text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
There are many myths prevalent in academia that make it difficult for many of us to imagine we can be creative, focused, relaxed, and productive. These myths include: “Some people are geniuses;” “the only way to be successful is to work all the time;” “some people are gifted writers;” “I can only write when I feel inspired;” and “a balanced life is impossible when you are on the tenure track.” These myths are counterproductive and prevent many academics from reaching their full potential.
Instead of believing in these myths, I believe that anyone can become a great writer by practicing their writing; that you can be successful and have a life too; and that there are specific strategies you can learn that will help you tap into your creativity.
Developing new ideas, which is at the core of academia, requires being creative. Your ability to tap into your creative potential is severely limited when you are frazzled, stressed, and overworked. Thus, although it might seem contradictory, being productive requires setting limits on how much you work.
I am sure you can think of a few writers you admire for their craft. I am also sure that those writers did not just wake up one day with the ability to write. Instead, they developed that skill over many years. The good news is that you can do that too. You can develop the ability to write clearly and convincingly, by practicing and honing your writing skills.
There are many strategies you can learn that will help you to become less stressed, more creative, and more productive. Seven of my favorite strategies include:
I incorporate all of these strategies into the Creative Connections writing retreat I co-facilitate every year.
The Creative Connections writing retreat is based on the idea that there are four elements that lead to enhanced creativity: 1) focused writing time; 2) spending time unplugged and in nature; 3) connections via conversations about our work; and 4) meditation and mindfulness activities that enhance focus and allow us to tap into our creative potential.
This retreat will use a combination of these proven techniques to create a space that not only provides for productivity during this week, but that also teaches participants valuable skills they can use for the remainder of their careers. Producing cutting-edge scholarship requires imaginative and creative abilities and this retreat is designed to maximize creativity and productivity.
You can read a review of the retreat here, written by a previous participant.
Please consider applying to this retreat by January 15, 2016 to secure your spot!
Direct link to the application here.
I hope to see you in Hawaii this June! | <urn:uuid:f8d08969-c9f0-46bc-831e-a328885cacdb> | CC-MAIN-2017-04 | http://getalifephd.blogspot.com/2015/12/how-to-become-more-creative-focused.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00330-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97143 | 546 | 1.546875 | 2 |
While many companies are considering moving their applications to the cloud,
there is still reluctance to do so in
light of some considerations and the potential pitfalls that might be encountered.
So let’s have a look at some of the inhibiting and driving factors to move to the cloud-facing organizations today:
By far, security has been at the forefront of the inhibiting factors for
moving applications to the cloud. The
lack of control of the infrastructure has left many companies skeptical about the assurance that the cloud
service provider can ensure the infrastructure is secure and the customers’ data and applications are
protected and whether all proper security measures are being taken so that the information security is
in no way compromised outside their premises.
Among the key elements of the security inhibitors are privacy, legal and
physical security (the list is not
Another element that often acts as an inhibitor is the compliance factor.
This usually relates to the
numerous governmental and industry regulations governing the storage and use of the data as
well as the audit trails and reporting practices among others.
Last but not least of the inhibiting factors is the “vendor lock-in” paradigm
which might prevent interoperability
should you plan to shift to another service provider.
Among the drivers, one attraction has certainly been the agility factor.
Being able to add capacity in no time to
increase productivity, sales and revenue without the hurdle of having to invest in massive infrastructure or the
time you would have to invest in setting it up.
Scalability no longer being a constraint allows organization to make
decisions faster when increasing resource
allocations in a minimum amount of time while adapting to ever changing conditions on the ground.
As to costs, these do take a significant part in the decision making process.
The most obvious aspect lies in the
fact that money is no longer being spent on hardware and software required to establish or expand an infrastructure.
With the availability of the pay-per-use model you only pay for what is truly consumed, thus further reducing the cost
pressure. Scalability is another aspect that brings in further cost reduction as the organization grows thus inducing
economies of scale.
Cloud computing might not constitute the miracle solution to cost control
maintenance, but is certainly an option to
consider when it comes to addressing constraints due to agility, regulatory compliance and security. | <urn:uuid:187a90d9-60ef-461a-bc08-7486c1d3195a> | CC-MAIN-2017-04 | https://www.ibm.com/developerworks/mydeveloperworks/blogs/tivolicloudenablement/entry/drivers_and_inhibitors_in_the_journey_to_the_cloud1?lang=es | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00075-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.943108 | 491 | 1.632813 | 2 |
Benefits of online games
Playing online games joins us into http://188.8.131.52/ Various folks of Various countries; you are able make a free accounts on Nova88 Indonesia and begin playing your favorite matches. You may create good friends and get to understand relating to these. The quantity of gamers playing online flash games has risen much in the last couple of years. New game enthusiasts have some difficulty playing on line games, nevertheless, you can upgrade later playing for many time. On-line flash games have plenty of pleasure involved in it. We will examine online games.
You’ll have pleasure
Playing online flash games will be fun. You learn new approaches to Win games. Most importantly, you can find new points in matches, and also you can lose and try back, however, it’s not necessary to handle the consequences of real life failure. All these matches make the mind strong and capable of working in the toughest circumstances. Struggling games have more interesting because we must conquer the enemy with our own heads. These plans games make your mind robust.
Create fresh Pals
We socialize with lots of gamers from Various Nations While playing games that are online. You can play with your close friend too. Using friends is definitely enjoyable, and also you also have more pleasure.
Development slowly and find out the sport
When you start to play with a fresh game, It’s Difficult to Win. You must understand that the plans and also plan to acquire on the match. On-line games possess levels you are able to transfer from beginner to professional, but you have to abide by the game rules. Try to master the game and also give more focus on the fundamentals of game.
In Summary, spending Time enjoying with these games is the Best knowledge in your life. You may curl up and forget about the anxieties of the true world when playing with these games. Make sure that you’re selecting a respectable platform for those online games. | <urn:uuid:09e11935-55b7-462c-b73f-ba3f250d5157> | CC-MAIN-2022-33 | http://buyviagramg.org/benefits-of-online-games/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00673.warc.gz | en | 0.958056 | 406 | 1.5 | 2 |
مزیت زن در تشخیص حالت عاطفی چهره: آزمون یک فرضیه تکاملی
|کد مقاله||سال انتشار||مقاله انگلیسی||ترجمه فارسی||تعداد کلمات|
|37677||2006||16 صفحه PDF||سفارش دهید||محاسبه نشده|
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Evolution and Human Behavior, Volume 27, Issue 6, November 2006, Pages 401–416
Abstract A set of computerized tasks was used to investigate sex differences in the speed and accuracy of emotion recognition in 62 men and women of reproductive age. Evolutionary theories have posited that female superiority in the perception of emotion might arise from women's near-universal responsibility for child-rearing. Two variants of the child-rearing hypothesis predict either across-the-board female superiority in the discrimination of emotional expressions (“attachment promotion” hypothesis) or a female superiority that is restricted to expressions of negative emotion (“fitness threat” hypothesis). Therefore, we sought to evaluate whether the expression of the sex difference is influenced by the valence of the emotional signal (Positive or Negative). The results showed that women were faster than men at recognizing both positive and negative emotions from facial cues, supporting the attachment promotion hypothesis. Support for the fitness threat hypothesis also was found, in that the sex difference was accentuated for negative emotions. There was no evidence that the female superiority was learned through previous childcare experience or that it was derived from a sex difference in simple perceptual speed. The results suggest that evolved mechanisms, not domain-general learning, underlie the sex difference in recognition of facial emotions.
Introduction The ability to decode facial expressions of emotion is fundamental to human social interaction. Elements of facial decoding, including the immediate preverbal detection of a facial signal, are believed to represent evolved mechanisms that enable the receiver to predict another individual's emotional state and anticipate future actions (Ekman, 1997, Izard, 1994 and Russell et al., 2003). Ekman and others (Ekman, 1994, Ekman & Friesen, 1971 and Izard, 1994 have argued that a limited set of facial expressions is innate and universally recognized as signals for happiness, sadness, anger, fear, disgust, and surprise. While the verbal labels and cultural rules governing the expression of these emotions may vary, the expressions themselves have a universal signal value. Thus, both the production of specific facial expressions and their interpretation by a receiver are thought to be innate. It is often claimed that women are superior to men at recognizing facial expressions of emotion (see below). Explanations for the sex difference range from sexual inequalities in power and social status (e.g., see Hall, 1984, Henley, 1977 and Weitz, 1974) to evolutionary perspectives based on women's near-universal responsibility for child-rearing (e.g., Babchuk, Hames, & Thompson, 1985). The primary caretaker hypothesis proposed by Babchuk et al. (1985) contends that females, as a result of their evolutionary role as primary caretakers, will display evolved adaptations that enhance the probability of survival of their offspring. In humans, these adaptations are hypothesized to include the fast and accurate decoding of facial affect, an important means of communication especially in preverbal infants. The child-rearing hypothesis is more complex than it first appears. It gives rise to two different predictions. According to one interpretation of the theory, the “attachment promotion” hypothesis, women should display across-the-board superiority, relative to men, in decoding all facial expressions of emotion because mothers who are highly responsive to infants' cries, smiles, and other nonverbal signals are likely to produce securely attached infants (Ainsworth, 1979 and Hall et al., 1986), and secure infants display optimal long-term health and immune function and social outcomes (Goldberg, 2000). A second interpretation of the theory, the “fitness threat” hypothesis, assigns a special status to negative emotions. It predicts a female superiority that is limited to expressions of negative emotion including fear, disgust, sadness, and anger.1 Because negative emotions signal a potential threat to infant survival (e.g., threats to safety, loss, pain, or the ingestion of a toxin) that calls for action on the caretaker's part—whereas positive expressions carry no such imperative—it is specifically facility in the recognition of negative expressions that may have been selected in the primary caretaker and in which a female superiority may therefore be found. By tying the sex difference to parental roles, the fitness threat hypothesis offers an alternative to theories based on individual survival, which predict either no sex difference in the ability to discriminate threat or a female advantage limited to single emotions (e.g., anger, where a sex difference would be adaptive in allowing physically weaker females to preemptively avoid acts of physical aggression, usually initiated by males; Goodall, 1986 and Konner, 1982). Although both sexes have a stake in infant survival, the ability to swiftly and accurately identify potential threat is a basic adaptation to the role of primary caretaker and would be maximized in the sex having the largest investment in each offspring. Finding a female advantage that is selective to negative emotions would constitute support for the fitness threat hypothesis. Evidence of a female superiority in identification of facial expressions is mixed. Of 55 studies reviewed by Hall (1978), only 11 (20%) found a significant superiority for females in judging emotions based on visual cues alone (conveyed by the face and/or body). Studies using the Profile of Nonverbal Sensitivity have yielded a median effect size of r=.15 in favor of women when only facial cues were available for decoding ( Hall, 1984). A meta-analysis by McClure (2000) found a smaller but statistically significant female advantage among children and adolescents. These effect sizes conceal substantial variability across studies in the size and even the direction of the sex difference. Obtained differences ranged from d=1.86 to d=−0.60 in the 55 studies reviewed by Hall. Inconsistency is to be expected if the female advantage does not encompass all facial expressions of emotion since most studies do not assess the full range. On the other hand, failures to find a sex difference could simply reflect methodological factors. Many studies have used face exposure times in the 10- to 15-s range or up to 1 min. This lengthy time allowance lacks ecological validity since facial expressions are often fleeting and since accuracy of decoding depends on the speed with which an expression can be apprehended. Female superiority in perceptual speed, the ability to rapidly absorb the details of a visual stimulus, has been recognized since the 1940s (Harshman et al., 1983, Kim & Petrakis, 1998, Tyler, 1965 and Wesman, 1949) and generalizes to many types of visual stimuli. Since facial decoding involves, under natural conditions, speeded apprehension of visual detail, it is important to rule out the possibility that any female advantage is based on nothing more than a perceptual speed advantage. In that case, evolutionary explanations based on child-rearing would be inappropriate. Previous work has not included methodological controls to rule out this possibility. The present study was designed to test whether a female advantage in the discrimination of emotional expressions can be verified among young adults of reproductive age. Differences in accuracy and response times (RTs) were evaluated. Secondly, we wished to investigate whether any advantage applies equally to all emotions regardless of hedonic valence, as predicted by the attachment promotion hypothesis, or is differentially found among the negatively valenced emotions, as predicted by the fitness threat hypothesis.2
نتیجه گیری انگلیسی
3. Results Analysis of the scores on the Verbal Meaning Test revealed that the men (M=26.77, S.D.=7.54) and women (M=25.61, S.D.=10.61) were well matched in general level of ability, t(60)=0.50, p=.621. Data from the experimental conditions were evaluated to test whether a female advantage was present in the discrimination of emotional expressions and whether any advantage was differentially seen among the negatively valenced emotions, as predicted by the fitness threat hypothesis. 3.1. Accuracy Level of accuracy in the practice condition (Facial Matching) was extremely high, demonstrating excellent acquisition of the basic stimulus presentation and response procedure in both sexes. The mean percent correct was 98.25% (S.D.=2.59) for men and 98.65% (S.D.=2.50) for women. Similar high levels of accuracy were seen in the Facial Identity (M=97.20, S.D.=3.66 and M=96.34, S.D.=3.59) and Pattern Matching conditions (M=99.46, S.D.=1.78 and M=98.79, S.D.=2.45) for men and women, respectively. Likewise, accuracy of identification in the Facial Emotion condition was very high, with scores of ~90% or above for all emotions except for disgust (M=84.67, S.D.=14.32 and M=90.00, S.D.=7.88) and anger (M=50.65, S.D.=27.20 and M=60.97, S.D.=25.61). Only for the latter two emotions, where accuracy failed to reach ceiling, was there any indication whatsoever of a sex difference: t(45)=1.79, p=.081 for disgust and t(60)=1.54, p=.129 for anger (two-tailed a priori test). Because the scores for the other emotions were at or near ceiling values, sex differences could not be analyzed meaningfully. Therefore, all further statistical analysis focused on the RT data. 3.2. Response times Means and standard errors for each of the six emotions are shown in Fig. 2. To evaluate if a sex difference was present in the discrimination of emotional expressions, we entered the RTs for the six emotions and three control conditions into a two-way mixed effects analysis of variance (ANOVA), with sex as the between-subjects factor and condition as a within-subjects factor. Three participants (two females, one male) who had average RTs greater than 3 S.D. from the group mean were omitted from the analysis, resulting in a sample of 59. The results showed a significant main effect of sex, F(1, 57)=7.19, p=.010, and a significant interaction between sex and condition, F(5, 272)=5.68, p<.001. There was also a main effect of condition, F(5, 272)=84.08, p<.001, reflecting the fact that RTs were faster in the control conditions (Facial Matching, Pattern Matching, and Facial Identity) than in the emotion conditions (all p values <.001). The control conditions included the Facial Identity task, in which individual identities had to be decoded to make a correct match. Pairwise comparisons showed that of the six emotions, happy faces elicited significantly shorter RTs than all other expressions (p values<.001), while angry faces elicited longer RTs than all others (p values<.025), except fear (p=.070) or neutral expressions (p=.060). Mean RTs for men and women in the six emotion conditions and three control ... Fig. 2. Mean RTs for men and women in the six emotion conditions and three control conditions. Bars represent standard errors of the means. Asterisks indicate a significant sex difference (p<.05 or less). Figure options Tukey tests were used to decompose the significant interaction effect. The sex difference was not significant in any of the control conditions (all p values>.05). There was no sex difference in identification of happy faces (p<.10), but women were significantly faster than men at discriminating neutral faces (p<.05), as well as faces depicting disgust (p<.025), fear (p<.025), sadness (p<.01), and anger (p<.01). Thus, a sex difference in favor of women appeared selectively in the emotion conditions and not in conditions requiring other visual discriminations. The selectivity of the effect suggested that a female advantage in simple perceptual speed was not the basis for the sex difference. Nevertheless, associations between RTs and performance on a conventional test of perceptual speed, the Identical Pictures Test, were evaluated. As expected, women (M=69.98, S.D.=13.50) tended to show faster performance on the perceptual speed test than men (M=65.79, S.D.=14.17), although this was not significant, t(60)=1.19, p=.119 (one tailed). Scores on the test were correlated significantly with the RTs in five of the six emotion conditions. Therefore, the ANOVA was repeated using the Identical Pictures score as a covariate and, also, in a separate analysis, using the RT in the Pattern Matching condition as a covariate. The Pattern Matching condition was expressly devised to control for perceptual speed while closely matching the emotion conditions in all other stimulus presentation and response characteristics. It provided a direct estimate of visual decoding and RT in the absence of facial stimuli. Therefore, of the two control tasks, it was considered the superior covariate. Correlations between Pattern Matching and the emotion conditions ranged from r=.51 to .65. With perceptual speed controlled, the main effect of sex was still highly significant, F(1, 56)=6.08, p=.017, either when Identical Pictures was used as the covariate or when Pattern Matching was used as the covariate, F(1, 56)=14.79, p<.001. The significant interaction between sex and condition was also preserved, F(5, 271)=5.21, p<.001 and F(6, 316)=4.18, p=.001, for the two covariates, respectively. Thus, the female superiority in discriminating emotional expressions was retained when perceptual speed was explicitly controlled. The fitness threat hypothesis predicted that the female superiority would be larger for negative emotions than for positive ones. Inspection of the means in the six emotion conditions revealed that the sex difference was indeed larger for each of the four negative emotions than for either of the two positive emotions. To investigate this formally, we performed a two-way mixed effects ANOVA on the Negative and Positive composite scores that represented the mean RT for each participant averaged across the four negative and two positive conditions, respectively. Pattern Matching was used as a covariate to remove variance associated with nonemotive parts of the task. Sex was the between-subjects factor and valence (Positive or Negative) was a within-subjects factor. The results revealed a significant main effect of sex, F(1, 59)=6.88, p=.011. In both categories of emotion, women showed consistently shorter RTs than men. Importantly, the interaction between sex and valence was also significant, F(1, 59)=4.00, p=.050. The sex difference was larger for negative emotions than for positive ones, as predicted by the fitness threat hypothesis ( Fig. 3). Although several of the negative emotions were harder to identify than the positive ones, and thus elicited slower RTs (see above), women showed a processing advantage relative to men in decoding the negative emotions. To investigate if the effect was robust, we computed a ratio score using the two composites for each person: (Negative RT−Positive RT)/Pattern Matching RT, a multiplicative instead of additive adjustment for nonemotive factors. The results were essentially identical. A t test on the resulting scores showed that, on average, women could identify negative emotions nearly as adeptly as positive ones, with only a 9% change in RT, while men showed a 27% increase in processing time for the negative emotions, t(60)=2.01, p=.049 (two tailed; Fig. 3). Analysis of the positive and negative composite scores revealed that the sex ... Fig. 3. Analysis of the positive and negative composite scores revealed that the sex difference in RT was larger for negative emotions than for positive emotions. Inset: Men showed a nearly 30% increase in processing time for negative emotions over positive ones, while women showed only a 9% increase. Pattern Matching was used to adjust for individual differences in basal response speed (see text). Figure options 3.3. Other control tasks Men and women were equally accurate at generating verbal labels on the Facial Labeling task, t(60)=1.34, p=.187. The mean for men was 4.68 correct (S.D.=1.05) and the mean for women was 5.03 correct (S.D.=1.05), out of a possible value of 6. Both sexes were able to capture the emotions portrayed with a high level of verbal accuracy. Experiences with children or the theater were analyzed using t tests. The purpose of the analyses was to discover whether any experiential differences existed between the two sexes, which might confer an advantage in the recognition of emotional expressions. Sixteen of the 62 participants (26%) did report drama or theater experience and 75% of these were women. However, Pearson correlations revealed that theater experience did not correlate significantly with RT on any of the emotion tasks (−.12<r<.20). Scores on the childcare variable ranged from 0 to 20 (out of 25). Women reported more childcare experience (M=8.42, S.D.=4.15) than men (M=5.45, S.D.=3.13), t(60)=3.18, p=.002. However, there was no evidence that greater experience with children was associated with better recognition times, either for the six emotions individually or for the two valence composites (men: r=−.15 to −.02; women: r=−.03 to .10, n.s.). | <urn:uuid:014c81f9-9cad-41fc-a808-1aa06e34ca0c> | CC-MAIN-2017-04 | http://isiarticles.com/article/37677 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00272-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.938271 | 3,918 | 2.40625 | 2 |
The Basics of Plumbing
There are quite a few difficulties when discussing plumbing that the best plumbing companies might overlook. Even research can’t begin to crack the iceberg of complexities that pertains to plumbing; it is indeed a lifelong skill for many. However, a quick guide into the world of plumbing and its various areas can provide a basic understanding of drain line repair before venturing down your pipes.
There are two significant parts to plumbing: the water supply system that carries clean water, and the drain waste system that removes unclean water or water that’s no longer being used.
Water Supply System: The water system is used for circulating water from your street’s main valve and is extremely high-pressured as it incoming water to supply showers and faucets. Another additional pipe is required to be dedicated to providing incoming fresh water to the water heater—the water system’s primary function is merely to provide instant, clean water throughout businesses or residential areas as needed.
Drain-Waste Water System: Water must be drained, like everything else; water becomes known as water waste and taken from the residence through the drain-waste process. Gravity is an important factor for this system to work efficiently with various pipes are angled downward to lead the water outside of a residence. This system requires complexities that use different vents, traps to allow things that fall down the drained to get trapped with the ability to retrieve it, but typically requires drain line replacement by professional plumbing companies.
Tanks: Having a tank is crucial in a residence and commercial areas—septic tanks, for example, are described as an “underground chamber” typically comprised of concrete, fiberglass or plastic that domestic water waste flows for necessary treatment. They are used as a type of primary onsite sewage facility that holds waste from traveling.
Lines: There are a variety of lines that plumbing companies use for different resources, such as sewer lines and water lines that are required to be installed in all residential and commercial areas to operate by a plumbing company. Replacing pipes can be taxing; sewer repair, inspections, and water line excavations—when repairing or excavating pipes it is vital to have a general understanding of how and when the optimal time is to make changes.
Sump-pumps: The term is probably unknown to most not within plumbing companies, but they are installed to prevent frequent flooding in isolated areas like basements or if the water table is above or equivalent to the foundation of the home. Areas such as san diego plumbing company are known for performing these type of repairs.
How To Properly Care For Your Septic Tank
Septic tanks catch all the waste-water that flows from your home into the tank. Through time, heavier solids typically sink to the bottom where bacteria reduce them to sludge and gasses while lighter solids remain afloat and form a layer of scum. Approximately 20% of Americans rely on septic tanks for sewage disposal— municipal water-treatment plants sever the additional 80%. Typically, most solids have a decomposition time, but if they are not removed during their periodic pumping period of 3-5 years, the bacteria will continue to accumulate and eventually overflow to the drain field causing extensive damage. A septic tank has a typical life expectancy approximately 25 years, but it all depends on how well the system was designed and maintained by its owner. When discussing your standard septic tank knowing when to pump it is important—once a year is ideal to inspect your septic tank to ensure there are no septic tank repairs required. If so, also knowing how the bacteria appears tells you when pumping is imperative to sustain its warranty. A) When scum in the tank is within 3” of the bottom of the outlet device, the tank needs to be pumped, b) When the top of the sludge layer is close to 12” of the bottom of the outlet, the tank needs to be pumped.
How Do You Know If Your Septic Tank’s System Is Failing?
- 1. An odor is exuding, surfacing sewage, wet spots, excessive vegetation growth in the drain field.
- 2. Plumbing or backups
- 3. Gurgling-like sounds coming from the system
- 4. Slow drainage fixtures | <urn:uuid:fc8dee60-c852-4f89-9f4c-4fb48a905920> | CC-MAIN-2022-33 | https://homeimprovementvideo.net/the-basics-of-plumbing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00069.warc.gz | en | 0.948926 | 883 | 2.875 | 3 |
Would-be managers are often told they should aspire to being consensual, team-playing listeners. But in fact it is hard taskmasters who not are afraid to crack the whip to get the job done that are most valued by employees.
A study by the UK Institute of Leadership & Management has found that people would rather work for a tough boss who is successful than a lenient one who fails to deliver the goods.
Its poll of 1,500 managers, carried out with research firm AQR, found that, while qualities such as team-working and being focused on people were considered good attributes to have, when it came to delivering the goods, a bit of bloody-minded grit never went amiss.
The ILM's research echoes a U.S. study published earlier this year by academics at the University of Chicago which has suggested that, for chief executives, hard-nosed personal virtues such as persistence and efficiency count for more than "softer" strengths such team-working or flexibility.
The ILM study found that the majority of managers polled would choose a hard manager who exhibited a real commitment to deliver over and above "nicer" bosses who took more of an interest in them as people but failed to deliver.
The key, it argued, was less about whether a manager was being nasty or nice, but simply about how much they were focused on performance.
The Chicago University research, meanwhile, looked at the personal assessments of 313 chief executive candidates to get an idea of what made a good leader.
Of the 313, 225 were hired, with the academics also examining closely their subsequent performance.
It identified five CEO traits that correlated most closely with business success at buyout companies, and five that scored the lowest.
The top five traits that mattered were: persistence, attention to detail, efficiency, analytical skills and setting high standards.
Those considered less important were: strong oral communication, teamwork, flexibility or adaptability, enthusiasm and listening skills.
"We found that 'hard' skills, which are all about getting things done, were paramount," lead author Steven Kaplan, a professor of finance and entrepreneurship at the university, told the newspaper the Wall Street Journal, which has published the research.
"Soft skills centering on teamwork weren't as pivotal. That was a bit of a surprise to us," he added.
However, the survey was careful not to dismiss the value of the "soft" traits out of hand.
A trait such as enthusiasm was self-evidently useful to have. But the key was that an extremely enthusiastic manager was unlikely to fare much better than one who was just enthusiastic. The same would apply to traits such as listening skills or treating people with respect.
By comparison, the value of "hard" traits increased non-stop. A certain amount of flexibility could make for a better chief executive, for example, but too much could shade into indecisiveness.
Yet extra persistence, efficiency or standard setting would always be beneficial, it argued. | <urn:uuid:dd984ea5-7d3d-4da4-94d2-8a7a1dedd46b> | CC-MAIN-2022-33 | https://www.management-issues.com/news/4645/workers-prefer-tough-love/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00277.warc.gz | en | 0.984035 | 610 | 1.609375 | 2 |
Includes bibliographical references (pages 355-356) and index.
Book I: The mind and consciousness. Unlocking the mind ; Consciousness: a physicist's viewpoint -- Book II: Mind over matter. Telepathy: a penny for your thoughts ; Telekinesis: mind controlling matter ; Memories and thoughts made to order ; Einstein's brain and enhancing our intelligence -- Book III: Altered consciousness. In your dreams ; Can the mind be controlled? ; Altered states of consciousness ; The artificial mind and silicon consciousness ; Reverse engineering the brain ; The future: mind beyond matter ; The mind as pure energy ; The alien mind ; Concluding remarks.
A survey of current research into the human mind reveals how top international laboratories have innovated unique technologies for recording profound mental capabilities and enabling controversial opportunities in the field of cognition enhancement. | <urn:uuid:06568e49-09aa-415d-a249-82edc37b139f> | CC-MAIN-2022-33 | https://pgpl-kids.iii.com/search~S1?/dMind+and+body/dmind+and+body/1%2C1%2C1%2CB/frameset&FF=dmind+and+body+research&0%2C0%2C | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00665.warc.gz | en | 0.743569 | 173 | 2.46875 | 2 |
In the summer of 1983, the eight member school board of District 97 were forced to make a difficult decision. Affirmative action had leaped into the national spotlight and they, being progressive, liberal minded elected folk, were determined to be leaders of the movement. Longfellow School currently had two African American teachers out of a staff of forty. The breakdown of minorities in the student population was just under twenty percent. Per arbitrary requirements, the board decided by a 5-3 vote to hire two additional teachers of color.
The two teachers, Mrs. Irma Haynes and Sherri Gardner, would become my fifth grade teachers.
On the first day of school, with our new clothes and backpacks, we queued up on the blacktop playground. Large yellow numbers spray paint stenciled on the pavement led us to our respective doors. Teachers stood patiently, smiling in front of their new classes and when the bell rang, echoing through the end of summer air, they led everyone inside. Except the fifth graders. We stood there bewildered for a moment until our vice-principal, Mr. Grayson pushed the bar of the heavy metal door in front of our restless pack.
"Please get in line and follow me to the auditorium." He yelled.
We jostled into position, getting near our last year friends and squeaked our tennis shoes through the locker lined linoleum hallways toward the auditorium.
We fell down the pitch of the aisles to the first four rows and filed in, pushing down the green velvet seat cushions and bouncing into place. A whispered hum was interrupted by the entrance of four women on stage.
Two I recognized, one Mrs. Revarek, had been listed as my teacher in a notice sent to my house the previous month. Another, Ms. Smith had been my sister's teacher, but I didn't know the other two. The first thing I noticed about them was they were black. One was tall and skinny and had glasses, the other was plump and the dress she wore seemed stretched around her body.
The skinny one was named Mrs. Haynes, and the other was named Ms. Gardner. Mr. Grayson explained to us that the school was implementing a new type of curriculum, instead of one teacher, we would now have two; one for homeroom and social studies, and the other for math and science. Then he read out two lists of names. Most of my friends were on the first list, and they left with Mrs. Revarek and Ms. Smith. The rest of us sat, then we counted off, one… two… one… tw..
Mrs. Haynes would be my homeroom teacher.
She seemed nice enough, but her demeanor was false, like a drill sergeant. I feared her under my skin, and that was the effect she desired. Before she led us into our classroom on the first day, she lined us up in the hallway and explained that we would be producing a school play on American historical figures that year and as we entered the room, we would pull a name out of a hat. We would research the character and BE that character in the play. She told us about respect for each other and her, if any of us lost the respect, we would all know it.
When I reached into the felt hat, I fished through the confetti expecting to draw a dead president, instead, I didn't even recognize the name. Harriet Tubman.
By Thanksgiving, We had lost and gained Mrs. Haynes' respect many times. She had a bubbled security mirror installed in the back corner of the room as her "third eye". She had taken recess away from us on numerous occasions and one special day, pushed all of our pelican desks together and demanded that we sit with our heads down all day. She would periodically throw a confiscated Match-box car across the room and hit the back black board to startle us. Mrs. Haynes was crazy and we often looked forward to going to Ms. Gardners' room next door for Science and Math. Ms. Gardner was our nice and soft and sweet teacher, Mrs. Haynes was our mean and hard and sour.
Our first report on our historical figure was due the day after Thanksgiving break and the extent of my research was a plagiarized account of a Golden Book biography I had glanced over the day before. When I discovered Harriet Tubman was a black woman, I thought Mrs. Haynes would realize her mistake and assign me someone else. Instead, she scolded me for my lackluster effort and demanded an explanation.
I played my only card right away, "I can't play Harriet Tubman"
"Why not?" She asked, over her horn rimmed glasses.
"She's a woman and bl…" I stopped myself.
"And YOU are a little boy and have an assignment. Now, when we go to the library today I want you to get every book on Harriet Tubman you can find. AND READ THEM."
By Christmas, I had read every book in the school library and had ordered three more from the Troll Book Club. I had it down. The play would be in February, and I was excited.
Around the same time, five white teachers were filing reverse discrimination lawsuits against the school, claiming the better qualified teachers were turned down in lieu of arbitrary quotas set by the school board. The Village Journal ran an editorial. It turns out that the school board not only hired minority teachers in the name of affirmative action, but also put ninety-five percent of minority children in their classrooms. When my mother asked me how many black kids were in my class compared to the others, I replied,
On the first day after Christmas break, our class had changed. Despite the progressive, integrated suburb our parents applauded, it seemed an undertow of racism had sucked out a third of my white classmates. No one ever said a word about it. Class (smaller) resumed as normal.
Our village didn't. PTA meetings became shouting matches about standards, and equality and other words that had too many meanings. Parents and teachers took sides and wrote letters to the Journal. A follow up article outed Mrs. Haynes and Ms. Gardners' credentials compared to their shunned white counterparts. Mrs. Haynes was criticized for her lack of experience, citing that she had been a successful marketing executive from Detroit, but only had her teaching certificate as a supplement degree in college. She defended herself with a hardened shell committed to education.
I had received a chess set for Christmas that year and was trying to teach a friend to play on the playground one day when Mr. Bitoy, a sixth grade teacher looked on in interest. Bitoy was a large Samoan with a goatee. He wore vintage button up shirts that untucked themselves over his round belly. He was a jolly sort, loved by his students, and tenured. He told me that students played chess in his room at lunchtime and invited me. I went that day, and every day for the next month. I began to crush the sixth graders and received the ultimate compliment one day, a match with Bitoy himself. Word on the playground was, that if you beat Bitoy, you got a free lunch from Mcdonalds. I couldn't wait.
He crushed me. I'll never forget that game. It was our first of many and he taught me two important lessons, one about chess and the other about race. The first was when he observed my obvious disappointment losing. He took a long look at me and explained.
"The only way to get better at chess is to lose"
The second lesson came when he used one of his famous distraction tactics and asked me about my pile of Harriet Tubman books. I explained to him that I was playing her in the class production. He smiled. I stumbled with embarrassment. I started to explain that I didn't understand why I had to play a black lady when I was a white boy when he stopped me.
"What color are the chess pieces Mr. B?" He always called me Mr. B.
"Black and white." I replied, shrugging my shoulders.
"And does it matter what color you are in chess?"
"No." I replied, hesitant. Then Bitoy finished my thought.
"But it matters with people." He said, starring at the top of my head as I stared at the chess board.
"The thing you have to understand Mr. B, is that you will always be white, and sometimes you won't always know it. And I'll always be black, but I'll always know it. Think about it B. I'll see you tomorrow." He stood up and walked out of the room as I sat there in a puddle of almost understanding.
A few weeks later on Groundhog Day, we had the dress rehearsal for the play, we all stood in the wings of the polished pine stage. It was after school and we slowly took our turns walking on stage, getting a spotlight on us, then reading a brief synopsis of our historical significance. My costume consisted of an apron and a red do rag tied around my head. The audience was a hodgepodge of teachers and parents. My performance went off without a flaw.
As I walked off stage into the audience a low rumble paused through parts of the auditorium. A few performances later and it became all too evident to the gallery that this was not just a play of historical figures, but only African-American historical figures. Parents who once tolerated the controversy surrounding Mrs. Hanes were now outraged that she had produced a one sided affair and some dragged their children out of the auditorium with sharp words. The school officials present rushed the students out into the hallway and we were told to get our jackets on and go home.
That night, Mrs. Haynes phoned my house. My parents both talked to her. I hid at the top of the stairs eavesdropping over the wooden banister, nervously running my fingers through the rust colored shag carpet. I thought I was in deep trouble. My dad came up first and sat next to me on the landing. I thought I would cry and began to tremble, hiccup. My father rested his hand on my shoulder and told me that I wasn't in trouble, but he wanted to know if I still wanted to be in the play. I told him yes.
The next day we performed for the school, four white kids, Harriet Tubman, Frederick Douglass, William Edward Burghardt Dubois and Denmark Vesy and fourteen black kids. That night we performed for a packed house of Parents, teachers, educators and journalists.
When it was all over, the journalist who had been writing the editorials came to me and asked how I felt playing a black woman, I shrugged my shoulders and told him that it was just like playing the Tin Man last year in The Wizard of Oz, except this year I didn't have to paint my face silver.
Mrs. Haynes was dismissed the next day. | <urn:uuid:6d688b1c-a7e4-472c-916c-d8c2b7d38ca1> | CC-MAIN-2022-33 | https://m.everything2.com/title/The+Harriet+Tubman+Offense | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00675.warc.gz | en | 0.98706 | 2,297 | 1.6875 | 2 |
The presentation from Alex Rodriguez, Urban Drones CEO, titled “What Film Makers and Videographers Really Want From a Drone and How These Changes can Benefit Other Sectors” brings to the international meeting organized by the Association for Unmanned Vehicle Systems International (AUVSI), the aspirations of professional filmmakers: drones that are modular, like cameras.
The conference from the developer of the Splash Drone (read our article Splash Drone: a Water Loving Quadcopter), takes place at the Innovation Hub (Exhibit Hall), in the Georgia World Congress Center, in Atlanta, May 05, 2015: 10:15 AM – 5:30 PM.
In the session Alex Rodriguez talks about the fact that “the film/video production industry is one of the earliest benefactors of drone technologies” but the industry has still not asked producers and cinematographers what they really want from a drone. Alex Rodriguez says he has “found that producers are having to change their scripts around the capability of the drone on set. This is because, unlike professional cameras, drones are not modular. Professional film makers want drones to be like cameras, a modular and quickly adaptive tool. Today, when a film maker hires a drone operator, they’re stuck with that specific platform and can hardly change the look and feel on the shot. This is impeding artistic creativity.”
The speaker states that “there’s barely any flexibility to change a lens or a camera on set without having to have several drones. This gets cost prohibitive and is inefficient. We’ve talked to a couple of dozen digital media professors, producers and cinematographers and would like to bring our findings forward to help drone technology developers make better tools for film makers and media professionals. These insights will help manufacturers develop more efficient technologies that will bleed into the agriculture field, land surveyors, wildlife management organizations and many other sectors.”
Alex Rodriguez’s conference is the only one centered on the use of drones by cinematographers, in a series of conferences held during the event. This year, Colin Guinn, chief robotics officer for 3D Robotics, which drone Solo was a star at NAB 2015, is the general session host for the event.
With more than 8,000 attendees and 600 exhibitors from more than 55 countries around the world, Unmanned Systems 2015 is recognized as the leading event for the unmanned systems marketplace. Drones are, naturally, becoming an important part of the event.
The Unmanned Systems 2015 includes three days of interactive exhibits and demonstrations of air and ground vehicles spread throughout 350,000 square feet of exhibit space. The 200-plus educational sessions, workshops, and panel presentations focus on the future of commercial, humanitarian, environmental, governmental, and military applications for robotics and unmanned systems.
Organizer of the event, the Association for Unmanned Vehicle Systems (AUVSI) is the world’s largest nonprofit organization devoted exclusively to advancing the unmanned systems and robotics community. AUVSI’s 7,500 members worldwide come from government organizations, industry and academia.
For more than four decades, AUVSI’s Unmanned Systems conference and trade show has been the premier worldwide event for the unmanned land, sea, and air industries. Unmanned Systems 2015 is a must-attend event for any local, national, or trade news organization interested in gathering valuable insight into the emerging commercial markets and current applications of unmanned technologies. The conference explores the opportunities and innovations of this projected $48 billion industry, and how it will soon impact the lives of people at home and across the globe.
Follow the link to know more about the Unmanned Systems 2015 conference and trade show. | <urn:uuid:b4091349-67a8-4170-8902-9d1c4161cd01> | CC-MAIN-2022-33 | https://www.provideocoalition.com/filmmakers-want-modular-drones/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00067.warc.gz | en | 0.926803 | 764 | 1.617188 | 2 |
The Lifeboat Foundation will present the “Lifeboat to the Stars” award along with $1,000 to the winner at the 2013 Campbell Conference.
The “Lifeboat to the Stars” award will be for the best work of science fiction of any length published in 2011 or 2012 contributing to an understanding of the benefits, means, and difficulties of interstellar travel.
Coordinating judge is Hugo, Nebula, and Campbell Award-winning science-fiction writer Robert J. Sawyer. Editors and readers are invited to nominate eligible works — novels, novellas, novelettes, or short stories — by emailing Sawyer at firstname.lastname@example.org.
Sawyer will present the award — and the $1,000 prize — at this year’s Campbell Conference, June 13-16, 2013, at the Oread Hotel in Lawrence, Kansas:http://www.sfcenter.ku.edu/
Working with coordinating judge Sawyer will be consulting judge Greg Bear. Also consulting on the choice of winner will be Catherine Asaro, Jason Batt, Sherry E. Bell, Kevin M. Berry, Don V. Black, Stephan Vladimir Bugaj, Brenda Cooper, David Gerrold, Niklas Jdrvstret, Jim Karkanias, Rouslan Krechetnikov, Wes Kretzschmar, Eva-Jane Lark, Mike E. McCulloch, George Perry, Allen Steele, John K. Strickland Jr, and Allen G. Taylor.
The award was suggested by Frederik Pohl and James Gunn, and named by Gunn.
About Lifeboat Foundation
The Lifeboat Foundation is a nonprofit nongovernmental organization dedicated to encouraging scientific advancements while helping humanity survive existential risks and possible misuse of increasingly powerful technologies, including genetic engineering, nanotechnology, and robotics/AI, as we move towards the Singularity.
Robert J. Sawyer | <urn:uuid:5f3e19da-94d9-46f6-8e38-f6ef3b0e00a8> | CC-MAIN-2016-44 | http://www.sfwa.org/2013/01/lifeboat-to-the-stars-award/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00262-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.883448 | 392 | 1.53125 | 2 |
SAN DIEGO — In today’s world, most of us have somewhat of an idea to make sure we are not victims of fraud whether it’s not clicking on certain links or not answering certain calls, however, hackers are sneaky. One woman told News 8 she was almost a victim of a new type of fraud and wants to spread the word.
Last Thursday, Julia Legaspi, who’s 67 years old, got a typical-looking receipt from PayPal in her inbox.
"It looked so legit," said Legaspi.
Legaspi said she noticed a few things that didn’t align but she decided to contact PayPal using a 1-800 number provided in the fake statement and thought the person on the other end of the call was going to help sort things out for her.
"The guy was asking [to] log onto your account so we could return the fraudulent charge," said Legaspi.
What she didn’t know, was the guy on the other line was trying to get her personal information, the number she was referring to was a fraudulent number.
She said she realized something didn’t feel right when the person on the other line asked for her PayPal and bank account numbers.
"Before I gave them my banking information to return the charges," said Legaspi.
Legaspi said she was able to stop the transaction from going through. But unfortunately, not many people are as lucky.
According to the FBI, millions of elderly people are targeted because of many reasons, and $3 billion dollars are lost every year from scams affecting the elderly.
There are many ways to keep yourself safe one of the biggest ones resist the urge to act quickly. Scammers will create a sense of urgency to produce fear and lure victims into immediate action. | <urn:uuid:be3a63f5-f346-4a51-923a-4a1f28d4b4fd> | CC-MAIN-2022-33 | https://www.cbs8.com/article/news/local/consumer-alert/senior-san-diego-woman-targeted-by-paypal-scam/509-7959ea78-d418-4c3e-aeaf-4324ece10318 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00672.warc.gz | en | 0.976003 | 374 | 1.828125 | 2 |
Watch the Words
Proverbs 15:1 A soft answer turns away wrath, but a harsh word stirs up anger.
Responding with soft words isn't my default when I get mad, I'm stressed out or my feelings get hurt. More often than not, my first impulse is to use my words to "make things right" in my eyes. Now that may make me feel better temporarily, but responding straightaway with harsh words rarely makes the situation better. In fact, I'd say about 98% of the time, I wish after the fact, that I had chosen different words, used a different tone and opted for different timing.
So how did Proverbs 15:1 speak to you today? Going forward, what can you do to make sure you're dispensing more soft responses when you find yourself in a difficult situation? Tami W.
Powered by 4 is all about engaging God's Word and living it out--in community. So if it's encouragement you want or motivation you need, join the discussion on the P4 Blog--a place to weigh in on the daily scripture as well as share thoughts & questions. And, for a more in-depth look at Scripture, tune in to the daily Back to the Bible radio program with Woodrow Kroll. | <urn:uuid:4be0d7c0-c302-437b-b578-65e273d29f8d> | CC-MAIN-2017-04 | http://www.christianity.com/devotionals/powered-by-4-tami-weissert/powered-by-4-nov-3-2012.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00571-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955524 | 262 | 2.15625 | 2 |
How to Drain a Beagle's Ear
Beagles have large ears that often get yeast and bacterial infections, so it's important to drain their ears with approved cleansers. Find out why it's important to never force liquids into a beagle's ear with help from a veterinarian in this free video on dog health.
Promoted By Zergnet
Let's talk about how to drain a beagle's ear. Now, beagle's have pretty large flappy ears, and they're they're accustomed sometimes to getting yeast and bacterial infections down in the ears, so cleaning the ears, or draining that is, can be an important step in keeping your beagle's ears healthy. The first thing you need to know is is there infection going on, so check with your veterinary clinic first and make sure that cleaning, using medications, draining the ear that is, is a good and safe step to do. The anatomy of a dog ear, beagle or otherwise, is kind of unique in that there is an external canal under that flap that goes pretty much straight down, and there's a very sharp almost ninety degree angle that goes to the eardrum, and so a lot of things can be going on under that or in that canal that you don't know about so check with your veterinary clinic and get a diagnosis first. When you're trying to clean an ear the best thing to do in a lot of instances is to use an approved ear cleanser, and what what you want to do is take this cleanser and use gauze pads or cotton balls and place the cleanser on that first. Then, what you can do is actually use that gauze pad with the cleanser on it and press down into this canal. Be careful. Ears are very tender, so don't get bit or anything like that, but you can press this this these cotton gauze pads down in that ear canal and turn and swipe, and get a lot of exudate out that way. You can also take the ear flap; open, and put the cleanser down in there and gently squeeze some of that cleanser down in, and then massage that ear, and usually a beagle is going to flap their head right after you do that. Then, you want to clean with ex or any excess material out with a dry gauze pad. You don't want to force any liquids down in the ear because that can hurt the eardrum, or force any exudate or wax up against the eardrum and damage it. So again, check with your veterinary clinic first to make sure that there's not a bad infection going on; that you don't need any medications, but draining the ear is pretty simple. Essentially, you're just cleaning it out and using a cleanser. | <urn:uuid:db46aa87-ad06-44d3-bc41-42793ce40b45> | CC-MAIN-2017-04 | http://www.ehow.com/video_4801798_drain-beagle_s-ear.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00292-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968882 | 565 | 2.40625 | 2 |
This new thrill-seeking robot actually base-jumps. That’s right, a robot seeking thrills and showing off. It will climb up the side of a building, then jump off and deploy a paraglider to fly back down to Earth.
Presumably just before each jump it says something clever, like “Geronimo” or “allons-y” and I’m sure it has a tattoo that says “Death from above”. We all know that’s where this is going anyway.
It’s name is Paraswift and it boasts an on-board video camera to film the jump. The bot was born from an unholy union between Disney Research and the Swiss Federal Institute of Technology in Zurich. It’s the first bot in it’s size class to be able to both climb and fly. It may be showing off now, but it has some potential when it comes to serious uses as well. For instance it could gather aerial footage for 3D modeling systems and help with projects like Google Street View.
It climbs and sticks to surfaces thanks to a rotor spinning in a tube, which creates a vortex that lets it stick to the wall as it climbs. Think of it as a mini tornado. The pressures created make it stick to the wall.
Switching from climbing to flight needs some work and has been a challenge for the team. Right now, the paraglider is deployed by remote control by a mechanical arm. When the paraglider opens, the vortex is turned off and the robot simply falls off the wall.
All I can say is, look up and do it often. And wear a helmet.
[via New Scientist] | <urn:uuid:c9e4ed89-f438-4cc8-9836-088dc43728bf> | CC-MAIN-2022-33 | https://technabob.com/blog/2011/09/09/robot-jumps-from-building-paraglider/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00477.warc.gz | en | 0.944525 | 360 | 2.296875 | 2 |
Wednesday, April 16, 2014
World Youth Conference 2014 Sri Lanka #WCY2014 from 6-10th May 2014
The International Youth Conference 2014(World Youth Conference 2014 #WYC2014) will be held in Sri Lanka from 6th to 10th May 2014.
The inaugural function of this international forum will be held at the Magam Ruhunupura International Conference Hall in Hambanthota on the 7th of May under the patronage of Sri Lanka President Mahinda Rajapakse. More than 1500 youth representatives from 196 countries will attend this conference.
This is the 1st time that a youth conference of this magnitude is being held in an Asian country. 152 youth from Sri Lanka will participate in this conference. Minister Dallas Alahapperuma and parliamentarian Namal Rajapakse will function as the co-chairmen of this conference.
The underlying theme of WCY 2014 is ‘Mainstreaming Youth in the Post 2015 Development Agenda’.
The conference will bring together youths from the world over with a special focus on underrepresented youths with a gender and regional balance. In total, 1,500 youths will be selected representing different countries with young people from groups identified as unrepresented or underrepresented.
All expenses of youth representatives selected to attend the conference will be borne by the organizers. WCY 2014 will also bring representatives of member states including Ministers of Youth, UN officials, representatives of other international and regional organizations, academics, corporate leaders and other relevant stakeholders to Colombo.
WCY 2014 will facilitate a process that strengthens effective youth participation in the planning, implementation and evaluation of post 2015 development agenda, which refers to the process of defining the future global development framework that will succeed the Millennium Development Goals.
The Conference will also create an inclusive platform for youths that enable them to review the progress of MDGs, share ideas, experiences and innovative approaches for effectively contributing to the post MDG framework and its implementation.
The conference will be organized by an International Youth Task Force (IYTF) in collaboration with the National Task Force appointed by the Youth Affairs and Skills Development Ministry.
The IYTF comprises 20 youths where 10 of whom are young leaders from around the world representing established international youth-led and youth serving organizations and 10 young leaders from Sri Lanka.
The IYTF which convened in Colombo for its second meeting has finalized the thematic areas of WCY 2014 and discussed matters pertaining to conference logistics and the participation of young people.
The members of the IYTF also hosted a discussion with officials from the United Nations Country Team in Colombo and explored ways of collaborating further with the UN system.
Labels: World Youth Conference 2014 Sri Lanka #WCY2014 Colombo, World Youth Conference 2014 Sri Lanka #WYC2014 Hambantota | <urn:uuid:5c43f409-1fb4-4f61-9372-a34f37d35445> | CC-MAIN-2017-04 | http://www.lankauniversity-news.com/2014/04/world-youth-conference-2014-sri-lanka.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00267-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.920689 | 569 | 1.5 | 2 |
Every year on Thanksgiving I dedicate a post to the horrendous genocide of Native Americans. Could you imagine if the day the first white man landed on Africa was a national holiday? Hell, if slavery wasn't abolished in 1865, I'm sure they would've made the holiday up! This year let's acknowledge the massacre of Thanksgiving across the globe -- not just North America. Indian communities were wiped out like a nuclear bomb from every island on the Caribbean, mainly by those crafty Spaniards (see picture above). Here is an interesting fact on the Arwark Indians from http://www.salvationinc.org/:
The term Arawak (from aru, the Lokono word for cassava flour), was used to designate the friendly Amerindians encountered by the Spanish in the Caribbean. These include the Taino, who occupied the Greater Antilles and the Bahamas, the Nepoya and Suppoyo of Trinidad and the Igneri who were supposed to have preceded the Caribs in the Lesser Antilles, together with related groups (including the Lokono) which lived along the eastern coast of South America as far south as what is now Brazil.
The group belongs to the Arawakan language family and they were the natives Christopher Columbus found when he first landed in the Americas. The Spanish described them as a peaceful, gentle people, although this description was biased by the fact that any "hostile" groups were automatically classified as Caribs.
It is said that a number of Arawak tribes have been extinct for several hundreds of years. What could have happened that would bring a population that once numbered 2 to 3 million down to just a few thousand by the early part of the 16th century? Throughout history the Arawak where subject to many hostile take-overs, diseases, enslavement, damage to food supplies and much more. Inevitably, by the end of the 16th century the Island Arawak had become extinct.
Columbus, in his log, noted: "They brought us parrots and balls of cotton and spears and may other things, which they exchanged for the glass beads and hawks' bells. They willingly traded everything they owned . . . they do not bear arms, and do not know them, for I showed them a sword, they took it by the edge and cut themselves out of ignorance . . .. Their spears are made of cane . . . they would make fine servants . . .. With fifty men we could subjugate them all and make them do whatever we want."
See also: THANKSGIVING HORROR DAY | <urn:uuid:a8c78b83-aadf-4313-91e9-b565303edb16> | CC-MAIN-2016-44 | http://claycane.blogspot.com/2007/11/thanksgiving-horror.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721595.48/warc/CC-MAIN-20161020183841-00478-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.977476 | 526 | 2.421875 | 2 |
How can packaging Django projects make deployments easier, faster and more reliable?
Deployments of Django projects can be a challenging task. Beside the Python source code itself you usually have to handle a lot of other stuff:
* Installing Python dependencies
* Compiling SCSS to CSS
* Collecting static files
* Building documentation
* Compiling translations
And of course you want a deployment approach that is independent of a specific hosting solution.
Also you have to think about the scalability of your deployment when the number of servers you operate increases.
This usually means that `git pull` is not the best way to deal with these tasks.
So I will discuss different ways to package your Django project like
* Operating system packages
Some of these concepts will hopefully help you to make your deployment process easier, faster and more reliable. | <urn:uuid:1f50ba28-8849-4fb1-91a8-faf8040baa8e> | CC-MAIN-2022-33 | https://api.media.ccc.de/v/hd-117-can-packaging-improve-django-deployments- | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00476.warc.gz | en | 0.882771 | 196 | 1.65625 | 2 |
A coin is tossed 8 times. Calculate the probability of ;
a) tossing 6 heads and 2 tails.
b) tossing 7 heads and 1 tail
c) tossing at least 6 heads
I guess drawing a tree diagram with 8 stages might be a little too complicated but it will greatly help to analyse and solve the problem at hand.
Anyway for problem a the probability of obtaining a head or a tail is half. Therefore the answer to part a is (0.5)^6 x (0.5)^2 hope you will be able to do part b and c. | <urn:uuid:80d8851d-a9fd-445d-8d43-eae9e8f283b0> | CC-MAIN-2017-04 | http://mathhelpforum.com/statistics/64348-probability-distributions.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00247-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.928557 | 121 | 2.984375 | 3 |
[This is part of a series of posts on Liberty University’s student handbook, “The Liberty Way,” which governs what students can say, do, read, and watch – both on and off campus – and sets out a regimen of reprimands and fines for violators]
Liberty University is all about freedom – the freedom to do, think and say exactly what Jerry Falwell would want you to do, think and say, and nothing else. Accordingly, students cannot participate in demonstrations, petitioning, picketing, or literature distribution on campus without the express approval of the administration. Students can also be restricted or prohibited from participating in such activities off campus if they are deemed to be in violation of the school’s principles and policies.
Demonstrations, Petitions and PicketingStudent participation in on-campus demonstrations, petitions or picketing is prohibited unless approved by Liberty University administration. The administration may also prohibit or restrict student participation in demonstrations, petitions or picketing at places other than on campus, where such participation would contradict or otherwise compromise the principles and policies of Liberty University.Distribution of LiteratureDistribution of literature is permitted on campus only when prior administrative approval has been secured from the Student Life Office or University Services. Distribution of literature in the residence halls requires written approval from the Residence Life Office.
12 Reprimands + $50.00 Fine
- Participation in an unauthorized petition or demonstration | <urn:uuid:7bf12305-9f4b-4930-9b39-05ee2f6f864b> | CC-MAIN-2016-44 | http://www.rightwingwatch.org/post/the-first-amendment-doesnt-apply-at-liberty-university/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00096-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.92312 | 293 | 1.726563 | 2 |
Directories and SD Folder Structure
Assets are files that can be loaded by a core and are organized by platform.
In the case of assets common to a platform and independent of any core implementation:
If a core for a particular platform requires its own core-specific assets they should be placed in a subfolder named after the core folder itself, and flagged as such in the core definition:
If a core uses assets that are not specific to any existing platform they should be placed in a folder called “_none” and within that folder another folder named after the core itself:
If desired, custom subdirectories can be used to further organize within these folders.
Saves contains all user created files loaded or saved by a core, and like Assets, are organized by platform and function.
Data slots in a core definition that are flagged as
nonvolatile are placed here.
When a core’s data slot Parameter Map is flagged with 0x8 and also marked as nonvolatile, its filename will be cloned from slot index 0 (the first slot in
/Assets/sampleplatform/common/sample subfolder/Example Asset.bin when loaded as the primary asset, may be used by other data slots as a basis for their filenames -
/Saves/sampleplatform/common/sample subfolder/Example Asset.sav When the nonvolatile file is created, any necessary subfolder structure to contain it will also be created automatically.
The directory structure in the Assets and Saves folders should mirror each other. If folders are organized in one, they should be reorganized in the other as well.
Cores contain subfolders of all cores installed following a certain naming convention.
The format is
“AuthorName.CoreName”. This convention must be respected as it allows quick loading and sorting of the cores list.
View the Core Definition section for information about files used to define a core in this folder.
Folder structure for Memories is still in development and is subject to change.
All .pocket files go here and no subfolders are currently supported.
Save files for GB Studio are placed in
In the future, saving and loading the system settings wholesale via JSON will be stored here.
Per-core settings may be present as well.
Additional system files for Pocket are stored in this folder. | <urn:uuid:9b4fdd86-4859-41f4-b5f3-2899734dc959> | CC-MAIN-2022-33 | https://www.analogue.co/developer/docs/directories-and-sd-folder-structure | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00069.warc.gz | en | 0.892926 | 614 | 2 | 2 |
Do Common but Differentiated Responsibilities Belong in the Post-2015 SDGs?
A Short History of CBDR and the Issue of its Application to Sustainable Development
At the ninth session of the Open Working Group (OWG), a debate emerged, largely between developed and developing countries, on the application of Common but Differentiated Responsibilities (CBDR) to the SDGs. Developing countries posited that CBDR should apply to the post-2015 development agenda. Meanwhile, developed countries responded that the concept is rooted in environmental frameworks and is not applicable to the SDGs. Which side will win the debate depends not on who is ‘right’ in a legal sense but rather on which side can gather consensus on this issue. Even so, it is worth exploring the history and context of CBDR to gain an understanding of both sides of this contentious issue.
A Short History of CBDR
The concept of CBDR is not new to the international community and was originally codified as an international environmental legal principle. Under CBDR, “all states are responsible for addressing global environmental degradation yet not equally responsible.” This concept accounts for the need for all states to take collective responsibility for the environment, while allowing countries of varying levels of development to contribute according to their capacity. The general idea of states being collectively responsible for environmental problems though to different extents dates back to the first UN Conference on the Human Environment in 1972 and the resulting Stockholm Declaration, which described CBDR as “the applicability of standards which are valid for the most advanced countries but which may be inappropriate and of unwarranted social cost for the developing countries.”
In 1992, CBDR became enshrined as an international legal concept at the UN Conference on Environment and Development in Rio de Janeiro, also known as the Earth Summit, which covered issues related to climate change, deforestation, desertification, and biodiversity. Principle 7 of the Rio Declaration of 1992 states:
In view of the different contributions to global environmental degradation, States have common but differentiated responsibilities. The developed countries acknowledge the responsibility that they bear in the international pursuit of sustainable development in view of the pressures their societies place on the global environment and of the technologies and financial resources they command.
Here, CBDR is tied with sustainable development explicitly. Many developing countries have logically extended CBDR to all of the three pillars of sustainable development (environmental protection, economic development, and social progress). Twenty years later, the International Law Association built on the Rio Declaration. In its 2002 New Delhi Declaration of Principles of International Law Relating to Sustainable Development, the organization declared that the CBDR principle obliged "a duty to cooperate in the achievement of global sustainable development," and acknowledged "the special needs and interests of developing countries and of countries with economies in transition" and countries "affected adversely by environmental, social and developmental considerations."
However, as was clearly demonstrated during OWG 9, developed countries are not in full agreement with the broader interpretation of CBDR that allows for its application to general sustainable development. At the same 1992 Earth Summit at which CBDR was codified, the United States issued a written statement reading: "The United States understands and accepts that Principle 7 [of the Rio Declaration] highlights the special leadership role of the developed countries, based on our industrial development, our experience with environmental protection policies and actions, and our wealth and technical expertise capabilities. The United States does not accept any interpretation of Principle 7 that would imply a recognition or acceptance by the United States of any international obligations or liabilities, or any diminution in the responsibilities of developing countries." This line of thinking has continued to the present among many developed countries, particularly on the rejection of CBDR’s application outside of the realm of environmental issues to sustainable development more broadly.
More recently, the the UN Conference on Sustainable Development, better known as Rio+20, which is seen as the foundation of the development of the SDGs, mentioned CBDR explicitly in its outcome document The World We Want in a somewhat ambiguous context. The document first reaffirms “all the principles of the Rio Declaration on Environment and Development, including, inter alia, the principle of common but differentiated responsibilities, as set out in Principle 7 of the Rio Declaration.” It later states, “We recall that [UN Framework Convention on Climate Change – UNFCCC] provides that Parties should protect the climate system for the benefit of present and future generations of humankind on the basis of equity and in accordance with their common but differentiated responsibilities and respective capabilities.” Though the second reference to CBDR in Rio+20 deals more explicitly with the environment, the first reaffirmation leaves it open to interpretation as to whether CBDR should be more widely applied to sustainable development.
CBDR and the SDGs
This ambiguity has contributed to a divergence in approaches to the SDGs. Developed countries tend to not support the application of CBDR to development, as it would increase their global development contribution liability. Developing countries tend to support the application of CBDR to the SDGs, as it will lessen their burden of contributing to global development. Brazil, as one of the major global emerging powers, has specifically claimed Rio+20 “universalized” CBDR to all the SDGs in their justification of the principle. However, this logic has not swayed the thinking of developed countries. As the international legal framework is somewhat unclear on CBDR’s application to sustainable development broadly speaking and hence to the SDGs, both sides can find grounds to bolster their arguments from past UN agreements.
As the OWG Co-Chairs continue to prepare their report by whittling down and tweaking inputs from member states, it remains to be seen which side will prevail on the issue of CBDR in the SDGs. An examination of CBDR’s history as an international legal principle has shown that there are no easy answers as to its validity in application to sustainable development generally speaking. Time will tell whether CBDR makes an appearance in the SDGs, but in any case member states would be wise to heed the words of OWG Co-Chair H.E. Mr. Macharia Kamau, who, during the proceedings of OWG 9, urged members to consider whether a proposed goal speaks equitably to “north and south, east and west, and rich and poor.” | <urn:uuid:3c4071e0-f78c-47e2-b628-7c87c64eceb3> | CC-MAIN-2017-04 | http://cic.nyu.edu/blog/global-development/do-common-differentiated-responsibilities-belong-post-2015-sdgs | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00457-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955533 | 1,289 | 3.1875 | 3 |
I am working on forms 6i Oracle 8i,
under WIN-NT 4.0 Workstation.
Please let me know immediately.
My propblem is:
I am not displaying more than one record
in multirecord block from a database table.by writing a select statement in form.
In form, I have a multirecord block
(block name is DEPT and also basetable
name is DEPT). I want to fetch the records
from DEPTNEW table into that multirecord block.
If only one record in DEPTNEW table, then it is worked properly.
But the problem is, if in DEPTNEW table has more than one record
then the records are not displayed in that DEPT block on forms.
(NOTE: DEPT and DEPTNEW both tables have same structure)
Please give me the solution as soon as possible,
thanks a lot for ur cooperation.
my email id is firstname.lastname@example.org
I unable to get your proble
Are your fetching the data from DEPTNEW through
procedure, and then save it to DEPT table through
Pl give some more detail
what i feel from your question is that you want to display records in dept table from deptnew table.If thats true then you have to write a cursor which selects the data from the dept table. Assign the cursor columns to the dept table columns.You will be able to view the records in the dept block.
When the going gets tough, the tough gets going
Click Here to Expand Forum to Full Width | <urn:uuid:bcbb7857-5f03-4089-b98c-309c25898c92> | CC-MAIN-2016-44 | http://www.dbasupport.com/forums/showthread.php?7925-please-let-me-know-immdeiately | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00261-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.894577 | 342 | 1.5 | 2 |
ICCIS 2021 is monitoring the situation with COVID-19 pandemic and is considering measures to ensure a safe environment for all participants. Meanwhile, aside from regular onsite presentation format (oral presentation), ICCIS 2021 conference will also provide online platform (online presentation format) for participants who have difficulties to attend the conference physically due to the epidemic. Read more about online attendance (Click)
ICCIS is a premier, annual forum for researchers and scholars from multiple disciplines to come together to share knowledge, discuss ideas, exchange information, and learn about cutting-edge research in diverse fields with the common theme of communication and information systems. Continuing this tradition, 2021 5th International Conference on Communication and Information Systems (ICCIS 2021) will be held in Chongqing, China on October 15-17, 2021. The conference is hosted by Chongqing University, China, organized by School of Microelectronics and Communication Engineering of Chongqing University, supported by College of Electronic and Information Engineering, Shandong University of Science and Technology, China, Wuhan University, etc.
Sponsor Type:1; 9
INTERNATIONAL ADVISORY COMMITTEES
• Kin K. Leung, Imperial College London, UK (IEEE Fellow)
• Xiang-Gen Xia, University of Delaware, USA (IEEE Fellow)
• Fengchun Tian, Chongqing University, China
• Anu Gokhale, Illinois State University, USA
• Anhui Liang, Shandong University of Science and Technology, China (IEEE Senior Member)
• Yan Zhang, University of Oslo, Norway (IEEE Fellow)
• Yulin Wang, Wuhan University, China
• Min Liu, Deputy Dean, School of Microelectronics and Communication Engineering, Chongqing University, China
• A. C. M. Fong, Western Michigan University, USA
• Pascal Lorenz, University of Haute Alsace, France (IEEE Senior Member, IARIA fellow)
• Fei Yuan, Ryerson University, Canada (IET Fellow, IEEE Senior Member)
• Hirotake Ishii, Kyoto University, Japan
• Mehdi Kargar, Ryerson University, Canada
• Aiping Yao, St. Cloud State University, USA
• Paulo Batista, Interdisciplinary Center for History, Cultures and Societies of the University of Évora, Portugal
• Hongmei Li, National Engineering Laboratory for Intelligent Video Analysis and Application, China
• Mehmet Hakan Karaata, Kuwait University, Kuwait
• Xinzhou Xu, Nanjing University of Posts and Telecommunications, China
• Jiang Qing, Institute of Intelligent Machines, China
• Abdelaziz Bouras, Qatar University, Qatar (IEEE member)
• Mohamed F. Hassan, Kuwait University, Kuwait
• Vanvisa Chutchavong, King Mongkut's Institute of Technology Ladkrabang, Thailand
• Khalaf Khatatneh, Al-Balqa` Applied University (BAU), Jordan
• Roberto Ferro Escobar, CUN “Corporación Unificada Nacional de Educación”, Colombia
• Noel Linsangan, Mapua Institute of Technology, Philippines
• Chen Wu, Nanjing University of Posts and Telecommunications, China
• Zhengkang Zuo, Jiangxi Normal University, China (CCF Senior Member)
• Arif Djunaidy, Institut Teknologi Sepuluh Nopember, Indonesia
• Shu-Wen Dang, Shanghai University of Engineering Science, China
• Xuejing Zhang, University of Electronic Science and Technology of China, China
• Abderrahim Maizate, University of Hassan II, Morocco
• Jocelyn Flores Villaverde, Mapua University, Philippines
• Khaled Mohamed, Ajman University, UAE & Assiut University, Egypt
• Haythem Yousef Zorkta, Aleppo University, Syria
• Antonio Carluccio, RUDN University, Russia
• Md. Ismail Jabiullah, Daffodil International University, Bangladesh
• Shuangjuan Li, South China Agricultural University, China
• Wei Zhang, XianYang Normal University, China
ICCIS 2021 welcomes paper submissions on innovative work from researchers in academia, industry and government describing original research work in communication and information systems field. After a careful reviewing process, all accepted papers after proper registration and presentation, will be published in the Conference Proceedings by IEEE, and sent to be reviewed by the IEEE Conference Publication Program for IEEE Xplore, Ei Compendex and Scopus.
2021 5th International Conference on Communication and Information Systems (ICCIS 2021) will be held in Chongqing, China on October 15-17, 2021. The ICCIS 2021 conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:
1. SUBMISSION METHOD
Authors are invited to submit papers through the Easychair Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. If you have any difficulty about it, please feel free to contact firstname.lastname@example.org.
2. PAPER FORMAT
Papers should be prepared in complete English and carefully checked for correct grammar. Figures should be of high quality. The submitted papers should be no less than 5 pages, otherwise it may be rejected directly.
3. PEER REVIEW
All submissions to the ICCIS 2021 are first reviewed by the organizing committees. At this stage, manuscripts may be rejected without peer review if it is felt that they are not of high enough quality or not relevant to the conference. This fast rejection process means that authors are given a quick decision and do not need to wait for the review process. Manuscripts that are not instantly rejected are sent out for peer review, to 2-3 independent reviewers. Based on the feedback from these reviewers and the organizing committees’ judgment a decision is given on the manuscript.
4. Conference Policies
1. By submitting a paper to ICCIS 2021 conference, authors acknowledge that it has not been previously published or accepted for publication in substantially similar form in any peer-reviewed venue including journal, conference, workshop, or archival forums. Furthermore, no paper substantially similar in content has been or will be submitted to another conference or workshop during the review period. Violation of any of these conditions will lead to rejection.
2. Plagiarism is a regular nuisance in publication. Any plagiarism including self-plagiarism will not be tolerated and lead to rejection.
2018-12-28 Singapore2018 IEEE 3rd International Conference on Communication and Information Systems
2017-11-07 China2017 2nd International Conference on Communication and Information Systems
2016-12-16 Thailand Bangkok, Thailand2016 International Conference on Communication and Information Systems | <urn:uuid:7243c729-4d3e-4108-986b-78572f6702cc> | CC-MAIN-2022-33 | https://www.aconf.org/conf_180861.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00271.warc.gz | en | 0.849543 | 1,509 | 1.632813 | 2 |
Startup FITPASS makes going to the gym economical and convenient for customers
Arushi and Akshay Verma, Co-founders, FITPASS. Prominent gym chains that are part of the FITPASS network include Gold’s Gym, Snap Fitness and Reebok Crossfit.
BMC notice to actor Arjun Kapoor on 'illegal' terrace gym
It issued the first notice in March, & last week it issued another notice to Kapoor...
Gym myth busted: Increase in muscle size not related to strength
According to researchers, size and muscle strength may actually be separate ...
Gym on mind? Discuss your goals with trainers, be careful about safety & cleanliness
The most important point to remember is that any gym is only as good as its trainers are.
Bored of working out at gym? Try swimming to be fit in the best way
Swimming also helps better your lung capacity and is a great form of cardio workout.
L&T Mutual Fund goes one step further with ‘Finance GYM’
L&T Mutual Fund has partnered with ‘The Learning Curve Academy’ for a programme labelled - Finance GYM.
Here's why you should never hit the gym when angry
New research suggests there may be better or worse times to exercise, and that extremes can trigger harm.
No time to hit the gym? Ditch the office chair, take lunch walks to fight fat
Being healthy is more than just making the right food choices, it's also about physical activity.
Not just being lazy: Why obese people can't stick to their gym programmes
If we begin to decipher the physiological causes, it may also help reduce some of the stigma obese people face.
No time to go to the gym? Fitness apps can help you get in shape
Truweight is a weight loss startup that offers a meal tracker app that is watched closely by a personal dietician.
Have you stopped visiting the gym due to winter? It will up your cholesterol storage
It is the lack of vitamin D synthesis from sunlight that causes this problem.
Will students visit gyms and salons before appearing for an exam?
Given the spate of incidents involving mass cheating in Bihar, the officials apparently decided that stripping was easier than searching each candidate for telltale crib sheets.
Talwalkars Better Value Fitness jumps 5% on board approval to demerge, list gym biz
In a filing to BSE, the company said shareholders of Talwalkar Better Value Fitness (TBVF) would get one share of Talwalkar Lifestyles every existing share of TBVF.
After flying with AirAsia, Mittu Chandilya sweats out at gym
If you’re wondering what Mittu Chandilya has been up to since he quit AirAsia three months ago, a clue could come from his battered running shoes.
Eight types of annoying people in the gym
The gym is often inhabited by some painful characters that can make your routine the ultimate test of patience. | <urn:uuid:4e5cebb2-da8d-4711-9411-ebfa6831f945> | CC-MAIN-2017-04 | http://economictimes.indiatimes.com/topic/gym | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00286-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.952234 | 629 | 1.65625 | 2 |
GSK sued Glenmark for Patent Infringement: Case Overview
GSK (GlaxoSmithKline) British drugmaker filed the Lawsuit against Glenmark Pharmaceuticals on infringement of Patent before the Delhi High court. GlaxoSmithKline is the world’s famous pharmaceuticals company same discovers, develops, and manufacture medicines, vaccines, and other consumer health products. The famous and well-known medication products are antidepressants, Paxil and antidiabetic, etc. Pharmaceuticals and consumer healthcare are GSK’s two primary business divisions. This profile focuses on GSK’s medicines segment, which accounts for 85 percent of the company’s revenue. On the other hand, Glenmark pharmaceuticals became a premier integrated research-based global pharmaceutical company; Glenmark was formed in 1977. It has emerging markets in India. Scroll down to check further why GSK Sued Glenmark for Patent Infringement?
GSK sued Glenmark for patent infringement and same filed the Lawsuit against Glenmark before the Delhi high court. The latter’s Valor F drug purportedly infringes GSK’s Indian Patent on vilanterol, an active ingredient. Fluticasone furoate, a corticosteroid, and vilanterol, a long-acting Beta-2 developed by GSK in 2001, are the active ingredients in Glenmark’s medication for treating chronic obstructive pulmonary disease (COPD). In India, GSK was permitted a patent for vilanterol in 2007. In September 2022, the Patent will expire. Valor F is used to treat asthma and other chronic lung illnesses, such as chronic bronchitis, by preventing and reducing symptoms.
Vilanterol is a long-acting beta 2-adrenergic agonist co-developed by GlaxoSmithKline (GSK) and Theravance (now Innovia) for the treatment of chronic obstructive pulmonary diseases (COPD), such as chronic bronchitis and emphysema.
Glenmark will be able to sell its generic pills under a royalty-bearing license from GSK in the third quarter of 2011, or earlier in some instances, according to the provisions of the settlement agreements. Glenmark is said to be the first company to dispute the drug’s Patent. According to guidelines for generic medication sales in the United States, a First to file a marketing application with the US drug regulator Food and Drug Administration will let the challenger sell its generic drug within 180 days of exclusivity in the US market after the Patent expires. On the other hand, Glenmark’s benefits would be limited, given the medicine only produced $56 million in sales in the US market in 2009, according to industry sources. Although, the Federal Trade Commission and the Department of Justice are still reviewing the settlement agreements, according to Glenmark.
We concluded here that since we have discussed why GSK sued Glenmark for Patent Infringement. Also, we have gone through the sole reason behind why GSK sued Glenmark. GSK has approached the High Court for an appropriate quantum of damages under Indian patent law in its complaint filed against Glenmark. The case settled between the parties, although the Federal Trade Commission and the Department of Justice are still reviewing the settlement agreements.
Read our Article:Yashram Lifestyle Files Contempt Plea Against ABFRL in HC | <urn:uuid:3b554a6f-43b7-49b4-860d-117e3c95eb08> | CC-MAIN-2022-33 | https://swaritadvisors.com/blog/gsk-sued-glenmark-for-patent-infringement/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00068.warc.gz | en | 0.926565 | 712 | 1.601563 | 2 |
Welcome to the rebellion.
According to the Huffington Post and NASA’s website (by way of Jonathan Llyr at hardcorenerdity.com) the space agency’s LCROSS (Lunar Crater Observation and Sensing Satellite) project designed to confirm or disprove the presence of water reaches it final stage today. The shepherding spacecraft is now in an elongated orbit, positioned to separate with an Atlas V’S Centaur upper stage rocket, essentially launching it toward the moon’s South Pole at twice the speed of a bullet.
The intent is to kick up a plume of debris the orbiter can fly through to analyze for signs of water. You can watch it live this morning, Oct. 9th, at approximately 4:30 a.m. PDT. NASA has set up a webpage with all the information you need to watch for yourself on a home telescope (just make sure it’s a very good telescope). NASA also has a terrific simulation of the entire mission.
I suppose that's a reasonable explanation.
Or is it?
This could all be the result of building grudge in the space agency against the moon.
After hearing this summer that the original tapes of the historic moon landing were accidentally erased, we are forced to wonder if NASA scientists have been getting razzed by their cosmological buddies, calling into doubt their moon landing achievements now that they cannot produce video proof. Now every night the moon’s face waxes and wanes into a mocking grin.
Perhaps they’ve simply lost patience and want to blast it out of the night sky. At least that's what NASA's new director, D. Vader, hinted at during his first press conference several months ago when he warned the press that "this technological terror NASA has constructed paled compared to the power of the force" and he couldn't wait to "wipe the smirk off the faces of those holier than thou Selentites."
I know for a fact that this is going to end badly. This morning I blacked out for two minutes and seventeen seconds. In that time I flashed forward to our future, skipping like a stone across the pond of time, foreseeing where all this will take us.
This is what I saw...
I also saw visions of high-quality cuts of beef in orbit above the lunar South Pole after the Centaur rocket sliced a leaping cow into bits on its way down to the surface. They were being barbecued up by this guy...
Say good night, moon. | <urn:uuid:38ed9bd2-e826-4b9c-b823-d68224ff76d7> | CC-MAIN-2022-33 | https://rebelalert.blogspot.com/2009/10/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00072.warc.gz | en | 0.949635 | 541 | 1.796875 | 2 |
ACCORDING to a famous quotation often attributed to Mark Twain, everybody complains about the weather but nobody does anything about it. Let's hope that doesn't apply to climate change, because all the talk is now primed to bring about major congressional action.
Last week, the outlines of the American Clean Energy and Security Act (HR 2454) became clear after intense discussions in the House Energy and Commerce Committee. Its chairman, Henry A. Waxman, (D., Calif.) and subcommittee chairman, Rep. Edward J. Markey (D., Mass.), have helped fashion a bill that they hope can pass in the face of Republican opposition.
With competing claims that the legislation will lead to job losses in traditional industries and gains in emerging green endeavors and will both cost Americans money and save them money, it's easy to see why the Waxman committee has struggled for some sort of working consensus.
Stark differences in opinion on the bill's effects partly reflect attitudes to basic questions: Is global warming real and should major steps be taken to alleviate it? For our part, we answer "yes" to those questions but we do recognize that the nation's energy policies can't be changed overnight.
Sure and steady will get the job done. The great strength of the Waxman-Markey bill is that it will set a schedule for moving the nation to clean energy and combating global warming.
The bill uses a cap-and-trade system, which sets a limit on emissions (the cap) and allows polluting industries to buy or sell credits so long as the ceiling isn't breached (the trade). Of course, it would be simpler if each industry were to pay a carbon tax for pollution but politically that's a non-starter.
Whatever the method, the goal is still curbing emissions of carbon dioxide, methane, and other greenhouse gases. As originally conceived, the bill would have cut emissions from 2005 levels by 20 percent in 2020 and roughly 83 percent by 2050. That first target has come down a bit in the latest version, to 17 percent by 2020, although the half-century goal is still in place.
That sort of compromise has led Greenpeace to say that it can't support the latest version of the bill because it doesn't go far enough in curbing emissions.
This bill isn't perfect and could be stronger. For all the argument over details, however, Congress is poised to do something historic about climate change.
Guidelines: Please keep your comments smart and civil. Don't attack other readers personally, and keep your language decent. Comments that violate these standards, or our privacy statement or visitor's agreement, are subject to being removed and commenters are subject to being banned. To post comments, you must be a registered user on toledoblade.com. To find out more, please visit the FAQ. | <urn:uuid:2544c665-6901-463f-bdd2-bfa7560f3b3b> | CC-MAIN-2017-04 | http://www.toledoblade.com/Editorials/2009/05/20/Climate-for-change.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00016-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.95921 | 574 | 2.40625 | 2 |
The European Union and China presented sweeping plans to limit greenhouse-gas emissions that will increase costs for industry and consumers, but they drew criticism from environmentalists as not going far enough to slow climate change.
The moves, while both long discussed and still months or years from full implementation, show a new urgency to regulate emissions in two of the world’s biggest economies. They come as the Biden administration promises its own bold initiatives but faces big obstacles in Congress.
Beijing and Brussels are also acting ahead of the world’s next climate-change conference, scheduled for November in Glasgow, Scotland, where the world’s biggest powers hope to hammer out new initiatives to limit emissions.
The EU on Wednesday proposed a broad economic overhaul that would sharply cut the bloc’s reliance on fossil fuels and place first-of-its kind levies on imports from high-emitting countries.
The import tax plan, which has been in the works for months, has already drawn condemnation from the bloc’s trading partners in the developing world and given an additional push to companies to scrutinize emissions throughout global supply chains.
‘Our current fossil-fuel economy has reached its limit.’
The package of legislation, drafted by the European Commission, the EU’s executive arm, ranks among the most ambitious plans yet by a major economic power to cut emissions of carbon dioxide and other gases such as methane that scientists say are causing the earth to warm. It calls for a massive shift by companies and households to cleaner technologies such as wind turbines, solar power and electric vehicles—including a requirement for the share of renewable sources in Europe’s energy mix to rise to 40% in 2030 from 20% currently. The plan aims to limit pollution across the European economy, including electricity generation, automobiles, housing, shipping and agriculture.
“Our current fossil-fuel economy has reached its limit,” said European Commission President
Ursula von der Leyen.
“We know that we have to move to a new model.”
China plans this week to launch an emissions-trading system focused only on its own companies, establishing the world’s largest carbon market and doubling the share of global emissions covered under such programs. Emissions-trading systems put a price on the greenhouse gases generated by industry, increasing the cost of products with the intent of promoting efficiency and cutting emissions.
China’s plan will help it achieve its goal of reaching peak emissions before 2030 and carbon neutrality, or net zero emissions, by 2060, officials said at a news conference Wednesday. China is the world’s largest carbon emitter.
Invitations for launch ceremonies set for Friday were sent out, according to people familiar with the situation.
The trading program will initially involve 2,225 companies in the power sector. Those companies are responsible for a seventh of global carbon emissions from fossil-fuel combustion, according to calculations by the International Energy Agency.
China’s officials have signaled that they plan to add the cement, aluminum and steel sectors to the trading system next year. The program is expected to adopt stricter caps in the future, although the timing and scope haven’t been determined, say people familiar with the situation.
Over the next three to five years, the market is set to expand to seven more high-emissions industries in China: petrochemicals, chemicals, building materials, iron and steel, nonferrous metals, paper and domestic aviation.
Emissions trading is one part of the EU’s broader plan. Its outlines enjoy strong support in EU capitals, but the details will be fiercely debated in the coming months by national governments and the European Parliament, which must approve the plan before it can become law. Negotiators will work to bridge differences across the EU, from wealthier countries like France—which has relatively low emissions because of its reliance on nuclear power—to poorer Eastern European nations such as Poland, a major user of coal-fired electricity.
Policy makers are also wary of sapping public support for the fight against emissions by saddling households with a big increase in their energy bills. In France, a plan to raise a tax on the carbon content of fuel drew outrage from drivers and gave birth to the antiestablishment yellow-vest protest movement.
The commission’s plan, dubbed the European Green Deal, aims to achieve the bloc’s most recent commitment under the Paris Climate Agreement, the 2015 accord that calls for countries to limit global warming to close to 1.5 degrees Celsius above preindustrial levels. The EU has already passed a law requiring it to cut greenhouse-gas emissions 55% by 2030 compared with 1990, and achieve zero net greenhouse-gas emissions by 2050.
European environmental groups said that while the ambition of the EU plans is unprecedented, it still won’t be enough to meet the global-warming targets of the Paris climate accord and avert some of the dire consequences of climate change such as drought and rising sea levels. The groups say the EU should aim to cut emissions 65% by 2030.
“This is a major crisis, so 55% for us is just not enough,” said Patrick ten Brink, deputy secretary general of the European Environment Bureau, an umbrella group of the region’s environment activists.
President Biden in April set targets for increasing renewable energy in the U.S., including 100% carbon-free electricity generation by 2035. But a national renewable energy standard sought by his administration was dropped from an infrastructure bill during negotiations with Republicans, raising questions about how some of the targets will be achieved.
The push for emissions reductions comes as scientists say the effects of climate change are becoming more evident and disruptive, from a scorching heat wave in the Western U.S. to record high temperatures in the Arctic.
The EU’s proposals aim to sharply accelerate the bloc’s timetable for cutting carbon emissions from power plants and other industrial facilities. Pollution would have to fall by 61% by 2030 from 2005 levels, more ambitious than the bloc’s current target of a 43% cut. The proposed measures also aim to raise the price of allowances in the EU’s emissions market to at least €60 a metric ton of carbon dioxide, equivalent to $71.
Traders have bid up the price of EU allowances this year to more than €50 a metric ton in anticipation of the tighter limits.
The EU plan would impose a border tax on imports, an idea that has already sent shudders through global supply chains and drawn condemnation from developing countries. The proposal is intended to prevent what is called carbon leakage, in which manufacturers avoid tougher limits by shifting production to countries that regulate carbon-dioxide emissions less strictly, or not at all. Trading partners that have set their own price on carbon would be allowed to deduct those costs from the carbon bill on their goods at EU borders.
“Countries that have ambitious programs with respect to climate change have a very legitimate interest in ensuring that they address carbon leakage,” U.S. Treasury Secretary
said Tuesday during meetings with EU officials in Brussels. Ms. Yellen said countries such as the U.S. that are regulating carbon-dioxide emissions using different methods than the EU should still get credit under the EU system.
The tax, called a carbon border-adjustment mechanism, would establish a new agency to monitor the carbon content of imported goods. Companies importing covered products would need to register with the EU agency and hire companies to audit the greenhouse-gas emissions of their suppliers. The proposal has unsettled some U.S. officials, even as the Biden administration is considering the proposal for the U.S.
“I don’t disagree in principle that it has value, but I think that it’s got enormous complexity,” Jonathan Pershing, an adviser to U.S. climate envoy John Kerry, said in May.
The rules would apply initially to imports of steel, fertilizer, cement and unfinished aluminum and then extend to other products. Importers would have to begin monitoring and reporting the carbon content of covered imports in 2023 and begin paying in 2026, using the same price per metric ton of carbon dioxide as the EU’s emissions allowance market. That timetable and the fact that the U.S. isn’t a major exporter to the EU of the four covered products means U.S. companies wouldn’t feel much of an impact at first.
Some companies outside Europe were already shifting their operations ahead of the EU’s carbon tax proposal. Russian aluminum maker Rusal PLC, the world’s largest outside China, said in May that it would turn its high-carbon assets into a separate company so that it can focus on low-carbon aluminum using cleaner energy sources such as hydropower.
European companies in industries including cars, metals, aviation and energy largely applauded the EU announcement but said it must be applied fairly across industries and between domestic and foreign producers. EU rules have already forced many companies to cut emissions and they don’t want to face a greater disadvantage internationally on cost.
Corrections & Amplifications
The EU has pledged to cut greenhouse gas emissions 55% by 2030 compared with 1990. A previous version of this article incorrectly said the 55% reduction was compared with the EU’s emissions in 2005. (Corrected on July 14)
Copyright ©2021 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8 | <urn:uuid:4016390c-9f01-48ea-b413-0d998b16a04a> | CC-MAIN-2022-33 | https://green-reporter.com/eu-china-unveil-sweeping-plans-to-cut-greenhouse-gas-emissions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00468.warc.gz | en | 0.948574 | 1,974 | 2.765625 | 3 |
The cost of inflation is affecting many families in Kingston, and now a local school lunch program provides healthy meals to students throughout the summer.
With the end of the school year, the Food Sharing Project warehouse was generally quiet.
But this summer, volunteers will be working outdoors, says general manager Andy Mills, as he packs boxes full of groceries.
“We will provide food boxes, healthy and nutritious food to families in need.”
The organization provides free school meals to elementary and high school students in the Kingston area.
Mills says with the rising cost of food and inflation, those same children still need help, so the program has been extended.
“Some families struggle to juggle things, especially with utilities and fuel for their car to get to work,” he says, “and the cost of food.”
The boxes are filled with things like bread, fresh fruits and vegetables, and cereal. They are delivered every two weeks to over 450 families in Kingston.
The summer program started as a way to help students at home at the start of the pandemic, Mills says, but three years later, and with skyrocketing costs for parents, demand has remained steady. .
Macy Briand, a fourth-year summer student at Queen’s University with the Food Sharing Project, says it’s all about helping pack the boxes to help bridge the one-year gap at school. ‘other.
“I was really shocked by the number of families who needed help,” she said. “It certainly educated me, generally speaking, about Kingston’s widespread need for nutrition and food aid. In the summer, the students aren’t even in school, so they don’t get the resources they get there.
The organization says their own food and supply costs have increased by almost 20% in some cases. Mills says he relies on cash donations to provide the service.
“We will have this year, we will help people and we will also look to next year,” he said. | <urn:uuid:0c3d6e9d-149e-4447-85ba-5dc961273e48> | CC-MAIN-2022-33 | https://duchetridao.com/kingston-news-school-lunch-program-continues-through-summer/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00268.warc.gz | en | 0.971669 | 429 | 2.375 | 2 |
Theorem 2.14: (The second Pasch property) Let A, B, and C be three noncolinear points. If a line crosses the line segment AB, then the line will either intersect line segment AC, segment BC, or go through point C.
Proof: Let D be the point where the line crosses line segment AB. We can conclude from Theorem 2.1 that there are points on the line segment between A and B, which are on either side of the point D. By Theorem 2.5, then, there are points on that line segment which are on either sides of the line determined by A and B. Let E be a point on the same side of the line determined by AB as C.
Consider the line determined by CD. Since C is, by hypotheses, not on the line determined by AB, we conclude that CD crosses AB at D. As a result, by Theorem 2.5, A is on one side of the line determined by CD, and B is on the other side.
If we substitute the coordinates of E into the equation for the line determined by CD, the trichotomy law for real numbers states that there are three cases.
Case 1: E is on CD. Then the line determined by CD and the line determined by DE both contain the distinct points D and E, so by Theorem 1.4, they are the same line, and the line determined by DE contains the point C.
Case 2: E is on the same side of CD as A. We also have that E is on the same side of AD as C, because E is supposed to be on the same side of AB as C, and AD has the same equation as AB, so E is on the same side of AD as C. The hypotheses of Theorem 2.13 are satisfied, so we can conclude that DE crosses the line segment between A and C.
Case 3: E is on the same side of CD as B. This case is the same as Case 2 if we simply switch A's and B's, and the conclusion is that DE crosses the line segment between B and C. | <urn:uuid:63874a50-39d8-43b9-902e-e500fc64563f> | CC-MAIN-2017-04 | http://www.sonoma.edu/users/w/wilsonst/Papers/Geometry/parametric/T10-16/T1-2-14.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00192-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967692 | 443 | 3.625 | 4 |
Solar PV is a great way to reduce energy and cut your carbon footprint.It's also a good financial investment and can generate a good return, much higher than you would receive from a savings account.
Benefits of solar PV
- Cut your electricity bills - Once your system is fitted you will immediately start saving by using free electricity generated.
- Get paid for every unit generated through the governments FIT scheme, even if you use all generated electricity.
- Sell any surplus electricity back to the grid.Currently 4.5p per unit.
- 20 years tax free index linked return
- Cut your carbon Footprint.
- Low maintenance
- Increases property value
A solar PV system needs very little maintenance and should stay relatively clean if installed at 15 degrees or more.
Dust, debris and bird droppings may need to be re moved from time to time after long periods of dry weather which would
be removed with warm water. We also offer an annual cleaning and operational checking service.Please contact for details. | <urn:uuid:d3825754-ef86-41c2-a8c3-048673048d1e> | CC-MAIN-2022-33 | https://www.genr8renewableenergy.co.uk/solar-pv | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00471.warc.gz | en | 0.91013 | 214 | 2.171875 | 2 |
Originally published in Arthur No. 17 (July, 2005)
Illustration by Arik Roper
“Here and Now” column by Daniel Pinchbeck
“No More Oil, No More Bullshit”
The recent appearance of a sizable excerpt from James Kunstler’s new book in the glossy pages of Rolling Stone may well represent the beginning of a cultural sea change. It is not that the argument presented in The Long Emergency: Surviving the End of the Oil Age, Climate Change, and Other Converging Catastrophes of the Twenty-first Century is particularly new—in fact, the bulk of it was offered by Thom Hartmann’s The Last Hours of Ancient Sunlight (1999), as well as World Watch editor Ed Ayre’s God’s Last Offer (1999), among others. The significance is that the mainstream finally finds itself compelled to pay attention to it. What these authors have been telling us is stark and simple: Our current form of mass post-industrial civilization based on fossil fuel consumption and over-use of natural resources is about to end. There is no way to prevent a collapse that may be more or less sudden, and more or less cataclysmic. All we can do is decide what to do in the time that remains to prepare for it.
The reason for this radical and imminent shift is the exhaustion of cheap fuel, causing a continual and irreversible rise in energy prices. In Hubbert’s Peak, Kenneth Duffeyes, a former geologist for the oil corporations, made a convincing argument that we are passing the point of “peak oil,” and the oil that remains underground is exponentially more difficult and expensive to extract. As Kunstler—and Hartmann, and others—report, there is no real replacement for fossil fuels in running our current sprawling, suburbs-based, energy-wasting civilization. The end of cheap oil (accompanied by the almost more worrisome depletion of clean water reserves the world over, as well as the various side effects of accelerated global warming) will cause extraordinarily far-reaching changes in the way life will be lived by all of us, in the near future.
In The Long Emergency, Kunstler takes a hard-nosed look at the consequences of our profligate ways in the last decades. “Suburbia will come to be regarded as the greatest misallocation of resources in the history of the world. It has a tragic destiny. The psychology of previous investment suggests that we will defend our drive-in utopia long after it has become a terrible liability.” He offers a cogent regional analysis of what America may become in an energy-scarce future, in which social inequity increases, paramilitary activity escalates, and desperate urban ghettos riot at a level exceeding all previous phases of unrest. As sea levels rise by several feet in this century, low-lying cities such as New Orleans may disappear underwater. At the same time, water-scarce regions like the Southwest—and cities such as Phoenix and Las Vegas—should become essentially uninhabitable. Along with forced mass-migrations out of unsupportable areas, Kunstler foresees the “end of industrial growth, falling standards of living, economic desperation, declining food production, and domestic political strife,” as well as a probable increase in terrorism.
And yet, as severe as Kunstler’s diagnosis is, his prognosis is not all bad. The massive changes caused by our energy emergency will force community building, re-localization of industry and an ethical revaluing of life, as well as a careful attention to all living processes. The passive consumer-trance of our current age will no longer be possible, as people who want to survive in this new world will have to be fully participatory as well as fluidly adjustable to continual changes in social structure and environment. In the end, Kunstler’s perspective is similar to Hartmann’s, who foresees, in the collapse of the steroid-pumped values of the current dominator culture, a return to the consilient and collaborative life-patterns of indigenous tribal societies. Prolonged, long-distance war such as the current Iraq conflict will, also, soon be a thing of the past: “A point will be reached when the great powers no longer have the means to project their power at a distance,” Kunstler notes. All of our institutions—from schools to government—will have to be reconfigured, downscaled and re-localized to mesh with our new realities. “Social responsibility to the community will be hard to evade,” he writes. “The pervasive and corrosive idea of just being another wage-earning ‘unit’ in a consumer society will be dead.”
Although Kunstler considers this approaching crisis to be a “long emergency,” reaching full-blown form by the middle of the 21st century, there is another possibility. According to this vision, the long emergency may actually turn out to be a short emergency of a year or two, followed by a movement into a vastly different—and far superior—way of thought and action for humanity as a whole. By this alternative perspective, humanity is currently going through an accelerated evolution in consciousness that will culminate in the creation of new social systems and new spiritual possibilities. My own thinking on this subject led me to the study of the outsider hypothesis that considers the Mayan Calendar to be a model of the evolution of consciousness, culminating in the establishment of a harmonic and compassion-based global civilization before the end-date of the Mayan Calendar on December 21, 2012. An excellent video presentation of this point of view, by the artist Ian Lungold, is available at http://www.mayanmajix.com; Carl Johan Calleman’s book The Mayan Calendar and the Transformation of Consciousness is another useful tool for exploring this radical vision. According to their meticulous study of the fractal model of time apparently presented by the Classical Mayans, Lungold and Calleman propose the year 2008 as the point of collapse for the current socioeconomic paradigm, to be superseded by a new form of consciousness and a unified planetary culture in the following years.
A “new form of consciousness” may sound like a specious concept, but it is one that many philosophers and visionaries have proposed, and tried to define, from Ken Wilber to Sri Aurobindo, Carl Jung to Jean Gebser. My perspective is that, as part of this 2012 transition, we are witnessing an integration of the modern rational mindset with the archaic shamanic or esoteric worldview—many people I know seem to be paying closer and closer attention to synchronicities and psychic events that appear in their lives, not in a naive or fuzzily “New Age” way but in a very sophisticated and careful manner. Such a shift is almost impossible to quantify—though the Global Consciousness Project at Princeton University is giving it a good shot, placing random number generators in cities around the Earth and noting significant statistical deviation from normal patterns of randomness after—and even hours before—major world events such as 9/11 or the massive tsunami.
The subjective, psychic, or shamanic aspect of being is only barely alluded to in Kunstler’s analysis of a potentially spooky, Road Warrior-like future (he does propose religion will become more essential to many people, with the melting-down of our current support systems), but it is one that needs to be considered. Dean Radin, Director of the Consciousness Research Laboratory at the University of Nevada, has compiled and analyzed the statistical evidence for “psi” phenomena, presenting the data in his book, The Conscious Universe: The Scientific Truth of Psychic Phenomena (1997). According to his meticulous study, thousands of experiments in telepathy, precognition, and clairvoyance have fulfilled the scientific requirements of verifiability and repeatability, indicating that these phenomena do, in fact, exist, and can be measured. In our current understanding of psychic phenomena, we may be in a similar place as the West was in the 1750s in regards to electricity—the scientists of that time had noticed lightning and static shocks, but had no conception of how to convert this energy into a transformative force for their world. It may be that the transfer to a harmonic world will be accompanied by global psychic experiments focused on planetary healing.
Rather than thinking of a retraction or destruction of human possibilities in an approaching economic collapse, it might be that such an episode would be bracing as well as clarifying, leading to a sudden switch-over of the elites who run our crudely globalized and inequitable world-system. It is worth considering previous epochs of revolutionary change, such as the French Revolution. Before the French Revolution, the Enlightenment philosophers, pamphleteers, and cafe intellectuals of the ancien regime had little clue that they might end up the vanguard of a new social order. Revolutionary moments are mythological and archetypal situations—and we may be closer to such an episode than most of us currently dare to imagine. After all, before 1989, how many people managed to predict or even imagine the sudden and astonishingly peaceful fall of the Berlin Wall? Would the collapse of Wall Street—symbolizing a system of abstract monetary value that is a bit like a parasitical artificial life form feeding on the natural capital of the planet—be any more surprising?
If this alternative hypothesis is correct, the time between now and the approaching change-over represents our singular opportunity to develop alternative paradigms and basic support systems—of food production, alternative energy, new currencies, and so on —that could be applied on increasingly large scales as the mainstream socioeconomic system continues its inevitable entropic decline. The macroscopic utopianism of someone like Buckminster Fuller—who believed humans were fated to succeed on the Earth, designing societies of abundance rather than scarcity—may deserve more of our current attention than the dystopian visions that have become so prevalent, and so popular. At the same time, the pursuit of spirituality may come to seem increasingly less fuzzy and more pragmatically necessary and straightforward. When Yogi Bhaijan —the master of kundalini yoga who died last year—was asked by his disciples to define the true meaning of the long-awaited “Age of Aquarius,” he replied bluntly: “No more bullshit.” His answer may be a mantra for our time. | <urn:uuid:d1fd5529-70ad-48ec-9dfc-dad445a4d73d> | CC-MAIN-2017-04 | https://arthurmag.com/tag/daniel-pinchbeck/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00332-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.94216 | 2,185 | 1.9375 | 2 |
Inter-Caste Marriages in Nepal Face Violence and Intimidation, February 12, 2009
News Bulletin 175
February 12, 2009
Inter-Caste Marriages in Nepal Face Violence and Intimidation
February 12, 2009, Kathmandu, Nepal: A shocking new report from the Jagaran Media Center (JMC) in Nepal finds that Nepalis who marry outside their caste risk social exclusion and even violence, particularly from their own families. This severely reinforces the caste system in Nepal, and impedes social mobility.
The finding is based on an investigation by six Dalit reporters, who interviewed around 200 married couples in six districts of Nepal late in 2008. Their reports have been edited by the JMC in Nepal and posted online by The Advocacy Project (AP) in Washington.
Inter-caste marriage is the first issue to be featured by JMC as part of a new project. Starting this month, JMC reporters throughout Nepal will investigate a practice which contributes towards caste discrimination. Every three months, their information will be distributed by e-bulletin and by radio in Nepal and abroad, and used by JMC and its allies to lobby for change. Future issues will report on such issues as forced labor, water, education, political participation and Dalit culture.
Dalit make up 22 percent of the population in Nepal. But so few marry across caste lines that only 20 inter-caste married couples were identified in Doti province. According to JMC, mixed marriages face four types of abuse:
- Harassment: Inter-caste couples face such harassment that they often end up living in seclusion from friends and neighbors. Read about Kamala Wali.
- Forced separation: Parents of non-Dalit often intervene to prevent inter-caste relationships. Some go as far as to forcibly separate their child from a Dalit partner. Read about Ganesh Nepali and Tuli Khadka.
- Displacement: Inter-caste couples are forced to leave their village and even flee the country, to escape from parents and family. Read about Asha Shrestha and Mithun Bagchand.
- Institutional discrimination: Inter-caste couples and their children face severe discrimination from authorities and officials. They are regularly denied citizenship, without which they are unable to vote and move to another village. Also, their children cannot obtain education. Read about the Baglung district.
In spite of the general hostility towards mixed marriages, some local government officials actively try to prevent discrimination. In Morang District, Madan Acharya, a District Administrator Officer, said that the administration is ready to help couples who request a court marriage. So far, his district has provided fifteen couples with 5,000 Nepalis ($65) to help them start a new life and pursue higher education. The police in Morang are also ready to punish officers found guilty of discrimination. Such support is available throughout Nepal, but very few couples know of it.
JMC will now use the information from its reporters to lobby for change in Nepal and with allies abroad. Working with local Dalit advocacy groups in the districts, JMC will help inter-caste couples to understand their rights and report abuses to local officials. Couples that brave intimidation, or families that provide support to mixed marriages, will be encouraged with letters from abroad and profiled in the local media.
In Kathmandu, JMC will contact Dalit MPs in the Constituent Assembly and press for caste discrimination to be declared a crime against humanity in the new Constitution, which is currently being drafted. JMC will also urge Dalit MPs to follow up in their constituencies. JMC hopes to bring at least one test case before the Nepali courts in 2009.
JMC is asking advocates in North America and Europe to distribute this e-bulletin widely, and send letters of support to married couples in Nepal and local officials who make inter-caste marriage possible. | <urn:uuid:e9d49ab2-e434-492c-8ab0-b8ee6ee31892> | CC-MAIN-2017-04 | https://intercaste.wordpress.com/facts-figures/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00077-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953139 | 811 | 2.03125 | 2 |
I making a 2d top-down shooter game and i'm currently in the process of creating weapons.
When a soldier fires a projectile, i find the unit vector between the soldiers center and mouse position ( the target )
and use that as a basis for the velocity vector for the projectile which works fine!
But i've run into problems creating a shotgun, which is supposed to spray bullets.
What i want to do here is spread 5 bullets out evenly in a 25 degree angle centered around the target vector.
My vector math is a few too many years behind me but from what i've been able to find online, the formula i need and have been using is:
xVel = xVel * (float)cos(addingAngle) - yVel * (float)sin(addingAngle); yVel = yVel * (float)sin(addingAngle) + yVel * (float)cos(addingAngle);Where xVel and yVel is the coordinates of the unit vector i found between shooter and target. addingAngle is the angle im trying to add ( or substract by being negative).
This is however, giving me some wierd results with bullets flying in irregulair angles.
I'm probably mixing up radians and degrees, but that doesnt explain why my bullets appear to be choosing such apparently random angles (however conistent)
So can anyone point me in the right direction?
I'm going to have to read up on vectors eventually, but i'd rather wait until i have more time on my hands. | <urn:uuid:69e28a06-95f7-4733-a203-b54eb1a4c7b6> | CC-MAIN-2017-04 | https://www.gamedev.net/topic/626128-rotating-vector-need-help/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00574-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.936931 | 325 | 2.203125 | 2 |
An Internet search turns up an astounding number of pages about radiation from Japan's Fukushima Daiichi nuclear power plant meltdown that followed an earthquake and tsunami in March 2011. But it's difficult to find credible information. With the lack of data from government, the Woods Hole Oceanographic Institution is asking the public for help.
HALIFAX - Several East Coast fish stocks that collapsed in the early 1990s are showing the first signs of recovery, according to new research that suggests whole ecosystems can rebound.
Scientists at the Bedford Institute of Oceanography, a federal government research centre in Halifax, released a study Wednesday that says cod, haddock and other once dominant groundfish stocks are making a comeback on the eastern Scotian Shelf. | <urn:uuid:0ca7a602-4c22-4c80-a46e-396906f5867e> | CC-MAIN-2017-04 | http://www.huffingtonpost.ca/news/fish-stocks/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00188-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.918478 | 147 | 2.21875 | 2 |
about iwrm project
Mano River Union Ecosystem Conservation and International Water Resource Management Project
The IWRM project targets the conservation and sustainable use of the transboundary water basins and their
biodiversity resources within the Mano River Union member states. It is being implemented in the Upper Guinea forest covering Sierra Leone, Guinea, Liberia and Cote d’Ivoire. | <urn:uuid:ab1dbd70-1627-470d-81ca-d1ed5733ba29> | CC-MAIN-2022-33 | https://iwrm.fda.gov.lr/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00265.warc.gz | en | 0.769847 | 99 | 1.929688 | 2 |
Which are the typical emotions skilled?
The so called “normative” psychological a reaction to partnership control is dependent on regardless if you are performing the separating, or, your partner is actually breaking up along with you.
We usually best think about partnership breakup as a feasible option if:
our very own mate is regularly perhaps not meeting our very own requires
we experience a connection betrayal to the level rely on are not restored
stressors, challenges, and social disapproval outside of the commitment are very persistent and rigorous the connection reduces to the level it can’t end up being revived.
The individual starting the breaking up will frequently enjoy comfort, blended with ideas of shame (due to the damage they’re inflicting on their mate), anxieties (over how break up are got) and despair (especially should they have appreciation and affection for mate).
The individual whoever lover is breaking up with these people, the feelings practiced frequently associate with the three steps of loss group go through.
In the first level, one protests the separation and attempts to re-establish closeness along with their mate. Contained in this state, the dominating emotion experienced is regarded as rage, but the danger of control brings about distress thoughts instance anxiety. These feelings of “separation protest” can be therefore stronger that any particular one works tough to reunite with regards to companion.
But if the relationship is really at an https://hookupdate.net/escort-index/stamford/ end, next participating in this type of actions best makes it more challenging (and much longer) to recuperate through the relationship control. These strong ideas that sit behind split protest include why, even in harmful relationships, one may decide to reunite making use of their companion.
In the 2nd phase, you pertains to the realisation that fixing your relationship isn’t feasible, and thus, emotions of despair take over alongside thinking of lethargy and hopelessness.
During the 3rd step, someone involves words with, and takes, losing. Hard work will then be devoted to various other existence work and aim (that may include searching for a brand new mate).
A question usually questioned about relationship breakups was “how long can I feel this?”
The ability of partnership control is actually a rather specific experiences, and there’s great variability in how much time it will take for individuals to recover from loss.
People’s situations may complicate healing. a partnership that finished (on close or poor terms), but nonetheless requires seeing one’s previous lover (say, simply because they work at exactly the same organisation or show custody of the kids) increases the process of data recovery, and make it tougher. The reason being seeing one’s lover may reactivate thoughts of damage, frustration or depression, especially if someone didn’t need the connection to end.
If you’re perhaps not functioning on a daily basis you should find support. davidcohen unsplash , CC BY
We additionally learn areas of people’s characteristics can impact to their capacity to endure reduction. Those who enjoy insecurity about by themselves as well as their connections think it is much harder to deal with and cure thinking of frustration and depression than people that believe safe within on their own as well as their connections.
Overall, folk will sort out the different stages of loss to reach the recovery level from anywhere between 30 days to half a year following connection is finished.
Dealing with relationship control
Those who endure union reduction tend not to prevent the emotions these are generally experiencing. Which, they try not to control or ignore her feelings, plus in doing so, they provide on their own the opportunity to plan their own feelings and also to make sense of those. Some studies have recommended currently talking about the loss, like journalling, will help with data recovery from commitment loss.
Having said that, brooding over these emotions, maybe not recognizing the relationship reduction, and talking about the separation with others who only increase thoughts of despair and frustration by reinforcing these adverse attitude or additional highlighting all you need missing, aren’t specifically constructive methods of working with the breakup. | <urn:uuid:ed239dd8-3889-49aa-a968-8202de766c28> | CC-MAIN-2022-33 | http://kevinoneal.de/separating-with-a-long-lasting-enchanting-mate-is | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00473.warc.gz | en | 0.95529 | 859 | 1.835938 | 2 |
You might be surprised how anyone who gets on your PC can easily access your credit card details, activity history (including visited websites, viewed videos, and online transactions), passwords, and other data you’d rather keep private.
We recommend removing all traces of your sensitive information, which are stored in various locations on your computer. It is wise to do this on a regular basis (daily or weekly, depending on how heavily you use your PC).
The Protect tab in Auslogics BoostSpeed 12 helps you discover all avenues through which your privacy may be compromised. A comprehensive scan identifies traces of your private data in web browsers, applications and system files. The tool then runs cleanup to prevent your personal information from falling into the wrong hands.
On the left side of the tab, you will find four areas that can be scanned for privacy traces:
Check the ‘Include category’ box next to each option and then click the ‘Scan now’ button.
When the scan is complete, click the ‘Check details’ link on each option to review the information that was found. Unmark the checkbox for any item you wouldn’t want to delete to exclude it from the cleanup. When done, click the ‘Resolve all items’ button.
For your convenience, BoostSpeed Pro lets you schedule automated scans to ensure that you stay protected at all times. Click the clock icon in the bottom-right corner of the program window. In the window that opens, select ‘Protect’ under ‘Scheduler’ on the left-side pane and check the ‘Enable automatic maintenance’ box.
You can then choose how often you want to run an automated scan and also set a time for it. Click OK when you’re done.
On the right side of the Protect tab, you’ll see links to some useful tools (Windows 10 Protector, Free Space Wiper, and File Shredder) that provide even more options to safeguard your confidential files and shield your private information. Click on each one to find out what they do and activate them.
Now, flip the toggle to enable Browser Protection. It secures your browser against unauthorized changes and protects your data every time you surf the web.
Click the gear icon beside the header to set up the tool. Doing so opens a new tab where you can select a default browser and enable the following options:
Browser Protection also lets you check for updates for your default browser.
Another good tweak that may boost your web browser is Windows registry cleanup. But please keep in mind that cleaning the registry manually can put your PC at risk, so use Registry Cleaner to make this process safe and easy.
Windows users around the world are enjoying a faster and smoother PC experience
thanks to their computers being optimized with BoostSpeed.
Auslogics software is recognized by leading IT magazines and online resources
See the difference between Free and Pro
Diagnostics & essential PC optimization
$50.96 (reg. $59.95)
1 year / 3 PC license
|50+ mlp downloads around the globe|
|Execellent 4.9-star rating on Trustpilot||Check out our 324 reviews| | <urn:uuid:f3cf6017-d557-4355-ac61-097012940c33> | CC-MAIN-2022-33 | https://www.auslogics.com/pt/software/boost-speed/protect/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00670.warc.gz | en | 0.874437 | 675 | 1.664063 | 2 |
WHEN: Tuesday, June 28, 9:00-11:00 AM
WHERE: 6th Floor Board Room, Woodrow Wilson Center
On June 29, President Obama, President Peña Nieto, and Prime Minister Trudeau will meet in Ottawa for the 2016 North American Leaders Summit (NALS). North America is already the largest trading bloc in the world, with a GDP of over 20 trillion dollars and more than a trillion dollars of annual trade. The Leaders Summit will set the stage for future North American cooperation across a wide range of areas, including economic competitiveness, regional security, energy and climate change. It also represents an important opportunity for the leaders to clearly articulate the benefits of enhanced regional cooperation to a public that is increasingly focused on understanding the benefits and costs of global engagement.
The Mexico and Canada Institutes of the Woodrow Wilson Center are pleased to invite you to a discussion on North American cooperation ahead of the North American Leaders Summit. | <urn:uuid:80e24956-09e5-491e-b1cb-2917981f65cd> | CC-MAIN-2017-04 | https://mexicoinstitute.wordpress.com/2016/06/22/upcoming-event-ideas-for-a-stronger-north-america-ahead-of-the-north-american-leaders-summit/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00574-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.93326 | 189 | 1.828125 | 2 |
The Dreidel (Yiddish) or Sevivon (Hebrew), is a four-sided spinning top, with a Hebrew letter inscribed on each side. Assembling the letters you can have the sentence "A great miracle happened there" as well as "A great miracle happened here", referring to the miracle of the oil that took place in the Beit Hamikdash.The small spinning top
in the pen's cap
another Delta collection:
in limited edition.
Some say the Dreidel game is played to commemorate a game devised by the Jews to camouflage the studying of the Torah, which was outlawed by the Greeks and the Romans.
Delta made two different models for celebrating this tradition:
Dreidel is made in hand turmed special resin. Pink, white and blue are pearly marmorized colors; black is glossy plain color.
The central ring is in sterling silver, decored on relief with Delta's classic designs.
Note: there are two models of Dreidel. One is only cartridge filled, the other one (this one we sell) features both cartridges and converter. | <urn:uuid:7a7da728-d891-4f6f-b3cb-61801067ecba> | CC-MAIN-2017-04 | http://www.giardino.it/pens/delta/dreidel.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00464-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.894959 | 227 | 1.8125 | 2 |
Minimum Tank Size: 70 gallons
Care Level: Moderate
Reef Compatible: With Caution
Water Conditions: 72-78° F, dKH 8-12, pH 8.1-8.4, sg 1.020-1.025
Max. Size: 4"
Color Form: Blue, Red
In captivity these dwarf angels are moderately hardy. They do need to be maintained in better water quality than what's required for most saltwater fish, so are suggested for an intermediate aquarist. But they are great little angelfish that are not too picky about what they eat and are great foragers. Their natural diet consists mostly of algae and detritus, which keeps them very active moving around picking at the substrate and the rockwork. They can handle some neglect and they will even breed in captivity. They can be kept in a mature tank over 30 gallons it they are the only fish, but do best with 55 gallons or more. The best environment is one with live rock that can help supply them with plenty of natural algal foods, and positioned to create lots of hiding places.
They do best in a fish only saltwater aquarium as they can become a nuisance in reefs. It is possible to keep them in a reef tank with leather corals and some of the more noxious soft corals, since most don't harm these. But you must keep an eye out for problems as they can turn destructive. They are less suitable to other types of reef tanks as they are harder on corals than other types of angelfish. They may nip at stony coral polyps, sponges, clam mantles, tiny snails, and other invertebrates.
These angelfish are generally not overly aggressive with their tankmates. Like most angelfish, they get along with tankmates best when they are the only type of dwarf angelfish in the aquarium. However it can be housed with other species of dwarfs as long as they are all added at the same time. Be careful to only combine angelfish with very distinct color variations.
When choosing a Rusty Dwarf Angelfish, look for a specimen that is alert and picking at rocks. Its body should be filled out, have no fin or body damage, and it should be brightly colored. A healthy specimen will also show an initial curiosity about who is approaching its tank, then quickly dart into hiding. All Rusty Angelfish are born female. They can be paired according to size by buying one large and one small Rusty Angelfish. Within a few months, they will assume their roles as male and female. Offer plenty of hiding spaces within the rock. In general, dwarf angelfish may spawn in captivity under the right circumstances. | <urn:uuid:91db059f-dba8-4007-a8f8-29354e47fb78> | CC-MAIN-2017-04 | http://yourfishstore.com/products/rusty-angel-centropyge-ferrugatus | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00501-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960628 | 562 | 1.859375 | 2 |
What’s the North Liberty fire chief’s 'dream come true'? A house to burn down.
Fewer North Liberty buildings are going up in flames lately, which is only somewhat good news for firefighters.
“Our fires are down; we don’t have a lot of structure fires anymore, which is a good thing if you look at it from why we exist,” said Brian Platz, North Liberty Fire Department chief.
But it also means there are fewer opportunities to give firefighters experience taming structure burns. That’s why Platz called the donation of an empty house a “dream come true.”
Iowa City Community School District cleared the building, located on district property next to Liberty High School, of asbestos and allowed the department to burn the building to the ground. The gift saved the district from having to pay to have the building demolished.
The house went up in flames Saturday around noon, but not before the fire department, between fielding calls from citizens, ran drills.
“We have the ability to be controlled and methodical about our approach and just step people through the right process,” he said. “Versus the pager going off and they jump into the truck.”
Firefighters practiced locating and extinguishing fires, rescuing trapped colleagues and communicating over the radio.
When they finished, with hoses at the ready, they watched flames consume their training ground.
“These opportunities are just second to none,” Platz said.
Reporter Aimee Breaux covers education for the Press-Citizen. Reach her at email@example.com or 319-887-5414, and follow her on Twitter @aimee_breaux. | <urn:uuid:fd1a3b56-6b8d-4007-9737-7706e5e880e7> | CC-MAIN-2022-33 | https://www.press-citizen.com/story/news/2018/10/27/north-liberty-fire-use-house-donated-iowa-city-schools-training/1790071002/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00069.warc.gz | en | 0.94863 | 370 | 1.914063 | 2 |
The UK Environmental Change Network, Rothamsted. Physical and Atmospheric Measurements: The First 20 years
© Lawes Agricultural
Scott, T., Macdonald, A and Goulding, K. (2014). The UK Environmental Change Network, Rothamsted. Physical and Atmospheric Measurements: The First 20 years. 32 pp. Lawes Agricultural Trust. ISBN 978 0 9564424 1 3
ECNRothamstedFirst20yr_revised2015.pdf — PDF document, 6.71 MB (7039427 bytes)
Rothamsted Research was established as an agricultural research centre by John Bennet Lawes and Joseph Henry Gilbert in 1843. It is home to the oldest continuing agricultural field experiments in existence. Rothamsted has been an ECN site since 1992. This booklet, written by Rothamsted's ECN Site Manager, Tony Scott, gives a brief overview of the physical and chemical measurements that are routinely measured at Rothamsted, as part of the Long-term Experiments National Capability (LTE-NC) and the ECN. | <urn:uuid:6e6f664c-7621-4547-abef-63d9e0adf3ee> | CC-MAIN-2017-04 | http://www.ecn.ac.uk/publications/scott-2014-ecn-at-rothamsted | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00549-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.832425 | 220 | 2.609375 | 3 |
These are the sources and citations used to research analyzing the use of pre-existing scores. This bibliography was generated on Cite This For Me on
In-text: (Antoun, 2009)
Your Bibliography: Antoun, N., 2009. Film review: "Waltz with Bashir". [online] The Electronic Intifada. Available at: <http://electronicintifada.net/content/film-review-waltz-bashir/3547> [Accessed 9 January 2015].
In-text: (Brown, 1994)
Your Bibliography: Brown, R., 1994. Overtones and undertones. Berkeley: University of California Press.
In-text: (Chion, Gorbman and Murch, 1994)
Your Bibliography: Chion, M., Gorbman, C. and Murch, W., 1994. Audio-vision. New York: Columbia University Press.
In-text: (Waltzes - Chopin Music, 2015)
Your Bibliography: Chopin Music. 2015. Waltzes - Chopin Music. [online] Available at: <http://www.chopinmusic.net/works/waltzes/> [Accessed 8 January 2015].
In-text: (Gabrielsson and Bradbury, 2011)
Your Bibliography: Gabrielsson, A. and Bradbury, R., 2011. Strong experiences with music. Oxford: Oxford University Press.
In-text: (Manvell and Huntley, 1957)
Your Bibliography: Manvell, R. and Huntley, J., 1957. The technique of film music. London: Focal Press.
In-text: (Miell, MacDonald and Hargreaves, 2005)
Your Bibliography: Miell, D., MacDonald, R. and Hargreaves, D., 2005. Musical communication. Oxford: Oxford University Press.
In-text: (Neale and Smith, 1998)
Your Bibliography: Neale, S. and Smith, M. ed., 1998. Contemporary Hollywood Cinema. 1st ed. London: Routledge, pp.142-155.
In-text: (Powrie and Stilwell, 2006)
Your Bibliography: Powrie, P. and Stilwell, R., 2006. Changing tunes. Aldershot, England: Ashgate.
In-text: (Purvis, n.d.)
Your Bibliography: Purvis, R., n.d. Max Richter - Waltz with Bashir, film soundtrack review. [online] Mfiles.co.uk. Available at: <http://www.mfiles.co.uk/reviews/max-richter-waltz-with-bashir.htm> [Accessed 9 January 2015].
In-text: (Romney and Wootton, 1995)
Your Bibliography: Romney, J. and Wootton, A., 1995. Celluloid jukebox. London: British Film Institute, pp.45-55.
10,587 students joined last month! | <urn:uuid:c01056ba-9b52-4548-b7f4-e52600da3ad3> | CC-MAIN-2022-33 | https://www.citethisforme.com/topic-ideas/music/analyzing%20the%20use%20of%20pre-existing%20scores-5951872 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00067.warc.gz | en | 0.658098 | 653 | 2.09375 | 2 |
Forget chunks of ugly 3D printed concrete. “Fossilized” by Amalgamma uses a new method for printing concrete that yields unbelievable results.
Students from the Bartlett School of Architecture have designed and printed gorgeous concrete furniture and structures. Amalgamma is comprised of four masters students who spent the past year on the one of the coolest student research projects: “Fossilized.”
3D printed concrete buildings and foundational structures seems very much in vogue these days. That’s not what this is about. Rather, “Fossilized” was about reinventing printing. The students have not only created stable practices and structures, but beautiful ones. It’s hard to say whether you’re looking at a functional piece or an art gallery.
“Fossilized is a project that attempts to counteract current ‘stagnant’ 3D printing practices, aiming to reinstate the concept of craftsmanship back into architectural design by adopting a more tectonic approach to 3D printed form. Rather than focusing on actual form generation, this is achieved through an understanding of aggregation and heterogeneity at the material level, encouraging the dissolution of boundaries at the massing, structural and material scales.”
Amalgamma: What’s their New 3D Printing Method?
The new method combines two common practices: extrusion printing and powder printing. The result is “supported extrusion” that yields a higher resolution and larger overhangs.
Concrete is pumped to a robot and deposited through a customized head that allows 1cm resolution. A binder was also incorporated into the extrusion process to harden certain parts of the granular support and create a multi-material piece.
Amalgamma does recognize the difficulty of printing an entire structure from start to finish. Instead, they plan to create smaller pieces, like floor-wall-ceiling assemblies or stair-floor-wall assemblies. These smaller chunks can be fit together, or exist on their own, challenging the idea of the catalogue construction element.
The results of their new methods are extraordinary, and not only from an artistic stand-point. What do you think? Let us know in the comments.
License: The text of "“Fossilized” 3D Printed Concrete Structures by Amalgamma" by All3DP is licensed under a Creative Commons Attribution 4.0 International License. | <urn:uuid:32bdaf31-530b-4a52-ab9e-42a030ea6903> | CC-MAIN-2017-04 | https://all3dp.com/fossilized-3d-printed-concrete-structures-amalgamma/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00120-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.919204 | 510 | 2.71875 | 3 |
The large number of risks that any Windows computer is exposed to every day is really scary: viruses, worms, trojans, rootkits, spyware, phishing, ransomware... they're all waiting on any corner, lurking on webs of dubious reputation, in email attachments supposedly sent by a friend or in applications you downloaded and installed without even thinking.
How to fight malware on your computer
This antivirus works on several aspects to make sure that your computer isn't affected by any kind of malicious software. Malwarebytes Anti-Malware comes along with the following features and functions that have helped it to arrive on other platforms like Mac and Android.
- Removal of infections: it's got one of the best detection engines capable of detecting and removing malware such as worms, trojans, spyware, rootkits, or bots, returning the operating system to its previous state.
- Prevention of future infections: it comes along with real-time protection capable of detecting potential threats and establishing shields for what may come.
- Blocks malicious websites: it has a system that blocks fake or unlawful webs that may jeopardize your PC in different manners.
- Quick system scanning: forget about waiting for hours on end for your computer to be fully scanned; Malwarebytes has an ultrafast and silent scanning mode that allows you to carry out other actions while checking your files.
- Hides itself from malware: it implements the technology that allows it to remain hidden from any malware capable of modifying and disabling our antivirus protection.
Three system scanning modes
Once you've downloaded this antivirus, you'll have three ways of analyzing your computer: threat analysis, customized analysis and quick analysis.
- Threat analysis: it's the most thorough of the three and it analyzes all the elements where viruses and other malware usually hide: memory, registry, start... It's the analysis you should carry out on a daily basis.
- Customized analysis: here the user decides how this tool should analyze the different objects.
- Quick analysis: it carries out a quick scan of the memory and starts searching for active threats.
A great alternative to NOD32, Kaspersky, AVG, Avira, Norton and other antiviruses.
The program also offers us a quarantine area where we can keep both suspicious files as well as URLs that might bring some sort of danger to our PC.
Malwarebytes Free or Premium?
Once you try out the different functions available in the trial version, you'll realize that it's worthwhile getting hold of the Pro version of this tool as it offers greater and more efficient protection, which can be almost a must nowadays in order to guarantee the integrity of our computer and the information we store on it.
What's new in the latest version
- Improved detection and correction of risks. | <urn:uuid:154bdee3-23ad-4f93-9046-cc2d08297377> | CC-MAIN-2022-33 | https://www.malavida.com/en/soft/malwarebytes-anti-malware/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00073.warc.gz | en | 0.923086 | 575 | 2.46875 | 2 |
Wohl, E. and Barros, A. and Brunsell, N. and Chappell, N.A. and Coe, M. and Giambelluca, T. and Goldsmith, S. and Harmon, R. and Hendrickx, J. and Juvik, J. and McDonnell, J. J. and Ogden, F. (2012) The hydrology of the humid tropics. Nature Climate Change, 2 (9). pp. 655-662. ISSN 1758-678XFull text not available from this repository.
Hydrological processes in the humid tropics differ from other regions in having greater energy inputs and faster rates of change, including human-induced change. Human influences on population growth, land use and climate change will profoundly influence tropical hydrology, yet understanding of key hydrological interactions is limited. We propose that efforts to collect tropical data should explicitly emphasize characterizing moisture and energy fluxes from below the ground surface into the atmosphere. Research needs to chiefly involve field-based characterizations and modelling of moisture cycling and catchment processes, as well as long-term data acquisition and organization.
|Journal or Publication Title:||Nature Climate Change|
|Subjects:||G Geography. Anthropology. Recreation > GE Environmental Sciences|
|Departments:||Faculty of Science and Technology > Lancaster Environment Centre|
|Deposited On:||06 Aug 2012 13:43|
|Last Modified:||22 Jan 2017 03:33|
Actions (login required) | <urn:uuid:6c304f77-bc92-4f7b-aebd-1ca093fa3d05> | CC-MAIN-2017-04 | http://eprints.lancs.ac.uk/56723/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00174-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.803595 | 318 | 2.390625 | 2 |
The San Francisco-based robotic firm Anki, known for its smartphone-controlled toy race cars, has just announced the creation of an Artificial Intelligence toy robot by the name of Cozmo.
The palm-sized robot looks similar to a dump truck with a block for a head. Moving on tank-style tracks, Cozmo features built-in speakers that play music that changes based on the robot’s “emotions.” The same animation software was used to design the robot that is used by filmmakers, allowing Cozmo to show off “endearingly goofy moves” in real life, writes Nathan Olivarez-Giles for The Wall Street Journal.
“The reason we love the robots we see in movies so much is because they don’t just respond with the same canned responses, they surprise you,” says Hanns Tappeiner, Anki’s president and co-founder. “It’s taken years but our technology is finally to a point where we can build a robot with personality—and bring some of the things you see in the movies to real life.”
Through a connected iPhone, Cozmo is able to recognize faces and understand when it is about to roll of the edge of a table. It is also able to play simple games and stack blocks.
Tappeiner said that while Cozmo is based on the AI technology used by the company to create their smart car toys, it is not as limited as the cars were. He said that although the cars were fun to play with, they could not be turned into characters unless they were painted onto the cars in a similar fashion to the Disney film Cars.
Meanwhile, Cozmo was created to be playful. It is able to recognize and remember users and also interacts with them, getting to know them over time. Tappeiner said Cozmo attempts to combine the best of animation, including humor, personality, and emotional connection, with robotics and gameplay, writes Dean Takahashi for VentureBeat.
A color display represents a face with eyes that light up when a familiar person is seen. The built-in emotion engine allows the robot to express a variety of emotions with its eyes. In addition, it features its own voice, language, and soundtrack to match his mood and also corresponds to games and activities.
In setting up a demo, Tappeiner said, “I don’t know exactly what will happen in the demo. That is because his model is set up after the behavior of live beings like pets.”
Powered by advanced robotics, AI, and computer vision, the robot is able to process more data per second than all of the Mars rovers put together. Comparable robots are found within labs, coming at a cost of thousands of dollars and standing several feet high.
In addition to using computer vision, animatronics, motors, and A.I. software, the robot features three ARM-based microprocessors running on Android and iOS.
Anki worked on 45 versions of the robot throughout the last four-and-a-half years before settling on this one.
The robot works with an Android or iOS device. It is expected to debut in the US this October at a cost of $180. | <urn:uuid:b02ef3b1-ae9a-4e9e-9faf-9e2a704a96a4> | CC-MAIN-2017-04 | http://www.educationnews.org/technology/ankis-cozmo-robot-combines-artificial-intelligence-with-toys/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00123-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.970655 | 683 | 2.09375 | 2 |
The state auditor says North Carolina's Transportation Department can do better at estimating cost increases for building roads and mass transit.
State Auditor Les Merritt's staff has conducted a performance review of the D-O-T's highway program, including an examination of the Transportation Improvement Program. The rolling six-year plan sets priorities among more than 36-hundred projects totaling eleven-point-eight (b) billion dollars.
The review found that while the Transportation Improvement Program isn't a budget document, cost details for individual projects are difficult to evaluate and need improvement.
Cost overruns range from ten percent over estimates to nearly 300 percent more than original cost estimates. The review also found that the Transportation Improvement Program's inflation rates were understated. | <urn:uuid:77884b1b-b407-4c16-a8b5-fd4cd16be99c> | CC-MAIN-2017-04 | http://www.witn.com/home/headlines/4537526.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00545-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.93973 | 150 | 1.960938 | 2 |
We love teaching languages and culture. It’s as simple as that.
As demand for languages grows, we are always looking for teachers to fill new roles. Teaching assignments can range from teaching individuals from beginner through to A level, or from nursery age to adult. If you’re excited about teaching Mandarin, Spanish, French or Arabic then we want to hear from you.
As a Dragons teacher, your goal is to make language learning fun and exciting for your students. We ensure our teachers excel by providing an in-house training programme focused on student engagement.
With a team of 120 teachers and a dedicated office with more than 10 years of experience, you will be continually supported as you meet your next teaching challenge.
Please note that we can only recruit teachers who have a demonstrable right to work in the UK.
Where and when can I teach?
We have a range of teaching programmes designed for individual tuition, primary and secondary curricula, school enrichment and corporate cultural awareness. With the launch of our e-learning platform ‘Connect’ you will be able to teach to and from any location.
Working with schools can involve timetabled teaching for different age groups on-curriculum, running a regular after-school or enrichment club, or teaching a language as part of a school’s activity week.
Teachers who work directly with individual students at home may tutor complete beginners in short introductory courses or take their student from a beginner through to qualification level. Depending on the demand of a particular language and the availability of students at identical levels, some private tuition may involve teaching small groups of students.
Dragons teachers benefit from full support and training throughout the academic year; the provision of textbooks and schemes of work; and online access to all our teaching support materials. As our Connect programme is a hybrid learning model of both virtual teaching and interactive exercises, you will be unrestricted by geography, meaning that we can offer flexible teaching times to suit both you and our students.
What skills will I need?
Dragons Teaching prides itself on providing expert language tuition from genuine professionals. We look for candidates with strong teaching experience and those who have a demonstrable passion for their chosen language.
You will need to have excellent verbal communication skills and be confident teaching a range of group sizes, from one-on-one tuition to school class groups. You will need to demonstrate patience with learners and have the ability to remain calm in stressful situations. As our Connect programme is online, you will also need to be computer-literate and able to troubleshoot basic IT issues.
All of our teachers undergo enhanced background checks, which must be cleared before employment.
Jing (Chinese Teacher)
I have really enjoyed working at Dragons. The professional textbooks match up with the online games and homework are really helpful to foreign learners. The Kungfu Kingdom games from Dragons are really helpful and fun. Students can learn the tones through the Testy tones game and also get familiar with characters through Character Chaos and Stroke of Genius. All the staff are nice and kind. I can get help very soon whether it is a teaching query or another question.
Joseph (Chinese Teacher)
Dragons is comprised of a very friendly and helpful group of people who have been supportive throughout this process, and who have given me the freedom to teach in the way I see fit, whilst also providing support and resources for me to use when I need.
I love teaching and learning Chinese, and I am very happy to be teaching Chinese at a time in which people outside China are starting to realise what a brilliant, beautiful, and potentially useful language it is!
Joline (Chinese Teacher)
The MCTC scheme gave me a lot of ideas; as students we also learned a lot from each other. Also, it was useful to learn about new technology for teaching. Dragons provide a lot of resources for teaching, and of course the scheme itself. There is plenty of room for teachers to include their own ideas as well during the teaching sessions.
Our e-learning platform Connect, available in all of our taught languages, combines online tuition with fun, interactive exercises to consolidate learning.
Train with us
Are you a qualified primary school teacher interested in teaching a new language? We can help you introduce foreign languages into the classroom with our Dragons Teaching Certification.
We have a small team based at our head office in London, and over 60 Dragons teachers. Find out what’s brought us to Dragons today.
Answers to common questions
Frequently asked questions
How do you recruit your teachers?
All Dragons’ teachers go through a rigorous vetting and selection process that follows the Department for Education’s Safer Recruitment guidelines. Our teachers are predominately based in the UK and Taiwan and we maintain our own single central register of all their relevant and vetted personal information.
I am a teacher and I have questions about pay.
What are the rates for teachers?
Rates are variable depending on the lesson type (for example, ConnectLite – 30 minutes of teaching – or Connect – one hour of teaching/teacher presence). Rates will be discussed with you in the application process.
How do I receive my P45 or P60? Please visit http://www.myepaywindow.com.
When is the payroll cut-off? The Sunday before the last Friday of each month.
I’ve been paid incorrectly. Please check that you have confirmed your lessons before the cut-off (see above). If yes, please get in touch and we will rectify this so you receive the correct pay as soon as possible. If you have not confirmed your lessons before the cut-off, unfortunately you will need to wait until the following month’s pay. | <urn:uuid:ce04d07b-938b-4f6c-90a3-c9f6e8fa4d69> | CC-MAIN-2022-33 | https://dragonsteaching.com/teach-with-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00065.warc.gz | en | 0.953422 | 1,187 | 1.554688 | 2 |
The Cape Verdean Minister of Culture and Creative Industries (Ministério da Cultura e das Indústrias Criativas) has identified sites in the country that could be recognised by UNESCO as World Heritage sites. Cape Verde has already started the process in getting the Concentration Camp at Tarrafal, on the island of Santiago presented to UNESCO for consideration. However, other sites the Minister identified include the Natural Park of Cova, Paúl and Ribeira da Torre on the island of Santo Antão; the islands of Santa Luzia, Branco and Raso; Pedra de Lume on the island of Sal; the old centres of Praia (Santiago), São Felipe (Fogo) and Nova Sintra (Brava); and Chã das Caldeiras Natural Park on Fogo.
Cape Verde and Portugal are co-operating on the safeguarding of the cultural heritage of the country, including the Concentration Camp. The camp is situated in Chão Bom (3km south east of Tarrafal) and was built in 1936. The first political prisoners were incarcerated there later the same year, and it eventually closed in 1956. It then opened again in 1962 to house prisoners from Angola, Guinea-Bissau and Cape Verde. It contained more than 500 anti-fascist resistance fighters during that period. Since 2000 it has been a museum and was classified as a National Cultural Heritage site. This is a fascinating history, and it will be interesting to see if it becomes a World Heritage Site. Cidade Velha (originally Ribeira Grande) on the island of Santiago already has this status. | <urn:uuid:bb070c6d-590c-4ae0-b99e-f6dcd02df690> | CC-MAIN-2022-33 | https://www.discover-cape-verde.com/new-world-heritage-sites/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00468.warc.gz | en | 0.937679 | 351 | 2.546875 | 3 |
Issue date: 30 January 2013
To mark Dignity Action Day on 6 February 2013, UWE Bristol's Faculty of Health and Life Sciences is hosting an event for health and social care professionals and students. The event is part of the health and social care profession's response to public concern about dignity of care for older and vulnerable people.
Dignity Action Day is a national event organised by the Dignity in Care network, which is hosted by the Social Care Institute for Excellence.
Following the success of the 2012 event, the Faculty of Health and Life Sciences (in collaboration with the Higher Education Academy) is hosting another special event for health and social care students and professionals. The event will critically explore what 'dignity' means in contemporary health care settings, and promote good practice.
• The Dignity of Care Experience – participate in simulated care in a facilitated environment
• What is 'dignity'? Critical thinking on Dignity in Society
• Dignity in Pregnancy and Childbirth
• Creative Arts in Health - humanising health care
• Dignity, disgust and despair: supporting the unpopular patient
• Valuing People Now? Learning from Winterbourne View
• West of England Care and Repair: There's no place like home: independent living, freedom and dignity
Dr Melody Carter, from UWE said, “This event is an opportunity for students of nursing, midwifery, social work and all allied health professions to come together to explore and debate the issues. As well as students, we will have participants from local health and social care organisations enabling us to take a partnership approach to education for dignity in care. The event is fully booked which demonstrates the way that our students are committed to promote dignity in care. This event aims to develop and equip them for the challenges that professional practice brings and improve the care they provide to vulnerable people.
Dignity Action Day aims to highlight the need to ensure people in care are treated as individuals, are given choice, control and a sense of purpose in their daily lives and provide stimulating activities. For more information see Dignity Action Day
Back to top | <urn:uuid:007ad0fa-2307-49a6-b987-a46f3cb3dbac> | CC-MAIN-2017-04 | http://info.uwe.ac.uk/news/UWENews/news.aspx?id=2452 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00135-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.939049 | 431 | 2.015625 | 2 |
By Chuck Sandy
Living as I do in a quiet corner of central Japan where not much happens, I might be the last person you’d expect to see commenting on recent trends in ELT. Then add to this the very fact that it’s been a good while now since I’ve been a classroom teacher and it’s almost like I should disqualify myself from this task. Still I do keep a social media lookout for news from the English language teaching world and further fuel my addiction to this news with daily readings from the many English Language Teaching (and education) blogs that I follow and stumble upon. It’s from this distant vantage point that I offer up the following notes and observations.
- It’s been a year in which ELT teacher equity has been brought to the forefront thanks to the IATEFL 2016 plenary by Silvana Richardson, the ongoing work of TEFL Equity Advocates, and the conversation which has been happening all over social media for much of the year. The fact that the profession is now beginning to move away from the native-speaker bias that’s plagued ELT for years is something worth applauding.
- There’s been a vigorous discussion about what it means to be an ELT teacher going on throughout the year. While at times related to the equity issues raised above, this discussion has also seen many questioning what it takes to begin work as a qualified English language teacher. For an overview of this discussion, you might start with this post on Hugh Dellar’s Lexical Lab blog. But don’t stop there. For a full range of the discussion and the bigger picture of the problem, do a search for TEFL or TESOL or EFL teacher qualifications and spend some time looking around. As you do, consider for yourself what it means to be an ELT professional and what sort of qualifications new English language teachers should have upon entering the field. This is a discussion we’ll be seeing more of in the coming year.
- Several groups around the ELT world have begun experimenting with the notion of what a conference is and exploring the ways that ideas and initiatives can be shared. Who should be invited to speak? How long should keynote presentations be? Should there even be keynotes? Do we even need a traditional venue? What would happen if the doors were widened enough to bring in ideas from education, psychology, and business? Although there are several groups and individuals I could mention, Innovate ELT, ExcitELT, and EdYOUfest come to mind. Then there’s Laura Patsko and her Pedagogy Pop Ups on Periscope. It will be interesting to see how these start-up conferences and idea-sharing platforms develop in the coming year. Maybe you’ll be participating in one or more of these or forging ahead with new initiatives of your own.
- Everyone has probably noticed the slow but steady rise of the indie ELT publisher over the past couple of years. It may have all started with The Round but now there’s Atama-ii with its “choose your own adventure” books, Wayzgoose Press with a growing list of titles, and the soon to be launched The ELT Workshop. There is also a growing series of collaboratively written books produced by Heart ELT which are beautifully done. These are well worth a look.
- It seems that teacherpreneur just might be the ELT word of 2016. Though I first became aware of the word some time ago while exploring the archives at the mostly K-12 Teachers Pay Teachers, it didn’t register fully until I connected with Patrice Palmer. Her website is full of interviews with teachers who have made the jump from classroom teacher to provider of hand-crafted materials, self-published books, and online lessons. If you find this intriguing and are considering making a similar jump yourself, Patrice will be leading an iTDi Advanced Course in January 2017 called Teacher To Teacherpreneur that will help you explore your options as you learn about the business end of ELT.
- Perhaps it’s because I live way out in the middle of nowhere as I do that I’ve been even more amazed this year by how easy it is to collaborate on projects with people in far-away places. The things I’m working on now couldn’t have been done even a few years ago. The tools which are now available to us have become that easy to use. I can hardly imagine what’s next.
- I’m going to go out on a limb here and call 2016 the beginning of a post-PLN (Personal Learning Network) world. What I see from where I sit is more people getting connected in more ways and yet collaborating more closely in smaller groups. My friend Michael Obrien calls these smaller groups pelotons – a word that comes from the cycling world. A peloton is a group of cyclists who work collaboratively towards the fulfillment of a common goal. Sometimes one rider takes the lead while others block the wind. Sometimes another one does. Sometimes one rider will pull ahead while others fall behind. Then that one waits for others to catch up. “You can never be faster than your peloton,” says Michael. Nor should you. You’re all getting to the same place together and because you’re getting there together, that makes the whole experience better. Working in this way with my peloton is my goal for 2017.
And perhaps our paths will cross as I read your posts, or as we work on online projects together, or maybe we’ll even meet up out in the physical world somewhere. Although I write to you from a distant outpost, the ELT world is a small one. To where ever you are and for whatever you do, I thank you and wish you a happy, healthy, and prosperous year ahead. | <urn:uuid:b185d441-48ad-44b1-b414-34ac5ac1d862> | CC-MAIN-2017-04 | http://itdi.pro/blog/2016/12/23/notes-from-a-distant-elt-outpost/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00152-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.957681 | 1,223 | 1.65625 | 2 |
That kind of makes me wonder if that is true :) Anyway, it was supposed to be obvious that it is an opinion. Opinions are often stated as facts to make texts easier to read. "Good" is always subjective; "very good" is always very subjective.
nor does knowing the name of a module teach you anything about it.
Guess what: I thought of that and used this site's wonderful linking mechanism to link the names to search.cpan.org, where you can find the documentation. Is that not wonderful?
I personally like finding out what modules other people like and many have said that they also like that. It's an imperfect world and sometimes people post something that you may find useless. Sometimes most people agree that it is indeed useless. In this case, I am certain that there are people who like my post. That is enough reason to post it. It is the "point", to answer your original question. | <urn:uuid:779b4731-ba6c-4a5e-89f3-39a16844ff16> | CC-MAIN-2017-04 | http://www.perlmonks.org/?node_id=334677 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00226-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.982419 | 195 | 1.554688 | 2 |
TORONTO — Twenty years ago, the American economy was in the third year of a deep recession. It was impossible to find a job. The 1980s housing bubble had popped; high-end housing prices in New York City dropped by 80 percent. Then, as now, the president seemed oblivious, aloof and clueless. Two years later, with no recovery in sight, angry voters turned him out of office.
But help was on the way. Something called the World Wide Web appeared in 1991. Two years later, Mosaic—the first graphic Web browser, which would evolve into Netscape—was introduced. The Internet boom began. It flamed out seven years later, but in the meantime tens of millions of Americans collected new, higher paychecks. They spent their windfall. Consumer spending exploded. So did government tax revenues. When President Clinton left office in 2001, the Office of Management and Budget was projecting a $5 trillion surplus over the next 10 years—enough to pay off the national debt and fund Social Security for decades. Unemployment had fallen to 4 percent. United States GDP accounted for a quarter of the global economy.
It’s different this time. We are in a deep depression: Calculated the same way as it was in the 1930s, the unemployment rate is the same as it was in 1934. Global credit markets have stalled. Investment has ceased.
And help isn’t coming.
Despair oozes between the lines of media interviews of economists. Asked where the recovery will come from, they run down the list of theoretical possibilities, dismissing them one by one. The question remains unanswered. Which is, of course, the answer.
No one knows where the recovery will come from for a simple reason: It isn’t coming. Not any time soon.
“A robust rebound in retail sales earlier in the spring had fueled hopes that consumer spending—which makes up about 70 percent of U.S. economic activity—would give a strong lift to the recovery. But now that is looking increasingly unlikely,” reported the Los Angeles Times. “Households are not going to be the engine of growth for some time,” Paul Dales of Capital Economics told the newspaper.
“In past recoveries, booming construction activity led the way, fueling spending and other economic activity. That’s not happening this time,” said the Times.
If there’s some new technological innovation—like the Internet in the early 1990s—waiting in the wings, no one has heard or seen it.
Forget about Congress. The feds wasted hundreds of billions of dollars to bail out banks, insurance companies and big automakers that used our taxpayer money to give raises to its top executives and remodel its offices. Meanwhile, the stimulus that needed to happen—bailing out distressed homeowners, small businesses and individuals who lost their jobs—never happened. Now Congress is worried about the deficit. So read my lips: no new bailouts, not even one that might actually work.
Some think the U.S. could export its way out of the depression. But a radical restructuring of trade agreements and manufacturing infrastructure would have to come first, followed by years of expansion. U.S. policymakers haven’t even begun to think about the first move. Moreover, the rest of the world isn’t in a position to buy our stuff. The rate of expansion of the economies of China and Japan is slowing down. Germany and other EU nations are imposing austerity measures.
Globalization is key. Writing in The Wall Street Journal, John H. Makin argued that the actions of individual G20 nations threaten to bring the whole system crashing down in a Keynesian “paradox of thrift.”
Said Makin: “Because all governments are simultaneously tightening fiscal policy, growth is cut so much that revenues collapse and budget deficits actually rise. The underlying hope or expectation that easier money, a weaker currency, and higher exports can somehow compensate for the negative impact on growth from rapid, global fiscal consolidation cannot be realized everywhere at once. The combination of tighter fiscal policy, easy money and a weaker currency, which can work for a small open economy, cannot work for the global economy.”
Added Mike Whitney of Eurasia Review: “Obama intends to double exports within the next decade. Every other nation has the exact same plan. They’d rather weaken their own currencies and starve workers than raise salaries and fund government work programs. Class warfare takes precedent over productivity, a healthy economy or even national solvency. Contempt for workers is the religion of elites.”
One can hardly blame workers for fighting back. Two weeks after hundreds of protesters rioted at the G20 Summit meeting, Toronto police are pouring through thousands of photos and are using facial recognition software to track down offenders. They have even released a top 10 “most wanted” list and related pictures of activists.
Whether or not the anti-globalization protesters are motivated by the struggle for liberation and economic equality, they symbolize the industrialized world’s best chance to prevent the economy from continuing its current process of slow-motion collapse. If the system cannot be saved by consumers, business or government, the system itself must be revamped and replaced. Late-period global capitalism’s constant cycle of booms and busts is unsustainable and intolerable. States must regulate and equalize incomes, and control production.
If the cops were smart, they would track down and arrest those people who really are ruining the economy. They could start by listing and releasing the photos of the attendees of the G20. | <urn:uuid:ea51f600-92e4-4b7d-8610-529acfe2bc04> | CC-MAIN-2017-04 | http://vegasseven.com/2010/07/22/help-not-soon/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00487-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.952919 | 1,159 | 2.203125 | 2 |
Aspergillus fumigatus is a mold that causes severe pulmonary infections. Our knowledge of how A. fumigatus growth is controlled in the respiratory tract is developing, but still limited. Alveolar macrophages, lung resident macrophages, and airway epithelial cells constitute the first lines of defense against inhaled A. fumigatus conidia. Subsequently, neutrophils and inflammatory CCR2+ monocytes are recruited to the respiratory tract to prevent fungal growth. However, the mechanism of neutrophil and macrophage recruitment to the respiratory tract after A. fumigatus exposure remains an area of ongoing investigation. Here we show that A. fumigatus pulmonary challenge induces expression of the inflammasome-dependent cytokines IL-1β and IL-18 within the first 12 hours, while IL-1α expression continually increases over at least the first 48 hours. Strikingly, Il1r1-deficient mice are highly susceptible to pulmonary A. fumigatus challenge exemplified by robust fungal proliferation in the lung parenchyma. Enhanced susceptibility of Il1r1-deficient mice correlated with defects in leukocyte recruitment and anti-fungal activity. Importantly, IL-1α rather than IL-1β was crucial for optimal leukocyte recruitment. IL-1α signaling enhanced the production of CXCL1. Moreover, CCR2+ monocytes are required for optimal early IL-1α and CXCL1 expression in the lungs, as selective depletion of these cells resulted in their diminished expression, which in turn regulated the early accumulation of neutrophils in the lung after A. fumigatus challenge. Enhancement of pulmonary neutrophil recruitment and anti-fungal activity by CXCL1 treatment could limit fungal growth in the absence of IL-1α signaling. In contrast to the role of IL-1α in neutrophil recruitment, the inflammasome and IL-1β were only essential for optimal activation of anti-fungal activity of macrophages. As such, Pycard-deficient mice are mildly susceptible to A. fumigatus infection. Taken together, our data reveal central, non-redundant roles for IL-1α and IL-1β in controlling A. fumigatus infection in the murine lung.
Aspergillus spp. are ubiquitous in the environment, and even though individuals are regularly exposed to fungal spores clinical invasive disease is a rare manifestation. In contrast, individuals with weakened immune systems develop severe disease, such as invasive pulmonary aspergillosis (IPA). IPA is associated with extremely poor prognoses and unacceptably high mortality rates. Knowledge gained from understanding how immunocompetent mammals control Aspergillus challenge will help develop new immunomodulatory strategies aimed at improving patient outcomes. It is well known that neutrophils and monocytes are crucial immune cells that act to limit fungal growth. Our work demonstrates a central role for the cytokine IL-1α in orchestrating the optimal recruitment of neutrophils and monocytes, whereas IL-1β and the inflammasome are more important in activation of anti-fungal activity of the monocytes. Moreover, our studies indicate that CCR2+ monocytes are required for optimal production of IL-1α in the lungs of A. fumigatus challenged mice. Thus, our data highlight a crucial role of the IL-1 cytokine in mediating anti-fungal immunity which might be harnessed to treat clinical cases of IPA.
Citation: Caffrey AK, Lehmann MM, Zickovich JM, Espinosa V, Shepardson KM, Watschke CP, et al. (2015) IL-1α Signaling Is Critical for Leukocyte Recruitment after Pulmonary Aspergillus fumigatus Challenge. PLoS Pathog 11(1): e1004625. doi:10.1371/journal.ppat.1004625
Editor: Bruce S. Klein, University of Wisconsin-Madison, UNITED STATES
Received: June 6, 2014; Accepted: December 11, 2014; Published: January 28, 2015
Copyright: © 2015 Caffrey et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited
Data Availability: All relevant data are within the paper and its Supporting Information files.
Funding: JJO was supported by funding from the National Institutes of Health NIGMS grant P20-GM103500 (Quinn, MT; PI), the MSU Agricultural Experiment Station, and an equipment grant from the M.J. Murdock Charitable Trust. RAC was supported by grants from the National Institutes of Health P30-GM103415 (Green, WR; PI), P30-GM106394 (Stanton, BA; PI), R01-AI081838. KMS is also supported by a National Institutes of Health training grant T32-DK007301 (Stanton, BA; PI). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
The mold Aspergillus fumigatus is one of the leading causes of invasive fungal infections. It is the causative agent of severe pulmonary infections such as invasive pulmonary aspergillosis (IPA), a disease of high morbidity and mortality which affects immunocompromised individuals . IPA has been a disease of growing concern over recent decades due to an increase in the immunocompromised population, specifically caused by advances in immunosuppressive drugs and organ transplantation methods as well as chemotherapy treatments in cancer patients . In addition, there is increasing evidence that IPA can sporadically develop in certain immunocompetent populations . Currently there are no available vaccines for A. fumigatus and anti-fungal drugs have a modest rate of success in limiting high mortality rates typically due to late diagnosis of IPA [1,2,4]. Moreover, the recent emergence of drug resistance has further limited treatment options in certain clinical cases and geographic areas [5,6,7].
The concentration of Aspergillus conidia in air samples ranges from 0.2–15 conidia/m3 and on a daily basis an individual can inhale hundreds of conidia . In most immunocompetent individuals the conidia are typically removed from the body by physical barriers encountered within the respiratory tract. However, if the conidia escape this primary immune barrier and enter the lung, they will be removed by alveolar macrophages and other resident leukocytes, such as CCR2+ monocytes. Conversely, in an individual lacking a sufficient immune response, Aspergillus conidia are able to swell, germinate, and form hyphae, invading pulmonary tissue with the potential to disseminate systemically [9,10]. Our understanding of the inflammatory pathways necessary for an immunocompetent individual to maintain control of A. fumigatus while constantly being exposed to conidia is an ongoing area of investigation.
Control of A. fumigatus growth in the lung during invasive infection is highly dependent on rapid recruitment and activation of innate immune cells, including neutrophils , inflammatory monocytes [10,12], NKT cells , and plasmacytoid dendritic cells . The importance of appropriate activation of leukocytes in the control of A. fumigatus is highlighted by patients and mice with chronic granulomatous disease or lacking NADPH oxidase subunits, being highly susceptible to developing IPA after A. fumigatus challenge [15,16,17]. Furthermore, patients who become neutropenic after chemotherapy for a bone marrow transplant are at a higher risk for developing IPA [18,19,20,21]. In the murine model of A. fumigatus infection, CXCR2 and its ligands are important signaling components for neutrophil recruitment [22,23,24]. In the absence of CXCR2 signaling during pulmonary A. fumigatus infection, there is a decrease in neutrophil recruitment along with a higher fungal burden and increased mortality rate, similar to a neutropenic model . Additionally, a role for CCR2 signaling has been shown to be necessary to promote recruitment and differentiation of inflammatory monocytes from the bone marrow into CD11b+ dendritic cells upon A. fumigatus infection [10,12]. However, the exact sequence of events necessary for the expression of chemotactic molecules for optimal leukocyte recruitment has not been well elucidated.
In addition, it has been shown that polymorphisms in the Interleukin (IL)-1 gene cluster may be important in determining the susceptibility or resistance to IPA in humans [25,26]. The IL-1 gene cluster codes for two pro-inflammatory cytokines, IL-1α and IL-1β, as well as the IL-1 receptor antagonist (IL-1Ra) . All three of these IL-1 family members bind to the IL-1 receptor, type I (IL-1RI). IL-1α and IL-1β enhance the immune response while IL-1Ra competitively binds to IL-1RI, thereby preventing the binding of IL-1α and IL-1β . Although IL-1α and IL-1β are both pro-inflammatory cytokines within the same IL-1 cytokine family, they differ in their maturation processes. IL-1α can be released as pro-IL-1α or mature IL-1α after calpain cleavage. In either form it can actively bind to IL-1RI and mediate downstream signaling [27,28]. Conversely, IL-1β is first produced as inactive pro-IL-1β which must be cleaved by a caspase-1 containing inflammasome to yield the mature biologically active cytokine . After fungal exposure, IL-1β production has been linked to activation of the NLRP3 inflammasome [30,31,32,33,34,35,36,37]. Mice lacking the NLRP3 inflammasome are highly susceptible to disseminated candidiasis [30,36,37]. However, the role of inflammasome activation by A. fumigatus in vivo is unknown.
The role of IL-1α in regulating the pulmonary inflammatory response after infectious challenge is much less understood and is an active area of research. Importantly, several studies have shown that IL-1α and IL-1β can have non-redundant roles in infection and inflammation. Specifically, it has been demonstrated that an increase of IL-1α correlated with early neutrophil recruitment, while IL-1β correlated with macrophage recruitment during later time points in a model of sterile inflammation [38,39]. During pulmonary Legionella pneumophila infection IL-1α is essential for early neutrophil responses . In a systemic candidiasis model, IL-1α and IL-1β played non-redundant roles in anti-fungal immunity by enhancing anti-fungal activity of leukocytes and recruitment of neutrophils, respectively . However, the role(s) of IL-1 cytokines after challenge with the mold A. fumigatus remains to be fully defined.
Here, we delineate the differential roles of IL-1α and IL-1β after in vivo challenge with A. fumigatus and further define the sequence of events required for leukocyte recruitment after A. fumigatus challenge. Specifically, we observed, unlike the diseases caused by the yeast Candida albicans [30,36,37], that the inflammasome is not essential for preventing severe invasive pulmonary aspergillosis, but does participate in initiating the full anti-fungal activity of leukocytes. In stark contrast, IL-1α signaling through IL-1RI is crucial for the control of pulmonary A. fumigatus infection through optimal leukocyte recruitment, which correlated with CXCL1 expression. CCR2+ monocytes regulated the early expression of IL-1α and CXCL1, and promoted early neutrophil accumulation in the airways. Treatment of Il1r1-deficient mice with a chemokine known to enhance neutrophil recruitment enhanced immunity against pulmonary A. fumigatus infection. Thus, our studies define the specific sequence of events regulated by both IL-1α and IL-1β necessary for control of A. fumigatus growth and lung damage within the respiratory tract.
Differential temporal expression kinetics of IL-1 cytokine family members after Aspergillus fumigatus challenge
To examine the early pulmonary inflammatory milieu induced after A. fumigatus challenge, bronchoalveolar lavage fluid (BALF) was collected 6, 12, 24, and 48 h after intratracheal (i.t.) instillation of ∼5×107 conidia of the CEA10 strain of A. fumigatus. Of note, both the inflammasome-dependent cytokines IL-1β (Fig. 1A) and IL-18 (Fig. 1B) were expressed within approximately 6 h after A. fumigatus challenge. In contrast, IL-1α (Fig. 1C) and IL-1Ra (Fig. 1D) were expressed in a linearly increasing manner during the first 48 h. Thus, A. fumigatus challenge results in temporally distinct expression of IL-1 cytokine family members.
Mice were infected i.t. with 5×107 CEA10 conidia and at indicated time-points, mice were euthanized, bronchoalveolar lavage fluid (BALF) collected, and lung tissue homogenized. IL-1β (A), IL-18 (B), IL-1α (C), and IL-1Ra (D) levels in lung homogenate (IL-1α) and BALF (IL-1β, IL-18, and IL-1Ra) were measured using ProcartaPlex Mouse Cytokine & Chemokine 36-plex Immunoassay or ELISA. Data are representative of four mice per time point and two independent experiments. Each dot represents the mean ± one SEM.
Il1r1-deficient mice are highly susceptible to pulmonary Aspergillus fumigatus infection
In one cohort of human patients it has been shown that a complex polymorphism in the Il1a, Il1b, and Il1rn genes, which was associated with decreased IL-1 dependent inflammatory events, resulted in increased risk for the development of IPA . Because of this prior clinical observation plus our finding that both IL-1α and IL-1β are produced in the lungs after A. fumigatus challenge (Fig. 1), we questioned whether IL-1RI signaling was critical in the clearance of A. fumigatus from the lung. To globally test the role of IL-1 signaling in limiting A. fumigatus growth in the respiratory tract of mice, we challenged C57BL/6 and Il1r1-deficient mice with ∼5×107 conidia of A. fumigatus CEA10 delivered via the i.t. route. Subsequently, control of A. fumigatus in the respiratory tract was assessed by histological analysis at 24, 48, and 72 h after instillation. Strikingly, Grocott-Gomori methenamine silver (GMS) staining of lung tissue from Il1r1-deficient mice revealed the presence of a significant fraction of germinating A. fumigatus conidia at 48 h that was not observed in C57BL/6 mice (Fig. 2A). When the presence of germinating A. fumigatus conidia was quantified over the first 72 h, C57BL/6 mice displayed minimal germination that was ∼4% at 48 h before resolving (Fig. 2B); in contrast, Il1r1-deficient mice displayed a significant impairment in controlling A. fumigatus germination within 24 h (Fig. 2B). By 48 h, the majority of fungal conidia in Il1r1-deficient mice were germinated (Fig. 2B). High levels of germination were observed in the majority of Il1r1-deficient mice and this was associated with significant mortality in those mice (Fig. 2C). To strengthen our conclusion that IL-1RI signaling was crucial for controlling A. fumigatus germination in the lungs rather than a development issue in the Il1r1-deficient mice, we treated C57BL/6 mice intraperitoneally (i.p.) with 200 μg of hIL1ra, which antagonizes IL-1α and IL-1β, or placebo every 24 h starting one day prior to challenging mice with ∼5×107 conidia of A. fumigatus. Lung tissue from hIL1ra-treated C57BL/6 mice revealed the presence of a significant fraction of germinating A. fumigatus conidia at 48 h, which was not observed in placebo treated C57BL/6 mice (S1 Fig.). Taken together, these results strongly support the conclusion that IL-1RI signaling is critical for prevention of A. fumigatus strain CEA10 pulmonary proliferation and host damage.
Age-matched C57BL/6 or Il1r1-deficient mice were infected i.t. with 5×107 CEA10 conidia and at indicated time-points, mice were euthanized, BALF collected, and lungs saved for histological analysis. (A) Formalin-fixed lungs were paraffin embedded, sectioned, and stained with H&E (top) or GMS (bottom) for analysis by microscopy. Representative lung sections from C57BL/6 and Il1r1-deficient mice infected with CEA10 for 48 h are shown using either the 4× (left) or 20× (right) objectives. (B) A. fumigatus germination rates were assessed over the first 72 h of infection by microscopically counting both the number of conidia and number of germlings in GMS-stained section. (C) Survival of C57BL/6, Pycard−/−, and Il1r1−/− mice challenged i.t. with 1.5×107 A. fumigatus (CEA10) conidia was then monitored for survival over the first 96 h (Mantel-Cox log-rank test, p = 0.0002). Data are representative of 2 independent experiments at each time point consisting of at least 5 mice per group. (D) Total macrophage (left panel) and neutrophil (right panel) recruitment in the BALF was measured at 12, 24, and 48 h post-infection. Data are representative of at least 2 independent experiments at each time point consisting of 3–5 mice per group. Bar graphs show the group mean ± one SEM. Statistically significant differences were determined using Student’s t-test (*p < 0.05; **p < 0.01).
Neutrophils and macrophages are widely acknowledged to be critical effector cells for clearing A. fumigatus from the lungs . Assessing cellular recruitment via differential microscopic counting of cytospins stained with Diff-Quik from the bronchoalveolar lavage fluid at 12, 24, and 48 h post-challenge demonstrated a significant impairment in neutrophil recruitment at each time point analyzed, while macrophage recruitment was similar between C57BL/6 and Il1r1-deficient mice at early time points after A. fumigatus challenge, but were decreased by 48 h (Fig. 2D). When inflammatory infiltrates within the BALF and lung parenchyma were assessed at 12, 24, and 36 h by flow cytometry a similar decrease in neutrophils in both compartments was observed in the Il1r1-deficient mice (S2A-S2B Fig.), while CD11b+ macrophages (S2C Fig.), CD11c+ alveolar macrophages (S2D Fig.), and CD103+ dendritic cells (S2E Fig.) were found at similar levels as observed in C57BL/6 mice. We next questioned whether leukocyte recruitment was diminished in Myd88-deficient mice because it is the key signaling adapter for IL-1RI, as well as TLRs [27,43], and Myd88-deficient mice have an impaired ability to control pulmonary A. fumigatus growth . Indeed, Myd88-deficient mice exhibited defective neutrophil recruitment 12 and 24 h after A. fumigatus instillation, but normal macrophage recruitment at these early time points (S3 Fig.). Thus, mice deficient in Il1r1 and Myd88 are highly impaired in their ability to clear A. fumigatus from the lungs, which correlates with defects in early neutrophil recruitment to the lungs.
Pycard-deficient mice are only mildly susceptible to pulmonary Aspergillus fumigatus exposure
It is well documented that IL-1β secretion requires the function of the inflammasome and that both the inflammasome and IL-1β are important in limiting systemic fungal infections [30,33,35,36,37,41,45]. Recent in vitro studies have shown that the NLRP3-ASC-Capase1 inflammasome can be triggered by A. fumigatus , but the in vivo relevance of this triggering during A. fumigatus infection remains unknown. Multiple inflammasome complexes exist, but ASC (Pycard) is a central adapter protein needed for maturation of IL-1β and IL-18 . Thus, to determine the role of the inflammasome after A. fumigatus challenge, we challenged C57BL/6 and Pycard-deficient mice with ∼5×107 conidia of A. fumigatus CEA10 i.t.; subsequently, control of A. fumigatus in the respiratory tract was assessed by histological analysis at 24, 48, and 72 h after instillation. GMS staining of lung tissue from Pycard-deficient mice revealed the presence of germinating A. fumigatus conidia at elevated frequencies compared to C57BL/6 mice at 48 h (Fig. 3A-B), but this phenotype was less severe than what was observed in Il1r1-deficient mice and did not result in murine mortality (Fig. 2). When the presence of germinating A. fumigatus conidia was quantified over the first 72 h, C57BL/6 mice display minimal germination that was ∼3% at 48 h (Fig. 3B). Pycard-deficient mice displayed normal control of A. fumigatus germination at 24 h. However, by 48 h impaired control of A. fumigatus germination (∼22%) was observed, but these mice were ultimately able to resolve the A. fumigatus challenge (Fig. 3B). Because, neutrophils and macrophages are widely acknowledged to be critical effector cells for clearing A. fumigatus from the lungs and were diminished in the absence of IL-1RI signaling (Fig. 2C), we next assessed inflammatory cell recruitment in BALF via differential microscopic counting of cytospins stained with Diff-Quik from the bronchoalveolar lavage fluid at 12, 24, and 48 h after instillation. Interestingly, C57BL/6 and Pycard-deficient mice demonstrated equivalent neutrophil and macrophage recruitment at each time point analyzed (Fig. 3C). Moreover, when the inflammatory infiltrates within the BALF and lung parenchyma were assessed at 12, 24, and 36 h by flow cytometry the number of neutrophils in the BALF and lung parenchyma, CD11b+ macrophages, CD11c+ alveolar macrophages, and CD103+ dendritic cells in the lung parenchyma were found at similar levels in C57BL/6 and Pycard-deficient mice (S2 Fig.). When we examined the expression of IL-1β in the BALF of Pycard-deficient mice, no expression of IL-1β at 12 h was observed while significant levels were detected in C57BL/6 mice (Fig. 3D); however, when IL-1α was examined in the lung parenchyma we observed equivalent levels of cytokine expression (Fig. 3E), suggesting that IL-1α signaling could still be activated in the Pycard-deficient mice.
Age-matched C57BL/6 or Pycard-deficient mice were infected i.t. with 5×107 CEA10 conidia and at indicated time-points mice were euthanized, BALF collected, and lungs saved for histological analysis. (A) Formalin-fixed lungs were paraffin embedded, sectioned, and stained with H&E (top) or GMS (bottom) for analysis by microscopy. Representative lung sections from C57BL/6 and Pycard-deficient mice infected with CEA10 for 48 h are shown using either the 4× (left) or 20× (right) objectives. (B) A. fumigatus germination rates were assessed over the first 72 h of infection by microscopically counting both the number of conidia and number of germlings in GMS-stained section. (C) Total macrophage (left panel) and neutrophil (right panel) recruitment in the BALF was measured at 12, 24, and 48 h post-infection. (D) IL-1β levels in the bronchoalveolar lavage fluid (BALF) and (E) IL-1α levels in the lung parenchyma were assessed from C57BL/6 and Pycard-deficient mice infected i.t. 12 h prior with 5×107 CEA10 conidia. IL-1α and IL-1β levels in BALF were measured by ELISA. (B-E) All data are representative of at least 2 independent experiments at each time point consisting of 3–5 mice per group. Bar graphs show the group mean ± one SEM. Statistically significant differences were determined using Student’s t-test (*p < 0.05; **p < 0.01). LOD = limit of detection. (F-G) The anti-fungal activity of bone marrow-derived macrophages (BMDM) were assessed in vitro using the previously described XTT assay . (E) BMDMs were obtained from C57BL/6 (WT) or Pycard-deficient (ASC) mice. An XTT assay was performed using BMDM from each mouse strain in both normoxic and hypoxic conditions. (B) BMDMs from C57BL/6 mice were obtained and incubated with isotype control antibody, IL-18 neutralizing antibody or IL-1ß neutralizing antibody. These BMDMs were then used in an XTT assay in both normoxic and hypoxic conditions. (E-F) Data are representative of four biological replicates in each group. Bar graphs show the group mean ± one SEM. Statistically significant differences were determined using an one-way ANOVA with Bonferroni’s post-test (∞p < 0.05 compared to C57BL/6 cells under the same conditions).
Since Pycard-deficient mice did not demonstrate impaired leukocyte recruitment after A. fumigatus challenge, we next sought to quantitate the anti-fungal activity of macrophages from C57BL/6 and Pycard-deficient mice. Hyphal damage induced by macrophages was assessed using the XTT hyphal damage assay, which measures fungal cell metabolic activity as an indirect measure of fungal viability . C57BL/6 and Pycard-deficient bone marrow-derived macrophages induced similar hyphal damage when co-cultured with A. fumigatus under normoxic conditions (Fig. 3F, yellow bars). Interestingly, a previous report demonstrated enhanced anti-fungal activity of leukocytes against fungal hyphae under hypoxic conditions , which occurs within the lungs after A. fumigatus challenge and at sites of microbial infection [47,48]. Intriguingly, time-points when hypoxia is observed also coincides with the recruitment of inflammatory monocytes to the site of infection . Thus, we sought to test the contribution of the inflammasome to the anti-fungal response of macrophages under hypoxic conditions. Similar to the previous findings , C57BL/6 bone marrow-derived macrophages displayed significantly enhanced anti-fungal activity when cultured in hypoxia (Fig. 3F). In contrast, Pycard-deficient macrophages induced less hyphal damage when co-cultured with A. fumigatus under hypoxic conditions (Fig. 3F, blue bars). Since activation of the inflammasome triggers the release of both IL-1β and IL-18 we next sought to assess which inflammasome-dependent cytokine was responsible for increasing the anti-fungal activity of macrophages in hypoxia. C57BL/6 macrophages were treated with an isotype control antibody, anti-IL1β antibody, or anti-IL18 antibody during the co-culture with A. fumigatus germlings. Subsequently, fungal damage was again assessed by an XTT assay. Macrophages treated with an isotype control antibody display increased anti-fungal activity in hypoxia. This increased anti-fungal activity was lost in the presence of a blocking anti-IL1β antibody, but not a blocking anti-IL18 antibody (Fig. 3G). Collectively, these data demonstrate that mice deficient in Pycard are mildly impaired in their ability to clear A. fumigatus from the lungs, which correlated with in vitro defects in the anti-hyphal activity induced by IL-1β in hypoxia, rather than inflammatory cell recruitment to the lungs.
Anti-IL-1α treatment impairs pulmonary recruitment of leukocytes, enhancing the susceptibility of mice to pulmonary Aspergillus fumigatus infection
As Il1r1-deficient mice were much less able to control A. fumigatus germination than Pycard-deficient mice (Fig. 2 & 3) and Pycard-deficient mice still produced IL-1α in the lungs (Fig. 3D), we next sought to understand the role IL-1α played in the clearance of A. fumigatus from the lung. To determine the role of IL-1α after A. fumigatus challenge, we treated C57BL/6 mice i.p. with 40 μg of goat IgG or anti-IL1α 24 h prior to and 24 h after challenging mice with ∼5×107 conidia of A. fumigatus. Control of A. fumigatus in the respiratory tract was assessed by histological analysis at 48 h after instillation. GMS staining of lung tissue from anti-IL1α treated C57BL/6 mice revealed the presence of germinating A. fumigatus conidia at significantly higher frequencies than seen in goat IgG treated C57BL/6 mice (Fig. 4A & B). As leukocyte recruitment to the lungs was significantly impaired in Il1r1-deficient, but not Pycard-deficient, mice following A. fumigatus challenge, we next assessed inflammatory cell recruitment to the BALF via differential microscopic counting of cytospins stained with Diff-Quik from the bronchoalveolar lavage fluid at 24 and 48 h post-challenge. Interestingly, anti-IL1α treated C57BL/6 mice demonstrated reduced neutrophil recruitment at 24 h post-A. fumigatus challenge (Fig. 4C). Additionally, treatment of Pycard-deficient mice with anti-IL1α significantly enhanced the susceptibility of those mice to A. fumigatus challenge, mirroring what was found in Il1r1-deficient mice (S4 Fig.). Thus, blocking IL-1α in mice significantly impairs early neutrophil recruitment to the lungs early after A. fumigatus challenge resulting in impaired control of A. fumigatus germination in the lungs.
C57BL/6 mice treated with isotype control antibody or IL-1α neutralizing antibody were infected i.t. with 5×107 CEA10 conidia. At the indicated time points mice were euthanized, BALF collected and lungs saved for histological analysis. (A) Formalin-fixed lungs were paraffin embedded, sectioned and stained with H&E (top) or GMS (bottom) for analysis by microscopy. Representative lung sections from C57BL/6 mice treated with isotype control antibody (left) or with anti-IL-1α antibody (right) and infected with CEA10 for 48 h are shown using either the 4× (left) or 20× (right) objectives. (B) A. fumigatus germination rates at 48 h after challenge was determined by microscopically counting both the number of conidia and number of germlings in GMS-stained section. (C) Total macrophage (left panel) and neutrophil (right panel) recruitment in the BALF was measured at 24 and 48 h post-infection via cytospins. Data are representative of two independent experiments consisting of 4–5 mice per group. Bar graphs show the group mean ± one SEM. Statistically significant differences were determined using a Student’s t-test (*p < 0.05, ***p < 0.001).
IL-1α signaling enhances the expression of CXCL1
As both Il1r1-deficient mice and anti-IL1α treated C57BL/6 mice displayed significantly decreased cellular infiltration into the BALF (Fig. 2D and 4C), we next sought to understand the roles that IL-1α, IL-1RI, and the inflammasome play in setting up the inflammatory milieu within the lungs. Thus, we challenged four cohorts of mice, C57BL/6 treated with 40 μg of goat IgG, C57BL/6 treated with 40 μg of anti-IL1α, Il1r1-deficient, and Pycard-deficient, with ∼5×107 conidia of A. fumigatus. Twenty-four hours after challenge, the inflammatory milieu in the lung parenchyma was assessed by a 12-plex multiplex cytokine assay. Anti-IL1α treatment, rather than Pycard-deficiency, largely mirrored the inflammatory cytokine defects found in the Il1r1-deficient mice (Fig. 5) fitting with the biological outcomes of A. fumigatus challenge in those mice. Specifically, TNFα, CCL3, and CCL4 expression was not diminished in the absence of IL-1α, IL-1RI, or ASC (Fig. 5). Interestingly, CXCL1 and G-CSF expression were significantly reduced in Il1r1-deficient mice. CXCL1 expression was almost entirely dependent on IL-1α signaling (Fig. 5), while G-CSF expression trend to being dependent on both IL-1α and ASC in an additive manner (Fig. 5). A similar trend, as observed with CXCL1, was seen with IL-6 and CCL2, but it did not reach significance (Fig. 5). Thus, blocking IL-1α in mice significantly decreased the abundance of CXCL1 in the lungs, which correlates with the decreased neutrophil recruitment in Il1r1-deficient mice.
C57BL/6 mice treated with either isotype control antibody or IL-1α neutralizing antibody, Il1r1-deficient and Pycard-deficient mice were infected with 5×107 CEA10 conidia and at 24 hours post-infection, mice were euthanized, BALF collected, and lung tissue homogenized. Cytokine and chemokine levels in the lung homogenates were measured using 12-plex multiplex Luminex assay, similar trends were observed in BALF. Data are representative of two independent experiments consisting of 4–5 mice per group. Bar graphs show the group mean ± one SEM. Statistically significant differences were determined using a Kruskal-Wallis one-way ANOVA with Dunn’s post-test (*p < 0.05, **p < 0.01).
Absence of CCR2+ monocytes results in decreased IL-1α, CXCL1, and neutrophil recruitment
As IL1α was necessary for optimal CXCL1 expression and neutrophil infiltration into the BALF (Fig. 4C & 5), we next sought to identify potential cellular sources of IL-1α in response to pulmonary challenge with A. fumigatus. Within the lung of a naïve mouse several potential sources of IL-1α exist including: non-hematopoietic cells (epithelial and endothelial cells), alveolar macrophages in the airway spaces, and CCR2+ monocytes within the lung parenchyma. During pulmonary Mycobacterium tuberculosis infection two distinct populations of myeloid cells co-express IL-1α and IL-1β: inflammatory monocytes which are CD11b+ CD11c− Ly6c+ and monocytic dendritic cells which are CD11b+ CD11c+ . In response to pulmonary A. fumigatus challenge, CCR2+ inflammatory monocytes are rapidly recruited to the lung and give rise to monocyte-derived dendritic cells that play essential roles in innate defense against invasive aspergillosis . Interestingly, both CCR2+ inflammatory monocytes and monocyte-derived dendritic cells show increased transcription of the Il1a gene at 48 h post-A.fumigatus challenge , but whether lung-resident CCR2+ monocytes could contribute to IL-1α production at early times after infection was not explored.
Thus, we challenged either C57BL/6 or CCR2-depleter mice [10,50], which had been treated one day prior with 250 ng of diphtheria toxin, with ∼5×107 conidia of A. fumigatus. To confirm depletion of the CCR2+ monocytes we quantified CCR2+ inflammatory monocytes (identified as CD45+CD11b+Ly6C+Ly6G−) in the BALF and lung parenchyma 8 h after A. fumigatus challenge by flow cytometry. We found that diphtheria toxin had no effect on CCR2+ monocytes in control animals, while CCR2-depleter mice treated with DT had no detectable Ly6C+ inflammatory monocytes, in the BALF or lung parenchyma as expected (Fig. 6A) . We found that IL-1α protein levels were significantly decreased when CCR2+ monocytes were absent (Fig. 6B) consistent with the idea that lung-resident CCR2+ inflammatory monocytes are important for producing and/or inducing expression of this cytokine in the lung at early times after infection. Since blocking IL-1α in mice significantly decreased the expression of CXCL1 in the lungs (Fig. 5), we next asked whether CXCL1 protein levels were diminished in the lung parenchyma of the CCR2-depleter mice. We found that CXCL1 protein levels were also significantly decreased in the absence of CCR2+ monocytes (Fig. 6C). Thus, CCR2+ monocytes are important regulators of the early expression of IL-1α and CXCL1. Consistent with the importance of these factors in promoting early neutrophil recruitment (Fig. 2 and 4), diminished IL-1α and CXCL1 levels in CCR2-depleter mice correlated with diminished recruitment of neutrophils to the airways 8 h after A. fumigatus challenge (Fig. 6D). Thus, CCR2+ monocytes are important regulators of the early expression of IL-1α and CXCL1, which are required for optimal recruitment of neutrophils at early times after A. fumigatus challenge.
C57BL/6 or CCR2-depleter mice were treated i.p. with 250 ng of DT 24 h prior to challenge with 5×107 Af293 conidia. (A) Naïve C57BL/6 or CCR2-depleter mice or C57BL/6 or CCR2-depleter mice challenged eight hours prior were euthanized and the BALF and lung tissue collected for flow cytometric analysis to assess depletion of target cells by DT. Plots are gated on CD45+ CD11b+ cells and show Ly6c and Ly6g staining, which identify the CCR2+ monocytes and neutrophils, respectively. (B) IL-1α and (C) CXCL1 protein levels in the lung parenchyma at 8 h post-challenge with 5×107 conidia of A. fumigatus strain Af293 were measured using ELISA assays. Bar graphs show the group means ± one SEM. (D) Eight hours post-challenge with 5×107 conidia of A. fumigatus strain Af293, neutrophils in the BALF were enumerated. Data are representative (B-C) or pooled (D) from two independent experiments consisting of 4 mice per group. Each symbol represents an individual mouse and the line represents the group mean. Statistically significant differences were determined using a one-way ANOVA with Bonferroni’s post-test compared C57BL/6 mice (*p < 0.05, **p < 0.01).
CXCL1 supplementation of Il1r1-deficient mice enhances neutrophil recruitment and resistance to pulmonary Aspergillus fumigatus challenge
As both Il1r1-deficient mice and anti-IL1α treated mice displayed significantly decreased cellular infiltration into the BALF (Fig. 2D and 4C) that correlated with decreased abundance of CXCL1 (Fig. 5), we next sought to test whether immunotherapy which enhances neutrophil accumulation in the lungs, such as CXCL1 supplementation, could enhance control of A. fumigatus growth in the Il1r1-deficient mice. We challenged either C57BL/6 or Il1r1-deficient mice with ∼5×107 conidia of A. fumigatus. Three hours after challenge mice were treated i.t. with either PBS or 0.5 μg CXCL1. As expected, Il1r1-deficient mice displayed a significant impairment in controlling A. fumigatus germination at 48 h when compared with C57BL/6 mice (Fig. 7A-B). Provision of CXCL1 to Il1r1-deficient mice could partially rescue control of A. fumigatus germination in the lungs, while no enhancement in control of fungal growth was observed in the CXCL1 treated C57BL/6 mice (Fig. 7A-B). Furthermore, provision of CXCL1 i.t. rescued the impairment of anti-IL1α treated C57BL/6 mice in controlling A. fumigatus infection (S5A Fig.). As expected, twenty-four hours after challenge the recruitment of neutrophils, but not macrophages, to the BALF in Il1r1-deficient mice was enhanced by the provision of CXCL1 (Fig. 7C). Additionally, neutrophil recruitment to the BALF in anti-IL1α treated C57BL/6 mice was significantly enhanced (S5B Fig.). While CXCL1 provision enhanced neutrophil accumulation in the airways of Il1r1-deficient mice, we also sought to test whether the anti-hyphal activity of neutrophils was altered in the absence of IL-1RI signaling but exogenous addition of CXCL1. Hyphal damage induced by neutrophils isolated from the bone marrow of respective mouse genotypes was assessed using the XTT hyphal damage assay . C57BL/6 bone marrow neutrophils induced robust hyphal damage when co-cultured with A. fumigatus, which was not further enhanced by treated with 50 nM of CXCL1 (Fig. 7D). Interestingly, Il1r1-deficient bone marrow neutrophils induced significantly less damage to A. fumigatus hyphae than was observed with C57BL/6 bone marrow neutrophils (Fig. 7D). In contrast to the treatment of C57BL/6 bone marrow neutrophils, treatment of Il1r1-deficient bone marrow neutrophils with 50 nM of CXCL1 significantly enhanced the anti-hyphal activity of those cells (Fig. 7D). When cell death and endothelial/epithelial cell leakage were assessed in vivo by lactate dehydrogenase (LDH) and albumin measurement, respectively, in the BALF both markers were increased in the absence of IL-1RI (Fig. 7E-F). CXCL1 supplementation reduced both markers, but albumin levels were more dramatically reduced than LDH levels (71% versus 32%, respectively) (Fig. 7E-F). Thus, provision of CXCL1 could significantly enhance neutrophil recruitment to the lungs in the absence of IL-1α signaling and enhanced the in vitro anti-hyphal activity of Il1r1-deficient bone marrow neutrophils, which together ultimately resulted in a partial repair of the A. fumigatus control mechanisms in the Il1r1-deficent lungs.
C57BL/6 mice and Il1r1-deficient mice were challenged i.t. with 5×107 CEA10 conidia. Three hours post-challenge mice were given 0.5 μg CXCL1 i.t. or PBS alone. Twenty-four hours post-infection, mice were euthanized, BALF collected, and lungs saved for histological analysis. (A) Formalin-fixed lungs were paraffin embedded, sectioned and stained with H&E (top) or GMS (bottom) for analysis by microscopy. Representative lung sections from Il1r1-deficient mice challenged with CEA10 for 48 h and treated with either PBS or CXCL1 are shown using either the 4× (left) or 20× (right) objectives. (B) A. fumigatus germination rates were assessed at 48 h of infection by microscopically counting both the number of conidia and number of germlings in GMS-stained section. Number of conidia and number of germlings were counted for each GMS-stained section to quantify the percent germination. (C) Macrophage and neutrophil recruitment in Il1r1-deficient mice 24 h post-challenge infected with A. fumigatus treated with PBS or CXCL1 given i.t. was determined via cytospins.(D) Bone marrow neutrophils from C57BL/6 and Il1r1-deficient mice were incubated with CEA10 germlings in vitro at a 10:1 ratio in normoxia for 2 h. The XTT assay was used to determine percent fungal damage. (E) Lung damage and (F) leakage were assessed by measuring LDH and albumin, respectively. Data is representative of at least two independent experiments consisting of three to five mice per group, except for the bone marrow neutrophil anti-hyphal XTT assay which is a single experiment which consisted of pooled bone marrow neutrophils from three mice done in triplicate. Each symbol represents an individual mouse or replicate and the line represents the group mean. Statistically significant differences were determined using a one-way ANOVA with Bonferroni’s post-test (*p < 0.05, **p < 0.01, ***p < 0.001, ns = not significant).
In this study, we uncover an essential function for IL-1RI in preventing fungal proliferation and host damage in murine lungs. We have demonstrated a novel dichotomy for the IL-1 cytokines in regulating the innate immune response induced by A. fumigatus. Specifically, IL-1α is required for initiating the correct inflammatory signals necessary for optimal leukocyte recruitment, while the inflammasome and IL-1β was necessary for optimal anti-fungal activity against fungal hyphae. We have elucidated that IL-1α plays the dominant role in activating IL-1RI signaling which results in amplified CXCL1 expression, which correlated with optimal leukocyte recruitment to the respiratory tract. CCR2+ monocytes were important cells in regulating the early production of IL-1α, CXCL1, and neutrophil recruitment. Taken together, our data demonstrate that signaling through IL-1RI by both IL-1α and IL-1β was necessary for optimal control of A. fumigatus pulmonary challenge to prevent IPA development.
IL-1RI signaling was essential in resisting pulmonary A. fumigatus challenge in our studies, as demonstrated by Il1r1-deficient mice being unable to resist fungal growth resulting in significant mortality in those animals. This finding is consistent with results reported by Pearlman and colleagues who also found that Il1r1 was needed to prevent the development of A. fumigatus induced keratitis . Moreover, van de Veerdonk and colleagues have recently shown that a polysaccharide fungal virulence factor, galactosaminogalactan (GAG), from A. fumigatus induces the expression of IL-1Ra, which antagonizes IL-1 signaling resulting in enhanced susceptibility to IPA . Gresnigt et al demonstrated that GAG pretreatment of BALB/c mice resulted in more fungal growth associated with impaired neutrophil recruitment, which was completely dependent on IL-1Ra expression . However, the importance of GAG induction of IL-1Ra during a live pulmonary A. fumigatus infection remains unknown. GAG expression might actually be reduced at specific infection sites during in vivo A. fumigatus challenge because hypoxia, which occurs after A. fumigatus challenge has been observed to reduce GAG production . In general, the temporal and spatial dynamics of fungal cell wall PAMPs in vivo during an active infection is not fully understood and likely complicated by the heterogeneous nature of the lung and infection site microenvironments.
Downstream of IL-1RI the proximal signaling adapter to propagate IL-1 signaling is MyD88. Similar to our observation with Il1r1-deficient mice, Marr and colleagues and Hohl and colleagues (Jhingran A. et al, in press) have found the Myd88-deficient mice are more susceptible to A. fumigatus challenge. Additionally, impaired control of pulmonary histoplasmosis and disseminated candidiasis was observed in Il1r1-deficient and Il1a/Il1b-doubly deficient mice, respectively [41,45]. While our studies and the studies just discussed strongly support a role for IL-1RI signaling in limiting IPA, and other invasive fungal infections, Romani and colleagues have observed that Il1r1-deficient mice were more resistant to pulmonary A. fumigatus challenge . The difference with our study is potentially due to the A. fumigatus strain studied, as Romani and colleagues have shown that different A. fumigatus strains have diverse abilities to induce pathology and immune responses . Importantly, the infection models studied are significantly different, with Romani and colleagues utilizing a cyclophosphamide-induced immunosuppression model with Aspergillus conidia delivered on 3 consecutive days intranasally , while our studies used immunocompetent mice and a single dose of Aspergillus conidia given intratracheally. Additionally Bellocchio et al. , reported that histological analyses in the Il1r1-deficient mice revealed “numerous fungal elements in the relative absence of signs of inflammatory pathology” which is consistent with the results we report here in our experimental model. Murine mortality in infectious disease models can result from direct pathogen mediated damage or immunopathogenesis, and it is unclear, in this regard, how our models differ. What appears to be clear, however, is that in the absence of IL-1RI signaling, Aspergillus proliferation increases in vivo. Taken together, all these findings demonstrate that the IL-1 signaling pathway is likely central for resistance to fungal diseases, but their role during immunosuppression and frequency of fungal exposure/quantity may differ, warranting further exploration of the IL-1 cytokine family in each clinically relevant model of IPA.
In further support of our observation, the protective role of IL-1 cytokines in anti-fungal immunity uncovered in our study using the murine model of A. fumigatus infection is likely to be operational in humans as indicated by genetic linkage studies. First, individuals with SNPs in the IL-1 gene cluster, which are associated with decreased IL-1 dependent inflammatory events, were at increased risk for the development of IPA [25,26]. Second, polymorphisms in the CIAS1 gene play a central role regulating inflammasome activity and IL-1β production, which can alter the risk of a subset of patients to developing recurrent vulvovaginal candidiasis . Third, macrophages from patients with chronic cavitary pulmonary aspergillosis (CCPA) had prolonged expression of Il1a and Il1b after A. fumigatus treatment when compared to healthy controls and SNPs in the Il1b and Il1rn loci are associated with susceptibility to developing CCPA . Thus, targeting the IL-1 cytokine pathways in humans could be important in managing fungal infections.
In previous papers exploring the role of MyD88 during A. fumigatus [44,51] it was shown that fungal growth was not controlled, but the mechanism impaired in the absence of IL-1RI and MyD88 signaling remains an open question. In this study and a parallel study by Jhingran et al (in press) it was demonstrated that MyD88 and IL1RI mediated signals are necessary for optimal leukocyte recruitment after pulmonary A. fumigatus challenge, which is needed for preventing the development of IPA. Analogously, in the A. fumigatus keratitis model both Myd88- and Il1r1-deficient mice demonstrated reduced cellular infiltrate early after inoculation . However, why the lack of IL-1RI or MyD88 signaling results in decreased cellular infiltrates was an open question. Interestingly, we found a decrease in the expression of the chemokine CXCL1 in Il1r1-deficient mice, which others have also observed in challenged Myd88-deficient mice (Jhingran A. et al, in press). CXCL1, together with CXCL2 and CXCL5, are ligands for CXCR2 and are key chemoattractants for recruitment of neutrophils. Administration of a blocking anti-CXCR2 antibody or genetic ablation of Cxcr2 has been shown to exacerbate mortality and delay neutrophil recruitment following pulmonary A. fumigatus challenge [23,24]. Moreover, transient over-expression of CXCL1 in CC10-expressing lung epithelial cells resulted in significantly enhanced leukocyte accumulation and reduced fungal burden . Correspondingly, when we treated Il1r1-deficient mice with recombinant murine CXCL1 we observed significantly enhanced neutrophil accumulation. In addition, Il1r1-deficient bone marrow neutrophils displayed decreased anti-hyphal activity in vitro, which was restored by treatment with CXCL1. These data demonstrate that both IL-1RI and CXCL1 signaling is critical in not only enhancing neutrophil recruitment to the airways in the Il1r1-deficient mice, but also in inducing the optimal anti-hyphal state of the recruited neutrophils. While the mechanism behind CXCL1 mediated anti-hyphal activity in our model is unknown, neutrophils from Cxcl1-deficient mice have an impaired reactive oxygen response in a polymicrobial sepsis model . Moreover, Cxcl1-deficient neutrophils stimulated with Klebsiella pneumoniae had reduced expression of p67phox and p47phox and reduced production of myeloperoxidase, nitric oxide, and hydrogen peroxide, which results in decreased killing of Klebsiella pneumoniae by the neutrophils . Finally, IL-8 has been shown to be important for priming the human neutrophils reactive oxygen burst . Thus, our data supports a model where IL-1RI signaling is critical for optimal neutrophil recruitment and activation of their anti-hyphal activity in part through the regulation of CXCL1 abundance. Further support for this conclusion comes from a recent analysis of mice with a myeloid deficiency of the transcriptional regulator HIF1α. Loss of myeloid HIF1α results in severe susceptibility to the same strain of A. fumigatus utilized here in part through reduction in neutrophil recruitment. Importantly, loss of HIF1α resulted in decreased IL1-α and CXCL1 levels after A. fumigatus challenge similar to what we observed in our studies . Interestingly, other inflammatory pathways are also temporally regulating neutrophil recruitment after A. fumigatus challenge, because Card9-deficient mice had a late defect in neutrophil recruitment that was associated with a more global diminution of the inflammatory milieu . In addition to the early defect in neutrophil recruitment Il1r1-deficient mice also had decreased macrophage recruitment to the airways by 48 h post-inoculation. The reason for this is unknown at this time, but it is known that G-CSF deficient mice have monocyte defects and our cytokine analysis demonstrated that Il1r1-deficient mice had significantly lower level of G-CSF in the airways . Thus, further studies exploring the regulation of multiple neutrophil chemotactic pathways, such as CXCR2-, CCR1-, IL17-, leukotriene-, and complement-dependent pathways, and monocyte chemotactic pathways, such as G-CSFR—and CCR2-dependent pathways, are needed after pulmonary fungal challenge.
IL1RI, together with IL1RAcP, is the high-affinity receptor for both IL-1α and IL-1β . The maturation and secretion of IL-1α and IL-1β is known to be regulated by distinct proteolytic pathways dependent on calpain and caspase-1, respectively [27,63]. Numerous fungal pathogens have been shown to activate the inflammasome resulting in the production of IL-1β [30,31,32,33,34,35,36,37]. Importantly for our studies, others have demonstrated that the NLRP3-ASC-Caspase1 inflammasome could be activated by A. fumigatus , but the in vivo relevance of that finding was unknown. Control of C. albicans infection, which also activated the NLRP3-ASC inflammasome, was highly dependent on NLRP3 and IL-1β [30,36,37,41]. In sharp contrast, our current results indicate that the inflammasome only plays a modest role in the control of pulmonary A. fumigatus growth. In our experiments, neutrophil recruitment in mice lacking the inflammasome was completely normal, which is in contrast to C. albicans infection where mice deficient in IL-1β displayed a significant reduction in neutrophil recruitment . Furthermore, antibody blockade of IL-1β during pulmonary Histoplasma capsulatum infection resulted in decreased survival associated with decreased recruitment of Gr-1+ cells early and CD4+ cells late to the lungs of challenged animals . Thus, we were surprised to observe such a dominant role for IL-1α in regulating early leukocyte recruitment following pulmonary A. fumigatus challenge, which correlates with its regulation of the chemokine CXCL1. In support of this finding, during sterile inflammation the importance of IL-1α in regulating neutrophil recruitment is unquestionable [38,39]. It has also been demonstrated that IL-1α plays a critical role during murine L. pneumophila infection, initiating neutrophil recruitment and the inflammatory response early after infection . Others have previously shown that IL-1RI and MyD88 expression within a radioresistant population of cells was essential for optimal expression of CXCL1 and CXCL2 during L. pneumophila infection . Interestingly, in their parallel study Hohl and colleagues found that IL-1RI/MyD88 signaling in a radioresistant cell population was necessary for optimal CXCL1 expression and neutrophil recruitment early after pulmonary A. fumigatus challenge (Jhingran A. et al, in press).
Because of the early importance of IL-1 cytokines in regulating the pulmonary anti-fungal immune response, non-hematopoietic cells (epithelial or endothelial cells) or lung-resident myeloid cells could represent potential sources of IL-1α and IL-1β after A. fumigatus challenge. During pulmonary Mycobacterium tuberculosis infection two distinct populations of myeloid cells co-express IL-1α and IL-1β: inflammatory monocytes which are CD11b+ CD11c− Ly6c+ and monocytic dendritic cells which are CD11b+ CD11c+ . After pulmonary A. fumigatus challenge both inflammatory monocytes and monocytic dendritic cells are found in the lung parenchyma and both show increased transcription of the Il1a gene . Here our data demonstrates that CCR2+ monocytes are at least one of the important cell types regulating the early expression of IL-1α and CXCL1, as well as neutrophil recruitment at 8 hpi. However, in the absence of CCR2+ monocytes there is still a significant amount of IL-1α and CXCL1 produced in the lungs after A. fumigatus challenge, thus there are likely multiple sources of IL-1α that can regulate early pulmonary neutrophil accumulation. Moreover, by 48 h after infection CXCL1 levels and neutrophil recruitment to the lung is unaffected in CCR2-depleter mice , thus suggesting that distinct mechanisms of neutrophil recruitment are operational at various times after infection. This is supported by observation that Myd88-deficient and Card9-deficient mice have early or late defects in neutrophil recruitment, respectively (Jhingran A. et al, in press and ).
In our experiments the inflammasome and IL-1β appear to regulate the anti-fungal activity of macrophages against hyphae, especially under hypoxic conditions. This enhancement of anti-fungal activity in hypoxic microenvironments is physiologically and clinically important because hypoxia can be generated within the lungs of mice with IPA , which is coincident with inflammatory monocyte arrival to the lungs . Understanding how hypoxia can enhance the anti-fungal activity of macrophage in an inflammasome and IL-1β dependent manner will be important in understanding how macrophages limit fungal growth. Interestingly, a recent paper from Torres et al demonstrated that acidosis, which can be driven by hypoxia, resulted in increased IL-1β production in response to P. aeruginosa challenge . Perhaps somewhat surprisingly, in the absence of MyD88 anti-fungal activity against A. fumigatus conidia remains intact (Jhingran A. et al, in press). It has been shown in other fungal pathogens that IL-1β treatment of human peripheral blood leukocytes enhances their anti-fungal activity against Paracoccidiodies brasiliensis [66,67]. Additionally, Il1r1- and Nlrp3-deficient macrophages have impaired antifungal activity against P. brasiliensis . In contrast, during disseminated candidiasis Il1a-deficiency was associated with decreased anti-fungal activity of leukocytes . Thus, studies designed to understand the differential dependencies of the IL-1 cytokines in regulating leukocyte recruitment and anti-fungal activity during a range of fungal diseases and morphological forms are needed.
In addition to understanding the cellular source of IL-1α and IL-1β, understanding the inflammatory pathways leading to expression of IL-1α and IL-1β are essential to our understanding of resistance to IPA. In the absence of dectin-1 signaling there is decreased expression of both IL-1α and IL-1β [68,69]. The loss of HIF1α in the LysM-expressing cells also resulted in decreased IL-1α levels after A. fumigatus challenge , which can be regulated by dectin-1 agonists such as β-glucan . Pulmonary A. fumigatus infection results in significant tissue damage and cell death, but the exact type of cell death is not known. Moreover, the phenotype of cell death will be shaped by the hypoxic microenvironment found during IPA. The type of cellular death occurring in vivo during A. fumigatus will have important immunological impacts shaping the early IL-1α and IL-1β response because necrotic cell death favors IL-1α release while pyroptosis favors IL-1β release . Interestingly, C. albicans mutants with defects in inducing pyroptosis also demonstrated defects in inducing IL-1β secretion, but IL-1α release was not examined . Additionally, understanding how deficiencies in PRR signaling alters the overall inflammatory response will be crucial as patients with SNPs in PRRs are known to have elevated risks for developing IPA . Our data demonstrate that in the Pycard-deficient mice there are elevated levels of TNFα, CCL3, and CCL4. One explanation for observing elevated levels of TNFα, CCL3, and CCL4 could be the range or degree that PRRs are being engaged in the Pycard-deficient mice and/or temporal and spatial dynamics of fungal cell wall PAMP engagement with PRRs in vivo that are not fully understood and further complicated by a PRR known to be engaged during infection now being absent.
It is well defined that prolonged corticosteroid treatment increases susceptibility of hosts to IPA . Interestingly, dexamethasone induces the expression and release of IL-1RII . IL-1RII is known to limit the activity of IL-1 cytokines and/or sequester IL-1α protein in the cytosol, preventing the cleavage of IL-1α by calpain . Dexamethasone has also been shown to impair IL-1α and IL-1β secretion from human mast cells in response to Pseudomonas aeruginosa stimulation . Moreover, dexamethasone treatment of bronchoalveolar macrophages prior to treatment with A. fumigatus conidia significantly impaired their release of IL-1α [77,78]. Because we have uncovered such a prominent role for IL-1α in controlling pulmonary A. fumigatus challenge, future studies exploring the cleavage status of IL-1α and expression of IL-1RII in clinically relevant models are critical.
Finally, the importance of appropriate activation of leukocytes in the control of A. fumigatus is highlighted by patients with chronic granulomatous disease being highly susceptible to A. fumigatus [15,16,17]. Interestingly, CGD patients or mice are typically in a hyperinflammatory state, which is linked to inflammasome activity and IL-1β expression [79,80]. Further, blockade of IL-1 cytokines in p47phox-deficient mice through treatment with hIL1ra results in improved control of A. fumigatus . Together, these studies demonstrate that further exploration of the positive and negative regulators of IL-1 signaling during invasive fungal infections is needed. Moreover, it is critical that we continue to explore the regulation of the inflammatory response induced in each of the different subpopulations of hosts susceptible to developing invasive fungal infections in order to develop patient specific novel immunotherapeutic approaches that could complement treatment with anti-fungal agents.
Materials and Methods
C57BL/6J mice were bred in-house. Pycard (ASC)-deficient and Myd88-deficient mice were originally provided by Dr. Vishiva Dixit (Genentech) and Dr. Mark Jutila (Montana State University), respectively. Il1r1-deficient (Stock #003245) and C57BL/6 (Stock #000664) mice were originally purchased from Jackson Laboratories. Mouse strains were then bred in-house. The CCR2-depleter (CCR2-DTR) strain was generated on the C57BL/6 background as previously described [10,50]. Control animals for CCR2+ monocyte depletion experiments were sex—and age-matched, non-transgenic littermates. All mice were 8–10 weeks of age at the time of infection. All animal experiments were approved by the Montana State University or Rutgers University Institutional Animal Care and Use Committee.
Preparation of Aspergillus fumigatus conidia
A. fumigatus strain CEA10 or Af293 was grown on glucose minimal media (GMM) agar plates for 3 days or Sabouraud dextrose agar (SDA) for 7–10 days at 37°C, respectively. Conidia were harvested by adding 0.01% Tween 80 to plates and gently scraping conidia from the plates using a cell scraper. Conidia were then filtered through sterile Miracloth, were washed and resuspended in phosphate buffered saline (PBS), and counted on a hemacytometer.
Aspergillus fumigatus challenge pulmonary model
Mice were challenged with A. fumigatus conidia by the i.t. route. Mice were anesthetized with 2.5% 2,2,2-tribromoethanol or a Ketamine/Xylazine solution given i.p.; subsequently, mice were challenged i.t. with ∼5 × 107 A. fumigatus conidia in a volume of 100 μl. At the indicated time after A. fumigatus challenge, mice were euthanized using a lethal overdose of pentobarbital. Bronchoalveolar lavage fluid (BALF) was collected by washing the lungs with 2 ml of PBS containing 0.05M EDTA. BALF was clarified by centrifugation and stored at −20°C until analysis. BAL cells were resuspended in 200 μl of PBS and total BAL cells were determined by hemacytometer count. BAL cells were subsequently spun onto glass slides using a Cytospin4 cytocentrifuge (Thermo Scientific) and stained with Diff-Quik stain set (Siemens) for differential counting. For histological analysis lungs were filled with and stored in 10% buffered formalin phosphate for at least 24 hours. Lungs were then embedded in paraffin and sectioned into 5-micron sections. Sections were stained with H&E and GMS using standard histological techniques to assess lung inflammatory infiltrates and fungal germination, respectively. For cytokine analysis lungs were homogenized in 2 ml of PBS. After clarification, lung homogenates were stored at −20°C until analysis.
Neutralizing antibodies and chemokine reconstitution
For IL-1α neutralization studies, normal goat IgG control and anti-mIL-1α neutralizing antibody were purchased from R&D systems. IgG control or anti-mIL-1α neutralizing antibody were administered i.p. at 40 μg per mouse. Administration of neutralizing antibody was given every other day, beginning the day prior to A. fumigatus challenge. For CXCL1 reconstitution studies, recombinant murine CXCL1 was purchased from PeproTech. CXCL1 was administered i.t. at 0.1–0.5 μg per mouse and was given 3 hours after A. fumigatus challenge. For the hIL1ra studies, recombinant hIL1ra and the appropriate placebo (Amgen) were kindly provided by Dr. Charles A. Dinarello. The hIL1ra and placebo were administered i.p. at 200 mg per mouse given at −24, 0, and +24 h relative to A. fumigatus challenge.
CCR2+ cell depletion strategy
For depletions of CCR2+ cells, CCR2-DTR mice and control littermates received 250 ng of diphtheria toxin i.p. one day prior to infection. Diphtheria toxin was purchased from List Biological Laboratories (Campbell, CA) and reconstituted at 1 mg/ml in PBS. Aliquots were stored at −80°C. The specificity and efficiency of depletion in the lung was confirmed by flow cytometry.
Quantification of lung damage and leakage
To assess lung damage, bronchoalveolar lavage fluid was analyzed by measuring lactate dehydrogenase levels using a CytoTox 96 Cytotoxicity Assay (Promega) following the manufacturer’s instructions. To assess vascular/pulmonary leakage, bronchoalveolar lavage fluid was analyzed using an Albumin BCG Reagent Set (Eagle Diagnostics). A standard curve was made by diluting the calibrator in PBS. Then 100 μl of sample or standard was transferred to a 96 well flat-bottomed plate, mixed with 100 μl of BCG reagent, let sit at RT for 5 min and then read on a plate reader at 630 nm.
Lung cell isolation and flow cytometric analysis
After collection of the BAL fluid, lung samples were minced in RPMI containing 100 units/ml of collagenase (Gibco) at 37°C for 60 minutes, followed by disruption through a 40-μm filter. After which, red blood cells were lysed using a Tris ammonium chloride solution. Staining of ∼107 cells was performed in 200 μl of PBS containing 2% bovine serum and 2 mM EDTA. For analysis of leukocytes, antibody staining was both conducted at 4°C for 30 minutes. Phenotypic analysis of leukocytes was conducted using a panel of cell surface markers: CD11b, CD11c, Ly6g, Ly6c, 7/4, CD19, and I-A/I-E, as previously described . All antibodies used for analysis were purchased from Biolegend, BD Biosciences, eBioscience or Novus Biologicals. After staining, cells were washed and fixed with 1% paraformaldehyde in PBS. Fluorescent intensities were measured using an LSR (BD Biosciences) and data were analyzed using FlowJo software (Tree Star).
Assay for cytokine, chemokine, and soluble receptor secretion
Bronchoalveolar lavage fluid and lung homogenates from C57BL/6 mice challenged with A. fumigatus for 6, 12, 24, and 48 h were initially analyzed for cytokines and chemokines using ProcartaPlex Mouse Cytokine & Chemokine 36-plex (Affymetrix-eBioscience). IL-1Ra levels were determined by ELISA (R&D Systems). Plates were read using a BioPlex 200 (Bio-Rad) or a SpectraMax Paradigm plate reader (Molecular Devices).
Growth of bone marrow-derived macrophages (BMDM)
Femurs and tibias from 8–10 week old mice were obtained and centrifuged to collect bone marrow. Cells were resuspended in media containing RPMI 1640, 2 mM L-glutamic acid, 50 mg/l gentamycin, 100 U/ml penicillin/streptomycin, 30% L929 cell supernatant, 20% FBS and 0.0004% 2-ME. On day 3 fresh medium was added to the cultures. Cells were incubated for a total of 6 days at 37°C and 5% CO2.
Isolation of bone marrow neutrophils
Bone marrow neutrophils were isolated from femurs and tibias from 8–12 week old C57BL/6 and Il1r1-deficient mice as previously described . Briefly, single cell suspensions of bone marrow in HBSS containing 0.1% FBS and 1% glucose were resuspended in 3 ml of 45% Percoll (GE Healthcare). A discontinuous Percoll gradient was set-up consisting of (top to bottom) 3 ml 45%, 2 ml 50%, 2 ml 55%, 2 ml 62%, and 3 ml 81%. Gradients were then centrifuged for 30 min at 1600 × g in a Sorvall Legend Mach 1.6R benchtop centrifuge. Bone marrow neutrophils were collected from the 62%/81% border and washed with HBSS before counting and viability assessment.
In vitro fungal damage assay
An XTT assay was used to measure fungal metabolic activity as previously described . Bone marrow derived macrophages and CEA10 germlings were incubated together in normoxic or hypoxic conditions at a 10:1 (effector:target) ratio for 5 hours. Bone marrow neutrophils and CEA10 germlings were incubated together in normoxic conditions at a 10:1 (effector:target) ratio for 2 hours with or without 50 nM CXCL1 . Following incubation, macrophages or neutrophils were lysed and the remaining fungi were incubated with 0.4 mg/ml XTT and 0.05 mg/ml coenzyme Q for 1 h and the optical density (OD) subsequently measured on a spectrophotometer at a wavelength of 450 nm. The percent fungal damage was defined by the equation: (1-[A450 of fungi with cells—A450 of cells alone] / [A450 of fungi alone]) * 100.
S1 Fig. hIL-1ra treatment results in impaired control of Aspergillus fumigatus.
C57BL/6 mice were treated with recombinant hIL-1ra or placebo and infected i.t. with 5×107 CEA10 conidia. Forty-eight hours post-infection, mice were euthanized, BALF collected, and lungs saved for histological analysis. Formalin-fixed lungs were paraffin embedded, sectioned, and stained with GMS for analysis by microscopy. A. fumigatus germination rates were assessed at 48 h of infection by microscopically counting both the number of conidia and number of germlings in GMS-stained section. Number of conidia and number of germlings were counted for each GMS-stained section to quantify the percent germination. Data are representative of one experiment consisting of 5 mice per group. The bar graph show the group means ± one SEM. Statistically significant differences were determined using a Student’s t-test (**p < 0.01).
S2 Fig. Impaired neutrophil recruitment in the lung parenchyma of Il1r1-deficient mice.
C57BL/6, Il1r1-deficient, and Pycard-deficient mice were challenged i.t. with 5×107 CEA10 conidia. At 12, 24, and 36 h post-challenge, mice were euthanized, BALF and lungs collected for flow cytometric analysis of neutrophil, monocyte, and dendritic cell populations with the lungs, like previously done . (A) Neutrophils in the lungs were identified as being CD45+ Ly6g+ 7/4+. (B-E) Lungs were digested in collagenase to generate single cell suspensions, after which cells were stained for flow cytometric analysis. Lung neutrophils were identified as CD45+ CD11b+ Ly6g+ 7/4+ (B), CD11b+ macrophages were identified as CD45+ Ly6g− CD11b+ CD11c− CD103− (C), CD11c+ macrophages were identified as CD45+ Ly6g− CD11b+ CD11c+ CD103− (D), CD103+ dendritic cells were identified as CD45+ Ly6g− CD11b− CD11c+ CD103+ (E). Each time-point represents 8–10 mice pooled from two independent experiments. Data are presented as box and whisker plots with Tukey whisker and outliers displayed as dots. Statistically significant differences were determined using a one-way ANOVA with Bonferroni’s post-test (*p < 0.05; **p < 0.01).
S3 Fig. Myd88-deficient mice are impaired in their ability to recruit neutrophils after Aspergillus fumigatus challenge.
Age-matched C57BL/6 or Myd88-deficient mice were infected i.t. with 5×107 CEA10 conidia and at indicated time-points, mice were euthanized, and BALF collected. Total macrophage (left panel) and neutrophil (right panel) recruitment in the BALF was measured at 12 and 24 h post-challenge. Data are representative of at least 2 independent experiments at each time point consisting of 3–5 mice per group. Bar graphs show the group means ± one SEM. Statistically significant differences were determined using Student’s t-test (*p < 0.05; **p < 0.01).
S4 Fig. Pycard-deficient mice treated with IL-1α neutralizing antibody are highly susceptible to Aspergillus fumigatus infection.
C57BL/6 or Pycard-deficient mice treated with isotype control antibody or IL-1α neutralizing antibody were infected i.t. with 5×107 CEA10 conidia. Twenty-four hours post-infection mice were euthanized, BALF collected and lungs saved for histological analysis. Formalin-fixed lungs were paraffin embedded, sectioned, and stained GMS for analysis by microscopy. A. fumigatus germination rates were assessed 48 h after challenge by microscopically counting both the number of conidia and number of germlings in GMS-stained section. Data are representative of two independent experiments consisting of 4–5 mice per group. The bar graph show the group means ± one SEM. Statistically significant differences were determined using a one-way ANOVA with Bonferroni’s post-test (**p < 0.01, ***p < 0.001).
S5 Fig. Intratracheally provision of CXCL1 to anti-IL1α treated C57BL/6 mice increases resistance to Aspergillus fumigatus infection.
C57BL/6 mice were treated with goat IgG or anti-IL1α 24 h prior to and 24 h after i.t. challenge with 5×107 CEA10 conidia. Three hours post-challenge half the anti-IL1α treated mice were given 0.5 μg CXCL1 in PBS or PBS alone given i.t. At 48 h post-infection mice were euthanized, BALF collected, and lungs saved for histological analysis. Formalin-fixed lungs were paraffin embedded, sectioned and stained with GMS for analysis by microscopy. (A) A. fumigatus germination rates were assessed 48 h after challenge by microscopically counting both the number of conidia and number of germlings in GMS-stained section. (B) Total macrophage (left panel) and neutrophil (right panel) recruitment in the BALF was measured at 24 h post-challenge. Data are representative of two independent experiments consisting of 3–5 mice per group. Bar graphs show the group means ± one SEM. Statistically significant differences were determined using a one-way ANOVA with Bonferroni’s post-test (*p < 0.05).
Thank you to Dr. Tobias Hohl (MSKCC) who provided many helpful suggestions and shared unpublished data related to this project. The authors wish to thank Dr. Vishva Dixit (Genentech) and Dr. Mark Jutila (Montana State University) for providing the original breeding pairs of the Pycard- and Myd88-deficient mice, respectively. Thank you to Dr. Charles Dinarello for providing the hIL1ra reagent and sharing the protocol for blocking IL-1α in vivo. Also, thanks to Drs. Jovanka Voyich, Matthew Taylor, and Blake Wiedenheft (Montana State University) for helpful discussion about this project and manuscript.
Conceived and designed the experiments: AKC AR RAC JJO. Performed the experiments: AKC MML JMZ VE KMS CPW KMH AT BMB. Analyzed the data: AKC MML JMZ VE KMS CPW KMH AT AR RAC JJO. Wrote the paper: AKC JJO.
- 1. Brown GD, Denning DW, Gow NA, Levitz SM, Netea MG, et al. (2012) Hidden killers: human fungal infections. Sci Transl Med 4: 165rv113. pmid:23253612
- 2. Segal BH (2009) Aspergillosis. N Engl J Med 360: 1870–1884.
- 3. Stevens DA, Melikian GL (2011) Aspergillosis in the ‘nonimmunocompromised’ host. Immunol Invest 40: 751–766. pmid:21985304
- 4. Hayes GE, Denning DW (2013) Frequency, diagnosis and management of fungal respiratory infections. Curr Opin Pulm Med 19: 259–265. pmid:23411576
- 5. Vermeulen E, Lagrou K, Verweij PE (2013) Azole resistance in Aspergillus fumigatus: a growing public health concern. Curr Opin Infect Dis 26: 493–500. pmid:24126719
- 6. van der Linden JW, Snelders E, Kampinga GA, Rijnders BJ, Mattsson E, et al. (2011) Clinical implications of azole resistance in Aspergillus fumigatus, The Netherlands, 2007–2009. Emerg Infect Dis 17: 1846–1854. doi: 10.3201/eid1710.110226. pmid:22000354
- 7. Verweij PE, Mellado E, Melchers WJ (2007) Multiple-triazole-resistant aspergillosis. N Engl J Med 356: 1481–1483. pmid:17409336
- 8. VandenBergh MF, Verweij PE, Voss A (1999) Epidemiology of nosocomial fungal infections: invasive aspergillosis and the environment. Diagn Microbiol Infect Dis 34: 221–227. pmid:10403102
- 9. Park SJ, Mehrad B (2009) Innate immunity to Aspergillus species. Clin Microbiol Rev 22: 535–551.
- 10. Hohl TM, Rivera A, Lipuma L, Gallegos A, Shi C, et al. (2009) Inflammatory monocytes facilitate adaptive CD4 T cell responses during respiratory fungal infection. Cell Host Microbe 6: 470–481. doi: 10.1016/j.chom.2009.10.007. pmid:19917501
- 11. Mircescu MM, Lipuma L, van Rooijen N, Pamer EG, Hohl TM (2009) Essential role for neutrophils but not alveolar macrophages at early time points following Aspergillus fumigatus infection. J Infect Dis 200: 647–656. pmid:19591573
- 12. Espinosa V, Jhingran A, Dutta O, Kasahara S, Donnelly R, et al. (2014) Inflammatory monocytes orchestrate innate antifungal immunity in the lung. PLoS Pathog 10: e1003940. doi: 10.1371/journal.ppat.1003940. pmid:24586155
- 13. Cohen NR, Tatituri RV, Rivera A, Watts GF, Kim EY, et al. (2011) Innate recognition of cell wall beta-glucans drives invariant natural killer T cell responses against fungi. Cell Host Microbe 10: 437–450. doi: 10.1016/j.chom.2011.09.011. pmid:22100160
- 14. Ramirez-Ortiz ZG, Lee CK, Wang JP, Boon L, Specht CA, et al. (2011) A nonredundant role for plasmacytoid dendritic cells in host defense against the human fungal pathogen Aspergillus fumigatus. Cell Host Microbe 9: 415–424. doi: 10.1016/j.chom.2011.04.007. pmid:21575912
- 15. Ben-Ari J, Wolach O, Gavrieli R, Wolach B (2012) Infections associated with chronic granulomatous disease: linking genetics to phenotypic expression. Expert Rev Anti Infect Ther 10: 881–894. doi: 10.1586/eri.12.77. pmid:23030328
- 16. Morgenstern DE, Gifford MA, Li LL, Doerschuk CM, Dinauer MC (1997) Absence of respiratory burst in X-linked chronic granulomatous disease mice leads to abnormalities in both host defense and inflammatory response to Aspergillus fumigatus. J Exp Med 185: 207–218. doi: 10.1586/eri.12.77. pmid:9016870
- 17. Pollock JD, Williams DA, Gifford MA, Li LL, Du X, et al. (1995) Mouse model of X-linked chronic granulomatous disease, an inherited defect in phagocyte superoxide production. Nat Genet 9: 202–209. pmid:7719350
- 18. Marr KA, Carter RA, Boeckh M, Martin P, Corey L (2002) Invasive aspergillosis in allogeneic stem cell transplant recipients: changes in epidemiology and risk factors. Blood 100: 4358–4366. pmid:12393425
- 19. Wald A, Leisenring W, van Burik JA, Bowden RA (1997) Epidemiology of Aspergillus infections in a large cohort of patients undergoing bone marrow transplantation. J Infect Dis 175: 1459–1466. pmid:9180187
- 20. Perfect JR, Cox GM, Lee JY, Kauffman CA, de Repentigny L, et al. (2001) The impact of culture isolation of Aspergillus species: a hospital-based survey of aspergillosis. Clin Infect Dis 33: 1824–1833. pmid:11692293
- 21. Torres HA, Rivero GA, Lewis RE, Hachem R, Raad II, et al. (2003) Aspergillosis caused by non-fumigatus Aspergillus species: risk factors and in vitro susceptibility compared with Aspergillus fumigatus. Diagn Microbiol Infect Dis 46: 25–28. pmid:12742315
- 22. Mehrad B, Wiekowski M, Morrison BE, Chen SC, Coronel EC, et al. (2002) Transient lung-specific expression of the chemokine KC improves outcome in invasive aspergillosis. Am J Respir Crit Care Med 166: 1263–1268. pmid:12403697
- 23. Mehrad B, Strieter RM, Moore TA, Tsai WC, Lira SA, et al. (1999) CXC chemokine receptor-2 ligands are necessary components of neutrophil-mediated host defense in invasive pulmonary aspergillosis. J Immunol 163: 6086–6094. pmid:10570298
- 24. Bonnett CR, Cornish EJ, Harmsen AG, Burritt JB (2006) Early neutrophil recruitment and aggregation in the murine lung inhibit germination of Aspergillus fumigatus Conidia. Infect Immun 74: 6528–6539. pmid:16920786
- 25. Sainz J, Perez E, Gomez-Lopera S, Jurado M (2008) IL1 gene cluster polymorphisms and its haplotypes may predict the risk to develop invasive pulmonary aspergillosis and modulate C-reactive protein level. J Clin Immunol 28: 473–485. doi: 10.1007/s10875-008-9197-0. pmid:18484169
- 26. Wojtowicz A, Gresnigt MS, Lecompte T, Bibert S, Manuel O, et al. (2014) IL1B and DEFB1 Polymorphisms Increase Susceptibility to Invasive Mold Infection After Solid Organ Transplantation. J Infect Dis.
- 27. Garlanda C, Dinarello CA, Mantovani A (2013) The interleukin-1 family: back to the future. Immunity 39: 1003–1018. doi: 10.1016/j.immuni.2013.11.010. pmid:24332029
- 28. Kim B, Lee Y, Kim E, Kwak A, Ryoo S, et al. (2013) The Interleukin-1alpha Precursor is Biologically Active and is Likely a Key Alarmin in the IL-1 Family of Cytokines. Front Immunol 4: 391. doi: 10.3389/fimmu.2013.00391. pmid:24312098
- 29. Latz E, Xiao TS, Stutz A (2013) Activation and regulation of the inflammasomes. Nat Rev Immunol 13: 397–411.
- 30. Gross O, Poeck H, Bscheider M, Dostert C, Hannesschlager N, et al. (2009) Syk kinase signalling couples to the Nlrp3 inflammasome for anti-fungal host defence. Nature 459: 433–436. doi: 10.1038/nature07965. pmid:19339971
- 31. Said-Sadier N, Padilla E, Langsley G, Ojcius DM (2010) Aspergillus fumigatus stimulates the NLRP3 inflammasome through a pathway requiring ROS production and the Syk tyrosine kinase. PLoS One 5: e10008. doi: 10.1371/journal.pone.0010008. pmid:20368800
- 32. Mao L, Zhang L, Li H, Chen W, Wang H, et al. (2014) Pathogenic fungus Microsporum canis activates the NLRP3 inflammasome. Infect Immun 82: 882–892. doi: 10.1128/IAI.01097-13. pmid:24478101
- 33. Lei G, Chen M, Li H, Niu JL, Wu S, et al. (2013) Biofilm from a clinical strain of Cryptococcus neoformans activates the NLRP3 inflammasome. Cell Res 23: 965–968. doi: 10.1038/cr.2013.49. pmid:23567555
- 34. Tavares AH, Magalhaes KG, Almeida RD, Correa R, Burgel PH, et al. (2013) NLRP3 inflammasome activation by Paracoccidioides brasiliensis. PLoS Negl Trop Dis 7: e2595. doi: 10.1371/journal.pntd.0002595. pmid:24340123
- 35. Tomalka J, Ganesan S, Azodi E, Patel K, Majmudar P, et al. (2011) A novel role for the NLRC4 inflammasome in mucosal defenses against the fungal pathogen Candida albicans. PLoS Pathog 7: e1002379. doi: 10.1371/journal.ppat.1002379. pmid:22174673
- 36. Joly S, Ma N, Sadler JJ, Soll DR, Cassel SL, et al. (2009) Cutting edge: Candida albicans hyphae formation triggers activation of the Nlrp3 inflammasome. J Immunol 183: 3578–3581. doi: 10.4049/jimmunol.0901323. pmid:19684085
- 37. Hise AG, Tomalka J, Ganesan S, Patel K, Hall BA, et al. (2009) An essential role for the NLRP3 inflammasome in host defense against the human fungal pathogen Candida albicans. Cell Host Microbe 5: 487–497. doi: 10.1016/j.chom.2009.05.002. pmid:19454352
- 38. Chen CJ, Kono H, Golenbock D, Reed G, Akira S, et al. (2007) Identification of a key pathway required for the sterile inflammatory response triggered by dying cells. Nat Med 13: 851–856. pmid:17572686
- 39. Rider P, Carmi Y, Guttman O, Braiman A, Cohen I, et al. (2011) IL-1alpha and IL-1beta recruit different myeloid cells and promote different stages of sterile inflammation. J Immunol 187: 4835–4843. doi: 10.4049/jimmunol.1102048. pmid:21930960
- 40. Barry KC, Fontana MF, Portman JL, Dugan AS, Vance RE (2013) IL-1alpha signaling initiates the inflammatory response to virulent Legionella pneumophila in vivo. J Immunol 190: 6329–6339. doi: 10.4049/jimmunol.1300100. pmid:23686480
- 41. Vonk AG, Netea MG, van Krieken JH, Iwakura Y, van der Meer JW, et al. (2006) Endogenous interleukin (IL)-1 alpha and IL-1 beta are crucial for host defense against disseminated candidiasis. J Infect Dis 193: 1419–1426. pmid:16619190
- 42. Cramer RA, Rivera A, Hohl TM (2011) Immune responses against Aspergillus fumigatus: what have we learned? Curr Opin Infect Dis 24: 315–322. doi: 10.1097/QCO.0b013e328348b159. pmid:21666456
- 43. Kawai T, Akira S (2011) Toll-like receptors and their crosstalk with other innate receptors in infection and immunity. Immunity 34: 637–650. doi: 10.1016/j.immuni.2011.05.006. pmid:21616434
- 44. Bretz C, Gersuk G, Knoblaugh S, Chaudhary N, Randolph-Habecker J, et al. (2008) MyD88 signaling contributes to early pulmonary responses to Aspergillus fumigatus. Infect Immun 76: 952–958. pmid:18039832
- 45. Deepe GS Jr, McGuinness M (2006) Interleukin-1 and host control of pulmonary histoplasmosis. J Infect Dis 194: 855–864. pmid:16941354
- 46. Shepardson KM, Ngo LY, Aimanianda V, Latge JP, Barker BM, et al. (2013) Hypoxia enhances innate immune activation to Aspergillus fumigatus through cell wall modulation. Microbes Infect.
- 47. Grahl N, Puttikamonkul S, Macdonald JM, Gamcsik MP, Ngo LY, et al. (2011) In vivo hypoxia and a fungal alcohol dehydrogenase influence the pathogenesis of invasive pulmonary aspergillosis. PLoS Pathog 7: e1002145. doi: 10.1371/journal.ppat.1002145. pmid:21811407
- 48. Nizet V, Johnson RS (2009) Interdependence of hypoxic and innate immune responses. Nat Rev Immunol 9: 609–617. doi: 10.1038/nri2607. pmid:19704417
- 49. Mayer-Barber KD, Andrade BB, Barber DL, Hieny S, Feng CG, et al. (2013) Innate and adaptive interferons suppress IL-1alpha and IL-1beta production by distinct pulmonary myeloid subsets during Mycobacterium tuberculosis infection. Immunity 35: 1023–1034. doi: 10.1016/j.immuni.2011.12.002. pmid:22195750
- 50. Serbina NV, Hohl TM, Cherny M, Pamer EG (2009) Selective expansion of the monocytic lineage directed by bacterial infection. J Immunol 183: 1900–1910. doi: 10.4049/jimmunol.0900612. pmid:19596996
- 51. Leal SM Jr, Cowden S, Hsia YC, Ghannoum MA, Momany M, et al. (2010) Distinct roles for Dectin-1 and TLR4 in the pathogenesis of Aspergillus fumigatus keratitis. PLoS Pathog 6: e1000976. doi: 10.1371/journal.ppat.1000976. pmid:20617171
- 52. Gresnigt MS, Bozza S, Becker KL, Joosten LA, Abdollahi-Roodsaz S, et al. (2014) A polysaccharide virulence factor from Aspergillus fumigatus elicits anti-inflammatory effects through induction of Interleukin-1 receptor antagonist. PLoS Pathog 10: e1003936. doi: 10.1371/journal.ppat.1003936. pmid:24603878
- 53. Bellocchio S, Montagnoli C, Bozza S, Gaziano R, Rossi G, et al. (2004) The contribution of the Toll-like/IL-1 receptor superfamily to innate and adaptive immunity to fungal pathogens in vivo. J Immunol 172: 3059–3069. pmid:14978111
- 54. Rizzetto L, Giovannini G, Bromley M, Bowyer P, Romani L, et al. (2013) Strain dependent variation of immune responses to A. fumigatus: definition of pathogenic species. PLoS One 8: e56651. doi: 10.1371/journal.pone.0056651. pmid:23441211
- 55. Lev-Sagie A, Prus D, Linhares IM, Lavy Y, Ledger WJ, et al. (2009) Polymorphism in a gene coding for the inflammasome component NALP3 and recurrent vulvovaginal candidiasis in women with vulvar vestibulitis syndrome. Am J Obstet Gynecol 200: 303 e301–306. doi: 10.1016/j.ajog.2008.10.039. pmid:19254587
- 56. Smith NL, Hankinson J, Simpson A, Bowyer P, Denning DW (2013) A prominent role for the IL1 pathway and IL15 in susceptibility to chronic cavitary pulmonary aspergillosis. Clin Microbiol Infect.
- 57. Jin L, Batra S, Douda DN, Palaniyar N, Jeyaseelan S (2014) CXCL1 contributes to host defense in polymicrobial sepsis via modulating T cell and neutrophil functions. J Immunol 193: 3549–3558. doi: 10.4049/jimmunol.1401138. pmid:25172493
- 58. Batra S, Cai S, Balamayooran G, Jeyaseelan S (2012) Intrapulmonary administration of leukotriene B(4) augments neutrophil accumulation and responses in the lung to Klebsiella infection in CXCL1 knockout mice. J Immunol 188: 3458–3468. doi: 10.4049/jimmunol.1101985. pmid:22379035
- 59. Swain SD, Rohn TT, Quinn MT (2002) Neutrophil priming in host defense: role of oxidants as priming agents. Antioxid Redox Signal 4: 69–83. pmid:11970845
- 60. Shepardson KM, Jhingran A, Caffrey A, Obar JJ, Suratt BT, et al. (2014) Myeloid Derived Hypoxia Inducible Factor 1-alpha Is Required for Protection against Pulmonary Aspergillus fumigatus Infection. PLoS Pathog 10: e1004378. doi: 10.1371/journal.ppat.1004378. pmid:25255025
- 61. Jhingran A, Mar KB, Kumasaka DK, Knoblaugh SE, Ngo LY, et al. (2012) Tracing Conidial Fate and Measuring Host Cell Antifungal Activity Using a Reporter of Microbial Viability in the Lung. Cell Rep.
- 62. Lieschke GJ, Grail D, Hodgson G, Metcalf D, Stanley E, et al. (1994) Mice lacking granulocyte colony-stimulating factor have chronic neutropenia, granulocyte and macrophage progenitor cell deficiency, and impaired neutrophil mobilization. Blood 84: 1737–1746. pmid:7521686
- 63. Zheng Y, Humphry M, Maguire JJ, Bennett MR, Clarke MC (2013) Intracellular interleukin-1 receptor 2 binding prevents cleavage and activity of interleukin-1alpha, controlling necrosis-induced sterile inflammation. Immunity 38: 285–295. doi: 10.1016/j.immuni.2013.01.008. pmid:23395675
- 64. LeibundGut-Landmann S, Weidner K, Hilbi H, Oxenius A (2011) Nonhematopoietic cells are key players in innate control of bacterial airway infection. J Immunol 186: 3130–3137. pmid:21270399
- 65. Torres IM, Patankar YR, Shabaneh TB, Dolben E, Hogan DA, et al. (2014) Acidosis Potentiates the Host Pro-Inflammatory IL-1beta Response to Pseudomonas aeruginosa Infection. Infect Immun.
- 66. Kurita N, Oarada M, Brummer E (2005) Fungicidal activity of human peripheral blood leukocytes against Paracoccidioides brasiliensis yeast cells. Med Mycol 43: 417–422. pmid:16178370
- 67. Kurita N, Oarada M, Miyaji M, Ito E (2000) Effect of cytokines on antifungal activity of human polymorphonuclear leucocytes against yeast cells of Paracoccidioides brasiliensis. Med Mycol 38: 177–182. pmid:10817235
- 68. Werner JL, Metz AE, Horn D, Schoeb TR, Hewitt MM, et al. (2009) Requisite role for the dectin-1 beta-glucan receptor in pulmonary defense against Aspergillus fumigatus. J Immunol 182: 4938–4946. doi: 10.4049/jimmunol.0804250. pmid:19342673
- 69. Steele C, Rapaka RR, Metz A, Pop SM, Williams DL, et al. (2005) The beta-glucan receptor dectin-1 recognizes specific morphologies of Aspergillus fumigatus. PLoS Pathog 1: e42. pmid:16344862
- 70. Cheng SC, Quintin J, Cramer RA, Shepardson KM, Saeed S, et al. (2014) mTOR- and HIF-1alpha-mediated aerobic glycolysis as metabolic basis for trained immunity. Science 345: 1250684. doi: 10.1126/science.1250684. pmid:25258083
- 71. England H, Summersgill HR, Edye ME, Rothwell NJ, Brough D (2014) Release of IL-1alpha or IL-1beta depends on mechanism of cell death. J Biol Chem.
- 72. Wellington M, Koselny K, Krysan DJ (2013) Candida albicans Morphogenesis Is Not Required for Macrophage Interleukin 1beta Production. MBio 4. pmid:23269828
- 73. Romani L (2011) Immunity to fungal infections. Nat Rev Immunol 11: 275–288. pmid:25404119
- 74. Lewis RE, Kontoyiannis DP (2009) Invasive aspergillosis in glucocorticoid-treated patients. Med Mycol 47 Suppl 1: S271–281. pmid:18654923
- 75. Colotta F, Re F, Muzio M, Bertini R, Polentarutti N, et al. (1993) Interleukin-1 type II receptor: a decoy target for IL-1 that is regulated by IL-4. Science 261: 472–475. pmid:8332913
- 76. Lin TJ, Garduno R, Boudreau RT, Issekutz AC (2002) Pseudomonas aeruginosa activates human mast cells to induce neutrophil transendothelial migration via mast cell-derived IL-1 alpha and beta. J Immunol 169: 4522–4530. pmid:12370389
- 77. Kamberi M, Brummer E, Stevens DA (2002) Regulation of bronchoalveolar macrophage proinflammatory cytokine production by dexamethasone and granulocyte-macrophage colony-stimulating factor after stimulation by Aspergillus conidia or lipopolysaccharide. Cytokine 19: 14–20. pmid:12200108
- 78. Brummer E, Kamberi M, Stevens DA (2003) Regulation by granulocyte-macrophage colony-stimulating factor and/or steroids given in vivo of proinflammatory cytokine and chemokine production by bronchoalveolar macrophages in response to Aspergillus conidia. J Infect Dis 187: 705–709. pmid:12599092
- 79. de Luca A, Smeekens SP, Casagrande A, Iannitti R, Conway KL, et al. (2014) IL-1 receptor blockade restores autophagy and reduces inflammation in chronic granulomatous disease in mice and in humans. Proc Natl Acad Sci U S A 111: 3526–3531. doi: 10.1073/pnas.1322831111. pmid:24550444
- 80. van de Veerdonk FL, Smeekens SP, Joosten LA, Kullberg BJ, Dinarello CA, et al. (2010) Reactive oxygen species-independent activation of the IL-1beta inflammasome in cells from patients with chronic granulomatous disease. Proc Natl Acad Sci U S A 107: 3030–3033. doi: 10.1073/pnas.0914795107. pmid:20133696
- 81. Klesney-Tait J, Keck K, Li X, Gilfillan S, Otero K, et al. (2013) Transepithelial migration of neutrophils into the lung requires TREM-1. J Clin Invest 123: 138–149. doi: 10.1172/JCI64181. pmid:23241959 | <urn:uuid:9249c5d0-a7a9-4bf4-b8cf-2a0086dbeb7b> | CC-MAIN-2017-04 | http://journals.plos.org/plospathogens/article?id=10.1371/journal.ppat.1004625 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00219-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.894014 | 24,393 | 1.625 | 2 |
30% Say U.S. Heading in Right Direction
Wednesday, January 29, 2014
Thirty percent (30%) of Likely U.S. Voters continue to think the country is heading in the right direction, according to a new Rasmussen Reports national telephone survey for the week ending January 26.
That’s unchanged from the week before.
A year ago, 39% said the country was heading in the right direction.
Early last October during the federal government shutdown, confidence in the country’s course fell to 13%, the lowest finding in five years.
During President Obama’s first months in office, the number of voters who felt the country was headed in the right direction rose steadily to 40% in May 2009. In 2010 and 2011, confidence fell to the narrow range of 14% to 19%, levels similar to those measured in the final months of the George W. Bush administration. Optimism began easing up again in mid-December 2011.
Sixty-three percent (63%) of voters now think the country is headed down the wrong track. That’s up one point from the previous week. Eighty percent (80%) felt the country was on the wrong track in early October, but 57% believed that at this time last year.
(Want a free daily e-mail update? If it's in the news, it's in our polls). Rasmussen Reports updates are also available on Twitter or Facebook.
The national telephone survey of 3,500 Likely Voters was conducted by Rasmussen Reports on January 20-26, 2014. The margin of sampling error for the survey is +/- 2 percentage points with a 95% level of confidence. Fieldwork for all Rasmussen Reports surveys is conducted by Pulse Opinion Research, LLC. See methodology.
Eighty-seven percent (87%) of Republicans and 66% of voters not affiliated with either major political party still think the country is on the wrong track. Among Democrats, 49% believe the country is heading in the right direction, while 41% think it’s on the wrong track.
Fifty-seven percent (57%) of black voters feel the country is headed in the right direction. Sixty-eight percent (68%) of whites and 59% of other minority voters disagree.
Fifty-two percent (52%) of those under 40 think the country’s on the wrong track, a view shared by two-thirds of older voters.
Seventy-one percent (71%) of the Political Class think the country is heading in the right direction, while 77% of Mainstream voters feel it is headed down the wrong track.
Democrats now lead Republicans by five points on the latest Generic Congressional Ballot.
One-in-four (24%) now say their home is worth less than when they purchased it, a five-point increase from November and the highest level of pessimism since June.
Sixty-three percent (63%) of voters believe most government contracts are awarded to the company with the most political connections rather than one that can provide the best service for the best price.
Nearly one-out-of-three voters now say their health insurance coverage has changed because of the new health care law, and most (52%) continue to view the law unfavorably.
Just 21% believe the federal government has the consent of the governed today.
Crosstabs and historical data are available to Platinum Members only.
Please sign up for the Rasmussen Reports daily e-mail update (it's free) or follow us on Twitter or Facebook. Let us keep you up to date with the latest public opinion news.
Rasmussen Reports is a media company specializing in the collection,
publication and distribution of public opinion information.
We conduct public opinion polls on a variety of topics to inform our audience on events
in the news and other topics of interest. To ensure editorial control and independence,
we pay for the polls ourselves and generate revenue through the sale of subscriptions,
sponsorships, and advertising. Nightly polling on politics, business and lifestyle topics
provides the content to update the Rasmussen Reports web site many times each day.
If it's in the news, it's in our polls. Additionally, the data drives a
daily update newsletter and various media outlets
across the country.
Some information, including the Rasmussen Reports daily Presidential Tracking Poll
and commentaries are available for free to the general public.
Subscriptions are available for $4.95 a month or 34.95 a year
that provide subscribers with exclusive access to more than 20 stories per week on upcoming elections,
consumer confidence, and issues that affect us all. For those who are really into the numbers,
Platinum Members can review demographic crosstabs
and a full history of our data.
To learn more about our methodology, click here. | <urn:uuid:6779d568-c305-498a-814d-81a93dd8b5cb> | CC-MAIN-2017-04 | http://www.rasmussenreports.com/public_content/archive/mood_of_america_archive/right_direction_or_wrong_track/january_2014/30_say_u_s_heading_in_right_direction2 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00410-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.938402 | 998 | 1.78125 | 2 |
Education is a journey not a race.
Help our school to survive as the only Steiner school in the North West and to be as inclusive as we have always been by offering bursaries to widen access.
Lancaster Steiner School is a small friendly school situated in the centre of Lancaster, and the only Steiner School in the North West. We run toddler groups, a Kindergarten for 3 – 6 year olds, and a primary school for 6 – 11 year olds.
We are the ONLY Steiner School in the North West of England, and the only school regionally offering a real alternative to target-driven education, providing an education which is holistic, nurturing and creative. We are a non-selective and non-denominational school, welcoming pupils of all academic abilities and backgrounds.
We believe that education is a journey and not a race. We teach the whole child, through the ‘head, heart and hands.’ We teach literacy and numeracy when the children are ready to learn, though we do prepare them for it through craft and play. Our School Inspection Service Report says that our school ….
‘provides a good education for its pupils, which includes a number of outstanding features and is much appreciated by parents. ‘
Why do we need crowdfunding?
Lancaster Steiner School is funded solely by parents’ fees (the majority of which receive fee-assisted places), fundraising events and donations. We receive no state or other funding. As a small school the loss of families to other parts of both the UK and Europe has been sharply felt this year, and we need crowdfunding to cover an income shortfall this year, until new (expected) pupils start next year
Some comments about the school from past pupils and parents
‘Before I started at steiner, I was a shy, quiet little girl who was really scared of school because of the past 2 years in the state school system. Steiner school really helped me come out of my shell, slowly, over the 5 years I was there, I developed into a young girl who was sure of herself, of who she was, and of what mattered. This helped me get through the rocky early teens in a state high school, and become who I am today. Looking at other people my age, I am very thankful that I had the chance to go to the Steiner school because I have a sort of confidence that most of my friends struggle with. I truly think Steiner completely changed my life, and made me who I am today. Maia, ex-pupil, doing her A-levels.
‘I think Lancaster Steiner School went a huge way to getting me where I am today. I think that Steiner education supports a child's inner personality and encourages whatever that may be completely, giving the child the confidence and the ability to continue this even after leaving. I think this has been the main factor in my success in the dramatic arts….My ability to take responsibility for my learning, combined with the confidence to seek feedback, support and knowledge from others as I follow my interests is something which I developed through my relationship with my class teacher during my time at Lancaster Steiner School……I believe that Lancaster Steiner School broadened my mind, and allowed me to learn a lot of things that I would not necessarily have learnt through the mainstream curriculum. I owe a lot to the school and I hope future students take as much out of it as I did.’ Freya, ex-pupil, doing A-levels and heading for Cambridge.
My experience at Lancaster Steiner School gave me ability to adapt to different situations and the ability to confront new challenges that arise. It has given be a broad basis in education and led to my enjoyment of learning throughout my childhood. This resulted in me going to university with the hope of achieving a first class degree. My school experience has impacted on my independence giving me the confidence to travel to Malawi on my own to volunteer in an orphanage. I think going to Lancaster Steiner school has made me into a well-rounded confident individual. Ex-pupil Eller at university, heading for a first class degree.
‘My son absolutely loved the whole experience, the experientiaand educational philosophy, the nurturing ‘whole child’ approach, the emphasis on the natural environment around him and the curriculum which drew out and helped him develop his creative talents and inner self…. At the year 7 Parents Evening he received very positive feedback from all his teachers. What stands out are reports of his enthusiasm for learning, his attentiveness, his creativity, his support of others in the class group and his respect for his environment and the person ‘in charge’. I am sure that amongst other nature/nurture factors his Steiner school experience is a considerable factor in who he is today and why his new school have experienced him so positively this year.’ Ex-parent whose son is now at secondary school.
Lancaster Steiner School employs 2 Kindergarten teachers, 3 Lower School teachers, 2 assistants, 1 afternoon club co-ordinator, 1 Bursar, 1 administrator and 1 Music teacher, all very skilled, and almost all part-time. The school is governed by the Council of Trustees, 7 volunteers with a broad range of skills and experience. Parents also contribute hugely to school activities and organisation.
If we exceed our target amount, we will contribute any additional money raised towards the Bursary Fund to subsidise fees for parents on low incomes. | <urn:uuid:faa77ead-f913-44b5-aa6d-0f4dfcb95441> | CC-MAIN-2016-44 | http://www.crowdfunder.co.uk/lancaster-steiner-school?txid=0 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00415-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.977259 | 1,139 | 1.6875 | 2 |
A look at how much the average Australians are saving and spending.
Finally, some useful ways to use your money.
Your guide on where to start.
A large portion of the population, especially women, are retiring in poverty. But why is this? And why do women typically have less Super than men.
Lockdown has triggered something of a family venture boom. Here’s how to get your website started.
If you borrow money and the rate is too high, it can cost you a lot of money. On the flipside, if you’re saving, you can make money.
“Stop buying take-away coffees”. As someone who doesn’t drink coffee, this tip is not very helpful. But there are other ways to save.
There are two kinds of debt; good debt and bad debt. But what’s the difference and how can you tell. The experts at Tilly Money explain. | <urn:uuid:71024133-fd45-4ed6-aa92-def5f3735fc7> | CC-MAIN-2022-33 | https://www.russh.com/tag/personal-finances/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00668.warc.gz | en | 0.948247 | 198 | 1.703125 | 2 |
New York City will replace half of its plastic-protected bike lanes with “sturdier” barriers during the first 100 days of the incoming Adams administration, soon-to-be Department of Transportation Commissioner Ydanis Rodriguez announced Tuesday, Dec. 21.
The move would mean reworking hundreds of miles of protected green paths across the Five Boroughs that currently separate car from bike traffic with frail one-foot sticks known as flex posts.
“We are going to commit to replacing 50% of all plastic protected bike lanes with sturdier and more permanent structures within the first 100 days,” said Rodriguez at a joint press conference with Mayor-elect Eric Adams officially announcing his appointment.
The uptown councilman wouldn’t say where he planned to put the stronger barriers or with what he wants to replace the plastic flappers, but said that federal dollars from President Joe Biden’s infrastructure package could help fund the scheme.
“Day one, we’re gonna be going to the agency and listening from the experts that we have there, people that have decades of experience, and we’ll be looking at where in the city should we get started,” Rodriguez said. “What we know is that there’s now funding at the federal level that is part of the infrastructure plan.”
Adams on Monday tapped Rodriguez — who chairs the Council’s Transportation Committee — to head DOT and replace Commissioner Hank Gutman come Jan. 1.
The city had 546 miles of protected bike lanes as of 2020 and the agency planned to add another 30 miles in 2021, but it is unclear how many of the roughly 576 miles are bordered by flex posts.
DOT’s definition of “protected” covers a wide range of ways cyclists are separated from car traffic, including completely detached paths on bridges or raised sidewalks, or lanes level with the rest of the road but shielded by concrete jersey barriers, flex posts, or a row of parked cars.
The plastic posts are easy to drive over for motorists and block the lanes, and cycling advocates have long called on the city to use more hard materials like concrete to keep pedalers safe, but DOT has continued to add them to new projects, such as Queens Boulevard.
Other new bike paths like the highly-popular Brooklyn Bridge bicycle lanes are protected by a jersey barrier and a fence on top of it.
“People on bikes need real protection and we know truly protected bike lanes are what keep bike riders and other road users safe on our streets,” said Danny Harris, executive director of the street safety advocacy group Transportation Alternatives. “Upgrading the bike lane network is a much-needed and very promising first step from the next NYC DOT commissioner.”
Across the Hudson River in Jersey City, Mayor Steven Dunlop in October promised to buy jersey barriers for all their protected bike lanes to make them safer and save on the cost of replacing damaged plastic posts every time a driver destroys them.
We are in the process of buying jersey barriers for all of our protected bike lanes. We are planning on moving from flex posts to more substantial protection in 2022. Pricing is coming back now to make the change as we think it will be safer for the network + cheaper in long term https://t.co/7BNzKZcgqQ
— Steven Fulop (@StevenFulop) October 5, 2021
Adams has said he will roll out 300 miles of protected bike lanes during his tenure, or 75 miles annually during his four-year term, up from the 30 miles DOT says they are currently capable of building.
The mayor-elect on Tuesday added that he wanted to pedestrianize more streets, with a focus on lower-income areas.
“We’re going to expand pedestrian plazas where they’re not only localized in some communities, they’re going to be citywide,” said Adams. “What is happening in our central business district is not happening in Washington Heights, it’s not happening in South Jamaica, Queens, in Brownsville. The failure to connect the use of our streets is something that we’re going to ensure that it is equitable.”
Rodriguez also said he would work to give 25% of public space dedicated to cars to pedestrians, cyclists, and buses, inspired by Transportation Alternatives’ 25×25 plan, as well as work with the Sanitation Department to containerize trash that currently piles up on sidewalks, and expand bike share program Citi Bike to “all corners” of the city. | <urn:uuid:4e0f4817-f5df-4638-a051-e6ee96e2d610> | CC-MAIN-2022-33 | https://www.amny.com/transit/dot-promises-plastic-protected-nyc-bike-lanes-sturdier/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00677.warc.gz | en | 0.959171 | 952 | 1.960938 | 2 |
Call for texts and art projects:
Art and New Media in Latin America
**Submission deadline extended to September 26, 2016**
For the publication of its issue #90, the digital journal InterArtive will edit an special issue dedicated to the intersections between Art and New Media in the geopolitical and cultural context of Latin America. We invite scholars, critics, curators and artists who work on this subject to participate.
From the middle of the last century, the relationships between art and technoscientific media have constantly increased. Especially from the 90’s, these relationships have given rise to a whole series of hybrid art practices such as net.art, interactive multimedia installations or bioart, which have meant a critical questioning of the production, exhibition, distribution, consumption, receipt or conservation strategies traditionally linked to the art practice.
The construction of narratives about this phenomenon has usually met a hegemonic, centered vision, which sets out a look to the North American and European contexts and leaves little space to account for other realities. However, and despite being considered a global issue, the so-called «New Media Art» seems to have had an unequal development and establishment in different local contexts. This would be due to the reach of technoscientific media themselves within different societies, but would also depend on the existing artistic-cultural infrastructure, which enables their integration as creative means.
The aim of this especial issue is to make visible these «other» dynamics of New Media Art that happen specifically in the Latin American context, either considering the perspective of the tensions between center and periphery - both stressing or questioning it - or the point of view of the similarities and differences that arise in such a wide and diverse territory.
Proposals that consider one or more of the following topics, among others, will be accepted:
- History/Histories of the intersections between art, science and technology in Latin America and/or its different regions: innovating projects, artists, trends, movements, etc.
- Art practices produced in the context of Latin America that integrate the new technologic and scientific media as creative means: projects dealing with net.art, software art, virtual reality, augmented reality, sound and visual experimentation, performance, dance, interactive installation, bioart, etc.
- Problems linked to the production, distribution, exhibition, conservation, etc. of New Media Art, as well as to its dissemination, training/education, etc. on these areas in the context of Latin America.
- Initiatives and projects (festivals, exhibitions, learning programs, labs, databases, etc.) aimed to foster reflection and exchange about the intersections between art and techno-science in Latin America and/or its different regions.
The length of the texts should be kept between 800 and 3000 words: Text Publishing Guidelines (pdf)
Artworks and art projects will be published in the form of Online Exhibition (images and short text): Artwork Publishing Guidelines (pdf)
Proposals should be submitted by
15th 26th September 2016, by email at: firstname.lastname@example.org
E-mail title: "Art + New Media in Latin America Submission"
The Issue #90 of InterArtive will be published at the end of November 2016.
With the partnership of: | <urn:uuid:39b22411-ea4b-486c-962f-1628b07fab31> | CC-MAIN-2022-33 | https://interartive.org/2016/06/art-new-media-latin-america-call/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00468.warc.gz | en | 0.929992 | 673 | 1.8125 | 2 |
Google Analytics is a service offered by Google that generates detailed statistics about a website's traffic and traffic sources and measures conversions and sales. Google Analytics can track visitors from all referrers, including search engines and social networks, direct visits and referring sites. It also displays advertisin...
A semantic personal publishing platform with a focus on aesthetics, web standards, and usability.
Allows a website to define how a page is rendered in Internet Explorer 8, allowing a website to decide to use IE7 style rendering over IE8 rendering.
The Open Graph protocol enables any web page to become a rich object in a social graph, a open protocol supported by Facebook
Meta descriptions are HTML attributes that provide concise explanations of the contents of web pages. Meta descriptions are commonly used on search engine result pages (SERPs) to display preview snippets for a given page.
A canonical link element is an HTML element that helps webmasters prevent duplicate content issues by specifying the "canonical", or "preferred". | <urn:uuid:5c0b7709-b734-4b5b-ac62-7dc1d7de7672> | CC-MAIN-2022-33 | https://www.similartech.com/websites/nfb.org | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00267.warc.gz | en | 0.832454 | 235 | 1.664063 | 2 |
- Programs and Services
In 2010, Ministry of Training Colleges and Universities, sponsored the Métis Nation of Ontario (MNO) to conduct applied research about the opportunities and barriers Métis post-secondary learners face in Ontario.
Historically there has been very little research conducted on the state of Métis learners in Ontario’s education system. Through a tendered process, Stone Circle Consulting was the successful contractor. In conversation with the MNO, the researchers embarked on a multifaceted approach that included a literature search, on-line survey of current Métis college and university students, and key interviews.
The main results are highlighted in the executive summary and offer a greater understanding of barriers and opportunities facing Métis students today. Recommendations to improve the system include building partnerships between the MNO, post-secondary institutions and the Ministry.
The MNO was in fact already well underway in working to address many of the issues identified and will continue to explore opportunities to improve outcomes for Métis students. We invite you to read the report. | <urn:uuid:911badea-bab2-42a4-a258-46dfe42f8a35> | CC-MAIN-2017-04 | http://www.metisnation.org/programs/education-training/education/pse-report | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00152-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.945355 | 217 | 1.859375 | 2 |
The 2010 documentary “Catfish” chronicled photographer Nev Schulman’s trip to see who had been truly behind the long-distance partnership he’d already been having with a beautiful 19-year-old singer called Megan. Fundamentally, Schulman discovers that the girl he’d communicated with via countless texts, myspace posts and telephone discussions was actually actually formulated by a middle-aged mom located in Michigan.
Ever since then, catfishing is now a famous dating term — definition, pretending become an entirely various individual online than you really come into actual life. And even though (ideally) we aren’t making use of super sensuous photo of someone otherwise to mess with the brains in our online dating sites possibilities, the urge to lay about years, peak, occupation along with other facts to draw even more matches is clearly here.
If you have ever got an online date arrive IRL appearing age older or inches smaller than their account allowed in, you are already aware how embarrassing kittenfishing can make that initial conference.
“On a simple amount, kittenfishing are ‘catfishing light,'” claims Jonathan Bennet, founder of Double depend on matchmaking. “While you’re perhaps not acting is someone, you’re nevertheless misrepresenting your self in an important way. This may feature pictures with misleading perspectives, sleeping about rates (get older, peak, etc.), images from in years past, putting on caps if you’re bald, or whatever else that produces your seem radically different than the manner in which you would show up physically.”
Kittenfishing was ‘catfishing light.’ While you’re maybe not acting are someone, you’re nonetheless misrepresenting yourself in a substantial way.
This also reaches the approach to life your show on the matchmaking visibility. Although it’s recognized you are probably perhaps not posing with tigers on safari from the regular, moving off a costly local rental vehicle as the own, pretending your own wealthy pal’s father or mother’s boat try yours, or listing your profession as something it’s not (PSA: doing work in “finance” is not the identical to becoming a bank teller) which also matters here.
So why do men and women kittenfish?
Online dating sites try aggressive, faults are really easy to cover during the digital business as well as the conclusion your day, each of us wish to be adored. So bending the http://datingmentor.org/biracial-dating facts might seem just like the proper way to increase your chances of snagging that earliest go out.
Matchmaking 101 ‘Cookie jarring’: are you a prey from the dating pattern?
You’ll obviously understand you have been kittenfished when you perform hook up regarding first go out. But psychologist Ana Jovanovic says there are a few indicators to watch out for so that you can place they beforehand.
- Inconsistencies as to what you were letting you know. “You may observe contrary details in their stories or read all of them neglect to answer a relatively straightforward question about a topic they appear to be extremely passionate about,” claims Jovanovic.
- Diminished information when you come to be inquisitive. “they could prevent telling you particulars about their work, event, back ground – due to the fact details may expose reality,” Jovanovic says.
- Idealistic self-presentation. If this appears like they have no flaws, whatsoever, Jovanovic says absolutely a high possibility they’re probably too good to be real.
It’s in the end for you to decide to decide whether you wish to research furthermore. However, if you may be confronted with a kittenfisher, Jovanovic claims to ask yourself: “What is the person trying to include or rest around, how serious will be the kittenfishing as well as how crucial so is this to you? You will want to help make your choice about what to complete based on the reply to this matter.”
I identified the secret to online dating in a digital industry
Waiting . am we kittenfishing?!
If you’ve peruse this far and cannot get that one visibility image from last summertime out of your brain — usually the one in which you threw a sepia filter to make your self check a little more sunkissed — let’s stop and explore they for a minute. If you believe you may be kittenfishing, Jovanovic suggests asking yourself the below concerns, and answering truly.
- If a person were to satisfy myself now, just what differences would they get a hold of between who Im on the internet and in-person? Think about yourself showing up for a date with a potential match. Would they know you against the pictures? Do you really search similar physically while you manage into the pictures they will have observed of you? We all have our good angles, but are you deliberately concealing how the body really appears?
- The number of white lays have actually I informed this individual? a matched questioned everything you are up to and you also believed “cleaning the restroom” was not more endearing reaction, which means you embellished a little and stated you used to be aside with a friend instead. Light sits certainly happen via online dating sites. However, if you’ve constantly told ones that paint a photo of an extremely different individual than you truly are, you may possibly have ready unrealistic objectives.
- How can I believe this person would describe myself? So is this the way I would describe my self, as well? You described yourself as adventurous and outdoorsy, nevertheless’ve never been on a hike that you experienced . now your own match thinks that’d getting a perfect basic big date.
- If an in depth friend you never know me personally well and this also person had been to share with you me, would they have the ability to accept myself while the exact same person? Would your absolute best buddy accept you from your internet online dating visibility? Inquiring a buddy to vet your on line dating profile was a surefire way to be sure you’re placing the best foot forward without misleading a prospective fit.
If this feels like your, Jovanovic claims investing sometime distinguishing their real better traits are a good idea. “think on what it is that you have to provide,” she says. “exactly what are your strengths? Accomplishments you’re happy with? What is it you and individuals around you like about yourself? If you’re not positive what there is certainly in regards to you that people might be attracted to, consult with men near you. Inquire further about techniques they might describe your.”
Behind kittenfishing, there’s a desire to be best. And while there are some things you simply can’t changes, Jovanovic claims working toward that best type of your self will allow you to move forward away from the need to kittenfish. “put aim to be this much better form of yourself,” she states. “If you’re constantly locating your self needing representing your self as more effective, best browsing or maybe more social than you might be, you may possibly consider establishing objectives for your self to really improve from inside the segments you see crucial.” | <urn:uuid:71357bcd-78e6-4f9e-a753-594dc404ff51> | CC-MAIN-2022-33 | https://www.coach-de-vie-annecy.fr/kittenfishing-the-common-internet-dating-pattern/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00277.warc.gz | en | 0.961527 | 1,560 | 1.78125 | 2 |
OBSERVANCE OF THE ASCENSION
June 20, 2012
“No One But Us”
The most important part of this text from Acts is not Jesus’ physical ascension. That may sound like blasphemy to you, standing, as I am, in front of this great stained glass window above the altar depicting the ascension of Jesus, with Isaiah and St. Paul. The theological implications of this event are shown in the figures present. The fulfillment of promises, and the promises to come are shown. Still, it is not the most important part of the story. It is the force, the impetus if you will, behind what is important: Jesus tells the disciples to go and be his witnesses.
“You will receive a power from the Holy Spirit, and you will be my witnesses in Jerusalem and in all Judea and Samaria and to the end of the earth” (Acts 1:8). And Luke follows that general geographical outline as he tells his series of dramatic tales, beginning with the Spirit’s fall in Jerusalem (Acts 2) and ending with Paul’s open preaching in Rome (Acts 28), the “end of the earth” of the Roman world in which Luke lives.
I do not believe that I am making too much of a stretch to say that the world we live in is very similar to Luke’s. I make note of this to say that I think I know what the disciples were up against. In my mind’s eye I see them trudging down off the mountain, murmuring to one another something to the effect, “Really? I don’t even know any of those people.” Or, “they don’t even know us!” Maybe, like the disciples, we just feel inadequate. After all, I am a civil engineer, or plumber, or nurse, or warehouse worker, not an evangelist! If I was Peter, I’d be murmuring about being a professional fisherman, ‘what do I know about witnessing?’
Last week you may have heard me say something to the effect, “let us look to the Holy Spirit to direct the movement of the Church.” This is, of course, part of Jesus’ message to the gawking disciples. They are to wait for the Spirit. Today I want to emphasize that time after the waiting. I realize that a long time has passed between then and now, and I do not believe that the Holy Spirit has been absent, or without anything to say to the church. What I do think is that we have gotten ourselves stuck on experiencing the benefits of this ‘life, death, resurrection, and ascension,’ rather than living it.
What I am talking about is being a disciple. I believe that is the goal of the Christian faith. If you listened carefully to the baptismal questions from last week, you know that what we are essentially asking at baptism is for the individual to live in the Kingdom of God in the present time.
What that means is that we go about our own lives and do our best to live them in a way that glorifies God. As a disciple of Jesus I am with him, by choice and by grace, learning from him how to live in the kingdom of God. This is the crucial idea. That means how to live within the range of God’s effective will, his life flowing through mine. Another important way of putting this is to say that I am learning from Jesus to live my life as he would live life if he were I. I am not called to do everything he did, but I am learning how to do everything I do in the manner in which he did all that he did. This idea is not so much about what we say, as if witnessing was isolated to speech. Instead, it raises questions about how we do our work, how we live in our families, and how we participate in our community.
What the Ascension does is put the Christian life squarely in the world. It does not mean we will cease to be who we are, or suddenly stop our work and move up to the mountain top to wait in prayer for the Lord to return. Knowing this can help deliver us from the genuine craziness that the current distinction between “full-time Christian service” and “part-time Christian service” imposes on us. For a disciple of Jesus is not necessarily one devoted to doing specifically religious things as that is usually understood.
Brother Lawrence, who was a kitchen worker and cook, remarks, Our sanctification does not depend upon changing our works, but in doing that for God’s sake which we commonly do for our own. . . It is a great delusion to think that the times of prayer ought to differ from other times. We are as strictly obliged to adhere to God by action in the time of action as by prayer in the season of prayer.
Sometimes there is a disconnect between Sunday mornings and the rest of the week. Why is that?
I suppose I do know the answer. It is far safer, far less demanding, to be a spectator than a witness. Spectators observe, they do not participate in the event. Spectators can learn a great deal about what is going on; they can memorize statistics, relish the history, wave the home team flag, and have a truly emotional experience. Witnesses, on the other hand, just witness to the truth of the gospel: the truth of justice for the whole world, the love of enemies, and the care for the marginalized and outcast. As Acts 1 makes so clear, the world needs far fewer speculators and far more witnesses.
At the end of this passage, Jesus is gone and, as Luke tells us, “While he was blessing them, he withdrew from them and was carried up into heaven.” And then, it was up to us. | <urn:uuid:801c120a-e00d-4875-8b83-511fffb00c1e> | CC-MAIN-2017-04 | https://simplecountrypastor.wordpress.com/2012/05/16/nobody-but-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00191-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967888 | 1,227 | 1.890625 | 2 |
Because nothing survived of Skara Brae’s roof structures, we must assume that they were made of a perishable, organic material — whalebone or driftwood beams supporting a roof of turf, skins, thatched seaweed or straw.
But out on the Ness of Brodgar, the archaeologists at the ongoing Orkney Research Centre for Archaeology (ORCA) excavations have found Orkney’s first real evidence of a Neolithic roof.
In most reconstructions of prehistoric buildings, you’ll often see hotch-potched arrangements of turf, animal skins or perhaps thatch. But on the Ness, the Stone Age builders used stone slates for at least one of their buildings — the remains of which have been uncovered within the side recesses along the interior walls of Structure Eight.
Site director, Nick Card, explained in 2010: “In the Structure Eight recesses, when we removed the upper layers of rubble, we found large, flat stone slabs, most of which would appear to be a standard thickness.
“Most of these thin slabs have been carefully shaped, with the edges trimmed to form regular, rectangular ‘slates.’”
Are we seeing the first evidence for a “standard” roofing system? Perhaps not for structures such as those at Skara Brae — in Structure Eight the excavators only found evidence for stone slates being used in the side recesses.
Nick said: “We may find other evidence as we dig, but perhaps this technique was only used to roof the side recesses as the limited span across these spaces would have made it quite easy.”
With no evidence of post holes inside the structure, it seems likely that a wooden framework was secured to the top of the building’s walls, and the slates attached to it.
Nick added: “Mixed in with the ‘slates’ are also some deposits of clay – was this used to calk the spaces between the slates to stop water ingress? Or possibly to bed the slates down on so as to achieve a more regular profile for the roof?”
Every “slate” is being carefully removed in sequence, numbered, measured and recorded so that the experts can not only piece together how they were used but also the way that the roof collapsed.
“Of course, it may be that the roofing was deliberately demolished – an act of ritual closure found at other Neolithic sites in Orkney,” Nick said.
Continued removal of rubble and collapse in the central area of Structure Eight revealed more roofing slates.
“We are asking ourselves now whether this means the whole of Structure Eight was slated and not just the recesses as we first thought,” said Nick.
“In addition, the odd slate was also being discovered in Structure One – so could other structures on the site been likewise roofed?” | <urn:uuid:e85bf65f-a775-4f7c-9f32-6b9fcedeeeb1> | CC-MAIN-2017-04 | http://www.orkneyjar.com/archaeology/nessofbrodgar/excavation-background-2/prehistoric-slate-roof/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00145-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969711 | 617 | 3.609375 | 4 |
blandcramration writes: I have recently decided to further my education with a technical school associates degree. I am a first quarter student in my third week as an IT student. I have taught myself Python and have been working with computers for over 10 years. We've been learning C++ and though my instructor appears to know how to program, he doesn't really understand the procedure behind the veil, so to speak. In a traditional learning environment, I would rather learn everything about the computer process rather than fiddle around with something until I figure out how it works. I can do that on my own. I think the real issue is I'm not feeling challenged enough and I'm paying through the nose to go to school here. Am I even going to be able to land a decent job, or should I just take a few classes here and move on to a traditional college and get a computer science degree? I'm much more interested in an approach to computer science like http://www.nand2tetris.org/ but I feel as if I should get a degree in something. What are your thoughts? | <urn:uuid:cfc9fdc6-cf2a-4340-9155-235d1bbca07b> | CC-MAIN-2016-44 | https://slashdot.org/submission/2320719/ask-slashdot-is-going-to-a-technical-college-worth-it?sdsrc=rel | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00023-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.985186 | 227 | 1.546875 | 2 |
Co-Curricular Activities (CCAs) play an integral part in the holistic development of our pupils. They provide a pivotal platform for our pupils' character development, allowing them to discover and develop their interests and talents.
In Stamford, all CCAs are involved in at least one Values In Action (VIA) activity every year. Pupils brainstorm on feasible activities, facilitated by their CCA teachers, to care for the less fortunate in society and be considerate users of the physical environment. All CCAs have also embarked on a Progressive Achievement Checklist for their members to identify the acquisition of key skills and knowledge during their CCA sessions.
CCAs also help nurture qualities such as resilience, tenacity, confidence and perseverance in the pupils. These qualities will prepare our pupils to adapt and thrive in a volatile, uncertain, changing and ambiguous world.
To cater to our pupils' diverse needs and interests, the school offers a wide range of CCAs in the following categories:
- SHINE (Stamford Heartbeat INstrumental Ensemble)
- Cub Scouts
- Art Club
- Outdoor Activity Club (ODAC)
Stamfordians are highly encouraged to participate in at least one of the 8 CCAs offered for a holistic, well-balanced education. | <urn:uuid:b04aac4c-abbe-4e22-ad0f-1c2089de5c85> | CC-MAIN-2022-33 | https://stamfordpri.moe.edu.sg/co-curriculum | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00675.warc.gz | en | 0.936042 | 291 | 2.3125 | 2 |
Bergamots aren’t something one runs across everyday in the supermarket, or even at greengrocers. But mid-winter, depending on where you live, you just might get lucky and happen across some, as I recently did in Paris. But no matter, this recipe can be made with other kinds of lemon, especially “sweet” lemons, such as Meyer lemons.
There’s conflicting information what a bergamot actually is, but it’s definitely a member of the citrus family and most consider it to be a relative of the bitter orange, which might have been mated with a lemon at some point in its murky past.
Most are familiar with the fruit because the oil from the peel is used to flavor Earl Grey tea. In France, many people are familiar with bergamot as they’re used to make the balmy-tasting Bergamots de Nancy hard candies, from the Lorraine region.
When buying citrus for jam-making, be sure to source out organic or unsprayed fruits. Because you’re eating the entire fruit, including the peel, it’s good to make sure the fruit hasn’t been sprayed with anything you wouldn’t feel comfortable ingesting. You want the finished marmalade to be something you’re happy to eat!
Some people are put off by the price of organic produce, and yes, I pay a little more when I shop at the organic stand at my market. But the entire bag of the ones I bought to make this marmalade were under €6 ($6), and I got two lovely jars of jam from the lovely fruits I plucked from the bag when I got home.
Because of the longer cooking, the color of the lemons will concentrate and won’t be as sunny-colored as the fresh fruits, but no matter. The flavor will shine through, especially when spread on your favorite toast for breakfast the next morning, which I did with some grainy bread I picked up at Chambelland bakery in Paris.
As mentioned, you might not be able to find bergamots (and I’ve linked below to articles on what they are), but if you have lemons, don’t make lemonade – make marmalade!
Makes about one quart (1l)
Before making this marmalade, be sure to check and make sure your fruit resembles mine. What are called bergamots in France, go by different names elsewhere. Just below, I’ve linked to Wikipedia entries describing bergamot oranges and citron limetta, which are what they refer to as bergamots in France. And that’s what I used.
You can read more about them at What is a bergamot? For this recipe, you could substitute any sweet lemon, such as a Meyer lemon, although regular lemons would work as well, too.
8 bergamots (about 700g), organic or unsprayed
3 cups (600g) sugar
4 cups (1L) water, plus more for blanching the bergamots
pinch of sea salt
optional: 2 teaspoons kirsch or lemoncello
1. Rinse and dry the bergamots, trim off the stem ends, then cut each in half and pluck out the seeds.
2. Slice the bergamots as thinly as possible.
Tip: If you have trouble getting them very small, after slicing, you can use a chef’s knife to chop them to the right size. Don’t use a food processor, as that will make the marmalade muddy.
3. Put in a large pot, cover with water, and bring to a boil. Let boil for five minutes, then drain well.
4. Return the bergamots to the pot, add the sugar, 4 cups (1l) of water, and salt, and bring to a boil. Cook the bergamots, stirring occasionally, until the marmalade begins to set using the wrinkle test: turn the marmalade off and put a dab on a plate that’s been in the freezer then check it after five minutes; if it wrinkles when you nudge it, it’s done. If not, continue to cook, repeating this step, until it reaches the desired consistency.
Depending on the heat, the marmalade will take at least 30 minutes to reach this point, although if you’re used to making other jams, it will look slightly more liquid than others when done. You can also use a candy thermometer; the marmalade will be done when the temperature reaches around 218ºF (103ºC).
5. Once done, stir in the liqueur, if using, then ladle into clean jars and twist on the lids. Once cool, store in the refrigerator, where they’ll keep for at least six months.
For those interesting in canning and preserving the marmalade, you can find downloadable instructions at the USDA website.
Related Links and Recipes
What is a bergamot?
Bergamot orange (Wikipedia)
Beguiling Bergamot (Daniel Patterson)
Bergamot Madeleines (Chez Pim)
Bergamot Growers Get a Whiff of Success (BBC)
Bergamot Marmalade (Yum in Tum)
Bergamot Orange Custard Cups (Hungry Cravings)
Seville Orange Marmalade
Shallot, Beer and Cocoa Nib Marmalade
No-Recipe Cherry Jam | <urn:uuid:db574d6b-4d4b-487c-8a3b-06cf0fcb686b> | CC-MAIN-2017-04 | http://www.davidlebovitz.com/bergamot-marmalade-recipe/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00401-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.915115 | 1,193 | 1.570313 | 2 |
Building Tribal Maternal Child Health Epidemiologic Capacity
Sudden Unexplained Infant Death Investigation Training
Sudden Infant Death Syndrome (SIDS) research informed the Sudden Unexplained Infant Death Investigation (SUIDI) Training Program that was developed by CDC's Division of Reproductive Health (DRH) for infant death investigators.
- Risk factors for sudden infant death syndrome among Northern Plains Indians.
- Infant mortality trends and differences between American Indian/Alaska Native infants and white infants in the United States, 1989–1991 and 1998–2000.
- The Aberdeen Area Indian Health Service Infant Mortality Study: Design, Methodology and Implementation [PDF - 293KB].
The training program seeks to standardize death investigations and data collection to aid in accurate reporting of sudden, unexplained infant deaths (SUID). CDC worked with American Indian and Alaska Native (AI/AN) representatives to identify specific training needs and implement training workshops for AI/AN communities, professionals, and those working in the AI/AN community. Sudden Unexplained Infant Death Investigation (SUIDI) Training materials were first presented at the National Indian Program Training Center in Albuquerque, New Mexico, in 2007.
Valid and reliable data are crucial to support research and infant death prevention efforts and to inform stakeholders. For example, the National Institute of Child Health and Development Back to Sleep campaign outreach material— AI/AN Safe Sleep for Your Baby [PDF - 925KB]. This brochure communicates data-based information to the tribal community.
Journals and Special Supplements
In support of an evidence base for improving AI/AN maternal and infant health in the United States, CDC supported a special supplement of the Maternal Child Health Journal published in July 2008, entitled Research for Maternal Child Health Practice in American Indian and Alaska Native Communities.
This was the first MCH Journal issue dedicated to AI/AN and was disseminated to more than 3,500 partners, including all AI/AN tribal health directors. Tribal Epidemiology Centers and AI/AN communities solicited the papers. The 15 original articles in this supplement offer direction for research to improve MCH outcomes in AI/AN communities. They include a broad spectrum of articles ranging from analysis of data sets to primary research spanning pregnancy, motherhood, child rearing, and adolescence.
MCH Epidemiologists Assigned to Tribal Epidemiology Centers
MCH epidemiologists were assigned to serve Tribal Epidemiology Centers (TECs) from 2005 through 2007. In collaboration with the Indian Health Service (IHS), CDC/DRH provided technical support to conduct surveillance, interventions, and outreach to build MCH capacity, specifically to support infant mortality risk reduction projects.
Assignees were supported at the following centers:
- Alaska Native Tribal Health Consortium Epidemiology Center
- Great Lakes Inter-tribal Epi Center
- Inter Tribal Council of Arizona TEC
- Northwest TEC
- United South and Eastern Tribes TEC
- Urban Indian Health Institute
The program was modeled after the CDC MCH Epidemiology Program that supports CDC MCH epidemiologists in state health departments and other organizations that support MCH work. Despite cessation of funding in 2008 to place MCH epidemiologists in TECs, efforts to support MCH epidemiology among Tribal Epi Centers continue.
Tribal Requests for Epidemiologic Assistance
Examples of CDC/DRH epidemiologic assistance include—
- Investigation of reported excess molar pregnancies on a reservation in the Northern Plains.
- Evaluation of a syphilis outbreak on a reservation in the Southwest.
- Investigation of a reported increase in infant and fetal deaths on a reservation in the Northern Plains.
Tribes may contact CDC's Division of Reproductive Health to request assistance.
Additionally, the Council of State and Territorial Epidemiologists (CSTE) partners with CDC and the Association of Schools of Public Health (ASPH) to support a fellowship program to train and mentor recent graduates in the expanding field of applied epidemiology.
- Page last reviewed: January 21, 2015
- Page last updated: July 13, 2015
- Content source: | <urn:uuid:e99d6cfc-0e45-4271-8d7e-7b0d84163be4> | CC-MAIN-2017-04 | https://www.cdc.gov/reproductivehealth/MCHEpi/AI-AN/BLDG_Tribal-MCHPI-Capacity.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00357-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.894905 | 853 | 2.796875 | 3 |
How do I Dispose of a Car? There comes a point with every vehicle when it’s no longer practical or safe to use on the road. What’s more, if it’s not roadworthy you could end up with points on your driving licence or a fine. So if your car’s reaching the end of life, read on to find out how you can dispose of a vehicle?
- Avoiding common car scrapping pitfalls
- Scrapping a car
- Selling your roadworthy car
Avoiding common car scrapping pitfalls
- Present your photo ID. When a car is scrapped the NZ Transport Agency (NZTA) needs to be notified using an Application to cancel registration form (MR15). The registration can only be cancelled at authorised registration agents. If you don’t, then you’re still responsible for the vehicle and could end up being fined.
- Give the registration number plates to the authorised registration agents (if you don’t hand in the plates you may not get a refund of any unused licence fees & RUC).
- If the licence for the vehicle has already expired you will be required to pay licence fees from the date the licence expired up to the date of cancellation. To avoid any future fine or charges.
- If your vehicle is subject to road user charges (RUC), you must ensure that all RUC is up to date before you cancel the vehicle. If there is any outstanding RUC, you may be invoiced for the outstanding amount.
Find out more information on NZTA.
Scrapping a car
People usually scrap their cars if they break down, fail a WOF, deregistered, damaged, require expensive repairs, or they can’t find a buyer. Scrapping your car should be the last option you might choose to do if it’s damaged beyond repair or you can’t find anyone prepared to buy it.
Remember, unless your car is a complete wreck, it might still be worth something, so you shouldn’t have to pay to get it towed away. Bear in mind, the vehicle recycler (otherwise known as wreckers, breaker, dismantler or scrapyard) we remove your vehicle for free and pay instant top dollars for your motor vehicle. Scrapping your car will ensure it’s properly recycled without damaging the environment.
Scrap car prices vary depending on the make/model of vehicle, the area it’s collected in, whether it has any re-saleable parts, the condition of the vehicle and current market rates.
Selling your roadworthy car
If your car is still roadworthy or in good condition, Find out how to sell a car in NZ? | <urn:uuid:72d20c7f-bfcf-4eee-a04d-19f9bbd72fa3> | CC-MAIN-2022-33 | https://www.cashforcar.nz/how-do-i-dispose-of-a-car/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00064.warc.gz | en | 0.900891 | 567 | 1.6875 | 2 |
Stop Worrying About Sliding Dentures
We offer implant supported dentures for a secure fit
Are You Tired of Dentures?
Wearers have a list of complaints that all boil down to instability. Poor adhesives and glues allow removable dentures to slip and shift, often at the most inopportune times. This basic lack of security translates to:
- Diet restrictions and difficulty chewing
- Clicking and whistling noises when talking
- Discomfort from dentures resting directly on the gums
Denture implants are dental implants custom designed to secure them in place. With this method, titanium implants are placed strategically into the jawbone and after a short integration period, are fused with your existing bone. This creates a strong bond with which to anchor your implant retained dentures.
For More Information – Follow Us On YouTube
Types of Implant Retained Dentures
Ball-Retained Denture Implants
Consist of a ball and socket method. Each implant post is topped with a ball while your dentures are outfitted with corresponding sockets. The dentures are then snapped onto the implants for a secure fit. They may be removed at any time.
Bar-Retained Denture Implants
Are implant posts which are topped with metal bars. The bars run along the gum line, serving as a base for your dentures. The dentures are then held in place with metal clasps or clips.
Implants Can Last a Lifetime So Have Them Performed by an Expert
Denture implants are performed by Dr. Rob D’Orazio, a leader in implant dentistry. He is a co-founder of AIM (Advanced Implant Mentoring) and teaches dental implant placement for IBSA Dental Implant company. Dr. Kefei Duan also places dental implants at our office and was trained by AIM. Additionally, Dr. Duan has an additional focus and background creating custom fixed or removable dentures. Our experts at DIIMI extend their knowledge to develop your treatment plan to best diagnose, manage and solve your challenges. | <urn:uuid:715930c0-ba3c-45d8-be46-e43110d2e213> | CC-MAIN-2022-33 | https://diimi.net/services/dentures-and-partials/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00269.warc.gz | en | 0.921398 | 430 | 1.773438 | 2 |
I hate setting SMART targets.
Both for myself and also with the students.
I hate reducing the complexity of learning down to some meaningless sentence that I write down somewhere and then forget about.
The kids goals often end up being more behaviour focused rather than learning focused. Moreover the process of writing often impedes the thinking behind the goal.
Last term I threw out statements in favour of the children using visual goals with just one or two words as their goal.
As a PYP teacher I turned to the learner profile and attitudes for a common language to help articulate their thinking.
The kids used the classroom iPads to create a photograph based on the word they wished to focus on that term.
By creating a photograph the children had to think carefully about the meaning behind the word. They were already visualising themselves as having that quality rather than using words to explain it.
We then used Path On, an app which overlays text onto lines the kids draw over the image, to create the finished product.
The children really enjoyed being able to create high-quality images with a modicum of fuss and the app remains a classroom favourite.
The images were then printed out and placed on the PYP display. Instead of being more visual noise in the room, the display now had a purpose.
Both the kids and I kept referring back to the visuals throughout the term when we felt people were showing growth and also when they needed reminders of their goal.
The simplicity of one word and a visual reminder helped keep that goal alive. While the common language helped the children to articulate the growth. | <urn:uuid:d9323660-91c4-421b-adf6-51362c87f282> | CC-MAIN-2022-33 | https://traintheteacher.me/2015/01/08/one-word-visual-goals-a-powerful-form-of-thinking-8365/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00476.warc.gz | en | 0.975585 | 326 | 2.96875 | 3 |
The Wild Edge
The Wild Edge, Harbour Publishing, 2004, 168 pages.
Jacqueline Windh writes: “I hope that this book will give you some idea of the complexity and allure of the wild west coast —the savage beauty,its fascinating history, and the people who make their home here … I want to show you the places that you don’t make it to (this time!),and give you greater insight into the places that you do see. And I hope to inspire you to help protect them so that this ancient and venerable land and its traditional inhabitants will be here for all future generations.”
This beautiful photographic study of Vancouver Island’s wild west coast will go far towards revealing its legendary charms both to actual visitors and armchair travellers. Jacqueline Windh has spent ten years photographing the Clayoquot –Pacific Rim in all its seasons and moods, studying its history and getting to know its people. In The Wild Edge she shares her findings in images and words, supplementing her unforgettable scenic photographs with a light-hearted but informative text that blends history and science with essential visitor guidance.
“This book is a stunner.” The Province.
“A gloriously shot coffee table book that isn’t afraid to go off the Pacific Rim’s beaten path…” Monday Magazine.
“Her photographs of wildlife, people and landscapes are stunning, and her flowing narrative blends history, science and tradition.” The Globe and Mail.
The Wild Edge
Harbour Publishing 2004
Hardcover, 168 pages, 225 colour photographs, $34.95
Available at your local bookstore (if it’s not on their shelf, tell them to order it in!) or purchase now on Amazon. | <urn:uuid:6e4447d3-f382-409e-b1e8-4c1c513da803> | CC-MAIN-2016-44 | https://jacquelinewindh.com/books/wild-edge/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00292-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.902124 | 366 | 1.710938 | 2 |
This article is composed of extracts from Rex Gilroy’s: Uru - The Lost Civilisation of Australia [copyright (c) 2001 Rex Gilroy, Uru Publications] [the name Uru is the registered trademark of Uru Publications]
What is it like to suddenly realise that you are the discoverer of an hitherto unknown ‘lost’ civilisation?
Words cannot describe my feelings at the moment I realised I had made such a discovery, and the enormous importance it had for Australian, and World history.
I suppose the nearest description one could give of my feelings would be to compare them with the excitement of Heinrich Schliemann, when he discovered the ‘mythical’ lost city of Troy in 1873. In the course of my researches over many years, I had observed that the ancient myths and legends of our Aboriginal people speak of a race of ‘culture-heroes’ who inhabited the land in the long-ago ‘Dreamtime’, and had passed on much of their culture to the Aborigines.
These ‘culture-heroes’ are variously described as being pale or white-skinned; that they shaped many natural geological features, and erected many, often truly monolithic rock formations, and worshipped the Sun, Moon and Stars. They gave the Aborigines laws and passed on elements of their religion, such as Sun, Earth-Mother and Sky-Father worship, and taught the Aboriginal warriors the manufacture of the boomerang and the use of the woomera in spear-throwing. These traditions convinced me, over thirty years ago, that an advanced megalithic monument-building people had inhabited Australia.
Yet, when I published my theory in the press, I was immediately attacked by establishment archaeologists and historians, with cries of ‘impossible’ and that I was wasting my time searching for something that was nothing more than an Aboriginal myth!
Nevertheless, my theory led me on a search which culminated, one January day in 1965, while exploring dense scrubland overlooking a Blue Mountains valley, in the discovery of an extensive culture centre of crumbling sandstone mounds, altar stones carved in the forms of Serpent and Eagle motifs, and other mystery structures. One, obvious ceremonial structure was a tree-covered 15m tall mound composed of sandstone boulders and rubble. On its western side stone slab steps led to the summit, where I found, upon a flat base, facing east, a large altar stone whose flat top had been carved in the form of a serpent.
URU - The Lost Civilisation of Australia
The altar, standing on an north-south axis, measured 1.7m long by 70cm wide by 1.2m tall. The serpent, carved in relief in a curved aspect, bore a groove at its northern [head] end representing its mouth. Beside the altar was a large boulder bearing a long, deep groove, obviously used for sharpening a stone knife.
Had human sacrifices once been performed here? I later measured the mound’s base a 315m in circumference.
Another, much larger altar, carved in relief in the form of an eagle, was found in 1973 a few kilometres away, reached by climbing a 6m tall sandstone rock.
The eagle measures 72cm long from head to tail, by 1.28m wide from its left [barely depicted] wing to outstretched right wing, which like the beak points south. Once again, this altar faces east. Having met my wife Heather the previous year we were now a ‘team’ determined to locate, map, measure and photograph every megalithic site we could find..
In 1974 we were shown two 3km long alignments of granite standing stones by a farmer in the Bathurst district, west of the Blue Mountains. These structures, totalling hundreds of stones, had been erected on a north-south axis. In the months ahead we discovered many more granite structures - crude stone circles, temples and massive standing stones erected upon bases of cut stone blocks. Over the next 20 years we were to discover there were great numbers of altars, even carved stone heads, alignments and many other obvious astronomical formations, covering an area of about 10 square kilometres, and that there is a perpetual flow of natural earth electricity flowing throughout the alignment and circles making up the borders of the vast astronomical centre.
To what use was this electrical energy put by the builders. The large carved stone heads, up to 2m tall, have high foreheads, with eyes, nose and mouth toward the base and appear in both male and female forms. At the time of my first discoveries of these heads I reasoned, correctly as it turned out, that the female heads depicted the Earth-Mother and the male the Sun-god, principal deities of the old earth-worshipping megalithic cultures. During 1974, at the Bathurst district megalithic centre, and other sites on the Blue Mountains, I identified examples of ancient rock script. This script included symbols reminiscent of ancient Sumerian, yet also Celtic and Phoenician in appearance, intermixed with others of a unique character, often with images of humans and other characters.
My first attempts at translating this script were largely unsuccessful, although one word kept repeating itself at script sites hundreds of kilometres apart - ‘Uru’. Gradually I would come to realise this word was the name of the people responsible for this culture. I would also uncover the names of the principal deities of this people; Aea, their supreme being; Nim the sun-God and Nif the Earth-Mother. The eagle depicted upon altars I eventually learnt was I-na, ‘the Eagle of the Sun”, who, as inscriptions have revealed, carried the Sun across the sky each day in his beak. There are many more deities in the Uruan pantheon, and much has been learnt of their religion from the rock inscriptions, including names of kings and queens who ruled widely-scattered kingdoms throughout this continent. This information is revealed in full in “Uru - The Lost Civilisation of Australia”.
I maintain, on various grounds presented in my book, that the Uruan script was the earliest written language known to mankind, THE ‘mother’ script from which the later written languages developed, in the course of the spread of this civilisation out across the earth at the dawn of history. If indeed the Uruan script is the earliest written language, then it was developed in Australia before the earliest [officially] known script, developed in the Mediterranean around 3500 BC My book reveals fossil human evidence showing that the earliest modern humans evolved in Australia, from Homo erectus who had earlier entered this continent from south-east Asia. The Uru were descended from these first modern people.
Their language displays features of a ‘proto-Aryan’ character, as was the megalithic culture which they spread across the Old World, and which would in various ways, influence the later rise of Sumer, the civilisations of India, the Mediterranean, Middle-East and Western Europe. I have found the name ‘Uru’ synonymous with ancient megalithic sun-worship sites up through island south-east Asia and across mainland Asia to Europe, wherever the megaliths were erected. Examples of Uruan script have been found across the Old World, as well as across the Pacific as far as the Americas. Lately my wife Heather and I have uncovered megalithic structures in New Zealand, at which Uruan rock script has also been found. Just how old this script is remains unestablished for now, but it was certainly already long in use by 10,000 years ago.
The limitations of space preclude greater detail in this article, so the reader will have to wait for the release of my book (available to order now) to learn the full story. When the ancestors of the Uruans arose in Australia, I believe the natural world around them began to influence their thinking. Like all primitive stone-age people, they were fascinated by the stars and wondered what they were; the movements of the Sun and Moon: and seasonal climatic changes. And gradually was born a primitive nature-worship. Both they and their Aboriginal neighbours would have observed how quickly plants grew from the earth after rainfall, so in their simplicity, they imagined the earth as a female, the great Earth-Mother; frequently fertilised by the rain [ie semen] of a great Sky-Father, to give birth to all plant, animal and human life.
URU - The Lost Civilisation of Australia
In time, as the importance of sunlight in the cycle of life was realised, the worshippers came to believe the Earth-Mother and Sky-Father had produced a child, the Sun-God, depicted as a serpent as we have seen. The Earth-Mother bore her child in a cave in the east, from where he arose each morning to be carried across the sky to the west, where he slept in the Underworld, or ‘died’, only to rise again in the east each morning.
In the course of their earth and solar worship, the Uruans observed the rising and setting of the Sun, Moon and stars, and that they often rose in alignment with certain natural features; a mountain peak, large rock, etc., and this led to a primitive “star cult”, the worshippers erecting their own stone markers in line with natural features, with which the Sun, Moon or planetary body rose in alignment, and ultimately a more sophisticated megalithic astronomical science was born which aided the
Uruans in their development of agriculture, as well as in their maritime activities, which, as my book reveals, saw them construct ocean-going vessels with which they explored and colonised the farthest reaches of the ancient world.
Modern-day observations at the Australian megalithic sites reveals the Uruan astronomer-priests were aware of the Summer and Winter Solstices [22nd December and 22nd June respectively] at a remote period.
At one extensive astronomical stone arrangement site in the New England district of northern NSW, which covers an area of about 1,000 acres, Heather and I have mapped out several large circles whose stones have been arranged to plot the summer and Winter Solstices. In March 1991 we began uncovering yet another extensive megalithic astronomical culture centre, high up in the ranges north of Tamworth covering at least 10 square kilometres. Here stands a massive phallic-shaped granite tomb, and at another site a massive granite dolmen, both weighing 50-60 tonnes each.
There is also a 15m wide circle of large granite boulders, a couple of metres to the south of which lies a large weathered carved stone head, once erect but now lying on its back. It has a high forehead with eyes, nose and mouth toward the base. A nearby rock inscription identifies the circle as “the temple of Nim the Sun”. The head is that of Nim and is similar to others found elsewhere throughout Australia.
About a kilometre to the south of this stone circle and head, lying among the crumbling remains of an enclosure of huge granite boulders I later found another, smaller stone head, almost Mayan in appearance, bearing a flattish head upon which is engraved the message “Nim the Sun”.
Scattered about the hills hereabouts Heather and I have uncovered a large number of altar stones and collapsed structures, the remains of probable small shrines. Over a five year period we uncovered dozens of stones inscribed in Uruan script; votive offering stones, day-to-day messages, even a grave marker, and a number of small stone heads of ‘household deities’ once kept in the huts of the Uruan workforce hereabouts, at least several thousand years ago. The Uru civilisation’s demise is complex and the reader will have to obtain my book to find out the details. Yet this remarkable people have left behind them a mass of rock inscriptions which tell us much of their daily lives, their fertility festivals, the names of their monarchs, their scientific achievements, which included experiments with flight, aided by crude hang gliders, often used in their “Bird Man” cult ceremonies, particularly on the Blue Mountains west of Sydney.
This region is surely THE major culture-centre of the Uru, for thousands of rock inscriptions have so far been found over a wide area and untold thousands may yet await discovery. Here stands a large Uruan sphinx, part man, part reptile in features, weathered with age, and which for various reasons discussed in the book, may be at least 10,000 years old. It faces a huge, three-sided, flat summit astronomical pyramid, shaped from a natural mountain. It location is one of my most closely-guarded secrets, but photographs of the sphinx and pyramid will be a feature of the book. The mountain is littered with uruan glyphs and in the summer months it and its sphinx guardian are unapproachable, due to the countless snakes that literally cover the area. The Uru traded with one another over vast distances of the continent, exchanging animal hides, weapons, stone for manufacturing tools, precious stones for decoration, ochres for body paint, bush foods such as yams etc.
Much of this trade was carried out via waterways across Australia, many of which are long dried-up, such as those which formerly covered much of what is now Sydney’s western suburbs.
Before these waterways dried up with the close of the Ice-age, Uruan rafts and canoes, and larger watercraft, voyaged between widely-scattered settlements, and over lakes where now houses and highways now stand. Before the massive land developments of the suburbs, which began in the 1950's, there were a number of large terraced, tree-covered hills in the Fairfield and Prospect district, as well as outside Liverpool and several other localities now heavily built on. These terraced hills were carved out in the form of four-sided stepped pyramids.
Similarly, in the Seven Hills district, there existed until bulldozers moved into the area in 1972, a number of apparent ‘grave mound’ type structures, some of considerable height, and which early 19th century settlers of the area had been informed of by Aborigines, held the remains of ‘culture-heroes’ who shaped the landscape. In 1955 at Lansvale on the Georges River outside Cabramatta, fragments of primitive stone-age period pottery, including an almost intact bowl, were dug up by a resident. Nearby, crude stonework, the remains of apparent ancient human structures, were unearthed during the construction of a house. Found at a depth of 2m., these stones were thoughtlessly discarded by workmen in nearby Prospect Creek.
“Uru - The Lost Civilisation of Australia” will, I believe, prove once and for all that Australia, the fabled ‘lost paradise’ of mankind, was the origin of the Atlantis legend, and I present what I believe, is a mass of evidence to demonstrate this fact. | <urn:uuid:9e055822-a8c7-42df-93d4-01427cb12a61> | CC-MAIN-2017-04 | http://www.rexgilroy.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00071-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968566 | 3,170 | 2.640625 | 3 |
The Qualcomm developed Skifta app for Android has become the first application to be certified by the Digital Living Network Alliance (DLNA) under its new Software Certification program.
The app, which was demoed over in Vegas at CES, is designed to turn smartphones and tablets into universal remote controls, with an emphasis on streaming media. The idea is to allow users to access and play their digital media collection from any connected platform whether they're at home, or on the go.
Qualcomm analysts estimate that there will be nearly 2 billion DLNA Certified devices in homes worldwide by 2014.
“We are proud that the Skifta Android application has become the first DLNA Certified software application,” said Bruce Jackson, vice president of technology at Qualcomm Services Labs.
“The Skifta application demonstrates our commitment to DLNA and to making the smartphone central to the connected home and lifestyle. The Skifta application creates the potential for tens of millions of smartphones and tablets to run DLNA Certified software and stream multimedia content reliably to devices around the home.”
The Skifta application beta is available now in the Android Market. It's free, so give it a whirl and let us know what you think. | <urn:uuid:8ff17854-0b86-41b5-a0d7-270ea81ba542> | CC-MAIN-2017-04 | http://www.pocket-lint.com/news/108464-qualcomm-dnla-skifta-android-market | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00431-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.930544 | 251 | 1.515625 | 2 |
MILWAUKEE -- Thousands of 20- and 30-somethings are expected to participate in workshops and social events being offered in Milwaukee this week as part of a program focusing on Millennials.
Young Professional Week begins Sunday with a series of events focused on Milwaukee. Other days will focus on water issues, women in leadership, economic development and the environment.
Organizer Angela Damiani says 1,500 people attended events last year when the program started, and 5,000 are expected this year based on responses so far.
Damiani says all but three of the 21 events are free, although people are asked to sign up in advance because some of the buildings and tours have space limitations.
People can sign up for events at the Young Professional Week website: http://www.ypweek.com/ . | <urn:uuid:e4505704-d1fa-4e99-8c72-2b3c1b538cc8> | CC-MAIN-2017-04 | http://www.dailyherald.com/article/20130413/news/130419940/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00487-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.96403 | 166 | 1.609375 | 2 |
Google has just launched its new service inside Gmail which enables users to voice and video chat. To use this new feature, the only thing you have got to do is just to download and install the voice and video plugin and that’s it. The rest is up to Gmail. This new feature, according to gmailblog.blogspot.com has been designed by “using Internet standards such as XMPP, RTP, and H.264, which means that third-party applications and networks can choose to inter-operate with Gmail voice and video chat.” Once you have installed the plugin, ” just click on the “Video & more” menu at the bottom of your Gmail chat window, and choose “Start video chat.” If you want to know more, watch the video below.
Related Articles Latest Articles
- How to Search for Content in any File in Windows 10
- How to Block and Restrict Other Users Access to Windows 10 Registry Editor
- Easy Trick to Find Out the WiFi Password of a Internet Connection (No Hacking Required)
- How to Save, Backup and Restore All Drivers in Windows 10
Web Talk is best viewed in Firefox. | <urn:uuid:dc0e6662-6da8-4efa-a72e-03f627f1c01b> | CC-MAIN-2017-04 | http://www.webtlk.com/2008/11/13/new-gmail-features-voice-and-video-chat/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00304-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.931712 | 246 | 1.507813 | 2 |
Hello, I would be happy to help you with your question.
First of all, it is normal to attempt conception for up to a year! Your chances of pregnancy
per cycle are only about 15-20%. So at 6 months, do not panic.
Second, your irregular cycles might indicate that you are not ovulating predictably which will decrease your chances of conception. You should talk with your doctor about testing for diabetes
and thyroid disease
, and also ask them if you are candidate for medications to regulate your cycle and increase the chances of ovulation, such as Clomid
I hope that this helps and good luck! If you would like a more detailed or prompt answer, please consider the Premium Service. | <urn:uuid:f53ae8d2-b62d-4c14-8bf1-824cba9ac55d> | CC-MAIN-2016-44 | http://www.healthcaremagic.com/questions/Trying-to-conceive-Irregular-periods-pain-in-the-breast-and-white-bumps-around-nipple-Pregnant/343725 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00167-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.954203 | 146 | 1.773438 | 2 |
A compound found in a poisonous plant nicknamed the deadly carrot blocks the activity of all COVID-19 variants in isolated cell cultures, according to a new study in the journal Virulence. Known as thapsigargin (TG), the antiviral agent triggers an immune response in host cells that stops viruses from replicating and appears to be effective against all known COVID variants, including the highly infectious Delta variant.
Extracted from a plant called Thapsia garganica, TG has previously been found to inhibit the activity of several influenza viruses as well as the original SARS-CoV-2 strain. However, the emergence of new COVID-19 variants during the course of the pandemic has raised questions as to whether the compound is capable of blocking some of the more virulent forms of the pathogen.
The researchers began by comparing the potency of the Alpha, Beta, and Delta variants. To do so, they infected human cell cultures with each strain, and measured the viral RNA load in these samples 24 hours later.
Initial results indicated that the Delta variant was by far the most prolific, multiplying and spreading at a rate that was four times higher than the Alpha variant and nine times higher than the Beta variant. The researchers also discovered that the Delta strain significantly boosts the multiplication rates of other variants when cells were co-infected with two different SARS-CoV-2 viruses.
Worryingly, all co-infection combinations resulted in what the authors describe as “multiplication synergy”, whereby new virus outputs were greater than the sum of the two variants involved.
The good news, however, is that TG was found to inhibit the replication of each individual variant as well as all co-infection combinations. When applied to cells that had been pre-treated with TG, the ability of all variants to replicate and spread to adjacent cells was diminished by at least 95 percent.
“In [Alpha-Delta] co-infection, the most prolific infection group, combined viral RNA from TG-primed cells fell by 99.6%” in comparison to cells that had been treated with a control substance, the authors write.
“We further showed that TG was effective in inhibiting the replication of the three variants during active infection,” they explain, indicating that the compound is protective when used as a treatment as well as a preventative.
“Our new study has given us better insights into the dominance of the Delta variant,” said study author Professor Kin Chow Chang in a statement. “Even though we have shown that this variant is clearly the most infectious and promotes production of other variants in co-infections, we are pleased to have shown that TG is just as effective against all of them.”
“Together, these results point to the antiviral potential of TG as a post-exposure prophylactic and an active therapeutic agent.”
As promising as these findings may be, however, it’s important to note that researchers are yet to develop an actual treatment from the compound, and that self-medicating with deadly carrot is the last thing that anyone should do. For the time being, vaccines remain the most effective form of protection against COVID-19. | <urn:uuid:d1b02ca6-027a-499c-9b74-67bb8125c60d> | CC-MAIN-2022-33 | https://freemarketing.net/2021/11/23/plant-based-antiviral-drug-effective-against-all-known-covid-19-variants-iflscience/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00671.warc.gz | en | 0.974058 | 667 | 2.90625 | 3 |
One of the most sensational crimes of the 20th century took place when two wealthy young men decided to commit the perfect crime. Travel back in time to learn of how they planned their dastardly deed. From the carefully laid out plans for ransom and the brutal murder of a young boy, these two young men chose path which weaved through the Cook County courtroom with America's most famous attorney who slipped them off the hangman's gallows into prison for life.
With all the details of today's modern documentaries the very words of the killers themselves will spellbind the listener and have all parents noting the whereabouts of their children. Danger lurks at all times, often from those who know your child. This true crime story is as relevant today as it was to the family of young Bobby Franks in 1924 when he was murdered by the depravity of Richard Loeb and Nathan Leopold.
©2012, 2013 Kenneth C Rossignol (P)2013 Kenneth C Rossignol
Richard Loeb and Nathan Leopold grew up together. Both highly intelligent and both very dangerous.
They set out one day to commit an intentional murder. It is very hard to understand this much evil. Loeb and Leopold made so many plans in order to pull this murder off.
The police and the District Attorney when questioning the two got direct answers as Loeb confessed to his part.
Leopold also just answered questions with no responses that showed any feelings about what they had done at all.
The facts of this case are so stark and chilling. These men did not care what happened to their small kidnapping victim.
Even when being questioned there was no remorse. They believed they were too intelligent to get caught. They believed they had the perfect crime planned out.
Since they were only murderers were only 18 and 19 years old they were treated differently in sentencing. Ken Rossignol and Bruce Caplan did a great job with the research and brought this story to light.
There was a child, a trusting child that was murdered and they never showed any compassion for that little boy.
I am glad I read this book, because I never would have believed it to be true if I had not.
This was an Audible AudioBook and it was well represented. The narrator Stan Jenson was impressive. The characters were clearly different in their speech patterns. He had a clear concise narration voice and the voices were well defined.
birds and more birds
a different narrator, the narrator was straight out of a rankin and bass holiday special he would be better off with bad children's books
... think this whole production was a practical joke. Though I don't like it, I can usually live with narrators doing multiple voices. Not with this production. It's nearly impossible to listen to the narrator read dialogue. If he just used his own voice, it probably would've been fine. The story, of course, is morbidly fascinating, but there were scenes that repeated themselves. So, on top of the issues with the audio production, the narrative needed a better editor.
Report Inappropriate Content | <urn:uuid:6cf17353-e72d-49ff-b167-2d3a2de799f0> | CC-MAIN-2017-04 | http://www.audible.com/pd/History/Leopold-Loeb-Killed-Bobby-Franks-Audiobook/B00EUS6I6S/ref=det_sim_narr_2 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00392-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.985219 | 632 | 1.851563 | 2 |
Nalyvaiko, Severyn (Semerii) [Наливайко, Северин (Семерій); Nalyvajko], b ca 1560 in Husiatyn, Galicia, d 21 April 1597 in Warsaw. Cossack leader; brother of Demian Nalyvaiko. He participated in campaigns of the Zaporozhian Cossacks against Turkey and the Crimean Tatars and then served as a captain in Prince Kostiantyn Vasyl Ostrozky's private army. In 1594 he became otaman of an independent Cossack force in the Bratslav region and led it on a campaign into Moldavia, where it defeated the Crimean Tatars advancing against Hungary. In the spring of 1595, together with Hryhorii Loboda and Matvii Shaula, he successfully engaged the Turks in Moldavia and Transylvania, thereby halting their advance on Austria.
After Nalyvaiko returned to Ukraine, he led a popular rebellion against the Poles that spread from the Bratslav region throughout Right-Bank Ukraine and into Belarus. With the help of local burghers the rebels captured Bratslav, Husiatyn, Bar, Lutsk, Kaniv, Cherkasy, and Slutsk, Babruisk, and Mahiliou in Belarus. In late 1595 the Polish government sent Hetman Stanisław Żółkiewski and the royal army to suppress the rebellion. Having retreated from Belarus, in April 1596 Nalyvaiko's force united with Matvii Shaula's Zaporozhians and successfully engaged the Poles at Bila Tserkva before retreating to Pereiaslav. There Nalyvaiko was elected hetman in place of the wounded Shaula. On 26 May 1596 the rebels were surrounded by a superior Polish force near Lubny. After a two-week Polish siege a mutiny arose among the rebels. Hryhorii Loboda was lynched, and on 7 July 1596 Nalyvaiko and Shaula were handed over to the Poles. During peace negotiations S. Żółkiewski's army caught the rebels off guard and slaughtered several thousand Cossacks. Nalyvaiko was taken to Warsaw, where he was cruelly tortured before being beheaded, quartered, and put on public display. After the rebellion all Cossack lands and enterprises were legally confiscated and redistributed among Polish magnates. Nalyvaiko was portrayed as a hero in folk stories, folk songs, and folk legends. Taras Shevchenko and Kondratii Ryleev glorified him, and the Soviet writer Ivan Le wrote a novel about him.
Antonovych, M. Studiï z chasiv Nalyvaika (Prague 1941)
Rozner, I. Severin Nalivaiko: Rukovoditel’ krest’iansko-kazatskogo vosstaniia 1594–1596 gg. na Ukraine (Moscow 1961)
Myshko, D. Severyn Nalyvaiko (Kyiv 1962)
Gordon, L. Cossack Rebellions: Social Turmoil in the Sixteenth-Century Ukraine (Albany, NY 1983)
[This article originally appeared in the Encyclopedia of Ukraine, vol. 3 (1993).] | <urn:uuid:edb32e61-cd64-4450-815e-8a8ca75a5db8> | CC-MAIN-2017-04 | http://www.encyclopediaofukraine.com/display.asp?linkpath=pages%5CN%5CA%5CNalyvaikoSeveryn.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00016-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.913482 | 728 | 2.8125 | 3 |
Written By Jessica Ryen Doyle for Fox News
In the past 20 years, stem cell research has been thrust into the medical spotlight as celebrities like Michael J. Fox and Christopher Reeve have advocated for it. Also, numerous studies have shown stem cell therapies have successfully treated a plethora of diseases.
And now, with the release of The Healing Cell: How the Greatest Revolution in Medical History Is Changing Your Life, the Catholic Church has given its stamp of approval on adult stem cell research by discussing the many ways these therapies work for the greater good. In fact, Pope Emeritus Benedict XVI wrote the book’s introduction, which was co-authored by Dr. Robin Smith and Monsignor Tomasz Trafny, along with Max Gomez.
Stem cell therapy isn’t anything new. Using bone marrow transplants to treat leukemia, which started more than 40 years ago, is essentially the same procedure. Through this process, doctors extract stem cells from the bone marrow and transplant them into the body to replace damaged cells caused by blood and bone marrow cancers. Sometimes cancer patients use autologous cells – cells harvested from their own body – and sometimes they use donated cells from another person’s bone marrow.
Smith said when celebrities began speaking out on behalf of embryonic ‘super cells,’ that’s when the real buzz started.
“Embryonic stem cells can become anything, any organ,” Smith said. “You have to destroy the embryo to get the cells, unless it’s from a stillborn fetus. It’s hard to control that in a lab. So that’s a little different from an adult stem cell, which is more mature. They exist in our bodies throughout our lifetime and go on to create just one or two specific things. All these clinical trials are looking at what cells should come from and where, in order to be treated.”
Embryonic stem cells are derived from unused embryos initially intended for in vitro fertilization. However, because of the sheer number of embryos actually created and stored, there are many ultimately slated for destruction.
The ethical concerns come from whether or not to use embryonic stem cells for research. | <urn:uuid:b7c409f3-f39f-4ea8-a86a-cfd1b9a08953> | CC-MAIN-2017-04 | http://www.empowher.com/wellness/content/catholic-church-gives-its-blessing-stem-cell-research-new-book | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00328-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.940625 | 452 | 2.15625 | 2 |
Editor’s Note: FII’s #MoodOfTheMonth for May, 2022 is Gender at Workplaces. We invite submissions on the many layers of this theme throughout the month. If you’d like to contribute, kindly refer to our submission guidelines and email your articles to email@example.com
Many households, especially the more economically affluent and urban ones, rely on domestic workers. The International Labour Organisation characterises domestic workers as workers who perform domestic work for pay and remuneration. These workers perform arduous tasks, which can include cooking, washing clothes, sweeping, cleaning, childcare, driving, security, etc. These tasks often have a gendered assignment within a household, and exporting these tasks to external sources, reflects those gender dynamics.
Domestic work entails one of the most significant employment avenues for women in India. According to National Sample Survey Office (2012), India has 39 lakh people employed as domestic workers, out of which at least 26 lakh are women. However, the lack of legislation and the socio-economic dynamics within these spaces have resulted in high informalisation of this work.
While domestic work has always observed a demand, the spike in domestic workers in the recent decade has been amplified by increasing industrialisation, shrinkage in agricultural employment, and rapid urbanisation. These workers, especially women, have observed a reduction in their traditional income sources (mainly agriculture), and lack transferable skills to work in other sectors. There is a surplus of female workers without adequate education and skills, who seek better sources of income in cities and are often absorbed into the informal economy, especially in the expanding services sectors, which includes domestic work.
The informal economy captures a significant slice of the global market, especially in the emerging economies. South Asian countries are particularly characterised by large-scale informal employment, the highest among emerging economy regions in the world, about two-fifths of the world total.
Domestic work offers easy employment opportunities to women who might seek to augment their income, or otherwise lack sources of income, due to a lack of qualifications and skills as well as discriminatory barriers in other employment avenues. However, its highly informal, deregulated, and unorganised nature creates conditions unfavourable to the workers, especially women and individuals from other marginalised social locations.
The domestic worker often faces poor working conditions, and low wages and is subject to exploitation, routine harassment, and abuse. With the overwhelming number of women in this category, tied to the isolating nature of the work, without the ability to unionise or belong to organisations, and reliant on word of mouth, domestic workers, especially women in private homes are also vulnerable to sexual abuse, with few means for recourse.
Private households are not recognised as work establishments bound by labour laws. The same kind of work performed at an establishment like a school or factory is considered work bound by labour laws, yet domestic workers do not receive the same recognition. Domestic work can be highly fragmented, with workers often employed on a part-time basis in multiple households, which makes it difficult for existing legislation to cover.
Moreover, domestic workers do not have a specific set of hours of work, thus, with no strict adherence to minimum daily wage and working hours. However, the total amount of hours they put in can equate to or be greater than, for example, the number of hours a full-time factory employee works.
A majority of domestic workers also belong to the oppressed castes and are often employed by members of the dominant castes. Notions of purity and pollution influence their treatment at work, and the kind of tasks allocated to them. These caste-based dynamics are evident, such as the provision of separate utensils, separate or no water facilities, denial of the use of furniture or toilet facilities, provision of stale food, etc. All these are examples of daily humiliations and indignities domestic workers are forced to face.
Household work is devalued and that is reflected in the pay for such work, especially due to high labour competition. Moreover, it is also stigmatised, where having to clean another person’s house is considered impure and looked down upon since it is often driven by necessity rather than choice. Yet, those who look down upon such work seek out such workers to labour in their households.
The unorganised nature of work, reliance on word of mouth, and the bargaining power of the employer leave domestic workers vulnerable to exploitation and income insecurity. For example, a personal account by a domestic worker stated a common occurrence in their work. Often, when an employer decides to travel or take a holiday, they do not get paid for that period of time, and yet are expected to immediately start work once they return.
This indicates a devaluation of their work tied to the informal nature of the arrangement as well as a dismissal of household work. Job opportunities are few, inequalities are high, and competition for labour is plentiful, leaving workers with little recourse. In other instances, workers have often faced accusations of theft, especially among employers who do not wish their dues. Domestic workers often have too little bargaining power and are subject to the whims of their employees.
Comprehensive legislature encompassing the varied nature of domestic work is crucial. There is a need for regulation and monitoring to reduce the possibility of exploitation and allow means of recourse for the workers. Provisions to aid the unionisation and organisation of domestic workers are necessary, to allow for greater collective bargaining power, regulate wages, argue against unfair dismissal, and improve job security.
Moreover, linking such legislature to social protection schemes is essential, as highlighted during the COivid-19 pandemic, where thousands of workers were forced to survive without income for months.
Most importantly, there is a need to recognise domestic work as dignified work, both in the paid and unpaid sphere, and recognise the culpability of those who employ domestic workers. Such exploitative practices should not be considered the norm, and individual households that employ domestic workers hold a strong measure of responsibility to treat them with dignity and support their rights.
Featured Image Source: UCA News | <urn:uuid:9327f43f-224e-4dd6-aa1b-9492d48e455e> | CC-MAIN-2022-33 | https://feminisminindia.com/2022/05/24/domestic-workers-unorganised-left-with-low-bargaining-power-and-forced-into-indignity/?amp | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00072.warc.gz | en | 0.966076 | 1,249 | 3.359375 | 3 |
Golden-cheeked warblers are the only bird species that nests exclusively in Texas, including the refuge.
Miles of trails lead you through old growth cedar forests, meadows and along rocky creeks. Come enjoy the beauty of the Hill Country!
Wildlife Watching and Nature Trails
Public Use Areas
Balcones Canyonlands is not a continuous piece of land. It is actually fragmented with only 3000 of its 27,500 acres open to the public.Trails and Where to Find Them
About the NWRS
The National Wildlife Refuge System, within the U.S. Fish and Wildlife Service, manages a national network of lands and waters set aside to conserve America’s fish, wildlife, and plants.
Learn more about the NWRS
What's Happening at the Refuge
In the late 1980s the future for the black-capped vireo looked bleak. Only about 350 birds were known to survive in a few locations. Following the bird’s listing under the Endangered Species Act (ESA) in 1987, the Service began working with the states of Oklahoma and Texas, the U.S. Army, private landowners and non-governmental organizations to protect and recover the vireo. There are now more than 5,200 known birds and more than 14,000 estimated across their breeding range.More about the proposal
Come join other birders at the refuge for a guided bird walk, learn about how to identify birds and get expert advice on finding elusive species. Walks held weekly on Tuesdays and Thursdays.Morning Bird Walks through February
- December 19, 2016
This is a free event and welcomes expert and beginner birders.Event and registration details
The refuge has been identified as an internationally Important Bird Area, an official designation indicating its unique importance to birds, specifically the golden-cheeked warbler and black-capped vireo.
Their songs are derived from a large syllable repertoire, an order of magnitude greater than that of other vireos.
Page Photo Credits All photos courtesy of USFWS unless otherwise noted., Golden-cheeked warbler / Greg Lasley ©, Black-capped vireo / Greg Lasley ©
Last Updated: Dec 16, 2016 | <urn:uuid:4685466b-9935-4038-b187-bb5fcf37636c> | CC-MAIN-2017-04 | https://www.fws.gov/refuge/Balcones_Canyonlands/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00308-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.923918 | 463 | 3.015625 | 3 |
Twenty years ago, we were still using dial-up internet. Ten years from now, power could be supplied to homes wirelessly. In 20 years, there’s no telling what kind of world we’ll inhabit. However, one thing is for sure: space travel will look very different than it does today.
In recent years, the private sector has been leading the way in a new age of commercial space exploration and development. We hope this trend continues unabated. And that NASA will continue to play an important role in pushing the boundaries of human knowledge and understanding. Through its unparalleled expertise in deep space missions like Voyager 1 and 2. But progress seems to be increasingly being driven by private interests more than ever before.
As the old saying goes, necessity is the mother of invention. The same can be said for space travel. There are too many examples of things that were not invented until there was a need for it to count them all here.
However, here is a list of just some of what we have discovered so far:
- Inflatable space habitats like the Bigelow Expandable Activity Module (BEAM) and the Transhab Concept (TransHab – see Space Station Freedom)
- New propulsion technologies such as nuclear thermal rockets, Hall Effect thrusters, and ion thrusters
- Flexible solar arrays such as deployable solar arrays and roll-out solar arrays.
- Advanced materials such as carbon fiber, Kevlar, Teflon, reinforced plastics.
- Telecommunications improvements such as the ability to send voice and video transmissions through space.
- Advancements such as microprocessor development and nanotechnology innovations.
Obviously, the list above isn’t exhaustive. But it gives you an idea of how much progress has been made in a relatively short period of time. As well as what frontiers are yet to be explored.
What about Space Tourism?
Imagine a future where you can book a vacation that includes an African safari in the morning, New York City sightseeing in the afternoon, and watching a man-made meteor shower from your hotel balcony at night.
Now imagine booking that same trip for 35 years from now. You’ll be able to board a spacecraft, blast off into space aboard an incredibly luxurious spaceship filled with fine wines and top-notch entertainment, and then glide down back to Earth — without ever leaving home.
Shortly, SpaceX and XCOR Aerospace will offer space travel on a commercial basis for the first time. The companies are among the few companies in the world working to make space travel a reality.
“We’ve been doing it for the last 20 years. We’re ready to go,” Greason told Business Insider in a wide-ranging interview. “It’s not a question of if it will happen, but when.”
Another contender for space tourism is SpaceX. And now it seems like space tourism is on the minds of billionaires as well. Elon Musk and Jeff Bezos are already on board with the idea of space tourism.
It might sound like science fiction, but Elon Musk says that his company isn’t just dreaming about this future. He says it’s already on track to deliver it.
It is only a matter of time until we explore space as a leisure activity. | <urn:uuid:c5d41c55-3199-4e60-a465-a34a1858e759> | CC-MAIN-2022-33 | https://www.wikye.com/what-will-space-travel-look-like-in-20-years/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00676.warc.gz | en | 0.951693 | 682 | 2.859375 | 3 |
The overlapping territorial disputes in the South China Sea involve China, Brunei, Malaysia, Taiwan, the Philippines and Vietnam have recently been moving from bad to worse. Vietnam is seeking to upgrade its air defences by acquiring western fighter jets and drones, a move which would further militarize a dispute with Beijing over territorial claims in the South China Sea. Taiwan's coast guard has commissioned its biggest ships for duty in the form of two 3,000-ton patrol vessels, as the island boosts defenses amid concerns about China's growing footprint in the disputed South China Sea, says a report in the Reuters. The new vessels will be able to dock at a new port being constructed on Taiping Island, the largest of the naturally occurring Spratly Islands in the South China Sea, before the end of this year. In a troubling sign that tensions continue to grow over the contested South China Sea, the Philippine government is claiming a Chinese warship has opened fire, with warning shots directed at one of its fishing boats in the area. The development follows a war of words between the two nations after the Philippine president, Benigno Aquino, this week likened China's behaviour to that of Nazi Germany in the lead-up to World War II. A Chinese coast guard vessel has been accused of encroaching on Malaysia's territorial waters in the South China Sea.
China asked the United States to take no position on the South China Sea issue after US Navy Officer Robert Thomas promised to back the Association of Southeast Asian Nations (ASEAN) in patrolling areas of the waterway. "We hope the United States will strictly honor its commitment of not taking positions or sides on territorial sovereignty issues," said Chinese Foreign Ministry spokesperson Hong Lei.
Taiwan proposed a peace initiative on Tuesday to resolve territorial disputes in the South China Sea that it says will reduce tensions that have put Beijing at odds with its neighbours and the United States. The South China Sea Peace Initiative announced by President Ma Ying-jeou called on claimants to temporarily shelve their disagreements to enable negotiations on sharing resources. Ma's plan is similar to a 2012 proposal for the East China Sea
The United States is expected to sail warships close to China's artificial islands in the South China Sea within the next two weeks to signal it does not recognize Chinese territorial claims over the area, the Financial Times reported, citing a senior U.S. official. The ships will sail within the 12-nautical-mile zones that China claims as territory around some of the islands it has constructed in the Spratly chain, the report said.
Indonesia has no conflict with China over the South China Sea, an Indonesian palace spokesman said on Wednesday, days after eight Chinese crew members were detained for allegedly fishing illegally in the Natuna Sea. "There is no conflict between Indonesia and China related to the South China Sea," said presidential spokesman Johan Budi told reporters. "This is purely the enforcement of law by Indonesia, and we have already conveyed our letter of protest."
U.S. Secretary of State John Kerry will urge Southeast Asian nations in meetings in Laos next week to find diplomatic ways to launch talks with China on easing tension over the South China Sea following an international court ruling that denies China's claims in the sea. Kerry travels to Laos' capital Vientiane on Monday for meetings of foreign ministers from the 10-member Association of South East Asia Nations where tensions between China and several ASEAN members
CNOOC Ltd.’s unlisted parent company plans to start deep water oil and gas exploration in the South China Sea with Canada's Husky Energy Inc. next year, according to AP report. If the scheduled exploration finds sizable reserves in a bloc in the South China Sea about 185 miles south of Hong Kong, it will be China's first deep water oil and gas field. CNOOC's parent company is currently restricted to pumping oil and gas offshore at no deeper than 350 m
China has expressed anger at remarks made by the Association of Southeast Asian Nations (ASEAN) secretary general Le Luong Minh on the disputed South China Sea, , rejecting Chinese claims based on the so-called nine-dash line. The Chinese government criticized Association of Southeast Asian Nations (ASEAN) Secretary General Le Loung Minh over the latter’s remarks on the issue in the South China Sea, particularly on the contested “nine-dash-line” claim.
Countries must be free to pass through the South China Sea, the European Commission said on Wednesday, in its first diplomatic admonishment of Beijing after Chinese jets intercepted a U.S. military plane over the contested waters last month. The Commission avoided directly criticising Beijing, a major trade partner, but warned in a new policy document that it opposed "unilateral actions that could alter the status quo and increase tension"
Three State-owned enterprises from the shipping, tourism and construction sectors will cooperate to equip up to eight cruise liners and offer diversified sightseeing services to tap the travel market in the South China Sea, says China Daily. Sanya International Cruise Development Co Ltd, a joint venture by COSCO Shipping, China National Travel Service (HK) Group Corp and China Communications Construction Co Ltd, will buy between five and eight ships.
China's sole aircraft carrier conducted drills in the South China Sea, the navy said, days after neighbouring Taiwan said the carrier and accompanying ships had passed 90 nautical miles south of the island amid renewed tension between the two sides.
Russia sent its anti-submarine destroyer and a replenishment oiler to the Philippines in a bid to hold maritime exercises with the latter, according to various media reports. The two ships — Admiral Tributs, an anti-submarine vessel
A group of Chinese warships led by its sole aircraft carrier is testing weapons and equipment in exercises this week in the South China Sea that are going to plan, China's foreign ministry said Wednesday. Exercises by the ships, in particular the aircraft carrier Liaoning
Singapore welcomes Hong Kong pledge on handling of dispute. Singapore's defence minister on Monday said the nine armoured vehicles seized in Hong Kong could not be detained or confiscated, but that he welcomed Hong Kong's pledge for the dispute to be handled in line with its laws.
The United States is ready to confront China should it continue its overreaching maritime claims in the South China Sea, the head of the U.S. Pacific fleet said on Wednesday, comments that threaten to escalate tensions between the two global rivals.
The U.S. government has approved the sale to the government of the Philippines of two Sea Giraffe radars and related equipment, support and training for about $25 million, the U.S. Defense Security Cooperation Agency said on Wednesday.
A Chinese warship has seized an underwater drone deployed by a U.S. oceanographic vessel in the South China Sea, triggering a formal diplomatic protest and a demand for its return, U.S. officials told Reuters on Friday. The drone was taken on Dec
Zycraft announced it had recently completed its longest range and fastest delivery of spares to a vessel in the Indian Ocean with one of its Shomari Long Range Vessels (LRV-17). The Nimble Cheetah traveled a total distance of 980 nautical miles at 25 knots to deliver critical
China's Defense Ministry said on Saturday it plans to return an underwater U.S. drone seized this week by a Chinese naval vessel in the South China Sea, but complained the United States was "hyping up" the incident. The drone was taken on Thursday
The United States expects China to return an underwater drone "relatively soon" after a Chinese naval vessel seized it in the South China Sea last week, triggering U.S. protests, two U.S. defense officials told Reuters on Monday.
Japan and Indonesia are planning to establish a new high-level bilateral maritime forum. The Japan-Indonesia Maritime Forum will discuss maritime cooperation., says a report in The Japan News. Under the new framework, Tokyo will support Jakarta’s efforts to protect its
The United States said on Tuesday it had received an underwater drone "unlawfully seized" by a Chinese vessel last week and called on China to refrain from further efforts to impede its lawful activities in the South China Sea. China had earlier announced it had returned the drone
China has begun daily civilian charter flights to Woody Island in the disputed South China Sea after approved the airport there for civil operations, state news agency Xinhua said on Thursday. China claims almost all of the South China Sea
China's sole aircraft carrier has arrived at a naval base on the southern Chinese province of Hainan, a senior Taiwanese military officer said on Wednesday, after drills that took it around self-ruled Taiwan, an island China claims as its own.
Asia’s most populous democracies and emerging powers, have firmed up a blueprint for enhancing maritime cooperation and resolved to jointly combat terror. India and Indonesia enjoy a good maritime partnership. India has backed Indonesia on the latter’s escalating dispute | <urn:uuid:8e8b57e8-df79-4490-a4b2-b075530b6306> | CC-MAIN-2017-04 | http://www.marinelink.com/maritime/china-sea | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00072-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.950844 | 1,834 | 1.945313 | 2 |
* EU leaders meet on Thursday to discuss next steps on Russia
* U.S. pushing for sanctions against Moscow, Europe more cautious
* Germany's Merkel urges mediation to resolve Ukraine crisis
* If Russia does not change course, EU sanctions possible
By Luke Baker
BRUSSELS, March 5 (Reuters) - European leaders are under pressure to match the United States in imposing sanctions on Russia over Ukraine. But splits in the European Union, with many countries either close to Russia or reliant on its energy, means EU-U.S. unity is unlikely.
The EU has given Russian President Vladimir Putin until Thursday to reverse course over Crimea or face sanctions, which could include visa and travel bans, the freezing of Russian assets abroad and other political and economic steps.
At the same time, diplomatic energy is being deployed to try to get Putin to accept monitoring on the ground in Crimea and broader mediation with Ukraine, possibly via the Vienna-based Organization for Security and Cooperation in Europe.
EU leaders will meet in Brussels on Thursday to decide on the next steps, but diplomats and EU officials say it is unlikely that there will be agreement among all 28 member states for any hard or far-reaching measures against Russia.
Under EU rules, unanimity is required to impose sanctions.
"I'm not convinced leaders can go very much further," said one EU official involved in preparations for the summit.
"If you are arguing for de-escalation, how do you achieve that if you escalate via sanctions? There's a desire among major member states to avoid measures that might provoke."
Finnish Prime Minister Jykri Katainen, whose country shares a 1,300 km (800 mile) border with Russia and understands the Russian mindset after past wars, said mediation was preferred.
"Any sanctions must be looked at only if the negotiations won't proceed," he said. "Sanctions always have a negative impact for the ones that launch them, so they must be carefully evaluated. It is likely there will be counter-sanctions."
The most influential country in the debate is Germany, which has vast business and trade ties with Moscow, including importing nearly a third of its gas from Russia.
Chancellor Angela Merkel has been the most forthright among EU leaders in advocating mediation, a position backed to varying degrees by France, Britain, the Netherlands and Italy - five of the largest and most powerful EU member states.
While Merkel has not ruled out sanctions - and EU foreign ministers have agreed that in the absence of "de-escalating steps" by Russia they will consider "targeted measures" - she would rather rely on dialogue to ease tensions.
The stakes are high. France has a deal to sell warships to Russia that it is so far not prepared to cancel, London's banks have profited from facilitating Russian investment, and German companies have $22 billion invested there in Russia.
For its part, Britain was embarrassed on Monday when photographers took pictures of an official taking documents into a meeting with Prime Minister David Cameron showing UK opposition to restrictions on Russian access to London.
Britain said the documents were no guide to the line it might take on sanctions, but it was an indication of the grey area that exists in Europe, far different from the black-and-white approach in Washington.
With Russia supplying nearly a third of Europe's oil and gas, Moscow holds a degree of leverage it could never hope to exert on the United States, which is largely energy independent.
Add to that the close historical or business ties that exist between Moscow and countries such as Cyprus, Italy, Bulgaria and Hungary, and it quickly becomes clear that securing EU unanimity on sanctions may be impossible.
Even the decision by the G7 nations to suspend preparations for the G8 summit in Sochi in June - a move to isolate hosts Russia - was not uniformly backed in private: diplomats said Italy had reservations about it.
Putin knows the pressure he can bring to bear on Europe, and yet is also aware that Europe is far and away Russia's largest trading partner and the biggest buyer of its energy.
While Moscow has threatened retaliation against the United States and Europe if they impose sanctions, Putin has also been quick to talk down the threat of an economic escalation.
"It's not necessary to add to the difficult situation," he said on Wednesday. "It is not necessary to whip things up and place political considerations on top of issues of economic cooperation."
Another factor playing on the minds of EU officials is what to do if sanctions are imposed. The quality of sanctions depends on the precision with which the legal net is drafted. In the case of EU sanctions on Iran, that net was steadily unpicked.
U.S. officials have indicated they are considering sanctions on Russia banks, in much the same way measures were imposed on Iranian banks over the country's nuclear programme.
The EU's history there is unpalatable: it followed the U.S. and imposed sanctions on a number of Iranian banks. But some of the banks sued in the European courts and won because the EU could not produce sufficient evidence.
It is an experience the EU would prefer not to repeat. (Additional reporting by Justyna Pawlak in Brussels and Jussi Rosendahl in Helsinki; Writing by Luke Baker; Editing by Giles Elgood) | <urn:uuid:35b7daa5-8ccc-46f7-8cd8-111de56c18a8> | CC-MAIN-2017-04 | http://news.trust.org/item/20140305142009-0maxa/?source=hpbreaking | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00215-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.965319 | 1,079 | 1.765625 | 2 |
09 Jun The Modi Government’s “Achievement”
The Modi government is celebrating four years in office with great fanfare. The fact that these four years have unleashed an unparallelled process of social and political retrogression in the country is well-known and need not detain us here. Our purpose here is to examine what these years have meant for the living standards of the bulk of the Indian people.
Here however one immediately comes across a hurdle. For a very long time India had one of the finest statistical systems in the world, with a National Sample Survey collecting data from a large sample of households, larger than anywhere else in the world, once every five years. This survey pioneered by Professor P.C.Mahalanobis provided a mine of information on various aspects of economic life, on the basis of which meaningful economic discussions could occur. The data thrown up by this Survey alas are now increasingly either being withheld from the public domain or not even being collected. Challenging Modi’s bombasts therefore is now being made increasingly difficult.
Mercifully however, despite all camouflage, a bit of the truth always shows through, even from other official statistics. Let us see what it reveals about Modi’s four years.
The Central Statistical Organization provides data on the Gross Value Added in various sectors of the economy in current prices, from which we can get the nominal Gross Value Added in the sector “Agriculture, Forestry and Fishing, and Mining and Quarrying”. Agriculture alone, as is well-known, employs almost half of the country’s total work-force. Hence taking this sector as a whole we can safely say that it employs well over half of the work-force of the country and hence provides the means of livelihood for more than half the population. What happens to the people dependent on this sector, who also are largely co-terminus with the “poor” in the country, is the real acid test of the performance of any government.
Now, Modi came to power at the end of May 2014, which means that its first year in office coincided with almost the entire financial year 2014-15. We can therefore take 2013-14 as our base year from which the Modi period can be judged. Accordingly, we shall examine how the living standard of the population dependent upon this sector has improved by 2017-18 over that base year.
The CSO itself also provides data on the “real” gross value added in this sector, by deflating the nominal gross value added with a price index of the goods produced by it. But this means looking at the “real” amounts produced by this sector, which does not give us any idea of the living standards of the people engaged in this sector. For this we need to look not at the real bundle of goods they produce but at the real bundle of goods over which they have command through the incomes they earn from what they produce. We therefore deflate the nominal gross value added in this sector, comprising agriculture, forestry, fishing, mining and quarrying, by the index of consumer prices which is also taken from official statistics. This is a combined index which has started being published of late, apart from the sectional consumer price indices for particular groups, such as agricultural labourers, rural labourers, and industrial workers.
Upon deflating the nominal gross value added figure, which is nothing else but the sum total of the gross incomes of all the persons engaged in production in this sector, by a consumer price index and calculating the per capita figures on the assumption of a 1.5 percent rate of population growth, and hence a 1.5 percent rate of work-force growth (since four years are too short a time for any notable change in the sectoral composition of the work-force) we find that the per capita real income of the work-force engaged in this sector has declined by 2.02 percent between 2013-14 and 2017-18. From this we can clearly infer that the per capita real income of the population that is sustained by this sector, which is well over half the population of the country, has declined over this four year period. This being precisely the period that Modi and his men are celebrating, the tragic irony of the situation is obvious.
The conclusion that the living condition of more than half the population of the country has become worse in absolute terms at the end of four years of Modi rule compared to what it was when he came to power, is a robust one. Some may argue that these comparisons are sensitive to the end-points chosen and hence could only reflect the fact that the base year we have taken was a good-harvest year and hence a high-income year. To guard against such criticism we have done another calculation. Instead of 2013-14 we have taken 2014-15 as our base year, and it is well-known that 2014-15 was a poor agricultural year, which by lowering the base should exaggerate the growth of incomes subsequently, and hence provide a favourable picture of the Modi period.
Even if take 2014-15 as our base and do the same calculation, it turns out that between 2014-15 and 2017-18 there was a 1.74 percent decline in the real per capita income of the work-force of this sector and hence in the real per capita income of the population dependent upon this sector. The conclusion that at the end of four Modi years the bulk of the people in the country, belonging to the agricultural sector and its allied activities, have witnessed an absolute decline in their per capita living standard compared to what it was when he took over, is thus quite indisputable.
True, the decline is not large, but there is a decline. Besides, there are two further points to consider here. First, value added includes, apart from wages and the income of the self-employed, the surplus as well. If we assume, reasonably, that the real income of the capitalists and the landlords in this sector has not gone down per capita, then the per capita real incomes of the workers and peasants, who constitute the overwhelming bulk of the agriculture-dependent population, must have gone down even more than our figure suggests.
Secondly, we have not taken into account here the effect of the privatization of education, health and a host of other essential services which has occurred and pushed up the cost of living index for the people. The Consumer Price Index we have taken into consideration in other words only measures the increase in the price of a bundle of goods and services. It does not take into account the fact that many items in the bundle which were available in the base year may not be available in the current year, at least in the same quantities, and their place taken by other items which are more expensive.
An example will make the point clear. Suppose in the base year most people went to government hospitals where a particular surgery cost Rs.5000. The same surgery in the current year, let us assume, still costs Rs.5000 in the government hospitals; and if all other goods’ prices too remain unchanged then the rate of inflation between the base and the current year will be zero according to the consumer price index (where the bundle of goods includes only surgery in government hospitals). But if meanwhile because of lack of adequate spending the government hospitals have got run down to a point where they conduct very few surgeries, while most people are forced to go to private hospitals where the same surgery costs Rs. 50000, then the effective increase in the cost of living is enormous, even though the official index shows a zero increase.
Exactly the same can be said of education and many other services which are getting privatized. In the current era of privatization of essential services therefore the consumer price index necessarily understates the actual extent of increase in the cost of living. If we look at the actual increase in the cost of living of the agriculture-dependent population, it would turn out that the decline in their per capita real income is far greater than what our calculations, based on the official consumer price index, suggest.
It would of course be argued, quite rightly, that privatization of essential services is not a phenomenon specific to the Modi years. It is a feature of neo-liberalism and was being put into practice even before Modi came to power. But there can be scarcely any doubt that privatization of essential services has proceeded with even greater vigour in the Modi period than ever before. And what is more, even if we assume that the rate of privatization is the same as before, and the difference between the actual increase in cost of living, taking privatization into account, and the rate of inflation in consumer price index, is the same as before, that still does not make an iota of difference to the conclusion that the decline in per capita real income of the agriculture-dependent population is much greater than our figures suggest, owing to the privatization of services. All that matters here is that the cost of living increase is underestimated by the consumer price index, not whether it is underestimated more than in the earlier period.
To celebrate four years of “achievement” when the bulk of the population has witnessed a decline in its per capita real income requires a degree of insensitivity which only the Modi crowd is capable of.
(This article was originally published in The People’s Democracy on June 3, 2018) | <urn:uuid:c7f0b34d-fb46-4721-b593-3a8e36e771ad> | CC-MAIN-2022-33 | https://www.schoolofeconomics.net/the-modi-governments-achievement/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00673.warc.gz | en | 0.965256 | 1,912 | 2.1875 | 2 |
Dr Adam Carey, Chair of the European Specialist Sports Nutrition Alliance said the chemical had no place in sports nutrition and everything was being done to remove it from market.
“DNP is a chemical which has nothing to do with either sport or nutrition. This chemical is a plant fertiliser,” Dr Carey said in the wake of recent deaths in the UK reported recently in The Guardian , that led to calls for its classification as a narcotic.
“It should not be available to the public in any form for consumption. It is unacceptable that products containing DNP are available over the internet and we are fully behind the families campaigning for it to be classified as a class-C drug.”
“We hope that the UK National Crime Agency’s (NCA) work with the FSA will help crack down on all the distributors that put consumers’ lives at risk. I personally would like to express my condolences to those families who have lost loved ones because of this dangerous substance.”
He said ESSNA had been acting as a watchdog by informing authorities of outlets that continue to illegally the chemical as a food supplement.
“Often these products are being sold from websites based overseas or by blatantly criminal enterprises that have little or nothing to do with the sports nutrition industry here in Europe,” he said.
“We urge all consumers to be very careful about the content of the products they are purchasing and to make sure they are buying from reputable retailers and manufacturers.”
The FSA said it was working with police and local authorities and was focusing on internet sales.
“The FSA will be providing local authorities with relevant support, including financial assistance to help with this work. We are reminding companies, including internet traders, of the criminal sanctions available to the courts to deal with any person or company found to be supplying DNP products for consumption.” | <urn:uuid:cc6d9e1f-a567-4730-9e4a-a143e65c9b4d> | CC-MAIN-2017-04 | http://www.nutraingredients.com/Regulation-Policy/European-sports-nutrition-sector-working-to-ban-killer-weight-loss-aid-DNP | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00136-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97148 | 386 | 1.914063 | 2 |
Fix Our Eyes
“Let us fix our eyes on Jesus, the author and perfector of our faith,
who for the joy set before him, endured the cross, scorning its shame,
and sat down at the right hand of God. Consider him who endured such
opposition from sinful men, so that you will not grow weary and lose
We can see that Jesus had his eyes on the conclusion of his life, not
getting weighed down with every little thing. Jesus had a finish line
and his finish line was on the other side of the cross. His finish
line was to sit at the right hand of the Father with confidence that
he had done everything that the Father asked. Completely obedient in
heart, mind, spirit and action.
We think as people that we have to find something grand to do for God.
Like we need to make our mark for all people to see. Like we have to
prove that we have value or that we think we can earn something.
Jesus said: “I only do what I see the Father do.”
Jesus knew what the Father was doing because he knew the Father.
Jesus said: no one comes to the Father except through the Son. We can
only know the Father through Jesus, the author and the perfector of
Jesus, the author and the perfector of our faith had his life focus on
obedience to the Father.
As we obey Jesus and do what he says, then we can know that we are
being obedient to the Father. To obey, we need to listen; we cannot
know what his will is without listening. We can listen through his
word, people, or His still small voice.
When he tells you something make it your ambition to just obey. | <urn:uuid:6952c7fa-1919-49c5-b807-fb1630bd7d04> | CC-MAIN-2022-33 | http://goodnewswaco.org/paper/Stories/shStory.asp?FirID=149 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00467.warc.gz | en | 0.975964 | 396 | 1.570313 | 2 |
Many cultures have used both garlic and cayenne pepper in traditional medicine for thousands of years. Each of these medicinal foods possesses antioxidant properties that can help protect against cancer. Garlic is most studied for its role in promoting heart health and boosting immune function, whereas cayenne pepper is most known for its potential to induce weight loss and reduce pain.
Survey of Garlic Research
Garlic is an herb with many potential applications, although MedlinePlus rates it as possibly effective for five uses, including high blood pressure, atherosclerosis (hardening of the arteries), colon cancer, tick bites and fungal infections of the skin. According to the University of Maryland Medical Center, garlic is most well-known for its role in preventing heart disease, although the evidence in this area is mixed. But garlic does serve as a blood thinner, which in itself can help prevent heart attacks and strokes. Garlic may also have some efficacy in treating the common cold.
Stimulate Your Immune System with Garlic
A 2001 a paper published in "The Journal of Nutrition" notes that garlic's ability to prevent the growth of cancer cells may be among its most extraordinary benefits. According to the authors, garlic has detoxification properties as well as the potential to stimulate antioxidant compounds. Garlic can also serve as a powerful immune booster, which furthers its efficacy as a cancer preventative. It works by stimulating various white blood cells that fight off infections and disease. When immune system stimulation is maintained, the risk of cancer can be significantly reduced, according to the authors of the study.
Cayenne Pepper for Pain
Capsicum annuum, also known as cayenne pepper, contains a substance known as capsaicin, which has a variety of potential benefits, including pain reduction. The University of Maryland Medical Center notes that capsaicin has been used as an oral remedy for poor appetite and stomach problems, as well as to improve circulation. Capsaicin creams are often applied topically to treat psoriasis, osteoarthritis, rheumatoid arthritis, nerve pain, shingles pain after surgery and lower back pain.
Boost Weight Loss with Cayenne
According to a 2011 paper published in the "European Journal of Pharmacology," capsaicinoids, the active substances in cayenne pepper, have a number of health-promoting effects, including anticancer, anti-inflammation, antioxidant and anti-obesity properties. A 2012 paper published in "Appetite" also notes the potential for cayenne and pepper to promote weight loss. Furthermore, the authors mention the ability of capsaicinoids to increase energy output, promote fat burning and reduce appetite. These combined effects can make cayenne pepper a beneficial part of a weight-loss program. | <urn:uuid:3c65b251-4224-4feb-a569-0f9c146ad2eb> | CC-MAIN-2017-04 | http://www.livestrong.com/article/121576-benefits-garlic-cayenne-pepper/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00356-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.961557 | 566 | 2.796875 | 3 |
Mary Barra, senior vice president of General Motors Global Product Development, left, and Mark Reuss, president for General Motors North America, speak after the unveiling of the Detroit auto show Monday. (Rebecca Cook/Reuters)
General Motors Co. will invest $1.5 billion in its North American plants this year, a senior executive said Wednesday, adding that its next-generation Chevrolet Volt plug-in hybrid could cost thousands of dollars less per car to build.
The investment is part of the $8 billion the Detroit automaker has said it will put into in its worldwide operations annually.
North American chief Mark Reuss, speaking at the Automotive News World Congress in downtown Detroit, did not provide further details of the investment plan or year-on-year comparisons.
GM, which has invested $10.2 billion in the North American market since its 2009 bankruptcy and $50 billion U.S. taxpayer-funded bailout, has said it will finish refreshing 70 percent of its U.S. vehicle lineup this year 2013.
"Our recent track record proves that this kind of continuous investment in the product pays off," Reuss said.
Despite a lukewarm reception from consumers, the electric car is not dead, Reuss said. GM introduced the Cadillac ELR, the upscale sibling of the Volt, at the Detroit auto show on Tuesday.
"We're talking about a massive transformation that we're undergoing as an industry, as a nation," he said. "It takes a long time to change an industry, to change habits and to change a way of life."
Thousands of dollars in costs per car would be saved in the next generation of the Volt by adopting a more efficient design that would allow GM to use smaller components and save weight, said Reuss. He declined to say when the next version would be introduced.
He said if GM used a platform built specifically to carry the EV technology, the car could be smaller and less expensive.
"We will get there," Reuss said. "We will see the day when we have an affordable electric car that offers 300 miles of range with all the comfort and utility of a conventional vehicle." | <urn:uuid:c5965609-6e52-41e5-a5ff-d8cb50259a4f> | CC-MAIN-2016-44 | http://articles.chicagotribune.com/2013-01-17/business/chi-gm-to-invest-15b-in-north-american-plants-this-year-20130117_1_cadillac-elr-electric-car-detroit-automaker | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00085-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.965149 | 441 | 1.523438 | 2 |
Geneva, Switzerland, 6 July 2022 – The Government of Fiji held its last Steering Group meeting…
Monday, 8 November 2021 — At the Climate Conference in Glasgow, where States parties are making final negotiated decisions this week, the Norwegian Agency for Development Cooperation (Norad), the Platform on Disaster Displacement (PDD) and the United Nations Office for Project Services (UNOPS) signed an agreement on a joint project to avert, minimize and address displacement related to the adverse effects of climate change.
According to the Internal Displacement Monitoring Centre (IDMC), since 2008 over 318 million people around the world have been forcibly displaced by floods, windstorms, earthquakes or droughts, 30.7 million in 2020 alone.
Large-scale displacements, driven by a number of factors including climate change, have devastating effects on people across the world, particularly on countries and communities most vulnerable to climate change such as small island developing states.
“Climate change is an existential threat for island states. Stronger political will at the international level is needed to combat climate change and ensure the safety and livelihoods of Pacific and other island communities,” said Mr. Anare Leweniqila, Deputy Permanent Representative of Fiji to the UN in Geneva, and Chair of the PDD, in a recent statement.
Looking forward, the World Bank projects that in six regions of the world, rising sea levels, water scarcity and declining crop productivity could compel 216 million people to move within their own countries by 2050, in the absence of immediate action to combat climate change.
“The Intergovernmental Panel on Climate Change has also indicated that risks are increasing in all areas, and so we need to prepare for them, take action to avert and minimize them, and understand them better,” stated Mr. Atle Solberg, Head of the Secretariat of the PDD, at the signing event.
Norad and the PDD are embarking on a 3-year project which aims to develop a better understanding of displacement in the context of climate change as loss and damage, and to enhance action and support for measures aimed at averting, minimizing and addressing displacement related to the adverse effects of climate change.
The overall project is situated within the implementation of the United Nations Framework Convention on Climate Change (UNFCCC) and the 2015 Paris Agreement, but will adopt an integrative approach, operating across related policy areas such as disaster risk reduction, human mobility, humanitarian assistance and protection, human rights, and development. The project will be implemented in up to five developing countries particularly vulnerable to the adverse effects of climate change, including small island developing states and least developed countries.
“Loss and damage is a very realistic scenario in some areas of the world, and will become more and more critical in the coming years,” declared Mr. Bård Vegar Solhjell, Director General of Norad, at the COP26 Nordic Pavilion event.
The needs and types of action and support within each country will be identified and developed during an inception period of six months, during which consultations, country needs assessments, priority-setting and development of country-specific National Project Plans will be undertaken. During the inception period, the project will also consult with mechanisms for collaboration and coordination within the UNFCCC such as the Least Developed Countries Expert Group, as well as Party groupings such as the African Group, the Alliance of Small Island States, and the Independent Association of Latin America and the Caribbean (Asociación Independiente de Latinoamérica y el Caribe).
The project will be supported by a number of Operational Partners, including: Climate Action Network, the Internal Displacement Monitoring Centre, the International Centre for Climate Change and Development, the International Federation of Red Cross and Red Crescent Societies, the International Organization for Migration, the Norwegian Refugee Council, the Office of the United Nations High Commissioner for Refugees, the UNFCCC Secretariat, the art project DISPLACEMENT: Uncertain Journeys and the two artists Ms. Lena Dobrowolska and Mr. Teo Ormond-Skeaping.
About the Platform on Disaster Displacement (PDD): PDD is a group of States leading and working together with partners towards better protection for people displaced across borders in the context of disasters and climate change. Its Secretariat is hosted by UNOPS in Geneva, Switzerland.
For more information or to set-up an interview, please contact: In Geneva, Switzerland – Chirine El Labbane, Communication Officer, Platform on Disaster Displacement, firstname.lastname@example.org |+41 79 542 18 09 | www.disasterdisplacement.org
For more information or to set-up an interview, please contact: Chirine El Labbane, Communication Officer, email@example.com
+41 79 542 18 09
Read the Project Leaflet
Read the Project Information Note | <urn:uuid:72be5d93-31b5-47d3-8d0e-b340b38fa8bc> | CC-MAIN-2022-33 | https://disasterdisplacement.org/cop26-norad-and-pdd-press-release | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00475.warc.gz | en | 0.911513 | 1,019 | 2.40625 | 2 |
Books & Music
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
News & Politics
Religion & Spirituality
Travel & Culture
TV & Movies
How Do You Pray?
I am working with a sponsee who believes in a power greater than herself but has no clue how to pray. She is not an atheist nor is she agnostic. I find it hard to believe she didn’t recite a “foxhole” prayer every once in a while but if and when she did I don’t think it was thought of as a prayer. I think it was just an emotional response to a situation (which really is what a foxhole prayer is, don’t you think?).
We are just beginning work on the Steps so prayer and meditation have not yet been a huge part of the journey. Honestly, I have never had a sponsee who had never prayed and so when I said anything about praying at all, I figured she just got it. When she approached me with a difficult problem that involved another person and was a threat to her sobriety and well being, I talked about resentment and the resentment prayer. It was difficult for her to think about wishing good things to someone she didn’t like but the dilemma was the word “prayer”.
I was raised in the Catholic school system so I knew from a very young age what a prayer was. We had to memorize them even though we might not have had a clue what they meant. If it wasn’t in the Baltimore Catechism, we probably didn’t have to know it! I’m not knocking the process or the structure because I am one of those people who felt that God wanted to hear something more perfect than what I could have said on my own. Today I realize how ridiculous that is but at least it set the foundation of prayer for me. And, so, how do you teach someone to pray? Can you even teach someone to pray?
There are ways I believe you can bring a person to begin to learn to pray (if, of course, they believe in a Higher Power to pray to). For example, my sponsee and I wrote out a resentment prayer so that she would not have to search for words that she couldn’t find. I told her to just say it daily for the next couple of weeks no matter what and to see if she could begin feeling the words instead of reciting them. That, to me, would be the beginning of learning how to pray.
Prayer, however, is so personal that no one but the individual can truly call his/her thoughts and words to a Higher Power a prayer. So there are two questions I pose to you (myself included). The first is, “How do you pray?” The second is, “How old are you when you pray?”
Step Eleven suggests that improving our conscious contact with God comes from prayer and meditation and that will lead us to knowledge of God’s will for us and the power to carry that out. When I feel worried, discontent and things generally aren’t right, I am positive that I am not improving my conscious contact with God but separating more and more from Him. I have to look at the way I am praying. Am I reciting certain daily prayers without feeling or thought because they have become a habit? I can handle the good times but can I handle the bad with faith that this is God’s will for me?
This leads me to the second question, “How old are you when you pray?” Are my prayers all about me? Are my prayers about what I want and need? Am I like a child asking God, “Please, please, please give me….”? Am I always asking for something even if it is in the spirit of heartfelt prayer? Or do I pray as an adult understanding that God knows what I want and need and will provide according to His will and His timing.
Today, at this moment, I honestly have to say that I am not praying as I should. There is worry on my mind (worry is lack of faith) and so the first thing I have to do is be very serious about praying for faith so that I can practice Step Three as it was intended and as I know I have done before. It sounds like I’m asking for something, yet again, doesn’t it? I’m not afraid of praying but I like to use the prayers of others instead of just talking to God. For whatever reason, I somehow think I don’t have the right words. The words of others make so much more sense to me. Don’t get me wrong. I talk to God but I don’t always feel as if I’ve prayed. Perhaps I still suffer from the not-being-good-enough syndrome!
Like I said earlier, prayer is personal. I totally get it but there are times when I want to feel more in my heart and my soul. I know that my Higher Power is aware of all of this and I have a vision of Him laughing and shaking His head and saying to the angels, “Sooner or later I think she will finally get it. She just has to remember that it will always be progress, not perfection.”
We seldom question faith and prayer when life is good. Don’t wait for a dark day to ask yourself, “How do I pray?” and “How old am I when I pray?”
Namaste. May you walk your journey in peace and harmony.
Check out the “Women in Recovery” pendant at Bill’s Friends! Beautiful!
| Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map
Content copyright © 2015 by Kathy L.. All rights reserved.
This content was written by Kathy L.. If you wish to use this content in any manner, you need written permission. Contact Kathy L. for details.
Website copyright © 2016 Minerva WebWorks LLC. All rights reserved. | <urn:uuid:43cca502-8745-478c-b595-80feb508611a> | CC-MAIN-2017-04 | http://www.bellaonline.com/articles/art62222.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00472-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.971522 | 1,282 | 1.523438 | 2 |
Where will your retirement money come from? If you’re like most people, qualified-retirement plans, Social Security, personal savings and investments are expected to play a role. Once you have estimated the amount of money you may need for retirement, a sound approach involves taking a close look at your potential retirement-income sources.
Why are 401(k) plans, annuities, and IRAs so popular?
Have A Question About This Topic?
Retirement income may come from a variety of sources. Here's an overview of the six main sources.
Even low inflation rates over an extended period of time can impact your finances in retirement.
Experiencing negative returns early in retirement can potentially undermine the sustainability of your assets.
Calculating your potential Social Security benefit is a three-step process.
There have been a number of changes to Social Security that may affect you, especially if you are nearing retirement.
It's important to make sure your retirement strategy anticipates health-care expenses.
Estimate how much income may be needed at retirement to maintain your standard of living.
Estimate the maximum contribution amount for a Self-Employed 401(k), SIMPLE IRA, or SEP.
Help determine the required minimum distribution from an IRA or other qualified retirement plan.
Estimate how long your retirement savings may last using various monthly cash flow rates.
This calculator may help you estimate how long funds may last given regular withdrawals.
Estimate your monthly and annual income from various IRA types.
Investment tools and strategies that can enable you to pursue your retirement goals.
A number of questions and concerns need to be addressed to help you better prepare for retirement living.
A growing number of Americans are pushing back the age at which they plan to retire. Or deciding not to retire at all.
Around the country, attitudes about retirement are shifting.
A bucket plan can help you be better prepared for a comfortable retirement.
Taking your Social Security benefits at the right time may help maximize your benefit.
What does your home really cost?
There are three things to consider before dipping into retirement savings to pay for college. | <urn:uuid:1301c342-58d1-4e00-afaf-74ca0ab394b0> | CC-MAIN-2022-33 | https://www.servowealth.com/resource-center/retirement | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00465.warc.gz | en | 0.917095 | 445 | 1.859375 | 2 |
We are proud to announce the successful completion and demonstration of a Small Business Innovation Research (SBIR) Phase 2 effort to develop a replacement radio for a maritime environment which provided anti-jam waveform capabilities. This development effort resulted in a customer demonstration of a replacement communications system for a legacy radio, which did not provide anti-jam capabilities and was therefore susceptible to RF jamming.
We were very pleased to team up with GIRD Systems Inc. for this effort. The delegation of work for this effort was for GIRD Systems to focus their efforts on the OSI Physical Layer of the communications stack, while we focused on the higher layers of the OSI protocol stack to create a fully functional replacement networked radio for a maritime environment.
GIRD Systems implemented and successfully demonstrated their custom “smart” RF anti-jam technology, resilient to RF jammer interference at specified power levels, durations, and signal jamming types. GIRD Systems Inc. specialized in custom signal processing solutions for communications systems with a particular focus on waveform development. GIRD Systems has developed novel algorithms to remove sources of interference that are not susceptible to traditional filtering techniques, offering real-time suppression and mitigation of interference sources even when the characteristics of the interference source are unknown.
Low Latency Network Bridge
Excluding the Physical Layer, we developed the software protocol stack for the radio to act as a transparent OSI Layer 2 device. This required the development of a low latency bridge between the wired and wireless interfaces of the radio to facilitate the specified host sensor data rates. The RoboCom low latency software platform was leveraged to accelerate the development of radio network protocol stack using a fully tested and integrated software framework for embedded systems running on embedded Linux.
Smart Bridging Technology
The radio protocol stack that we implemented utilized “smart bridging” technology, which limited the host packets transmitted over the network to network control packets used for network discovery and management, broadcast packets, and only host data packets whose IP destination was known to exist on the wireless network, learned passively from monitoring network traffic. This allowed the radio to exist as a network device plugged into what could be a very active host network, and reduce the data packets transmitted over the bandwidth constrained RF network to only host-to-host packets that required an RF signal path. Smart bridge technology prevents bandwidth waste, reduces collisions over the RF network, and increases available bandwidth because of fewer nodes sharing the resource limited wireless spectrum.
Custom Channel Access and Network Simulation
The maritime environment in which this radio exists, required the development of a custom Time Division Multiple Access channel access protocol to coordinate the exchange of host packets across the network using a custom handshake protocol. This protocol required dynamic frequencies and dynamic data rates unique to the challenges of communications of mobile units in a maritime environment. This custom protocol was designed and developed within the OPNET simulation environment and resulted in the creation of an OPNET Bridge Model to test and evaluate the behavior of this custom channel access algorithm.
SNMP Backwards Compatibility
An essential part of this development was to develop a network stack which was backwards compatible with the legacy radio in both network behavior and performance, as well as command and control. The legacy radio had a SNMP agent interface as its primary control interface in addition to a web interface. For the replacement radio to be a “plug-in” replacement, we had to develop a fully function SNMP agent interface which was identical to the SNMP interface of the legacy radio, and then extend this SNMP interface with additional functionality. Having compatibility at the SNMP agent layer allowed the radio to “plug-in” to the customer’s existing framework without having to change their legacy custom SNMP management application used to manage the radio network.
We have developed several network devices with SNMP agent capabilities to provide upstream management. This often requires the development of a custom SNMP Management Information Base (MIB), which defines the functionality implemented by the SNMP agent interface of the device. For this effort, we needed to utilize a legacy MIB and then extend it in a backwards compatible manner to accommodate additional functionality.
The demonstration system for the radio network consisted of radio simulators executing on a network of Xilinx ZC706 multi-core ARM based hardware platforms and Raspberry Pi 3 ARM devices. Host traffic was simulated using the commonly used industry standard JPerf/IPerf network performance test application using UDP traffic at a specified maximum host data rate along with host to host ping traffic to observe and measure network latencies.
We want to thank GIRD Systems Inc. for inviting us to work with them on this development and bring it to completion by way of a successful customer demonstration. | <urn:uuid:4d0b9a20-e9ca-4071-a3ba-17a059b0feee> | CC-MAIN-2022-33 | https://robocomtech.com/maritime-radio-sbir-phase-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00668.warc.gz | en | 0.909695 | 1,060 | 1.695313 | 2 |
By: EU NAVFOR Public Affairs Office
On Tuesday 7 August 2012 seven Somali men were found guilty by a Kenyan court of attempting to commit an act of piracy against a French fishing vessel, MV Captain St Vincent, off the Somali Coast in October 2009. Following the terrifying attack, the pirates, operating in 2 attack skiffs, were located by an EU Naval Force (EU NAVFOR) warship that was conducting counter-piracy patrols nearby.
After arriving at the scene, the boarding team from the warship detained the suspect pirates, and they were subsequently transferred to Kenya for trial. Based on what had been observed by counter piracy forces and reported by the crew from Captain St. Vincent, all of the suspect pirates were found guilty and sentenced to 20 years imprisonment. They will serve their sentence in Kenyan jails.
According to the Associated Press a court in the Kenyan port town of Mombasa found the Somalis guilty of attacking a German naval supply ship in the Gulf of Aden on March 29 last year, said Jared Magolo, their lawyer. He said his clients plan to appeal the verdict made Monday.
“Even though we believe that the verdict was not very heavy, but the conviction was not proper,” said Magolo.
The “judgment marks an important step in the cooperation between EU and Kenya in the repression of acts of piracy and armed robbery off the coast of Somalia,” said Maj. Gen. Buster Howes, the force’s operation commander.
Riding in a single skiff, the seven pirates opened fire on the FGS Spessart, a German Navy tanker, mistaking it for a commercial vessel. They were repelled by ship’s security and later captured by the German frigate FGS Rheinland-Pfalz. The pirates were handed over to Kenyan authorities in April last year.
Prior to this case, Kenyan courts had convicted 28 Somalis of piracy since 2006, when the first piracy case was concluded in the East African nation.
Somalia has been mired in anarchy and chaos since 1991, and the lawlessness has allowed piracy to thrive off its Indian Ocean and Gulf of Aden coastlines. Somali pirates are able to make multimillion dollar ransoms from their hijackings. | <urn:uuid:5462455c-a879-49c9-a431-0833d588bc80> | CC-MAIN-2022-33 | https://somalilandsun.com/the-european-union-anti-piracy-task-force-welcomes-conviction-of-7-somali-pirates-in-kenya/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00071.warc.gz | en | 0.982361 | 464 | 1.789063 | 2 |
ROSE Compiler Framework/Installation
ROSE is released as an open source software package. Users are expected to compile and install the software.
- 1 Don't like installing ROSE?
- 2 Platform Requirement
- 3 Software Requirement
- 4 ./build
- 5 configure
- 6 make
- 7 make check
- 8 make install
- 9 set environment variables
- 10 try out a rose translator
- 11 Trouble shooting
Don't like installing ROSE?
There are quite some steps for users to install ROSE from scratch. We provide a virtual machine image which contains an intalled copy of ROSE. You can download and try it out before making serious investment of your time.
More information about this is at ROSE_Compiler_Framework/Virtual_Machine_Image.
EDG 4.x-based ROSE is portable to Linux and Mac OS X on IA-32 and x86-64 platforms. In particular, ROSE developers often use the following development environments:
- Red Hat Enterprise Linux 6.6 or its open source equivalent Centos 6.6
Old EDG-3.x based ROSE also supports:
- Ubuntu 10.04.4 LTS. Higher versions of Ubuntu are NOT supported due to the GCC versions supported by ROSE.
- Mac OS X 10.5 and 10.6
Here is a list for prerequisite software packages for installing ROSE
- GCC 4.0.x to 4.4.x , the range of supported GCC versions is checked by support-rose.m4 during configuration
- gfortran (optional for Fortran support)
- boost library: version 1.36 to 1.47. Again the range of supported Boost versions is checked by support-rose.m4 during configuration
- Sun Java JDK: needed only if you are interested in Fortran and Java support in ROSE.
- GNU autoconf >=2.6 and automake >= 1.9.5, GNU m4 >=1.4.5
- libtool: >=1.5.6, defined in rose/build
- bison (byacc),
- ZGRViewer, a GraphViz/DOT Viewer: essential to view dot graphs of ROSE AST
- install Graphviz first - Graph Visualization Software
Optional packages for additional features or advanced users
- texlive-full, need for building LaTeX docs
LLNL internal environment
For LLNL internal developers, we already have all software installed. They can be accessed by source
- Redhat 5: /nfs/casc/overture/ROSE/opt/rhel5/x86_64/rose_environment.sh
- Redhat 6: /nfs/casc/overture/ROSE/opt/rhel6/x86_64/rose_environment.sh
Some typical software paths are:
__GIT_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/git" __BOOST_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/boost" __GCC_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/gcc" __GHC_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/ghc" __JAVA_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/java/jdk" __PYTHON_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/python" __LIBTOOL_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/libtool" __AUTOCONF_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/autoconf" __AUTOMAKE_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/automake" __LLVM_CLANG_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/llvm/clang" __CMAKE_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/cmake" __CCACHE_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/ccache" __GHOSTSCRIPT_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/ghostscript" __GRAPHVIZ_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/graphviz" __XERCES_HOME="/nfs/casc/overture/ROSE/opt/rhel5/x86_64/xerces"
Default versions are
#------------------------------------------------------------------------------- # Set Defaults #------------------------------------------------------------------------------- BOOST_VERSION_DEFAULT=1_45_0 GCC_VERSION_DEFAULT=4.4.5 GHC_VERSION_DEFAULT=6.10.4 GIT_VERSION_DEFAULT=latest JAVA_VERSION_DEFAULT=latest PYTHON_VERSION_DEFAULT=2.7.5 LIBTOOL_VERSION_DEFAULT=2.4 AUTOCONF_VERSION_DEFAULT=2.69 AUTOMAKE_VERSION_DEFAULT=1.14 LLVM_CLANG_VERSION_DEFAULT=3.0 CMAKE_VERSION_DEFAULT=latest CCACHE_VERSION_DEFAULT=latest GHOSTSCRIPT_VERSION_DEFAULT=latest GRAPHVIZ_VERSION_DEFAULT=latest XERCES_VERSION_DEFAULT=latest
The installation of Boost may need some special attention.
Download a supported boost version from http://sourceforge.net/projects/boost/files/boost/
- Currently version 1.45 to 1.47 are supported.
To Install create the boost installation directory first
In boost source tree
- ./bootstrap.sh --prefix=your_boost_install_path
- ./bjam -j4 install --prefix=your_boost_install_path --libdir=your_boost_install_path/lib
Remember to export LD_LIBRARY_PATH for the installed boost library, for example
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/home/leo/opt/boost_1.45.0_inst/lib export PATH LD_LIBRARY_PATH
If you have trouble in installing boost (iostreams,thread) using gcc 4.7 and after, see detailed instructions at ROSE_Compiler_Framework/boost
Installing Java JDK
JAVA is required if you want the Fortran and Java language support in ROSE.
- Or you can "configure --without-java" to bypass this requirement and turn off Fortran+Java support in ROSE.
Download Java SE JDK from http://www.oracle.com/technetwork/java/javase/downloads/index.html
For example, you can download jdk-8u25-linux-x64.tar.gz for your Linux 64-bit system.
After untar it to your installation path, remember to set environment variables for Java JDK
# jdk path should be search first before other paths PATH=/home/leo/opt/jdk1.7.0_05/bin:$PATH # lib path for libjvm.so LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/home/leo/opt/jdk1.7.0_05/jre/lib/i386/server # Don't forget to export both variables!! export PATH LD_LIBRARY_PATH
In general, it is better to rebuild the configure file in the top level source directory of ROSE. Just type:
The next step is to run configure in a separated build tree. ROSE will complain if you try to build it within its source directory.
There are many configuration options. You can see the full list of options by typing ../sourcetree/configure --help . But only --prefix and --with-boost are required as the minimum options.
mkdir buildrose cd buildrose /home/liao6/rose/freshmaster/sourcetree/configure --prefix=/home/liao6/rose/freshmaster/install --with-boost=/nfs/casc/overture/ROSE/opt/rhel6/x86_64/boost/1_45_0/gcc/4.4.5 --with-C_OPTIMIZE=-O0 --with-CXX_OPTIMIZE=-O0
By default, all supported languages are enabled as much as possible, this may slow down your compilation process. You can specify the desired language sets by using:
--enable-languages=LIST Build specific languages: all,none,binaries,c,c++,cuda,fortran,java,x10,opencl,php,matlab,python (default=all)
For example, you can use "--enable-languages=c++,fortran" if you are only interested in C++ and fortran languages support
Additional useful configure options
- Specify where a gcc's OpenMP runtime library libgomp.a is located. Only GCC 4.4 (and after)'s gomp lib should be used to have OpenMP 3.0 support
By default, ROSE is configured with GCC's -O2 and -g options by default so the translators shipped with ROSE should already have some debugging information available. But some variables may be optimized away. To preserve the max debugging information, you may have to reconfigure/recompile rose to turn off GCC optimizations.
- --with-C_OPTIMIZE=-O0 --with-CXX_OPTIMIZE=-O0 // in the configuration option list
- --without-CXX_OPTIMIZE --without-C_OPTIMIZE // alternative method
- --with-C_OPTIMIZE=no --with-CXX_OPTIMIZE=no // third way
To enable more comprehensive testing when typing make check
If you are interested in the OpenMP lowering translation in ROSE and let it automatically link with GCC's libgomp.a, you should add one more option
Other useful options
- --enable-boost-version-check=false // disable boost version check
see more at ROSE Compiler Framework/cmake
EDG 4.x-based ROSE also supports cmake build system.
Here is the CMake command to configure ROSE:
- jdk: export JAVA_HOME=/home/demo/opt/jdk1.8.0_25/
$ CC=gcc CXX=g++ cmake ../rose/ -DBOOST_ROOT="$BOOST_HOME" -Denable-cuda:BOOL=off -DCMAKE_BUILD_TYPE:STRING=Debug -DCMAKE_INSTALL_PREFIX:PATH="$(pwd)/../install"
Afterwards, simply run "make" and then "ctest".
In ROSE's build tree, type
cd buildrose make -j4 # This may take a long time depending on your machine configuration
will build the entire ROSE, including librose.so, tutorials, projects, tests, and so on. -j4 means to use four processes to perform the build. You can have bigger numbers if your machine supports more concurrent processes. Still, the entire process will take hours to finish.
For most users, building librose.so should be enough for most of their work. In this case, just type
make -C src/ -j4 # this is much faster.
turn off silent build
By default, the Automake build system will use silent build to reduce screen output. Details about compilation/linking command lines and options are hidden. In case you want to see the full command lines, you can pass an option to make, like "make V=1".
More background information about this subject is available at https://www.flameeyes.eu/autotools-mythbuster/automake/silent.html.
Optionally, you can type make check to make sure the compiled rose pass all its shipped tests. This takes hours again to go through all make check rules within projects, tutorial, and tests directories.
To save time, you can just run partial tests under a selected directory, like the buildrose/tests
make -C tests/ check -j4
After "make", it is recommended to run "make install" so rose's library (librose.so), headers (rose.h) and some prebuilt rose-based tools can be installed under the specified installation path using --prefix.
To install everything, type the following command line under your ROSE build tree:
make install -j8
A simplified installation target is install-core, which only installs essential binaries and prebuilt tools
make install-core -j8
set environment variables
After the installation, you should set up some standard environment variables so you can use rose. For bash, the following is an example:
ROSE_INS=/home/userx/opt/rose_installation_tree PATH=$PATH:$ROSE_INS/bin LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$ROSE_INS/lib # Don't forget to export variables !!! export PATH LD_LIBRARY_PATH
try out a rose translator
There are quite some pre-built rose translators installed under $ROSE_INS/bin.
You can try identityTranslator, which just parses input code, generates AST, and unparses it back to original code:
identityTranslator -c helloWorld.c
It should generate an output file named rose_helloWorld.c, which should just look like your input code.
some example options
-rose:skip_unparse read and process input file but skip generation of final C++ output file -rose:skipfinalCompileStep read and process input file, but skip invoking the backend compiler
We list common issues associated with ROSE's installation.
If you do not have the EDG frontend source code, ROSE's build system will automatically attempt to download an appropriate EDG binary using wget during the build process (i.e. make -C src/frontend/CxxFrontend). This is an example download URL that is generated by ROSE's build system:
The generalized format for the tarball file is as follows:
The binary compatibility signature can be manually generated executing the ROSE/scripts/edg-generate-sig script. For example:
$ cd ROSE/ $ ./scripts/edg-generate-sig 968750cb07c75694948532c55bfb097684144cc4
The EDG binaries are platform-specific and have historically been a cause of issues, i.e. Autoconf detecting wrong host/build/platform types. One possible remedy to these problems is to use the Autoconf Build and Host Options:
1. Check what build system Autoconf thinks you have:
$ ./config/config.guess x86_64-unknown-linux-gnu
2. Use the appropriate Autoconf options during configuration of ROSE:
$ $ROSE/configure [--build|--host|--target|...]
A real user's solution:
Hi Justin, Checking the config.guess file in source tree, I search the apple darwin for detail information in --build option, then I found that UNAME-PROCESSOR and UNAME_RELEASE are needed in --build First, I type uname -m (for finding UNAME_PROCESSOR in config.guess) result : x86_64 Second, I type uname -r (for finding UNAME_RELEASE) result : 10.8.0 (darwin kernel version) Third, I type command to configure again, but I added --build option, then autoconf can directly find the detail platform type /Users/ma23/ROSE/configure --with-CXX_DEBUG=-ggdb3 --with-CXX_WARNINGS=-Wall --with-boost=/Users/ma23/Desktop/ROSE/boost/BOOST_INSTALL --with-gfortran=/Users/ma23/Desktop/macports/bin/gfortran-mp-4.4 --with-alternate_backend_fortran_compiler=gfortran-mp-4.4 GFORTRAN_PATH=/Users/ma23/Desktop/macports/bin/gfortran-mp-4.4 --build=x86_64-apple-darwin10 At last, make :) Thanks:) Regards, Hongyi Ma | <urn:uuid:03f7d2ad-fb6a-4aef-85ee-14b4a0063716> | CC-MAIN-2017-04 | https://en.wikibooks.org/wiki/ROSE_Compiler_Framework/Installation | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00130-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.714481 | 3,767 | 2.015625 | 2 |
Now there is a big hoo-dada over questions that Dylan's paintings at Gagosian are copied from old masters...or less old and lesser masters anyway. Sheesh. Why won't they let this guy alone. His 50 year contribution to our culture isn't enough?
If we were to list the painters who used photographs or other source material for their paintings, we would never get out of the room. Much ado about nothing, and that the questions are being raised by folks who do not paint is obvious. Just as there are no new jokes in the world, there are pretty much no new paintings. The whole point of art school and studying art is to learn how to replicate accurately.
Walk through MOMA and start with the pop artists. How do you think those comic book panels now worth millions were made? But it didn't start in the 60s.
In fact, sometimes paintings are literally painted OVER existing images. How many great paintings in museum collections even actually have a photograph under them? A question art scholars do not often pursue and museums do not want to know. So called "crayon portraits" were common in the years before color photography. The dreadful things still appear like zombies at antique malls. Hopeful offspring and relatives lug the beasts (Victorian frames and all) to experts everyday thinking they have a family masterpiece. All they have is a photograph exposed in emulsion briefly, "skillfully" covered over in charcoal to hide the faint photographic lines, and grazed with pastel to create a "lifelike" colorful dust catcher for the wall. You have certainly seen them. They always travel in pairs. The fellow has a beard and the woman looks glum.
A similar practice continues today. You've seen those "Bring your family photographs back to life" ads? One of the tools at their disposal.
The 2001 book "Vermeer's Camera: Uncovering the Truth behind the Masterpieces" by Philip Steadman makes it clear at least one master's hyper-realistic paintings were based on a base of camera obscura. If I owned a Vermeer, I would be inclined to dispute the findings, but I wouldn't lean in and look too closely either. One can easily speculate his work may be the tip of an antique art fraud iceberg. We may learn the camera has had a far larger influence on painting than thought. One day, a portable x-ray could be as common at the auction houses as a loupe and a black light.
John Kane (the first major self-taught painter to be recognized by a museum, on this side of the pond anyway) was an "everyman" painting genius. That is until it was discovered he painted over discarded photographic images. Suddenly the authentic naive and common man was a common authentic fake. A wire story of June 1931 disclosed some 5 works by the artist at the Carnegie Exhibition were actually colored photographs. Kane, a genuine primitive, didn't even know artists weren't supposed to cheat like that, and apparently readily admitted the practice. His career continued, but he died as penniless as he was before being discovered.
I didn't look far to find the examples of Vermeer and Kane. The number of contemporary artists who use photographs (first projecting the image onto a canvas rather than painting over an actual exposure) is too large to count. Most don't hide it, but they don't go out of their way to share it either.
Remember those advertisements in comic books with projectors to help one paint anything? Believe me, they are still in use and by some of the finest and most famous artists working today. Magic Enlargers. "Throw anything on the wall and draw BIG!)
Just like the carnival, the music business, and I suppose even the ice follies, the art world is often a sleazy, crooked business. But there are far greater scams to find.
SEE DULL TOOL DIM BULB ART BOOK CATALOG HERE | <urn:uuid:f7328f18-e6c2-49ef-a100-79e632532114> | CC-MAIN-2016-44 | http://chalktalkbooks.blogspot.com/2011/09/bob-dylan-paints-just-like-painter.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00159-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.982693 | 818 | 1.859375 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.