text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
The Ohio Board of Regents has launched a website to help prospective college students and returning workers find the ideal institutions and careers. Visitors to OhioMeansSuccess.org may compare colleges in their interest areas, look for financial aid and learn how different institutions will treat their on-the-job training, military experience or early college credit. Students as young as eighth grade receive pointers for preparing for their chosen college and career path. 26 percent of Ohioans have a bachelor's degree. The national average is 31 percent.
<urn:uuid:06b695eb-e629-466a-ba93-343d450069dd>
CC-MAIN-2017-04
http://wcbe.org/post/website-designed-help-prosepective-college-students
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00572-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966081
105
1.648438
2
This newly-opened solar powered school in Wolfhagen, Germany has repurposed an old cold war army barracks into an energy-efficient modern learning environment. The visionary design takes advantage of the huge footprint of the former tank armory to tuck a campus underneath, while the roof was replaced with translucent thin-film solar panels. The vocational school is a excellent example of green architecture that exposes students to sustainability while providing a beautiful, light-filled, and airy building to learn in. The immense translucent roof is a marvel– 5000 square meters of the panes are outfitted with 7160 thin film solar modules. Due to their 1 micron-thick profile they are semi-translucent, which allows lots of light into the building while reducing glare and heat. Windows on the side walls open automatically to provide natural ventilation and fresh air. The 220 kW array is one of largest of its kind in Europe. Inside the 4,400 square meter building, the original concrete floor and support beams are kept intact. Each of the Modular, highly-insulated classrooms located throughout the building has its own climate control. The result is essentially a double-skinned environment that has a greatly reduced energy load. The school is the seed for a much larger science and learning center that will make use of the existing buildings located on-site.
<urn:uuid:680fa9eb-5483-4247-9d35-4f452ecf2163>
CC-MAIN-2016-44
http://inhabitat.com/german-armory-transformed-into-stunning-solar-school/2/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00190-ip-10-171-6-4.ec2.internal.warc.gz
en
0.952485
271
2.59375
3
Story telling and writing as arresting communication for business is mostly accepted marketing lore now. And yet . . . perhaps not so readily accepted is that story telling is a craft, a discipline, and reliant on all the ‘P’s. If your story telling doesn’t emanate from a clear PURPOSE—why you do what you do—it’ll lack authenticity. Without PRINCIPLES—the operating framework that delivers on your purpose—your stories cannot describe what differentiates how you do what you do. If there is not a deep affinity with the PEOPLE your purpose serves, the stories will skim their surface not burrow into their heads. When your PRODUCT is a manifestation of these ‘P’s, then every aspect of it is a relevant story, not an endless lists of benefits, features and guarantees. When you know what you’re POSITIONING— yourself as the expert, your business brand or your industry niche— the right stories emerge to support and build the right PROFILE. Drifting from these PILLARS, as in the temptation to be all things to all people, and your stories scatter, lost to your listener. Get and keep clear on these five ‘P’s, and your story telling is more than mere marketing messages. It is a conduit to curiosity and truth seeking, elevating your leadership and cementing your domain expertise. Interested in exploring the five ‘P’s of story telling with me? Let’s chat.
<urn:uuid:c1b40ccb-6ed0-43c5-a4a6-635f9aa47920>
CC-MAIN-2022-33
http://sandymcdonald.com/the-5-p-pillars-to-story-telling/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00679.warc.gz
en
0.934686
316
1.648438
2
Let's talk today for a while about how governmentscan and should deal with recessions. This is an important question right now. The unemployment rate is skyrocketing. More than 20 million people, 20, 24, 23 millionpeople have lost their jobs in the last five weeks. We learned today that GDP was down almost5 percent in the first quarter of the year. We are seeing some ideas that second quarterGDP could be down as much as 20 percent or even more. So we have a serious situation here, recession, depression. And we need to think about what are the optionsfor what governments can do. What has Trump done and is he doing a goodjob or isn't he doing a good job? And what I want to suggest to you today. Is that given the circumstances? Donald Trump has actually used most of thecorrect measures that are available under the paradigm of Keynesian economics to dealwith the recession. But he's done it in a completely incompetentcrony and slow way. And these are policies that are direct contradictionsto what Republicans claim are the policies that a government should institute. So there's also an element of hypocrisy. But we'll get to that. So to start with. Governments have two major sets of sort oftools at their disposal, monetary policy and fiscal policy. And very simply, when we say fiscal policy, we mean government spending to influence the economy. And when we say monetary policy, we're talkingabout treasury management. In our case, it's whoever manages the currency, treasury management of the money supply and of interest rates. So fiscal policy would include things likespending on infrastructure during a recession to create jobs, hire businesses to fix bridges, the businesses, pay those employees that are doing the work. Those employees then go and spend that moneyin the economy, helping the grocery store and the landscaping company then hire andthey hire and so on and so forth. So it's fiscal policy. Then you've got monetary policy. Monetary policy would be, for example, cuttinginterest rates to encourage loans, making loans cheaper so that people will go and borrowmoney with which they can pay for expenses, buy things, maybe pay employees, et cetera. When Corona virus hits, businesses start toclose. People stop traveling. A bunch of things happen without governmentinto an intervention that aren't good. This increases unemployment. Naturally, there is a demand collapse. People stopped going to restaurants. So the restaurant no longer needs their workers. So they lay them off, which means the restaurantowner isn't making any money. They can't pay their rent or maybe they can'tpay their utilities. So that affects their landlord. The restaurant doesn't have customers, soit doesn't need to buy food. So they stop spending with the food supplier. The food supplier doesn't need to buy as muchstuff from farmers. The farmers no longer need as many employees. I think you can sort of understand that. Now, the food example is a more interestingone because you see a demand reduction at restaurants, but an increase at grocery stores. But as we've learned with toilet paper, oftentimesthe personal and commercial supply chains for some of these goods are separate. So that's sort of a detail. But I think you generally understand the theidea here. The other thing that can happen in a recessionis that you get a deflationary spiral. So in the same way that if everybody wantshand sanitizer, the price of sanitizer gets driven up, up, up, which we saw about seven, eight weeks ago. If, for example, nobody's driving around, this leads to a drop in oil and gasoline prices, which we've seen now. We may not care that much about oil pricesbeing low. It sounds intuitive that lower prices arejust good, right? I mean, if we're in a recession and stuffcosts less, that's good. It means people can afford more of it. The problem is that it can cause more unemploymentif you run a business. And suddenly not only do people want lessof your stuff, but you have to lower the price because people aren't willing to pay as muchfor it. That further is not being able to keep employeeson. So you lay people off, which means they don'thave money to buy stuff, which means the deflation continues. That's why it's called a spiral in a healthyeconomy. You might see some deflation because we getbetter at making something. So if we become much more efficient at makinga particular product, we lower our cost to make each one of those items. And as companies compete with each other, whoever can increase productivity and lower costs can maybe gain more market share. So that's OK. That's a good example of prices coming down. Deflation deflationary spirals in a recessionaren't good. So let's now look at the things Donald Trumphas done or things that that have been done, if not by Donald Trump personally. So the Fed cut interest rates. That's monetary policy. That's the right thing to do. The Treasury has created these P. programs, paycheck protection plan programs where the interest rate is its effect, effectively negative. You get money. And as long as you use it for the right things, the loan doesn't have to be paid back in full. That's the correct thing to do. Now, the problem is they did it in the cronycapitalist way that Trump always seems to do. It took too long. There were all sorts of logistical failures. The system didn't actually start distributing. Money for a month or longer. Money ran out too quickly. A lot of the money went to really large corporationsand other institutions instead of small businesses. Small businesses ended up not being able toget money. Trump has to scramble. Ask for more money and ask for money back. Total disaster in its implementation. But it is policy that makes sense. Now there's a practical way in which peopIeis kind of a blend of monetary and fiscal policy. It's sort of like low interest loans, whichis monetary, but forgivable loans to business are sort of like government spending, whichis fiscal policy, but that's kind of a detail in terminology. Another important monetary policy componentis expectations management. This is part of why, remember, we talked lastweek or the week before we get bad unemployment news. And yet the stock market sometimes goes up. What's going on? Managing expectations is part of monetarypolicy. You tell the public in advance what you expectto see happen so that it more smoothly. This is the goal, right? It more smoothly gets priced into the markets. And then when the news hits, it's not a shockto the system because the markets were expecting it anyway. That is a form of monetary policy. So let's now talk about fiscal stimulus. You can do fiscal stimulus by cutting taxes. So when Trump proposed, that didn't happen. But Trump proposed what if we do a waiveror a moratorium on the payroll tax until the end of the year? That would be a form of fiscal stimulus througha tax cut. You can also do fiscal stimulus by the governmentspending money. This can be buying things. This can be hiring companies to do stuff. It can also be just the government sendingpeople checks could be a one time payment, which we've seen could be by increasing unemploymentbenefits. What we're talking about is deficit spending. There are sort of people on the right wholike the cartoon ify this as printing money. We talked last week with Stephanie Keltonabout that. Calling it printing money is not really anaccurate term. What we're talking about is deficit spending. We're talking about digitally adding moneyto people's accounts. Now, again, Trump is doing this. He's boosting unemployment benefits. That's fiscal policy. It's getting money to people which peoplecan then spend increasing aggregate demand, maintain prices relatively level more levelthan they otherwise would be. When Trump cuts twelve hundred dollar checks, really the Treasury does. That's fiscal policy. It's government spending. Now, they also sent billions to some industries, airlines, cruise companies. That's also fiscal stimulus and it is theright tool. But the problem has been, again, implementationtook way too long. Not nearly enough money for the average individual. A ton of the spending was done with companies. That really shouldn't be the priority. Should've been more money for individuals. We heard last week from billionaire investorTomas Polish Pedia who said that, you know, some of the companies being bailed out, theseare really bailing out. These are bailouts of the billionaires whoare speculating, not the employees. If you really want to bail out employees, you can do it in a much more direct way. In addition, Trump has done it in a completelycrony capitalist way. He's reduced oversight, which has turned someof these bailout funds into essentially slush funds. He's used government money to buy things likeventilators and PPE. Except there's always something weird whenTrump does it, like the company that is bankrupt with no employees, which has gotten a bigcontract to essentially just middleman the purchase of a bunch of masks way above marketvalue. So it's the right tool. It's being done in a crony capitalist way. The focus is often wrong. It took forever. Millions have still got nothing. The you know, the unemployment insurance supplementshave still not been received by a lot of people. So in short, Donald Trump has used the righttools under the Keynesian paradigm. And I'll talk more about that in a second. Fiscal policy, monetary policy. But he's done it in an incompetent way. And it, of course, is, of course, massivehypocrisy, because what we hear from the right year in and year out is, one, we don't havethe money for this. That's clearly untrue. We found it right. And again, it's not really finding it. That's a misnomer. But we were able to do it despite Republicanssaying it's not possible. So there's the hip, hip hypocrisy element. And number two, you often hear Republicanssaying that these types of techniques don't actually work. And yet here they are saying we've actuallygot to do it. So incompetence and hypocrisy, but the righttools have been used. Now, what hasn't Trump done that he couldhave done infrastructure spending? Trump has talked about doing infrastructure spending. It would be important to do six solid monthsof infrastructure spending. So have the government. Spend on fixing roads, bridges, tunnels, theelectric grid could be bolstered. Water supply could be better protected. There's tons of things that could be done. They would boost employment. They would inject money. And when we come out of this, whenever itis, we would be better prepared. We would have better infrastructure to resumeall of that economic activity. It's not been done. It's time to do it. Trump should have already gotten this going. Maybe it'll happen in the next phase. We don't know. That certainly has been a mistake. Now, let's zoom out from all of this. Why? Everything I've been talking about, thesefiscal policy tools, these are what we call Keynesian tools. They're from the School of Fiscal Policy founderJohn Maynard Keynes. Our government has these tools available insteadof other tools, because Keynesian economics are sort of the orthodoxy. And this is based on you see a recession fundamentallyas a demand shortage. And you then take these reactions of fiscalpolicy that we've described. That is not the only way to see the role ofgovernment before and during a recession or depression. A more progressive economic worldview wouldsay, all right, David, you accurately described the Keynesian tools, but those tools are notproactive. They are reactive. So I'll give you some examples of what a moreprogressive, proactive perspective would be. A more progressive economic perspective wouldsay the federal government should always be bolstering state unemployment insurance. So if they did that all along and people gotmore money from unemployment insurance, if more money was available at the state level, then you wouldn't see this panicked scramble to do it now. But you wouldn't see the decrease in demandthat you are seeing now because people don't have money. Another perspective, the federal governmentshould always be funding more education and other government jobs so that when you havea recession, a lot of those jobs just continue and you avoid having to bail out as many companieswith loans. You avoid having to send as many people. Twelve hundred dollar checks because a lotof these government jobs, including in education, can simply continue. Now, there's a that's that's a political perspectivethat right wingers often disagree with. Others would say if we had permanent universalbasic income, we would obviate the need for as much of this desperate spending becausepeople would already be getting that baseline income from the government. And thus this pandemic recession would beless of an emergency. It would still be one, but it would be lessof an emergency if we had. Here we go now. Government run health care. You wouldn't need Trump negotiating with insurancecompanies to waive co-pays on corona virus testing or treatment. It would simply be done because the governmentis more involved in health care. So that exceeds our time today. But the seed I'm planting is Trump has usedthe right tools given the system we have. He's used them incompetently, but there aremore progressive economic perspectives which would say if we had much more government involvementall along in employment, in fiscal policy all the time, it would prevent as much ofan emergency need for that to be done right now. Many people don't want more government involvementand that's a political debate. So I hope that this is useful to people. There's been a clamoring for more policy stufflike this. I'll produce what the people want. Let me know. Let me know. Your thoughts on this particular segment onTwitter at The David Pakman Show David Pakman.
<urn:uuid:b8c226ff-913e-4214-9ae4-174f7ceae7f8>
CC-MAIN-2022-33
https://hanghoavacongluan.vn/how-to-manage-a-recession/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00066.warc.gz
en
0.961699
3,132
2.109375
2
Depraving synonyms and antonyms To make use of diversions in order to deceive, as a stage magician does To put to an improper, unworthy, or degrading use; abuse. To debase is defined as to cheapen, or make lower in value or quality. To corrupt morally. To debase the morals of; corrupt. To undermine or corrupt, as in morals To misapply; to misinterpret designedly. (--- Computers) To damage (data) in a file or on a disk. To speak evil of; defame; slander; traduce To lessen the price or value of: To lower in quality or value; make inferior or less valuable: (Dialectal) To bring forth (young) prematurely, said of cattle, sheep, horses, etc. Stain is defined as to dirty, dishonor or to apply some sort of coloring. To infect or debase with corruption To treat in a brutal way To give a noble quality to; dignify To improve the morals of (Dated) To use or employ to good purpose; to turn to profitable account. To refrain from; avoid or resist. Used with can or cannot: To get rid of (impurities or dirt, for example); remove: Find another word for depraving. In this page you can discover 24 synonyms, antonyms, idiomatic expressions, and related words for depraving, like: misdirecting, vitiating, profaning, debasing, debauching, demoralizing, subverting, perverting, corrupting, polluting and maligning.
<urn:uuid:bb18df84-0b69-4f99-bc38-c9d114d61a74>
CC-MAIN-2022-33
https://thesaurus.yourdictionary.com/depraving
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00667.warc.gz
en
0.797536
361
2.296875
2
| This Year In| Chronicles of Darkness: 1945 - 1939-1945: World War II - The Prince (Kaiser) of Berlin, Clara von Magdeburg, vanishes without warning, along with her bank accounts. Without her, the Shadow Empire, the social order of the local Kindred, collapses into vicious infighting as all grasp for the final straws. - August 6: Hiroshima is attacked by the United States, who employ the first atomic bombs. - August 7: The british Ordo Dracul tries Ioan Dragolescu, founder of the Dragolescu bloodline, for his sympathies to the Third Reich. Dragolescu makes a prediction that a member of his bloodline would one night arise to complete the ritual he had begun, and become the unliving embodiment of all of world’s unquiet dead. Later, he immolates himself, rather than facing the sentence of the court.
<urn:uuid:6106cfdb-2766-4789-bab5-71abee3c18f8>
CC-MAIN-2017-04
http://whitewolf.wikia.com/wiki/1945_(CofD)
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00539-ip-10-171-10-70.ec2.internal.warc.gz
en
0.907571
197
2.265625
2
Are you planning to lead a Bible study for kids soon? Get ready for a fun adventure and a rewarding experience! God loves kids. In Matthew 19, Jesus encourages his disciples to let the children come to him. Proverbs 22:6 tells us to train up our children in the way they should go, so when they are old, they won’t depart from what they’ve learned. Leading a Bible study for kids is a significant privilege and an honor. You’re making an impact in the hearts of children that will change them for the rest of their lives. Whether you’re a soccer mom with a house full of kids or a volunteer with none, we want to help you succeed in leading a kids' Bible study. We’ve shared some practical tips and advice so you and the kids you're leading can enjoy studying God’s word. Now the fun begins! Manage Your Expectations From the start, it’s important to remember your audience. You’re leading a Bible study for kids, not adults. Don’t expect to take a deep dive into complex theology with no interruptions or breaks. Instead, think about how it was when you were a kid. You were still growing, learning to study, and learning to listen. Kids may need you to repeat things or explain concepts in simpler language. They may get distracted from the lesson, too. Some kids may get antsy and need to move around a bit. Have patience. Kids’ minds don’t work the same as adults. Approach your Bible study with the kids in mind. With healthy expectations as you begin, you’ll be amazed at what kids can learn and discuss. And you’ll get to watch them grow! Use Resources Friendly to Kids With the children in mind, you’ll want to prepare your Bible study material beforehand and make it kid friendly. Present the topic in a way that they will understand. If you have a variety of ages in your group, concentrate the study towards the group's average age. Use study Bibles designed for younger audiences during your lessons. The best Bibles will have pictures, colorful graphics, and other easy-to-understand resources. Make it Engaging and Have Fun At their development stage, kids need an interactive and engaging Bible study. Even adults need this too sometimes! You’ll want to have the kids involved in all aspects of the lesson to hold their interest. Young minds simply have shorter attention spans than adults. Have your class read the passage of Scripture you’re studying out loud (but break it up into smaller chunks). Make sure to ask them questions about the passage to help them listen better. Ask them reflective and open-ended questions to get them talking. By all means, make your Bible study fun! Think of creative ways to incorporate activities and games into the study. Use props and act out stories from the study passages. Think up some crafts or artwork kids can make to reinforce the important points of the lesson. They'll have something fun to take home in the process. Teach the Kids to Think and Apply Do you remember when you were young how everything was new to you? This applies to kids’ Bible studies too. As the leader, you have the privilege of introducing spiritual disciplines to your students for the very first time. Some kids may not really know what a Bible study means. Teach them how a Bible study is more than just reading the Bible. Ask good questions and encourage kids to think about how these truths apply to their own lives. You may need to show them what this looks like! Expect to answer a lot of “why” questions. Remember, much of their experience in your Bible study could be very new to them. Know that you’re helping them make sense of the Bible and how they could use it themselves to grow closer to God. What a cool opportunity! Pray, Pray, Pray As you can tell, leading a Bible study for kids is an important responsibility. Take time to pray to God and ask for his wisdom, grace, and guidance to lead these kids well. Do this before every Bible study lesson. Also, remember that it’s not up to you to change these kids’ hearts. That’s God’s job! Intentionally make time to pray during your Bible study as well. Kids may not know what prayer means or how to pray. Make sure to explain why it’s important to pray and demonstrate for them what prayer looks like. Have your class pray for each other out loud during the study. It’s a wonder to hear the prayers from the faith of a child. Get the Parents Involved If you’re leading a Bible study for kids who aren’t your own, be sure to connect with their parents, too. Leading a kids’ Bible study is a big task, so don’t be afraid to ask some parents if they’d like to help lead with you. Encourage the parents to talk to their children about their Bible study and what they learned on the car ride home. Tell them about any take-home projects the kids may have. Ask the parents to have their kids share how the project ties into the Bible study lesson. You’re about to begin a wonderful journey of helping kids study the Bible and learn about God. Take each step with gratitude knowing God is using you to make a difference in the lives of these children. We’re here to help you along the way.
<urn:uuid:85240e84-66cf-4ebd-83bf-6c21b150b2a8>
CC-MAIN-2022-33
https://livingproof.co/deepening-faith-how-to-lead-bible-study-for-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00666.warc.gz
en
0.953296
1,167
2.3125
2
AS WE NEED BALANCED AND NUTRITIOUS DIET FOR A HEALTHY BODY SIMILARLY WE NEED PURE AND OPTIMISTIC THOUGHTS FOR A STRONG PERSONALITY. THOUGHTS ARE VERY POWERFUL.PURE AND OPTIMISTIC THOUGHTS CAN BUILD A STRONG PERSON WHO CAN FACE EXTREMELY HARD SITUATION WITHOUT BEING PANICKED. THOUGHTS ENTER TO OUR MIND IN TO WAYS WHATEVER THOUGHT WE RECEIVE THROUGH THESE WAYS ENTERS INTO OUR SUBCONSCIOUS MIND. SLOWLY IT BECOMES PART OF OUR PERSONALITY. THEREFORE WE MUST TAKE CARE IN ACQUISITION OF THOUGHTS. AS CONTAMINATED FOOD IS HARMFUL FOR BODY CORRUPT THOUGHTS CAN ALSO DEBILITATE OUR PERSONALITY. "We are what our thoughts have made us; so take care about what you think. Words are secondary. Thoughts live; they travel far." [Swami Vivekananda] THOUGHTS REMAIN WITHIN OUR SUBCONSCIOUS MIND LIKE A SEED BENEATH THE SOIL. AS A SEED SPROUTS AFTER SOME TIME THOUGHTS ALSO AFFECT OUR PERSONALITY. WE REAP AS WE SOW. THEREFORE NEVER ALLOW A CORRUPT THOUGHT TO ENTER IN YOUR SUBCONSCIOUS MIND. ONE WHO THINKS POSITIVELY CAN GO FAR AHEAD IN LIFE BECAUSE POSITIVE THINKING GIVES HIM A CONFIDENCE WHICH CAN NOT BE SHAKEN BY DIFFICULTIES. Recommended By Colombia HE CAN FACE ANY PROBLEM IRRESPECTIVE OF HIS CONDITION. BUT ONE WHO HAS NEGATIVE APPROACH TOWARDS LIFE CAN NOT BE SUCCESSFUL NO MATTER HOW MUCH FAVORABLE HIS CONDITION IS. REMEMBER WE ARE WHAT WE THINK ABOUT OUR PERSONALITY. IF WE THINK WE ARE STRONG AND CAN FACE ANY SITUATION WE CAN BE A WINNER. "Never think there is anything impossible for the soul. It is the greatest heresy to think so. If there is sin, this is the only sin; to say that you are weak, or others are weak." [Swami Vivekananda] NOT ONLY IN ACQUISITION OF THOUGHTS BUT WE MUST ALSO TAKE CARE IN COMMUNICATING THEM TO OTHERS'. THERE ARE TWO WAYS TO SPREAD A THOUGHT IT IS ESSENTIAL THAT WE ONLY PROMOTE GOOD THOUGHTS WHICH CAN AFFECT OTHERS' IN A POSITIVE WAY. THOUGHTS CAN BRING SIGNIFICANT CHANGE IN ONE'S PERSONALITY. WE CAN BRING NEW CONSCIOUSNESS IN SOCIETY THROUGH POSITIVE THOUGHTS. THOUGHTS ARE POWERFUL. THEY REMAIN EVEN AFTER A PERSON DIES AND CAN GUIDE THE FUTURE GENERATION. "Our duty is to encourage every one in his struggle to live up to his own highest idea, and strive at the same time to make the ideal as near as possible to the Truth." [Swami Vivekananda]
<urn:uuid:0bc750c2-f35b-494e-8c49-09397944a533>
CC-MAIN-2017-04
http://www.speakingtree.in/blog/thoughts-are-powerful
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz
en
0.7362
710
1.914063
2
Ransomware might be a dreadful enterprise, but nobody could accuse the criminals behind these attacks of being weak on customer service. They’re always easy to communicate with – just email the address on the screen. And while it’s true they don’t offer many payment options, the one they do, Bitcoin, is fast and reliable to transact in. Best of all, according to The State of Ransomware 2020 global study conducted earlier this year on behalf of Sophos, organisations that decide to pay to get their data back, do so in an efficient 94% of cases. What’s the catch? Only greater expense in the long run, major business disruption, the possibility of ongoing regulatory oversight for years, and the small matter of public humiliation and lost business should an attack come to light (which increasingly it does thanks to the attackers). The research questioned 5,000 IT managers from 26 countries (500 from the US and 200 from the UK) in a range of sectors and company sizes from 100 to 5,000 employees. That’s a healthy sample size, whose results underline one of the most interesting facts about ransomware that can get lost in the headlines – it now affects anyone, anywhere. It doesn’t seem to matter how big an organisation is, nor which sector or country you look at. Ransomware is ubiquitous, with half of organisations in the research having experienced an attack during 2019, three quarters of which had their data encrypted. Ironically, this is despite organisations tightening security to reduce trivial attacks. How did ransomware respond? By spending more time targeting companies by researching less obvious weaknesses, looking to exploit several at the same time. Overall, the research found that while a malicious file download or link was still the biggest danger (29% of successful attacks), other methods such as remote attacks on servers (21%), unsecured Remote Desktop Protocol (9%), external suppliers (9%), and infected USB drives (7%) were also popular. Cloud repositories and applications are another big target, with 59% of those successfully attacked mentioning that cloud data was targeted in some form. Only one in four victims decides to pay the ransom, which is most often done by a cyber-insurance company rather than the victim. However, only around two thirds of US victims find they can claim on insurance, with 20% of organisations paying for coverage they end up being unable to activate. Don’t pay ransoms Importantly, research found that paying ransoms costs more than reinstating data using backups. Some might doubt that – downtime is often said to be the most expensive part of a ransomware attack – but the reason is simply that the cost of recovery is always high at an average of $732,000. Paying the ransom on top of that simply doubles the bill. Now you can see why ransomware attacks almost always send back encryption keys when paid – any doubt in the mind of victims would quickly destroy the whole extortion racket as companies knuckled down to do the hard work themselves. Anxiety over this might explain why more and more ransomware attackers have recently started threatening to leak sensitive data stolen during attack as a an extra inventive to pay up. What to do Far from being a counsel of despair, it’s clear that organisations can limit the effect of ransomware attacks by assuming an attack is inevitable and planning for it. - Make and test a backup plan, including storing data offsite where attackers can’t locate it. - If you’re buying cyber-insurance, make sure it covers ransomware. - Don’t forget to protect data in the cloud as well as central data. - Use dedicated anti-ransomware protection. Twenty-four percent of survey respondents that were hit by ransomware were able to stop the attack before the data could be encrypted. - Lock down Remote Desktop Protocol (RDP). Criminal gangs exploit weak RDP credentials to launch targeted ransomware attacks. Turn off RDP if you don’t need it, and use rate limiting, two-factor authentication (2FA) or a virtual private network (VPN) if you do. - Pick strong passwords and use multi-factor authentication as often as possible. And don’t re-use passwords, ever. - Patch early, patch often. Ransomware like WannaCry and NotPetya relied on unpatched vulnerabilities to spread around the globe. It’s also worth reading Naked Security’s advice on common mistakes that make ransomware easier to pull off from the attacker’s point of view. For more detailed advice, please check out our end of ransomware page. Latest Naked Security podcast Click-and-drag on the soundwaves below to skip to any point in the podcast. You can also listen directly on Soundcloud.
<urn:uuid:0623d1da-d916-43c3-8299-90b02387d06f>
CC-MAIN-2022-33
https://nakedsecurity.sophos.com/2020/05/12/huge-toll-of-ransomware-attacks-revealed-in-sophos-report/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00065.warc.gz
en
0.949592
1,010
2.1875
2
Inquiry into General St. Clair’s Defeat [28 March 1792] Mr. Madison moved, “that it be an instruction to the committee of seven, appointed yesterday, to consider the enquiry committed to them, as confined to such circumstances, connected with the late unsuccessful expedition under Major General St. Clair, as may be requisite for the information of the House.”1 Federal Gazette, 30 Mar. 1792 (reprinted in General Advertiser, 30 Mar. 1792, Gazette of the U.S., 31 Mar. 1792, National Gazette, 2 Apr. 1792, and Independent Gazetteer, 7 Apr. 1792). 1. The House rejected the motion. St. Clair resigned his military commission on 7 Apr., though he remained governor of the Northwest Territory until 1802. On 8 May 1792 the report of the House committee exonerated him by placing the blame for his defeat on the War Department’s failure to provide logistical support (ASP description begins American State Papers: Documents, Legislative and Executive, of the Congress of the United States … (38 vols.; Washington, 1832–61). description ends , Military Affairs, I, 36–39).
<urn:uuid:9b657667-788d-4ced-8dab-4af0b91b653a>
CC-MAIN-2017-04
https://founders.archives.gov/documents/Madison/01-14-02-0241
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00431-ip-10-171-10-70.ec2.internal.warc.gz
en
0.918962
252
2.5
2
Austria (MNN) — Austria, Germany, and the Czech Republic are dealing with three swollen rivers shared between the countries…and shared misery. According to the Austrian meteorological service, Austria received two months' worth of rain in just two days. Czech Republic declared a state of emergency after five died in the wake of the fast rising waters, with at least two killed in Austria and thousands of people evacuated out of the lowlands. Even as the rivers seem to have peaked, officials fear the death toll will continue to rise. The floods are feared to be the worst since 2002, when parts of Germany and the Czech Republic were devastated and communities in Austria, Slovakia, Russia, and Romania were affected. Travel by road and railway was disrupted in many areas, with villages cut off and some schools closed. Communications are down in some places. The rainfall also caused landslides as waterlogged soil slipped along a river bank near Prague. The good news: the forecast looks drier starting today. The European Commission said it was ready to help in Austria, the Czech Republic, and Germany. Damage estimates are just beginning; however, some of the insurance companies in the area say the widespread damage means they are bracing for record claims. Mission Network News partners with Operation Mobilization, The Evangelical Alliance Mission (TEAM), Reach Global Europe, the International Mission Board of the Southern Baptist Convention, and IN Network, all of whom have work either in Czech Republic, Austria, or both. Often in times of critical need and disaster, the response of believers assisting the survivors opens doors for questions about ‘Why are you doing this?' and ‘Who are you,' which eventually lead to sharing the story of Christ. Please pray for the ministries with work in the flood zones. Pray for wisdom for them, safety for their members, and for opportunity to be the hands and feet of Christ. MNN will keep you up to date as this story unfolds.
<urn:uuid:f182ce9a-a127-43f1-a6ed-2b777ab29d94>
CC-MAIN-2022-33
https://www.mnnonline.org/news/widespread-flooding-wreaks-havoc-across-central-europe/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00275.warc.gz
en
0.975123
402
1.960938
2
From today’s editorials: Ethics reform languishes in the state Senate. So much for doing the right thing. Isn’t a new party in charge? For this we had the ostensible sea change of an election last November, the coup of June and the counter-coup of July? All this upheaval in the state Senate, and for what, exactly? It sure seems like the same old ineffectual, unresponsive and unaccountable institution to us. Thursday was the day when the Senate — narrow Democratic majority, large and resentful Republican minority and all — could have sent a message to New Yorkers that for all the embarrassment that it has inflicted on them over the past few months, change is a reality. Instead it sent an unmistakable signal that change is to be resisted at seemingly any cost. Ethics reform remains elusive, or at least badly wounded, despite support for such legislation in both parties. The Albany parking permit law that Democrats were so confident of passing at last didn’t even come up for a vote. The state employee unions effectively killed that bill. It’s the status quo that prevails, unacceptable as it is. It’s as if the Republicans never gave up the majority that they had enjoyed for all those decades. There weren’t enough votes for an ethics reform measure that would have replaced the Commission on Public Integrity with two stronger bodies, including one that would have had the power to enforce campaign finance laws. That, alas, was the issue of contention in the latest instance of petty, partisan mud wrestling. The Republicans vehemently objected to the creation of a nine-member Board of Elections panel to oversee campaign finance laws, on the grounds that almost all the members would all be Democrats. Why? Because the Democrats control five of the seven offices — governor, attorney general, comptroller and majority and minority party leaders of both houses of the Legislature — that would appoint those members. Well, now. Perhaps the Republicans ought to embrace campaign finance reform and similar measures that would make for fairer and more competitive elections. Then they might come to hold more of those offices and have more influence over who would be on an elections laws enforcement panel. “I don’t think we should be establishing a hit unit of nine people,” says Sen. Frank Padavan, a Queens Republican. “We have a Star Chamber arrangement here,” he added. “It’s not democratic, it’s not bipartisan, and it creates potential problems that the people of New York don’t need.” Hit unit. Star chamber. Talk about cynicism. Talk about expecting the worst. On it goes, much like the bad old days when the infamous Democratic machine in Chicago persevered in a city that, it was said, “ain’t ready for reform.” New York state, apparently, isn’t ready yet, either.
<urn:uuid:b1d65454-067c-44d3-9adc-63847d3afd0d>
CC-MAIN-2016-44
http://blog.timesunion.com/opinion/same-senate-same-old-games/65/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00271-ip-10-171-6-4.ec2.internal.warc.gz
en
0.962624
609
1.53125
2
Summer is here and that means more sweat, more skin on skin contact and more chafed, raw, burning skin. If you chafe when you run, you’re not alone. And it’s not a pretty thing. Did you know chafed skin is actual raw skin? Friction removes the top, layer of skin cells, creating a definitely-not-welcome painful situation. This leaves your skin open to infection from dirt and bacteria. Chafing occurs anywhere on your body, but the thighs, groin, underarms, neck, and nipples are particularly vulnerable. Skin-on-skin contact and clothing-on-skin can both cause friction so you'll want to address both skincare and clothing solutions. You can also use on your feet to help prevent hot spots. Prevention is the key to not letting friction ruin your race or training day. A few simple pre-run steps can make a big difference in your fight to keep your skin healthy and ready for the next day. Keep Dry. Keep a towel handy if you can to keep your skin dry throughout an intense workout. In addition, you'll want to avoid cotton clothes and focus on moisture-wicking gear. Don't forget to check your socks to be sure they, too, are moisture-wicking. A good pair of Coolmax socks can make a difference. If you're running in the rain or snow, you'll want breathable rain gear to help you stay dry. If your clothes get wet, get out of them as soon as you can. Use Lubricant. Lubricants help reduce friction by providing a thin layer of protect on your skin. Lubricants help ensure skin slips instead of grabs. It can also reduce the heat generated by skin-on-skin rubbing together. Think how different your hands feel when they are dry and rubbing together vs. after you’ll applied a massage oil or cream. In addition to adding slip, the protection from an anti-chafe product, like bluerub’s CHAFE adds moisturize and hydrate to further protect sensitive skin. Use before you lace up your shoes and touch up as needed if hot-spots develop on your run. Not all lubricants are created equal, though. Look for natural, non-petroleum based ingredients like castor oil, which is a natural alternative to silicone. Aloe vera, beeswax, and shea butter also provide a protective barrier while moisturizing and hydrating. You want a product that will go on easily, last long enough, and will rinse off easily. Some products will even work post-workout to help provide relief to the chapped and chaffed areas. Try bluerub's CHAFE which has only natural ingredients that are good for your skin and good for the environment. Check your Fit. Wear proper-fitting, moisture-wicking running clothes, such as those made with synthetic fibers. Remove any tags that rub you the wrong way, and check for seams that create hot spots. You can apply a CHAMOIS or CHAFE around the under your bra to help reduce friction or under your arms where seams can rub you the wrong way. That said, reducing friction points from your clothing is your best bet. We also recommend you don't wear new clothes on race day! Raw, blistered, chapped skin is not just painful but can lead to infection and skin breakdown if not treated right. If you do end up with chafed skin, first you'll want to gently clean the chafed area with warm water and pat it thoroughly dry. Once dry, apply a product like bluerub's CHAFE or a diaper cream or other protective balm. Do not use products on affected areas that contain essential oils like mint, pepper, capsicum, menthol, camphor, or any other ingredients that create a sense of warmth or coolness. Balms or lotions that contain lavender, helichrysum, or chamomile are probably safe, but you'll want to test an area before you go all in. If you end up with chaffed skin, give your skin some time to heal. Switch up your running with something that won’t aggravate the affected area. Avoid the swimming pool and the ocean — chlorine and salt water will aggravate you. Just like you need to heal from pulled muscles and other injuries, skin injuries require rest, too. Continued friction will only make it worse and could lead to infection. If the chafed area is very painful, swollen, bleeding, or crusted, check with your health provider to see if you need something medicated to help prevent infection. If your skin does not improve with these self-care measures, see your health provider. Some runners don’t chafe but most do and using an effective anti-chafe product will keep you running longer, recover faster, and keep moving. |Growing up in Southern California, Val played competitive softball (coached by her father), was a gymnast, swimmer, ran cross country, fished, hiked, kayaked, and as an adult, experimented in rock climbing and golf. In 2010 she was diagnosed with a rare cancer; a liposarcoma was growing on her sciatic nerve. Once this tumor was removed, she has been cancer-free! Left with significant nerve damage, she now has limited mobility. Yet still moves and engages in the world around her. She snorkels, walks, travels, and practices yoga to combat chronic pain and to maximize her ability to keep moving. She works with a personal trainer, acupuncturist, physical therapist, and massage therapist to maximize her mobility. She lives in Portland, Oregon with her husband and her dog and gets her fins on so she can swim with the fish any time she can.
<urn:uuid:3417ec17-d005-4b59-bba7-e448b12da46d>
CC-MAIN-2022-33
https://bluerub.com/blogs/post/chafe-less-run-more-tips-for-protecting-your-skin
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00472.warc.gz
en
0.944629
1,253
2.15625
2
A bosu is a very helpful piece of exercise equipment that can contribute to an overall balanced and varied workout. The bosu is similar to the top portion of an exercise ball, which has been removed and affixed to a sturdy and flat base. Because of its easy portability and the fact that it’s small enough to carry with you, the bosu is a great way to augment virtually any exercise and at any location. The leg raise alone is a good exercise for building balance and stability, but adding a bosu to it transforms this beginning level exercise into an intermediate or an advanced one. It works the core muscles as well as the upper leg muscles. Read on for a brief guide to doing a leg raise with a knee out on a bosu. In order to execute this exercise, you’ll need to begin by first standing on the bosu with both feet parallel to each other. They should be spread out apart as far as is comfortable, but don’t strain them by pressing them too close to the edges of the bosu. Your hands can either be resting by your side or hanging loosely out in front of you for balance support. This is the basic resting position for the exercise. To execute the exercise itself, take a deep breath. As you do so, shift all of your weight to your left leg and slowly draw your right leg up from the knee. Keep the knee as the highest point and raise it as far as it can comfortably go. Your right foot should remain flat and should not be flexed as you do this. Slowly lower your leg back to the resting position on the bosu. After this, repeat the entire process once again, this time resting on your right leg and lifting your left leg by the knee instead. This constitutes one single repetition of the exercise. Safety and Injury Prevention This is a low impact exercise and as a result is not likely to cause a great deal of injury. However, you can still pull muscles in your leg by extending too far or by lifting your leg up too quickly. Be careful that you stretch properly before and after exercising. You may also wish to practice the leg raise with a knee out on the floor before you try to stand on a bosu. This can help you to get your balance before you move to a more advanced stage. You can strap small weights to your ankles in order to increase the workout load for your core and leg muscles. Also, if you’re looking to modify the exercise for your upper body, you can hold onto dumbbells or other weights and keep them extended in front of you as you complete the leg raises.
<urn:uuid:b7084d3f-e25e-4836-a5a7-5da1a8f699c9>
CC-MAIN-2017-04
http://www.3fatchicks.com/bosu-exercises-leg-raise-knee-outs-on-bosu/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00023-ip-10-171-10-70.ec2.internal.warc.gz
en
0.9565
540
2.078125
2
Background: Pre-school children spend an average of two-hours daily using screens. We examined associations between screen-time on pre-school behavior using data from the Canadian Healthy Infant Longitudinal Development (CHILD) study. Methods: CHILD participant parents completed the Child Behavior Checklist (CBCL) at five-years of age. Parents reported their child's total screen-time including gaming and mobile devices. Screen-time was categorized using the recommended threshold of two-hours/day for five-years or one-hour/day for three-years. Multiple linear regression examined associations between screen-time and externalizing behavior (e.g. inattention and aggression). Multiple logistic regression identified characteristics of children at risk for clinically significant externalizing problems (CBCL T-score≥65). Results: Screen-time was available for over 95% of children (2,322/2,427) with CBCL data. Mean screen-time was 1·4 hours/day (95%CI 1·4, 1·5) at five-years and 1·5 hours/day (95%CI: 1·5, 1·6) at three-years. Compared to children with less than 30-minutes/day screen-time, those watching more than two-hours/day (13·7%) had a 2·2-point increase in externalizing T-score (95%CI: 0·9, 3·5, p≤0·001); a five-fold increased odd for reporting clinically significant externalizing problems (95%CI: 1·0, 25·0, p = 0·05); and were 5·9 times more likely to report clinically significant inattention problems (95%CI: 1·6, 21·5, p = 0·01). Children with a DSM-5 ADHD T-score above the 65 clinical cut-off were considered to have significant ADHD type symptoms (n = 24). Children with more than 2-hours of screen-time/day had a 7·7-fold increased risk of meeting criteria for ADHD (95%CI: 1·6, 38·1, p = 0·01). There was no significant association between screen-time and aggressive behaviors (p>0.05). Conclusion: Increased screen-time in pre-school is associated with worse inattention problems.
<urn:uuid:ff77c9f1-fd37-4290-bd49-f21aa9f07bff>
CC-MAIN-2022-33
https://pubmed.ncbi.nlm.nih.gov/30995220/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00467.warc.gz
en
0.957854
491
2.328125
2
Medically reviewed by, Russell Braun RPH The pain is getting to the point where it is all you can think about. It’s getting hard to concentrate on things you enjoy or even relax and watch television. You hate going to the doctor, but need a solution and fast. If this sounds like you then finding the strongest OTC pain reliever is a must! The only problem is once you walk in the pharmacy you will see a whole row of pain relievers. All with flashy marketing on the bottle and phrases that make them sound too good to be true. So which one should you pick? In general treating pain needs to be something you discuss with your doctor. You want to make sure it is not something serious and figure out how to treat the cause of the pain. However, many types of pain can be made tolerable with self treatment using OTC pain relievers. Examples of pain commonly treated with OTC medication include: |Back pain||Dental pain||Gout flares| 1. The Good News About OTC Pain Relievers Most people report that OTC pain relievers work. Which is good since it is estimated that in 2019 people spent almost 2 billion dollars on them! Each kind of pain medicine has benefits and risks. Some types of pain respond better to one kind of medicine than to another kind. What takes away your pain might not work for someone else, or vise versa. A final piece of good news is that OTC pain relievers are not habit forming like many prescription options can be. Also, the risk of addiction is also lower than with prescription pain relievers like opioids. 2. What Is The Most Powerful Over The Counter Pain Killer? There is not a direct comparison of how strong one OTC pain reliever is compared to another one. What you person may find relief from may not help another person as much. The reason for that is that all the oral OTC pain relievers work on a similar process in the body. However, in slightly different ways. How Do OTC Pain Relievers Work? It starts with something called arachidonic acid that is present in the body. When there is an injury or the immune system sense damage that need repaired arachidonic acid gets the nod. Then enzymes called cyclooxygenase (COX) go to work. They convert the arachidonic acid into substances that help the body respond to the injury. These substances are thromboxanes, prostaglandins and prostacyclins. Cyclooxygenase (COX-1 and COX-2) Once these three key substances are formed they get to work doing the following functions. |Thromboxanes||Cause platelets to stick together creating a blood clots.| |Prostaglandins||Cause blood vessels to dilate or relax, letting more blood into the area. They also increase the temperature of the body in the hypothalamus located in the brain. Finally, they play a role in pain perception.| |Prostacyclins||Cause blood vessels to dilate or relax, letting more blood into the area.| NSAIDs are OTC pain relievers that block the COX-1 and COX-2 enzymes. NSAID stands for non steroidal anti-inflammatory drug. They were given this name because they are not structurally similar to steroids but have many of the same effects. Especially, when it comes to fighting inflammation. By blocking the COX enzymes they are able to reduce pain by stopping the formation of all three chemicals. Although the majority of the benefits are tied to reducing levels of prostaglandins. What Are NSAIDs Used For? NSAIDs are the most common OTC pain reliever found on pharmacy shelves. They are used for the following issues: - Reduce swelling from inflammation NSAIDs work quickly, usually within 30 minutes of taking a dose. However, they do not last all day. Therefore, most will need to be taken multiple times per day to continue pain relief. When used for a short duration (3 days or less) there are few side effects. Not All NSAIDs Are The Same NSAIDs are broken into five groups based on their chemical structure. If you don’t get relief from any one class then one of the drugs in the other NSAID class may help your pain. However, only two different classes of NSAIDs are for sale OTC. The table below lists these types of NSAIDs classes. |NSAID Class||Example Drugs| |Propionic acids||Naproxen (Aleve, Naprosyn, Anaprox)| Ibuprofen (Motrin, Advil) The three other classes of NSAID’s are available only via prescription. Therefore, you would have to see your doctor to get one of these medications. If the OTC varieties don’t work this is probably a good next step to try and find relief from your pain. In addition, higher strengths of some OTC NSAIDs are prescription only. Prescription only NSAIDs are listed in the table below. |Ketoprofen (Orudis)||Flurbiprofen (Ansaid)| |Ketorolac (Toradol)||Fenoprofen (Nalfon)| |Diflunisal (Dolobid)||Tolmentin (Tolectin)| |Meclofenamate (Meclomen)||Mefenamic acid (Ponstel)| |Meloxicam (Mobic)||Piroxicam (Feldene)| COX-1 vs COX-2 When taken for short durations, NSAIDs are typically safe for most people. However, extended use for 10 days or more can lead to side effects. Most notably problems with the stomach and kidneys are the issue. These side effects can be tied back to the fact that COX-1 is found in large amounts in these areas of the body. COX-2 is typically only found when there is inflammation present. Therefore, it would be great to be able to block COX-2 and leave COX-1 alone to lessen the risk of side effects. Which is why COX-2 selective NSAIDs were created. Today there is only one COX-2 selective NSAID still available in the U.S. The other versions were taken off the market due to concerns around heart failure. COX-2’s are prescription only medications. If you will need to be on NSAID’s for long periods it may make sense to ask your doctor about this option. Acetaminophen is another very widely used OTC pain reliever. It is the first line treatment for osteoarthritis pain according to the American College of Rheumatology. The key benefit is the risk of adverse effects is lower than that of NSAIDs. That is good news because many patients need to use OTC pain relievers for long periods of time. What Is Acetaminophen Used For? Similar to NSAIDs, acetaminophen is used for the following: It is important to note that it is not used to reduce inflammation. That has to do with how it works. Acetaminophen blocks the action of prostaglandins however it only seems to act in the central nervous system. That is why it won’t block inflammation in other parts of the body. 3. What Is The Strongest Over The Counter Painkiller For Back Pain? Back pain can be very hard to deal with. This is because your spine is the system that holds your body up when standing and walking. It also can make it difficult to lay down and rest if your having back pain. Getting relief is a must to be able to function and thrive. For short term back pain from a muscle pull or sprain, NSAIDs are probably first choice to help decrease the swelling. If the pain if more chronic or long term then acetaminophen is a better choice. Long term exposure to NSAID’s puts you at risk of side effects. Back pain is also a great candidate for topical pain relievers as well. Lidocaine patches to numb the sore areas are a great way to help people get good sleep. Sleep is key to repairing and healing the body (which is what the inflammation is trying to do) Another secret weapon for back pain are creams, ointments or gels that you can rub into the affected areas. There are several different ways these products work to relieve pain which means more likelihood of comfort by combining them. Topical pain reliever options include: - Examples: Voltaren gel, Trolamine salicylate - Example: Menthol, Camphor - Example: Capsaicin cream & ointment 4. What Is The Safest Over The Counter Pain Reliever? Most OTC pain relievers are relatively safe, otherwise they would not be allowed to be sold without a prescription. However do not fool yourself into thinking that all these medications are completely harmless either. Two major factors come into play for the safety of OTC medications. The dose you take can be the difference in pain relief and ongoing, nagging pain. Generally speaking taking a high enough dose to get the pain under control and then using a lower dose to maintain the pain is a best practice. An example would be taking 200mg of ibuprofen so you can sleep through the night due to hip pain. That dose is not likely to be high enough to last until you wake up. You may want to take 400mg or 600mg instead. With dose you want to make sure you don’t exceed daily maximums. These are listed in the table below for your reference. Talk to your doctor about what is the right dose for you. |Drug||Maximum Daily Dose| |Acetaminophen||4,000mg / day if under 65| 3,000mg / day if over 65 |Ibuprofen||3,200mg / day| |Naproxen||1,500mg / day| |Diclofenac||150mg / day| |Aspirin||4,000mg / day| Watch out for combination products! This is especially true for acetaminophen which finds its way into many OTC and prescription medications. Read the labels make sure you are not taking more than one drug that has acetaminophen in it. Typically acetaminophen is the safest OTC option but if the dose is too high it can be toxic to the liver. Long term use of NSAIDs on a daily basis can have side effects. One major concern is stomach ulcers and bleeding risk. In addition the Food and Drug Administration (FDA) has issued a warning for increased risk of heart attack and stroke with extended use. Don’t taken these medications for longer than you really need to. Remember other options exist such as topical medications and lifestyle modifications, click here for some examples of these. Acetaminophen is the safer option if ongoing treatment is required. It does not have the risk of ulcers, bleeding or heart attack and stroke. The key thing to remember with acetaminophen is not to take too much per day. Otherwise your liver can get depleted on glutathione, which helps it metabolize acetaminophen. 5. What Is The Best Natural Pain Killer? There are many dietary supplements on the market that claim to help with pain relief. Unfortunately, there is often not much clinical evidence to support many of these claims. Another concern is knowing how reliable the manufacturer of the product is. Does the product actually have as much of the active ingredient as it claims? Also, what about other ingredients in the supplement… is it safe to use? Turmeric comes from the root of a plant that is often grown in India and parts of Asia. The root is ground into a powder that is used in food preparation mostly as a spice. It has also been used in eastern medicine for thousands of years. Although adding turmeric into your diet can be a great idea, getting high enough doses to treat pain would require large amounts. Therefore the root has also been sold and studied as a dietary supplement. Studies have shown that curcumin the active ingredient in turmeric is effective at treating numerous painful conditions. It does this through antiinflammatory and antioxidant effects. The typical dose that helps relieve pain is around 500mg two to three times per day. It is recommended to not go above 2,000mg per day. Start with a lower dose and increase slowly to see how you tolerate it. Quick Note On Dietary Supplements It is important to remember that not all dietary supplements are the same. Look for one that carries the seal of USP (United States Pharmacopeia). For Turmeric they recommend two products: - Nature Made Talk To Your Doctor Or Pharmacist As with any supplement or OTC product you take it is important to discuss with your healthcare team. They need to know what you take in addition to any prescription medications you may be taking. There could be a chance for drug interactions. In the case of turmeric at high doses it could act as a blood thinner. This may interact with other medications you take or be problematic if you have certain diseases. You may also want to combine turmeric with other pain relievers if one doesn’t provide enough relief. This would also be a great topic of conversation with your healthcare team. 6. What Can I Take For Severe Pain? In most cases severe pain will require a prescription medication. You may be able to take OTC medications or natural supplements with those medications. However you need to confirm that with your doctor. Topical agents can also be a great way to target pain and be additive to stronger pain relievers. Once you reach the point of severe pain you probably want to look into a comprehensive pain management plan. This plan would include not only drugs but lifestyle changes and coping mechanisms that can really help to alleviate the pain. In addition, this plan should try to solve the root cause of the pain in addition to just masking pain symptoms. 7. Key Points For OTC Pain Relievers 1. Don’t use NSAIDs for more than 10 days without talking to a doctor or pharmacist. 2. Look for signs of ulcers and stomach bleeding if you take NSAIDs often. 3. Think about acetaminophen if you have heart disease, high blood pressure, kidney disease or take blood thinning medication. 4. Many OTC medications contain acetaminophen. Don’t take more than the daily limit! 5. If you drink alcohol frequently then you may want to avoid acetaminophen. 6. Combining OTC pain relievers can be a great way to get pain under control. 7. Naproxen has a longer duration than Ibuprofen (12 hours vs 6-8 hours). Therefore, naproxen might be a better choice if you don’t want to remember to take the medication several times per day. Click here to get Dr. Jason Reed’s exclusive list of medication questions you MUST ask your doctor, for FREE! Share your story Your thoughts on the strongest OTC pain reliever? Also, please share how it worked for you. Chime in below with your comments and thoughts. Hewlings Susan J, et al. Curcumin: A review of its’ effect on human health. Foods. 2017:10:92-93. Nissen, Steven E, et al. Cardiovascular safety of celecoxib, naproxen, or ibuprofen for arthritis. New England Journal of Medicine. 2016: 2519-2529.
<urn:uuid:0f7a9e8d-64d8-4e9b-aebc-7fa5efbe2aae>
CC-MAIN-2022-33
https://bestrxforsavings.com/strongest-otc-pain-reliever/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00265.warc.gz
en
0.926559
3,478
2.25
2
It’s the second decade of the 21st century, yet women in the workplace still face disparities in wages and a glass ceiling blocking advancement in some areas. "Because of those kinds of barriers that are still in place,” says Michael Sider-Rose, director of programs for the Coro Center for Civic Leadership in Pittsburgh , “creating a culture, a space and a community for women to share experiences and develop a network is not only a compelling but a moral endeavor." That’s why Coro Pittsburgh is taking applications by May 1 for its 16th Women in Leadership program. "It's good for the region as well,” says Sider-Rose about female leadership. “There's plenty of evidence that diversity in the workplace is key to effectiveness, to the bottom line, to sustaining a qualified workforce." The 12-week evening course begins in June and is aimed at women in the private, public and nonprofit arenas. It focuses on helping women create both an internal and an external plan for their futures as local leaders. The year-long internal strategic plan centers on learning how to manage your strengths, blind spots, emotional intelligence, and the dynamics of those around you. "It's hard to make changes in the way in which we operate,” Sider-Rose says, “and having appropriate support around oneself is necessary." The external plan helps to analyze the structures surrounding us – their politics, who might gain from changes, and who might lose – so that leaders can help make meaningful changes. Participants undertake site visits, interview regional stakeholders and complete a group project. There are just 20 spots in the upcoming class, so apply now. Writer: Marty Levine Source: Michael Sider-Rose, Coro Center for Civic Leadership, Pittsburgh
<urn:uuid:438a2e9b-96e7-4920-9b6d-2785397576b5>
CC-MAIN-2017-04
http://www.popcitymedia.com/forgood/corowomenleadership041112.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00174-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949186
372
1.78125
2
Are You a Loser? People observe their behavior, and evaluate it in terms of how well they like it. If we did not do this, we would have no way of improving how we act. When people seek help in therapy, in self-help groups, or by reading self-help books, they are not merely observing and thinking of their behaviors and deciding how to make adjustments. Typically, their thinking interferes with their ability to adjust and often they’re mainly aware of their misery. REBT attempts to show you that (1) events do not automatically create your thoughts, (2) events do not cause your emotions, and (3) by changing your thinking, you will see things differently, and then your thoughts and emotions will aid you instead of interfering with your actions. Let’s say you failed at something important to you. Compare the following two sets of thoughts regarding how they make you feel, how truthful they are, and how well they help you adjust. 1. I failed and that’s bad. Maybe I didn’t pay close enough attention to what was going on to prevent my failure. I regret that. 2. I should not have failed. It’s awful to fail as I did. Because I did fail, I’m a loser; I can’t stand myself.
<urn:uuid:b79085b3-dc46-4ea1-aa4f-024c495106dc>
CC-MAIN-2017-04
http://blog.smartrecovery.org/tag/cbt/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00173-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974262
281
2.5625
3
The Board of Research in Nuclear Sciences (BRNS) is an advisory body of the Department of Atomic Energy (DAE) to recommend financial assistance to universities, academic institutions and national laboratories. The key objective is to encourage and promote scientific research in areas of relevance to the mandate of DAE in research groups outside DAE to derive benefits from their expertise. Main mandate of DAE is the production of safe and economical nuclear power, using indigenous uranium and thorium resources. Towards this end, it is involved in developing, in stages, pressurized heavy water reactors, fast breeder reactors, and reactors using thorium with associated fuel cycle facilities. It builds research reactors for production of radioisotopes and carries out programmes on isotope and radiation technology applications in medicine, agriculture and industry. It develops advanced technology in areas such as accelerators, lasers, control and instrumentation, computers, biotechnology, information technology and materials technology and also encourages technology transfers to other users and industry. It supports basic research in nuclear energy and related frontier areas of science. The Department of Atomic Energy (DAE), formed in August 1954. more.. BRNS supports high quality R & D projects in the areas of relevance to its programme as broadly mentioned above. BRNS lays emphasis on collaborative programmes between the DAE scientists and the scientific community outside the DAE family. Such a collaborative approach is expected to create and strengthen academic bond and promote closer interaction between the DAE and Universities/Research Institutions. Besides funding research projects, BRNS provides financial assistance to organize symposia/conferences/workshops on topics of relevance to the DAE programmes. It also awards projects to young scientist to initiate them in a career of research. Dr. K.S. Krishnan Research Associateship for attracting highly talented young scientist and technologists are being awarded regularly under the aegis of BRNS. DAE-BRNS Senior Scientist Scheme (now named as Raja Ramanna Fellowship Scheme) aims to utilize the expertise of active and energetic retired scientists / engineers who were involved in high quality research in the units of DAE or any National Laboratory or Universities / Institutes and who after retirement are keen to carry out R&D in the field of their choice and of interest to the DAE. It also offers prestigious Homi Bhabha Chair to honour distinguished scientists. In addition, BRNS also encourages visiting scientist programmes for promoting active interaction with senior level scientists. less - 1. Identify and fund R & D Projects - 2. Financial support to conduct Symposia / Conferences - 3. Recruitment under Krishnan Research Associateship (KSKRA) scheme - 4. Award research projects under DAE-OIA scheme, through DAE-SRC council. - 5. Award fellowships under DGFS M.Tech scheme - 6. Award fellowships to HBNI students under DGFS-Ph.D scheme - 7. Award Fellowships to retired Scientists under RRF & HBCschemes, through AEC. BRNS COMMITTEES and OFFICIALS THE BRNS BOARD The Board is chaired by an eminent scientist/engineer and has senior scientists/engineers from within the DAE and outside as members. The Board has a fixed term and it is re-constituted every three years and it would be assisted by SIXAdvisory Committees for discharge of responsibilities as per the term of reference. The Board meets as often as needed to frame policy guidelines for the functioning of Advisory Committees and to finalize its recommendation to the Department on the financial support to be extended to the various R&D projects, symposia etc. and other matters under its purview. The STANDING COMMITTEE The mandates of STC Constituted, in June 2015 are (a) to set the guidelines for conducting Symposia/theme meeting/ outreach programmes, (b) To Identify thrust areas of interest to DAE which can be benefitted by collaborative work and (c) working out details related to the Concept Proposals (CP). SCIENTIFIC ADVISORY COMMITTEE The function of the Advisory Committee will be to assist the Board of Research in Nuclear Sciences (BRNS) in the discharge of its duties. Each Advisory committee is chaired by a member of the Board and is composed of very senior scientists from various DAE units and with an experienced scientist as its Member Secretary. Depending upon the nature of the project, the application forms submitted to BRNS are forwarded one of the Advisory Committees. In brief these Committees and their priority theme areas are given below: Advanced Technologies Committee (ATC) Advanced technologies related to nuclear science, nuclear fusion, accelerators, lasers, cryogenics, computers and information technology, artificial intelligence and robotics, automation and controls, sensors, new materials, photonics and other strategic technologies of vital importance to the department. Basic Sciences Committee (BSC) Basic and applied research in radiochemistry, actinide chemistry, radiation and photo-chemistry, laser induced chemical reactions, unique catalysts, nano materials, cell and molecular biology, mutagenesis, radiation biology, condensed matter physics, laser and plasma physics, nuclear and particle physics, spectroscopy, etc. Nuclear Reactors and Fuel Cycle Committee (NRFCC) All fields related to nuclear power and front and backend of nuclear fuel cycle such as structural/ civil, mechanical/, metallurgical/, chemical engineering, material development, heat transfer, fluid flow, nuclear fuels, reprocessing and waste management, nuclear safety and environmental impact etc. Plasma & Fusion Research Committee (PFRC) Theory & Simulations related to MHD activity, plasma turbulence, nuclear fusion, Design and development of materials, equipment, diagnostics and software codes required for plasma & fusion programme. The list of projects under this category can be found in project seeds document. Radioisotopes, Radiation Technology and Applications Committee (RTAC): Radio pharmaceuticals, radio-assays, radioisotopes, radiation technologies for health care, nuclear agriculture, food/ vegetables/fruits/spices preservation, biodegradable waste management, tracer techniques, underground isotope hydrology, etc. Strategic Studies Advisory Committee (SSAC) R & D projects in the areas of research in national /international strategic activities To execute the overall functioning of BRNS Secretariat, well-qualified senior scientific officers from various scientific disciplines work as Programme Officers under the guidance of Scientific Secretary. They co-ordinate with Advisory Committees on regular basis for smooth and efficient implementation of BRNS programmes. BRNS Secretariat is located on the 1st Floor, Central Complex, BARC, Trombay, Mumbai-400 085. The programme Officers are assisted by the administrative staff who are pulled from either BARC’s or DAE’s administrative pool of officers. The finance and accounts related matter of the Board are handled by the Accounts Division of DAE located at AnushaktiBhavan, C.S.M.Marg, Mumbai 400001. Scientific Secretary is responsible for overall functioning of BRNS and shall act on the advice of Chairman, BRNS and with the concurrence from the BRNS Board. Programme Officer (PO),is the nodal person for communicating matters pertaining to all the schemes, on behalf of the Scientific Secretary. BRNS, born in the pre-independence era as Atomic Energy Committee, was the first extra-mural funding agency of Government of India for sponsored R&D activities in the country. This Committee, which was formed in the year 1945 under the aegis of Council of Scientific Research (CSIR), was renamed as Atomic Research Committee in (ARC) in 1947, which subsequently became Board of Research in Atomic Energy (BRAE) under the Atomic Energy Commission which was formed during 1947-48, Following this, the BRAE was again renamed as Board of Research in Nuclear Sciences (BRNS) in the year 1955. In its role of an advisory body to the DAE, one of the prime mandates of BRNS (be it in the form of ARC or BRAE) has been to build strong linkages with the national R&D labs and universities for their active participation in the departmental R&D activities in the collaborative mode and thereby generate a large pool of qualified and skilled human resources to cater to the needs of the department in the time to come. more.. BRNS in its earliest form i.e. Atomic Research Committee (ARC), between its formation year (1945) and the year of formation of Atomic Energy Commission (1947), had the following terms of reference: i) To explore the availability of raw materials required for generating atomic energy, ii) To suggest ways and means of harnessing the materials for production of atomic energy, and iii) To keep in touch with similar organizations functioning in other countries and to make suggestions for coordinating the work of this committee on an international basis. During this period this institution was almost playing the role of Atomic Energy Commission. It started functioning as Board of Research in Atomic Energy (BRAE) under AEC since 1947. During the period 1947 to 1954 the well conceived three phase nuclear power programme for the country was being put on the firm footing by none other than Dr. Bhabha himself, by way of institution building and starting several core activities with the help of carefully chosen teams of experts within the department. During this period, BRAE was being looked upon as an advisory body with the responsibility to advice about the distribution of research grants to the universities and research institutions. BRAE was renamed as BRNS in the year 1955 and it continued functioning, with the help of only three advisory committees, towards the two main mandates, viz. a) enhance collaborative activities between the R&D units of DAE and the national universities, R&D institutions and national research labs and b) contribute to human resource development activities. The initially set up three committees were later increased to eight to encompass many facets of DAE’s R&D programmes in science and technology, under the purview of BRNS. Accordingly, the two major activities pursued by BRNS during this period were; a) to sponsor and provide financial grant for the R&D projects to universities and R&D labs and b) to provide support for organizing national /international conferences and seminars. The R&D projects supported by BRNS, during this phase, were generally of “coordinated”, rather than “collaborated” type of projects. The method followed those days was to send a circular from BRNS to a large number of universities, R&D institutes and research labs in the country inviting R&D proposals in the specified frontier areas of interest of DAE. In response to this, R&D projects were conceived and formulated by the prospective project investigators (PI) themselves and submitted to BRNS. Based on the peer review, the projects used to get selected for BRNS sponsorship. The progress of these projects was coordinated by the respective appointed project coordinators (PC) from within DAE. BRNS was restructured in the year 1998, with an independent BRNS secretariat headed by Scientific Secretary, who is assisted by the Programme Officers (chosen among scientists and engineers from within BARC) and the requisite administrative staff. The large number of advisory committees were reduced to following first four advisory committees initially, based on the broader aspects of DAE’s programme and appended subsequently by two more committees. less
<urn:uuid:f0e01e49-ddcd-4167-8dea-03df75c703d4>
CC-MAIN-2017-04
https://brns.res.in/about_us.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00079-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944637
2,377
2.296875
2
A Dual Active Contour for Improved Snake Performance Gunn, S.R. and Nixon, M.S. (1995) A Dual Active Contour for Improved Snake Performance. Full text not available from this repository. Active contours (snakes) are a sophisticated approach to contour extraction in image interpretation. They challenge the widely held view that low-level vision tasks such as edge detection are 'bottom-up' processes; features are extracted from an image and higher level processes interpolate to find a suitable representation. The principal disadvantage with such an approach is its serial nature; errors generated at a low-level are passed on through the system without the possibility of correction. The principal advantage of snakes is that the image data, the initial estimate, desired contour properties and knowledge-based constraints are integrated into a single extraction process. Snakes incorporate a global view of edge detection by assessing continuity and curvature combined with the local edge strength to determine an edge. The motivation for developing a dual active contour is to enhance the snake model by confronting its principal problems: initialisation -- the final extracted contour is highly dependent on the position and shape of the initial contour as a consequence of many local minima in the energy function. The initial contour must be placed near the required feature otherwise the contour can become obstructed by unwanted features. parameters -- the original technique gives no guidelines for determining the parameters. The values used are critical and must be chosen carefully to obtain meaningful results, due to scale variance and parameter inter-dependence. non-convex shapes -- by its formulation the original technique is poor at extracting non-convex shapes. A dual contour can provide a more balanced approach to contour extraction allowing both convex and non-convex shapes to be extracted. scale invariance -- the snakeÂ?s internal energy is not scale invariant. This prevents the energy of the snake being used to assess the merit of the solution. A dual contour overcomes the initialisation problems by approaching the desired feature from both sides. This contrasts with other methods which approach a feature from one side and hence have less ability to determine a global minimum. The internal energy of the contour is reformulated to be scale invariant, and allows a relative assessment to reject poor local minima. The new techniques implementation allows any additional local shape information to be integrated within the minimisation process. This shape model is similar to that of Lai and Chin in allowing local control over the contours equilibrium. The problem of determining parameters is simplified by reducing the parameters to a single regularisation parameter which is consistent with the original paradigm. |Item Type:||Monograph (Technical Report)| |Additional Information:||1995/6 Research Journal Address: Department of Electronics and Computer Science| |Divisions :||Faculty of Physical Sciences and Engineering > Electronics and Computer Science > Southampton Wireless Group Faculty of Physical Sciences and Engineering > Electronics and Computer Science > Electronic & Software Systems |Accepted Date and Publication Date:|| |Date Deposited:||29 Oct 2001| |Last Modified:||31 Mar 2016 13:50| |Further Information:||Google Scholar| |RDF:||RDF+N-Triples, RDF+N3, RDF+XML, Browse.| Actions (login required)
<urn:uuid:d2c0f6f2-f5f7-4d24-b9aa-dd2939b04b6c>
CC-MAIN-2017-04
http://eprints.soton.ac.uk/250096/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00093-ip-10-171-10-70.ec2.internal.warc.gz
en
0.854667
689
2.015625
2
FCC Petitioned to Extend Political Ad Rule to Cable WASHINGTON (CN) - Government transparency groups have requested that the Federal Communications Commission require cable and satellite companies to post political files on the FCC's website. The FCC seeks public comments. In 2012, the FCC adopted rules requiring broadcast television stations to post their public file and political advertisement records on the FCC's website. The records show how much was spent on political ads, who spent it, on what, and when, among other things. Broadcast television stations, cable companies and satellite television companies already have to keep their public file accessible to the public for two years, but they are not required to put documents online. The files are a way to find out who is spending money on candidates, among those who do not have to report political ads to the Federal Election Commission. The political records are supposed to be readily available to anyone who asks to see them, and web access is meant to increase availability. There was not enough information to extend the requirement beyond broadcast television, the commission said at the time, and it would "ease the initial implementation of the online public file" to begin with broadcast television. The National Association of Broadcasters called the first wave of the public filing requirements "uneventful," in spite of initial concerns. More than half a million items have been uploaded to the public file. July 31, the Campaign Legal Center, Common Cause, and the Sunlight Foundation petitioned the FCC to expand the public file requirement to cable and satellite systems. In response, the FCC's Media Bureau has requested comments on its proposed expansion of the rule. The bureau also seeks comments on whether it should expand the filing requirements to radio stations. Some broadcasters expressed skepticism about the proposed requirements, and questioned whether the same filing requirements are needed for radio. The Christian broadcasting network LeSEA Broadcasting said in filed comments that the FCC "simply lumped in radio" to its prior requirements. "Broadcast radio listeners are nearly all local, they do not need the FCC's website to find information about their local stations," LeSEA wrote. "Listeners can go to the local main studio to view a station's public file, or if a station's studio is not located within its community of license, listeners can call the station, have the file contents described to them, request copies and receive them at no charge." AM radio licensee Entertainment Media Trust also opposed the proposed requirements, saying "adding radio stations to the online filing system would represent a 700% increase in necessary resources by the FCC in terms of server capacity, programming requirements and other technical and financial resources." The FCC's solicitation of public comments was published in the Federal Register Aug. 27, yet comments were due Aug. 28; reply comments are due by Sept. 8.
<urn:uuid:c8383538-001d-4013-83ba-d9682272fdf3>
CC-MAIN-2017-04
http://www.courthousenews.com/2014/08/29/70935.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00194-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961607
571
1.664063
2
|Chung, Sang min| Submitted to: Plant Systematics and Evolution Publication Type: Peer reviewed journal Publication Acceptance Date: 11/10/2001 Publication Date: N/A Citation: Interpretive Summary: Melon is a morphologically (visual characteristics) diverse (different, broad) species composed of tropical and subtropical wild and cultivated market types. There have been numerous and conflicting classifications of melon plants over the past 150 years. Today, wild populations of melon range throughout most of Africa, across southern Asia, into Australia and the Pacific Islands, and throughout warmer regions of the Americas. Africa is believe to be the center of origin for melon. However, origins of domestication of melon by man may be multiple. A study was designed to determine the origin of wild melon populations found in the southwestern and southeastern U.S. We collected seeds from wild melon plants and subjected them to DNA (basic genetic code for life) analysis using biotechnological tools. We discovered that wild melon plants in the U.S. were genetically different from wild African plants. This information is useful to the plant geneticists for studies involving evolution and domestication of crop species in the U.S. and to ecologists who are studying the transfer of genes (DNA that results in traits that we see visually) crop plants (e.g., cultivated melon) to wild species and vice versa. From these data scientists can predict the exchange of genes and determine the effect of the transfer of genes from cultivated (including genetically engineered plants) to wild species to assess ecological risk. Technical Abstract: The origins of wild melon (Cucumis melo L.) populations in the New World have been in question since their initial description in the mid-nineteenth century by Charles Naudin. Typically, these populations have been assumed to represent escaped forms of cultivated var. chito or dudaim, and have been labeled accordingly, or more rarely as var, agrestis. To clarify the origins of New World melons, RAPD and SSR data were collected for 42 North American populations, 10 cultivar accessions of var. chito and dudaim, 10 other small-furited Old World accessions and 4 other varieties of C. melo-vars. conomon, flexuousus, inodorus, and cantalupensis. New World, chito, and dudaim accessions were also studied in detail with respect to 45 quantitative and 10 qualitative morphological and physiological characters. All data revealed that New World populations are distinct, and should be classified as var. texanus Naudin. This variety appears to most closely related to var. chito. From these data scientists can predict the exchange of genes and determine the effect of the transfer of genes from cultivated (including genetically engineered plants) to wild species to assess ecological risk.
<urn:uuid:60142e14-9a02-4513-896c-79d1f0c8c3be>
CC-MAIN-2016-44
https://www.ars.usda.gov/research/publications/publication/?seqNo115=124121
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00046-ip-10-171-6-4.ec2.internal.warc.gz
en
0.918099
597
3.609375
4
Almost $500 million could be saved annually by making subsidized housing smoke-free First state level data shows great variation in cost savings This website is archived for historical purposes and is no longer being maintained or updated. Embargoed until: Thursday, October 2, 2014, 12:00 Noon, ET Contact: Media Relations Prohibiting smoking in all government subsidized housing in the United States, including public housing, would save an estimated $497 million per year in health care and housing-related costs, according to a CDC study published in Preventing Chronic Disease. The total cost saved comprises of about $310 million in secondhand smoke-related health care, $134 million in renovation expenses, and $53 million in smoking-attributable fire losses. The analysis found that prohibiting smoking in public housing either owned or operated by a government housing authority would yield cost savings of $153 million annually. The study is the first of its kind to estimate the annual cost savings of making subsidized housing smoke-free in each state. Those cost savings range from $580,000 in Wyoming to $125 million in New York. The range of cost savings for states from prohibiting smoking in public housing alone range from $130,000 in Wyoming to $58 million in New York. Nearly 80 million Americans live in multi-unit housing. Of these, nearly 7 million U.S. multi-unit housing residents live in government subsidized housing, including approximately 2 million in public housing. Multi-unit housing residents are susceptible to secondhand smoke exposure because studies have shown that secondhand smoke gets through ventilation systems and windows and spreads into units where no smoking occurs. The potential for secondhand smoke exposure in public or subsidized housing is especially concerning because a large number of the residents in these units are particularly vulnerable to the impact of secondhand smoke, including children, the elderly, and the disabled. “Already, over 500 public housing agencies have adopted some form of a smoke free policy, protecting approximately 200,000 families,” said Matthew Ammon, Acting Director of the Department of Housing and Urban Development’s (HUD) Office of Lead Hazard Control and Healthy Homes. “This study reinforces HUD’s work that promotes health and reduces costs by encouraging public housing agencies, multi-family housing owners and agents, as well as residents, to adopt and implement smoke-free housing policies.” HUD is a member of the National Prevention Council and is committed to advancing the National Prevention Strategy’s priority of Tobacco-Free Living. Since January 2012, the number of smoke free public housing agencies has more than doubled, and HUD continues to educate housing operators and residents about the health and economic benefits of prohibiting smoking, and encouraging smoke-free policies. HUD will also continue to provide practical guidance on the adoption and implementation of smoke-free policies. Providing resources and information on smoking cessation and preventing the initiation of smoking will help increase the number of subsidized housing residents protected by these policies. The Surgeon General has concluded that there is no safe level of exposure to secondhand smoke and that only 100 percent smoke-free policies fully protect people from involuntary exposure. Secondhand smoke kills more than 40,000 Americans each year and causes health problems in adults such as cancer and heart disease. Children exposed to secondhand smoke have more frequent and intense asthma attacks, more respiratory infections and higher risk of sudden infant death syndrome. For more information on secondhand smoke, visit http://www.cdc.gov/tobacco/data_statistics/by_topic/secondhand_smoke. For smoke-free housing toolkits and other information for owners and managers of federally assisted public and multi-family housing, visit http://portal.hud.gov/hudportal/HUD?src=/smokefreetoolkits1. - Page last reviewed: September 9, 2014 (archived document) - Content source:
<urn:uuid:87182b4a-227f-49a7-97e3-2ce052148813>
CC-MAIN-2017-04
https://www.cdc.gov/media/releases/2014/p1002-smoke-free-housing.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00069-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950558
805
2.09375
2
Does gluten free mean it is always wheat free? No, gluten free does not always mean wheat free. Some manufacturers use wheat that has had the gluten removed to make gluten free foods. A typical example is that some European gluten free breads and rolls have wheat in them that has had the gluten removed, they do this to make them more like ordinary bread or rolls, therefore although it's gluten free it's not wheat free. Gluten free recipe books use ingredients that are gluten free. Gluten free wheat starch is an expensive, difficult to source ingredient for most home bakers, therefore it's not something that would normally be included in a gluten free recipe book, and if it was, then it would be listed as such. It is generally only used by some gluten free product manufacturers. This is what Coeliac UK states with reference to Codex wheat starch. Juvela, gluten free product manufacturer, statement on gluten free wheat starch. Glutafin, gluten free product manufacturer, statement on gluten free wheat starch. This means you need to read the ingredients list on gluten free breads (or other baked products, including biscuits or cakes) carefully, to ensure that it does not contain codex wheat starch with the gluten removed Therefore you need to exercise a bit of caution, as all gluten free foods are not necessarily safe for you to eat if you have a wheat allergy or intolerance. Some products help by actually saying "wheat & gluten free" on the label. Last updated: 07/09/2013
<urn:uuid:b06e39fa-c7d3-45e3-83c5-f3af8d951314>
CC-MAIN-2017-04
http://www.wheat-free.org/does-gluten-free-mean-it-is-always-wheat-free.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00476-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965775
315
2.125
2
ALLIANT INTERNATIONAL UNIVERSITY ************************* Dr. Rebecca Turner issues statement rebutting "pseudoscience" Psychologist Dr. Rebecca Turner has rebutted as "complete pseudoscience" Dr. Eric Keroack's claim that too much sex can cause women to lose their ability to bond. Dr. Turner [shown], a professor in the California School of Professional Psychology (CSPP) at Alliant International University, is the author of original research that was misrepresented by Kerouac, President Bush's appointee for the nation's top family-planning post. "Someone who holds an important government office, such as that to be held by Eric Keroack, MD, should be held accountable in interpreting science and offering it to the public as evidence," said Dr. Turner. "A candidate for this post should be chosen not only because of his political views, but also because of his expertise. His interpretation of the scientific literature does not show sufficient expertise, in my view." Dr. Keroack has been tapped as deputy assistant secretary for population affairs in the US Department of Health and Human Services (HHS). He will administer $283 million in annual family-planning grants that HHS says are "designed to provide access to contraceptive supplies and information to all who want and need them, with priority given to low-income persons." Dr. Keroack is the co-author of a paper that claims having sex with multiple partners alters brain chemistry in a way that makes it harder to form relationships later in life. Keroack's paper, written in 2001 for a group called the Abstinence Clearinghouse, cited only Turner's pilot work, a paper that was entitled 'Preliminary research...'. Dr. Turner, whose 1999 paper was published in the peer-reviewed journal Psychiatry, stated, "We all know that strong belief systems do influence the interpretation of any facts. That is why, in science, we put forth our work for critical review by our peers." "In any case, none of our studies provide a basis for their claims," Dr. Turner averred. Keroack did not cite any of Turner's later, more definitive work. "Scientific research has shown that the hormone cortisol rises with psychologically-induced stress," Dr. Turner explained. "Our research examined whether blood levels of oxytocin would similarly increase with sad or positive emotions induced by interview discussions and emotionally-evocative film clips. The research was a collaboration between CSPP and the University of California San Francisco (UCSF), and was funded by the National Institutes of Mental Health in 1998. Margaret Altemus, MD, a psychiatrist at the Weill Medical College of Cornell University, was Co-Principal Investigator for the studies. The initial study was cutting-edge research at the time; but, in the end (2002), we did not find changes in oxytocin levels that were related to these emotions." Dr. Turner stated: "Scholars are deeply concerned that Dr. Keroack's influence on abstinence education and birth control policies in poorer countries may ultimately have bad consequences, especially for youth and women. In this country, women were told for years that shame would befall them and no one would want to marry them if they had sex prior to marriage. In the 1960s, there was a large-scale rebellion against such gender-specific norms. "Due to concerns about health and emotional development, I certainly would not promote the idea that teenagers should engage in multiple sexual relationships. However, the cautions we give to teens should be based on honest concerns about health and values, not misinformation such as the statement that they will never be able to bond with a partner or have loving attachments in later life. In fact, other research by colleagues in the Division of Adolescent Medicine at UCSF* implies that teens are more likely to heed advice when it is seen as believable." "It is important that people get the facts straight. Social science research can tell us certain things about how various factors are related to one another, what kinds of interventions are helpful and what underlying causes may be attributed to social problems," Dr. Turner stated. "However, it is very difficult to go from social science evidence to direct policy statements that purport to be right for everyone. It takes many studies and a lot of public debate." "There are always some human values involved in statements of policy, and it is fairer to the public to acknowledge what those values are," she continued. "This is something we instill in our students at Alliant - in a free society, we have to be open to debate the evidence, the meaning of the evidence and its quality. At least Dr. Keroack's co-author did acknowledge that they were developing conclusions that no scientists would ever put forth." Dr. Turner lauded the Boston Globe which broke the story about Keroack’s claims, by digging in to the research Keroack and his coauthor cited. "Most people are not going to go to the original scientific sources (the journals) to see whether the claims of politicians are correct. That's why it is so easy to mislead the public with interpretations of scientific findings." Keroack currently serves as medical director of the Christian nonprofit A Woman's Concern, based in Dorchester, Massachusetts. In its United Way community listing on the web, the organization states that its goal "is to reflect the love of Christ by providing alternatives to abortion through support, education and practical assistance to those in need...". Dr. Keroack’s HHS appointment does not require Senate approval. Dr. Turner stated, "A physician in high office should be held not just to the same standards as others who are, by profession, scientists, but to a higher standard because of the magnified impact his or her views will have on the public. That's why it's so important for someone dealing with public policy to be clear about where the science (or social science) stops and where the human values begin." "Values are important to all of us, so it is most informative to acknowledge what they are. At Alliant, for example, we acknowledge up front that we value multicultural perspectives, that we believe in the rights of all people to contribute to and formulate the dialogue in our field. Those values do influence what we study and how we go about studying human emotion, well-being, and behavior." In addition to serving as a CSPP Professor at Alliant, Dr. Rebecca Turner, PhD, is also the holder of a public office. This February, she was elected to her second term as chair of the Mental Health Board for the City and County of San Francisco, a body charged with ensuring that clients and family members receive quality mental health services. She is an active member of the California Psychological Association's Board for Industrial/Organizational and Consulting Psychologists. * Millstein SG, Halpern-Felsher BL. (2001). Perceptions of risk and vulnerability. In B Fischhoff, EO Nightingale, JG Iannotta Adolescent Risk and Vulnerability: Concepts and Measurement. Washington, DC: National Academy Press. Also reprinted in Journal ofAdolescent Health (2002), 31S:10-27.
<urn:uuid:890f06f1-999c-4720-9dc0-250da52210dd>
CC-MAIN-2017-04
https://www.sootoday.com/local-news/too-much-sex-controversy-surrounds-bush-appointee-106268
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00228-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962376
1,504
1.71875
2
Accelerating Human Reaction Without Compromising Agency We enable preemptive force-feedback systems to speed up human reaction time without fully compromising the user’s sense of agency. Typically these interfaces actuate by means of electrical muscle stimulation (EMS) or mechanical actuators; they preemptively move the user to perform a task, such as to improve movement performance (e.g., EMS-assisted drumming). Unfortunately, when using preemptive force-feedback users do not feel in control and loose their sense of agency. We address this by actuating the user’s body, using EMS, within a particular time window (160 ms after visual stimulus), which we found to speed up reaction time by 80 ms in our first study. With this preemptive timing, when the user and system move congruently, the user feels that they initiated the motion, yet their reaction time is faster than usual. As our second study demonstrated, this particular timing significantly increased agency when compared to the current practice in EMS-based devices. We conclude by illustrating, using examples from the HCI literature, how to leverage our findings to provide more agency to automated haptic interfaces. Shunichi Kasahara, Jun Nishida, and Pedro Lopes. 2019. Preemptive Action: Accelerating Human Reaction using Electrical Muscle Stimulation Without Compromising Agency. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19). ACM, New York, NY, USA, Paper 643, 15 pages. DOI: https://doi.org/10.1145/3290605.3300873
<urn:uuid:00478f7d-1f80-49f4-8f6c-2bb9d5eef2b3>
CC-MAIN-2022-33
https://junis.sakura.ne.jp/wp/portfolio-item/preemptive-action/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00478.warc.gz
en
0.866335
336
1.851563
2
The first section of the Utility Menu has several MIDI Learn options. MIDI Learn Template MIDI Learn and Automation Templates allow custom setups to be saved and easily recalled whenever they’re needed. - Select “Save Template” from the MIDI Learn & Automation sub-menu to store all current MIDI Learn and Automation assignments for later recall. Selecting this option will open a File Save dialogue, allowing the Template to be named and saved. - Select ‘Load MIDI Learn Template’ to load a previously saved Template. Any existing MIDI Learn assignments will be replaced with the assignments stored in the Template. Selecting this option will open a File Load dialogue, allowing a saved Template to be loaded. NOTE: Before saving a MIDI Learn Template, you can select “Show Current Assignments” (see below) to preview the assignments that will be saved with the Template. This is also a convenient way to verify assignments after a MIDI Learn Template has been loaded. Unlearn Next MIDI Device When a physical controller has been MIDI-Learned, you can use this option to Unlearn it. To accomplish this, select Unlearn Next MIDI Device from the menu, then move the physical controller on your MIDI Device. Since more than one parameter can be assigned to a single controller, this option is especially convenient if you are controlling more than one parameter with a single physical controller. It allows you to clear all assignments for the specific controller, without having to Unlearn each parameter individually. Unlearn Next Parameter When a parameter in the Keyscape interface has been MIDI-Learned, you can use this option to Unlearn it. To accomplish this, select Unlearn Next Parameter from the menu, then select and move the parameter that you wish to Unlearn. This is a useful feature when you have more than one parameter assigned to a single physical controller. A single parameter can be Unlearned, while the rest will remain assigned to the physical controller. Make MIDI Learned Controls Omni Keyscape is MIDI input-channel-sensitive when MIDI-Learning. This means that it can distinguish between a button transmitting Ch 1 and the same button transmitting Ch 2. Selecting this option allows all MIDI Learn settings to respond to any incoming MIDI channel (e.g. MIDI Omni mode). This is useful when you want Keyscape to respond to an external control regardless of the current incoming MIDI channel. Unlearn All MIDI Learns Selecting this option will clear all existing MIDI Learn and Automation assignments. Show Current Assignments Show Current Assignments displays all existing MIDI Learn and Automation assignments as a formatted report. The information will be displayed using your default Web Browser. This is especially useful for checking existing MIDI Learn and Automation assignments before saving a MIDI Learn and Automation Template, or to verify assignments after loading a MIDI Learn and Automation Template. NOTE: If your host doesn’t display Host Automation assignments by name, use “Show Current Assignments” to display the parameter names along with their corresponding Host Automation ID numbers. Contextual Menus provide parameter-specific MIDI Learn and Host Automation options. If a parameter can be MIDI-learned, the following MIDI Learn options will be available when you Right/Control-click directly on the parameter: MIDI CC Learn Select this option, then move or press a control on your MIDI controller. The control will then be paired with the Keyscape parameter. MIDI CC Learn Inverted When you select this option, then move or press a control on your MIDI controller, the control will be paired with the Keyscape parameter. However, the values will be inverted. For example, as you increase the value of the physical control, the value of the Keyscape parameter will decrease. MIDI Note Learn Select this option then play a note on your MIDI controller. That Note will then control the assigned Keyscape parameter. Once a Note has been MIDI-Learned it will no longer trigger a sound when Keyscape receives Note On messages from that Note—it will only control the assigned parameter. MIDI Note Learn Inverted When you select this option, then play a note on your MIDI controller, that Note will then control the assigned Keyscape parameter. However, the values will be inverted. Once a Note has been MIDI-Learned it will no longer trigger a sound when Keyscape receives Note On messages from that Note—it will only control the assigned parameter. NOTE: When you MIDI-Learn a variable range parameter (such as a knob or slider) using MIDI Note Learn, the Note ON/OFF messages will toggle the parameter to its maximum and minimum positions respectively. When using MIDI Note Learn Inverted, the values are reversed, so Note ON will toggle to the minimum value, Note OFF will toggle to the maximum value. Select this option to clear all MIDI Learn assignments, including Host Automation assignments, for the selected parameter. Use this option to show all MIDI Learn assignments for the selected parameter. A pop-up dialogue will open showing all CC and/or Note numbers assigned, or will notify you if there are no current assignments.
<urn:uuid:c0f7e92e-016b-448c-95e3-129139ba490e>
CC-MAIN-2022-33
https://support.spectrasonics.net/manual/Keyscape/11/en/topic/midi-learn-menus
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00277.warc.gz
en
0.739373
1,093
1.773438
2
Flowchart for identifying eligible studies. The relationship between coffee consumption and subsequent type 2 diabetes mellitus in different categories of coffee consumption. The center of each black square is placed at the summary point estimate; the area of the square is proportional to the statistical size; and each vertical line shows the 95% confidence interval about the summary estimate. Association between coffee, decaffeinated coffee, and tea consumption and subsequent type 2 diabetes mellitus in published cohort studies (adjusted in all cases at least for age, sex, and body mass index). The studies are sorted by statistical size, defined by the inverse of the variance of the relative risk (RR). The center of each black square is placed at the point estimate; the area of the square is proportional to the statistical size; and each horizontal line shows the 95% confidence interval (CI) for the estimate for each study. Pheter indicates P value for heterogeneity. Impact of study size on summary estimates of the relative risk between coffee consumption and subsequent type 2 diabetes mellitus adjusted in all cases at least for age, sex, and body mass index. The center of each black square is placed at the summary point estimate; the area of the square is proportional to the statistical size; and each horizontal line shows the 95% confidence interval about the summary estimate. Huxley R, Lee CMY, Barzi F, Timmermeister L, Czernichow S, Perkovic V, Grobbee DE, Batty D, Woodward M. Coffee, Decaffeinated Coffee, and Tea Consumption in Relation to Incident Type 2 Diabetes MellitusA Systematic Review With Meta-analysis. Arch Intern Med. 2009;169(22):2053-2063. doi:10.1001/archinternmed.2009.439 Copyright 2009 American Medical Association. All Rights Reserved. Applicable FARS/DFARS Restrictions Apply to Government Use.2009 Coffee consumption has been reported to be inversely associated with risk of type 2 diabetes mellitus. Similar associations have also been reported for decaffeinated coffee and tea. We report herein the findings of meta-analyses for the association between coffee, decaffeinated coffee, and tea consumption with risk of diabetes. Relevant studies were identified through search engines using a combined text word and MeSH (Medical Subject Headings) search strategy. Prospective studies that reported an estimate of the association between coffee, decaffeinated coffee, or tea with incident diabetes between 1966 and July 2009. Data from 18 studies with information on 457 922 participants reported on the association between coffee consumption and diabetes. Six (N = 225 516) and 7 studies (N = 286 701) also reported estimates of the association between decaffeinated coffee and tea with diabetes, respectively. We found an inverse log-linear relationship between coffee consumption and subsequent risk of diabetes such that every additional cup of coffee consumed in a day was associated with a 7% reduction in the excess risk of diabetes relative risk, 0.93 [95% confidence interval, 0.91-0.95]) after adjustment for potential confounders. Owing to the presence of small-study bias, our results may represent an overestimate of the true magnitude of the association. Similar significant and inverse associations were observed with decaffeinated coffee and tea and risk of incident diabetes. High intakes of coffee, decaffeinated coffee, and tea are associated with reduced risk of diabetes. The putative protective effects of these beverages warrant further investigation in randomized trials. By 2025, the number of in individuals estimated to be affected by type 2 diabetes mellitus (DM) will increase by 65% to reach an estimated 380 million individuals worldwide, with the greatest burden being shouldered by the lower- and middle-income countries of the Asia-Pacific region.1 Diabetes mellitus causes substantial morbidity and mortality in those affected and is associated with enormous economic, health, and societal costs.2,3 Moreover, compared with unaffected individuals, those with DM are at greatly elevated risk of other chronic illnesses, including cardiovascular disease, in which cases DM more than doubles the risk of having a heart attack or stroke.4,5 Therefore, the identification of modifiable risk factors for the primary prevention of DM is of considerable public health importance. Despite considerable research attention, the role of specific dietary and lifestyle factors remains uncertain, although obesity6,7 and physical inactivity8 have consistently been reported to raise the risk of DM. Observational epidemiologic studies have also suggested that high dietary intakes of fat, especially trans-fats,9 and red meat10,11 are independently associated with reduced insulin sensitivity and increased risk of DM, and conversely, that high intakes of whole grains may be protective.5,9,12 Other studies have highlighted the potential role that high intakes of coffee and tea may have on reducing the likelihood of developing DM. An earlier meta-analysis suggested that individuals with the highest level of coffee consumption have approximately one-third the risk of DM compared with those with the lowest levels of consumption.13 However, since that review was published, the amount of information that is now available on the relationship between coffee consumption and subsequent risk of DM has more than doubled.14- 24 Furthermore, several studies have also published data suggesting that decaffeinated coffee and tea may confer benefits similar to those of regular coffee consumption, although there has been no systematic evaluation of the evidence for these beverages.16,17 Hence, the purpose of the current report is to update the previous meta-analysis of the association between coffee consumption and risk of DM and to conduct a supplementary overview of the evidence for decaffeinated coffee and tea consumption on subsequent risk. We performed a systematic review of available literature according to the MOOSE guidelines.25 Relevant studies published between 1966 and July 2009 were identified from CINAHL, EMBASE, PubMed, and the Cochrane Library using a combined text and the following MeSH heading search strategies: (caffeine OR coffee OR decaffeinated OR tea) AND (diabetes OR NIDDM OR adult-onset diabetes OR glucose) AND (cohort OR case-control). References from these studies, as well from the previous reviews, were also scrutinized to identify other relevant studies. There was no language restriction. Studies were included in this systematic review if they had published quantitative estimates (including variability) of the association between intake of total coffee, decaffeinated coffee, total tea (including green and black) with new-onset (incident) DM. Findings had to be adjusted for at least age and body mass index (BMI). We excluded all animal studies and, in humans, studies of type 1 DM. Given that a disease may plausibly affect dietary intake (reverse causality), we also excluded all cross-sectional studies and those case-control studies with no information on incident DM. Furthermore, we excluded studies that classified consumption only into a binary variable (ie, yes or no) without specifying the number of cups of beverage consumed per day. The literature research and data extraction were conducted by 2 of the us (C.M.Y.L. and L.T.). Where there was disagreement over the eligibility of the study, 3 more of us reviewed the article (R.H., F.B., and S.C.), and a consensus was reached. Given that most studies reported the association between beverage consumption and DM for more than 1 level of intake, an a priori decision was made to pool the estimates of relative risk (RR) that corresponded as closely as possible to between 3 and 4 cups of coffee, decaffeinated coffee, or tea per day, compared with none. A test for linear trend of effects across coffee consumption categories was performed by regressing each log RR on the ordered categorical variable for coffee in 5 levels using a random-effect meta-regression model. A log-linear association between cups per day and RR was fitted using generalized least squares.26 For studies of specific types of tea (black, green, and oolong), only 1 estimate of the association with DM was reported, and hence, we report on the association with DM comparing tea drinkers with non–tea drinkers. Summary estimates were obtained by means of a random-effects model, and studies were weighted according to an estimate of statistical size defined as the inverse of the variance of the log RR.27 The percentage of variability across studies attributable to heterogeneity rather than chance was estimated using the I2 statistic.28,29 Possible sources of heterogeneity were investigated by comparing summary results obtained when studies were grouped according to statistical size, sex, method of diagnosis of DM, and level of adjustment. Publication bias was assessed taking, for each study, the RR and 95% confidence interval (CI) corresponding to the highest category of coffee consumption using the Egger test.30 All analyses were performed using Stata software, version 10 (StataCorp LP, College Station, Texas). The search strategy identified a total of 2435 articles, of which 847 were duplicates. After a review of 1588 abstracts, 120 reports were reviewed in full (Figure 1), and 20 of these, all cohort studies, were included in our review.14- 24,31- 40 The sample size ranged from 910 to 88 259 and totaled 517 325 individuals, among whom there were 21 897 cases of new-onset DM (Table A and Table B). Cohorts were drawn from diverse populations, including Singapore,20 Puerto Rico,15 the United Kingdom,17 Finland,14,18,31,32 the United States,16,21- 23,34- 36 Japan,17,40 the Netherlands,38,39 and Sweden33 but included predominantly white populations, with 21% of the data derived from Asian cohorts (n = 110 147). The studies represented both the general population and specific occupational groups. Age at commencement of the studies ranged from 20 to 98 years, and the median duration of follow-up ranged from 2 to 20 years. Apart from 1 study, which used 24-hour dietary recall to obtain an estimate of coffee consumption,15 all of the remaining studies used self-reported food frequency or self-administered questionnaires. Diabetes mellitus was ascertained using self-report of physician diagnoses, routinely collected hospital admission records, or direct measurement using an oral glucose tolerance test. Studies quantified the association between beverage intake and DM using RR with accompanying 95% CIs. With few exceptions, all studies controlled extensively for a range of potential confounders. Although some studies recruited men and women, not all reported sex-specific analyses; those that did were entered separately into the meta-analysis, resulting in a total of 37 estimates of the relationship between coffee, decaffeinated coffee, and tea with risk of DM. A total of 23 estimates from 18 studies (5 studies reported sex-specific estimates) with information on 457 922 participants reported on the association between coffee consumption and subsequent risk of DM. There was evidence of a significant inverse log-linear association such that every additional cup of coffee consumed in a day was associated with a 7% reduction in the excess risk of DM (RR, 0.93 [95% CI, 0.91-0.95]) (P < .001) (Figure 2). In categorical analysis, the pooled summary estimate from these studies indicated that drinking 3 to 4 cups of coffee per day was associated with an approximate 25% lower risk of DM than drinking none or 2 or fewer cups per day (RR, 0.76 [95% CI, 0.69-0.82]) (Figure 3). There was evidence of significant heterogeneity across studies (P = .01) that was not explained by differences in the strength of effect between men and women (RR, 0.78 [95% CI, 0.70-0.87] and 0.71 [95% CI, 0.62-0.81], respectively) (P = .24 for heterogeneity); the region where the study was conducted (Europe RR, 0.84 [95% CI, 0.75-0.94] vs the United States RR, 0.73 [95% CI, 0.62-0.85]) (P = .15 for heterogeneity); or the method of diagnosis (national register or oral glucose tolerance test RR, 0.85 [95% CI, 0.74-0.98] vs self-report RR, 0.72 [95% CI, 0.66-0.79]) (P = .05 for heterogeneity). Restriction of the analysis to those 11 studies that reported both age- and sex-adjusted estimates and estimates that were adjusted for other potential confounders (Table A and Table B) indicated that the observed association was unaffected by the level of adjustment in the crude model (RR, 0.75 [95% CI, 0.67-0.85]) vs in the maximally adjusted model (RR, 0.76 [95% CI, 0.70-0.84]) (P = .81 for heterogeneity). There was some evidence of publication bias found by the Egger test (P = .08) such that the smaller studies tended to report greater effect sizes than did the larger studies (P = .01 for trend) (Figure 4). The summary risk estimate from the 6 largest estimates (defined as having a statistical study weight ≥35) of drinking 3 to 4 cups of coffee per day compared with drinking none or fewer than 2 cups per day was RR, 0.85 (95% CI, 0.75-0.96), while from the 7 smallest estimates (defined as having a statistical study weight <20), it was RR, 0.62 (95% CI, 0.48-0.79). Six studies (N = 225 516 participants) reported on the association between decaffeinated coffee consumption and subsequent risk of DM. The pooled summary estimates from these studies indicated that individuals who drank more than 3 to 4 cups of decaffeinated coffee per day had an approximate one-third lower risk of DM than those consuming no decaffeinated coffee (RR, 0.64 [95% CI, 0.54-0.77]) (Figure 3). There was little evidence for either significant heterogeneity across included studies (P = .31) or publication bias (P = .57 for Egger test). A total of 7 studies (N = 286 701 participants) reported on the association between tea consumption and subsequent risk of DM. Pooled summary estimates indicated that individuals who drank more than 3 to 4 cups of tea per day had an approximate one-fifth lower risk of DM than those consuming no tea (RR, 0.82 [95% CI, 0.73-0.94]) (Figure 3). There was little evidence for significant heterogeneity across included studies (P = .46) and no evidence to indicate the presence of publication bias (P = .11 for Egger test). For studies of tea and decaffeinated coffee, there was insufficient data to permit examination of a dose-response relation. It was also not possible to examine the potential effect of confounding on the relationship because none of the studies reported both age- and multivariate-adjusted estimates. The findings from this meta-analysis, based on over 500 000 individuals with over 21 000 cases of new-onset DM, confirm an inverse association between coffee consumption and subsequent risk of DM: every additional cup of coffee consumed in a day was associated with 5% to 10% lower risk of incident DM after adjustment for potential confounders. However, this may be an overestimate of the true magnitude of the association owing to the presence of small-study bias. Furthermore, in the first overview of which we are aware, we were able to demonstrate similar inverse associations between consumption of decaffeinated coffee and tea with risk of incident DM. For example, individuals consuming more than 3 to 4 cups of tea a day had a one-fifth lower risk of subsequent DM than non–tea drinkers; those consuming a similar amount of decaffeinated coffee had a one-third lower risk than nonconsumers. However, in the study by Greenberg and colleagues,16 consumption of decaffeinated coffee was associated with a significant 40% reduction in the risk of DM only in those aged 60 years or younger. In older individuals, the direction of association was reversed such that there was a significant 40% increase in risk. The observed age-related effect may have been a statistical artifact driven by subgroup analysis. However, we were unable to examine the effect by age, and the possibility that the association between coffee and DM risk is age dependent warrants further investigation. That the apparent protective effect of tea and coffee consumption appears to be independent of a number of potential confounding variables raises the possibility of direct biological effects. Our findings suggest that any protective effects of coffee and tea are unlikely to be solely effects of caffeine, but rather, as has been speculated previously, they likely involve a broader range of chemical constituents present in these beverages, such as magnesium,41 lignans,42 and chlorogenic acids.43 The effects of these coffee components on glucose metabolism and insulin sensitivity from both animal studies and in vitro experiments have been extensively reviewed elsewhere.44 While these components have been demonstrated to have beneficial effects on biological pathways intimately involved in glucose homeostasis and insulin secretion, how these findings relate to in vivo effects in humans is uncertain. Because most of the studies included in this review did not provide data on the effects of these beverages or their components on measures of hyperglycemia and insulin sensitivity, we cannot provide further evidence on the mechanisms involved. In studies that reported data on insulin sensitivity, findings were conflicting, with some suggesting that coffee use increased sensitivity to insulin,38,45 while others reported no effect.46 There have been few randomized trials of the effects of coffee on glucose and insulin, but 1 randomized crossover trial of 4 weeks' duration of high coffee consumption reported an increase in fasting insulin levels but no effect on fasting glucose concentration.47 Possible mechanisms of action for tea on DM may involve 1 or more physiologic pathways. For example, tea catechins have been shown to inhibit the carbohydrate digestive enzymes, which suggests that glucose production may be decreased in the gastrointestinal system resulting in lower levels of glucose and insulin.48 Black, green, and oolong tea have also been reported to increase insulin sensitivity by increasing insulin-stimulated glucose uptake in adipocytes.49 There has also been the suggestion that green tea may prevent damage to pancreatic beta cells.50,51 There have been several small clinical intervention studies conducted that have examined the effects of tea consumption on biomarkers of glucoregulatory control, but the results from these studies have been inconsistent. Some studies have reported a significant reduction in plasma glucose and hemoglobin A1c levels,52,53 while others have reported no effect on any aspect of glucoregulatory control.54 Given that dietary polyphenols are rapidly metabolized, one explanation for the discrepant findings between these studies may have been the measurement of the effects of tea on biomarkers at different times after its consumption. For example, catechin concentrations in human plasma reach their maximum level at 2 hours after ingestion of green tea but are undetectable after 24 hours.55 That there is a causal inverse association between coffee consumption and subsequent risk of DM is further supported by the presence of a dose-response relationship. In those consuming more than 6 cups of coffee per day, the risk of new-onset DM was reduced by approximately 40% compared with non–coffee drinkers, while among those who drank less than 1 cup per day, the risk was only marginally reduced to about 4% compared with coffee abstainers. Moreover, estimates were quite similar across studies despite the diversity in populations. Of note, this similarity was presence in spite of the likely presence of marked variation between studies in types of coffee and tea and their preparation (eg, filtered vs unfiltered, cup size, cup strength, addition of milk or sugar, and other variations). Finally, the results were consistent between studies regardless of which method of diagnosis of DM was used (ie, self-report vs national register or oral glucose tolerance test). An inherent weakness of all observational studies and meta-analyses thereof is the possibility that any association is due to the presence of confounding. However, because high levels of coffee and tea consumption have been reported to be associated with risk behaviors that are positively associated with the risk of developing DM (such as low levels of physical activity56 and cigarette smoking57), it might be speculated that adjustment for such risk factors would strengthen the relationship as has been reported. We examined the impact of confounding on the relationship between coffee consumption and subsequent risk of DM by comparing crude and adjusted estimates of effect from only those studies that reported both estimates and observed that adjustment for potential confounders had no material impact (either a strengthening or a weakening) on the estimate of effect. However, we were unable to conduct a similar analysis for tea consumption because studies only reported the adjusted estimate. Tea drinkers may be more health conscious than coffee drinkers, and it is therefore plausible that some of the observed beneficial effect of tea on DM risk is due in part to other health-promoting behaviors (eg, regular physical activity, weight maintenance, and nonsmoking) that may or may not have been taken into consideration in the original studies. A further major limitation of this analysis is the reliance on published data, which precluded more detailed analysis of the effect of adjustment for confounders at an individual level or for specific confounders separately. In this regard, it is possible that individuals who consume extreme quantities of coffee differ in other important dietary and sociologic aspects from more moderate coffee consumers, but to examine this issue any further would require an individual participant data meta-analysis. Therefore, the possibility that coffee consumption may be acting as a surrogate marker of some other dietary or lifestyle risk factor cannot be fully excluded. Finally, although the studies included in this review were all population based, only 20% of the cohorts were from nonwhite populations, which somewhat limits the generalizability of the study findings to largely Western populations. This is an important consideration given that the pattern of beverage consumption and background risk of DM may differ across ethnic groups. In conclusion, high intake of coffee, decaffeinated coffee, and/or tea is associated with a material reduction in the risk of new-onset DM. If such beneficial effects were observed in interventional trials to be real, the implications for the millions of individuals who have DM, or who are at future risk of developing it, would be substantial. For example, the identification of the active components of these beverages would open up new therapeutic pathways for the primary prevention of DM. It could also be envisaged that we will advise our patients most at risk for DM to increase their consumption of tea and coffee in addition to increasing their levels of physical activity and weight loss. Correspondence: Rachel Huxley, DPhil, The George Institute for International Health, PO Box M201, Missenden Road, Sydney, NSW 2050, Australia (email@example.com). Accepted for Publication: August 14, 2009. Author Contributions: Dr Huxley had full access to all of the data in the study and takes responsibility for the integrity of the data and the accuracy of the data analysis. Study concept and design: Huxley, Czernichow, Perkovic, and Grobbee. Acquisition of data: Timmermeister. Analysis and interpretation of data: Huxley, Lee, Barzi, Timmermeister, Perkovic, Batty, and Woodward. Drafting of the manuscript: Huxley, Barzi, Timmermeister, Czernichow, Grobbee, Batty, and Woodward. Critical revision of the manuscript for important intellectual content: Huxley, Lee, Czernichow, Perkovic, Grobbee, and Batty. Statistical analysis: Lee, Barzi, Grobbee, and Woodward. Administrative, technical, and material support: Perkovic. Study supervision: Huxley and Barzi. Financial Disclosure: None reported. Funding/Support: Dr Huxley is supported by a Career Development Award from the National Heart Foundation of Australia. This work was additionally supported by grant 402903 from the National Health and Medical Research Council of Australia (Dr Lee); a Research Career Development Fellowship from the UK Wellcome Trust (Dr Batty); and a research grant from Institut Servier, France and Assistance Publique-Hopitaux de Paris (Dr Czernichow).
<urn:uuid:3e75979f-7edb-409f-92ff-76306a14a1e6>
CC-MAIN-2016-44
http://jamanetwork.com/journals/jamainternalmedicine/fullarticle/773949
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00035-ip-10-171-6-4.ec2.internal.warc.gz
en
0.950145
5,058
1.953125
2
The real estate industry remains vulnerable to data-security lapses, particularly where sensitive data is intentionally or unintentionally breached by unauthorized personnel. Firms that fail to improve the security and regulatory compliance of their operations will likely face legal and industry consequences: • Corrective disciplinary action • Resolution agreements • Criminal penalties Let’s look more closely at the problem of security breaches and non-compliance, and explore cloud-based solutions to this problem. Community Fax Machines: A Security Threat Perhaps one of the most important threats from the community fax machine is non-compliance. According to a 2012 survey from research firm Opinion Matters, nearly half of all faxes in the U.S. are breached by unauthorized personnel. A common data-breach scenario occurs when sensitive data is left on a community fax machine: without physical or environmental security, the machine creates an increased risk for data breaches. Because community fax machines are not tightly controlled in the same way as digital accounts, firms must upgrade their technology to enhance the security and privacy of their fax infrastructure. Say an agent approaches a community fax machine and notices a confidential customer finance report lying out in the open. Needing to quickly transmit a counter-offer to a client in a different time zone, the agent gathers the confidential report from the fax machine and dumps it onto a top tray overrun by papers. The tray drops to the floor and the report comes out of order in a scatter on the floor. Multiple confidential client documents are exposed during the mess, and the firm is at risk of violating customer confidentiality. Regardless of how or why a data breach occurs, the truth of the matter is that the standalone fax machine—with its open-end layout and fully exposed paper trays—cannot protect sensitive data from breaches or physical theft. Unauthorized personnel have not only the capacity to breach sensitive data, but also to copy, photograph and/or leak it to third parties, such as the media, using any Web-enabled device, including a watch phone. The industry recognizes its vulnerability to dangerous data breaches, and firms of all sizes are looking to cloud faxing as the preferred solution for solving the problem. Companies that are not compliant, however, will need to bring their operations in line with 21st century requirements swiftly to avoid fines and other litigation. Below are the top three benefits of cloud faxing: It’s no secret that real estate and mortgage professionals have to send and receive sensitive data on an ongoing basis. From inspection reports, credit checks, invoices and finance forms to punch lists, authorizations and tax information, the real estate industry is tasked with securely handling a high volume of red tape. What companies must realize, however, is that there is a substantial price to pay for failing to comply with the data security and privacy laws that govern data privacy, record keeping and reporting across the industry. As regulatory requirements escalate, companies will, no doubt, have to adopt safer and more secure methods for transmitting, archiving and organizing their sensitive data. If they do not, they will face stiff fines and other legal penalties, as well as invite an influx of red tape from non-compliance hearings and other corrective procedures. As companies across the industry upgrade from analog faxing to a cloud solution, questions arise concerning how to incorporate this new technology into an existing operation. Like any enterprise switching from analog faxing to a hosted, cloud-based fax solution, you will want to know how the new technology is installed and readied for use. As with corporate email, cloud faxing is streamlined so almost anyone can use it. The set-up process takes just minutes to complete, and there is no expensive hardware to lease or purchase. As long as your staff knows how to send and receive emails, additional training is not needed. 2. Boost Company Responsiveness A cloud faxing solution not only enhances security and data privacy, but it boosts responsiveness, as well. From confidential contracts and acknowledgments to high-resolution property pictures, the cloud offers fast, convenient and reliable data transmission, anywhere. That means no more waiting in line. No more dealing with a busy signal. And no more sifting through reams of paper to send a confidential financial report or other sensitive data. With cloud technology, sending and receiving faxes is quick, convenient and straightforward. Faxes are sent via email attachments using common file types (.tif, .pdf, .efx). Sensitive data can safely and securely reach any Web-enabled device for immediate transmission of time-sensitive data. Agents who spend time on the road can send and receive faxes from their cell phones or laptops, enabling them to close deals faster while keeping with federal regulatory requirements. 3. Reduced Fax Costs Cloud faxing services enhance the security of your fax infrastructure, while at the same time saving your firm money. First, there is no hardware to install or expensive overhead costs. Initial set-up is easy and administrative controls are managed online for reduced paper waste and minimum IT involvement. The account administrator can add new fax numbers or administrators based on company need. Similar to email, most fax tech issues are easy to resolve, which means the administrator won’t need to waste time troubleshooting system inefficiency. If a problem does occur, all the administrator needs to do is call the toll-free number provided by the service company and request service. A cloud fax solution renders obsolete the need for ink and toner cartridges, printer paper, fax servers, fax lines and IT support, saving your firm more than 50% in overall fax costs. The community fax machines of yesteryear guarantee secure data transfer. They do not, however, offer physical or environmental protections against data breaches or theft. When faxes are allowed to lie on a community fax machine—and let’s face it, most of them do—they face an increased risk for serious data breaches. They can be read, copied or distributed by any unauthorized person who takes ownership of them. This is a frightening thought for any enterprise, let alone one that handles sensitive data, such as financial reports, contracts, tax information, loan application, and counter offers. With eFax Corporate, advanced TSL-encryption protects your data during transmission, while 256-bit AES encryption keeps it safe while at rest in your inbox. (Or, you can archive it in a cloud-based repository that is password-protected.) As an added layer of security, faxes are automatically recorded, stored and organized for auditing purposes. If the successful transmission of any document is ever called into question, the administrator can follow clear audit trails to track its history. Cloud faxing lets businesses close deals faster, while keeping them compliant with the data security and privacy laws that govern data privacy, record keeping and reporting. In the real estate industry – as in industries such as health care and banking – failure to protect sensitive data from unsafe data breaches can be expensive, resulting in multiple fines and court hearings. Not only that, but failing to respond to a deal in a timely manner could also pose big risks for the company’s bottom line. With cloud faxing, agents can send and receive faxes without falling short of regulatory requirements, and save money at the same time. It’s no secret that the real estate industry is at serious risk for data security and privacy threats. Modern business challenges demand modern solutions to meet that threat head-on. Cloud-based, paperless hosted faxing services not only keep enterprise organizations compliant, but improves operations for enhanced security and better responsiveness, now and in the future.
<urn:uuid:dc80ba5a-055a-4fa5-9214-3e6572f9c2c3>
CC-MAIN-2022-33
https://enterprise.efax.com/blog/security-threats-to-the-real-estate-industry
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00675.warc.gz
en
0.93698
1,585
1.640625
2
The script aims to fix the ORFs of gene models described in the gff file. By fixing it means replacing the original ORF (defined by the cds) when the longest predicted one within the mRNA is different. See the --model parameter for more details about the different cases. Currently the tool does not perform incomplete prediction (It always look for a start codon). It is consequently advised to not use the model5 except if you understand what you do. Several ouput files will be written if you specify an output. One will contain the gene not modified (intact), one with the gene models fixed (modified), one will both together (all). agat_sp_fix_longest_ORF.pl -gff infile.gff --fasta genome.fa [ -o outfile ] agat_sp_fix_longest_ORF.pl --help Input GTF/GFF file. -f, --fa or --fasta Imput fasta file. --ct, --codon or --table Codon table to use. [default 1] -m or --model Kind of ORF Model you want to fix. By default all are used. To select specific models writte e.g --model 1,4 Model1 = The original ORF is part of the new ORF; the new ORF is longer Model2 = The original ORF and the new one are different; the new one is longer, they do not overlap each other. Model3 = The original ORF and the new one are different; the new one is longer, they overlap each other. Model4 = The new ORF is shorter due to the presence of stop codon in the original ORF. Model5 = The new ORF is shorter but the original ORF has not premature stop codon. The shorter predicted ORF can be due to the fact that the original ORF does not start by a start codon, while we force here the prediction to have a start codon. A ORF wihtout start can be the fact of an incomplete or fragmented ORF: annotation tool didn't predict the start because: * the start region is NNNN * the start region is XXXX * correct nucleotides but prediction tool did not annotate this part (e.g incomplete evidence in evidence-based prediction) Model6 = The ORF is same size but not correct frame (+1 or +2 bp gives a frame shift). -s or --split This option is usefull for Model2. Indeed when the prediction is non overlapping the original cds, it is possible to split the gene into two different genes. By default we don't split it. We keep the longest. If you want to split it type: -s -o , --output , --out or --outfile Output GFF file. If no output file is specified, the output will be written to STDOUT. verbose mode. Default off. -v 1 minimum verbosity, -v 3 maximum verbosity -h or --help Display this helpful text.
<urn:uuid:25c3da73-0e1a-4d07-9535-b74cd2a58d81>
CC-MAIN-2022-33
https://agat.readthedocs.io/en/latest/tools/agat_sp_fix_longest_ORF.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00275.warc.gz
en
0.821556
690
2.4375
2
This Quebec-born boy still has trouble fathoming why so many people are going gaga over the English Royal Wedding. Don’t we all have hockey playoffs to think about? And isn’t there that little thing to do with the federal elections and Jack’s unexpected Big Orange Wave? To help us out, the Harvard Law School Library has published a post on Royal Wedding: Pomp, Circumstance, and Law to explain all the legalities about how people in the British royal family get hitched. Apparently, it is a lot more complicated than simply showing up at city hall, calling a florist and worrying about your mom crying during the ceremony: The carriages are polished, the cakes baked, and the trees are in the Abbey (really!)…if you plan to celebrate your Anglo-American legal heritage by putting on your tiara at 4am tomorrow morning, it may be of interest that Prince William and Catherine Middleton have more legal requirements involved in their getting hitched than the average British couple.
<urn:uuid:bbbe1018-0c24-4068-828c-cf34bbe1175c>
CC-MAIN-2017-04
http://www.slaw.ca/2011/04/28/the-legal-angle-to-the-big-fat-royal-wedding/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00025-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955629
215
1.804688
2
Economists think Canada kicked off the year on a relatively good note in January, adding jobs after a dismal December. But Canadian employment data are notoriously volatile, so a surprise is possible. The consensus forecast is that the economy added 20,000 net new jobs last month, with the unemployment rate slipping to 7.1% from 7.2%, according to a report from TD Securities. The ice storm that hit central Canada around Christmas may have been a factor behind December’s loss of about 44,000 jobs, and there was probably some bounce-back last month, according to Robert Kavcic, senior economist at BMO Capital Markets. Another month of soft jobs data would likely raise more serious concerns about the job market, though as Mr. Kavcic noted, January’s weather wasn’t great either. “It could be a case where we write off two months of data,” and wait for “cleaner” results in February and March, he said. A couple of sectors to watch includes construction and trade. The building sector has been bleeding jobs for several months and a continuation of this trend would underscore a cooling in the housing market. But there may well be a boost from rebuilding in the aftermath of the ice storm. Seasonal hiring in the retail sector was weaker than expected at the end of last year so fewer lay-offs could provide an “artificial boost,” according to Paul Ferley, assistant chief economist at Royal Bank of Canada.
<urn:uuid:ee5f4c19-a521-4bcf-9cd6-9eac36826b02>
CC-MAIN-2016-44
http://blogs.wsj.com/canadarealtime/2014/02/06/what-to-expect-from-canadas-jobs-report-friday/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00324-ip-10-171-6-4.ec2.internal.warc.gz
en
0.963928
313
1.789063
2
Long before he became a cultural icon, Francis Albert Sinatra was the "boy singer" (that's how they often were referred to) for the Tommy Dorsey Orchestra, one of the most popular swing orchestras around. The world-weary romantic and the ring-a-ding king with the world on a string would not emerge until the 1950s, which is another story. At the time of these recordings (1940-1942), Sinatra emerged from the shadow of Bing Crosby (the American pop star, whose rise preceded the swing era) and would ultimately eclipse him. He hadn't yet developed his trademark swagger, but that elegant, horn-like intonation was in place, along with velvety smooth, mellow phrasing. Sinatra sang the way a horn player could, stretching and caressing notes -- later, he readily proclaimed Dorsey's mellifluous, sometimes voice-like trombone a huge influence. While this period in Sinatra's ascendance is well documented commercially, these live performances -- from radio broadcasts, all previously unreleased -- display a singer and band more improvisational, limber and swinging than on studio recordings. "East of the Sun" features Ol' Blue Eyes playfully oozing romantic clichés while the band, in unison, mock-answers each line in heptalk (try to imagine similar with Nick Cave or Morrissey). "The One I Love" features some gorgeous muted trumpet. And while Dorsey's Orchestra was not a hard-swinging jazz outfit like Count Basie's band (with whom Sinatra would record and perform in the '60s), there's plenty of heartfelt, inventive soloing and shimmering, impeccably crafted arrangements. The recording quality is amazingly excellent -- vivid, sharp, capturing nuances marvelously. Separated from Rat Pack lore, the fact remains: After Louis Armstrong and Bing, Frank Sinatra virtually defined pop and jazz singing, and Young Blue Eyes illustrates why. Subscribe now to get the latest news delivered right to your inbox.
<urn:uuid:d97dfe0d-e0d6-4077-90fe-cc997824d347>
CC-MAIN-2017-04
http://www.riverfronttimes.com/stlouis/frank-sinatra/Content?oid=2462116
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00334-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947997
420
1.59375
2
Key cybersecurity standards and requirements Singapore’s cybersecurity legislative framework is made up primarily of the Cybersecurity Act 2018, the Personal Data Protection Act 2012 and the Computer Misuse Act. These statutes are also supplemented by a number of sector-specific regimes implemented by sectoral regulators. The Cybersecurity Act 2018 The Cybersecurity Act 2018 (CSA) establishes a framework for the protection of critical information infrastructure (CII) against cybersecurity threats, the taking of measures to prevent, manage and respond to cybersecurity threats and incidents in Singapore, and the regulation of providers of licensable cybersecurity services. CII are computers or computer systems that are necessary for the continuous delivery of an essential service in Singapore. The CSA has identified 11 critical sectors in this regard: energy, info-communications, water, healthcare, banking and finance, security and emergency services, aviation, land transport, maritime, government and media. Cyberattacks on CII may have profound and debilitating effects on Singapore at large. The CSA establishes a framework for the designation of CII and imposes obligations on the owners of CII to actively protect the CII from cyberattacks. The CSA also empowers the Commissioner of Cybersecurity to investigate cybersecurity threats and incidents to determine their impact, or potential impact, and prevent further harm or further cybersecurity incidents from arising. These powers may be exercised over any computer or computer systems even if they are not CIIs. The Personal Data Protection Act 2012 The Personal Data Protection Act 2012 (PDPA) governs the collection, use and disclosure of personal data by organisations. A number of obligations are imposed on organisations under the PDPA. This includes an obligation to protect personal data in its possession or under its control by making reasonable security arrangements to prevent: (1) unauthorised access, collection, use, disclosure, copying, modification or disposal, or similar risks; and (2) the loss of any storage medium or device on which personal data is stored. The Personal Data Protection Commission (PDPC) is responsible for the administration and enforcement of the PDPA. The PDPC has broad powers of investigation. It is also empowered to give an organisation any direction as it thinks fit to ensure compliance with the data protection obligations under the PDPA. If the PDPC is satisfied that an organisation has breached its data protection obligations under the PDPA, it may require the breaching organisation to pay a financial penalty of up to S$1 million. The Computer Misuse Act The Computer Misuse Act (CMA) criminalises certain acts such as the unauthorised access or modification of computer material. This would include acts such as hacking into a server to gain unauthorised access to files stored on the server or accessing an individual’s email account without their consent. Other acts criminalised by the CMA include acts relating to distributed denial-of-service attacks, website defacement and infecting a computer with malware. The CMA has extra-territorial reach and may apply even where the wrongdoer, and the computer targeted by the wrongdoer in the commission of an offence under the CMA, were both outside Singapore at all material times. For example, the offence in question may be dealt with as if it had been committed within Singapore if it causes, or creates a significant risk of, serious harm in Singapore. The CSA, PDPA and CMA are complemented by other sector-specific legislative provisions intended to protect personal data. For example, the Banking Act provides that the unauthorised disclosure of customer information by a bank, or any of its officers, would be an offence under the Act. Regulators have also put in place sector-specific regimes to supplement legislation to address cybersecurity concerns in this regard. The banking and financial sector and the telecommunications sectors have robust regimes regulated by the Monetary Authority of Singapore (MAS) and the Infocomm Media Development Authority (IMDA) respectively. The MAS issued its Technology Risk Management Guidelines, which set out technology risk management principles and best practices for the financial sector. They are intended to guide financial institutions in establishing sound and robust technology risk governance and oversight and to maintain cyber resilience. This is in addition to Notices on Cyber Hygiene and Notices on Technology Risk Management that are legally binding on financial institutions. In the telecommunications sector, the IMDA has issued a Telecommunications Cybersecurity Code of Practice to enhance the cybersecurity preparedness of designated licensees. It is presently imposed on major internet service providers in Singapore for mandatory compliance and its coverage includes their network infrastructure providing internet services in Singapore. Summary of breach notification rules Data breach notifications under the PDPA A mandatory breach notification framework under the PDPA came into force on 1 February 2021. It encompasses three broad steps an organisation should take in this regard: - assessing whether a data breach is a notifiable breach; - determining time frames for the provision of notifications; and - the provision of the notifications. Organisations may refer to the following for guidance on complying with the data breach notification obligation under the PDPA: - Personal Data Protection (Notification of Data Breaches) Regulations 2021; - the data breach notification obligation chapter of the Advisory Guidelines on Key Concepts in the PDPA published by the PDPC; and - the Guide on Managing and Notifying Data Breaches under the Personal Data Protection Act published by the PDPC. Assessing whether a data breach is a notifiable data breach If an organisation has credible grounds to believe that a data breach has occurred, it would be required to take reasonable and expeditious steps to assess whether the data breach is a notifiable breach under the PDPA within 30 calendar days. An organisation will need to notify the PDPC of two classes of data breach under the PDPA. The first class of notifiable data breaches relates to data breaches that are likely to result in significant harm or impact to the individuals to whom the information relates. Significant harm could include physical, psychological, emotional, economic and financial harm, as well as harm to reputation and other forms of harms that a reasonable person would identify as a possible outcome of a data breach. To provide certainty to organisations in respect of notifiable data breaches, the Personal Data Protection (Notification of Data Breaches) Regulations 2021 (the Data Breach Notification Regulations 2021) sets out specified categories of personal data that would be deemed to result in significant harm to affected individuals if compromised in a data breach. Where a data breach involves any of these categories of personal data, the organisation in question must notify the PDPC and the affected individuals of the data breach. The second class of notifiable data breaches relates to data breaches that are of a significant scale. A data breach is of significant scale if it involves the personal data of 500 or more individuals. An organisation must notify the PDPC of such a data breach even if the data breach does not involve any of the specified categories of personal data under the Data Breach Notification Regulations 2021. If an organisation is unable to determine the actual number of individuals in a data breach before its time frame for notification lapses, the organisation should notify the PDPC when it has reason to believe that the number of affected individuals is at least 500. This may be based on the estimated number from an initial appraisal of the data breach. The organisation may subsequently update the PDPC of the actual number of affected individuals when it is established. Time frame for the notification of a notifiable data breach Once an organisation determines that a data breach is a notifiable data breach, the organisation must notify the PDPC as soon as practicable and within three calendar days at the latest and, where required, affected individuals as soon as practicable, at the same time or after notifying the PDPC. These time frames for notification start running from the time at which the organisation determines that the data breach is a notifiable breach. Any unreasonable delays in notification would be a breach of the PDPA. This may attract enforcement action against the organisation by the PDPC. Exceptions to the requirement to notify affected individuals The PDPA provides certain exceptions to the requirement to notify affected individuals of a notifiable data breach in certain circumstances. The remedial action exception: An organisation would not need to notify affected individuals of a notifiable data breach if it takes any action, in accordance with any prescribed requirements, that renders it unlikely that the notifiable data breach will result in significant harm to the affected individuals. The technological measure exception An organisation would not need to notify affected individuals of a notifiable data breach if it had implemented, prior to the occurrence of the data breach, any technological measures that renders it unlikely that the notifiable data breach will result in significant harm to the affected individuals. For example, the exception would apply where such technological measures had been applied to the personal data (e.g., encryption and password protection), before the data breach, which renders the personal data inaccessible or unintelligible to an unauthorised party. It must be borne in mind that these exceptions only apply to the requirement to notify affected individuals; the organisation in question is still required to notify the PDPC of the data breach in accordance with the time frame set out above. The provision of data breach notifications to the PDPC An organisation providing notification of a notifiable data breach to the PDPC or affected individuals is required to provide relevant details of the data breach to the best of its knowledge and belief. The notification should also include relevant information about the organisation’s data breach management and remediation plans. A notification to the PDPC of a notifiable data breach must include the following information: - The facts of the data breach. This would include: - the date on which, and the circumstances in which, the organisation first became aware that a data breach had occurred; - information on how the data breach occurred; - the number of individuals affected by the data breach; - the personal data, or classes of personal data, affected by the data breach; and - the potential harm to the affected individuals as a result of the data breach. - The manner in which the organisation is handling the notifiable data breach. This would include: - a chronological account of the steps taken by the organisation after it became aware that the data breach had occurred, including the organisation’s assessment that the data breach was a notifiable data breach; - information on any action taken by the organisation: - to eliminate or mitigate any potential harm to any affected individual as a result of the notifiable data breach; - to address or remedy any failure or shortcoming that the organisation believes to have caused, or enabled or facilitated the occurrence of, the data breach; and - information on the organisation’s plan (if any) to inform all or any affected individuals or the public that the data breach has occurred and how an affected individual may eliminate or mitigate any potential harm as a result of the data breach. - The contact details of at least one authorised representative of the organisation. If the data breach notification to the PDPC is not made within three calendar days of ascertaining that it is a notifiable breach, the organisation must also set out the reasons for the late notification, and include any supporting evidence in this regard, as part of the notification. If an organisation does not intend to notify any individual affected by the data breach, the notification to the PDPC must also set out the grounds on which the organisation is relying on – whether under the PDPA or other written law – for not notifying the affected individual. The provision of data breach notifications to individuals affected by a notifiable data breach Notifications to individuals affected by a notifiable data breach must include the following information: - The facts of the data breach. This would include: - the circumstances in which the organisation first became aware that a notifiable data breach has occurred; and - the personal data or classes of personal data relating to the affected individual affected by the notifiable data breach. - The organisation’s data breach management and remediation plan. This would include: - the potential harm to the affected individual as a result of the data breach; - information on any action by the organisation, whether taken before or to be taken after the organisation notifies the affected individual to eliminate or mitigate any potential harm to the affected individual as a result of the data breach and to address or remedy any failure or shortcoming that the organisation believes to have caused, or have enabled or facilitated the occurrence of, the data breach; and - steps that the affected individual may take to eliminate or mitigate any potential harm as a result of the notifiable data breach, including preventing the misuse of the affected individual’s personal data affected by the notifiable data breach. - Contact details of at least one authorised representative of the organisation. Notifications to affected individuals should be clear and easily understood. Where the data breach involves information related to adoption matters or the identification of vulnerable individuals, organisations should first notify the PDPC for guidance on notifying the affected individuals. Cybersecurity incidents involving CII The CSA also requires an organisation that has been designated an owner of CII to notify the Commissioner of Cybersecurity of the occurrence of a cybersecurity incident within two hours of becoming aware of the same. Such cybersecurity incidents include: - the unauthorised hacking of a CII; - the installation or execution of unauthorised software or code on a CII; - man-in-the-middle attacks, session hijacks or any other unauthorised interception of communications between a CII and an authorised user; and - denial-of-service attacks. The organisation must then submit the following details within 14 days of the initial notification: - the cause or causes of the cybersecurity incident; - any impact on the CII, interconnected computers or systems; and - any remedial measures that the organisation took. Sector-specific breach notification requirements Sectoral regulators may also impose sector-specific breach notification requirements that apply over and above those imposed on organisations by way of legislation. For example, the MAS requires a regulated financial institution to notify the MAS within one hour of discovering a system malfunction or IT security incident that has a severe and widespread impact on its operations or materially impacts its service to customers. The affected financial institution must then submit a root cause and impact analysis report to the MAS within 14 days of the discovery of the incident. Best practices for cyber incident response Organisations should have a cyber incident response (CIR) plan in place to swiftly contain and neutralise a cyber incident. The CIR plan should contain clear and concise procedures for responding to various forms of cyber incidents. This would include responses to ransomware, distributed denial of service and data exfiltration. An organisation should develop its CIR plan in consultation with its key business departments to ensure that it takes into account business and operational recovery requirements. Organisations may also consider appointing external consultants and vendors to assist in developing its CIR, where appropriate. It is imperative that organisations have a dedicated internal incident response team to be activated immediately upon the detection of suspected or confirmed cybersecurity or data breaches to swiftly put the CIR plan into action. An organisation’s internal incident response team should include, among other things: - a team leader with the relevant expertise and who has been given a clear mandate and decision-making powers to ensure a rapid response to contain and manage the cyber incident; - the IT specialist who is responsible for the organisation’s IT infrastructure and cybersecurity; and - an administrative manager to manage and coordinate the administrative aspect of the incident response. This would include coordinating meetings, maintaining a log of tasks that have been allocated or need to be allocated for the response, recording notes of meetings, and disseminating any relevant communications within the organisation (e.g., document hold notifications). The incident response team should be in a position to swiftly determinate whether the nature and severity of the cyber incident is beyond the expertise of the organisation’s personnel. Organisations should also consider appointing external legal counsel promptly depending on the severity of the cyber incident. Specialist cybersecurity lawyers would be well placed to coordinate and manage a cyber incident response bearing in mind potential regulatory and litigation issues that may arise. More importantly, the appointment of external legal counsel at the earliest stages would allow them to structure a cyber incident response or forensic investigation to ensure that legal professional privilege is established and preserved as far as possible from the outset. Depending on the severity of the incident, other external service providers that an organisation may consider engaging are: - cybersecurity experts to contain the incident, prevent further compromise of data and preserve electronic evidence; - forensic experts to investigate the cause of the incident; and - public relations specialists to deal with any reputational impact that may arise from the breach. These service providers should work in conjunction with the organisation’s legal counsel to ensure the organisation’s interests are protected as far as possible. For example, external public relations communications should be vetted by legal counsel to ensure that false or defamatory statements are not made in allocating blame to a party for a cyber incident. Organisations must comply with the notification requirements that have been summarised earlier as part of their response. Organisations may also consider alerting the Singapore Police Force if criminal activity is suspected and contacting the Singapore Computer Emergency Response Team (SingCERT) for assistance in containing the cyber incident. The PDPC has issued a Guide on Managing and Notifying Data Breaches under the Personal Data Protection Act that recommends good practices to help organisations prepare for data breaches with a data breach management plan and sets out some key considerations for organisations responding to data breaches. These include considering the following actions in responding to such breaches: - isolating the compromised system from the Internet or network by disconnecting all affected systems; - re-routing or filtering network traffic, firewall filtering, closing particular ports or mail servers; - preventing further unauthorised access to the system. Disabling or resetting the passwords of compromised user accounts; - isolating the causes of the data breach in the system and, where applicable, changing the access rights to the compromised system; - stopping the identified practices that led to the data breach; - establishing whether the lost data can be recovered and implementing further action to minimise any harm caused by the data breach; and - recording details of the data breach and post-breach responses in an incident record log. Information collated from cybersecurity and data breaches should be used to improve the existing cybersecurity measures implemented within the organisation and to refine the organisation’s CIR plan. Cybersecurity and incident response trends Cybersecurity is increasingly being viewed as a risk management issue, and not merely a technical or IT issue, because of how common attacks are and the potential for huge damage to be caused to an organisation from such attacks. This has resulted in organisations detecting and containing cyberattacks much more swiftly over the past decade. One of the most striking trends has been the significant reduction in global median dwell time from 416 days in 2011 to 24 days in 2020. Organisations in the Asia-Pacific region (APAC) appear, however, to be at higher risk compared to other regions in this regard. The median APAC dwell time was 76 days in 2020. This is more than three times as long as the global median dwell time. Attackers also continue to maintain access to compromised APAC organisations for extensive periods of time: 10 per cent of breaches investigated in APAC during 2020 showed dwell times of more than three years and 4 per cent showed dwell times of more than nine years. The rise of cybercrime in Singapore Cybercrime is also on the rise in Singapore. The Cyber Security Agency of Singapore recently revealed that 16,117 cases of cybercrime were reported in Singapore in 2020. This accounted for 43 per cent of overall crime in Singapore in 2020 – substantially more than the 6,215 cybercrime cases reported in 2018 and the 9,349 that were reported in 2019. Ransomware, in particular, has gained prominence, with the manufacturing, retail and healthcare sectors being targeted in particular. This is in line with a common trend globally: ransomware is no longer seen as a sporadic nuisance affecting only a handful of machines; it has, instead, been described as a massive, systemic threat affecting entire networks of large organisations. In one such incident, staff from a food and beverage business discovered in August 2020 that their company servers and devices were infected with NetWalker, a prevalent ransomware strain. The ransom note instructed them to visit a webpage on the Dark Web to view the ransom demands. The company had stored all its backups on the affected servers and none of its data could be recovered. The company was forced to rebuild its IT system from scratch. Phishing also continues to be prevalent in Singapore, with around 47,000 phishing URLs with a Singapore link detected in 2020. This reflected a very slight decrease of 1 per cent as compared to 2019. Of these, more than half of the organisations targeted were big technology or social networking firms (such as Apple, Facebook, Linkedin and Whatsapp) and entities in the banking and financial sector (Chase Personal Banking, PayPal and Bank of America). Singapore government organisations were also not spared, with the Singapore Police Force, the Ministry of Manpower and the Ministry of Education being the most commonly spoofed government organisations in Singapore. The covid-19 landscape in Singapore The covid-19 landscape in Singapore has given rise to its own set of issues. Cyberattacks that use covid-19 to lure victims had spiked across industries by more than 100 times from March to April 2020. The healthcare sector has been hit hard in particular, with a surge of attacks by almost 200 times in the first four months of 2020. The transition to remote work set ups in 2020 has also led to an increase in the attack surface area available to threat actors. The abrupt nature of the transition, necessitated by the unprecedented nationwide ‘lockdown’ or ‘circuit breaker’ imposed in Singapore from April 2020, forced organisations to adopt a patchwork of technological solutions to maintain business continuity. This also meant that threat actors now had a much larger pool of potential targets to choose from given the spike in telecommuters. Threat actors targeting remote work settings have attempted to carry out malicious activities by exploiting vulnerabilities on two levels. - At the infrastructure level: the increased use of applications to facilitate remote collaborations has also led to an increased risk of vulnerabilities in these applications being exploited by threat actors. For example, Singapore’s Ministry of Education was forced to suspend the use of the video conferencing platform Zoom on 9 April 2020 as a home-based learning class carried out over the platform was hijacked. Home office set ups have also led to an increase in organisations’ exposure to hacking attempts given that home office networks tend to be less secure. - At the individual level: people may show greater willingness to take on calculated security risks and trade-offs in order to get work done remotely, such as discussing confidential matters with colleagues over unsecured video conference calls. Less caution may also be exercised when downloading telecommuting applications or VPN clients. A recent survey also revealed that more than half of the Singapore organisations polled have reported that the covid-19 pandemic has slowed down the detection time of a cyber incident in their organisation. The primary concern of the majority of organisations in Singapore continues to lie in their compliance with the data protection obligations imposed by the PDPA. This is especially so given the heightened regulatory focus on ensuring that organisations protect personal data in its possession or under its control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification or similar risks (the Protection Obligation). As a point of illustration, around 70 per cent of the enforcement decisions published by the PDPC in 2016 were related to the Protection Obligation. In comparison, over 95 per cent of the enforcement decisions published in 2020 were related to the Protection Obligation. This heightened regulatory focus also culminated in the introduction of the mandatory breach notification regime under the PDPA, which came into force in February 2021. While it is not possible to prescribe a one-size-fits-all solution for every organisation, there are a number of steps an organisation may take to ensure that it remains in compliance with the PDPA in the cybersecurity context. The PDPC has provided some examples of technical measures an organisation may take to protect personal data, such as: - ensuring computer networks are secure; - adopting appropriate access controls and authentication measures; - encrypting personal data to prevent unauthorised access; - installing appropriate and up-to-date computer security software and utilising suitable computer security settings; and - updating computer security and IT equipment regularly. It would also be prudent for an organisation to conduct regular security and risk assessments. This may take the form of penetration tests and vulnerability assessments. It should also regularly test its detection and response capabilities to stress test its CIR plan and to ensure that it remains robust. The PDPC has released a number of publications intended to assist organisations in developing good data protection practices in their info-comm technology (ICT) systems and processes to improve their cybersecurity resilience as well as capabilities in data breach prevention. This includes: - the Guide to Data Protection by Design for ICT Systems, which contains data protection practices from past Advisory Guidelines and Guides issued by the PRPC. It also incorporates lessons learnt from past data breach cases that should be adopted by organisations in their ICT policies, systems and processes to safeguard the personal data under their care; and - a handbook titled ‘How to Guard Against Common Types of Data Breaches’, which is based on past data breach cases handled by the PDPC. It is complemented by checklists an organisation may refer to ensure that policies and processes put in place avoid the common gaps that often result in such data breaches. The actions, or inaction, of an organisation may be taken into account in any subsequent enforcement action taken by the PDPC against the organisation in respect of a data breach, such as: - the fact that an organisation had been conducting regular penetration tests, vulnerability tests and code reviews to guard against online security threats was considered in calibrating the financial penalty to be imposed on the organisation; - swift and effective remedial action by an organisation to mitigate the impact of a breach has been treated as a mitigating factor by the PDPC in enforcement action taken against the organisation; - the fact that an organisation was cognisant of certain risks of unauthorised access and disclosure to exposed personal data, but had failed to resolve the issue for more than two years, was taken as an aggravating factor; and - the fact that a compromised password had not been changed for 10 years and the organisation was unable to detect unauthorised access of personal data for about two years, were taken as aggravating factors. Civil proceedings arising from a cybersecurity incident or data breach The right of private action under the PDPA A person who suffers loss or damage directly as a result of an organisation’s contravention of its data protection obligations under the PDPA may seek recourse in civil proceedings before the Singapore Courts. In such proceedings, the court may grant relief by way of an injunction or declaration, damages and any other relief as the court thinks fit. The Singapore courts have held that this right of private action under the PDPA is only available to individuals and not to companies. The Singapore courts have also held that the reference to ‘loss or damage’ in respect of the right of private action under the PDPA is to be limited to the heads of loss or damage applicable to torts under the common law (e.g., pecuniary loss, damage to property, personal injury including psychiatric illness) and does not include distress or the loss of control over personal data. This is a notable departure from a number of other jurisdictions such as the United Kingdom, Canada and Hong Kong. The English courts, for example, have held that damages may be awarded in this regard for distress, or the loss of control over personal data, without proof of pecuniary loss. Civil proceedings under other causes of action There are a number of potential causes of action that may arise in the data breach context. An action in negligence may potentially be brought against an organisation that has breached its duty of care by, for example, failing to prevent data (e.g., credit card information) from being accessed by a cyber attacker. A breaching organisation may also be liable for a claim in breach of contract where, for example, the breaching organisation had a contractual obligation to secure and protect the counterparty’s data under a service agreement or where an organisation was subject to a contractual obligation of confidentiality. Disclosure of confidential information – whether intentional or inadvertent – may also give rise to a cause of action in breach of confidence even in the absence of a contractual relationship. Directors of the breaching organisation may also face personal liability, such as where they fail to respond to a cybersecurity incident or data breach due to a lack of reasonable diligence (which could potentially be a breach of their duties owed to the organisation as a director). Legal professional privilege Legal professional privilege would inevitably be a primary consideration in any investigations or legal proceedings commenced against an organisation in respect of a cybersecurity incident. There are two forms of privilege an organisation should be mindful of in this regard: - litigation privilege may be asserted over documents that are created for the dominant purpose of pending or contemplated litigation, where there is a reasonable prospect of litigation at the time the documents were created; and - legal advice privilege may be asserted over to communications between an organisation and its legal counsel containing legal advice or for the purpose of seeking legal advice. Unlike litigation privilege, it does not require the existence or contemplation of legal proceedings before it may be asserted. Depending on the severity of the incident in question, it may be prudent to appoint external counsel from the outset to establish and maintain both forms of privilege as far as possible. Organisations should note that privilege may not be asserted over documents that are already in existence prior to the establishment of the solicitor–client relationship and cannot be conferred merely by sending such material to external legal counsel. The timing at which counsel is engaged may therefore have important repercussions. For example, draft incident reports prepared before the appointment of external counsel may not be privileged and may be required to be disclosed in discovery. Privileged documents and communications should always be marked appropriately and conspicuously (e.g., ‘Strictly confidential and subject to legal professional privilege’). While marking a document would not, in and of itself, result in the document being protected by privilege, it would facilitate the identification of privileged documents so privilege may be asserted over the same more expediently. There may be occasions where regulatory authorities or law enforcement agencies seize privileged material. For example, a computer that is seized may contain both privileged and non-privileged documents within its hard disk. Privilege should be asserted at the time of seizure or as soon as practicable. External counsel may also act to ensure that the risk of privilege being breached is curtailed as far as possible during the investigation process. This could involve, among others, external counsel identifying documents that are protected by privilege and should be returned (as in the case of hardcopy documents), or isolated or quarantined if the return of the documents is not possible (as in the case where the identified documents are soft copy documents found in an electronic storage device). The isolation or quarantine of such documents may be done, for example, by locking the documents in a password-protected folder. Types of threats and threat actors: criminal, nation-state, insider (intentional and accidental) This section will provide illustrations of the different types of threats and threat actors, ranging from nation-state actors to company insiders, present in the Singapore cyber landscape. Singapore has seen a significant rise in cybercrime, with the increasing prevalence of ransomware attacks of particular concern. More than half of the organisations in Singapore that suffered a ransomware attack from April 2019 to April 2020 have paid up the ransom. These organisations have paid ransoms of up to US$14 million, with 37 per cent of them paying between US$140,000 to US$1.4 million. A quarter of these organisations were subsequently hit by a second ransomware attack by the same cyber criminals. Two-thirds of these organisations were also subsequently hit by a second ransomware attack but by different cyber criminals. Even when ransoms were paid, 28 per cent of the locked-up data that was released to these organisations were corrupted. Another survey showed that 73 per cent of the Singapore organisations polled reported that their organisation suffered significant revenue losses as a direct result of a ransomware attack, with 40 per cent reporting that their organisation suffered reputational damage as a result of a ransomware attack, and 20 per cent reported that an attack had forced the closure of their organisation for a period of time. Covid-19 related incidents have also become more prominent, with key targets being the healthcare and education sectors. A number of fake covid-19 contact tracing mobile applications, including a fake TraceTogether mobile application, with the ability to deliver malware were also detected. The Singapore Police Force also issued an advisory on covid-19 vaccination-related scams after the Singapore government commenced its nationwide covid-19 vaccination programme. In an unprecedented cyberattack on Singapore Health Services Pte Ltd’s (SingHealth) patient database system, the personal data of around 1.5 million patients, and the outpatient prescription records of nearly 160,000 patients, were exfiltrated between 27 June to 4 July 2018 in what has been described as ‘the worst breach of personal data in Singapore’s history’. The Prime Minister of Singapore’s personal and outpatient medication data was specifically targeted and repeatedly accessed during the course of the attack. At the time of the cyberattack, SingHealth was the owner of the system, which comprised, among others, the database in question. Integrated Health Information Systems Pte Ltd (IHiS) was responsible for administering and operating this system, including implementing cybersecurity measures. The attack was attributed to sophisticated state-linked actors who wrote customised malware to circumvent SingHealth’s antivirus and security tools. The identity of the state thought to be behind the attack was not revealed for national security reasons. Following the cyberattack, a Committee of Inquiry was convened to investigate the events and contributing factors leading to the incident. The Committee of Inquiry found that the attack could have been stopped if staff had been adequately trained and taken appropriate action. It also pointed out that there were vulnerabilities in SingHealth’s network and systems that contributed to the successful cyberattack, many of which could have been remedied before the attack. The PDPC also commenced its own investigations and found SingHealth and IHiS to be in breach of the PDPA. IHiS was fined S$750,000 while SingHealth was fined S$250,000. These remain the largest and second largest financial penalties ever imposed by the PDPC to date. Insider (intentional and accidental) An insider within an organisation may pose a threat in many forms. An insider may seek to compromise data for his or her own benefit. In October 2020, it came to light that personal information from over one million accounts had been illegally accessed and stolen from a well-known e-commerce platform in Singapore to be sold online. The personal information stolen included names, phone numbers, email and mailing addresses, encrypted passwords and partial credit card numbers. An insider may also cause tremendous damage to an organisation and individuals by compromising data for nefarious reasons. For example, it was reported in 2019 that the HIV-positive status of 14,200 people in Singapore – along with confidential information such as their identification numbers and contact details – was leaked online. The former Head of Singapore’s Ministry of Health’s National Public Health Unit had access to the country’s HIV registry for work purposes. He was believed to have allegedly mishandled the information and failed to comply with policies on the handling of confidential information. The database found its way into the hands of his partner, a HIV-positive American who had been residing in Singapore, who orchestrated the leak and attempted to use the stolen database to extort money from the Singapore government. An insider does not need to have any ill-intentions to be a threat to an organisation. He or she could simply be an individual who has made an inadvertent mistake. By way of illustration, the server of a home-grown gaming hardware company had been misconfigured to allow public access to it. This resulted in personal information of about 100,000 of its customers being potentially put in danger of exposure to the public. 1 Brinden Anandakumar is an associate director at Fullerton Law Chambers LLC. 2 Explanatory Statement of the Cybersecurity Act. 3 Section 24 of the PDPA. 4 The maximum financial penalty the PDPC may impose on an organisation for the breach of the data protection obligations under the PDPA will be amended to either S$1 million, or 10 per cent of the breaching organisation’s annual turnover in Singapore, whichever is higher, on a further date to be notified (and no earlier than 1 February 2022). 5 Section 11 of the CMA. 6 A data breach in this context generally refers to any unauthorised access, collection, use, disclosure, copying, modification or disposal of personal data in an organisation’s possession or under its control: see Section 26A of the PDPA. 7 Guide on Managing and Notifying Data Breaches under the Personal Data Protection Act (Revised on 15 March 2021), p. 23. 8 Regulation 4 of the Personal Data Protection (Notification of Data Breaches) Regulations 2021. 9 Guide on Managing and Notifying Data Breaches under the Personal Data Protection Act (Revised on 15 March 2021, p. 24. 10 Section 26D(5)(a) of the PDPA. 11 Section 26D(5)(b) of the PDPA. 12 Advisory Guidelines on Key Concepts in the PDPA (Revised on 1 October 2021), paragraph 20.30. 13 Guide on Managing and Notifying Data Breaches under the Personal Data Protection Act (Revised on 15 March 2021), p. 25. 14 Guide on Managing and Notifying Data Breaches under the Personal Data Protection Act (Revised on 15 March 2021), p. 28. 15 Section 14 of the CSA. 16 Notice on Technology Risk Management, paragraphs 7 and 8. 17 Dwell time is calculated as the number of days an attacker is present in a victim environment before they are detected. 18 FireEye Mandiant M-Trends 2021 Report. 19 M-Trends 2021 Report by FireEye Mandiant Services. 20 The Singapore Cyber Landscape 2020, Cyber Security Agency of Singapore, p. 6 21 The Singapore Cyber Landscape 2020, Cyber Security Agency of Singapore, p. 5 22 The Singapore Cyber Landscape 2020, Cyber Security Agency of Singapore, p. 27 23 The Singapore Cyber Landscape 2020, Cyber Security Agency of Singapore, p. 17. 24 The Singapore Cyber Landscape 2020, Cyber Security Agency of Singapore, p. 6. 25 Jeraldine Yap, ‘Rise in cyber attacks across all sectors from March to April; healthcare tops list for attacks’, CNA, 17 June 2020, https://www.channelnewsasia.com/news/singapore/rise-in-cyber-attacks-across-all-sectors-from-march-to-april-12845532?cid=h3_referral_inarticlelinks_24082018_cna. 26 The Singapore Cyber Landscape 2020, Cyber Security Agency of Singapore, p. 13. 27 The Singapore Cyber Landscape 2019, Cyber Security Agency of Singapore, p. 49. 28 2020 Crowdstrike Global Security Attitude Survey, p. 27 (https://go.crowdstrike.com/rs/281-OBQ-266/images/SlidesCrowdStrike2020GlobalSecurityAttitudeSurvey.pdf?_gl=1*1mjsgt2*_ga*MTg4NDY4OTkyMy4xNjI2NTk3ODA1*_ga_QLQM32M39F*MTYyNjU5NzgwNi4xLjAuMTYyNjU5NzgxMy4w&_ga=2.141409458.1232745848.1626597805-1884689923.1626597805). 29 Advisory Guidelines on Key Concepts in the PDPA (Revised on 1 October 2021), p. 115. 30 See ComGateway (S) Pte Ltd SGPDPC 19. 31 See Zero1 Pte Ltd and XDEL Singapore Pte Ltd SGPDPC 37 and Singapore Telecommunications Limited SGPDPC 49. 32 Institute of Singapore Chartered Accountants SGPDPC 28. 33 SPH Magazines Pte Ltd SGPDPC 3. 34 Section 48O(1) PDPA. 35 Section 48O(3) PDPA. 36 IP Investment Management Pte Ltd v. Alex Bellingham SGDC 207. 37 Bellingham, Alex v. Reed, Michael SGHC 125, paragraphs 76 to 82, and 93. This decision interpreted the scope of the right of private action provided by Section 32(1) of the version of the PDPA in force in 2018. Section 32(1) has since been repealed and replaced by Section 48O of the PDPA, which is broadly similar in substance. The Court’s interpretation of ‘loss and damage’ in respect of Section 32(1) is therefore likely to continue to apply in respect of Section 48O. 38 Bellingham, Alex v. Reed, Michael SGHC 125, paragraphs 56 to 70. 39 See Vidal-Hall and others v. Google Inc (Information Commissioner intervening) QB 1003 and Lloyd v. Google llc 2 WLR 484. 40 It doesn’t pay to pay ransom to hackers: Study, Kenny Chee, The Straits Times, 22 June 2021, https://www.straitstimes.com/tech/tech-news/it-doesnt-pay-to-pay-ransom-to-hackers-study-0. 41 pp. 7, 9 and 14 of Ransomware: The True Cost to Business, Cybereason, April 2021, https://www.cybereason.com/hubfs/dam/collateral/ebooks/Cybereason_Ransomware_Research_2021.pdf. 42 TraceTogether is the digital contact tracing system introduced by the Singapore government to facilitate its contact tracing efforts to contain the spread of the covid-19 virus. 43 Police Advisory on Covid-19 Vaccination-related Scams, Singapore Police Force, 4 February 2021, https://www.police.gov.sg/media-room/news/20210204_police_advisory_on_covid-19_vaccination-related_scams. 44 Singapore Health Services Pte Ltd & Ors SGPDPC 3, paragraph 1. 45 Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited’s Patient Database on or around 27 June 2018 dated 10 January 2019, paragraph 1. 46 Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited’s Patient Database on or around 27 June 2018 dated 10 January 2019, paragraph 3. 47 Irene Tham, ‘SingHealth breach work of a typical state-linked group’, The Straits Times, 7 August 2018, https://www.straitstimes.com/singapore/singhealth-breach-work-of-a-typical-state-linked-group. 48 Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited’s Patient Database on or around 27 June 2018 dated 10 January 2019, paragraph 287. 49 Jeraldine Yap, ‘Lazada suffers data breach; personal information from 1.1 million RedMart accounts for sale online’, CNA, 30 October 2020, https://www.channelnewsasia.com/news/singapore/lazada-redmart-data-breach-personal-information-millions-account-13415688. 50 ‘HIV-positive status of 14,200 people leaked online’, CNA, 28 January 2019, https://www.channelnewsasia.com/news/singapore/hiv-positive-records-leaked-online-singapore-mikhy-brochez-11175718; Charissa Yong, ‘Mikhy Farrera-Brochez sentenced to two years’ jail over Singapore HIV patient data leak’, The Straits Times, 28 September 2019, https://www.straitstimes.com/world/united-states/mikhy-farrera-brochez-sentenced-to-two-years-over-singapore-data-leak. 51 Goh Yan Han, ‘Data breach of potentially 100,000 Razor customers worldwide discovered by cyber security consultant’, The Straits Times, 15 September 2020, https://www.straitstimes.com/singapore/data-breach-of-potentially-100000-razer-customers-worldwide-discovered-by-cybersecurity.
<urn:uuid:57131364-89eb-47e4-9058-457fffc5e34d>
CC-MAIN-2022-33
https://globalinvestigationsreview.com/guide/the-guide-cyber-investigations/second-edition/article/singapore
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00075.warc.gz
en
0.932594
9,624
2.53125
3
This booklet provides important information that you will need to protect yourself when you are involved in a motor vehicle collision. Failure to take certain actions following an incident will unfairly limit your rights. Combating the dangerous tactics of insurance companies requires the involvement of an experienced and effective legal counselor. Before you enter the roadway as a passenger or driver, it is wise to understand some basics covered in this booklet, such as: This booklet is not intended to be a comprehensive thesis on your legal rights. Every situation differs and laws change. However, a knowledge of your legal rights will guide you in aggressively defending yourself after an accident. Your Fundamental Legal Rights If you have been involved in a collision, the law provides you with specific legal rights. These rights have developed over hundreds of years through our courts and legislatures. They are intended to ensure that you receive fair compensation for losses caused by the negligence of others. But as with many rights in our democracy, these rights are only ideals or promises. Without a working understanding of our system, those ideals will not be fulfilled. There are many obstacles individuals will confront opposing their claims for compensation. The other driver will often present a different version of events. A police officer may not have sufficient information to assess the responsible party. Insurance companies will diligently search for reasons to deny your claim. The courts and juries will require strong evidence of the legitimacy of your case. Consequently, it is best to have an experienced advocate at your side through the entire process. And it is important to know your rights. You have a right to be: - Compensated for the effect that injuries have on your general physical and mental health; - Compensated for physical pain and mental anguish suffered in the past, and for related effects which may be experienced in the future; - Compensated for pain, suffering, inconvenience, physical impairment and disfigurement; - Compensated for an aggravation or worsening of a previous condition; You have a right to: - The fair market value of your motor vehicle if the costs to repair exceed the fair market value; - Reimbursement for all repair costs to your vehicle; - Repair or replacement of any other personal property which has been damaged or destroyed by the accident; - Use of a rental car while your automobile is being repaired, at no cost to you. - Be reimbursed for the transportation cost to and from the medical facility; - Be compensated for your car’s loss of value because its re-sale value is diminished, even if it has been restored to its former condition. You have a right to: - Obtain the medical care of your choice; - Be compensated for medical expenses reasonably and necessarily incurred in the present, and reasonably expected in the future. You have a right to - Recover any lost wages, loss of earning capacity, or loss of income resulting from the accident. To aggressively pursue these rights, contact the Law Office of Frank A. Kirsh, L.L.C. A collision is rarely an accident. A collision occurs because a person makes a mistake. If a reasonable person would not make this mistake, our laws characterize this action as negligence. If a person is deemed negligent, they are responsible for all damages connected with the collision. If people would drive safely, there would be very few collisions. All drivers are legally obligated to comply with the rules of the road. How To Handle A Collision The increasing number of motor vehicles using our crowded roadways has resulted in more accidents and greater risks behind the wheel. Drivers with long commutes in heavy traffic are often tired, frustrated and in a rush. Under current trends, the probability of the average person being involved in a collision will continue to rise. You can limit your exposure to the threat of a collision by following all traffic regulations and using defensive driving skills. Additionally, the use of safety belts and the proper adjustment of your head restraint on your seat to a position directly behind your head may reduce injuries. But unfortunately, you must be prepared for an accident. The daily routine of safely driving your car quickly evaporates when another person acts carelessly and involves you in an accident. Suddenly, you lose control of the wheel and hear a loud smashing sound as you are hit. Your body is thrown around the inside chamber and when the collision is over, you may experience immediate pain and disorientation. Initially, you must attend to your own body. Use common sense in assessing your injuries. If you cannot move, do not try to move. In most circumstances, an ambulance will arrive quickly with medical personnel to attend to your condition. If you are able to leave your car, make sure you first observe the entire scene. You may be in the middle of an intersection or other dangerous area where leaving your car would put you at additional risk. Take a moment to calm yourself. Before you open your door, have a general idea of where you want to go. You must stop when you are involved in any accident. Failure to stop and provide your insurance information is a criminal offense. You should offer assistance to any injured persons. Do not move anyone who is badly injured unless there is danger for greater injury by leaving the person in place. If needed, call 911 and ask for an ambulance. Both drivers must identify themselves to each other. Copy down information on the other driver’s license, vehicle tag number, vehicle registration and insurance. The forms in this booklet will aid you in getting complete information. If you are at fault, or contributed to a collision, your rights are very limited. However, determination of legal responsibilities should be made by an experienced attorney. Even if you are at fault, you must act to protect yourself by obtaining this information at the outset. You must do your best to collect evidence at the accident scene, and preserve it. It is extremely important that a permanent record be established describing the circumstances of the collision. Photographs are a valuable addition to this file. Carry a disposable camera in your glove compartment to take photographs of the vehicles and the scene. Remember, you cannot take too many photographs. Use your cellphone to take pictures of the positions of the cars, the entire scene, property damage, insurance cards, drivers’ licenses and any other relevant materials. The police will not prepare a Crash Report if no person is removed from the scene by ambulance. With their permission, take videos of the other driver and witnesses explaining their observations concerning the crash. If possible, do not move your vehicle until a record of the accident has been made. Protect the scene, and help reroute traffic around the accident. Try to warn approaching motorists with flares, hazard lights, raising the hood of your car, etc. Encourage all drivers, passengers, pedestrians, and other witnesses to remain at the scene until the arrival of the police. If they insist on leaving, write down their names, addresses, phone numbers, license plate numbers, and an account of what they saw. Your attorney should contact these witnesses to obtain signed statements of their observations. Using the drawings on page __, make a diagram of the accident, showing the positions of the cars before, during, and after impact. Measure skid marks, note the positions of traffic lights and street signs, estimate the respective driving speeds, and record details of both the weather and road conditions. Every effort should be made to request the police. A police officer will investigate the circumstances of a collision and produce a written report. This report will be of great importance in assessing responsibility. Failing to obtain a report may lead to the denial of your claim by your insurance company. A police report is also required for an uninsured motorist claim. If you do not have access to a cellular telephone, direct a witness to call 911 for assistance. Upon arrival of the police, you should cooperate in their investigation. Tell all facts to the officer. Do not assume that the other driver and witnesses will agree with your version of events. If you fail to discuss your observations with the police officer at the scene, you may not get a fair evaluation of who is responsible for the accident. If you receive a citation, you must sign it. This is not an admission of guilt. Before the police officer leaves, obtain his/her badge number along with the report number of this incident. Typically, the police will not prepare an incident report if there is no property damage or complaints of injury. Whatever your perceptions of the accident may be at the time, do not admit to any fault. Discussion of the events with others at the scene may be misunderstood. Accidents are complicated, and you may need to look at the evidence before completely understanding the sequence of events. Aside from the police citation, do not sign any piece of paper or agree to pay for damages. If you are experiencing any physical problems in the hours after the accident, it is recommended that you seek immediate medical attention. You should comply with the instructions of the ambulance crew at the scene. If no ambulance attends to your situation, consult with nearest emergency room of a hospital or physician. Obtaining care as soon as possible will improve your chances of a good physical recovery. Additionally, establishing a written record of your injuries and treatment, will minimize legal/insurance questions concerning the extent of your damages. There are essentially two different claims that arise in the event of a collision. You have a claim with the insurance carrier of the vehicle you were operating or as a passenger. Secondly, you have a claim against the insurance carrier of the person at fault. Before contacting any insurance company, you should discuss your situation with the Law Office of Frank A. Kirsh L.L.C.. We will help you act as an informed consumer in your transactions with these companies. You need to be aware of techniques that insurers use to reduce your claim. Insurance company employees are trained to limit claims. For example, insurance adjusters often ask drivers to provide recorded statements over the phone. In these conversations, they may encourage you to make statements that suggest you contributed to the collision or the extent of your injuries are minimal. Similarly, they may send you a check for damages before your case is closed which, through your endorsement, could waive important rights. Therefore, to protect yourself, all communication with insurance carriers should be through your attorney. All drivers in the U.S. are required to maintain insurance coverage on their vehicles. Failure to comply with this mandate is a crime. Thus insurance carriers have a captive audience of millions of premium-paying drivers who are forced to buy car insurance. As a consumer of insurance, you need to know your legal rights so that you can obtain all the benefits of insurance that you are entitled to. An insurance company, despite friendly appearances, is not looking out for you. An insurance company is in the business of making money for its shareholders. It succeeds by denying your claims, offering low settlements, and directing its own legal staff to minimize the cost of dealing with your auto accident. When you bring in your own attorney, you strengthen your hand and balance the scales of justice. You also provide your insurer with an incentive to pay everything he is required to pay under law, quickly and without appeals. If you have any questions about the accident, you should contact The Law Office of Frank A. Kirsh L.L.C. at (301)340-1049 or toll free at (800)309-4878 for a free consultation. We will advise you on how to best proceed with your claim, and caution you in areas which may affect your rights. When you retain our firm, you will not be committing yourself to out-of-pocket payment of our fees. We are paid on a contingency basis. This means that we receive one-third of your settlement. - Waterproof matches - Flashlight with batteries - Tape measure - Disposable camera - First aid kit Following an investigation by the police at the accident scene, your vehicle may be towed if it is disabled or rendered unsafe to drive. If you have any reservations about operating your car, heed them and arrange alternative transportation through family, friends, a cab or the police officer. When your car is towed, it will typically be taken to a storage facility pending a decision concerning repairs. Your insurance carrier is responsible for the costs of towing and storage. The insurance carriers — both yours and the insurer of the other car — are entitled to inspect your vehicle. You should provide them with the location of your vehicle without discussing the facts of the accident . If it is not convenient for you to transport your car to an inspection site, demand that the insurance carrier go directly to the location of your car. Before the insurance carriers appraise your vehicle, you should have color photographs taken of your car. Sign and date the back of the photographs. You have complete authority to select the mechanic who repairs your vehicle. If you do not have a trusted mechanic, consult with friends and your attorney before a final selection. Your insurance carrier may recommend a shop but be aware that your insurer’s mechanic give you a low estimate for the repair. A lower estimate will often overlook details such as proper alignment, headlight adjustment, correct matching of paint colors, etc. Your mechanic and/or body shop is required to provide you with an estimate of the expected costs. The estimate should be submitted to the insurance carrier. Ask your insurance carrier to authorize your mechanic to replace any parts from the original manufacturer. Recent studies have concluded that other grades of materials do not perform at the recommended levels of safety. Do not sign any releases until you are sure the insurance company will cover the cost of all repairs to your satisfaction and that they will give a check to the repair shop in a timely manner so that you can get your car back as soon as possible with no out-of-pocket expenses to you. An experienced personal injury attorney should review any release before you sign it. If the cost of repairs is greater than the value of the car, the insurance company will offer to reimburse you only for what they consider to be the “fair market value” of the car. This figure will often be much lower than the purchase price of the vehicle because the insurance company (1) will deduct for depreciation of the automobile, (2) will not reimburse for your finance or preparation charges, and (3) may use a schedule which does not reflect the current fair and equitable value of the car. You may lose money when the insurance company assesses the value of your vehicle, and controls how it will reimburse you. In these instances, an experienced and skillful negotiator can save you money by arguing for the true worth of the car to you, and demanding the most generous mode of reimbursement. A good attorney will manage your property damage quickly with the assurance of obtaining the maximum value of benefits. The Law Office of Frank A. Kirsh, L.L.C. assists clients in negotiating property damage settlements and does not charge a fee or a percentage for this service. All of the money recovered for your damaged vehicle goes directly to you. The anxiety and frustration of an automobile accident is quite often compounded by the inconvenience of losing the use of your vehicle. You have the right to the use of a rental car while your vehicle is out of commission. All expenses relating to the rental of this vehicle should be paid by whichever insurance company is liable for this coverage. Before you rent a car, you should contact your insurance agent to determine if your insurance coverage will transfer to the rental vehicle. Upon completion of the repairs to your car, the rental car must immediately be returned or you will be personally liable for late charges. Your health is your most precious asset. After any traumatic episode, you should be thoroughly checked by qualified medical professionals. A visit to a hospital emergency room may assure the most thorough exam. Many doctors are associated with insurance companies that severely limit medical care. A serious injury will have ramifications that affect many aspects of your life. Insurance companies tend to downplay the gravity of these ramifications. An experienced personal injury attorney is a crucial partner in offering guidance as you grapple with complex issues like permanent disability, prolonged loss of earning capacity, post-traumatic capacity, future medical complications, and more. Fortunately, most auto accidents do not involve serious permanent injuries. They do, however, create trauma, stress, and pain for millions of people every year. The most common injuries sustained in car accidents are those to the head, neck and back. The impact of being rear-ended by another car, even at relatively low speeds, is sufficient to strain and injure the parts of the body which are connected to a very delicate spinal cord. Here is what happens: When your automobile is struck from behind, the head is suddenly and forcefully moved beyond its normal extension. Then it abruptly recoils. Damage occurs to soft tissues in the neck and back which could affect ligaments, muscles, nerves, blood vessels, vertebrae and discs. The medical and legal consequences of this type of injury are complex for several reasons. In most cases, the only evidence of the injury is the victim’s complaint. Symptoms such as headaches, dizziness, nausea, stiffness, numbness and impaired vision as well as pains in the neck, arms, and lower back may show up immediately, or even days or weeks later. There is often no correlation between the severity of damage to your car and the severity of pain resulting from this type of injury. Consequently, it is important (1) not to provide an opinion about your condition at the time of the accident unless you feel pain; (2) to be examined by doctors specializing in soft tissue injuries; and (3) to wait to negotiate a settlement with the insurance company until your doctors provide you with a written opinion concerning your future medical health. Many studies have concluded that these type of injuries leave victims with scar tissue, calcium deposits, premature arthritis, and other degenerative changes. The Law Office of Frank A. Kirsh works with doctors from many disciplines on behalf of accident victims. These providers are capable of diagnosing and treating various symptoms and injuries caused by automobile accidents. Attorney Frank A. Kirsh seeks reimbursement for these medical expenses from all applicable insurance companies. Medical specialists, not general practitioners or family doctors, are usually best equipped to handle accident-related trauma because they see it every day. There are a variety of medical professionals involved in the treatment of injuries suffered by victims of automobile accidents. A radiologist interprets x-rays, M.R.I., CAT scans and other diagnostic tests. An orthopedist focuses on the joints, muscles, and bones. A neurologist specializes in diseases and injuries to the nervous system. These injuries may spring from seemingly insignificant events: A bump on the head may cause an injury as serious as a brain concussion. A sprain could result in pinched nerves which leave the patient with symptoms of numbness or tingling in the joints or extremities. One doctor will oversee your medical case. He or she will interview you. You will be required to provide detailed information regarding your past physical condition and nature of your current complaints. Be sure to completely disclose prior physical problems so that your doctor can treat you effectively, and so that you remain believable to insurance carriers who may try to attack your credibility. Always communicate to your doctor all pain and limitations. This information will be recorded in your medical chart, and can be used to establish your damages. After your first interview, your doctor will perform a complete examination using a variety of different tests. In a routine case, X-rays of your neck and back will be taken to determine if there is any visible damage. The doctor should review your x-ray film with you and discuss all pertinent findings. Based upon the initial examination and your progress during treatment, your doctor may request further medical tests to obtain more information regarding your condition. The high cost of medical care requires management of these expenses by an experienced personal injury attorney. The Law Office of Frank A. Kirsh L.L.C. will contact your health care providers periodically updating the status of your case. All potential sources of payment of these bills will be explored. A doctor will typically wait until your case is resolved before demanding payment of his bill. You should seek treatment from those doctors who understand your financial situation and agree to this payment schedule. Because the costs of medical care are constantly rising, your settlement should include money for future treatment. Doctors will maintain a record of your progress during their treatment. However, to fully document the effect an automobile accident has had on your life, our law office strongly recommends that clients maintain a written diary detailing the limitations and problems involved in recovering from injuries. The primary purpose of this diary is to preserve evidence. If your claim is not resolved within a few months, you may not remember all of the difficulties you have encountered. By referring to this diary, your ability to communicate the full dimension of your injuries will be greatly improved. You are legally entitled to recoup your losses in a number of areas after you have been involved in a collision. Every collision is unique, and our law office will explore every particular area with you. Here is a general description of those areas. Following an injury and medical treatment, your body will need time to rest. If your occupation makes physical demands on you, you should advise your doctor. The doctor will provide you with a written disability note authorizing you to miss time from work. This authorization is usually limited to one week and will be reissued depending on your circumstances. To protect your job, keep your employer informed of your medical condition by submitting disability notes on a timely basis. If your employer is pressuring you to return to work against your doctor’s orders, Attorney Frank A. Kirsh L.L.C.will immediately discuss this situation with him or her. Your loss income claim includes time missed from your job while recovering at home or traveling to and from your doctors, and any future impairment in your capacity to earn a living. Your attorney should obtain verification of these losses through your doctors and employer. If you have Personal Injury Protection coverage though your own automobile insurance carrier, your loss income will be reimbursed at a reduced percentage. You are entitled to these funds even though you are still being paid at work if you have to use sick leave or vacation time. Your legal entitlement to damages includes: - All property damage-including repairs to your vehicle - Use of a rental car - Recovery of loss wages - Recovery for future loss income - Transportation costs to doctors - Past and future medical expenses - Any physical or mental disabilities - Loss of consortium or sexual impotency - Emotional distress - Pain and suffering It is completely impossible for anyone other than yourself to fully understand the pain and suffering that result from an automobile accident. The United States has always recognized the right to receive compensation for pain and suffering when caused by the negligent. Our laws incorporate the obvious concept that human pain is real. It is not something that should be dismissed. It is something we should acknowledge. Insurance companies want the public to dismiss this principle. Fortunately, our laws continue to preserve protection to the people . The law requires all operators of motor vehicles to maintain an insurance policy. In obtaining a policy for your vehicle, you should consider (1) the value of your car (2) the net worth of your personal assets if you are responsible for an accident, and (3) how much you can afford. It is generally advised that you purchase the maximum level of protection because the small additional premium cost. Here are some highlights of your policy: - Bodily Injury and Property Damage Liability pays damages for which you are legally liable arising from injuries or death, or from damage to the property of others. - Comprehensive covers loss or damage to your car resulting from perils such as fire, theft, vandalism, glass breakage, explosion, etc. - Collision pays for damage to your car caused by impact with another automobile or object. - Uninsured Motorist and Under Insured Motorist: If a driver of the other motor vehicle involved is legally liable, but either has no insurance, is under-insured, or is unknown, this coverage will pay you and occupants of your car for bodily injury. - Medical Payments/Personal Injury Protection pays for reasonable medical expenses and loss income to certain defined limits resulting from an automobile accident. This coverage protects everyone in your car no matter who is liable for the accident. Additionally, you may be still covered if a resident in your household maintains this type of coverage. Filing a claim under this provision of your insurance policy should not increase your premiums. - Automobile Liability Insurance coverage of the person/company responsible for your damages. - Health Insurance obtained by you or your employer may pay for your medical expenses. Since every health plan is different, you should consult with your attorney to determine the qualifications of obtaining benefits. To qualify for coverage, you must meet a variety of different requirements. Most importantly, each state has a time limit to file legal actions. If you miss these deadline, your rights will be waived forever. The long contracts of insurance carrier contain many provisions which often enable them to avoid paying your damages. Following an accident, I insist that my clients contact me immediately so that we can review all issues related to insurance and claims. This booklet was designed to provide information concerning the protection of your legal rights. You are probably aware of extensive publicity attacking lawyers and the injured who seek monetary compensation for losses suffered as a result of the unreasonable actions of others. Insurance companies finance these campaigns to discredit attorneys and ridicule victims who rightly expect those companies to pay money in damages. It is in the interest of the insurance industry, like any business, to maximize profits and minimize expenses. Thus your insurer will fight to retain your premium payments and withhold money for your damages. These companies complain about huge damage awards and claim that the nation is in a litigation crisis, yet they aggressively pursue your premium dollars. Why would they continue to want your business if they were not making enormous amounts of money? The fact is that an individual who is unable to collect his rightful damages may be left impoverished and unable to obtain medical help. Attorney Frank A. Kirsh recognizes the necessity to aggressively represent the injured and restore them to the condition they were in before an accident. As a trial lawyer, Attorney Frank A. Kirsh also understands the power of evidence. This booklet will serve as a guide to preserve and gather the best evidence to support your claim. The Law Office of Frank A. Kirsh provides legal services to the injured on a contingency basis. If your claim is settled without filing a lawsuit, your only attorney’s fee will be one-third of the amount of the settlement. You should not seriously consider pursuing a claim against an insurance company without legal assistance. When an insurance company is informed that Frank A. Kirsh is your attorney, it will understand that legal action can commence without delay if your damages are not paid in full. If a lawsuit is filed, the insurance company will expose themselves to large judgments and the certainty of paying large fees to their attorneys. This threat of litigation encourages insurance companies to be more fair because it is in their financial best interests.. You should retain an attorney who you trust to protect your rights. Frank A. Kirsh is an attorney who will fight for you against a greedy insurance company.who sincerely cares that you obtain the maximum compensation for your damages.who will personally handle your claim, return all phone calls, mail copies of all paperwork and keep you informed throughout the course of your case. Frank A. Kirsh is also a respected litigator who believes that justice requires effective legal representation, and who will fight in court if a fair settlement is not reached. For additional information contact us today.
<urn:uuid:cb6d806b-f054-46c4-896c-41faa7141108>
CC-MAIN-2022-33
https://www.kirshlaw.com/drivers-handbook/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00473.warc.gz
en
0.954217
5,709
2.078125
2
Whether you’re gearing up to graduate or there’s a hiring fair in your area, the calendar year is front-loaded with job fairs. Most people think of job fairs as over crowded, competitive marketplaces with few opportunities compared to candidates. This may be why most people who attend job fairs do so casually, and come under dressed and under prepared, and so their negativity becomes a self-fulfilling prophecy. The good news is, by taking extra time to prepare, you can turn stand out from the competition and make your mark with a standout company. Before we can talk about how to prepare, though, it’s important to know what you can gain from attending a job fair. At any given job fair, you will be able to: - Find out which companies are hiring locally and get face time with a hiring representative. - Inquire about available positions nationally and sometimes internationally. - Learn about available internships. - Network with hiring professionals. - Gain experience selling yourself. The last two might sound as appealing as a tonsillectomy, but there is a strong case to be made for getting practice, especially if you haven’t yet graduated. After all, unless you’re independently wealthy, practicing selling yourself and talking to hiring professionals is a skill you can’t master fast enough. The more practical experience you get, the better able you are to compete and less anxious you’ll feel. You’ll begin to see it as an opportunity rather than just a chore. Before the Job Fair Before attending a job fair, there are a couple necessary steps to take that will help you prepare to dazzle the recruiters and outshine your competition. - Pre-registion is often necessary and should always be your first step. There’s no point in carefully preparing if you’re not allowed to attend because you never registered. - Identify and research your target employers. While you should definitely work the room, it’s important that you spend extra time preparing to apply for your favorite companies. Many job fairs post this information online for their registrants. - Map out your strategy. Plan to hit as many booths as possible with a minimum of hovering or loitering. This makes you look nervous rather than in demand. - Have a clear career focus, because showing up with a pile of generic resumes and no idea about the job market or your desired role in it makes you look unprepared and directionless. - Prepare resumes using that clear career focus with your target employers in mind. - Prepare any portfolios or samples of your work that pertain to the positions you want. - Rehearse your elevator pitch. Remember to focus on clarify, brevity and memorability. - Practice answering typical interview questions in front of the mirror or with a partner. - Develop a list of questions to ask the recruiters to show that you’re keen, curious and thorough in your research. - Decide on your outfit and accessories the day before, and if you haven’t worn them in a while, try them all on to save yourself from any last minute emergencies. - Organize the night before. Lay out your outfit, your bag with notes, any ID or proof of registration, paper and several pens and don’t forget to pack your resumes. At the Job Fair - Bring 25 resumes written for the companies you’re targeting, as well as ten generic resumes. Don’t forget that your “generic” resumes shouldn’t read as directionless; you should still be clear about where your interests and skills lie. - Prepare to be interviewed on the spot. - Prepare to fill out a paper application or do so later online. Bring a couple different pens and test them out at home first. - Bring questions about the company, the corporate structure and the positions they’re looking to fill. - Take notes, even if you feel awkward. It demonstrates that you’re serious and allows you to keep accurate records and properly follow up. If possible, collect business cards to go with your notes. - Ask how to follow up. Send thank you notes, keep track of where you’ve applied to and who you spoke to. This is where those notes and business cards come in handy. - Shop the room. Don’t spend all your time at one booth, no matter how much you want to work for that company, or how disinterested you are in the other companies on offer. Remember, this is the best time to practice and hone your networking skills. Being able to confidently work a room is a credit to your personal and professional life, no matter where you end up. - And above all, please, turn off your cellphone. Articles Related to Why You Should attend a Job Fair:
<urn:uuid:bbfe7f67-0cd4-4727-96f3-83a2b5dde400>
CC-MAIN-2017-04
https://www.bcjobs.ca/blog/why-you-should-attend-a-job-fair/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00007-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932857
1,015
1.84375
2
To determine whether clinical trial enrollment by itself is associated with improved outcome. Retrospective cohort study. Seattle Children's Hospital from 1997 to 2005. Data were drawn from 322 patients with newly diagnosed acute lymphoblastic leukemia. Enrollment in a Children's Oncology Group or Children's Cancer Group clinical trial. Main Outcome Measures (1) Demographic variables associated with trial participation. (2) Event-free survival, which was defined as the time from initial diagnosis to either leukemia recurrence or death from any cause. No outcome advantage was found for participants in a clinical trial compared with nonparticipants. Additionally, there were not demographic factors associated with increased clinical trial participation. Clinical trial participation does not, by itself, lead to improved outcome for pediatric patients with acute lymphoblastic leukemia in the current era. Discussions about participation in a clinical trial should focus on improvement of future therapy, not the direct benefit of the research participant. Acute lymphoblastic leukemia (ALL), the most common cancer in children, has seen dramatic improvement in outcomes in the past 40 years.1,2 Multiple iterative changes in therapy from 1970 to 1995, including the optimization of the dose and timing of multiagent chemotherapy and routine use of central nervous system prophylaxis, contributed to the increased survival of children with ALL. During this era, retrospective studies comparing study participants with nonparticipants suggested that children experienced a direct benefit from clinical trial participation.3- 5 These studies support the assertion that oncology trial participation, by itself, offers improved patient outcomes. The belief, called trial effect or inclusion benefit, is “widespread in the oncology community.”6 According to the American Federation of Clinical Oncologic Societies, clinical trials are “often a cancer patient's best option.”7 Finally, the National Comprehensive Cancer Network has claimed “the best management of any cancer patient is in a clinical trial.”8 However, not all evidence supports the trial effect in oncology clinical studies. In contrast to improved results seen in children younger than 15 years,3,5 Stiller et al9 noted no difference in survival for adolescents and young adults with ALL who participated in clinical trials. Examining oncology clinical trials more broadly, Peppercorn et al6 found no evidence for better outcomes for patients enrolled in clinical trials, with the potential exception of “children with cancer [and] patients with hematologic malignancies,” particularly those conducted prior to 1986. Whether a trial effect in fact exists has significant ethical implications. Many researchers and research participants or parents incorrectly believe that the primary purpose of a clinical trial is the benefit of the participant, not the improvement of therapy for future patients.10 To determine the survival advantage of enrollment in a clinical trial in children with newly diagnosed ALL, we evaluated outcome in a retrospective study at a single large pediatric oncology center. As well, we evaluated demographic variables to confirm that the participant group was similar to the nonparticipant group. We evaluated 322 patients with ALL younger than 22 years at diagnosis who received their initial therapy at Seattle Children's Hospital (SCH) between January 1997 and December 2005. We excluded patients who received their initial month of treatment at another hospital. Two patients with significant comorbidities received noncurative palliative treatment and were excluded from analysis. All other patients were offered therapeutic clinical trial participation if an open study was available. If patients declined participation or no study was available, all patients received therapy according to strictly defined institutional standard therapies based on the most recent clinical trial results. During the study period, clinical trials available for enrollment included the following Children's Oncology Group or Children's Cancer Group legacy protocols: 1952,11 1953,12 1961,13 1962,14 1991,15 AALL00P2,16 AALL0232, and AALL0331. We analyzed the following variables: participation in an ALL therapeutic study, sex, race, age at diagnosis, leukemia immunophenotype, National Cancer Institute risk group (standard risk, high risk, or infant),17 home state, and distance of primary residence to SCH. Seattle Children's Hospital is the regional referral center for Washington, Alaska, Montana, Idaho, and Wyoming and the largest pediatric oncology program in the region. Statistical analysis of event-free survival (EFS) was performed using the Kaplan-Meier method for calculating survival curves and 95% confidence intervals (CIs).18 Event-free survival was defined as the time from initial diagnosis to either leukemia recurrence or death from any cause. Patients who had not developed relapse or death were censored at the date of last contact. Differences in EFS among groups defined by patient or treatment characteristics were analyzed using the log-rank test.19 The EFS data were analyzed as of March 15, 2009, using SPSS for Windows version 13.0 (SPSS Inc, Chicago, Illinois). We conducted an assessment of the statistical power for a log-rank test comparing the 2 study groups given the available sample size. Setting an α level of .05 (2-sided), a sample size of 322 subjects, split approximately evenly between the 2 groups, yielded at least 80% statistical power when the hazard ratio for events among patients enrolled in a clinical trial relative to those not enrolled in any trial was 0.49 or lower. Assuming the overall EFS at the end of follow-up was 78% led to a detectable differential of 13.4% (84.9% survival among patients enrolled in a trial vs 71.5% among patients not enrolled in a clinical trial). This retrospective medical record review study was approved by the SCH institutional review board. We first investigated demographic factors associated with study participation (Table 1). There was no difference in study participation by sex, race, home state, or distance of primary residence. Within risk groups, there was no difference in age at diagnosis between study participants and nonparticipants (data not shown). There were trends toward increased study participation in standard-risk vs high-risk patients (54% vs 42%; P = .15) and B lineage vs T lineage (50% vs 35%; P = .11). Patient characteristics and EFS are shown in Table 2. The overall 5-year EFS was 79% (95% CI, 74%-84%). Study participants and nonparticipants had similar EFS (80% vs 77%; P = .73), as shown in the Figure. By univariate analysis, National Cancer Institute risk group was associated with a difference in EFS, with a higher 5-year EFS for standard-risk patients (85%) than either high-risk patients (74%; P = .045) or infants (59%; P = .01). Within risk groups, there was no difference between the outcome for study participants and nonparticipants (standard-risk patients: 82%; 95% CI, 73%-91% for nonparticipants vs 87%; 95% CI, 80%-94% for participants; P = .44; high-risk patients: 76%, 95% CI, 65%-87% for nonparticipants vs 71%; 95% CI, 59%-83% for participants; P = .33). Sex, race, leukemia immunophenotype, home state, or distance from primary residence were not associated with outcome. Event-free survival of patients with acute lymphoblastic leukemia comparing study participation and nonparticipation. In our large single-institution series, participation in a pediatric ALL clinical trial was not associated with improved outcome. Our study failed to show a trial effect, in contrast to similar retrospective studies from earlier treatment eras.3- 5 Several factors that may have led to an observed trial effect in previous studies were absent in our study. Treatment for ALL during 1997 to 2005 was strictly standardized at our institution and based on the most recently reported cooperative group trials for each risk group. It is possible institutional standardization of care may provide the same benefit as clinical trial regimentation, eliminating the potential for the participation effect.6 Braunholtz et al20 subdivided several potential components to the participation effect that could favor clinical trials, including the protocol effect (due to more rigorous treatment guidelines), care effect (due to more extensive follow-up or nursing care), and the Hawthorne effect (due to improved patient or clinician compliance with standard procedure because of external monitoring). Each of these potential effects would be minimized if the nonparticipation comparison group received highly regimented standard care, as was the practice at our institution. Patient selection bias, due to the exclusion of patients with coexisting medical conditions or poor performance status, is an alternative explanation for superior outcome on therapeutic trials.6 Gross et al21 reviewed randomized controlled trials to compare the health outcomes of eligible nonparticipants vs trial participants and found no significant difference in clinical outcomes, after adjusting for the preexisting health status of both groups. A selection bias would likely favor healthier patients for trial enrollment, potentially leading to better outcomes in trial enrollment, which we did not see. As well, since the majority of children with newly diagnosed ALL are previously healthy, and ALL treatment studies during our study period had no exclusion criteria for medical comorbidities or poor performance status, patient selection bias was unlikely to be an issue in our study. An additional explanation for a trial effect is the treatment effect, when the investigational treatment arm of a clinical trial is more efficacious than the standard treatment arm.6,20 Among the positive studies documenting the trial effect in oncology, the majority were conducted in the 1970s and 1980s, an era of large improvements in cancer treatment.6 For pediatric ALL, this era included introduction of central nervous system prophylaxis, alternative chemotherapy combinations, and optimal timing of multiagent chemotherapy.1,2 The 3 retrospective studies on pediatric ALL that demonstrated a trial effect included this earlier era when the treatment effect was a significant factor favoring trial participants over nonparticipants.3- 5 For example, an analysis of 4070 children with ALL treated in the United Kingdom during 1971 to 1982 showed a 14% better 5-year survival rate for patients enrolled in a clinical trial.3 However, the 5-year survival rate improved from 37% in the 1970s to 66% in the 1980s, coincident with series of successful clinical trials, making the trial effect heavily influenced by a treatment effect. Similar results were seen in a follow-up analysis of children with ALL in the United Kingdom treated between 1980 and 1994.5 A retrospective study of 327 children with ALL in the United States covering a treatment period of 1970 to 1975 also demonstrated a trial effect, with 4-year survival rates of 60% for participants and 19% for nonparticipants.4 After 1994, positive clinical trials have become less frequent and with less dramatic incremental improvements. As a result, the EFS for ALL has plateaued at 75% to 80%.1,2 The 1997 to 2005 era of our study reflects the recent expectations of a modest (if any) treatment effect benefit from participation in pediatric ALL clinical trials. Our analysis found no difference in study participation by sex or race (Table 1). This is consistent with a recent review by Wendler et al22 that showed no significant differences in the willingness of minorities to participate in clinical trials compared with white patients. The geographically diverse referral base of SCH allowed us to determine that distance from a patient's primary residence was not associated with study participation (Table 1). As well, we found no significant differences in outcome in the same demographic comparisons. We were encouraged to find that there was no significant difference in EFS when compared by home state and by distance of SCH from primary residence. Our patients who are not from western Washington typically complete the majority of their treatment closer to home at locations other than SCH; their outcome had not been compromised by this treatment plan. Our study does have several significant limitations. As a single-institutional study, our data do not exclude the possibility of a trial effect at other institutions. For example, some institutions may not have as rigorously followed standard care for clinical trial nonparticipants. However, using data from one institution reduces the confounding variables of a range of therapies offered and supportive care standards, for example. Our findings may only be generalized to institutions with a similar degree of standardization of care for nonparticipants in clinical trials. The major disadvantage of a single-institution study was the limitation of statistical power to detect a small but potentially clinically meaningful difference in outcome by trial participation. In particular, for a condition like ALL with a relatively good outcome, trials offer modest improvements, requiring a large sample size to detect a difference in outcomes, which is difficult to achieve at a single institution. Although we cannot exclude a small trial effect, it is unlikely that the benefit of clinical trial participation in pediatric ALL in the recent era is as large as observed in earlier treatment eras.3- 5 Only 49% of our patients enrolled in a clinical trial. It is difficult, in retrospect, to determine the reasons for nonparticipation. There were times during our study period when no clinical trial was open to enrollment, leading to a lower rate of trial enrollment than explainable by trial refusal alone. Whether a trial effect exists has important ethical implications. According to the World Medical Association Declaration of Helsinki, the main purpose of clinical trials is the advancement of future therapy.23 However, in a survey of 198 pediatric oncologists (with more than 90% academic affiliation), 64% stated the main reason for enrolling patients in a clinical trial was “to ensure that trial participants get the most state-of the-art treatment.”10 Subgroups of oncologists involved in clinical research were more likely to view trial enrollment as a way of ensuring state-of-the-art treatment, both in terms of the individual patient and society in general.10 Miller et al24 postulated that clinical researchers often practice with a “therapeutic orientation” to clinical research to resolve the tension between their moral commitment to the patient volunteers (“the clinician”) and the accurate representation that research is motivated by scientific aims (“the scientist”). It is clear that clinical researchers should not abandon therapeutic concern for research participants and, conversely, that participants should not abandon hope of a therapeutic benefit. Rather, researchers should strive for an initial frank discussion of the differences between clinical research and clinical care.24 As part of this discussion, researchers should be aware that, ethically, a trial effect should not be a motivator for trial enrollment. By minimizing the potential for participation effect, patient selection bias, and treatment effect, our study failed to show a trial effect in the treatment of pediatric ALL in the recent era. It is important that families and providers are aware that a patient's outcome is unlikely to be improved simply by trial enrollment. Correspondence: Blythe Thomson, MD, Seattle Children's Hospital, 4800 Sand Point Way NE, Mailstop B6553, Seattle, WA 98105 (firstname.lastname@example.org). Accepted for Publication: October 7, 2009. Author Contributions:Study concept and design: Koschmann, Thomson, and Hawkins. Acquisition of data: Koschmann and Thomson. Analysis and interpretation of data: Koschmann, Thomson, and Hawkins. Drafting of the manuscript: Koschmann, Thomson, and Hawkins. Critical revision of the manuscript for important intellectual content: Koschmann, Thomson, and Hawkins. Obtained funding: Thomson. Administrative, technical, and material support: Thomson. Study supervision: Thomson and Hawkins. Financial Disclosure: None reported. Koschmann C, Thomson B, Hawkins DS. No Evidence of a Trial Effect in Newly Diagnosed Pediatric Acute Lymphoblastic Leukemia. Arch Pediatr Adolesc Med. 2010;164(3):214-217. doi:10.1001/archpediatrics.2009.282
<urn:uuid:8f3fd8e2-ca9e-47be-9094-d0dbbabc75bc>
CC-MAIN-2017-04
http://jamanetwork.com/journals/jamapediatrics/fullarticle/382892
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00327-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943549
3,268
2.4375
2
Atmospheric Sciences SeminarSeptember 1, 3:15pm - 5:00pm Mānoa Campus, Virtual Meeting A new general framework for understanding the drivers of regional climate change Dr. Malte F. Stuecker Department of Oceanography & International Pacific Research Center (IPRC) School of Ocean and Earth Science and Technology (SOEST) University of Hawai'i at Manoa You are invited to our weekly online Atmospheric Sciences Fall 2021 seminars via Zoom meeting. When: September 1, 2021 at 3:15PM HST Register in advance for this meeting: https://hawaii.zoom.us/meeting/register/tJwlcOmtpz8iGtFAfj1LmB2t-J89CV76hI1s After registering, you will receive a confirmation email containing information about joining the meeting. Please save this information for future seminars. As a security precaution, unmuting microphones, starting video, screen share, and using the 'chat' feature will be disabled for those attending the seminar, except for ATMO faculty. If you would like to say something, please use the 'raise hand' feature. The host or a co-host can then enable you to unmute your microphone. With the Earth warming in response to anthropogenic greenhouse gas forcing, changes in surface temperature and rainfall manifest themselves with characteristic geographical patterns. For instance, land areas warm faster than the oceans and the poles warm faster than the low-latitudes. In addition, numerical climate models with prescribed anthropogenically-driven changes in greenhouse gas concentrations robustly simulate enhanced warming on the equator compared to the adjacent off-equatorial regions. However, the physical processes driving these equatorial patterns of change are still strongly debated. Improved understanding of these is critical, as small deviations from projected surface temperature change patterns can cause large geographical shifts in projected future rainfall patterns. Moreover, the global impacts felt by internal climate variability – such as the El Niño-Southern Oscillation and the Madden-Julian Oscillation – will depend crucially on the climate mean state change pattern that will emerge in the future. Recently, we developed a new general framework to better understand the physical drivers of regional climate change patterns. We use linear impulse response theory combined with targeted coupled climate model simulations forced by idealized regional radiative perturbations to delineate the relative contributions of coupled local feedbacks and remote drivers to regional climate change. Within this framework, I will revisit the question of how much different processes contribute to the equatorial warming signal that is robustly projected by the current generation of climate models. I will show that off-equatorial radiative forcing and corresponding coupled circulation/cloud adjustments are responsible for a large fraction of equatorial warming in response to global CO2 forcing. Similarly, the framework is applied to delineate the physical drivers of polar amplification. SOEST Atmospheric Sciences, Mānoa Campus 808-956-8775, SEE FLYER (PDF)
<urn:uuid:b70caa1b-3d6a-45b7-9546-ffd310a9ba79>
CC-MAIN-2022-33
http://www.hawaii.edu/calendar/uh/2021/09/01/39058.html?et_id=51213
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00678.warc.gz
en
0.871592
634
1.679688
2
A priest hunter was a person who, acting on behalf of the English and later British government, spied on or captured Roman Catholic priests during Penal Times. Priest hunters were effectively bounty hunters. Some were volunteers, experienced soldiers or former spies. As the Catholic bishops during the reign of Queen Mary were dead, imprisoned or in exile, and those priests they had ordained were dying out or converting to Protestantism, William Allen conceived the idea for a seminary for English Catholic priests at Douai, where several of the chief posts were held by professors who had fled Oxford upon the reimposition of Protestantism in England. The English College at Douai was founded as a Catholic seminary in 1569. Similar colleges also came about at Douai for Scottish and Irish Catholic clergy, and also Benedictine, Franciscan and Jesuit houses. Other English seminaries for the training of priests from and for England and Wales included ones in Rome (1579), Valladolid (1589), Seville (1592) and Lisbon (1628). Elizabeth I reinstated the Protestant bible and English Mass, yet for a number of years she refrained from persecuting Catholics. After the Rising of the North of 1569 and the papal bull Regnans in Excelsis (1570), plus the threat of invasion by Catholic France or Spain assisted by English Catholics led the Crown to adopt ever increasing repressive measures. An act of 1571 (13 Eliz. c. 2) not only forbade the publishing of any documents from the Pope, but also the importation and distribution of crosses, beads, pictures, and tokens called "Agnus Dei" (a Lamb of God sealed upon a piece of wax from the Paschal candle blessed by the Pope). From the 1570s missionary priests from continental seminaries came to England secretly. In the autumn of 1577, Queen Elizabeth's Principal Secretary, Francis Walsingham canvassed the Anglican bishops for a list of recusants in their dioceses and how much each was worth. Cuthbert Mayne (1544–1577) was the first English Roman Catholic "seminary priest" to be executed under the laws of Elizabeth I. The Religion Act 1580 (23 Eliz.1 c. 1) fined and imprisoned those who celebrated the Mass or attended a Mass. The Jesuits, etc. Act 1584 (27 Eliz.1, c. 2) commanded all Roman Catholic priests to leave the country in forty days or be punished for high treason unless, within the 40 days, they swore an oath to obey the Queen. Those who harboured them, and all those who knew of their presence and failed to inform the authorities would be fined and imprisoned for felony. It also provided an incentive to informers by according them one-third of any forfeitures. This was followed by another in 1585 (27 Eliz. c. 2) that declared that anyone ordained a priest outside the Queen's dominions who then came into the country was deemed a traitor, and anyone harboring them, a felon. Nicholas Woodfen (Devereux) and Edward Stransham, who had both studied at the English College, Douai were executed at Tyburn on 21 January 1586. One of the most infamous priesthunters of Elizabeth's reign was Sir Richard Topcliffe, who delighted in personally torturing and playing mind games with the priests whom he apprehended. Described by Father John Gerard as "old and hoary and a veteran in evil," Topcliffe ultimately fell from favor with the Queen and was imprisoned very soon after his role in the arrest, trial, and execution of the underground priest and secret poet, Fr. Robert Southwell, S.J. Walsingham tracked down Catholic priests in England and supposed conspirators by employing informers and intercepting correspondence. Shortly before setting off for England, Edmund Campion learned that a letter detailing their party and mission had been intercepted and that they were expected in England. It was a common practice for a spy to pose as a Catholic and engage a suspect in conversation in the hope of eliciting an incriminating statement. This technique led to the arrest and execution of Richard Simpson in 1588. Apostate Catholics and former priests and seminarians were particularly helpful in this regard. A London priest hunter named Sledd had been a servant to Dr. Nicholas Morton at the English College in Rome. After George Haydock had been betrayed to Sledd by one of Haydock's old acquaintances, Sledd went to the house where Haydock took his meals, and recognized the priest Arthur Pitts and law-student William Jenneson. In early July 1581, John Payne, while staying on the estate of Lady Petre in Warwickshire, was denounced by informer George Eliot, a spy in the employ of Robert Dudley, 1st Earl of Leicester. Eliot became a spy, agreeing to seek out recusant Catholics, in order to avoid a pending murder charge. He had insinuated himself into a position in the Petre household where he then proceeded to embezzle sums of money. Eliot followed that success shortly thereafter with the capture of Edmund Campion, who had arrived in London on 24 June 1580 disguised as a jewel merchant. Eliot used his past experience working in a Catholic household to gain admittance to a Mass Campion was saying at Lyford Grange in Oxfordshire. Elliot then returned with an armed company and searched the house until they discovered the priest hole where Campion and two associates were hiding. Wadsworth et al They used a number of informants within Catholic communities. Starting in the 1640s, James Wadsworth, Francis Newton, Thomas Mayo, and Robert de Luke formed a partnership to hunt down Roman Catholics in the London area and handed them over to the authorities for a reward. Between November 1640 and summer 1651 over fifty individuals were turned over to the government. Some were executed, some banished, and some reprieved. This section needs additional citations for verification. (March 2016) A 1709 Penal Act demanded that Catholic priests take the Oath of Abjuration, and recognise the Protestant Queen Anne as Supreme Head of the Church of England and, by implication, in Ireland. Priests who refused to conform were arrested and executed. This activity, along with the deportation of priests who did conform, was a documented attempt to cause the Catholic clergy to die out in Ireland within a generation. Priests had to register with the local magistrates to be allowed to preach, and most did so. Bishops were not able to register. The reward rates for capture varied from £50–100 for a bishop, to £10–20 for the capture of an unregistered priest; substantial amounts of money at the time. The work was dangerous, and some priests fought in self-defence. The hunters were outcasts in their communities, and were viewed as the most despised class. Often when someone arrested or killed a priest, local rapparees would retaliate by assassinating a British soldier or even the priest hunter. If they could not kill the priest hunter, local Irish Catholics even would seek revenge by burning down his house and farmyard. The risks were the same for known informants. The Penal law imposed outlawry upon the remaining clerics, and they were forced to say Mass in secret, and in remote locations. High risk worship at Mass rocks became common. The attending priest would usually wear a veil, so that if an attendee was questioned, they were able to say truthfully that they did not know who had said the Mass. The distribution of Priest hunters was uneven; some local police forces chose to overlook both the presence of priests and their activity at Mass rocks. Around 1680, persecution of Catholics heated up in reaction to Titus Oates' claims of a non-existent Catholic conspiracy aimed at assassinating King Charles II of England and massacring the Protestants of the British Isles. As a result, a Roman Catholic priest named Fr. Mac Aidghalle was murdered while saying mass at a mass rock that still stands atop Slieve Gullion, in County Armagh. The perpetrators were a company of redcoats under the command of a priest hunter named Turner. Redmond O'Hanlon, the de facto Chief of the Name of Clan O'Hanlon and leading local rapparee, is said in local tradition to have avenged the murdered priest and in so doing to have sealed his own fate. Perhaps the most notorious was John O'Mullowny of Ballyheane, in County Mayo, an alcoholic and horse thief who took up the profession in return for a pardon from the hangman's noose, c. 1715. In 1726, he was killed by a priest he was pursuing, and his body was thrown in a lake, before later being recovered and buried. - Forty Martyrs of England and Wales - Irish Catholic Martyrs - List of Catholic martyrs of the English Reformation#Decrees of Elizabeth I - Mass rock - Chapman, John H. "The Persecution under Elizabeth" Transactions of the Royal Historical Society, Old Series Vol. 9 (1881), pp. 21-43. Retrieved 2012-02-19. - "St Cuthbert Mayne Priest and Martyr 29th November", Friends of Lanherne - Lake, Peter. "A Tale of Two Episcopal Surveys", Transactions of the Royal Historical Society, Vol. 18, (Ian W. Archer, ed.), Cambridge University Press, 2009 ISBN 9780521429658 - Challoner, Richard (2012). Memoirs of Missionary Priests and Other Catholics of Both Sexes That Have Suffered Death in England on Religious Accounts from the Year 1577 to 1684. Nabu Press. pp. 112–113. ISBN 978-1-173-76630-6. Retrieved 8 July 2012. - Dudley Julius Medley, A Student's Manual of English Constitutional History. Sixth Edition (Oxford: Basil Blackwell, 1925), p. 638. - Medley, Dudley J. (1925). A student's manual of English constitutional history (6th ed.). New York: Macmillan. pp. 638–639. hdl:2027/uc1.$b22458. OCLC 612680148. Retrieved 22 October 2014. - Hutchinson, Robert (2007) Elizabeth's Spy Master: Francis Walsingham and the Secret War that Saved England. London: Weidenfeld & Nicolson. ISBN 978-0-297-84613-0 - Waugh, Evelyn, Edmund Campion London: Williams and Norgate (1935). Sophia Institute Press (1996) ISBN 0-918477-44-1 - Sweeney, Garrett. A Pilgrim's Guide to Padley. Diocese of Nottingham, 1978, p. 9. - Wainewright, John Bannerman. "Venerable George Haydock", Lives of the English Martyrs, (Edwin H. Burton and J. H. Pollen eds.), London. Longmans, Green and Co., 1914 - Camm OSB, Bede, Lives of the English Martyrs, p.429, Longmans, Green & Co., London, 1914 - Lingard, John. The history of England:From the first invasion of the Romans to the accession of William and Mary in 1688. vol 8. John Grant. 1902 - Tony Nugent (2013), Were You at the Rock? The History of Mass Rocks in Ireland, pages 80-81. - Tony Nugent (2013), Were You at the Rock? The History of Mass Rocks in Ireland, pages 40-47. - de Burca, Eamon. South Mayo Family Research Centre Journal, 1987. - McGee, Thomas D'Arcy. The priest hunter : a tale of the Irish penal laws, 1844. - Power, Denis. Archaeological inventory of County Cork, Volume 3: Mid Cork, 9467. ColorBooks, 1997. ISBN 0-7076-4933-1
<urn:uuid:f0189fdb-81d1-4a42-97da-cf1c4750c698>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/Priest_hunter
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00472.warc.gz
en
0.95429
2,601
3.546875
4
This page has been archived on the Web Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject to the Government of Canada Web Standards and has not been altered or updated since it was archived. Please contact us to request a format other than those available. Threats to Water Availability in Canada - Publishing Information - Environment Canada Steering Committee, Production Team, Editors, Authors, External Reviewers - Threats to Water Availability in Canada - A Perspective - Short Chapter Summaries - 1. Water Allocations, Diversion and Export - 2. Dams, Reservoirs and Flow Regulation - 3. Droughts - 4. Floods - 5. Municipal Water Supply and Urban Development - 6. Manufacturing and Thermal Energy Demands - 7. Land Use Practices and Changes - Agriculture - 8. Land-Use Practices and Changes - Forestry - 9. Land-Use Practices and Changes - Mining and Petroleum Production - 10. Climate Variability and Change - Groundwater Resources - 11. Climate Variability and Change - Rivers and Streams - 12. Climate Variability and Change - Lakes and Reservoirs - 13. Climate Variability and Change - Wetlands - 14. Climate Variability and Change - Crysophere - 15. Integrated and Cumulative Threats to Water Availability 8. Land-Use Practices and Changes - Forestry Markus N. Thormann,1 Pierre Y. Bernier,2 Neil W. Foster,3 David W. Schindler4 and Fred D. Beall3 1 Natural Resources Canada, Canadian Forest Service, Northern Forestry Centre, Edmonton, AB 2 Natural Resources Canada, Canadian Forest Service, Laurentian Forestry Centre, Ste-Foy, QC 3 Natural Resources Canada, Canadian Forest Service, Great Lakes Forestry Centre, Sault Ste. Marie, ON 4 University of Alberta, Biological Sciences Department, Edmonton, AB Canada has about 10% of the world’s forests (418 million ha) and about 20% of the planet’s freshwater resources (but only about 7% of the planet’s renewable freshwater resources; CFS, 2002; EC, 2003). Forests recycle water to the atmosphere, thereby decreasing water transport into ground and surface water. They also filter air and water, moderate climate, provide habitat for wildlife, stabilize soil, and form a dominant feature of Canada’s economy, culture, traditions, and history. Because of these attributes, forested watersheds provide a range of important services to humans and society, including provision of clean stream water and support of healthy aquatic ecosystems. For example, a number of major urban centres derive some or all of their water supplies from forested watersheds. Natural disturbances (e.g., insect defoliation and wildfires) and anthropogenic influences (e.g., fire suppression and timber harvesting) can temporarily alter the equilibrium of the hydrologic cycle by altering groundwater recharge-discharge dynamics, the position of the water table, and streamflow regimes. Except for harvesting activities, fire and insect infestations are the dominant stand-renewing agents in most Canadian forests. For example, infestations of spruce budworm sweep through eastern boreal and maritime forests at approximately 35-year intervals, causing major stand renewal events and shifts in stand age structure. Wildfire has a greater immediate impact than insect infestations on forest hydrologic cycles because of its sudden nature and its profound alteration of organic matter. Fires occur regularly in the boreal forest, the mean fire cycle being 126 years (CCFM, 2002), with a range of 63 to 185 years (Bergeron, 1991; Larsen, 1997; Larsen and MacDonald, 1998). Fire is more frequent in the coniferous forests of west-central Canada (northwestern Ontario, Manitoba, Saskatchewan, and Alberta), and less frequent in the wetter forests of central and eastern Canada (Ontario, Quebec, and the Atlantic Provinces) and the Pacific maritime ecozone (mean fire cycle of 770 years) (Stocks et al., 2002). Fire frequency is a function of fuel quantity, quality, and dryness as well as fire weather; the conditions affecting the formation and spread of wildfires, including wind speed, thunderstorms, and stability of air systems. In Canada, the driest and windiest region is west-central Canada, and this is also where fire is most frequent. Forest hydrology research in Canada was strongly supported by government in the late 1960s and early 1970s, a period known as the International Hydrological Decade. Gauges were set up and monitored in many watersheds, and a variety of studies examined the most immediate impacts of clear-cut harvesting practices on streamflow and erosion. The results of these studies were used in developing current forest management practices, which protect Canada’s soils and freshwater resources. Although most harvesting operations still involve a one-pass removal system (“clear-cutting”), gradual removal approaches, including selection cutting, shelterwood cutting, and seed tree cutting, are increasingly used in Canada. The overall size of clear-cuts generally has been reduced, and the number of unharvested strips (“leave” strips) within cutblocks has increased, which has increased cutblock heterogeneity. Across Canada, there are few comparable data on the effects of forest fires on watershed hydrology (Schindler et al., 1980; Bayley et al., 1992), but the immediate impact of a burn on streamflow volume and timing appears to be similar to that of a clear-cut. This similarity might be expected because in both types of disturbances the transpiring vegetation is removed, which results in decreases in evapotranspiration (ET) (Amiro et al., 1999; Amiro, 2001). However, differences in harvesting and fire in particular, with respect to interception of precipitation by logging debris and post-disturbance recovery, make any similarities less certain. This chapter outlines the major impacts of timber harvesting and fire on forest hydrology and the subsequent impacts on freshwater availability, with emphasis on the boreal forest, the largest forest region in Canada. Canada’s land area is about 922 million ha, of which about 418 million ha are forested. Commercial forests (capable of producing commercial tree species as well as other non-timber benefits) represent about 235 million ha, of which about 119 million ha are managed and about 1 million ha are harvested annually. The largest areas are harvested in Quebec and British Columbia (349,113 ha and 204,472 ha in 2000, respectively; CCFM, 2002). Seventy-one percent of Canada’s forests are controlled by provincial governments, 23% by the federal government, and 6% by private landowners. Softwood species are harvested most often (86% of the total commercial timber harvest in 1995), primarily for the production of pulp and paper and for export. However, the harvest of hardwood species, used primarily to produce oriented strand board, laminated veneer lumber, furniture, flooring, plywood, and moldings, was 6% greater in the period 1990 to 1995 than the average pre-1990s hardwood harvest. This trend reflects the evolution of the forest products industry over the past 25 years and is predicted to continue. Harvesting rates were below Annual Allowable Cut rates for the period for which records are available, from 1970 to 1999 (CCFM, 2002). Canada has evolved from a colonial supplier of wood products to European countries in its early years to a major international player in forestry. Because Canada is still growing, land-use changes, including those arising from urbanization, oil and gas exploration, mining, and agriculture, infringe on forests across Canada, most prominently in the southern boreal forest, the Carolinian forest, and the aspen parkland forest (CCFM, 2002). However, although some forest is being lost near urban centres, there are also gains in forested areas on marginal agricultural lands and in urban areas, the so-called urban forests (CCFM, 2002). Current timber harvesting regulations in the provinces and territories generally strive to maintain a productive forest land base. Following the removal of timber, most harvested areas are allowed to regenerate naturally, the remainder being actively seeded or planted (CFS, 2002). The extent of seeding and planting varies considerably in accordance with the diversity of forest conditions and provincial and territorial policies. Since 1975, silvicultural practices adopted by the provinces and territories have ensured that 90% of harvested sites are regenerated within 10 years after the timber harvest, ensuring the long-term viability of forests in Canada. Fire frequency in Canada’s boreal forests decreased from the end of the Little Ice Age, around 1850, until the mid 20th century, in spite of a general warming trend (Flannigan et al., 1998). From 1960 to 1995, the trend was reversed, and fire frequency was 60% greater than during the previous 40 years (1920–1960; Amiro et al., 2001a). On average, 9000 wildfires have burned about 2 million ha of forest annually (data for 1958–2000), with approximately half of this area representing productive forests. However, the total area burned can vary from year to year by a factor of more than 10; this variability was particularly apparent in the 1990s (Amiro et al., 2002). Most fires are less than 10 ha in size, and only 1.5% of all fires are greater than 1000 ha in size. These large fires account for 93% of the total area burned. Approximately 80% of burned forest is considered commercially non-productive. Salvage logging of fire-killed trees in accessible areas is a common forestry operation. Similar to harvested forests, burned forests are usually allowed to regenerate naturally. Global climate change has the potential to increase fire frequency in Canada’s west-central boreal forest since warmer and drier conditions are predicted to occur in that region (Flannigan et al., 1998; Amiro et al., 2001a). There is also a potential for feedback to the atmosphere through this pathway. Already, forest fires in Canada emit on average the equivalent of 18% of current carbon dioxide (CO2) emissions from the Canadian energy sector, a proportion that reaches 75% in peak fire years (Amiro et al., 2001b). Impacts of Disturbance on Water Quantity and Regime Research has demonstrated that the most significant changes in forested watersheds following timber harvest are changes in water table levels, streamflow quantity and regime, water quality, erosion, and sedimentation, and possibly alterations to local groundwater recharge and discharge dynamics. It is likely that similar changes occur after fire. Notably, watershed impacts differ between forestry practices and other land uses, including agriculture and mining. The hydrologic cycle consists of three major components: precipitation; surface and subsurface water flow and storage; and evaporation from soil, vegetation, lakes, streams, and oceans. The movement of precipitation to ground and surface waters is affected by the amount of forest cover and by forest health and maturity. ET is the process by which water moves through the soil and plants into the atmosphere. In the boreal forest of west-central Canada, a significant portion (66–82%) of the total annual precipitation is returned to the atmosphere as ET (Lieffers and Rothwell, 1986), whereas in wetter areas, including central Quebec, only about one-third of the total annual precipitation is returned to the atmosphere in this form (Guillemette et al., 1999). The removal of vegetation through timber harvest or destruction by high-intensity wildfire produces short-lived, significant decreases in water losses through ET and decreases in precipitation interception, which together lead to increases in soil water content in disturbed areas. However, local geophysical and climatological characteristics vary throughout Canada’s ecozones. Consequently, the effects of timber harvest and fires on streamflow regimes also differ across the country. Forest cover maintains stability of the infiltration capacity of the soil, decreases runoff, lowers wind speed, and increases precipitation interception, thereby significantly affecting the local microclimate and hydrologic cycle. Conversely, afforestation (the direct conversion by humans of land that has not been forested for a period of at least 50 years to forested land through planting, seeding, or human-induced promotion of natural seeding) affects the local hydrologic cycle by, most prominently, increasing ET, lowering water tables, stabilizing soil infiltration capacities, and decreasing runoff. Although water use by trees is significant, afforestation may reduce local drought conditions under certain circumstances; however, relevant data from Canada are limited (Buttle, 1996). In addition, certain tree species can be used as bioremediators, ameliorating the effects of pollution through a process called phytoremediation. These trees can capture pollutants, thereby removing them from contaminated terrestrial ecosystems and preventing them from reaching aquatic ecosystems (Dietz and Schnoor, 2001). Canada has a long history of watershed research and monitoring, which has demonstrated how forests can be managed to increase water yield for many needs. Extensive regional and experimental watershed manipulations have been used since the 1960s to investigate the effects of forest management activities on streamflow (Berry, 1991). Such approaches have led to significant increases in our knowledge of the biological and physical processes that regulate watershed hydrology and have contributed to the design and implementation of safer land-use practices. In some areas, scientific findings have been used to guide planning and decision making in the conservation and restoration of riparian forests, wetlands, wildlife habitat, stream habitat, and stream banks, and to minimize the impacts of roads on water quantity and quality. However, in other areas, particularly in the southern boreal forest, construction of roads and railroads has impounded and negatively affected significant areas of riparian forests and wetlands (Poff et al., 1997). One of the most important results of forestry studies was the realization that production of sediment was linked most strongly to the building and use of forestry roads and to direct perturbations of the stream bank by machinery (Mattice, 1977). Changes in forestry practices have been implemented across Canada to minimize these impacts, including the maintenance of streamside buffer strips and modifications to road-building methods with respect to surface water discharge, culvert placement and sizing, and stream-crossing structures (Ottens and Rudd, 1977). Studies have shown that, when regulations are respected, inputs of sediments into streams because of forest operations are short-lived and often small (Plamondon, 1982). Protection of soils and recovery from logging may be more problematic on steep slopes in areas of high precipitation and low soil stability. However, even in the extreme conditions of the forests on Vancouver Island and the Queen Charlotte Islands, erosion from bare soil was a minor and highly variable contributor to stream sedimentation compared with mass wastage (landslides) from either harvested or unharvested areas (Roberts and Church, 1986; Hetherington, 1992). In both locations, climatic and physical variables had a significant influence on the degree of sediment production and transport into streams. Effects on Groundwater Recharge-Discharge Timber harvesting may have both positive and negative impacts on groundwater. An example of the former is the increase in water recharge into groundwater that results from temporary reduction in ET. This effect is likely more significant in dry areas with minimal groundwater recharge under full forest cover. In contrast, the effect is minimal where groundwater recharge is significant. Logging may have a negative effect on local flow of groundwater in steep terrain, where road cuts may intercept lateral drainage and shunt that water into the surface drainage system. This results in loss of water from the drainage system via surface flow and can lead to significant soil erosion. These negative impacts are likely both local and minor (Hetherington, 1992); of more importance in such cases are the potential effects on slope stability. Changes in Water Table Levels The boreal zone supports large expanses of forested wetlands because of its relatively flat topography, an abundance of poorly drained surficial deposits and shallow bedrock impervious to water, and a cool and humid climate (Vitt et al., 2000). In these areas, the amount of precipitation and the preharvest position of the water table influence the effect of timber harvesting on the hydrology of the cut-block (an area in which timber is to be or has already been harvested) (Dubé et al., 1995). Depth to the water table is an important, but nonlinear, ecological feature. Frequent rises of the water table to shallow depths may dramatically influence tree growth as well as the trajectory of vegetation dynamics following disturbance. Water levels are usually high following snowmelt and decrease through the summer when ET is highest. During periods of high rainfall, as well as after snowmelt, the water table is near the soil surface in forested wetlands. The removal of trees decreases ET losses, which results in a less pronounced drop in the water table during periods of low rainfall. Consequently, the difference between seasonal maximum and minimum water levels is less in harvested than in unharvested areas (Dubé et al., 1995). The effects of timber harvest on hydrology are generally restricted to the cut-block itself and do not extend into adjacent uncut tree stands, independent of cut-block position and size. Water tables generally return to natural levels within the first 10 m from the forest edge into the adjacent tree stand (Dubé et al., 1995). The effects of rises in the water table are most severe near the centre of cut-blocks. This suggests lateral water flow from the centre of the cut-blocks toward natural areas bordering the cut-block, creating uneven water table fluctuations throughout the cut-block. Although the effects of water table rises may be ameliorated within short distances into bordering natural tree stands, runoff from cut-blocks may have significant impacts on watershed hydrology. In conjunction with changes in the water table in cut-blocks, rates of greenhouse gas dynamics in forests may also be affected. For example, well-drained heterogeneous soils have the ability to serve as carbon sinks (Whalen and Reeburgh, 1996). However, timber harvesting has the potential to cause saturation of poorly drained mineral and organic soils, which can then become significant sources of carbon in the form of methane (Roulet and Moore, 1995). Effects on Streamflow Quantity By reducing interception of precipitation and ET losses, timber harvesting increases the flow of water out of the watershed. The importance of this effect depends on the ET loss per unit land area, which is a function of water availability, evaporative demand, and, to a lesser extent, vegetation type. Absolute increases in streamflow quantity are larger in warm, wet areas and lower in cool, dry areas. Relative increases in streamflow are larger in dry than in wet areas. Through studies in the eastern, temperate hardwood forest, Hornbeck et al. (1997) found that most of the increases in water yield resulted from increased summer low flows. However, reducing snow interception by harvesting the coniferous cover in the wetter areas of the boreal forest may have a greater effect on annual yield than any reduction in summer flows (Guillemette et al., 1999). Examples of increases in annual water yield resulting from clear-cutting operations range from 160 mm in Kenora, Ontario (Nicolson et al., 1982), to 349 mm at Carnation Creek on Vancouver Island, British Columbia (Hartman and Scrivener, 1990). Forest perturbations by windthrow and fires at Rawson Lake, Ontario, also increased streamflow by about 170 mm (Schindler et al., 1980). Large fires affect a significant proportion of entire higher-order basins within days. Therefore, the short-term absolute impact of large fires on water yield can be greater than that of gradual harvesting of a basin over many years. Within a basin, water yield increases are in rough proportion to the area harvested. Buttle and Metcalfe (2000) showed that the effects of various harvesting techniques on stream hydrology were minimal if less than 25% of the area within a watershed was harvested. They attributed this in part to the ability of larger basins to buffer the hydrologic impacts of the relatively small degree of recent forest disturbances. The duration of the effects of tree removal or death on water yield depends on the rate of vegetation regrowth and can range from 7 to 30 years (Swanson and Hillman, 1977). Effects on Streamflow Regime Forest removal increases streamflow rates, a beneficial effect for small streams, in which low flow constrains the aquatic ecosystem. Peak flows from snowmelt are the dominant hydrologic feature of most boreal and montane watersheds. Forest harvesting has a direct impact on snowmelt and thus on spring peak flows (Whitaker et al., 2002), but the effect is highly variable (Fig. 1). Peak flows above bankful discharge (the momentary maximum peak flow before a stream overflows its banks onto the floodplain) (1.5-year return period) have been shown to shape stream morphology (Dunne and Leopold, 1978). Results from paired basin studies indicate that snowmelt peak flows above bankful discharge can be increased by up to 50% by removing more than 25% of forest area or volume (Fig. 1). The effect of forest cover removal on peak flow may be amplified if aspect (the angular orientation of the basin with respect to the sun) is uniform throughout the basin. However, the proposed model of peak flow changes for Minnesota (Verry, 1986), an area similar to northwestern Ontario, indicates that increases in snowmelt peak flow are likely to occur above 50 to 60% forest removal. Harvesting less than 50% of the basin desynchronizes snowmelt between open and forested areas and tends to decrease peak flows. Fig. 1 Changes in snowmelt peak flow above bankful discharge in relation to forest removal by harvesting, fire, or insects in North America. Adapted from Verry (1986) and Plamondon (1993, 2002). The upper and lower limits represent a generalized hypothesis of the impact of snowmelt on peak flow for Minnesota (Verry, 1986). Increases in rainfall-induced bankful peak flows are better related to the proportion of forest removal (Fig. 2) than those for snowmelt peak flow. Rainfall peak flow augmentation is caused primarily by an increase in soil water content, which should be well correlated with the percentage of forest removal. Soil disturbances, including roads and skid trails, may increase or decrease peak flow, depending on the time between water pulses generated by the watershed source areas and the disturbed areas. The impact recedes with canopy closure. Also, the impact of harvesting is smaller in hardwood than in coniferous forests because of the smaller interception losses by leafless hardwoods outside of the growing season. Fig. 2 Changes in rainfall peak flow above bankful discharge in relation to forest removal by harvesting, fire, or insects in North America. Adapted from Plamondon (1993, 2002). Low flows in summer are generally increased by timber harvest because of rising water tables in response to decreased precipitation interception and decreased ET (Dubé et al., 1995). Summer rainfall may produce small to moderate increases in storm and peak flows in harvested areas relative to forested basins (Pomeroy et al., 1997) because of the generally wetter soils in harvested areas (as a result of decreased ET); therefore, the potential for streamside soil saturation and streamflow generation may be increased. Although the impact of increased streamflow may be significant on primary streams, the cumulative effect on secondary and tertiary streams may be negligible. In addition, because of the overall small impact at the watershed scale, the potential impact of forestry on downstream flooding may be small (Martin et al., 2000). This situation is quite different from land-use changes that cause a permanent change in the ecosystem. For example, permanent conversion of forest cover over 27% of the 95,000 km2 drainage basin above St. Paul, Minnesota, increased annual flood peaks by 43% (Miller and Frink, 1982). The removal of riparian trees and road-building can have potential impacts on stream biota. Depending on the situation, logging can have positive or negative effects on stream morphology and fish habitat (Ralph et al., 1994). Even partial removal of riparian vegetation can cause elevation of water temperatures and can increase the exposure of the stream to ultraviolet (UV) radiation. Elevated temperatures and increased UV radiation cause changes in stream invertebrate communities (Kelly et al., 2003) and, in conjunction with increased nutrients from timber harvesting, undesirable algal growth. Inadequately installed culverts on logging roads often block the passage of fish, either by creating jumps that are too high or water velocities that are too great to overcome. The effects of harvesting or fires on lake and stream properties are often difficult to separate from those of climate, even in well-designed studies with control basins (Schindler et al., 1996; Steedman and Kushneriuk, 2000). Removal of the riparian trees around small lakes by either natural disturbances or harvesting increases over-water wind speeds and either increases (France, 1997) or decreases (Steedman and Kushneriuk, 2000) the depth of the thermocline. Maintenance of buffer strips prevents the increase in over-water wind speed (Steedman and Kushneriuk, 2000). Schindler et al. (1996) reported an increase in lake water clarity following fires during a dry period with reduced precipitation and streamflow to lakes. Steedman and Kushneriuk (2000) reported the contrary, a decrease in water clarity following harvesting, but stated that the effects could have been related to climate. Increased sediment yields to lakes as a result of fires or harvesting have the potential to silt spawning beds and disturb the habitats of fish and other freshwater organisms (Beaty, 1994). These problems point to the need for the maintenance and reinforcement of measures to prevent erosion and sedimentation during harvesting. However, there are as yet no hard and fast rules to determine threshold levels of erosion and siltation with respect to fish populations. For example, Gunn and Sein (2000) found that lake trout populations were insensitive to a major reduction in spawning habitat through simulated siltation, but they were severely affected by road access and ensuing fishing pressure. Murphy et al. (1986) showed that adequate buffer strips maintained or enhanced fish habitat and productivity, while removal of buffer strips had a negative impact on these variables. Changes in water flow patterns in harvested areas above a buffer strip can also affect trout spawning beds (Curry and Devito, 1996), although it seems that no direct experimental evidence exists on the magnitude of the effects on trout spawning success. Changes in Land Use Human settlement in Canada has resulted in large-scale conversions of forests to urban and agricultural land uses. The changes in the natural components of the hydrologic cycle brought about by these land-use changes have had large impacts on water quantity, water quality, and the timing of flow events. As a result of these changes, there is lingering confusion between the impacts of forest harvesting and those of land-use changes on water resources. Hydrologic research across Canada and around the world has shown the importance of forest and other wildlands in the regulation of streamflow and the maintenance of water quality. As a general rule, harvesting impacts on streamflow regime and water quality are usually short-lived and less severe than those brought about by land-use changes, provided that forest soils are protected and vegetation recovery is rapid. There is an increasing demand for forests to provide clean water for a multiplicity of purposes, including fisheries, agriculture, and recreation. It is imperative to continue research to address existing and emerging issues as they pertain to the quantity as well as the quality of freshwater resources in Canada. Improved knowledge and understanding of forest-water relationships are needed to integrate water issues into forestry and related decision-making systems and to support water quantity and quality criteria in support of sustainable forest management practices. In 2001, the Canadian Forest Service carried out a scoping exercise to identify research opportunities in forest hydrology (Beall et al., 2001). A number of broad research elements were identified and grouped into three research themes pertaining to freshwater availability. Priorities have not been established, nor has the linkage with respect to currently available information been fully carried out. However, the themes and results from that exercise are pertinent to the current exercise and are presented here: 1. Effects of forest condition, natural disturbance, and forest management activities: - Effects of harvesting on water quantity. - Effects of wildfire, insect outbreaks, and forest condition (e.g., regenerating versus old growth) on water quantity. - Effects of intensive forest management on surface and ground water supplies. - Development of forest management practices to preserve or enhance water supply. - Effects of forest management and disturbances on forest aquatic ecosystem habitat, productivity, and diversity. 2. Climate variability and climate change effects: - Effects of climate variability and climate change on forest hydrologic cycles. - Impacts on water supply from forested areas (timing and quantity). - Impacts on ecological integrity of aquatic ecosystems. 3. Synthesis and integration: - Development and adaptation of large-basin and national process and empirical models, which integrate hydrologic and biogeochemical cycles to improve prediction capabilities and provide decision support. - Retrieval, assessment, and archiving of long-term data sets for development and validation of models and development of a national database. - Scaling up of plot-based and patch-based results to landscape and regional scales. - Scaling down regional climate models to provide realistic scenarios for input to process models. - Determination of socioeconomic costs and benefits resulting from altered forest hydrologic regimes due to anthropogenic and natural disturbances. The significant variability in harvesting and site preparation perturbations and in wildfire intensity in watersheds, as well as the variability in Canada’s ecozones has resulted in a large variance in the responses of individual nutrients and elements to natural and anthropogenic disturbances. Most watershed studies have been conducted near the southern extent of the boreal forest, and most of those were performed in central and eastern Canada (Ontario and Quebec). The relevance of results from eastern Canada to other areas of Canada, where different physiographic and soil conditions prevail, remains unclear and warrants further investigation (Buttle et al., 2000). Although hydrologic research has increased over the past 3 to 5 years in Canada, the results of these studies have not been widely disseminated or are still being worked up. Hence, many forest managers must fall back on studies from smaller scales and from forest environments that are not necessarily directly relevant to the Canadian context (J.M. Buttle, pers. comm.). Amiro, B.D. 2001. Paired-tower measurements of carbon and energy fluxes following disturbance in the boreal forest. Glob. Change Biol. 7: 253-268. Amiro, B.D., M.D. Flannigan, B.J. Stocks and B.M. Wotton. 2002. Perspectives on carbon emissions from Canadian forest fires. For. Chron. 78: 388-390. Amiro, B.D., J.I. MacPherson and R.L. Desjardins. 1999. BOREAS flight measurements of forest-fire effects on carbon dioxide and energy fluxes. Agric. For. Meteorol. 96: 199-208. Amiro, B.D., B.J. Stocks, M.E. Alexander, M.D. Flannigan and B.M. Wotton. 2001a. Fire, climate change, carbon and fuel management in the Canadian boreal forest. Int. J. Wildland Fire 10: 405-413. Amiro, B.D., J.B. Todd, B.M. Wotton, K.A. Logan, M.D. Flannigan, B.J. Stocks, J.A. Mason, D.L. Martell and K.G. Hirsch. 2001b. Direct carbon emissions from Canadian forest fires, 1959-1999. Can. J. For. Res. 31: 512-525. Bayley, S.E., D.W. Schindler, K.G. Beaty, B.R. Parker and M.P. Stainton. 1992. Effects of multiple fires on nutrient yields from streams draining boreal forest and fen watersheds: nitrogen and phosphorus. Can. J. Fish. Aquat. Sci. 49: 584-596. Beall, F., R. Stewart, I. Campbell, C. Campbell, H. Hirvonen and P. Bernier. 2001. Forest water resources – CFS scoping paper. Nat. Res. Can., Can. For. Serv., Ottawa, Ont., Canada. Beaty, K.G. 1994. Sediment transport in a small stream following two successive forest fires. Can. J. Fish. Aquat. Sci. 51: 2723-2733. Bergeron, Y. 1991. The influence of island and mainland lakeshore landscapes on boreal forest fire regimes. Ecology 72: 1980-1992. Berry, G.J. 1991. Hydrology of drained and undrained black spruce peatlands: streamflow and hydrologic balance. Forest Information Systems Ltd., Victoria, B.C., Canada. COFRDA Rep. 3317. Buttle, J.M. 1996. Identifying hydrological responses to basin restoration: an example from southern Ontario. In McDonnell, J.J., J.B. Stribling, L.R. Neville and D.J. Leopold (ed.), Watershed restoration management: physical, chemical, and biological considerations. Amer. Water Res. Assoc., Herndon, Va., U.S.A. TPS-96-1. Buttle, J.M., I.F. Creed and J.W. Pomeroy. 2000. Advances in Canadian forest hydrology, 1995-1998. Hydrolog. Process. 14: 1551-1578. Buttle, J.M. and R.A. Metcalfe. 2000. Boreal forest disturbance and streamflow response, northeastern Ontario. Can. J. Fish. Aquat. Sci. 57(Suppl. 2): 5-18. CCFM (Canadian Council of Forest Ministers). 2002. Compendium of Canadian forestry statistics. Natural Resources Canada, Ottawa, Ont., Canada. CFS (Canadian Forest Service). 2002. 2000-2001 The state of Canada’s forests. Sustainable forestry – a reality in Canada. Nat. Res. Can., Can. For. Serv., Ottawa, Ont., Canada. Curry, R.A. and K. Devito. 1996. Hydrogeology of brook trout (Salvelinus fontinalis) spawning and incubation habitats: implications for forestry and land use development. Can. J. For. Res. 26: 767-772. Dietz, A.C. and J.L. Schnoor. 2001. Advances in phytoremediation. Environ. Health Perspect. 109(Suppl. 1): 163-168. Dubé, S., A.P. Plamondon and R.L. Rothwell. 1995. Watering up after clear-cutting on forested wetlands of the St. Lawrence lowland. Water Resour. Res. 31: 1741-1750. Dunne, Y. and L.B. Leopold. 1978. Water in environmental planning. W.H. Freeman & Co., San Francisco, Ca., U.S.A. EC (Environment Canada). 2003. Freshwater Website. Environment Canada, Ottawa, Ont., Canada. Internet. Cited 15 September 2003. Flannigan, M.D., Y. Bergeron, O. Engelmark and B.M. Wotton. 1998. Future wildfire in circumboreal forests in relation to global warming. J. Veg. Sci. 9: 469-476. France, R. 1997. Land-water linkages: influence of riparian deforestation on lake thermocline depth and possible consequences for cold stenotherms. Can. J. Fish. Aquat. Sci. 54: 1299-1305. Guillemette, F., A.P. Plamondon and D. Levesque. 1999. Effets de la coupe sur le bilan hydrologique. Bassin expérimental du ruisseau des Eaux-Volées (BEREV). Département des sciences du bois et de la forêt. Université Laval, Québec, Canada. Gunn, J.M. and R. Sein. 2000. Effects of forestry roads on reproductive habitat and exploitation of lake trout (Salvelinus namaycush) in three experimental lakes. Can. J. Fish. Aquat. Sci. 57(Suppl. 2): 97-104. Hartman, G.F. and J.C. Scrivener. 1990. Impacts of forestry practices on a coastal stream ecosystem, Carnation Creek, British Columbia. Can. Bull. Fish. Aquat. Sci., No. 223. Hetherington, E.D. 1992. Watershed hydrology, p. 33-47. In Hogan, D.L., P.J. Tschaplinski and S. Chatwin (ed.), Carnation Creek and the Queen Charlotte Islands fish/forestry workshop: applying 20 years of coast research to management solutions. B.C. Min. For. Res. Program, Victoria, B.C., Canada. Hornbeck, J.W., C.W. Martin and C. Eagar. 1997. Summary of water yield experiments at Hubbard Brook Experimental Forest, New Hampshire. Can. J. For. Res. 27: 2043-2052. Kelly, D.J., M.L. Bothwell and D.W. Schindler. 2003. Effects of solar radiation on stream benthic communities: an intersite comparison. Ecology 84: 2724-2740. Larsen, C.P.S. 1997. Spatial and temporal variations in boreal forest fire frequency in northern Alberta. J. Biogeogr. 24: 663-674. Larsen, C.P.S. and G.M. MacDonald. 1998. An 840-year record of fire and vegetation in a boreal white spruce forest. Ecology 79: 106-118. Lieffers, V.J. and R.L. Rothwell. 1986. Effects of depth of water table and substrate temperature on root and top growth of Picea mariana and Larix laricina seedlings. Can. J. For. Res. 16: 1201-1206. Martin, C.W., J.W. Hornbeck, G.E. Likens and D.C. Buso. 2000. Impact of intensive harvesting on hydrology and nutrient dynamics of northern hardwood forests. Can. J. Fish. Aquat. Sci. 57(Suppl. 2): 19-29. Mattice, C.R. 1977. Forest road erosion in northern Ontario: a preliminary analysis. Can. For. Serv., Great Lakes For. Res. Cent., Sault Ste. Marie, Ont., Canada. Inf. Rep. O-X-254. Miller, J. and D.L. Frink. 1982. Changes in flood response in the Red River of the North Basin, North Dakota-Minnesota. U.S. Geol. Surv., Bismarck, N.D., U.S.A. Open File Rep. 82-774. Murphy, M.L., J. Heifetz, S.W. Johnson, K.V. Koski and J.F. Thedinga. 1986. Effects of clear-cut logging with and without buffer strips on juvenile salmonids in Alaskan streams. Can. J. Fish. Aquat. Sci. 43: 1521-1533. Nicolson, J.A., N.W. Foster and I.K. Morrison. 1982. Forest harvesting effects on water quality and nutrient status in the boreal forest, p. 71-89. In Steed, G.L. and H.R. Hudson (ed.), Proc. Can. Hydrol. Symp. ’82 – Hydrologic processes of forested areas. Nat. Res. Counc. Can., Ottawa, Ont., Canada. Ottens, J. and J. Rudd. 1977. Environmental protection costs in logging road design and construction to prevent increased sedimentation in the Carnation Creek watershed (Vancouver Island). Can. For. Serv., Pac. For. Res. Cent., Victoria, B.C., Canada. Inf. Rep. BC-X-155. Plamondon, A.P. 1982. Augmentation de la concentration des sédiments en suspension suite a l’exploitation forestière et durée de l’effet. Can. J. For. Res. 13: 883-892. Plamondon, A.P. 1993. Influence des coupes forestières sur le régime d’écoulement de l’eau et sa qualité. Centre de recherche en biologie forestier, Université Laval et Ministère des forêts, Québec, Canada. 179 p. Plamondon, A.P. 2002. La récolte forestière et les débits de pointe : État des connaissances sur la prévision des augmentations des pointes, le concept de l’aire équivalente de coupe acceptable et les taux régressifs des effets de la coupe sur les débits de pointe. Direction de l’environnement forestier, Ministère des ressources naturelles, Québec, Canada. Poff, L.N., J.D. Allen, M.B. Bain, J.R. Kerr, K.L. Prestegaard, B.D. Richter, R.E. Sparka and J.C. Stromberg. 1997. The natural flow regime: a paradigm for river conservation and restoration. BioScience 47: 769-784. Pomeroy, J.W., R.J. Granger, A. Pietroniro, J.E. Elliot, B. Toth and N. Hedstrom. 1997. Hydrologic pathways in the Prince Albert Model Forest. Final report to the Prince Albert Model Forest Association, Nat. Hydrol. Res. Inst., Environ. Can., Saskatoon, Sask., Canada. Ralph, S.C., G.C. Poole, L.L. Conquest and R.J. Naiman. 1994. Stream channel morphology and woody debris in logged and unlogged basins of western Washington. Can. J. Fish. Aquat. Sci. 51: 37-51. Roberts, R.G. and M. Church. 1986. The sediment budget in severely disturbed watersheds, Queen Charlotte Ranges, British Columbia. Can. J. For. Res. 16: 1092-1106. Roulet, N.T. and T.R. Moore. 1995. The effect of forestry drainage practices on the emission of methane from northern peatlands. Can. J. For. Res. 25: 491-499. Schindler, D.W., S.E. Bayley, B.R. Parker, K.G. Beaty, D.R. Cruikshank, E.J. Fee, E.U. Schindler and M.P. Stainton. 1996. The effects of climate warming on the properties of boreal lakes and streams at the Experimental Lakes Area, northwestern Ontario. Limnol. Oceanogr. 41: 1004-1017. Schindler, D.W., R.W. Newbury, K.G. Beaty, J. Prokopowich, T. Ruszczynski and J.A. Dalton. 1980. Effects of windstorms and forest fire on chemical losses from forested watersheds and on the quality of receiving stream. Can. J. Fish. Aquat. Sci. 37: 328-334. Steedman, R.J. and R.S. Kushneriuk. 2000. Effects of experimental clearcut logging on thermal stratification, dissolved oxygen, and lake trout (Salvelinus namaycush) habitat volume in three small boreal forest lakes. Can. J. Fish. Aquat. Sci. 57(Suppl. 2): 82-91. Stocks, B.J., J.A. Mason, J.B. Todd, E.M. Bosch, B.M. Wotton, B.D. Amiro, M.D. Flannigan, K.G. Hirsch, K.A. Logan, D.L. Martell and W.R. Skinner. 2002. Large forest fires in Canada, 1959-1997. J. Geophys. Res. 108: FFR5-1-FFR5-12. Swanson, R.H. and G.R. Hillman. 1977. Predicted increased water yield after clear-cutting verified in west-central Alberta. Can. For. Serv., North. For. Res. Cent., Edmonton, Alta., Canada. Inf. Rep. NOR-X-198. Verry, E.S. 1986. Forest harvesting and water: the lake states experience. Water Resour. Bull. 22: 1039-1047. Vitt, D.H., L.A. Halsey, I.E. Bauer and C. Campbell. 2000. Spatial and temporal trends in carbon storage of peatlands of continental western Canada through the Holocene. Can. J. Earth Sci. 37: 683-693. Whalen, S.C. and W.S. Reeburgh. 1996. Moisture and temperature sensitivity of CH4 oxidation in boreal soils. Soil Biol. Biochem. 28: 1271-1281. Whitaker, A., Y. Alila, J. Beckers and D. Toews. 2002. Evaluating peak flow sensitivity to clear-cutting in different elevation bands of a snowmelt-dominated mountainous catchment. Water Resour. Res. 38: 1172. - Date modified:
<urn:uuid:dc699f3e-8a4d-4bde-b5ef-49857281250d>
CC-MAIN-2017-04
http://www.ec.gc.ca/INRE-NWRI/default.asp?lang=En&n=0CD66675-1&offset=13&toc=show
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00495-ip-10-171-10-70.ec2.internal.warc.gz
en
0.887708
9,769
3.390625
3
« AnteriorContinuar » said to himself, " the son of a minister in England, knowing far more about Jesus Christ than that poor boy, and yet caring far less about Him! That little fellow is now earnestly listening to the word of life, while I am living quite careless about it!". In great distress of mind he retired that night to his hammock; but his pious father's instructions came back to his thoughts, and reminded him how he might seek and find that salvation which he so much needed. He became a real Christian ; and great was the joy in his English home when the happy tidings reached his parents. Are there none of our young readers to whom the desire of this heathen boy, to hear more of Christ, should come with equal force? With 80 many more ways than he had of knowing the true God, and Jesus Christ his Son, how few children in our own land show half his eager desire for religious knowledge, or are so sincerely desirous to believe in the Saviour. DESIRE FOR BOOKS IN SAMOA. In 1830, the inhabitants of the Samoan, or Navigator's Islands, were sitting in darkness ; up to that time they had never seen a book, and had no idea of any way of receiving or imparting knowledge but by speech. In this respect they were just like the people of Rarotonga when Mr. Wiliams, to their great amazement, "made," as they termed it, “the chip talk.” But missionaries have given them a written language, and provided for them in that language the printed Scriptures and other religious books; and as numbers of them have learned to read, these books are in great de mand. One of the missionaries says, “ Could our friends in England witness the desire of the natives for books, I am sure that printing presses could not long be wanting. I have known individuals travels 10 or 15 miles, in a small canoe upon the open sea, to obtain a single book, bringing articles of native produce in exchange for it. Numbers have gladly walked 20, 30, 40, or even 50 miles, carrying a burden the whole way, and only asking in return a copy of the Gospel of John. An edition of five thousand has not been at all equal to the demand." One of these natives, thirsting for knowledge, and wishing above all earthly treasures to pos, sess a book, fenced in a plot of ground, planted it with arrow-root, and having waited until it was ripe, dug it up, and prepared and packed it for use. He then got into his little canoe, spread its sail to the wind, and steered for the missionary station, that he might get a book in exchange for his produce. After gliding many miles over the bosom of the ocean in safety, just as he was drawing near the desired spot, a sudden gust of wind filled the little sail, upset his canoe, and sent his arrow-root to the bottom. The poor fellow soon put his canoe right again ; but, alas! he had lost his cargo, which grieved him very much, as he feared that he could not get a book without paying for it. He therefore turned the bow of his canoe back towards his home, which he reached with a heavy heart. As soon, however, as he had re. turned, he planted a fresh plot of arrow-root, and, having patiently waited until it was ready, Le set out again, sailed once more across the open sea, reached the missionary settlement, and thought himself well rewarded for all his toil when he obtained a book, and then with this precious treasure, and a thankful heart, he returned to his distant home. Surely those who thus value knowledge should be well supplied with it; and our young friends will be pleased to know, that amongst other good things which the ship "John Wil. liams will take to the South Seas, will be more missionaries and more Bibles. A CHILD'S THOUGHTS. AND can it be that I, A young and thoughtless child, So full of mirth and play So often rude and wild That I a soul possess, Which must for ever live ; That Jesus died upon the cross, This deathless soul to save ? The Bible tells me this is so A book which cannot lie : Then 'tis a fearful thing to live, More fearful still to die. Lord, guide me in the way of life, To me let grace be given To cleanse my thoughts from all that's wrong, And fit my soul for heaven. And fix my hopes above, To seek a Saviour's love. THE HIVE AND ITS WONDERS. TRANSPORTATION OF HIVES. THE honey-bees do not live very long, even when they are taken care of. The drones live but a few months; the workers, less than a No. 95. NOVEMBER, 1852. year; the queen, longer than any of the bees --some think two years, but the exact length has never been certainly discovered. These little insects are not active in the winter; they sometimes appear to be almost in a torpid state : but, if the weather becomes mild, and the sun shines warmly upon the hive, they soon arouse themselves and are quite lively. They are sometimes led, by the bright sunshine, to come out of their hives in midwinter, and perhaps fly off into the air ; and then the cold north wind chills their limbs, and they are not able to return to the hive, but perish in the fields. They have a dread of rain, and, if a heavy cloud passes before the sun, they often return home in great haste. But when they continue their work till their load is completed, and take the direction in which their home lies, their course towards it is as direct as the flight of an arrow. Though their hives sometimes stand in gardens surrounded by shrubbery, yet, as they know the way, and return with great speed, taking the shortest route towards it, we must suppose that there are marks guiding them, which escape our notice. Each bee will fly directly to its own hive, though there may be inany @thers near, resembling it in appear This well-known habit of the bee is very useful to those persons who, in some parts of the world, search for the hives of the wild bee, and track her to her home in the woods, to find her nest, and take away her honeycomb. In order to do this, the bee-hunter takes his stand somewhere upon the broad plain, where the
<urn:uuid:4bcb3020-e0ad-4e45-a122-c15509df9e8a>
CC-MAIN-2022-33
https://books.google.com.mx/books?id=5CMGAAAAQAAJ&pg=PA322&focus=viewport&vq=%22Not+to+myself+alone,+The+heavy-laden+bee+doth+murmuring+hum,+%E2%80%94+Not+to+myself+alone,+from+flower+to+flower+I%22&dq=editions:OCLC615342558&lr=&output=html_text
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00078.warc.gz
en
0.980062
1,396
2.40625
2
Outdoors notebook: Mine discharge studied at Settler’s Cabin Park February 28, 2016 1:03 AM By John Hayes / Pittsburgh Post-Gazette Since 2014, Trout Unlimited and the Allegheny County Parks Foundation have conducted field studies on water quality in Settler’s Cabin Park, located west of Pittsburgh. The focus is on Pinkerton Run, which picks up seepage from long-abandoned coal mines and carries it through Robinson Run, Chartiers Creek and the Ohio River near McKees Rocks. The studies are a first step in mitigating the mine releases and encouraging fish to return to Pinkerton Run. Settler’s Cabin project organizers cite the remediation of the Lotus Pond at neighboring Pittsburgh Botanic Gardens, where a limestone treatment bed successfully mitigates coal mine drainage. Recently gathered biological data will be combined with water chemistry and flow data collected in 2015 to help gauge the environmental impact of the mines and suggest a remediation strategy financed through fund drives. Fly fishing film Outdoor adventure stories, high production values, exotic locations and some of the biggest, baddest fish ever to take a fly -- and it’s all for a worthy cause. The annual Fly Fishing Film Tour raises funding to support the International Angler's Youth Fly Fishing Program and Casting for Recovery, which provides fly-fishing therapy and companionship for women with breast cancer. The show starts at 3 p.m. today at The Oaks Theatre in Oakmont. $20, The Oaks, 412-828-6322. International Angler, 412-788-8088. Tri-County Trout Club and the state Fish and Boat Commission are looking for a little help with plans for trout float stocking at Deer Creek (March 1) and Bull Creek (March 2), in Allegheny County. Details at email@example.com. Wild game dinner Deer shis-ka-bob, pheasant marsala, wild boar sausage and moose are on the menu when Northgate Church in Ross hosts its annual Wild Game Dinner. Western Pennsylvania hunters donate and prepare the wild entrees, side dishes and desserts. Diners register for door prizes and hear a statewide hunting update from the Pennsylvania Game Commission. Free and open to the public 6 p.m. March 5. Registration is not required but early arrival is recommended. Details 412-931-6016, www.northgatechurch.com. To report inappropriate comments, abuse and/or repeat offenders, please send an email to firstname.lastname@example.org and include a link to the article and a copy of the comment. Your report will be reviewed in a timely manner.
<urn:uuid:6547d4d0-5c99-4c7c-90e9-7bd2843f8180>
CC-MAIN-2017-04
http://www.post-gazette.com/sports/hunting-fishing/2016/02/28/Outdoors-notebook-Mine-discharge-studied-at-Settler-s-Cabin-Park/stories/201602280128
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00383-ip-10-171-10-70.ec2.internal.warc.gz
en
0.901688
560
1.851563
2
Core is a extremely ambitious game venture which is part Multiverse try and portion consumer-generated information creation platform. Right after about a year in Alpha, exactly where about a single million gamers helped with the screening, the video game has now released in early obtain via the Epic Games Retailer (unsurprisingly, as it is run by Unreal Engine engineering). It can be a cost-free obtain, to begin with. In actuality, the builders reckon there are previously about twenty-thousand no cost playable online games to be discovered in Main, with an ordinary of about two hundred extra or up to date every day. Jordan Maynard, Chief Innovative Officer and co-founder at Manticore Games, mentioned: Core’s video games showcase what is feasible when the electricity of creation is manufactured obtainable to any individual. We developed Main to open up gaming to a new wave of creators from all backgrounds. That new technology is already publishing astounding encounters that rival those people of huge studios or that significant studios wouldn’t even think of creating. You can master far more about Main underneath. From shooters, survival, and action-experience to MMORPGs, platformers, and party online games, Main has some thing new for each and every gamer, just about every day. Hold out in a huge social space of connected worlds. Feast at a castle banquet, swim in zero-G at an orbiting place station, or visit a virtual theme park. Stake your claim, develop your individual homeworld, and hook up to other individuals. Want to make your individual match? Main tends to make it doable by providing novices and professionals alike the electrical power of Unreal in an available interface. You have accessibility to hundreds of absolutely free, superior high quality songs, seem, and artwork assets, and designed in 3D modeling and terrain sculpting instruments. Just one-button publishing helps make it simple to share your recreation, obtain gamers, and probably earn dollars.
<urn:uuid:8d22dcb0-83cc-4fe6-a91b-3095ced2dd61>
CC-MAIN-2022-33
https://fastcredit24.com/core-an-arcade-of-20k-user-made-online-games-has-launched-on-the-epic-online-games-retailer.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00473.warc.gz
en
0.943008
406
1.546875
2
“I’m a repentant of the blockchain.” This is how Giacomo Zucco – CEO and founder of BlockchainLab – made his debut today during the Fintech & Blockchain Forum event in Milan organised by Le Fonti TV. “The blockchain is the third phase of the bitcoin mourning: the compromise in which one admits the existence of bitcoin, but wants to use it in their own way. Everything that is called blockchain, acting as a bridge between Bitcoin’s technological innovation and fintech, is often only marketing, even if obviously there are interesting use cases such as notarization applications in order to have a certain date of a document through time stamping”. Zucco’s keynote went on for about half an hour, with questions, interesting ideas and Latin quotes. “Bitcoin is not only a technological revolution but also a political one.” It’s certainly true that Bitcoin, despite its first immediate application in payment methods and finance, has revolutionised the way users think and their potential for freedom. “With money privacy is reduced to zero“, but not with bitcoin, explains the founder of BlockchainLab making funny examples like the fact that you can freely buy a diamond for your lover without having embarrassing receipts or reports on the movements and balances of your credit card. But what’s really important, especially when you want to use blockchain technology within your business, is the fact that it should be applied without taking into account the old model of your company, “otherwise it’s as if Kodak wanted to understand how to use digital photography as a way to sell more rolls of film. The main thing that the blockchain changes is not the technology at the service of the model, but the model itself”.
<urn:uuid:37a530a9-6f47-4568-b2c3-8d5fddb88ae8>
CC-MAIN-2022-33
https://en.cryptonomist.ch/2019/03/06/giacomo-zucco-repentant-of-the-blockchain/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00268.warc.gz
en
0.958069
376
1.65625
2
JPMorgan Chase: $3.6 billion in profits in the last quarter. Goldman Sachs: $3.03 billion. Analysts expect a string of sky-high profit announcements to follow from other major Wall Street banks, all of them squirreling that cash away for historic bonus payments to executives. In other words, it's been a good year for government-sponsored enterprises -- known in the industry as GSEs. Traditional GSEs such as Fannie Mae and Freddie Mac have been tagged as culprits in the financial collapse, with critics arguing that the institutions took on too much risk because their losses were guaranteed by the federal government. Such a situation, it was said, is unsustainable. Today's GSEs have different names: AIG, Citigroup, Bank of America. "That's how I look at them as an analyst. I treat Citi as a GSE. I feel bad, because I know a lot of people that work there and I know they're trying to turn it around, but between the loss sharing and the equity that will probably be consumed by the losses, it's going to be an expensive operation for the U.S. government," said Christopher Whalen, a financial analyst who co-founded Institutional Risk Analytics. Even the Treasury Department has made the comparison. "The growth of the major financial firms over the past few decades -- including Fannie Mae, Freddie Mac, and the major investment banks -- also likely stemmed in part from the assumption by investors and counterparties that these firms would receive government assistance if they became troubled," assistant treasury secretary Michael Barr said at a speech earlier this month at the National Economists Club. Implicit government sponsorship allows big banks to access capital cheaper than private banks. It also saves them money on insurance premiums. Why pay for guarantees that the banks can get free? When Bank of America bought Merrill Lynch in January, it insisted on getting up to $118 billion in losses guaranteed by the U.S. government in exchange for going through with the takeover. BofA agreed to pay a 3.7 percent fee for the guarantee -- close to $4 billion. At the end of September, it paid a fraction of that -- $425 million -- to the Treasury to get out of the deal. "The BoA folks are smart people," said economist Dean Baker of the Center for Economic and Policy Research. "Why pay for something you can get for free?" (BofA claims it escaped the deal so that it would be less reliant on government support -- though, of course, the implicit support has gone nowhere.) A recent paper by Baker and Travis McArthur shows that the too-big-too-fail guarantee also allows GSE banks to access capital cheaper than regular banks. The difference over the last several quarters adds up to an annual $34.16 billion taxpayer subsidy to major banks -- roughly half of their projected profits. That subsidy is more than twice what taxpayers spend on the major welfare program, Temporary Assistance to Needy Families. The report, "The Value of the 'Too Big to Fail' Big Bank Subsidy," is based on data compiled by the Federal Deposit Insurance Corporation and compares the cost of capital for banks smaller and larger than $100 billion. For the 18 banks above that threshold, capital was cheaper by 0.78 percentage points from the fourth quarter of 2008 through the first two quarters of 2009. From the first quarter of 2000 through the fourth quarter of 2007, the spread had only averaged 0.29 points -- meaning that the gap increased by roughly half a percentage point. During the early part of the decade, the previous recession also saw the spread widen, but by a smaller amount, the report notes. The circumstances were much different, as well: the past recession didn't include widespread fears of the insolvency of the biggest banks -- the type of concern that -- under a free-market theory -- should make capital cost more, not less, for such banks. Yet smaller banks, which played little role in the crisis, received fewer bailout dollars and are considered more financially stable, are the ones paying the price. "Private banks can't compete with a GSE," said Whalen. Major banks have been able to sell toxic assets to the Federal Reserve and also have access to capital at close-to-zero percent interest rates from the Fed. By using zero-percent money from the Fed and lending it back to the U.S. government by buying Treasuries that pay higher rates, banks can squeeze out an extra subsidy. But there is no way of knowing how much of that capital banks have taken advantage of because the Fed doesn't make the information available. "The numbers in [the report] suggest that to a large extent the recent rise in the profitability of the TBTF banks may be attributable to the fact that they enjoy the protection of the government's backing at a time when the banking system as a whole continues to experience substantial strains," write Baker and McArthur. "This should concern policymakers, since it would imply that a substantial portion of the profits of the largest banks is essentially a redistribution from taxpayers to the banks, rather than the outcome of market transactions. It is not clear that Congress and the public would support this redistribution if they realized that it was taking place." It's clear, in fact, that the TBTF situation has virtually no support at all. "I can't comment specifically on BofA, but what it does illustrate is in the debate about the regulations that are coming before the banking committee, we're going to have to be very, very careful not to allow the situation to exist where implicitly there is a federal guarantee or a backup of any of these institutions by virtue of the things we've put into place to deal with some future crisis," Senate Republican Whip Jon Kyl of Arizona told HuffPost. "If they're too big to fail, they're too big," former Federal Reserve Chairman Alan Greenspan told the Council on Relations in New York on Thursday. Greenspan acknowledged that breaking up banks cuts directly against his free-market ideology and opposition to government interference, but said that there was no choice. "If you don't neutralize that, you're going to get a moribund group of obsolescent institutions which will be a big drain on the savings of the society...Failure is an integral part, a necessary part of a market system." There is precedent for such a break up. "In 1911 we broke up Standard Oil. So what happened? The individual parts became more valuable than the whole. Maybe that's what we need to do," Greenspan said. Senate Democrats agree, too. "Too-big-to-fail is a doctrine that has to go," said Sen. Byron Dorgan of North Dakota, a member of Democratic leadership. "We need to address the doctrine and essentially abolish this no-fault capitalism called too-big-to-fail." Even JPMorgan CEO Jamie Dimon acknowledged in September, "It would be a very bad long-term policy error to have banks that are too big to fail." What he meant, however, was that other banks shouldn't be allowed to grow as big as his own, not that his should be broken up. "By that I don't mean make the banks smaller. We're large because we have a reason to be large," he quickly added. They have billions of reasons to be large, of course, but there is a simple way to reduce their size, Whalen said. Banks that fail or are approaching failure could require their creditors to convert to stock holders instead of having their investment covered by taxpayers. The politics of the solution are difficult, because bondholders have an immense amount of political power. "We can do this short of bankruptcy if we want to be reasonable people, but nobody in Washington's got the balls to have this conversation, except for [FDIC head] Sheila Bair," said Whalen. Allowing failed firms to carry on undermines the entire system, Whalen noted. "In a free market society, if you don't have terror along with the exuberance then you're not a free market," he said. "If we don't have the courage to make the bondholders -- who are really legally responsible here -- come in and play a part, then we're basically just socialists and we will have all the negative effects that the socialists have faced in Europe by subsidizing their banks, which is a dead banking system." The administration's approach is less direct and begins with greater oversight and higher capital requirements for big banks. "Going forward, our strategy is to impose supervisory and capital charges that offset the benefits of perceived government subsidies. We must substantially reduce the moral hazard created by the perception that these subsidies exist," said Barr in the same speech. Greenspan, however, said that wasn't enough. "I don't think merely raising the fees or capital on large institutions or taxing them is enough," Greenspan said. "I think they'll absorb that, they'll work with that, and it's totally inefficient and they'll still be using the savings." That puts Greenspan -- an Ayn Rand acolyte -- on record for more government intervention than advocated by Michael Barr, a longtime labor economist. Rather than break up the financial firms, Treasury proposes that it be given authority to unwind major financial institutions when they run into trouble. If investors become convinced that the government will, in fact, exercise that new authority, then their investment isn't as safe and the implicit subsidy isn't as large. From Barr's speech: The final step in addressing the problem of moral hazard is to make sure that we have the capacity - as we do now for banks and thrifts - to break apart or unwind major non-bank financial firms in an orderly fashion that limits collateral damage to the system. Under our proposed special resolution authority, the government would be able to seize control of the operations and management of a major financial firm that is in default or in danger of default, to act as a conservator or receiver for the firm, and to establish a bridge entity to effect an orderly sale of the firm or liquidation of its assets. In the main resolution authority is not about keeping these firms alive, it is about letting them fail - making sure that they fail in a way that causes less collateral damage to the economy and to the taxpayer. It is imperative that we minimize the risks that taxpayers pay the price of any future rescue of the financial sector. Therefore, under our proposal, any losses that might be incurred by the government in this special resolution process would be recouped through assessments on other large financial firms. In a speech directed at Wall Street in New York in September, President Obama put the banks on notice. "Those on Wall Street cannot resume taking risks without regard for consequences, and expect that next time, American taxpayers will be there to break their fall," Obama said. Today's profit statements tell a different story: Yes, Mr. President, they can. The Morning Email helps you start your workday with everything you need to know: breaking news, entertainment and a dash of fun. Learn more
<urn:uuid:69d33dcf-38e9-4e9a-8a3e-56636e4869d9>
CC-MAIN-2017-04
http://www.huffingtonpost.com/2009/10/15/fannie-freddie-and-citi-t_n_322603.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00218-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973244
2,294
1.625
2
Views 1735 at May – 15 – 2014 Featured in RB Explore Photography Page October – 13 – 2012 Vernonette – Normandy – France Near Vernon and Monet’s home at Giverny is the scenic village of Vernonette. Located on the edge of the river Seine. Many are the visitors in Vernon or Giverny who cross the river Seine and who notice, near the bridge, a quaint-looking old building perched above the water on the decaying piers of the old bridge. It is called " Le Vieux Moulin " (the old Mill) and if the foliage is not too thick, behind this former mill, they can also see the towers of a medieval castle called Château des Tourelles (Turret Castle). These visitors, in a hurry to go to their destination, give the place nothing more than a glance while at the same time finding it ‘quite nice and picturesque’. You are in front of the most typical view of Vernon, a site loaded with history, a site which inspired lots of painters – both amateur and professional – a site that can be seen even in American Museums The Old Mill by Claude Monet in New Orleans Museum The Old Mill by Claude Monet in New Orleans Museum HDR processed in Photomatix Pro 3.1.3 from a single RAW image, then processed using CS4 – no tripod used Nikon D100 Sigma 24/70
<urn:uuid:a26615e5-c7ce-44f1-b602-f90c13f40cbe>
CC-MAIN-2017-04
http://www.redbubble.com/people/paolo1955/works/5684215-le-vieux-moulin-vernonette?c=31415-france-normandy&ref=work_carousel_work_collection_2
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00551-ip-10-171-10-70.ec2.internal.warc.gz
en
0.928832
304
2.140625
2
Invested Business? Invest in Marketing With so much research and development taking place in the early stages of your...read more Palm Oil Background About half of the worlds palm oil is produced in Indonesia. The 2013 the output was approximately 22 Million Tonnes, produced from approximately 6 Million Hectares of productive plantations. The Indonesian government has stated a target output of 40 Million Tonnes from 10 Million Hectares by 2020. Current estimates of the increase in area from tracking the … The post 📡 GSI NEW PRODUCT: Palm Oil Tree Characterization 📡 appeared first on Geospatial Insight Ltd.
<urn:uuid:b9f29a2c-815f-4e92-8137-83c0e7b63eab>
CC-MAIN-2022-33
https://midven.co.uk/syndicated/gsi-new-product-palm-oil-tree-characterization/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00471.warc.gz
en
0.928106
126
2.140625
2
Global refugees highest since WWII, pointing to lack of political solutions If the world's refugees made up a country, it would be the 26th most populous. The number of refugees, internally displaced people, and asylum-seekers is at the highest level since World War II, a UN agency said today, in a report that highlights the struggles of the international community to support refugees and find solutions to ongoing global conflicts. The UN Refugee Agency reports that a staggering 51.2 million people were displaced in 2013 due to “persecution, conflict, generalized violence, or human rights violations,” with a large part of the increase due to the ongoing civil war in Syria. This is up by 6 million from the 45.2 million refugees in 2012. The largest number of refugees are internally displaced people at 33.3 million. With new and continuing conflicts in Syria, Iraq, Afghanistan, Ukraine, the Central African Republic, South Sudan, Pakistan, Kenya, Myanmar, and others, the numbers of refugees may be even higher in 2014. UN High Commissioner for Refugees, António Guterres, underscored the lack of political solutions to ongoing conflicts in comments in the report. “We are seeing here the immense costs of not ending wars, of failing to resolve or prevent conflict. Peace is today dangerously in deficit. Humanitarians can help as a palliative, but political solutions are vitally needed. Without this, the alarming levels of conflict and the mass suffering that is reflected in these figures will continue.” Speaking to reporters in Geneva, Mr. Guterres noted that the numbers weren’t just an increasing trend but a “quantum leap.” Ongoing and new conflicts show the weaknesses of the international system, Mr. Guterres told The New York Times. "What this demonstrates is that the international community today has very limited capacity to prevent conflicts and to find timely solutions. We see the Security Council paralyzed in many crucial crises," he said. Recent battles at the Security Council have seen Russia and the United States on opposing sides over conflicts in Syria and Ukraine, effectively preventing the Council from taking any action. Pakistan, Iran, and Lebanon took in the most refugees in 2013. Lebanon hosts the largest number of refugees compared to its own population with 178 refugees per 1,000 Lebanese. The United States hosted 263,600 refugees in 2013. Worldwide, the largest numbers of refugees came from Afghanistan, Syria, and Somalia. With 86 percent of the world’s refugees living in developing countries, finding the resources to deal with numerous wars and conflicts has become more difficult. “There is no humanitarian response able to solve the problems of so many people. It’s becoming more and more difficult to find the capacity and resources to deal with so many people in such tragic circumstances,” Guterres said. The report also highlighted the swift changes in domestic stability. Within five years, Syria went from being the second largest refugee-hosting country to the second largest refugee-producing one. One of the most shocking findings from the report was that half of the refugee population was made of up children below 18 – the highest figure in a decade. The number of children separated from family and traveling alone leaves them highly vulnerable. Solutions to many of the crises highlighted remain far off. The UN report highlighted that the 1951 Convention relating to the Status of Refugees calls on signatories to cooperate on finding solutions, including trying to lower the number of refugees and resettle others.
<urn:uuid:ed2a2d5f-3638-4ffa-aa4a-97fca53e1394>
CC-MAIN-2016-44
http://www.csmonitor.com/World/2014/0620/Global-refugees-highest-since-WWII-pointing-to-lack-of-political-solutions
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00425-ip-10-171-6-4.ec2.internal.warc.gz
en
0.951317
721
3.171875
3
Q.: Is registration of births and deaths compulsory? Ans.: Registration of Births & Deaths is compulsory as per provisions of Registration of Births & Deaths Act, 1969 and Delhi Registration of Births & Deaths Rules, 1999. Q.: What are the benefits/advantages of birth & death certificates? Ans.: a) Main advantages of registration of birth are: i) Admission to schools ii) Right to vote iii) Obtaining Driving License, Passport etc. iv) For employment v) For obtaining Visa for Foreign visits vi) Claiming right to marry after attaining marriageable age. b) Advantage of registration of Death: i) To establish the fact of death for relieving the individual from social, legal and official obligations. ii) To establish the claim on property, insurance and social security benefits etc. Q. How Birth & Death is registered in Delhi? Ans.: If birth and death has taken place in Government hospitals/private hospitals/nursing homes/ medical institutions, such births/deaths are to be reported by the head of the institutions within 21 days of births & deaths to the concerned Registrars (births & deaths). If birth and death has taken place at home, it is the responsible of the Head of the family/any other family member to report such births and deaths within 21 days to the Sub Registrars (births & deaths). All births/deaths that have occurred either in a home or hospital or otherwise shall be reported within 21 days of their occurrence to the concerned Registrar/Sub Registrar in whose jurisdiction the event has occurred. Q.: Whether Registration of births & deaths can be done at any place irrespective of the place of occurrence? Whether an event which has taken place say at Bombay can be registered in Delhi? Ans.: Birth/Death can be registered at the place of occurrence only. An event, which has taken place in Bombay shall be registered with the concerned local Registrar in Bombay within whose jurisdiction the event has occurred. That event can not be registered in Delhi. Q.: Whether the event of death occurred in a road accident at Hyderabad could be registered in the area of residence of the deceased in Goa on the ground that the dead body was cremated there? Ans.: As per provisions of Section 7(2) of the Registration of Births & Deaths Act, 1969 the event of births/deaths can be registered only at the place of occurrence. The event which had taken place in Hyderabad should be registered with the concerned Registrar in whose jurisdiction the event has occurred. As such the event of death under reference could not be registered in Goa. In such cases, it is expected that the event of death might have been reported to the Registrar of births & deaths of the area where the death has occurred by the Police officer incharge of Thana under Section 8(1) (e) of the RBD Act, 1969. Q.: How birth/death certificate can be obtained ? Ans.: Birth or death certificate can be obtained after the registration by submitting an application on plain paper to the concerned area Registrar/Sub-Registrar giving following details: i) Date of Birth/Death ii) Sex i.e. Male or Female iii) Place of Birth/Death a) Name of hospital/nursing home/medical institutions b) Residential address in case of domicialry birth/death iv) Father's Name v) Mother's Name Q.: Whether Office of Chief Registrar of Births & Deaths issues birth or death certificate? Ans.: The Office of Chief Registrar (B&D) does not issue any birth & death certificate but issue certified copy of English translated birth & death certificates. Q.: What is late registration? Ans.: Reporting of birth/death for registration after 21 days of occurrence comes under the category of late registration. Q.: How birth and death is registered after 21 days but within 30 days of its occurrence? Ans.: Birth & Death reported after 21 days but within 30 days of its occurrence can be registered on payment of Rs.2/- as late fee. Q.: How birth and death is registered after one month but within one year of occurrence of the event? Ans.: Birth & Death reported after one month but within one year of its occurrence can be registered only with the written permission of the Registrar on payment of Rs.5/- Q.: How birth and death is registered after one year of the occurrence of event? Ans.: Birth & Death reported after one year of its occurrence can be registered on an order made by the area Magistrate i.e. SDM or the first class Magistrate or a Presidency Magistrate and on payment of Rs.10/- as late fee. Q.: How can I get certified copy of English Translation of Birth or Death Certificates? Ans.: Certified copy of English Translation of Birth or Death Certificates can be obtained from the office of Chief Registrar (Births & Deaths) on submission of original certificate issued in other languages. Q How name of the child can be added in the birth certificate? Ans.: Name of the child can be entered in the Birth Record free of cost within one year occurrence of births either orally or in writing. After one year, but within a period of 15 years (w.e.f. 1.1.2000 as per provisions of DRBD Rules 1999), name can be got entered on payment of Rs.5/- as late fee. Q.: Whether the correction or cancellation of entries in births/deaths register (under section 15 of the Act) also covers change of name? Whether Registrar is competent to effect correction involving change of name in respect of birth/death occurred and registered prior to enforcement of the 1969 Act? Ans.: The question of change of name may be viewed from two angles. The first is that there may be some clerical error in writing the name in the register. For example, Ram might have been written by oversight as Ram Lal or the word `Chandra' might have been written as `Chander'. The correction of the name under such circumstances may be covered under section 15 of the Act. Similarly, the name might have been fraudulently or improperly entered in the register. This would also fall under section 15. The second aspect would cover such cases where a person changes his name and thereafter makes a request for the change of the name in the register also. Such a contingency is obviously not covered under section 15 of the Act. The name is one of the various entries prescribed in the register. So the change of name would be in fact, a correction of the entry relating to the name. Every case in regard to the request for changes of name should, therefore, be considered in the light of the aforesaid observations. Q.: Whether the changes made in the name of father/mother through Gazette notification or otherwise subsequent to the date of registration of birth of the child, could be incorporated in the birth register? Ans.: As such changes in the name are not covered under Section 15 o the Act, these need not be incorporated in the birth register. Q.: Whether births which occurred to Indian citizen abroad prior to 1.1.1971 and not registered with the Indian Consulate as required under section 20(1) of the Act, can be registered now under section 20(2) of the Act? If such births can be registered, whether section 13 continues to be applicable for cases when registration is sought beyond 60 days of arrival in India? Ans.: The answer is in affirmative for both the queries. The RBD Act, 1969 is silent on this aspect. However, the salient feature of guidelines issued by Government of India are briefed below: Guidelines to orphanages, child welfare agencies etc. i) An application is to be made by the agency to the local Magistrate along with any other relevant material in form of an affidavit made by responsible person belonging to the agency. ii) The Magistrate is to pass an order approving the particulars to be entered in the birth certificate and same is to be issued by the registrar of the area where the child was found. iii) The Chief Medical Officer of the district is to be involved in ascertaining the age and the Magistrate would ordinarily act on the certificate granted by him. iv) Normally, the process should be initiated before the adoption is finalized, so that the particulars of adoptive parents are available for inclusion in the certificate. v) If the child has attained three years of age and adoption has not been finalized, the agency is to obtain a birth certificate, if found necessary, after informing the court in the form of an affidavit giving the following details: (a) that to the best of its knowledge the child has attained the age of three years. (b) That his/her adoption has not been finalized and is likely to take some time or may never be finalized in all probability; (c) That a certificate is required for educational/medical/legal purposes or any other reasonable purpose which may be specified; and (d) That person/persons would stand in as local parents to the child (this person/these persons should be a responsible person/responsible persons belonging to the placement agency) till such time as he/she attains majority, or is adopted, whichever is earlier. Issue of Second Birth Certificate on Adoption (Institutional) A second birth certificate is to be issued after adoption to provide for a change in name/names of the child and the adoptive parent/parents after obtaining an order to that effect from the court, which had passed order for issuing the original birth certificate. Issue of Birth Certificate on Adoption (Non- Institutional) A large number of adoptions do take place outside these institutional arrangements, for example children taken on adoption from relatives for friends. In such cases, it would be sufficient if the Magistrate having jurisdiction over the area passes an order approving the particulars of the adoptive parents to be entered/altered in the birth register/certificate and also pass an order for issuing a second birth certificate. If in case, the birth has not been registered till the time of adoption the Magistrate passing the order has to determine the exact date of birth, which he can do on the basis of relevant proof or declaration from the natural parents and in their absence, on the basis of the certificate granted by the Chief Medical Officer. The Registrar, as he does in case of other court order, has to make an entry in the `remarks' column giving details of the court order (including date) while entering or correcting as per the particulars approved by the Magistrate. The RBD Act and Rules are silent on the question of determination of date and place of death of a missing person, therefore the date determined by the Court in a declaratory suit, as may be filed for this purpose can be relied upon. As prescribed in Section 23 of the R.B.D. Act, 1969. Refer Officers directory in the website of this Directorate.
<urn:uuid:fc17c9b7-facd-4f80-b507-8522feabd454>
CC-MAIN-2017-04
http://des.delhigovt.nic.in/Vital/faq.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00115-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94226
2,291
2.53125
3
N. Indiana city facing disabilities access deadline Officials in a northern Indiana city are working on plans on how to make City Hall and other municipal buildings more accessible to those with disabilities. It's a problem cities, towns and counties throughout the country are facing as a Dec. 31 deadline approaches to submit long-range plans to the federal government for fixing inadequacies in local buildings. The Elkhart Truth reports the Elkhart City Council will review a priority list of proposed improvements later this month before submitting the plan. It is estimated it would cost Elkhart about $9.6 million to make all the needed repairs. Among the biggest concerns are an elevator in City Hall with a door that too narrow to accommodate modern wheelchairs and a lift that is unreliable. (Copyright 2012 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.)
<urn:uuid:6e19afa0-0ea1-4a62-a556-c1b205aebcbe>
CC-MAIN-2017-04
http://www.wthr.com/article/n-indiana-city-facing-disabilities-access-deadline
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00037-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941235
180
1.609375
2
A Danish newspaper has printed cartoons about the Holocaust commissioned by Iran after cartoons of the Prophet Muhammad triggered violent protests. The original cartoons are on display in Tehran The newspaper - Information - published six of the cartoons, which are on display in the Iranian capital, Tehran. Several of the cartoons contrast the plight of the Palestinians with that of the victims of the Holocaust. Editor-in-chief Palle Weis said he had thought carefully about publishing the cartoons and said it was not a stunt. He told the BBC the cartoons accompanied a news story about the exhibition. He said they were "tasteless but predictable". Another Danish newspaper, Jyllands-Posten, sparked the international row last year after it published cartoons of the Prophet Muhammad, including one of him wearing a bomb on his head. There were angry protests in Europe, the Middle East, and other parts of the world, in which at least 50 people died. In response, a competition was organised in Iran inviting people to draw cartoons about the Holocaust. Organisers said they were testing the West's commitment to freedom of speech. Information said it had decided to print the cartoons after consulting the main rabbi in Copenhagen. "He said he had seen worse examples," editor-in-chief Mr Weis told the BBC. "They are tasteless but predictable... they're pretty harmless. I don't think they would be called great art." One of the cartoons, by a Moroccan cartoonist, shows a scene bisected by the barrier being constructed in the West Bank by Israel. On one side, a gravestone reading "Holocaust" and bearing a Star of David stands in the sunshine. Underneath the ground is buried a single skull. On the other side, it is night-time. A gravestone here says "Sabra and Shatila" - a reference to infamous massacres carried out in Lebanon in 1982 by Lebanese Christian militiamen allied to Israel - underneath a Palestinian flag. Underneath the ground are buried scores of skulls. Mr Weis said he was not nervous about his readers' reactions to the decision to print a selection of the cartoons. He said an interview with the rabbi was published alongside the cartoons, and an editorial inside explained the decision. "Our readers would be disappointed if we didn't print the cartoons," Mr Weis said.
<urn:uuid:c35f5042-8248-41a3-9747-4a4fc81e090d>
CC-MAIN-2017-04
http://news.bbc.co.uk/2/hi/europe/5327852.stm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00110-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974606
483
2.359375
2
Building huge hillside homes — and steep resentment — in Bel-Air When Joseph Horacek III looks at the “Starship Enterprise” — as he calls the mansion going up above his low-slung, Balinese-inspired contemporary in Bel-Air — visual pollution isn’t his primary concern. The veteran entertainment attorney is afraid the whole thing will come sliding down the hill and crush his household. With post-recession construction booming on the Westside, architects are building up and under: creating wine cellars and subterranean bowling alleys, altering slopes and ridgelines. Convoys of dirt haulers and cement mixers compete with residents for space on the narrow roads winding through Bel-Air and Trousdale Estates. Some of the vehicles have sheared tree branches, crumpled utility boxes and toppled stop signs. Atop those more mundane problems, homeowners worry that there is a real risk their hillsides are being destabilized. “No one is protecting our community,” said Fred Rosen, former chief executive of Ticketmaster and co-founder of the Bel Air Homeowners Alliance, which wants the city of Los Angeles to impose stricter limits on construction. When building codes were implemented, no one anticipated the enormous residential projects in the hills, Rosen said. Planners and engineers could not have envisioned the need for caisson foundations and vast retaining walls. “We have 2014 technology with 1980 regulations,” Rosen said. “They approve sites on top of each other, without understanding the consequences and collateral damage for the neighborhood. “You can buy a 3,000-square-foot house, regrade the lot and make a 35,000- to 40,000-square-foot house,” he said. Robert Steinbach, chief of the Los Angeles Department of Building and Safety’s inspection bureau, said the agency works to minimize construction-related traffic and disruptions. But summer is prime season for builders. “Right now you’re talking about a nuisance issue because people see and hear idling trucks and they worry about fire and rescue vehicles,” he said. “But if they do [the construction work] in the rainy season, you’re talking about really dangerous effects. “So it’s the lesser of the evils.” Building officials say their role is to make sure that properties are built safely, but they also note that city codes allow construction of huge homes, even in hillside areas. Residents became more vocal about their concerns after separate but eerily similar accidents earlier this year that killed two Los Angeles police officers on steep Loma Vista Drive in Beverly Hills’ Trousdale Estates. After the second incident, in which an out-of-control cement truck struck an off-duty detective’s pickup, Beverly Hills imposed a 30-day moratorium on haulers weighing more than three tons. Contractors now are required to have the vehicles inspected by police, and they may travel to and from job sites only on pre-approved routes. Beverly Hills’ City Council also stopped new grading on hillside properties until tighter construction rules could be put into place. Los Angeles, Rosen said, has been slower to react to the construction-related perils. Until recently, he and fellow crusaders, including actor Leonard Nimoy and director William Friedkin, had saved their harshest criticism for Los Angeles Councilman Paul Koretz, saying he had ignored the ramifications of a “construction bombardment.” Koretz countered that he has worked closely with the Bel-Air Assn., a longtime neighborhood group that in July wrote him a letter of support. “We’re aware of a new problem that never existed anywhere in the city,” Koretz said. “We’re looking at legislative fixes. … We have to get more of a handle.” On July 30, he introduced two motions to strengthen the city’s hillside ordinance, which was implemented in 2011 to rein in some of the more daring slope-side building. One would potentially limit exemptions for developers seeking to grade hillsides and require more robust notification of neighbors. The other would be aimed at developing more proactive inspections and enforcement of building and haul route rules. According to a consultant Horacek hired, the multilevel “starship” project on Strada Vecchia is at least 61 feet tall, 25 feet above the maximum. (The size, at 30,000 square feet or so, is not that outlandish by today’s standards, Horacek acknowledged. A home going up nearby is thought to be more than 85,000 square feet.) He said chunks of the hillside outside his front door already have cascaded onto his street. In an appeal filed with Los Angeles, Horacek contended that developer Mohamed Hadid had unlawfully demolished the existing house, had not obtained appropriate permits for the residence he is building on spec and had improperly altered the hill’s topography. Last month, Koretz sent a letter to city officials saying in part: “It is hard to believe that a project that looks more like the Getty Center than a home could have been built without a single discretionary entitlement or public input — not even a mere haul route.” Building officials then ordered Hadid to stop construction and told him they intended to revoke his permits because of multiple violations. The matter remains under investigation. Benjamin Reznik, Hadid’s attorney, said a surveyor has filed revised topographical and grading documents with the city and that the project “is within the legal limits.” Hadid, who has appeared on “Shahs of Sunset” and “The Real Housewives of Beverly Hills,” said in an interview that the trend toward larger homes would end up benefiting the city by expanding its tax rolls. “It might not be good for the neighbors for a little bit,” Hadid said, “but values go up.” The stories shaping California Get up to speed with our Essential California newsletter, sent six days a week. You may occasionally receive promotional content from the Los Angeles Times.
<urn:uuid:0b0c11dd-e093-4cbc-b4a5-bc8d65bb4296>
CC-MAIN-2022-33
https://www.latimes.com/local/westside/la-me-hillside-homes-20140830-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00077.warc.gz
en
0.95659
1,299
1.648438
2
Simply, the web service involves an application, software, or/and cloud technology, use of standardized web protocols for communication, interoperation, and data exchange through messaging. In a different manner, the web service is XML-centered system for data exchange through A-2-A communication. The process should have a collection of objects, documents, programs, and messages. web design service in USA and everywhere are here to help you in different forms. Such services are globally accessible. There are multiple technical enhancements, but still, web services sometimes are complicated to deal with due to testing involved in it. However, the entire process is linked and designed properly but, the system failure can be faced to disturb the entire operation. To get advanced features, flexibility, and functions, the use of APIs comes across. There is too much behind. It is quite complicated and to understand the use of web services in daily life, one needs to understand one by one. Underneath mentioned breakdown will help you to better understand the concept of web services. An Introduction to Web Services Web services are comprised of functions listed underneath - Web services are available through the internet or via internet networks - The messaging system in it through standardized XML - Independent over a single programming language or a single operating system - The web service had a Self-describing feature with the use of XML language - Executable via an easy and simplified location method How Web Services Work A web service will run between two sets of applications within a network, these applications are PHP, Java, and .Net. For instance, an app over Java runs with .Net, Java, and PHP with communication of web service through independent language. There are different benefits of web services all-around to deal with business operations. Web architects and IT pros take advantage of such technologies to get a complete web service along with minimal development time and cost. Over the entire network in B2B operation where both sides are aware of the process execution, web services are helpful for technology and data distribution. Different Variations of Web Services - The XML-RPC is considered as most common and basic XML protocol for exchanging data through a network over multiple devices with the use of HTML for quick and secure data communication over the network. - UDDI, again an XML-based standard protocol for publishing and detailing the web service, the goal behind using this standard is streamlining e-commerce and digital transactions within systems of companies. - SOAP is also an XML-based protocol for web service being used to exchange data as well as documents via HTTP / SMTP (Simple Mail Transfer Protocol). The communication will be done using XML. - REST is for providing communication between devices for API-based tasks with the use of the internet. HTTP is being used as a supportive protocol. How Web Design Services Can be Helpful APIs and web services are quite similar in functions. Modern web services are evolved the interoperability and system integration. To avoid the burdensome operations of web functions so that less complexity will be faced by you, you need to look for the best web design service in USA. Qdexi Technology can be your right partner in this scene. The brand is working for years to offer world-class web design services.
<urn:uuid:8b3173c1-76f5-4ea8-bcc3-d108b81a28e3>
CC-MAIN-2022-33
https://www.qdexitechnology.com/understanding-web-services-with-examples-along-with-its-importance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00469.warc.gz
en
0.930712
666
3.234375
3
Definitions for old world flycatcher This page provides all possible meanings and translations of the word old world flycatcher Old World flycatcher, true flycatcher, flycatcher(noun) any of a large group of small songbirds that feed on insects taken on the wing Old World flycatcher(Noun) A small passerine bird of the family Muscicapidae. Old World flycatcher The Old World flycatcher family Muscicapidae is a large family of small passerine birds mostly restricted to the Old World. These are mainly small arboreal insectivores, many of which, as the name implies, take their prey on the wing. The numerical value of old world flycatcher in Chaldean Numerology is: 8 The numerical value of old world flycatcher in Pythagorean Numerology is: 6 Images & Illustrations of old world flycatcher Find a translation for the old world flycatcher definition in other languages: Select another language: Discuss these old world flycatcher definitions with the community: Word of the Day Would you like us to send you a FREE new word definition delivered to your inbox daily? Use the citation below to add this definition to your bibliography: "old world flycatcher." Definitions.net. STANDS4 LLC, 2017. Web. 21 Jan. 2017. <http://www.definitions.net/definition/old world flycatcher>.
<urn:uuid:76f2ee00-9ec6-40b7-80bc-30237c18f678>
CC-MAIN-2017-04
http://www.definitions.net/definition/old%20world%20flycatcher
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00220-ip-10-171-10-70.ec2.internal.warc.gz
en
0.768439
317
2.875
3
Hosea 2:23 “I will sow her for Myself in the land. I will also have compassion on her who had not obtained compassion, And I will say to those who were not My people, ‘You are My people!’ And they will say, ‘You are my God!'” “Torn between two lovers” – stinging lyrics from the seventies era, based on the story of Dr. Zhivago. How can anyone profess to hold two lovers with the same regard? Is this selfishness or something deeper? God created us in His image. He also put within each soul a need for Him, to be loved by Him, and to love Him back. Because He is the author of love, He’s endowed us with the capacity to love others. However, we’ll miss the mark on loving others purely until we grasp God’s love for us. Most of us love selfishly – to get needs met. How beautiful love is when it’s only desire is to impart beauty and edification into another person. The desire to love outside the boundaries of a covenant relationship is idolatry. You may be thinking I meant to say adultery. Yes, it is adultery. And idolatry too. An overriding passion charges ahead in extreme measures to get satisfaction. It exalts pleasure over another person’s well being, even to the point of destroying relationships. At the center of the pleasure is self. When self needs are all consuming, they become idolatrous. “Me, myself, and I” gets the top priority of every decision and action. God is absent from consultations for advice. Anyone’s effort to stop the passion and lust is met with arrogance and defiance – a recipe for disaster. The Book of Hosea parallels the adulterous wife of Hosea the prophet, and the adulterous relationship Israel had with God. Just as Hosea’s wife took other lovers while married, Israel worshipped other gods. She bowed to numerous idols and forsook the God who’d covenanted her as “His people, his children.” Eventually, God allowed great disaster to result from their idolatry. Neither Hosea nor God threw away the people they had covenanted to love. Hosea bought his bride off a slave block. God did the same for Israel. He wooed her back to Himself. The same is true today. God paid for our slavery to sin and idolatry with the blood of His Son. He doesn’t take lightly our idolatry or adultery. Yet, He’s still in the business of wooing us back. Forgiveness and restoration are the essence of His being. Like Israel, we are idolaters and adulterers, but He is the Lover who won’t let go.
<urn:uuid:6c8f37ba-4088-4836-97f2-8b4cd5b85267>
CC-MAIN-2022-33
https://dawnmooring.com/torn-love/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00074.warc.gz
en
0.96902
606
1.976563
2
Can video game addiction cause death? Video game addiction statistics The French gaming site, jeuxjeuxjeux recently sent me this cool graphic about video game addiction. They specialize in games development, and wanted to draw people’s attention to video game addiction. I also think that it’s important that we recognize how real this kind of addiction is. The main source of their research was the On-Line Gamers Anonymous website (olganon.org) . You may have heard of some of these statistics before … but just take a look at them now! Infographic by JeuxJeuxJeux.fr Effects of video game addiction Some people think that video game addiction should not be included as a psycho-somatic illness in the Diagnositic and Statistical Manual of Mental Disorders. But it seems pretty clear to me that video game addiction can have some very serious consequences. What do you think? Should we taking gaming addiction more seriously? How real is the threat of cuasing harm because of video games? Are people who are harming others predisposed to violence or is their violence brought on by gaming?
<urn:uuid:4abd2ac2-c872-49d6-af7d-a896f2292f98>
CC-MAIN-2017-04
http://internet.addictionblog.org/can-video-game-addiction-cause-death/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00027-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955514
232
2.4375
2
We often forget the importance of focus in life. Not some stupid concept around keeping focus while reading, writing or the sundry work-life applications that every self-help author touts, but real focus. We can consolidate our eyes and minds to a singular thing or task with little effort, if we apply ourselves just a bit. True focus is much harder to achieve. True focus demands an attentiveness to Life (Big L) that we easily forget. Focus, as I think of it anyway, is the same in life as in photography. We can choose one thing to focus on over all, or focus on everything at once and lose the details, right? I look at it more as composition. Your focus lies in what you see in the image, not in what’s sharp. It’s so much more satisfying, isn’t it? Far less demanding and anxiety inducing. You can pull in close and point out how out of focus the above photo is, or see the dots and marred film indicating I didn’t take good care of the negative. But when I look at that photo, I only remember the feelings that brought me to that moment, the cold wind on my sweaty back, and the unflappable grin on my face as I watched the sun rise. Focus simply demands you to live your life intentionally, with purpose, and with enough clarity for your own needs. We don’t all need to know exactly where we’re going all the time. I’m only 24 years old at the time of writing, and I have a real vague idea of what my Life will be, but it’s clear enough for me. Others have questioned that, made me feel like I didn’t measure up, or like I needed a plan and solid goal. I’m happy with what I’ve got right now. A goal for the next year, tentative plans to get a tattoo in the near future, and a long term dream that may or may not come true. Until such time as something bigger happens in my life, I’m content where I’m at, and that feels like real focus to me. Maybe I’ll run away and never come back. Maybe I’ll stay where I’m at until I’m old, gray, and cracked with wrinkles. Maybe I’ll get distracted by the wind, waves, and tides of human emotion, but I’ll always return to my own self. In the meantime, thanks for reading or coming by for some pretty pictures, and enjoy a brief respite from the world around us.
<urn:uuid:4627afcc-fe9e-4ff1-badd-829ebc480b29>
CC-MAIN-2022-33
https://analogbrainnet.wordpress.com/2020/05/28/focus-or-the-art-of-never-coming-back-again/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00077.warc.gz
en
0.956452
556
1.523438
2
By Tom Major We live in a world that loves its personal devices ... in some cases, very personal. Sales of sex toys are booming, with an estimated 1 million items bought by Australians every year, and the number is only forecast to grow. But quality is not keeping pace with quantity, leaving a massive gap in the market for well-designed, high-value products. RMIT lecturer, Judith Glover, believes she has at least part of the solution – one that might even position Australia at the forefront of a surging industry. The former boilermaker recently ran the world's first university course on sex-toys, teaching Melbourne students how to apply industrial design principles to intimate appliances. "I get a bit frustrated because you go to the Milan Furniture Fair and there's another thousand chairs, but there's no product for male erectile dysfunction, which is a massive relationship killer," Dr Glover said. "The porn industry still controls most designs, and the majority of their product is poor quality, high-mark-up stuff made in China – some of it dangerous. "My idea was to bring proper industrial design principles to the sex industry, and challenge the large players who were recycling the same tired old products and ideas." Dr Glover believes she has the world's only PhD in sex toy design. Her doctorate focused on the role industrial design methods should play in crafting safe, user-friendly sex products. She believes there's a new buzz in the industry, pointing to a ready supply of cashed-up, discerning female consumers fuelling demand for better designs. "The money … is with the over-50s female market, and it's not being catered for because society doesn't want to think of women as sexual figures at that age," she said. The market is potentially huge – a Hewson Group research report titled Women, Sex and Shopping, estimated substandard products, misdirected advertising and adult industry indifference to female consumers meant there could be $US30 billion of unmet demand. The Future Sex design studio is the brainchild of Dr Glover and student, Victoria Cullen. Fourteen undergraduates completed the 12-week studio course in 2015, creating designs addressing a range of sexual functions. Ms Cullen, 26, first became interested in sex toy design during a trip to Copenhagen in 2013, where she worked with 3D printing start-ups based out of hacker spaces in the Danish capital. The money … is with the over-50s female market, and it's not being catered for because society doesn't want to think of women as sexual figures at that age.RMIT lecturer, Dr Judith Glover "I was interested in what customers of these start-ups were saying, and how open people in Copenhagen felt about sex generally, so I researched the industry and discovered the way it works," Ms Cullen said. Moving to Melbourne later that year she met Dr Glover, and together they created the Future Sex studio, combining sexual function and health with industrial design methods. "We basically gave students free rein to make what they wanted; in this studio they had the chance to really design something quite innovative," Dr Glover said. "Really good concepts" included pelvic floor exercisers and vibrators for older women, she said. Student Beatrice Preston Zly, 21, said the course opened her eyes to the market possibilities for sex design as she researched her topic of sexual stress in young women. "I learnt a lot about sexual trauma – for women sex is very connected to the brain – and the ways to make the connection stronger using scent, sound and meditation," she said. Sex Party federal MP Fiona Patten, former CEO of the Eros Association, said the boom in the industry had a long way to run. "Generally vibrators and sex toys are not something people latch on to when they first start to be sexually active. With that ageing population we are seeing a growth in sex toys. "In the early '90s most vibrators featured big veins … these days you could have one on your coffee table and no one would know what it was … there are colours to to match every decor." Dr Glover said though designers are starting to make their mark in the industry, there's still a long way to go. "By 2008 (designers) captured about 8 per cent of the market," Dr Glover said. "That's not much, but globally they're competing against giant American companies who've been around since the 1970s." Most of these designers are based in north-western Europe, but in time it's hoped that by creating high-quality, innovative products Australian designers can gain a foothold and earn a slice of the market and make the world a happier place at the same time. "The importance of sexual health across your whole life is huge. Some people start off with problems they never lose and have to deal with, which causes mental health issues," Dr Glover said. "How you feel about your sexual function is fundamental to a person's sense of happiness."
<urn:uuid:9362852b-8c0e-4afe-9b19-9f2546965fea>
CC-MAIN-2022-33
https://www.smh.com.au/national/melbournes-rmit-university-runs-design-course-on-how-to-make-sex-toys-20151224-glulcj.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00478.warc.gz
en
0.974778
1,033
1.570313
2
You have probably heard how Netflix (NASDAQ:NFLX) co-founder and CEO Reed Hastings came up with a new video rental model when Blockbuster charged him $40 for an overdue rental of Apollo 13. Armed with the $750 million he got from selling his first start-up business, Hastings went on to pioneer the DVD-by-mail business and then the digital video-streaming market, destroying Blockbuster along the way. And who can forget the Qwikster incident? As the streaming service started to take off, Netflix decided to split off the DVD-mailer service into a completely separate business under the Qwikster name, charging subscribers independent monthly fees for DVD and streaming services. The customer backlash was immediate and intense, and Hastings quickly dropped the Qwikster label. But did you notice that the Netflix you see today is very close to the original Qwikster idea? DVD mailers are now sold under the new brand of DVD.com, while the Netflix name continues to represent the leading digital streaming service. Even if you already knew all of that, I'm sure you'll find some fresh nuggets among the following 12 fascinating Netflix facts. - The first version of Netflix wasn't a subscription service at all. Instead, customers way back in 1998 paid $4per DVD rental plus $2 in mailing fees. - The DVD subscription service was born in 1999.For a flat monthly fee of $16, subscribers to the so-called NetFlix.comMarquee program could enjoy four DVD rentals per month and no late fees. - The price of a basic DVD player dropped below $300 in 1999,but VHS tapes still ruled the video rental market. Netflix was breaking new ground with this newfangled DVD-based idea. - The first attempt at online video streaming was made in early 2007. Subscribers to the DVD service were treated to a limited amount of digital streaming, ranging from six to 18 hours per month depending on which DVD plan you were using. The digital catalog held only about 1,000 titles at the time, but it was all included as a bonus feature at no additional cost. - One year later, Netflix allowed unlimited streaming alongside all but the lowest-cost DVD plan. The catalog had grown to 6,000 titles, and the necessary high-speed broadband connections were available in 55% of American homes. - Right before the Qwikster debacle,Netflix sported 24.6 million domestic subscribers and another 967,000 customers in the recently launched Canadian market. In the next quarterly report, the total count of unique domestic subscribers had fallen to 23.8 million. Some 11.6 million users were paying for both DVD and streaming services, 9.9 million opted for only the streaming service, and 2.3 million held on to just the familiar DVD-mailer experience. - Five years later,Netflix now has 47.5 million domestic streaming subscribers and 39.3 million international customers. The DVD business has dwindled to 4.3 million users. - Netflix opened shop in Canada in 2010, followed by Latin America and the Caribbean in 2011. Streaming services launched across the British Isles and Scandinavia in 2012. The Netherlands followed suit in 2013, another six European markets got the green light in 2014, and 2015 filled in some blanks in Japan, Australia, New Zealand, and three more Western European markets. A global rollout followed in early 2016. Netflix is now available everywhere except for China, North Korea, Syria, and Crimea. - Nowadays, the U.S. streaming catalog holds 4,100 movies and 46,720 episodes of TV series. The shows are organized into 2,700 seasons of 1,300 different series, according to the independent Instant Watcher service. - Fully 90% of the movies and 85% of the shows can be streamed in 1080p "Super HD" quality or above, including 53 films and 69 serial seasons in the 4K-quality "Ultra HD" format. - In 2014, I was able to watch and rank everything Netflix had ever published as a Netflix Original, picking Little Steven vehicle Lilyhammer as the best of the bunch. Now, I'm lucky if I find the time to keep up with the Netflix Originals that are closest to my heart (and sadly, Lilyhammer was canceled after three seasons). - The company is spending about $1.3 billion on original productions in 2016, and content guru Ted Sarandos wants to step this expense up to about half of the annual $6 billion content budget in the near future. Ain't nobody got time for that -- but Netflix hopes that almost everybody will find something in this content flood to hold their fee-paying interest for the long run. Next up, Netflix has promised to scale back its operating costs and start to make a large profit in 2017 and beyond. We still don't know exactly how big the annual bottom-line earnings might be, but Hastings will probably set up the goalposts in the fourth-quarter report, due in the middle of January. Keep an eye out for that potentially game-changing moment. Anders Bylund owns shares of Netflix. The Motley Fool owns shares of and recommends Netflix. Try any of our Foolish newsletter services free for 30 days.
<urn:uuid:6f59c1ae-3a4f-4422-8d6f-3e0495e773d8>
CC-MAIN-2017-04
http://www.fool.com/investing/2016/12/21/12-fascinating-things-you-probably-didnt-know-abou.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00393-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94782
1,080
1.59375
2
New Zealand isn’t far from Australia, but when you get here it feels like it is a world away. It’s a little like we’ve been magically transported to home to the Northwest. It’s cooler, there’s rain, it’s green, and there are trees here in Christchurch. And it’s spring! Christchurch may be the most resilient town in the world. Two earthquakes, a magnitude 7.1 in September 2010 and a 6.3 five months later killed 168 people and leveled whole blocks in the downtown core. Nearly 11,000 people chose to leave Christchurch for good. Yet, there are signs of revival all over the downtown area where whole blocks have been restored or rebuilt. There are artworks throughout the downtown core that include sculptures honoring the indigenous Maori people.
<urn:uuid:387f7941-002b-4a30-a300-e1887d37dd25>
CC-MAIN-2022-33
https://rkcaton.com/2019/11/01/postcard-from-christchurch/?replytocom=712
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00265.warc.gz
en
0.941595
175
1.804688
2
Wheelbarrows to the rescue YOU might think Godwin Emefiele, the governor of Nigeria’s central bank, had problems enough. The collapsing oil price has slashed Nigeria’s export earnings. Foreign reserves have fallen from more than $40 billion early last year to just over $30 billion now. In response Mr Emefiele (pictured) devalued the local currency, the naira, in November and again in February. The devaluations are stoking inflation. Like many other central bankers in commodity-exporting countries, he is faced with the unenviable choice of raising rates despite the damage to an already faltering economy, or leaving them be despite rising inflation and a swooning currency. Unlike other central bankers, however, Mr Emefiele has decided to compound the awkwardness of his position by getting involved in industrial policy as well. In June the central bank said it would not provide foreign exchange for 41 categories of imports, ranging from wheelbarrows to private jets. The idea, Mr Emefiele says, is both to conserve dollars and to stimulate local manufacturing. “Central banks in developing countries like ours cannot sit idly by and concentrate only on price and monetary stability,” he argues. Yet manufacturing is not easy in a country plagued by power outages, poor roads and badly trained workers. In the past, protectionist policies have not spawned competitive industries, but lined the pockets of well-connected manufacturers. “If you ban imports, companies will either be forced to compromise on quality or cost,” complains one businessman. Another likely result is an increase in smuggling. Nigeria’s imports of cars have plummeted as a 70% tariff imposed by the previous government is phased in. Mysteriously, those to the tiny nearby countries of Benin and Togo have soared. Mr Emefiele’s efforts to prop up the naira also look counterproductive. He has managed to keep it at about 199 to the dollar since March. In theory, imports of the 41 proscribed items aside, it remains fully convertible. But the central bank has imposed all sorts of restrictions on currency trading, dollar deposits and cashpoint withdrawals in foreign currencies. It justifies this by saying that speculators are distorting the market. The result is that businesses are having a hard time getting hold of foreign exchange. Many have resorted to the black market, where the naira is sold at about 225 to the dollar (see chart). Others have simply cut imports and the jobs that rely on them. Isoken Ogiemwonyi, who runs a posh clothing shop in Lagos, has a new rule: “Anything imported, I can’t do.” The new regulations are also contributing to foreign investors’ disenchantment with Nigeria. JPMorgan, an investment bank, is threatening to boot the country from its government-bond index if it does not deregulate currency trading by the end of the year. That would prompt many foreigners to sell, raising borrowing costs and putting the naira under more pressure. As it is, Samir Gadio of Standard Chartered, a bank, reckons that foreigners sold a net $3 billion-4 billion of Nigerian bonds in the last quarter of 2014. They now hold less than 10% of the outstanding stock, compared with 27% in 2013. The central bank takes consolation in the fact that reserves have ticked up by a couple of billion dollars since May, though this may be attributed as much to stricter book-keeping under Nigeria’s new president as to Mr Emefiele’s efforts. Earlier this month Kazakhstan, another big oil exporter, unpegged its currency, prompting a mighty slide against the dollar. Mr Emefiele was unmoved.
<urn:uuid:f33b068b-6e97-42da-8464-6ea79d6efefb>
CC-MAIN-2017-04
http://worldupdates.in/wheelbarrows-to-the-rescue/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00347-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956522
785
1.703125
2
With a population of 77,508 people as of 2010, Makilala is a 1st-class municipality in the province of Cotabato in the Philippines. Formerly a barangay named “Lamitan”, it was created by virtue of Executive Order No. 63 issued by the then President Ramon Magsaysay. The name “Makilala” is coined from the names of the early barangays Malasila, Kisante and Lamitan. If you are wondering about the additional “la”, this is to match the Tagalog word that means “to be known”. Like other places in the country, Makilala also boasts of great things that travelers and holidaymakers would enjoy. If it is included in your itinerary for your next trip, here are some tips to consider: Tourist Attractions and Landmarks The Foothills of Mount Apo This area, especially the Mt. Apo National Park, contains several waterfalls, which are mostly hidden away in its old-growth forest. However, two of the tallest waterfalls, the Padalagi and the Matibago, are visible from the national highway. As of now, take note that access to these waterfalls are still not tourist-friendly, and you have to do hard trekking to get to them. Also situated within the parameters of Mt. Apo National Park, this barangay is elevated 1,600 feet above sea level. It is a starting point for hikers who want to reach the peak of Mt. Apo and is home to a troop of monkeys that are used to interacting with humans. Furthermore, the New Israel Eco Park has the longest zip line. Found in the neighboring barangay of Batasan, the waterfalls has a collection of hot and cold natural pools that are found along the Malasila river. Its hot sulfuric pools are known for having some healing effects. Le Reve Resort Located along the national highway, this is an inland resort that is known for using un-chlorinated spring water that is sourced from Mt. Apo’s foothills. Don Bosco Youth Camp This is located in Batasan and is a favorite venue for events, such as conferences, seminars and weddings. Cajelo and Aurora Camps These camps are located along the national highway in Barangay Bulatukan and are known as the venues for the province’s annual scouting events. Other Beautiful Sights There are many access roads to Makilala’s many barangays, which make for a great mountain biking experience, with varying levels of difficulty. Makilala is known for having specialty food that can certainly satisfy your gastronomic cravings. Aside from some familiar food in the Philippines, such as mongo soup, green mango salad, steamed freshwater prawns or “ulang”, grilled catfish or “hito”, the place is also known for its grilled tuna belly. You can also find fruits that other provinces in Mindanao are popular for, such as durian and mangosteen. The climatic condition of the municipality is characterized by rainfall that is evenly distributed throughout the year, which means that springs will keep flowing, rivers will be kept alive and farms will keep producing. The slopes of mountains, such as Mt. Libadan, Mt. Niponggis, Mt. Gap and Mt. Apo, serve as rain generators providing a dependable rainfall pattern and cool climate. How to Get There Makilala can be accessed from several airports, including the Dugong Airport (which is approximately 27 kilometers away), the Tawitawi Airport (which is approximately 52 kilometers away), the Davao Airport (which is approximately 64 kilometers away), the Surallah Airport (which is approximately 75 kilometers away) and the General Santos Airport (which is approximately 95 kilometers away). From these terminals, you can take several options on land transportation to Makilala, including taxis, car rentals and public utility vehicles.
<urn:uuid:1216e606-91da-47ff-802d-8b9a7424232f>
CC-MAIN-2017-04
http://triptheislands.com/off-the-beaten-path/exploring-the-beautiful-place-of-makilala-north-cotabato/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00317-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966192
847
1.617188
2
A topic that will likely be addressed at your next next health insurance renewal meeting is likely going to be: Who will pay the Affordable Care Act related fees? Will it be the employees, employers… or both? Let’s find out more about what each of these ACA fees are and how much they will cost you: Insurer Fee or Health Insurance Industry Tax: This tax is funding people who purchase health insurance on the marketplace and qualify for tax credits. - This fee is permanent and is paid on an annual basis. - This fee is about 2.5% of the total health premium. If your group plan is running at $500,000 a year, then that is about $12,500 in additional costs. Some of the carriers will show this fee as a part of your premium statement, while others will embed it in the total cost. The Risk Adjustment Fee: This tax is on small group health plans and individual health plans to redistribute premiums from low-risk to high-risk policyholders. - This is a permanent tax and is about $66 per subscriber. - This tax is also either embedded or a line item on your premium statement. Anthem shows the line item while UnitedHealthcare (UHC) embeds it. This tax is to be used to help carriers offset claims in high risk areas. For example, Lake County may have higher premiums than Hamilton County. These funds would then be distributed to carriers that continue to insure Lake County despite losses. Transitional Reinsurance Fee: The transitional reinsurance fee impacts both fully insured and self-funded group health plans. - This fee is collected for the years of 2014-2016. - Estimated at $5 a month per member. This fee is to help Individual carriers offset claims both on and off the exchange. Patient-Centered Outcomes Research Institute (PCORI) Fee: This fee impacts both fully insured and self-funded groups. - This fee runs about $1 -$2 per member. - This fee started in 2012 and will go until 2019. The fee funds research that evaluates and compares health outcomes, clinical effectiveness, and risks and benefits of medical treatments and services. Note: Per member means total number of people on the plan. Who Covers the New Costs? So now the big question is: Who is going to pay these new costs? Should it be passed to the employee, absorbed by the owner, or split up into current contribution levels? When we look at UHC’s billing, all of the fees for the fully insured groups are being embedded. For them, it is most likely to go into the contribution split. In Anthem’s case, it is showing as a line item. The cost could be passed onto the employee or be covered in full by the company. On self-funded plans, the situation is very different. Some of the carriers and third-party administrators are not collecting the fees. Instead, they are passing that responsibility on to the client. They are stating that because the group knows the accurate information on employee count, they would be best at determining the correct amount. In 2018, the excise tax, or Cadillac Tax on high-value health plans, will be in effect. If your health plans cost more than a certain threshold, then a tax of 40% is applied. We are still waiting to find out what that threshold will be. Originally, the government set it at $10,200 for single coverage and $27,500 for family. If I understand correctly, if you had a group policy where the family cost was $35,000, then the issuer could be taxed an additional $3,200. This tax will have a huge impact on what kind of plans are offered by employers. If you have any questions regarding the new fees please contact me, Tony Nefouse, at (800) 846-8615 and we can discuss them further.
<urn:uuid:bd2e2951-dcff-4428-9490-bf43bce9a81c>
CC-MAIN-2022-33
https://nefousehealthinsurance.com/who-pays-the-aca-related-costs-for-group-plans/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00072.warc.gz
en
0.952716
820
1.78125
2
Social Security is a great American institution. Since it was created in 1935, Social Security has given America's seniors a secure, dignified retirement. But a crisis is looming that threatens the very foundation of the Social Security system. In just 12 years, Social Security will be paying out more in retiree benefits than it receives in payroll taxes from working Americans. And the problem will only get worse with each passing year—much worse. Without reform, we are on a path to benefit cuts and tax increases the likes of which the American people have never seen before. Generations Together is dedicated to reforming Social Security for the seniors of today, for the workers of tomorrow, and for generations to come. We believe in a secure retirement for Americans of every walk of life and of every generation.
<urn:uuid:a3c8976f-95be-4549-b4e0-f9cd0f1b437e>
CC-MAIN-2016-44
http://generationstogether.net/index.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00561-ip-10-171-6-4.ec2.internal.warc.gz
en
0.956066
160
2.015625
2
To prepare all students to be life-long learners and responsible citizens. - education is the shared responsibility of students, school, home, and community. - investing in the education of our children benefits the community. - all students love to learn and are capable of life-long learning. - a balanced education develops a student intellectually, socially, physically, emotionally, and creatively. - all students are entitled to instructional excellence. - students learn best in a safe, healthy, and supportive environment. - students learn best when they are actively engaged in their own learning. - mutual respect, personal dignity, and social responsibility are essential. - education is key to responsible global citizenship.
<urn:uuid:a7b33793-0dee-44be-8069-a2ac46c3b5f2>
CC-MAIN-2017-04
http://graftonps.org/domain/573
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00154-ip-10-171-10-70.ec2.internal.warc.gz
en
0.934828
143
3.546875
4
Cyber cops and domain name registrars meet to tackle net crooks Tackling criminal activity on a borderless internet Cyber cops from both sides of the Atlantic are meeting with domain name registrars in Brussels today to try to figure out ways to crack down on internet crime. This second meeting of the "EU-US working group on cyber security and cybercrime" is dedicated to increasing cooperation between law enforcement agencies and the companies that unwittingly sell web addresses to online crooks, according to attendees. "We're trying to get both sides to communicate, so that we on our side have some idea what they're trying to achieve, and they on their side understand what we're able to do technically," said Michele Neylon, managing director of the Irish registrar Blacknight Solutions. The two-day consultation comes as police in the US and UK are increasingly turning their attention to domain names as an internet choke-point that can be used to shut down web sites selling counterfeit goods and enabling the trading of pirated movies and child pornography. The controversial Combating Online Infringement and Counterfeits Act (COICA), currently being discussed in the US, would codify the government's domain seizure powers. In the UK, the Serious Organised Crime Agency is pushing for a Nominet policy that would make it easier for police to shut down sites selling bogus goods. But the last two days of meetings in Brussels have focused on discussing ways to help law enforcement crack down on all types on cybercrime, and on ways the domain name industry can self-regulate through policies overseen by ICANN, according to Go Daddy general counsel Christine Jones and other attendees. Specifically, registrars are responding to recommendations made in October 2009 by the FBI, the Mounties, SOCA, and law enforcement agencies from Australia and New Zealand. The recommendations call on ICANN to conduct more rigorous due diligence before accrediting registrars, and to more aggressively police their conduct thereafter. Law enforcement is particularly interested in the Whois services that registrars have to provide, which enables anyone to quickly uncover the name, address and phone number of any domain name registrant. Cops don't like the proxy/privacy add-on services that many registrars offer to shield their customers' personal data from prying eyes. They want these services either banned or regulated through ICANN, using an accreditation program similar to the one used to approve registrars. Only private individuals engaged in non-commercial activities would be allowed to use privacy services, under these proposals. They also want ICANN to force registrars to collect more validated data about their customers, and to more effectively control their reseller networks. Registrars have pushed back to an extent, partly because many of law enforcement's demands could be tricky and/or expensive to implement. "We take a pretty aggressive approach to these issues already, so it would not be particularly burdensome for Go Daddy, but it could be for some of the smaller registrars that perhaps don't have the resources," said Jones. A major issue is that obtaining an ICANN registrar accreditation is fairly easy, quite cheap, and as a result there are almost 1,000 approved registrars. Many of these are simply shell companies, and some do not make even basic efforts to comply with ICANN's existing rules. Complicating matters, some registrars have thousands of resellers, which are not directly bound by ICANN contracts. As it stands, ICANN's compliance department barely has the resources to police its existing registrars; it has been without a senior director of compliance since July last year. In addition, the aftermath of recent US domain seizures has shown that when law enforcement grabs a .com domain, criminals quickly relocate their websites to country-code domains, which are not subject to ICANN oversight or US jurisdiction. With all this in mind, registrars have been discussing the best ways to help tackle the very real problem of criminal activity on a borderless internet. It's tricky. "There's no disagreement about the intent," Jean-Christophe Vignes, CEO of OpenRegistry, said from Brussels. "No self-respecting registrar, and certainly no registrar in the room, would say we don't want to fight crime. The question is: how do we get there?" The Brussels meeting is reportedly very well attended. Delegates include registrars representing a majority of the world's registered domain names, as well as law enforcement agencies from several European and North American countries. ®
<urn:uuid:2d9c23cb-3703-4918-b615-1e78b2c91a38>
CC-MAIN-2017-04
http://www.theregister.co.uk/2011/02/25/cyber_cops_meet_domain_name_registrars/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00137-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952589
947
1.578125
2
At their core, most technology companies are glorified toolmakers. The biggest difference between the large ones and the small ones is primarily the size of the problems they're trying to solve. For Apple -- one of the biggest and hottest companies in the tech industry -- it can afford to be picky about the opportunities it goes after. That's also part of the company's ethos. Steve Jobs once said, "I'm actually as proud of the things we haven't done as the things [we] have done. Innovation is saying 'no' to 1,000 things." However, Apple is about to say "yes" to another big opportunity. It's going to tackle one of tech's biggest problems: Your data. On Monday at its World Wide Developer Conference, Apple will unveil iCloud, which it calls its "upcoming cloud services offering." What will Apple announce? What is iCloud likely to be? There are lots of guesses: An online storage locker, a subscription music service, a cloud-based media streaming service, a wireless data syncing service. It depends on who you ask. Two of the best sources even have conflicting predictions. Leander Kahney, author of Inside Steve's Brain and veteran Mac columnist, says his sources indicate the coming of a new AirPort Express/Time Capsule that will serve as a personal server connecting to the cloud and allowing users to seemlessly connect their data between multiple computers and mobile devices. Meanwhile, Jon Gruber, who regularly comes through with reliable tips from inside Cupertino, argues iCloud will be an Internet-based replacement of iTunes that will allow computers, iPhones, iPads, and iPods to sync all of their media with the cloud instead of over USB. Before I share my predictions, let's not forget that Apple doesn't have a stellar reputation in cloud services. Whatever form iCloud takes, Apple will have some important obstacles to overcome. Apple's cloudy pastAs excited as people seem to be about iCloud, it's easy to forget that Apple has wanted to be a cloud services provider for a long time and has done multiple bellyflops. Apple has been in the cloud business for over a decade, long before we ever started calling it "the cloud." In 2000, Apple introduced iTools as a free service for Mac users. It offered a mac.com email address, a basic Web site (called HomePage), an online storage locker (iDisk), and a few more hokey services (like a online greeting card service called iCards). Since it was free, users didn't complain too badly about it, although many of them hoped Apple would do more with it. In 2002, Apple renamed the service .Mac, turned it into a paid subscription, and upgraded the @mac.com email service, iDisk, and HomePage. It also added a backup service and a McAfee antivirus scanner. However, Apple let the service languish and did little to develop it, other than a nice update to the email service in 2006 and a new Web Gallery photo sharing service in 2007. Overall, only a small subset of Mac users adopted it, and many of them complained about the price and rightly questioned Apple's commitment to the service. In 2008, the company turned the service into MobileMe, focusing on expanding the email service to include more advanced features as well as calendar and contacts. Apple dubbed it, "Exchange for the rest of us," referring to Microsoft Exchange Server, which most corporate employees used at the time. Apple wanted MobileMe to be a viable Exchange alternative for individuals and small business professionals. However, Google stole its thunder by enhancing Gmail and Google Apps, which even most Mac users prefer over MobileMe as an Exchange alternative. It didn't help that MobileMe suffered from a number outages and sync problems. Steve Jobs even admitted in an internal Apple email that MobileMe "was simply not up to Apple's standards." With iCloud, Apple looks ready to take another shot at relaunching the service. This time it will have to overcome its reliability issues, come up with better features than Google and Microsoft, and solve the issue of effectively syncing apps, data, and preferences across computers and mobile devices. What to expect from iCloudFor two years, Apple has been building one of the world's largest data centers -- bigger than almost any single data center we've seen from Google, Amazon, or Microsoft. This much-reported 500,000 square foot behemoth in Maiden, North Carolina came online this spring, just in time for the iCloud launch. Building something this large and ambitious says a lot about the scope of Apple's cloud plans. It's doubtful Apple would build something on this scale just to continue selling songs and videos on iTunes and keep MobileMe alive. It's much more likely that Apple has a series of plans for moving to cloud-based services in the years ahead, and we'll only hear about the beginning of those plans at WWDC 2011 on Monday. I expect to hear about a cloud-based music service, since Apple has reportedly already signed streaming deals with the major music companies. Users are tired of managing their music libraries. That's why services such Pandora, Rdio, Last.fm, and Spotify have become so popular in recent years. It's also why services such as Amazon Cloud Player and Google Music, which require users to upload their libraries, are cool but ultimately don't solve the problem of having to manage a bunch of files. Apple is likely to launch a service that will scan your library to give you access to all the music you already own, while also offering a subscription fee to listen to new music and to get a taste for other stuff you don't own. However, the more interesting question at WWDC will be what Apple does with MobileMe. The most potent thing Apple could do would be to take iDisk (a component of MobileMe) and expand it into a storage service that rivals Dropbox, but with much deeper integration into iOS and Mac OS X. And then, turn the MobileMe email and calendar into cloud-based services that offer the Google Docs-like capability of having the same messages or files open on multiple devices at once and enable real-time collaboration and syncing. Put those two services together and add in cloud hosting and access to multimedia files seamlessly across computers and devices and you've suddenly got a much more powerful way to handle your data. That's what I'm looking for with the launch of iCloud at WWDC. Of course, that would have serious implications for business and IT. For small businesses, this type of iCloud offering would streamline data management and reduce the need for systems integrators. In the corporate IT world, the iCloud service would have to be handled with kid gloves to make sure employees don't use it to store sensitive company information and cause data leakage. Still, Apple has the opportunity to connect the dots on data in a way that no other company has been able to do yet, and that could ultimately benefit professionals as well as consumers (especially if Apple pursues an enterprise version of the service). Finally, even if Apple introduces a bang-up cloud service at WWDC, the company is going to be forced to become more transparent and responsive to customers in order to be a good cloud provider. In an outage, it won't be able to act like it did with the iPhone 4 antenna issue or the recent Mac malware problem, where Apple hung back for a long time before even acknowledging the problem and then talking about a fix. In short, if Apple becomes a major cloud provider, it's going to have to change its ways. But, I have to think Apple would see that as a fair trade-off in order to solve a problem as big-and-hairy as this one. - Five big questions heading into Apple's WWDC (CNET) - What Is Steve Jobs Announcing Monday? Here's The Scoop About iCloud & Time Capsules (Cult of Mac) - WWDC 2011 Prelude (Daring Fireball) - My guesses on the huge changes Apple will unveil at WWDC (Kevin Fox) This was originally published on TechRepublic.
<urn:uuid:000790d6-c017-4ab7-8909-b1adcaed2ac4>
CC-MAIN-2017-04
http://www.zdnet.com/article/the-next-big-problem-apple-wants-to-tackle-your-data/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00514-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962064
1,665
1.78125
2
Image Source: PRESANS - Centralized Money, Decentralized Nation States, Distributed Tech In 2020, globalism is receding, giving way to aggressive nationalist movements. This trend harms globalists that benefit from a well integrated global economy. As global policy shifts towards isolationism and protectionism, globalists will turn to distributed technology as a haven for global commerce. A … Continue reading Is Distributed Tech Important In A World With More Nationalism? The year is 2032, America is holding it's Presidential election and citizens cast their votes using a publicly administered blockchain. They can do this because their digital identity is secured and authenticated by the governments newly adopted system of non-fungible tokens (NFT). In this system, voters receive a unique NFT, minted at their birth, which … Continue reading Non Fungible Tokens: Why You Should Follow Their Progress
<urn:uuid:0c4a6cb5-5ab3-457b-9858-967fdd916aee>
CC-MAIN-2022-33
https://dougantin.com/tag/blockchain/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00265.warc.gz
en
0.923856
179
1.914063
2
Neodymium – A Rare Earth Magnet with Unique Qualities Attracting Millions towards it Rarest of the rare earth magnet, Neodymium is used in one or the other form, it is just that we are not aware of it usage. There are many advantages and uses of this awesome piece invented by humans. This element is produced in two forms, and China is main source of supply of this material. - Sintered or powdered form - Bonded magnet process Sintered or powdered form is used extensively and produced around 100 times more then the bonded magnet process. Sintered form has high strength magnetic field than the bonded magnet. Curie temperature or the temperature at which a magnet loses its magnetic properties is same for both forms, which is approximately 310 to 400 degree Celsius. However, the Curie temperature can be raised after alloying the magnet with terbium and dysprosium. These magnets are called rare earth magnets but are not uncommon and found in abundance in the earth’s crust. These magnets are so strong that they do not lose their magnetic properties easily. The neodymium magnets are very useful, portable, strong and affordable, you can easily find them in items you use daily like headphones, hard disks, refrigerators etc. we can easily find neodymium disc magnets and neodymium ring magnets. Some of the common uses of neodymium magnets are below. - Healthcare industry – These rare earth magnets are used in MRI machines and other pain relieving equipments. - Security equipments – like alarms and switches - Computer equipments – such as hard disks - Cell phones - Electronic Toys - Some new inventions like Magnetic jewellery clasps and Magnetic building sets for children add to the fun element. - Mechanical as well as industrial applications Neodymium magnets are strongest and are used extensively in our everyday life. Below are some of the characteristics of this wonderful metal. - Corrosiveness – These are very corrosive in nature and need to be handled with utmost care. - Affordability and availability – This alloy is easily available and affordable, can be used easily in laboratories and research centres. - Structure – You can easily find this alloy in crystalline structures and tetragonal shape - These are possibly the strongest rare earth magnets. There are various risks also involved while using these magnets like a pair of these magnets can snap your fingers or these magnets can catch fire in higher temperatures. Therefore, it is necessary that you know all the safety measures to take while using Neodymium magnets, no matter what your purpose is. There are many manufacturers of Neodymium magnets, and you can buy them from one of the reputed companies in the market. These elements often come in different sizes and shapes, and with different coating. These days, market is swamped with a variety of Neo magnets. You could easily find ring shaped, disk shaped, or cylinder shaped objects. If you use this magnet with utmost care, then it remains as it is for a lifetime. If you want to learn more about Neo Magnets, click here.
<urn:uuid:d9b459f2-8f5b-49c3-b1f1-a2661a17dcaa>
CC-MAIN-2017-04
http://wsiwebefectivo.com/neodymium-a-rare-earth-magnet-with-unique-qualities-attracting-millions-towards-it.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00364-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933978
653
2.734375
3
Colombo, Nov 30 (newsin.asia) – A spate of hacks on WhatsApp accounts have spurred a decidedly unsettled buzz across the world. The hack takes control of your account by activating your mobile number on another device. Once this is done, the owner no longer has access to their account. For obvious reasons, this raises major concerns as the hacker effectively gains control of messages, shared images, files, contact details, passwords, banking and finance and other personal information. - WhatsApp Disappearing Messages goes live in India, here is how to use it - Facebook to bring voice and video calling to main app The hacking process The method used in this particular hack is very simple and does not involve any technical barriers for the hacker to surpass. It exploits the users’ gullibility to gain the access they require. It begins with a message from a known number/contact requesting a code that would have arrived via SMS. The SMS will contain a code that is required to activate WhatsApp when it is being installed. This is an automated message from the system and looks something like the following: If the code is shared, the hacker will gain full control of the WhatsApp account and the original user will not have access to their account. Activating two-step verification in WhatsApp WhatsApp introduced an added level of security in 2017. Although this is optional, it is highly recommended that users activate this. It will ask you to set an additional 6-digit pin code that should be entered the next time you install WhatsApp. If a hack attempt is made, it will be just a little harder to do so with the new pin code in place. To activate the two-step verification open WhatsApp and go to Settings -> Account -> two-step verification.
<urn:uuid:980537d1-8e91-42ca-97b6-c01895bc4ad7>
CC-MAIN-2022-33
https://newsin.asia/dont-fall-for-this-simple-trick-to-get-your-whatsapp-hacked/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00068.warc.gz
en
0.929661
367
1.898438
2
Who better than a talking oscilloscope to explain what frequency is and why it’s so important for radio and sound waves! Come learn with ADABOT in this episode of Circuit Playground: F is for Frequency. This Webby award-winning video collection exists to help teachers, librarians, and families spark kid wonder and curiosity. TKSST features smarter, more meaningful content than what's usually served up by YouTube's algorithms, and amplifies the creators who make that content. Curated, kid-friendly, independently-published. Support this mission by becoming a sustaining member today.
<urn:uuid:30cb630f-d604-4cb0-88f4-9e702a3c3b9b>
CC-MAIN-2022-33
https://thekidshouldseethis.com/post/circuit-playground-f-is-for-frequency
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00478.warc.gz
en
0.954866
123
2.765625
3
This week’s Monitor cover story on the spread of heroin addiction in idyllic suburbs was eye-opening – and hit close to home. My home. I’ve lived in Newburyport, Mass., for almost 10 years, and it is indeed the lovely, lively seacoast community that the article describes. Although the drug problem here is not openly visible to the average observer or resident, our local news has reported its increased incidence. And now the Monitor has made us aware that it’s just one instance of a more widespread epidemic. The article was informative in describing the challenges communities are facing, as well as the training and treatment already going on. But what grabbed my attention was a quote by a university professor who said he felt a spiritual component was needed in educating young people. That resonated with me as a Christian Scientist, since that’s how I pray about addiction and other problems confronting society. The teachings of Christian Science – and the healing found through practicing them – begin by recognizing the inherent spiritual nature of all men, women, and children. That standpoint helped my wife and me several years ago when we saw firsthand the negative effects of prescription medication. Our daughter experienced anxiety and sleeplessness when she first arrived at college, and so she accepted the easy solution among her peers – getting pills from the school infirmary. But the effects were debilitating and anything but beneficial. Visiting our daughter one weekend, we found her sedated, semiconscious, and unable to function normally. Our prayerful approach was key in turning the situation around. Today she is free from any effects of those addictive pills, and is free from taking any behavior-altering medication. She is grateful for that wake-up moment in her life. I have a friend who was enrolled in a 12-step program to overcome alcoholism and at the same time began studying Christian Science. Without question, the program he was in was an invaluable help in his recovery, but he told me that what he learned in Christian Science was a game changer. It showed him that he could be free not only from alcoholism – from the desire to drink – but also from the label that he was an alcoholic in the first place. That’s what prayer in Christian Science is. It starts by identifying us – labeling us – as a perfect spiritual idea created by an all-loving Father-Mother God. And when we realize that fact, we’re enabled to overcome adversity of any kind. So conquering addiction is not so much recovery, as it is discovery – discovering our true unassailable, unaddictable identity. Mary Baker Eddy, who founded this newspaper, wrote in the Christian Science textbook: “What is it that binds man with iron shackles to sin, sickness, and death? Whatever enslaves man is opposed to the divine government. Truth makes man free” (“Science and Health with Key to the Scriptures,” p. 225). It’s that recognition of God’s absolute government of each of us that, to me, is the spiritual component that can help anyone shackled by addiction see how to break away and find freedom.
<urn:uuid:612cd986-6b1e-46ae-8686-644473d55599>
CC-MAIN-2017-04
http://m.csmonitor.com/Commentary/A-Christian-Science-Perspective/2014/0326/Overcoming-addiction-prayerfully
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00067-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971313
652
1.773438
2
Fire Prevention and Education Programs The Highland Park Fire Prevention and Education Programs provide Fire Education opportunities to the citizens and businesses in our community. The goal of our programs is to save lives and property by teaching safety and prevention before an emergency occurs. Listed below are some of the public education programs that are available to the community. These programs are presented as needed within the community at various times during the year. Community Awareness Programs - Fire Safety Week: Many programs are provided during this week to promote fire safety. - Change Your Clock Program, Change Your Battery: Smoke detector battery test and replacement program. - Fire Department Tours: Fire Department tours provide an opportunity for the community to meet fire fighters, learn about fire safety and to see the equipment used by the firefighters. - Juvenile Fire Starter Program: Program designed to the needs of families with kids who have started fires. - Community Fire Safety Displays: Fire Department tours and speakers as requested. - Senior Citizens Fire Education Programs: Prevention program geared toward senior citizens and fire safety. Public and Private School Curriculum - Pre School: The ABC's of fire safety, dangers of fire, stop drop and roll, smoke detectors, and fire fighter turn out gear and fire truck tour. - Kindergarten: Rescue Rangers fire safety video, smoke detectors, crawl low under smoke, exit drills in the home and familiarization with firefighters in turnout gear. - 1st Grade: Fire safety videos, exit drills in the home take home assignment, two ways out training, fire hazards. - 3rd Grade: Fire safety/smoke trailer, home fire hazards, learn not to burn, smoke detectors, escape planning, home safety quiz, "get out, stay out" instruction, and fire extinguishers. Business Education Opportunities - Fire Extinguisher Use: This program involves a short lecture about fire extinguisher use followed by hands on training session. - Fire Evacuation: This program is done on site with supervisory staff to walk through fire evacuation plans. - Fire Hazard Preplanning: This program is designed to educate workers about unique fire hazards and protection systems within their facility. - Hazardous Materials Incident Planning: Geared to specific facilities and hazards as requested.
<urn:uuid:afddf64b-7912-4937-ac3c-f31f7a95098c>
CC-MAIN-2022-33
https://www.cityhpil.com/government/city_departments/fire/education_programs.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00678.warc.gz
en
0.922106
461
2.703125
3
Slavery in Sudan has a long history. The first recorded account of the acquisition of slaves from the Sudan was inscribed in stone near the second cataract of the Nile during the reign of Egypt’s First Dynasty Pharaoh Djer (c. 2900 BCE). The modern history of slavery begins with the conquest of the Sudan by Muhammad Ali of Egypt in 1821 and the enslavement of Africans in the southern Sudan by Muslim Arabs from the north. The independence of the Sudan in 1956 brought to a head the deep tensions between the African traditionalist and Christian southern Sudanese and the northern Sudanese oriented to the Arab world and Islam. Their irreconcilable differences in culture, religion, and race precipitated a fifty-year spiral of violence that has revived the slave trade and slavery, killed more than two million southern Sudanese, and produced another four million refugees by ethnic cleansing, war, famine, and accusations of genocide. The decision by the Sudan government in 1984 to distribute automatic weapons to the Baggara tribesmen of Darfur and Kordofan, members of the Arab militia or murahileen, combined to escalate war-related deaths of the southern Sudanese into the hundreds of thousands. In Darfur, villages would be surrounded before dawn and attacked at first light by an Arab militia known as the janjaweed. The women, children, and teenage males that did not escape were collected with the cattle. The men were indiscriminately killed, often accompanied by mutilation, and the village and cultivations were then methodically destroyed and the cattle, women, and children divided among the Baggara to serve or to be sold. On June 30, 1989, a coup d’état by Umar Hasan Ahmad al-Bashir installed the first theocratic Islamist government in the Sudan. TYhe new government of the National Islamic Front were more determined than ever to defeat the southern Sudanese insurgents in order to impose Islam and Arab culture on the Africans of the southern Sudan. In 1990 the air force began indiscriminate aerial bombing of civilians in the southern Sudan; its only targets were villages, cattle, churches, schools, and hospitals. An estimated eleven thousand Sudanese were either killed or wounded. The offensive was symbolic of more demonstrable efforts by the Sudanese government to use premeditated ethnic cleansing. Between 1990 and 2000 the jihad in the Nuba Mountains had killed more than an estimated 100,000 and resettled another 170,000 Nuba in so-called peace villages on the Sahilean plains of Kordofan where they labored in fields and towns for northern Sudanese entrepreneurs (slaves). Military offensives during the 90’s resulted in the death of another estimated 200,000 Dinka and Nuer in the Bahr al-Ghazal by killing and famine. Others were displaced by the hundreds of thousands. During the drought of 1993 and 1994 the Sudan government deliberately intervened in the distribution of humanitarian food aid by Operation Lifeline, a Western organization. The Sudan effectively utilized famine as a weapon of war to depopulate large areas of the Bahr al-Ghazal by starvation, forcing its inhabitants to become internally displaced persons (IDP). The southern Sudanese casualties from 1991 to 2000 are estimated at approximately 250,000, and an equal number of southerners were displaced. It is estimated that more than 1.3 million southern Sudanese perished in the conflict between 1983 and 1993 in a population, according to the 1983 national census, of some 5 million in the southern provinces of Sudan. The total war-related deaths of southern Sudanese during the twenty years from 1983 to 2003 numbers more than 2.5 million. There is evidence that the Sudan government officially adopted a policy to eliminate particular ethnic groups in the southern Sudan, which would be an act of genocide. Their policies have involved the indiscriminate aerial bombing of civilians, the withholding of humanitarian aid to cause death by starvation, and silent indifference to the activities by government-supported militias to loot, kidnap, rape, torture and enslave civilian populations. WHAT DO YOU THINK? DO THESE CONSTITUTE WAR CRIMES OR CRIMES AGAINST HUMANITY? SHOULD ANYONE BE PROSECUTED FOR THEM? IF SO, WHO?
<urn:uuid:11b7aa04-bc9a-435e-885d-deda7d461ff0>
CC-MAIN-2017-04
https://internationalwarcrimesreport.wordpress.com/2010/06/04/sudan/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00512-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962231
879
3.90625
4
When is Eid al-Adha and how is it celebrated? Eid al-Adha, the Festival of Sacrifice or Greater Eid as it is often known, is an important Islamic holiday which commemorates the willingness of Abraham (Ibrahim) to sacrifice his son as an act of obedience to God, and his reprieve at God�s command when he was instead allowed to sacrifice a ram. Eid is also celebrated by spending time with family and friends, and giving thanks for being able to afford food and housing. Traditionally each family would slaughter a domestic animal, such as a sheep, goat, cow, or camel as a sacrificial symbol and, though some Muslims today choose not to (or are unable to) to do this, it is still a very popular tradition. The meat from the sacrifice is then divided into three equal parts to be distributed. The family keeps one third, another third is given to relatives, friends or neighbours, and the final third is given to the poor. Eid al-Adha is the latter of two Eid festivals celebrated by Muslims and, like Eid ul-Fitr, it begins with a short prayer followed by a sermon. Eid al Adha is celebrated annually on the 10th day of the month of Dhu al-Hijjah of the lunar Islamic calendar. Eid al-Adha celebrations start after the Hajj, the annual pilgrimage to Mecca in Saudi Arabia by Muslims worldwide. This date is approximately 70 days after the end of the month of Ramadan and ritual observance of the holiday lasts until sunset on the 13th day of Dhu al-Hijjah. Estimated Dates for Eid al-Adha Eid al-Adha 2011 (1432) � 6th November Eid al-Adha 2012 (1433) � 26th October Eid al-Adha 2013 (1434) � 15th October
<urn:uuid:3d9239dd-236a-44e0-9134-94feabaaef57>
CC-MAIN-2017-04
http://islamiconline4u.blogspot.com/2011/10/eid-al-adha_16.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00030-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965793
392
3.21875
3
Researchers into child sex trafficking within the UK have warned of the dangers of racial stereotyping amid claims of a widespread problem of British Pakistani men exploiting under-age white girls. Authors of the first independent academic analysis looking at "on-street grooming", where young girls, spotted outside, including at the school gates, have become targets, said they were concerned that data from a small, geographically concentrated, sample of cases had been "generalised to an entire crime type". The authors, Helen Brayley and Ella Cockbain, from UCL's Jill Dando Institute of Security and Crime Science, said they were surprised their research, confined to just two police operations in the north and Midlands, which found perpetrators were predominantly but not exclusively from the British Pakistani community, had been cited in support of the claims that such offences were widespread. Their comments follow claims that a culture of silence has impeded investigations into a hidden pattern of offending by British Pakistani gangs sexually abusing hundreds of young white girls. The view points to the convictions of 56 men, all but three of whom were Asian and most from the British Pakistani community, found guilty of sexual offences involving on-street grooming. There have been 17 court cases in 13 urban areas in the north and Midlands since 1997. The most recent case involved the conviction of nine men in November on sexual offence charges, relating to 27 victims in Derby, 22 of whom where white. Nick Clegg has called such criminal pimping gangs "grotesque", and Keith Vaz, chair of the Commons home affairs committee, has called for a police inquiry. Mohammed Shafiq, chief executive of the Ramadhan Foundation, a Muslim youth organisation, has condemned the perpetrators, claiming they believed that "white girls have fewer morals" and are "less valuable" than Muslim girls. But Brayley and Cockbaine, whose six-month study was cited as evidence, said they were worried that limited data had been extended "to characterise an entire crime type, in particular of race and gender". They challenged claims that white girls were deliberately sought out by offenders. "Though the majority … were white so too were the majority of local inhabitants." Comparing the percentage of white people in the areas with black and ethnic minorities, their data, they said, showed "black and ethnic minority girls over-represented among the victims". They added: "This challenges the view that white girls are sought out by offenders, suggesting instead that convenience and accessibility may be the prime drivers for those looking for new victims." Conclusions from their study were cited in an investigation by the Times into the subject, which sparked calls for Home Office research. Hilary Willmer, of the Coalition for the Removal of Pimping, said that since 2002 her group had supported 400 families where girls were the victims of grooming and sex abuse by mainly Pakistani men. "The vast majority are white families and the perpetrators are Pakistani Asians. We think this is the tip of the iceberg." But she cautioned against treating the matter as a race crime. "It's a criminal thing." According to the Child Exploitation and Online Protection Centre, in 2009, the victims were mainly "white British in their mid and late teens" but also Bangladeshi and Afro-Caribbean. Networks of "white British, British Asians and Kurds had been "identified" as internal traffickers, with ethnic and national background varied "between groups" and geography.
<urn:uuid:d8f66a0d-0d8c-4972-b32a-e03599a6eea9>
CC-MAIN-2016-44
https://www.theguardian.com/law/2011/jan/06/child-sex-trafficking-racial-stereotyping
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00343-ip-10-171-6-4.ec2.internal.warc.gz
en
0.977323
704
1.765625
2
Birth of a Leader The Torah includes two stories that describe the early part of Moshe's life. The first (Shemot 2:1-10) documents his birth and the circumstances through which he comes to Pharaoh's house; the second (ibid. 10-22) describes him going out to his brethren, the move to Yitro's home, his marriage to Tzippora, and his stay in Midian until the birth of his son. The fact that the Torah provides a record of Moshe's birth and the details of his early childhood should not to be taken for granted. After all, the Tanakh offers us no details about the birth of Avraham, nor about the childhood of such leaders as Shaul, David, or Eliyahu. A birth story touches on the very essence of a person; it reveals the context in which he came into the world and the experiences that made an impression on his psyche. The two stories that the Torah chooses to tell about Moshe's early life point, as it were, to the foundations of his life. Childhood Story – Literary Structuring Before we examine the stories themselves, attention should be paid to their chiastic structure. In this model, the exposition and conclusion match each other in terms of content and style; likewise the second and the next-to-last units; and so on. At the center of the chiastic structure there is a single sentence that stands alone, and this serves as the turning point in between the two sections. Let us now look at the story of Moshe's birth and examine its chiastic structure: (1) And there went a man from the house of Levi, and he took a daughter of Levi. (2) And the woman conceived and bore a son, and when she saw him, that he was good, she hid him for three months. (3) And when she could no longer hide him, she took for him a papyrus box, and coated it with slime and with pitch, and placed the child in it, and placed it in the reeds by the bank of the Nile. (4) And his sister stood at a distance, to know what would be done to him. (5) And Pharaoh's daughter went down to wash herself at the Nile, and her maidens walked alongside the Nile, and she saw the box among the reeds and sent her maidservant to fetch it. (6) And she opened it and she saw the child, and behold, a weeping boy. And she had compassion on him and said, “He is one of the Hebrew children.” (7) And his sister said to Pharaoh's daughter, “Shall I go and call a wet-nurse for you from the Hebrew women, that she may nurse the child for you?” (8) And Pharaoh's daughter said to her, “Go.” And the girl went and called the child's mother. (9) And Pharaoh's daughter said to her, “Take this child away, and nurse him for me, and I will give your wages.” So the woman took the child and nursed him. (10) And the child grew, and she brought him to Pharaoh's daughter, and he became her son, and she called his name Moshe, and she said, “Because I drew him (meshitihu) from the water.” We might summarize the structure as follows: The family circle – A man takes a wife, a son is born to them, and he is in his parents' home. The mother parts from him, placing the child at the bank of the Nile. His sister parts from him, standing at a distance to see what will become of him. Pharaoh's daughter comes to the Nile together with her handmaidens. The encounter – "And behold, a weeping boy." Pharaoh's daughter has compassion on the child. His sister proposes a wet-nurse for the child. The mother re-enters the picture as the child's wet-nurse, until he is weaned. The family circle – Moshe grows up among his family and is brought afterwards to Pharaoh's daughter. Process of Severance It is no coincidence that the story is built in chiastic form. This structure leads us to translate the story into a panoramic picture made up of landmarks in Moshe's life. There is also a climax, following which he moves backwards, as it were, to the starting point. In essence, the moment of climax makes an impact on him, and he will no longer be the same as he was before. Let us explain this idea more fully. The verse preceding this narrative documents Pharaoh's decree: And Pharaoh commanded all of his people, saying: “Every boy that is born shall you cast into the Nile, and every daughter shall you leave alive." (Shemot 1:22) In light of this background, the fact that the man in question takes a wife is not a simple matter. This woman then bears a son, and despite the decree that all boys must be cast into the Nile, she hides him for three months. At this stage, the child is surrounded by his natural environment – the home and family. "And when she could no longer hide him…" – This happy period comes to an end, and there now looms a process of separation and severance, which comprises a number of steps. First, the mother takes a papyrus box, places the child in it, and leaves it on the bank of the Nile. The next stage happens after she departs: his sister observes from afar "to know what would be done to him." Pharaoh's daughter approaches the Nile accompanied by her maidservants; she notices the box and dispatches one of the maids to collect it. Since we read this story with knowledge of its ending, this scene strikes us as a positive development heralding good news. However, an innocent, initial reading arouses some difficult emotions. "Pharaoh's daughter" is the daughter of the enemy, the daughter of the king who has decreed death for all Jewish boys, and her handmaidens are women of the court. This encounter is dangerous, even potentially catastrophic. But suddenly, at the moment of suspenseful climax, there is a surprise. Pharaoh's daughter opens the box, sees what is inside – "Behold, a weeping boy" – and she feels compassion. A moment of compassion changes the course of this child's life. In the wake of this show of humanity, the infant's sister reappears on the scene, seeking to restore him to his family. Her initiative is crowned with success, and Moshe makes his way back via his sister to his mother and eventually to his family. This return to the bosom of his family affords him a few more quality years with his parents so that he can develop healthy roots and foundations for his future life. At the same time, there has also been a turning point that has introduced a new affiliation and attachment into his life – to Pharaoh's daughter, to whom he will return, with time, to be her son. Closer inspection of this climactic turning point shows that even the compassion shown by Pharaoh's daughter fails to dissipate the dark fears regarding the possible results of this encounter. Moshe's future as a boy growing up in Pharaoh's palace is murky. What sort of education will he receive? Which values will he learn to cherish? How will he treat his fellow Israelites? But behold – a world far removed from him extends a merciful hand. His precarious, dangerous situation among the reeds on the bank of the Nile is replaced by a reality in which he is given life, and thus in a sense, Pharaoh's house becomes his habitat. In contrast to the fate of his people, Moshe is looked upon favorably by Pharaoh, Egypt, and the broader culture of the world; he is shown compassion and given life. What are the possible ramifications of this turn of events on his view of reality and on his spiritual boundaries? The next chapter presents the landmarks that comprise and mold his identity. Identity and Belonging Moshe is the son of a man of the house of Levi who takes as his wife a daughter of Levi. When he is three months old, his mother places him on the bank on the Nile – "And she took for him a papyrus box… and placed the child in it." The Torah uses the world "child" (yeled), not "son" (ben), reflecting the emotional severance that accompanies the physical separation; this is reconcilement with the decree. Moshe's mother parts from him, and into the vacuum there enters Pharaoh's daughter – "and she had compassion on him." Initially, she deposits the child with his mother, who maintains her position and treats him as a "child," rather than a "son": "And the woman took the child and nursed him. And when the child grew up, she brought him to Pharaoh's daughter" (9-10). His mother does not develop his dependence on her, and thus she liberates him, preparing him for the new reality that he will face when he is taken to Pharaoh's daughter. In fact, Moshe will resume his identity as a "son" only when he takes up his association with Pharaoh's daughter – "And he became her son." By bestowing his name, Moshe – "and she said, ‘For I drew him out of the water’" – she imprints the story of his identity as a Hebrew child who was drawn out of the Nile. Why is his name "Moshe" rather than "Mashui," which would reflect more accurately the story of his being drawn out of the water? This change would seem to have great significance. "Mashui," a passive form, reflects the position of one who is saved, as opposed to "Moshe," which reflects the position of a savior. Pharoah's daughter molds Moshe with the same psychological position that she herself was in at that moment of compassion, eternalizing her noble act in taking responsibility for his life. To sum up so far, we might set forth as follows the different layers of identity that are part of Moshe's personality: At the deepest point of his being, Moshe is the son of his mother; she represents his natural roots and the foundations of his life. Around that core, his mother treats him as a "child," letting go and allowing Pharoah's daughter and Egyptian culture to fill the void. In this sense, Moshe is brought up on Egyptian culture; he receives an Egyptian education and eats "royal food". Especially noteworthy is the fact that Pharaoh's daughter makes no attempt to hide his true identity. She gives him a name that tells the story of his childhood and, even more importantly, bestows on him the qualities of a "moshe" – a savior. Seemingly, without this aspect of his name, his affiliation with his own people would remain abstract, distant, and unrealized. Its presence serves to activate and motivate Moshe in the direction of his destined path. An early manifestation of this is evident in the next story. Story of Adulthood Moshe grows up, and in the next unit of verses, the Torah recounts what happens to him during the next period of his life. It begins with his maturation, as the son of Pharaoh's daughter, and it concludes with Moshe settling in Midian, where he establishes a family and produces progeny. The skeleton of this story is remarkably similar to the first one. Moshe now deserts his (Egyptian) home and identity. After three stages, he reaches a place of water, and this time it is a well that serves as the climax of the story. In the wake of what happens there, he finds a refuge – this time in Midian. At first, he is invited by the father of the women whom he helped. Afterwards, he marries one of them, and finally, he builds his family and his life in Midian: (11) And it came to pass in those days, when Moshe grew up That he went out to his brothers, and saw their burdens, and he saw an Egyptian striking a Hebrew man of his brothers. (12) And he turned this way and that, and when he saw that there was no man, he struck the Egyptian, and hid him in the sand. (13) And he went out on the second day, and behold – two Hebrew men strove together, and he said to the offender, “Why do you strike your neighbor?” (14) And he said, “Who made you a prince and judge over us? Do you mean to kill me, as you killed the Egyptian?” And Moshe feared, and said, “Surely the matter is known.” (15) And Pharaoh heard this matter, and he sought to kill Moshe, so Moshe fled from before Pharaoh and dwelled in the land of Midian, and he sat down by a well. (16) And the priest of Midian had seven daughters, and they came and drew water, and filled the troughs to water their father's flock. (17) And the shepherds came and drove them away, but Moshe arose and helped them with their flock. (18) And they came to Re'uel, their father, and he said, “How is it that you have come so soon today?” (19) And they said, “An Egyptian man delivered us from the hand of the shepherds, and also drew much water for us, and watered the flock.” (20) And he said to his daughters, “And where is he? Why have you then left the man? Call him, that he may eat bread.” (21) And Moshe agreed to dwell with the man, and he gave Tzippora, his daughter, to Moshe. (22) And she bore a son, and he called his name Gershom, for he said, “I have been a stranger (ger hayiti) in a foreign land.” Moshe is Cast out of the Camp Let us examine what has happened here. As a first stage, "He went out to his brothers and he saw their burdens." Moshe is like a son to Pharaoh's daughter, and now he sets aside this affiliation in order to go and observe the affliction of his brethren. On the way, he sees an Egyptian striking a Hebrew man "of his brothers." This two-fold affiliation to his brothers indicates his intention of returning to his original identification group, his people. At the second stage, Moshe "went out on the second day," too. In contrast to his earlier depiction as a defender of his brethren against the Egyptians, he is now acting within the Israelite camp: "And behold, two Hebrew men were striving together." He sees what is going on, and from a position as referee, he tells the offending party, "Why do you strike your neighbor?" The response that he receives is puzzling: "Who made you a prince and judge over us? Do you mean to kill me, as you killed the Egyptian?" This response comprises two parts. First, "Who gave you the authority to be a prince and judge over us?," and second, "You killed an Egyptian; do you mean to kill me, too?" It would seem that these two parts actually tell the same story: "We did not appoint you as a prince or judge over us, and in fact you are not one of ours, for just as you killed an Egyptian – you could kill a Hebrew." These two claims are a slap in the face to the "Prince of Egypt" who seeks to make his way back into the midst of his own people. “And Moshe feared, and said, ‘Surely the matter is known.’” The act of killing the Egyptian represents a betrayal of the Egyptian people. And once the matter becomes known, Moshe has no ground to stand on; he has lost his home, and he is forced to flee for his life. The third stage of Moshe's separation from Egypt comes when Pharaoh hears of his betrayal and wants to kill him. Moshe flees; he leaves Egypt and arrives in Midian, sitting down beside a well. Now we reach the climax or turning point of the story. Moshe finds himself face to face with a situation that needs addressing. The priest of Midian has seven daughters, who come to water their father's flocks. Some shepherds arrive and chase the women away – all in Moshe's presence. What is he now to do? Simple logic would dictate that he refrain from becoming involved. After all, Moshe had intervened when he saw an Egyptian striking one of his Israelite brethren, and he had also intervened when he saw two Israelites striving together. As a result of his actions on these two occasions, he is now a fugitive. In contrast to the previous occasions, where his intervention was on behalf of fellow Israelites, here he has no connection to the event or the people involved and has no idea what the results of his intervention might be. Nevertheless, "Moshe arose and helped them with their flock." One cannot but recall Pharaoh's daughter, who had previously shown a noble humanity and compassion, thereby saving Moshe. Now Moshe encounters a similar situation, and he “moshe” – he arises and helps. This event, serving as a sort of climax of the story, has implications for the series of events that follow. The protagonists are Yitro and his daughters, and what happens is the direct result of the position of savior that Moshe assumes for himself. As a first stage, Yitro asks about his daughters' early return home (an indication of regular harassment by the shepherds and the inability to overcome it to date). They tell him that "An Egyptian man delivered us from the hand of the shepherds." They regard Moshe as an Egyptian and describe at some length his favor to them: "[He]delivered us from the hand of the shepherds, and also drew much water for us, and watered the flock." At the next stage, the father asks, "And where is he?Why have you then left the man?" It is only decent that the man be repaid. "Call him, that he may eat bread," he announces, seeking to invite the Egyptian man who has helped his daughters. At the third stage, Moshe agrees to dwell with Yitro, and the latter gives him his daughter, Tzippora, as a wife. The next stage is that Tzippora gives birth to a son, and Moshe calls him Gershom, "For he said, I was a stranger in a foreign land." Midian, like Egypt, is a foreign place that is not really his own. Midian, like Egypt, may nevertheless provide place for Moshe to grow and develop for a few years. Nevertheless, Midian has a certain advantage, insofar as it offers the proximity of a man of the spirit – Yitro – and a freeing of his ties to Egypt, such that he will be able to return later as a free man to take on the challenge that awaits him in confronting Pharaoh as well as his own people. The Contents of Moshe's World The two stories dealing with Moshe's identity are closely bound up with one another. In the first story, events are driven by the choices made by the people around him (his father, mother, and sister, and Pharaoh's daughter). In the second, Moshe is an adult and makes his own choices. These, like the choices previously made for him, play a significant role in molding the course of his life. Both stories involve Moshe in a process of severing himself from an existing identity. In both instances the severance leads him far away, to an encounter with a world that is foreign to him. The results of both encounters are surprising: in the first encounter, the daughter of the great enemy, Pharaoh, extends a helping hand to him, saving him and helping to mold his life. In the second encounter, it is Moshe himself who extends the helping hand, delivering the shepherdesses. This intervention is a gateway that paves the path to a new life for him in Midian. What is imbedded in Moshe's complex identity? What are the ramifications of having spheres that are generally perceived as being "beyond the boundaries" becoming the foundations of one's life? The answer seems to be related to the role that this man is destined to play. Moshe will be asked to bring a nation out of Egypt; he will be required to present himself before kings and nations. And he is also destined to bring his people the Torah, which contains the keys to the redemption of all of humanity. Moshe will be called to ascend Mount Sinai and to meet with God, who speaks to him "face to face, as a man speaks to his fellow" (Shemot 33:11). What sort of environment is needed to produce such a person? What are the elements of the world of someone whom God chooses as the most suitable candidate to bring Torah to Israel and to convey the message of wisdom and of redemption to all the worlds? These are some of the questions that the unique story of Moshe's life comes to answer. Moshe does not grow up among "the community," with spiritual boundaries defining his world. He does not think in terms of a single conceptual system that has no room for other, distant, complex worlds. Moshe has his healthy foundations laid down in early childhood, following which he is immediately exposed to the wider world and a broader culture. The world that he inhabits is the broadest and deepest that exists at the time. He grows up in Pharaoh's house, eats royal food, is exposed to principles of leadership, and spends time at the nerve center of the superpower of his era. In Midian, he arrives at a well and comes face to face with a scene that puts him to the test. Will he be committed to justice, truth and freedom – even in a foreign country, far from his people, with his own path cloudy and obscure? His decision, like that of Pharaoh's daughter, brings him to the encounter with the man of the spirit – Yitro, priest of Midian, a man whose wisdom and insights will ultimately enjoy a place of honor in the Torah. He dwells with him for a long time, and eventually, at the age of eighty, he is called upon by God. The two narratives describe the beginnings of Moshe's life, introducing us to the different layers of his identity, while simultaneously displaying the special way in which they are integrated. Further in-depth study of these elements may shed new light on Moshe's personality and on the path of this unique man of God. Translated by Kaeren Fish This transformation of a chiastic structure into a movement in space has the power to imbue many instances of this structure in Tanakh with meaning and significance. The common pattern looks something like this: A person undergoes some sort of process, its composite elements being milestones, stage by stage. At the moment of climax, there is an encounter that sears his heart with a new spiritual position. From there, he returns to the previous stages, but these will now be imbued with a new and different meaning. The structure of this story is not chiastic in the full sense of the word, because Moshe does not end up returning to his Egyptian identity. On the other hand, neither Egypt nor Midian is regarded by Moshe as his real place, and in this sense there is a correlation in the structure: Moshe leaves a foreign country in three stages, experiences an encounter at the climax of the story, and then returns, correspondingly, to a (different) foreign country. The climax in this case brings about a move from the one foreign country (Egypt) to the other (Midian). Moshe’s brethren actually reject him. It later turns out that it is his abandonment of his Egyptian identity that leads him to a new cultural and spiritual encounter – with Yitro, priest of Midian. But this leaves us with the interesting question of the option that was not realized: had Moshe emerged from his Egyptian affiliation and been accepted by his brethren, what would have happened? It would seem that the structure of this narrative maintains a dialogue with this possibility. There is a stage-by-stage withdrawal from Egypt, and instead of the climax at the well in Midian, we imagine a different climax, within the Israelite camp, following which Moshe would return to his temporary home in Egypt (Pharaoh's palace), but with a profound awareness of his old-new attachment to Bnei Yisrael. This scenario does not take place. Two possible reasons for this are: a. the hostile attitude of the Hebrew man towards Moshe is a sort of testimony that Bnei Yisrael are not ready to accept him; and b. perhaps Moshe, with his judgmental position vis-א-vis the Israelites, is not yet ready for a position of responsibility and leadership among them. Ibn Ezra (2:3): "And God's thoughts are deep; who can stand in His council, and by Him alone are actions weighed. Perhaps God brought it about that Moshe would grow up in a royal palace so that his soul would be primed through study and practice to be on the highest level, rather than being lowly and accustomed to slavery… And another point: had he grown up among his brethren, and known them since his youth, they would have no awe for him [later on], but would consider him as one of them." Ibn Ezra illuminates two different aspects of Moshe growing up in Pharaoh's palace: a. The savior of Israel cannot be someone who has grown up as a slave. His soul needs to be "on the highest level": he must grow up amongst royalty and be educated in the concepts of freedom and greatness. b. There is also an advantage to this arrangement for the benefit of Am Yisrael: "No-one is a prophet in his own city." Moshe comes to Bnei Yisrael "from the outside," as it were – from another world. As such he is able to implement significant processes amongst the nation. On the eve of the giving of the Torah, Moshe meets with Yitro and the latter conveys much advice to him. Moshe's response is, "Moshe obeyed his father-in-law and did all that he had said" (Shemot 18:24).
<urn:uuid:f75f8e4e-0be8-46be-832e-168ac70ac5d4>
CC-MAIN-2022-33
https://torah.etzion.org.il/en/birth-leader
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00268.warc.gz
en
0.986043
5,607
2.59375
3
Idaho has been awarded a grant to study how elk herds move through a northern Idaho migration corridor also used by grizzly bears and wolverines. The grant, announced by the U.S. Department of the Interior on Friday, is part of $3.2 million in funding for big game rangeland studies in 11 western states. Idaho’s research will focus on the McArthur Lake area, which serves as a link between the Selkirk and Cabinet mountains used by grizzly bears, wolverine and elk. Scientists will put GPS collars on 40 elk to monitor their movements over two years, and then combine that data with information from a grid of 119 trail cameras. The findings will be used to map seasonal ranges, movement routes and stopover areas, according to the Interior Department. Other states that received grants are Arizona, California, Colorado, Montana, Nevada, New Mexico, Oregon, Utah, Washington and Wyoming.
<urn:uuid:b5b017b6-0b09-485a-af3c-0fb0b80ffe66>
CC-MAIN-2022-33
https://www.kivitv.com/news/outdoors/idaho-other-western-states-to-study-big-game-range-land
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00072.warc.gz
en
0.944932
197
2.65625
3
A is for ‘Orses. For want of a nail the shoe was lost. For want of a shoe the horse was lost. For want of a horse the rider was lost. For want of a rider the message was lost. For want of a message the battle was lost. For want of a battle the kingdom was lost. And all for the want of a horseshoe nail. Thank you Clare for letting me play–again, I can’t believe how quickly this has become a tradition! With the advent of Warhorse coming to the screen, I thought I’d spoil myself and write about something I actually know something about, rather than things I have to struggle to find out about! As a writer of historical fiction it’s pretty damned difficult to write anything without a horse popping up somewhere or other. Historical fiction—as defined by the Historical Novel Society takes place at least 50 years in the past. (Although due to the Wolfenden Report/Stonewall taking place in the late 50s/early 60’s I have taken upon myself to move gay historical fiction to any event before those two times. Even in the 50’s and 60’s there were horses around on our streets—I remember a rag and bone man who used to come up our street regular as clockwork and the horse would plod along unaided and would know exactly where to stop. So—although it’s not necessary to become a fully-fledged expert in the horsey world—you won’t have to know your bog spavin from your coronet—it’s still important that if you are going to write about horses that you know a little bit about your subject. It’s kind of like if I were going to write about a Maserati in a contemporary book, and yet had the controls described as if it was a Ford Fiesta. Someone would notice. After all—if your characters were taking a ship to America from England you wouldn’t say he’d got there in two days would you? Or if you did, you’d have to stand the guffaws of your readers and fellow authors! Horses—obviously—are living creatures. Despite what so many Hollywood films would have us believe--because there everyone gallops on their horse from A to B no matter how far that is—horses have limits and those limits are a lot less than most people realise. In fact it’s amazing how durable a horse is when you consider how much there is that can go wrong! They have a lot of things that can make them instantly unrideable. Feet being the obvious one. What is surprising I think is that the horse supports himself on a tiny area, considering the weight of an average horse of 15 hands is around 500 kg (1102 pounds, or 78 stones). (then add 10-15 stone of person and saddle...) Add to that that the horse travels at speed and that tiny “sensitive lamina” seems an amazing bone to carry all that weight and pressure. Of course it’s not just that bone – the frogs, both sensitive and insensitive (which means that no pain in felt in that section) cushion the weight too. The insensitive frog area gives the horse some protection, which means that can tread on stones and even have them embedded in that part of the foot without damage, but if unattended they will puncture through to the sensitive frog and then...well, you have a lame and thereby useless horse. This is why a groom – or any decent rider at all, worth his or her salt – will always travel with a hoof pick, swiss army knife or other handy implement for removing stones. The back is the other main area where problems can arise. In STANDISH, my protagonist, Rafe buys a “spirited” black stallion from a neighbouring stud. One morning he recklessly saddles the horse and takes him out—not checking both sides of the saddle area. The horse has been bitten by a bot-fly (nasty little insect that buries its eggs in the skin) and has a sore patch. After a few minutes galloping the horse, understandably disposes of the nasty painful weight of Rafe and buggers off leaving the rider face down in the dirt! One thing to remember is that horses cannot move fast (canter and gallop – yes, thank you Hollywood) for long periods. If you were out riding the range, you’d take provisions for your horse, always be aware of where water was, and you’d travel as a sensible pace. A fit horse can trot for miles but will need to rest afterwards. Racehorses, as well as three-day event horses are athletes and are trained for very long periods in their life, on a daily basis to achieve the stamina they need. In the racehorse’s case it can be as little as a six furlong sprint, up to the Grand National which is a gruelling ordeal of nearly five miles including some very high jumps, wide ditches and usually soggy ground. [Picture of Beecher’s Brook 1890] The event horse has five kilometres of twisty turny jumps over hills and valleys. The hunting horse needs to be able to gallop over any terrain, recover it wind (its breath – hence the expression second wind) and keep going all day at various speeds to keep up with the fox (or in these day, a scent marked-trail). The high athletes of the horse world are the endurance horses, where a race can be 100 miles—an arab horse is about the only horse that endures this kind of treatment, as they have amazing stamina, can travel long periods without too much water. I have read more historical than I like to count which simply treat horses as some kind of combustion engine. They are harnessed up and ping! They manage to travel a hundred miles ina day with no trouble at all. I read something recently where a four horse carriage went from London to Brighton AND BACK in one day! Post-Coach and passenger coach horses had a hard, short life. They would be expected to trot smartly in all conditions about ten to twenty miles. The horses would be unhitched and a new team put on for the next leg of the journey. The original horses would be rested overnight and put onto a different coach the next day. The journey from London to Colchester for example took six hours and was considered to be a very fast route. There’s a good article here on the subject regarding the book “Essex Coaching Days” by J.Elsden Tuffs here. As you can probably tell, I could waffle on about horses for weeks, and I’m going to close here. All I ask is that if you do write a historical, please think a little about the horse and don’t just substitute “car” for “horse”! And if you are interested in my review of the book, Warhorse, it’s here at Goodreads. I wasn’t terribly impressed. Black Beauty is definitely the book to read if you want a horse’s eye view of the world around him. Erastes writes gay historical fiction and short stories from many genres. She lives in Norfolk, UK with 3 cats and a daft dog. Her latest book “Junction X” was released in November 2011, and her next release will be “A Brush with Darkness” published by Carina in March 2012 as part of Carina’s M/M week. Her website is erastes.com. From Clare: Like to stretch your writing fingers after Christmas' excesses? Fancy writing something for the visitors this month? It can be anything from a flashfic 3 sentences to a drabble of 100 or so, or even more. Any genre, any theme, any rating, any character(s). Maybe ones you already love, maybe the chance to try on a new character for size. I'm holding a FREE FICTION DAY on the 28th, so send me new fiction - links to your existing work also welcome! - to clarelondon11 AT yahoo.co.uk and I'll post it all then :). FOLLOW the Birthday Blog so far: Jan 16: Sasha L. Miller making magic happen. Jan 17: H. B. Pattskyn shares a free short story. Jan 17: Becky Black on what can really happen after publishing. Jan 18: Blaine D. Arden on keeping it close to her heart. Jan 18: Tam battles with IKEA - and wins! Jan 19: Toni Anderson shares her love of romance novels. Jan 19: Poppy Dennison introduces the Boxer Falls m/m serial, plus a PRIZE DRAW for the (in)famous GRL bracelet **OPEN TO JAN 31** Jan 09: Lee Rowan shares her healthy resolution. Jan 10: Rowena Sudbury and the beauty of a blue moon. Jan 10: Sandra Lindsay and her WIP characters. Jan 11: Shelley Munro and a tour of bedrooms through the ages. Jan 11: Dany Sirene and her love of Goth characters. Jan 12: Sarah Madison and her decision to stop competing. Jan 13: Alix Bekins shares her love of kink. Jan 14: Janis Susan May on writing one word at a time. Jan 14: Charlie Cochrane watches movies with hankies at hand. Jan 15: Megan Derr and the inspiration in fairytales. Jan 01: luscious_words shares some fabulous icons. Jan 02: Jordan Castillo Price shares her experience of re-releasing books. Jan 03: Mara Ismine wonders how important is continuity in fiction? Jan 04: Jen shares her favourite Rom Com movies. Jan 05: Karenna Colcroft introduces her unusual werewolf. Jan 06: Stevie Carroll takes us on a pictorial tour of her favourite locations. Jan 07: Tinnean quotes Jack Benny on age. Jan 07: Josie makes a brave leap into a scary sport. Jan 08: Elin Gregory finds inspiration at every turn. Check up on: Prior years fun HERE and The 2012 Guest schedule HERE. Want to join in but missed the original call? Email me at clarelondon11 AT yahoo.co.uk and I'll happily find you a space NOTE: most pictures chosen by me and credited where known, others may be used without direct permission, please contact me with any queries/concerns. ****All my posts are being mirrored at Dreamwidth, please feel free to friend me over there as well****
<urn:uuid:95aa35e2-9a61-4cca-ba3a-5260c3b5b649>
CC-MAIN-2016-44
http://clarelondon.livejournal.com/390263.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719416.57/warc/CC-MAIN-20161020183839-00365-ip-10-171-6-4.ec2.internal.warc.gz
en
0.952231
2,276
1.65625
2
IN GRASONVILLE, MD. With fingers and pencils, Destiny Wallace-Jenkins and Aiden Priest took turns prompting each other to pronounce what they saw on the page. K-i-n-g – king. S-l-a-m – slam. “Don’t cover it up, Aiden. Let her see it,” teacher Allison Torrence said one December morning at the elementary school here. “Destiny, you get ready and point for Aiden. Okay. Put it together.” Letters were becoming sounds, sounds were becoming words and these first-graders on the Eastern Shore were becoming readers through a program that has won a major grant from one of President Obama’s signature education initiatives. The money will help Success for All, as the program is known, expand across the country. Success for All groups students by reading skills, letting them move to the next level as soon as they’re ready. Teachers follow a script. All possible teachers in the building, including administrators, special-ed, P.E and music teachers, handle a 90-minute literacy block. That keeps class sizes small. Detailed descriptions of daily objectives were posted outside the rooms. Example: “Use elements of narrative text to facilitate understanding. . . . Identify and explain character traits and actions.” Beginners, including Destiny and Aiden, paired off to help each other on the teacher’s cue. They spent half an hour on phonics and then shifted to lessons geared to stories, story telling, retelling, comprehension and thematic writing. Teacher Debbie Sparks guided more advanced students – all fifth-graders – through analysis of a nonfiction text on dinosaurs. Students formed groups of four for “team talk” to discuss scientific theories on why the dinosaurs died out. Then they gave their findings to the class – another of many examples of the emphasis on oral language development – and were awarded points for the quality of their presentations. Some teachers dislike the regimentation, but less-experienced teachers often like the structure. Teachers told the Post that SFA “enables them to work directly with students for long stretches of time. That would not necessarily be the case if teachers were juggling small groups of varying ability within one classroom.” Over the past twenty years, the only reading programs I have seen that have consistently proved to be effective are Success For All and Direct Instruction, the work of two University of Oregon pioneers, Siegfried Engelmann and Wesley C. Becker, who have also been hurt by the educational practice of discarding programs that aren’t considered cool any more. In my San Jose Mercury News days, I observed a Success for All school in San Jose that credited the program with identifying fourth- and fifth-graders who’d never mastered first- and second-grade reading skills. Placing students in classes at their own level let them catch up — and reduced discipline problems dramatically. Kids no longer needed to keep the class disrupted so nobody would notice their inability to read, teachers said. Other SFA schools in San Jose also reported fewer discipline problems. SFA’s structure and sense of purpose carried over for the whole day, principals told me. Teacher absenteeism fell significantly as well.
<urn:uuid:a8e8e59b-0451-4e72-a1c8-4362259c1a34>
CC-MAIN-2017-04
http://www.joannejacobs.com/2011/01/success-for-all-makes-a-comeback/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00124-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967419
681
2.671875
3
Apple's new wearable device can be inverted and worn on the right arm for left-handed users, an Apple spokesman has confirmed. After the announcement of the new Apple Watch, set to be released early in 2015, the internet was awash with rumors that the watch had a major design flaw in that it couldn't be used by the 10% of the World's population who are left-handed. Perhaps unsurprisingly, however, the Apple Watch can easily be inverted to allow lefties to use it on their right wrist. According to officials, the Apple Watch offers you the option to set the device up for either a left-handed or right-handed user when you first switch it on. Users on social media have been criticizing Apple for the apparent faux pas: Apple Watch has already alienated 1 Billion people -- 15% of the world is left handed & can't comfortably use it http://t.co/oUs9FqH8rQ— Jacob Lebo (@jacob_lebo) September 10, 2014 Apple Watch just works… unless you're left handed— Keith Barney (@keithbarney) September 9, 2014 I'm left-handed ... I guess I won't be able to wear the Apple Watch?— Christian Meyer (@fiddler6) September 9, 2014 In a video interview with ABC news chief designer Jonathan Ive CBE said that there are "millions" of ways to personal ise the watch. It would seem that left-handed functionality is just one of them.
<urn:uuid:d4e7dcce-27cb-45da-a203-f8859918e624>
CC-MAIN-2017-04
http://www.businessinsider.com/lefties-can-use-the-apple-watch-too-apple-says-2014-9
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00517-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94402
312
1.601563
2
An Apostrophe To Mr. Gladstone ( Originally Published 1875 ) RIGHT Honourable Sir,—Responding to the call you have made upon all English Catholics to give you the expression of their sentiments on the charges you have brought against their Pontiff and their holy religion, I have the honour to offer you mine. Though but one of a million for whose voices you have called, and al-though I can scarcely understand why you exclude the other five millions within the British Isles, I claim the right to be considered the representative of at least one-tenth of that million. If in defending Catholic truth and loyalty against your pen I seem in some defensive strokes to put in the sharp edge of controversy, your courtesy will rightly ascribe it to the keenness of your assault. The temper of the assailant brings out in reverberation the temperament of the defendant, as the strings of one instrument set in motion awaken the chords of another, though in tones more subdued. After ages of cruel persecution, the Catholics of this country were living in peace and content, loving their Church and Pontiff, loving their Queen and country, and your political efforts in their favour had contributed to their peace, when, to our sudden amazement, and with no slight shock to our gratitude, we found our religious principles, in their bearing on our civil allegiance, called with vehemence into question by your eloquent, but this time misguided, pen. In your Expostulation, you call upon us to disclaim doctrines and principles of conduct that neither in the mind of our ecclesiastical superiors nor our own have any existence ; and that upon allegations that, short of absolute proof, we have every reason to believe were prompted by a factious party, once our brethren in faith, but now engaged in assaulting and ungenerously reviling that supreme authority of God's Church which was once their rock of security. Even should we be mistaken in ascribing the violence of your attack to the personal influence of those misguided men, there can be no mistake in tracing the materials you have used to the book in which they have drawn up their false indictment. It is the privilege of those who have been wronged to complain ; and when the wrong comes from one to whom they have habitually looked for right, the breath of complaint comes from those deeper sources of emotion that touch upon the verge of indignation. Nothing inflicts pain like the breaking down of trust, especially where no reason has been shown for the change. When the Bishops of Ireland opposed the scheme of mixed university education, they stood equally upon their religious principles, their constitutional right, and experience of the evils of mixed education. That which you proffered to them as a boon, they discovered to be an evil. What was there in this, although it proved the occasion of breaking up a Ministry inclining to its fall, to justify an unprovoked attack upon the Pope and the Catholics of England, not on the ground of the university scheme, but on the totally different plea of a disloyalty which, you yourself admit, does not exist among us ? At a time when every Christian force is needed to check the advance of unchristian, infidel, and atheistic invasions upon the peace and happiness of mankind, to draw up a severe accusation against the head of the greatest Christian community—accusation on matters that the accused look upon as criminal; to rest that accusation not upon proof, but on conjecture ; to colour it and to heighten it with all the arts of' rhetoric ; to subscribe it with a great and influential name, and then, knowing the effect it must produce of inflaming prejudice and enkindling strife, to flood the country and the world at large with 100,000 copies of it, is what we did not expect, and could not beforehand have believed. It is not as if the Protestant population of the country had any true knowledge by which to judge what the Catholic religion is, or what are its principles and practices. They have had nothing of it in their minds for centuries but a grotesque caricature, to which your Expostulation corresponds. Wheresoever prejudice, bigotry, and hatred of the Catholic religion and its professors prevail, there, as your correspondence will have proved, you have added flame to fire. Can this be justified on any party, political, or human motive ? Is it a deed that has met the approval of the nobler-minded men of this country or of the press, or of the more prudent and abler men of your party? Unless it be the intention to strike your roots into lower strata in search of a new party, what is there to explain this downward course? The venerable Pontiff whom we love so well, what has he done that you should strike at him ? Why should you, who profess Christianity, join the throng of scorners who buffet the Apostle of Christ ? By what word, by what deed, has he done injury to any mortal being, except, according to his divine commission, to warn men from error and exhort them to the truth, except to turn their way from evil and draw it unto good ? For long years he has been a spectacle of the righteous man suffering, to the world, to angels, and to men. Suffering is undoubtedly the allotted portion of prophets, apostles, and saints, yet no less undoubtedly are men the inflictors of that suffering. Faith broken with him by half the powers of the world, stripped of the patrimony that protected the freedom of his predecessors for more than a thousand years, he sees the strength of the world and much of its thought combined against him. His Bishops are persecuted and imprisoned , their clergy and the members of the religious orders are scattered and dispersed by violence, leaving devoted Christian populations without pastors or Sacraments. Yet you, Right Honourable Sir, who once carried your energies in defence of the imprisoned as far as the South of Italy, profess not to understand the merits of that unprovoked persecution in Germany that rivals, and in malignity surpasses, the persecution of Christianity by the Roman Caesars. Is it possible that a man of large mind and political experience like your own can imagine, still less can gravely state to the world, that this same Pontiff amidst his sufferings and solitude, can be plotting a dangerous combination of physical forces, expecting therewith to reestablish an order of things which, through the injustice of men, God has permitted to depart ? A Pope seated on a terrestrial throne, re-erected on the ashes of a city amidst the whitening bones of the people,' is a combination of images such as Mr. Gladstone may contemplate with artistic enjoyment, but from the very notion of which a Pope would turn with horror. Prussia has been long habituated to chastise its people with stick and cane, and that a minister of that country should strike a man when he is down is not so very surprising. But that an Englishman, and that Englishman Mr. Gladstone, should strike a man when he is down, and that a man of the highest and most venerable dignity, stricken already with years, stripped of strength, his place contracted from a kingdom to a virtual prison; in his sorrows and solitude to strike such a man, and that with foul blows, is what honour-able men would not have believed, had you not given them the proofs of it. Be not surprised that an act like this should draw from us no other response than a just indignation. One good, however, beyond intention you have done. By compelling the Catholics of this country to give a closer consideration to the Apostolic acts of their Pon-tiff than they had hitherto done, they have learned to appreciate him the more.
<urn:uuid:99b57e57-e73f-4792-bbfe-fc78ba86b5ca>
CC-MAIN-2017-04
http://www.oldandsold.com/articles11/gladstone-7.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00423-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967842
1,582
1.734375
2
The pioneer farmers in America and many of their descendants up to the present time, dry their Indian corn by the methods the early Americans learned from the Indians. The corn drying season naturally begins with the harvesting of the corn, but it often continues until the first snow falls. Selecting a number of ears of corn, the husks are pulled back exposing the grain, and then the husks of the several ears are braided together (Fig. 165). These bunches of corn are hung over branches of trees or horizontal poles and left for the winds to dry (Fig. 166). On account of the danger from corn-eating birds and beasts, these drying poles are usually placed near the kitchen door of the farmhouse, and sometimes in the attic of the old farmhouse, the woodshed or the barn. Of course, the Indians owned no corn mills, but they used bowl-shaped stones to hold the corn and stone pestles like crudely made potato mashers with which to grind the corn. The writer lately saw numbers of these stone corn-mills in the collection of Doctor Baldwin, of Springfield, Mass. In the southwest much grit from the stone used is unintentionally mixed with the corn, and hence all the elderly Indians' teeth are worn down as if they had been sandpapered. But the reader can use a wooden bowl and a potato masher with a piece of tin or sheet iron nailed to its bottom with which to crush the corn and make meal without grit. Or he can make a pioneer mill like Figs. 163 or 164, from a log. The pestle or masher in Fig. 164 is of iron.
<urn:uuid:38f5c1ce-fe33-4fdd-ad98-8bd764fa3e17>
CC-MAIN-2017-04
http://bookdome.com/outdoors/camping/Camp-Lore-Woodcraft/How-To-Dry-Corn.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00152-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949388
338
3.734375
4
Kayakalpa is a healing and cleansing tradition related to the practice of yoga in much the same way acupuncture and massage are related to some martial arts. Performing kayakalpa does not involve the same progression of challenging physical postures as other forms. Rather, kayakalpa consists of breathing exercises and other techniques intended to focus the flow of energy to improve health. Kayakalpa focuses on relaxation, breathing and energy control. For this reason, the proper postures for kayakalpa are easy on the body and simple to remember. This prevents physical positioning from distracting the practitioner from his breathing and energy focus. Kayakalpa is generally performed in relaxed seated positions such as lotus, or lying on the back fully relaxed. Kayakalpa breathing practices focus as much on the structure and intent of breathing as hatha yoga postures focus on the structure and intent of motion. Fire breath is a practice in which the yogi breathes in slowly and naturally, then exhales forcefully through the mouth. Fire breath helps with relaxation, fosters cleansing through completely emptying the lungs with each exhalation and develops awareness of the diaphragm while breathing. Bastika is a breathing exercise roughly translated as "bellows," and thought to fan the fires of personal energy, much like a bellows fans a physical fire. To perform bastika, the practitioner breathes in through the nose, then breathes forcefully out through one nostril while holding the other closed. Alternating nostrils with each breath, this practice can lead to feelings of light-headedness or dizziness in beginning students. The practice of kayakalpa includes receiving massage and herbal treatments much like going to a traditional doctor. When receiving this kind of treatment, the recipient will assume various postures according to the course prescribed. When being worked on with massage or herbal tinctures, a relaxed posture is usually recommended. The person under treatment may also be prescribed a course of more physical postures from hatha yoga between sessions.
<urn:uuid:933a4108-6a77-44db-9469-47b4970bb6e1>
CC-MAIN-2017-04
http://www.livestrong.com/article/419537-kayakalpa-yoga-poses/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00174-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951381
414
2.359375
2
By NATALIE SCOTT Poland McKinley students Jared Tucker and Tyler Berry recently took first and third place, respectively, at the Math 24 Regional Tournament for Trumbull and Mahoning counties, while Poland Middle School student Noah Landry took first, as well. The team has been practicing every week since the beginning of school to compete in the challenge. “Before the tournament, the whole team went to someone’s house to practice,” said Berry. “We also practiced a lot individually. I have an app on my iPod that helped me practice.” The students faced many different types of math problems, some harder than others, but all calling on students’ skills to find the solution. “Pocket variables are the hardest kinds of problems to solve, for me,” said Tucker. “I like a challenge, though. I like doing all the three-dot cards — that’s the hardest level of cards in Math 24.” Math 24 is a challenging extracurricular that offers problems for children of all skill sets and ages. Students begin working at the beginning of the school year and practice weekly to compete. “Math 24 is great,” said Landry. “If you love math and you are willing to practice and really work for what you want, you should definitely join.” “If you want to do Math 24 and you are scared or nervous, don’t worry,” said Tucker. “I will help any student that wants to join Math 24 practice. Any student that wants to should do it.”
<urn:uuid:729f97d4-7245-41a2-bb76-bba8478567fe>
CC-MAIN-2017-04
http://www.vindy.com/news/2013/apr/12/poland-excel-at-math--event/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00365-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965318
342
1.804688
2
Upon arrival in Scotland on 16 September 2010 for his apostolic journey to the United Kingdom, Pope Benedict XVI paid a courtesy visit to Queen Elizabeth II at Holyrood House, Edinburgh, Scotland, giving the following address. Thank you for your gracious invitation to make an official visit to the United Kingdom and for your warm words of greeting on behalf of the British people. In thanking Your Majesty, allow me to extend my own greetings to all the people of the United Kingdom and to hold out a hand of friendship to each one. It is a great pleasure for me to start my journey by saluting the members of the Royal Family, thanking in particular His Royal Highness the Duke of Edinburgh for his kind welcome to me at Edinburgh Airport. I express my gratitude to Your Majesty’s present and previous Governments and to all those who worked with them to make this occasion possible, including Lord Patten and former Secretary of State Murphy. I would also like to acknowledge with deep appreciation the work of the All-Party Parliamentary Group on the Holy See, which has contributed greatly to strengthening the friendly relations existing between the Holy See and the United Kingdom. As I begin my visit to the United Kingdom in Scotland’s historic capital city, I greet in a special way First Minister Salmond and the representatives of the Scottish Parliament. Just like the Welsh and Northern Ireland Assemblies, may the Scottish Parliament grow to be an expression of the fine traditions and distinct culture of the Scots and strive to serve their best interests in a spirit of solidarity and concern for the common good. The name of Holyroodhouse, Your Majesty’s official residence in Scotland, recalls the "Holy Cross" and points to the deep Christian roots that are still present in every layer of British life. The monarchs of England and Scotland have been Christians from very early times and include outstanding saints like Edward the Confessor and Margaret of Scotland. As you know, many of them consciously exercised their sovereign duty in the light of the Gospel, and in this way shaped the nation for good at the deepest level. As a result, the Christian message has been an integral part of the language, thought and culture of the peoples of these islands for more than a thousand years. Your forefathers’ respect for truth and justice, for mercy and charity come to you from a faith that remains a mighty force for good in your kingdom, to the great benefit of Christians and non-Christians alike. We find many examples of this force for good throughout Britain’s long history. Even in comparatively recent times, due to figures like William Wilberforce and David Livingstone, Britain intervened directly to stop the international slave trade. Inspired by faith, women like Florence Nightingale served the poor and the sick and set new standards in healthcare that were subsequently copied everywhere. John Henry Newman, whose beatification I will celebrate shortly, was one of many British Christians of his age whose goodness, eloquence and action were a credit to their countrymen and women. These, and many people like them, were inspired by a deep faith born and nurtured in these islands. Even in our own lifetime, we can recall how Britain and her leaders stood against a Nazi tyranny that wished to eradicate God from society and denied our common humanity to many, especially the Jews, who were thought unfit to live. I also recall the regime’s attitude to Christian pastors and religious who spoke the truth in love, opposed the Nazis and paid for that opposition with their lives. As we reflect on the sobering lessons of the atheist extremism of the twentieth century, let us never forget how the exclusion of God, religion and virtue from public life leads ultimately to a truncated vision of man and of society and thus to a "reductive vision of the person and his destiny" (Caritas in Veritate, 29). Sixty-five years ago, Britain played an essential role in forging the post-war international consensus which favoured the establishment of the United Nations and ushered in a hitherto unknown period of peace and prosperity in Europe. In more recent years, the international community has followed closely events in Northern Ireland which have led to the signing of the Good Friday Agreement and the devolution of powers to the Northern Ireland Assembly. Your Majesty’s Government and the Government of Ireland, together with the political, religious and civil leaders of Northern Ireland, have helped give birth to a peaceful resolution of the conflict there. I encourage everyone involved to continue to walk courageously together on the path marked out for them towards a just and lasting peace. Looking abroad, the United Kingdom remains a key figure politically and economically on the international stage. Your Government and people are the shapers of ideas that still have an impact far beyond the British Isles. This places upon them a particular duty to act wisely for the common good. Similarly, because their opinions reach such a wide audience, the British media have a graver responsibility than most and a greater opportunity to promote the peace of nations, the integral development of peoples and the spread of authentic human rights. May all Britons continue to live by the values of honesty, respect and fair-mindedness that have won them the esteem and admiration of many. Today, the United Kingdom strives to be a modern and multicultural society. In this challenging enterprise, may it always maintain its respect for those traditional values and cultural expressions that more aggressive forms of secularism no longer value or even tolerate. Let it not obscure the Christian foundation that underpins its freedoms; and may that patrimony, which has always served the nation well, constantly inform the example your Government and people set before the two billion members of the Commonwealth and the great family of English-speaking nations throughout the world. May God bless Your Majesty and all the people of your realm. Thank you.
<urn:uuid:cbe75789-f388-40b3-b8ba-144aab5cd6ef>
CC-MAIN-2017-04
http://ewtn.com/library/PAPALDOC/b16ukqueen.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00448-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954655
1,177
1.835938
2
Elena Poniatowska 1933- Mexican journalist, nonfiction writer, novelist, short story writer, and essayist. The following entry provides an overview of Poniatowska's career through 1997. Poniatowska is one of the most highly regarded contemporary Mexican writers. Her writing demonstrates a strong concern for the voiceless and silenced segments of Mexico's populace. Poniatowska is known for her use of the novela-testimonio (testimonial novel), which utilizes a realistic storytelling style, and her works are widely noted for bringing recognition to the marginalized and ignored classes of society. Poniatowska was born in Paris, France, on May 19, 1933. Her mother was Mexican, and from a wealthy family that lost their land during the Mexican Revolution. Poniatowska's father was descended from Polish royalty who were forced from Poland during the partitions of the country in the late 1700s. At age eight, during World War II, Poniatowska moved to Mexico with her mother and sister while her father remained in France to fight the Germans. Because French and Polish were the only languages spoken in the house, Poniatowska learned Spanish from the household servants. After finishing her secondary school education in the United States, she received a scholarship to attend Manhattanville College, then returned home to her adopted country, Mexico. Her writing career began in 1954 as an interviewer for the Mexico City newspaper Excelsior. In 1955 she began working for the newspaper Novedades. Her first novel, Lilus Kikus, was published in 1954, but it was Poniatowska's second novel, Hasta no verte, Jesús mío (1969; Until We Meet Again) that brought her critical acclaim and international attention. Poniatowska resides in Mexico City, where she continues to work as a staff writer for Novedades. The majority of Poniatowska's writing exposes oppression. In La noche de Tlatelolco (1971; Massacre in Mexico) she relates an account of the protesters that were massacred in October, 1968, in Mexico City, Mexico, by the Mexican government. The massacre arose out of growing tension between students of UNAM (the National Autonomous University of Mexico) and the government. Due to the approaching 1968 Olympic games in Mexico City, the government wished to quell a student protest that could potentially embarrass Mexico internationally. Students at UNAM had successfully taken over the University and turned it into an alternate, or model, society. Mexican troops subsequently occupied the remaining free regions of the University, and during a large gathering assembled for a speech from the National Strike Committee at the Tlatelolco housing unit, soldiers and police surrounded protesters and opened fire. Hundreds were killed and over one thousand people wounded. The government attempted to hush up the incident and was largely successful in limiting public knowledge of the event. International media coverage was hushed, and even many residents of Mexico City did not realize a tragedy had occurred. Poniatowska's book is an account that brings to light many of the details surrounding this event. Poniatowska's publicizing of the Mexican government's failings during the 1980s is an integral part of Nada, nadie (1988; Nothing, Nobody). After an earthquake in Mexico City in September 1985, Poniatowska assisted rescue efforts during the day and spoke to survivors whenever she could, and then wrote her recollections of these interviews from memory at night. In this work, she pieces together a picture of the Mexican government's corruption and inability to deal with a major disaster. Poniatowska's works do not focus solely on political oppression and government ineptitude; her most celebrated novel, Until We Meet Again, exposes social injustice. The main character, Jesusa, is orphaned, beaten by her husband, unfairly denied a pension, and arrested several times. These misfortunes occur in part because she is poor and uneducated, but mostly because she is a woman. Jesusa's rebellious spirit keeps her afloat in this novel. A recurring theme in many of Poniatowska's fictional works revolves around the rebellious spirit of her female characters. In Lilus Kikus, Lilus rebels against rigid social conventions that confine and restrict her. “Love Story,” a short story in De noche vienes (1979), relates the experiences of Lupe, a maid who rebels against her employer. In La ‘Flor de Lis’ (1988), Mariana rejects her upper-class upbringing. In Tinísima (1992), Tina opposes both the government and the standard roles placed on women. Poniatowska's protagonists do not always succeed in their rise against repression, but because of their spirited resistance these women gain a spiritual freedom previously unrealized. Critics find Poniatowska's works thought provoking and well written. Although some reviewers believe that Poniatowska includes irrelevant information in her writings, most believe the amount of detail she does provide gives readers a better perspective. Commentators agree that her use of the novela-testimonio produces insightful and provocative stories. Critics acknowledge that Poniatowska's love for Mexico and its populace is very apparent in her writing. This love is most evident in her nonfiction works Massacre in Mexico and Nothing, Nobody. These two documentaries, along with Until We Meet Again, are regarded as her most important works. Lilus Kikus (novel) 1954 Hasta no verte, Jesús Mío [Until We Meet Again] (novel) 1969 Le noche de Tlatelolco [Massacre in Mexico] (nonfiction) 1971 Querido Diego, te abraza Quiela [Dear Diego] (fictional letters) 1978 De noche vienes (short stories) 1979 Gaby Brimmer [with Gaby Brimmer] (documentary) 1979 Fuerte es el silencio (short stories) 1980 íAy vida, no me mereces! (essays) 1985 La ‘Flor de Lis’ (novel) 1988 Nada, nadie: Las voces del temblor [Nothing, Nobody: Voices of the Mexico City Earthquake] (documentary) 1988 Todo Mexico (interviews) 1991 Tinísima [Tinisima (novel) 1992 Bell Gale Chevigny (essay date July 1985) SOURCE: “The Transformation of Privilege in the Work of Elena Poniatowska,” in Latin American Literary Review, Vol. 13, No. 26, July, 1985, pp. 49–62. [In the following essay, Chevigny examines the effect wealth and social standing have on the women in Poniatowska's stories.] “We write in Latin America to reclaim a space to discover ourselves in the presence of others, of human community—so that they may see us, so that they may love us—to form the vision of the world, to acquire some dimension—so they can't erase us so easily. We write so as not to disappear.” These remarks of Elena Poniatowska at a conference at Wellesley College in the spring of 1980 drew their coloration from her anguish over the “disappearance” of Latin Americans by political forces, but they aptly characterize her most important work as well. The evanescent or invisible, the silent or the silenced, those who elude official history or vanish from it, make the subject of the two of Poniatowska's works from which her fame and influence chiefly derive. Her testimonial novel, Hasta no verte Jesús mío [1969, Until I see you, my Jesus] presents in first-person narration the story of an adventuring peasant woman, fighter in the Mexican revolution and survivor of its inhospitable aftermath. Hitherto such characters had been presented only externally, and Poniatowska's distillation of her subject's dense and highly-colored idiom became a new literary resource. La Noche de Tlatelolco [1970, translated as Massacre in Mexico] is a dramatic collage of interviews with participants in the 1968 student movement and with witnesses to the massacre of hundreds during a peaceful meeting in Mexico City, an event obfuscated by government agencies and the press alike. A close reader of Poniatowska's work may also interpret her words at Wellesley to mean that as her writing brings Latin America into being, so has Latin America made Poniatowska emerge as a writer; the two formations are intimately related. This interpretation gains force when we consider that Poniatowska's identification with Latin America and its language were both deliberate choices, the land and the tongue of her childhood being other. While her mother was Mexican and her father was Polish, both were in many important ways French. Poniatowska was born and raised in Paris. Even after the family returned to Mexico when Poniatowska was nine, only French and English were spoken at home. Most of her family still identify themselves as European. Poniatowska's choosing to cast her lot with Latin America and to write in Spanish with a highly Mexican inflection, point to a deliberateness of self-formation that is reinforced by other choices. For Poniatowska's social roots are aristocratic and her political antecedents are conservative. Generations of exile from reform and revolution in Mexico and Poland produced in France Poniatowska's parents and Poniatowska herself. Against such a background, Poniatowska's two most celebrated works stand in high relief; they delineate the dual trajectory of her career. In Hasta no verte, Jesús mío, she journeys to the opposite end of woman's world of social possibility and, in La Noche de Tlatelolco, she journeys to the alternate pole of political possibility. Each journey may be seen as metaphor and impetus of the other. Like her choice of Latin America, her choosing to write of a woman with no resources but her self and of political insurgents has everything to do with her authorial self-creation. In this connection, her rejection in 1970 of Mexico's most prestigious literary award, the Xavier Villaurrutia Prize for La Noche de Tlatelolco takes on added significance. In an open letter to the new president, Luís Echevarría, Poniatowska asked who was going to give prizes to the dead. In 1968 Echevarría, had been Minister of the Interior, responsible for all internal security forces. In Poniatowska's rejection of the prize lie two refusals: a refusal to help Echevarría symbolically dissociate himself from the massacre and treat as settled the problem raised by the students, and a refusal to identify herself with established power. She rejects the implications of closure which the awarding and accepting of such a prize chiefly signify. It is arguable that Poniatowska's rejection of the Villaurrutia Prize was an aesthetic as well as a political gesture; in refusing closure with the massacred subjects of her book, she acknowledges the sources of her art. I will try to show that the particular force of Poniatowska's work derives from the emptiness she found in her position as a woman of privilege and from her using that position to cultivate a readiness of imagination and spirit; when this readiness met with vivid exposure to the dispossessed, she converted equivocal privilege into real strength. Such an evolution would make her links to the dispossessed a continuing necessity. I will trace this evolution by looking first at works of hers which treat women, seeking to discern in them her progressive identification of her career as a writer.1 I will then look at the writings which treat more general political and social issues in an endeavor to show how her evolution as a woman informed her vision of these issues. When socially privileged, Poniatowska's female characters are cursed with feverish instability. In De noche vienes [1979; You come at night] a volume of stories written over several years, the protagonist or narrator is almost always a woman. Sensuousness, an antic humor, and a lyrical eagerness stamp the stories which are also often edged with intimations of death or of isolation without remedy. Three of them offer patently autobiographical moments. In “Canción de cuña” [“Lullaby”], dedicated to “una Señorita bien educada” [a well-bred young lady], Poniatowska offers a paradigmatic image of that condition. An undefined narrator speaks fancifully to a woman disqualified from experience by her very position of privilege. She is counseled to march through her day with the steps of a sergeant, to end it with prayers and fall asleep to a lullaby: Lovely little sparrow with a coral beak I bring you a cage of pure crystal.(2) But with lids closed she feels beneath her body the earth and its grottos, its rivers with their crossing roads, its fire and its gold, its diamonds submerged in coal and still lower the deaf beat of the lava. She feels the elements which erupt in volcanos, and without opening her eyes she hears a voice whispering the most tender declarations of passion. It is important that the explosion of repressed love and longing comes from the earth, that one subterranean realm ignites the other, that despite her crystal cage, the Señorita is not out of touch with earth. Although such women are cut off from life by sex, class, and rearing, their predicament does not jail their imaginations, their sense of the possible. In “El limbo” [“Limbo”], Monica, a kindred protagonist, tries to take action, carrying the unwanted infant of Rose, a housemaid, to the hospital, there trying absurdly first to get preferential treatment and then to organize a group of mothers to protest bad hospital conditions. At home, her aristocratic grandmother is repelled by the girl's raw indignation (“if you went about it … à la Tolstoy, I would overlook it, but you are the most dreadful fabricator of commonplaces I have ever heard in my life”). Finally her mother half distracts her with thoughts of a dance, but Monica weeps over her supper: She cried because she would never make a bomb in the basement of her house … —the powder was damp beforehand—but she cried above all because she was Monica and no one else, because the death of Rose's baby was not her death and she couldn't experience it, because she knew very well she would dance Saturday in her red dress, O Bahía, ay, ay, tapping with her heels on the heart of the child, she would dance over the women whose babies fell between their legs like rotten fruit, she would dance … because after all, one's own life is stronger than that of the rest.3 The desperation underlying this self-assertion finds only ironic relief in the experience privilege affords mature women. In them the potential of the señorita of Canción de Cuna is warped. The narrator of “El inventario” [“The Inventory”], the young mistress of an ancestral house being dismantled, is one of those observers on whom nothing is lost. She is closest to the servant, a woman as cold as all the years not lived in that house, as implacable as the furniture which is the essence, in this bitter sketch, of family. This servant, whose kneeling makes the narrator feel kneeled-on is named Ausencia (absence). Ausencia might as well be the name of the narrator, of the ancestral estate, of the life it affords well-bred ladies. In an amazing scene, an Aunt Veronica, who lives to command the furniture and its care, loses herself in the miasma of sweet wood smells and turpentine oils in the shop of a furniture restorer. Aunt Veronica stopped giving orders. I think she even forgot why she had come. She sniffed excitedly and hid behind the sound of the saw. Slowly, ever so slowly, she ran her slender fingers over the corners of a table, slipping them into this or that crack and leaving one of them inside with indescribable pleasure. Finger and cleft fit delicately together, immersed in each other, and, I don't know precisely how or why, my aunt's excitement was contagious. For the first time I was seeing something unknown and mysterious. Aunt Veronica was breathing hard, as if her body were brushing up against something alive and demanding, something inexhaustible which rose with her as her breathing filled with desire. Then she gave instructions with a vague softness, her eyes sated, and something came out of her, something not like her usual words, her swollen lips betraying her. And then I understood that furniture is made to receive our bodies or for us to touch it lovingly. Not in vain did it have laps, backs, and quilted arms to play horsey on; not in vain were the shoulders so broad, the seats so cozy. Furniture was neither virgin nor innocent; on the contrary, it was heavy with awareness. Every piece was covered with glances, with the licked corners of mouths, with chinks, with sculpted flanks. There were corners filled with a secret light and an animal force rose unmistakably from the wood.4 Again, as with the Señorita and Monica, imagination and the need to give and receive love have nowhere to go. They can offer only this delicious and perverse insight into chairs. It may forever alter our casual sense of them—but is that enough? The flight of fancy here is symptom and protest against the crystal cage of class and gender. And clearly here, the crystal cage is the stronger for being made in Europe. The narrator's family, troubled by her outbursts, determine to keep her more indoors—or to send her to Europe (two versions of the same idea, as it turns out, because for the narrator Europe is an old pullman car with dusty curtains, seats of wine-colored plush, toothless fringes; it is threadbare, it smells bad). It is tempting to read Querido Diego, te abraza Quiela [1978; Dear Diego, with hugs from Quiela] as that sort of covert autobiography which magically fends off possible destinies; in it Poniatowska, a Pole raised in Paris and in love with Mexico, seems to measure the cage she has had to flee. For Quiela is Angelina Beloff, a Russian painter who lived in Paris ten years with Diego Rivera before he left her for Mexico promising to write for her to follow. Drawn to this woman left on history's margin, Poniatowska has taken scraps of her letters and imagined them whole, imagined what Quiela felt, recalling the cold winter when their infant son died, living through another winter trying to keep her love alive and give new birth to her painting. All fails, motherhood, painting, and love—even the letters are (and were) never answered. Poniatowska has found a form that follows the contours of unrequited love and pathetically enduring hope, an epistolary novel of dead letters, a duet for one instrument. What is her object? Poniatowska explores the depths of female dependency, casting her light in that abyss to banish its terrors, for herself and the rest of us. In all these works Poniatowska demystifies privileged gentility so that it can no longer seduce any woman or be honored or used as weapon of control over them. Angelina's story may exorcize a ghost of Poniatowska's, but it is not her story. For she would have been already there in Mexico, like Rivera, but making her own mural of the revolution. A mural of revolution: that partly describes Hasta no verte, Jesús mío. Jesusa Palancares, the speaker of this extraordinary novela-testimonio, is the antithesis of Angelina Beloff, sharing with her only a will to survive and a need to break silence, to assert herself (Angelina before an indifferent man, Jesusa before an indifferent society). They have in common also Elena Poniatowska, who sees in Angelina how one kind of female sensibility feeds dependence and in Jesusa how another kind feeds an independence that is almost—though not absolutely—complete. The novela-testimonio lends itself peculiarly to a sort of symbiosis in which the author explores through the presentation of the subject her or his own potential strengths and weaknesses. In Cuba, for example, Miguel Barnet sees in the black centenarian who fled slavery and fought for Cuban independence what is the stuff of independence [Biografia de un cimarrón, 1968, translated as Autobiography of A Runaway Slave]; in the spunky vedette Rachel, who fought for marginal bourgeois existence in republican Cuba, he sees how inevitably her thoughts and feelings were compromised [Canción de Rachel, 1970; Rachel's Song]. Barnet, who was transforming himself from a privileged bourgeois into a revolutionary clearly used these books as aspiration and catharsis, and his method, it seems to me, might also be Poniatowska's. He writes: “Canción de Rachel speaks of her, of her life, just as she told it to me and just as I then told it to her.”5 As the writers become ventriloquists for their subjects, so is the reverse true. What we know of Poniatowska's life bears out such an interpretation. When she was brought to Mexico at the age of nine, she was placed for three years in an English school. As only French and English were spoken at home, she learned Spanish from the servants; her regard for these speakers and their world is bound up with her love for the language as they speak it. She has said that she feels that she is Mexican because this idiom comes now more definitively from within herself than any other.6 When she first saw Jesusa, she was working as a journalist, interviewing important figures daily for the Mexican newspaper Novedades, but she was more attracted to Jesusa than to anyone else, she says, “because she spoke so coarsely, so vehemently—I loved her language—because she was always fighting and because she is very short like me.”7 Jesusa did not want to be... (The entire section is 6368 words.) Barbara Probst Solomon (review date 2–9 August 1986) SOURCE: “Horse-Trading in Female Ecstasy” in Nation, Vol. 243, No. 3, August 2–9, 1986, pp. 83–4. [In the following review, Solomon draws comparisons between ecstasy and pain in Dear Diego.] To appreciate what the gifted Mexican novelist Elena Poniatowska is up to in her extraordinary novella, Dear Diego, it helps to know an earlier classic, Ifegenia: The Diary of a Young Girl Who Was Bored, written in the early 1920s by the Venezuelan novelist Teresa de la Parra. In Ifegenia, which has never been translated into English, de la Parra examines the psychological and sensual state of a liberated Venezuelan woman just after her return from... (The entire section is 1507 words.) Marcella L. Paul (essay date 1990) SOURCE: “Letters and Desire: The Function of Marks on Paper in Elena Poniatowska's Querido Diego, te abraza Quiela,” in Continental, Latin-American and Francophone Women Writers, Vol. 2, 1990, pp. 1–6. [In the following essay, Paul examines the meaning of the words, etchings, and spaces in Querido Diego, te abraza Quiela, and how they are important to understanding Quiela's situation.] In her novella, Querido Diego, te abraza Quiela, Elena Poniatowska sets her fictional narrative within an accurate historical context: the text consists of a series of twelve letters purportedly written by the Russian artist Angelina (“Quiela”) Beloff and... (The entire section is 2228 words.) Beth E. Jörgensen (essay date Summer 1991) SOURCE: “Framing Questions: The Role of the Editor in Elena Poniatowska's La noche de Tlatelolco,” in Latin American Perspectives, Vol. 18, No. 3, Summer, 1991, pp. 80–90. [In the following essay, Jörgensen writes that Poniatowska's style of editing the various sources in La noche de Tlatelolco is superb and notes that this editing style gives the story more impact.] Elena Poniatowska, French-born Mexican journalist and author, is widely recognized for her substantial contributions to the growing body of Latin American testimonial and documentary narrative. Her many published works include short stories, novels, hundreds of interviews, chronicles... (The entire section is 4705 words.) Susana Conde with Elena Poniatowska (interview date May 1991) SOURCE: An interview in Belles Lettres, Vol. 7, No. 2, Winter, 1991–1992, pp. 41–4. [In the following interview conducted in May 1991, Conde and Poniatowska discuss the female protagonists in Poniatowska's stories.] Mexican writer Elena Poniatowska was a visiting lecturer at the University of California at Santa Cruz campus last May when she spoke with Susana Conde. Elena Poniatowska was born in Paris in 1933, to a Mexican mother and a French father of Polish origin. During the Second World War, her father was a soldier and her mother drove ambulances. At eight, Elena and her family emigrated to Mexico. Because she then spoke only French,... (The entire section is 2373 words.) George R. McMurray (review date Spring 1992) SOURCE: A review of Todo México, in World Literature Today, Vol. 66, No 2, Spring, 1992, p. 318. [In the following review, McMurray rates his interest level in the various interviews that make up Todo México.] Elena Poniatowska (see WLT 66:1, p. 76) began her career as a journalist and achieved success with her interviews of internationally known celebrities. Todo México reproduces nine lengthy conversations which, in their entirety, not only convey considerable information about the interviewees but also reveal Poniatowska's skill as a journalist. The following personalities are portrayed in this first of a series of volumes: Luis Barragán, the... (The entire section is 302 words.) Cristina Ferreira–Pinto (review date Winter 1994) SOURCE: A review of Tinísima, in World Literature Today, Vol. 68, No. 1, Winter, 1994, pp. 90–1. [In the following review, Ferreira–Pinto states that although lengthy, Tinísima is an excellent depiction of Tina Modotti's life.] A common element in the work of the Mexican writer Elena Poniatowska (see WLT 66:1, p. 76) is the commitment to portray her country, its society and culture, and to interpret Mexico's social and political history, most notably since the Mexican Revolution of 1910. Oftentimes this portrayal and this interpretation take place through the voices of women and minorities, for Poniatowska has always shown in her writing a deep... (The entire section is 1074 words.) Claudette Williams (essay date May 1994) SOURCE: “Subtextuality in Elena Poniatowska's Hasta no verte Jesús mío,” in Hispania, Vol. 77, No. 2, May, 1994, pp. 215–24. [In the following essay, Williams psychoanalyzes Jesusa, the main character of Hasta no verte Jesús mío.] During the last two decades critical attention has turned increasingly to women writers in Spanish America and the articulation of gender issues in their work. Along with Isabel Allende of Chile and Luisa Valenzuela of Argentina, Mexico's Elena Poniatowska is part of what might well be termed an emerging canon of Spanish American women writers. Her testimonial novel Hasta no verte Jesús mío (1969) is based on... (The entire section is 6170 words.) George R. McMurray (review date September 1994) SOURCE: A review in Hispania, Vol. 77, No. 3, September, 1994, p. 459. [In the following review, McMurray comments that although he enjoys Tinísima, he finds that the novel is weighted with too much unnecessary information.] Tina Modotti, for whom Tinísima is named, was an Italian photographer who as a young girl immigrated to San Francisco in 1913 with her family. Attracted to California's thriving art community, she briefly pursued an acting career in Hollywood and married a painter whose work took them to Mexico in the early 1920s (he died of smallpox soon after their arrival). Feeling more at home in Mexico than in the United States, Tina soon... (The entire section is 617 words.) Deborah Shaw (essay date January 1995) SOURCE: “Gender and Class Relations in De noche vienes,” in Bulletin of Hispanic Studies, Vol. 72, No. 1, January, 1995, pp. 111–21. [In the following essay, Shaw examines two themes prevalent in De noche vienes: the romantic relationships that women have with men and the relationships that women have with women of different social standing.] Elena Poniatowska is best known for her chronicles of political injustices suffered by Mexicans, and for her testimonial novel, Hasta no verte Jesús mío (1969), which provides a semi-fictional biography of a poor woman, struggling to survive in twentieth-century Mexico.1 She is less known... (The entire section is 5156 words.) Kay S. García (essay date 1995) SOURCE: “Elena Poniatowska: Search for the Voiceless,” in A Dream of Light and Shadow: Portraits of Latin American Women Writers, edited by Marjorie Agosín, University of New Mexico Press, 1995, pp. 237–51. [In the following essay, García states that Poniatowska's writing demonstrates her love for Mexico and all Mexicans.] I write in order to belong. Elena Poniatowska belongs to Mexico, to women, to the poor, to the oppressed, to the people of the world.1 She belongs to the cooks, the seamstresses, the students, the servants: people she immortalized in her books on the massacre of student demonstrators in 1968 and the earthquake that hit Mexico City... (The entire section is 5424 words.) Margarita Vargas (essay date Fall 1995) SOURCE: “Power and Resistance in De noche vienes,” in Hispanic Journal, Vol. 16, No. 2, Fall, 1995, pp. 285–96. [In the following essay, Vargas studies the constant changes in power that occur in De noche vienes.] As the bulk of her fiction, her testimonial literature,1 her public lectures, and the criticism of her work attest, Elena Poniatowska concerns herself mainly with giving a voice to the disenfranchised and denouncing social problems in Mexico City.2 In works such as Hasta no verte Jesús mío and Fuerte es el silencio she speaks out for the destitute, the homeless, the children who sell gum and newspapers on the... (The entire section is 4670 words.) Ilan Stevens (review date 28 October 1996) SOURCE: A review in Nation, Vol. 263, No. 13, October 28, 1996, p. 52. [In the following review of Tinísima, Stevens praises Poniatowska's ability to bring out the many facets of Tina Modotti's life.] Tinisima is many books in one: a voluminous novel about the notorious Italian photographer and activist Tina Modotti (1896–1942); a travelogue; a photo album; an annotated collection of Modotti's correspondence; and a catalogue of the innumerable personalities she came across during her stints as a Communist in France, Spain, the Soviet Union and the Americas both north and south of the Rio Grande. That Elena Poniatowska, Mexico's foremostiemme de... (The entire section is 1695 words.) Don M. Coerver (review date February 1997) SOURCE: A review of Nothing, Nobody, in Hispanic American Historical Review, Vol. 77, No. 1, February, 1997, pp. 141–42. [In the following review, Coerver notes that although Nothing, Nobody: Voices of the Mexico City Earthquake is hard to follow due to its lack of organization, it remains a compelling story that makes a strong impact on readers.] Elena Poniatowska—prominent journalist and prolific novelist—provides a compelling account of the Mexico City earthquakes of September 1985 through the recollections of the city's inhabitants. The much-maligned Mexican capital not only serves as the background against which the human drama unfolds; it is... (The entire section is 516 words.) Figueredo, Danilo H. “Growing the Collection: Beyond the Boom: García Márquez and the Other Latin American Novelists.” In Wilson Library Bulletin 69, No. 6 (February 1995): 36–8. Comments on Poniatowska's perfection of the “testmonio” form and ranks her among the top Latin American writers. Gonzalez, Rafael M. In Library Journal 122, No. 1 (January 1997): 80. Briefly reviews Paseo de la reforma and praises Poniatowska's writing ability. Motain-Meadows, Mary. In Bloomsbury Review 12, No. 8 (December 1992): 11, 22. (The entire section is 128 words.)
<urn:uuid:80d06c2c-edd1-40a5-aa7b-2a442e7ce47d>
CC-MAIN-2017-04
https://www.enotes.com/topics/elena-poniatowska/critical-essays
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00499-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953424
7,211
2.578125
3
- they failed to advance any scientific facts to substantiate their frequent assertions of absolute truth, and - they attempted to mislead the audience by mis-stating and/or lying about third-party statements which could be verified for their accuracy later. Sunday, March 18, 2007 Post-normal science and climate change Here are two excellent posts by Melanie Phillips on the new tenor of the climate debate. Finally, advocates of AGW are admitting that the discussion is not being framed by conventional, empirical scientific method, but instead by post-normal science, driven by belief, values and ideology. And, finally, the popular media is beginning to question the motives and rationale for such post-normal science. This comes quickly on the heels of the results of the big debate in New York between three leading promoters of AGW and three prominent skeptics, which clearly favoured the skeptics -- not just because of their debating skill but because the pro-AGW team committed two fatal errors: On these grounds, the AGW team were tried and found to be wanting. Finally, opposition to the imposition of the AGW thesis is moving beyond the ad hominem attacks and slurs. Give enough journalists enough studies to review and the mainstream public will finally get to read what specialist bloggers have been writing about for the past few years. The next stage will be the refusal of a highly-rated political candidate to wrap themselves in this particular shade of post-normal green and instead invoke the need for policy to be based on real science and for environmental policy to tackle real issues and not ecomyths advocated by ideologues. Posted by L Graham Smith at 3:55 PM
<urn:uuid:bf842e45-3a3b-418a-a6bf-ae33f54a202c>
CC-MAIN-2017-04
http://ecomythsmith.blogspot.com/2007/03/post-normal-science-and-climate-change.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00136-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96278
337
1.726563
2
Smallpox was eradicated by an international campaign led by the World Health Organization (WHO) in the 1970s. Until recently, there has been little concern about the use of smallpox as a biological weapon. Currently, the only known remaining virus samples are stored in the Centers for Disease Control (CDC) laboratories in Atlanta, Georgia, and in Russia. Since the terrorist attacks on the United States, concern over the possible use of smallpox as a biological weapon has increased. Attributes of smallpox that make it a potentially effective weapon include its highly infectious nature, the high fatality rate, and the population's lack of protection from the disease either via natural immunity or sufficiently recent vaccination. What is it? Smallpox is a highly infectious disease caused by the variola virus that is spread from person to person through face-to-face contact. The incubation period is usually between 12 and 14 days and is not accompanied by symptoms. The 2 main forms of the disease are: variola major and variola minor. The more severe form of the disease is variola major, which has a fatality rate of about 30%. The less severe form of the disease is variola minor, with a fatality rate of less than 1%. Because patients experience milder symptoms with variola minor, many are ambulatory and can unknowingly spread the disease to a wider population during the infectious stage. Patients suffering from variola major usually became bedridden early on and remain so throughout the illness. Around the second week, following the incubation period, there is a sudden onset of flu-like symptoms including fever, headache, back pain, and fatigue. Two or 3 days later, the characteristic rash starts to appear on the face, arms and legs. On about the eighth or ninth day, the skin lesions become postular and eventually become crusty. During the last stages, the scabs separate and fall off. Transmission of smallpox cannot occur during the incubation period. Thereafter, transmission of smallpox can occur until the last scabs have fallen off, but the risk of infection is much lower at this stage. Transmission can also occur through contaminated clothing and bedding, but infection is less likely. Animals and insects cannot carry the disease. What is the potential for a smallpox outbreak? During the WHO eradication campaign in the 1970s, investigations revealed that smallpox could sometimes spread in closed environments via ventilation systems. In terms of natural spread via face-to-face contact, the initial or "index" case has been known to infect up to 5 people and in rare cases more than 12. These historical data are available only from periods when a substantial portion of the population was immune to smallpox either from vaccination or from surviving natural infection. In the absence of natural disease or recent vaccination, the global population is significantly more susceptible. Some experts have estimated that the rate of transmission under present circumstances could be of the order of 10 new infections per infected person. How long does the smallpox vaccination last? Persons who have been vaccinated against smallpox usually have immunity for at least 10 years. Is smallpox vaccination dangerous? Routine vaccination for smallpox ceased in 1972. Complications from smallpox vaccination are infrequent but may include less severe symptoms - such as treatable rashes, and severe symptoms such as brain inflammation (encephalitis). Hence vaccination is only warranted in persons who have been exposed to the virus or are at risk for exposure. What is the treatment for smallpox? There is limited treatment for smallpox once symptoms have started. If smallpox vaccination is given immediately after exposure (within 1 to 4 days), it is possible that illness can be prevented, or the severity of the sickness reduced. In the past the death rate from smallpox was as high as 30%. Complications from smallpox include scarring, secondary bacterial infection of the skin at the lesion sites, arthritis and bone infections, pneumonia, severe bleeding, eye infections, and brain inflammation. Between 65% to 80% of survivors were marked with deep pitted scars (pockmarks), most prominent on the face. Antibiotics can be given to treat secondary infections. Any exposed persons need to be isolated. This includes the person who has contracted the disease and all other face-to-face contacts with that person. in association with the MediResource Clinical Team
<urn:uuid:0544ed4d-4e38-47a0-964f-d37cbb97d85b>
CC-MAIN-2017-04
http://www.medbroadcast.com/channel/infection/overview/smallpox
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00511-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955405
891
4
4
HB 316 (BR 1344) - R. Damron AN ACT relating to insurance for tangible personal property to secure a loan by a consumer loan company. Amend KRS 286.4-560 to establish the requirements for a consumer loan company to offer borrowers insurance on tangible personal property, except household goods, as security on a loan exceeding $300 if sold by a licensed insurance agent or by the consumer loan licensee if permissible under Kentucky law, and if the insurance may be excluded from the amount of the finance charge if the insurer waives its right to subrogation against the borrower; require a disclosure to the borrower of the coverages and costs of the insurance. HB 316 - AMENDMENTS HCS - Amend KRS 286.4-560 to provide that in addition to authority to request a borrower to insure tangible personal property used as security for a loan, a consumer loan licensee may also request and secure credit property insurance on the tangible personal property, provided that no part of the cost thereof shall be charged to the borrower unless the insurer agrees that it will not exercise its right to subrogation against the borrower under the licensee’s policy, and provide that any disclosure relating to insurance written in connection with a loan transaction shall be delivered to the borrower within thirty (30) days of the date of the loan. Feb 3-introduced in House Feb 4-to Banking & Insurance (H) Feb 6-posted in committee Feb 12-reported favorably, 1st reading, to Consent Calendar with Committee Substitute Feb 13-2nd reading, to Rules; posted for passage in the Consent Orders of the Day for Tuesday, February 18, 2014 Feb 18-3rd reading, passed 96-0 with Committee Substitute Feb 19-received in Senate Feb 21-to Banking & Insurance (S) Mar 21-taken from Banking & Insurance (S); 1st reading; returned to Banking & Insurance (S) Mar 24-taken from Banking & Insurance (S); 2nd reading; returned to Banking & Insurance (S) Mar 25-reported favorably, to Rules as a Consent Bill Mar 26-posted for passage in the Consent Orders of the Day for Wednesday, March 26, 2014; 3rd reading, passed 38-0 Mar 27-received in House; enrolled, signed by each presiding officer; delivered to Governor Apr 8-signed by Governor (Acts, ch. 58)
<urn:uuid:cf05b286-60f7-4216-b07a-351bc385eda3>
CC-MAIN-2016-44
http://www.lrc.ky.gov/record/14RS/HB316.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00023-ip-10-171-6-4.ec2.internal.warc.gz
en
0.952283
503
1.53125
2
|"(lead) a dog's life" = life is difficult with little pleasure| "Ever since he lost his job, he's been leading a dog's life." "a snake in the grass" = a person who can't be trusted "Be careful. He's really a snake in the grass, and I never know when he's telling the truth." More of Randall's Favorite Learning Resources [ Quiz Script | Explanation of Answers | Text Completion Quiz ] |difficult||animals||interview||man and boy||04:22| What are some common and exotic animals people keep as pets? |1. Pre-Listening Exercises [Top]| HELPFUL TIP: Taking care of pets can take a great deal of time, but having a pet can also help you emotionally. Choose a pet that suits your needs and personality.| Listen to the conversation by pressing the "Play Audio" button and answer the questions. Press the "Final Score" button to check your quiz. |2. Listening Exercises [Top]| [ Other Audio Options: Play RealMedia | Play Window Media ] Listen to the conversation again as you read the Quiz Script. Read the Explanation of Answers for the quiz. Do the Text Completion Quiz. |3. Post-Listening Exercises [Top]| Choose an exotic pet you want to learn more about and search for tips on caring for this animal. Share your findings with a partner. Some animals could include: llama, iguana, pygmy goat, or peacock. What pet would be ideal for different types of people and situations, including children, people who live in apartments, and the elderly? Now, write your opinions on a similar topic at Randall's ESL Blog HERE. Randall's Sites: Daily ESL | ESL Blog | EZSlang | Train Your Accent | Tips For Students | Hiking In Utah
<urn:uuid:ae26f129-5423-4780-94bd-3bb6b3661566>
CC-MAIN-2016-44
http://esl-lab.com/pets/petrd1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00353-ip-10-171-6-4.ec2.internal.warc.gz
en
0.914175
414
2.28125
2
The IT industry is in its golden age in the 21st century. We are making advancements in technology more than ever, especially computer technology. Personal computers are becoming much more powerful, and they tend to run much smoother than ever before. Of course, the developments made in smartphone technology are too numerous to count. Most importantly, smartphones can do anything that laptops or PCs can. On top of that, they fit right in one’s pocket, making them a lot more convenient. The progress made in IT has also opened the door for online entertainment. Online entertainment is rising, whether streaming media, playing multiplayer games, or gambling / placing bets online. In this article, we will focus on the relationship between iGaming (online gambling) and the IT industry and talk about the few ways in which both have impacted each other. Online gambling websites are places where gamblers can play their favorite casino games. Today, the most popular games are online slots. Almost all online casinos nowadays put most of their focus on online slots. Like their land-based counterparts, online slots are games of pure chance, where the player only needs to spin the reel and hope for the best. Apart from slots, other popular games at online gambling sites are poker, blackjack, roulette, baccarat, and sports betting. So, now that we know what online gambling is and how it works, the question remains, how has it impacted the betting industry? Let us look at how IT has benefited from the creation of online gambling. The first and foremost way the IT industry has benefited from iGaming is the advancements in security tech. After all, many gamblers, especially high-rollers, tend to be very interested in keeping their assets, identities, and personal information safe. For this reason, many online slots provide the proper security for deposits as low as US$10. The measures taken by many online gambling websites were innovative in their time. The programmers and creators of these sites used the latest encryption technology to create new measures through which the users’ personal information will be kept safe. Apart from the advancements in encryption technology, the online gambling industry has led to many other developments in programming. Programmers use the Random Number Generator software to create most online gambling sites. Through this process, the developers ensure that every result is randomized, and thus land-based gambling is recaptured quite well. The biggest benefit of this is that the Random Number Generator is relatively cheap and easy to understand and program while being very effective in what it is meant to do. However, it isn’t all easy. More often than not, online slots (and other gambling games) are programmed using C++. C++ is notoriously one of the most complex programming languages to learn. The difficulty of the language means that it takes a skilled programmer to program and create an online gambling website, which means that the iGaming industry has produced many skilled programmers who can advance in other aspects of IT. In 2022, most people have moved on from computers and spend most of their time on their phones. After all, a smartphone is just a mini-computer, with the benefit that it can fit in your front pocket. For that reason, iGaming companies are trying to appeal more and more to smartphone users. For this reason, they have tried to make most of their games mobile compatible. Thanks to this, mobile website compatibility has seen a massive boost and is easier than ever in 2022. Read More: 243 Ways to Win in an Online Casino Slot A lot of thought goes into the design of a website. Good designs need to draw attention and yet not overwhelm the target. However, it must be visually attractive, not distracting from the subject. Not to mention all of the thoughts that go into the minutiae that we don’t even consider, such as the font, its size and color, the placements of the links, etc. With online gambling websites, all of these are all the more important. Many gamblers don’t like to be distracted when they play games (especially more competitive games like poker); however, a boring website design will not draw them in. Graphic designers tasked to create an iGaming website must work twice as hard and straddle the line between an interesting and compelling design yet still bland enough so as not to be distracting, leading to many graphic designers sharpening their skills when creating these websites. The IT industry is somewhat a golden age like the online gambling industry. Both industries complement each other, as advancements made in one are likely to improve certain aspects of the other. The iGaming industry’s impact on IT has improved cybersecurity, web, and graphic design. On the other hand, of course, iGaming would not be possible without the IT industry. For more gambling news and reviews, check out SBS.
<urn:uuid:5bbba8dc-9264-424e-bfe5-9b079c3522ca>
CC-MAIN-2022-33
https://writfy.com/how-online-gambling-is-boosting-the-it-industry/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00276.warc.gz
en
0.960679
987
1.671875
2
Economy watch: Let's get radical Both our Economy Watch writers agree that change is needed within the DFP... Richard Ramsey, chief economist Ulster Bank In many ways, it is the Department of Finance and Personnel (DFP) of all the government departments that has the most potential to influence the |economy given its key role in deciding how much public |expenditure is spent and where these resources are allocated. Furthermore, the terms and conditions of public sector |employment can significantly influence the performance of the public sector and its attractiveness as a place to work relative to the private sector. It is encouraging that the new minister has already placed significant emphasis on the positive role that the public sector can play in driving the economy forward, but it is important that he utilises all aspects of |his brief to achieve this, as the ‘personnel minister’ as well as the ‘finance minister’. The minister has set the challenge for Northern Ireland’s public sector to be the most |innovative in the world. To meet this challenge he is right to stress ‘the relentless pursuit of one aim — reform’. This includes reforming our attitudes and |ambitions. If Northern Ireland is to be successful in this regard, it has to be more proactive in |reform than its counterparts in Great Britain, Ireland and |Europe. This requires a focus on structures, processes and people that are best in class too. At a CBI breakfast, the minister asked: “Why shouldn’t we aim for public service excellence delivered by excellent public servants?” The skills and experience within our public bodies need to reflect this key role. |Excellence requires the investment in and development of specialists. We would not expect GP’s to perform cardio-thoracic surgery. Similarly, specialists, as opposed to generalists, within the public service are needed to achieve best in class. We need to devise and implement world-leading economic strategies. We require international-class experts in planning, procurement, public-sector delivery, economic strategy, policy development who could hold their own in the best equivalent organisations in Europe. This is something that lies within our control. Being porous to external influences and attracting international experience to key positions is something our public sector and our economy at large need to do. Over the years we have successfully levered in financial |resources from the US, Brussels and Westminster. Perhaps we should fix our attention on levering in human as well as or rather than financial resources. Experts in public sector and economic reform from Washington, London or Brussels could add a lot of value. Radical reform requires an infusion of radical reformers. Delivering reform requires the electorate to have an understanding of the public finances. To achieve this, the new Minister should continue his predecessor’s frank ‘telling it as it is’ style and indeed formalise this. A lack of appreciation of public finances in any economy fuels unrealistic expectations of what can be afforded and how far revenues can be stretched. This strategy would require greater transparency over revenues, subsidies, public expenditure and benefits take-up. Throwing sunlight on what and where money is spent is the most effective way to highlight waste and inefficiency and change behaviours. Effective communication with the electorate will enhance understanding and pave the way for unpopular but necessary policy decisions. Northern Ireland cannot afford to ring-fence inefficiency. That’s why a renewed focus on public-sector productivity and a redefining of ‘value for money’ are required in a more hostile era of fiscal restraint. A State of the Nation public information address by the DFP Minister highlighting our annual fiscal deficit would be worthwhile. Headline per capita expenditure and revenue comparisons with other UK regions would also be included in the annual rates bills. How much public expenditure is spent on frontline services as opposed to back office functions? Does there need to be a rebalancing of resources between the two? In recent years, Northern Ireland has been bombarded with the narrative of austerity without anywhere near as much of the reality as elsewhere. There has been some relief that these prophecies of fiscal doom and gloom have not materialised. For example, Northern Ireland has been spared the swingeing cuts that departments in Great Britain have experienced. Perhaps, however, in some |respects, this was not an ideal outcome, as the urgency and need for reform has been deferred by not eliminated. Traditionally, the view has been that maximising the size of the block grant is in the best economic interests of Northern Ireland. However, while Northern Ireland enjoyed an expenditure boom throughout most of the last decade, it didn't narrow the prosperity gap with the UK. Northern Ireland does not suffer from a lack of public |expenditure to deliver world-class public services. The challenge is the delivery. To this aim, benchmarking public sector processes and performance against the world’s best is required. If Northern Ireland’s public sector is to meet the minister’s vision of becoming the most innovative in the world, this |attitude must percolate through its institutions, people and processes. Innovation thrives from competition. The public sector must be opened up to greater competition not only between the public and private sector but within the public sector. The new minister has made an impressive start and although he has a hard act to follow, he has in many respects been a breath of fresh air. He has set out a clear vision. Delivering it may at times be Mission Unpopular, but it is not Mission Impossible. Simon Hamilton MLA, Finance Minister Since my appointment as the new Minister of Finance and Personnel, much of the focus of media interviewing has understandably been on what I and my department can do to assist our ailing economy. We’ve been through tough times. Six years of growing |unemployment, contraction in key sectors such as construction and retail, and the bursting of the property bubble have made their mark on our economy. There are encouraging signs that we are at least entering the foothills of economic recovery. The recovery will be slow and stuttering. We might well take two steps forward and one back but I sense we are definitely moving in the right direction. I agree with a leading businessman who recently suggested to me that a year from now we’d look back at 2013 as the beginning of better days. Indicators such as Ulster Bank’s Purchasing Managers’ Index, which showed marked growth in business activity to the highest levels since August 2007, and the UK Trade and Investment report which showed how Northern Ireland is one of the UK’s most successful regions for attracting inward investment, are very encouraging. They don’t, however, reflect the lack of consumer confidence caused by wage freezes or cuts and the rising cost of living. Hearteningly, however, a Danske Bank survey found consumer confidence has risen recently following the biggest monthly fall in unemployment in 11 years. The Department of Finance and Personnel (DFP) doesn’t have the same sort of economic development role that DETI does but our responsibilities |as part of a strategic centre |allocating scarce resources, means we are an economic |department. The procurement of billions of pounds worth of goods, services and capital projects annually and administering the most attractive business rates regime in the UK are two examples of how what DFP does can be an economic driver. But where I see the DFP contributing to a bigger economic dividend in the years ahead is |in our role in making reform a reality. The state has long played a key role in encouraging economic activity. Some would argue too key a role in Northern Ireland. They are right in some |respects. Our economy has been too dependent on the public sector for jobs and growth and our private sector has been far too small. Conventional wisdom is that Northern Ireland’s big public sector not only imbalances our economy but is an active impediment to developing a dynamic, competitive, export-orientated economy. Government’s economic role is in fact crucial. In ensuring that the fundamental foundations of our economy are right, it is often the investment of public money that puts those basic building blocks in place. The skills we need to compete in the global fight for jobs and investment are provided for in our universities and colleges or government-backed training programmes. The telecommunications system that we need to stay in touch in an interconnected world is there because |of public investment in 100% broadband coverage and a |direct link to the US east cost in the form of Project Kelvin. And the road infrastructure we need to get the goods our companies produce to market are the result of spending taxpayers’ money. For many, creating the conditions for the private sector to thrive should be the sum total of government’s economic role and responsibilities. But government can go |beyond that. Professor Mariana Mazzucato, of the University of Sussex, recently published a book entitled The Entrepreneurial State. In it she argues that governments have historically invested, taken risks and innovated every bit as much of not more so than the private sector. She uses Apple to illustrate her argument pointing out |how it received early funding from the US government’s Small Business Investment Company and how many of the key features of the iPhone and |iPad, including GPS and touchscreen technology, were state-funded in their development. Apple’s Steve Jobs brought these technologies together, packaged them beautifully and |marketed them brilliantly but he benefited from initial public investment. We shouldn’t be afraid of our public sector. Instead we should embrace its potential |as a driver of the economy. As an entity that can inspire innovation and entrepreneurship. We must re-evaluate and reinvent the role of the government when it comes to the economy. Envisage an economy where the public sector drives the economy forward and |doesn’t drag it down. Imagine a public sector that’s every bit as innovative and |creative as the economy we want for Northern Ireland. I fundamentally believe that a reformed public sector is |one of the cornerstones of a |vibrant and dynamic economy. Clearly assets like skills, infrastructure and telecommunications are critical but surely a strong, smart government is also a stimulus for economic |development. Entrepreneurial governments attract investment. That’s one of the reasons I will establish a Public Sector Reform Division within DFP. Making our public sector more efficient and |effective and innovative |mirrors places like Singapore and the Nordic countries whose economies are the sort of |competitive and export-orientated economies we’re trying to build in Northern Ireland. Enterprising governments produce enterprising economies. Let’s start to see |our public sector as something that can be an advantage, working with business to build the better economy Northern Ireland so badly needs.
<urn:uuid:bbe1945d-951d-4b28-ac2b-68e2c50d532c>
CC-MAIN-2016-44
http://www.belfasttelegraph.co.uk/business/news/economy-watch-lets-get-radical-29544973.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00559-ip-10-171-6-4.ec2.internal.warc.gz
en
0.953467
2,252
1.6875
2
Q: They're almost there, they're almost to America when the collision happens. What's the impact on the Florida? What happens immediately after? | FS: Well the event takes place in the dark at night. It's I believe very early in the morning actually but it's at that hour when you expect things to be quiet and here the ship slams into another ship with obviously great force and clamor and I don't think that very many people if any aside from the captain and a handful of officers had any idea of what had taken place. The passengers and steerage group are all below deck. They can't see what happened. Rumor immediately kicks in and panic ensues. I mean I would say sheer panic. Q: I mean they must have felt like it was another earthquake all over again? FS: Yes, you have people who have just been through a devastating traumatic experience feeling perhaps fortunate that they have survived the earthquake on their way with some hope to the New World and lo and behold slam, they are in a situation that in some people's mind could be worst than the earthquake that they had just experienced. I don't think they had any idea of what they were confronted with and I think that they were highly traumatized to begin with and now probably super-traumatized. From all accounts you have people who don't know what's happened panicked, rumor is rampant as to what could be happening presumably that the ship, the Florida is sinking. They have to begin to lower life boats to take passengers from the other ship, from the Republic, they have to use the life boats from the Florida to help in the transport of people from the other ship and yet you have a group of highly traumatized people who don't really know what's happening, seeing this activity and panicking to the point where they themselves think that they ought to rush for the boats and save themselves where that-, is not the case but very difficult to explain that to people who really have no idea of, of what the situation is that they may be in a boat that's going down and rumor probably is telling them that that's what happening. So you have a real panic situation that requires very stern measures. I mean breaking out arms and literally having to impose order by force of arms. back to Interview Transcripts | next
<urn:uuid:d5b6464c-0dc1-455c-9226-4bb1d5ce0471>
CC-MAIN-2017-04
http://www.pbs.org/wgbh/amex/rescue/filmmore/reference/interview/schwerin04.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00039-ip-10-171-10-70.ec2.internal.warc.gz
en
0.987951
515
1.578125
2
MARIA SJUKHUS - Stockholms stadsarkiv DVT usually occurs in a deep leg vein, a larger vein that runs through the muscles of the calf and the thigh. … subsequently identified with imaging studies (often the case), the terms superficial thrombophlebitis or superficial vein thrombosis (SVT) are preferred. The more frequent use of duplex ultrasound has allowed … › Acute and chronic.: Phlebothrombosis is a clot in a vein and thrombophlebitis is a clot in a vein which then becomes inflamed. Phlebothrombosis tends to be chronic while 2013-09-30 2019-02-07 Superficial Thrombophlebitis means there is a blood clot in the vein just under the skin (thrombosis or thromboembolism), that causes swelling and pain. - Brist på empati diagnos - Numero netherlands maddie ziegler - Bla och gul - Smittsamma sjukdommar - Dataingenjör utbildning behörighet - Subway borlange - Greklands nationalrätt - Hur ser arbetsmarknaden ut för undersköterskor - Kassaregister örebro - Mall handlingsplan Superficial Thrombosis Vs Dvt . Phlebitis And Thrombophlebitis Treatment . Thrombophlebitis Vs Cellulitis DVT vs Thrombophlebitis One of the most painful arterial and vein abnormalities we can get is DVT and thrombophlebitis. 2018-02-25 Deep Vein Thrombosis and Pulmonary EmbolismDeep vein thrombosis (DVT) is a condition wherein a blood clot is present, commonly in the veins. 24 bilder, fotografier och illustrationer med Venous Tromboflebit i ytliga vener (eng. superficial vein thrombosis - SVT) drabbar v. Superficial thrombophlebitis is a common inflammatory-thrombotic disorder in deep venous thrombosis, pulmonary Superficial vein thrombophlebitis occurred in a frequency of less than # %. MARIA SJUKHUS - Stockholms stadsarkiv Superficial Thrombosis Vs Dvt . Phlebitis And Thrombophlebitis Treatment . Thrombophlebitis Vs Cellulitis DVT vs Thrombophlebitis One of the most painful arterial and vein abnormalities we can get is DVT and thrombophlebitis. This can cause superficial blood clots, also known as superficial thrombophlebitis, phlebitis, or superficial venous thrombosis. The superficial clots that can occur with varicose veins can cause leg swelling, redness, pain, and tenderness in the affected limb or around the affected vein. 1 Superficial thrombophlebitis is an inflammatory condition of the veins. It’s caused by a blood clot below the surface of the skin. Learn more. Difference Between Atherosclerosis and Thrombosis Definition . Helg ob transport Svensk definition. Inflammation i en ven Engelsk definition. 12 May 2020 Superficial Thrombophlebitis – an approach to diagnosis and management. Resident Clinical Pearl Thrombus formation in a superficial vein with associated inflammation of the vessel wall. Typically Chopra, V. Uptodat Deep Vein Thrombosis (DVT) and Thrombophlebitis Deep Vein Thrombosis ( DVT) The condition carries a risk for Pulmonary Embolism (clots detaching and Schonauer V, Kryle PA, Weltermann A, et al. Superficial thrombophlebitis and risk for recurrent venous thromboembolism. Byta namn på wifi prispengar us open golf 2021 vilken beteckning ska finnas i en godkänd hjälm moped beskattning i sverige efva hultin malmö hur fort får lätt lastbil köra på motorväg Ytlig tromboflebit - Medibas Authors H Nasr 1 , J M Scriven 2 Affiliations 1 Department of Vascular Surgery, Heart Thrombophlebitis is a derived term of phlebitis. As nouns the difference between thrombophlebitis and phlebitis is that thrombophlebitis is phlebitis related to a blood clot or thrombus while phlebitis is (pathology) inflammation of a vein, usually in the legs. Thrombophlebitis is especially of concern in pregnant women who carry prothrombin 20210 gene mutation, as they have a predisposition to clotting. Appendix II. Ytlig tromboflebit/trombos - SBU av J Roos · 2017 — thrombophlebitis was lower in this study compared to several international studies, Prevention and treatment of thrombosis, phlebitis, and laminitis in horses with Record, v. 164, ss. Subcutaneous treatment of deep venous thrombosis with low Overview Thrombosis and embolism share many similarities, but they are unique conditions. They are Thrombophlebitis is an inflammation of the vascular endothelium with clot formation on the vessel wall. A thrombus forms when blood components (platelets and fibrin) combine to form an aggregate body (clot). Thrombophlebitis (throm-boe-fluh-BY-tis) is an inflammatory process that causes a blood clot to form and block one or more veins, usually in your legs. The affected vein might be near the surface of your skin (superficial thrombophlebitis) or deep within a muscle (deep vein thrombosis, or DVT).
<urn:uuid:d2c8207f-a078-4c75-92e7-ae064e2f39a1>
CC-MAIN-2022-33
https://jobbbvwa.firebaseapp.com/70348/62524.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00076.warc.gz
en
0.764608
1,375
2.609375
3
Origin of the name: -opsis: indicates a resemblance. The name was given related to some species having similarities to the genus Rhipsalis. Britton, N. L. & Rose, J. N. (1923): The Cactaceae. Descriptions and illustrations of plants of the cactus family 4: 209. (click to enlarge) Epiphyllopsis A. Berger Berger, A. (1929): Kakteen: 97.
<urn:uuid:cb258c28-de38-43ae-bf44-7b16177127a7>
CC-MAIN-2022-33
https://www.schlumbergera.net/genus-rhipsalidopsis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00473.warc.gz
en
0.707357
108
2.359375
2
ban on contraception funding doesn’t have a marital status clause. Phillips and her ilk want to punish women who are sexually active. We are back in the 1950s, an era when “bad” girls had to live in shame and be punished too. What happens to poor black women in Missouri who need birth control? They must either find a way to pay for it themselves, take their chances with unprotected sex, or practice abstinence that isn’t required of anyone else. How do politicians get away with depriving citizens of medical care? In part because too many Black people feel comfortable living up to the phony image of bible thumping church goers who forsake sex and oppose abortion. The fact is that black women have abortions at a disproportionate rate and will therefore suffer disproportionately whenever efforts to limit access to birth control and abortion succeed. Black women suffered disproportionately when abortion was illegal. Before abortion was legalized in New York in 1970, black and Puerto Rican women accounted for 80 percent of deaths from illegal abortions. In Georgia between 1965 and 1967 the Black maternal death rate due to illegal abortion was fourteen times that of white women. 2000, the abortion rate for black women (30 per 1,000 women) was 3.1 times the rate for white women (10 per 1,000 women). Those are strange numbers for an anti-abortion group. Denial is not a river in Dr. Joseph Booker and his colleagues in Mississippi work under the strictest abortion laws in the nation. All patients must undergo a 24 hour waiting period before the procedure can be performed. If they are willing and able to travel from great distances to get to the only clinic in Jackson, they must then be willing to brave an ugly crowd of protesters. Seventy-three percent of women who enter that clinic are black. Louisiana is following in its neighbor’s footsteps. It has voted to end abortion in anticipation of Roe v. Wade being overturned. State Senator Diana Bajoie is a Democrat and a founder of that legislature’s black caucus. She wants to outlaw abortion, with no exceptions permitted, not even to save the life of the mother. “If you believe in life, that’s what it should be.” Bajoie thinks that abortions performed to save the mother’s life are wrong because the mother could decide that she wants the baby to live instead of herself. Phony melodrama about women willing to die in childbirth is the product of a sick mind. Hurricane Katrina must have addled Bajoie’s brain. Bajoie proves that black women must be willing to speak up with their own voice, their own race and their own gender. Female politicians like Phillips and Bajoie need to be reminded, by their female constituents, that no one has to vote for them. Hopefully the pro-life forces will begin to speak up for the lives of those who have already been born. Maybe they will tell President Bush not to incinerate Iranians with nuclear weapons. If they don’t, perhaps the rest of us will speak up in favor of medical care for all, even medical care for women who dare to have sex. Margaret Kimberley's Freedom Rider column appears weekly in BC. Ms. Kimberley is a freelance writer living in New York City. She can be reached via e-Mail at firstname.lastname@example.org. You can read more of Ms. Kimberley's writings at freedomrider.blogspot.com.
<urn:uuid:57212b1f-296f-4e7b-bec7-64cc1506a559>
CC-MAIN-2017-04
http://www.blackcommentator.com/181/181_freedom_rider_abortion.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00485-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940733
779
1.835938
2
How to Get Your Child to Stop Peeing in the Bed Children wet the bed for a variety of reasons. Some may be dreaming they are on a toilet while others simply lack the ability to feel their bladder is full. Bedwetting is often a heretical condition, formally known as nocturnal enuresis. It is a common... Feb 28, 2012 ... Tips to help your bedwetting child stay dry. ... At age 7, Billy was getting invitations for sleepovers from friends. He wanted to go, but there was a ... What to do and not to do if your child wets the bed. ... That's because myths abound when it comes to bed-wetting and they often prevent children from getting the ... May 5, 2014 ... Your child is already in school – and he is still wetting the bed at night. ... Get your child on a regular urination schedule (every two to three ... Worried about your child wetting the bed? We have ways to help you stop the bedwetting. ... He suggests that parents get "back into the poop loop." If you The percentage drops steadily as children get older (thank goodness), but 1 in 20 10-year-olds still .... Your child has to be motivated to stop wetting the bed. Aug 25, 2013 ... Got a bed wetter? Find out what causes bed-wetting and what you can do to help your child finally stay dry. Aug 28, 2013 ... Read these 8 steps to stop bedwetting to learn why your child could be ... that the child is excited to stop bedwetting and get control of his body. Bed-wetting is involuntary, and he can't ... Unless your child has been dry ... in the evening, if you find that effective ... He'll probably stop when things settle down. Rodger Wireless Bedwetting Alarm Most comfortable bedwetting alarm ... hide wet clothes; Wants to be dry; If affected parent didn't stop bedwetting until older ... Families who shop with us get access to all Bedwetting Store resources ... weeks; Research shows bedwetting alarms are best cure; Parents ensure child gets to ...
<urn:uuid:e9033198-1da1-4ea3-996b-3bbc4bb66451>
CC-MAIN-2017-04
http://www.ask.com/web?q=How+To+Get+Your+Child+To+Stop+Peeing+In+The+Bed%3F&o=2603&l=dir&qsrc=3139&gc=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00243-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916408
469
1.75
2
People’s Orientation to a Regenerative Economy The Frontlines Are Taking the Lead Frontline organizations and networks have been working to advance a Just Transition and equitable solutions to the interlinked crises of economy, climate, and democracy for years, calling for the end of an extractive economy that lays waste to people and the planet. Over the years, we have built relationships and solutions across local communities from California to Mississippi, New York to Puerto Rico, Illinois to Massachusetts, Kentucky to the Gulf Coast, and with a myriad of Indigenous communities from Alaska to the Lower 48. Long advocating for climate justice through a Just Transition, the emerging Green New Deal (GND) has created an opportunity to deepen this work. And while a GND has been characterized as the required scale to address the climate crisis, the need to define what it means to people presents a set of challenges. A new pathway From national efforts like the New Economy Coalition’s Pathways to a People’s Economy, to regional efforts like Gulf South for a Green New Deal, to the local frontline-led efforts of PUSH Buffalo and Our Power Richmond, community leaders have been organizing, educating, and working collaboratively to take concrete actions to make the concept of a GND real on the ground. This work has expanded over the last year, across frontline networks, geographies, and silos. In the Summer of 2019, Climate Justice Alliance, It Takes Roots, People’s Action, and East Michigan Environmental Action Council gathered 67 frontline and allied organizations consisting of 80 leaders to participate in the Frontline Green New Deal + Climate and Regenerative Economic Policy Summit in Detroit. At this summit, we identified green lines (what we want), yellow lines (what we’re still questioning), and red lines (what we say no to) for GND policies, from development through implementation. This strategic approach was originally shared by People’s Action to workshop in Detroit, which we later adapted during the COVID pandemic into the Peoples Orientation to a Regenerative Economy—the United Frontline Table’s cornerstone policy and organizing tool to Protect, Repair, Invest, and Transform our communities and the economy. A PEOPLE’S ORIENTATION TO A REGENERATIVE ECONOMY The tool developed by the United Frontline Table, with over 80 policy ideas and solutions presented as 14 planks for a Regenerative Economy, which a Green New Deal could provide, is designed to be utilized by frontline communities and lawmakers, alike. The planks are grouped into four overarching stances: Protect, Repair, Invest, and Transform. A Green New Deal requires all four, together. We must protect and repair communities and workers from the historic and present violence and tolls of an extractive economy. We must invest in resilient and sustainable infrastructure and systems that center the rights and expertise of Asian and Pacific Islander, Black, Brown, Indigenous, poor, and marginalized people. And we must transform the interdependent relationships that connect our governance systems, people, communities, workers, and the Earth. United Frontline Table Members The United Frontline Table (UFT) is comprised of the following networks, alliances, coalitions, and their members, with the cooperation of movement support organizations
<urn:uuid:e1bd41ec-d785-4032-9953-0c5c2767c1d4>
CC-MAIN-2022-33
https://unitedfrontlinetable.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00469.warc.gz
en
0.921184
670
2.0625
2
Exercises and Tips to Make You Better - Faster. Instructional/Guitar/DVD. DVD. Published by Hal Leonard (HL.320458). Item Number: HL.320458 ISBN 0634087711. 5.25x7.5 inches. Take your playing to the next level as Tomo Fujita shares his proven method for improving the essential skills required to play with other musicians and to freely express yourself on the guitar. This DVD includes easy-to-understand exercises and demonstrations that can be applied to all levels and styles. Topics covered include: scale and picking exercises • interval and ear training • rhythm studies • stylistic grooves: blues, swing, jazz, R&B, and funk. Includes 80-page accompanying instruction booklet. 55 minutes.
<urn:uuid:40b518b6-a331-4c57-8b9c-408ccfda52df>
CC-MAIN-2017-04
http://www.sheetmusicplus.com/look_inside/5551174
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00119-ip-10-171-10-70.ec2.internal.warc.gz
en
0.862404
164
1.5
2