
<urn:uuid:22430ceb-17a1-47ca-92f7-33f36bc3d5d1>
CC-MAIN-2022-33
https://www.alpineanimalhospital.us/regenerative-medicine.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.930518
477
2.734375
3
Medical training will not be one thing obtained simply or rapidly. Conventional medical training requires a four-year undergraduate program, a four-year graduate program in medical college, and a residency that may take wherever from three to seven years, to not point out the checks essential to follow medication within the state they dwell in. Every thing from fundamental remedies to delicate surgical procedures requires follow. Whereas a few of these procedures could be practiced on cadavers or dummies, the perfect training comes from hands-on expertise. Nevertheless, these experiences aren’t all the time accessible. How can we guarantee the following era of medical professionals has the coaching and training to look after future sufferers? What position will synthetic intelligence (AI) and robotics play in the way forward for medical training? AI for Diagnostics In accordance with info collected by the Facilities for Illness Management and Prevention (CDC), upwards of 70% of medical selections are contingent on laboratory outcomes and diagnostics. Complete and correct diagnostics are an integral cornerstone of medical training and remedy. Introducing synthetic intelligence could make diagnostics extra correct. Early functions of AI in diagnostics might help streamline workflows and even present extra correct general diagnostics. These programs can type by huge information shops, evaluating affected person checks and scans to a wealth of beforehand collected diagnostic info. One AI system at Tulane College can at the moment detect and diagnose colorectal most cancers extra precisely than pathologists with expertise on this specialization. AI won’t ever substitute the necessity for a talented diagnostician, however it could assist complement their abilities, offering quicker diagnostics and higher affected person outcomes. At the side of hands-on expertise, AI can present college students and professionals with the chance to additional develop their abilities and enhance their experience. The demand for AI in healthcare will enhance within the coming years, with Enterprise Insider projecting it’s going to develop by 48% yearly between 2017 and 2023. Advances in Robotic Surgical procedure There are all the time appendix removals, breast biopsies, and cesarean sections that want somebody behind the scalpel. In the USA, surgeons carry out greater than 300,000 appendectomies yearly, so new surgeons have loads of alternatives to hone their abilities in these widespread procedures. Rarer surgical procedures or those who belong to a selected specialty could also be more durable to come back by, making it tougher for medical college students to get the expertise they should full these procedures sooner or later. Whereas some robots can be utilized in hospitals to carry out extra mundane (but nonetheless vital) duties, they will additionally present help for a number of the most important. Surgical robots have gotten extra widespread yearly to help expert surgeons with delicate operations, however they may also be helpful for training. Many of those gadgets can report the procedures they full. These recordings can then be used to create a digital surgical coaching program utilizing information collected from dwell sufferers. It is probably not as efficient as hands-on expertise, but when a selected sort of neurosurgery solely occurs annually, it might function the following smartest thing. Chatbots as Training Assistants The COVID-19 pandemic modified so many issues. Distant work and digital training grew to become the norm for a few years. Whereas face-to-face training is slowly resuming, there are nonetheless functions for the strategies and applied sciences that helped carry us by the pandemic. Chatbots, for instance, are able to serving as medical simulations and educating medical college students find out how to work together with sufferers. Telehealth appointments proceed to develop in recognition and require strict protocols to guard affected person privateness. Chatbots have developed into helpful instruments for customer support and the shopper expertise in numerous fields, from medication to retail and all the pieces in between. Because the programming continues to advance – particularly when paired with AI – these chatbots might assist fill in any gaps in staffing transferring into the longer term. The Subsequent Technology of Medical Training There isn’t any method to make medical training quicker or cheaper. Nonetheless, there’s a rising number of instruments making it simpler for many who select that path to get the expertise and training they should present the perfect care doable Be taught extra about Robots Integration with RobotLAB
<urn:uuid:ee59dc56-70a6-4bc0-bcbe-8a72b23116dc>
CC-MAIN-2022-33
https://www.educationwebonline.com/the-way-forward-for-medical-training-depends-on-ai-robotics/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz
en
0.93865
883
2.59375
3
On Wednesdays, we look at artist statements or design philosophy statements and discuss the best vocabulary to describe an artwork or design. Today’s piece is an oil painting by Scott Naismith of Glasgow, Scotland, called ‘Primary Sky.’ Here is the text from his Artist-A-Day About page, in italics. With the ambition to become an artist, Scott studied at Duncan of Jordanstone College of Art, Dundee. In June 2000 he left with a BDes in Illustration and printmaking. Since graduating Scott has been a full time artist, working from his studio in Glasgow. Much of his time is spent travelling around the country looking for inspiration for another take on the Scottish landscape. The many lochs, glens and isles of the West coast are amongst his favourite subject matter for his vibrant and atmospheric oils. Since 2003 Scott has also been a part time lecturer at the Creative Arts Department of Reid Kerr College, Paisley. Scott uses vivid colours in a vigorous application to represent the fast changing light conditions of the West coast of Scotland. Colour use often becomes an entirely emotional response to the subject while tone can remain representational. The love he has for his native Scottish countryside is portayed in his work through an ebullient energy with which he handles the colour with pallette knife and brush. Scot describes his work by saying, “After 10 years of painting the Scottish landscape, my recent work now becomes more involved with cloudcover and its effect on light and colour through both its translucent and opaque properties. Clouds are visible masses of water droplets or frozen ice crystals suspended in the atmosphere . They have the ability to refract and reflect, creating an ever changing perception of light which inspires my use of colour. I am constantly refering to the paradox of a cloud’s peceived weight and its fragility and the relationship between the cool and warm colours created by it. I have become increasingly interested in catching the moment when heavy overcast clears to reveal clear blue sky, a cool colour that complements the warmth it brings. While the most obvious manifestation of light refraction at this time would occur in the form of a rainbow, I will be concerned with accentuating the infinite, more subtle effects.” First, let’s take a minute to look at the structure of this artist statement. Naismith begins by giving us some information from his bio and talking about what inspires him as a full-time artist. In the next paragraph, he talks about his style and his process. In the third paragraph, he talks about his recent work and what he hopes to accomplish with it. These are all important points to include when writing a good artist statement. Next, let’s look at the words he uses. In the first paragraph, he describes his work as vibrant and atmospheric. Vibrant means bright and colorful, and atmospheric means something that describes the atmosphere, or the space around us – often the sky. Since his paintings are colorful depictions of the sky, this is a perfect way to describe them. He also uses the phrase for another take on the Scottish landscape. We use take as a noun this way to mean another way of looking at something: a new take on…, a different take on…, a fresh take on… something. He also talks about the different types of landscapes that he paints as his subject matter. Lochs, glens and isles are Scottish words for lakes, valleys, and islands. In the second paragraph, he describes his painting process as a vigorous application, which means he applies the paint with a lot of energy and strength. Next, he talks about how he uses bright colors to show his feelings about a subject, but he tries to keep the tone of the color true to real life. He tries to show his love for his country with ebullient energy, which means it is very lively. In the third paragraph, he talks about the effects of clouds in his paintings and how they change the look of the light and color. He describes what clouds are made of and talks about how they refract (bend) and reflect light which changes the way the light looks and the color he uses. Next, he says, I am constantly refering to the paradox of a cloud’s peceived weight and its fragility. A paradox is made up of two opposite things that are together, and here he’s talking about how a cloud looks heavy and yet is still fragile. He also describes the opposite colors that are created by this paradox. He talks more about complementary warm and cool colors in the next sentence. In the last sentence, he says that the most obvious manifestation of light refraction at this time would occur in the form of a rainbow. This means that the most noticeable example of light refraction is a rainbow. He finishes by saying that instead, he wants to show and bring attention to the many more subtle effects of light, which means the effects that are not as easy to notice. What do you think of this painting and the artist statement? Do you agree with my comments? Do you have questions about the vocabulary? Do you want to suggest a piece for me to discuss next week? Leave a comment below! I’ve chosen 5 words or phrases for you to focus on today. They are in bold. If you don’t know them, look up the meaning, synonyms, antonyms, and other forms of these words. You can find links to Merriam-Webster dictionary sites at the bottom of this page. To see the original post at Artist A Day, click the link below:
<urn:uuid:ba609262-4351-4702-ad94-24fc529f90ed>
CC-MAIN-2022-33
https://jessgardnercoaching.com/wordy-wednesdays-13/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.974999
1,174
2.03125
2
« 上一頁繼續 » things before him, without thinking about himself; what he is, and what is to become of him ? and these thoughts will lead him to his prayers; that he may be ready to receive into his mind the good seed of God's word, and to lay it up in his heart, as the grain is covered in the earth, that it may bring forth fruit to life eternal. Then shall the angels come at the end of the world, when the great harvest shall be gathered, to take the elect into the kingdom of God. If the husbandman thinks on these things, his work will be sanctified; and he himself will be brought nearer every day to the kingdom of heaven. It is very truly said of the husbandman, that his work is never done ; every season, every day, brings some new employment with it. It is the same with the Christian : his work is never done; and he would be under a dangerous mistake, if he should think it is: for the tempter is always at some new device, to give a Christian sorrow or trouble; he never thinks his work done, till the man is destroyed, and made a child of hell, instead of a child of God. I would have it here to be remembered, that I am only giving a few examples, which the learner is to practise upon, and be multiplying all the days of his life. I open a school-door, into which he that is disposed may enter and profit according to his capacity; the employment is delightful; and the matter inexhaustible. In our observations upon other people, charity and all the christian virtues will be exceedingly promoted, if we use ourselves to make a short prayer on what passes before our eyes. Thus if we see one that is blind; how proper would it be to say, “Lord, thou hast taken from that man bodily sight, give him the sight of the mind, which is far better.” If you see one that is lame, you may say, “Othou who didst enable the lame to walk ; tho’thou art not now present with us, to heal the infirmities of our bodies, thou canst still show us the path of life, and enable us to walk in the way everlasting: thus shall the halt and lame enter into life.” If we hear of any one that is fallen into some dreadful sin or calamity, it would be proper to say, “Lord, I bless thy name, that I myself am not made an example to that man, who is now made an example to me : raise up him that is fallen ; and let me not be high minded, but fear; for blessed is the man that feareth always in such a world as this.” If you should hear the bell sound for a funeral, you may say, “Lord, make me wise to consider my latter end: that while I live I may live unto thee, and when I die, I may die unto thee, so that living and dying may be thine." Once more : you should be present when criminals are judged at an assize; think of the great tribunal of Jesus Christ : think, how we shall all be called out of our graves, to stand before his judgment-seat : in which case it is hardly possible for a man to turn his eyes towards himself, without saying, “Lord, how, where, shall I appear in that dreadful day? O let thy holy angels find me, to strengthen and encourage me, before I dare to look upon thy face ; that I may have boldness in the day of judgment, and find myself placed on thy right hand among the heirs of salvation : Lord remember me in that day; for my heart panteth, my strength faileth, when I think of it: but thou didst expire upon the Cross, to lessen the terrors of it to me and all poor penitent sinners." There would be no end, if we were to collect such other examples as might be thought of; the day, the night, the sea, the land, the heaven above, and the earth beneath, abound with objects to exercise our devotion. I would now say a word or two on the advantage of praying in this manner. If If prayer be be a labour to the mind, there is none of it here: a small transient ejaculation is sufficient to signify the disposition of the heart, even though it be not uttered by the lips: for God is a witness to the meditations of the heart. Therefore it may be used in society, as well as in solitude: and in whatever work a man is employed, provided it be lawful, it will not be interrupted but promoted. Is the husbandman interrupted, if, when he casts the seed into the ground, he prays that the seed of God's word may take root in his own heart? so far from it, that it will bring down a blessing upon himself and his labour; and improve his daily work into a work of grace; a work, by which his mind will be kept in conştant practice, to a temper of piety ; so that he may be strictly said, to walk with God, as the Saints did of old; which should be the first object of a Christian's ambition. The agreement between the objects of the natural world and the objects of revelation, so amply and illustriously displayed in the Scriptures, shews (to those who understand it) a wonderful sight; it shews the whole Creation as one great picture of divine truth: which will give as much entertainment, and afford more variety to the imagination of a Christian, than all the works of genius, which all the wit of man ever did, or ever will invent. It is as wide as the world, and as bright as the ocean, when the sun shines upon it. Religious meditation and devotion draw it forth into use; and shew so many ways of applying it to the edification of the mind, that if we can bring any qualified person to this one employment, he will never complain that Christianity is a dry study. It infuses a new spirit into common things, which in themselves are dull and insipid : every trifling event assumes a new figure and new importance, when applied to spiritual things : every common object changes its nature and value : * the touch of a devout mind has a magical effect upon it, and turns it into gold; so that to live by this rule, and turn all objects to a spiritual use, is the next thing to living in a spiritual world. There will be this further advantage, and a great one it is, that we shall find this sort of devotion our best security against temptation. * If the reader wishes to know better this art of applying natural objects to sacred subjects ; I would desire him to consult a small Key to the language of Propbesy, bound up with the third edition of the Book of Nature; also, Lectures on the Figurative Language of the Scriptures. The husbandman's Manual; with such other things as he can collect of the same kind : particularly a treatise on Ejaculatory Prayer, by the Rev. Robert Cooke, late Vicar of Boxted, in Essex. All printed for Rivingtons,
<urn:uuid:1daccdb6-9bdb-4728-8a18-74f8ea3d7e88>
CC-MAIN-2022-33
https://books.google.com.hk/books?id=FXUAAAAAMAAJ&pg=PA46&vq=%22but+wounds,+and+bruises,+and+putrifying+sores:+they+have+not+been+closed,+neither+bound+up,+neither+mollified+with%22&dq=editions:OCLC215046153&lr=&hl=zh-TW&output=html_text
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.963466
1,543
2
2
Kolkata, West Bengal: Kolkata (formerly Calcutta) is the capital of India's West Bengal state. Founded as an East India Company trading post, it was India's capital under the British Raj from 1773–1911. Today it’s known for its grand colonial architecture, art galleries and cultural festivals. There Local resident adopts off Grid Power with Loom Solar's Monocrystalline panel which is one of the residential installations in the region. The 720 watt solar panels are all set assure that the electricity produces shall save 28 trees over its lifetime & reduce carbon footprint by 30 Tons. The acceptance of Loom Solar's Monocrystalline panel has been the testimony to the fact that these modules are higher efficiency, most durable, and quick at plug & play mode.This off Grid Power installed at the f house of Mr. Manjit mandal shall generate 22000 units of electricity in its lifetime. This Monocrystalline panel has been installed by our our Distributor - Green Watt Solar Energy near by Kolkata, West Bengal. You can call on 9007 33 43 56
<urn:uuid:2b2faf07-d4db-4dfd-9f10-0afb845e04f0>
CC-MAIN-2022-33
https://www.loomsolar.com/pa/blogs/kolkata/720watt-off-grid-power-installation-in-kolkata-west-bengal
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.922446
232
1.664063
2
Based on qualitative interviews with musicians, label owners, owners of clubs and journalists, this paper describes Vienna's independent music scene from different angles. Beside of the pure description of the field of creative production (Bourdieu), we focus on the economic aspects of the scene and the relationships between the members of the scene. We show that the music production within the scene does not follow the rules of the market. It is neither organized within hierarchies, but mostly works on the basis of informal exchange. This works because the scene members are motivated intrinsically. So the artistic expression, high quality and originality are most important - and not money or fame. The Viennese music scene is therefore another example for an interesting phenomenon: a non-market or demandoriented production field within a highly capitalistic environment. |Name||Schriftenreihe / Forschungsbereich Wirtschaft und Kultur| - Schriftenreihe / Forschungsbereich Wirtschaft und Kultur
<urn:uuid:f9868b26-92ce-4340-b7f9-67eee8974191>
CC-MAIN-2022-33
https://research.wu.ac.at/en/publications/die-wiener-indie-szene-independent-networking-innerhalb-einer-ver-3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.865337
219
1.765625
2
Cognitive mediation of adult age differences in language performance. - Additional Document Info - View All Young (M = 20 years) and old (M = 68 years) adults completed language processing tasks, measures of working memory capacity (backward span and the n-back lag task), inhibitory efficiency (Stroop interference), and processing speed (color naming). regression analyses revealed that each of the resource measures significantly predicted language performance and attenuated variance in language performance that would otherwise be attributed to age. When speed variance was entered into the equation first, the mediating influence of the inhibition and working memory measures remained significant. When speed and inhibition differences were controlled, the working memory measures could not reliably predict language performance. These results suggest that language performance differences may be fundamentally mediated by age differences in processing speed and inhibitory efficiency. has subject area
<urn:uuid:17a7f97b-e173-4216-ae35-7708934e7a85>
CC-MAIN-2022-33
https://experts.mcmaster.ca/display/publication1564416
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.918959
213
2.59375
3
Despite its many portraits of players in uniforms without team logos, over 100 capless pictures, and overall plain card design, the 1961 Topps Baseball card set has always been popular among hobbyists, and today is considered a classic. How did this came about you may wonder? Well, the main reason is that the set has no fewer than 587 cards, being one of the largest sports sets ever launched by Topps in the “vintage” era. Also, there are quite few subsets with wonderful cards, as well as a few different versions of some cards, which has given rise to many discussions. The set is undoubtedly nostalgic. The 1961 baseball season was a remarkable one in many ways. Just think of Maris and Mantle. It was also the time when the sport underwent a major expansion. All things considered, the 1961 Topps baseball set still retains some magic, 50 years after kids sat on front porches all over America and sorted, flipped and traded while the Cold War played in the background. Topps’ 1961 baseball set was the largest the company had created up to that point, featuring 587 cards in six series. Unlike the cards in the previous years, the 1961 cards were vertical and plain, Topps doing away with the fancy logos or autographs used in the past. On the front was a simple portrait of the player, and on the bottom, a colored box featuring his name and team. Many used to the colorful print of the 1960 set were surprised at the toned-down look of the ’61s. The back featured the same basic player facts that previous editions did, but the fancy quizzes or ‘Make a Photo’ scratch-off areas were gone. The only exceptions were the Thrills cards, which had a newspaper headline and a story on the backside, and which made up one of the many subsets. Where are the logos? It was not the plain design that disappointed the most. The 1961 Topps Baseball set featured loads of cards in which players did not appear in their teams’ official uniforms and hats. They were dressed in plain tops – the logos were just not there. The reason? The 1961 season saw the Major Leagues expand by two teams (Angels and a new Senators team while the old Washington franchise moved to Minnesota). Thanks to the changes and the resulting expansion draft, players were switching sides until just before the beginning of the season. Topps had to start production of the cards way before the rosters were even close to finalized, and their strategy was to keep the poses and photos used as generic as possible, and then supposedly add the logos just before the set came out. What happened in the end was that the logos disappeared completely. Also about one fifth of the cards show players with no caps. Though one would have expected that this lack of logos and caps may have made the series less attractive for collectors, the truth is that this has not really happened. The huge number of cards and the cool subsets have alleviated all problems with the photos and for many, seeing the players’ heads in all their glory is nostalgic and fun! Subsets and Top Cards To compensate for the rather plain portraits, the 1961 set features a handful of interesting subsets. There’s a league leaders series (#41-50), a Thrills series (#401-410), a Most Valuable Player series (#471-486), two managers series (#131-139 and #219-226), a World Series highlights series (#306-313) and 7 checklists. There’s also a highly prized All-Star subset that ends the collection. Some cards in the set have become elusive. While the #1-370 cards are relatively easy to find and quite affordable, the #371-446 and #447-522 cards are becoming increasingly rare. Cards #523-589, the dreaded high numbers, were the last one to be released, and they are the hardest of all to find. Mickey Mantle, Hank Aaron and Roger Maris All-Star cards are the highest priced high numbers, but #559 Jim Gentile is a tough one, too and #541 and 563 are hard to find in near mint or better. The most sought after card in the set is, not surprisingly, #300 Mickey Mantle, which can fetch several hundred to several thousand dollars in high-grade. There are several Hall of Famers, of course, including Willie Mays and Roberto Clemente, but the rookie card class is limited. The Ron Santo, Juan Marichal and Billy Williams cards are the first for each. Finally, there are quite a few variations, two notable ones being the two #463 cards(Jack Fisher and Braves team, which is #426 in the checklist) and the three versions of the #98 checklist. The set is numbered to 598 but there are only 587 cards in the set. #426, 587 and 588 weren’t issued. PSA lists the value of graded 1961 Topps sets at anywhere from $4,757 for an excellent condition group to $85,365 for a set of all mint 9’s. Ungraded EX-EX/NM sets will generally cost $3000-$3500. Full of subsets and surprises, the 1961 Topps Baseball card set is today one of the most prized vintage sets. It has many outstanding photos of fantastic players, some interesting sets within the set, a terrific selection of players– and it celebrates a great season in the history of the sport. You can see 1961 Topps baseball singles, lots and sets on eBay by clicking here.
<urn:uuid:270b2ea4-60d1-4790-9f60-6ba4e41f6087>
CC-MAIN-2022-33
https://www.sportscollectorsdaily.com/1961-topps-baseball-still-magic-after-50-years/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.977833
1,165
1.578125
2
Using natural anxiolytics and pheromones and not driving on a full stomach are simple tricks that help dogs and cats to travel without dizziness and happy this vacation This explains why 50% of people who live with dogs and 25% of those who share their lives with felines have already travelled with their furry friends. Many will do it again this Christmas. The following essential guide is directed for them to have a happy trip with dogs and cats in the car , without dizziness, stress or dangers . Traveling with cats and dogs at Christmas But there are also more and more people who want to share their time with them, which includes vacations. In fact, 54% of those who live with dogs have already taken their furry companion with them on vacation, the same as 26% of people who do so with kittens. Traveling with calm cats Cats are not friends to travel, but anchoring their carrier in the back seat of the vehicle, using pheromones and feeding them three hours before starting the journey are tricks that help them. In necessary cases, the veterinarian will recommend an anxiolytic, since the sedative is hardly used anymore, because it causes damage to the cat’s health. There are natural anxiolytics, created with milk proteins, which greatly relax kitties nervous about the trip. But, if the cat is under stress , it is advisable to postpone the furry vacation and hire a feline babysitter to take care of the friend in the absence of his human. For others, these tips help traveling cats at Christmas. - Carry the feline in a carrier. A safe trip with these animals involves choosing a good carrier. Most vets agree to recommend those that are rigid and have racks, as they are safer. Where to put them? The back seat of the car is the safest place. The receptacle must be well anchored with the seat belt, so that it does not move in the event of sudden braking. - Get used to the car. Cat trips by car will be less stressful if the animal gets into the car before the holidays. - Tranquillity. When traveling with cats (and dogs) in the car it is important to remain calm. The volume of the stereo should be low and the windows of the vehicle turned all the way up, to avoid that the noises of the road can frighten you even more. Traveling with dogs, goodbye dizziness! Dogs get dizzy in cars, just like people. Not being used to traveling, eating just before leaving or not staying calm and relaxed are more than enough reasons. However, car sickness is even more prevalent among puppies. The reason is that the ears of the puppies have not yet finished developing. As a result, they are also less efficient when it comes to maintaining a sense of balance. How to recognize a dizzy dog? Symptoms include inactivity, apathy, anxiety and stress, repeated yawning, excessive panting and drooling, as well as vomiting. Dogs that get dizzy are often not used to traveling. Dogs (and cats) find the car a strange space. For this reason, it is so important, before leaving, to try to familiarize the animal with the vehicle little by little. The trick is to get her to associate the trip with a positive experience. “We can put his favourite quilt and toys inside the travel carrier, or in the back area if the dog is large,. In this way, the car will be a more pleasant space for them.
<urn:uuid:a86b971c-1b5c-465d-85b9-e5b63a39b0b2>
CC-MAIN-2022-33
https://petlifey.com/guide-to-traveling-with-cats-and-dogs-at-christmas/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.967998
730
1.953125
2
One outdoor pest many people have experience with is the hornet. An old saying about “stirring up a hornet’s nest” is the last thing you want to do. There are around 20 species of hornets found worldwide. That’s a lot of buzzing going on around the world. They’ve made their presence known in Asia, Africa, Europe, and here at home in North America. Head of Household There’s no debate when it comes to the “leader of the pack.” That would be the queen. She is the domineering force and responsible for reproducing. Other females have tasks such as providing protection for the colony, taking care of the young, construction, and food gathering. The male has only one specific job and that is to mate with the reigning queen; then he dies. Hornet Life Cycle Winter usually finds young queens along with their eggs in protected areas to weather the season. During the spring, the queens begin the process of nest building, followed by directing their workers to take over the chores. She will continue to reproduce to ensure more workers as well as breed a new generation of drones (males) and queens. NJ pest control services are a good way to prevent hornets from setting up household in your yard and home. When hornets are making a pest of themselves, it’s best to contact the NJ pest control specialists at Stern Environmental. We see them all the time whenever we’re outdoors; insects. Whether crawling, walking, or flying, Mother Nature has provided a smorgasbord of insects for us to share the environment. This works out fine unless we happen to get in the way of one of these social species: the hornet. About the Hornet There are two genera; Vespa (22 species ) and Provespa (3 species). The Provespa species, unlike the Vespa, are nocturnal. In North America, the European Vespa hornet is most prevalent. Hornets are often confused with yellowjackets due to their similarity in appearance. Their distinguishable characteristics include a distinctive head and an elongated rounded abdomen. In size, some species can grow to over two inches long. Stirring Up a Hornet’s Nest There’s an old saying about “stirring up a hornet’s nest,” which means when applied to a human situation you want to avoid causing trouble. When applied to hornets, this is something you don’t want to do deliberately for any reason. They’re already an aggressive species without any provocation, but when their nests are in danger, they become even more so and attack anything in sight including humans and pets. Due to their aggressiveness, hornet nest removal is best left to a professional service with trained staff and appropriate solutions. At Stern Environmental, our hornet nest removal process will rid your home or commercial building of these unwanted pests. Call today to schedule an appointment. You’re outdoors enjoying the clear skies, brilliant sunshine, and comfortable temperatures poking your garden or maybe you’re trimming tree branches or bushes and out of nowhere, an aerial assault leaves you with a painful sting or multiple stings. You look around for the out-of-control pilot and realize you’ve happened upon a wasp or hornet’s nest and they’re reacting with pinpoint precision. Wasps vs Hornets Wasps are most aggressive when provoked. This is usually if you’ve interfered with a nesting spot. Removal of their nests is best left to the services of a wasp abatement professional for this reason. The nests may be clearly visible hanging from the eaves of a home giving you ample opportunity to steer clear, but if they’re hidden behind the siding, you can find yourself in a hurtful predicament when doing any type of outdoor home improvement project. Hornets, on the other hand, are aggressive without any particular provocation and they’ll do it repeatedly. For many, the stings of both the wasp and the hornet can cause an allergic reaction known as anaphylaxis, which, if not treated, can result in a deadly outcome. An estimated 1,500 people die annually due to anaphylactic reactions. While you may think it’s safe to handle the situation on your own, you have no idea how many stinging pests you may be faced with. For the proper help with wasp abatement, contact the experts at Stern. Just the thought of hornets is enough to make some people shudder. These pests are often a problem for NY and NJ homeowners and business owners. Still, do you know how to correctly identify them and their nests? Once you know you have hornets on your property, you’ll be able to make plans to deal with them. This should include calling NJ & NYC pest control specialists for assistance. What do Hornets Look Like? Hornets, wasps and yellow jackets are often confused for one another, yet they’re all very different. A hornet’s color is usually white and black, while the others are yellow and black. This is one of the easiest ways to differentiate between them. Also, hornets have much smaller waists than the others. One characteristic that sets hornets apart is the fact that their stingers are not barbed. This means they are able to sting repeatedly, without losing their stingers and dying. What do Hornet Nests Look Like? Hornet nests are gray and shaped like an oval. They appear to be made out of paper, but the material used to make them is actually wood and saliva. You’ll find their nests are often high above the ground, hidden out of sight. Do you have a hornet problem? NJ & NYC pest control experts can help you get rid of them. Contact us here at Stern and we’ll provide you with the help you need. If you come across a hornet nest on your property, it’s important not to panic. Your first action should be to remain calm and assess the situation so that you know exactly how to handle it, and whether or not to proceed with removal of the nest. Questions to Ask Ask yourself the following questions when you come upon a hornet nest: Is this nest in a dangerous place where people might get stung? Is it likely that the nest just started forming because it’s very small? Knowing the answers to these questions will help you know what you should do. Removing the Nest If the nest is still very small, you can use a large rock or a brick to flatten the nest. Make sure you hit it really hard, and leave it alone after you flatten it. However, if the nest is larger than the size of a tennis ball, you will need to use a can of hornet or wasp jet spray. Spray the nest thoroughly, but wait until the evening hours when the hornets will be asleep. You will want to douse the nest with spray, and then leave it alone. Observe for any activity the next day. As your NJ pest control specialists, we’re able to help you remove any nests when you’re not able to. Please contact us for an appointment.
<urn:uuid:c8dd1b92-2f97-4ebd-9f12-a43399f0c321>
CC-MAIN-2022-33
https://www.sternenvironmental.com/blog/tag/hornet-nest-removal/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.9458
1,548
2.734375
3
A building is so much more than just a roof over your head. Because buildings use 40% of all of our energy, they represent a huge opportunity: Redesign how our buildings work and we could go a long way toward solving our emissions issues. We saw the start of that this year, with the most energy efficient office ever opening in Seattle and a building in Germany that gets its power from algae that live in its walls. But buildings are also where we spend most of our time, so they should make us happy to be inside them. And so projects like the giant skyscraper in Shanghai are incredibly important. It’s filled with parks and open to the public, in an attempt to get people spending more time with nature. At the other end of the market, there’s the $20,000 house designed initially for impoverished rural Alabamans. But the houses are so nice (and so cheap), they may soon hit the market for everyone. We tend not take for granted the walls and roofs that surround us, but the new offices, new homes, and even new dorms we saw this year should show that that’s a bad decision. Pick your house of the future out here (and read about last year’s best buildings if you want more here). For years, students at Auburn University’s Rural Studio have been building cheap houses for impoverished locals. Now their designs are going mass market. Cities are so … static. The Very Large Structure will let an urban population just roll down the road if commerce or resources dry up. Housing is expensive. So why not have students live in cubes they can afford? That’s the idea behind the “smart student unit.” The just-topped 2,000-foot-tall Shanghai Tower will have huge 15-story parks throughout the structure–and it will let the public in to play in them. The Bullitt Center is made from totally clean materials, has composting toilets, and catches enough rainwater to survive a 100-day drought. And it’s 100% solar-powered, in a city not known for its sunny days. What’s the best way to incorporate nature into your living space? How about just putting a whole tree in your house? The city today unveiled the winner of a contest to design livable tiny apartments to expand studio-scale housing in the Big Apple. A new building in Germany gets its energy from what’s growing inside it. If your house is destroyed in a disaster, you don’t want to live in a tent. The Rapid Deployment Module can be assembled in 20 minutes with no tools and will last at least 10 years. Using a new type of tile that converts the chemicals in pollution into less toxic substances, the Torre de Especialidades is fighting the city’s bad air–and looking good in the process. Up to 60,000 women could eventually enroll at PNU, though their job prospects after graduation still leave something to be desired. Read more of our best stories of the year in these categories: Top stories, infographics, photography, maps, buildings, design, cities, food, transportation, innovative workplaces, bikes, collaborative consumption, energy, crowdfunding, robots, environment, health, education
<urn:uuid:438eb412-205c-4af6-9613-1a7f282c986f>
CC-MAIN-2022-33
https://www.fastcompany.com/3023644/the-top-11-buildings-of-2013
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.949043
688
2.609375
3
More than three-quarters of Florida’s corrections officers have less than two years’ experience. In some state prisons, a single CO will be left alone to supervise 150-200 inmates in a jail block. Contraband has become so bad, one random search of (just half) a Dade facility turned up $15,000 in street value of cocaine, seven knives, 46 cellphones and an array of other drugs and illicit materials, said Department of Corrections Secretary Julie Jones Thursday. The state’s prisons chief was in front of the Senate Appropriations Committee, having to explain just how bad the situation was, even though the state’s inmate population dropped by 3,000 from the year before. Three main problems, she said, were safety, recidivism, and operational deficiencies — all due to a lack of funding. Corrections officers are paid so little, and have such a high stress in a dangerous job, she can’t keep them on the payroll. “I’m losing state and local officers to state and local businesses — even to Wal-Mart,” she told the committee. “We hire thousands of new corrections officers every year. We’re a hiring machine. The problem is we can’t keep them.” She said turnover for COs has increased 95 percent since 2009. Entry-level base pay for a corrections officer before completion of on-the-job training hovers around $29,000. It goes up, slightly, when a combination of certifications and on-the-job training are completed, but for working 12 hour shifts — sometimes doubles due to the lack of staffing, especially at correctional facilities specializing in mental health issues, Jones said — it’s no wonder why she can’t keep anyone on for more than a year or so. That tempts some COs to earn a little extra money on the side. Jones said, unfortunately, some of the ones securing the facility are the ones bringing in the contraband or are looking the other way in exchange for bribes. And with career field numbers so low — with a current vacancy rate of 13 percent statewide, she said — security issues become a factor. Drugs and weapons are stashed in trash cans or simply tossed over fences by friends or loved ones working in cahoots with inmates. When a random search of a prison, or part of a prison, takes place, inmates caught with illegal materials, products or drugs face more charges, leading to high recidivism rates. Since 2009, the introduction of contraband into the prisons system has increased more than 400 percent. Inmate on inmate attacked have increased 68 percent during the same period, she cited. To boot, she admitted, when questioned by Sen. Jeff Brandes, facilities are falling apart. Fencing at some prisons is so old, or dilapidated, the department doesn’t have a way to mend it without tearing it all down and rebuilding or renovating, and there simply isn’t the money to do that, she said. Without a new and increased pay package, she said she doesn’t any change for the better coming. She’s requested more money and according to the chair of the appropriations committee, Jack Latvala, the cavalry is coming. “I am pleased to report, in consultation with Sen. [Joe] Negron … help is on the way from the Florida Senate,” he said. “Our budget will include some substantial help on this issue. … Let’s go to work and make it happen.”
<urn:uuid:5e93a2aa-fc1a-4ab0-b596-562b8bc97718>
CC-MAIN-2022-33
https://floridapolitics.com/archives/234079-florida-prison-chief-state-losing-corrections-staff-wal-mart-creating-insecurity-system/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.94815
751
1.53125
2
Dash Dev Tools is a set of tools to make debugging and developing Dash apps more productive & pleasant. These tools are enabled when developing your Dash app and are not intended when deploying your application to production. Dash Dev Tools includes: - Callback Graph - Dash displays a visual representation of your callbacks: which order they are fired in, how long they take, and what data is passed back and forth between the Dash app in the web browser and your Python code. Code Reloading - Dash restarts your app when you change code in your project. Hot Reloading - Dash automatically refreshes the web browser and your CSS files when you make a code change so that you don’t need to manually refresh your browser. In-App Error Reporting - Dash reports error messages in the browser instead of your terminal so that you can stay focussed on your app and your code. Component Validation - Dash will display error messages if you pass malformed data to your components. Better Error Messages - Dash prunes certain stack traces from Flask & Dash internals and logs from Flask, Dash’s underlying web server. These Dev Tools features are turned on when the app is run in development run_server and when See the “Configuring Dash Dev Tools” section at the bottom to turn individual features on and off. 60 second demo video (no sound) The Dash Dev Tools Callback Graph provides Live Introspection, Profiling, and Live Debugging of your callback graph. type- Whether the callback was a clientside callback or a serverside callback. call count- The number of times the callback was called during your session status- Whether the callback was successful or not. time (avg milliseconds)- How long the request took. This is the same as the summary on the green box. total- The total time of the request. compute- The time spent running your callback function and serializing & deserializing the data. Serialization and deserialization is a data conversion step that the dashframework framework performs when receiving and sending data to the client. network- The time spent transferring the data from the browser client to the server and back. user: <task-id>- (Optional) Custom timing events captured by dash.callback_context.record_timing(see “Custom Timing Events” below) data transfer (avg bytes) download- The number of bytes sent from the browser client to the server. This is the data that is passed into your callback function: the upload- The number of bytes sent from the server back to the browser callback. This is the data that is returned from your callback function: the outputs- A JSON representation of the data that was returned from the callback. inputs- A JSON representation of the data that was passed to your callback function as state- A JSON representation of the data that was passed to your callback function as The timing data reported above includes the entire time that the callback is running. To report more granular timing data about certain steps within your callback, use dash.callback_context.record_timing. For example: from timeit import default_timer as timer @app.callback(Output('graph', 'figure'), Input('dropdown', 'value')) def update_graph(value): start_1 = timer() # perform some action dash.callback_context.record_timing('task_1', timer() - start_1, 'The 1st task') start_2 = timer() # perform another action dash.callback_context.record_timing('task_2', timer() - start_2, 'The 2nd task') return px.scatter() With this, the custom timing data is available in two places: dash.callback_context.record_timing(name, duration=None, description=None) Records timing information for a server resource. :param name: The name of the resource. :type name: string :param duration: The time in seconds to report. Internally, this is rounded to the nearest millisecond. :type duration: float or None :param description: A description of the resource. :type description: string or None By default, Dash includes Code Reloading & Hot Reloading. This means that Dash will automatically refresh your browser when you make a change in your Python or CSS code. The Code Reloading feature is provided by Flask & Werkzeug via the A caveat of Code Reloading is that your app code is run twice when starting: once to start the parent process and another time to run the child process that gets reloaded. Hot reloading works by running a “file watcher” that examines your working directory to check for changes. When a change is detected, Dash reloads your application in an efficient way automatically. A few notes about how Code Reloading & Hot Reloading works: - Hot reloading is triggered when you save a file. - Dash examines the files in your working directory. - CSS files are automatically “watched” by examining the assets/ folder. Learn more about css - If only CSS changed, then Dash will only refresh that CSS file. - When your Python code has changed, Dash will re-run the entire file and then refresh the application in the browser. - Hot reloading will not save the application’s state. For example, if you’ve selected some items in a dropdown, then that item will be cleared on hot-reload. - Hot reloading is configurable through a set of parameters: dev_tools_hot_reload, and the If Hot-Reloading is Too Slow If your application initialization is too slow for hot reloading, then consider: .arrowfile format so that loading the file is fast or a picklefile to save & load all of your variables. Our intention was to reduce the context switch during development between terminal, code editor, browser and browser debug console. With error messages in the app, you can just focus on your browser and your code editor. To hide the error message, click on the Blue Dev Tools icon in the bottom right corner and then click on the “Toggle Errors” icon. Dash’s Dev Tools validates the shape of the properties of components. For example, if you provide value as a string to dcc.Checklist( options=['New York City', 'Montréal', 'San Francisco'], value='New York City' ) Instead of as a list: dcc.Checklist( options=['New York City', 'Montréal', 'San Francisco'], value=['New York City'] ) You’ll see an error message like: Invalid argument `value` passed into Checklist. Expected an array. Was supplied type `string`. Value provided: "New York City" As a Dash component author, you do not need to write any input argument validation logic for your component. However, you will need to provide type definitions within the propTypes of your component. The more specific, the better. These propType definitions are used for validation and automatic docstring generation. Note: You can disable the check by setting dev_tools_props_check=False. But we strongly recommended to fixing the property type errors instead. In dev mode, component authors can include source maps or dev bundles in their component suite. These source maps or dev bundles will be served dev_tools_serve_dev_bundles=True. In production they will be omitted. The component libraries that are maintained by Plotly (including dash-table) provide the sourcemaps via asyncloading. This means that they will be loaded on-the-fly when requested by the browser in the browser’s console regardless of the value of Dev Tools is configured by the run_server command, which is typically: app.run_server(host='127.0.0.1', port='7080', proxy=None, debug=False, dev_tools_ui=None, dev_tools_props_check=None, dev_tools_serve_dev_bundles=None, dev_tools_hot_reload=None, dev_tools_hot_reload_interval=None, dev_tools_hot_reload_watch_interval=None, dev_tools_hot_reload_max_retry=None, dev_tools_silence_routes_logging=None, dev_tools_prune_errors=None, **flask_run_options) debug=True, all of the Dev Tools features listed below enabled. Individual dev tools featured can be turned on or off with keyword app.run_server. These include: debug, bool, activate all the dev tools listed below. use_reloader, bool, set to Falseto turn off Code Reloading. Code Reloading restarts. dev_tools_ui, bool, set to Falseto explicitly disable dev tools UI in debugger mode (default=True). dev_tools_props_check, bool, set to Falseto explicitly disable Component Validation (default=True). dev_tools_hot_reload, bool, set to Trueto enable hot reloading (default=False). dev_tools_hot_reload_interval, float, interval in seconds at which the renderer will request the reload hash and update the browser page if it changed. (default=3). dev_tools_hot_reload_watch_interval, float, delay in seconds between each walk of the assets folder to detect file changes. (default=0.5 seconds) dev_tools_hot_reload_max_retry, int, number of times the reloader is allowed to fail before stopping and sending an alert. (default=8) dev_tools_silence_routes_logging, bool, remove the routes access logging from the console. dev_tools_prune_errors, bool, simplify tracebacks to just user code, omitting stack frames from Dash and Flask internals. (default=True) For example, to turn off the automatic reloader but keep the rest of the development features, you could run: app.enable_dev_tools(debug=None, dev_tools_ui=None, dev_tools_props_check=None, dev_tools_serve_dev_bundles=None, dev_tools_hot_reload=None, dev_tools_hot_reload_interval=None, dev_tools_hot_reload_watch_interval=None, dev_tools_hot_reload_max_retry=None, dev_tools_silence_routes_logging=None, dev_tools_prune_errors=None) enable_dev_tools when you want to turn on certain features when deploying your application with A common use case is to enable the Callback Graph to diagnose performance or network issues in your deployed application: app.enable_dev_tools( dev_tools_ui=True, dev_tools_serve_dev_bundles=True, ) We do not recommend using these settings in your deployed applications in general usage because: - Displaying serverside tracebacks is a security vulnerability - Dev Tools features incur a performance penalty: There is a cost to running component validation and loading the dev bundles. dev_tools variables can be set with environment variables, just replace the dash_ and convert to uppercase. This allows you to have different run configs without changing the code. By placing these features in run_server, we prevent you from using these features in production. As a reminder, run_servershould not be used when deploying your application in production. Instead, the app should be run with server = app.serverinstance. We don’t run use dev tools in production because: - Displaying serverside tracebacks is a security vulnerability - Dev Tools features incur a performance penalty: there is a cost to component validation and loading the larger dev bundles.
<urn:uuid:ca76a5e0-f42b-42fe-a95d-c3aa2e54d0de>
CC-MAIN-2022-33
https://dash.plotly.com/devtools
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.772943
2,978
1.742188
2
“But the Lord said to Samuel, “Do not consider his appearance or his height, for I have rejected him. The Lord does not look at the things people look at. People look at the outward appearance, but the Lord looks at the heart.” -1 Samuel 16:7 Many of us we think that God always calls the brightest and the best. In 1st Samuel, the people of Israel don’t have a king. One day, the Jewish people decide they want a king so they choose Saul. He was regal, tall, handsome, and kingly. However, he soon became a tyrant, treating people terribly. So God sends Samuel to Jesse’s house in Bethlehem to where he is going to call a new king. When he arrives, he tells the people they are going to have a party and make a sacrifice to God. Now the bible doesn’t say this, but I always believe that Samuel did this party sacrifice thing as a bit of a disguise to snoop around Jesse’s family and see who the king was. Samuel was led by the Holy Spirit and was supposed to discern by listening and feeling to find out who the next king was. So Jesse brings out his eldest son Eliab, claiming that “surely this is God’s anointed,” because he was the tall and handsome and the eldest son. But the bible says this: “God said to Samuel, do not consider his appearance, or his height for I have rejected him. The Lord does not look at the things people look at. People look at the outward appearance, but the Lord looks at the heart.” The Lord looks at the heart. One at a time, all of these sons were brought before Samuel and he keeps thinking this is the one. But God says no to all of them, and Samuel asks if there are any more sons. Jesse scratches his head and he goes well there’s, I mean I guess there’s David. David was told to stay back and take care of the sheep during this big party. He wasn’t invited. Then, Samuel says “we will not sit down until he is here.” And when David comes, he is the chosen one because of his heart. PRAYER: Thank you, God, for looking at our heart. Even though we may be rejected and uninvited, you choose us and use us. REFLECTION: Do you ever feel like David?
<urn:uuid:c0c7f9e9-6196-4aa8-ae05-d1ad3e6c7fe7>
CC-MAIN-2022-33
https://hourofpower.org/heart/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.98578
518
1.96875
2
A default is a |“||failure of a vendor to fulfill the obligations of a contract or purchase order, including, but not limited to, failure to deliver on time or unauthorized substitution of supplies, equipment, or services for those specified in the contract or purchase order.||”| A default in an action taken by a court when a party fails to plead within the time allowed or fails to appear at trial. - Michigan Dept. of Tech., Management & Budget, 8000 Glossary (Jan. 6, 1997) (full-text).
<urn:uuid:9b2ad7e4-bd79-465f-9fe9-97d595f3acc0>
CC-MAIN-2022-33
https://itlaw.fandom.com/wiki/Default
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.824501
131
1.5
2
MasterPad is a gap-filler especially formulated to have a great thermal conductivity and dielectric. It is the ideal thermal interface for application fields where there are gaps between two mating surfaces. - Highly electrical isolative, highly incombustible, and with high compression ratio. - Applicable in a wide temperature range from -60°C to 200°C. - Cushion effect provides high quality protection from deformation caused by wrapping or vibration. - The material used is environmentally friendly and non-toxic. - Passed Bellcore Specifications per document TR-NWT-000930, exhibiting superior low volatilization. - Masterpad is a gap filler, it cannot be used on high power rating components such as a CPU - Pressure must be applied, not suitable for heat sinks - The thickness of the gap-filling material MUST be thicker than the gap - Please tailor the pad size that suits your needs. 60mm x 30mm x 0.3mm| Product Release Sheet Cooler Master HTP-U01 Master Pad Cooler Master HTP-U01 MasterPad Cooler Master HTP-U01 MasterPad Questions Thermal Interface Material
<urn:uuid:d86c1bb4-9fac-4661-9d8d-c072573d9621>
CC-MAIN-2022-33
https://wehitech.com/cooler_master_thermal_compound_htpu01_2788_197.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.722503
363
1.742188
2
Baltimore Schools May Change Gradu For decades, graduating Baltimore Schools seniors have had to show that they have met or exceeded their school’s educational requirements, typically in the form of a standardized test such as the SAT or ACFor the best Maths Tutor In Ireland company, call Ace Solution Books. T. Many school districts have adopted tests that have been designed by their state’s DOE (Department of Education). While lots of kids do well on these types of assessments, there are thousands who do not; and it’s not because they haven’t learned what they should but becaus… Baltimore Schools, Patricia Hawke For decades, graduating Baltimore Schools seniors have had to show that they have met or exceeded their school’s educational requirements, typically in the form of a standardized test such as the SAT or ACT. Many school districts have adopted tests that have been designed by their state’s DOE (Department of Education). While lots of kids do well on these types of assessments, there are thousands who do not; and it’s not because they haven’t learned what they should but because they are poor test-takers. Some kids lack the skills necessary to take a standardized test successfully. Others simply freeze up. Their nerves get to them, and they cannot think clearly and fail the test or at least get a score that doesn’t truly reflect what they’ve learned. The leaders of Baltimore County Public Schools, in partnership with the rest of the state of Maryland, have finally realized that there is more than one way to assess a student’s success in school. For at least the last 5 years, Baltimore Schools have been telling their students that they must pass four High School Assessments by the end of their senior year of high school to graduate and get that diploma. The assessments taken by Baltimore Schools students are in algebra, biology, American government, and English. The problems with this blanket policy are obvious. Teachers in the Baltimore Schools spend 13 years of a student’s educational career doing their best to give them the type of Baltimore Schools learning experiences they need the most. For example, students who need extra help with Math, speak a language other than English, or those who would benefit from the challenge of a tougher writing class. Students must be held accountable to the same standards, but they don’t all learn the same way, and it’s not fair to test them all the same. Maryland schools Superintendent Nancy S. Grasmick says that Baltimore Schools students who repeatedly fail the exams will be allowed to do a senior project instead. The proposal was made in response to the fact that a minimum of 2,000 students across the state in the Class of 2009 may not graduate because of their poor performance on the state tests. Baltimore Schools students have quite a while to take and pass the tests; if they fail one or two, they can retake it. Under this new plan, for example, Baltimore Schools students who pass two of the four tests could do their senior projects in the subjects they’ve failed. Grasmick insists that the project will be rigorous, and would require the Baltimore Schools student’s entire senior year to complete. Detractors say that by telling Baltimore Schools students they don’t have to pass the exams will mean that they won’t take them seriously. Also of concern is that the students in Baltimore Schools must fail before they can take advantage of this alternative means of assessment. Students and their Baltimore Schools teachers should be given a choice in the type of assessments would best reflect what they have learned. Most, if not all, teachers keep portfolios on a student’s work throughout the school year, with the purpose of assessing a student’s progress.
<urn:uuid:8160eafe-a0f6-4c30-84be-b5da4469666b>
CC-MAIN-2022-33
http://www.marlandlasers.com/baltimore_schools_may_change_graduation_requirements/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00264.warc.gz
en
0.969811
800
2.484375
2
On Madame H.P. Blavatsky's life and work, the Blavatsky has published many of the writings of the late Theosophical historian Walter A. Carrithers, Jr. "If Madame Blavatsky (HPB) was the most influential occultist of the nineteenth century, Walter Carrithers was her sustained twentieth century champion against the charges of fraud." See more of Mr. Price's comments. Mr. Carrithers' major titles include: The Truth About Madame Blavatsky 1947. Obituary: The "Hodgson Report" on Madame Blavatsky The "Hodgson Report" on Madame Blavatsky. 1969. The Founding of the Theosophical Society 1975. "Jiddu Krishnamurti and The Return of Madame See also Appendix Letter from Walter A. Carrithers, Jr. to See also The Writings of Walter A. Carrithers, Jr. for other titles from Mr. Carrithers' pen. See also Death of an American Theosophical Historian (p. 16) by John Cooper for information on Mr. Carrither's life and work.
<urn:uuid:1a33e26b-43bb-433c-a869-f60d73604d7d>
CC-MAIN-2022-33
http://blavatskyfoundation.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.839474
302
1.9375
2
'We are too tired to be nervous': Some Ukrainian refugees return home, despite escalating Russian attacks As Ukraine's conflict with Russia nears its one-month mark, some Ukrainians are returning home, either to grab more supplies or because they believe the Ukrainian military will prevail. - More than 10 million Ukrainians have been displaced by the invasion, with 368,000 fleeing to Moldova. - Some refugees are returning home, either briefly to check on their homes, or for good. - For some elderly Ukrainians, the thought of dying somewhere other than their homeland is worse than the fear of Russian tanks. This story was produced in partnership with the Pulitzer Center. PALANCA, Moldova – Valentina Garbetz and her family piled out of the car at the Ukraine-Moldova border, shouldered their bags and headed east. Not west, away from Russia's deadly assault on their homeland. Not west, away from the terror and destruction and death on the front lines of Mariupol and Kyiv. But east, toward Odesa. “We don’t scare," Garbetz said, the wheels of her purple suitcase skittering across the potholed pavement of the Ukraine-Moldova border crossing at Palanca. A handbag slung over her shoulder, Garbetz hustled to keep up with the two other women traveling with her, passing a small crowd of westbound Ukrainian refugees waiting for a shuttle bus to a nearby emergency shelter established by Moldovan authorities. Garbetz and her family are among a small but steadily growing number of Ukrainian refugees who evacuated to neighboring Moldova at the start of the Russian invasion but are now returning home. Many plan to stay only briefly, to check on their homes or to collect clothing more suited to the warm spring weather arriving in the two former Soviet republics. Others say they're tired of living in fear and are confident the Ukrainian military will ultimately prevail, thanks in part to the weapons, supplies and intelligence being supplied by the United States and other allies. More than 10 million Ukrainians have been displaced by the invasion, with about 3.5 million refugees fleeing the country for the western neighbors of Poland, Romania or Moldova, according to U.N. officials. According to the Moldovan Border Police, 368,000 Ukrainians have fled into Moldova, and 101,000 of those have remained in the country, one on of Europe's poorest. But as war nears its one-month mark, some refugees are ready to risk going home. 'Our people are being killed':Ukrainians flee to tiny, poor Moldova as Russia escalates attacks Garbetz and her family stayed with extended family near Moldova's capital, Chisinau, but after more than two weeks away, they decided it was time to head home. Border officials in Palanca said that for security reasons they could not discuss the number of Ukrainians crossing back from Moldova, but international aid workers confirmed the number of eastbound crossers is rising daily. Most of the refugees from Ukraine are women and children; most men of fighting age have been banned from leaving to bolster the national defense. 'Everything we have is there' Tuesday, evacuee Kristina Logvinova waited to cross back into Ukraine, idling in her BMW SUV while waiting for Moldovan border officials to check her paperwork. Logvinova evacuated to Chisinau with her husband and infant when the invasion began, but after talking with friends in Odesa, she decided it would be safe to risk a brief daytime visit, despite the shelling the day before. Odesa is about 35 miles from the Palanca border crossing. "You never know where the explosions will be. I’m nervous about it but not too much," said Logvinova, a musician. "A lot of friends who are there say the situation is very normal right now." Like many refugees, Logvinova feels guilty she didn't stay to defend her home, but she decided the safety of her family came first: “I’m upset I can’t stay and help my friends and my country, but my baby is more important." Karina Hoderan, an engineer, said she and her family planned to drive to Odesa to pick up clothes, but they weren't sure when they would actually return to Moldova. Maybe immediately. Maybe not. “Everything we have is there," she said of their home. "And we are too tired to be nervous." Fleeing west, refugee Liubov Skorobohatykh said she thought it was foolish for people to return to some areas of Ukraine, especially anywhere near her home in Mykolaiv, where Ukrainian soldiers patrol the streets and residents fear further attacks. Mykolaiv, about 80 miles east of Odesa, was heavily damaged during the initial Russian attacks, but the Ukrainian military has been counterattacking. 'I will never leave Ukraine': Full of stoicism and unspoken fear, Ukrainian men steel for battle as they say goodbye to families Tuesday afternoon, Skorobohatykh and her son walked across the Moldovan border and climbed aboard a shuttle bus to a nearby refugee processing center. The United Nations says the Russian invasion has caused the fastest-growing refugee crisis in Europe since World War II. Also among the group was an elderly man with no legs, who was carried onto the shuttle bus by volunteers. “It’s a scary place at the moment," Skorobohatykh said, worrying about her sister, who remained behind. “We were really scared.” While many refugees walked across the border after long bus rides to safety, others are able to drive across, their heavily loaded cars with distinctive Ukrainian license plates flowing west into Moldova and then into Romania and the European Union. They pass dilapidated Soviet-era collective farms and green shoots pushing out of the rich, brown soil. But for some elderly Ukrainians, the thought of dying somewhere other than their homeland is more unsettling than the fear of Russian tanks. Masha Klinova waited Tuesday afternoon to drive her 80-year-old mother back east to Odesa. Klinova, an international chess champion who now lives in Israel, said her father refused to evacuate, and her mother insisted on being returned home because the immediate danger had passed. Nothing she could say would persuade them otherwise, she said. “My father said he will not go anywhere, anytime," she said. "And my mother wants to live until she dies in the motherland.”
<urn:uuid:c591acbf-e245-4365-a659-f2837e3982c6>
CC-MAIN-2022-33
https://www.cantonrep.com/story/news/politics/2022/03/23/ukrainian-refugees-return-despite-russian-war/7128658001/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.968415
1,374
1.851563
2
Dr. Frederick Harold Wilson was born in Stouffville, Ontario on the 22nd of September, 1895. He was the 3rd of 4 children born to Frederick Theodore Wilson and the former Fannie Lehman. His father was a mason and his siblings were; John “Arthur” Bruce Wilson who was born on the 28th of November, 1890 and died on the 13th of December, 1890. His sister Rhea Bernice Wilson was born on the 31st of July, 1893. She died of ammonia poisoning on the 10th of October, 1894. His younger brother Murray Cecil Wilson was born on the 8th of May, 1897 and died on the 10th of July, 1900. All of the children were buried at the Stouffville Cemetery. Dr. Wilson was the only child to survive into adulthood. Dr. Wilson was educated in Stouffville and matriculated at Stouffville Continuation School. He entered The University of Toronto Faculty of Medicine, but his studies were interrupted by WWI. Dr. Wilson enlisted in Toronto on the 13th of October, 1917. He was described as being 5’6″ tall, 148 pounds with a fair complexion, blue eyes and brown hair. Dr. Wilson was attached to the 1st Depot Battalion of the 1st Central Ontario Regiment. He was discharged from the army and joined the Royal Canadian Navy on the 14th of May, 1918 where he held the rank of Lieutenant Commander. After the war, Dr. Wilson returned to Toronto and he completed medical school graduating from The University of Toronto Faculty of Medicine in 1921. Dr. Wilson married Ethel Gertrude McRorie in Timiskaming, Ontario on the 13th of August, 1923. Mrs. Wilson was born on the 8th of February, 1894 in Chesley, Ontario. She was the eldest of 6 children born to John McRorie and the former Margaret Alice Fortune. Her father was listed as a blacksmith when she was born but he would also work as a mason until he moved his family to Durban, Manitoba and took up farming. Mrs. Wilson’s siblings were, Albert John McRorie, Stuart James McRorie and Evelyn Marguerite McRorie, Ruby Elizabeth McRorie and Dorothy Harriett McRorie. Mrs. Wilson was a nurse. Dr. and Mrs. Wilson had a son Murray Stewart Wilson who was born in Toronto on the 24th of October, 1924. Dr. Murray Stewart Wilson graduated from The University of Toronto Faculty of Medicine in 1948. Mrs. Wilson died on the 2nd of November, 1928 in Englehart, Ontario. She was buried at the Birchwood Cemetery in Swan River, Manitoba. She was 33 years old. Dr. Wilson married Gertrude Mary Hodgson in the Village of Swansea (now part of Toronto) on the 15th of June, 1937. At the time of their marriage, Dr. Wilson lived on Cockshutt Street in Englehart and Mrs. Wilson was a nurse at the Red Cross Hospital in Englehart. Mrs. Wilson was born in Preston-Patrick, Westmoreland, England in 1898. She was the youngest of 12 children born to Joseph Hodgson and the former Isabelle Philips. Her father was a cooper and her siblings were; Thomas Earl Hodgson, George Herbert Hodgson, Joseph Clarkson Hodgson, Frederick James Hodgson, Robert, Walter, Sarah, John, Adam, Edward and Victor. Her father died in 1901. Dr. Wilson practiced medicine as a general practitioner in Englehart until the summer of 1946 when he moved to Shelburne to assume the responsibilities as the Medical Officer of Health for Dufferin County. While living in Shelburne, Dr. Wilson was also the Head of the Health Department. Dr. Wilson was a member of the Rotary Club and the Masonic Order. In early December of 1950, Dr. Wilson was appointed as the Medical Officer of Heath for Kent County. He died suddenly of a heart attack at his residence located at 111 St Clair Street (in Chatham) on the 23rd of January, 1951. An article that appeared in the Chatham Daily News on the 24th of January, 1952 indicated the Dr. Wilson was a “fine, energetic and co-operative man” and that he “had the ability of applying good common sense.” Mrs. Wilson died in 1992. Dr. and Mrs. Wilson were buried at the Stouffville Cemetery. Dr. Wilson’s son, Dr. Murray Stewart Wilson M.D. died in 2009 and he was buried with his grandparents and his father’s siblings at the Stouffville Cemetery. *Mrs. Ethel Wilson’s brother’s Albert John McRorie and Stuart James McRorie both served with the Canadian Armed Services during WWI. Pte. Albert John McRorie, was killed in action at Vimy Ridge in France on the 11th of April, 1917. He was 21 years old.
<urn:uuid:b232e799-9854-4783-abef-1ee7b357a3c8>
CC-MAIN-2022-33
http://ckphysiciantribute.ca/doctors/frederick-harold-wilson/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.987448
1,059
1.953125
2
Columnist George Will on Sunday criticized what our own Jacob Sullum has been hammering on about in recent days: that President Bush's executive decision to bail out the Big 2.5 automakers is an(other) affront to the constitutional separation of powers. Here's Will: The expansion of government entails an increasingly swollen executive branch and the steady enlargement of executive discretion. This inevitably means the eclipse of Congress and attenuation of the rule of law. For decades, imperatives of wars hot and cold, and the sprawl of the regulatory state, have enlarged the executive branch at the expense of the legislative. For eight years, the Bush administration's "presidentialists" have aggressively wielded the concept of the "unitary executive" -- the theory that where the Constitution vests power in the executive, especially power over foreign affairs and war, the president is immune to legislative abridgements of his autonomy. […] Most members of the House and Senate want the automakers to get the money, so they probably are pleased that the administration has disregarded Congress's institutional dignity. History, however, teaches that it is difficult for Congress to be only intermittently invertebrate. Recent Reason writing on executive power here. And it's always worth re-reading our June 2008 excerpt/adaptation from Gene Healy's The Cult of the Presidency: America's Dangerous Devotion to Executive Power, which Will described as "the year's most pertinent and sobering public affairs book."
<urn:uuid:2138a0a8-44bd-4730-af13-80c4b50aa41c>
CC-MAIN-2022-33
https://reason.com/2008/12/22/whos-the-leader-of-the-cult-th/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.953167
300
1.992188
2
find intro, multiple accesses, and all 6 weeks here: [link to p2pu image below for link for w2 unhangout.. thurs, jan 23, 530pm mst] and link to doodle for alternate (because of time zones) un un hangout.. so simply a hangout? 4 min in.. sounds like compromise to partial freedom is no freedom (that i’m not sure we can afford) can we make people dependent/free if you have an agenda.. ? ie: can we force independence within the system? (maybe defiance.. but not the kind of independence that breeds community/interdependence… ?) i think anytime you make people (d0/be) things.. those things don’t last. and.. if you are in the position where you feel you need to make people (do/be) things.. perhaps we need to ask if it’s really needed/necessary/humane…? as posted in fb: learning chaos (source included in link) love this share.. The Power of Networks – Manuel Lima also will share a shortened version of her rhizome overview ish: - any point of a rhizome can be connected to any other, and must be - only when the multiple is effectively treated as a substantive, “multiplicity” that it ceases to have any relation to the One - a rhizome may be broken, but it will start up again on one of its old lines, or on new lines - a rhizome is not amenable to any structural or generative model; it is a “map and not a tracing” also love her take heed ness: Falling into the tendency to think about rhizomatic learning within formal educational contexts. links to pdf in fb thread on rhizome vs connectivism.. via dave: I will say that George tends to see the objective as tending toward objectivity and I tend to see that as a false path. This is where the theory becomes really helpful. D&G talk about lines of flight. Imagine a network model in your head. It has dots and lines and the dots and lines all connect to each other. It’s tidy. This is how I see connectivism. When I think about rhizomatic learning, I see lines unconnected to dots, and dots without lines. I see things that people believe that contradict themselves. It’s very messy. As for ‘where rhizomatic learning fits in educational theory’ questions generally… I don’t think a purveyor of a given story (or theory, if you like) should be the person to decide where it fits. I had an argument in wikipedia 3 years ago with a guy about rhizomatic learning (for an entry i hadn’t entered) and realized that if there wasn’t a sufficient number of other people to argue with him (and his arguments were REALLY annoying to me) than I should leave it alone. If it becomes important to other people, they will place it, with less bias than I would. http://en.wikipedia.org/wiki/Talk:Rhizome_(philosophy)#what.3F - Sarah Honeychurch Whether you meant it or not it is a good challenge. I also realise that I looked at that page and hated it, and my supervisor also said it was shite. Hadn’t looked at the comments page before though - Keith has the nicest touch on that subject of anyone I’ve read. Super nice guy too. Might be a nice project to try and fix the description and make it human readable. i’m all for clearing up and ongoing editing.. because i think that models how learning is rhizomatic.. that ongoing re-ness. we’ll never be done – ness…no? (bernard shaw) but i’m also for being ok with others not understanding… until they really want to. or have experienced it enough to put in their own words. or question it rather than debunk it – just because they don’t understand. all the dance. no? it’s like the stream that made Dave grumpy again.. is just modeling the disconnected dot.. and line.. ness. on the 3 characteristics of social labs (social, experimental, systemic): ..perhaps more than anything else, together they represent integrity and honesty—they are not what we want solutions to look like, but what we have found they actually look like when effective. – Zaid Hassan more from Zaid: This banishment of messy and potentially embarrassing emotions is one hallmark of the expert-planning paradigm. Madhura Pradhan on fb:I find it ironic that people talk about their qualifications and researches and their ability to read and understand critical theory when that is not the aim of this uncourse at all. As long as everyone “gets” the generic meaning of it, all is well and we progress as a community. How everyone reaches to the end is immaterial. If you get the theory without reading it, you have cheated brilliantly. posted on fb Just to change the flow of conversation a little, I came across this video in the G+ #rhixo14 community. Improvisation, an interesting word in the edu context. If we are too structured with lesson design & delivery is Rhizomatic Learning stifled? What if we relax a bit, go with the flow and foster independence in our classrooms? Is improvisation part of Rhizomatic learning? a space to realize the ability you already have post by Bonnie from 2011: These rhizomatic learning lenses are not intended to make you see more clearly, per se, though you may or may not come to that conclusion about their effects. Rather they are intended to make you see differently. It’s also profoundly self-replicating: we become subjects of the system in school, and then subject others to the operations of the system we’ve come to see as natural and right. So long as our lenses on learning are actually focused on schooling, we replicate the same colonizing systems. Even where we try not to. Even online, where we don’t have to. Which is where rhizomatic learning and the new pair of glasses come in. The rhizome is not a way of tweaking the systems we have. i keep hearing Krishnamurti talking about the ego ness we bring – even as parents – in love with our children… and to realize their here\ness find intro, multiple accesses, and all 6 weeks here:
<urn:uuid:8a70c3db-bb99-4ec2-9dfa-97c304dfac69>
CC-MAIN-2022-33
https://redefineschool.com/rhizo14-w2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.940281
1,471
1.570313
2
M.S. (Master of Science) School of Nursing Anxiety; Nurse and patient; Patients--Psychology; Artificial respiration--Psychological aspects; Intubation--Psychological aspects The thesis describes the observable manifestations of anxiety exhibited by adult, intubated, mechanically ventilated patients. The diagnostic content validity model provided the framework for this study. Forty-four certified critical care nurses rated characteristics by completing an adapted version of the Anxiety II survey. In accordance with the diagnostic content validity model, weighted means were calculated for each of the defining characteristics. These mean scores classified the characteristics as major, minor, or not validated. The major characteristics included: restlessness; teeth and mouth activity; increased pulse; and fight behavior, aggressive. The minor characteristics included: increased respiration rate, insomnia, increased blood pressure, respiratory difficulties, synchronicity mismatch, confusion, facial tension, wide-eyed, extraneous movements, increased perspiration, increased alertness, cough, glancing about, increased reflexes, foigetfulness, arterial pulse oximeter change, dry mouth, and poor eye contact The not-validated characteristics included: fight behavior, withdrawal; flushed face; twitching; weakness; tremors; pupil dilation; superficial vasoconstriction; and diarrhea. Ford, Susan A., "Anxiety in adult, intubated, mechanically ventilated patients : an expert validation study" (1997). Graduate Research Theses & Dissertations. 1490. vii, 92 pages Northern Illinois University Rights Statement 2 NIU theses are protected by copyright. They may be viewed from Huskie Commons for any purpose, but reproduction or distribution in any format is prohibited without the written permission of the authors.
<urn:uuid:e274f41d-2e66-499c-9d72-93368a3e10c2>
CC-MAIN-2022-33
https://huskiecommons.lib.niu.edu/allgraduate-thesesdissertations/1490/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.842828
451
1.875
2
Imagine slaving away for years in your own business only to find out that it isn’t worth anything. I regularly meet with business owners who ask me how much their business is worth and I have to tell them the disappointing news that it’s actually worth very little. The reason their business isn’t worth anything is often because it’s not making a profit. While the naysayers of capitalism focus on the fact that some businesses are corrupt in making excess profits, the reality is that 60 per cent of small businesses aren’t profitable or are only marginally profitable. Would you work in a job where you aren’t being paid or are underpaid? I doubt it! In order to be healthy and provide jobs for the economy, invest in their communities and support non-profits with their donations, it’s essential that a business makes a profit. For this to happen, businesses need customers who are willing to buy their product or service. As the customers buy our products, we turn those purchases into profits (after paying our expenses). If your business isn’t making the profits it needs to stay healthy, the good news is that these focused strategies to improve our business in key areas will result in a substantial improvement in the bottom line: Contacts, leads and referrals All businesses need prospective customers, people who might be interested in our product or service. How we identify and reach these prospects is determined in our marketing plan. There are strategies to help you reach these prospective customers and turn them into paying customers. The key thing is to understand that prospects are potential customers. Working in this area will increase sales and, if everything else is working, improve your bottom line. Unless you’re just starting out, all businesses have existing customers. These are the people who are buying your products or services. As business owners, sometimes we’re so focused on getting new customers that we take our existing customers for granted. Once you’ve identified what market you want to play in, your existing customers in that market are key to your ongoing success and profitability. Over time, some of your customers decide not to buy from you. Some die off (literally) or perhaps move away; others choose to buy from your competition, perhaps buy online, or for some other reason aren’t buying from you. As business owners looking for profits, we need to know why these people aren’t buying from us simply because we don’t want to lose any more customers. Better yet, we want to transform those past customers into buying customers once again. How many prospects can we convert into customers? Online companies are great at considering their conversion rates, but how many brick-and-mortar business owners look at how many customers are coming through their doors but leave without purchasing? What can we do to improve those rates? What can we do to increase the number of times our customers buy from us in a given year? There are a number of strategies you can use to improve conversion rates. What can you do to increase your average sale? You have the customers buying from your business (which is the hard part). Now think about how you can sell them more of what they want. This increase in average sales can make a significant difference to your business. You will have concrete ways and ideas to use to increase average sales. Gross margin is the amount of money you have after paying the cost of the products or services sold. By dividing this number by your total revenue, you get your gross margin percentage (also called gross profit percentage). This is important because this is the profit you’ve made before your fixed expenses or the expenses you must pay to run the business. Think about areas where you can increase your margins. A one per cent margin increase on $1 million is $10,000. Many business owners undervalue what they sell because they don’t believe they’re creating value for their customers. By increasing your margins, you will increase your profitability – unless you get too greedy and your customers decide to shop elsewhere. Overhead is what you spend on expenses to run your business. This is an area of focus when we get into trouble or times are tight, but we forget about it when things are good. One way of reducing your stress as a business owner is by increasing your profits to the point where you’re sufficiently satisfied with the outcome. Of course, being human, we won’t ever be fully satisfied with anything in life – and most business owners naturally want more when they achieve a level of success. However, if business owners improved their performance by 10 per cent in the areas above, they would double their profits. Work on improving each area simply by 10 per cent and you will double your profits. Let me know how it works out for you. I would love to hear. Dave Fuller, MBA, is an award-winning business coach and a partner with Pivotleader Inc. For a full comprehensive study on how to turn your business from marginally profitable to healthy profitability, order his book Profit Yourself Healthy from Amazon or email him at email@example.com for a free digital copy. For interview requests, click here. © Troy Media Troy Media is an editorial content provider to media outlets and its own hosted community news outlets across Canada.
<urn:uuid:b931cb1e-786a-41ec-a1e5-fc57c32c97d1>
CC-MAIN-2022-33
https://calmarvoice.ca/business/these-strategies-will-help-make-your-business-profitable/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.960168
1,147
1.742188
2
Southern hospitality, history and heart run deep through the region Where’s the chicken? August 15, 2004 A trip to the Deep South is more than the mere sum of its air mileage points: It’s a journey of the heart. There’s the tug on the heartstrings from the ghosts of the Civil War, there’s the heartbeat of the Delta blues, snatches of which are in the air everywhere, there’s the heartburn from eating too much, too often, because the food is so darn good. Before visiting, my sole experience of the South was through such works as "The Adventures of Huckleberry Finn," "Cat on a Hot Tin Roof" and, of course, "Gone With the Wind." Then I found out that I could stay in pre-Civil War mansions that rivaled Tara – each lavishly furnished with period antiques and each with its own amazing history. First stop, Vicksburg, Miss., a city of charming, 19th-century mansions and Civil War battle sites. We had reservations at Cedar Grove Mansion Inn, an antebellum jewel on four acres of gardens overlooking the Mississippi River. Guests can stay in the mansion, in cottages or the carriage house. Our Confederate Suite in the carriage house had fine period antiques and opened onto a Tara-columned porch with white wicker furniture and twirling fans. The rooftop bar is a nice place to sip mint juleps while listening to the sounds of passing tugboats. Where’s the chicken? A craving for a plate piled high with Southern fried chicken drove us downstairs for dinner at Andre’s, the inn’s restaurant. Surely, the dish was a staple and would be easy to find. Despite the 1860s ambience, the fare was Southern California trendy, and we wound up eating – brace yourself – roasted free-range birds. "I’ll think about fried chicken tomorrow," I sighed, doing my best Scarlet imitation. Breakfast the next day was a masterpiece with eggs, handmade sausage, grits and buttery biscuits that sang their own song of the South. Breakfast was followed by a tour, led by a young man named Ed. Built by John Alexander Klein, the mansion was presented to his bride, Elizabeth, Gen. Sherman’s cousin, in 1840. One of the most popular rooms is the Grant Room, where you can sleep in the same canopy bed that the general did. During the war, the house was under attack by Union troops, and there’s still a cannonball embedded in the parlor wall. Elizabeth liked to add rooms while her husband was out of town; since John was gone a lot, she added quite a few rooms, and the mansion maxed out at 50 rooms 18 years later. It was in Vicksburg National Military Park that Union and Confederate forces, both wanting control of the Mississippi, fought for 47 days. Gen. Pemberton’s troops surrendered to Gen. Grant’s forces on July 4, 1863; militarily, the Confederacy had been split in half. It was a somber experience to walk the grounds where so many had died. All to ourselves Natchez, Miss., is an otherwise scruffy town famous for its antebellum architectural gems. The cotton trade made many here rich, giving rise to dozens of lavish pre-Civil War homes. We had reservations at one of the nicest. Situated high on a bluff overlooking the Mississippi, the Briars is a classic antebellum mansion, built in 1814 and resting smack in the middle of 19 acres of ponds, gardens and aged trees. Talk about Southern heritage credentials: Confederate President Jefferson Davis married Varina Howell there in 1845. The big surprise was not the majesty of the drawing room with Palladian arches and twin staircases nor the parlor with carved mantel and elegant furnishings but that we had the place all to ourselves – a large tour group had canceled. Steve, the manager, handed us the keys and said, "Oh, and if you get locked out, you’re on your own – there’s no one else here but you tonight." Steve gave us a tour of the 15 bedrooms, each one more charming than the previous. The inn is owned by a pair of retired interior designers, Robert Canon and Newton Wilds, and they have painstakingly restored it. Our room was enormous, with two bathrooms and antiques to die for. A walk through the magnificent grounds, designed by Canon and Wilds, and gardens was like peeling a beautiful onion, uncovering layer after layer of hidden treasure: brickwork, gazebos, ponds, statuary, topiary and, always in the distance, the mighty river. Dinner that night was in a Gothic carriage house dating from the 1790s when it was part of Routhland Plantation; it’s been recently updated and converted into the Castle Restaurant. Still no fried chicken. Castle’s chef, John Terranova, preferred Nouveau Southern. The next morning, we felt like royalty walking into the elegant Briars dining room for breakfast. We were the only customers, and our server couldn’t stop fussing over us. After breakfast, we spoke to Newton Wilds in the gift shop. He introduced us to Emily and Winston, his Saint Bernards. "They have the run of the place and even have their own pool." He said that he had bought the inn in 1975 when it was in poor condition. "You should return for the Pilgrimage tours," he continued. "They’re held a few times a year. Ladies in hoopskirts give tours of 18 of the most beautiful antebellum mansions, including ours." On Wild’s advice, we took a tour of a couple of Natchez’s other restored gems, Stanton Hall and Rosalie. Both were magnificent examples of the architecture and style of the Old South. The South left me with memories of grand homes, painful history and good food. I never did find that fried chicken, but that’s OK. As Scarlett O’Hara was known to say, tomorrow is another day. Copyright © 2004, Winston-Salem Journal
<urn:uuid:1ff5a916-c2ea-40ba-8373-0e3a5e2c3208>
CC-MAIN-2022-33
https://dixieoutfitters.com/2015/04/04/down-south/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.963071
1,328
2.03125
2
Be Still . . . Devotionals for Daily Living © “We are going up to Jerusalem, and the Son of Man will be betrayed to the chief priests and the teachers of the law. They will condemn him to death and will turn him over to the Gentiles to be mocked and flogged and crucified. On the third day he will be raised to life!” (Matthew 20:18-19 (NIV)) In the next few days leading up to Easter, we need to remember what happened in Jesus’ life during these days. He knew what was coming and He went into it willingly. He laid down His life for us. Even though He was, and is, the Son of God, He paid the ultimate price for us willingly. He could have avoided the cross, yet He went through the torture and agony because He loves us. As Easter Sunday draws closer, remember the agonizing death that Jesus went through so that we could celebrate His Resurrection and our salvation.
<urn:uuid:8a9df0f9-bbe7-4c0e-8c05-ca2bc4428dd4>
CC-MAIN-2022-33
https://dailylivingministries.wordpress.com/category/betrayed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.980372
207
1.71875
2
Call for Nomination The Ibn Rushd Fund is seeking nominations for the 2012 Ibn Rushd Award: a young activist of the Arab Spring who peacefully fights for a democratic state The revolutions and political upheaval in Syria and Tunisia, in Egypt and Yemen, demonstrations and protests in further Arab countries – without the unconditional dedication of young women and men all this would not have been thinkable, and even less possible. Wanting to break away from outdated thought patterns and the paternalism and despotism they have had to endure ad nauseam, these youth have become the voice of a new era, and the imaginative use of new media has carried their message. Therefore the Ibn Rushd Award calls for nominations of a: of the Arab Spring. It is indispensable that his or her fight for change and restart, justice and freedom, democracy and basic human rights in the Arab world be non-violent. By honouring a young person and his or her dedication to civil values, the Ibn Rushd Fund wants to honour the outcry of a whole generation: many young people have risked their personal freedom, integrity and in many cases even their lives in this struggle. They have set in motion changes which are not only unique in Arab history, but also irreversible. Any member of the public may nominate a candidate (excepting oneself). The candidate’s immediate sphere of activity should be in the Arab world. This year, the Ibn Rushd Fund has set an age limit to ensure the appreciation of a young activist, so candidates must not be older than 40 years. An independent jury will select the winner of the Ibn Rushd Prize for 2012 from among the nominees. The award is financed exclusively by the Ibn Rushd Fund members’ fees and donations. Please fill out the form on our website for your nomination and include a justification for nomination and, if known, a short vita of the candidate, and submit these data by mail, e-mail or fax to the address below. Nominations can be in Arabic, German, French or English. The deadline for nomination is June 1, 2012. The Prize includes a 2500 Euro award which is financed exclusively by membership fees and members’ donations. The Ibn Rushd Prize is to be presented during a public ceremony at the end of November 2012 in Berlin. Previous winners of the Ibn Rushd Award: Ibn Rushd Prize The winner of the award is expected to be presented to the public in a ceremony at the end of November in Berlin, Germany.
<urn:uuid:63ff7b54-a588-46e1-ad9f-88a6b5a63a14>
CC-MAIN-2022-33
https://ibn-rushd.org/wp/en/2012/11/30/award-2012-call-for-nomination/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.955632
517
1.515625
2
Dermatitis refers to inflammation of the skin, often characterized by redness and itching. Additionally there may be scaling, desquamation, induration, or eruptive lesions present. There are several types of dermatitis, the most common being atopic dermatitis (eczema) and contact dermatitis. Atopic dermatitis is an inherited condition of unknown etiology, and more commonly afflicts children. Contact dermatitis can be further divided into two types, allergic and irritant. Plants like poison ivy, metals such as nickel, and the chemicals in cosmetics and cleaning products are common sources of contact dermatitis. In many cases, the exact cause cannot be determined. Most holistic traditions emphasize the importance of systemic treatment to address skin disease, as symptoms appearing on the skin may be merely the manifestations of an internal imbalance. Holistic treatments for skin conditions generally emphasize supporting the liver and emunctories to promote natural detoxification processes. Contact Allergy Antigens™ – homeopathic antigen formula for relief of symptoms associated with poison ivy, poison oak, poison sumac, and stinging nettles.** * Cort Sym™ Gel – topical gel indicated for itchy skin irritations, inflammation, and rashes due to eczema, dermatitis, swelling and rash with small blisters, red, inflamed skin; genital and anal itching.** Coxsackie Cord – homeopathic nosode blend of several coxsackie virus serotypes.** Dermapar™ – glandular homeopathic for relief of itching, burning, weeping, cracks, and skin eruptions.** Drainpar™ – glandular homeopathic for liver, lymph, and kidney support and drainage.** * Eczema HP™ – high potency formula indicated for eczema, skin irritation, and chronic skin eruptions.** Elimitone™ – tonifier for lymphatic drainage and immune system support.** Histamine Phenolic – isopathic phenolic remedy, for relief of symptoms associated with allergic reactions.** Psora Miasm – homeopathic miasm formula indicated to treat illnesses associated with the psoric miasm. According to classical homeopathic theory, the psoric miasm is a widely inherited predisposition to developing skin disease.** Psoriasis HP™ – (will renameDerma Scale HP) high potency formula to relieve burning, scaling, and dryness of skin.** Scrophularitone™ – tonifier for stimulating detoxification and lymphatic drainage.** Scrophulous HP™ – high potency formula for stimulating detoxification and lymphatic drainage.** Sulphur – single homeopathic remedy indicated for red, burning, itching skin, aggravated by heat and/or bathing.** Burdocom™ – fortifier for the smooth muscles, skin, and liver, indicated for skin support. Dandecom™ – fortifier for the liver, indicated to support detoxification. Gencom™ – fortifier for the emunctories, indicated to support detoxification. Inflammacom™ – (will remame Al Miasm) fortifier for the immune system, indicated to maintain a healthy and balanced inflammatory response.. * Lomacom™ – soothing topical herbal ointment for dry, cracked skin. Rejuvederm™ – topical herbal skin cream formulated to nourish and stimulate the rejuvenation of damaged skin tissue. Scrophularicom™ – fortifier for the lymph, spleen, and liver, indicated to support detoxification. Trifolocom™ – fortifier for the lymphatic system and spleen, indicated to support lymphatic drainage. B-Complex – B vitamin supplement to help maintain healthy skin and proper circulation. Enervimin™ Stress Focus – full-spectrum vitamin and mineral formula designed for those under stress, high in the B vitamins to support skin health. * G.L.A. Borage – rich in essential fatty acids to help maintain healthy skin. Hepa-Detox – vitamin formula with herbs to support the liver and promote detoxification. High Delivery Acidophilus (HDA) – probiotic blend to support the microbiome, immune function, and skin health. Immunique™ – essential nutrients for tissue healing and immune support. Initial-E™ – vitamin E to support the skin and immune system. Mineral Magic Concentrate – highly concentrated natural source of minerals and colloidal trace minerals needed for maintenance of tissues. Primrose Oil – essential fatty acid supplement for maintaining healthy hair and skin. Zinc Picolinate – zinc aids skin healing and supports immune function. Applying a mixture of vitamin E and raw honey topically can relieve itching and promote healing of the tissue. The patient should minimize the use of chemicals on the skin, such as bubble bath, detergents, and perfumed skin lotions. Encourage your patient to wear rubber gloves when using harsh detergents or chemicals. Food sensitivities may exacerbate skin conditions. A gluten-free and dairy-free diet has proven beneficial in controlling dermatitis in some patients. Consider additional testing for other food sensitivities. If food allergies are suspected, please refer to the Allergies (Food Sensitivities) page of this guide. [i] Anogeianaki A, Castellani ML, Tripodi D, et al. Vitamins and mast cells. Int J Immunopathol Pharmacol. 2010;23(4):991–996. doi:10.1177/039463201002300403 *Denotes primary remedy. **These statements are based upon traditional homeopathic practice. **Claims based on traditional homeopathic practice, not accepted medical evidence. Not FDA evaluated. These statements have not been evaluated by the Food and Drug Administration. These products are not intended to diagnose, treat, cure, or prevent any disease.
<urn:uuid:54de5cf0-b212-4098-a753-c065ae212589>
CC-MAIN-2022-33
https://www.energiquepro.com/therapeutic-guide/dermatitis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.87022
1,246
3.078125
3
Module Name: Wabash yard Prototype?: None - constructed as a generic staging yard. Builder(s): Tom Johnson, David Klemm, UMTC History: Originally designed as a generic staging yard for free-mo setups by Tom Johnson. The yard was named 3D Staging as it was built on 3 hollow core door sections. The module had a double track yard throat with a hand laid double crossover (AJ Murphy) to give access to both yard ladders regardless of which track a train entered on. An additional feature was the inclusion of two run through tracks on the lower ladder to allow for the yard module to be connected to any double track free-mo module. The yard could be set up in either a two or three section configuration. The downfall of the module was the use of code 100 track which was problematic when the module was offered for national setups which required code 83 track to be in compliance with the national standard. David Klemm adopted the module and replaced the code 100 with code 83 track. The yard throat was modified into a five track configuration to fit into his Decatur module set. When David sold his Decatur module the yard was offered to UMTC where it has resided since 2013. UMTC has used the module as both a two or three section yard. We had to do a slight adjustment to the yard tracks to make them line up better for use in either configuration and change the cam lock orientaton on the modules so they were in the same orientation on all three sections. The run through tracks are now in use with the figure eight layout we have currently in the club room space. A dedicated curve module (Hill curev) is used for this purpose. We have also constructed an 18" long adapter module to connect the run through tracks to a standard 26" double track free-mo endplate.
<urn:uuid:64b828a1-2672-46b0-851d-5e22e8e8ed12>
CC-MAIN-2022-33
https://rrclub.umn.edu/modules/wabash-yard
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.969842
389
1.507813
2
Given the volatility experienced year-to-date compared with 2017, we continue to remind clients that market fluctuations are a necessary part of investing and that it is important to stick to your long-term investment plan. Market fluctuations are an expected and necessary part of investing. The important thing is to stick to your long-term investment plan. This is easier said than done. It is useful to remember that when the market falls you still own the same assets; you are just paying less for them. Human psychology is odd: when cornflakes go on special we tend to take advantage and stock up, but when the stock market falls we become stressed. Investors who attempt to time the market run the risk of missing periods of exceptional returns, leading to significant adverse effects on the ending value of a portfolio. The top graph illustrates the risk of attempting to time the stock market (FTSE/JSE All Share Index) between July 1995 and December 2017 by showing the returns investors would have achieved if they had missed some of the best days in the market. The bottom graph illustrates the daily returns for all 5,639 trading days. Investors who stayed in the market for all 5,639 trading days achieved a compound annual return of 14.9%. However, that same investment would have returned only 8.4% had it missed only the 25 best days of stock returns. Further, missing the 50 best days would have produced a below-inflation return of 4.2%. Although the market has exhibited tremendous volatility on a daily basis, over the long term, stock investors who stayed the course have been rewarded accordingly. The appeal of market timing is obvious—improving portfolio returns by avoiding periods of poor performance. However, timing the market consistently is extremely difficult. And unsuccessful market timing, the more likely result, can lead to a significant opportunity loss. Source: Morningstar Investment Management
<urn:uuid:a98df5de-d6f2-4960-bc70-5cdd38a07dea>
CC-MAIN-2022-33
https://www.southwood.co.za/the-cost-of-market-timing
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.964249
385
1.8125
2
Originally published in Reuters, Nov 9, 2020. TBILISI (Thomson Reuters Foundation) – When Anna Kuznetsova saw an ad offering access to Moscow’s face recognition cameras, all she had to do was pay 16,000 roubles ($200) and send a photo of the person she wanted spying on. The 20-year-old – who was acting as a volunteer for a digital rights group investigating leaks in Moscow’s pervasive surveillance system – sent over a picture of herself and waited. Two days later and her phone buzzed. The seller had forwarded the paralegal a detailed list of all the addresses in the Russian capital where she had been spotted by cameras over the previous month, her lawyers said. “It was really incredible,” said Sarkis Darbinyan, a lawyer for Roskomsvoboda, the group behind the investigation. “We got a report of all her movements in Moscow.” The incident is now under police investigation. Far from an aberration, the incident is at the centre of one of several lawsuits brought in recent months by rights activists against the Russian authorities over their use of face recognition. The rise of cloud computing and AI technologies have popularised the technology globally, with supporters saying it promises greater security and efficiency. But the backlash is growing, too, as critics say benefits come at the cost of lost privacy and increased surveillance. To continue reading this article, click here.
<urn:uuid:35c52694-d8d8-403e-9679-4fe79589c5f8>
CC-MAIN-2022-33
https://neoshare.net/machine-learning/leaks-and-lawsuits-blight-russia-facial-recognition-machine-learning-times/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00264.warc.gz
en
0.966337
309
2.03125
2
The US Department of Justice (DoJ) has seized three web domains used by threat actors to facilitate distributed denial-of-service (DDoS) attacks and trade stolen personal data, the department said in a press release on Wednesday. “Today, the FBI and the Department stopped two distressingly common threats: websites trafficking in stolen personal information and sites which attack and disrupt legitimate internet businesses,” according to the announcement, citing US Attorney Matthew M Graves. “Cyber crime often crosses national borders. Using strong working relationships with our international law enforcement partners, we will address crimes like these that threaten privacy, security, and commerce around the globe,” Graves added. According to the announcement, the seized domains are: The first one on the list was a cybercrime marketplace that let users advertise and trade stolen personal information. It featured a searchable database of information stolen in over 10,000 breaches. The website’s database consisted of 7 billion records of personally identifiable information (PII), including full names, usernames, phone numbers, email addresses, and online account credentials (usernames and passwords). Users could access these stolen records through varying subscription tiers. In January 2020, authorities confiscated a domain bearing an almost identical name (weleakinfo[.]com) and made 21 arrests tied to the illicit operation. Last year, one of the related domain’s operators received a two-year prison sentence. While the other two domains on the list didn’t deal in marketing stolen data, they acted as cybercrime hubs. Ipstress[.]in and ovh-booter[.]com hosted DDoS-as-a-service operations, where clients could execute DDoS attacks on their desired targets by proxy by simply paying a sum of money. DDoS attacks are cyberattacks designed to make targeted machines, resources or networks unavailable by overloading them with excessive traffic. During a successful DDoS attack, the targeted device can no longer handle legitimate requests and often goes offline until the attack ceases. As their names suggest, the DDoS-associated domains offered booter, or IP stresser attacks to its customers.
<urn:uuid:4e312e35-c012-4338-99ff-55f25741cf3f>
CC-MAIN-2022-33
https://bitdefender.in/department-of-justice-seizes-three-web-domains-used-for-ddos-and-stolen-data-sales/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.922597
471
1.8125
2