text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Fill In Word Improve retention of subject materials, reading, and test-taking skills. Program generates on-screen and printed fill-in tests for your subject materials. Multi-sensory approach using the Microsoft Agent character Peedy the parrot. This game has nothing to do with (noun)s. You fill in the (noun)s with words to make people around you (verb). Think you can write something better than us? Send it to us at email@example.com. If it's good enough, we'll include Remove all pictures/photos in one or many MS Word files. Word 2000 or higher required. Word Search and Replace Tool is an efficient software tool adept at finding and replacing words and phrases in Word files. The software can find and replace multiple words and phrases in multiple word files. This software supports various languages. FirePDF PDF to Word Converter is able to convert native and scanned PDF to Word document (PDF to DOC) with unchanged original pages, images, hyperlinks, etc. The new OCR can recognize the image-based PDF to searchable text in Word document. The Classic crossword fill in puzzle comes to the computer. Crossword FillIns let's you solve and print fill-in puzzles. Download a free copy of the shareware version today. Save time and money. EZ Newsletter Generator will create an instant search engine optimized, interactive, content-rich, HTML Internet marketing newsletter or ezine publication in under 10 minutes. Fill in a few blanks, then upload webpage template to Form Pilot - form filler software. It designed for filling in paper forms (of any type) on your computer. It makes typewriters obsolete! The program allows you to fill in .PDF forms as well. With some few mouse clicks pdf-FieldMerge allows to fill in existing PDF form fields automatically. PDFs may be processed singularly or en masse - automatically or manually with pre-selected data - without detour of Acrobat Reader GetPDF Form Filler enables you to fill out interactive PDF forms without the need for Adobe Acrobat. You can fill PDF forms with any field type; fill in text, make choice, select items, answer yes or no etc. In the process of filling out a PDF Form, you Fill in windows as they appear on your screen automatically. A Form Filler help you automatically fill in windows as quickly as they appear on your screen. Imagine having: 1. windows that delay your system start-up automatically dealt with, 2. pesky
<urn:uuid:ddc0f594-17b1-4932-b4ed-aae8fad764ca>
CC-MAIN-2017-04
http://fill-in-word.sharewarejunction.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00265-ip-10-171-10-70.ec2.internal.warc.gz
en
0.829904
530
1.632813
2
- Letter of Transmittal - User Guide - Feature stories - Performance Report - Management and Accountability - Our Fisheries - Quick reference guide to domestic fisheries performance in 2010–11 - Antarctic fisheries - Coral Sea Fishery - Norfolk Island fisheries - Northern Prawn Fishery - North West Slope and Western Deepwater Trawl fisheries - Southern and Eastern Scalefish and Shark Fishery - Bass Strait Central Zone Scallop Fishery - Southern Squid Jig Fishery - Small Pelagic Fishery - Eastern Tuna And Billfish Fishery - Southern Bluefin Tuna Fishery - Skipjack Tuna Fishery - Western Tuna and Billfish Fishery - Financial Statements SOUTHERN BLUEFIN TUNA FISHERY Southern Bluefin Tuna Estimated catch 2009-10: Gross value of production 2009-10: DEVELOPMENTS IN 2010–11 - In 2009 the AFMA Commission agreed on an 8030 tonne total allowable catch for the Southern Bluefin Tuna fishery for the next two years. There was a two-year season of which 2010–11 was the second year. - On 24 November 2010, the Commonwealth Minister for Sustainability, Environment, Water, Population and Communities announced his decision to list Southern Bluefin Tuna as ‘conservation dependent’ under the Environment Protection and Biodiversity Conservation Act 1999. The listing as conservation dependent recognises the strong measures in place in Australia to manage Southern Bluefin Tuna, and also accounts for the progress being made at an international level to rebuild the global stock to ecologically sustainable levels. It does not add additional restrictions to fishing within Australian waters. - On 19 October 2010 the Southern Bluefin Tuna Fishery was reaccredited as an approved Wildlife Trade Operation under the Environment Protection and Biodiversity Conservation Act 1999. The accreditation is valid until 24 July 2013. - At the 16th meeting of the Commission for the Conservation of Southern Bluefin Tuna in October 2009, it was agreed that Australia would begin a commercial trial of stereo video technology covering 10 percent of the catch in the 2011 season. The technology will be assessed for its ability to improve the accuracy of the quota decrementation process in the farm sector of the fishery. The trial was conducted in February/ March 2011. A report on the outcomes of the trial will be presented to the AFMA Commission in 2011–12. - On 28 April 2011, industry conducted a live release of Southern Bluefin Tuna. AFMA officers on board the release vessel reported that the release was conducted in accordance with the trial provisions of the Southern Bluefin Tuna Management Plan 1995. The trial release provisions outlined in the management plan have been extended until the end of the 2013 fishing season. Southern Bluefin Tuna is the only species covered by the Southern Bluefin Tuna Fishery Management Plan 1995 and globally the species is considered overfished. Recent outcomes from the Commission for the Conservation of Southern Bluefin Tuna include a reduced global total allowable catch to rebuild the stock. In 2010 AFMA amended the plan to: - remove the prescribed procedures for undertaking a verified count, and - extend the restricted overcatch and live release provisions by three years. The amendments are required to allow the flexibility to use new monitoring technologies such as stereo video and to allow the continuation of the AFMA-agreed trial to allow a single end of season release of live fish to reduce the risk of exceeding Australia’s national catch allocation. Catches in 2009–10, the first half of the two-year season, were within the maximum 5265 tonnes that could be taken during the first 12 months. Correction to the Estimated Catch figures provided in the 2009–10 Annual Report. Due to a typographical error the catch for the 2008-09 season was reported as 506 tonnes. The actual catch was 5242 tonnes.
<urn:uuid:6a63273c-abfa-4a67-99d1-50b945170319>
CC-MAIN-2017-04
http://www.afma.gov.au/static/annual-report-2010-11/fisheries/southern-bluefin.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00029-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919033
820
1.992188
2
Department of Veterans Affairs VA Space Planning Criteria (Chapter 206) Washington, DC 20420 H. Food Shop: A food counter or station in a cafeteria that offers a particular food concept or menu. A partial list of branded concepts for Food Shops developed by VCS or available from a commercial provider follows. Deli, Grill, Chicken Express, Salad Bar (Self-Served), Salad Shop (Made-to-Order), Mexican, International, Pizza, Pizza & Salad, Starbucks, Beverages, To-Go Full-Time Equivalent (FTE): A staffing parameter equal to the amount of time assigned to one full time employee. It may be composed of several part-time employees whose total time commitment equals that of a full-time employee. One FTE equals a 40 hours per week. J. Functional Area: The grouping of rooms and spaces based on their function. Typical Functional Areas for Canteen Service are the Retail Store, Optical Shop, Barber and Beauty Shop, Cafeteria, Vending, and Coffee Shop. K. Input Data Statements: A set of questions designed to elicit information about the healthcare project in order to create a Program for Design (PFD) based on the criteria parameters set forth in this document. Input Data Statements could be Mission related, based on the project's Concept of Operations; and Workload or Staffing related, based on projections and data provided by the VHA or the VISN about the estimated model of operation for the facility. This information is processed through mathematical and logical operations in VA-SEPS. L. Nutrition and Food Services: Nutrition and Food Services (NFS) provides meals and nourishments that contribute to the healing and comfort of, and meet the medical and nutritional requirements of Veterans enrolled In VA Healthcare programs. M. Participation Factor: The projected percentage of the available employees and visitors that will participate in the Cafeteria. This factor can vary from 35% to 75% depending on the quality of the food and service, the availability of alternative dining facilities, the meal price point compared to commercial dining facilities, length of employee meal period, and the proximity of the cafeteria in relationship to its customers. The Participation Factor may be based on historical data of an existing cafeteria, or projected data based on similar facilities in the area. If no value is given, a default value of 50% for lunch and 15% for breakfast will be used. N. Peak Half Hour Factor: Based on industry standards and historical data, 36% of cafeteria customers dine in the peak half-hour of business. O. Peak Volume Single Meal: The maximum projected number of meals served in the Canteen Cafeteria during a single meal period (breakfast or lunch or dinner). P. Peak Volume Meals per Day: The maximum projected number of meals served in the Cafeteria during a single day (breakfast and lunch and dinner). Q. Program for Design (PFD): A space program generated by VA-SEPS based on criteria set forth in this document and specific information entered about Concept of Operations, Workload projections and Staffing levels authorized. Canteen Service (Chapter 206): Page 3 of 18
<urn:uuid:8fcfa71e-72be-47e4-b6d5-4a5b0e60280e>
CC-MAIN-2017-04
http://vacriteria.tpub.com/7610-206/7610-2060003.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00291-ip-10-171-10-70.ec2.internal.warc.gz
en
0.894063
702
1.765625
2
Models and qualifiers Words and titles applied to God function as models. Models always need to be qualified - qualifiers. A model can help a person to gain real insight and understand more clearly what is being talked about - disclosure. Religious language functions as a model that leads us to an understanding of God. A person comes to understand by using the model (disclosure) and a new level of understanding is achieved. So the many titles and images of God function as models that can eventually lead us to an understanding of God.
<urn:uuid:b1b79da1-9fc4-45c9-86ae-c50b6f59abbe>
CC-MAIN-2017-04
https://getrevising.co.uk/revision-cards/ian_ramsey_model_and_qualifiers
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00180-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96366
111
2.3125
2
Limiting the amount of memory and CPU that mod_perl uses is also quite easy (using rlimits as in Apache::Resource). I think you are misinformed about leaking memory. Most of the things people consider leaking memory under mod_perl are simply using memory as your program needs it to do more work. PHP will use memory too, if you load a big data structure from a file or database. Leaking requires you to code a circular structure or use a module with bad XS code. Running mod_perl by itself is quite stable. PHP is not as fast as mod_perl. Numerous benchmarks have shown this, including the ones Yahoo did to decide on using PHP. The subject of this thread was security, and why PHP is considered secure in a shared environment. The answers seem to be that it can be run as CGI (which of course is true of Perl as well) or that it can be run in a safe shared mode. The latter is an advantage over mod_perl for ISPs. At the moment, people looking for a cheap mod_perl ISP have to go for either a virtual server environment (where you get your own server with root access, but not a dedicated box) or SpeedyCGI.
<urn:uuid:6e3dd55f-edf1-453c-af74-853052ac4617>
CC-MAIN-2017-04
http://www.perlmonks.org/index.pl?node_id=282203
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00293-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944419
259
2.546875
3
Superconductors.ORG herein reports signs of superconductivity near 175 Kelvin at ambient pressure. This would be a new world record for a superconductor whose formula and structure are known. The proposed chemical formula is Sn1.4In0.6Ba4Tm5Cu7O20+ with 1245/1212 structure. Such a high Tc material was thought possible only after the discovery in 2005 of a superconductor that took advantage of planar weight disparity (PWD) to achieve its then-record Tc of 150K. 150K material was based on a 1234/1212 intergrowth structure, which was counter-intuitive to conventional thinking about Tc-enhancement. Historically, increasing the number of CuO2 planes in the (Hg,Tl,Pb,Bi)-cuprates depresses Tc when the Ca-CuO2 layers exceed two. In PWD superconductors this limitation does not apply. As such, the next logical step was to attempt a 1245/1212 intergrowth (shown at left) - which contains one more Tm-CuO2 layer than the 1234/1212 structure. Tc-vs-PWR extrapolation (see log graph below) suggested such a material should produce a Tc between 160K and 190K. However, finding the 1245/1212 superconductivity signature within a multi-phasic bulk proved difficult, due to the small volume fraction that results. Very high planar weight ratios are not attainable by stoichiometric synthesis. They occur only as byproducts. So, a means needed to be derived wherein a minority phase of 1245/1212 material would occur in amounts large enough to measure within the bulk of a parent compound. Success was finally realized by increasing the amount of Tm and Cu by 5% in a 1223/1212 host. And, by increasing the ratio of Sn to In from 5:5 to 7:3. Four separate tests of the resulting material showed sharp resistive transitions near 175K, 174K 176K and 177K for the minority phase. Three of those plots are shown below and the fourth is at top left. A patent has been applied for the general formula (Sn,In)2Ba4Tm5Cu7O20+ Below are the other 3 structure types from the Tc-vs-PWR plot. These members of the Sn-In-Ba-Tm-Cu family suggested the existence of an even higher Tc material between 160K and 190K. Synthesis of the material was by the solid state reaction method. Stoichiometric amounts of the below precursors were mixed, pelletized at 70,000 psi and sintered for 36 hours at 830C. The pellet was then annealed for 10 hours at 500C in flowing O2.SnO 99.9% (Alfa Aesar) RESEARCH NOTE: Tm-copper-oxides have been found to be strongly hygroscopic. All tests should be performed immediately after annealing. - E. Joe Eck © 2007 Superconductors.ORG Patent Pending. All rights reserved.
<urn:uuid:51978c34-6ccc-4f2c-a8c3-851abccc0870>
CC-MAIN-2017-04
http://superconductors.org/175K_pat.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00246-ip-10-171-10-70.ec2.internal.warc.gz
en
0.935461
682
2.71875
3
The University of Health and Allied Sciences (UHAS) yesterday launched a 20,000 Euro “Dora Gertrude Quaye Scholarship Scheme” to provide financial support to needy but brilliant students. The fund which is an award won by Professor Margaret Gyapong, Director, Institute of Health Research, donated to UHAS for her achievement in honour of her mother Dora Gertrude Quaye, aimed at serving as motivation for the young mothers and mothers-to-be. The university, therefore, used the initiative to institute a lecture to be known as Professor Margaret Gyapong Annual Mentorship Programme for Female Students & Academics. The maiden lecture which was held yesterday at UHAS brought female students from Mawuli School, OLA Senior High, Mawuko Girls Senior High, Sonrise, Sokode Secondary Technical School, lecturers and students of UHAS. Professor Esi Awuah, Foundation Vice Chancellor of University of Energy and Natural Resources (UENR) who gave the maiden lecture on the theme: “Harnessing the potential of today’s girl-child for the future”, noted that the girl- child is such a delicate thing that should be protected and encouraged. “Therefore we need to guide these young girls that they do not just make choices in their careers, but are able to be accountable for their choices,” she said. She continued that every girl-child should be allowed to have a full benefit of her potentials just like their male counterparts. “These are girls who will change the dynamics of not only their families but Ghana as a whole. We would make it our duty to ensure that they are safe and protected from all forms of harm, danger and violence and this include child marriage.” “To our girls, take time, make education your focus and be careful not to get yourselves into any trouble,” she counselled. Prof. Esi Awuah was grateful to UHAS for instituting the fund, which would help strengthen the role in educating needy but brilliant girl child. Professor Margaret Gyapong, in her remarks said this was to honour her mother’s life achievements and history as well as her personal achievements, saying that “in addition this will help mentor our girl-child and make sure that those that will progress to UHAS are given opportunity to apply for the fund.” Professor John Gyapong, Vice Chancellor of UHAS, who launched the fund, noted that the initiative, the first of its kind in the university, was indeed worthy of emulation and could not have come at a better time as many vulnerable but brilliant students needed financial support. FROM KAFUI GATI, HO
<urn:uuid:8afeecac-e81b-424b-a7a6-6e4ed191085b>
CC-MAIN-2022-33
https://www.ghanaiantimes.com.gh/uhas-launches-dora-gertrude-quaye-scholarship-scheme/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00274.warc.gz
en
0.967313
576
1.6875
2
ANN ARBOR, Mich. -- An increase in cases of a rare type of head and neck cancer appears to be linked to HPV, or human papillomavirus, according to a new study from researchers at the University of Michigan Comprehensive Cancer Center. The study looked at patients with nasopharyngeal cancer, a tumor that grows behind the nose and at the top of the throat, above the tonsils. This rare cancer occurs in less than 1 of every 100,000 Americans. "Though rare, this is the first report of nasopharyngeal cancer being caused by the HPV epidemic. We are in the middle of a tonsil cancer epidemic, seeing many patients with tonsil cancer linked to HPV. It turns out that HPV may also be a new cause of this rare form of cancer that occurs in this hidden location," says study author Carol Bradford, M.D., professor and chair of otolaryngology at the U-M Medical School. In the study, which appears online in the journal Head & Neck, the researchers looked at tissue samples taken before treatment for either nasopharyngeal cancer or tonsil cancer. Of the 89 patients in the study, five had nasopharyngeal cancer, and four of those were positive for HPV. At the same time, the four HPV-positive tumors were also all negative for Epstein-Barr virus, which has previously been one of the biggest infectious causes of nasopharyngeal cancer. "Since I began studying head and neck cancer, I have wondered what the cause of Epstein-Barr virus-negative nasopharyngeal tumors might be. This research suggests that there is a changing etiology for nasopharyngeal cancer in the North American population that may mirror the HPV-positive epidemic of tonsil cancer," says study author Thomas Carey, Ph.D., professor of otolaryngology and pharmacology and co-director of the head and neck oncology program at the U-M Comprehensive Cancer Center. Overall, about 60 percent of nasopharyngeal cancer patients are alive five years after treatment. In fact, death rates for this type of cancer have declined 4 percent per year. The researchers suspect one potential reason is that HPV-related tumors are more responsive to chemotherapy or radiation than tumors linked to the Epstein-Barr virus. Because nasopharyngeal cancer is so rare, the authors propose a multi-center trial to recruit more patients to verify the role of HPV in nasopharyngeal cancer. Additional authors: Jessica Maxwell, M.D., M.P.H.; Bhavna Kumar, M.S.; Felix Feng, M.D.; Jonathan McHugh, M.D.; Kitrina Cordell, M.D.; Avraham Eisbruch, M.D.; Francis Worden, M.D.; Gregory Wolf, M.D.; Mark Prince, M.D.; Jeffrey Moyer, M.D.; Theodoros Teknos, M.D.; and Douglas Chepeha, M.D., all from U-M; Jay Stoerker, Ph.D. and Heather Walline, M.A., from SensiGen LLC Funding: National Institutes of Health, National Cancer Institute, U-M Head and Neck Cancer SPORE grant, state of Michigan loan to SensiGen LLC Disclosure: SensiGen is a wholly-owned subsidiary of Sequenom. The University of Michigan's Office of Technology Transfer has exclusively licensed HPV detection technology to Sequenom. Reference: Head & Neck, published online Sept. 15, 2009, DOI:10.1002/hed.21216 U-M Cancer AnswerLine, 800-865-1125 U-M Comprehensive Cancer Center, www.mcancer.org
<urn:uuid:4ac2cbeb-dcf0-4acc-92dc-06e54c8346a4>
CC-MAIN-2016-44
https://www.eurekalert.org/pub_releases/2009-10/uomh-rha100709.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00282-ip-10-171-6-4.ec2.internal.warc.gz
en
0.906516
786
2.921875
3
About 100 demonstrators gathered at Westlake Center in Seattle this morning on a day they hoped would see fast-food workers walking off their jobs and demanding a minimum wage of $15 an hour. Today’s protests are part of a national effort and were under way in cities across the country including New York, Chicago and Detroit. UPDATE: 9:50 a.m. | At Westlake, a large cheer went up when workers were told protesters successfully closed down a McDonalds restaurant in Detroit. Protesters said they went to three locations early this morning: a Starbucks in the 1100 block of Fourth Avenue, Specialty’s Coffee in the 1000 block of Third Avenue and Top Pot Doughnuts in the 700 block of Third Avenue. Vans were expected to take protesters to various fast-food outlets during the day while some protesters planned to focus their efforts in downtown Seattle. Organizers say they hope that their demonstrations will build throughout the day, ending with a rally at Plymouth Pillars Park at Pike Street and Boren Avenue. One Seattle demonstrator, David Rolf, president of SEIU, Local 775, which represents health-care workers, said it’s hard to predict exactly what would occur today, noting that demonstrations in the Seattle area three months ago were “a little viral and a little chaotic.” Those earlier protests and demonstrations occurred at several locations in May. Shortly after 8 a.m. today, a group of about 20 demonstrators arrived at a Subway shop at Fifth Avenue and Seneca Street downtown, and a handful of them went inside and unsuccessfully tried to get the woman behind the counter to join them. Then outside the shop, one demonstrator spray-painted the word “Strike” on the sidewalk as the group chanted, “We want change. And we don’t mean pennies.” Outside Columbia Center on Fourth Avenue, about 20 demonstrator were joined by two young men who said they walked off their job at Specialty’s Cafe & Bakery to participate in the strike. “I feel like if no one stands up now, it will never happen,” said one of the men, a barista who identified himself simply as Tyler. He said he started work two weeks ago and is paid $10 an hour. Their walkout didn’t close down the store. At another Specialty’s, this one at Fifth Avenue and Union Street, a worker brought demonstrators a plate of sandwiches but said she could not join the group, which included her older brother. “I feel for you guys, but I just can’t do it. I have too many bills to pay. And I love my job,” said barista Cambria McMahon, 19, who’s worked for Specialty’s for nine months. Her older brother, Garrett, 22, is one of two Specialty’s workers who joined the demonstrators an hour earlier at Columbia Center. “It was definitely scary walking out,” he said. “But I feel if I don’t do something, countless people are going to be stuck in the same rut I am.” Local demonstrators were expected to bring their protest to several other fast-food locations around town today. At $9.19 an hour, Washington state has the highest minimum wage in the country. Gov. Jay Inslee says he supports fast-food workers, but not the $15 hour minimum.
<urn:uuid:52d04000-5e98-4f18-84df-ff74f31602b7>
CC-MAIN-2017-04
http://blogs.seattletimes.com/today/2013/08/fast-food-workers-march-for-higher-pay/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00273-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973158
727
1.546875
2
Born in Bremen in a prosperous German family of merchants. He studied in many educational institutions: studied law at the Karl Ruprecht University in Heidelberg; Biology at the Humboldt University in Berlin, the Friedrich Schiller University in Jena and the University of Würzburg. It was at this latter university that he attended the lectures of Rudolf Virchow and showed interest in what was then called "ethnology". The first of the many voyages made in 1850 to Australia as a ship's doctor. From that time until 1903, he traveled the world - visited the Middle East, on both sides of the Pacific Ocean, on the west coast of Africa, in South and East Asia. The main publication on the results of these journeys was the six-volume work of the peoples of East Asia. Together with Rudolf Virchow, Bastian organized the Society of Anthropology in Berlin in 1869, and in 1870 the Society for the Study of Central Africa. When the Royal Ethnographic Museum (later named the Museum of Ethnology) was built in Berlin in 1886, Bastian became its first director. Bastian argued that the similarity of customs in different parts of the world is a product of identical forms of thinking, which he called "elementary ideas". In the early stages of the development of society, elementary ideas are formed as “popular notions” under the influence of the geographic environment; later modified under the influence of historical factors. The exposition of this concept can be found in the work Ethnic elementary ideas in the teaching about man. Among other works of Bastian should be noted the book Man in History. He died in Port of Spain (Trinidad). He was buried in the southwestern cemetery of Stansdorf. Stansdorf, Potsdam-Mittelmark district, Brandenburg Land, Germany. A group of small islands east and southeast of the island of Wilhelm in the southern entrance to the Hinlopen Strait. Вернуться на главную страничку
<urn:uuid:035fa2ca-20ec-4f67-9157-8c31ac5301c1>
CC-MAIN-2022-33
http://www.gpavet.narod.ru/Names7/bastian1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00277.warc.gz
en
0.937239
479
2.984375
3
EDU PUZZLE – FRUIT & VEG Sets of easy to assemble two-piece puzzles. Scatter the pieces randomly on a flat surface and try to match them in pairs. The playsets help children train their perceptiveness, associative skills and manual dexterity. Package dimensions ( l - w - h)
<urn:uuid:b0bd2034-9db5-4321-892c-3795ad14b40e>
CC-MAIN-2022-33
https://alexandertoys.com/products/edu-puzzle-fruit-veg/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00078.warc.gz
en
0.770354
115
1.9375
2
A British man sitting down for breakfast received a fright when a snake slithered out of his cereal box and fled into his dishwasher. The RSPCA said Animal Collection Officer Katie Hetherington responded Saturday morning to a home in Sheffield, Yorkshire, England, where a man reported a 3-foot snake had emerged from his box of cereal. "I think he was expecting to have Cornflakes for breakfast -- not Cornsnakes!" Hetherington quipped. "The poor chap was absolutely terrified -- I think it was the last thing he expected to find in his kitchen!" The snake was safely removed from the man's dishwasher and taken to a specialist center, the officer said. The cereal-stowaway serpent was identified as a corn snake, a species native to North America but common in Britain as an exotic pet. The RSPCA said the snake is suspected to be a runaway pet and officials are trying to find its owners. "Corn snakes are one of the most commonly-kept exotic pets -- and they are particularly good at escaping!" said Nicola White, RSPCA senior scientific officer in wildlife.
<urn:uuid:62323171-f281-401a-a4c9-d8c9e510c177>
CC-MAIN-2022-33
https://app.asempanews.com/snake-slithers-out-of-mans-cereal-box-hides-in-dishwasher/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00466.warc.gz
en
0.982691
241
2.078125
2
Jake Wood is a United States Marine Corps Veteran, the co-founder of Team Rubicon, and the author of the book Once a Warrior. Jake's story starts as a college athlete, playing football at the University of Wisconsin. As college was winding down, he knew that he wanted to serve in the military, but the traditional route college graduates take toward an officer's commission was blocked by obstacles due to his football injuries. So Jake decided that he was going to enlist. He joined the Marine Corps and became an infantryman, and then eventually, a scout sniper. Jake served multiple deployments to Afghanistan. When it came time for Jake to get out, he was deciding on whether or not he wanted to pursue his MBA, and then a massive earthquake hit Haiti. Jake decided that he was going to go down to help with the rebuilding effort. After landing in the Dominican Republic, Jake met up with a number of other American veterans and civilians who were also going down to help with the effort. He crossed the border of the Dominican Republic into Haiti with them. Along the way, the idea for Team Rubicon was born. Since then, Jake has built Team Rubicon into a massive volunteer organization that consists of hundreds of thousands of members. He was awarded the Pat Tillman Award for service in 2018, and recently published the book Once A Warrior. You can find Jake's book here: https://www.amazon.com/Once-Warrior-Veteran-Mission-Closer/dp/0593189353 You can learn more about Team Rubicon here: https://teamrubiconusa.org/?gclid=Cj0KCQiA48j9BRC-ARIsAMQu3WSHN1vKj2WVrj0PjLJDXXe37PopP06N78amLSyRpnW6uEyb_w7AUBkaAkVLEALw_wcB Feature photo by Kirk Jackson
<urn:uuid:bd2411cc-3e46-49e9-b1e4-ddbfe49ef440>
CC-MAIN-2022-33
https://warriorsoulpodcast.libsyn.com/jake-wood-crossing-the-rubicon-to-lifelong-service
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00676.warc.gz
en
0.975829
410
1.765625
2
Build solar energy projects across India that generate renewable electricity and support the sustainable development of local economies. - Pavagada, Karnataka - India - Bhadla, Rajasthan - India - Bodhare, Maharashtra – India Solar energy projects across India produce clean, renewable electricity where power would otherwise be generated by a fossil-fuel fired power plant. Solar power is clean: it produces no emissions and therefore eliminates the local air pollutants associated with fossil fuels. Electricity availability in the regions have been improved, reducing the occurrence of blackouts. The projects empower national energy security and support the sustainable development of local economies. The increase in local employment by people engaged as engineers, maintenance technicians, on-site operators and security guards also boosts local economies and village services. Importantly, the project developer donates portions of its revenue to the community to invest in technological resources for education and healthcare. The projects offer local communities financial diversity, improved living conditions and supports the development of a brighter future. - Over 815,000 tonnes of greenhouse gas emissions prevented each year. - The projects employ graduates in engineering, commerce and science and have implemented a mentoring program to enhance their skills - A portion of revenue generated from these projects goes into supporting local access to healthcare including child health with check-up clinics and healthy nutrition education for families. Sustainable Development Goals:
<urn:uuid:d9a9507a-3fff-4afe-ba59-7f42357d5862>
CC-MAIN-2022-33
https://carbonoffset.singaporeair.com.sg/en-GB/solar-power
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00677.warc.gz
en
0.901705
285
3.203125
3
The Peace Talks That Kill Bloodshed has bookended the faltering Middle East peace negotiations. When talks kicked off in early September, Hamas claimed responsibility for the killing of four Israelis in the West Bank; when talks appeared near collapse on Monday, vandals set fire to a West Bank mosque, burning Korans and carpets. This latest attack, reportedly by Israeli settlers, threatens to fuel another wave of rejectionism, barely a month into negotiations between Palestinian President Mahmoud Abbas and Israeli Prime Minister Benjamin Netanyahu. In the years I've spent covering the region, I've been hard pressed to see any tangible peace dividend from the many rounds of Middle East peace talks. Talks don't seem to constrain the violent actors, and on this occasion seem to have provoked more violence. Not a single person I interviewed in the Middle East during the last two months expected anything to come of the current talks—certainly not anything good—although, for the record, no one predicted either that a failed peace process would unleash a new intifada or wholesale change in Israeli priorities. Instead, the Arab diplomats, analysts, and activists who support Hamas and Hezbollah with whom I spoke seemed in accord that for the time being, neither the Israelis nor the Palestinians saw anything to gain from dialogue, except for earning chits with Washington. The main benefit of a peace process, in this view, is that Washington wants one, and so long as it doesn't cost anything, Washington's allies in Ramallah and Jerusalem are happy to oblige. (The play by Washington, meanwhile, is a little puzzling. Did no one in the Obama administration look at the calendar, when the settlement freeze was under discussion, and try to come up with an expiration date that didn't coincide with the midterm election?) Later this week, the Arab League will decide whether to authorize the Palestinians to continue negotiations. It's a purely tactical question—none of the leaders or diplomats involved appears to hold out any hope that this round of dialogue is going to be the one that leads to a big breakthrough. Not a single person I interviewed in the Middle East during the last two months expected anything to come of the current talks—certainly not anything good. And the whole exercise of the peace talks—all those handshakes, all those meetings—can backfire. What do talks achieve for their advocates in Jerusalem and Ramallah? Don't violent rejectionists on both sides benefit every time another cycle of talks concludes with no results? These latest talks between Netanyahu and Abbas actually seem to have emboldened the gunmen and thugs, the people who ambush passenger cars and set fire to places of worship. Since the collapse of peace talks at Taba under President Clinton in January 2001, enthusiasm on the ground has dwindled for each round. Since those failed talks, Hamas has only grown stronger in Gaza and the West Bank while the settler bloc has extended its influence in Israel. Hamas governs Gaza unchallenged but stands squarely outside of the Palestinian Authority and any peace process that it undertakes. The Jewish settlers and their leaders in the West Bank, for their part, have secured autonomy from Israel's government. Until both groups join the process, it is largely academic: talks between two governments that lack control over significant portions of their territory and constituents. At worst, the talks create bloodshed; at best, perhaps, they are irrelevant. A poll just released by the Palestinian Center for Policy and Survey Research showed that two-thirds of the Palestinians polled wanted their leaders to pull out of direct negotiations with Israel. The same poll shows that levels of support are unchanged for Hamas, which opposed the talks, and the Fatah-controlled Palestinian Authority, which initiated them, suggesting that the Palestinians didn't punish Fatah for joining the talks, and didn't reward Hamas for apparently trying to sabotage them. In fact, direct negotiations don't seem to have changed the landscape of Palestinian public opinion much at all. On the Israeli side, meanwhile, it was the settlement expansion moratorium—and not direct negotiations with the Palestinian Authority—that provoked political turbulence. Now the political center of gravity seems to have returned to an equilibrium that favors settlement growth. A few weeks before the current round began in Washington, I was interviewing an Arab diplomat in the region about the parameters of the talks. "How serious do the Arab governments take the prospect of Hamas ultimately joining this process?" I asked. The diplomat burst out laughing. "Who's taking any part of this process seriously? No one here does, I assure you." All the considerable preparations under way for the talks, in this diplomat's view, were an exercise in futility. "No one expects a thing to come of this process," the diplomat said. "But we have to go through the motions." Thanassis Cambanis is the author of A Privilege to Die: Inside Hezbollah's Legions and Their Endless War Against Israel. He teaches at Columbia University's School of International and Public Affairs in New York City. He has covered the Arab world since 2003, including four years as the Boston Globe Baghdad and Middle East bureau chief. He contributes regularly to the Boston Globe, The New York Times, Global Post and Foreign Affairs.
<urn:uuid:1cb674a7-ad6e-4d99-80b4-9c4ebe1941ee>
CC-MAIN-2017-04
http://www.thedailybeast.com/articles/2010/10/05/middle-east-peace-talks-create-more-violence-than-peace.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00394-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961745
1,064
1.5625
2
I wonder if anyone has a crystal ball in Tom Harkin’s office: The U.S. Agriculture Department would be given the power to regulate all food sold in schools — including vending machine snacks — when Congress renews child nutrition programs, the chairman of the Senate Agriculture Committee said on Tuesday. Chairman Tom Harkin said he hopes the committee will start work on legislation to reauthorize school lunch programs in October or November, with a goal to conclude the work by the end of the year. And no chips for you! Agriculture Committee work on child nutrition will begin with a draft that gives the USDA the authority to oversee all food in schools, so nutrition programs are not “undermined” by junk food in vending machines, Harkin said at a confirmation hearing for the head of the USDA’s nutrition programs. Purportedly because “Roughly 17 percent of school-age children are obese,” which of course the food censors consider is an “epidemic,” as if you caught obesity from sitting next to a fat person. When I was in Catholic school I was a scrawny-thin kid, and every morning looked forward to a bag of potato chips and a small Coca-Cola during recess, which back then the nuns sold you for twenty-five cents. Now the Feds would probably raid the nuns over it. Wouldn’t an enterprising vendor set up a hot dog, chips and soda cart right outside the school perimeter and make a bundle? Or would the Feds implement “zero-tolerance” zones near schools, as they do with drugs, and send you to jail for having soda and chips?
<urn:uuid:c1cd6eea-a138-4135-8fc8-f6933723001c>
CC-MAIN-2022-33
https://faustasblog.com/2009/07/feds-to-oversee-vending-machine-doritos/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00269.warc.gz
en
0.95895
360
1.570313
2
Rc 3d Helicopter What is RC 3D??? Well, you may often look at a helicopter as a lower, less privileged, version of an RC airplane. After all, they are slower, more restricted in their movements and generally not as cool as your latest RC F-22 jet replica. But RC 3D is quickly changing the way you look at RC helicopters, and not just that, it is fast becoming a major sub-hobby amongst RC hobbyists. Planes have always been known to perform mind-blowing aerobatics but in recent times, with improving technology, military helicopters have also begun participating in similar aerobatics, a feature that has now found a firm footing in specialised RC clubs. Of course, the RC helicopters used in RC 3D are more advanced than your average RC model helicopter. How you ask? Well, its all a bit technical and boring, but if you insist. Normal toy RC helicopters have a 3-channel coaxial transmitter and receiver that controls the flight of the aircraft, not enough to enable RC 3D flying. However, in model-grade RC helicopters, there are six channels that fly the aircraft, making aerobatic manoeuvres simpler to execute due to the larger range of movements, now allowed by the extra channels. In other words, if you try to fly your toy RC helicopter upside down, you might have to pick up the pieces, however, if you have a '3D-capable' model RC helicopter, then not only can you fly it upside down, you can do loops, twists, turns and much more. When looking for a model that's 3D-capable, you need to understand your capabilities as well as what you want the model to do. The size, weight, material, engine and gears, all decide how the RC 3D performance of the model will be and how well you, the controller, can handle it. Constructing an RC 3D model requires putting together the parts, using the provided manual, as well as the right set of tools. Expertise always helps however, there is always a first time for everyone and if this is yours, then don't worry, it isn't as hard as it looks. Of course, if you do try to venture into uncharted waters, or skies, then you might just end up saving for another RC model helicopter to have a go at it again. You can get a book that teaches you how to perform back-flips or loops using your RC 3D helicopter or there is always the option of joining an RC club that encourages the 3D aspect of the sport. For an experienced flyer, it provides an ideal platform to showcase the talents that you have acquired and if you are a fresh fruit, then there are plenty of experienced people around who can teach you the finer nuances of the sport. Either ways, RC 3D is a great way to explore a whole new dimension to your RC hobby and if ever you have had the inferiority complex of liking helicopters as against people who love planes, then here is your chance to upstage them with your own RC 3D routine.
<urn:uuid:d4fe15d8-6c62-4299-9ce0-8b6bc4e7bdc0>
CC-MAIN-2022-33
https://www.hobby.net.au/flex/rc-3d-helicopter/757/1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00466.warc.gz
en
0.96002
640
2
2
The School of Agriculture imparts resident instructions in different disciplines for developing human resources in agriculture. Besides, it lays thrust on carrying out research in agriculture and allied fields. The school has well equipped laboratories, library, lecture rooms and excellent farm facility. Until the day arrives when the polar ice-caps stop melting, there will be a place for biotech and till the world is free of all diseases, biotech is indispensable. The belief is that this century is for those who belong to the field of biology and who possess the acumen to apply its findings. School of Business is one of the first ten institutions in India to be accredited by ACBSP, USA. Known for its teaching excellence, the School offers a wide choice of Management, Commerce & Economics programs upto Doctoral degree. Programmes developed in partnership with the industry, incubation of entrepreneurship projects and emphasis on learning by doing are distinguishing features of the School. Since beginning of humanity when the first time someone placed a roof over his head or laid a tree trunk to cross a river, Civil Engineering existed. The emphasis is laid on the evolution of man made infrastructure with commitment to create professionals who can build smart cities of tomorrow. Ranked among the top four Computer Applications Institutes of Northern India by NASSCOM. Having learners from all across the country and 15 plus countries around the globe with an experienced team of proficient faculty members committed to create developers and innovators for the next century. Is it money? Is it intellectual challenge? Is it captivation of technology? A Computer Science degree can lead to a fulfilling IT career on all three fascinations. If you enjoy creative problem solving, working with people and using computers to help invent the future, then you should consider studying Computer Science and Engineering because you deserve the best. Smart is the phone, smart would be the cities drawing power from smart grids. Manufacturing plants are being controlled remotely through Internet, thanks to Internet of Things (IoT). Even the video data is now transferred at visible light spectrum through LiFi. Energy saved is energy created, let us design efficient lighting through LEDs and explore renewable energy sources. Creating possibilities for your designs to be showcased in the international couture shows In Paris and Milan! Faculty from premier design institutes to sharpen design visualization and execution. Labs and equipment to simulate the industry environment with practical exposure to fashion industry right from design to merchandising. Option of specialization in Design or Technology Hospitality and tourism has experienced continued growth and diversification to become one of the fastest growing economic sectors in the world. This growth has led to creation of huge opportunities for students. The School grooms students through intensive service orientated practical, excellent infrastructure, industry endorsed curriculum and faculty with Industry exposure. The society has always valued creativity and creative people. Artists, writers, musicians, film makers and designers have been the icons of their respective times whose fame has far outlived their mortal bodies. The School, with its curriculum, skills, technology and exposure to live projects, seeks to harness the creativity and passion to generate work that endures. Law, approved by Bar Council of India was established with a view to cater to the requirements of the legal profession. Students across the globe are groomed for bright professional careers by providing wide range of exposure on theoretical as well as practical aspects of law. The School takes pride in its alumni who have made their mark as judicial officers, legal practitioners, corporate advisors and civil sevants Liberal arts education is a crying need of the global education system. There is an increased focus on technical knowledge and applied sciences while failing to appreciate cultural diversity, global interdependence and inclusive growth. The School exposes to theoretical rigor, field work and research, along with social sensitization through opportunities to interact with and learn from the outside world. In an era of smart cities, sustainable buildings and contemporary interiors we nourish learners to become lateral thinkers by focusing on critical design approach. To aim for a world, designed with latest creations and innovations by our potential planners, architects, interior and product designers making it a joyous place to dwell. Education if given rightly is meaningful. Recognizing the challenges and need of education across the globe, we promote innovation through learner centred pedagogies, skill enhancement outreach activities, mentoring, application based research and access to reach offline and online learning resources to develop insight and imagination among learners Everything in motion, from Wheels of an aircraft to the hard disk of computer to the vibration of mobile phone is being touched upon by Mechanical Engineering, thus making it Omnipresent. Creating professionals who can handle omnipresence of technology and who are capable of moving things efficiently. Ingenuity and aesthetics in science form the essence of drug discovery in our labs. “From laboratory bench to patient bed side” is the ultimate aim for the young minds. Fusion of traditional and modern techniques has resulted in two herbal products already in market. Development at any phase is always linked with technology and technology happens when there is an advancement in science. Committed to strive for excellence in teaching, research and thus producing professionals to meet the challenges for the next generation. Developing skills in people to participate in providing solutions for societal problems Early engagement in learning and professional development stands a better chance of success. Three year diploma in engineering programme is to akin the need of the society by enlarge. The emphasis is more on practical approach to create a seamless tiers between technicians and Engineers which can support shop floor and field operations. Correct diagnosis and eventual treatment of the disease are the critical factors in deciding the patient care regimen. The dichotomy of the diagnosis and treatment as well as rehabilitation gets seamlessly integrated when the sciences of physiotherapy and paramedical meet each other. Once the perfect diagnosis is achieved, the treatment and rehabilitation of the patient becomes much more stream-lined. The School, apart from preparing physical education teachers, is credited for nurturing sports person with an aim to participate in Asian games and other international competitions. Rigorous academic and sports training is delivered by expert faculty members. Dynamic and vibrant environment attracts rich diversity of national and international students.
<urn:uuid:d3a748f8-e6f0-4dc2-9b88-861aeb0e1b90>
CC-MAIN-2022-33
https://schools.lpu.in/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00078.warc.gz
en
0.942994
1,245
1.835938
2
In 1942 design began on the M36, which was a replacement for the M10 Wolverine, which mounted the 3” gun. Prudent foresight showed that the M10 would have difficulty engaging the new generation German tanks (Panthers and Tigers) at long range. Most M36s used the same chassis as the M10, while a few - known as M36B1s - used the M4A3 chassis. The M36 was lightly armored and had an open top, which provided its crews with better observation than standard close topped turrets. The new M3 90mm gun was capable of taking out heavier German tanks at much longer ranges than previous Tank Destroyers. The M36 first saw combat in September 1944 and served with US armed force into the Korean War. The M36 was exported to several other nations and even saw combat during the wars in the Balkans from 1991 to 1995. These models are from the new US Cavlary Group Army Box. It includes four M36s and the security section. For those of you not interested in buying an entire army, you can also get the M36s in a platoon box. The new M36 box set from Battlefront and the Army Box includes everything you need to build four M36 Jackson Tank Destroyers. This includes a resin hull and turret, plastic tracks, metal crews and stowage, a decal sheet and 8 rare earth magnets. The M36 retails at about $45 USD MSRP, but you can pick it up from the War Store for about $40 USD. The M36 model kit is a very nice kit. Metal bits had little to no flash and required minimal clean up. The same went for the resin. There were no major defects or issues with the cast. One thing the platoon box set does not include, which the army box does is the Tank Destroyer Security Section. The security section is sold separately if you get the platoon box. It would be nice to have the security section included in the TD platoon box sets, but then the price would be about $60 USD and if you already had security sections from previous gaming acquisitions it might be a bit of a waste. I have yet to field my M36s on the table, but have been on the receiving end of them. They are powerful with an AT 14, Firepower 3+. At long range they are nasty vicious and just gut light and medium armor. Even when facing heavier German Tigers and Panthers they are ferociously awesome. I know that when they appear on the table top they cause great consternation and become a priority target. If you have any tips or strategies on how to use M36s or fight them off feel free to share them on the WWPD forums. “Craig Baxter is the Director of the WWPD Northern Research center in Anchorage, AK. When he’s not contributing to WWPD.net he is busy blogging, painting, modeling and rolling dice. You can find more of his work and articles at frozengamerak.blogspot.com.”
<urn:uuid:80464b1f-e599-497e-8260-c7b54f7c8c74>
CC-MAIN-2017-04
http://www.wwpd.net/2013/02/review-battlefront-m36-jackson.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00402-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967141
630
1.546875
2
Known as Pegasus, this cyberweapon is widely considered as the most powerful piece of spyware technology ever made. Governments all over the world are scrambling to woo the Israeli government into providing them licenses to use the spyware, which was developed by an Israeli technology firm called the NSO Group. Pegasus is known as a “zero-click hacking tool” used for infiltrating smartphones. Once it has entered the target phone, it can turn it into a 24-hour surveillance device. Everything from messages, photos and video recordings that the smartphone sends or receives can be copied without the owner even knowing that their phone had been hacked. (Related: Authoritarian governments using spyware to keep an eye on enemies of their regimes.) If properly utilized, the Pegasus software can infect millions – potentially billions – of phones running either iOS or Android operating systems. Pegasus spyware is known to have been used by the Saudi Arabian government to spy on Amazon founder Jeff Bezos and murdered dissident Jamal Khashoggi. More recently, the Israeli government itself has been accused of using Pegasus to carry out warrantless surveillance of its citizens. Israel prefers to preserve its relationship with Russia than provide Ukraine the cyber defense system Ukraine has reportedly been trying to get the Israeli government to allow the NSO Group to sell the Pegasus software since 2014, following the Russian invasion and occupation of Crimea and the declaration of independence of the pro-Russian breakaway states of Donetsk and Luhansk. Since then, Ukraine has increasingly become the favorite target of Russian cyberattacks. Fearing the strain the sale of the Pegasus to Ukraine would cause on Russian relations with Israel, the government at the time refused to budge. It even went so far as to impose a near-total embargo on selling any kind of weaponry and defense equipment to Ukraine. In the case of the Baltic nation of Estonia, the country started its process of trying to purchase Pegasus in 2018. The Israeli government at first agreed to allow Estonia to have the system. Negotiations went far enough that the Estonian government even approved a down payment of $30 million to the NSO Group. But the following year, a senior Russian defense official contacted Israeli intelligence agencies to notify them that Estonia planned to use the Pegasus system to hack into Russian phones. The Estonian government might have even considered using Pegasus on its citizens of ethnic Russian descent, who constitute nearly 24 percent of the population. Israeli officials who had control over the sale of defensive equipment, including Pegasus, hotly debated whether to allow the sale. The Israeli Ministry of Defense inevitably blocked the sale and returned the Estonian government’s down payment. Western governments have strongly criticized Israel’s close relationship with Russia since the beginning of the invasion of Ukraine. Many Ukrainian officials have also publicly called out Israel for only offering limited support to Ukraine. Ukrainian President Volodymyr Zelensky himself made a virtual speech to the Knesset, the Israeli parliament, criticizing the country for not providing it with defensive weapons systems, including the highly admired Iron Dome antimissile system, and for not joining Western nations in imposing economic sanctions on Russia. Critics of the Israeli government have also pointed out that it was hypocritical when it blocked the sale to Ukraine and Estonia, who supposedly want to use the system as a means of defense. They noted that the Israeli government did not bat an eye when it sold the system to the United Arab Emirates, Saudi Arabia, Panama, Mexico, India and Hungary. These governments, led by corrupt or authoritarian rulers, have used the Pegasus to spy on dissidents and critics, including journalists, human rights activists and political opponents. Learn more about how Ukraine and Russia are escalating their conflict in cyberspace by reading the latest articles at CyberWar.news. Watch this episode of the “Health Ranger Report” as Mike Adams, the Health Ranger, talks about how people can survive a cyberattack designed to take down America. More related stories:
<urn:uuid:7109a099-22ca-4367-90f8-8e5885174f5f>
CC-MAIN-2022-33
https://naturalnews.com/2022-03-28-israel-refuses-selling-pegasus-cyberweapon-ukraine-estonia.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00077.warc.gz
en
0.956857
816
1.8125
2
Full profile →'"> The author is a Forbes contributor. The opinions expressed are those of the writer. The following post was published on http://knowledge.wharton.upenn.edu on January 18, 2012. The widening income gap has become a controversial issue in the United States, as liberals decry the decline of the middle class and conservatives argue that a healthy market economy must reward effort, enterprise and risk taking. But on the related issue of economic mobility, or individuals' ability to move up the income ladder, most people appear to agree: Upward mobility is good. Indeed, conservatives often cite economic mobility as the reason not to worry about widening income inequality. As long as people can rise, it doesn't matter that some are very rich and others are many rungs below: Economic mobility means people are not trapped where they started. But a growing body of evidence shows that economic mobility is not as attainable in the United States as many people think. Moreover, various studies show that economic mobility declines as income inequality increases, indicating that in coming years, it could become harder for people to move from poverty to the middle class, or from the middle class to the top. "Recent studies suggest that there is less economic mobility in the United States than has long been presumed," concludes a study by The Economic Mobility Project, conducted by The Pew Charitable Trusts, The American Enterprise Institute, The Brookings Institution, The Heritage Foundation and The Urban Institute. "The last 30 years have seen a considerable drop-off in median household income growth compared to earlier generations. And, by some measurements, we are actually a less mobile society than many other nations, including Canada, France, Germany and most Scandinavian countries. This challenges the notion of America as the land of opportunity." What drives economic mobility? "I believe that one of the great historical advantages of the United States has been the remarkable mobility of the U.S. workforce," says Wharton finance professor Richard J. Herring, referring to workers' ability to move from one location to another to pursue jobs, education and other opportunities for a better life, making the economy more efficient than if workers were fixed in place. The chance to rise is key to workers' willingness and ability to move, he argues. "Historically, this may have come from our origins as a land of immigrants who came to the U.S. to seek a better life and the opportunity to move West whenever economic conditions declined in the East," Herring adds. "It also had much to do with expenditures on public education.... This traditional strength has diminished in recent years, for both transitory and secular reasons." Economic mobility involves two measurements, notes Wharton finance professor Nikolai Roussanov. First is "absolute" mobility, or the wealth of children compared to their parents. Then there is "relative" mobility, the ability of children to rise to a higher economic position than their parents occupied, as when children of the poor rise to the middle class. While both types of mobility are important, relative mobility is especially revealing because it shows the extent to which people are trapped by circumstances of birth or are able to rise relative to others. The Economic Mobility Project study argues that relative mobility determines whether a country has a "meritocratic" society where people rise on effort, a "fortune cookie" society where status depends on luck, or a "class-stratified" society where children tend to end up in the same position as their parents. Americans have historically viewed theirs as a meritocracy, but data shows that is not necessarily the case. "Most studies find that, in America, about half of the advantages of having a parent with a high income are passed on to the next generation," the Economic Mobility Project study concludes. "This means that one of the biggest predictors of a child's future economic success -- the identity and characteristics of his or her parents -- is predetermined and outside the child's control." Clearly, prosperous parents can provide their children with good education and other advantages that are typically not available to people in lower income brackets. While some children of means will fail because of laziness, lack of talent or bad luck, the average person benefits from the initial leg up. Measuring inter-generational economic mobility by comparing the child's income to the parents', the Economic Mobility Project study finds that Americans are slightly more mobile than people in the United Kingdom, but less so than residents of France, Germany, Sweden, Canada, Finland, Norway and Denmark. In the latter four countries, people have two to three times the economic mobility of Americans. A second study by the Economic Mobility Project found that "42% of children born to parents in the bottom fifth of the income distribution remain in the bottom, while 39% born to parents in the top fifth remain at the top." Only about one-third of Americans were ranked as "upwardly mobile," which required earning more than their parents as well as moving to a higher quintile on the income ladder.
<urn:uuid:c132286a-230e-44be-97b1-3a993df60b6a>
CC-MAIN-2017-04
http://www.forbes.com/sites/knowledgewharton/2012/01/26/32012/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00016-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96845
1,022
2.765625
3
Obsessive-compulsive disorder (OCD) and autism spectrum disorders (ASD) are serious and debilitating psychiatric conditions and each constitutes a significant public health concern, particularly in children. Both of these conditions are highlighted by the repeated expression of meaningless behaviors. Individuals with OCD often show checking, frequent hand washing, and counting. Children with ASDs also engage in repetitive tapping, arm or hand flapping, and rocking. These behaviors can vary widely in intensity and frequency of expression. More intense forms of repetitive behaviors can even result in injury (e.g. excessive grooming, hand washing, and self-stimulation). These behaviors are therefore very disruptive and make normal social discourse difficult. Treatment options for repetitive behaviors in OCD and ASDs are somewhat limited and there is great interest in developing more effective therapies for each condition. Numerous animal models for evaluating compulsive-like behaviors have been developed over the past three decades. Perhaps the animal models with the greatest validity and ease of use are the marble burying test and the nestlet shredding test. Both tests take advantage of the fact that the target behaviors occur spontaneously in mice. In the marble burying test, 20 marbles are arrayed on the surface of clean bedding. The number of marbles buried in a 30 min session is scored by investigators blind to the treatment or status of the subjects. In the nestlet shredding test, a nestlet comprised of pulped cotton fiber is preweighed and placed on top of cage bedding and the amount of the nestlet remaining intact after a 30 min test session is determined. Presently, we describe protocols for and show movie documentation of marble burying and nestlet shredding. Both tests are easily and accurately scored and each is sensitive to small changes in the expression of compulsive-like behaviors that result from genetic manipulations, disease, or head injury. 22 Related JoVE Articles! Controlling Parkinson's Disease With Adaptive Deep Brain Stimulation Institutions: University of Oxford, UCL Institute of Neurology. Adaptive deep brain stimulation (aDBS) has the potential to improve the treatment of Parkinson's disease by optimizing stimulation in real time according to fluctuating disease and medication state. In the present realization of adaptive DBS we record and stimulate from the DBS electrodes implanted in the subthalamic nucleus of patients with Parkinson's disease in the early post-operative period. Local field potentials are analogue filtered between 3 and 47 Hz before being passed to a data acquisition unit where they are digitally filtered again around the patient specific beta peak, rectified and smoothed to give an online reading of the beta amplitude. A threshold for beta amplitude is set heuristically, which, if crossed, passes a trigger signal to the stimulator. The stimulator then ramps up stimulation to a pre-determined clinically effective voltage over 250 msec and continues to stimulate until the beta amplitude again falls down below threshold. Stimulation continues in this manner with brief episodes of ramped DBS during periods of heightened beta power. Clinical efficacy is assessed after a minimum period of stabilization (5 min) through the unblinded and blinded video assessment of motor function using a selection of scores from the Unified Parkinson's Rating Scale (UPDRS). Recent work has demonstrated a reduction in power consumption with aDBS as well as an improvement in clinical scores compared to conventional DBS. Chronic aDBS could now be trialed in Parkinsonism. Medicine, Issue 89, Parkinson's, deep brain stimulation, adaptive, closed loop Training Synesthetic Letter-color Associations by Reading in Color Institutions: University of Amsterdam. Synesthesia is a rare condition in which a stimulus from one modality automatically and consistently triggers unusual sensations in the same and/or other modalities. A relatively common and well-studied type is grapheme-color synesthesia, defined as the consistent experience of color when viewing, hearing and thinking about letters, words and numbers. We describe our method for investigating to what extent synesthetic associations between letters and colors can be learned by reading in color in nonsynesthetes. Reading in color is a special method for training associations in the sense that the associations are learned implicitly while the reader reads text as he or she normally would and it does not require explicit computer-directed training methods. In this protocol, participants are given specially prepared books to read in which four high-frequency letters are paired with four high-frequency colors. Participants receive unique sets of letter-color pairs based on their pre-existing preferences for colored letters. A modified Stroop task is administered before and after reading in order to test for learned letter-color associations and changes in brain activation. In addition to objective testing, a reading experience questionnaire is administered that is designed to probe for differences in subjective experience. A subset of questions may predict how well an individual learned the associations from reading in color. Importantly, we are not claiming that this method will cause each individual to develop grapheme-color synesthesia, only that it is possible for certain individuals to form letter-color associations by reading in color and these associations are similar in some aspects to those seen in developmental grapheme-color synesthetes. The method is quite flexible and can be used to investigate different aspects and outcomes of training synesthetic associations, including learning-induced changes in brain function and structure. Behavior, Issue 84, synesthesia, training, learning, reading, vision, memory, cognition Protein WISDOM: A Workbench for In silico De novo Design of BioMolecules Institutions: Princeton University. The aim of de novo protein design is to find the amino acid sequences that will fold into a desired 3-dimensional structure with improvements in specific properties, such as binding affinity, agonist or antagonist behavior, or stability, relative to the native sequence. Protein design lies at the center of current advances drug design and discovery. Not only does protein design provide predictions for potentially useful drug targets, but it also enhances our understanding of the protein folding process and protein-protein interactions. Experimental methods such as directed evolution have shown success in protein design. However, such methods are restricted by the limited sequence space that can be searched tractably. In contrast, computational design strategies allow for the screening of a much larger set of sequences covering a wide variety of properties and functionality. We have developed a range of computational de novo protein design methods capable of tackling several important areas of protein design. These include the design of monomeric proteins for increased stability and complexes for increased binding affinity. To disseminate these methods for broader use we present Protein WISDOM (http://www.proteinwisdom.org), a tool that provides automated methods for a variety of protein design problems. Structural templates are submitted to initialize the design process. The first stage of design is an optimization sequence selection stage that aims at improving stability through minimization of potential energy in the sequence space. Selected sequences are then run through a fold specificity stage and a binding affinity stage. A rank-ordered list of the sequences for each step of the process, along with relevant designed structures, provides the user with a comprehensive quantitative assessment of the design. Here we provide the details of each design method, as well as several notable experimental successes attained through the use of the methods. Genetics, Issue 77, Molecular Biology, Bioengineering, Biochemistry, Biomedical Engineering, Chemical Engineering, Computational Biology, Genomics, Proteomics, Protein, Protein Binding, Computational Biology, Drug Design, optimization (mathematics), Amino Acids, Peptides, and Proteins, De novo protein and peptide design, Drug design, In silico sequence selection, Optimization, Fold specificity, Binding affinity, sequencing Developing Neuroimaging Phenotypes of the Default Mode Network in PTSD: Integrating the Resting State, Working Memory, and Structural Connectivity Institutions: Alpert Medical School, Brown University, University of Georgia. Complementary structural and functional neuroimaging techniques used to examine the Default Mode Network (DMN) could potentially improve assessments of psychiatric illness severity and provide added validity to the clinical diagnostic process. Recent neuroimaging research suggests that DMN processes may be disrupted in a number of stress-related psychiatric illnesses, such as posttraumatic stress disorder (PTSD). Although specific DMN functions remain under investigation, it is generally thought to be involved in introspection and self-processing. In healthy individuals it exhibits greatest activity during periods of rest, with less activity, observed as deactivation, during cognitive tasks, e.g. , working memory. This network consists of the medial prefrontal cortex, posterior cingulate cortex/precuneus, lateral parietal cortices and medial temporal regions. Multiple functional and structural imaging approaches have been developed to study the DMN. These have unprecedented potential to further the understanding of the function and dysfunction of this network. Functional approaches, such as the evaluation of resting state connectivity and task-induced deactivation, have excellent potential to identify targeted neurocognitive and neuroaffective (functional) diagnostic markers and may indicate illness severity and prognosis with increased accuracy or specificity. Structural approaches, such as evaluation of morphometry and connectivity, may provide unique markers of etiology and long-term outcomes. Combined, functional and structural methods provide strong multimodal, complementary and synergistic approaches to develop valid DMN-based imaging phenotypes in stress-related psychiatric conditions. This protocol aims to integrate these methods to investigate DMN structure and function in PTSD, relating findings to illness severity and relevant clinical factors. Medicine, Issue 89, default mode network, neuroimaging, functional magnetic resonance imaging, diffusion tensor imaging, structural connectivity, functional connectivity, posttraumatic stress disorder Correlating Behavioral Responses to fMRI Signals from Human Prefrontal Cortex: Examining Cognitive Processes Using Task Analysis Institutions: Centre for Vision Research, York University, Centre for Vision Research, York University. The aim of this methods paper is to describe how to implement a neuroimaging technique to examine complementary brain processes engaged by two similar tasks. Participants' behavior during task performance in an fMRI scanner can then be correlated to the brain activity using the blood-oxygen-level-dependent signal. We measure behavior to be able to sort correct trials, where the subject performed the task correctly and then be able to examine the brain signals related to correct performance. Conversely, if subjects do not perform the task correctly, and these trials are included in the same analysis with the correct trials we would introduce trials that were not only for correct performance. Thus, in many cases these errors can be used themselves to then correlate brain activity to them. We describe two complementary tasks that are used in our lab to examine the brain during suppression of an automatic responses: the stroop1 and anti-saccade tasks. The emotional stroop paradigm instructs participants to either report the superimposed emotional 'word' across the affective faces or the facial 'expressions' of the face stimuli1,2 . When the word and the facial expression refer to different emotions, a conflict between what must be said and what is automatically read occurs. The participant has to resolve the conflict between two simultaneously competing processes of word reading and facial expression. Our urge to read out a word leads to strong 'stimulus-response (SR)' associations; hence inhibiting these strong SR's is difficult and participants are prone to making errors. Overcoming this conflict and directing attention away from the face or the word requires the subject to inhibit bottom up processes which typically directs attention to the more salient stimulus. Similarly, in the anti-saccade task3,4,5,6 , where an instruction cue is used to direct only attention to a peripheral stimulus location but then the eye movement is made to the mirror opposite position. Yet again we measure behavior by recording the eye movements of participants which allows for the sorting of the behavioral responses into correct and error trials7 which then can be correlated to brain activity. Neuroimaging now allows researchers to measure different behaviors of correct and error trials that are indicative of different cognitive processes and pinpoint the different neural networks involved. Neuroscience, Issue 64, fMRI, eyetracking, BOLD, attention, inhibition, Magnetic Resonance Imaging, MRI Transferring Cognitive Tasks Between Brain Imaging Modalities: Implications for Task Design and Results Interpretation in fMRI Studies Institutions: Research Centre Jülich GmbH, Research Centre Jülich GmbH. As cognitive neuroscience methods develop, established experimental tasks are used with emerging brain imaging modalities. Here transferring a paradigm (the visual oddball task) with a long history of behavioral and electroencephalography (EEG) experiments to a functional magnetic resonance imaging (fMRI) experiment is considered. The aims of this paper are to briefly describe fMRI and when its use is appropriate in cognitive neuroscience; illustrate how task design can influence the results of an fMRI experiment, particularly when that task is borrowed from another imaging modality; explain the practical aspects of performing an fMRI experiment. It is demonstrated that manipulating the task demands in the visual oddball task results in different patterns of blood oxygen level dependent (BOLD) activation. The nature of the fMRI BOLD measure means that many brain regions are found to be active in a particular task. Determining the functions of these areas of activation is very much dependent on task design and analysis. The complex nature of many fMRI tasks means that the details of the task and its requirements need careful consideration when interpreting data. The data show that this is particularly important in those tasks relying on a motor response as well as cognitive elements and that covert and overt responses should be considered where possible. Furthermore, the data show that transferring an EEG paradigm to an fMRI experiment needs careful consideration and it cannot be assumed that the same paradigm will work equally well across imaging modalities. It is therefore recommended that the design of an fMRI study is pilot tested behaviorally to establish the effects of interest and then pilot tested in the fMRI environment to ensure appropriate design, implementation and analysis for the effects of interest. Behavior, Issue 91, fMRI, task design, data interpretation, cognitive neuroscience, visual oddball task, target detection Automated, Quantitative Cognitive/Behavioral Screening of Mice: For Genetics, Pharmacology, Animal Cognition and Undergraduate Instruction Institutions: Rutgers University, Koç University, New York University, Fairfield University. We describe a high-throughput, high-volume, fully automated, live-in 24/7 behavioral testing system for assessing the effects of genetic and pharmacological manipulations on basic mechanisms of cognition and learning in mice. A standard polypropylene mouse housing tub is connected through an acrylic tube to a standard commercial mouse test box. The test box has 3 hoppers, 2 of which are connected to pellet feeders. All are internally illuminable with an LED and monitored for head entries by infrared (IR) beams. Mice live in the environment, which eliminates handling during screening. They obtain their food during two or more daily feeding periods by performing in operant (instrumental) and Pavlovian (classical) protocols, for which we have written protocol-control software and quasi-real-time data analysis and graphing software. The data analysis and graphing routines are written in a MATLAB-based language created to simplify greatly the analysis of large time-stamped behavioral and physiological event records and to preserve a full data trail from raw data through all intermediate analyses to the published graphs and statistics within a single data structure. The data-analysis code harvests the data several times a day and subjects it to statistical and graphical analyses, which are automatically stored in the "cloud" and on in-lab computers. Thus, the progress of individual mice is visualized and quantified daily. The data-analysis code talks to the protocol-control code, permitting the automated advance from protocol to protocol of individual subjects. The behavioral protocols implemented are matching, autoshaping, timed hopper-switching, risk assessment in timed hopper-switching, impulsivity measurement, and the circadian anticipation of food availability. Open-source protocol-control and data-analysis code makes the addition of new protocols simple. Eight test environments fit in a 48 in x 24 in x 78 in cabinet; two such cabinets (16 environments) may be controlled by one computer. Behavior, Issue 84, genetics, cognitive mechanisms, behavioral screening, learning, memory, timing Community-based Adapted Tango Dancing for Individuals with Parkinson's Disease and Older Adults Institutions: Emory University School of Medicine, Brigham and Woman‘s Hospital and Massachusetts General Hospital. Adapted tango dancing improves mobility and balance in older adults and additional populations with balance impairments. It is composed of very simple step elements. Adapted tango involves movement initiation and cessation, multi-directional perturbations, varied speeds and rhythms. Focus on foot placement, whole body coordination, and attention to partner, path of movement, and aesthetics likely underlie adapted tango’s demonstrated efficacy for improving mobility and balance. In this paper, we describe the methodology to disseminate the adapted tango teaching methods to dance instructor trainees and to implement the adapted tango by the trainees in the community for older adults and individuals with Parkinson’s Disease (PD). Efficacy in improving mobility (measured with the Timed Up and Go, Tandem stance, Berg Balance Scale, Gait Speed and 30 sec chair stand), safety and fidelity of the program is maximized through targeted instructor and volunteer training and a structured detailed syllabus outlining class practices and progression. Behavior, Issue 94, Dance, tango, balance, pedagogy, dissemination, exercise, older adults, Parkinson's Disease, mobility impairments, falls Methods to Explore the Influence of Top-down Visual Processes on Motor Behavior Institutions: Rutgers University, Rutgers University, Rutgers University, Rutgers University, Rutgers University. Kinesthetic awareness is important to successfully navigate the environment. When we interact with our daily surroundings, some aspects of movement are deliberately planned, while others spontaneously occur below conscious awareness. The deliberate component of this dichotomy has been studied extensively in several contexts, while the spontaneous component remains largely under-explored. Moreover, how perceptual processes modulate these movement classes is still unclear. In particular, a currently debated issue is whether the visuomotor system is governed by the spatial percept produced by a visual illusion or whether it is not affected by the illusion and is governed instead by the veridical percept. Bistable percepts such as 3D depth inversion illusions (DIIs) provide an excellent context to study such interactions and balance, particularly when used in combination with reach-to-grasp movements. In this study, a methodology is developed that uses a DII to clarify the role of top-down processes on motor action, particularly exploring how reaches toward a target on a DII are affected in both deliberate and spontaneous movement domains. Behavior, Issue 86, vision for action, vision for perception, motor control, reach, grasp, visuomotor, ventral stream, dorsal stream, illusion, space perception, depth inversion A Novel Method for Assessing Proximal and Distal Forelimb Function in the Rat: the Irvine, Beatties and Bresnahan (IBB) Forelimb Scale Institutions: University of California, San Francisco. Several experimental models of cervical spinal cord injury (SCI) have been developed recently to assess the consequences of damage to this level of the spinal cord (Pearse et al. , 2005, Gensel et al. , 2006, Anderson et al. , 2009), as the majority of human SCI occur here (Young, 2010; www.sci-info-pages.com). Behavioral deficits include loss of forelimb function due to damage to the white matter affecting both descending motor and ascending sensory systems, and to the gray matter containing the segmental circuitry for processing sensory input and motor output for the forelimb. Additionally, a key priority for human patients with cervical SCI is restoration of hand/arm function (Anderson, 2004). Thus, outcome measures that assess both proximal and distal forelimb function are needed. Although there are several behavioral assays that are sensitive to different aspects of forelimb recovery in experimental models of cervical SCI (Girgis et al. , 2007, Gensel et al. , 2006, Ballerman et al. , 2001, Metz and Whishaw, 2000, Bertelli and Mira, 1993, Montoya et al. , 1991, Whishaw and Pellis, 1990), few techniques provide detailed information on the recovery of fine motor control and digit movement. The current measurement technique, the Irvine, Beatties and Bresnahan forelimb scale (IBB), can detect recovery of both proximal and distal forelimb function including digit movements during a naturally occurring behavior that does not require extensive training or deprivation to enhance motivation. The IBB was generated by observing recovery after a unilateral C6 SCI, and involves video recording of animals eating two differently shaped cereals (spherical and doughnut) of a consistent size. These videos were then used to assess features of forelimb use, such as joint position, object support, digit movement and grasping technique. The IBB, like other forelimb behavioral tasks, shows a consistent pattern of recovery that is sensitive to injury severity. Furthermore, the IBB scale could be used to assess recovery following other types of injury that impact normal forelimb function. Neuroscience, Issue 46, spinal cord injury, recovery of function, forelimb function, neurological test, cervical injuries The 5-Choice Serial Reaction Time Task: A Task of Attention and Impulse Control for Rodents Institutions: Oberlin College. This protocol describes the 5-choice serial reaction time task, which is an operant based task used to study attention and impulse control in rodents. Test day challenges, modifications to the standard task, can be used to systematically tax the neural systems controlling either attention or impulse control. Importantly, these challenges have consistent effects on behavior across laboratories in intact animals and can reveal either enhancements or deficits in cognitive function that are not apparent when rats are only tested on the standard task. The variety of behavioral measures that are collected can be used to determine if other factors (i.e ., sedation, motivation deficits, locomotor impairments) are contributing to changes in performance. The versatility of the 5CSRTT is further enhanced because it is amenable to combination with pharmacological, molecular, and genetic techniques. Neuroscience, Issue 90, attention, impulse control, neuroscience, cognition, rodent Using the Threat Probability Task to Assess Anxiety and Fear During Uncertain and Certain Threat Institutions: University of Wisconsin-Madison. Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e. , “startle probes”). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g. , neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g ., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. Behavior, Issue 91, Startle; electromyography; shock; addiction; uncertainty; fear; anxiety; humans; psychophysiology; translational Inchworming: A Novel Motor Stereotypy in the BTBR T+ Itpr3tf/J Mouse Model of Autism Institutions: University of Calgary Faculty of Medicine, Trinity College. Autism Spectrum Disorder (ASD) is a behaviorally defined neurodevelopmental disorder characterized by decreased reciprocal social interaction, abnormal communication, and repetitive behaviors with restricted interest. As diagnosis is based on clinical criteria, any potentially relevant rodent models of this heterogeneous disorder should ideally recapitulate these diverse behavioral traits. The BTBR T+ Itpr3tf /J (BTBR) mouse is an established animal model of ASD, displaying repetitive behaviors such as increased grooming, as well as cognitive inflexibility. With respect to social interaction and interest, the juvenile play test has been employed in multiple rodent models of ASD. Here, we show that when BTBR mice are tested in a juvenile social interaction enclosure containing sawdust bedding, they display a repetitive synchronous digging motion. This repetitive motor behavior, referred to as "inchworming," was named because of the stereotypic nature of the movements exhibited by the mice while moving horizontally across the floor. Inchworming mice must use their fore- and hind-limbs in synchrony to displace the bedding, performing a minimum of one inward and one outward motion. Although both BTBR and C56BL/6J (B6) mice exhibit this behavior, BTBR mice demonstrate a significantly higher duration and frequency of inchworming and a decreased latency to initiate inchworming when placed in a bedded enclosure. We conclude that this newly described behavior provides a measure of a repetitive motor stereotypy that can be easily measured in animal models of ASD. Behavior, Issue 89, mice, inbred C57BL, social behavior, animal models, autism, BTBR, motor stereotypy, repetitive Intra-Operative Behavioral Tasks in Awake Humans Undergoing Deep Brain Stimulation Surgery Institutions: Harvard Medical School, Massachusetts General Hospital. Deep brain stimulation (DBS) is a surgical procedure that directs chronic, high frequency electrical stimulation to specific targets in the brain through implanted electrodes. Deep brain stimulation was first implemented as a therapeutic modality by Benabid et al. in the late 1980s, when he used this technique to stimulate the ventral intermediate nucleus of the thalamus for the treatment of tremor 1 . Currently, the procedure is used to treat patients who fail to respond adequately to medical management for diseases such as Parkinson's, dystonia, and essential tremor. The efficacy of this procedure for the treatment of Parkinson's disease has been demonstrated in well-powered, randomized controlled trials 2 . Presently, the U.S. Food and Drug Administration has approved DBS as a treatment for patients with medically refractory essential tremor, Parkinson's disease, and dystonia. Additionally, DBS is currently being evaluated for the treatment of other psychiatric and neurological disorders, such as obsessive compulsive disorder, major depressive disorder, and epilepsy. DBS has not only been shown to help people by improving their quality of life, it also provides researchers with the unique opportunity to study and understand the human brain. Microelectrode recordings are routinely performed during DBS surgery in order to enhance the precision of anatomical targeting. Firing patterns of individual neurons can therefore be recorded while the subject performs a behavioral task. Early studies using these data focused on descriptive aspects, including firing and burst rates, and frequency modulation 3 . More recent studies have focused on cognitive aspects of behavior in relation to neuronal activity 4,5 . This article will provide a description of the intra-operative methods used to perform behavioral tasks and record neuronal data with awake patients during DBS cases. Our exposition of the process of acquiring electrophysiological data will illuminate the current scope and limitations of intra-operative human experiments. Medicine, Issue 47, Intra-Operative Physiology, Cognitive Neuroscience, Behavioral Neuroscience, Subthalamic Nucleus, Single-Unit Activity, Parkinson Disease, Deep Brain Stimulation Methods to Quantify Pharmacologically Induced Alterations in Motor Function in Human Incomplete SCI Institutions: Rehabilitation Institute of Chicago, University of Illinois at Chicago, University of Illinois at Chicago. Spinal cord injury (SCI) is a debilitating disorder, which produces profound deficits in volitional motor control. Following medical stabilization, recovery from SCI typically involves long term rehabilitation. While recovery of walking ability is a primary goal in many patients early after injury, those with a motor incomplete SCI, indicating partial preservation of volitional control, may have the sufficient residual descending pathways necessary to attain this goal. However, despite physical interventions, motor impairments including weakness, and the manifestation of abnormal involuntary reflex activity, called spasticity or spasms, are thought to contribute to reduced walking recovery. Doctrinaire thought suggests that remediation of this abnormal motor reflexes associated with SCI will produce functional benefits to the patient. For example, physicians and therapists will provide specific pharmacological or physical interventions directed towards reducing spasticity or spasms, although there continues to be little empirical data suggesting that these strategies improve walking ability. In the past few decades, accumulating data has suggested that specific neuromodulatory agents, including agents which mimic or facilitate the actions of the monoamines, including serotonin (5HT) and norepinephrine (NE), can initiate or augment walking behaviors in animal models of SCI. Interestingly, many of these agents, particularly 5HTergic agonists, can markedly increase spinal excitability, which in turn also increases reflex activity in these animals. Counterintuitive to traditional theories of recovery following human SCI, the empirical evidence from basic science experiments suggest that this reflex hyper excitability and generation of locomotor behaviors are driven in parallel by neuromodulatory inputs (5HT) and may be necessary for functional recovery following SCI. The application of this novel concept derived from basic scientific studies to promote recovery following human SCI would appear to be seamless, although the direct translation of the findings can be extremely challenging. Specifically, in the animal models, an implanted catheter facilitates delivery of very specific 5HT agonist compounds directly onto the spinal circuitry. The translation of this technique to humans is hindered by the lack of specific surgical techniques or available pharmacological agents directed towards 5HT receptor subtypes that are safe and effective for human clinical trials. However, oral administration of commonly available 5HTergic agents, such as selective serotonin reuptake inhibitors (SSRIs), may be a viable option to increase central 5HT concentrations in order to facilitate walking recovery in humans. Systematic quantification of how these SSRIs modulate human motor behaviors following SCI, with a specific focus on strength, reflexes, and the recovery of walking ability, are missing. This video demonstration is a progressive attempt to systematically and quantitatively assess the modulation of reflex activity, volitional strength and ambulation following the acute oral administration of an SSRI in human SCI. Agents are applied on single days to assess the immediate effects on motor function in this patient population, with long-term studies involving repeated drug administration combined with intensive physical interventions. Medicine, Issue 50, spinal cord injury, spasticity, locomotion, strength, vector coding, biomechanics, reflex, serotonin, human, electromyography Perceptual and Category Processing of the Uncanny Valley Hypothesis' Dimension of Human Likeness: Some Methodological Issues Institutions: University of Zurich. Mori's Uncanny Valley Hypothesis1,2 proposes that the perception of humanlike characters such as robots and, by extension, avatars (computer-generated characters) can evoke negative or positive affect (valence) depending on the object's degree of visual and behavioral realism along a dimension of human likeness ) (Figure 1 ). But studies of affective valence of subjective responses to variously realistic non-human characters have produced inconsistent findings 3, 4, 5, 6 . One of a number of reasons for this is that human likeness is not perceived as the hypothesis assumes. While the DHL can be defined following Mori's description as a smooth linear change in the degree of physical humanlike similarity, subjective perception of objects along the DHL can be understood in terms of the psychological effects of categorical perception (CP) 7 . Further behavioral and neuroimaging investigations of category processing and CP along the DHL and of the potential influence of the dimension's underlying category structure on affective experience are needed. This protocol therefore focuses on the DHL and allows examination of CP. Based on the protocol presented in the video as an example, issues surrounding the methodology in the protocol and the use in "uncanny" research of stimuli drawn from morph continua to represent the DHL are discussed in the article that accompanies the video. The use of neuroimaging and morph stimuli to represent the DHL in order to disentangle brain regions neurally responsive to physical human-like similarity from those responsive to category change and category processing is briefly illustrated. Behavior, Issue 76, Neuroscience, Neurobiology, Molecular Biology, Psychology, Neuropsychology, uncanny valley, functional magnetic resonance imaging, fMRI, categorical perception, virtual reality, avatar, human likeness, Mori, uncanny valley hypothesis, perception, magnetic resonance imaging, MRI, imaging, clinical techniques A Proboscis Extension Response Protocol for Investigating Behavioral Plasticity in Insects: Application to Basic, Biomedical, and Agricultural Research Institutions: Arizona State University. Insects modify their responses to stimuli through experience of associating those stimuli with events important for survival (e.g. , food, mates, threats). There are several behavioral mechanisms through which an insect learns salient associations and relates them to these events. It is important to understand this behavioral plasticity for programs aimed toward assisting insects that are beneficial for agriculture. This understanding can also be used for discovering solutions to biomedical and agricultural problems created by insects that act as disease vectors and pests. The Proboscis Extension Response (PER) conditioning protocol was developed for honey bees (Apis mellifera ) over 50 years ago to study how they perceive and learn about floral odors, which signal the nectar and pollen resources a colony needs for survival. The PER procedure provides a robust and easy-to-employ framework for studying several different ecologically relevant mechanisms of behavioral plasticity. It is easily adaptable for use with several other insect species and other behavioral reflexes. These protocols can be readily employed in conjunction with various means for monitoring neural activity in the CNS via electrophysiology or bioimaging, or for manipulating targeted neuromodulatory pathways. It is a robust assay for rapidly detecting sub-lethal effects on behavior caused by environmental stressors, toxins or pesticides. We show how the PER protocol is straightforward to implement using two procedures. One is suitable as a laboratory exercise for students or for quick assays of the effect of an experimental treatment. The other provides more thorough control of variables, which is important for studies of behavioral conditioning. We show how several measures for the behavioral response ranging from binary yes/no to more continuous variable like latency and duration of proboscis extension can be used to test hypotheses. And, we discuss some pitfalls that researchers commonly encounter when they use the procedure for the first time. Neuroscience, Issue 91, PER, conditioning, honey bee, olfaction, olfactory processing, learning, memory, toxin assay The Structure of Skilled Forelimb Reaching in the Rat: A Movement Rating Scale Institutions: University of Lethbridge. Skilled reaching for food is an evolutionary ancient act and is displayed by many animal species, including those in the sister clades of rodents and primates. The video describes a test situation that allows filming of repeated acts of reaching for food by the rat that has been mildly food deprived. A rat is trained to reach through a slot in a holding box for food pellet that it grasps and then places in its mouth for eating. Reaching is accomplished in the main by proximally driven movements of the limb but distal limb movements are used for pronating the paw, grasping the food, and releasing the food into the mouth. Each reach is divided into at least 10 movements of the forelimb and the reaching act is facilitated by postural adjustments. Each of the movements is described and examples of the movements are given from a number of viewing perspectives. By rating each movement element on a 3-point scale, the reach can be quantified. A number of studies have demonstrated that the movement elements are altered by motor system damage, including damage to the motor cortex, basal ganglia, brainstem, and spinal cord. The movements are also altered in neurological conditions that can be modeled in the rat, including Parkinson's disease and Huntington's disease. Thus, the rating scale is useful for quantifying motor impairments and the effectiveness of neural restoration and rehabilitation. Because the reaching act for the rat is very similar to that displayed by humans and nonhuman primates, the scale can be used for comparative purposes. from a number of viewing perspectives. By rating each movement element on a 3-point scale, the reach can be quantified. A number of studies have demonstrated that the movement elements are altered by motor system damage, including damage to the motor cortex, basal ganglia, brainstem, and spinal cord. The movements are also altered in neurological conditions that can be modeled in the rat, including Parkinson's disease and Huntington's disease. Thus, the rating scale is useful for quantifying motor impairments and the effectiveness of neural restoration and rehabilitation. Experiments on animals were performed in accordance with the guidelines and regulations set forth by the University of Lethbridge Animal Care Committee in accordance with the regulations of the Canadian Council on Animal Care. Neuroscience, Issue 18, rat skilled reaching, rat reaching scale, rat, rat movement element rating scale, reaching elements Morris Water Maze Experiment Institutions: Michigan State University (MSU). The Morris water maze is widely used to study spatial memory and learning. Animals are placed in a pool of water that is colored opaque with powdered non-fat milk or non-toxic tempera paint, where they must swim to a hidden escape platform. Because they are in opaque water, the animals cannot see the platform, and cannot rely on scent to find the escape route. Instead, they must rely on external/extra-maze cues. As the animals become more familiar with the task, they are able to find the platform more quickly. Developed by Richard G. Morris in 1984, this paradigm has become one of the "gold standards" of behavioral neuroscience. Behavior, Issue 19, Declarative, Hippocampus, Memory, Procedural, Rodent, Spatial Learning Brain Imaging Investigation of the Memory-Enhancing Effect of Emotion Institutions: University of Alberta, University of Illinois, Urbana-Champaign, Duke University, University of Illinois, Urbana-Champaign. Emotional events tend to be better remembered than non-emotional events1,2 . One goal of cognitive and affective neuroscientists is to understand the neural mechanisms underlying this enhancing effect of emotion on memory. A method that has proven particularly influential in the investigation of the memory-enhancing effect of emotion is the so-called subsequent memory paradigm (SMP). This method was originally used to investigate the neural correlates of non-emotional memories3 , and more recently we and others also applied it successfully to studies of emotional memory (reviewed in4, 5-7 Here, we describe a protocol that allows investigation of the neural correlates of the memory-enhancing effect of emotion using the SMP in conjunction with event-related functional magnetic resonance imaging (fMRI). An important feature of the SMP is that it allows separation of brain activity specifically associated with memory from more general activity associated with perception. Moreover, in the context of investigating the impact of emotional stimuli, SMP allows identification of brain regions whose activity is susceptible to emotional modulation of both general/perceptual and memory-specific processing. This protocol can be used in healthy subjects8-15 , as well as in clinical patients where there are alterations in the neural correlates of emotion perception and biases in remembering emotional events, such as those suffering from depression and post-traumatic stress disorder (PTSD)16, 17 Neuroscience, Issue 51, Affect, Recognition, Recollection, Dm Effect, Neuroimaging Real-time fMRI Biofeedback Targeting the Orbitofrontal Cortex for Contamination Anxiety Institutions: Yale University School of Medicine , Yale University School of Medicine , Yale University School of Medicine , Yale University School of Medicine . We present a method for training subjects to control activity in a region of their orbitofrontal cortex associated with contamination anxiety using biofeedback of real-time functional magnetic resonance imaging (rt-fMRI) data. Increased activity of this region is seen in relationship with contamination anxiety both in control subjects1 and in individuals with obsessive-compulsive disorder (OCD),2 a relatively common and often debilitating psychiatric disorder involving contamination anxiety. Although many brain regions have been implicated in OCD, abnormality in the orbitofrontal cortex (OFC) is one of the most consistent findings.3, 4 Furthermore, hyperactivity in the OFC has been found to correlate with OCD symptom severity5 and decreases in hyperactivity in this region have been reported to correlate with decreased symptom severity.6 Therefore, the ability to control this brain area may translate into clinical improvements in obsessive-compulsive symptoms including contamination anxiety. Biofeedback of rt-fMRI data is a new technique in which the temporal pattern of activity in a specific region (or associated with a specific distributed pattern of brain activity) in a subject's brain is provided as a feedback signal to the subject. Recent reports indicate that people are able to develop control over the activity of specific brain areas when provided with rt-fMRI biofeedback.7-12 In particular, several studies using this technique to target brain areas involved in emotion processing have reported success in training subjects to control these regions.13-18 In several cases, rt-fMRI biofeedback training has been reported to induce cognitive, emotional, or clinical changes in subjects.8, 9, 13, 19 Here we illustrate this technique as applied to the treatment of contamination anxiety in healthy subjects. This biofeedback intervention will be a valuable basic research tool: it allows researchers to perturb brain function, measure the resulting changes in brain dynamics and relate those to changes in contamination anxiety or other behavioral measures. In addition, the establishment of this method serves as a first step towards the investigation of fMRI-based biofeedback as a therapeutic intervention for OCD. Given that approximately a quarter of patients with OCD receive little benefit from the currently available forms of treatment,20-22 and that those who do benefit rarely recover completely, new approaches for treating this population are urgently needed. Medicine, Issue 59, Real-time fMRI, rt-fMRI, neurofeedback, biofeedback, orbitofrontal cortex, OFC, obsessive-compulsive disorder, OCD, contamination anxiety, resting connectivity Brain Imaging Investigation of the Impairing Effect of Emotion on Cognition Institutions: University of Alberta, University of Alberta, University of Illinois, Duke University , Duke University , VA Medical Center, Yale University, University of Illinois, University of Illinois. Emotions can impact cognition by exerting both enhancing (e.g., better memory for emotional events) and impairing (e.g., increased emotional distractibility) effects (reviewed in 1 ). Complementing our recent protocol 2 describing a method that allows investigation of the neural correlates of the memory-enhancing effect of emotion (see also 1, 3-5 ), here we present a protocol that allows investigation of the neural correlates of the detrimental impact of emotion on cognition. The main feature of this method is that it allows identification of reciprocal modulations between activity in a ventral neural system, involved in 'hot' emotion processing (HotEmo system), and a dorsal system, involved in higher-level 'cold' cognitive/executive processing (ColdEx system), which are linked to cognitive performance and to individual variations in behavior (reviewed in 1 ). Since its initial introduction 6 , this design has proven particularly versatile and influential in the elucidation of various aspects concerning the neural correlates of the detrimental impact of emotional distraction on cognition, with a focus on working memory (WM), and of coping with such distraction 7,11 , in both healthy 8-11 and clinical participants 12-14 Neuroscience, Issue 60, Emotion-Cognition Interaction, Cognitive/Emotional Interference, Task-Irrelevant Distraction, Neuroimaging, fMRI, MRI
<urn:uuid:86177cf9-0f3c-4d48-8fdf-31f325c932ca>
CC-MAIN-2016-44
http://www.jove.com/visualize/abstract/21966460/manifestation-incompleteness-obsessive-compulsive-disorder-ocd-as
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721405.66/warc/CC-MAIN-20161020183841-00312-ip-10-171-6-4.ec2.internal.warc.gz
en
0.919046
9,505
2.90625
3
TED is a nonprofit devoted to Ideas Worth Spreading. On this feed, you'll find TEDTalks video to inspire, intrigue and stir the imagination from some of the world's leading thinkers and doers, speaking from the stage at TED conferences, TEDx events and partner events around the world. This podcast is also available in high-def video and audio-only formats. November 24th, 2014 Episode 146 of 716 episodes "The greatest and most endangered species in the Amazon rainforest is not the jaguar or the harpy eagle," says Mark Plotkin, "It's the isolated and uncontacted tribes." In an energetic and sobering talk, the ethnobotanist brings us into the world of the forest's indigenous tribes and the incredible medicinal plants that their shamans use to heal. He outlines the challenges and perils that are endangering them — and their wisdom — and urges us to protect this irreplaceable repository of knowledge.
<urn:uuid:7a72d2a4-afbf-4756-ae2d-d2794b86702e>
CC-MAIN-2017-04
http://www.podcastchart.com/podcasts/tedtalks-audio/episodes/mark-plotkin-what-the-people-of-the-amazon-know-that-you-don-t
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00301-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930489
197
1.976563
2
Student record means any item of information directly related to an identifiable student, other than directory information, which is maintained by a community college whether recorded by handwriting, print, tapes, film, microfilm, or any other means. Student record does not include: Directory information may include one or more of the following items: student’s name, address, telephone number, date and place of birth, major field of study, e-mail address, photograph, participation in officially recognized activities and sports, weight and height of members of athletic teams, dates of attendance, degrees and awards received, the most recent previous public or private school attended by the student, and any other information authorized in writing by the student. The Office of Admissions and Records of the colleges are the designated keepers of student records. Those offices shall not release any information from the official student records (other than directory information) to any outside person or group unless the student provides a signed and dated release or a legally valid subpoena is received except that access may be permitted to: The Directors of Admissions and Records of the colleges may authorize the release of directory information about students who have authorized the release of that information to legitimate educational institutions, governmental agencies, firms that perform contracted work on behalf of the college or district, and other agencies that have legitimate need for this information upon receipt of a formal request on official letterhead from the organization making the request. If a student does not want this information released, the student must check the privacy requested boxes on the online admissions form or the update form. June 11, 2014
<urn:uuid:8509e35d-8983-4dcd-8a02-c34913727ca2>
CC-MAIN-2017-04
https://www.portervillecollege.edu/academics/student-records
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00218-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936736
322
2.25
2
- Portugal’s solar energy auction has received a very positive response from domestic and international players - According to Reuters, against the original capacity of 1.4 GW the government has received interest for over 10 GW of solar under the auction - 64 companies, mostly international, will compete with each other to secure their place in Portugal’s solar market - The government is looking at announcing final winners around August 10, 2019 More than 10 GW of new capacity has been offered by companies interested in the development of solar power projects in Portugal during the country’s solar energy auction. Tha means the auction was oversubscribed by a factor 7. The original capacity offering went through several changes from 1.7 GW to finally 1.4 GW. Earlier in June 2019, the government said it received interest from about 300 investors and decided to extend the deadline for the mega auction to July 7, reported Reuters. Portugal finally had 64 companies competing to win a share of the pie. As the Environment and Energy Transition Minister Joao Pedro Matos Fernandes said investors had offered over 10 GW of new capacity. Most of the interested investors are foreign companies. The final winners will be announced on August 10, 2019. “Out of 24 locations to install solar panels, only one found no bids, and one had an instant winner, while 22 licenses will require auctions where bidders offering the largest discount off the energy tariff will win,” Reuters reported. The government expects an investment of up to €1 billion ($1.12 billion).
<urn:uuid:0c79a970-c850-4271-bb81-0b58f642fa27>
CC-MAIN-2022-33
https://taiyangnews.info/markets/portugals-solar-auction-heavily-oversubscribed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00671.warc.gz
en
0.973893
318
1.53125
2
The AutoCAD folks at Autodesk are trying to understand how AutoCAD users work in a connected, cloud enabled and mobile world - and they'd like your help! (yes, You!) You just need a camera phone or digital camera and a computer to participate in the Oz Photo Hunt. Yes Dorothy, we’re not in Kansas anymore. There are incredible new possibilities for AutoCAD and Autodesk in general. And Autodesk wants your input into what this new territory might look like! So what do they need from you? Take photos of the following list of items, and write a short caption describing each. These images can be both figurative and literal, and might include screenshots as well as photos that you take yourself. YOU CAN TAKE AS MANY OR AS FEW PICTURES AS YOU LIKE, DRAWING FROM THE LIST BELOW. 2. Your “main workspace(s)” (i.e. the place where most of your work is done) 3. Any other places where you do your work (1-3 pictures) 4. Something that makes your job easier 5. The thing you would most like to delegate 6. Your favorite mobile applications, websites, or software/technology (1-3 pictures) 7. How your favorite mobile applications, websites, or software/technology make you feel 8. How you see AutoCAD CURRENTLY within the context of a connected world 9. How you would like to see AutoCAD in the FUTURE, within the context of a connected world How do you submit photos? Add email@example.com on Facebook, and post your pictures on the wall (along with a short caption). If you prefer, you can also email them directly to firstname.lastname@example.org How will this be used? Your input will impact our strategy for AutoCAD in a connected world, and will be used only for research purposes. What’s in it for you? EACH photo you submit will count as ONE entry into a raffle. Prizes will include two $100 Amazon giftcards. If you live outside of the U.S., you may select an online vendor of your choice for the giftcard. What’s the deadline? All photos must be submitted by Friday, August 19 (so hurry!) How do you get started? Click on the link below to start the short survey and you'll find more detailed instructions at the end of the survey.
<urn:uuid:d243599f-329f-4b4f-a815-fbddb1672912>
CC-MAIN-2017-04
http://lynn.blogs.com/lynn_allens_blog/2011/08/the-autocad-oz-photo-hunt-were-not-in-kansas-anymore.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00083-ip-10-171-10-70.ec2.internal.warc.gz
en
0.896878
530
1.625
2
This ongoing prospective randomized controlled study is evaluating pregnancy rates and successful long-term pregnancies in 400 women treated with CRINONE 8% progesterone vaginal gel versus compounded progesterone intramuscular injections. The study is being conducted by the Brigham and Women's Hospital in Boston. The interim analysis compared pregnancy rates and patient preferences among 215 patients who had completed 20 weeks of pregnancy. Patients were randomized to receive CRINONE 8% (n = 105) or IMP (n = 110). Pregnancy rates, implantation rates, and early spontaneous abortion rates were similar in both arms of the study, whereas fewer side effects and greater overall satisfaction were reported by women receiving CRINONE 8%. "The fact that CRINONE 8% delivers the progesterone needed to achieve and maintain pregnancy has been widely established in numerous clinical studies. This study by Brigham and Women's Hospital is also evaluating patient satisfaction, which is increasingly important given the trend toward patients taking a more active role in deciding their treatment regimens," stated Robert S. Mills, president and chief executive officer of Columbia Laboratories. "The interim analysis shows women receiving CRINONE 8% reported fewer side effects and greater overall satisfaction versus women receiving IMP. This comes as no surprise, considering their differences. The IMP is administered as a deep intra-muscular injection, with injection site pain and potential irritation and infection. CRINONE 8% bioadhesive vaginal gel is self-administered at home once a day using a convenient, patient-friendly, pre-filled applicator." The full in-press article is available for purchase at http://www.fertstert.org/article/PIIS0015028207005407/abstract and will soon appear in the print version. About Fertility and Sterility Fertility and Sterility, known as "the red journal," publishes juried original articles of scientific excellence in clinical and laboratory research relevant to reproductive endocrinology, physiology, immunology, genetics and menopause. Citation analysis indicates that it is among the most frequently referenced scientific journals and has the highest immediacy and impact factors in the field of reproductive medicine. The journal is an indispensable resource to reproductive endocrinologists, obstetricians, gynecologists, urologists, and basic scientists who treat and investigate the problems of fertility, sterility and the physiology of reproduction. About Columbia Laboratories Columbia Laboratories, Inc. is a is a specialty pharmaceutical company focused on developing and marketing products for the women's healthcare and endocrinology markets using its novel bioadhesive drug delivery technology. Columbia markets CRINONE(R) 8% (progesterone gel) and PROCHIEVE(R) 8% (progesterone gel) in the United States for progesterone supplementation as part of an Assisted Reproductive Technology treatment for infertile women with progesterone deficiency and PROCHIEVE 4% (progesterone gel) for the treatment of secondary amenorrhea. The Company also markets STRIANT(R) (testosterone buccal system) for the treatment of hypogonadism in men. The Company's research and development programs include a vaginally-administered lidocaine product to prevent and treat dysmenorrhea. For more information, please visit www.columbialabs.com. Safe Harbor Statement Under the Private Securities Litigation Reform Act of 1995: Th is press release contains forward-looking statements about Columbia Laboratories, Inc.'s expectations regarding the Company's strategic direction, prospects and future results, and clinical research programs, which statements are indicated by the words "will," "plan," "expect" and similar expressions. Such forward-looking statements are subject to certain risks and uncertainties; actual results may differ materially from those projected in the forward-looking statements. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date on which they are made. Factors that might cause future results to differ include, but are not limited to, the following: the successful marketing of CRINONE(R) 8% (progesterone gel), PROCHIEVE(R) 8% (progesterone gel), PROCHIEVE 4% (progesterone gel), and STRIANT(R) (testosterone buccal system) in the U.S.; the timely and successful development of new products, including determining the clinical and regulatory path for possible development of PROCHIEVE 8% for the prevention of preterm birth; the timely and successful completion of clinical studies, including the clinical studies for our vaginally-administered lidocaine product candidate; success in obtaining acceptance and approval of new products and new indications for current products by the FDA and international regulatory agencies, the impact of competitive products and pricing; competitive economic and regulatory factors in the pharmaceutical and healthcare industry; general economic conditions; and other risks and uncertainties that may be detailed, from time-to-time, in Columbia's reports filed with the Securities and Exchange Commission. Columbia Laboratories undertakes no obligation to publicly update any forward-looking statements. CRINONE(R), PROCHIEVE(R) and STRIANT(R) are registered trademarks of Columbia Laboratories, Inc. Columbia Laboratories, Inc. James A. Meer, 973-486-8860 Senior Vice President, CFO & Treasurer Rx Communications Group, LLC Melody A. Carey, 917-322-2571
<urn:uuid:d8af0a43-9735-41ea-abcc-b7337573dd54>
CC-MAIN-2017-04
http://www.bio-medicine.org/medicine-technology/Interim-Analysis-of-Crinone-Pregnancy-Study-to-Be-Published-in-0AAmerican-Society-for-Reproductive-Medicine-Journal-220-1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00124-ip-10-171-10-70.ec2.internal.warc.gz
en
0.918856
1,132
1.84375
2
Controlling Energy Use at Argonne National Laboratory One of the U.S. Dept. of Energy’s largest science and engineering research laboratories is equipping its facilities with intelligent energy management technology to help control energy-related costs and improve reliability. Based near Chicago and operated by the University of Chicago, Argonne National Lab conducts a range of scientific research in the physical, life and environmental sciences. Argonne is dedicated to developing and evaluating advanced energy technologies to enhance the nation’s energy resources, support national security and help solve environmental challenges. To improve the efficiency and reliability of its extensive research facilities, Argonne has equipped its 1,500-acre complex with an enterprise energy management (EEM) system from Power Measurement of Victoria, Canada. The EEM system uses a network of advanced energy meters installed at all power substations, mains and feeders to monitor the electricity supplied to Argonne’s highly specialized research facilities, such as the Advanced Photon Source (APS) and the Argonne Tandem Linac Accelerator System (ATLAS). Meters collect data on power quality, energy consumption and breaker status throughout the distribution system, and provide the information to a centrally located workstation equipped with energy management software. From this web-enabled interface, Argonne’s Plant Facilities and Services Division and its Utility Systems Department continuously track energy usage by facility, and can quickly identify any potentially disruptive power-quality conditions that, if left unchecked, could otherwise result in equipment damage, downtime and costly interruptions to power-sensitive research projects. With this framework in place, Argonne next plans to further enhance the facility’s operational effectiveness by using the new system to allocate costs by process.
<urn:uuid:cf8bba0c-31fa-4730-922a-c5379a80ba87>
CC-MAIN-2017-04
http://www.csemag.com/single-article/controlling-energy-use-at-argonne-national-laboratory/4128ad7fe747c8050d94a96123617b31.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00061-ip-10-171-10-70.ec2.internal.warc.gz
en
0.915761
351
2.75
3
Does Apple really need to keep maintaining two separate operating systems (OS), one for mobile devices such iPhones and iPads, and the other for notebook and desktop computers? Will Apple merge iOS with Mac OS X instead? That’s what some developers are wondering right now. “It doesn’t make sense for [Apple] to be developing two of everything, one good, one not as good — two calendars, two address books,” said Panic‘s Cabel Sasser during a chat session sponsored by Ars Technica. Too Early to Merge the two OSs? Maybe, but for quite some time, reasoned John Tudor, a Perl programmer and former Apple marketing exec. In a separate blog post in Mac Observer, Tudor pointed out that sales of Apples’ Macs and mobile devices are both on the rise. “With an estimated 60 million active Macs on the planet and 50 percent of all new customers coming from Windows, a merger doesn’t make sense any time soon,” according to Tudor, who linked his blog to a write-up of the Ars Technica chat session for more more perspectives on the issue. Loren Brichter of Atebits concurred that the Mac still has plenty of time remaining. “Mac in the awesome old grandma, whose kids (iPhone & iPad) have left home,” said Brichter. “Not dead; not really dying. But it’s our job to keep her comfortable until she’s gone.” Although iOS is derived from the ten-year-old Mac OS X, Apple’s mobile operating system been stripped of many of the APIs (applications programming interfaces) and functions of the older OS. At the same time, iOS now has capabilities that OS X lacks. Yet some of these features wouldn’t necessarily that useful inside Mac OS X, Tudor observed. Desktop users might strain their arms and necks trying to handle multi-touch on a 27-inch display screen, he illustrated. Technical Aspects Only Part of the Problem The panel of developers in the Ars Technica chat session agreed unanimously that iOS will eventually subsume OS X. Mekentosh’s Alexander Griekspoor predicted that consumers will buy iPads instead of MacBooks. “Unless the pro segment will remain [on Mac OS X] — they need the accuracy of a mouse,” he said. In his blog, Tudor maintained that it wouldn’t really be that hard for Apple to add features from iOS to Mac OS X, or to restore functionalities to the mobile OS that have been stripped out. However, “the technical aspects of merging the two OS are only part of the problem,” according to Tudor. “There are just too many professional and technical UNIX users out there who love Macs to do anything that would upset them. A premature push into a merger, even if technically possible, has UI (user interface) implications that many customers just don’t want to deal with. Maybe it’s better to let time, technology, and the sales of iOS devices naturally lead the way rather than trying to force the issue,” he said. Although some have suggested running Mac OS X apps inside iOS until OS X fades away, Tudor rejected this notion on the grounds that iOS might not contain all the APIs and processes needed to support the OS X apps. As one possible alternative for co-existence between Apple’s two OS, Tudor raised the idea of developing technologies that would allow both OSes to run on the same piece of hardware in dual-bootable fashion.
<urn:uuid:1fde37d1-caa7-4c54-83f4-9876f36d9445>
CC-MAIN-2017-04
http://www.brighthand.com/news/will-apples-ios-and-mac-os-x-remain-separate/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00143-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941944
763
2
2
Atelier João Turin The proposal is clear: to put “João Turin” into history, an innovative idea due to the context that surrounds it. It is the first time that an audacious process begins “from end to end”, from the purchase of an estate, through its inventory, registration, restoration, cataloguing, historical survey, book production, photography, casting, until it reaches national and international exhibitions. But the entire process would not be possible if we had not an artistic foundry prepared and able to cast these works. Launched the challenge, we began an extensive search of equipment and human resources to move the project on; we have exchanged information about the use of new materials to improve the casting of our pieces, while using the ancient technique of “lost wax”. We have sought technology in several countries, including France, Italy, Belgium and the United States. As a result, we built Brazil’s first technologically correct artistic foundry, fully electric, with low environmental impact and the use of rainwater; reusing 60% of their inputs. A full partnership between Turin and Lago families, combined to pass the legacy of João Turin on to new generations. At the same, to present “Paraná” with its own people. Now we face the results achieved, weeks of relentless work, but the certainty of accomplishment. As said the indigenous “Guaranis” who lived here: “A warrior carries with himself the bones of his ancestors.”
<urn:uuid:ed1b5d5f-a078-46fb-a520-69f92f4742d2>
CC-MAIN-2022-33
https://joaoturin.com.br/en/atelier/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00066.warc.gz
en
0.956584
323
2.03125
2
“The proposal by the transport ministers on rail passenger rights is equivalent to a declaration of bankruptcy,” says Westbahn. “A meaningful submission by the European Parliament was not revised in favour of passengers, but for the benefit of national state-owned railways.” The regulation of rail passenger rights and obligations by the European Parliament and the European Council of transport ministers is currently being recast. “To this end, the European Parliament, in consultation with European passenger representatives, proposed a good solution at the end of 2018,” Westbahn explains. “AllRail, which represents private rail operators, wanted more rights for passengers, but even the more moderate proposal by the European Parliament is now threatened with a noticeable deterioration in the upcoming tri-partite discussions, if the regulation as put forward by the European Council is implemented. Transport ministers in the European Council seem to have less focus on rail customers, but clearly represent the view of the European state railways that they own and whose interests are against significant improvements for passengers.” Westbahn cites some examples of where passenger rights are being compromised. “As certain commuter rail regulations are not mandatory, EU member states can easily exclude frequent travellers from compensation claims and rapid support,” Westbahn says. “There is thus little incentive to provide more than the minimum for these services. “The force majeure clause which exempts operators from compensating passengers for loss is a reward to the state railways for requesting this exemption. The better solution that was originally proposed will now be made worse. “So-called multi-company transit tickets which are based on distribution agreements will be labelled better under the revised regulation. This is clearly too little. For example, if a train is delayed and a passenger misses their connection, the passenger should be able to take the next available train without any bureaucratic obstacles, while the railway companies carry out internal billing in the background. A train journey should be as easy as possible. Minimal compromises do not help anyone.” Lack of simplicity Westbahn also complains that the original requirement for a single platform to be provided in each country to enable passengers to easily find and compare train times and fares for all operators has not been honoured. “Only when the lowest price can be found in one place, without customers having to search several pages, will rail travel be so simple that the CO2 targets will be met,” Westbahn says. “As is often the case, the European Council compromise is a lazy one that does not really position the EU as progressive. Only when kowtowing to the incumbents ends and rail travel is made transparent and easy to book, will we achieve the ambitious goal of making Europe carbon-neutral by 2050. We still hope that in future the Austrian Ministry of Transport will be able to implement a transport and climate policy that really makes travelling by train attractive.”
<urn:uuid:0cf861c5-2801-473a-88a8-08a4414b754e>
CC-MAIN-2022-33
https://www.railjournal.com/policy/westbahn-says-proposed-eu-reforms-favour-incumbents-not-passengers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00077.warc.gz
en
0.955293
607
1.820313
2
Saturday, June 12, 2010 LESSON 76: The Success of Your Hive is Riding On Your Queen Hello from David & Sheri Burns at Long Lane Honey Bee Farms! Is there any better life than that of a beekeeper? I’ve kept bees long enough now and have such a love for bees and beekeeping that I even don’t mind being stung. You can always tell a new beekeeper from a seasoned beekeeper because the new ones tell you how many times they’ve been stung and where. Seasoned beekeepers have lost track and don’t care and know you don’t care to hear about bee stings :) Here at Long Lane Honey Bee Farms we are in full queen production! Queens, queens, queens, everywhere there are queens in all stages. My youngest daughter Karee has work along side of me for 3 year now in our queen rearing operation and she’s a pro! All day long we are grafting, transferring cells, marking mated queens for sale, and dividing hives for more mating nucs. Karee knows the whole operation and is a great grafter too. Our bees help out a bunch with our own garden. Here’s mating nuc number 40 doing double duty. Producing queens and pollinating our gardens. We enjoy garden, chickens, bees and generally living out in the country! We are in our 6th year now in the country and it’s a hoot. GUESS THE PHOTO! Sheri took this picture of everything we made from our own property in these three containers. Anyone know what’s in the jars? The middle one is obvious, so good luck on the other two. You can click on the photo to enlarge it. LESSON 76:The Success of Your Hive is Riding on Your Queen You must keep an eye on your queen and make sure she has a great laying pattern. As we hit middle summer and slide down into fall beekeepers are more likely to kill their queen during super removal, or queens can fail toward fall. Don’t go into winter with an old queen or a missing queen. There are three caste of bees in a hive: 1) The female worker bee, underdeveloped reproductive ability, 2) The male drones who only mate high in the air with virgin queens, then die and 3) The queen. When a hive makes a new queen, they do so from a fertile egg laid by a queen. They feed this young, three day old larva or younger, a special queen royal jelly and build out the queen cell perpendicular to the comb. It looks like a peanut shell. From the time the egg is laid until the queen emerges requires 16 days. Workers take 21 days to emerge and drones 24 days. When the queen emerges she, of course, is a virgin queen or what some call an unmated queen. The queen only mates one time outside the hive. A few days after emerging, she will take her mating flight and fly away from her hive several miles to a drone congregation area (DCA). The DCAs are 40 feet or higher and have been an established meeting place for years. The DCA is a place where hundreds of drones hang out in the afternoon seeking a virgin queen. Virgin queens somehow know where the DCAs are and will mate with 12-20+ drones. She may take several mating flights over the course of a week, but once mated she will never leave her hive again unless the hive decides to swarm. For reproductive swarms, the original, old queen will leave with 60% of the bees and the 40% left behind will be headed up by a new queen. The queen mates with many drones in order to increase the genetic mix in the hive for survival. During mating, the drone’s genitalia (shown in picture) breaks off and is left in the queen and can be seen upon the queen’s return to the hive. This is called the mating sign. However, since she mates with many drones, each drones removes the previous drone’s mating sign and then mates with the queen. The sperm from each drone is stored in the queen’s spermatheca so that she is able to lay fertile eggs for years to come from her initial mating flight. She will never mate again. A poorly mated queen may have stored only a limited amount of sperm and may only lay a very short time and turn into what we call a drone layer, laying only unfertilized eggs which produces drones. It is very important that beekeepers see the value in replacing their queens on a regular basis. Replacing queens especially after June 21 can dramatically increase your hive’s winter survivability. More on queens next time. Mon – Thur 8:30 am – 4 pm Central Time FRI-SAT visits & pickups by appointment only Long Lane Honey Bee Farms 14556 N. 1020 E. Rd Fairmount, IL 61841
<urn:uuid:e93ae842-3149-4038-86c2-c315299a92fc>
CC-MAIN-2017-04
http://basicbeekeeping.blogspot.com/2010/06/lesson-75-dreaded-laying-worker.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00303-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93002
1,035
2.078125
2
Here’s today’s Final Jeopardy (in the category Animals) for Tuesday, August 31, 2021 (Season 37, Game 167): German settlers in Texas called this animal “panzerschwein” (correct response beneath the contestants) |Steve Moulds, a playwright from Louisville, Kentucky |Nibir Sarma, a junior at the University of Minnesota from Eden Prairie, Minnesota |Karen Farrell, a political consultant from Chesapeake, Virginia Andy’s Pregame Thoughts: Season 38 begins September 13 with the return of 18-day champion Matt Amodio; in the interim, Jeopardy! is running four weeks of reruns. The first two weeks were the 10 “Alex Around the World” episodes that ran in his memory in late December; the 2021 Tournament of Champions, hosted by Buzzy Cohen, will air from August 30 through September 10. Today’s episode was the second quarterfinal of the 2021 Tournament of Champions that originally aired on May 18, 2021. PSA: The best way to keep COVID-19 at bay (and keep Jeopardy! producing new episodes) is for everybody to get their vaccinations as soon as they are able to. When wearing a mask, ensure that your mask covers both your nose and your mouth. Are you going on the show and looking for information about how to bet in Final Jeopardy? Check out my new Betting Strategy 101 page! (Content continues below) Correct response: What is the (nine-banded) armadillo? More information about Final Jeopardy: (The following write-up is original content and is copyright 2021 The Jeopardy! Fan. It may not be copied without linked attribution back to this page.) “Panzerschwein” literally transates to “armored pig”, referring to the famed nine-banded armadillo currently found mainly in the Southeastern United States and in Central and South America. The mammals, which were named the state mammal of Texas in the mid-1990s, first entered Texas from Mexico in the 19th century. One thing I found interesting, from Claire McNear’s tournament preview: Cohen also learned perhaps a bit more about his own speech patterns than he would have liked. “There was one thing where I say ‘animals,’” Cohen, who grew up in the Northeast and now lives in Los Angeles, says of a clue. “Sarah was like, ‘You say animals with an accent.’ I asked her how she says it. ‘Animals.’ So then I go into the writers’ room and I’m like, ‘Apparently I say “animals” weird.’ And Michele [Loud, the show’s co–head writer] just looks at me dead in the eye and says, ‘You say the word “and” weird as well.’” I’m guessing that this Final Jeopardy! was the cause for that exchange. Looking to find out who won Jeopardy! today? Tonight’s results are below! Scores going into Final: Steve $2,400 + $2,400 = $4,800 (What is an armadillo?) Nibir $13,200 – $1,001 = $12,199 (What is a coyote?) Karen $14,200 + $2,000 = $16,200 (What is an armadillo?) (Semi-Finalist) Wild card standings: Monday: Ryan Bilger, $32,405 Tuesday: Karen Farrell, $16,200 1. Jason Zuffranieri, $18,800 (99.950% to advance) 2. Nibir Sarma, $12,199 (75.809% to advance) 3. Steve Moulds, $4,800 (1.812% to advance) 4. Sarah Jett Rayburn, $0 (0.020% to advance) Scores after the Jeopardy! Round: Opening break taken after: 15 clues Daily Double locations: 1) IN THE NATIONAL WOMEN’S HALL OF FAME $800 (clue #13) Steve 400 -1000 (Karen 3400 Nibir 4200) 2) “A” MATERIAL $1600 (clue #7) Nibir 7400 +2000 (Karen 9400 Steve 1200) 3) THE DAILY QUINTUPLE $1600 (clue #13, $15200 left on board) Nibir 8600 +1000 (Karen 10600 Steve -800) Overall Daily Double Efficiency for this game: -61 Karen $14,200 Coryat, 16 correct, 1 incorrect, 28.07% in first on buzzer (16/57), 1/1 on rebound attempts (on 5 rebound opportunities) Nibir $13,400 Coryat, 18 correct, 2 incorrect, 31.58% in first on buzzer (18/57), 0/0 on rebound attempts (on 4 rebound opportunities) Steve $3,400 Coryat, 11 correct, 5 incorrect, 24.56% in first on buzzer (14/57), 0/1 on rebound attempts (on 3 rebound opportunities) Combined Coryat Score: $31,000 Lach Trash: $14,600 (on 14 Triple Stumpers) Coryat lost to incorrect responses (less double-correct responses): $8,400 Karen Farrell, career statistics: 227 correct, 25 incorrect 15/19 on rebound attempts (on 49 rebound opportunities) 39.11% in first on buzzer (210/537) 8/13 on Daily Doubles (Net Earned: $6,900) 8/10 in Final Jeopardy Average Coryat: $17,000 Nibir Sarma, career statistics: 113 correct, 20 incorrect 3/3 on rebound attempts (on 14 rebound opportunities) 40.93% in first on buzzer (115/281) 7/10 on Daily Doubles (Net Earned: $24,895) 2/5 in Final Jeopardy Average Coryat: $16,760 Steve Moulds, career statistics: 99 correct, 14 incorrect 6/7 on rebound attempts (on 20 rebound opportunities) 32.98% in first on buzzer (94/285) 4/7 on Daily Doubles (Net Earned: $9,600) 4/5 in Final Jeopardy Average Coryat: $13,400 - Evidence of how strong yesterday’s game was: there were only 5 Triple Stumpers in the entire game yesterday; there were 5 in just the Jeopardy! round today. When commenting, please note that all comments on The Jeopardy! Fan must be in compliance with the Site Comment Policy. If you are going to quote any information from this page or this website, attribution is required.
<urn:uuid:9166759b-89a9-44d5-95e7-aec30ba524f4>
CC-MAIN-2022-33
https://thejeopardyfan.com/2021/08/final-jeopardy-8-31-2021.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00277.warc.gz
en
0.920613
1,600
1.679688
2
At Code Club, we think everyone should have the opportunity to learn to code, no matter who they are or where they come from. James Aslett, International Programme Manager for Code Club, shares the launch of the new Growth Leaders programme, where we are working with other like-minded organisations to make this vision come true. Today, 4 out of 5 countries in the world have at least one active Code Club — in indigenous communities in Australia, favelas in Brazil, isolated parts of northern Canada, and thousands of towns and cities in between. That’s amazing! But we want to grow the Code Club network even more, so we can reach our goal of having a club in every community in the world. This is why we’ve launched a new partnership programme called Growth Leaders so we can collaborate with expert not-for-profit organisations across the globe to bring Code Club to children in their communities. The Growth Leaders programme Over the last six years, we’ve spent a lot of time researching the best way to support and grow Code Clubs. We have packaged up all this experience together with lots of engaging resources, and are offering all this to other not-for-profit organisations for free. In return, we ask that these organisations commit to helping grow the Code Club network, upholding our values, and supporting our volunteers to get started. From Zhejiang to Mexico City The organisation Happy Coding was already teaching robotics to young people in high schools in Zhejiang when the team joined our pilot phase of Growth Leaders. They were looking for a way to reach primary school children, most of whom weren’t receiving any formal coding education. With support from Code Club, in just three months they have been able to set up an amazing 17 Code Clubs in public schools! “I chose Code Club because of its success in many other countries and the opportunity to learn from and interact with non-profits in other countries. Being part of the Growth Leaders network gives me access to great resources that encourage children to code for the first time.” – Xia Tianyan, Founder of Happy Coding For Jacaranda, another organisation in the Growth Leader pilot, Code Club works perfectly alongside changes happening in the education system in Mexico. As well as supporting students in schools, Jacaranda has also facilitated summer courses in a public library in Mexico City, including a popular girls-only course. “The Code Club programme has so far proved to be a great way to get schools, teachers, and students on the road and started and connected with STEAM, making, and twenty-first century learning in a variety of contexts.” – Michael Beckwith, Director of Operations at Jacaranda Could you become a Growth Leader? Our Growth Leaders programme is now open to applications from non-profit organisations around the world! If you are part of an organisation that might be interested, find out more on the Growth Leader page on our website.
<urn:uuid:6eac9773-45b3-4da9-a10d-7dda7ad4ff6a>
CC-MAIN-2022-33
https://blog.codeclub.org/2018/09/26/from-china-to-mexico-and-beyond-code-club-growth-leaders/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00278.warc.gz
en
0.944132
608
1.828125
2
First on why "Madame Le Ferre" may be used: (Wikipedia)"It is normally impolite to address people by their given names unless one is a family member, a friend or a close work colleague of comparable hierarchic importance. One also does not address people by their last name only unless in a work environment. Also, contrary to English or German usage, it is considered impolite to address someone as Monsieur X when talking to that person: a mere Monsieur should be used, Monsieur X being reserved for talking about M. X to another person. When speaking of someone, Monsieur/Madame given name family name, by far the most polite form of address, is generally reserved for the most solemn occasions. (HEY LOOK!!!!!)Monsieur/Madame family name or given name family name is polite and used in normal formal occasions, as well as in the formal quality press (Le Monde, Le Monde Diplomatique, for example). By contrast, in colloquial usage the family names of personalities are used alone. Formally, a married or widowed woman can be called by the given name of her husband (Madame (given name of husband) family name or Madame veuve (given name of husband) family name); this is now slightly out of fashion. In the workplace or in academic establishments, particularly in a male-dominated environment, it is quite common to refer to male employees by their family name only, but to use Madame or Mademoiselle before the names of female employees. and naming practices: Wikipedia: "Since the 1789 Revolution, the law stipulates that "no one may use another name than that given on his birth certificate"; furthermore, the 1946 revision to the Constitution guarantees that "women and men have equal rights", including in the use of their birth name. Upon getting married, a woman keeps her maiden name (nom de jeune fille). She may, under her maiden name, for example, open a bank account, sign cheques, obtain a passport, etc. However, marriage grants a married person the right to assume his or her spouse's last name. It is still a common practice for a woman to use her husband's name in this way, despite the fact that no official due process formalizes this usage. (HEY LOOK!!!!!)The majority of married women use their husband's name for all documents, official or not. The article 264 of the French civil code does, however, stipulate that "upon divorcing both spouses lose the right to use each other's name".
<urn:uuid:a293454e-94ae-4620-a03a-553ad4bfa193>
CC-MAIN-2017-04
http://www.genealogy.com/forum/surnames/topics/ferree/1390/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00303-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945687
539
2.609375
3
Go Spy the Land: Military Intelligence in History For too long military history has ignored the role of intelligence. As a result, many people do not realize that military intelligence has played a significant role in history. However, intelligence gathering, evaluation, and analysis has always been part of war. Lack of knowledge of how intelligence has been utilized in wars makes for an incomplete and inaccurate picture of historical events. While many are aware of such things as the Allied code-breaking efforts in World War II, few know that similar activities were undertaken as early as the beginning of recorded history. By examining a number of case studies from Roman times to the present, Go Spy the Land reveals the essential continuity in military intelligence, the fact that many of the problems involved in military intelligence have remained constant, and the nature of the problems themselves. Specifications of Go Spy the Land: Military Intelligence in History |Number Of Pages||222| Write a review Note: HTML is not translated! Rating: Bad Good Enter the code in the box below:
<urn:uuid:fd34430b-9497-4855-abe8-c55202fb849d>
CC-MAIN-2017-04
http://ergodebooks.com/go-spy-the-land-military-intelligence-in-history-DADAX0275937089
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00512-ip-10-171-10-70.ec2.internal.warc.gz
en
0.91129
211
2.953125
3
Adrian, city (1990 pop. 22,097), seat of Lenawee co., SE Mich., on the Raisin River; inc. 1836. It is a manufacturing and trading center for a fertile farm region. Manufactures include machinery, furniture, transportation equipment, plastics, and adhesives. It is the seat of Adrian College and Siena Heights College. Numerous lakes are in the area. The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. See more Encyclopedia articles on: U.S. Political Geography
<urn:uuid:aa524b13-6e7f-4fb7-ae94-e83b4927968a>
CC-MAIN-2017-04
http://www.infoplease.com/encyclopedia/us/adrian-city-united-states.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00219-ip-10-171-10-70.ec2.internal.warc.gz
en
0.831604
121
1.8125
2
Acid dyes are most suitable for dyeing silk, wool and other protein fibres such as cashmere, fur, camel and some synthetics including nylon. These textile dyes are set using citric acid or distilled vinegar in a hot dyebath, or by using the heat from steam, to make them permanent and washable on fabric, fibres or yarns. Choose from 14g pots of Jacquard Acid dyes in 40 pre-mixed colours, 50g pots of Fibrecrafts Acid dyes which can be mixed to create any colour, H Dupont Classique liquid dyes (popular with silk painters) or explore these dyes with the Fibrecrafts Acid Dye Kit which contains four colours of dye, tools and instructions. The Blog post Dye Recipes using Acid Dyes explains further how to use these dyes. The Fibrecrafts Discharge Acid Dyes and Illuminating Acid dyes offer further exploration and experimentation; the dischargeable acid dyes have a low resistance to bleaching and are easily removed from fabric with a discharge paste while the illuminating dyes have a high resistance to bleaching. You can learn more about how to print with discharge dyes from our Blog post.
<urn:uuid:4ba0a500-0245-42e3-af1f-b76280c6aaa3>
CC-MAIN-2022-33
https://www.georgeweil.com/dyes-and-assistants/acid-dyes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00667.warc.gz
en
0.908075
253
2.265625
2
Whimsical. Magical. Rainbows. There is something captivating about this colorful combination. The Rainbow Maze provides a sensory fine motor stimuli for little ones who appreciate moving their fingers. The repetition of moving the hidden marble through the rainbow hemisphere will delight the fidgety digits of your little ones. This pocket sized rainbow will help your little mover find focus and concentrate on the mindful task of dancing the marble through the rainbow. Each enclosed rainbow is pieced together with six colored strips stitched together and enclosed with white backing. A simple ribbon handle is attached to hang or tote this tactile toy making it easy to grab-and-go.
<urn:uuid:25aaad21-d117-4164-8a3f-aa6294af4b0b>
CC-MAIN-2022-33
https://www.mamamayi.shop/products/the-amazing-rainbow
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00669.warc.gz
en
0.885971
141
1.625
2
There is a new bike plan for Portland, this plan has many layers, with a completion date of 2030, seems to have many hopes for gaining momentum. “Yesterday the Bureau of Transportation released the final version of the Portland Bicycle Plan for 2030. This version reflects many changes – some large, some small – to the public comment draft released back in October. Meanwhile, the Bicycle Transportation Alliance and a new activism group, TransConPDX are gearing up for a final push to raise awareness about the plan before it’s adopted by Portland City Council on February 4th.” –BikePortland.org It will be exciting to see how many new cyclist the plan can pull in, especially in this US based city that many cycling Americans hold as the “go to cycling city.. Many are trying to mirror what Portland has done for cycling as an alternative transportation and lifestyle. We will be keeping our eyes on the numbers to see how Portland keeps people on bikes, or gets new people to become cyclist.
<urn:uuid:86ab3a2c-0729-4232-a227-fa18df878526>
CC-MAIN-2022-33
https://www.campfirecycling.com/blog/2010/01/09/portlands-new-20-year-bike-plan
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00077.warc.gz
en
0.956888
206
1.640625
2
AMĪN, ḤĀJJĪ, name given successively to two Bahaʾis who were trustees of the Bahaʾi system of religious taxation, the Ḥoqūq Allāh (q.v.). The first was Šāh-Moḥammad Manšādī, Amīn-al-bayān, who was a farmer and shepherd before his conversion to the Bābī faith. He then lived for a time in Baghdad while Bahāʾallāh was there. Later in about 1867, he made the first of his journeys to take the gifts and offerings of the Bahaʾis to Bahāʾallāh in Edirne (Adrianople). Bahāʾallāh then appointed him the Trustee (Amīn) of the Ḥoqūq Allāh. Thereafter he made journeys almost every year to ʿAkkā taking money and letters from Iran and returning with Tablets (Alwāḥ), which he distributed traveling from town to town, especially in the north of Iran. He was killed in his travels during Shaikh ʿObaydallāh’s revolt in 1297/1880. The second Ḥāǰǰī Amīn was Abu’l-Ḥasan Ardakānī, Amīn-e Elāhī, who had become a Bābī in the early days. He was the first Bahaʾi from the outside world to succeed in meeting with Bahāʾallāh inside the prison-city of ʿAkkā, and he assisted Ḥāǰǰī Šāh-Moḥammad before being appointed his successor. See further under Ardakānī. Fāżel Māzandarānī, Ẓohūr al-Ḥaqq VI (ms. in private hands), fols. 742-48; VIII, part 2, Tehran, 132 Badīʿ/1975, pp. 901-94. Originally Published: December 15, 1989 Last Updated: August 3, 2011 This article is available in print. Vol. I, Fasc. 9, pp. 938-939
<urn:uuid:ba1e8dc5-2f09-4c6c-9f38-dd9ffcf23e80>
CC-MAIN-2016-44
http://www.iranicaonline.org/articles/amin-hajji-two-bahais
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718426.35/warc/CC-MAIN-20161020183838-00138-ip-10-171-6-4.ec2.internal.warc.gz
en
0.967239
505
2.25
2
It is necessary to consider the atmosphere and environment as your company decides to buy materials and disposal. It is also essential to consider how it is possible to minimize your consumption and waste production and reduce its carbon footprint. By 2060 the global extraction of resources could grow to 190 billion tons, and the greenhouse gas emissions could rise by 43% if resource usage continues according to historical patterns. These unsustainable output levels could result in unregulated changes to climate and drastic changes in wildlife. Thankfully, businesses will contribute to climate change resistance by making waste management and consumption more environmentally friendly. We will discuss in the following guide why it is so important to decrease your waste and carbon footprint and offer some options to support your company. Why Should You Reduce Carbon Footprint? Why is it so important to reduce your waste and carbon footprint? Excessive waste production impacts the climate, our health and the long-term prospects for human beings on Earth in many ways. The following advantages are achieved by reducing waste production: Greenhouse Gas Emission Reduction Tons of wastes are thrown away each year and tons of new products are produced each year to replace discarded goods. The manufacture of new items in factories means the consumption of fossil fuels, such as oil, and the production of tons of harmful greenhouse gases. And it brings even more fossil fuels to the world by transport, whether by truck, rail, boat or aircraft, and generates yet more greenhouse gas emissions. There is well known damage of greenhouse gases on the earth. Greenhouse gases such as carbon dioxide and methane, are invisible to the infrasound radiation produced on the planet by the sun’s energy. The radiation becomes trapped behind the greenhouse gases rather than harmlessly passing through the atmosphere and dissipating in space. It stays in the atmosphere and warms the earth inexorably. Higher temperatures, rising sea level and sea-acidification are just some of the effects that have been unable to curb international agreements, as were melting polar ice, habitat loss, and increasingly extreme weather events. Environmental and Human Health Security Each year the amount of waste the United States throws away—around 267 million tons of municipal solid waste alone, adding only industrial waste to this number. As land is increasingly used in plants and places, we infringe natural environments, contaminate ecosystems and threaten loss of biodiversity. Fuel, materials and even food are being produced and processed that make up an astounding 90% of the loss of biodiversity and water stress worldwide. And waste we throw away contaminates wildlife habitats that once flourished, making it harder to migrate, replicate and make every year thousands of lives dead. Fossil combustion has dire impacts on the air we breathe and on our breathing health. Contamination reduces air quality and can worsen asthma and other respiratory problems and even raise the risk of strokes. It is inevitable to go for systematic waste management. Leave Future Generations with Resources Most of the electricity in the world comes from fossil fuels, but it is not renewable. For millions of years, they have been formed when extinct creatures died and compressed by the crust of the Planet and the oceans – and the Earth is no longer regenerating. If petroleum and its derivatives, fossil fuels are absent, they will forever be gone. Reducing waste would also minimize new production, ensuring that less fossil fuels are used and more is available for the future generations.Call Envirodispose in OKC to learn more about the waste management procedures and make sure you are taking the right step towards the security of yourself and the environment.
<urn:uuid:9ddb1a0a-44a4-426e-ab0a-74777146adf0>
CC-MAIN-2022-33
https://www.envirodispose.com/why-should-you-make-your-waste-management-environment-friendly/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00468.warc.gz
en
0.940363
715
3.546875
4
Heart Protection Study Cost-effectiveness of simvastatin based on the Heart Protection Study: a randomised controlled trial of cholesterol lowering therapy with simvastatin |Funding:||Medical Research Council, British Heart Foundation and Merck| |Collaborators:||Clinical Trial Service Unit, University of Oxford| |Information:||Borislava Mihaylova, Alastair Gray, Andrew Briggs,| The MRC/BHF Heart Protection Study (HPS) is a 'streamlined' randomised controlled trial to examine the effect (compared to placebo) of both cholesterol-lowering therapy and antioxidant vitamin supplementation on coronary heart disease (CHD) and non-CHD mortality. The '2 x 2 factorial' design allows all patients to contribute to both assessments without affecting the trial cost or sample size requirements whilst also providing information concerning their combined effects. The 'streamlined' nature of the trial is such that only 'essential' data was collected. This minimises the workload for participating centres allowing more patients to be recruited including a wider range of high-risk patient. The rationale for this design is that a large trial including many types of patient is likely to be of much wider relevance than a smaller more homogeneous study. For further information about the Heart Protection Study and its results please visit http://www.ctsu.ox.ac.uk/~hps/. As the clinical results for the antioxidant vitamin supplementation did not show any significant benefit during the trial the corresponding cost-effectiveness analysis became redundant. The economic analyses, therefore, focused on evaluating the cost-effectiveness of the statin intervention. Given the potential importance of expanding the scope of statin treatment in terms of health care budgets it is important to examine whether the value for money of treatment differs in different patient groups. The within trial cost-effectiveness analysis published in the Lancet in 2005 reports the cost per major vascular event avoided and cost per vascular death avoided in patients at different baseline vascular disease risk. The lifetime cost-effectiveness of simvastatin was published in the BMJ in 2006 and reports the cost per life year gained and quality adjusted life year gained for people at different vascular disease risk and different ages at initiation of treatment. A paper presenting the extrapolation of the cost-effectiveness analyses to US context is submitted for publication. Summary of major results of the cost-effectiveness analyses of the Heart Protection Study - The five-year risk of first major vascular event among HPS participants in multivariate risk (with age, sex, prior disease at baseline, LDL-cholesterol, HDL-cholesterol, midpoint of systolic and diastolic blood pressure, and creatinine as predictive factors) quintiles ranged from 42% in the highest quintile to 12% in the lowest risk quintile. - Allocation to simvastatin was associated with a highly significant 25% (20%–29%; p<0.0001) proportional reduction in the rate of first and subsequent major vascular events and a highly significant 22% (95% CI 16-27; p<0.0001) proportional reduction in UK hospitalisation costs for all vascular events, with similar proportional reductions in every subcategory of participant studied (including multivariate disease risk quintiles). - Therefore, the baseline cardiovascular disease risk is an important determinant of the absolute effects of treatment on cardiovascular events and costs and its cost-effectiveness. - A vascular disease decision model was developed based on the individual participant HPS data estimate lifetime risks of vascular events and costs of treatment and hospital admissions. - At the April 2005 UK price of 4.87 pounds sterling (7 euros; 9 dollars) per 28 day pack of generic 40 mg simvastatin, lifetime treatment was cost saving in most age groups and vascular disease risk groups in the HPS. - Gains in life expectancy and cost savings decreased with increasing age and with decreasing risk of vascular disease. People aged 40-49 with 5 year risks of major vascular events of 42% and 12% at start of treatment gained 2.49 and 1.67 life years, respectively. - Treatment with statins remained cost saving or cost less than 2500 pounds sterling per life year gained in people as young as 35 years or as old as 85 with 5 year risks of a major vascular event as low as 5% at the start of treatment. Implications: Our results suggest that treatment with statins is cost effective in a wider population than is routinely treated at present and it would seem appropriate to consider reducing the estimated level of vascular event risk at which statin therapy is recommended. Mihaylova, B, Briggs, A, Hlatky, M, Armitage, J, Parish, S, Gray, A, and Collins, R (2009). Statin cost-effectiveness in the United States for people at different vascular risk levels. Circulation: Cardiovascular Quality and Outcomes, 2:65-72. Mihaylova, B, Briggs, A, Armitage, J, Parish, S, Gray, A, and Collins, R (2006). Lifetime cost-effectiveness of simvastatin in a range of risk groups and age groups derived from a randomised trial of 20,536 people. BMJ 333(7579):1145-8. Mihaylova, B, Briggs, A, Armitage, J, Parish, S, Gray, A, and Collins, R (2005). Cost-effectiveness of simvastatin in people at different levels of vascular disease risk: economic analysis of a randomised trial in 20,536 individuals. Lancet 365(9473):1779-85.
<urn:uuid:75031207-5bce-4a9d-9e6a-8f79cfecf381>
CC-MAIN-2017-04
https://www.herc.ox.ac.uk/research/heart-disease/studies-26/heart-protection-study-3
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00272-ip-10-171-10-70.ec2.internal.warc.gz
en
0.911437
1,180
1.664063
2
22, October 2017 • As Discrimination Stirs Discontent • Protest Against Political, Economic Discrimination Fuelling Clamp Down • Country Heading Towards Pogrom Few days before October 1, 2017, the atmosphere was charged on the two campuses of University of Bamenda and University of Buea. On the orders of President Paul Biya, troops were drafted from the Francophone region to Anglophone towns and cities to carry out a specific mission- stop, by all means, the symbolic proclamation, by students and university teachers, of the “Republic of Ambazonia,” a name for Anglophone Cameroon. The political union of both Anglophone and Francophone Cameroon, two separate and sovereign legal entities, came into existence on October 1, 1960 via a referendum; whereby Anglophone Cameroun opted to join a united and indivisible Federal Republic of Cameroon. According to Mesang Rosine Noutsa, a student of University of Bamenda, the soldiers moved into the hostels and residential quarters on the campus in the wee hours of October 1, and started brutalising students and families of lecturers. “It was a scene of horror, and I have never witnessed such an ugly incident in my entire life,” she declared on her sick bed at the General Hospital, Bemenda, where many students and teachers were receiving treatment for wounds inflicted on them by the soldiers. The repression by the soldiers was also carried out at the University of Buea. Unconfirmed reports indicate that some students and teachers were allegedly killed by the soldiers on these two campuses. According to Amnesty International, and eyewitnesses, who spoke to Al-Jazeera, an international satellite television, at least 17 peaceful and unarmed protesters were killed by soldiers drafted to the campuses by Biya. “In order to avoid further bloodshed, the security forces must cease unnecessary and excessive use of force, and protesters should be peaceful if they want to make their voices heard. The government should investigate these killings,” declared Illaria Allegrozzi, a researcher with Amnesty International in the Lake Chad basin. Vice Chancellor of University of Buea, Professor Horace Ngomo Manga, and Vice Chancellor University of Bamenda, Professor Theresa Akenji Nkou, were both summoned for a meeting with the Higher Education Minister, Jacques Fame Ndongo. At the meeting, which took place in Yaounde, capital of Cameroun, the two vice chancellors were told, in very clear terms that their campuses would remain closed until “all secessionists were cleared from the campuses.” The meeting only lasted for 10 minutes. According to diplomatic sources, in order to escape arrests, many ring leaders of the symbolic attempts to declare the Republic of Ambazonia, fled into Nigeria through bush paths, to where they reside a large community of Cameroonian students and teachers on Nigerian university campuses. Discontentment of Anglophone Intelligentsia IN an exclusive interview with University World News (UWN), Professor Samuel Wara, Head of Department of Electrical Engineering, Covenant University, Ota, Ogun State, who is a native of Bamenda, Anglophone Cameroun, provided useful insights into the past and present complex history of his country, with particular reference to the difficult relationship with Francophone Cameroun, and the role of the Anglophone intelligentsia in the possible resolution of the current problems in the land. “Anglophone university community in Cameroun has always played a vital role in the misfortunes and fortunes of the English speaking region of our country. It was the intellectuals, who canvassed and supported a United Nations- sponsored referendum in 1961, in which our people massively accepted the idea that we create a federation with Francophone Cameroun,” he stated. “It was Professor Bernard Nsokika Folon, Professor Carlson Anyangwe, and Fon Gorji Dinka, a renowned lawyer, who produced, in 1984, a manifesto called the New Social Order in which they stated clearly that by reverting to the name French Cameroon it had at independence, President Paul Biya, had “seceded” from the union and so the English speaking part of Cameroon has the right to revert to its “independence” before 1961. And the new state was named Ambazonia.” And in 2005, Anglophone Cameroon was registered and recognised as Republic of Ambazonia, with Unrepresented Nations and Peoples Organisation (UNPO), an international organisation affiliated to United Nations,” he informed. Wara, while shedding light on the current political situation in Anglophone Cameroon, revealed that Bamenda and Buea universities’ communities are in the forefront of what he called, “the struggle for the emancipation of the people of Anglophone Cameroon.” Instances of marginalisation and discrimination against the Anglophones, which the intelligentsia are fighting against include: •The National Entrance Examination into schools that develop the human resources are set by the French Subsystem of Education. This makes it difficult for Anglophones and Francophones to compete on an equal playing field. The examination board members are all Francophones, a development, which places some bias against Anglophone candidates. Important examinations into professional schools are set in French only, sometimes sparingly in the English-speaking region. •There are five ministries in charge of education. None of them is Anglophone. •State institutions put documents and public notices in French with no English translations. •Most heads of government offices only speak French, even in the English speaking region. Visitors and clients to government offices are also expected to speak French. •Most senior administrators and members of the Armed Forces and law enforcement agencies in the Anglophone region are French-speaking, and there is lack of effort by them to demonstrate an understanding of Anglophone culture. •According to the 1961 constitution, the vice president was the second most important person in state protocol. Today, the Prime Minster (appointed Anglophone) is the fourth most important person in state protocol, after the President of the Senate and the President of the National Assembly. •Of the 36 ministers, who defended the budget for the ministries last month, only one was Anglophone. •Most of the military tribunals in Anglophone Regions conduct their courts in French. •Financial documents such as COBAC Code, CIMA Code and the OHADA Code are all in French. These documents are international treaties and conventions to which Cameroon is a signatory. •Magistrates in Anglophone Cameroon are disproportionately Francophone. In addition, other government –appointed officers such as the senior divisional officers, commissioners, and commandants are disproportionately Francophone. • There are Francophone principals in Anglophone schools, hospitals, banks and mobile telephone companies. IN an exclusive chat with UWN, Professor Augustine Awasum, a veterinary surgeon, Ahmadu Bello University, Zaria, who hails from Anglophone Cameroon, said that best solution to put an end to the current bloodbath in Anglophone region of his country is to create an enabling atmosphere for dialogue by all stakeholders. He is of the view that all students, teachers held in prison by the government must be released unconditionally. And the universities of Buea and Bamenda must be reopened as soon as possible. “This inevitable dialogue should be supervised by the African Union, and the United Nations, with a view to ensuring that mutual agreements reached at the negotiation table are legally binding on all the parties. The minimum condition to guarantee peace, progress and meaningful development is to reinstate the October 1, 1961 constitution, which guarantees true federalism where Anglophone and Francophone regions are equal partners,” he concluded. Source: The Guardian
<urn:uuid:6a5cb59f-6741-4829-ac64-d274053032e6>
CC-MAIN-2022-33
https://www.cameroonconcordnews.com/chaos-at-ekok-mfum-border-as-southern-cameroons-demand-autonomy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00672.warc.gz
en
0.957886
1,627
2.5
2
A distressing emergency operation was launched after a woman was left "clinging" on for life after falling off her paddle board in Galway waters. Lough Derg RNLI assisted the person who had gotten into difficulty in the waters at around 4pm on Wednesday with help from Valentia Coast Guard. The crew were told that the person in the water was "clinging to a navigation mark in the lake, southwest of Portumna" as they waited for the lifeboat with helm Eleanor Hooker, crew Steve Smyth, Joe O’Donoghue and Doireann Kennedy on board. Several emergency crews attended the scene given the 'serious risk to life' including Rescue 115, the Irish Coast Guard Search and Rescue Helicopter team, Portumna Gardai, Portumna Fire and Rescue Crews and Galway ambulance crews who made their way to a small harbour on the Galway shore known as New Quay. The casualty was located by the team and she was taken ashore where an ambulance was waiting to assist her for medical treatment. She had been paddle-boarding and, after coming off her board, was unable to get back on. She said she was in the water for an hour and a half before she was eventually able to use her mobile phone to call the emergency services. She was located after being able to identify landmarks visible on shore. Catherine Gleeson, Deputy Launching Authority at Lough Derg RNLI said: "We're glad of the positive outcome and that the person in the water had a means of calling for help." She advises water users if they are going afloat, to go with a friend and if you are going out alone, always tell someone where you're going and when you'll be back’.
<urn:uuid:c47bc6c7-6a17-4777-bea3-712cd78a97fd>
CC-MAIN-2022-33
https://www.galwaybeo.ie/news/galway-news/gardai-emergency-crews-swarm-irish-6358163
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00076.warc.gz
en
0.98666
363
1.523438
2
International Standard Recording Code The International Standard Recording Code (ISRC) is an international standard code for uniquely identifying sound recordings and music video recordings. The code was developed by the recording industry in conjunction with the ISO technical committee 46, subcommittee 9 (TC 46/SC 9), which codified the standard as ISO 3901 in 1986, and updated it in 2001. An ISRC identifies a particular recording, not the work (composition and lyrical content) itself. Therefore, different recordings, edits, and remixes of the same work should each have their own ISRC. Works are identified by ISWC. Recordings remastered without significant audio-quality changes should retain their existing ISRC, but the threshold is left to the discretion of the record company. ISO 3901 was finished in 1986. In 1988, the IFPI recommended that its member companies adopt ISRCs for music videos. In 1989, the ISO designated the IFPI as the registration authority for ISRCs. The IFPI, in turn, delegated part of the administration of ISRCs to several dozen national agencies, which allocate ISRCs to both record companies and individuals. The national agencies began assigning ISRC codes for music videos in August 1989. The Japanese recording industry began encoding ISRCs on audio CDs in November 1989. The IFPI and the Recording Industry Association of America (RIAA) then developed detailed recommendations for this practice, as well as for ISRC assignment in general. The IFPI adopted the recommendations in March 1991, and they went into effect for IFPI members on 1 January 1992. ISRC codes are always 12 characters long, in the form "CC-XXX-YY-NNNNN". The hyphens are not part of the ISRC code itself, but codes are often presented that way in print to make them easier to read. The four parts are as follows: - "CC" is the appropriate two-character country code for the ISRC issuer. The code is assigned according to the ISO 3166-1-Alpha-2 standard. (High demand for ISRCs within the United States has caused the supply of available registrant codes to become exhausted; after December 6, 2010, new registrants in the U.S. use country code "QM". The codes "CP", and "DG" are reserved for further overflow, and "ZZ" is reserved for codes assigned by the International ISRC Agency.) - "XXX" is a three character alphanumeric registrant code of the ISRC issuer. (This number by itself does NOT uniquely identify the ISRC issuer as the same 3-digit number may be used in various countries for different issuers. To uniquely identify an issuer, the country code and registrant code should be used together.) - "YY" represent the last two digits of the reference year – the year that the ISRC was assigned to the recording. This is not necessarily the date the recording was made. - "NNNNN" is a 5-digit number that identifies the particular sound or video recording, unique within the scope of the reference year. - US for United States - RC1 for RCA - 76 for 1976 - 07839 is the unique id identifying this particular recording The Red Book standard recommends the encoding of ISRCs onto CDs. Embedding ISRC in files Obtaining ISRC Codes The provision of ISRCs is overseen by appointed national ISRC agencies. These national ISRC agencies issue codes directly to the public and may also utilize authorized ISRC Managers to issue ISRCs. In the United States, the appointed agency is RIAA. ISRC codes can be obtained in large blocks directly from RIAA for an administrative fee ($95 at time of this publication), in quantities as little as 1 from ISRC.net, or in conjunction with other music-related services from other authorized ISRC managers. In territories where there is no national ISRC agency, users can obtain ISRC codes directly from IFPI or from ISRC.net. - Amazon Standard Identification Number (ASIN), a 10-character alphanumeric unique identifier assigned by Amazon.com and its partners for product identification within the Amazon organization - Global Release Identifier (GRid), a unique identifier for musical releases - International Article Number or EAN-13 (also known as European Article Number) the Media Catalog Number code stored on an audio CD - International Standard Book Number (ISBN), a similar unique identifier for books - International Standard Musical Work Code (ISWC), a unique identifier for musical works such as songs - Universal Product Code (UPC), Universal Product Code - Resources – ISRC – Handbook (incorporating the ISRC Practical Guide) s321 - "List of Approved ISRC Managers". Recording Industry Association of America. Retrieved April 15, 2014. |Wikidata has the property: International Standard Recording Code (P1243) (see uses)|
<urn:uuid:f980abe7-7de3-4584-8a13-68cc8140bfee>
CC-MAIN-2017-04
https://en.wikipedia.org/wiki/ISRC
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00045-ip-10-171-10-70.ec2.internal.warc.gz
en
0.904434
1,034
2.875
3
If elevated low density lipoprotein cholesterol (LDL-C) levels were the only source of cholesterol deposited in the artery wall, then high doses of potent statins should be reversing (rather than reducing) the build-up of atherosclerotic plaques, largely eliminating deaths from coronary heart disease (CAD). Sadly the number one cause of death in Americans taking statins to lower their elevated LDL-C to prevent heart attacks is still heart attacks! Yes, statin drugs are very effective for reducing high LDL-C levels, and they do slow the progression of cholesterol-filled plaques. However, they rarely reverse the build-up of cholesterol in the artery wall. More importantly, statin drugs alone do not come close to eliminating the risk of heart attacks and most strokes despite impressive reductions in LDL-C levels. Research now shows that other lipoproteins besides LDL particles can and do carry cholesterol from the blood into the artery wall, promoting the growth of cholesterol-filled plaques and CAD. These lipoproteins are neither LDL-C or high density lipoprotein cholesterol (HDL-C), but rather consist of the cholesterol-rich remnants of triglyceride-rich lipoproteins produced by the liver (VLDL) and the small intestine (chylomicrons)(1). Both genetic factors and dietary factors influence the amount of these triglyceride-rich lipoproteins produced and also the amount of cholesterol-rich remnant particles derived from each of them in the blood. Fat and cholesterol-rich meals can dramatically increase the production of chylomicrons and lead to greater amounts of cholesterol-rich chlyomicron remnants in the blood for several hours after each fat-rich meal (2). Dr. Borge Nordestgaard’s recent study followed nearly 12,000 people with established CAD in Denmark and found that each 1 mmol (38.7 mg/dl) increase in non-fasting remnant cholesterol caused 2.8 times greater risk of a CAD event that was independent of HDL-C levels. The increased causal risk of CAD from elevated cholesterol remnant particles appeared much stronger than for changes in either LDL-C or HDL-C levels (3). Most doctors (MDs) now check only fasting blood lipids and focus largely on LDL-C and HDL-C to assess their patient's future CAD risk. This was based on the simplistic notion that it was only the LDL-C particles delivering cholesterol to the artery wall, making it the "bad" cholesterol, while the HDL-C particles were removing the cholesterol from the artery wall and bringing it back to the liver, making their cholesterol content "good". Of course, we now know HDL-C particles can actually become proinflammatory and proatherogenic "bad" HDL particles, perhaps partly in response to biochemical changes in the HDL particles triggered in part by chylomicrons and other remnant cholesterol particles in the blood. Chylomicrons and their cholesterol-rich remnants remain in the blood for several hours after each fat-rich meal and likely play a major role in promoting inflammation (by increasing IL-6 & CRP), thrombosis (by activating clotting factor VII), and atherosclerosis (by delivering more cholesterol-rich remnant particles to the artery wall). The fact that damage to the endothelium (inside "skin" of the artery wall) as evidenced by reduced flow mediated dilation (FMD) occurs to a much greater extent after a single fat-rich meal than after a meal high in carbohydrate points to the fact that pathological changes must be occurring in the artery wall in response to fat and cholesterol-rich particles coming from the intestines (4). Indeed, this reduced FMD is likely the main reason why many people with angina tend to experience far more chest pain after a large, fat-rich meal than they do after a meal high in carbohydrate-rich plant foods. The only legitimate debate is not whether LDL-C or other cholesterol-rich remnant particles promote atherosclerosis and increase the risk of CAD, but rather which is more atherogenic. Clearly both LDL-C and other remnant lipoprotein particles deliver cholesterol to the artery wall and promote foam cell formation and atherosclerosis. Unlike LDL-C particles (which must first be oxidized), remnant cholesterol particles are readily taken up by scavenger receptors of macrophages in the cell wall to form foam cells (5,6). Increasing evidence suggests that damage to the artery wall from cholesterol-rich remnant particles appears to be at least as important as either fasting LDL-C or HDL-C levels for predicting future CAD events. It should be noted that diets high in refined carbohydrates (particularly large amounts of refined sugars) combined with inactivity can contribute to a marked increase in the liver's production of VLDL particles because the liver converts some of the excess carbohydrate (especially fructose) into triglyceride. This leads to more triglyceride-rich VLDL particles being released into the blood, which then degrade into cholesterol-rich remnant particles and eventually also LDL particles. This is particularly true in people who are genetically prone to develop insulin resistance and type 2 diabetes and who experience significant increases in fasting triglyceride levels as visceral fat stores accumulate. Bottom Line: Reducing LDL-C levels with statin drugs alone is insufficient for stopping and reversing CAD and preventing most heart attacks and strokes. A diet low in fat, salt, cholesterol, and refined carbohydrates coupled with increased activity and loss of excess weight may also be necessary to stop and reverse CAD in part by reducing remnant cholesterol levels in the blood. By James J. Kenney, PhD, FACN - Mark Nordestgradd BG, Freiberg JJ. Clinical relevance of nonfasting and postprandial hypertriglyceride and remnant cholesterol. Curr Vasc Pharm. 2011;9:281-6 - Mark Cesar TB, et al. High cholesterol intake modifies chylomicron metabolism in normolipidemic young men. J Nutr 2006;136:971-6 - Mark Varbo A, et al. Remnant cholesterol as a causal risk factor for ischemic heart disease. J Am Col Cardiol. 2013;61:427-36 - Mark Tomaino RM, Decker EA. High-fat meals and endothelial function. Nutr Rev. 1998;56:182-5 - Mark Zilversmit DB. A proposal linking atherogenesis to the interaction of endothelial lipoprotein and triglyceride-rich lipoproteins. Circ Res.1973;33:633-8 - Mark Nakajima K, Nakano T, Tnaka A. The oxidative modification hypotheis of atherosclerosis: the comparison of atherogenic effects of oxidized LDL and remnant lipoproteins in plasma. Clin Chim Acta. 2006;367:534-42 Stephanie Ronco has been editing for Food and Health Communications since 2011. She graduated from Colorado College magna cum laude with distinction in Comparative Literature. She was elected a member of Phi Beta Kappa in 2008.
<urn:uuid:a3e625fe-bb3b-4e00-afa9-372f64e44219>
CC-MAIN-2022-33
https://foodandhealth.com/heart-attack-diet-statins-cffh/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00677.warc.gz
en
0.91018
1,457
2.59375
3
OPNAV INSTRUCTION 4790.4 Home > Flashcards > Print Preview The flashcards below were created by user on FreezingBlue Flashcards . What would you like to do? What is the Purpose? To establish policy and as ign responsibilities for the Ship'S 3-M System in accordance with references (a) OPNAVINST 4700.7 (Series) and (b) NAVSEAINST 4790.8B . This instruction provides the current Navy 3-M System policy; reference (b)NAVSEAINST 4790.8B provides implementation guidance . What is Scope a? The Ship' s 3-M System applies to all ships, service craft , small boats , and non- aviation fleet test and support equipment, with the exceptions as noted in paragraph 4. c . What is Scope b? Common support equipment used by both ship's force and naval aviation units shall have Planned Maintenance System (PMS) support provided under reference (b) . Scheduling of this maintenance by naval aviation units may be done under the Naval Aviation Maintenance Program to avoid duplicat ive and redundant schedules . What is Scope c? The Ship'S 3-M System does not apply to nuclear propulsion plants and as sociated test equipment under the cognizance of Commander, Naval Sea Systems Command (COMNAVSEASYSCOM) (SEA 08), f leet ballistic missile systems, or aeronautical support equipment covered in the Nava l Aviation Maintenance Program. Also excluded are civilian operated and maintained ships, small boats, and service craft, unless specifically included as a requirement in a Base Operating Contract (BOC) or other similar document . What is Scope d? Maintenance Program. Also excluded are civilian operated and maintained ships, small boats, and service craft, unless specifically included as a requirement in a Base Operating Contract (BOC) or other similar document . What is Scope e? Shore activity level of participation in the Ship's 3-M System shall be at the request of the shore activity's senior command and will be provided on a cost reimbursable basis. Equipment used a shore which is identical to shipboard installed equipment with Ship's 3-M support will be maintained using existing 3-M coverage . The Ship'S 3-M System is the nucleus for managing a float and applicable shore station equipment. How does it do this? This system provides maintenance and material managers throughout the Navy with a process for planning, acquiring, organizing, directing, controlling and evaluating the manpower and material resources used to support maintenance . The Ship'S 3-M System is designed to provide for managing maintenance and maintenance support to achieve maximum equipment operation readiness. The Ship's 3-M System shall provide for what? - (1) Standardization - (2) Efficiency - (3) Documentation - (4) Analysis - (5) Configuration Status Accounting (CSA) - (6) Scheduling achieve uniform maintenance standards and criteria effective use of available manpower and material resources in maintenance and maintenance support efforts . recording maintenance and maintenance support actions to establish a material history. used to improve reliability and maintain ability of systems and equipment, and to reduce cost of material owner ship. Configuration Status Accounting (CSA) reporting and recording changes to installed equipment, equipment configuration specifications, and ship board location. standardized method for planning, managing, executing and tracking maintenance requirements and accomplishments. This includes component requirements from the Class Maintenance Plans (CMP) and the Integrated Class Maintenance Plan (ICMP) . What is Policy A? a . The Ship' s 3-M System is a management tool that provides efficient and uniform methods for conducting and recording preventive, alterative, and corrective maintenance. Planned Maintenance System (PMS) and Maintenance Data System (MDS) tools are provided to manage ship maintenance. What is Policy B? PMS is a standardized method for planning, scheduling, and accomplishing preventive maintenance by ship's force. PMS maintenance procedures will be developed in accordance with Reliability-Centered Maintenance (RCM) concepts as specified inreferences ( c ) and (d). The procedures are to be developed by the activities of the Systems Commands (SYSCOMs) responsible for the development and procurement of the systems / equipment for active, new construction, major conversion and activation of ships, boats, and crafts. The procedures are to be the minimum required to maintain equipment in a fully operable condition within specifications. PMS supersedes all organizational level planned or preventive maintenance systems or programs. Where a difference between the requirements and/or procedures of PMS and other technical publications or systems exists, PMS requirements will prevail. Differences shall be reported using PMS feedback reporting procedures. What is Policy C? To reduce PMS requirements while in extended maintenance periods and other times when equipment is not operated, an Inactive Equipment Maintenance (IEM) system will provide modified PMS procedures for the maintenance of systems and equipment . What is Policy D? MDS is the means by which maintenance personnel can report applicable maintenance requirements and configuration changes on all categories of equipment. MDS will be setup so that maintenance personnel will record maintenance data only once. What is Equipment Configuration Status Accounting? Configuration status accounting, or the ability to accurately document, track and maintain the configuration of a ship's systems is a critical factor in maintaining proper shipboard logistics support. NAVSEASYSCOM maintains a central database with the ships' configuration data . What is Configuration Data Manager (CDM)? For each ship class, a single activity called a Configuration Data Manager (CDM), has been designated the control authority for accuracy and completeness of the configuration information. Prior to ship delivery, the SYSCOM and the delivering activity are responsible for the initial accuracy and completeness of the central database. After delivery, it is imperative that the ship maintains and updates its configuration data in the Ship's Equipment File (SEF), through the submission of configuration change reports. An item is considered to be a Conf iguration Worthy Item (CWI) if one or more criteria are met. How many criteria are there? What is criteria (a) of deciding a Configuration Worthy Item (CWI)? ( a ) Any item that is bought from an outside activity What is criteria (b) of deciding a Configuration Worthy Item (CWI)? (b) Any item, including software that has a separate specific ation What is criteria (c) of deciding a Configuration Worthy Item (CWI)? ( c ) Any item that has a separate drawing, What is criteria (d) of deciding a Configuration Worthy Item (CWI)? (d) Any item that is a separate line item or subline item on a purchase order or contract What is criteria (e) of deciding a Configuration Worthy Item (CWI)? ( e ) Any item that has or requires any form of separate technical or logistics document ( e .g., supply support, test equipment requirement, calibration standard requirement, technical manuals and/or repair standards, PMS, e t c .), Maintenance Assist Modules (MAMs), intermediate and/or depot level maintenance plans or drawings, installation or configuration control drawings and/or selected records, What is criteria ( f ) of deciding a Configuration Worthy Item (CWI)? ( f ) Any item needed to support software tracking What are alteration installation activities required to provide upon completion of installation? Alteration installation activities are required to provide configuration change data to the ship upon completion of equipment installation. Configuration changes made by the ship are reported through the Ship's 3-M System. For ships with Maintenance Support Centers (MSCs ), the MSC will research a approve all configuration change requests. What are the overall responsibilities for the commands of the operating forces? Commands of the operating forces are responsible for the proper implementation of the Ship's 3-M System in the Fleet, and are responsible for informing appropriate seniors in the chain of command of those conditions that affect material readiness. The development of management tools at the command level is encouraged. What are the responsibilities of the Deputy Chief of Nava l Operations Fleet, Readiness and Logistics, Fleet Readiness Division (N43) when it comes to 3-M? - (1) Sponsor the Ship's 3-M System. - (2) Implement the overall policy governing management of the Ship's 3-M System, its development, coordination, and maintenance. - (3) Review the resources requested for the operation, improvement, and support of the 3-M System by all levels of leadership a float and a shore; and supporting requirements in the budget effort. The program requirements will be submitted by Commander, Fleet Forces Command (USFF) to OPNAVN43 for review. - (4) Approve management applications of the MDS and PMS. What are the responsibilites of Commander, Fleet Forces Command (USFF) as it applies to the 3-M? Implement, manage, coordinate and maintain the Ship's 3-M System program for all ships and commands under its cognizance and submit the program requirements to OPNAVN43 for review and validation. What are the responsibilites of the Type Commanders (TYCOMs) as it applies to the 3-M? Exercise primary responsibility for the effective operation and support of the Ship's 3-M System under their claimancy. This responsibility includes shore activities under their cognizance where the Ship's 3-M System is applicable. The Commanding Officer of Naval Bases, Naval Stations, and other activities that do not report directly to a TYCOM, shall exercise TYCOM 3-M System responsibilities. What are the responsibilites of the Naval Sea Systems Command (NAVSEASYSCOM) as it applies to the 3-M? Manage and direct the development, implementation it operational maintenance, and improvements of all aspects ship's 3-M system throughout the Navy, both PMS and MOS. What are the responsibilites of the SYSCOMs/BUMED as it applies to the 3-M? Ensure appropriate PMS packages are delivered simultaneously with equipment. Ensure that PMS packages are delivered to the FTSCs for inclusion in the masterdata file. What are the responsibilites of the Naval Education Training Command (NETC) as it applies to the 3-M? - (1) Ensure training efforts in support of the Ship's 3-M System meet FLTC requirements and the necessary follow-on training is provided to fleet personnel. - (2) Maintain ship board applicable training equipment in accordance wi th reference. What would you like to do? Home > Flashcards > Print Preview
<urn:uuid:37a7415f-30db-4a11-b435-1f0ed86f3e4e>
CC-MAIN-2017-04
https://www.freezingblue.com/flashcards/print_preview.cgi?cardsetID=130547
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00393-ip-10-171-10-70.ec2.internal.warc.gz
en
0.906509
2,257
1.851563
2
3D Printer Filament Buyer’s Guide 2022 Welcome to the most in depth 3D printer filament buyer’s guide on the internet. This guide covers everything you need to know about 3D printer filament. There are 11 sections in this guide, and each section gives an overview of the topic. But every section of this guide will lead you to an article with more in depth infromation so you can learn more if you want to. Also, check out our huge list of dozens of filament brands with reviews and information to help you make an informed purchase. Combined with this guide, you will have all of the information you need to buy 3D printer filament. Here are the best filaments on the market right now: PART 1: Introduction To 3D Printer Filaments What is 3D Printer Filament? 3D printer filament is the strands of plastic wire that go into a printer’s extruder. The extruder melts and extrudes the filament onto the print bed to form objects. In comparison to 2D printers, filament basically acts as the ink of your 3D printer, except in three dimensions. 3D Printer Filament Uses 3D printer filaments can now be used to make everything from medical devices and electronics to functional parts for commercial mechanical applications. In fact, 3D printing is so much more efficient for prototyping and custom part production that it has virtually taken over the commercial prototyping industry. It makes sense: 3D printing offers much more effecient ways of constructing many complex shapes and machines than traditional manufacturing processes. Innovative 3D Printer Filaments Brands Thankfully, because the filament industry has boomed over the last decade along with rise of 3D printers, lots of exciting things are happening in the filament industry. As a result of years of research by engineers around the world, there are now dozens of innovative filaments for almost any application. Pellets, Powers, and Resins There are many different types of 3D filament plastic available at the moment, and new types of filament are created practically every month. For information about filament and other forms of plastic used in the 3D printing, such as pellets and resins, check out ‘Pellets, Powders, And Other Forms Of Plastic Used In 3D Printing‘ where we go over the other common forms of 3D printing plastic materials. PART 2: Buying 3D Printer Filament Buying filament is usually a pretty simple process. But figuring out which brand to buy from is trickier since not all of them are high quality. Check out our gigantic list of dozens of filament brands for reviews and information about each brand before buy. What should you look for in a brand? The main thing a 3D Printer Filament Buyer’s Guide should tell you is how to find good quality filament. There are three things you should look for in a filament brand: - Filament quality - Consistency of the tolerance These are the three main factors that usually determine whether or not you will have a good experience with a brand’s products. There are several other aspest to consider about a brand as well, though, such as packaging and customer service, but those are usually less important. Obviously you want to buy the highest quality filament you can. The quality of filament directly affects the quality of your print. There are tons of cheap Chinese filaments that are very poor quality. We suggest avoiding them. Otherwise you are bound to spend your time unclogging your extruder and dealing with poor quality prints. Cheapest 3D Printer Filament The price of filament depends loosely on many factors including the quality and source. The reason we say ‘loosely’ is that, at the end of the day, the price is determined mostly by manufacturers and suppliers based on what they think people will buy. That means you can often find poor quality filament for high prices (like cd-writer.com or Cool Components ), and high quality filament for low prices like (Amphilogic and FormFutura). Check out our list of the cheapest filaments here. Tolerance is probably the single most important factor to look at when evaluating a brand. If a filament has bad tolerances, then it basically unusable. Watch out for cheap chinese filaments that often have terrible tolerances. These brands are everywhere and many beginners fall for them. Instead, stick with brands that have incredible tolerances. For instance, Hatchbox offers tolerances as low as +/- 0.01 mm, which means that their tolerances are basically perfect. PART 3: Types of 3D filament As the world of 3D printing grows, more types of filament are coming to market every year. In fact, there are now dozens of types of filament available today. The selection will only increase as 3D printing finds new applications. There are some very interesting filaments out there, including algae filament by Algix and flexible wood filaments by Lay Filaments. Check out a full list of types of filament in the ‘2019 3D Printer Filament Materials Guide‘ for more information. What are the most popular types of filament? Currently, the most popular types of plastic filaments are PLA, ABS, PET, TPU, Nylon, Glow in the Dark, Metal, and Wood. They each have different properties and have different applications. - PLA is the most popular plastic used in 3D printing and is easy to work with. - It is a hard plastic that can be used to print most non-functional plastic objects, such as figurines, jewelry and pencil holders. - ABS can be used to create parts for machines, toys for kids, and even medical devices. - The only major downside to ABS is that it is a bit harder to work with than PLA. - PETG is also growing in popularity. - It is very strong and as easy to print with as PLA. Here’s a prediction: due to the fact that PETG has the strength of ABS and ease of PLA, there is a good chance that it will take over as the most popular filament material in the future. Check out a full list of types of filament in the ‘2019 3D Printer Filament Materials Guide‘. PART 4: 3D Printer Filament Glossary of Terms 3D printers are technical machines and they require good quality filaments to produce good quality prints. But how do you evaluate filaments and decide what to buy? There are certain things to look for when choosing a filament, and 3D printer enthusiasts use a bit of jargon to describe them. It will be important to understand a few basic terms before moving on to the rest of the article. You can find a complete list of 3D printer terms in our glossary. You can also check out the Glossary of Terms for a complete list of 3D printing terminology. PART 5: Homemade filament The irony of buying filament is that plastic waste is everywhere around us these days. Wouldn’t it be great if we could recycle that waste plastic into filament? With home filament extruders, you can do just that. It takes a little bit of work to learn how to produce usable filament with these machines. But once you do, you can start recycling plastic bottles, milk jugs, and other commonly available plastic items into filament for your 3d printer. You can also purchase plastic pellets for fraction of the price of filament and extrude them into filament yourself.Table could not be displayed. Of course, these machines aren’t cheap. A typical filament extruder will cost you anywhere from $500 to $2000. But if you plan on doing a lot of printing, then you might want to seriously consider getting one. After all, you would only have to extrude about 50 rolls of filament to recoup the value of investing in $1000 extruder. There several great filament extruders you can buy for your workspace. They each have pros and cons. The best option currently is probably the filabot extruder simply due to ease of use. But here is a list of other filament extruders worth considering: Another machine that dovetails nicely with filament extruders is filament winders. These machines wind the filament onto a spool at a constant speed as it comes out of the extruder. One of the hardest parts of extruding your own filament is making sure that you don’t pull too hard on the filament during winding as it comes out of the extruder. Otherwise, your filament will have uneven diameters. Filament winders make it much easier to exert a constant low level force on warm filament without messing up the tolerance. How to make 3d printer filament yourself Once you have all the components, it’s relatively straightforward to make filament yourself. PART 6: How to store filament The best way to store filament is is in a storage bin. You can by these plastic storage containers at office supply stores, large department stores like Target and Walmart, as well as some Hardware stores. Make sure you get storage containers that have air-tight lids to prevent humidity from getting inside. Also, try to get clear bins if you can so that you can see what filaments are inside without opening it up. It’s not necessary but it makes life a bit easier. Next put a desiccant of some kind in the bin. A popular desiccant is a porous bag of rice. Rice naturally absorbs moisture from its environment. So if you put a few cups of rice in a sock or shoe box and place it in the bin, it will absorb any humidity that gets inside and keep the filament dry. You can also you silica beads or gel packs. But if you really want to keep your filaments completely dry, the best thing you can do is buy a dehumidifier. Even a small one will make a big difference.Table could not be displayed. That’s pretty much all you need to do store most 3D printer filament for the long term. Put it in an airtight bin with a desiccant. For more information about storing filament and extra tips to make sure your filament stays usable for a long time, check out our guide to 3D printer filament storage. PART 7: 3D Printer Filament Accessories Before you start printing, you can do a few accessories you can pick up that will make your printing experience easier. They save time and frustration, and over the course of several prints, their benefit can compound. Other than the accessories listed below, most accessories are not strictly necessary for printing, but they are nice to have. Here is a quick list of a few other accessories to consider buying before you start printing. PART 8: Best 3D printers Most filaments will work on any FDM 3D printer. On rare occasions, some filaments will print better on specific 3D printers, but that is usually the result of human error or the quality of the 3D printer. In general, good filament will print well on all good 3d printers if operated correctly. Here’s a list of cheap 3D printers for under $300. PART 9: Bad Filament? Troubleshooting failed prints This topic is a bit outside of the normal scope of a 3D printer filament buyer’s guide but this information is important to have in case you do run into problems with the filament you buy. The first step to troubleshooting failed prints is understanding what went wrong. So the goal here is to go through some of the most common reasons prints fail so that, if you are beginner, you cut down the amount of time it takes to find a solution. There’s no universal way to troubleshoot all print failures becuase all printers are different and all printers are printing in different conditions with different materials. But understanding is the first step to finding a solution. Clogs happen all the time in 3D printing. Clogging probably the most common issue 3D printers face. And they are pain to deal with because so many things cause them: dirty gears, malfunctioning parts, obstructions in the hot end, printer height is too low, etc. But when they are caused by filament, the problem is usually easier to discover. Here are a few of the most common reasons that 3D filament cause 3D printers to get clogged up. - Particles in a specialty composite filament (wood, ceramic, metal) are too big to fit through the nozzle - Impurities in the filament itself have either burned up inside the hotend or are obstructing the nozzle. - Dirt or dust on the filament has entered the hot end and caused a jam - Wood filament has burned up inside the hotend because the printer speed is too slow - You didn’t clean out the extruder between spools so old filament is burning inside - The momentum of the spool spinning forward has pushed more filament into the melt chamber than your printer can handle and has jammed it up. - The filament absorbed too much water - And last but not least (say it with me): THE DIAMETER OF THE FILAMENT IS TOO LARGE Each of these issues has a different solutiont. But hopefully the list above has given you some ideas about what might be causing clogs you experience. Solution: varies by printer, material, and environment Warping is usually caused by uneven cooling between layers of filament. This happens commonly with ABS, PETG, and other filaments that require a heated printer bed and adhesive materials to keep the bottom of the object stuck to the print plate. Basically, as middle layers cool, they contract, which pulls on the warm bottom layers that are in contact with the heated printer bed and the warm top layers that were recently extruded. If the force of the this contraction is large enough, the object will bend out of shape. Solution: better bed adhesion and matching the print speed to the temperature of the print. Delamination and Layer bonding The same process described above can also pull layers apart. But layer bonding issues can have other causes as well. Some 3D filaments simply don’t have good bonding properties. Flex filaments are a good example. Other times, delamination occurs because the printer is speed is too slow and the filament isn’t getting deposited on top of the previous layer before it cools. After the previous layer cools, the new layer won’t won’t fuse with it as easily. Some brands of filament have discolorations when printed. Discolored patches in object often occur when the colorant used in the filament is poor quality. However, many discolorations are caused by impurities in the filament and by burned filament. PLA specifically becomes discolored when it absorbs too much moisture. ABS and other plastics can also become discolored when exposed to UV rays and direct sunlight over time. Fun Fact: The degradation of ABS by UV radiation in direct sunlight led to the discontinuation of it’s use in parts for seat belts in cars. How to clean out your extruder with cleaning filament If you haven’t tried eSUN cleaning filament already, then you are definitely missing out. That stuff is magical. In fact, one of the best tips in this 3D Printer Filament Buyer’s Guide is to pick up a roll of cleaning filament immediately. It will remove gunk from the inside of you printer that you didn’t even know was there. The best part about it is that it is super cheap and super easy to use. Just push a 10 cm piece of it through your hotend while it is heated to the temperature you will be printing at. Then insert a piece of the material you want to print with and push the cleaning filament out. That’s it. The cleaning filament will remove almost all dirt. It is far easier than other cleaning methods, like the Atomic pull method (AKA Cold pull or Nylon pull). PART 10: Post-processing techniques for different materials One of the advantages of making objects yourself with 3D printers is that you can customize them. That includes making sure they look exactly the way you want them to after they are printed. After all, many objects come off the printer bed with visible layers, rough surfaces, discolorations and other imperfections. With a little touching up you can fix these blemishes and makes your pieces eye-catching. Check here for a complete list of post-processing techniques for various materials. Also, check out the list of post-processing solvents for ABS. There are more than you might imagine.Table could not be displayed. PART 11: The Future Of Filament We’re almost at the end of this 3D printer filament buyer’s guide. The last thing we need to talk about is the future. The future of 3D printer filament looks very bright. As the 3D printing industry expands, the filament industry will as well. Significant resources are being put towards developing new and innovative types of filament that will allow 3D printers to find new applications. Several types of filament are already making waves in industries that are not traditionally focussed on plastics as a functional material. Architecture firms and other business that rely on rapid prototyping can now create prototypes in-house in just a few hours with PLA and ABS. Conductive filaments hold strong promise for reshaping the future of the electronics industry. Ceramic filaments could change the way dishware, pottery, and ceramic parts are produced. The filament industry is itself undergoing big changes. With the proliferation of cheap filament brands has come massive confusion about the quality of different filament products. Soon, the 3D printing industry may shift in the direction of multimaterial printing (one printer, multiple extruders) and more specialized materials. Moreover, with metal printing, bio printing, food printing and nano printing on the horizon, the filament industry will have to diversify to keep up. Innovative brands like Lay Filaments, owned by Kai Parthy, and Black Magic 3D, owned by Graphene 3D lab, will have to continue to innovate in order to stay relevant. Meanwhile, larger filament brands will continue to hone their manufacturing technologies and large 3D printing companies will likely acquire promising filament brands. These trends could lead to market consolidation. Perhaps the largest threat to filament companies is the rise of home extruders. Homemade filament is still in its infancy, and home filament extruders still face serious obstacles to widespread adoption. But as the technology improves and prices come down, personal filament extruders could become the 3D filament source of choice for many, including the most hardcore DIY enthusiasts. Recycling trash into filament could become a daily chore for teenagers around world over the next decade. Whatever happens, the consumer level 3D printing industry will more than double in the next 5 year according market analysts. That bodes well for the filament industry in general. We will keep this 3D Printer Filament Buyer’s Guide updated with the latest information so that you can keep on top of these trends. Final thoughts: 3D Printer Filament Buyer’s Guide We hope you enjoyed this 3D printer filament buyer’s guide. We really did try to include everything a beginner would need to know about filament to get started. Of course, 3D printer filament is such a wide subject that there are bound to be things we missed. If you would like us to include anything else, feel free to leave a comment below.
<urn:uuid:fef5ec33-eddb-4c0a-bf6a-586312135f9c>
CC-MAIN-2022-33
https://printermaterials.com/3d-printer-filament-buyers-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00670.warc.gz
en
0.92805
4,169
2.203125
2
State Bar of Arizona Ethics Opinions 02-06: Corporate Representation; Multiple Representation; Lawyer-Client Relationship; Confidentiality; Conflicts of Interest A lawyer may form a business entity for various individuals and be counsel only for the yet-to-be-formed entity, if appropriate disclosures and consents occur. Alternatively, a lawyer may represent all of the incorporators, collectively, with appropriate disclosures. Lawyer is a business law practitioner who currently represents several businessmen in various matters. The existing clients ask the lawyer to form a new entity corporation for them and to be counsel only for the entity. - May a lawyer represent a yet-to-be-formed entity during formation? - Can a lawyer represent the prospective entity without being deemed to also represent the incorporators? - If so, what disclosures must the lawyer make to the constituents to clarify who is the client? RELEVANT ETHICAL RULES ER 1.6. Confidentiality of Information (a) A lawyer shall not reveal information relating to representation of a client unless the client consents after consultation, except for disclosures that are impliedly authorized in order to carry out the representation, and except as stated in paragraphs (b), (c) and (d) or ER 3.3(a)(2). (b) A lawyer shall reveal such information to the extent the lawyer reasonably believes necessary to prevent the client from committing a criminal act that the lawyer believes is likely to result in death or substantial bodily harm. (c) A lawyer may reveal the intention of his client to commit a crime and the information necessary to prevent the crime. (d) A lawyer may reveal such information to the extent the lawyer reasonably believes necessary to establish a claim or defense on behalf of the lawyer in a controversy between the lawyer and the client, to establish a defense to a criminal charge or civil claim against the lawyer based upon conduct in which the client was involved, or to respond to allegations in any proceedings concerning the lawyer's representation of the client. ER 1.7. Conflict of Interest: General Rule (a) A lawyer shall not represent a client if the representation of that client will be directly adverse to another client, unless: (1) the lawyer reasonably believes the representation will not adversely affect the relationship with the other client; and (2) each client consents after consultation. (b) A lawyer shall not represent a client if the representation of that client may be materially limited by the lawyer's responsibilities to another client or to a third person, or by the lawyer's own interests, unless: (1) the lawyer reasonably believes the representation will not be adversely affected; and (2) the client consents after consultation. When representation of multiple clients in a single matter is undertaken, the consultation shall include explanation of the implications of the common representation and the advantages and risks involved. * * * * ER 1.13. Organization as Client (a) A lawyer employed or retained by an organization represents the organization acting through its duly authorized constituents. (b) If a lawyer for an organization knows that an officer, employee or other person associated with the organization is engaged in action, intends to act or refuses to act in a matter related to the representation that is a violation of a legal obligation to the organization, or a violation of law which reasonably might be imputed to the organization, and is likely to result in substantial injury to the organization, the lawyer shall proceed as is reasonably necessary in the best interest of the organization. In determining how to proceed, the lawyer shall give due consideration to the seriousness of the violation and its consequences, the scope and nature of the lawyer's representation, the responsibility in the organization and the apparent motivation of the person involved, the policies of the organization concerning such matters and any other relevant considerations. Any measures taken shall be designed to minimize disruption of the organization and the risk of revealing information relating to the representation to persons outside the organization. Such measures may include among others: (1) asking reconsideration of the matter; (2) advising that a separate legal opinion on the matter be sought for presentation to appropriate authority in the organization; and (3) referring the matter to higher authority in the organization, including, if warranted by the seriousness of the matter, referral to the highest authority that can act in behalf of the organization as determined by applicable law. (c) If, despite the lawyer's efforts in accordance with paragraph (b), the highest authority that can act on behalf of the organization insists upon action, or a refusal to act, that is clearly a violation of law and is likely to result in substantial injury to the organization, the lawyer may resign in accordance with ER 1.16. (d) In dealing with an organization's directors, officers, employees, members, shareholders, or other constituents, a lawyer shall explain the identity of the client when it is apparent that the organization's interests are adverse to those of the constituents with whom the lawyer is dealing. (e) A lawyer representing an organization may also represent any of its directors, officers, employees, members, shareholders or other constituents, subject to the provisions of ER 1.7. If the organization's consent to the dual representation is required by ER 1.7, the consent shall be given by an appropriate official of the organization other than the individual who is to be represented, or by the shareholders. 1. Can a lawyer represent an entity that does not yet exist? Yes, as long as the incorporators understand that they are retaining counsel on behalf of the yet-to-be-formed entity and will need to ratify this corporate action, nunc pro tunc, once the entity is formed. According to ER 1.13(a), a lawyer may represent an "organization." The Comments to the Rule explain that an "organizational client is a legal entity, but it cannot act except through its officers, directors, employees, shareholders and other constituents. . . . The duties defined in this comment apply equally to unincorporated associations." An "organizational client" or "entity" can be a separate client. For purposes of the ethical analysis, this Opinion will refer to "corporations" as the entity at issue, but the analysis also is applicable to other legal entities. To determine whether a lawyer ethically may represent a yet-to-be-formed corporation, the analysis must include a review of Arizona corporate and partnership statutes. A.R.S. § 10-203 provides: A. Unless a delayed effective date is specified in the articles of incorporation, incorporation occurs and the corporate existence begins when the articles of incorporation and certificate of disclosure are delivered to the commission for filing. Under this statute, a corporation does not exist as a separate legal entity until its articles of incorporation are filed with the Corporation Commission. Section 10-204 of the Arizona Revised Statutes further cautions that individuals who attempt to transact business as a corporation, knowing that no corporation exists, will be jointly liable for their actions. Presumably, however, a newly formed corporation may ratify pre-incorporation acts of the corporation, nunc pro tunc. A decision from Wisconsin specifically holds that a lawyer hired to form an entity can represent the to-be-formed entity, not the incorporators, and the "entity" rule applies retroactively. Jesse v. Danforth, 485 N.W.2d 63 (Wis. 1992). This view would be consistent with the "entity" theory of representation, under ER 1.13(a). The "entity" theory holds that a lawyer may represent the corporation and does not, necessarily, represent any of the constituents that act on behalf of the entity - even if it is a closely held corporation. See, e.g., Skarbrevik v. Cohen, England & Whitfield, 282 Cal. Rptr. 627 (Cal. App. 1991); Bowen v. Smith, 838 P.2d 186 (Wyo. 1992). An alternative view is the "aggregate" theory in which the lawyer is found to represent the incorporators/constituents collectively as joint clients. See Griva v. Davison, 637 A.2d 830 (D.C. 1994). Under the aggregate theory, a lawyer represents multiple co-clients during formation of the corporation and then once the entity is formed, the clients must determine whether the lawyer will continue to represent all of the constituents and the entity, or just the entity. Who a lawyer may represent depends upon whether the lawyer's independent professional judgment would be materially limited because of the lawyer's duties to another client or third person. See ER 1.7(b); Matter of Shannon, 179 Ariz. 52, 876 P.2d 548 (1994). As discussed below in Section 3, there are specific disclosures that a lawyer must make to co-clients, in order for them to consent to a joint representation. Thus, a lawyer may represent an entity during the formation process, as long as the constituents who are acting on behalf of the yet-to-be-formed entity understand and agree to the entity being the client. 2. Can a lawyer represent only the yet-to-be-formed entity and not the constituents? Who a lawyer represents depends upon the reasonable perceptions of those who have consulted with the lawyer. In re Petrie, 154 Ariz. 295 (1987). When two or more individuals consult with a lawyer about forming an entity, it is the responsibility of the lawyer at that initial meeting to clarify who the lawyer will represent. ER 1.13 provides that a lawyer may represent an entity and the Rule suggests that the lawyer will not automatically be considered counsel for the constituents because paragraph (e) of the Rule provides: A lawyer representing an organization may also represent any of its directors, officers, employees, members, shareholders or other constituents, subject to the provisions of ER 1.7. If the organization's consent to the dual representation is required by ER 1.7, the consent shall be given by an appropriate official of the organization other than the individual who is to be represented, or by the shareholders. In Samaritan v. Goodfarb, 176 Ariz. 497, 508, 862 P.2d 870 (1993), the Arizona Supreme Court confirmed that a lawyer representing an entity does not automatically represent the constituents. Therefore, unless a lawyer wants to be counsel to all of the incorporators and the entity, the lawyer should specify that the lawyer does not represent the constituents collectively - the lawyer only represents the entity. If an engagement letter or oral representation by the lawyer suggests that the constituents are represented as an aggregate, then the lawyer will have ethical obligations to each constituent. Aggregate representation also is ethically proper if the disclosure to each client includes an explanation that the lawyer may have to withdraw from representing each client if a conflict arises among the clients. 3. What disclosures should a lawyer make to the incorporating constituents to obtain their informed consent to the limited representation of the entity? The underlying premise of the conflict Rules is loyalty to clients. Where a lawyer's independent professional judgment for a client is materially limited due to anything or anyone, a conflict may exist. Thus, in order to avoid inadvertent conflicts caused by misunderstandings of constituents in corporate representations, it is crucial for lawyers to specify exactly who they represent, who they do not represent, and how information conveyed to the lawyer by constituents of an entity client will be treated, for confidentiality purposes. The Restatement Third, The Law Governing Lawyers, Comment b to § 14 provides in part: "A lawyer may be held to responsibility of representation when the client reasonably relies on the existence of the relationship. . . ." See also Comment f: "[A] lawyer's failure to clarify whom the lawyer represents in circumstances calling for such a result might lead a lawyer to have entered into client-lawyer representations not intended by the lawyer." Therefore, it is crucial that a lawyer specify in the engagement agreement if the lawyer is not representing the constituents of an entity client. Even if the engagement letter specifies that the constituents are not clients, lawyers still should regularly caution constituents that they are not clients - particularly when they consult with counsel. Lawyers who represent entities also must be aware of the entity's potential fiduciary duties to the constituents, so that the lawyer does not run afoul of those statutory or common law obligations. For instance, there are cases that have held that lawyers may have fiduciary duties to non-clients, depending upon whether the entity represented had fiduciary duties to the third parties. See Fickett v. Superior Ct. of Pima Cty, 27 Ariz. App. 793, 558 P.2d 988 (1976); Matter of Estate of Shano, 177 Ariz. 550, 869 P.2d 1203 (App. 1993) (lawyer disqualified as counsel to administrator for an estate because of prior representation of one beneficiary and derivative duty of neutrality to all beneficiaries). Accordingly, lawyers for entities should be mindful of this potential responsibility and that a derivative fiduciary duty to constituents may cause a conflict of interest for the lawyer. The engagement letter also should explain that once the entity is created, the constituents agree to ratify the lawyer's services, nunc pro tunc on behalf of the entity. With respect to confidentiality obligations, lawyers should specify how information conveyed to the lawyer will be treated for confidentiality purposes. If the firm is representing only the entity, constituents must be advised that their communications to the lawyer will be conveyed to the other decision-makers for the entity and are not confidential as to the entity. The information is confidential, however, according to Rule 1.6(a), to the "outside world." Similarly, information shared by one co-client that is necessary for the representation of the other joint clients will be shared with the other co-clients because there is no individual confidentiality when a joint representation exists. Finally, if the lawyer has chosen to represent multiple clients, including the constituents and the entity, the lawyer should explain, at the beginning of the joint representation, that in the event that a conflict arises among the clients, the lawyer most likely will need to withdraw from representing all of the co-clients. However, some commentators, including the Restatement Third, note that the engagement agreement may provide that in the event of a conflict, the lawyer may withdraw from representing one of the co-clients and continue to represent the remaining clients. The usefulness of such provisions was recently demonstrated in In re Rite Aid Corp. Securities Litigation v. Grass, 139 F. Supp. 2d 649 (E.D. Pa. April 17, 2001), where the court permitted the law firm to withdraw as counsel for one of the executives of Rite Aid and continue as counsel for the entity in a class action suit, primarily because the engagement agreement provided for such action. Partnerships, however, are not required to make a filing to establish their existence; a partnership exists once there is an "association of two or more persons to carry on as co-owners [of] a business for profit. . . whether or not the persons intend to form a partnership." A.R.S. § 29-1012.A.
<urn:uuid:628bc5eb-5e67-44ad-8cc9-370be4bcdb5e>
CC-MAIN-2017-04
http://www.azbar.org/Ethics/EthicsOpinions/ViewEthicsOpinion?id=290
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00353-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953352
3,154
1.90625
2
News From the Field Math Used as a Tool to Heal Toughest of Wounds September 21, 2009 Scientists expect a new mathematical model of chronic wound healing could replace intuition with clear guidance on how to test treatment strategies in tackling a major public-health problem. The researchers are the first to publish a mathematical model of an ischemic wound -- a chronic wound that heals slowly or is in danger of never healing because it is fed by an inadequate blood supply. Ohio State University The National Science Foundation (NSF) is an independent federal agency that supports fundamental research and education across all fields of science and engineering. In fiscal year (FY) 2016, its budget is $7.5 billion. NSF funds reach all 50 states through grants to nearly 2,000 colleges, universities and other institutions. Each year, NSF receives more than 48,000 competitive proposals for funding and makes about 12,000 new funding awards. NSF also awards about $626 million in professional and service contracts yearly. Get News Updates by Email Useful NSF Web Sites: NSF Home Page: https://www.nsf.gov NSF News: https://www.nsf.gov/news/ For the News Media: https://www.nsf.gov/news/newsroom.jsp Science and Engineering Statistics: https://www.nsf.gov/statistics/ Awards Searches: https://www.nsf.gov/awardsearch/
<urn:uuid:543bde0d-d126-4d7f-932e-9f217e01cdff>
CC-MAIN-2016-44
https://www.nsf.gov/news/news_summ.jsp?cntn_id=115701
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00035-ip-10-171-6-4.ec2.internal.warc.gz
en
0.897078
308
2.546875
3
- 2 updates Norman Cornish, one of the north's most famous artists, has turned 94 today. Recently his family found thousands of previously unseen sketches and paintings at his home in County Durham. Some were in old notepads, others on pieces of rolled-up brown paper. Norman, doesn't usually do interviews anymore but he granted us a rare visit to talk about his work. One of the north's most famous artists is celebrating his 94th birthday today and he has a new exhibition. Norman Cornish has very strong connections with Cumbria. He exhibited at Tullie House in Carlisle in 1950, also working closely with the Cumbrian artist Sheila Fell. Lori Carnochan reports:
<urn:uuid:4353f5bb-9806-48b6-bfc4-8234222fbfea>
CC-MAIN-2017-04
http://www.itv.com/news/border/story/2013-11-19/artist-celebrated-in-cumbria/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00085-ip-10-171-10-70.ec2.internal.warc.gz
en
0.9888
155
1.78125
2
Later this year the Supreme Court will decide two cases posing the question whether dying patients have a right to choose death rather than continued pain and suffering.1 We print here the brief filed as amicus curiae in these cases by the group of six moral philosophers listed above, with an introduction by Ronald Dworkin. We cannot be sure, until the Supreme Court decides the assisted suicide cases and its decision is published, how far the justices might have accepted or rejected the arguments of the brief published below.2 In this introduction I shall describe the oral argument before them last January, and offer some suggestions about how, if they decide against the brief’s position, as many commentators now think they will, they might do the least damage to constitutional law. The laws of all but one American state now forbid doctors to prescribe lethal pills for patients who want to kill themselves.3 These cases began when groups of dying patients and their doctors in Washington State and New York each sued asking that these prohibitions be declared unconstitutional so that the patients could be given, when and if they asked for it, medicine to hasten their death. The pleadings described the agony in which the patient plaintiffs were dying, and two federal Circuit Courts of Appeal—the Ninth Circuit in the Washington case and the Second Circuit in the New York case—agreed with the plaintiffs that the Constitution forbids the government from flatly prohibiting doctors to help end such desperate and pointless suffering.4 Washington State and New York appealed these decisions to the Supreme Court, and a total of sixty amicus briefs were filed, including briefs on behalf of the American Medical Association and the United States Catholic Conference urging the Court to reverse the circuit court decisions, and on behalf of the AmericanMedical Students Association and the Gay Men’s Health Crisis urging it to affirm them. The justices’ comments during oral argument persuaded many observers that the Court would reverse the decisions, probably by a lopsided majority. The justices repeatedly cited two versions—one theoretical, the other practical—of the “slippery slope” argument: that it would be impossible to limit a right to assisted suicide in an acceptable way, once that right was recognized. The theoretical version of the argument denies that any principled line can be drawn between cases in which proponents say a right of assisted suicide is appropriate and those in which they concede that it is not. The circuit courts recognized only a right for competent patients already dying in great physical pain to have pills prescribed that they could take themselves. Several justices asked on what grounds the right once granted could be so severely limited. Why should it be denied to dying patients who are so feeble or paralyzed that they cannot take pills themselves and who beg a doctor to inject a lethal drug into them? Or to patients who are not dying but face years of intolerable physical or emotional pain, or crippling paralysis or dependence? But if the right were extended that far, on what ground could it be denied to anyone who had formed a desire to die—to a sixteen-year-old suffering from a severe case of unrequited love, for example? The philosophers’ brief answers these questions in two steps. First, it defines a very general moral and constitutional principle—that every competent person has the right to make momentous personal decisions which invoke fundamental religious or philosophical convictions about life’s value for himself. Second, it recognizes that people may make such momentous decisions impulsively or out of emotional depression, when their act does not reflect their enduring convictions; and it therefore allows that in some circumstances a state has the constitutional power to override that right in order to protect citizens from mistaken but irrevocable acts of self-destruction. States may be allowed to prevent assisted suicide by people who—it is plausible to think—would later be grateful if they were prevented from dying. That two-step argument would justify a state’s protecting a disappointed adolescent from himself. It would equally plainly not justify forcing a competent dying patient to live in agony a few weeks longer. People will of course disagree about the cases in between these extremes, and if the Court adopted this argument, the federal courts would no doubt be faced with a succession of cases in years to come testing whether, for example, it is plausible to assume that a desperately crippled patient in constant pain but with years to live, who has formed a settled and repeatedly stated wish to die, would one day be glad he was forced to stay alive. But though two justices dwelled, during the oral argument, on the unappealing prospect of a series of such cases coming before the courts, it seems better that the courts do assume that burden, which they could perhaps mitigate through careful rulings, than that they be relieved of it at the cost of such terrible suffering. The practical version of the slippery slope argument is more complex. If assisted suicide were permitted in principle, every state would presumably adopt regulations to insure that a patient’s decision for suicide is informed, competent, and free. But many people fear that such regulations could not be adequately enforced, and that particularly vulnerable patients—poor patients dying in overcrowded hospitals that had scarce resources, for example—might be pressured or hustled into a decision for death they would not otherwise make. The evidence suggests, however, that such patients might be better rather than less well protected if assisted suicide were legalized with appropriate safeguards. More of them could then benefit from relief that is already available—illegally—to more fortunate people who have established relationships with doctors willing to run the risks of helping them to die. The current two-tier system—a chosen death and an end of pain outside the law for those with connections and stony refusals for most other people—is one of the greatest scandals of contemporary medical practice. The sense many middle-class people have that if necessary their own doctor “will know what to do” helps to explain why the political pressure is not stronger for a fairer and more open system in which the law acknowledges for everyone what influential people now expect for themselves. For example, in a recent study in the state of Washington, which guaranteed respondents anonymity, 26 percent of doctors surveyed said they had received explicit requests for help in dying, and had provided, overall, lethal prescriptions to 24 percent of patients requesting them.5 In other studies, 40 percent of Michigan oncologists surveyed reported that patients had initiated requests for death, 18 percent said they had participated in assisted suicide, and 4 percent in “active euthanasia”—injecting lethal drugs themselves. In San Francisco, 53 percent of the 1,995 responding physicians said they had granted an AIDS patient’s request for suicide assistance at least once.6 These statistics approach the rates at which doctors help patients die in Holland, where assisted suicide is in effect legal. The most important benefit of legalized assisted suicide for poor patients however, might be better care while they live. For though the medical experts cited in various briefs disagreed sharply about the percentage of terminal cases in which pain can be made tolerable through advanced and expensive palliative techniques, they did not disagree that a great many patients do not receive the relief they could have. The Solicitor General who urged the Court to reverse the lower court judgments conceded in the oral argument that 25 percent of terminally ill patients actually do die in pain. That appalling figure is the result of several factors, including medical ignorance and fear of liability, inadequate hospital funding, and (as the Solicitor General suggested)the failure of insurers and health care programs to cover the cost of special hospice care. Better training in palliative medicine, and legislation requiring such coverage, would obviously improve the situation, but it seems perverse to argue that the patients who would be helped were better pain management available must die horribly because it is not; and, as Justice Breyer pointed out, the number of patients in that situation might well increase as medical costs continue to escalate. According to several briefs, moreover, patients whose pain is either uncontrollable or uncontrolled are often “terminally sedated”—intravenous drugs (usually barbiturates or benzodiazepenes) are injected to induce a pharmacologic coma during which the patient is given neither water nor nutrition and dies sooner than he otherwise would.7 Terminal sedation is widely accepted as legal, though it advances death.8 But it is not subject to regulations nearly as stringent as those that a state forced to allow assisted suicide would enact, because such regulations would presumably include a requirement that hospitals, before accepting any request for assistance in suicide, must demonstrate that effective medical care including state-of-the-art pain management had been offered. The guidelines recently published by a network of ethics committees in the Bay Area of California, for example, among other stringent safeguards, provide that a primary care physician who receives a request for suicide must make an initial referral to a hospice program or to a physician experienced in palliative care, and certify in a formal report filed in a state registry, signed by an independent second physician with expertise in such care, that the best available pain relief has been offered to the patient.9 Doctors and hospitals anxious to avoid expense would have very little incentive to begin a process that would focus attention on their palliative care practices. They would be more likely to continue the widespread practice of relatively inexpensive terminal care which is supplemented, perhaps, with terminal sedation. It is at least possible, however, that patients’ knowledge of the possibility of assisted suicide would make it more difficult for such doctors to continue as before. That is the view of the Coalition of Hospice Professionals, who said, in their own amicus brief, “Indeed, removing legal bans on suicide assistance will enhance the opportunity for advanced hospice care for all patients because regulation of physician-assisted suicide would mandate that all palliative measures be exhausted as a condition precedent to assisted suicide.” So neither version of the slippery slope argument seems very strong. It is nevertheless understandable that Supreme Court justices are reluctant, particularly given how little experience we have so far with legalized assisted suicide, to declare that all but one of the states must change their laws to allow a practice many citizens think abominable and sacrilegious. But as the philosophers’ brief that follows emphasizes, the Court is in an unusually difficult position. If it closes the door to a constitutional right to assisted suicide it will do substantial damage to constitutional practice and precedent, as well as to thousands of people in great suffering. It would face a dilemma in justifying any such decision, because it would be forced to choose between the two unappealing strategies that the brief describes. The first strategy—declaring that terminally ill patients in great pain do not have a constitutional right to control their own deaths, even in principle—seems alien to our constitutional system, as the Solicitor General himself insisted in the oral argument. It would also undermine a variety of the Court’s own past decisions, including the carefully constructed position on abortion set out in its 1993 decision in Casey. Indeed some amicus briefs took the occasion of the assisted suicide cases to criticize the abortion decisions—a brief filed on behalf of Senator Orrin Hatch of Utah and Representatives Henry Hyde of Illinois and Charles Canady of Florida, for example, declared that the abortion decisions were “of questionable legitimacy and even more questionable prudence.” Protecting the abortion rulings was presumably one of the aims of the Clinton administration in arguing, through the Solicitor General, for the second strategy instead. The first strategy would create an even more evident inconsistency within the practice of terminal medicine itself. Since the Cruzan decision discussed in the brief, lawyers have generally assumed that the Court would protect the right of any competent patient to have life sustaining equipment removed from his body even though he would then die. In the oral argument, several justices suggested a “common-sense” distinction between the moral significance of acts, on the one hand, and omissions, on the other. This distinction, they suggested, would justify a constitutional distinction between prescribing lethal pills and removing life support; for, in their view, removing support is only a matter of “letting nature take its course,” while prescribing pills is an active intervention that brings death sooner than natural processes would. The discussion of this issue in the philosophers’ brief is therefore particularly significant. The brief insists that such suggestions wholly misunderstand the “common-sense” distinction, which is not between acts and omissions, but between acts or omissions that are designed to cause death and those that are not. One justice suggested that a patient who insists that life support be disconnected is not committing suicide. That is wrong:he is committing suicide if he aims at death, as most such patients do, just as someone whose wrist is cut in an accident is committing suicide if he refuses to try to stop the bleeding. The distinction between acts that aim at death and those that do not cannot justify a constitutional distinction between assisting in suicide and terminating life support. Some doctors, who stop life support only because the patient so demands, do not aim at death. But neither do doctors who prescribe lethal pills only for the same reason, and hope that the patient does not take them. And many doctors who terminate life support obviously do aim at death, including those who deny nutrition during terminal sedation, because denying nutrition is designed to hasten death, not to relieve pain. There are equally serious objections, however, to the second strategy the philosophers’ brief discusses. This strategy concedes a general right to assisted suicide but holds that states have the power to judge that the risks of allowing any exercise of that right are too great. It is obviously dangerous for the Court to allow a state to deny a constitutional right on the ground that the state lacks the will or resource to enforce safeguards if it is exercised, particularly when the case for the practical version of the “slippery slope” objection seems so weak and has been little examined. As Justice Rehnquist, who perhaps favors the first strategy, observed in the oral argument, “[I]f we assume a liberty interest but nevertheless say that, even assuming a liberty interest, a state can prohibit it entirely, that would be rather a conundrum.”10 If the justices believe that they cannot now accept the lower court decisions, in spite of the powerful defense offered by the respondents and the various briefs supporting them, then they should consider a third strategy—postponement. They might declare that both precedent and principle offer strong grounds for a constitutional right to manage one’s own death, but that there is as yet too little experience with legally permitted assisted suicide for the Court to rule that states lack the constitutional power to follow their traditional practice of outlawing it. That third strategy, unlike the first two, would in effect commit the Court to considering a new challenge in the future when a much more substantial record of experience is available—from Oregon and any other American state that follows its lead in permitting assisted suicide by legislation, and from the Netherlands, Switzerland, the Northern Territories of Australia, and any other jurisdiction whose legislature takes the same course. In the meantime, the public would have had an opportunity to participate more fully in the argument about principle; and, when circumstances make it possible, wide public discussion is a desirable and democratic preliminary to a final Supreme Court adjudication.11 Postponement is not what the philosophers’ brief urges. But it would be the most statesmanlike way in which the Court could make the wrong decision. —February 27, 1997 THE BRIEF OF THE AMICI CURIAE Interest of the Amici Curiae Amici are six moral and political philosophers who differ on many issues of public morality and policy. They are united, however, in their conviction that respect for fundamental principles of liberty and justice, as well as for the American constitutional tradition, requires that the decisions of the Courts of Appeals be affirmed. Introduction and Summary of Argument These cases do not invite or require the Court to make moral, ethical, or religious judgments about how people should approach or confront their death or about when it is ethically appropriate to hasten one’s own death or to ask others for help in doing so. On the contrary, they ask the Court to recognize that individuals have a constitutionally protected interest in making those grave judgments for themselves, free from the imposition of any religious or philosophical orthodoxy by court or legislature. States have a constitutionally legitimate interest in protecting individuals from irrational, ill-informed, pressured, or unstable decisions to hasten their own death. To that end, states may regulate and limit the assistance that doctors may give individuals who express a wish to die. But states may not deny people in the position of the patient-plaintiffs in these cases the opportunity to demonstrate, through whatever reasonable procedures the state might institute—even procedures that err on the side of caution—that their decision to die is indeed informed, stable, and fully free. Denying that opportunity to terminally ill patients who are in agonizing pain or otherwise doomed to an existence they regard as intolerable could only be justified on the basis of a religious or ethical conviction about the value or meaning of life itself. Our Constitution forbids government to impose such convictions on its citizens. Petitioners [i.e., the state authorities of Washington and New York] and the amici who support them offer two contradictory arguments. Some deny that the patient-plaintiffs have any constitutionally protected liberty interest in hastening their own deaths. But that liberty interest flows directly from this Court’s previous decisions. It flows from the right of people to make their own decisions about matters “involving the most intimate and personal choices a person may make in a lifetime, choices central to personal dignity and autonomy.” Planned Parenthoodv. Casey, 505 U.S. 833, 851 (1992). The Solicitor General, urging reversal in support of Petitioners, recognizes that the patient-plaintiffs do have a constitutional liberty interest at stake in these cases. See Brief for the United States as Amicus Curiae Supporting Petitioners at 12, Washingtonv. Vacco [hereinafter Brief for the United States] (“The term ‘liberty’ in the Due Process Clause…is broad enough to encompass an interest on the part of terminally ill, mentally competent adults in obtaining relief from the kind of suffering experienced by the plaintiffs in this case, which includes not only severe physical pain, but also the despair and distress that comes from physical deterioration and the inability to control basic bodily functions.”); see also id. at 13 (“Cruzan…supports the conclusion that a liberty interest is at stake in this case.”). The Solicitor General nevertheless argues that Washington and New York properly ignored this profound interest when they required the patient-plaintiffs to live on in circumstances they found intolerable. He argues that a state may simply declare that it is unable to devise a regulatory scheme that would adequately protect pa-tients whose desire to die might be ill-informed or unstable or foolish or not fully free, and that a state may therefore fall back on a blanket prohibition. This Court has never accepted that patently dangerous rationale for denying protection altogether to a conceded fundamental constitutional interest. It would be a serious mistake to do so now. If that rationale were accepted, an interest acknowledged to be constitutionally protected would be rendered empty. I. The Liberty Interest Asserted Here is Protected by the Due The Due Process Clause of the Fourteenth Amendment protects the liberty interest asserted by the patient-plaintiffs here. Certain decisions are momentous in their impact on the character of a person’s life—decisions about religious faith, political and moral allegiance, marriage, procreation, and death, for example. Such deeply personal decisions pose controversial questions about how and why human life has value. In a free society, individuals must be allowed to make those decisions for themselves, out of their own faith, conscience, and convictions. This Court has insisted, in a variety of contexts and circumstances, that this great freedom is among those protected by the Due Process Clause as essential to a community of “ordered liberty.” Palko v. Connecticut, 302 U.S. 319, 325 (1937). In its recent decision in Planned Parenthood v. Casey, 505 U.S. 833, 851 (1992), the Court offered a paradigmatic statement of that principle: matters involving the most intimate and personal choices a person may make in a lifetime, choices central to a person’s dignity and autonomy, are central to the liberty protected by the Fourteenth Amendment. That declaration reflects an idea underlying many of our basic constitutional protections.[1.1] As the Court explained in West Virginia State Board of Education v. Barnette, 319 U.S. 624, 642 (1943): If there is any fixed star in our constitutional constellation, it is that no official…can prescribe what shall be orthodox in politics, nationalism, religion, or other matters of opinion or force citizens to confess by word or act their faith therein. A person’s interest in following his own convictions at the end of life is so central a part of the more general right to make “intimate and personal choices” for himself that a failure to protect that particular interest would undermine the general right altogether. Death is, for each of us, among the most significant events of life. As the Chief Justice said in Cruzanv. Missouri, 497 U.S. 261, 281(1990), “[t]he choice between life and death is a deeply personal decision of obvious and overwhelming finality.” Most of us see death—whatever we think will follow it—as the final act of life’s drama, and we want that last act to reflect our own convictions, those we have tried to live by, not the convictions of others forced on us in our most vulnerable moment. Different people, of different religious and ethical beliefs, embrace very different convictions about which way of dying confirms and which contradicts the value of their lives. Some fight against death with every weapon their doctors can devise. Others will do nothing to hasten death even if they pray it will come soon. Still others, including the patient-plaintiffs in these cases, want to end their lives when they think that living on, in the only way they can, would disfigure rather than enhance the lives they had created. Some people make the latter choice not just to escape pain. Even if it were possible to eliminate all pain for a dying patient—and frequently that is not possible—that would not end or even much alleviate the anguish some would feel at remaining alive, but intubated, helpless, and often sedated near oblivion. None of these dramatically different attitudes about the meaning of death can be dismissed as irrational. None should be imposed, either by the pressure of doctors or relatives or by the fiat of government, on people who reject it. Just as it would be intolerable for government to dictate that doctors never be permitted to try to keep someone alive as long as possible. when that is what the patient wishes, so it is intolerable for government to dictate that doctors may never, under any circumstances, help someone to die who believes that further life means only degradation. The Constitution insists that people must be free to make these deeply personal decisions for themselves and must not be forced to end their lives in a way that appalls them, just because that is what some majority thinks proper. II. This Court’s Decisions in Casey and Cruzan Compel Recognition of a Liberty Interest Here A. Casey Supports the Liberty Interest Asserted Here In Casey, this Court, in holding that a state cannot constitutionally proscribe abortion in all cases, reiterated that the Constitution protects a sphere of autonomy in which individuals must be permitted to make certain decisions for themselves. The Court began its analysis by pointing out that “[a]t the heart of liberty is the right to define one’s own concept of existence, of meaning, of the universe, and of the mystery of human life.” 505 U.S. at 851. Choices flowing out of these conceptions, on matters “involving the most intimate and personal choices a person may make in a lifetime, choices central to personal dignity and autonomy, are central to the liberty protected by the Fourteenth Amendment.” Id. “Beliefs about these matters,” the Court continued, “could not define the attributes of personhood were they formed under compulsion of the State.” Id. In language pertinent to the liberty interest asserted here, the Court explained why decisions about abortion fall within this category of “personal and intimate” decisions. A decision whether or not to have an abortion, “originat[ing] within the zone of conscience and belief,” involves conduct in which “the liberty of the woman is at stake in a sense unique to the human condition and so unique to the law.” Id. at 852. As such, the decision necessarily involves the very “destiny of the woman” and is inevitably “shaped to a large extent on her own conception of her spiritual imperatives and her place in society.” Id. Precisely because of these characteristics of the decision, “the State is [not] entitled to proscribe [abortion] in all instances.” Id. Rather, to allow a total prohibition on abortion would be to permit a state to impose one conception of the meaning and value of human existence on all individuals. This the Constitution forbids. The Solicitor General nevertheless argues that the right to abortion could be supported on grounds other than this autonomy principle, grounds that would not apply here. He argues, for example, that the abortion right might flow from the great burden an unwanted child imposes on its mother’s life. Brief for the United States at 14-15. But whether or not abortion rights could be defended on such grounds, they were not the grounds on which this Court in fact relied. To the contrary, the Court explained at length that the right flows from the constitutional protection accorded all individuals to “define one’s own concept of existence, of meaning, of the universe, and of the mystery of human life.” Casey, 505 U.S. at 851. The analysis in Casey compels the conclusion that the patient-plaintiffs have a liberty interest in this case that a state cannot burden with a blanket prohibition. Like a woman’s decision whether to have an abortion, a decision to die involves one’s very “destiny” and inevitably will be “shaped to a large extent on [one’s] own conception of [one’s] spiritual imperatives and [one’s] place in society.” Id. at 852. Just as a blanket prohibition on abortion would involve the improper imposition of one conception of the meaning and value of human existence on all individuals, so too would a blanket prohibition on assisted suicide. The liberty interest asserted here cannot be rejected without undermining the rationale of Casey. Indeed, the lower court opinions in the Washington case expressly recognized the parallel between the liberty interest in Casey and the interest asserted here. See Compassion in Dying v. Washington, 79 F.3d 790, 801 (9th Cir. 1996) (en banc) (“In deciding right-to-die cases, we are guided by the Court’s approach to the abortion cases. Casey in particular provides a powerful precedent, for in that case the Court had the opportunity to evaluate its past decisions and to determine whether to adhere to its original judgment.”), aff’g, 850 F. Supp. 1454, 1459 (W.D. Wash. 1994) (“[T]he reasoning in Casey [is] highly instructive and almost prescriptive…”). This Court should do the same. B. Cruzan Supports the Liberty Interest Asserted Here We agree with the Solicitor Gen-eral that this Court’s decision in “Cruzan…supports the conclusion that a liberty interest is at stake in this case.” Brief for the United States at 8. Petitioners, however, insist that the present cases can be distinguished because the right at issue in Cruzan was limited to a right to reject an unwanted invasion of one’s body.[2.1] But this Court repeatedly has held that in appropriate circumstances a state may require individuals to accept unwanted invasions of the body. See, e.g., Schmerber v. California, 384 U.S. 757 (1966) (extraction of blood sample from individual suspected of driving while intoxicated, notwithstanding defendant’s objection, does not violate privilege against self-incrimination or other constitutional rights); jacobson v. Massachusetts, 197 U.S. 11 (1905) (upholding compulsory vaccination for smallpox as reasonable regulation for protection of public health). The liberty interest at stake in Cruzan was a more profound one. If a competent patient has a constitutional right to refuse life-sustaining treatment, then, the Court implied, the state could not override that right. The regulations upheld in Cruzan were designed only to ensure that the individual’s wishes were ascertained correctly. Thus, if Cruzan implies a right of competent patients to refuse life-sustaining treatment, that implication must be understood as resting not simply on a right to refuse bodily invasions but on the more profound right to refuse medical intervention when what is at stake is a momentous personal decision, such as the timing and manner of one’s death. In her concurrence, Justice O’Connor expressly recognized that the right at issue involved a “deeply personal decision” that is “inextricably intertwined” with our notion of “self-determination.” 497 U.S. at 287-89. Cruzan also supports the proposition that a state may not burden a terminally ill patient’s liberty interest in determining the time and manner of his death by prohibiting doctors from terminating life support. Seeking to distinguish Cruzan, Petitioners insist that a state may nevertheless burden that right in a different way by forbidding doctors to assist in the suicide of patients who are not on life-support machinery. They argue that doctors who remove life support are only allowing a natural process to end in death whereas doctors who prescribe lethal drugs are intervening to cause death. So, according to this argument, a state has an independent justification for forbidding doctors to assist in suicide that it does not have for forbidding them to remove life support. In the former case though not the latter, it is said, the state forbids an act of killing that is morally much more problematic than merely letting a patient die. This argument is based on a misunderstanding of the pertinent moral principles. It is certainly true that when a patient does not wish to die, different acts, each of which foreseeably results in his death, nevertheless have very different moral status. When several patients need organ transplants and organs are scarce, for example, it is morally permissible for a doctor to deny an organ to one patient, even though he will die without it, in order to give it to another. But it is certainly not permissible for a doctor to kill one patient in order to use his organs to save another. The morally significant difference between those two acts is not, however, that killing is a positive act and not providing an organ is a mere omission, or that killing someone is worse than merely allowing a “natural” process to result in death. It would be equally impermissible for a doctor to let an injured patient bleed to death, or to refuse antibiotics to a patient with pneumonia—in each case the doctor would have allowed death to result from a “natural” process—in order to make his organs available for transplant to others. A doctor violates his patient’s rights whether the doctor acts or refrains from acting, against the patient’s wishes, in a way that is designed to cause death. When a competent patient does want to die, the moral situation is obviously different, because then it makes no sense to appeal to the patient’s right not to be killed as a reason why an act designed to cause his death is impermissible. From the patient’s point of view, there is no morally pertinent difference between a doctor’s terminating treatment that keeps him alive, if that is what he wishes, and a doctor’s helping him to end his own life by providing lethal pills he may take himself, when ready, if that is what he wishes—except that the latter may be quicker and more humane. Nor is that a pertinent difference from the doctor’s point of view. If and when it is permissible for him to act with death in view, it does not matter which of those two means he and his patient choose. If it is permissible for a doctor deliberately to withdraw medical treatment in order to allow death to result from a natural process, then it is equally permissible for him to help his patient hasten his own death more actively, if that is the patient’s express wish. It is true that some doctors asked to terminate life support are reluctant and do so only in deference to a patient’s right to compel them to remove unwanted invasions of his body. But other doctors, who believe that their most fundamental professional duty is to act in the patient’s interests and that, in certain circumstances, it is in their patient’s best interests to die, participate willingly in such decisions: they terminate life support to cause death because they know that is what their patient wants. Cruzan implied that a state may not absolutely prohibit a doctor from deliberately causing death, at the patient’s request, in that way and for that reason. If so, then a state may not prohibit doctors from deliberately using more direct and often more humane means to the same end when that is what a patient prefers. The fact that failing to provide life-sustaining treatment may be regarded as “only letting nature take its course” is no more morally significant in this context, when the patient wishes to die, than in the other, when he wishes to live. Whether a doctor turns off a respirator in accordance with the patient’s request or prescribes pills that a patient may take when he is ready to kill himself, the doctor acts with the same intention: to help the patient die. The two situations do differ in one important respect. Since patients have a right not to have life-support machinery attached to their bodies, they have, in principle, a right to compel its removal. But that is not true in the case of assisted suicide: patients in certain circumstances have a right that the state not forbid doctors to assist in their deaths, but they have no right to compel a doctor to assist them. The right in question, that is, is only a right to the help of a willing doctor. III. State Interests do not Justify a Categorical Prohibition on all The Solicitor General concedes that “a competent, terminally ill adult has a constitutionally cognizable liberty interest in avoiding the kind of suffering experienced by the plaintiffs in this case.” Brief for the United States at 8. He agrees that this interest extends not only to avoiding pain, but to avoiding an existence the patient believes to be one of intolerable indignity or incapacity as well. Id. at 12. The Solicitor General argues, however, that states nevertheless have the right to “override” this liberty interest altogether, because a state could reasonably conclude that allowing doctors to assist in suicide, even under the most stringent regulations and procedures that could be devised, would unreasonably endanger the lives of a number of patients who might ask for death in circumstances when it is plainly not in their interests to die or when their consent has been improperly obtained. This argument is unpersuasive, however, for at least three reasons. First, in Cruzan, this Court noted that its various decisions supported the recognition of a general liberty interest in refusing medical treatment, even when such refusal could result in death. 497 U.S. at 278-79. The various risks described by the Solicitor General apply equally to those situations. For instance, a patient kept alive only by an elaborate and disabling life-support system might well become depressed, and doctors might be equally uncertain whether the depression is curable: such a patient might decide for death only because he has been advised that he will die soon anyway or that he will never live free of the burdensome apparatus, and either diagnosis might conceivably be mistaken. Relatives or doctors might subtly or crudely influence that decision, and state provision for the decision may (to the same degree in this case as if it allowed assisted suicide) be thought to encourage it. Yet there has been no suggestion that states are incapable of addressing such dangers through regulation. In fact, quite the opposite is true. In McKay v. Bergstedt, 106 Nev. 808, 801 P.2d 617 (1990), for example, the Nevada Supreme Court held that “competent adult patients desiring to refuse or discontinue medical treatment” must be examined by two non-attending physicians to determine whether the patient is mentally competent, understands his prognosis and treatment options, and appears free of coercion or pressure in making his decision. Id. at 827-28, 801 P.2d at 630. See also: id. (in the case of terminally-ill patients with natural life expectancy of less than six months, [a] patient’s right of self-determination shall be deemed to prevail over state interests, whereas [a] non-terminal patient’s decision to terminate life-support systems must first be weighed against relevant state interests by trial judge); [and] In re Farrell, 108 N.J. 335, 354, 529 A.2d 404, 413 (1987) ([which held that a] terminally-ill patient requesting termination of life-support must be determined to be competent and properly informed about [his] prognosis, available treatment options and risks, and to have made decision voluntarily and without coercion). Those protocols served to guard against precisely the dangers that the Solicitor General raises. The case law contains no suggestion that such protocols are inevitably insufficient to prevent deaths that should have been prevented. Indeed, the risks of mistake are overall greater in the case of terminating life support. Cruzan implied that a state must allow individuals to make such decisions through an advance directive stipulating either that life support be terminated (or not initiated) in described circumstances when the individual was no longer competent to make such a decision himself, or that a designated proxy be allowed to make that decision. All the risks just described are present when the decision is made through or pursuant to such an advance directive, and a grave further risk is added: that the directive, though still in force, no longer represents the wishes of the patient. The patient might have changed his mind before he became incompetent, though he did not change the directive, or his proxy may make a decision that the patient would not have made himself if still competent. In Cruzan, this Court held that a state may limit these risks through reasonable regulation. It did not hold—or even suggest—that a state may avoid them through a blanket prohibition that, in effect, denies the liberty interest altogether. Second, nothing in the record supports the [Solicitor General’s] conclusion that no system of rules and regulations could adequately reduce the risk of mistake. As discussed above, the experience of states in adjudicating requests to have life-sustaining treatment removed indicates the opposite.[3.1] The Solicitor General has provided no persuasive reason why the same sort of procedures could not be applied effectively in the case of a competent individual’s request for physician-assisted suicide. Indeed, several very detailed schemes for regulating physician-assisted suicide have been submitted to the voters of some states[4.1] and one has been enacted.[5.1] In addition, concerned groups, including a group of distinguished professors of law and other professionals, have drafted and defended such schemes. See, e.g., Charles H. Baron, et. al., A Model State Act to Authorize and Regulate Physician-Assisted Suicide, 33 Harv. J. Legis. 1 (1996). Such draft statutes propose a variety of protections and review procedures designed to insure against mistakes, and neither Washington nor New York attempted to show that such schemes would be porous or ineffective. Nor does the Solicitor General’s brief: it relies instead mainly on flat and conclusory statements. It cites a New York Task Force report, written before the proposals just described were drafted, whose findings have been widely disputed and were implicitly rejected in the opinion of the Second Circuit below. See generally Quill v. Vacco, 80 F.3d 716 (2d Cir. 1996). The weakness of the Solicitor General’s argument is signaled by his strong reliance on the experience in the Netherlands which, in effect, allows assisted suicide pursuant to published guidelines. Brief for the United States at 23-24. The Dutch guidelines are more permissive than the proposed and model American statutes, however. The Solicitor General deems the Dutch practice of ending the lives of people like neo-nates who cannot consent particularly noteworthy, for example, but that practice could easily and effectively be made illegal by any state regulatory scheme without violating the Constitution. The Solicitor General’s argument would perhaps have more force if the question before the Court were simply whether a state has any rational basis for an absolute prohibition; if that were the question, then it might be enough to call attention to risks a state might well deem not worth running. But as the Solicitor General concedes, the question here is a very different one: whether a state has interests sufficiently compelling to allow it to take the extraordinary step of altogether refusing the exercise of a liberty interest of constitutional dimension. In those circumstances, the burden is plainly on the state to demonstrate that the risk of mistakes is very high, and that no alternative to complete prohibition would adequately and effectively reduce those risks. Neither of the Petitioners has made such a showing. Nor could they. The burden of proof on any state attempting to show this would be very high. Consider, for example, the burden a state would have to meet to show that it was entitled altogether to ban public speeches in favor of unpopular causes because it could not guarantee, either by regulations short of an outright ban or by increased police protection, that such speeches would not provoke a riot that would result in serious injury or death to an innocent party. Or that it was entitled to deny those accused of crime the procedural rights that the Constitution guarantees, such as the right to a jury trial, because the security risk those rights would impose on the community would be too great. One can posit extreme circumstances in which some such argument would succeed. See, e.g., Korematsu v. United States, 323 U.S. 214 (1944) (permitting United States to detain individuals of Japanese ancestry during wartime). But these circumstances would be extreme indeed, and the Korematsu ruling has been widely and severely criticized. Third, it is doubtful whether the risks the Solicitor General cites are even of the right character to serve as justification for an absolute prohibition on the exercise of an important liberty interest. The risks fall into two groups. The first is the risk of medical mistake, including a misdiagnosis of competence or terminal illness. To be sure, no scheme of regulation, no matter how rigorous, can altogether guarantee that medical mistakes will not be made. But the Constitution does not allow a state to deny patients a great variety of important choices, for which informed consent is properly deemed necessary, just because the information on which the consent is given may, in spite of the most strenuous efforts to avoid mistake, be wrong. Again, these identical risks are present in decisions to terminate life support, yet they do not justify an absolute prohibition on the exercise of the right. The second group consists of risks that a patient will be unduly influenced by considerations that the state might deem it not in his best interests to be swayed by, for example, the feelings and views of close family members. Brief for the United States at 20. But what a patient regards as proper grounds for such a decision normally reflects exactly the judgments of personal ethics—of why his life is important and what affects its value—that patients have a crucial liberty interest in deciding for themselves. Even people who are dying have a right to hear and, if they wish, act on what others might wish to tell or suggest or even hint to them, and it would be dangerous to suppose that a state may prevent this on the ground that it knows better than its citizens when they should be moved by or yield to particular advice or suggestion in the exercise of their right to make fateful personal decisions for themselves. It is not a good reply that some people may not decide as they really wish—as they would decide, for example, if free from the “pressure” of others. That possibility could hardly justify the most serious pressure of all—the criminal law which tells them that they may not decide for death if they need the help of a doctor in dying, no matter how firmly they wish it. There is a fundamental infirmity in the Solicitor General’s argument. He asserts that a state may reasonably judge that the risk of “mistake” to some persons justifies a prohibition that not only risks but insures and even aims at what would undoubtedly be a vastly greater number of “mistakes” of the opposite kind—preventing many thousands of competent people who think that it disfigures their lives to continue living, in the only way left to them, from escaping that—to them—terrible injury. A state grievously and irreversibly harms such people when it prohibits that escape. The Solicitor General’s argument may seem plausible to those who do not agree that individuals are harmed by being forced to live on in pain and what they regard as indignity. But many other people plainly do think that such individuals are harmed, and a state may not take one side in that essentially ethical or religious controversy as its justification for denying a crucial liberty. Of course, a state has important interests that justify regulating physician-assisted suicide. It may be legitimate for a state to deny an opportunity for assisted suicide when it acts in what it reasonably judges to be the best interests of the potential suicide, and when its judgment on that issue does not rest on contested judgments about “matters involving the most intimate and personal choices a person may make in a lifetime, choices central to personal dignity and autonomy.” Casey, 505 U.S. at 851. A state might assert, for example, that people who are not terminally ill, but who have formed a desire to die, are, as a group, very likely later to be grateful if they are prevented from taking their own lives. It might then claim that it is legitimate, out of concern for such people, to deny any of them a doctor’s assistance [in taking their own lives]. This Court need not decide now the extent to which such paternalistic interests might override an individual’s liberty interest. No one can plausibly claim, however—and it is noteworthy that neither Petitioners nor the Solicitor General does claim—that any such prohibition could serve the interests of any significant number of terminally ill patients. On the contrary, any paternalistic justification for an absolute prohibition of assistance to such patients would of necessity appeal to a widely contested religious or ethical conviction many of them, including the patient-plaintiffs, reject. Allowing that justification to prevail would vitiate the liberty interest. Even in the case of terminally ill patients, a state has a right to take all reasonable measures to insure that a patient requesting such assistance has made an informed, competent, stable and uncoerced decision. It is plainly legitimate for a state to establish procedures through which professional and administrative judgments can be made about these matters, and to forbid doctors to assist in suicide when its reasonable procedures have not been satisfied. States may be permitted considerable leeway in designing such procedures. They may be permitted, within reason, to err on what they take to be the side of caution. But they may not use the bare possibility of error as justification for refusing to establish any procedures at all and relying instead on a flat prohibition. Each individual has a right to make the “most intimate and personal choices central to personal dignity and autonomy.” That right encompasses the right to exercise some control over the time and manner of one’s death. The patient-plaintiffs in these cases were all mentally competent individuals in the final phase of terminal illness and died within months of filing their claims. Jane Doe described how her advanced cancer made even the most basic bodily functions such as swallowing, coughing, and yawning extremely painful and that it was “not possible for [her] to reduce [her] pain to an acceptable level of comfort and to retain an alert state.” Faced with such circumstances, she sought to be able to “discuss freely with [her] treating physician [her] intention of hastening [her] death through the consumption of drugs prescribed for that purpose.” Quill v. Vacco, 80 F.2d 716, 720 (2d Cir. 1996) (quoting declaration of Jane Doe). George A. Kingsley, in advanced stages of AIDS which included, among other hardships, the attachment of a tube to an artery in his chest which made even routine functions burdensome and the development of lesions on his brain, sought advice from his doctors regarding prescriptions which could hasten his impending death. Id. Jane Roe, suffering from cancer since 1988, had been almost completely bedridden since 1993 and experienced constant pain which could not be alleviated by medication. After undergoing counseling for herself and her family, she desired to hasten her death by taking prescription drugs. Compassion in Dying v. Washington, 850 F. Supp. 1454, 1456 (1994). John Doe, who had experienced numerous AIDS-related ailments since 1991, was “especially cognizant of the suffering imposed by a lingering terminal illness because he was the primary caregiver for his long-term companion who died of AIDS” and sought prescription drugs from his physician to hasten his own death after entering the terminal phase of AIDS. Id. at 1456-57. James Poe suffered from emphysema which caused him “a constant sensation of suffocating” as well as a cardiac condition which caused severe leg pain. Connected to an oxygen tank at all times but unable to calm the panic reaction associated with his feeling of suffocation even with regular doses of morphine, Mr. Poe sought physician-assisted suicide. Id. at 1457. A state may not deny the liberty claimed by the patient-plaintiffs in these cases without providing them an opportunity to demonstrate, in whatever way the state might reasonably think wise and necessary, that the conviction they expressed for an early death is competent, rational, informed, stable, and uncoerced. Affirming the decisions by the Courts of Appeals would establish nothing more than that there is such a constitutionally protected right in principle. It would establish only that some individuals, whose decisions for suicide plainly cannot be dismissed as irrational or foolish or premature, must be accorded a reasonable opportunity to show that their decision for death is informed and free. It is not necessary to decide precisely which patients are entitled to that opportunity. If, on the other hand, this Court reverses the decisions below, its decision could only be justified by the momentous proposition—a proposition flatly in conflict with the spirit and letter of the Court’s past decisions—that an American citizen does not, after all, have the right, even in principle, to live and die in the light of his own religious and ethical beliefs, his own convictions about why his life is valuable and where its value lies. 'The Philosopher's Brief': An Exchange May 29, 1997 State of Washington et al. v. Glucksberg et al. and Vacco et al. v. Quill et al., argued January 8, 1997. ↩ Though academic philosophers have been parties to amicus briefs before, as members of organizations or as representing an applied specialty like bioethics, I am unaware of any other occasion on which a group has intervened in Supreme Court litigation solely as general moral philosophers. All the signers to the brief contributed actively to its preparation, though we differ among ourselves about general issues of political philosophy and justice, and may have somewhat different opinions about how states might properly regulate assisted suicide if the principles the brief supports were recognized. We were wonderfully represented, both with the substance of the brief and the administration of its filing, by the Washington and New York law firm of Arnold & Porter, which donated its services and itself bore the considerable printing and administrative expenses. (Anand Agneshwar, Philip H. Curtis, Abe Krash, Janet Meissner Pritchard, Kent A. Yalowitz, and Peter L. Zimroth of that firm were praticularly helpful.) ↩ The voters of Oregon approved an assisted suicide scheme by referendum in 1994. A federal court held the scheme unconstitutional, but that decision is under appeal. The Netherlands has allowed assisted suicide, in practice, for several years, and there was much disagreement in the various briefs filed in these cases about the lessons to be drawn from the Dutch experience. The Northern Territories of Australia recently adopted legislation legalizing assisted suicide, but legislation to annul that legislation may be introduced in the Australian national Parliament. Switzerland also allows doctor-assisted suicide in highly restricted circumstances. See Seth Mydans, “Legal Euthanasia: Australia Faces a Grim Reality,” The New York Times, February 2, 1997. ↩ Idescribed the circuit court decisions in an earlier article, “Sex and Death in the Courts,” The New York Review, August 8, 1996. ↩ Anthony L. Back et al., “Physician-Assisted Suicide and Euthanasia in Washington State,” Journal of the American Medical Association, Volume 275, No. 12, pp. 919, 920, 922 (1996). ↩ See David J. Doukas et al., “Attitudes and Behaviors on Physician Assisted Death:A Study of Michigan Oncologists,” Clinical Oncology, Volume 13, p. 1055 (1995), and L. Slome et al., “Attitudes Toward Assisted Suicide in AIDS: A Five Year Comparison Study,” conference abstract now available on the World Wide Web (1996). The amicus brief of the Association of Law School Professors offers other statistics to the same effect taken from other states and from nurses. ↩ According to one respondent’s brief, “Despite some imprecision in the empirical evidence, it has been estimated that between 5 percent and 52 percent of dying patients entering home palliative care units have been terminally sedated.” The brief cites Paul Rousseau, “Terminal Sedation In The Care of Dying Patients,” Archives of Internal Medicine, Volume 156, p. 1785 (1996). ↩ The amicus brief of the Coalition of Hospice Professionals raised a frightening question about terminal sedation. “Unfortunately, while a terminally sedated patient exhibits an outwardly peaceful appearance, medical science cannot verify that the individual ceases to experience pain and suffering. To the contrary, studies of individuals who have been anaesthetized (with the same kinds of drugs used in terminal sedation) for surgery (and who are in a deeper comatose state than terminally sedated patients since their breathing must be sustained by a respirator) have demonstrated that painful stimuli applied to the patient will cause a significant increase in brain activity, even though there is no external physical response.” See, e.g., Orlando R. Hung et al., “Thiopental Pharmacodynamics:Quantitation of Clinical and Electroencephalographic Depth of Anesthesia,” Anesthesiology, Volume 77, p. 237 (1992). ↩ BANEC-Generated Guidelines for Comprehensive Care of the Terminally Ill. Bay Area Network of Ethics Committees, September, 1996. ↩ Justice Scalia, who may also favor the first strategy, then suggested that “[P]roclaiming a liberty interest is cost-free so long as you can proclaim them and then say, however, they can be outweighed by various social policies adopted by the states. We can say there’s a liberty interest in murdering people .” ↩ See my book, Freedom’s Law (Harvard University Press, 1996), pp. 29-31. ↩
<urn:uuid:4fb1c9af-b4b4-4c54-8371-412015e17232>
CC-MAIN-2017-04
http://www.nybooks.com/articles/1997/03/27/assisted-suicide-the-philosophers-brief/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00338-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956968
11,832
1.929688
2
A clicking sound in the ear is a variation of tinnitus, which may be caused by loud noise, brain tumors, ear and sinus infections, thyroid complications, or female hormonal changes, the National Institute on Deafness and Other Communication Disorders explains. However, tinnitus is often harmless and has no detectable cause. Tinnitus may also be a symptom of Meniere's disease or another condition that damages or alters the auditory system.Continue Reading When tinnitus manifests as sharp clicking, the symptoms may be triggered by abnormal muscle contractions of the ear, Mayo Clinic explains. Doctors may use audiological exams or imaging tests to come up with a diagnosis, but in many cases, the cause remains unknown. Other known triggers of tinnitus include age-related hearing loss, the stiffening of middle ear bones, earwax blockage, and head or neck injuries. Specific medications, such as antibiotics, diuretics and antidepressants, may also cause or worsen tinnitus. People who are routinely exposed to loud noise may be at risk of developing tinnitus and noise-induced hearing loss, the National Institute on Deafness and Other Communication Disorders explains. This form of hearing loss occurs when sensory cells in the inner ear become damaged, interfering with their ability to relay sound to the brain. Service members exposed to loud explosives can develop tinnitus when shock waves put excessive pressure on their skulls, causing damage to brain tissue involved in auditory functions.Learn more about Pain & Symptoms
<urn:uuid:7285c9be-d0ab-4626-bc71-e2d31ad9898b>
CC-MAIN-2017-04
https://www.reference.com/health/causes-clicking-sound-ear-5d05b60469abb6f9
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00503-ip-10-171-10-70.ec2.internal.warc.gz
en
0.931702
304
3.71875
4
Credit and Ledgers As the colonies grew, products from agriculture and manufacturing were sold to pay for farming and business supplies as well as personal needs. Bills of exchange representing credit for products grown or manufactured were issued to the farmer of tradesmansimilar to our present-day concept of credit. Colonists usually used this credit for purchases rather than cash. The credit could not be transferred from store to store or colony to colony as it can today. Rather, it could be compared to how a gift card would work today. Gift cards are only available to be used at the store for which it is intended. You may purchase items from that store for the amount that is available on your card (ledger). When it is "empty", you must get another card, reload the card, or pay by another method. Similarly, the colonial plantation owner or tradesman would need to provide more agricultural or manufactured product to receive more credit. In this lesson, students: - Explain how colonists purchased items using credit. - Describe how colonial businesses recorded transactions using ledgers and waste books. - Read a scenario and record entries into a waste book and individual ledger to simulate colonial credit transactions. - Merchant Activity Directions - Waste Book worksheet - Ledger worksheet - Benjamin Powell Waste Book (for lesson extension) - Benjamin Powell Ledger (for lesson extension) - Discuss with students the process of using a gift card to buy things. The credit on the card is only good for that particular store, and the amount each item costs is deducted from the total amount on the card. - Explain that the colonies didn't have many coins or much paper money, so most people used credit to buy things. Using the information in the Introduction, explain how credit works in the eighteenth century, comparing to a gift card. People would exchange their crops for credit, which they could use at particular stores. - Ask students, "How would a store keep track of purchases without a computer?" In the eighteenth century, each storekeeper would keep track of how much credit a person had left to spend by writing it down in a ledger. They wrote down everything they sold, and to whom, in a waste book. - Distribute the Merchant Activity Directions as well as the Waste Book worksheet to each student. Using the merchant activity, have the students record the transactions in the "waste book." Explain to students that although the colonists would have been using pounds, shillings, and pence, they will be using dollars for this activity. Note to teacher: This may be more beneficial to do as a whole group activity so students get the information recorded correctly. - Tell students that at the end of the day, merchants would transfer the information from the waste book into individual ledgers to keep track of each person's accounts. Today each gift card is barcoded so that the remaining amount is recorded in a computer. In the eighteenth century, merchants had to write down in their ledgers how much each customer had left to spend at the merchant's store. - Distribute the Ledger worksheet for the students to complete. Students should now transfer the information from the waste book into the individual colonists' ledger. Students should write the correct item on the correct ledger and subtract the amount of credit used, then total the balance of credit still available to the colonist on the bottom of the individual ledgers. - To close the lesson, assign students to ask an adult with whom they live how they keep track of the household budget. Discuss their findings during the next class period. - Have students examine the Benjamin Powell Waste Book and Ledger and interpret the transactions listed there. - Student may create a small ledger for their personal use extending through one week of school. They need to record "income" by listing allowances, earnings, lunch money, etc. and to record "expenditures" for anything they purchase. This lesson was written by Shawn Cunlisk, Vancouver, WA, and Bill Neer, Baldwinsville, NY.
<urn:uuid:bfe9041b-0ea0-4e0f-b122-9477c8065075>
CC-MAIN-2017-04
http://www.colonialwilliamsburg.org/history/teaching/enewsletter/volume11/mar13/teachstrategy.cfm?showSite=mobile-regular
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00475-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95896
826
3.53125
4
FACT SHEET: IDENTIFYING VICTIMS OF HUMAN TRAFFICKING Official Campaign Material (PDF 147KB) Who is a Human Trafficking Victim | Clues to Help Identify Victims | Mindset of a Trafficking Victim | Psychological and Behavioral Clues | Physical Effects of Human Trafficking Everyone can play a role in identifying victims of human trafficking. Health care and social service providers; law enforcement officials; and ethnic, community, and faith-based organizations may encounter victims through their work. An informed community member could also be a victim’s link to freedom. It is important to be vigilant and to “look beneath the surface” in situations that don’t seem quite right. One chance encounter could be a victim’s best hope for rescue. Human trafficking is a form of modern-day slavery in which victims are subjected to force, fraud or coercion for the purpose of commercial sex, debt bondage, or involuntary labor. Victims of human trafficking can be young children, teenagers, men and women. They can be U.S. citizens, Lawful Permanent Residents (LPRs) or foreign nationals, and they can be found in urban, suburban, and rural areas. Minors (under the age of 18) who are induced to perform commercial sex acts are victims of trafficking, regardless of whether their traffickers used force, fraud, or coercion. A victim could be a man who does not speak English who is suspiciously injured “on the job” and shows signs of old bruising. A victim could be an abused woman who doesn’t know what city she is in when brought to the emergency room, and who is accompanied by a controlling companion who insists on speaking for her. A victim could be a fearful individual who quietly slips in and out of a local church on Sunday morning, or a child who lives in the neighborhood, yet doesn’t go to school or play outside. Human trafficking may occur in the following situations: - Prostitution and escort services; - Pornography, stripping, or exotic dancing; - Massage parlors; - Sexual services publicized on the Internet or in newspapers; - Agricultural or ranch work; - Factory work or sweatshops; - Businesses like hotels, nail salons or home-cleaning services; - Domestic labor (cleaning, childcare, eldercare, etc. within a home); - Restaurants, bars, or cantinas; or - Begging, street peddling, or door-to-door sales. Victims of human trafficking may exhibit any of the following: - Evidence of being controlled either physically or psychologically; - Inability to leave home or place of work; - Inability to speak for oneself or share one’s own information; - Information is provided by someone accompanying the individual; - Loss of control of one’s own identification documents (ID or passport); - Have few or no personal possessions; - Owe a large debt that the individual is unable to pay off; or - Loss of sense of time or space, not knowing where they are or what city or state they are in. A human trafficking victim may develop a mindset of fear, distrust, denial, and conflicting loyalties. Foreign victims of trafficking are often fearful of being deported or jailed and, therefore, they may distrust authority figures, particularly law enforcement and government officials. Similarly, traffickers may convince sex trafficking victims who are U.S. citizens or LPRs that, if they report their traffickers to the police, the police will jail the victim for prostitution while the traffickers, pimps, or johns will go free. Many victims of both sex and labor trafficking fear that if they escape their servitude and initiate investigations against their trafficker, the trafficker and his/her associates will harm the victims, the victims’ family members, or others. Being able to recognize the psychological and emotional consequences of human trafficking can also be helpful in identifying victims. Victims often: - Develop general feelings of helplessness, shame, guilt, self-blame, and humiliation; - Suffer from shock and denial, or display symptoms of post-traumatic stress disorder, phobias, panic attacks, anxiety, and depression; - Suffer from sleep or eating disorders; - Become addicted to drugs and/or alcohol as a way to cope with or “escape” their situation, or as a method of control used by their traffickers; - Become emotionally numb, detached, and disassociated from the physical and psychological trauma and display “flat affect”; or - Experience “trauma bonding” with the trafficker, positively identifying with the trafficker and believing that, despite repeated abuse, the trafficker is a loving boyfriend, spouse, or parent. While not all victims of trafficking have physical indicators that aid identification, many victims suffer serious health issues, some of which may include the following: - Signs of physical abuse, such as bruises, broken bones, burns, and scarring; - Chronic back, visual, or hearing problems from work in agriculture, construction, or manufacturing; - Skin or respiratory problems caused by exposure to agricultural or other chemicals; - Infectious diseases, such as tuberculosis and hepatitis, which are spread in overcrowded, unsanitary environments with limited ventilation; - Untreated chronic illnesses, such as diabetes or cardiovascular disease; or - Reproductive health problems, including sexually transmitted diseases, urinary tract infections, pelvic pain and injuries from sexual assault, or forced abortions. If you think you have come into contact with a victim of human trafficking, call the National Human Trafficking Resource Center at 1.888.373.7888. The NHTRC can help you identify and coordinate with local organizations that protect and serve trafficking victims.
<urn:uuid:901f4d7e-f304-4e88-9759-7cd79fd0ce0c>
CC-MAIN-2016-44
http://www.acf.hhs.gov/endtrafficking/resource/fact-sheet-identifying-victims-of-human-trafficking
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00055-ip-10-171-6-4.ec2.internal.warc.gz
en
0.919859
1,212
2.921875
3
The Government’s plan to cut back over-the-counter sales of alcohol to 10.30pm daily has sparked an outcry, as some – including alcohol suppliers – asked if the annoyance caused by a minority of trouble drinkers warranted the imposition of sweeping curbs. While they acknowledged that the proposed ban on boozing in public spaces after 10.30pm would reduce the incidences of alcohol-induced disamenities, members of the public felt that new problems could surface. For instance, it could result in binge-drinking among more youth as they try to load up before sales stop. More cases of neighbourly disputes over noise from revellers who shift their parties back to their homes could be another problem, they said. INDUSTRY PLAYERS RAISE CONCERNS Meanwhile, in a joint statement on Monday (Jan 19), five retailers – including 7-Eleven, Cheers and FairPrice – and several manufacturers of alcohol and alcoholic beverages said that while they share the same concerns as the Government about disorder, safety and anti-social behaviour arising from public drinking, “effectively addressing the relevant social issues need not result in disproportionately penalising responsible consumers”. Asia Pacific Breweries (Singapore) head of corporate communications Shannen Fong added: “We believe that the problem of irresponsible public drinking and/or public congregation will be primarily mitigated by the strict enforcement of the public-drinking time restriction and hence, need not deny responsible consumers, who are the majority in Singapore, the convenience of purchasing alcohol for home consumption after 10.30 pm.” Instead, the industry players “strongly advocate a responsible culture in respect of liquor sales through the adoption of relevant voluntary actions”. For instance, they are planning to train and certify all retail store managers on the responsible sale of alcohol within the first year of the law coming into effect. These players in the alcohol sales trade have also asked for greater clarity on the conditions under which applications for an extension of retail sales hours will be granted, saying this will “mitigate any disproportionate effects of the liquor-sale regulation”. When contacted, a FairPrice spokesperson said the chain of Cheers convenience stores it owns will be hit harder if the law is passed, as it has more stores that operate 24 hours. Alcohol sales may be affected by as much as 20 per cent, the spokesperson said, with its outlets in the central and town areas which currently experience good alcohol sales to be the most affected. ROOM FOR DISCRETION? Ms Theresa Sia, 24, said the cheaper price of alcohol at convenience stores is not the reason she drinks occasionally in public spaces. “Sometimes, it’s not that you choose to drink in public, but because the area that you are at has no pubs or bars and it’s more convenient to just bring your own bottles or buy from the nearby convenience stores,” she said. Responding to the proposed law, Mr Baey Yam Keng, MP for Tampines GRC, said he does receive occasional complaints of people turning rowdy when they get drunk, but such instances are rare. While the proposed law will make residents feel safer and create a more pleasant environment, how the authorities enforce the rules is important. “There is some discretion to be made ... some room for subjective adjustments and judgment,” he said.
<urn:uuid:cb94b85a-cd7c-4f51-a087-b4c555b1f5af>
CC-MAIN-2022-33
https://www.campusrock.sg/publicaffairs/plan-to-restrict-public-drinking-sparks-outcry-among-some
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00667.warc.gz
en
0.953986
714
1.59375
2
Spyware disguises itself as Firefox extension The antivirus specialists at McAfee have warned of a Trojan that disguises itself as a Firefox extension. It is currently being openly disseminated through spam emails that purport to come from Wal-Mart. If the recipient opens the mail attachment while running a Windows operating system, the Trojan then installs itself as a Firefox extension, presenting itself as a legitimate existing extension called numberedlinks. It then begins intercepting passwords and credit card numbers entered into the browser, which it then sends to an external server. McAfee has dubbed the Trojan "FormSpy," although the company is still currently categorizing its distribution as low. The file attached to the email consists of an executable Windows program, the AXM downloader. Once launched, it fetches the extension from the Internet and records itself directly into the Firefox configuration data, avoiding the regular installation process. Firefox extensions are normally distributed as XPI files, which ask the user for confirmation after forcing a pause of several seconds. In a blog entry, Geok Meng Ong from McAfee Avert Labs called on users to take extreme caution when installing unsigned Firefox extensions from untrustworthy sources. This well-intended warning was actually off the mark on several points. One the one hand, only very few websites are authorized to install extensions without seeking additional approval. Furthermore there are at the moment virtually no signed extensions for Firefox or Mozilla. And finally, that mechanism would not have protected against this attack. This is because the user, in opening the file attachment and thereby allowing the foreign program to execute on his computer, automatically provides it with his own usage rights. An effective protection against this attack is simply never to open file attachments that you have not requested. It is also important not to rely on seemly trustworthy 'From:' address fields, since these are easy to forge. When in doubt, confirm the legitimacy of the email with the purported sender in another way, such as by telephone. Further tips for safe handling of email are provided at heisec Emailcheck. - Description of Formspy from McAfee - Beschreibung zu Downloader-AXM von McAfee - Spying Gecko Blog entry by McAfee Avert Labs
<urn:uuid:f0dd2ed8-a3aa-4b76-bf9f-7d1e85e869f4>
CC-MAIN-2017-04
http://www.h-online.com/security/news/item/Spyware-disguises-itself-as-Firefox-extension-731282.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00235-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943976
456
1.835938
2
Preventing your chimney from exposure to moisture is critical to your chimney’s health. There are a number of issues that can arise when moisture invades your chimney. Whether you have a masonry or prefabricated factory-built chimney, protecting your chimney begins at the top. That’s why at Hale’s Chimney and Fireplace Solutions, we offer chase cover and crown repairs. Chimney Crown Repair Your chimney crown is located at the top of your chimney and surrounds the opening. When your chimney was built, a mason constructed the crown out of cement by creating a perimeter that slopes away from your chimney. This slope is important because it directs rainwater from splashing into your chimney opening, and it also protects your masonry as well. This is important because if water rest and seep into your brickwork or mortar, it can settle inside tiny pores and slowly dissolve your masonry. If this moisture freezes, it will expand and crack your masonry or cause it to crumble. Because of its location, your chimney crown is constantly battling the elements. Over time, this exposure takes its toll, and it may begin to crumble or detach from your chimney. When this happens, your chimney opening and masonry are more likely to be exposed to moisture. This also leads to costly repairs. Because of the important role your chimney crown plays, we always include it in our annual inspection. If we do find an issue during the inspection, our masonry experts have extensive training and years of experience. We know what it takes to make your chimney crown functional again. A chimney chase is a fabricated chimney which encompasses a metal flue pipe. Unlike traditional chimneys, chases are not constructed with brick and mortar. They are designed to mimic a chimney for homes with fabricated fireplaces. A chase cover is a metal cover that sets atop your chase and prevents water and debris from entering. In many ways, it works similarly to chimney crown in a masonry chimney. Chase covers also contain a hole, and sometimes a couple holes, where the chimney flue sticks out of the chase. Like the chimney crown, your chase cover is at the top the chimney. Exposure to the elements can cause chase covers to become dented, detached, and it may even rust. If there are holes in your chase cover, or gaps between the chimney flue and the chase cover, rain and debris have access to your chimney. This accumulation in your chase can cause issues with leaks and fire hazards. Let Us Help! If you have a chase, there is a chance that it was custom built for your home. However, we can fix and replace your chase cover, no matter how it’s designed. Our ventilation experts can custom make a chase cover that will last for a long time and completely seal it from the outdoors. If you think that you are in the market for a chimney crown or chase cover, don’t hesitate and call Hale’s Chimney and Fireplace Solutions today at 972-563-6851 or contact us online to talk with one of our ventilation experts.
<urn:uuid:ef04b8c0-ca25-44b9-8b74-7fabf836d876>
CC-MAIN-2022-33
https://www.haleschimney.com/we-have-chase-cover-crown-repairs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00471.warc.gz
en
0.944074
669
1.570313
2
Create to do lists, reminders, and notes for any purpose. Sync lists across devices and Microsoft 365 accounts to access daily planner and task manager features anywhere. Stay organised and manage your day-to-day with Microsoft To Do. Make shopping lists or task lists, take notes, record collections, set reminders and more to improve your productivity and focus on what matters. Microsoft To Do is the task management app that makes it easy to stay organised and manage your life. Accomplish what’s important to you each day with My Day and Suggestions, personalised day planner tools. Daily tasks are simple with To Do, from grocery lists to housecleaning routines. Intelligent suggestions recommend tasks from across your lists that may be relevant each day. Microsoft To Do helps you quickly capture and retrieve your lists and tasks across devices. Sync reminders and tasks with Microsoft 365 to access them anywhere. Capture tasks from different Microsoft apps and services and sync them with Microsoft To Do, from flagging emails as tasks in Outlook to lists from Cortana. Your tasks and lists are hosted securely on the Microsoft 365 service. Make your lists unique with customizable features like emoji, colourful themes, dark mode and more. Stay connected and collaborate with friends and family by sharing lists to coordinate. Microsoft To Do Features: • Stay focused with My Day, a personalised daily planner with suggested tasks • Get your lists anywhere, on any device • Add notes to any task • Share lists and tasks with your friends, family, colleagues, and classmates • Create colour-coded lists • Set one-time or recurring due dates and reminders • Break your tasks into manageable steps • Attach files up to 25 MB to any task To Do Lists for Any Purpose • Bill planner • Shopping lists • Set reminders • Task management • Business calendar • Note taking • And more Microsoft 365 Integration • Sync your tasks between Outlook and To Do • Host lists and tasks with the reliability and security of Microsoft 365 • Compile tasks from across your Microsoft 365 apps and services Whether it's for work, school, or home, To Do helps you organise and simplify your plans. To Do is free and available on all your devices. Learn more: https://to-do.microsoft.com Follow us on Twitter: @MicrosoftToDo Have an idea or feature suggestion? https://go.microsoft.com/fwlink/?linkid=2171952 Need support? https://go.microsoft.com/fwlink/?linkid=2156547 We made some accessibility improvements and fixed some sync issues. Ratings and Reviews To-do management system The best of all. Super application 👍 Watch app please? This is my absolute favourite to-do app. It’s really easy to use and has a beautiful interface, but please can you make it accessible from the apple watch? Thank you! Data Linked to You The following data may be collected and linked to your identity: - Contact Info - User Content - Usage Data Privacy practices may vary based on, for example, the features you use or your age. Learn More - Microsoft Corporation - 105.8 MB - Requires iOS 13.0 or later. - Requires iPadOS 13.0 or later. - iPod touch - Requires iOS 13.0 or later. English, Arabic, Catalan, Croatian, Czech, Danish, Dutch, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian, Italian, Japanese, Korean, Malay, Norwegian Bokmål, Persian, Polish, Portuguese, Romanian, Russian, Simplified Chinese, Slovak, Spanish, Swedish, Thai, Traditional Chinese, Turkish, Ukrainian, Vietnamese - Age Rating - © 2021 Microsoft Corporation
<urn:uuid:0c769a06-db25-446e-827a-5114d03ed9dd>
CC-MAIN-2022-33
https://apps.apple.com/be/app/microsoft-to-do/id1212616790
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00269.warc.gz
en
0.853463
947
1.523438
2
Physical activity of school-age children at Play Streets in rural communities By: M. Renée Umstattd Meyer, Christina N. Bridges Hamilton, Tyler Prochnow, Megan E. McClendon, Emily Wilkins, and Gabriel Benavidez from Baylor University; Tiffany D. Williams from Gramercy Group; Christiaan G. Abildso from West Virginia University; and Kimberly T. Arnold and Keshia M. Pollack Porter from Johns Hopkins University Child physical activity is important for many health outcomes, yet few children are active enough to realize these benefits. Children of color and those residing in low-income communities face even greater challenges to engaging in recommended levels of physical activity. Children play outside less than their parents did at the same age. Residents of rural communities may face obstacles to being active, including fewer parks, playgrounds, and programs and greater geographic dispersion. Play Streets, temporary street closures that create safe places for children to play, could be an innovative solution to promote active play in rural communities. The purpose of this study was to examine physical activity of school-aged children during Play Streets that occurred in Summer 2017 in four low-income rural communities of different races and ethnicities. Perceptions and participant characteristics - Most school-aged children who attended the Play Streets reported it was their first time. - Children agreed or strongly agreed that their town has friendly (safe/attractive) places to walk and/or bike. - Almost all children (96%) agreed or strongly agreed they felt safe at a Play Street. - Over half of the children (59%) said they were physically active in their free time quite often (5-6 times last week) or very often (7 or more times last week) during the last week before the Play Street. - Physical activity was described in this question as including sports or dance that make you sweat or make your legs feel tired, or games that make you breathe hard, like tag, skipping, running, climbing, and others. Physical activity at Play Streets – Pedometer measured - A total of 372 elementary-to-middle school-aged children wore pedometers at the Play Streets to measure their physical activity, an average of 23 children at each Play Street. Children who wore pedometers were on average 9 years old and 55% were female. - Children wore the pedometers for an average of 93 minutes, with 42 steps per minute or 3,906 steps overall, while wearing the pedometer. - For context, existing studies show that children of varying ages accrue on average 918–1,943 total steps while in 15-29 minutes of recess. - There were no statistically significant differences in steps per minute between boys and girls. - When examining differences between boys and girls by age category, there were no significant differences between boys and girls for age groups other than 12-15 year-olds. - Boys aged 12-15 years recorded significantly greater steps per minute than girls and wore the pedometers longer on average. Physical activity at Play Streets – Systematic observation measured - Roughly half of all children observed were physically active at the Play Street (49%). - There was no significant difference in boys versus girls on physical activity except for male teens who were more likely to be physically active than female teens. - Overall, children were also more likely to be physically active than teens. - Areas containing inflatables (e.g., bounce houses, inflatable obstacle courses) had the highest percentage of physically active children. - Male children were significantly more likely to bee observed in sport court and field activity areas than female children; although both males and females present in a sport court or field activity area were mostly active. Findings from this lay summary are available in the full article, published in the Preventive Medicine: Umstattd Meyer MR, Bridges Hamilton CN, Prochnow T, McClendon ME, Arnold KT, Wilkins E, et al. Come together, play, be active: Physical activity engagement of school-age children at Play Streets in four diverse rural communities in the U.S. Preventive Medicine. 2019, 129; https://doi.org/10.1016/j.ypmed.2019.105869. Suggested Citation for Lay Summary: Umstattd Meyer MR, Bridges Hamilton CN, et al. Physical activity of school-age children at Play Streets in rural communities. A Lay Summary. San Diego, CA: Physical Activity Research Center; Waco, TX: Baylor University; and Baltimore, MD: Johns Hopkins Bloomberg School of Public Health; 2019. Available at: https://paresearchcenter.org/physical-activity-of-school-age-children-at-play-streets-in-rural-communities/. This lay summary was made possible with funding from the Physical Activity Research Center. The research that generated the lay summary was led by Drs. Keshia M. Pollack Porter from Johns Hopkins Bloomberg School of Public Health and M. Renée Umstattd Meyer from Baylor University.
<urn:uuid:4e6c4dd9-5af8-4ac0-80c8-6c04752228be>
CC-MAIN-2022-33
https://paresearchcenter.org/author/chadspoon/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00066.warc.gz
en
0.951233
1,053
3.46875
3
If you want to purchase a vest that will protect you against all situations from a battlefield, a soft armor would be what you need. Soft armor is mostly very lightweight but its protective components are more durable than that of hard armor. It isn’t too thick as the hard armor either, and with a good backpack armor you can easily wear it underneath your regular clothing as well. There are many designs of this kind of vest and one of which is the quadrelease plate carrier backpack armor. These plate carriers for the backpack have become popular and are being used by many special forces like soldiers, police and even civilians. The vests are made from different materials such as nylon, fiberglass and Kevlar. There are also soft armor plates which are used for training and for lighter duty applications. You can choose from any of these depending on the conditions you’re going to face and the terrain you’re fighting in. Nylon and fiberglass are good for environments that are sandy and rainy while Kevlar and a carbon fiber plate carrier are great if you plan to face tougher enemy and tougher weather conditions. A soft armor is ideal to face any enemy because it is light, flexible and has an extremely strong layer of protection. In fact, it’s similar to soft armor plate that is used on tanks and battle vehicles. It’s also perfect for resisting impact especially on softer skinned targets like kids. It’s important to note that this type of armor plate carriers should be used with a compatible vest or gun belt. That way, you’ll be sure that you’ll be protected and comfortable using this gear.
<urn:uuid:d5d456e4-30f7-40e1-9ac7-4c9c4d199ea2>
CC-MAIN-2022-33
http://riveratlanta.org/what-are-ballistic-plates/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00265.warc.gz
en
0.960543
336
2.015625
2
Manhattan has the same great-tasting water New Yorkers have come to expect when they turn on their taps, but now it's delivered through a 21st century system. The city's Department of Environmental Protection Wednesday completed the second phase of its much-delayed project to create a new water tunnel that will alleviate the stress of its aging infrastructure. Mayor Michael Bloomberg activated the second part of Water Tunnel No. 3, which until Wednesday served only northern Manhattan, Astoria and some of the Bronx by delivering water from a Yonkers reservoir. Bloomberg said the upgrade is significant because now all of Manhattan will no longer be dependent on Water Tunnel No. 1, which was created in 1917 and now needs maintenance. "Millions of New Yorkers and visitors from the Battery all of the way to up Central Park will have a reliable supply of water," the mayor said. Work on the tunnel, which will eventually stretch 32 miles through four boroughs, began in the 1970s, but funding dried up and delayed completion. The plan -- one of the city's largest infrastructure projects, which has cost $4.7 billion so far -- finished its first stage in 1998. Work on the now-completed phase two, which covers the rest of Manhattan, began in 2003. Bloomberg said he made it a priority to speed up the construction because of the age of Water Tunnel No. 1 -- one of only two clean-water tunnels. Although the nearly century-old system doesn't have any major problems, the mayor said the city shouldn't depend on it 100 percent. "If we were to lose one of the tunnels without backup, that part of the city would be uninhabitable," he said. Work is already underway on the third phase of Tunnel No. 3, which would connect Brooklyn and Queens to the system. Officials said construction would be complete by 2021 at the earliest. DEP Commissioner Carter Strickland said crews will temporarily shut down Tunnel No. 1 to make sure it is safe and up to date. "Water is the lifeblood of New York City. None of the businesses, landmarks or attractions that make New York City the best city in the world . . . would be possible without clean water," he said. The tunnel and other DEP projects were funded by hikes in the water rates, and the mayor acknowledged that New Yorkers had to pay a high price to maintain a high quality of water. He assured them that the investment has paid off. "We should be able to sleep easier because of this," Bloomberg said.
<urn:uuid:d0ba543d-ee22-4053-824a-dc2e81eae0c6>
CC-MAIN-2017-04
http://www.newsday.com/news/new-york/new-manhattan-water-tunnel-makes-progress-1.6268959
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00319-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975904
518
2.15625
2
5 Rules for Being a Successful NBA Point Guard in Today's Game The NBA is currently in the midst of the golden age of point guards. Players like Chris Paul, Derrick Rose, Russell Westbrook, Rajon Rondo, Deron Williams, Steve Nash, Ty Lawson and more all play basketball at a ridiculously high level and have two major things in common: They all line up at point guard and will thrive during the 2012-13 season. So, how do they achieve this high level of success? There are a certain number of rules that a point guard must follow to thrive in today's game. While the methods of following these rules might vary, each player has to understand all five of them in order to be elite. Other rules out there certainly exist, so don't be shy. Leave any personal rules that you might have in the comment section below. Offense Can Be Created in Multiple Ways Not every fan realizes it, but point guards can create offensive flow in a variety of ways. As long as the scoreboard operators are being forced to increase the point totals at a rather quick rate, it doesn't matter how the point guard goes about his creation. There's a reason that three different All-Star-caliber point guards are prominently displayed in the main image of this slide. All three of them understand this principle, but go about their work in vastly different ways. Russell Westbrook doesn't play like a traditional point guard, or "pure" point guard as that type of player has come to be known. Whereas 1-guards have historically generated offense through their passing, Westbrook has done so with his scoring. He gets criticized for his tendency to call his own number and pull up for a jumper early in the shot clock, but his dynamic offensive game does help to create offense. It's hard to imagine the Oklahoma City Thunder making it to the NBA Finals without him at the helm. The threat of Westbrook's shot serves the same function that other point guards' passing does. Defenders are forced to respect his ability to put the ball in the bucket, which lowers the amount of attention that can be paid to players like Kevin Durant and James Harden. Rajon Rondo takes the exact opposite approach. Because of his scoring limitations and brilliant court vision, Rondo creates offense with his passing skills and ability to squeeze the rock into the tiny passing lanes that only he can find. He increases his teammates' scoring outputs simply by putting them in the best position possible to score. Westbrook and Rondo might be polar opposites in terms of style, but they're both insanely effective at creating offense. As for the third point guard in the picture, well, we'll get to him later. Maintain Control of the Ball If you're going to be responsible for controlling the offense and taking possession of the ball, then you can't afford to lose the ball and turn it over to the opposition. Of all the rules explained in this article, this is easily the most cut and dried. Point guards simply can't afford to hand the opposition extra chances to score while detracting from their own team's scoring potential. On average, an NBA team allows right around a point per possession, which means that each team scores just about one point per possession as well. Essentially that means that each turnover is worth approximately two points, provided that both teams are hovering around the league average in point production and prevention. During the 2011-12 campaign, Jeremy Lin took some heat for his inability to maintain control of the rock. He would drive into the paint, get caught among the trees of the other team and cough it up or kick it out to the wrong man. The breakout player was able to make up for his control deficiency by scoring and assisting at a historic level, but that's not a luxury that most players have. It's also a pace that Lin wasn't able to maintain. Lin's turnovers are slightly excusable because of how often he had the ball in his hands. Players with high usage rates are naturally going to commit more turnovers, but each and every mistake still hurts. So, what's the point of the Lin example? At the end of the day, we're going to try to find excuses whenever a player turns it over. Sometimes those excuses are more valid than others. However, we have to make excuses for a reason. Turnovers are universally perceived as negatives, and it is a point guard's job to reduce the amount of times they hand the ball over on any given night. Understand the Pick-and-Roll Defensive Strategies The pick-and-roll has become one of the most effective and prevalent offensive plays of the modern era. If a duo like Ricky Rubio and Kevin Love hopes to challenge John Stockton and Karl Malone for PnR supremacy, the point guard will have to possess a nearly perfect understanding of the defensive strategies against the league's most popular play. There are essentially five ways to defend the pick-and-roll, although the first one just involves preventing it from ever happening by forcing the point guard away from the screening big man. So really, we're dealing with four legitimate—and common—defensive strategies. The first is for the defender to fight over, under or around the screen, leaving the defense in its original man-to-man matchups. This is also the least popular strategy because it really doesn't work too often. An intelligent point guard can drive to make the defense play if the defender takes too long to get past the pick. A sharpshooter can make his man pay if he chooses to go under the screen, leaving the point guard open for an easy three-point shot without much of a contest. Shows make up the next two types, as a defense can employ either a hard or a soft show. A hard show involves the defensive big man coming around the screen quickly, essentially faking a trap to force the point guard into a hasty decision. The immediate presence of a large body in his driving lane forces the point guard to slow his momentum, either grinding to a halt or retreating backwards as the big man catches up to the player he started out guarding. If a point guard recognizes that a hard show is coming, he can drive into the big man quickly and create a blocking foul, or at the very worst cause him to stay out in no-man's land, far away from the basket and his original man. The point guard can also slip through the two defenders and create a mini-fastbreak opportunity. Soft shows are slightly different, and this is the standard pick-and-roll defense employed by NBA teams. Essentially, the big man involved in the play starts to play de facto zone defense, waiting to react to the point guard's initial move as the man guarding the point guard fights past the screen. The onus is on the floor general to make the first move, and he must read the defense properly or risk a quick turnover. However, a quick-thinking point guard can exploit this method of defending. It's possible to both drive or kick the ball to a teammate and exploit the defense. Whether it's the rolling screener or an open teammate on the wing that ends up with the ball, the entire defense has to shift quickly because it's committed two players to stopping the point guard for a moment. Next is the trap, which is an even more aggressive defense than the hard show. Instead of recovering to the original responsibility, as is the case in a hard-show defensive strategy, the non-screened defender sticks with the point guard and forms a double-team with the man who was screened. Although this move can create some frantic action from a point guard, an intelligent and disciplined player can break this strategy down in the same way he can exploit a soft show. Two defenders are now assigned to one player, which means that someone has to be left open. It's just all about finding that guy quickly. The final defensive strategy against a pick-and-roll is hedging, which isn't used too often. And when it is used, it doesn't work too well except in very small doses. The non-screened player helps out then immediately retreats to his original man. Of course, this leaves an easy decision for the point guard, who must keep his dribble active and remain patient. Once the second defender is retreating and the screened player is recovering, that's when he should explode to the basket or take a jumper. No matter what defense is thrown at a pick-and-roll point guard, he can take advantage of it. The key is knowing what to expect and how to react. NBA teams aren't going to stick with the same strategy for prolonged periods of time, especially when that strategy fails to promote success. Given the prevalence of the pick-and-roll game in the current version of The Association, point guards must be familiar with all of these defensive strategies and how to render them ineffective. Don't Crash the Boards Excessively When Chris Paul pulls down a rebound and gets the fast break started, it's a positive for the Los Angeles Clippers. However, note that this rule contains the word "excessively." While it's fine for CP3 to crash the boards on defense, it would be detrimental to the L.A. effort if he were to hustle into the paint in a valiant attempt to grab an offensive rebound. By doing so, he'd leave the back of the Clippers defense quite susceptible to a fast break. There's a negative aspect to overaggressive attempts on the defensive end as well. The point guard should be the one leading a fast break, but it's harder to find him on an outlet pass if he's amongst the trees, fighting to gain control of a shot that's clanged off the iron. If he's content to hustle to long rebounds and wait for the big men to pull down the short ones before kicking it out to him, he'll be more effective in transition. I'm not saying that the point guard should ignore rebounding entirely. Just proceed with caution when crashing the boards. Additionally, 1-guards' rebounds tend to be overvalued. Sometimes, if a team is unselfish enough and not worried about padding stats with easy rebounds, the other four players will back off an easy board and allow the point guard to corral the loose ball. That way the outlet pass is unnecessary, and the risk of a turnover in transition is drastically reduced. If you watch enough Oklahoma City Thunder games, you'll notice that Russell Westbrook tends to elevate for quite a few rebounds that the taller players on the court could easily grab. However, when Westbrook can do the work himself, it's just not as beneficial if someone like Serge Ibaka has to get his paws on the rock and then kick it to his point guard. There will always be some glamour associated with rebounding totals by point guards because of the potential for triple-doubles and jaw-dropping, glass-cleaning stats. However, it's essential that the fans and media are the only ones getting caught up in the hype. Point guards must recognize that over-crashing the boards is detrimental to the team's efforts. Embody the "Floor General" Moniker Whenever Derrick Rose dribbles the ball up the court, he takes note of the situation and plans his course of action accordingly. Credit for this observation must go to B/R's own Kelly Scalleta, who discussed this with me in detail via email a while back. If there's an open lane to the basket, Rose is going to take it and finish at the rim in style. However, he can also recognize developments that enable him to increase the Chicago Bulls' chances at points. Even though D-Rose isn't the greatest long-range shooter, he won't hesitate to pull up for a three-point attempt if the Bulls are set up for an offensive rebound. Suppose someone like Joakim Noah is set up in position to box out his man and reel in any missed shot. Rose knows that there's a good chance at two points even if he misses, so he fires away from the outside to allow himself a chance at a triple. Best case, he gets three points. Worst case, he gets two. If he doesn't recognize the opportunity, Rose might continue to drive and knock one point off his earning potential. This is playing to the strengths of a team and truly embodying the "floor general" moniker that point guards have earned. Tony Parker is another great example of a point guard who understands how to direct his team, acting as a general does with his army. The speedy French point guard runs Gregg Popovich's offensive system to perfection because he recognizes the strengths of his team. Using ball screens and swinging the ball around to the corners for the shortest possible three-pointers, Parker maximizes his team's chances of success. He knows that he's a good midrange shooter, so he curls off picks to give himself that opportunity. Just like Rose, Parker understands how to play to the strengths of both his game and his team. Honestly, though, all elite point guards excel in this area. Of the five rules elaborated upon in this article, this is the most important. No matter how talented an individual may be, he won't be as successful if he doesn't become that floor general. It doesn't matter whether he scores or passes to do so, as long as he's playing to his strengths. Like the new article format? Send us feedback!
<urn:uuid:5d6ddf70-38d9-48b7-8d49-a1ae7756aae3>
CC-MAIN-2017-04
http://bleacherreport.com/articles/1374465-5-rules-for-being-a-successful-nba-point-guard-in-todays-game
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00071-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969221
2,792
1.617188
2
|Authoring system||AXMA Story Maker| How It Begins "I need your help. I mean, you're the one who is supposed to talk me out of things before I do anything stupid..." The player is the oft-neglected voice of reason in Alice's (the Wonderland explorer's) head. She has broken her father's pocket watch and subsequently Time itself, so spending the afternoon in her room as punishment for eternity would seem to warrant breaking laws of time and space to escape and prevent everyone from starving before tea-time. "There are other people who might be able to help us. Unfortunately, they are all mad." - Alice Aforethought (Hanon Ondricek; 01-Oct-2017; Web browser). - IF Comp 2017: 12th place of 79 entries.
<urn:uuid:5dae4700-5e0a-45b1-8179-dbf7dc2f586c>
CC-MAIN-2022-33
https://www.ifwiki.org/Alice_Aforethought
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00064.warc.gz
en
0.882606
324
1.546875
2
As the leader in understanding and predicting changes in the Earth's environment and managing coastal and marine resources, NOAA has the opportunity to be a leader in promoting the sustainable use of Earth's resources. Practicing and demonstrating environmentally sound business practices can and should become an intrinsic part of NOAA's organizational culture that is apparent to our employees and surrounding communities. The NOAA's energy program focuses on reducing NOAA's consumption of energy, natural resources, and manufactured materials, as well as its contributions to greenhouse gas emissions, other air and water pollution, and landfills. DOC has just announced an extension to the 2011 DOC Energy and Environmental Award Nominations and the annual call for nominations for DOE/FEMP 2011 Energy and Water Awards. This year the two awards programs are somewhat integrated; that is, DOC award nominations (energy and environmental) will be fed into the DOE/FEMP Award nominations. SECO strongly encourages your Line Offices participation in these important recognition programs to highlight the good work being done! The following provides more information regarding the submission requirements: The NOAA Green Buildings Grant Program is designed to stimulate internal greening efforts within NOAA by partially offsetting investment costs required to achieve energy or conservation objectives. More information is available at the Green Grant Program. As required of Federal agencies, NOAA must meet a number of energy, water, greenhouse gas emissions, fuels, and sustainability management requirements. Develop institutional contract language and cost analysis for managing ESPCs. Incorporate energy training as part of SECO Safety and Environmental Compliance Training for all NOAA employees before the end of FY11. Will be used to update lease requirements, and recommend hardware and best management practices to reduce energy use. EO 13514 Annual Reporting Requirement, via the Strategic Sustainability Performance Plan reporting, due late 2011, and includes: A program in partnership with DOE NREL to produce a suite of products, including Sustainable Buildings Design guidance, to help managers meet Federal energy requirements. "In order to create a clean energy economy that will increase our Nation's prosperity, promote energy security, protect the interests of taxpayers, and safeguard the health of our environment, the Federal Government must lead by example. It is therefore the policy of the United States that Federal agencies shall increase energy efficiency; measure, report, and reduce their greenhouse gas emissions from direct and indirect activities; conserve and protect water resources through efficiency, reuse, and stormwater management; eliminate waste, recycle, and prevent pollution; leverage agency acquisitions to foster markets for sustainable technologies and environmentally preferable materials, products, and services; design, construct, maintain, and operate high performance sustainable buildings in sustainable locations; strengthen the vitality and livability of the communities in which Federal facilities are located; and inform Federal employees about and involve them in the achievement of these goals." (Full Text) Objective: Modern, safe, and sustainable facilities. NOAA is committed to modernizing its facilities, and creating sustainable, energy-efficient, safe, and secure work environments. Reducing NOAA’s carbon footprint and energy costs through the use of sustainable design of new facilities and investments in energy-efficient building systems will be key strategies for more effective energy stewardship of NOAA facilities. (Full Text)
<urn:uuid:1131dae9-30ac-4f33-b0a7-a2802f48d7cc>
CC-MAIN-2017-04
http://www.energy.noaa.gov/energy-management/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00557-ip-10-171-10-70.ec2.internal.warc.gz
en
0.924236
651
1.953125
2
Our region contains six primary towns and cities (totaling approximately 170,000 inhabitants) located along the Jiu River basin and adjacent to Retezat National Park and other places of interest in our region of the Transylvanian Alps. [* Comuna] Nestled among the chain of Carpathian Mountains that cover one-third of Romania, Jiu Valley is the gateway to the Retezat National Park and other Carpathian destinations. Whether your interest is in Dacian or modern history, heritage sites, outdoor four-season adventure in the Transylvanian Alps, or coal mining, this portal is designed for you. ▶ Jiu Valley region Since 2001, the Jiu Valley Portal (JiuValley.com) is the home of the Official Jiu Valley City Websites and your gateway to the Transylvanian Alps and regional heritage sites. ▶ About JiuValley.com In the late Cretaceous Period, following the Jurassic Period, Jiu Valley was part of Hațeg Island, a large offshore island in the Tethys Sea. Visit one of the world’s best preserved dinosaur heritage sites and paleontology dig sites and see the famous Hațeg Dwarf Dinosaurs. ▶ Hațeg Country Dinosaur Geopark Directly to the north of Jiu Valley lie the ruins of the Dacian capital of Sarmizegetusa Regia and the fortresses built to protect the capital from the invading legions of Roman Emperor Trajan during the Dacian Wars (AD 101–102, 105–106). ▶ Dacian heritage ▶ Dacian Fortresses of the Orăștie Mountains Momârlanii are a small community in Romania, a population said to be descended from Dacians who were located in the Jiu Valley. Their number is estimated to be somewhere between 10,000 and 20,000. Coal mining has been an important aspect of Jiu Valley for the last 150 years, but the economic viability of its coal mines has decreased. Mine closures since 2000 have been accompanied by social disruption, high unemployment, strikes and protests. ▶ Coal mining – Jiu Valley ▶ Miners (Archives 1944-1989) ▶ Archives (Mineriada 1990-1999) ▶ Jiu Valley Coal Miners Union Within and surrounding Jiu Valley are numerous historic and cultural heritage sites, including a number of UNESCO World Heritage sites. ▶ Historical Sites The mountainous region surrounding Jiu Valley offer a diversity of outdoor adventures, from its well-known skiing in the winter to rock climbing, caving/spelunking, mountain biking and hiking, paragliding, river rafting, etc. ▶ Outdoor activities The mountain ranges surrounding Jiu Valley (Retezat, Vâlcan, Surean, Parâng) are part of the Transylvanian Alps, also referred to as the Southern Carpathians (Romanian: Carpații Meridionali), a group of mountain ranges that divide central and southern Romania, on one side, and Serbia, on the other. ▶ Transylvanian Alps ▶ Parâng Mountains ▶ Retezat Mountains ▶ Retezat National Park ▶ Surean Mountains ▶ Vâlcan Mountains The mountain ranges surrounding the Jiu Valley contain some of the most diverse plant and animal life in Europe. This is especially true of Retezat National Park and its protected 4,500 square acre UNESCO biosphere reserve area called "Gemenele". ▶ Flora & fauna The mountains surrounding Jiu Valley are full of caves, from large well-known and more touristic developed caves like Bolii or Sura Mare to numerous local caves still being discovered and explored by local spelunkers. This interactive navigation section is intended to help you to find your way to and around Jiu Valley, as well as guide you to the spectacular landscapes in the Retezat National Park and other places of interest in the Transylvanian Alps/Carpathians. ▶ Navigate-interactive maps Plan your adventure using these interactive maps with directions, route planning, elevations, etc. Perfect for biking, hiking or driving. ▶ Interactive trip planners Travel to and from Jiu Valley using train scheduler, look up ticket prices, and plan your route with railway maps. ▶ Trains, Travel & Tickets Interactive map with locations of petrol stations throughout the region and updated comparison of fuel prices. ▶ Fuel stations and prices Online communities related to Jiu Valley (e.g., General interest, Sports/Recreation, Religion). * Inclusion of the above communities in this list are based on available information and does not represent endorsement of the Jiu Valley Portal. ▶ Online communities This section provides current RSS news feeds related to Jiu Valley from both local, national and international sources. ▶ News & media Foreign exchange and unit conversion tools. ▶ Currency and unit converters This section features photographers (with an emphasis on talented young Romanians) that have captured the essence of the Vaii Jiului (Jiu Valley life) in their photographs. This section includes links to various online multimedia galleries related to Jiu Valley, the mountains, sports, culture, history, coal mining, etc. Please contact us if you have suggestions of other galleries that might be included in our listing.
<urn:uuid:64d1826e-5c46-48ed-bd10-38331af49e58>
CC-MAIN-2022-33
https://www.jiuvalley.org/category/heritage/dacian_heritage/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00267.warc.gz
en
0.908354
1,204
2.25
2
American Fire 63 percent contained August 21, 2013 Firefighters have reached 63 percent containment on the American Fire, which has been bedeviling the entire region with heavy smoke since Aug. 10. The fire, was at 15,738 acres Wednesday morning, is not expected to be contained until Sept. 1. Tuesday afternoon, a thunderstorm began to develop southeast of the area, resulting in erratic winds over the fire area. A red flag warning was in effect until 11 p.m. Wednesday for lightning and dry fuels. Wednesday, there was moderate fire spread in surface fuels with occasional single tree torching. “The fire has been quite active on the east side,” said California Interagency Incident Management Team 4 spokesman Peter Frenzen Wednesday evening. “Folks will see plumes (of smoke) from that east side. It’s the same side that has been kicking up, and is continuing to do so today.” According to Frenzen, the management team has pulled firefighters back on the east side to Forest Road 43 due to the increased fire activity. “To date, we’ve gone fairly direct, close to the fire’s edge,” he said. “With the topography and the extremely dry fuels and the winds, for safety we have had to move back so that we will have time to secure the fire line. “When wind conditions permit, we’ll bring fire — light in in strips, carefully, and bring it along so they end up with a secure black area along the fire line, so that when the main fire gets there, it loses intensity and won’t jump the fire line.” Firefighters have been working west along the Western States trail, Frenzen said. “Where they can, they will keep the dozer line away to protect the trail,” he said. “We are aware of the significance of the trail and we’re trying to minimize the impact.” On the south line of the fire, bucket work had been successful, Frenzen said. “That’s really good news for Michigan Bluff and Big Oak Flat,” he said. “That was a very high priority for us, to secure the fire on the south end.” A partial road closure was announced Wednesday for Mosquito Ridge Road (Highway 96) from the junction of Ralston Ridge Road, east to the junction of Forest Road, west of French Meadows Reservoir. Access to the Oxbow Middle Fork American River Rafting Launch remains accessible from Mosquito Ridge Road and remains open. French Meadows Reservoir Recreation Area remains open, and an alternate route is available. From Foresthill, take Mosquito Ridge Road to the Ralston Ridge Road 12 miles. At the intersection, go left toward the Ralston day use permit area. Drive past the day use area and powerhouse, and continue for approximately 18 miles to the intersection of FSR 22. Take FSR 22 approximately six miles to French Meadows Reservoir. This route is chipped sealed. There is another unmarked route (to the north) that is gravel or native surface roads. None of these routes are well-marked at this time, and there is also road construction. The road from Ralston Powerhouse upward is extremely steep, narrow and winding and is not suited for vehicles towing trailers or for motorhomes. The alternate route for vehicles towing trailers and motorhomes will be through the Georgetown Ranger District on the Eldorado National Forest. Foresthill Road is closed from Forest Road 66 to Robinson Flat Campground, and Forest Road 43 from Robinson Flat Campground to Mosquito Ridge Road. Robinson Flat Campground and Duncan Peak Lookout remain closed. Portions of the Tahoe National Forest on the American Ranger District also are closed. The total number of individuals involved is 1,822, with 51 hand crews, 72 engines, 40 dozers, 42 water tenders, and 13 helicopters. Four structures have been destroyed in the fire, which remains under investigation. To contact City Editor Liz Kellar, email email@example.com or call 530-477-4229.
<urn:uuid:e13dd783-5c95-4c10-a807-a099e23d40e7>
CC-MAIN-2016-44
http://www.theunion.com/news/local-news/american-fire63-percentcontained/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00343-ip-10-171-6-4.ec2.internal.warc.gz
en
0.946575
891
1.640625
2
Proper nutrition: what is not harmful to eat at night? Human health depends on proper nutrition. The habit of eating properly should be developed from childhood, but not everyone succeeds. Many people suffer from various eating disorders that can lead to overweight and obesity. One of these bad habits - the use of harmful food before bedtime. Proper nutrition throughout the day Proper nutrition is based on several principles, respecting which, a person can maintain the desired level of weight and consume the necessary rate of calories, depending on age and lifestyle. For example, a woman 26-50 years old, leading a sedentary lifestyle, you need to consume 1800 calories per day. A man of the same age and with the same level of physical activity needs 2400 calories per day. Proper nutrition should include a sufficient amount of protein, fat and carbohydrates. Complete failure of one of the components in the diet, can lead to health problems.Therefore, the diet should be selected only on the recommendation of a specialist in accordance with the age and state of health of the patient. If you follow the diet plan, it is advisable to eat 5 times a day in small portions. The main meal should be breakfast. It is he who provides a person with energy for a long time. Breakfast should contain complex carbohydrates, such as cereals, cereals, pasta, fruit or berries, tea or coffee. Lunch should consist of soup and second course, but not necessarily. Soup is one of the healthy and nutritious dishes. Some soups have a fairly low calorie, for example, broths with vegetables and chicken. The second dish may include steamed vegetables, lean meat or fish. The dinner should also include vegetables. Carbohydrate food - baked goods and pastries in the evening is undesirable, especially before bedtime. The diet of proper nutrition for those who want to lose weight or maintain it at the right level, should completely exclude fatty, sweet and salty foods. Why do people eat before bed? Compulsive overeating, aptly called by many "night dorozhor", contributes to the appearance of extra pounds. Some people would love to lose weight, but they are hampered by lack of willpower or stress. It is considered that eating at night is harmful, because at night the metabolism slows down, and those extra pounds are put off. Often, when using compulsive overeating, people do not use the healthiest foods — buns, pies, cakes, and sweets. Benefits for the body, they almost do not bring. They are the source of unspent calories. Therefore, all the dreams of losing weight fail. People eat before bed for several reasons. The first is the lack of food during the day. A person skips breakfast, because in the morning there is not enough time for him or there is no desire to eat. Also, he may miss lunch or dinner due to high workload at work. The result - all the same "night food ". Another reason is sticking to stress. It is nervous tension that causes compulsive overeating. Not all, but many people stubbornly pull to the refrigerator late at night or at night in stressful situations. The most harmful foods that contribute to weight gain are sweets, pastries, pickles, smoked meats, sausages and canned goods. But there are others who can eat at night without fear for weight. What food is not harmful to eat at night? There are healthy foods that you can eat at night and not be afraid to get better. It may seem strange, but among such products, for example, there is dark chocolate. It is much more useful than a full-time pier, and, especially, chocolate bars. It contains vitamins such as B1, B2 and E. What else can you eat at night without harm to weight: pistachios. They contain many beneficial substances, for example, folic acid and vitamin B6. For late evening snacks, it is important that the pistachios are not salty; soups. Not too rich soup has a calming effect and is also one of the most useful dishes for late evening or night; blueberries and desserts based on it. This berry has a large set of useful properties, the most important of which is a positive effect on vision. In winter, blueberries can be stored frozen, since this is how it retains all the beneficial substances; tea with lemon and ginger. Not by chance ginger is part of many diets. This is one of the most important products that help to combat excess weight or maintain it at the right level. Tea perfectly quenches thirst, which is sometimes disguised as hunger; kefir. Another common diet product, which is even included in the composition of mono diets, popular among the stars of show business. In addition to kefir, you can also eat low-calorie fruits, such as apples or oranges. Nutrition experts did not agree that eating at night was definitely harmful. But fewer are those who insist that one should not eat after 18.00. A softer point of view of nutritionists - you can eat no later than 1.5-2 hours before bedtime. It is desirable that the products have a low-calorie content and contain as little as possible carbohydrates and unhealthy fats. In the night and evening snacks there is nothing dangerous. If a person eats foods that do not have harmful consequences for weight, then the food for night snacks will calm the nerves and will not affect the harmony in any way. It is hardly worth including in the evening ration products that stimulate the nervous system, such as coffee. Do not eat those that contain simple carbohydrates, including sugar. If compulsive overeating caused by stress becomes a problem, then, first of all, it is necessary to eliminate its root cause, that is, the source of stress itself or get rid of eating disorders with the help of a specialist. It is possible that the cause of overeating at night is much deeper than the feeling of hunger. Lose weight without giving up food, you can. The main thing - to follow the principles of proper nutrition. Nutritionists say that in 21 days you can lose weight. Why and how you can lose weight in just 3 weeks, read the material. Both nutritionists and fitness trainers, and doctors are unanimous in their opinion: there is no more effective and healthy way to lose weight, to tighten the body and strengthen muscles, than a combination of proper nutrition for weight loss and physical exertion. Naturally, discipline is required to comply with both. Pleases one thing: nutritionists and trainers assure that you can get used to proper nutrition and exercise regimen in just 21 days. During these 3 weeks, your brain will rebuild, and sports and nutrition plan will become a habit. So, in three weeks you will not reach for a harmful bundle of chips - you just do not want to eat them. But how to make a diet correctly and how to eat to lose weight. There are 10 basic principles. • Set priorities: your task is not to limit yourself in everything in the name of harmony, but to build a power system that you can stick to for a long time, even your whole life. Proper nutrition for weight loss should help the body burn excess fat and build a muscular frame. When the goal is achieved, you can allow some products to be returned to the diet, but in limited quantities. • Remember the basis of nutrition: The core of the diet should be protein and the right fats with carbohydrates. You should not starve. The diet should include foods such as chicken, turkey, rabbit, lean red meat, sea and river fish, seafood, olive, coconut or sesame oils, vegetables, greens and fruits, berries, eggs, dairy products, whole grain cereals, many natural spices and spices. Also, do not forget about the drinking regime: 1.5-2 liters of clean water per day are the norm of fluid for any person. If you play a lot of sports, drink more water. • Define your calorie intake: caloric intake is important. For example, on average, women need to consume 1,500–2,000 kcal to maintain their shape, depending on body weight. And for weight loss you need to create a calorie deficit. But this does not mean that it is necessary to switch to only one little water in pursuit of the notorious 90-60-90. It is enough to reduce the daily calorie rate to 1200, and you will start to lose weight, but according to the rules. That is, the discarded weight does not come back after you go over to individual burrows m in calories. • Eat 5 times a day: the volume of a person's stomach is approximately 0.5 l, but it can stretch. The logic is simple: the more servings you eat, the more you will want to eat, because you stretch the stomach and it will need more food. In general, to eat less you need less, but more often there is (forgive me for tautology). Divide your daily ration of food in 5 receptions. Portions will be small, and you will not experience hunger throughout the day. For breakfast should fall 500-600 kcal, for lunch - 150-200. You can eat 300-400 kcal for lunch, 150 for snacks, and 300 for dinner. • No dry meat: Forget about snacks with sandwiches and even the most dietary biscuits. Meal should be complete. This does not mean that you should eat the first, second, third and compote five times a day. You just need to sit down and quietly eat a full meal, preferably warm. Liquid dishes cooked in meat, vegetable, fish broth and mushroom uzvarah contribute to the secretion of gastric juice. Once a day soup is enough to digest the main dishes. • Determine the size of portions for weight loss: again, we will not write about the size of the stomach. Better say how much you can eat in grams per meal. One serving of vegetables - 100–150 g, liquid dishes and dairy products - 150 ml, meat or fish - 120 g, 1 fruit, 1/4 avocado, 8-12 grapes, a handful of nuts, 1 tsp. vegetable oil. • Observe the correct diet: your diet for slimming and keeping fit should look something like this: breakfast - protein foods or whole grain cereals; lunch - soup + protein food or vegetable salad / stew; snacks - 1 fruit; dinner - dairy products or vegetable dishes. Adhering to these rules of nutrition, you will not lose weight as fast as with mono diets, but everything will not return. In addition, you can stick to this nutritional plan for the rest of your life, adding some foods at will. And the main thing - it is not only not harmful to health, but will improve it. Sample menu of proper nutrition for the week - 200 g of finished oatmeal with 30 g of dried fruit; coffee or tea; fruit. - 150 g of cottage cheese with 1 tsp. honey; 30 grams of nuts or 100 grams of fresh fruit; coffee, tea or a glass of freshly squeezed juice. - 2 whole grain toasts with 50 grams of avocado or 30 grams of cheese; boiled egg; coffee or tea, fruit. - Chicken soup; vegetable salad; A hot sandwich made from whole grain bread, chicken breast and greens. - Durum wheat pasta; 100 grams of chicken breast, cherry tomatoes; fruit. - Natural yogurt without additives; sandwich with whole grain bread, avocado, salmon and greens. - Baked fish with vegetables; 1/2 baked apple. - Salad with bulgur, chicken breast, tomatoes and dry herbs; tea. - Baked Chicken Fillet; garnish of baked vegetables, 1 tbsp. l feta; tea. - 150 g of cottage cheese with 30 g of nuts and 1 tsp. honey In your diet should be as much as possible raw vegetables and fruits, but until 16:00, then it is better to use baked vegetables and fruits, which in this form are easier to digest by the body. P National Board of nutrition in childhood is the foundation for building and maintaining health in the future. Starting at birth, food habits and addictions are formed, the correct attitude to food as a source of energy and building material for organs and systems is formed. The task of parents is to organize a full-fledged diet that covers the costs of a growing organism, allowing them to grow and develop, eliminating harmful and toxic substances from the children's menu. What should not be in the diet of the child In families where the diet is varied and includes all the necessary substances, the problem that a child eats badly or does not like something rarely arises. Therefore, it is important to give the children the right example, if there are deficiencies in the diet - to eliminate them together. Parents should themselves know and convey information to children about the dangers of fast food, "stall" food, an excess of sweets. Fast food restaurants and snack bars have a wide and varied menu, often including dishes for children. A significant drawback of such places is the questionable quality of the products. If in fast food chains they monitor a positive reputation, then in tents and eateries the quality of raw materials and hygienic standards leave much to be desired. In addition, the dishes in them are unbalanced in composition and high in calories, and cold drinks are offered, which negatively affects digestion processes. Parents should not buy or allow children to take food on the street or in dubious places. "Lucky" food, chips, crackers, snacks, salted nuts, soda are harmful to people of any age. The composition of these products include artificial flavors, dyes, preservatives, flavor enhancers that cause irreparable damage to the mucous membrane of the digestive tract, and absorbed into the blood, affect other organs and systems. An excess of salt adversely affects the cardiovascular system, causes thirst, which is often quenched with sweet soda. This drink contains a large amount of sugar, the excess of which leads to diabetes and obesity. An excess of simple sugars leads to disruption of carbohydrate metabolism. The particles of candies that are stuck in the teeth are a breeding ground for cariogenic microbes that destroy the tissues of the teeth. Confectionery products are dangerous not only with high calorie content, but also as a source of food poisoning, especially when milk and raw eggs are used in their production. What should be included in the diet of preschoolers A child of preschool and primary school age spends a lot of energy. Therefore, the daily diet should cover all costs, as well as be balanced in protein, trace elements and vitamins for harmonious development. Energy needs must be met by cereals, bread, sweet fruits, and fiber-rich vegetables. Animal protein must be included in baby food, which is complete in amino acid composition. In addition, meat is the main supplier of iron. Fats should prevail in the form of vegetable oils, and the share of animal fats is covered by the introduction of butter and milk into the diet. Children at this age should eat 4-5 times a day, in small portions, at regular intervals (3-4 hours). The approximate daily diet of a child consists of the following components: breakfast - a dish of cottage cheese, meat, eggs or cereals, milk or coffee drink (made of chicory, barley), weak tea with milk, fresh fruit; the second breakfast - yogurt without additives, sweet fruit; lunch - the first hot meal in the form of soup on a vegetable or secondary weak meat or fish broth, the second of meat, fish and vegetable garnish, less often pasta, vegetable salad, juice, compote of dried fruits; Snack - cottage cheese or a dish of eggs (casserole, scrambled eggs), kefir, milk or jelly, cookies or other sweets in small quantities, fresh fruit; dinner - a dish of milk, vegetables or cottage cheese, sour milk drink or herbal tea. To preserve vitamins, it is preferable to use fresh vegetables and fruits, cooking for a couple. Any dish of unpasteurized milk, cottage cheese, eggs, meat and fish should be thermally processed. Once a week, liver or other offal is introduced as a meat substitute. Children should not eat semi-finished products, dumplings, sausages, it is not recommended to use ketchup, mayonnaise, hot sauce in the children's menu. The daily amount of fluid consumed is at least 1-1.5 liters of clean water. In the adolescent period, good nutrition is necessary because of the high loads on the body due to hormonal adjustment, active growth, and weight gain. During this period, chronic diseases, in particular, diseases of the digestive system, are often manifested or exacerbated. Therefore, it is imperative that the child receives a balanced diet, taking into account the existing pathology. Teens attend various sports sections, study in circles, on preparatory courses, therefore, they have increased energy and protein requirements, this should be taken into account when drawing up the daily menu. Sedentary children should limit digestible carbohydrates. Athletes should drink enough, and after a workout (in 40-50 min.) Get full-fledged proteins in the form of meat, cottage cheese, egg dishes. Teenage girls who have menstruation need to eat more foods that contain iron. Teaching kids to eat right In childhood, parents set an example of food culture, table behavior, simple table etiquette skills. From 5 years old, you can teach a child to use a non-sharp table knife, placing the fork in your left hand. It is desirable to establish a certain diet, when food is taken at the same time during the day, this contributes to the timely development of digestive juices and better absorption of nutrients. It is important to explain to the child that you should not laugh and indulge at the table. You need to teach your child to use a napkin, carefully eat from a plate. It is not recommended to view cartoons, reading while eating. At the same time, the nervous system is distracted by other stimuli and does not respond to impulses from the receptors of the digestive system. In the end, this leads to overeating, increased hunger, which is a predisposing factor to the development of diseases of the gastrointestinal tract and obesity. Children easily learn from parents. If the family decided to eat and gather together at lunch or dinner, then the childwatching the adults, it is easy to learn the basic rules of behavior at the table. And in the future, he will have fewer problems associated with malnutrition. Meat in the system of proper nutrition The relevance of proper nutrition is growing today. Every day, modern people eat a huge amount of products that practically do not contain nutrients. The quality of the usual food is deteriorating due to the unfavorable ecological situation and the addition of preservatives, flavor enhancers and other chemical substances. The most harmful to humans is fast food products containing trans fats, fast carbohydrates and sugar. They contribute to the development of serious diseases - diabetes, obesity, hypertension. To live long and not get sick, more and more people today choose the right food. What is proper nutrition? Around the system of proper nutrition today there are many myths and misconceptions. Some believe that proper nutrition - it's boring, others - that is expensive, others confuse it with vegetarianism. Refusal of meat, it does not imply, but salt, sugar and pastries should be replaced by more healthy foods. For example, instead of salt it is recommended to use spices, and sweets to replace dried fruit or honey. It is "boring" to eat properly those who do not think about the consequences of eating fast food and sweets for their health. Eating right does not mean monotonous, and favorite foods can be useful. It is possible to cook meat, fish, vegetables and fruits in an interesting and tasty way, having refused meat semi-finished products and canned fish. Those who are mistaken understands proper nutrition strict diets or vegetarianism. Strict diets have many restrictions on the state of health and age of patients, while it is recommended for everyone to eat healthy foods. Vegetarianism involves a complete rejection of meat, fish and eggs, and also has contraindications. People who eat right, count their calorie, protein, fat and carbohydrate standards and carefully study the food packaging. The less preservatives and additives the product contains, the more useful it is. Therefore, today products that are positioned on the market as "organic" or "farmer" are very popular. Refusing to eat foods containing carbohydrates or fats is also not correct. Carbohydrates such as cereals, pasta or whole grain bread. Practically do not bring benefits to the body pastries and confectionery. The same with fats - the most useful of them are found in some varieties of fish and vegetable oils. And trans fats, on which semi-finished products and fast food products are prepared, are harmful to health. The most useful for human food With a healthy diet, it is important not only to choose the right foods, but also to be able to combine them with each other in such a way that they bring maximum health benefits and ensure the proper functioning of the gastrointestinal tract. Products for a healthy lifestyle can be divided into three groups: containing carbohydrates - bread, cereals, pasta; containing proteins - meat, fish, dairy products; containing fats - some types of fish, meat and dairy products, vegetable oils, nuts. To comply with the rules of healthy eating, it is necessary to reduce the consumption of animal fats. Most of them are found in fried meat and meat products. Much more useful products containing omega-3 fatty acids: red fish, vegetable oils and nuts. It is recommended to exclude frying from cooking methods, replacing it with stewing or steaming. To make meat and fish better assimilated, it is necessary to combine them with vegetables. Vegetables contain almost no fat, and the absorption of some of them consumes a large amount of energy. Among the most useful vegetables are cabbage, celery, zucchini, carrots. In addition to vegetables, it is also necessary to eat fruits and berries. They contain the necessary vitamins, and they can be replaced with confectionery and refined sugar. But many vegetables and fruits may be contraindicated in patients with chronic diseases of the stomach and intestines. Limit or completely eliminate the need to salty foods, canned, baked pastry, semi-finished meat, sweet carbonated water and refined sugar. They contribute to the emergence of overweight and the development of associated diseases. Meat semi-finished products - meatballs, sausages and sausages contain animal fats. Therefore, replacing them with natural meat is useful for both budget and health. Vitamins and other beneficial substances found in meat Meat is included in the human diet since ancient times. But despite this, the meat has staunch opponents - vegetarians and vegans, who consider it a source of disease. According to their beliefs, a person should not eat the flesh of living beings, if he wants to rise higher by one step of civilization development. Meat is necessary for the proper growth and development of children and the productivity of adults, because it contains not only protein, but also vitamins. The most useful are low-fat types of meat - poultry, rabbit, beef, veal. Pork should be chosen more carefully because it is considered one of the fattiest meats. According to the content of vitamins and minerals produce the following beneficial types of meat: beef. Contains vitamin A, C, copper, manganese, iron, zinc, potassium. Beef has a beneficial effect on the heart, blood vessels and the circulatory system; hen. One of the most low-cost sources of protein with a small amount of fat and a complete lack of carbohydrates. Many chicken dishes, such as broth, are recommended to strengthen the immune system and recover from colds. The easy digestibility of the chicken makes it one of the main dishes for baby and diet food; turkey. Contains vitamin A, E, calcium, magnesium, phosphorus. Due to its high calcium content, turkey has a beneficial effect on bones and joints; rabbit. Rabbit meat is one of the most dietary foods, because it contains a minimum of fat and "bad" cholesterol. It is indicated for patients with diseases of the stomach and intestines and various types of food allergies; pork. Contains vitamin B 12 and D, iron, magnesium, sodium, phosphorus. Despite the benefits of pork for the joints and the nervous system, it should be chosen with care because of the higher fat content. Cooking, stewing and steam treatment are recognized as the best ways to cook meat, because they allow you to save the greatest amount of useful substances. But when frying in a frying pan or grill most of them are destroyed, the poet does not recommend eating fried meat in large quantities. Inclusion in the diet of meat in accordance with the state of health and age of a person contributes to the saturation of the body with proteins to improve productivity, efficiency and proper operation of all body systems. Proper nutrition involves some limitations, although not as severe as with various diets. However, it is often considered that proper nutrition is too difficult. How easy is it to go on a healthy diet? Proper nutrition - this is not a rejection of delicious dishes and the transition to a boring and monotonous menu. On the contrary, thanks to this diet, one can significantly diversify the diet and add many interesting and tasty dishes to the menu. The essence of proper nutrition is to choose only healthy foods and prepare healthy meals. How to switch to this food painlessly? First of all, it is necessary to study the information on how to eat. Basic rules: dramatically reduce fast food, fried, fatty, rich food; there is often and little by little; stew, boil, bake food; drink plenty of pure water; include in the diet more vegetables, fruits, herbs; reduce the consumption of sugar and salt. Then gradually implement the rules in life, slightly adjusting the rules for themselves. If you want to eat fast food, cook it at home. Yes, you can make a healthy patty, bake wholegrain Bun and get a tasty and healthy hamburger. Want to eat something sweet? Prepare a fruit and berry smoothie, bake a cake of oatmeal, dried fruit and fruits, low-fat dairy products. That is, it is important to find a substitute for tasty, but harmful dishes. In addition, every day you need to drink more water. If it is hard to put this rule into practice, it is worth gradually adding water to the diet. You can drink half a glass, but often. You can sometimes add lemon juice to water. And you can also put a bottle of clean water near the workplace and drink it a little during the day. The bottom line is to achieve the introduction of a useful rule in life, but with the least inconvenience. How to reduce the consumption of sugar and salt? Instead of salt in dishes should add spices, herbs and herbs. They improve the taste of food and without salt. As for sugar, you should use dried fruits, berries, fruits, honey. For example, when baking, you can add dried fruit to the dough, then baking will be sweet and sugar-free. Food should not be cooked by frying. You can get a ruddy crust using roasting. But sometimes you can allow yourself something fried, as long as it is rare. It is very important to eat often: 4-6 times a day. This will avoid overeating. Moreover, you can prepare food at home and take with you to work, and you can dine in the dining room or cafe. But in the latter case, you should carefully choose the dish and give preference to vegetable soups, salads, fish and lean meat. In order to switch to proper nutrition easily and painlessly, it is necessary to gradually introduce its basic rules into practice,rather than rush to apply everything at once. In addition, be sure to pick up delicious recipes, and not follow the path of least resistance and cook too simple and monotonous dishes. Then there will be no desire to buy purchased dumplings or a cake with a fat cream. Slimming with proper nutrition A healthy diet helps with weight loss. But the process will be rather slow. But the extra weight will not return, as after the diet. After all, you will continue to eat right and not return to the usual unhealthy diet. Weight loss with such nutrition is the best option for those who like to eat tasty food and at the same time want to become slimmer. You can use any products. However, it is necessary to pay attention to the amount of sugar and caloric intake. So, dairy products should be chosen with a low percentage of fat, meat and fish should also be lean. At the same time, you should not refuse vegetable oils, despite their high caloric content, they are necessary for health. Of course, losing weight will go at a faster rate if the menu contains a lot of greens, vegetables, berries and fruits. But at the same time in no case should not abandon eggs, cottage cheese, meat, fish, seafood. A sample menu can be made as follows: in the morning: rice with berries, boiled egg, cucumber and tea; or scrambled eggs with vegetables, two slices of bread, yogurt, cocoa; snack: smoothies or fruit; dinner: fish soup, baked chicken, salad, bread, compote; or vegetarian soup, fish stew with vegetables, a slice of bread, fruit drink; snack: slice whole grain bread with curd cheese and tomato; or cottage cheese with nectarine; dinner: liver fritters, salad, vegetable juice; or stew, bread, kefir. This menu is varied and non-starved, as opposed to the menu during different diets. Therefore, it will be very easy to lose weight. Recipes for health and shape Recipes need to choose the original, interesting. The tastier the dish, the easier it will be to transfer the transition to proper nutrition. Here are some recipes. Put boiled carrots, onions, five potatoes into boiling water, cook for fifteen minutes. Beat the blender. Cut into plates 100 g of champignons, stew. Add to the soup mushrooms, garlic clove, 100 g of grated cheese, cook for another five minutes. Serve with croutons (dice black bread and dry in the oven). Minestrone Dice 200 g of pumpkin and zucchini, three multicolored peppers, celery stalk, chop the onion and three cloves of garlic. Heat onions and garlic in a frying pan for two minutes, add the rest of the vegetables, simmer on low heat for 20 minutes. Add broth or water, three sliced tomatoes, handful in advance boiled white beans, herbs, salt. Boil another five minutes. Meat rolls Cut a glass of spinach and simmer for two minutes. Cut veal in portions, discard, salt and pepper. Put spinach on each piece, wrap up with a roll, fix with a toothpick. Wrap in foil and bake in the oven or stew in a frying pan, adding vegetable broth. Salmon with zucchini and pepper Salt salmon steaks, put in a baking sheet, put sliced zucchini and two sweet peppers nearby. Bake the fish with vegetables. Serve with sauce (mix chopped peppers, parsley, orange juice). Grate celery root, dice two sweet peppers and three tomatoes. Mix vegetables, fill with vegetable oil and juice of half a lemon. Cake with cherry free 200 g of cherries from the bone. Beat 300 g low-fat cottage cheese, a couple of spoons of semolina, an egg and a spoonful of sour cream. Add a little water. Put the berries in the dough, mix and bake in the oven. Beat banana, 50 g strawberries and blueberries, two apricots and 100 grams of natural yogurt. Recipes, as you can see, are different. All dishes are tasty and healthy. You can find many more similar recipes that can be used with proper nutrition.
<urn:uuid:d6da0422-ad45-4813-bf77-6bd9cc5df57f>
CC-MAIN-2022-33
https://do-dietary-supplements-work.com/proper-nutrition.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00273.warc.gz
en
0.946773
6,638
3.21875
3
Package: gccxml (0.9.0+cvs20120420-4) Links for gccxml Download Source Package gccxml: - Homepage [www.gccxml.org] XML output extension to GCC There is one open-source C++ parser, the C++ front-end to GCC, which is currently able to deal with the language in its entirety. The purpose of the GCC-XML extension is to generate an XML description of a C++ program from GCC's internal representation. Since XML is easy to parse, other development tools will be able to work with C++ programs without the burden of a complicated C++ parser. Other Packages Related to gccxml
<urn:uuid:b605a4dd-b3c4-43ff-b6b3-3b889dd27768>
CC-MAIN-2017-04
https://packages.debian.org/wheezy/i386/devel/gccxml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00558-ip-10-171-10-70.ec2.internal.warc.gz
en
0.755704
147
1.867188
2
Williamsburg in James City County, Virginia — The American South (Mid-Atlantic) Community of Grove Erected 2012 by Department of Historic Resources. (Marker Number WT 4.) Location. 37° 13.281′ N, 76° 37.556′ W. Marker is in Williamsburg, Virginia, in James City County. Marker is at the intersection of Pocahontas Trail (U.S. 60) and Magruder Avenue, on the right when traveling east on Pocahontas Trail. Click for map. Marker is in this post office area: Williamsburg VA 23185, United States of America. Other nearby markers. At least 8 other markers are within 3 miles of this marker, measured as the crow flies. Trebell's Landing (approx. 0.8 miles away); Carter's Grove (approx. 0.8 miles away); Martin's Hundred Martin's Hundred Church (approx. 0.9 miles away); Whitaker's House (approx. 2.7 miles away); Aviation Field Yorktown (approx. 3.1 miles away); Lebanon Church (approx. 3.1 miles away); Endview (approx. 3.1 miles away). Click for a list of all markers in Williamsburg. Categories. • African Americans • Settlements & Settlers • War, World II • Credits. This page originally submitted on , by Bernard Fisher of Mechanicsville, Virginia. This page has been viewed 226 times since then. Photos: 1, 2. submitted on , by Bernard Fisher of Mechanicsville, Virginia. This page was last revised on June 16, 2016.
<urn:uuid:0ff17757-9656-4288-8a0e-3c3bfe10b575>
CC-MAIN-2017-04
http://www.hmdb.org/marker.asp?marker=66911
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00187-ip-10-171-10-70.ec2.internal.warc.gz
en
0.902737
341
2.21875
2
Six Essays in Hanseatic History The Hanseatic League was a remarkable and unique organisation in medieval Europe, a system of trade across the continent which stretched from Novgorod in Russia to Lynn and Boston on the east coast of England. Its origins were small groups or hanse, German merchants seeking trading rights abroad as the continent's population and economy expanded. By its heyday around 1400 it linked some 80 larger towns and 100 smaller ones. In Six Essays in Hanseatic History the authors come together to present aspects of the League from their own perspectives and specialisations. The New Hanseatic League was founded in the Netherlands in 1980, and now including Hull, Kings Lynn and Boston. All its members recognise the importance of international trade and participate in many practical ways, as well as rediscovering something of the story of the first Hanseatic League.
<urn:uuid:1dddfd0b-2f19-458d-8409-b6016ae8e7c5>
CC-MAIN-2022-33
https://poppyland.co.uk/products/B79633
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00077.warc.gz
en
0.941815
211
2.75
3
The rate at which Americans quit their jobs hit a historic high this spring, and workers may not be done job-hopping this year. More than a third of workers (37%) are either thinking of leaving their current jobs or are already preparing to make the move, according to a Yahoo Finance/Harris Poll survey of 1,639 U.S. adults conducted June 25-28, 2021. Four in five of the potential quitters (83%) want to make the move in the next six months, while the same percentage said they’ve been considering the move for the past year. The top reasons why workers want to quit are better opportunities (46%), higher salary (42%), better work-life balance (34%), changing industries (27%), and not enjoying their work (27%). Survey respondents could select more than one reason. “People are leaving for more attractive jobs because there are lots of attractive jobs on offer,” ZipRecruiter Economist Julia Pollak told Yahoo Money. “The share of signing bonuses has very radically exploded, the share of jobs offering a four-day workweek has also about doubled.” Job quits show it's ‘an amazing time for many young people' The survey results come after the rate at which workers quit their jobs hit a record high of 2.8% in April and remained historically elevated in May at 2.5% — much higher than before the pandemic. The number of job openings reached a high three months in a row from March to May — meaning workers have more options if they decide to leave. Accommodation and food services along with retail trade had the largest quit rates in May of 5.7% and 4%, respectively, according to data by the Labor Department. “There are many jobs where pay is low, and one doesn't have that much attachment to an employer,” Pollak said. “When suddenly warehousing and trucking and nursing are offering huge bonuses and reducing experience requirements and training requirements, they suddenly become much more attractive.” Younger workers are more likely to consider quitting than older ones, according to the data. Nearly half of millennials (46%) and 36% of Gen Z are thinking of leaving their jobs, while just 31% of Gen Xers and 21% of baby boomers are contemplating the move. “Younger people do switch jobs more frequently typically,” Pollak said, “But now… is an amazing time for many young people in the job market because many employers suffering from worker shortages are reducing the requirements for candidates, and so young people are becoming eligible for jobs that they may not have been able to get before.” Retaining workers with ‘the things that people care about most’ While quitting is on the rise, retaining workers may not be that hard. A 10% increase in annual salary would convince 37% of workers to stay with their current employer, the survey found. That syncs with other data on what workers want. For instance, workers’ earnings expectations reached a historic high in March 2021 of $72,341, according to the latest data available by the Federal Reserve Bank of New York. Employers can also retain workers by improving their benefits package — according to 32% of workers — including such perks as health insurance, retirement savings plan, stock options or by providing more time off, which 23% of workers selected. “We see an enormous preference for remote work,” Pollak said, “but, in general, historically, the things that people care about most are pay, benefits, and growth potential in a job.”
<urn:uuid:4dc3dc9e-bda8-41ff-8013-a19855657379>
CC-MAIN-2022-33
https://finance.yahoo.com/news/americans-are-considering-quitting-their-jobs-145258951.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00078.warc.gz
en
0.973556
755
1.53125
2
Estimated read time: 2-3 minutes John Daley ReportingA special visitor is in Utah today hoping to convince lawmakers that now is the time to pass a law which increases the penalties for crimes motivated by hate. Her name is Louvon Harris; she's the sister of James Byrd, the man killed in a racially-motivated murder. That case eventually led Texas to pass a tougher hate crimes bill; she's hoping to convince Utah lawmakers to do the same. Louvon Harris has endured more pain than most and hopes to spare others a similar fate. To that end she wants people to take seriously crimes motivated by hate. Louvon Harris, Sister of James Byrd: "James Byrd Junior was killed not because of his name. He was killed because he was black. And they took the liberty to intentionally drag him another three miles to put him in front of a black cemetery to send the message this is what we think of black America." The murder of James Byrd was called the most heinous hate crime in decades--three white men were convicted of chaining him to the back of a pickup and dragging him miles to his death. Today Harris visits with lawmakers in both houses, and the governor--who says he's is open to new hate crimes legislation--though lawmakers in the GOP-controlled legislature are still considering it. John Valentine, (R) Senate President: "Having her here brings a focus on the issue. The specifics of the bill will still govern however, whether the bill passes." Sen. Parley Hellewell, (R) Orem: "Black people kill white people. Black people kill black people. White people kill black people. Is it a hate crime when they kill a black person and not when they kill a white person? You know, now you're trying to start figuring out what's in somebody's mind when they committed the crime and I'm not sure you can do that." In past years hate crimes laws have stalled on the inclusion of sexual orientation. Harris overcame that same concern in Texas, where lawmakers eventually passed the tougher law. And she notes the beating death of gay Wyoming student Mathew Shepard as an example of a crime that deserves a more severe penalty. Louvon Harris, Sister of James Byrd: “We’re all Americans. No one deserves to die because of hate.” Hate crimes legislation has failed for the past several years, but this year Utah has a new governor and new leadership in both the House and the Senate. Advocates hope this year they will finally get this through.
<urn:uuid:afd6999a-96de-4a17-8aeb-ea6dc26dbdb0>
CC-MAIN-2022-33
https://www.ksl.com/article/80057
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00674.warc.gz
en
0.971446
523
1.773438
2
Research: Learning how to eat like a pig Recent research at Wageningen University and Research Centre, the Netherlands, indicates that training can help piglets overcome the difficult timeframe around weaning. Dr Marije Oostindjer received her PhD last week with a thesis called Learning How to Eat Like a Pig. Key to her research was to find out how piglets learn and how this knowledge can be used to facilitate the weaning process. She discussed three different aspects: - Direct learning from the sow through cues derived from observation and eating together - Learning in an enriched environment - Learning from flavour cues in the maternal diet Learning from the sow Oostindjer noted that the presence of the sow can influence piglet behaviour in various ways. She stated: "Piglets that were allowed to explore novel food items before weaning in the presence of the sow were less reluctant to explore an dingest these novel food items than in her absence." "Being able to interact more and eat together with the sow also had positive effects on food intake before weaning an dresulted in less damaging behaviour and more play behaviour after weaning." "Piglets learn effectively through both observation of the sow and participation with the sow while she eats, and they use information form both the location and the type of food eaten." In various tests, Oostindjer tested the behaviour of piglets in barren and enriched post-weaning housing conditions, e.g. more space allowance, straw, wood shavings, peat and branches. She concluded, "Enrichment of the environment before weaning positively affected growth and food intake afer weaning. Providing enrichment after weaning increased growth and feed efficiency and decreased diarrhoea and stress-related behaviours." The role of flavours also play a role as weaned piglets ‘recognise’ strong smells or flavours like e.g. carrot or anise, when this had been consumed prenatally or perinatally by their mothers. The resulting post-weaning effect is not so much related to piglets liking the acutal feed better – more it is related to a reduction of weaning stress levels. The result, Oostindjer noted, is less stress-related behaviour, reduction of diarrhoea, and an increase of growth and feed intake. The PhD thesis was presented late last week with an international symposium around the theme. Presentations made e.g. parallels with similar developments in human behaviour and flavour preference. Wageningen University and Research Centre To comment, login here Or register to be able to comment.
<urn:uuid:f3e93cac-bba5-4c86-a500-8646a424c54b>
CC-MAIN-2017-04
http://www.allaboutfeed.net/Nutrition/Research/2011/9/Research-Learning-how-to-eat-like-a-pig-AAF012259W/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00531-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954959
545
3.578125
4
Guidelines for Running MPI Applications in Windows Azure Updated: January 13, 2014 Applies To: Microsoft HPC Pack 2008 R2, Microsoft HPC Pack 2012, Microsoft HPC Pack 2012 R2, Windows HPC Server 2008 R2 This topic provides guidelines and procedures for enabling MPI applications to run on Windows Azure nodes. This information applies to Windows Azure nodes that are added to an on-premises Windows HPC cluster (in a Windows Azure “burst” scenario), or to nodes that are deployed as part of a Windows Azure service that uses the Windows Azure HPC Scheduler (Windows Azure only). For general guidelines about data and file shares on Windows Azure nodes, see Guidelines for Running HPC Applications on Windows Azure Nodes. In this topic: What kind of MPI jobs are best suited for Windows Azure? Registering an MPI job with the firewall on Windows Azure nodes Setting the MPI netmask for burst to Windows Azure nodes Tracing MPI applications on Windows Azure nodes Identifying Windows Azure nodes in MPI error messages Additional consideration for burst to Windows Azure MPI jobs that are not particularly latency and bandwidth sensitive are more likely to scale well in the Windows Azure environment. Latency and bandwidth sensitive MPI jobs can perform well as small jobs, where a single task runs on no more than a few nodes. For example, in the case of an engineering simulation, you can run many small jobs to explore and define the parametric space before increasing the model size. This can be particularly useful in situations where your access to on-premises compute nodes is limited, and you want to ensure that you are using your cluster time for the most appropriate models. Why do we make these recommendations? MPI jobs often run on clusters with specialized low-latency, high-bandwidth network hardware. Windows Azure nodes are not currently connected with this type of network. Additionally, Windows Azure nodes are periodically reprovisioned by the Windows Azure system. If a node is reprovisioned while it is running an MPI job, the MPI job will fail. The more nodes you are using for a single MPI job, and the longer the job runs, the more likely it is that one of the nodes will be reprovisioned while the job is running. An administrator must configure Windows Firewall to allow MPI communication between the compute nodes in Windows Azure. To this, you can register each MPI application with the firewall (create an application-based exception). This allows MPI communications to take place on a port that is assigned dynamically by the firewall. You can configure firewall exceptions on your nodes by using the clusrun and hpcfwutil commands. |For burst to Windows Azure nodes, an administrator can configure a firewall exception command to run automatically on all new Windows Azure nodes that are added to your cluster. After you run the hpcfwutil command and verify that your application works, you can add the command to a startup script for your Windows Azure nodes. For more information, see Configure a Startup Script for Windows Azure Nodes.| The following procedure describes how to add an exception for myApp.exe to all nodes. You must be an administrator for the Windows HPC cluster or for the Windows Azure HPC Scheduler deployment to perform the following steps. Connect to your head node in one of the following ways (using administrator credentials): Log in directly to the head node (on-premises). Run the command from a client computer that has the HPC Pack client utilities installed (on-premises). If the CCP_SCHEDULER environment variable is not set on the computer, then include the /scheduler:<yourHeadNodeName> parameter in the clusrun command. Use the Windows Azure Management Portal to make a Remote Desktop connection to a head node in your service deployment (Windows Azure HPC Scheduler). - Log in directly to the head node (on-premises). Open a command prompt. Type the following command: clusrun hpcfwutil register myApp.exe e:\approot\myApp.exe To run a clusrun command on a subset of nodes, you can specify a clusrun parameter such as /nodegroup:<node_group_name>, /nodes:<node_list> (comma separated), or . For more information, see clusrun. When you run MPI jobs on Windows Azure nodes, ensure that the IP addresses of the Windows Azure nodes are within the range of accepted IP addresses that is specified for the MPI network mask. The MPI network mask determines from what range of IP addresses an MPI rank can accept communications. If jobs on Windows Azure nodes are failing with errors about connection failures, you might need to reset the netmask to enable communication between the nodes. The default cluster-wide range is defined through the CCP_MPI_NETMASK cluster environment variable. The value that is specified in this cluster variable is automatically set as a system environment variable on all cluster nodes. Depending on your requirements, an administrator can reconfigure the network mask at a cluster-wide level, or override the cluster settings at a node or node group level. A job owner can override cluster or node settings at the job level (for more information, see Environment variable hierarchy). You can disable the netmask (allow all IP addresses) on the whole cluster. For example, run the following command on the head node: You can broaden the range to ensure that it includes your Windows Azure nodes and on-premises nodes. For example, if your Windows Azure nodes have a 10.x.x.x IP address and the default address range for on-premise nodes is 10.x.x.x or 10.1.x.x, you can set the netmask as follows: cluscfg setenvs ccp_mpi_netmask=10.0.0.0/255.0.0.0 |If you configure connectivity between the Windows Azure nodes access and on-premises resources, you should define separate netmasks for your on-premises and Windows Azure nodes. Ensure that the netmask for the Windows Azure nodes does not allow on-premises IP addresses.| You can disable or set the netmask (allow all IP addresses) on just your Windows Azure nodes. For example, to disable the netmask, type the following command: clusrun /nodegroup:AzureNodes setx CCP_MPI_NETMASK=”0.0.0.0/0.0.0.0” A job owner can specify the desired range (or disable it) at the job level by setting the MPI environment variable MPICH_NETMASK <range> in the mpiexec command arguments. For example, if the Windows Azure nodes have IP addresses starting with 10.28.x.x, type the following command: job submit /nodegroup:azurenodes /numcores:32 /stdout: %CCP_PACKAGE_ROOT%\myApp\out.txt /workdir: %CCP_PACKAGE_ROOT%\myApp mpiexec –env MPICH_NETMASK 10.28.0.0/255.255.0.0 myApp.exe If you try tracing an MPI application on Windows Azure nodes by using the –trace argument in mpiexec, the default trace file size (10 GB) is too large. The job submission is likely to fail with a message about insufficient disk space. You can reduce the trace file size by including the –tracefilemax argument. For example, to configure a trace file size of 1 GB, set –tracefilemax 1000. Error messages for MPI applications typically use the host name to identify nodes. In Windows Azure, the host name is not the friendly name for the nodes and can be difficult to identify. You can use HPC Cluster Manager to view the node name in the HPC cluster and the Windows Azure instance name. MPI jobs cannot span across on-premises and Windows Azure nodes, or across different Windows Azure node deployments (Windows Azure nodes that deployed by using different node templates). Separate Windows Azure node deployments are isolated, and MPI processes would not be able to communicate with each other. You can prevent MPI jobs from spanning these boundaries by submitting MPI jobs to specific node groups. Node groups can be enforced by the administrator at the job template level, or can be specified by the job owner at the job level.
<urn:uuid:52c6c46f-aee1-4577-82c6-059bacd5a97d>
CC-MAIN-2017-04
https://technet.microsoft.com/en-us/library/hh859817(v=ws.10)
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00251-ip-10-171-10-70.ec2.internal.warc.gz
en
0.81852
1,789
1.65625
2
BMW researchers have revealed a prototype car key that can, one day in the future, also be used to buy life's essentials, as well as pay for your public transport tickets. Would sir like some petrol with that? According to Hans-Jörg Vögel, a project manager at BMW Group Research and Technology, the company has inserted an RFID security chip into a prototype car key. With this chip on board, the key can be loaded with personal information, such as your credit card details, meaning that you could feasibly make purchases with your car key, should your retailer of choice have a proximity reader. If you live in a city whose public transport system uses stored value cards read by proximity sensors, like the Octopus card in Hong Kong and Oyster in London, cash can also be loaded on to your key, and your key swiped at turnstiles to pay for your train, bus or tram fare. This smart key can also store a raft of in-car settings, such as seat position, steering wheel height, favourite stations and so forth. In some of today's luxury cars these settings are associated to particular keys, but because BMW's prototype key stores personal preferences on the key itself, your settings aren't restricted to your own car. They could, possibly, be used in other BMWs that you may borrow, such as from your wife, friends or a hire car company. According to BMW Australia this technology is quite a while away from turning up in your favourite Bimmer. So our squeals of ironic delight as we pay for our bus fare with a car key will have to be put on ice for a little while.
<urn:uuid:0ea1b158-e719-4671-b9d1-6e828bf88a03>
CC-MAIN-2017-04
https://www.cnet.com/roadshow/news/bmw-puts-credit-card-train-ticket-on-car-key/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00143-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964877
340
1.78125
2
Student or Learner Travelling east along the coast to Antalya, you may easily miss the great Lake of Köyceğiz lying behind the orange trees. Visitors at nearby Dalyan sail regularly back and forth between the famous small peninsula of sand where turtles build their nests and the ancient ruins of Caunus four miles away. They may even visit the mud baths at the tip of the lake.Yet they seldom try to swim in the lake itself, which is strangely hidden away from both the highway and the tourist crowd; this has helped the lake to evolve into a rare area of ecological importance. The passage is largely concerned with the ----. A) historical ruins around Köyceğiz B) great Lake of Köyceğiz C) sandy beaches around Köyceğiz D) turtles nesting in Dalyan E) tourist attractions on the way to Antalya B or E ? I like E for that one. Yes, I can see why you would choose E. It's unclear from the passage whether the visitors at Dalyan sailing are actually on part of the lake or not. This would be the clincher (if they were). Even so, the sentence in blue is the only part not about the lake.
<urn:uuid:d99bb310-4b3f-44af-b457-0d05f6357c27>
CC-MAIN-2016-44
https://www.usingenglish.com/forum/threads/109277-Travelling-east-along-the-coast-to-Antalya
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721355.10/warc/CC-MAIN-20161020183841-00014-ip-10-171-6-4.ec2.internal.warc.gz
en
0.95911
268
2.1875
2
Bob is a peasant lad in medieval times who goes to see a dragon that is terrorizing a nearby village. There he meets a young wizard named Stephen who joins with Bob to kill the dragon. Through a legal technicality, Bob is cheated out of the rewards promised for success in killing the dragon. Thereafter, Bob sets out to kill more dragons in order to buy a horse and armor so that he might become a knight. During the course of events that follow, Bob meets and is befriended by Sir Wilfred, who invites Bob to spend the winter at his castle and receive training for the knighthood. The next spring Bob is on his way to the castle of the king to petition for knighthood when he encounters a lady in distress, being held captive by four of the king's best knights. Bob rescues Lady Katherine and falls in love with her as they travel back to the castle of her father, a powerful duke in the northern part of their country. Then, Bob learns that Lady Katherine is betrothed to Sir Wilfred. Bob gets drawn into fighting a civil war to overthrow the evil king. The ending portion of the novella revolves around the decisive battle between the army of the northern nobles and the army of the king for control of the kingdom and around resolving the romance between Bob and Lady Katherine. The review of this Book prepared by Linda Gilleland
<urn:uuid:458f75b1-e090-4b1e-a0c2-1a4279a107bb>
CC-MAIN-2017-04
http://allreaders.com/book-review-summary/bob-the-dragon-slayer-30847
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00243-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965032
286
1.65625
2
I'm not sure what this is, but it is awesome. Sticky Light is a student project at the Department of Information Physics and Computing at the Ishikawa Komuro Laboratory of the University of Tokyo. One source says this: Sticky Light is a 3d tracking technology using a laser diode (low power), a pair of steering mirrors and a single non-imaging photodetector. The big difference to other tracking technologies is the fact that the Sticky Light doesn’t use a camera or projector. So what could you do with? It can track the contour of objects and even augment real-time drawings. Or you could build games like air hockey or a pinball game. Official Website via Oh Gizmo!
<urn:uuid:ee3b40c0-0d9c-4c19-9422-4712f831e818>
CC-MAIN-2016-44
http://www.neatorama.com/2009/08/09/sticky-light/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00324-ip-10-171-6-4.ec2.internal.warc.gz
en
0.882831
153
2.484375
2
Joachim II introduced the Reformation in the Electorate of Brandenburg on November 1, 1539. To his contemporaries, however, something else was more important: Joachim was notorious for his sumptuous lifestyle and the high debt mountain he had accumulated in his 36-year rule. Joachim II Hector. Painting by Lucas Cranach the Elder around 1550. You only have to take a look at the portrait of Joachim II painted by Lucas Cranach around 1550. The Elector of Brandenburg plays to the gallery. He wears not less than two heavy gold chains over the gold enwrought robe with sleeves made of expensive brocade. He is dressed in a precious fur, complemented by a high fur hat emblazoned with a gorgeous piece of jewelry. Almost every finger is decorated with a sumptuous ring. Altogether, every inch of this ruler tells of his love for pomp and splendor. It was too bad that the revenues from the Electorate of Brandenburg were not enough to keep up with the claims of its ruler. The country was sparsely populated. Even if the cities had potential, they lacked capital and courageous merchants. Perhaps that was the reason why Joachim II allowed the Jews on June 25, 1539 – before his conversion to the Reformation, by the way – to resettle in the Margraviate of Brandenburg. Joachim II. Taler 1541, Berlin. Extremely rare. Very fine. Estimate: 20,000 euros. From Künker sale 300 (2018), No. 9. This was necessary because already in 1540 Joachim II had become so debt-ridden that he had to resort to extraordinary measures. He summoned the Assembly of Estates, spoke of bankruptcy, and in order to prevent that, his subjects advanced the money he needed to cover his debts. In return, they were granted the right to collect the electoral excise and property taxes themselves until the money they had lended was reimbursed with interest and compound interest. That never happened, though. The “Landschaftliches Kreditwerk”, as this new authority was called, existed until 1820 and for many centuries served as a guarantor for any debts that a sovereign incurred. No wonder that the talers from this time are so rare and that the gold gulden consist of bad gold. Precious metal did not grow on trees during these years. Joachim II. Ducat 1560, Berlin. Only known specimen in private possession. Almost extremely fine. Estimate: 60,000 euros. From Künker sale 300 (2018), No. 8. This did not change until Joachim II appointed Lipman ben Juda as coffer administrator, chairman of the electoral mint and representative of the Jews in the Margraviate of Brandenburg in 1556. As such, Lipman had to ensure that his master had sufficient financial means to finance his elaborate lifestyle. This was no easy task; however, thanks to a number of coercive measures he was successful. Lipman watched over the exchange of money. It brought lavish revenues, because on the home market the nominal value of Brandenburg coins exceeded their intrinsic value. Private ownership and export of gold and silver was banned, so that every merchant had to do with the bad coins. Therefore, everyone doing business in Brandenburg lost a substantial part of his profits through the forced exchange rate. The silver for the mint was supplied by the Jewish community, which was forced to buy silver abroad and sell it to the mint at a fixed price below purchase price. Did Lipman have a personal benefit from this situation? We do not know. The historical sources that either condemn or protect him are too much charged with emotions. In any case, he is said to have been notorious for his credit transactions and high interest rates of up to 54% per year. Joachim II. Portugaleser of 10 ducats 1570, Berlin. Very fine. Estimate: 200,000 euros. From Künker sale 300 (2018), No. 7. Shortly before Joachim’s death, the first Brandenburg portugaleser worth 10 ducats were produced. We happen to know where the gold came from. Joachim II is said to have given a heavy gold chain to his mint master Lipman, in order to melt it down and strike the portugaleser. On the evening before his death he presented every guest at Koepenick Castle with one of these valuable pieces. They were meant to illustrate the wealth of the elector to the guests. But that wealth left much to be desired. Joachim bequeathed a debt mountain of 4.7 million (counting) gulden to his son Johann Georg. Johann Georg. Painting by Lucas Cranach the Younger from 1564. The latter of course did not blame his father for this, but his father’s court factor and the Jewish community. Johann Georg had Lipman’s property searched and all the valuables confiscated; and he did nothing to prevent the people of Berlin from plundering and burning the Jewish quarter. A trial took place. Lipman’s books were audited, and the judge accused the court factor to have embezzled the elector’s money. Quite the opposite: it was confirmed that Joachim II actually still owed Lipmann 89 talers and 5 silver groschen. But that did not do Lipman any good. Now he was charged with sorcery and accused of murdering the Elector. When tortured, Lipman confessed to whatever he was accused of. The gold chain from which the portugaleser had been minted proved pivotal in the interrogation. Lipman admitted having stolen it. Also he confessed to burying a black rooster in the mint in order to devilishly prevent any succeeding mint master from making a profit. On the day of his execution, on January 28, 1573, Lipman ben Juda revoked his confession. Nevertheless, he was broken on the wheel and quartered all the same. Johann Georg. Ducat 1590, Berlin. Extremely rare. Extremely fine. Estimate: 25,000 euros. From Künker sale 300 (2018), No. 12. Johann Georg expelled the Jews once again. He went down in history as Oeconomus, the good householder. All coins presented here will be offered at the Künker Berlin Auction Sales 2018. You can browse through the online catalogues here.
<urn:uuid:d165f2dc-83c0-4fef-aa2b-0252997ebca3>
CC-MAIN-2022-33
https://coinsweekly.com/joachim-ii-and-his-jewish-court-factor/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz
en
0.972196
1,368
3.421875
3
On this day in 1773, a group of Massachusetts colonists disguised as Mohawk Indians board three British tea ships moored in Boston Harbor and dump 342 chests of tea into the water. In most American ports, the resistance group known as the Sons of Liberty scared off British tea-carrying ships by threatening their captains with tarring, feathering or worse. However, when three tea ships, the Dartmouth, the Eleanor and the Beaver, arrived in Boston Harbor and the colonists demanded that the tea be returned to England, Thomas Hutchinson, the British-appointed governor of Massachusetts, refused to permit the ships to leave. Patriot leader Samuel Adams organized the now-famous “tea party” with about 60 members of the Sons of Liberty. The British tea dumped into Boston Harbor on the night of December 16 was worth more than $700,000 in today’s currency. Parliament, outraged by the blatant destruction of British property, enacted the Coercive Acts, called the “Intolerable Acts” by the colonists, in 1774. The Coercive Acts closed Boston to merchant shipping, established formal British military rule in Massachusetts, made British officials immune to criminal prosecution in America, and required colonists to quarter British troops. The colonists subsequently called the first Continental Congress to consider a united American resistance to the British. – History.com Staff
<urn:uuid:7daf66c9-b285-4df1-85b7-6899d4d53ff1>
CC-MAIN-2022-33
http://bowienewsonline.com/2016/12/sons-of-liberty-dump-british-tea/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00671.warc.gz
en
0.951001
277
4.03125
4
THE EPIGONI (fragments) Fragment #1 -- Contest of Homer and Hesiod: Next (Homer composed) the "Epigoni" in seven thousand verses, beginning, `And now, Muses, let us begin to sing of younger men.' Fragment #2 -- Photius, Lexicon: Teumesia. Those who have written on Theban affairs have given a full account of the Teumesian fox. (1) They relate that the creature was sent by the gods to punish the descendants of Cadmus, and that the Thebans therefore excluded those of the house of Cadmus from kingship. But (they say) a certain Cephalus, the son of Deion, an Athenian, who owned a hound which no beast ever escaped, had accidentally killed his wife Procris, and being purified of the homicide by the Cadmeans, hunted the fox with his hound, and when they had overtaken it both hound and fox were turned into stones near Teumessus. These writers have taken the story from the Epic Cycle. Fragment #3 -- Scholiast on Apollonius Rhodius, Arg. i. 308: The authors of the "Thebais" say that Manto the daughter of Teiresias was sent to Delphi by the Epigoni as a first fruit of their spoil, and that in accordance with an oracle of Apollo she went out and met Rhacius, the son of Lebes, a Mycenaean by race. This man she married -- for the oracle also contained the command that she should marry whomsoever she might meet -- and coming to Colophon, was there much cast down and wept over the destruction of her country. (1) So called from Teumessus, a hill in Boeotia. For the derivation of Teumessus cp. Antimachus "Thebais" fr. 3 (Kinkel).Next
<urn:uuid:07c577ee-1efc-436b-8560-1c0701300f08>
CC-MAIN-2017-04
https://homer.thefreelibrary.com/Collection-Of-Hesiod-Homer-and-Homerica/64-1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00090-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964993
412
2.53125
3
One of the distinctive features of the second person of the Holy Trinity is that the eternal word — and only the word, not the Father nor the Spirit — enters into creation as part of creation. God freely and lovingly surrenders the trappings of divinity in order to become one with and part of the material world (Philippians 2:6-11). Our liturgical calendar marks a number of moments when we acknowledge this profound truth of faith. At Christmas, we celebrate the incarnation, when God the son becomes flesh of the world (sarx in Greek) and makes a home among humanity and the whole family of creation. Ordinary time recounts the preaching and deeds of Christ, as well as his miraculous engagement with the natural world. During Holy Week, we commemorate the last days of the Lord's life, recall the real precariousness and vulnerability of his passion and death and rejoice in his bodily resurrection from the dead. But the presence of Christ in the world is not a one-time-only event marked by the life and death of Jesus of Nazareth, as if it were a historical marker merely worthy of post-factum commemoration. Rather, God's continued presence to us in the material world is precisely what the sacramental life of the church is all about. This is especially true at Mass. When we gather at Eucharist, we celebrate the manifold ways Christ continues to enter into the concrete reality of creation. The Second Vatican Council's dogmatic constitution on the liturgy, Sacrosanctum Concilum, reminds us that Christ is "always present in His Church" and that during the celebration of the Mass, Christ is present in the presider, the assembly of the baptized, the holy Scriptures proclaimed and the Eucharistic species of bread and wine shared. Whether we consider the presence of Christ in our neighbor or the sacramental presence of Christ in the gifts of the altar, both reflect God's continued self-offering and closeness to all creation. Pope Francis echoes the profundity of God's choice to communicate God's self to us in the ordinariness of time and space. Writing in "Laudato Si', On Care for Our Common Home," he says: "Encountering God does not mean fleeing from this world or turning our back on nature." Furthermore, the pope highlights that the sacraments are themselves significant not only as a means of God's grace to the human family, but to all of God's creation. The Sacraments are a privileged way in which nature is taken up by God to become a means of mediating supernatural life. Through our worship of God, we are invited to embrace the world on a different plane. … For Christians, all the creatures of the material universe find their true meaning in the incarnate Word, for the Son of God has incorporated in his person part of the material world, planting in it a seed of definitive transformation. In a way, just as we can say with confidence that Christmas is a solemnity of all God's creatures, as I explained in my Christmas column, we can also say that the sacramental life of the church has ecological import. For this reason, when we gather to celebrate the Eucharist, we celebrating something of cosmic significance. The Eucharist is not simply a means by which humanity receives the sacramental presence of Christ, as if the bread and wine were mere vehicles of the divine for us humans alone. Rather, the Eucharist is the privileged place where God is now present to our world as part of that world. As Francis explains, again in Laudato Si': It is in the Eucharist that all that has been created finds its greatest exaltation. Grace, which tends to manifest itself tangibly, found unsurpassable expression when God himself became man and gave himself as food for his creatures. The Lord, in the culmination of the mystery of the Incarnation, chose to reach our intimate depths through a fragment of matter. He comes not from above, but from within, he comes that we might find him in this world of ours. In the Eucharist, fullness is already achieved; it is the living center of the universe, the overflowing core of love and of inexhaustible life. Joined to the incarnate Son, present in the Eucharist, the whole cosmos gives thanks to God. Indeed the Eucharist is itself an act of cosmic love. Others have likewise tied the celebration of the Eucharist — in which human creatures in all our finite corporeality and fragility gather in thanksgiving to receive the sacramental presence of Christ in earthen elements formed from wheat and wine — to the broader community of creation. Famously, Jesuit Fr. Pierre Teilhard de Chardin composed a poetic reflection on this theme titled "The Mass on the World" in his 1961 book Hymn of the Universe. More recently, the late philosopher and spiritual writer Beatrice Bruteau wrote in a 1990 article titled "Eucharistic Ecology and Ecological Spirituality," that we needed to renew the story we tell about the Eucharist and the world. She called for a shared vision of our "Eucharistic planet," by which she meant that Christians would take seriously the significance of God's presence in the material world, especially in light of environmental catastrophes and the idolatrous application of Christian Scriptures to justify our ecological abuse of nonhuman creation. Bruteau explains: A sense of the Eucharistic Planet, of the Real Presence of the Divine in the world, is something we need now for the protection of the planet. It may be that biblical religion has encouraged Western civilization to take unfair advantage of the natural environment under the belief that it was given to humanity by God for purposes of human exploitation and has no rights of its own. It may be that we need to tell ourselves a new story about how we fit into the general scene and what it's all about. I don't dispute that. But I would like to emphasize that on the basis of the Gospel we can say something quite constructive and very exciting that will give us the new story and a vision of the wholeness of the planet. Such considerations of the connection between the Eucharist and the material world challenge us — especially in an age of catastrophic climate change — to rethink the relationship between our sacramental worship and the way we live our lives. As Sacrosanctum Concilium asserts, the Sunday celebration of the Eucharist is the source and summit of our faith. We bring our whole selves to the Lord's table, and we go forth from that celebration renewed in our baptismal call to follow in the footprints of Jesus Christ. It is a time of renewal and recommitment, an opportunity to "be what you can see, and receive what you are," as St. Augustine famously exhorted the faithful in an exhortation on the Eucharist 1,600 years ago (Sermon 272). When we look at the blessed sacrament, do we see the earthen, material, fragile and finite web of creation of which we are a part and God lovingly chose to enter? When we say "amen" to the proclamation "the body of Christ," do we recognize that we are also affirming the goodness of the world that God freely created and renewing our responsibility to care for this world as it already cares for us? When we consider the importance of the Sabbath day, do recognize what Francis proclaims in Laudato Si', that: "Sunday is the day of the Resurrection, the 'first day' of the new creation, whose first fruits are the Lord's risen humanity, the pledge of the final transfiguration of all created reality"? May we approach Christ in the Eucharist with a renewed sense of the ecological significance of the sacrament we share, the divine gift we receive, the communion in which we are called to participate and the duty we have as members of the body of Christ to "care for our common home." Anything short of that may constitute an ecological sin of omission at best or a form of idolatry at worst. [Daniel P. Horan is a Franciscan friar and assistant professor of systematic theology and spirituality at Catholic Theological Union in Chicago. His most recent book is Catholicity and Emerging Personhood: A Contemporary Theological Anthropology. Follow him on Twitter: @DanHoranOFM.]
<urn:uuid:e41839c1-7e40-43af-8dd3-249b23c4d924>
CC-MAIN-2022-33
https://www.ncronline.org/news/earthbeat/faith-seeking-understanding/ecological-significance-eucharist
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00667.warc.gz
en
0.950458
1,745
2.25
2
- a dish of fruits stewed in a syrup - ⌂ a long-stemmed dish for serving candy, fruit, nuts, etc. Origin of compoteFr: see compost - Fruit stewed or cooked in syrup. - A long-stemmed dish used for holding fruit, nuts, or candy. Origin of compoteFrench, from Old French composte, mixture, from Latin composita, feminine past participle of comp&omacron;nere, to put together; see component. ruffled thumbprint-style compote made by the Fenton Art Glass Company
<urn:uuid:04b12c5c-ecce-4c5c-b998-d0608db063fd>
CC-MAIN-2017-04
http://www.yourdictionary.com/compote
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00344-ip-10-171-10-70.ec2.internal.warc.gz
en
0.884611
126
2.375
2
Starting a business has become something anybody can do. In today’s changeable economy, being a small business owner is no longer the preserve of the risk-taker. All you need to start your own enterprise is a great idea and the nous to see it through. And maybe some cash. And good contacts. And a business plan. Oh, and a marketing strategy… Some of us are guilty of having serial epiphanies and mentally retiring for the next 20 years before we’ve actually done anything about it. But before you throw everything at your wonderful idea, it’s crucial to do some research. Sometimes you can get so excited about the dream that you lose all objectivity. The best way to stay productive is to be really clear about what you want to achieve, and put something into action immediately. Clarify your goals as soon as you can in order to get your mind focused. Put your idea down on paper to make it more manageable. Then you need to question your idea as much as possible. Be ruthless. Do thorough research into the industry. If you don’t know the industry well, engage the services of someone who does, sharpish. A Google search for similar-sounding products simply isn’t enough. Don’t fall into the trap of thinking that just because something’s not on the internet it doesn’t exist. Go to the trade associations, look in industry magazines, and attend trade shows. Zoom in and then zoom out. Make sure you see your idea from as many different angles as possible. What does your idea look like as an insider, a consumer, an employee, a competitor, a critic? How can you make it better? Then get a second opinion. Sourcing an office When you’re looking for a workspace, be realistic about where you think you’ll be in five years’ time. Consult your business plan carefully and look at your projected growth. Will the space you choose be right for the business as you see it in five or ten years’ time? If not, will you be able to cope with the upheaval of a move if you’re expanding? Always get a break clause built into your contract and push for a rent-free period. Never be afraid to negotiate to get the space on the terms you want. Is the location right for the employees you have and the employees you want? Is it going to be a turn-off for the talent you hope to attract? What’s public transport like? Is it safe? Will security cost more than anything you might save? If you can, get a space near like-minded businesses. This could be good for your enterprise’s productivity, morale and general networking. Writing a business plan Your research into the market and your product should form the backbone of your business plan. If you haven’t got time to research and write your business plan, you haven’t got time to run a business. Not only does a business plan serve as a reference document for you, for investors and for future staff, it also helps you focus your mind and strategy. It enables you to see the figures written down, too. Your executive summary is the first thing people read. Sometimes it’s the only bit they read. So it needs to be clear, precise and jargon-free. The summary will be read by potential investors, so it’s also important not to assume too much prior knowledge of the industry. The summary should feature the most important points of your business or product and should sum up the following: - Your service or product and what its strengths are - Where your opportunity is in the market - Who your management team is and how it’s structured - Your track record in business and what your experience in the field is - What your financial projections are - What your funding requirements are and what returns are expected The rest of the plan should comprise an extrapolation of each of the points above, and include a background to the idea, work carried out to date, experience, and the proposed ownership structure of the business. It is really important to cover any disadvantages or weak points you feel the business may have. Being honest about these inspires confidence. Explain key features of the industry, like applicable regulations, and effective cartels. Explain the market segments you want to target (identify the size of each segment and the direction it’s heading in). Here, you should also put how many customers you have lined up and sales you’ve already made. Quote minimum order figures, if you can. You need to demonstrate how long you predict each sale or transaction will take. Also, discuss the likelihood of repeat orders and how this works with volume. Include details of the contributions each part of your business will make. Identify where you expect to make your profits and where there might be scope to increase. The business plan is designed to attract investors, so remember to list the reasons buyers will come to you over your competitors. If you can’t do this, then you might want to think about your business idea again. You also need to include a bit in your plan about how you expect to promote your product and what marketing plan you have in place. Once you’ve finished your business plan, read it. Does it give you a comprehensive overview of your idea and business? Show it to a friend and ask them for comments. Demand your supply Get your supply chain right and your business will run a lot more smoothly. Henry Freeman, commercial director at TradeRiver (opens in new tab), an online provider of supply-chain finance, says, “Being a cash buyer can help you to negotiate better rates with suppliers because they benefit from immediate cash-flow, the life blood of any business. Using this as leverage can save you hundreds or even thousands of pounds in purchasing and service costs. We have also found that, in the long term, relationships between companies using supply-chain finance are strengthened as suppliers like to sell to companies that can immediately settle their trades.” Use local suppliers where you can. This isn’t only good for your green credentials, but it’s good for quality, too. Using smaller, local suppliers can mean they are passionate about their work and put in extra effort. It’s also always better to be able to meet and talk to your suppliers and makes life easier if you have issues to iron out. If you’re going to go further afield, consider the challenges of working overseas before choosing new suppliers in far-flung climes. Be sure to think carefully about shipping costs, timing issues, supply chain complexity and cultural differences, and make sure they don’t negate your labor costs. If you are going overseas, make sure you keep up to date with localized supplier needs, rules and regulations, as well as global events, which could cause disruptions down the line. Gen up on all major festivals and holidays in the country you choose. Once you are satisfied that your idea is a sound one, you need to protect it. There are many ways to protect a new business idea and the best approach for you will really depend on what you are doing. Some ideas can be protected by a patent, which is a form of intellectual property registration, for which it may be possible to apply where there is a new invention. This is most obviously true of physical products, although software can be patented, too, in some cases. Registration of a patent can give its owner exclusive rights for a long period, which can obviously be a great benefit. However, many good ideas do not involve an invention – for instance, a new method of doing something, which it may not be possible to protect under intellectual property law but simply needs to be kept quiet in the development phase. In that case, the best course of action is to reveal the confidential aspects to as few people as possible, and to do so only where the other party is trusted and has signed a non-disclosure agreement (NDA) prepared by a lawyer. Tim Summers, partner at Temple Bright (opens in new tab), says, “The first legal issue to consider is the fundamental one: could the business be entirely prevented, or else made impractical, by a requirement of the law?” This is more likely to be a possibility in the context of business activities that are regulated, such as financial services. However, says Summers, “There may be laws you don’t know about in other, more general contexts, and these may need to be factored into your strategic planning. So it’s worth talking to a firm of solicitors early on, confidentially describing your plans and asking if there are any fundamental legal obstacles they can foresee.” If there is nothing fundamental that requires you to rethink the business plan, the rest of the detail (for example, setting up the trading vehicle, terms and conditions, employment contracts) may be able to wait a while. However, if you have a name in mind for your business, you should ask an intellectual property lawyer to run some checks and advise you whether it’s a problem if someone else is using a similar name. Summers says, “If the name is available for you to use, there are ways of securing it before you start trading – for instance, setting up a company, registering a trademark and buying a domain name.” It’s natural for a start-up to have legal matters a little way down the list of priorities, but, says Summers, “Having legal matters such as the small print of your customer terms in pristine form on day one may seem like a counsel of perfection, particularly given that lawyers can be expensive and start-up funds are often limited, but the big two early-stage oversights are, firstly, a poor or non-existent founders’ agreement, and secondly, not properly securing intellectual property used in the business – in particular, that which is created for the business by other people.” When everyone is good friends at the start, it may seem that having a founders’ agreement (such as a partnership agreement or shareholders agreement) is unnecessary. But once you start building the business, you may find that this pressing and perhaps rather uncomfortable matter is deferred so that by the time problems start to emerge among the founders, it is too late to agree a framework for resolving them. As for intellectual property, it’s possible to have a false start with a name or logo because you have not done the checks for use by others or have not registered your own trademark. Where written text or designs have been created by others, it’s all too common for a young business to appoint creative contractors informally, without realizing that ownership of intellectual property may remain with the creator rather than passing to the business – even when the business is paying for it. Should you take the chance? Says Summers, “Of course, entrepreneurship involves risk-taking. However, I’d make a distinction between the calculated commercial risks that are inherent to a new venture, and the kind of recklessness that could result in a good business being destroyed for avoidable causes. Not taking legal advice on important things early on is in the reckless category, and I hope most successful entrepreneurs would say the same.” However, if you want to keep things friendly, it’s worth shopping around for a lawyer who can create legal documents which are short, user-friendly and attractive. Says Summers, “This is a much better course than relying on a combination of cut-and-pastes from the internet, items passed to you by friends and nothing at all.” Instructing lawyers is in itself a potential minefield. It’s worth considering price (but don’t make it the only consideration). You should also consider quality and expertise, location and personal rapport, and you should talk to several firms before choosing one. The best indicators of quality and expertise will be the firm’s presentation and reputation, the testimonies of others who have used it for similar work, and its answers to searching questions put by you. “The temptation for solicitors,” warns Summers, “particularly junior ones, is to present every aspect of your situation as needing urgent attention. This may result from the cautious legal temperament, the fear of being sued unless every possible risk is dealt with, or the fact that more legal work generally means more fees. However, the reality may be that there are relatively few tasks requiring immediate work. A commercial view is one that measures the real risks against the size of your budget. A good solicitor is one that gives you such a commercial view, and not simply an expensive wish list to ensure that you are 100 percent watertight on all points, however obscure, and establish the price.” It can be really hard to achieve work-life balance in the early days of a start-up, especially if there’s only one of you working on everything. But there are ways of making sure you don’t let your business rule your personal life. Monica Parker of workplace specialist Morgan Lovell (opens in new tab) says, “Make sure you keep certain things sacrosanct, such as the school run, the ballet recital and date night. You will have your family longer than you’ll have this job.” Learn early on what you can control and what you can’t. “Instead, create processes,” says Parker. “Schedule and time-keep the aspects of your life you can control. Then release the aspects you can’t so they don’t make you crazy.” Get to know your rhythm. Are you an owl or a lark? Learn this about yourself before you start, so you can tackle jobs when you know you are at your most productive. Studies have shown that a 20-minute nap in the afternoon has a bigger impact on your energy levels than an extra 20 minutes of sleep in the morning. Learn the power of a quick kip. Be vulnerable and share your fears and failures with those closest to you. You will spring back more easily from the lows, and your friends and family won’t feel alienated from what’s going on. Learn to use advisors You might want to go it alone entirely but never underestimate the power of the right advice. Kathleen Saxton is the founder of The Lighthouse Company and chair of the advisory board Advertising Week Europe. She says, “Within any SME, investing in consultancy or external advisors is always a serious consideration. Any capital expenditure needs to have a positive impact on the business almost immediately. Whilst most businesses have a breadth of skillset within the leadership team, there will always be specialist areas or indeed blind spots that need careful consideration, so identify them early and be honest and open about where you need to seek counsel.” Saxton adds, “Don’t be tempted to only rely on your most immediate network. Trusting outside advisors with your deepest company issues or concerns is always daunting and sometimes exposing, but seeking, finding and engaging with the best advisors you can afford is always the smarter option.” And don’t balk at the idea of going straight to the top, either. Human nature dictates that we fundamentally like to be respected and needed, says Saxton, so you will probably find that even the most senior or high profile people enjoy being consulted or asked their opinion: “Don’t be daunted by stature or profile – you will be surprised how many people want to help you to succeed, paid for or otherwise.” Once you have asked for help, Saxton says it’s crucial to listen to it. “Be willing and ready to take the advice you are given,” she says, adding, “When we put our heart and soul into a business, it can be without, and what your overheads will be). When trying to make this decision, make sure you weigh very carefully the profits you might make against the risk that you will be taking. If you’re going to be required to charge your home to the bank in order to raise the money, can you survive if it all goes down the proverbial? It’s worth doing a bit of basic research into the different types of financing available on the market. Business finance falls into two categories: debt and equity. Debt is, in short, borrowing money that will be paid back over time with interest. Equity is finance provided by you or your investors and doesn’t have to be repaid as such (though investors usually expect some sort of return). The ratio of debt to equity is called gearing, and the terms highly geared or highly leveraged mean that the business has a higher proportion of debt compared with equity. Banks and finance companies offer a range of debt financing, including overdrafts and loans. An overdraft is a borrowing facility linked to an existing account and is designed to help with short-term borrowing needs. It’s worth being aware that a bank can demand repayment on an overdraft in full at any time (although if you’re keeping up repayments and your credit rating is stable, then it’s unlikely). Overdrafts are usually agreed for six to twelve months, and then renewed by negotiation. Overdrafts are also usually more cost-effective than credit cards, because the interest is only paid on the amount borrowed at a margin above the Bank of England base rate. Most banks offer business loans – a large amount of money repayable over an agreed period. These are obviously better than overdrafts and can be more cost-effective if interest is fixed. Business credit cards operate in a similar way to personal credit cards, and are a useful way to help with cash flow (if managed properly). The advantage of debt funding is that you don’t have to give up a share in your business to a lender, and your obligation is only to pay back the amount borrowed, with interest, so if you become a zillionaire, you don’t have to do any depressing maths about how much less you will actually be getting. Another thing to consider is that interest payments might be deductible against tax. One great finance initiative for smaller businesses is invoice finance, a way of freeing up cash from invoices raised. The amount of money available can grow automatically as sales increase. How it works is that you submit invoices to a factoring company, which advances a pre-agreed percentage of the invoice amount. The factoring company then collects the payment from the customer once it falls due, then releases the balance back to you. Going for growth So it’s all going swimmingly but how do you make the leap from a small business to a medium business? Daniel Callaghan is founder of MBA & Company, which connects large and small businesses with highly skilled professionals for project work. “Expand carefully,” he says. “Demand for your product or service is fantastic but there’s always a danger you simply won’t be about to fulfil orders, or deliver the level of service your clients expect.” If you can’t meet demand, you’ll lose clients and, in turn, demand will plummet. Some small businesses find they can accommodate an uplift but they can’t provide a service to a high enough standard, which creates customer service issues. “Quality can really set your firm apart from the competition,” says Callaghan, “So businesses need to ensure they can deliver the same quality service whether they have 5 employees or 500.” One potential problem is that most SMEs don’t have concrete systems or hierarchies in place. This is, of course, fine when you have 12 members of staff, but add 12 more into the mix and suddenly you need to clarify lines of communications, and implement structure and processes. You also need someone to check people are following these processes, something that SME owners commonly overlook. If your goal in setting up a business is simply to free up time and improve your quality of life, you shouldn’t feel pressurized to go for growth. Says Callaghan, “Entrepreneurs with big ambitions work round the clock to reach the dizzy heights, so growing a business is not for the faint-hearted. Lifestyle businesses can still be lucrative.” But if you do want to expand, you will have to hand over some responsibility at some point. Get your head in the cloud Cloud computing is where it’s at. Lori Williams, general manager, Europe, at cloud services company Appirio, says, “Small businesses were among the earliest adopters of cloud technology and first to witness its business benefits.” She says that cloud technology frees SMEs from the restraints of on-premise technologies. “They can purchase IT application services on demand, which helps them spend less, manage their cash flow and innovate more quickly without having to expend significant start-up costs on hardware or perpetual licenses. Crucially for companies wanting to grow and differentiate themselves, the cloud enables business agility by immediate provisioning of the functionality of core business needs, such as email and CRM, as well as access to cutting-edge social and mobile functionality.” If you know from the start that you’re likely to be making more than £20,000 of profit (not turnover), you should probably consider setting up as a limited structure, simply because it’s more tax efficient. If you run a limited company and want to take money out, it’s worth operating on a mixture of dividends and salary. You can set your own salary to whatever you want, and you don’t have to comply with minimum wage. The smaller the salary you take, the less tax you pay on it. Then take the rest as dividends (effectively making you a shareholder and director). If, for whatever reason, you can’t be a limited company (if you’ve been bankrupt recently or been disqualified as a director) or simply want to start small, you can register as a sole trader. As a sole trader, you’ll pay income tax and National Insurance contributions on your respective shares of the profits and gains of your business. If you are a sole trader and you want to continue using a personal bank account, it’s a good idea to keep any bank account you use for your business separate, just to make it easier for yourself. It’s completely legal to use a personal bank account if you are a sole trader, but some banks won’t allow you if they discover that you have a lot of trade income. However, if you are a limited company, you must use a business account by law. If there’s more than one of you and you’re a limited company, you could also set up as an LLP (Limited Liability Partnership). This means that one partner is not responsible or liable for another partner’s misconduct or negligence. Any new or existing firm of two or more people can incorporate as an LLP. - We've also featured the best business plan software (opens in new tab)
<urn:uuid:7a251966-ba60-47e1-a298-3dc22bf8e266>
CC-MAIN-2022-33
https://www.techradar.com/how-to/the-basics-of-starting-a-business
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00075.warc.gz
en
0.956842
4,861
1.757813
2
Plants like animals defend themselves from disease and sometimes succumb to microbial disease. My research group is interested in understanding the molecular genetic and biochemical mechanisms of plant immunity. Our long-term goal is to translate our plant immunity knowledge to reduce crop loss and pesticide use in agriculture. After many years of challenging research, my team demonstrated that DIR1 proteins move via the phloem from an initially infected leaf to distant leaves to participate in alerting/priming distant leaves to respond in a resistant manner to future microbial infections. Knowing that DIR1 is a key protein involved in inter-organ communication to initiate resistance, will allow us to dissect the priming response in distant leaves. We are using this knowledge to find environmentally friendly chemical treatments that initiate natural plant defense to provide pesticide-free methods to protect Ontario greenhouse-grown cucumbers and tomatoes from disease. We also study the Age-Related Resistance response in which plants become highly resistant to normally virulent pathogens as they mature. What molecular changes allow a mature plant to perceive and effectively defend against normally virulent pathogens, is another fascinating question we are investigating. As an instructor my goals include convincing students/future citizens that contrary to popular opinion, plants are fascinating and incredibly important for people and the planet. As a mentor to undergraduate and graduate students, I facilitate their growth as scientists and people. I encourage them to improve in areas they find challenging by reminding them it takes time, but it?s worth it. Genetics & Molecular Biology; Microbiology & Plant Biology
<urn:uuid:793956a3-839f-4ea9-a82a-b6775ed3089b>
CC-MAIN-2022-33
https://www.biology.mcmaster.ca/component/comprofiler/userprofile/rcamero.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz
en
0.950586
304
2.34375
2
- "No Hutts, no Jawas. This is already better than Tatooine." - ―Mara Jade Svivren was a mountainous Outer Rim Territories planet not far from Andasala. It was at the terminus of the Five Veils Route, which connected it to Suarbi. Despite the harsh climate of the world and its severe seasonal variation, the native Svivreni thrived and made it an important regional trading port. Its population of more than eight billion included large colonies of Humans, Sullustans and Ewoks. The source of Svivren's Ewok population was unknown. The importance of trade was reflected in the planet's Festival of Great Trade. Svivreni law forbid the presence of personal weapons, and any violent acts resulted in an immediate public execution. Well-armed security forces enforced these harsh codes effectively. The planet had a low crime rate and was avoided by smugglers. The planet was divided into a northern and a southern district. The northern district was experiencing an anti-Imperial rebellion as of 4 ABY. The southern district as a result had fewer troops and of less quality. The southern garrison was commanded by High General Touno, who resided in the southern district's capital of Wrils. The planet was directly represented in the Galactic Senate. Svivren remained completely neutral during the Galactic Civil War and resisted any Imperial attempts to occupy the planet. During the Thrawn campaign, Imperial forces attacked Svivren but were repelled. The planet was home to the Svivren Xenomineralogy Institute, which graduated fine mining foremen and metallurgists. - Jedi Quest: The School of Fear (Mentioned only) - Star Wars: Rebellion (First appearance) - Sleight of Hand: The Tale of Mara Jade (Mentioned only) - Mara Jade: By the Emperor's Hand 1 - Mara Jade: By the Emperor's Hand 2 - "First Contact"—Star Wars Adventure Journal 1 (Mentioned only) - The Last Command (First mentioned) - Specter of the Past (Mentioned only) - The Last Command Sourcebook - Galaxy Guide 11: Criminal Organizations - "Wanted by Cracken"—Star Wars Adventure Journal 10 - The Thrawn Trilogy Sourcebook - "Game Room: Launching a New Rebellion"—Star Wars Galaxy Magazine 10 - Star Wars: Rebellion: Prima's Official Strategy Guide - Geonosis and the Outer Rim Worlds - The New Essential Chronology - The Essential Atlas - Star Wars: Edge of the Empire Core Rulebook Notes and referencesEdit - ↑ 1.0 1.1 1.2 1.3 - ↑ 2.0 2.1 The Essential Atlas, p. 32 - ↑ 3.00 3.01 3.02 3.03 3.04 3.05 3.06 3.07 3.08 3.09 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20 3.21 3.22 3.23 3.24 The Thrawn Trilogy Sourcebook, p. 133 - ↑ The Essential Atlas, p. 226 - ↑ 5.0 5.1 5.2 Geonosis and the Outer Rim Worlds, p. 15
<urn:uuid:97be9559-9de2-4d79-97d4-587b71aed475>
CC-MAIN-2017-04
http://starwars.wikia.com/wiki/Svivren
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00479-ip-10-171-10-70.ec2.internal.warc.gz
en
0.921139
705
1.960938
2
Introduction to Apache Spark Brands and businesses around the world are pushing the envelope, when it comes to strategies and growth policies, in order to get ahead of their competition in a successful manner. One of these techniques is called data processing which is today playing a very important and integral role in the functioning of brands and companies. With so much data present within companies, it is important that brands can make sense of this data in an effective manner. This is because data has to be a readable manner making it easier to gain insights from them. Companies also need a standardized format so that they can process information in a simple and effective manner. With data processing, companies can face hurdles in successful fashion and get ahead of their competition as processing can help you concentrate on productive tasks and campaigns. Data processing services are able to handle a lot of non-core activities including conversion of data, data entry and of course data processing. Data processing allows companies to convert their data into a standard electronic form. This conversion allows brands to take faster and swifter decisions thereby allowing brands to develop and grow at a rapid pace than before. When brands can focus on things that matter, they can develop and grow in a competitive and successful manner. Some services that come under data processing includes image processing, insurance claims processing, check processing and form processing. While these may seem like minor issues within a company, they can really improve your value in the market. When consumers and clients can access information in an easy and secure manner, they will be able to build brand loyalty and power in an effective manner. Form processing is one way in which brands can make information available to the bigger world. These forms include HTML, resumes, tax forms, different kinds of surveys, invoices, vouchers, and email forms. One of the basic transaction units for all companies is a check and it is the basis for all commercial transactions and dealings. With the help of check processing, brands can ensure that their checks are processed in a proper manner and that payments are made on time, thereby helping brands to maintain their reputation and integrity as well. Insurance is another element that plays an important role in the functioning of brands as it helps companies to reimburse their losses in a fast and secure manner. When you invest in a good insurance processing plan, brands can save time and effort while at the same time continue with their job duties and responsibilities. Image processing might seem like a minor task but at the same time can take a brand’s marketing strategy to the next level. Making high-quality images is extremely important and when brands put such images in their brochures and pamphlets, they automatically attract the attention of clients and customers in an effective manner. Stages of Data Processing Cycle Data processing goes through six important stages from collection to storage. Here is a brief description of all the stages of data processing: Data has to be collected in one place before any sense can be made of it. This is a very important and crucial stage because the quality of data collected will have a direct impact on the final output. That is why it is important that data collected at all stages is correct and accurate because they will have a direct impact on the insights and findings. If the data is incorrect at the beginning itself, the findings will be wrong and the insights gained can have disastrous consequences on brand growth and development. A good collection of data will ensure that the findings and targets of the company are right on the mark. Census (data collection about everything in a group or a particular category of the population), sample survey (collection method that includes only a section of the entire population) and administrative by-product are some of the common types of data collection methods that are employed by companies and brands across all sections. The second stage of data processing is preparation. Here raw data is converted into a more manageable form so that it can be analyses and processed in a simpler manner. The raw form of data cannot be processed as there is no common link among them. In addition, this data must be checked for accuracy as well. The preparation of data involves the construction of a dataset that can be used for the exploration and processing of future data. Analyzing data is very important because if the wrong information seeps into the process, it can result in the wrong insights and impact the entire growth trajectory of the company in a very wrong and negative manner. The third stage of data processing is called input where verified data is coded or converted in a manner that can be read in machines. This data, in turn, can be processed in a computer. The entry of data is done through multiple methods like keyboards, digitizers, scanner or data entry from an existing source. Although it is a time-consuming process, the input method requires speed and accuracy as well. The data requires a formal and strict syntax method as the processing power is high when complex data needs to be broken down. That is why companies feel that outsourcing at this stage is a good idea. In this stage, data is subjected to a lot of manipulations and at this point, a computer program is executed where there are a program code and tracking of current activities. This process can contain multiple threads of execution that execute instructions in a simultaneous manner, depending on the operating system. While a computer is just a group of instructions that are passive, a process is the actual execution of these instructions. Today, the market is filled with multiple software programs that process huge quantities of data in a short period of time. 5. Output and Interpretation This is the fifth stage of data processing and it is here that data is processed information and the insights are then transmitted to the final user. The output can be relayed in various formats like printed reports, audio, video or monitor. The interpretation of data is extremely important as this is the insights that will guide the company on not just achieving its current goals but also for setting a blueprint for future goals and objectives. The storage is the final stage in the data processing cycle where the entire process above, meaning the data, instruction, and insights is stored in a manner that they can be used in the future as well. Data and its relevant insights must be stored in such a manner that it can be accessed and retrieved in a simple and effective manner. Computers and now systems like the cloud can effectively hold vast amounts of data in an easy and convenient manner, making it the ideal solution. After establishing the importance of data processing, we come to one of the most important data processing units, which is Apache Spark. Spark is an open-source cluster computing framework that was developed by the University of California. It was later donated to the Apache Software Foundation. As against Hadoop’s two-stage disk-based MapReduce paradigm, Spark’s multi-stage primitives provide great speed for performance. There are many things that set Spark apart from other systems and here are some of the following: Apache Spark has automatic memory tuning It has provided a number of tunable knobs so that programmers and administrators can use them to take charge of the performance of their applications. As Spark is an in-memory framework, it is important that there is enough memory so that actual operations may be carried out on one hand and have sufficient memory in the cache on the other hand. Setting the correct allocations is not an easy task as it requires a high level of expertise to know which parts of the framework must be tuned. The new automatic memory tuning capabilities that have been introduced in the latest version of Spark, making it an easy and efficient framework to use, across all sectors. Additionally, Spark can now tune itself automatically, depending on the usage. Spark can process data at a lightning-fast pace When it comes to Big Data, speed is one of the most critical factors. Despite the size of the data being large, it is important that the data frame is able to adjust with the size of data in a swift and effective manner. Spark enables applications in Hadoop clusters to function a hundred times faster in memory and ten times faster when data runs on the disk. This is possible because Spark reduces the number of read/write to disc and as apache spark framework stores this intermediate processing data in-memory, makes it a faster process. By using the concept of Resilient Distributed Datasets, Spark allows data to be stored in a transparent manner on the memory disc. By reducing the time to read and write on a disc, data processing becomes faster and improved than ever before. Spark supports a lot of languages Spark allows users to write their applications in multiple languages including Python, Scala, and Java. This is extremely convenient for developers to run their applications on programming languages that they are already familiar with. In addition, Spark comes with a built-in set of nearly 80 high-level operators as well which can be used in an interactive manner. Spark supports sophisticated analytics Besides a simple map and reduce operations, Spark provides supports for SQL queries, streaming data and complex analytics such as machine learning and graph algorithms. By combining these capabilities, Spark allows users to work in a single workflow as well. Spark allows the real-time streaming process It allows users to handle streaming in real-time. Apache Spark Mapreduce mainly handles and processes the stored data while Spark manipulates the data in real-time with the use of apache spark Streaming. It can also handle frameworks that work in integration with Hadoop as well. Spark has an active and expanding community Build by a wide set of developers that spanned more than 50 companies, Apache is really popular. Started in the year 2009, more than 250 developers around the globe have contributed to the growth and development of Spark. It also has an active mailing list and JIRA for issue tracking. Spark can work in an independent manner as well as in integration with Hadoop Spark is capable of running in an independent fashion and is capable of working with Hadoop 2’s YARN cluster manager. This means that it can read Hadoop data as well. It can also read from other Hadoop data sources like HBase and HDFS. This is why it is suitable for brands that want to migrate their data from pure Hadoop applications. As Spark uses immutability, it might not be ideal for all cases of migration. It has been a major game-changer in the field of big data since its evolution. It has been probably one of the most significant open-source projects and has been adopted by many companies and organizations across the globe with a considerable level of success and impact. Data processing has many benefits for companies that want to establish their role in the economy on a global scale. By understanding data and gaining insights from them, it can help brands to create policies and campaigns that will truly empower them, both within the company and outside in the market well. This means that data processing and software like Apache Spark can help companies to make use of opportunities in an effective and successful manner. In conclusion, Spark is a big force that changing the face of the data ecosystem. It is built for companies that depend on speed, ease of use and sophisticated technology. It performs both batch processing and new workloads including interactive queries, machine learning, and streaming, making it one the biggest platforms for growth and development of companies around the world. This has been a guide to Apache Spark. Here we have discussed the basic concept, stages and roles of Apache Spark with detail explanation. You may also look at the following articles to learn more –
<urn:uuid:b658f1a5-225b-43bc-98e5-c627bedb4ae5>
CC-MAIN-2022-33
https://www.educba.com/apache-spark/?source=leftnav
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00273.warc.gz
en
0.949528
2,382
2
2
Many states, including Illinois, in the past several years have passed laws with the intent of increasing the awareness of child sexual abuse. You may have heard of this legislation under its more common name, Erin’s Law, in honor of Erin Merryn, a brave young woman who has crossed the country advocating for laws that will increase awareness of this crime against children. One of the requirements of this law is that schools provide an age-appropriate curriculum to all students relating to sexual abuse prevention, which may include a variety of discussions, activities, videos and role play scenarios. The purpose of the lessons is to provide students tools needed for personal safety and to provide a nurturing and caring environment open for disclosure of any incidents. Our schools’ social workers work with teachers to present lessons meeting the requirements of Erin’s Law and will be discussing the following concepts: - Ways to be safe, such as but not limited to, wearing a bike helmet, asking before petting a dog, crossing the road, and safe and unsafe touches - Ask First Rule, for example, asking before going to a friend’s house - How to say no and tell a trusted adult Nationwide, 1 in 3 girls and 1 in 6 boys will be the victim of child sexual abuse by the age of 18. Through this program aimed at educating and empowering students, we want to provide your student with the knowledge and skills to use if ever affected by sexual violence. District 158 believes that all of our students will benefit from participating in this program. For more information about the lessons being presented please refer to the links below:
<urn:uuid:19c4aab1-da57-401e-a4b3-ae1a497a64e2>
CC-MAIN-2017-04
http://www.district158.org/curriculum/erins-law/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00222-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95128
329
3.453125
3
Listen to What the Wolf Really Said to Little Red Riding Hood on your phone! Francis Bret Harte was an American author and poet, best remembered for his short fiction featuring miners, gamblers, and other romantic figures of the California Gold Rush. In a career spanning more than four decades, he wrote poetry, fiction, plays, lectures, book reviews, editorials, and magazine sketches in addition to fiction. As he moved from California to the eastern U.S. to Europe, he incorporated new subjects and characters into his stories, but his Gold Rush tales have been most often reprinted, adapted, and admired. - Summary by Wikipedia
<urn:uuid:8d9d2440-2b46-4dd6-8201-29c75f835605>
CC-MAIN-2017-04
http://tunein.com/audio-books/What-the-Wolf-Really-Said-to-Little-Red-Riding-Hood-p874127/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00334-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975691
129
2.140625
2
Success with SAP Currently, figures indicate that between 80- 85% of people on the autism spectrum are unemployed or underemployed. However, some businesses have begun to see the value of this untapped resource of talented individuals. In 2013, SAP took the first step to becoming a more inclusive and diverse working environment through their Autism at Work Programme. SAP have committed to employing 1% of their workforce with individuals on the autistic spectrum. This programme enables employers to tap into an extremely underutilized talent source, reducing barriers of entry so qualified individuals can fully develop their potential. Autism at Work is an internationally recognised SAP programme operating in 12 countries and works with and employs more than 140 colleagues with Autism. Specialisterne Ireland is a specialist recruiting agency that supports talented individuals with Autism, Aspergers and similar challenges to find meaningful work. Specialisterne Ireland partnered with SAP on a global scale in 2013 to achieve this goal. Our candidates, now employees in SAP have shown and continue to show great loyalty to the company and are highly committed workers with a wide range of skills and talents.
<urn:uuid:ccdab73d-ad31-49dc-9f6c-9c5964c7e93e>
CC-MAIN-2022-33
https://www.specialisterne.ie/success-with-sap/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00073.warc.gz
en
0.939503
238
1.664063
2
The Great Gatsby at a Glance F. Scott Fitzgerald's novel,The Great Gatsby, follows Jay Gatsby, a man who orders his life around one desire: to be reunited with Daisy Buchanan, the love he lost five years earlier. Gatsby's quest leads him from poverty to wealth, into the arms of his beloved, and eventually to death. Published in 1925, The Great Gatsby is a classic piece of American fiction. It is a novel of triumph and tragedy, noted for the remarkable way Fitzgerald captured a cross-section of American society. Written by: F. Scott Fitzgerald Type of Work: novel Genres: social commentary; American fiction; Jazz Age First Published: 1925 Setting: 1920s in West Egg, Long Island Main Characters: Nick Carraway; Jay Gatsby; Daisy Buchanan Major Thematic Topics: decline of the 1920s; social issues; prohibition; displaced spirituality Motifs: weather; geography; types of money Major Symbols: eyes; Gatsby's parties Movie Versions: The Great Gatsby (1974); The Great Gatsby (2000); The Great Gatsby (2013) The three most important aspects of The Great Gatsby: - Nick Carraway is the narrator, or storyteller, of The Great Gatsby, but he is not the story's protagonist, or main character. Instead, Jay Gatsby is the protagonist of the novel that bears his name. Tom Buchanan is the book's antagonist, opposing Gatsby's attempts to get what he wants: Tom's wife Daisy. - From the gold hat mentioned in the novel's epigram to the green light at the end of Daisy's dock, The Great Gatsby is filled with things that are gold and green: the colors of money. - There are two kinds of wealth in The Great Gatsby: the inherited wealth of Daisy and Tom Buchanan, and the newly acquired wealth of Gatsby. The first kind comes with social standing and protects the Buchanans from punishment, as Daisy literally gets away with murder. Gatsby's kind of wealth, though considerable, leaves its owner vulnerable.
<urn:uuid:7fcc9cce-ce54-4015-b011-1786898dffe9>
CC-MAIN-2017-04
https://www.cliffsnotes.com/literature/g/the-great-gatsby/the-great-gatsby-at-a-glance
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00245-ip-10-171-10-70.ec2.internal.warc.gz
en
0.929631
459
2.921875
3
(FEDERALSBURG, Md.) — Newly released necropsy results are providing a new clue into the mysterious deaths of 13 eagles found on a farm last month in Federalsburg, Maryland, according to the U.S. Fish and Wildlife Service. “The results show that these eagles did not die of natural causes, including disease,” U.S. Fish and Wildlife public affairs specialist Catherine J. Hibbard told ABC News Thursday in a statement. The necropsy ruled out diseases such as avian influenza as a cause of the mass death, Hibbard said. “Our investigation is now focused on human causes and bringing to justice the person(s) responsible for the death of these eagles,” she said. “We cannot release further details about the cause of death as such information may compromise the ongoing investigation.” The U.S. Fish and Wildlife Service is working with the Maryland Natural Resources Police to solve the case, Hibbard said. She added that there is a $25,000 reward for information leading to the arrest and conviction of suspected wildlife offenders. Killing a bald eagle is a federal offense punishable by up to $250,000 in fines and possibly up to two years in prison. Copyright © 2016, ABC Radio. All rights reserved. Recent posts in National News
<urn:uuid:7172876f-be55-4ca0-9178-64bba82dff78>
CC-MAIN-2017-04
http://www.wwgp1050.com/2016/03/11/necropsy-provides-new-clue-into-mysterious-bald-eagle-deaths/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00117-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941163
280
2.40625
2
Goddess of household, hearth, family, fireplace, kitchen, wealth, peace and prosperity |Member of Lairembis| |Affiliation||Meitei mythology (Manipuri mythology) and Meitei religion (Sanamahism)| |Abodes||Phunga Lairu (fireplace), Sanamahi Kachin and Kitchen| |Symbols||Senphu (Coin container), Chengphu (Rice pot) and Yotsabi (Tripod)| |Region||Ancient Kangleipak (Antique Manipur)| |Ethnic group||Meitei ethnicity| |Festivals||Imoinu Iratpa (Emoinu Eratpa)| Imoinu (Emoinu) (Meitei: ꯏꯃꯣꯢꯅꯨ, ꯏꯃꯣꯏꯅꯨ) is a goddess in Meitei mythology and religion of Ancient Kangleipak (Antique Manipur). She is the goddess of household, hearth, family, fireplace, kitchen, wealth, peace and prosperity. She is frequently associated with Leimarel Sidabi. She is regarded as one of the incarnations or representations of goddess Leimarel Sidabi. Name[change | change source] The meaning of the name "Emoinu Ahongbi" ("ꯏꯃꯣꯢꯅꯨ ꯑꯍꯣꯡꯕꯤ") can be found by splitting it up word by word. Here, "E" ("ꯏ") refers to human being. "Moi" ("ꯃꯣꯢ" or "ꯃꯣꯏ") refers to rearing. "Nu" ("ꯅꯨ") refers to female deity or goddess. So, "Emoinu" means goddess who rears the human beings. "Ahongbi" means giver of plentiful household properties. Description[change | change source] Dr. Parratt described Emoinu Ahongbi (alias Emoinu Ahong Achaubi) as another form of Goddess Leimarel Sidabi. Leimarel Sidabi is the supreme mother. Imoinu is regarded as an ever resourceful lady. She always gives wealth and prosperity to the mankind. She was shown as having a human appearance. She resides near the fire hearth. The goddess is believed to be the controller and regulator of good conduct and behavior of the human beings. Imoinu Ahong Achaubi is a deity for good moral behavior, besides wealth and prosperity. As a social code of conduct, a Meitei woman should go out from home only after prayers and worship of the goddess and other household deities. When she returns home, she should pray to the deity. The Meitei people believed that goddess Imoinu lives in the houses of those who strictly obey her favorite social and moral behavior norms. Imoinu blesses such people with nungai yaifaba (well being and prosperity), watta padaba (having neither shortage nor excess), tekta kaidaba (unaffected by troubles of life) and punshi nungshangba (long life). These are the basic needs of life in the human world. Mythology[change | change source] Origin[change | change source] After the creation of the sky and the planets, Sidaba (Old Manipuri: Sitapa) (the Supreme Being) ordered His wife, Leimarel Sidabi (Old Manipuri: Leimalel Sitapi) (the first woman) to produce another Leimarel. The second Leimarel would be the second woman. Her responsibility was to take care of the mankind on the planet called earth. Goddess Leimarel Sidabi obeyed her divine husband's order. She created another Leimarel. The appearance of the second Leimarel was similar to the first Leimarel. The first Leimarel named the second Leimarel as "Emoinu Ahongbi". Lover[change | change source] Once goddess Imoinu fell in love with a man. The two became lovers. They swore to be husband and wife. One day, she visited his house in his absence. She discovered that he was already married to another woman. After knowing this, she sacrificed her love. She swore on not to see the man again. She never married to anyone. So, she remained as a virgin goddess. Worship[change | change source] Ancient worship[change | change source] Imoinu (Emoinu) is a hearth deity. She is annually worshipped on the 12th of the Meitei month of Wakching (December-January interface month). Despite this annual event, she is also worshipped everyday. The daily worship is a part of a Meitei ritual. It is done in every Meitei household with the offering of little cooked rice before eating. Modern worship[change | change source] Nowadays, there is little or no households with proper phunga lairu (traditional fire hearth). So, a modern fireplace is developed. Here, traditional rites and rituals are performed in honor of the goddess. There are a lot of changes in the way of worshipping Goddess Imoinu. However, the essence and the importance always remain the same as forever. Festival[change | change source] The Imoinu Iratpa (Emoinu Eratpa) is a religious festival dedicated to goddess Imoinu (Emoinu). It is celebrated on the 12th of Wakching month (December-January interface month) every year. Traditionally, worship and prayers are performed inside every households. Nowadays, Imoinu Iratpa festival is also celebrated in a larger way in public gathering clubs also. Wherever the festival is performed, seasonal fruits, vegetables and fish are offered to goddess Imoinu. Namesakes[change | change source] In commerce[change | change source] Ima Keithel (English: Mothers' Market) is the world's only women run market. It has three major building complexes. Imoinu Ima Keithel is the Complex Number 2 of the market. It is preceded by Leimarel Sidabi Ima Keithel (Complex Number 1) and followed by Phouoibi Ima Keithel (Complex Number 3). This 500 years old market is in the center of Imphal, Manipur. Related pages[change | change source] - Ireima (Ereima) - Meitei goddess of water - Leimarel (Leimalel) - Meitei goddess of earth - Ngaleima - Meitei goddess of fish - Panthoibi - Meitei goddess of civilization, love and warfare - Phouoibi - Meitei goddess of agricultural crops - Thumleima - Meitei goddess of salt References[change | change source] - Singh, Rocky; Sharma, Mayur (2014-07-25). Highway on my Plate - II: the indian guide to roadside eating. Random House India. p. 44. ISBN 978-81-8400-642-1. - "A Hymn for Goddess Emoinu". e-pao.net. - "Meiteis celebrate Emoinu". telegraphindia.com. - Devi, Dr Yumlembam Gopi. Glimpses of Manipuri Culture. Lulu.com. ISBN 978-0-359-72919-7. - "EMOINU AHONGBI THOUNIROL (A Traditional adoration to Goddess Emoinu)". e-pao.net. - Kipgen, Tingneichong G. (2010). Women's Role in the 20th Century Manipur: A Historical Study. Gyan Publishing House. ISBN 978-81-7835-803-1. - A Critical Study Of The Religious Philosophy. archive.org. August 1991. p. 75. - A Critical Study Of The Religious Philosophy. archive.org. August 1991. p. 165. - Gill, Preeti (2014-02-13). The Peripheral Centre: Voices from India's Northeast. Zubaan. ISBN 978-93-83074-65-5. - Oral Narratives of Manipur. archive.org. 2016. p. 231. - "Emoinu day". e-pao.net. - "Emoinu Eratpa celebrated". e-pao.net. - "Imoinu Iratpa extensively held all over". e-pao.net. - Gupta, Om (2006). Encyclopaedia of India, Pakistan and Bangladesh. Gyan Publishing House. ISBN 978-81-8205-389-2. - Shivhare, Vishal (2016-08-17). Vyapar Shastra. Jaico Publishing House. ISBN 978-81-8495-898-0. - Singh, Dr Th Suresh (2014-06-02). The Endless Kabaw Valley: British Created Visious Cycle of Manipur, Burma and India. Quills Ink Publishing. ISBN 978-93-84318-00-0. - "All-women Imphal market reopens after 10 months". m.timesofindia.com. Bibliography[change | change source] - Emoinu Ahongbi Tungnapham by Budhichandra, Yumnamcha - Holy Man by Dhiren Meitei,a.k - Laiyingthou Lairemmasinggee Waree Seengbul by Neelabi, Sairem - Leeklam by Apunba Shintha Lup Other websites[change | change source] |Wikimedia Commons has media related to Emoinu.| |The Simple English Wiktionary has a definition for: Imoinu.|
<urn:uuid:9b39578c-c56e-4bb1-8141-ae5807ba88df>
CC-MAIN-2022-33
https://simple.wikipedia.org/wiki/Imoinu
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00470.warc.gz
en
0.827561
2,271
2.421875
2
Login to create your personal playlist Don't have an account yet?Register Here In 1989 His Holiness was awarded the Nobel Prize for Peace and in December of that year he was inaugurated at the Oslo official award ceremony. The Meridian Trust was invited to be the official UK documentary team, recording all aspects of that special week. This collection covers all aspects of that special time as His Holiness visited Trondheim, Bergen and the Arctic region Samiland. This is the full footage from that time and reveals an intimate portrayal of The Dalai Lama, capturing His warmth, wisdom, compassion and humour. It includes excerpts from the award ceremony and His Holiness’ key acceptance speech, alongside other official and informal meeting and moments including a reindeer drawn sleigh ride, as The Dalai Lama spends a day in the company of the semi- nomadic Sami people of Northern Norway. Date: 1989 Norway
<urn:uuid:58635417-ac88-4b35-b32a-f25fd4aa4d3a>
CC-MAIN-2022-33
https://meridian-trust.org/video/h-h-the-dalai-lama-visits-norway-nobel-peace-prize_dldv001790/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00070.warc.gz
en
0.953397
185
1.992188
2
- May 28, 2019 - Posted by: Admin BW - Category: Uncategorized When you’ve decided on the organizational technique for the body of the review, the sections you will need to include in the paper needs to be easy to work out. Illustrating an assertion by using examples is among the best methods to simplify complicated ideas. You should also have every detail in the job that supports your analysis. Furthermore, it’s paramount to comprehend the concept and content of your literature review to be able to end a literature review the ideal way possible. This example proves that even for an engineer with years of experience within the field, the essentials of private essay writing remain the exact same. Your writer will reach out to you and react to your messages to be certain you have a mutual comprehension of your order’s specific wants and goals. If You Read Nothing Else Today, Read This Report on Examples of Literature Research Papers Our entrepreneurial papers are complete by writers that have a thorough insight in the area of both business science and English linguistics. An excellent research academic writing thesis is crystal clear and specific. The students are for the most part content with research papers written by our professional writers but it’s still true that you can request free amendments if you require. First of all, you must talk about the specific topic that you need to cover in your research paper. How you construct your paper will depend on what sort of research thesis you’ve posed. It is an impossible task to compose a persuasive research paper without having and crystal clear outline. How and why questions are indispensable since they require the author to produce an argument. The text ought to be regarded as a type of digital prisoner in every message and showed no pity on the syllabus. There are several good analytical thesis statement examples online you may access to provide you with a clearer picture, a crystal clear and arguable thesis statement is essential for your paper as the full text needs to be directed towards its defense. Examine this issue in terms of what it is that you’re curious about. write a research paper The usage of the expression statement’ often confuses students into thinking that the claim must be put in 1 sentence. Thus, you wish to form a topic sentence that every subsequent sentence relates to. The Advantages of Examples of Literature Research Papers Keep in mind that a high degree of detailing is a feature of all very good narrative essay examples. Not just to look at any grammatical or spelling errors but only to ensure you’ve covered all of the critical elements of your chosen studies. Write down an outline of the essential points from your notes that you wish to address in the paper. Life, Death and Examples of Literature Research Papers Always supply a reference to the work directly following the information that you have provided. Even though it is simple for qualitative researchers to create assumptions and wish to interpret the data quickly, they really will need to get immersed’ in the data over a period of time as the very first stage of information analysis. Whatever way you pick, make sure that you are in possession of a large enough sample to produce the information credible. Whispered Examples of Literature Research Papers Secrets The project is anticipated to add new info to the discipline of study. To acquire an idea, students may study totally free research papers online. Unfortunately, not many students have the free time needed to compose a great research paper. Type of Examples of Literature Research Papers There’s also quite a quick serving website which supplies you with reliable journal published original articles referred to as Jstor. Every one of these outlines is much the same. On this page you’ll find a list of the info that’s needed, along with various examples. When it has to do with learning the way to do the literature review readily, then make the most of our professional service for all of the examples that you demand! Even when you have the opportunity to truly dive into a research paper, you might still wind up struggling. So be certain to master the topic before looking for others’ work. Life After Examples of Literature Research Papers The reader will wish to be in a position to determine whether to read the proposal. You may treat our on-line essay service as an internet library tailored to your distinct needs. Don’t forget that even though narrative essays seem an easy undertaking, it remains an assignment that should be ready on time. The Argument About Examples of Literature Research Papers When you begin to outline literature review writing, make sure you’ve included everything you’ve got on the map. You truly can’t start to compose a literature review till you have determined what your own research is all about. 1 way for you to be in a position to compose a wonderful literature review is to understand what a good one looks like. Literature review provides you with the occasion to find out more about this issue you’re exploring. The Dissertation Literature Review Example provides you with plenty of new ideas for a distinctive review. You’ll need this while writing an integrative paper all on your own. The measures that are used are related to the hypotheses of the analysis and are included in those hypotheses. You might or might not have conducted what some academics call a preliminary study a succinct search into the current academic work in your selected topic. While it’s possible to critique a bit of research without them, frameworks serve as useful aides-memoires for people who aren’t utilized to critiquing research. It probably should also incorporate an indication of the reach of outcomes which you could reasonably expect from your observations. For exploratory or phenomenological research, you might not have any hypotheses. The majority of the moment, the research is going to have certain theory, this theory is always regarding the question that’s being investigated. There are many things that you must include in a research proposal in order to provide your supervisor a very good comprehension of the approach that you would like to take in your research. Keep it manageable A topic will be quite tricky to research if it’s too broad or narrow. Read them to have a sense of the sorts of themes you may want to look for in your own research or maybe to identify methods to organize your final review. Before the new international recession, a college degree proved to be a typical indicator of a greater earning potential. Grey literature is very important as a way of distributing scientific and technical and public policy and practice info. The research paper offers you the chance to think seriously about some matter. The whole procedure of writing a research paper can take significant time as there are many facets to think about. A result is also referred to as an outcome. Also, abstract examples will change in length based on the kind of your paper and your educational establishment.
<urn:uuid:d79da373-67bf-4fc4-acf7-63163f9fa778>
CC-MAIN-2022-33
https://igbengineeringconsultancy.com/the-biggest-myth-about-examples-of-literature-research-papers-exposed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00470.warc.gz
en
0.943338
1,404
1.984375
2
There are also plenty of different VR headset makers: Valve, HTC, HP and Sony, whose gear works with PCs or a PlayStation 4/5. Expect more headsets, a few of which might start connecting with telephones, by the top of the yr. Working the server yourself will use power 24/7 if left at all times-on, which you probably have customers connecting from outdoors your native LAN is mainly required. MightyPork’s Power Craft mod completely adjustments the mining experience. If Amazon's expertise building a heavily custom-made version of Android is any indication, the answer is sure -- nevertheless it wouldn't be the cure-all that you just might hope for. Mods play a major role in holding the Minecraft community alive, expertise for veteran players who've seen the game via to the Ender their justifiable share of times. That is an even bigger downside than it might sound to individuals who do not play Minecraft, or have only played the Bedrock version. On a public internet server, gamers can collaborate to construct bigger and higher things than they may have made alone; nevertheless, you can’t management exactly who connects to the public servers and thus who your youngster is interacting with online. The amount of bandwidth you'd want will change based mostly on what number of gamers you have got, and the quantity of plugins and stuff that provide additional services (like dynmap) that players will recurrently use. Server variations reminiscent of Bukkit permit for plugins to simply be added allowing for extra simplified customization of your video games. If you're utilizing a server that implements plugins it would be best to create a plugins folder. Place each plugin jar you want to use inside of this folder. Once you're contained in the world, it's essential press the Escape key and click the Open to LAN button. Choose Single Participant. Then, create a new world, or you'll be able to open an current world. It would be best to edit the ops.txt file to add your participant name as an operator thus supplying you with access to the sport as an administrator. Minecraft servers are very often hosted on older variations of the game, at the same time as far again as 1.08-first released in 2014. The rationale for this is due to mods, which need to be up to date for brand new variations of the sport. Initial servers touchdown on Bedrock are Lifeboat, CubeCraft, Mineplex and InPvP. Indeed, whereas Microsoft would really prefer everyone to maneuver to the "Bedrock" version of Minecraft on the Windows store-which strongly encourages players to congregate on Microsoft's personal Minecraft servers-the Java version stays dominant due to the convenience of internet hosting your own extensively-modded Minecraft world. Unsurprisingly, the Java version of Minecraft makes use of Log4j for its logging, and prior variations of the sport software program are fully susceptible to the Log4shell flaw. minecraft-servers No matter how you play it, it looks simply as great as every other version of Minecraft on the market. Receive massive amounts of helpful suggestions while you play. Wish to study a useful skill while creating games? Enroll in CodaKid courses which use games like Minecraft to teach coding for youths! Pam’s HarvestCraft modpack offers Minecraft’s food. Whereas Khonsari leaves a ransom be aware, the contact data seems to be pretend, leaving affected victims no technique to decrypt the data. Because of that, it is actually a more irritating version of a "wiper" malware that just deletes the data. At this time, Daydream received its own model of SculptrVR, a Minecraft-like world-constructing sandbox sport that had beforehand been released for Oculus Rift and HTC Vive. After i first obtained into this, I went with a $3/mo host with only a easy Spigot server w/ 1GB of ram. However, the process is comparatively simple. Given the severity of this Log4shell exploit-it may be triggered with a single chat message-it seems unlikely that almost all of those servers will stay open to the public, which is a shame. Given enough time, you may even uncover the dark secrets that lie beneath The Aether’s seemingly innocent floating islands in the sky … In case you have a great cable or fiber web supplier, you'll be able to probably get at least 20Mbps upstream plans (which is sufficient in your present amount of players), with fiber web providers normally having choices for a lot higher than that. For Windows 10 and Xbox users, select a bunch computer and ensure all of the players are linked to the identical community. Anytime you open up a pc to the internet, you make your self a visible target for the scum of the Earth. Another facet that units this supplier apart is its cellular app, which you should use to manage your server, monitor player slots, and chat with your player base when you are away from your pc.
<urn:uuid:00bc1618-c23b-4cbb-af0b-f9c00a15323a>
CC-MAIN-2022-33
https://k12.instructure.com/eportfolios/69360000000266419/Home/If_you_want_to_Be_A_Winner_Change_Your_Minecraft_Server_Philosophy_Now
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00078.warc.gz
en
0.945946
1,008
1.664063
2
What are biofuels? Biofuels are any kind of fuel made from living things, or from the waste they produce. This is a very long and diverse list, including: - wood, wood chippings and straw - pellets or liquids made from wood - biogas (methane) from animals' excrement - ethanol, diesel or other liquid fuels made from processing plant material or waste oil In recent years, the term "biofuel" has come to mean the last category - ethanol and diesel, made from crops including corn, sugarcane and rapeseed. Bio-ethanol, an alcohol, is usually mixed with petrol, while biodiesel is either used on its own or in a mixture. Rudolph Diesel: biofuel pioneer Pioneers such as Henry Ford and Rudolph Diesel designed cars and engines to run on biofuels. Before World War II, the UK and Germany both sold biofuels mixed with petrol or diesel made from crude oil; the availability of cheap oil later ensured market dominance. Ethanol for fuel is made through fermentation, the same process which produces it in wine and beer. Biodiesel is made through a variety of chemical processes. There is interest in trying biobutanol, another alcohol, in aviation fuel. Are biofuels climate-friendly? In principle, biofuels are a way of reducing greenhouse gas emissions compared to conventional transport fuels. Burning the fuels releases carbon dioxide; but growing the plants absorbs a comparable amount of the gas from the atmosphere. WHAT IS A QUICK GUIDE? Quick guides are concise explanations of topics or issues in the news. However, energy is used in farming and processing the crops, and this can make biofuels as polluting as petroleum-based fuels, depending on what is grown and how it is treated. A recent UK government publication declared that biofuels reduced emissions "by 50-60% compared to fossil fuels". Where are biofuels used? Production of ethanol doubled globally between 2000 and 2005, with biodiesel output quadrupling. Brazil leads the world in production and use, making about 16 billion litres per year of ethanol from its sugarcane industry. Sixty percent of new cars can run on a fuel mix which includes 85% ethanol. The European Union has a target for 2010 that 5.75% of transport fuels should come from biological sources, but the target is unlikely to be met. The British government's Renewable Transport Fuel Obligation requires 5% of the fuel sold at the pump by 2010 to be biofuel. In the US, the Renewable Fuels Standard aims to double the use of biofuels in transport by 2012. What are the downsides? From the environmental point of the view, the big issue is biodiversity. With much of the western world's farmland already consisting of identikit fields of monocultured crops, the fear is that a major adoption of biofuels will reduce habitat for animals and wild plants still further. Asian countries may be tempted to replace rainforest with more palm oil plantations, critics say. If increased proportions of food crops such as corn or soy are used for fuel, that may push prices up, affecting food supplies for less prosperous citizens. The mixed picture regarding the climate benefit of biofuels leads some observers to say that the priority should be reducing energy use; initiatives on biofuels detract attention from this, they say, and are more of a financial help to politically important farming lobbies than a serious attempt to cut greenhouse gas emissions. There are few problems technically; engines can generally cope with the new fuels. But current technologies limit production, because only certain parts of specific plants can be used. The big hope is the so-called second-generation of biofuels, which will process the cellulose found in many plants. This should lead to far more efficient production using a much greater range of plants and plant waste.
<urn:uuid:cd787bf4-2f3a-45e4-996f-b022dc03e360>
CC-MAIN-2017-04
http://news.bbc.co.uk/2/hi/science/nature/6294133.stm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00394-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936221
831
3.546875
4
Have you ever wanted to know, “Why does cast iron need to be dry?” It may seem strange because other cookware can stay wet. For example, you can soak Teflon or put stainless steel in the dishwasher. You can also leave them to air dry. Furthermore, doesn’t the seasoning protect the iron from coming in contact with water? In fact, that is one of the reasons why we season our pans. But, as it turns out, seasoning should also be dry. So, it is vital to learn why cast iron needs to be dry and find an effective way to do it. I will explain this reason further, plus give you three proven ways to dry your cast iron. Why Does Cast Iron Need to Be Dry? There is one main reason cast iron needs to be dry, and that’s because iron is highly susceptible to rusting when exposed to oxygen and water. You can’t keep your pan from coming in contact with the air, but you can make sure it isn’t wet for too long. One way is to dry it, and another way is to season it. However, seasoning also needs to be dry, so you can’t depend on this way alone to protect your cast iron from rust. In other words, you can’t leave a seasoned cast iron pan wet either. Drying it is essential. Fortunately, drying isn’t hard. There are several ways people think are best: with a lint-free towel, on the stovetop, or in the oven. Cast Iron Can’t Stay Wet You can’t leave your cast iron pans wet because you don’t want them to rust. Seasoning is one of the ways to protect your cast iron from rust. But water (and especially water combined with chemicals in the detergent) will degrade the seasoning if exposed to it for too long. Therefore, you should not leave your seasoned cast iron pans to soak, air dry, or go in the dishwasher. You probably shouldn’t boil water for a long time, either. However, short periods are okay. As long as you dry and season your pan afterward. Even damp air affects the seasoning if the pan goes unused for a long time. That’s why you might come across rusty cast iron cookware in a thrift store or yard sale. Maybe it was exposed to water, or perhaps it was just packed away in a damp basement and never used. In other words, you should use your pans if you want to keep the seasoning intact. But what about drying? Is there a best way, or does it matter how it gets dry? I’m not sure it matters a whole lot, but I found three ways that most people will use to dry their cast iron. And maybe, people who use these ways think their way is the best. 1. Use a Lint-free Towel This way might be the most common. And the quickest, in my opinion. Some people will tell you not to use a paper towel because it can transfer lint. And while that is true for a pebbly surface, I don’t see this as a problem with a well-seasoned, smooth skillet. Unless, of course, you scrub it dry. I do use half of a paper towel (or a quarter of a full one) to season, but not to dry. Drying requires a little more pressure. And to be honest, I don’t want the expense. My family teases me about how stingy I am with paper towels. Therefore, I use some of my older Norwex cloths for drying. Although I recently read that bandanas or old t-shirts work well. Most importantly, though, is to get the pan completely dry with no moisture and not leave behind any lint. RELATED > > > > > Lint-free Towel For Cast Iron – A Mr. Siga Microfiber Cloth Review 2. On the Stovetop Another method a lot of people recommend is to dry your cast iron on the stovetop. They say it ensures you get rid of any hint of moisture that might be left behind even after drying. Most people still dry their pan first with a towel (preferably lint-free), but maybe not as thoroughly as they would if they didn’t immediately put it on the stovetop to heat. Advice ranges from letting the pan sit on the burner over medium heat for 3-5 minutes to low heat for several minutes. One person even recommended longer. Faith Durand from The Kitchn says about drying on the stovetop, “I find that this method of drying is more thorough and quicker, and it also seems to preserve and even maintain the seasoning on my skillet better.” Regardless of how long you leave your pan to heat, you will at the very least be getting it dry. According to those who do it this way, a hot pan is also a better way to season. And that is most likely what they have in mind when saying to heat longer. I dry my pan this way sometimes, but not always, or even primarily. But I do like the idea of combining it with seasoning to let the heat adhere the oil to the surface of the pan. Of course, this type of seasoning isn’t as effective as oven seasoning, where the oil bakes past the smoke point for up to an hour. Still, it is better than oiling a room-temperature pan. RELATED > > > > Keep Your Cast Iron Pan Seasoned – 4 Different Methods How to season and Maintain a Cast Iron Skillet 3. In the Oven This method is the least likely way to dry your cast iron. Those who recommend it say it dries the pan better than the stovetop does. Usually, these same people will also tell you to preheat your pan in the oven instead of on the stovetop. I agree that this method is a more thorough way of drying (or preheating), but it is also more time-consuming. And at least for drying, I see no reason to go to this extent. But let’s say you plan to oven season, and your oven is going to be on anyway. In that case, you can put your pan in the oven for a few minutes while it is preheating. That makes perfect sense. So, I hope you now have a better understanding of why cast iron needs to be dry. You don’t want rust, which usually happens when you leave your cast iron wet for too long. I’m not talking about leaving it wet for a few minutes, but don’t let it air dry, soak, or run through the dishwasher. And don’t boil pasta or a pot of beans because 20 plus minutes of boiling water will not be kind to your seasoning. You should avoid these things at all costs. Instead, choose a way to dry your pan. Either with a lint-free towel, on the stovetop, or in the oven. How do you dry your cast iron? Let me know in the comment section below. Perhaps you have been exploring whether you want to cook with cast iron, and you’re now at the point you’re ready to start. In that case, check out my Which Size Cast Iron Skillet Should I Get?
<urn:uuid:5ef944b2-eb6f-4824-85d0-e6142ad96455>
CC-MAIN-2022-33
https://trycookingwithcastiron.com/why-does-cast-iron-need-to-be-dry-reason-plus-3-drying-methods/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00068.warc.gz
en
0.94765
1,590
2.0625
2