text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
T-shirts are a popular craze among people of all ages. In modern civilization, this has become a contemporary wardrobe staple for men, women, and children. Let’s learn how you can start making the small dream of owning a business and earning money by designing and printing t-shirts. - Step 1: Choosing the Right Fabric - Step 2: Selecting Your Customer - Step 3: Choosing Your Store - Step 4: Getting Brand Name and Logo - Step 5: Getting Your Funds - Step 6: Designing Your Stuff - Step 7: Printing Decisions - Step 8: Marketing and Packaging Step 1: Choosing the Right Fabric T-shirts are all about comfort. Product products will stop selling if the shirt is designed beautifully but lacks comfort. Most commonly, t-shirts are made of cotton textiles in a stockinet or jersey knit. These are better than shirts made of woven cloth. Some modern t-shirts are made of circular knitting machines to get rid of the side seams from the torso. Step 2: Selecting Your Customer Before you start planning your designs, you need to target your customer group. You need to decide whether you are making your shirts for any specific aged people or fraternity or churches or only for some special occasions only. Step 3: Choosing Your Store You need to decide where you are going to sell your product. Some prefer selling online as there is a chance of advertising your product in a versatile way. Also, there will be no constraint by location. Your customer can be literally from anywhere in the world. But some might prefer setting up a store and selling products physically. Step 4: Getting Brand Name and Logo The brand name is what attracts people in the first place. Be it online or in any store. If the brand name is not eye-catching, people will not bother to look inside. Also, choosing a logo that defines your product is crucial. Choosing a simple yet spectacular logo is the goal. Step 5: Getting Your Funds If you have ample money to start as an entrepreneur, that is great. But there are other ways to get your funds too. You can ask for a bank loan, or organizations like BizyTee provide money to startup owners. Also, options like crowdfunding are always open. Step 6: Designing Your Stuff Designing the perfect t-shirt is a hectic task. Often creative ideas are hard to come by. So here are some ideas that you can use to make a stunning shirt. - Make it simple and go with the classic lettering. Use quotes in bright colors. - Use a light garment to design your vintage lettering. - Go basic – use black and white t-shirts and indistinct layouts or geometric patterns. - Big photos of celebrities or picture collages via digital printing are a way to bring out your talent. - Keen and funny illustrations or popular characters viral on social media are worthy of a t-shirt design. - Color block is a new sensation. Use bold colors to create an illusion. - All-over print with a crewneck is pretty basic yet still popular. - You can always hand paint your t-shirts if you are an artist variety. This has a special demand among clothing brands. Step 7: Printing Decisions Printing tees depend on a lot of variables, like how many garments we need, what kind of fabric to use, or what color to choose. Here are some details about the T-shirt printing. This is the oldest method. It works like a stencil that has a fine mesh and is covered with an impermeable solution. Using a squeegee, the ink gets pushed through the mesh, thus creating a design. Things You Will Need - Photo emulsion kit - Screen (usually a mess stretched over a frame) - Transparent material to print the design - A lamp - Pressurized water Step 1: Create your design. Use the help of software or do it manually, but special attention must be given to the final design. Step 2: Cover the screen with emulsion evenly. Step 3: The screen should be dried in a dark room. Step 4: Create a stencil by placing the design on top and the screen below. Now use a light source to reflect upon it. Step 5: The design application is made by putting ink over the screen with a squeegee and distributing it properly over the screen. Make sure the garment below the screen stays fixed. As the name states, screen designs are printed on heat transfer paper instead of the T-shirts and later transferred to the shirt. Most transfers are done onto the T-shirt using a heat press. Bold fonts and numbers are easily printed via this. These are popular for designing sports t-shirts. They do not require a lot of skill, but a maximum of 4 t-shirts can be printed from a single transfer paper. Direct to Garment Printing (DTG) This is the most popular method for printing t-shirts now. It is like a printer that prints ink onto the fabric rather than paper. It works with water-based ink, so it is best to use cotton t-shirts for DTG printing. According to palmgear.com, the cost of production is low, but there is a caveat. This process consumes the most amount of time to produce as well. So it is best to be used for small orders. DTG printing can create more vibrant colors and small details than other printing techniques. Therefore its popularity is at its peak. Steps to Follow - Create the design - Pretreatment of the shirt; a pretreatment liquid is used for the inks to attach perfectly and then left to dry - Prepare artwork using a software - Load the T-shirt onto the DTG printer - Curation of garment There are different T-shirt printing methods, and all have their pros and cons. But I think screen printing is the best for a startup business. Step 8: Marketing and Packaging Packaging should be creative. Using cardboards in a non-conventional way to make it apprehensive is a trick. Marketing the products via social media may provide you with a profit. Also, feel free to give discounts to get attention from customers. Starting a business with printing custom t-shirts is no small feat. It is also a great way of becoming an entrepreneur.
<urn:uuid:7c41913f-b0ae-4c94-9185-3bca07cf3687>
CC-MAIN-2022-33
https://www.iedunote.com/start-t-shirts-printing-business
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00674.warc.gz
en
0.913748
1,364
1.882813
2
If you think that it is better to sleep alone, because no one will disturb you, wake you up or snore, then you may be wrong. Recent research has shown just how important it is to have another person at night. By embracing Morpheus, we may not realize that our brain is completely inseparable from the outside world. Though our thoughts jump on the clouds, Part of our consciousness is still awake. In this way, we can wake up when we hear an abnormal sound. However, we are not alarmed when our brain receives well-known cues, such as a family member’s footsteps, bed creaking or snoring. Is it better to sleep alone or with someone? It may seem to us that it is best for our well-being sleeps alone. After all, no one is going to push us, take the quilt, or snore under the ear. However, science shows something completely different. The results of the study were presented for the first time at the annual event of the affiliated professional sleep societies. More than 1,000 people from the United States of working age participated in the experiment. The results showed that whoever sleeps next to him has an effect on him How do we feel when we wake up. Compared to people who sleep aloneParticipants who shared a bed with their partner reported less fatigue The ability to fall asleep faster And sleep longer. Furthermore, it turned out that people in this group scored lower on depression, anxiety, and stress than those who slept alone. Sleeping with your partner or spouse shows tremendous health benefits to sleep, including reduced risk of obstructive sleep apnea, worsening insomnia, and overall improved sleep quality. Says psychiatrist Brandon Fuentes of the University of Arizona. Interestingly enough, limited research on this topic has shown that Couples don’t just synchronize their movements while sleeping, but also your sleep stages. It was found that couples who sleep in the same bed have a 10% increase in REM sleep, and their sleep Sleep is interrupted less frequently of sleeping alone. But that doesn’t mean you sleep with anyone It will improve the quality of our sleep. Research has shown that people who sleep regularly with their children are more likely to fall asleep victim of insomnia From people who sleep alone. a look: They found him 15 years ago. They have kept the discovery a secret until now a look: Garmin Edge 1040 Solar is the new solar powered bike computer Image Credit: Shutterstock Text source: Oxford Academic “Internet Geek. Food Enthusiast. Thinker. Beer Practitioner. Bacon Specialist. Music Addict. Traveler.”
<urn:uuid:310ab0ef-bd57-40b7-b762-d65c0e241a65>
CC-MAIN-2022-33
https://www.biologyreporter.com/do-you-fall-asleep-alone-you-failed-research-leaves-no-doubt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz
en
0.96049
548
2.453125
2
Fort Hays State University's College of Education and Technology is entering into agreements with community colleges statewide to help enhance the transition students make from community colleges to FHSU to earn a teaching degree that will lead to a Kansas teaching license. "The College of Education and Technology as a whole has looked for ways we can support the students who wish to seek a degree in teaching," said Dr. Germaine Taggart, chair of the Department of Teacher Education. At a recent Community College Day, the Department of Teacher Education invited representatives from all 19 Kansas community colleges to the university to discuss issues affecting that transition. Representatives from nine attended and worked with the Department of Teacher Education, Virtual College, Registrar and College of Education and Technology licensure faculty and staff to align coursework for a smooth transition to FHSU. The solution was for the College of Education and Technology to enter into "Two Plus Two Agreements," in which community colleges and four-year schools coordinate on required courses and course transferability. This will help students move smoothly from two years of community college to two years of university and graduate with a license to teach. Brochures specific to each community college will outline a four-year plan. Education faculty advisors from each of the community colleges will work with their students to begin the plan. The courses and grades from the community college will be recorded in the brochure which is signed by student and advisor and then sent to the university’s Teacher Education Department to prepare for the transfer. As students are admitted to FHSU, the document will assist with timely enrollment. The program will be available for the Early Childhood Unified and the K-6 TEAM Elementary Education programs. Early Childhood Unified combines early childhood education and special education into one major. The TEAM program is the standard teacher program for grades K through 6. A special education minor can be obtained with the TEAM program. "There are a number of teachers now nearing retirement, so it's a good time for students to get their teaching licenses and renew that workforce," said Taggart. "We want to make it as seamless as possible." Taggart and Dennis King, director of the Virtual College and learning technologies, have been working together to help plan these programs. They are expected to be available by fall 2009. Participating Community Colleges are: Barton Community College, Butler Community College, Cloud County Community College, Colby Community College, Garden City Community College, Fort Scott Community College, Johnson County Community College, Labette Community College and Dodge City Community College.
<urn:uuid:262819b4-8950-42ce-9cea-ebd237e8dcfc>
CC-MAIN-2017-04
http://bigcat.fhsu.edu/currentevents/display_event.php?id=3632
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00023-ip-10-171-10-70.ec2.internal.warc.gz
en
0.960569
519
1.59375
2
All money donated will go to the Bridge's medical fund that will provide necessary care and surgeries to the people of Africa. Most women in Sierra Leone have on average 5 children. Because most are not born in hospitals or receive proper medical care, infant mortality is 12%. 1 in 5 children will die before they reach the age of 5 and the life expectancy for those that do service childhood is only 48 years. In 2008 there…Read More It doesn't cost much to save a life! Delivery of a baby: $35-$50 Malaria, meningitis, typhoid fever etc: $50-$200 Complicated Delivery: $70-$100 Hernia Repairs: $120-$180 Every donation-no matter the size- can help…Read More
<urn:uuid:40771149-cbc7-47c8-b24c-75bd4d946ae0>
CC-MAIN-2016-44
https://www.causes.com/campaigns/2091-raise-money-for-medical-care-in-sierra-leone-africa
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00509-ip-10-171-6-4.ec2.internal.warc.gz
en
0.893179
160
1.78125
2
- Sir Herbert Leon Academy - Head: Dr Jo Trevenna Phd, BA (Hons) - T 01908 624720 - F 01908 624777 - E enquiries@leon…-keynes.sch.uk - W www.shlacademy.org - A mainstream state school for pupils aged from 11 to 19 - Boarding: No - Local authority: Milton Keynes - Pupils: 660 - Religion: None - Current Ofsted grade: Inadequate on 14th October 2016 - Previous Ofsted grade: Requires improvement on 3rd July 2014 - Ofsted report: View the Ofsted report What the parents say... No comments received for Sir Herbert Leon Academy Please login to post a comment. Thank the school Parents and pupils often have cause to acknowledge the help and support they have received from their schools, for example in helping in the choice of further education or careers. "Say thank you" allows you to send a quick note of appreciation to the school in general or to an individual teacher. This is a thank you to your school, teacher or careers adviser who helped you to get where you are now. Please fill in the fields below, which we will transform into a letter of thanks from you to them.
<urn:uuid:5b5a4ce1-57b9-44d7-9584-c46ae4757016>
CC-MAIN-2017-04
https://www.goodschoolsguide.co.uk/schools/102178/sir-herbert-leon-academy
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00563-ip-10-171-10-70.ec2.internal.warc.gz
en
0.939954
276
1.609375
2
Hate your cubicle with a gutteral, visceral, ceaseless intensity? Turns out there's a scientific reason why: it's architecturally unsound. Not at all the "dynamic office space" it was originally intended to be, it is, in fact, the result of "some accounts receivable guy, or whatever, deciding to save money by squeezing four people into a space that should only hold two," according to Three Walls, a new documentary by filmmaker Zaheed Mawani. Through Mawani's investigation, we learn that the creator of the cubicle, on his deathbed, "apologized for unleashing the single worst evil in the world" and that the name cubicle itself is "a bit of a misnomer. It's really 'systems furniture'—and we say 'systems' because in its original intent and design it's really a kit of parts that you can assemble and disassemble and reassemble in any number of configurations." Bob Propst, who designed the world's first official office cubicle in 1967, "identified the four-walled cubicle as the worst possible application of [systems furniture]." See? All this proves your wrath is totally justified. Three Walls - Excerpt
<urn:uuid:ed1eece5-9c95-43f6-a770-e06dffff6535>
CC-MAIN-2022-33
https://archive.curbed.com/2011/8/25/10445884/cubicles-the-single-worst-evil-in-the-world-archi-critics-say
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00465.warc.gz
en
0.947475
256
1.953125
2
Preparedness | Responses | Recovery Explosion on Campus In the event an explosion, take the following action: - Immediately take cover under a table, desk, or other object that will give protection against falling glass or debris. - After the immediate effects of the explosion and/or fire have subsided, notify the Department of Campus Safety X5566. - Give your name and describe the location and nature of the emergency. - If necessary, or when directed to do so, activate the building alarm (fire alarm). (Refer to the section on Evacuation Procedures.) - When the building evacuation alarm is sounded or when you are told by College officials to leave, walk quickly to the nearest marked exit and advise others to do the same. Assist those with disabilities in exiting the building! Remember that elevators are reserved for them. Do not use elevators in case of fire. - Once outside, move to a clear area that is at least 500 feet away from the affected building. Keep streets and walkways clear for emergency vehicles and crews. Report to your Evacuation Assembly Point as soon as possible. - If requested, assist emergency crews as necessary. - A Command Post may be set up near the disaster site. Keep clear of the Command Post unless you have official business. - Do not return to an evacuated building unless told to do so by a College official.
<urn:uuid:db10ce5a-21c7-4297-bc91-3fcf5fc103c2>
CC-MAIN-2017-04
https://www.skidmore.edu/emergency/responses/explosion.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00216-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933922
288
2.265625
2
During the past two centuries, Poster art had been displayed in public places all over the world. Visually striking, Poster Art or Illustration had been designed to attract attention, by way of raising political awareness, or by enticing people in attending specific events, or encouraging them to purchase a particular advertised product or service. Poster Art has been used primarily for advertising and announcements in the form of placards and posted bills. The great revolution in posters came when the development of printing techniques emerged, which allowed for cheap mass production and printing, when the technique of lithography surfaced unto the Printing Industry. Posters, have always been predominantly used for the sake of advertisement, and they continue to be used for this purpose, whether it involves Posters which advertise films, music, comic books, or simply travel destinations, Posters have always served as a means by where to convey a message to the masses and influencing the consumer market. However, anyone who’s ever shopped for a piece of art is well aware that big art typically comes at a big price. Even if you end up buying some mass-produced canvas, you still have to contend with fitting it in the car, or paying to have it delivered it to your doorstep. For those who have more time on their hands than money, there are some alternative DIY solutions for printing infinitely large posters from even the most modest printer. However, most of these DIY printing solutions can end up being disappointing and it’s going to use a lot of ink! These type of printing alternatives may get you close to the kind of result you’d get from a large format printer, however it will be quite easy to spot the seams between the pages and the color printing quality when you’re dealing with full sheets of color images tends to push the limitations of most consumer printers. Now if you lack the experience with the fine art of Printing nor have the poster board or the patience to DIY, then the best viable solution for printing all of your Poster Art would be to make your own Poster art prints brimming with brilliant colors in any type of finish or design and highly customizable options for any type of event or need your business requires- never having to leave the comfort of your home!
<urn:uuid:8a29b6c5-b1e8-4761-b095-8aedc7fdfd93>
CC-MAIN-2016-44
http://cre8tivenerd.com/2013/07/making-and-printing-your-own-poster-art-made-easy/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00054-ip-10-171-6-4.ec2.internal.warc.gz
en
0.955423
456
1.84375
2
At this point, almost everyone has heard of opioids. People understand these can be strong painkillers, but they have a dangerous potential side effect: addiction. Workers are no exception to this risk, and they may be at an even greater risk because of the amount of opioids prescribed during workers’ compensation situations. If you were hurt at work, you may be automatically prescribed opioids for your pain. However, this may not be the best course of action for you to get back to work. Fortunately, it looks as if opioid prescriptions during workers’ compensation claims are falling in multiple states, including Georgia. If you have questions regarding your workers’ compensation situation, contact the Augusta workers compensation lawyers of Ted A. Greve & Associates, P.A. What Are Opioids? Opioids are a class of pain relieving drugs often used for moderate-to-severe pain and chronic pain from health conditions. These drugs block the pain signals to the brain and can produce a pleasurable feeling. Well-known opioids are morphine, codeine, hydrocodone (Vicodin), fentanyl, and oxycodone (OxyContin), and methadone. These are all related to heroin. While opioids can be highly effective, they are also very addictive. People who are prescribed opioids for long-term use or at high dosage often struggle with addiction to these medications, which can lead to physical, emotional, and mental problems. Opioid Abuse in the U.S. The number of people addicted to opioids in the U.S. has reached such a height that health organizations are calling it an epidemic. It is also highly related to heroin addiction, making it an even bigger public health problem. At this point, it is difficult to discuss opioid abuse without also confronting heroin use, even for workers. According to the American Society of Addiction Medicine, 1.9 million people who had a substance abuse disorder used prescription pain relievers in 2014 and 586,000 used heroin that year. About 23 percent of people who use heroin end up abusing opioids. Conversely, four in five new heroin users previously abused prescription painkillers and moved to heroin because it was cheaper and easier to get than opioids. Both prescription opioids and heroin use are leading to a massive substance abuse issue in the U.S. and a rising overdose rate. The ASAM reported there were 18,893 opioid-related deadly overdoses and 10,574 heroin-related overdoses in 2014. Workers’ Compensation Research Institute Opioid Study The WCRI has looked at opioid prescriptions during workers’ compensation situations in 25 states, including Georgia, for years and recently updated its study to include data through March 2014. The organization looked at information for 337,424 nonsurgical workers’ compensation claims for injuries sustained between October 1, 2009 and September 30, 2012. Workers in the study lost at least seven days of work and received at least one prescription for pain medication under their workers’ compensation claim. There were 1.9 million paid prescriptions for pain meds of the opioid and nonopioid variety up between March 2012 and March 2014. The WCRI found opioid use was common in nonsurgical workers’ compensation claims, prescribed at a rate between 65 to 80 percent during the 2012 to 2014 time period. However, during this time Georgia saw a significant decrease in the use of opioids, between 10 to 20 percent. The reason for seeing a decline in opioid prescriptions for worker injuries may come from new laws, community initiatives, and physicians’ recognition of the growing opioid abuse epidemic in the U.S. Opioids May be Bad for a Worker’s Recovery It is good news to hear opioid prescriptions for workers are decreasing because using opioids for some injuries can make it more difficult to recover, The National Safety Council reported. A study conducted by the Washington State Department of Labor and Industries found a one-week prescription of opioids of two or more opioid prescriptions quickly following a worker’s injury doubles the worker’s chances of being disabled one year after the injury compared to workers who were never prescribed opioids. Workers with lower back pain are particularly in danger of early and prolonged use of opioids, a study by the Center for Disability Research at the Liberty Mutual Research Institute for Safety found. The study conducted in 2007 found workers who were prescribed opioids within 15 days of their injury were disabled an average of 69 days longer than patients who did not use opioids. Extended use of the pain relievers made workers three times more likely to need surgery, six times more likely to become dependent, and lengthened the duration of disability. Not only can the opioid stand in the way of a worker recovering and going back to work, but a worker prescribed these painkillers for months runs the risk of becoming dependent on them. Long-term use can also lead to an escalating tolerance, meaning a worker needs a higher dosage throughout the day to remain pain free. Tolerance and dependence can make it difficult to physically recover and get back on track at work. Georgia Workers’ Compensation If you were hurt on the job in Georgia and your employer has at least three part- or full-time workers, then you can file a claim for workers’ compensation. This enables you to receive medical care for your injury right away, paid for by your work. Not only will your medical costs be paid for, but you may be eligible to receive weekly payments while you are away from work. The workers’ compensation system may seem straightforward at first, but you can run into a number of obstacles when you first file a claim and throughout your recovery. If you were prescribed opioids and you are taking longer to get better and back to work, you may face an issue continuing to receive benefits or being laid off. If any trouble arises, contact a determined Augusta GA workers compensation attorney immediately. It can be hard to understand your rights during a workers’ compensation situation. The lawyers at Ted A. Greve & Associates, P.A. will explain your rights and how they can best fight to protect them. Call or contact us online to schedule a free consultation.
<urn:uuid:747d5eec-607b-42cf-b54c-4f34e185e1cb>
CC-MAIN-2022-33
https://mydrted.com/opioid-prescriptions-georgia-workers-compensation-claims-decreased/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00671.warc.gz
en
0.963627
1,253
2.296875
2
The vision of the School of Nursing is to become a center of excellence in nursing education, research, consultancy and public services that respond to national, regional and global challenges. The major function of the School is the provision of high quality nursing and midwifery related education, research and public services. To achieve this, School of Nursing endeavors to do the following: - To excel in knowledge and human resource capacity building in the nursing and midwifery professions without sacrificing the quality of care. - To build distinctive characteristics and trademark of nursing and midwifery under the label of “Scientific professionalism” to be acquired through the prime principle of integration of research, teaching, services and consultancy at the immediate subject area. - Further the image of nursing and midwifery professions by striving to make the School a centre of excellence for the creation of nursing and midwifery knowledge, skill development, effective entrepreneurship and formation of responsible attitude to the graduate nurses and midwives for the betterment of the society.
<urn:uuid:a0269357-2a4b-4361-84a8-5994927e4f7b>
CC-MAIN-2017-04
http://son.muhas.ac.tz/index.php/about-itm/vision
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93882
211
1.507813
2
From Birkat Hamazon: רחם נא ה' אלוהינו, על ישראל עמך, ועל ירושלים עירך, ועל ציון משכן כבודך, ועל מלכות בית דוד משיחך, ועל הבית הגדול והקדוש, שנקרא שמך עליו. "Please have mercy Hashem our God, on Israel Your people, on Jerusalem Your city, on Zion the dwelling place of Your honor, on the kingdom of the dynasty of David Your servant, and on the great and holy Temple which your name is attached to." רצה והחליצנו ה' אלקינו במצוותיך ובמצות יום השביעי השבת הגדול והקדוש הזה. "May you strengthen us Hashem our God in your mitzvot, and in the mitzvah of the seventh day, this great and holy Sabbath." [I make no pretense that these are great translations. My blogging philosophy right now is "quantity not quality".] It is interesting that the same phrase, "great and holy", is used to describe both Shabbat and the Temple in the same blessing. Indeed, there is a precedent in the Torah for linking Shabbat to the Temple: את שבתתי תשמרו, ומקדשי תיראו, אני ה'. "You shall guard my Sabbaths, and revere my Temple - I am Hashem." (Vayikra 19:30) In other contexts we see additional connections between Shabbat and the Temple. For example, the words "kidush" and "hilul", sanctification and desecration, are obviously applicable to the Temple, and are used many times when the Torah discusses the Temple. But they also appear in the context of Shabbat. The performance of work on Shabbat is called "hilul Shabbat", rather than something like "aveirah al mitzvat shabbat". And there is a positive mitzvah to be "mekadesh" Shabbat, not just to remember it. This Temple-like language in relation to Shabbat (and holidays) is second nature to us, but the basic observance of Shabbat could easily be described without it, so we must ask ourselves why it is there. What is the meaning of the linkage between Shabbat and the Temple? To understand it, we can rely on R' Soloveitchik's explanation of how Shabbat and holidays are similar yet different (in Shiurim Lezecher Abba Mori, Kivud veOneg Shabbat). Basically, on Shabbat God visits us (לכה דודי לקראת כלה), while on holidays we visit God, at the Temple (שלוש פעמים בשנה יראה כל זכורך את פני ה' אלקיך במקום אשר יבחר). Both Shabbat and Temple visits are encounters with God; the only difference is who is traveling to encounter whom. Thus they are mentioned together in Vayikra 19:30, and are described the same way in birkat hamazon.
<urn:uuid:58e6f9ae-0e90-4c81-9b55-3d815d8867fd>
CC-MAIN-2022-33
https://allyourbeis.blogspot.com/2008/09/shabbat-and-temple.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00272.warc.gz
en
0.78047
896
1.960938
2
Main Article Content This study aims to determine and empirically prove the positive relationship between servicescape, interaction orientation, service convenience on customer satisfaction, and implications for behavior intention. This research problem departs from the concept of pentahelix in the tourism industry and the Ministry of Tourism's priority programs, especially digital tourism, and homestays are the central themes in this research. The success of achieving the target of tourist visits is closely related to the accommodation system at the destination, in this case the role of the hotel. On the other hand, the sustainability of a destination is closely related to the operations of the hotels located in that destination. That is, in conditions of an increase in the flow of visits to certain destinations accompanied by a rapid increase in the number of hotels. So it can be concluded that in a business both goods and services, servicescape, Interaction Orientation, Service Convenience are important factors in increasing customer satisfaction, even the three tadit factors, namely servicescape, interaction orientation, service convenience can encourage customer interest in using the product or services offered. This work is licensed under a Creative Commons Attribution 4.0 International License. You are free to: - Share— copy and redistribute the material in any medium or format - Adapt— remix, transform, and build upon the material for any purpose, even commercially. The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: - Attribution— You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. - No additional restrictions— You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits. - You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation. - No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rightsmay limit how you use the material. El-Zeiny, R. M. A. (2012). The Interior Design of Workplace and its Impact on Employees’ Performance: A Case Study of the Private Sector Corporations in Egypt. Procedia - Social and Behavioral Sciences, 35. https://doi.org/10.1016/j.sbspro.2012.02.145 Kasa, M., Stephen, D., & Hassan, Z. (2019). Rasch analysis and differential item functioning of work-related flow inventory (Wolf): A study on the hotel industry in Sarawak. Asia-Pacific Social Science Review, 19(3). Kaura, Prasad, D., & Sharma. (2015). Service quality, service convenience, price and fairness, customer loyalty, and the mediating role of customer satisfaction. International Journal of Bank Marketing, 33(4), 404–422. https://doi.org/10.1108/IJBM-04-2014-0048 Kumar, D. S., Purani, K., & Sahadev, S. (2017). Visual service scape aesthetics and consumer response: a holistic model. Journal of Services Marketing, 31(6). https://doi.org/10.1108/JSM-01-2016-0021 Nunkoo, R., Teeroovengadum, V., Ringle, C. M., & Sunnassee, V. (2020). Service quality and customer satisfaction: The moderating effects of hotel star rating. International Journal of Hospitality Management, 91. https://doi.org/10.1016/j.ijhm.2019.102414 Priyo, J. S., Mohamad, B., & Adetunji, R. R. (2019). An examination of the effects of service quality and customer satisfaction on customer loyalty in the hotel industry. International Journal of Supply Chain Management, 8(1). Raza, K. (2013). Impact of Servicescape on Customer Satisfaction. In International Journal of Economics (Vol. 1, Issue 1). Sandaruwani, J. A. R. C., & C., G. W. K. A. (2016). The role of tourist guides and their impacts on sustainable tourism development: A critique on Sri Lanka. Tourism, Leisure and Global Change, 3(July 2015). Tjiptono, F., & Chandra, G. (2011). Service, Quality & Satisfaction. In Edisi 4. So-Ra Jung, (2006). The perceived benefits of healthcare information construct and survey development. Thesis - B.S., Dankook University. Suhaila Sufar, Anuar Talib, and Haris Hambali (2012). Towards a better Design: Physical Interior Environments of Public Libraries in Peninsular Malaysia. Procedia - Social and Behavioral Sciences. Vol. 42. pp. 131 – 143. ELSEFIER- Available online at www.sciencedirect.com. Sugiyono. (2009). Metode Penelitian Bisnis. Cetakan Ketujuh, Alfabeta, Bandung – Indonesia. Swan, J.E. and Oliver, R.L. (1989). “Postpurchase communications by consumers”. Journal of Retailing. Vol. 65. pp. 516-33. Tao Zhou (2013). An empirical examination of continuance intention of mobile payment services. Decision Support Systems. Vol. 54. pp. 1085–1091. ELSEFIER- Decision Support Systems. journal homepage: www.elsevier.com/locate/dss. Tjiptono, F. (2007). Perspektif manajemen dan pemasaran kontemporer. Yogyakarta: Penerbit Andi. Tombs, Alastair., McColl-Kennedy, Janet R. (2002). Beyond the Servicescape: Customer to Customer Interactions in the Social Servicescape. ANZMAC Conference Proceedings. Tomas G.M. Hult, (2001). Additional thoughts on international services marketing. Journal of Services Marketing. Vol. 15 (1). pp. 5-10. Treasa Kearney, Joseph Coughlan, and Aileen Kennedy (2013). An Exploration of the Effects of the Servicescape on Customer and Employee Responses in a Grocery Retail ContextKeele Management School, Keele University, UK † College of Business, Dublin Institute of Technology, Aungier Street, Dublin 2 Tse D.K., and Wilton P.C., (1988). Expectation as a comparison standard in measuring service quality: An assessment of a reassessment. Journal of Marketing. Vol. 58. pp. 132-139. Turley, L., & Milliman, R. (2000). Atmospheric effects on shopping behavior: A review of the experimental evidence. Journal of Business Research. Vol. 49. 193-211. Tumbel Altje L., (2010). Pengaruh Kebanggaan, Kepercayaan, Kualitas Layanan dan Nilai Konsumen Terhadap Kepuasan dan Perilaku Membeli Ulang Wanita Karir Pada Pasar Swalayan Di Manado. Disertasi. Universitas Hasanuddin-Makassar. Vanessa Gaffar (2007). Customer Relationship Management and Marketing Public Relations. Bandung-Alfabeta Véronique Aubert-Gamet, Servicescapes: From Modern Non-Places to Postmodern Common Places. Journal of Business Research. Vol. 44. pp. 37–45 (1999) ã 1998 Elsevier Science Inc. All rights reserved. ISSN 0148-2963/99/$–see front matter 655 Avenue of the Americas, New York, NY 10010 PII S0148-2963(97)00176-8. Véronique Aubert-Gamet, (1996). Twisting servicescapes: diversion of the physical environment in a re-appropriation process. International Journal of Service Industry Management. Vol. 8 No. 1. pp. 26-41. © MCB University Press, 0956-4233. Wakefield, L.K. and Blodgett G.J. (1996). “The effect of the servicescape on customer behavior intentions in leisure service setting”. Journal of Services Marketing. Vol. 10, No. 6. pp. 45-61. Ward, J.C., Bitner, M.J., and Barnes, J. (1992). “Measuring the prototypicality and meaning of retail environments”. Journal of Retailing. Vol. 68, Pp. 194-220. Westbrook, R.A., and Oliver R.L., (1991). The dimensionability of consumption emotional pattens and customer satisfaction. Journal of Consumer. Vol. 18 June, pp. 84-91. Wolfinbarger Mary, Mary C. Gilly (2003). eTailQ: dimensionalizing, measuring and predicting etail quality. Journal of Retailing. Vol. 79. pp. 183–198. Yoon, M.H., and Suh J. (2003). “Organizational citizenship behaviors and service quality as external effectiveness of contact employee”. Journal of Business Research. Vol. 56. pp. 597-611. Xiaoyu Chen, Steve Goodman, Justin Cohen, Johan Bruwer (tt). Wine tourists’ loyalty intentions: Toward an integrated behaviour model. [email protected] Yangyang Gao (2016). The impact of guest room environment on customer perception: The case of economy hotels in guizhou province in china. Thesis - Faculty of California State Polytechnic University, Pomona. Zeitham, V.A., and Bitner Mary Jo. (2000). Service marketing: integrating customer focus across the firm. Second Edition, USA, Boston: Irwin McGraw-Hill. Inc. Zeitham, V.A., Berry L.L. and Parasuraman A. (1996). “The behavioral consequences of service quality”. Journal of Marketing. Vol. 60. April, pp. 31-46. Zeitham, V.A., (1988). “Communication and control processes in the delivery of service quality”. Journal of Marketing. Vol. 52. No. 2. pp. 35-48. Zikmund W.G. (1994). Business Research Methods. International Edition. USA: The Dryden Press.
<urn:uuid:460f3b48-4207-4d72-be70-575caeb3dcba>
CC-MAIN-2022-33
https://dinastipub.org/DIJDBM/article/view/839
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00470.warc.gz
en
0.754282
2,276
1.671875
2
Web development remains one of the most popular industries and will not change anytime soon. To get your name and fame as a Freelance Web Developer or a software creator, you need to know some crucial tips. In this article, we will be discussing on such hacks that will make you an aspiring achiever in freelancing services and professionalism. Here are some tips: 1. Learn and continuously improve: In a fast-moving industry like us, staying up to date means never stopping learning. Technology is changing as fast as trends, and current common practices can become obsolete in a few years. If you want to be a great web developer, you have to go ahead. This means learning new technologies and programming languages and keeping an eye out for what customers want (and need). It’s pretty clear which part is most likely ahead of the competition. Another reason to continue learning is to anticipate the user base. Or, author Rick Cook said: So far, the universe is winning. “ 2. Keep up with the industry: Going to exhibitions and conferences is also a great idea. You can create a network and generate a lot of new ideas and knowledge. 3. You can manage and prioritize your time: Working with web development can be very stressful and confusing. Projects are piled up, and deadlines are always approaching. To stay efficient (and sane), it’s important to manage your time as much as possible. This is a struggle for many developers. It’s only because we’ve never taken a step back to improve our time management skills. Here are some simple tips to help you stay organized and keep your deadlines close. - Create a to-do list and prioritize the most urgent and vital tasks at the top. From time to time, others will just have to wait. - Check the list first thing in the morning and make a simple plan for the day. Things don’t always go according to that plan, but it’s much more efficient to have it in the first place. - Set reminders for essential tasks and project steps that you want to complete at specific times of the day or week. Make sure you meet your mini deadline, ignoring everything else if necessary. - Use the 80/20 rule to find everyday activities that take too long to get good results. You may be surprised at how much time you spend doing things that take too long in return every day. - If you think you can’t meet the deadline, contact your manager or client as soon as possible. It’s not ideal, but it’s not the end of the world. The sooner you talk to them, the faster they can prepare. 4. Understand UX: One of the excellent developer’s attributes is that they understand the technical aspects of the business and the design and customer-oriented aspects. To develop great applications and software, you need to understand how customers and clients use the final product. Programming courses need to teach you how to design and build, and the examples you choose should be able to demonstrate step-by-step development. Before embarking on a new project, take the time to think about the design and how consumers will use it. Through this step, we often develop ideas that can significantly improve the design of the product itself. Another important point is to keep up with design trends. The best way to do this is to spend every day reading articles on one of the myriad web design blogs out there. 5. Communicate well with others: Communication is essential in every job, and perhaps even more important in web development. To create a great product, you need to perfectly match the needs of designers, developers, clients, and customers. This means that communication is an integral part of all web developers’ work and should always be treated with high priority. Expanding the need for good communication skills is why coding is complicated for non-developers to understand. You have to get others to understand the technical problem, which can be very difficult. As a way to improve your communication skills, it’s a good idea to have regular conversations with acquaintances outside the office to help you understand what you’re working on. There are a lot of online platforms that provide tips about becoming successful, one of them is dormzi you can explore dormzi for Freelance Web Developer projects best suited for your skills. Your opening session on freelancing professionalism will lead you to better future goals according to your interest, skills, and passion.
<urn:uuid:f6133cd1-410a-4ce7-86fe-1227ebe83d5f>
CC-MAIN-2022-33
https://wpepro.net/freelance-web-developer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00075.warc.gz
en
0.94491
941
1.625
2
14/06/2022A blood clot in the brain that blocks the supply of oxygen can cause an acute stroke. In this case, every minute counts. A team from Empa, the University Hospital in Geneva and the Hirslanden Clinic is currently developing a diagnostic procedure that can be used to start a tailored therapy in a timely manner, as they write in Scientific Reports. 22/05/2019Many illnesses or old age require help with everyday tasks. Unfortunately, family members or caregivers aren’t always available to lend a hand. The MobiKa mobile service robot is designed to offer support, deliver motivation and improve the quality of life of those in need.
<urn:uuid:5a2106fb-f0a9-44c3-b14e-6972b9034aec>
CC-MAIN-2022-33
https://www.medica-tradefair.com/en/News/Topic_of_the_Month/Older_Topics_of_the_Month/Topics_of_the_Month_2020/Stroke_care/Stroke_care_When_every_minute_counts?mcat_id=7879
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00678.warc.gz
en
0.925751
137
1.710938
2
We live in a remarkable age where far-out concepts and theories once the exclusive domain of science fiction are creeping closer to reality. Last week, noted theoretical physicist and cosmologist Lawrence Krauss of Arizona State University tweeted out a statement that scientists may have discovered the elusive cosmic distortions known as gravitational waves, a phenomenon first predicted by Albert Einstein in his General Theory of Relativity more than 100 years ago but never actually observed. Gravitational waves are unpredictable ripples in the space-time fabric thought to be created by areas of extreme energy generated by violent occurrences like black holes, colliding neutron stars, supernovae and galactic mergers. Though there has been no official announcement via the Laser Interferometer Gravitational Wave Observatory (LIGO) project, the experiment designed to hunt down these strange sci-fi ripples from detecting stations in Hanford, Wash., and Livingston, La., Krauss says the probability is high that the discovery has been made due to serious rumblings in the scientific community and whispers among his close colleagues. Many of Krauss's Twitter followers took to social media to express their super-geeky displeasure at Krauss jumping the gun and announcing the rumor of these extraordinary findings prematurely, thereby reducing scientific credibility and stealing the thunder from the actual team of scientists that did the heavy lifting. Once reviewed by peers and tested, this gravitational wave discovery could turn out to be one of the most astonishing and significant breakthroughs in the history of physics, leading to deeper understanding of black holes, dying stars and other mysterious cosmic curiosities. Alan Weinstein, a representative at the LIGO research headquarters at Caltech, has neither confirmed nor denied the discovery, and simply states that they are "analyzing data and will share news when ready.’ “They will be extremely cautious," Krauss told The Guardian. "There’s no reason for them to make a claim they are not certain of. We would have a new window on the universe. Gravitational waves are generated in the most exotic, strange locations in nature, such as at the edge of black holes at the beginning of time. We are pretty certain they exist, but we’ve not been able to use them to probe the universe.” Should Krauss have jumped the gun and revealed LIGO's secret discovery before any official press release, or is all fair in love and physics?
<urn:uuid:b532dda9-2059-4624-a52b-065d5952ec65>
CC-MAIN-2016-44
http://www.blastr.com/2016-1-18/are-physicists-close-confirming-existence-gravitational-waves
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00261-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940903
488
2.828125
3
Google provides a python code sample for sending GCM notifications using the Extensible Messaging and Presence Protocol (XMPP). The guide doesn't specifically mention where the ' Traceback (most recent call last): File "google_ccs.py", line 54, in <module> client.connect(server=(SERVER,PORT), secure=1, use_srv=False) File "/usr/local/virtualenv-django18/local/lib/python2.7/site-packages/xmpp/client.py", line 200, in connect if not CommonClient.connect(self,server,proxy,secure,use_srv) or secure<>None and not secure: return self.connected File "/usr/local/virtualenv-django18/local/lib/python2.7/site-packages/xmpp/client.py", line 178, in connect File "/usr/local/virtualenv-django18/local/lib/python2.7/site-packages/xmpp/transports.py", line 281, in PlugIn if now: return self._startSSL() File "/usr/local/virtualenv-django18/local/lib/python2.7/site-packages/xmpp/transports.py", line 316, in _startSSL tcpsock._sslIssuer = tcpsock._sslObj.issuer() AttributeError: '_ssl._SSLSocket' object has no attribute 'issuer' The first solution is to patch xmpp/transports.py the patch comes from free-bsd but works on linux. The second solution is to switch to a fork of xmpppy that does not have this issue. You can install it as follows. source /myvirtualenv/bin/activate/ pip uninstall xmpppy wget https://github.com/ArchipelProject/xmpppy/archive/master.zip tar -xvf master cd xmpppy-master python setup.py build python setup.py install Now the SSL error goes disappears. You can be happy with the knowledge that you are using code that was last updated 2 years ago instead of seven years ago! This solution works for any project that has xmpppy as a dependency and isn't just limited to GCM. Both solutions were discovered in an Eventlet bug report. update: You can even use pip to install the fork. pip install https://github.com/ArchipelProject/xmpppy/archive/master.zip
<urn:uuid:b8053200-16e0-4d81-b16f-be5e088543f3>
CC-MAIN-2017-04
https://codedump.io/share/sOfhWxouxN2G/1/gcm-notifications-with-python-xmpp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00141-ip-10-171-10-70.ec2.internal.warc.gz
en
0.758383
558
1.648438
2
Education activist and Nobel Peace Prize winner Malala Yousafzai has yet again made her parents and Pakistan proud after scoring excellent results in the General Certificate of Secondary Education (GCSE). The 18-year-old has scored six A*s and four As in the GCSE results, which were declared recently. Malala's father, Ziauddin Yousafzai expressed his happiness by posting his daughter's grades on Twitter, asserting that he and his wife are proud of her. Malala was a student of Edgbaston High School for Girls at Birmingham, where she hardly missed a class in spite of attending several seminars and interviews around the world. "I will only miss school for an engagement if it is going to bring real change. That is the question I have to ask myself with each request and if the answer is yes, I say, OK, I will sacrifice one day of my school for the education of millions of children who are out of school," The Guardian quoted Malala as saying earlier. The young activist, who considers Benazir Bhutto as her role model, also stated that she has no plans to leave UK until she finishes her higher education. "I want to get my education- a good university education. A lot of politicians have studied in Oxford, like Benazir Bhutto. My dream is to empower myself with education, and then it is a weapon," added Malala. She and her family have been staying in UK ever since she was admitted to Queen Elizabeth Hospital Birmingham, after being shot by Taliban in Pakistan for demanding education for girls.
<urn:uuid:01962771-e8ae-4725-a33b-b8c12b28ddb6>
CC-MAIN-2017-04
http://www.ibtimes.co.in/malala-yousafzai-shines-excellent-gcse-result-proud-father-shares-grades-twitter-643849
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00285-ip-10-171-10-70.ec2.internal.warc.gz
en
0.989862
325
1.578125
2
The Ukraine Nuclear Delusion GENEVA – An argument now widely heard is that Ukraine would not be in the trouble it is in had it retained its substantial stockpile of nuclear weapons at the end of the Cold War. This has dangerous policy implications, and must not go unchallenged. Despite its superficial plausibility, the argument does not withstand scrutiny against the available evidence about how states behave. Nuclear weapons are simply not the effective deterrent that most people think, whether the context is deterring war between large nuclear-armed powers or protecting weaker states against conventional attack. The claim that the balance of nuclear terror between the United States and the Soviet Union maintained peace throughout the Cold War – and has been important since in restraining other potential belligerents (including India and Pakistan, India and China, and China and the US) – is not nearly as strong as it seems. There is no evidence that at any time during the Cold War either the Soviet Union or the US wanted to initiate war and was constrained from doing so only by the existence of the other side’s nuclear weapons. We know that the knowledge of an adversary’s possession of supremely destructive weapons (as with chemical and biological weapons before 1939) has not stopped war between major powers in the past. Nor has the experience or prospect of massive damage to cities and civilian death tolls caused leaders to back down – including after the bombing of Hiroshima and Nagasaki. There is now strong historical evidence that the key factor driving Japan to sue for peace was not the nuclear attacks; it was the Soviet Union’s declaration of war later that same week. But if nuclear weapons have not preserved the “Long Peace” since 1945, what has? A plausible alternative explanation is simply that the major powers realized, after the experience of World War II (and given all of the rapid technological advances that followed), that the damage inflicted by any war would be unbelievably horrific, far outweighing any conceivable benefit. What of the notion, more immediately relevant to today’s Ukraine, that nuclear weapons are a strategic equalizer, necessary to compensate for inferior conventional forces and capabilities? North Korea certainly believes that possession of even a very small number of nuclear weapons constitutes some deterrent against forcible regime change, with the experience of Serbia in 1999, Iraq in 2003, and Libya in 2011 no doubt reinforcing its perception that states without such weapons are particularly vulnerable. But weapons that would be manifestly suicidal to use are not ultimately a very credible deterrent. They will not stop the kind of adventurism now seen in Ukraine, because the risks associated with their deliberate use are simply too high. Both sides in these situations fully understand that. Russian President Vladimir Putin knows that Ukraine would be no more likely than the US to nuke Moscow for sending tanks into Crimea, or even Dnipropetrovsk. Nuclear weapons are not the stabilizing tools that they are commonly assumed to be. Maybe that is because the scale of nuclear weapons’ destructiveness makes their practical military use unthinkable in almost any conceivable circumstances. Maybe it is just the well-understood ethical taboo that inhibited even US Secretary of State John Foster Dulles: Had the US used nuclear weapons in Korea or Vietnam, or against China over Taiwan, Dulles said, “we’d be finished as far as present-day world opinion was concerned.” Whatever the reason, conflicts have regularly occurred in which nuclear weapons could have played a part, but did not. Consider the long list of wars in which non-nuclear powers either directly attacked nuclear powers or were not deterred by the prospect of their nuclear intervention: Korea, Vietnam, Yom Kippur, Falklands, the two in Afghanistan since the 1970’s, and the first Gulf war. Then there are the cases where both sides’ possession of nuclear weapons, rather than operating as a constraining factor, has given one side the opportunity to launch small military actions without serious fear of nuclear reprisal, owing to the too-high stakes of such a response. Think of the Kargil War between Pakistan and India in 1999. There is substantial quantitative, as well as anecdotal, evidence to support what is known in the literature as the “stability/instability paradox” – the notion that what may appear to be a stable nuclear balance actually encourages more violence. The old conservative line is that “the absence of nuclear weapons would make the world safe for conventional wars.” But it is more plausible to think that it is the presence of nuclear weapons that has made the world safer for such wars. There is one thing that the presence of Ukrainian nuclear weapons would have added to today’s mix: another huge layer of potential hazard, owing to the risk of stumbling into a catastrophe through accident, miscalculation, system error, or sabotage. Even true believers in nuclear deterrence must acknowledge that it has always been an extremely fragile basis for maintaining stable peace. It simply cannot be assumed that calm, considered rationality will always prevail in the enormous stress of a real-time crisis. And it certainly cannot be assumed that there will never be human or technological errors, with harmless events being read as threatening (as in 1995, when Russian President Boris Yeltsin was advised to retaliate immediately against an incoming NATO missile, which proved to be a Norwegian scientific rocket). There is also a major risk of miscommunication (now compounded by the sophistication of cyber weapons) and of basic system error. Much archival evidence of the Cold War years has now revealed how close to calamity the world regularly came – much more often than was known at the time. And recurring reports of security failures and acute morale problems at US missile sites today add further alarming weight to this concern. Nuclear-weapons enthusiasts seem to have an inexhaustible appetite for bad arguments. Nothing we have heard in the context of Ukraine suggests that their record is improving. Copyright: Project Syndicate, 2014. This article is brought to you by Project Syndicate that is a not for profit organization. Project Syndicate brings original, engaging, and thought-provoking commentaries by esteemed leaders and thinkers from around the world to readers everywhere. By offering incisive perspectives on our changing world from those who are shaping its economics, politics, science, and culture, Project Syndicate has created an unrivalled venue for informed public debate. Please see: www.project-syndicate.org. Should you want to support Project Syndicate you can do it by using the PayPal icon below. Your donation is paid to Project Syndicate in full after PayPal has deducted its transaction fee. Facts & Arts neither receives information about your donation nor a commission.
<urn:uuid:f781bdd7-6b42-4069-8b21-0a93b0ce42c5>
CC-MAIN-2022-33
https://www.factsandarts.com/current-affairs/ukraine-nuclear-delusion
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00678.warc.gz
en
0.960334
1,370
2.03125
2
Monasteries and monks that made their home in this college town by Erica Sagon One of the best things about Bloomington is the diversity of people who come here, and the reasons why. It might surprise visitors to know that two of the largest Buddhist centers in the Midwest are right here in Bloomington. Tucked away in heavy woods that act as a buffer from the outside world, the spiritual centers are places where people can marvel or meditate, or both. These centers are part of the fabric that makes this community so colorful, and offer visitors a unique and unexpected experience. You don't have to be a practicing Buddhist to explore these quiet and sacred monasteries. Their brightly colored temples, altars with gilded Buddha statues, and peaceful grounds are open to the public. Both centers welcome visitors of all faiths who are looking for a cultural experience or simply a few tranquil moments. The longstanding Tibetan Mongolian Buddhist Cultural Center is on the southeast side of Bloomington, and the newer Gaden KhachoeShing monastery is on Bloomington's north side. Both monasteries have four resident monks who chant and pray daily in the temples. Both centers were established to preserve Buddhism in Western culture and both are rooted in the Yellow Hat sect of Tibetan Buddhism, but their practices veer from there - the two are not affiliated. Here's what to expect when visiting these Bloomington landmarks. At the Tibetan Mongolian Buddhist Cultural Center, a winding drive seems to offer something new at every turn: monuments, the temple, a prayer-wheel pavilion, a pond with lotus flowers, and cottages for rent. Set back on a heavily wooded 108 acres - just 10 acres of which are developed - the center hosts individual visitors looking for meditation as well as large events, including a handful of visits from the Dalai Lama (he even has a private apartment at the Center for those visits). The Center was founded in the 1970s by the late Thubten Jigme Norbu, the eldest brother of the 14th Dalai Lama and a professor of Tibetan Studies at Indiana University. Today, the Center's director is Arjia Rinpoche, who fled Tibet and wrote a memoir about it called "Surviving the Dragon." Rinpoche was recognized as a reincarnate lama when he was two years old and he was tapped by the Dalai Lama to become the director in 2005. The center promotes diversity and interfaith prayer, which is why a Bible and Koran are on display in the temple, says Chenli Reije, the Center's manager and nephew of the Center's director. Yoga, meditation classes, and Sunday morning prayer are some of the ways the Center engages the community. Reije says he hopes that visitors enjoy seeing a different perspective at the Center. "In Buddhism, one of the main teachings is not having attachment. Life is impermanent," Reije says. "[People] usually look for guidance from Buddhist teachings to break their rituals and look at the bigger picture. For visitors, we just want them to be able to see something different." Past the temple, visitors will find a lotus pond, cottages nestled in the woods, and an outdoor teaching pavilion, which was used by the Dalai Lama on his visits to the Center. The renovated cottages resemble traditional Mongolian yurts but with the comforts of home. They have air conditioning and heating, electricity, plumbing, and kitchenettes, and go for around $100 a night. They're often rented out for spiritual retreats, but they also fill up on busy weekends in Bloomington as an alternative to a hotel, Reije says. Also on the grounds are two tall, striking monuments known as stupas, whose simplified shapes are said to represent Buddha. There's also a structure that houses a prayer wheel - giving it a spin clockwise is the equivalent of saying hundreds of thousands of prayers at once. There's even a gift shop in the community building, which offers Tibetan items including necklaces, slippers, and books. In addition to retreats and classes, the Center hosts celebrations for Buddha's birthday in the spring, the Dalai Lama's birthday in the summer, and the Tibetan new year in late winter or early spring. Meanwhile, at Gaden KhachoeShing monastery, about seven miles north of downtown Bloomington, the temple features a grand, gilded 32-foot-tall statue, one of the largest anywhere outside of Tibet, says Jamyang Lama, a resident monk and co-founder of the monastery. The temple may be new - it opened in fall 2014 - but the monastery was founded in Bloomington in 1996 in a different location. Set on 128 acres in the woods and at the end of an unpaved road, Gaden KhachoeShing feels remote. A clearing gives way to a large three-story building that houses the temple, living space for the monks, and a large dining hall and kitchen used for retreats and celebrations. Annual events include the Tibetan New Year and Taste of Tibet, a feast of traditional foods like momos (dumplings) and teas. Many features of the temple were imported from Nepal, Lama says, including the ornate doorknobs on the entrance and the three gilded statues on the altar that represent past, present, and future Buddhas. The space is made incredibly vibrant by colorful tapestries and paintings, brightened with natural light. The temple is used daily by the resident monks, but also for retreats, classes, and gatherings for visiting teachers from around the world. "Coming here is a spiritual destination," Jamyang Lama says. "It is a place where people can be contemplative and ultimately inspired to become a Buddha." The center welcomes people of all faiths to talk with monks and students, or simply to practice silence, he says. "Some just want to come here to gain some peace in their mind," Lama says. "We are here for everyone." The temple was built with eco-friendly features like LED lighting, low-flow faucets, and rainwater harvesting. If You Go Both centers welcome visitors of all faiths. Gaden KhachoeShing asks that visitors call ahead; the Tibetan Mongolian Buddhist Cultural Center is open daily, 10 a.m.-5 p.m., and large groups should call ahead. A few pointers on etiquette at the temples: Take off your shoes and place them in the cubbies/racks provided before entering - shoes are removed to keep the spiritual space clean and to symbolically leave negative thoughts behind. Don't touch statues, tapestries, or paintings. It's absolutely okay to take pictures, talk with the monks, and ask questions. "You don't have to be a Buddhist to come here and talk to one of our monks," says Reije, "We are everyday people." Tibetan Mongolian Buddhist Cultural Center 3655 Snoddy Road Bloomington, IN 47401 2150 E. Dolan Road Bloomington, IN 47408
<urn:uuid:0a4c9eaa-01e1-46e0-906f-0c4dcb3d05bf>
CC-MAIN-2017-04
https://www.visitbloomington.com/make-a-plan/virtual-visitors-guide/buddhists-in-bloomington/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00346-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959939
1,462
1.796875
2
Arched rooms that hold up sloping foundation in Taj Mahal’s basement don’t house Hindu idols. Nothing mysterious or worth maligning the Mughals for, say experts about a monument we should continue to be proud of Back in the 17th century, Mughal emperors didn’t enter the Taj Mahal from the south door that visitors take today. They would cross the Yamuna river by boat to come to a now defunct gate. “The emperor [Shah Jahan] would walk in from the gate on the left of the northern wall, now silted up,” says Delhi-based historian-author Rana Safvi. “He would pass through the galleries and rest in one of the rooms. Amita Baig [heritage management consultant who co-authored Taj Mahal: Multiple Narratives] described these galleries as very well-painted corridors.” It is these rooms that have been the subject of recent contention. Essentially a mausoleum commissioned by the Mughal emperor Shah Jahan for his favourite wife Mumtaz Mahal, the Taj was built between 1631 and 1648. Recently, a public interest litigation (PIL) was filed in the Allahabad High Court, seeking directives to the Archaeological Survey of India (ASI) to probe the 22 closed rooms under it to ascertain the presence of idols of Hindu deities, refuelling the theory that the Taj was built over Tejo Mahalaya, as claimed by historical revisionist Purushottam Nagesh Oak (PN Oak). Amita Baig, heritage mgmt consultant A professor of History at the Aligarh Muslim University in Uttar Pradesh, Syed Ali Nadeem Rezavi squashes these claims. Explaining the topography of the region and the structure of one of the Seven Wonders of the World, he says, “It is a massive and heavy structure constructed on sloping ground. The base is higher on the side of the garden and it slopes sharply towards the river. Mind you, the Yamuna that you see today was a vast river back in the 17th century. To support the structure, wells were dug [as they are for bridges] at regular intervals, lined with teakwood and filled with boulders and rubble so that the sand didn’t cave in. This made for a stable foundation. Brick platforms were built on top of these wells, held in place by arches, a technique to support heavy weights. So, a double platform was created towards the river, which sloped towards the garden. Arched rooms were created below the foundation, upon which marble was laid horizontally. These rooms had a number of purposes. During the Mughal era, the Yamuna was the main route of transportation. Large ships would navigate the river, connecting Agra to Allahabad and Bengal. When Shah Jahan or the royal family visited the monument, they would cross the river, and go into these rooms to rest.” The foundation for the Taj goes down 17.5 metres, adds Safvi. Thus the existence of any remains of a former structure is impossible. “So, where’s the question of any rooms from Raja Man Singh’s haveli?” asks Safvi. According to the historian, the underground rooms and gallery corridors still exist, but access to them was closed in 1980 after the flood of 1978. The Yamuna overflowed that year, nearly submerging the entire old city. “These rooms were then cordoned off from the public for the safety of the monument,” adds Safvi, who says she has spent many an evening in the Taj’s gardens with her sister. Since it was a massive construction on sloping ground, the foundation for the Taj Mahal went 17.5 metres deep. Wells were dug at regular intervals, lined with teakwood and filled with boulders to prevent the sand from caving in. On top of these wells came platforms, held together by arches, which later became arched rooms below the foundation. Pic/Getty Images The PIL, which the Lucknow bench of Allahabad Court dismissed on May 12, was supported by BJP MP Diya Kumari, the granddaughter of the last Maharaja of Jaipur, Man Singh II. She claimed that the land on which the Taj Mahal was built belonged to Jaipur’s Maharaja Jai Singh I, and was acquired by Shah Jahan. Her purported evidence is the royal records. Historians hold that Shah Jahan bought the land in exchange for four estates. One has to see this in the context of the relationship between the Mughals and the Jaipur royals, suggests heritage activist Sohail Hashmi. “His grandson, Man Singh I, was close to Akbar [Harkha Bai’s niece married Akbar’s son Jehangir]. In fact, Man Singh I was a senior noble in Akbar’s court and they were family. It was Akbar who granted him the land where the Taj stands today. Traditionally, these grants were not permanent, and the land would go back to the ruler once the grantee passed away; but in this case, it didn’t. Two generations later, when Mumtaz passed away, Shah Jahan selected the place for his wife’s mausoleum. His ministers would have traced the ownership of the land to Jai Singh I [Man Singh I’s grandson]. Jai Singh I, who was given the title Mirza, a title traditionally reserved for Mughal princes and nobles, was willing to gift it to Shah Jahan, but the Mughal emperor wouldn’t accept that, because as per Islam, you can’t build a mausoleum or a mosque on land that doesn’t belong to you.” Heritage activist Sohail Hashmi says that it is a myth that Emperor Shah Jahan chopped off the fingers of artisans who built the Taj Mahal. Within 200 yards of the south gate of the monument, is Tajganj, a settlement of the artisans’ descendants. Some of them have won the President’s medal. The book—Taj Mahal: The Illuminated Tomb by WE Begley and ZA Desai—details this. “Even though Raja Jai Singh I considered the acquisition of this [tract of land] to be fortunate… [he respected the importance of religious matters] and a lofty mansion from the crown estates was granted to him in exchange,” reads a line from the book. Safvi adds that the Mughals were great recordkeepers. “In 1633,” she says, “four havelis were given in lieu of this land. Now we don’t know whether it was along with the mansion mentioned earlier or in exchange for that, but there is a farman in the now sealed Kapad Dwara collection of Jaipur City palace. Diya Kumari ji has authority over the City Palace. All she has to do is open it, and that may sort out the litigation. Not just the farman, but even the Persian translation of Mahabharata and Ramayana—commissioned by Akbar—rest there.” Syed Ali Nadeem Rezavi Why did Shah Jahan choose this particular piece of land over any other? Why wasn’t the Taj built in Burhanpur (present-day Madhya Pradesh) where Mumtaz Mahal died and was buried temporarily? Safvi has an explanation. “He had initially considered a grand mausoleum on the banks of the Tapti. But it was a challenge to transport the marble from Rajasthan to Burhanpur. The composition of the soil was also unfavourable. Raja Man Singh’s haveli in Agra was the prime location due to its position on the bend of the river where the thrust of the Yamuna was the least, and the river was least likely to meander from. If you see the Red Fort, the Yamuna has shifted five or six km from its actual location. What used to be the Yamuna is now MG Road. But the Yamuna still runs along the Taj. The river was a very important because of the heft of the structure—the dome weighs about 1,200 tonnes. Water was needed to keep the timber [lining the wells] moist, otherwise it could crack.” Plus, as a mausoleum, it had to be a sacred space. “It is not just a monument of love,” she says. “It was a monument meant for the redemption of an empress. It had to be built on a paradisical theme, incorporating all religious factors. That’s why the calligraphy on the walls is about death and redemption in heaven. A grave has to be perpendicular to the Qibla [the direction of the Kaaba in Mecca, which the Muslims face in various religious contexts, particularly for prayer] and the mosque attached to the Taj would have to face west. This was the spot where all this was aligning.” Time and again the theory that Taj Mahal is Tejo Mahalaya, a temple to Lord Shiva, makes its way into WhatsApp groups and even on television debates. In 2000, the Supreme Court dismissed PN Oak’s petition to declare that a Hindu king had built the Taj Mahal as “misconceived”. The structure before restoration. Pics courtesy/ASI “I think it was in the 1980s that I first became aware of PN Oak and his far-fetched theories about St Peter’s Basilica, Notre Dame, Kaaba and Taj Mahal being temples,” says Safvi. “He even wrote a book titled The Taj Mahal was a Rajput Palace. Nobody took him seriously. His theories were debunked, and that was that. But in the last decade, with the growth of social media and WhatsApp, where there is hardly any verification of historical sources, his story about the Taj Mahal being Tejo Mahalaya has been picked up and circulated widely. Plus, the atmosphere at the moment is such that the Mughals are a bad word, and people are very happy to accept anything that is negative about them.” This isn’t the only conspiracy theory about the Taj Mahal and its makers circulating these past few years. “Unfortunately, we have ill-informed guides who go around saying that a black Taj Mahal was supposed to be built,” says Hashmi, “somebody has even written a book about it. The guides also tell tourists that Shah Jahan had the fingers of artisans and labourers, who worked on the mausoleum, chopped off so that there couldn’t be another Taj. Does anybody ask them about the source of this information? If it takes 20 years to build such a structure, the thought that it needs to be maintained would have occurred to Shah Jahan. Who would carry out the repairs [if the artisans were maimed]? Besides, within 200 yards of the Taj’s south gate is a locality [Tajganj] inhabited by the descendants of the artisans. They continue to do stone inlay work and some have won the President’s medal.” A newsletter released by the Archaeological Survey of India earlier in May contained pictures of the maintenance work they undertook on the underground cells by the riverside. These pictures should have put rumous to rest about the “locked rooms”. The decayed and disintegrated lime plaster was removed and replaced by a new one, using a traditional process It is important to note that many of these artisans also built the Red Fort, says Safvi, adding, “The chief architect, Ustad Ahmad Lahori, also laid the foundations of the Red Fort. Another theory questions the love shared by the royal couple because Mumtaz died giving birth to their 14th child. People forget that in those days, everybody had several children. Shah Jahan had many wives but his devotion to her is recorded at various points of his rule.” Hashmi adds, “They were inseparable. She would accompany him everywhere; that’s why she was in Burhanpur. Shah Jahan had gone to the Deccan to fight and put down a rebellion.” About the black Taj Mahal, Baig quotes her book, “Across the river was Mehtab Bagh, which has a classical char bagh, with proportions similar in the scale to the Taj Mahal. This naturally fuelled the myth of a black Taj—a twin across the river—a tomb the emperor intended for himself, perhaps perpetuated by folklore… inspired by viewing the Taj in the black reflecting pools at Mehtab Bagh on a moonlit night… Fortunately… recent excavations have revealed the true intentions of Mehtab Bagh—a critical component of the Taj Mahal Complex and one that weaves an even more powerful narrative than the idea of the Black Taj… Mehtab Bagh’s riverfront terrace has a large octagonal pool at its centre which, on a full-moon night, perfectly reflects the Taj Mahal. In this octagonal pool, measuring 88 feet across, with scalloped edges and 25 fountains, would the reflection of the Taj Mahal ripple in the moonlight? Would it be dark and brooding or shimmering white, the reflection ephemeral and even more symbolic of the emperor’s intent?” When asked about the ongoing comments, Baig shares some food for thought: “Whether it is the Taj or Bibi Ka Maqbara [in Aurangabad, Maharashtra], thousands of Indians come and venerate these graves, irrespective of their religion. For me, it is the beauty and the perfection of the monument, but for so many, it is the reverence of our forefathers and that drives the culture in India. [Besides] we can either behave like Aurangzeb, and decide to erase history. Or, we can accept that we are the product of a multi-layered culture and look ahead. If the roadmap is to behave like Aurangzeb, then why vilify him when we are no different?” No. of ‘rooms’ below the foundation. Historians say this is more like an arched corridor with doors Year the rooms were shut for public access to protect the monument after the Yamuna flooded old Delhi in 1978 The depth of the foundation for the Taj in metres Rana Safvi recommends that you read . Taj Mahal - The Illumined Tomb by WE Begley and ZA Desai . Taj Mahal: Multiple Narratives by Amita Baig and Rahul Mehrotra . Immortal Taj Mahal, the evolution of the tomb in Mughal architecture by R Nath . The Complete Taj Mahal by Ebba Koch . Taj Mahal by Giles Tillotson
<urn:uuid:ec0097c9-24cd-490c-8713-6b7ecfd7b7f8>
CC-MAIN-2022-33
https://www.mid-day.com/sunday-mid-day/article/truths-about-taj-23228217
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00276.warc.gz
en
0.97469
3,167
3.3125
3
The stats helper monkeys at WordPress.com mulled over how this blog did in 2010, and here’s a high level summary of its overall blog health: The Blog-Health-o-Meter™ reads Wow. The Louvre Museum has 8.5 million visitors per year. This blog was viewed about 79,000 times in 2010. If it were an exhibit at The Louvre Museum, it would take 3 days for that many people to see it. In 2010, there were 13 new posts, growing the total archive of this blog to 89 posts. There were 3 pictures uploaded, taking up a total of 1mb. The busiest day of the year was October 28th with 441 views. The most popular post that day was MATLAB code for bubble sort. Where did they come from? The top referring sites in 2010 were nm.mathforcollege.com, autarkaw.com, newtonexcelbach.wordpress.com, google.com, and en.wordpress.com. Some visitors came searching, mostly for bubble sort matlab, polynomial interpolation matlab, matlab solve equation, interpolation matlab, and spline matlab. Attractions in 2010 These are the posts and pages that got the most views in 2010. MATLAB code for bubble sort November 2009 How do I solve a nonlinear equation in MATLAB? April 2009 How do I differentiate in MATLAB? March 2009 A Matlab program for comparing Runge-Kutta methods August 2008 4 comments and 1 Like on WordPress.com, How do I do polynomial interpolation in MATLAB June 2009
<urn:uuid:a6d6cd40-5d73-4060-91db-2abc8d939eca>
CC-MAIN-2022-33
https://blog.autarkaw.com/2011/01/02/2010-in-review/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00671.warc.gz
en
0.946363
362
1.804688
2
Picking A Blog Topic That Makes Money You may create a blog to share you, your ideas, your feelings, or what you feel passionate about. Your blog will attract advertisers eventually if you get enough readers and enough hits. Advertisement means money for you. When choosing a blog topic, you should naturally pick a subject or topic that you know something about and have a definite interest in. Having a deep interest will keep you actively researching and adding to your blog daily or several times a day. Passion and a definite position can never hurt your blog. Having a definite position draws readers with similar points of view and readers mean notice and hits and ads and money. Even if you are into blogging just for the money you need a guide to determine what topics get the most traffic (number of hits and readers) and pick one of a topic at the top of the list to guarantee yourself an income. If you write profusely you can have multiple blogs and multiple sources of income from ads on your blogs. Listen to the Latest Episodes Right Now. Another way of making the internet and blogging make money for you is to select a special topic that appeals to a particular audience and develops that audience by bringing new information that is current and pertinent to your special field to your reader’s attention. What Does Google Say? You best source for finding out what is hot in blogging is Google naturally. Google still basically owns the net and dominates net searches and internet advertising. You can use Google’s AllInTtitle operator to generate a list of the most popular blog topics for any day or date frame you select. You can also narrow down the results you get by requesting results that are strings with AND or NOT operators that will produce a list that is more specific to the topic you have in mind. The date frame you pick is important for some topics due to changing factors in politics, business, sports, and entertainment. You want to keep an eye on the changes that affect your blog topic regularly so you keep a steady level of readership. How is Competition? You need to consider competition and the financial resources you have to pay Google for positioning on the side bar of search engine pages and at the top of search engine results. Cars, music, food, beauty, fashion, movies, health, and technology (phones, laptops, PCS, apps), and design (app design, home design, clothing design, etc.) have more sites than any other topics. If you select a topic that has a lot of competition you have to make your blog stand out from the rest in visual appeal and content in order to be noticed and to attract advertisements. Search engine optimization is a top topic because Google and every other search engine are constantly changing their algorithms for search engines. Knowing what is going on with search engine optimization keeps your blog in front of more eyes and makes you more money. The basic idea is there are tools to help you select blog topics that can make your blog make money for you. Topic selection is your first consideration due to the high levels of competition your blog will encounter. Advertisers have a defined amount of money to spend on the net and your selection of topics means you can get some of that money.
<urn:uuid:d2b36d8d-ebe2-4931-b31f-0db4662227c0>
CC-MAIN-2017-04
http://www.wpvirtuoso.com/43-most-popular-blog-category-topics/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00245-ip-10-171-10-70.ec2.internal.warc.gz
en
0.939453
661
1.515625
2
In May of 2022, prior to the 2022 Australian Federal Election, then-Prime Minister Scott Morrison expressed concern regarding the push for a National Integrity Commission and the focus on pork barrelling over other suspicious behaviour. Speaking to the Herald and The Age, Mr. Morrison suggested that a national integrity commission's focus should be on identifying criminal behaviour as opposed to 'subjective questions' regarding whether or not a marginal seat's spending amounts to pork barelling.' In regards to the federal politicians representing such seats, Mr. Morrison asked: “No one is suggesting anyone has broken any law are they?” Morrison Concerned Investigations into Alleged Pork Barrelling Could Lead to 'public autocracy' Mr. Morrison also expressed concern regarding members of parliament being investigated by public servants for allocating funding to grants and projects: “If we are going to so disempower our elected representatives to do things about what is needed in their communities, then what is the point? We can’t just hand government over to faceless officials to make decisions that impact the lives of Australians from one end of the country to the other. I actually think there’s a great danger in that. It wouldn’t be Australia anymore if that was the case, it would be some kind of public autocracy." Responding to a question on whether or not Mr. Morrison was passionate about establishing the new body, Mr. Morrison stated: “The unintended consequences of an ill-thought-through integrity commission, I think are very dangerous...I understand the interest there is in this, I understand why people want it. But I also know that if you get it wrong it could cause a lot of damage...I am trying to prevent a massive mistake.” Mr. Morrison also differentiated the focus areas of such a commission between state and federal governments, noting that sectors more susceptible to corruption including gaming, liquor licensing and development approvals were state government responsibilities. Mr. Morrison was also critical of how such investigations are portrayed in the media: “This is why I’m so critical of the NSW system because we read far too much [in the media] before anyone has actually been considered in relation to evidence...I think that has destroyed a lot of lives because I think the process has been very faulty.”
<urn:uuid:878aeef9-015c-4ab2-8b2a-8c9fde9e2be2>
CC-MAIN-2022-33
https://www.friendlyjordies.com/post/scott-morrison-pork-barrelling
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00478.warc.gz
en
0.97029
477
1.570313
2
Status epilepticus (SE) is a medical emergency. The general clinical course of a typical convulsive status can be categorized as: early, established, refractory and super-refractory. SE that continues or recurs 24 hours or more after the onset of anesthesia, including those cases in which SE recurs on the reduction or withdrawal of anesthesia is known as super-refractory status epilepticus.1 While treatment guidelines exist for established and refractory status epilepticus, the management of super-refractory status epilepticus is not well established. We present here a case of super-refractory status epilepticus treated with doses of anesthetic medications beyond the recommended guidelines with a good clinical outcome. A 28-year old female, a known hypertensive for 2 years, had 2 episodes of generalized tonic-clonic seizures (GTCS) following 2 days of fever. She was conscious in the interictal period. She had no prior history of seizures. She was managed initially at another hospital where she was given a loading dose of 3 g of levetiracetam. The next day, she was brought to our emergency department in a drowsy state following 2 more GTCS. On examination, she did not have any focal neurological deficits. She was given a loading dose of fosphenytoin (20 mg/kg phenytoin equivalent), while levetiracetam was continued at 1,500 mg q12h. MRI brain with and without gadolinium contrast revealed no abnormalities. Routine blood chemistries and hemogram were normal. Creatine phosphokinase was normal. Electroencephalogram (EEG) showed diffuse slowing without any interictal epileptiform discharges. The differential diagnosis was viral vs autoimmune encephalitis. At the time of admission, cerebrospinal fluid (CSF) analysis was normal (glucose 66 mg/dL with blood glucose 118 mg/dL, protein 48 mg/dL, 2 cells, both lymphocytes). CSF polymerase chain reactions (herpes simplex virus and tuberculosis) were negative. Her thyroid profile and anti-thyroid peroxidase antibody titres were within normal limits. She was treated with acyclovir empirically. She regained consciousness and was stable for the next 3 days. On the 4th day, she developed one episode of GTCS. Clobazam was added at a dose of 10 mg qhs. Following this episode, she developed recurrent focal seizures originating from the right as well as left temporal regions with worsening of sensorium (Fig. 1A ). She was intubated and placed on mechanical ventilator support. A loading dose of sodium valproate (40 mg/kg body weight) was given. For the next 2 hours, no clinical or electrographic seizures were recorded. After 2 hours, there was a recurrence of focal seizures with mild facial twitching, amounting to non-convulsive status epilepticus (NCSE, Fig. 1B ). A loading dose of midazolam (0.2 mg/kg) was followed by maintenance infusion which was gradually increased to 3 mg/kg/hr (body weight 80 kg, total dose was 240 mg/hr). At this dose of midazolam infusion, she developed hypotension with blood pressure of 80/60 mmHg. At this stage, noradrenaline infusion was initiated and the dose was titrated (320 mcg/hour) with concurrent decrease in the rate of infusion of midazolam (decreased upto 80 mg/hr). She had relapse of seizures in the form of recurrent electrographic seizures. Lacosamide (400 mg loading, then 200 mg q12h) and topiramate (400 mg loading, then 200 mg q12h) were added to the regimen. Due to continuation of NCSE, thiopentone sodium infusion was initiated and gradually increased. At a dose of 6 mg/kg/hr (total dose 480 mg/hr), burst suppression was achieved. At this point, her hemogram, renal and hepatic parameters were within normal limits. After 5 days of IV methylprednisolone (IVMP), she was given 5 days of IV immunoglobulin (0.4 g/kg/day). Evaluation for autoimmune state, including antibodies against N-methyl D-aspartate receptor and voltage-gated potassium channel as well as for systemic vasculitis was normal. As the CSF parameters, and investigations for systemic autoimmune conditions were normal, we postulated a probable diagnosis of viral vs autoimmune encephalitis. After 12 hours of burst suppression, gradual withdrawal of midazolam and thiopentone was started. Midazolam was completely stopped and thiopentone was reduced to 40 mg/hr without seizure recurrence, following which it was completely stopped. However, she developed recurrent electrographic seizures again. The second cycle of midazolam and thiopentone was started with doses of 80 mg/hr and 160 mg/hr respectively. Vasopressor support was added for hypotension. With these doses, control of seizures was achieved and they were gradually tapered off over the next 4 days. Her sensorium improved and she was able to follow simple commands. After 5 days, she developed a focal seizure with worsening of sensorium. EEG showed frequent electrographic seizures (Fig. 1C ). Midazolam was restarted at 10 mg/hr and control was achieved at a dose of 50 mg/hr. MRI Brain and CSF analysis were repeated but did not show any abnormalities. Midazolam was tapered and stopped over the next 2 days after seizure control (Fig. 1D ). Acyclovir was continued for a total of 14 days. She gradually improved and was weaned off the ventilator. There was no further seizure recurrence. She had developed mild proximal weakness of all limbs which was diagnosed as critical illness myoneuropathy. Cognitive assessment showed severe attentional deficits. On discharge, she had mild proximal weakness, attention and occasional recent memory deficits. She continued to improve during the follow-up period. At the last visit, she had no residual weakness but had mild attention and recent memory deficits. She was able to take care of herself and her family independently. The major events of the case are summarized in a timeline in figure 2 About 15% of all status epilepticus progress to super-refractory status epilepticus. The causes postulated include excitotoxicity, inhibitory neurotransmitter dysfunction, energy failure, inflammatory processes and network reorganization. The aim of treatment is to control seizures and prevent propagation of damage.2 However, the treatment of super-refractory status epilepticus is difficult and is hampered by the lack of established guidelines. The best treatment, of course, is treatment of the cause. For control of seizures, various methods have been proposed. These include anesthetic agents (thiopentone, midazolam, propofol, ketamine and inhalation anesthetics), newer antiepileptics, magnesium, pyridoxine, immunotherapy, ketogenic diet, hypothermia, neuromodulation and surgery.2 The doses for midazolam and thiopentone for adults, as used in available literature, are up to 0.4 mg/kg/hr and 5 mg/kg/hr respectively.2 In our case, we used midazolam up to 3 mg/kg/hr and thiopentone up to 6 mg/kg/hr. Even at these doses, hypotension was transient and there were no other systemic complications. We postulate that this case is unique in the sense that the patient had only transient hypotension with anesthetic medications and the good clinical outcome is related to appropriate aggressive medical care in a young female. The outcome of patients with refractory and super-refractory status epilepticus (SRSE) is variable.3 As we gain more information, the prognosis of super-refractory status epilepticus will improve. In the absence of established guidelines, the treatment of super-refractory status epilepticus needs to be individualized. Aggressive treatment, even with doses beyond those conventionally used, can result in a good functional outcome with minimal complications.
<urn:uuid:60e62821-c6a5-4598-befc-ba14bbb14451>
CC-MAIN-2022-33
https://www.j-epilepsy.org/m/journal/view.php?doi=10.14581/jer.16008
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00270.warc.gz
en
0.952326
1,762
1.632813
2
This error ‘Login Failed for user ‘SQLServer\user‘ happens when the Helpdesk Agent add-in installed on the workstation can’t login to the SQL server database on the network. Possible reason can be the followings: The user on that system is not authorized to have access to the SQL server or the database. If the option ‘Use Integrated Security’ is enabled under Helpdesk Manager > Helpdesk Settings Data Source panel, Helpdesk Agent add-in on other workstations will use windows authentication (NTLM) of the particular system to access the ‘AssistMyTeamHelpdeskDB’ database on the SQL server. So, make sure the windows user is allowed access to the SQL resource on the network.
<urn:uuid:3348a952-3183-48a4-a52d-9f9dbb9fe1c7>
CC-MAIN-2022-33
https://www.assistmyteam.com/kb/login-failed-for-user-sqlserveruser/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00474.warc.gz
en
0.783217
166
1.75
2
Although N2-fixing cyanobacteria contribute significantly to oceanic sequestration of atmospheric CO2, little is known about how N2 fixation and carbon fixation (primary production) interact in natural populations of marine cyanobacteria. In a developing cyanobacterial bloom in the Baltic Sea, rates of N2 fixation (acetylene reduction) showed both diurnal and longer-term fluctuations. The latter reflected fluctuations in the nitrogen status of the cyanobacterial population and could be correlated with variations in the ratio of acetylene reduced to 15N2 assimilated. The value of this ratio may provide useful information about the release of newly fixed nitrogen by a cyanobacterial population. However, although the diurnal fluctuations in N2 fixation broadly paralleled diurnal fluctuations in carbon fixation, the longer-term fluctuations in these two processes were out of phase.
<urn:uuid:43f47187-208f-4ec4-960c-5a4b901d9aa8>
CC-MAIN-2017-04
https://pure.knaw.nl/portal/en/publications/uuid(ae449a37-50a4-4e50-a5d1-529842ad5b94).html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00430-ip-10-171-10-70.ec2.internal.warc.gz
en
0.922972
170
1.960938
2
Your email address will be used for Wildy’s marketing materials only. We will never give your email address to any third party. Special Discounts for Pupils, Newly Called & Students Browse Secondhand Online Following the 9/11 terrorist attack, the attention paid to the issue of how peoples of various faiths live by both secular laws as well as their religious law has increased significantly. The issues of freedom of religion and religious accommodation in law are being debated in courts and legislatures across numerous jurisdictions. Such debates are also closely associated with broader discussions around secularism, multiculturalism, immigration, settlement and security. The book is unique in bringing together leading scholars and respected religious leaders to address contemporary issues in the relationship of law, religion and the state. The contributors to the volume bring legal, theoretical, historical and religious insights to bear on some of the most pressing social issues of our time. The variety of perspectives highlights the religious dimensions of law, the legal dimensions of religion, and the interaction between secular law and religion. Particular attention is given to the implications for law and society, religious tolerance and freedom. The book focuses on the practical and topical issues that have arisen in recent years in Australia. As one of the most ethnically diverse countries in the world, a pioneer of multicutural policies in immigration and social justice, Australia is a revealing site for contemporary studies in a world afraid of immigration and terrorism., issues that are affecting much of the globe.
<urn:uuid:82639840-53c2-45c3-8956-fe207a3c050d>
CC-MAIN-2017-04
http://www.wildy.com/isbn/9780415859646/law-and-religion-in-public-life-the-contemporary-debate-paperback-hardback-in-2011-routledge-cavendish
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00576-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94993
298
2.390625
2
Transactions of the Association for Computational Linguistics (2016) Morpho-syntactic lexicons provide information about the morphological and syntactic roles of words in a language. Such lexicons are not available for all languages and even when available, their coverage can be limited. We present a graph-based semi-supervised learning method that uses the morphological, syntactic and semantic relations between words to automatically construct wide coverage lexicons from small seed sets. Our method is language-independent, and we show that we can expand a 1000 word seed lexicon to more than 100 times its size with high quality for 11 languages. In addition, the automatically created lexicons provide features that improve performance in two downstream tasks: morphological tagging and dependency parsing. Distributional models that learn rich semantic word representations are a success story of recent NLP research. However, developing models that learn useful representations of phrases and sentences has proved far harder. We propose using the definitions found in everyday dictionaries as a means of bridging this gap between lexical and phrasal semantics. Neural language embedding models can be effectively trained to map dictionary definitions (phrases) to (lexical) representations of the words defined by those definitions. We present two applications of these architectures: reverse dictionaries that return the name of a concept given a definition or description and general-knowledge crossword question answerers. On both tasks, neural language embedding models trained on definitions from a handful of freely-available lexical resources perform as well or better than existing commercial systems that rely on significant task-specific engineering. The results highlight the effectiveness of both neural embedding architectures and definition-based training for developing models that understand phrases and sentences. Word meanings change over time and an automated procedure for extracting this information from text would be useful for historical exploratory studies, information retrieval or question answering. We present a dynamic Bayesian model of diachronic meaning change, which infers temporal word representations as a set of senses and their prevalence. Unlike previous work, we explicitly model language change as a smooth, gradual process. We experimentally show that this modeling decision is beneficial: our model performs competitively on meaning change detection tasks whilst inducing discernible word senses and their development over time. Application of our model to the SemEval-2015 temporal classification benchmark datasets further reveals that it performs on par with highly optimized task-specific systems. Understanding cross-cultural differences has important implications for world affairs and many aspects of the life of society. Yet, the majority of text-mining methods to date focus on the analysis of monolingual texts. In contrast, we present a statistical model that simultaneously learns a set of common topics from multilingual, non-parallel data and automatically discovers the differences in perspectives on these topics across linguistic communities. We perform a behavioural evaluation of a subset of the differences identified by our model in English and Spanish to investigate their psychological validity. This paper presents an empirical study of linguistic formality. We perform an analysis of humans’ perceptions of formality in four different genres. These findings are used to develop a statistical model for predicting formality, which is evaluated under different feature settings and genres. We apply our model to an investigation of formality in online discussion forums, and present findings consistent with theories of formality and linguistic coordination. Algorithmic decipherment is a prime example of a truly unsupervised problem. The first step in the decipherment process is the identification of the encrypted language. We propose three methods for determining the source language of a document enciphered with a monoalphabetic substitution cipher. The best method achieves 97% accuracy on 380 languages. We then present an approach to decoding anagrammed substitution ciphers, in which the letters within words have been arbitrarily transposed. It obtains the average decryption word accuracy of 93% on a set of 50 ciphertexts in 5 languages. Finally, we report the results on the Voynich manuscript, an unsolved fifteenth century cipher, which suggest Hebrew as the language of the document. The Tier-based Strictly 2-Local (TSL2) languages are a class of formal languages which have been shown to model long-distance phonotactic generalizations in natural language (Heinz et al., 2011). This paper introduces the Tier-based Strictly 2-Local Inference Algorithm (2TSLIA), the first nonenumerative learner for the TSL2 languages. We prove the 2TSLIA is guaranteed to converge in polynomial time on a data sample whose size is bounded by a constant. Existing work on domain adaptation for statistical machine translation has consistently assumed access to a small sample from the test distribution (target domain) at training time. In practice, however, the target domain may not be known at training time or it may change to match user needs. In such situations, it is natural to push the system to make safer choices, giving higher preference to domain-invariant translations, which work well across domains, over risky domain-specific alternatives. We encode this intuition by (1) inducing latent subdomains from the training data only; (2) introducing features which measure how specialized phrases are to individual induced sub-domains; (3) estimating feature weights on out-of-domain data (rather than on the target domain). We conduct experiments on three language pairs and a number of different domains. We observe consistent improvements over a baseline which does not explicitly reward domain invariance. Answer sentence ranking and answer extraction are two key challenges in question answering that have traditionally been treated in isolation, i.e., as independent tasks. In this article, we (1) explain how both tasks are related at their core by a common quantity, and (2) propose a simple and intuitive joint probabilistic model that addresses both via joint computation but task-specific application of that quantity. In our experiments with two TREC datasets, our joint model substantially outperforms state-of-the-art systems in both tasks. The strongly typed syntax of grammar formalisms such as CCG, TAG, LFG and HPSG offers a synchronous framework for deriving syntactic structures and semantic logical forms. In contrast—partly due to the lack of a strong type system—dependency structures are easy to annotate and have become a widely used form of syntactic analysis for many languages. However, the lack of a type system makes a formal mechanism for deriving logical forms from dependency structures challenging. We address this by introducing a robust system based on the lambda calculus for deriving neo-Davidsonian logical forms from dependency trees. These logical forms are then used for semantic parsing of natural language to Freebase. Experiments on the Free917 and Web-Questions datasets show that our representation is superior to the original dependency trees and that it outperforms a CCG-based representation on this task. Compared to prior work, we obtain the strongest result to date on Free917 and competitive results on WebQuestions. We consider the problem of disambiguating concept mentions appearing in documents and grounding them in multiple knowledge bases, where each knowledge base addresses some aspects of the domain. This problem poses a few additional challenges beyond those addressed in the popular Wikification problem. Key among them is that most knowledge bases do not contain the rich textual and structural information Wikipedia does; consequently, the main supervision signal used to train Wikification rankers does not exist anymore. In this work we develop an algorithmic approach that, by carefully examining the relations between various related knowledge bases, generates an indirect supervision signal it uses to train a ranking model that accurately chooses knowledge base entries for a given mention; moreover, it also induces prior knowledge that can be used to support a global coherent mapping of all the concepts in a given document to the knowledge bases. Using the biomedical domain as our application, we show that our indirectly supervised ranking model outperforms other unsupervised baselines and that the quality of this indirect supervision scheme is very close to a supervised model. We also show that considering multiple knowledge bases together has an advantage over grounding concepts to each knowledge base individually. We introduce a new approach to training a semantic parser that uses textual entailment judgements as supervision. These judgements are based on high-level inferences about whether the meaning of one sentence follows from another. When applied to an existing semantic parsing task, they prove to be a useful tool for revealing semantic distinctions and background knowledge not captured in the target representations. This information is used to improve the quality of the semantic representations being learned and to acquire generic knowledge for reasoning. Experiments are done on the benchmark Sportscaster corpus (Chen and Mooney, 2008), and a novel RTE-inspired inference dataset is introduced. On this new dataset our method strongly outperforms several strong baselines. Separately, we obtain state-of-the-art results on the original Sportscaster semantic parsing task. The field of grammatical error correction (GEC) has grown substantially in recent years, with research directed at both evaluation metrics and improved system performance against those metrics. One unvisited assumption, however, is the reliance of GEC evaluation on error-coded corpora, which contain specific labeled corrections. We examine current practices and show that GEC’s reliance on such corpora unnaturally constrains annotation and automatic evaluation, resulting in (a) sentences that do not sound acceptable to native speakers and (b) system rankings that do not correlate with human judgments. In light of this, we propose an alternate approach that jettisons costly error coding in favor of unannotated, whole-sentence rewrites. We compare the performance of existing metrics over different gold-standard annotations, and show that automatic evaluation with our new annotation scheme has very strong correlation with expert rankings (ρ = 0.82). As a result, we advocate for a fundamental and necessary shift in the goal of GEC, from correcting small, labeled error types, to producing text that has native fluency. Transition-based approaches based on local classification are attractive for dependency parsing due to their simplicity and speed, despite producing results slightly below the state-of-the-art. In this paper, we propose a new approach for approximate structured inference for transition-based parsing that produces scores suitable for global scoring using local models. This is accomplished with the introduction of error states in local training, which add information about incorrect derivation paths typically left out completely in locally-trained models. Using neural networks for our local classifiers, our approach achieves 93.61% accuracy for transition-based dependency parsing in English. We present a new approach for generating role-labeled training data using Linked Lexical Resources, i.e., integrated lexical resources that combine several resources (e.g., Word-Net, FrameNet, Wiktionary) by linking them on the sense or on the role level. Unlike resource-based supervision in relation extraction, we focus on complex linguistic annotations, more specifically FrameNet senses and roles. The automatically labeled training data (www.ukp.tu-darmstadt.de/knowledge-based-srl/) are evaluated on four corpora from different domains for the tasks of word sense disambiguation and semantic role classification. Results show that classifiers trained on our generated data equal those resulting from a standard supervised setting. Methods for Named Entity Recognition and Disambiguation (NERD) perform NER and NED in two separate stages. Therefore, NED may be penalized with respect to precision by NER false positives, and suffers in recall from NER false negatives. Conversely, NED does not fully exploit information computed by NER such as types of mentions. This paper presents J-NERD, a new approach to perform NER and NED jointly, by means of a probabilistic graphical model that captures mention spans, mention types, and the mapping of mentions to entities in a knowledge base. We present experiments with different kinds of texts from the CoNLL’03, ACE’05, and ClueWeb’09-FACC1 corpora. J-NERD consistently outperforms state-of-the-art competitors in end-to-end NERD precision, recall, and F1. We present a method for unsupervised open-domain relation discovery. In contrast to previous (mostly generative and agglomerative clustering) approaches, our model relies on rich contextual features and makes minimal independence assumptions. The model is composed of two parts: a feature-rich relation extractor, which predicts a semantic relation between two entities, and a factorization model, which reconstructs arguments (i.e., the entities) relying on the predicted relation. The two components are estimated jointly so as to minimize errors in recovering arguments. We study factorization models inspired by previous work in relation factorization and selectional preference modeling. Our models substantially outperform the generative and agglomerative-clustering counterparts and achieve state-of-the-art performance. We tackle unsupervised part-of-speech (POS) tagging by learning hidden Markov models (HMMs) that are particularly well-suited for the problem. These HMMs, which we call anchor HMMs, assume that each tag is associated with at least one word that can have no other tag, which is a relatively benign condition for POS tagging (e.g., “the” is a word that appears only under the determiner tag). We exploit this assumption and extend the non-negative matrix factorization framework of Arora et al. (2013) to design a consistent estimator for anchor HMMs. In experiments, our algorithm is competitive with strong baselines such as the clustering method of Brown et al. (1992) and the log-linear model of Berg-Kirkpatrick et al. (2010). Furthermore, it produces an interpretable model in which hidden states are automatically lexicalized by words. How to model a pair of sentences is a critical issue in many NLP tasks such as answer selection (AS), paraphrase identification (PI) and textual entailment (TE). Most prior work (i) deals with one individual task by fine-tuning a specific system; (ii) models each sentence’s representation separately, rarely considering the impact of the other sentence; or (iii) relies fully on manually designed, task-specific linguistic features. This work presents a general Attention Based Convolutional Neural Network (ABCNN) for modeling a pair of sentences. We make three contributions. (i) The ABCNN can be applied to a wide variety of tasks that require modeling of sentence pairs. (ii) We propose three attention schemes that integrate mutual influence between sentences into CNNs; thus, the representation of each sentence takes into consideration its counterpart. These interdependent sentence pair representations are more powerful than isolated sentence representations. (iii) ABCNNs achieve state-of-the-art performance on AS, PI and TE tasks. We release code at: https://github.com/yinwenpeng/Answer_Selection. Continuous word representations have been remarkably useful across NLP tasks but remain poorly understood. We ground word embeddings in semantic spaces studied in the cognitive-psychometric literature, taking these spaces as the primary objects to recover. To this end, we relate log co-occurrences of words in large corpora to semantic similarity assessments and show that co-occurrences are indeed consistent with an Euclidean semantic space hypothesis. Framing word embedding as metric recovery of a semantic space unifies existing word embedding algorithms, ties them to manifold learning, and demonstrates that existing algorithms are consistent metric recovery methods given co-occurrence counts from random walks. Furthermore, we propose a simple, principled, direct metric recovery algorithm that performs on par with the state-of-the-art word embedding and manifold learning methods. Finally, we complement recent focus on analogies by constructing two new inductive reasoning datasets—series completion and classification—and demonstrate that word embeddings can be used to solve them as well. Rule-based stemmers such as the Porter stemmer are frequently used to preprocess English corpora for topic modeling. In this work, we train and evaluate topic models on a variety of corpora using several different stemming algorithms. We examine several different quantitative measures of the resulting models, including likelihood, coherence, model stability, and entropy. Despite their frequent use in topic modeling, we find that stemmers produce no meaningful improvement in likelihood and coherence and in fact can degrade topic stability. We propose a novel approach to cross-lingual part-of-speech tagging and dependency parsing for truly low-resource languages. Our annotation projection-based approach yields tagging and parsing models for over 100 languages. All that is needed are freely available parallel texts, and taggers and parsers for resource-rich languages. The empirical evaluation across 30 test languages shows that our method consistently provides top-level accuracies, close to established upper bounds, and outperforms several competitive baselines. We present a simple and effective scheme for dependency parsing which is based on bidirectional-LSTMs (BiLSTMs). Each sentence token is associated with a BiLSTM vector representing the token in its sentential context, and feature vectors are constructed by concatenating a few BiLSTM vectors. The BiLSTM is trained jointly with the parser objective, resulting in very effective feature extractors for parsing. We demonstrate the effectiveness of the approach by applying it to a greedy transition-based parser as well as to a globally optimized graph-based parser. The resulting parsers have very simple architectures, and match or surpass the state-of-the-art accuracies on English and Chinese. We present Sparse Non-negative Matrix (SNM) estimation, a novel probability estimation technique for language modeling that can efficiently incorporate arbitrary features. We evaluate SNM language models on two corpora: the One Billion Word Benchmark and a subset of the LDC English Gigaword corpus. Results show that SNM language models trained with n-gram features are a close match for the well-established Kneser-Ney models. The addition of skip-gram features yields a model that is in the same league as the state-of-the-art recurrent neural network language models, as well as complementary: combining the two modeling techniques yields the best known result on the One Billion Word Benchmark. On the Gigaword corpus further improvements are observed using features that cross sentence boundaries. The computational advantages of SNM estimation over both maximum entropy and neural network estimation are probably its main strength, promising an approach that has large flexibility in combining arbitrary features and yet scales gracefully to large amounts of data. The growing work in multi-lingual parsing faces the challenge of fair comparative evaluation and performance analysis across languages and their treebanks. The difficulty lies in teasing apart the properties of treebanks, such as their size or average sentence length, from those of the annotation scheme, and from the linguistic properties of languages. We propose a method to evaluate the effects of word order of a language on dependency parsing performance, while controlling for confounding treebank properties. The method uses artificially-generated treebanks that are minimal permutations of actual treebanks with respect to two word order properties: word order variation and dependency lengths. Based on these artificial data on twelve languages, we show that longer dependencies and higher word order variability degrade parsing performance. Our method also extends to minimal pairs of individual sentences, leading to a finer-grained understanding of parsing errors. Named entity recognition is a challenging task that has traditionally required large amounts of knowledge in the form of feature engineering and lexicons to achieve high performance. In this paper, we present a novel neural network architecture that automatically detects word- and character-level features using a hybrid bidirectional LSTM and CNN architecture, eliminating the need for most feature engineering. We also propose a novel method of encoding partial lexicon matches in neural networks and compare it to existing approaches. Extensive evaluation shows that, given only tokenized text and publicly available word embeddings, our system is competitive on the CoNLL-2003 dataset and surpasses the previously reported state of the art performance on the OntoNotes 5.0 dataset by 2.13 F1 points. By using two lexicons constructed from publicly-available sources, we establish new state of the art performance with an F1 score of 91.62 on CoNLL-2003 and 86.28 on OntoNotes, surpassing systems that employ heavy feature engineering, proprietary lexicons, and rich entity linking information. Neural machine translation (NMT) aims at solving machine translation (MT) problems using neural networks and has exhibited promising results in recent years. However, most of the existing NMT models are shallow and there is still a performance gap between a single NMT model and the best conventional MT system. In this work, we introduce a new type of linear connections, named fast-forward connections, based on deep Long Short-Term Memory (LSTM) networks, and an interleaved bi-directional architecture for stacking the LSTM layers. Fast-forward connections play an essential role in propagating the gradients and building a deep topology of depth 16. On the WMT’14 English-to-French task, we achieve BLEU=37.7 with a single attention model, which outperforms the corresponding single shallow model by 6.2 BLEU points. This is the first time that a single NMT model achieves state-of-the-art performance and outperforms the best conventional model by 0.7 BLEU points. We can still achieve BLEU=36.3 even without using an attention mechanism. After special handling of unknown words and model ensembling, we obtain the best score reported to date on this task with BLEU=40.4. Our models are also validated on the more difficult WMT’14 English-to-German task. Semantic word embeddings represent the meaning of a word via a vector, and are created by diverse methods. Many use nonlinear operations on co-occurrence statistics, and have hand-tuned hyperparameters and reweighting methods. This paper proposes a new generative model, a dynamic version of the log-linear topic model of Mnih and Hinton (2007). The methodological novelty is to use the prior to compute closed form expressions for word statistics. This provides a theoretical justification for nonlinear models like PMI, word2vec, and GloVe, as well as some hyperparameter choices. It also helps explain why low-dimensional semantic embeddings contain linear algebraic structure that allows solution of word analogies, as shown by Mikolov et al. (2013a) and many subsequent papers. Experimental support is provided for the generative model assumptions, the most important of which is that latent word vectors are fairly uniformly dispersed in space. Most recent sentence simplification systems use basic machine translation models to learn lexical and syntactic paraphrases from a manually simplified parallel corpus. These methods are limited by the quality and quantity of manually simplified corpora, which are expensive to build. In this paper, we conduct an in-depth adaptation of statistical machine translation to perform text simplification, taking advantage of large-scale paraphrases learned from bilingual texts and a small amount of manual simplifications with multiple references. Our work is the first to design automatic metrics that are effective for tuning and evaluating simplification systems, which will facilitate iterative development for this task. Canonical correlation analysis (CCA) is a method for reducing the dimension of data represented using two views. It has been previously used to derive word embeddings, where one view indicates a word, and the other view indicates its context. We describe a way to incorporate prior knowledge into CCA, give a theoretical justification for it, and test it by deriving word embeddings and evaluating them on a myriad of datasets. We train one multilingual model for dependency parsing and use it to parse sentences in several languages. The parsing model uses (i) multilingual word clusters and embeddings; (ii) token-level language information; and (iii) language-specific features (fine-grained POS tags). This input representation enables the parser not only to parse effectively in multiple languages, but also to generalize across languages based on linguistic universals and typological similarities, making it more effective to learn from limited annotations. Our parser’s performance compares favorably to strong baselines in a range of data scenarios, including when the target language has a large treebank, a small treebank, or no treebank for training. We suggest a compositional vector representation of parse trees that relies on a recursive combination of recurrent-neural network encoders. To demonstrate its effectiveness, we use the representation as the backbone of a greedy, bottom-up dependency parser, achieving very strong accuracies for English and Chinese, without relying on external word embeddings. The parser’s implementation is available for download at the first author’s webpage. Mental illness is one of the most pressing public health issues of our time. While counseling and psychotherapy can be effective treatments, our knowledge about how to conduct successful counseling conversations has been limited due to lack of large-scale data with labeled outcomes of the conversations. In this paper, we present a large-scale, quantitative study on the discourse of text-message-based counseling conversations. We develop a set of novel computational discourse analysis methods to measure how various linguistic aspects of conversations are correlated with conversation outcomes. Applying techniques such as sequence-based conversation models, language model comparisons, message clustering, and psycholinguistics-inspired word frequency analyses, we discover actionable conversation strategies that are associated with better conversation outcomes. Efficient methods for storing and querying are critical for scaling high-order m-gram language models to large corpora. We propose a language model based on compressed suffix trees, a representation that is highly compact and can be easily held in memory, while supporting queries needed in computing language model probabilities on-the-fly. We present several optimisations which improve query runtimes up to 2500×, despite only incurring a modest increase in construction time and memory usage. For large corpora and high Markov orders, our method is highly competitive with the state-of-the-art KenLM package. It imposes much lower memory requirements, often by orders of magnitude, and has runtimes that are either similar (for training) or comparable (for querying). We release Galactic Dependencies 1.0—a large set of synthetic languages not found on Earth, but annotated in Universal Dependencies format. This new resource aims to provide training and development data for NLP methods that aim to adapt to unfamiliar languages. Each synthetic treebank is produced from a real treebank by stochastically permuting the dependents of nouns and/or verbs to match the word order of other real languages. We discuss the usefulness, realism, parsability, perplexity, and diversity of the synthetic languages. As a simple demonstration of the use of Galactic Dependencies, we consider single-source transfer, which attempts to parse a real target language using a parser trained on a “nearby” source language. We find that including synthetic source languages somewhat increases the diversity of the source pool, which significantly improves results for most target languages. We propose two models for verbalizing numbers, a key component in speech recognition and synthesis systems. The first model uses an end-to-end recurrent neural network. The second model, drawing inspiration from the linguistics literature, uses finite-state transducers constructed with a minimal amount of training data. While both models achieve near-perfect performance, the latter model can be trained using several orders of magnitude less data than the former, making it particularly useful for low-resource languages. The success of long short-term memory (LSTM) neural networks in language processing is typically attributed to their ability to capture long-distance statistical regularities. Linguistic regularities are often sensitive to syntactic structure; can such dependencies be captured by LSTMs, which do not have explicit structural representations? We begin addressing this question using number agreement in English subject-verb dependencies. We probe the architecture’s grammatical competence both using training objectives with an explicit grammatical target (number prediction, grammaticality judgments) and using language models. In the strongly supervised settings, the LSTM achieved very high overall accuracy (less than 1% errors), but errors increased when sequential and structural information conflicted. The frequency of such errors rose sharply in the language-modeling setting. We conclude that LSTMs can capture a non-trivial amount of grammatical structure given targeted supervision, but stronger architectures may be required to further reduce errors; furthermore, the language modeling signal is insufficient for capturing syntax-sensitive dependencies, and should be supplemented with more direct supervision if such dependencies need to be captured. Automatic satire detection is a subtle text classification task, for machines and at times, even for humans. In this paper we argue that satire detection should be approached using common-sense inferences, rather than traditional text classification methods. We present a highly structured latent variable model capturing the required inferences. The model abstracts over the specific entities appearing in the articles, grouping them into generalized categories, thus allowing the model to adapt to previously unseen situations. Taxonomies play an important role in many applications by organizing domain knowledge into a hierarchy of ‘is-a’ relations between terms. Previous work on automatic construction of taxonomies from text documents either ignored temporal information or used fixed time periods to discretize the time series of documents. In this paper, we propose a time-aware method to automatically construct and effectively maintain a taxonomy from a given series of documents preclustered for a domain of interest. The method extracts temporal information from the documents and uses a timestamp contribution function to score the temporal relevance of the evidence from source texts when identifying the taxonomic relations for constructing the taxonomy. Experimental results show that our proposed method outperforms the state-of-the-art methods by increasing F-measure up to 7%–20%. Furthermore, the proposed method can incrementally update the taxonomy by adding fresh relations from new data and removing outdated relations using an information decay function. It thus avoids rebuilding the whole taxonomy from scratch for every update and keeps the taxonomy effectively up-to-date in order to track the latest information trends in the rapidly evolving domain.
<urn:uuid:97d896f8-0440-45f3-a5d1-89327820c735>
CC-MAIN-2022-33
https://aclanthology.org/events/tacl-2016/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00475.warc.gz
en
0.916897
6,303
2.296875
2
The effectiveness of waste recycling initiatives is often dependent on the presence of the appropriate front lift bins. Convenience, utility, and appearance all influence how people respond to a program and how convenient it is for them to use recycling containers correctly. Consider these five points when purchasing with Waste Wise Products when selecting front lift bins for a residential curbside collection, implementing an office program, or placing recycling containers in schools. Focus On Capacity The proper front lift bins must be appropriately sized; if they are too big, they will take up too much room and will not reach capacity until pickup. lift bins that are too small will not fit because the waste will spill onto the ground. Keep these considerations in mind when determining the appropriate capability. First, decide on a pickup plan. Second, decide whether to provide a large number of small units that can be emptied into one larger piece or lift bins that can stand alone. Remember that these units can be heavy when full; use smaller parts with wheels, particularly in high traffic areas. Ease of Use and Collection Front lift bins are much more than mere receptacles that take up space in the house. To have an efficient program in place, each unit must be matched to its purpose and be simple to use. The total weight of recyclables must be kept manageable for a single person to manage in residential settings. Office and school implementations should also consider productivity with wheeled utility units rather than requiring considerable manpower to transport a set of front lift bins for collection. Materials of Construction High-quality front lift bins, like any other purchase, can last a long time and are well worth the investment. Different companies provide recycled plastic recycling containers for the ultimate in green solutions. Mould injected plastic units are often very durable, providing years of service in the home, workplace, or school. Sorting Multi-Stream Programs People often express their dissatisfaction with the perceived difficulty of multi-stream systems. Front lift bins with multiple slots and compartments for each different stream, as well as intuitive visual cues, are one of the best ways to solve this issue. When people can easily sort their waste, they can engage more and feel more involved. Good-Looking front lift bins when on the Job Having attractive front lift bins, particularly for office and school programs, is critical for high participation and pride in a program. Several companies provide customized fibreglass units that can be customized with business logos and slogans, as well as school colours and mascots. A strong sense of ownership is essential for developing highly successful programs. When developing a waste management policy for residential, industrial, or school use, these five points cover a lot of lands. Finally, the proper front lift bins are critical to the success of every recycling program. There are many more things to consider when looking for these lift bins. However, the above discussed are the critical ones to check.
<urn:uuid:48df3ba8-6aff-49a9-9663-4895dfcf32e0>
CC-MAIN-2022-33
https://www.thedailyload.com/top-5-things-to-think-about-when-purchasing-front-lift-bins/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00669.warc.gz
en
0.942447
587
2
2
DENVER—Colorado is preparing to tap a law that allows a water trust to lease water from willing water users to preserve wildlife and plants. The Natural Resources Conservation Service is warning stream flows are likely to be low across the state this summer. The law was passed in 2003 to protect waterfowl, wildlife, fish, bugs and plants. The Colorado snowpack is down to 35 percent of the statewide average, as of Monday. The North Platte and South Platte basins in northern Colorado were in the best shape, at 48 percent of average.
<urn:uuid:623bfd7d-b83c-4238-a2c6-31ead4e0db2b>
CC-MAIN-2017-04
http://www.denverpost.com/2012/04/23/colorado-gearing-up-for-possible-summer-drought/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00447-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952386
114
2.359375
2
Sansevieria trifasciata, Snake Plant (var. laurentii) Plant is a popular houseplant with leaves having dark green centers that are surrounded by light yellow to gold edges. What makes it special: NASA recommended air purifier plant. Best plant for AC rooms, office desk, etc. Zero maintenance plant. Best indoor plant for low light condition Popular houseplant with wavy cross stripes. Sr Item name 1 Sansevieria trifasciata, Snake Plant (var. laurentii) – Plant 2 5 inch (13 cm) Grower Round Plastic Pot (Black) family Asparagaceae Sansevieria trifasciata belongs to the family Asparagaceae. Leaves are erect, fleshy, sharply-pointed, sword-shaped, deep green with light gray-green horizontal stripes. Leaves arise in a rosette from a thick rhizome. Small fragrant greenish-white flowers bloom on mature plants. Flowers and fruit rarely appear on indoor plants. A plant has horizontal bands of light greyish-green and bordered with a creamy yellow margin of variable width which is parallel with the veins of the leaf.
<urn:uuid:11a39ac3-7597-4cdc-a1df-9cd01d9bef00>
CC-MAIN-2022-33
https://www.onlineplant.in/product/sansevieria-trifasciata-snake-plant-var-laurentii-plant/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00271.warc.gz
en
0.829541
256
1.773438
2
Department of English May 3, 2011 Hynson Lounge, Hodson Hall, 4:30 p.m. The Sophie Kerr Committee, the Rose O'Neill Literary House, and the Washington College Department of History Present 1861: The Civil War Awakening Washington College's Adam Goodheart will give a reading from his new book, 1861: The Civil War Awakening, which was published two weeks ago by Alfred A. Knopf and is already a New York Times Best Seller garnering wide critical acclaim. The event, which is free and open to the public, will be followed by a book-signing. Sponsored by the Sophie Kerr Committee, the Rose O'Neill Literary House, and the Washington College Department of History, the reading will take place in Hynson Lounge, Hodson Hall, located on the Washington College campus, 300 Washington Ave. In a publishing year in which the 150th anniversary of the Civil War has sparked a flood of new books about the conflict, none has received more positive press and critical praise than 1861 . In a front-page review in the April 24 issue of the New York Times Book Review , Pulitzer Prize-winning biographer Debby Applegate praised Goodheart's account of the secession crisis as "exhilarating" and "inspiring." Kirkus Reviews called it "beautifully written and thoroughly original�quite unlike any other Civil War book out there," and Pulitzer-winning historian James McPherson wrote that "Adam Goodheart is a Monet with a pen instead of a paintbrush." The new work of history, which Knopf describes as "a sweeping portrait of America on the brink of its defining national drama," was also excerpted in the New York Times Magazine on April 3. Goodheart has recently appeared on panels with filmmaker Ken Burns and noted historians James McPherson of Princeton and David Blight of Yale, and will be giving talks and readings at universities and cultural institutions across the country in the months ahead. Adam Goodheart is the Hodson Trust-Griswold Director of Washington College's C.V. Starr Center for the Study of the American Experience. For more information about his reading, please visit http://washingtoncollegenews.blogspot.com/2011/04/goodheart-to-read-from-best-selling.html
<urn:uuid:50acaa3a-bea8-41ab-ac24-57ff2232c8f2>
CC-MAIN-2017-04
http://www.washcoll.edu/departments/english/sophie-kerr-legacy/2011/adamgoodheart/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00275-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947378
481
1.515625
2
is british education the best Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Students come to Britannica for our nurturing and personalised learning environment. This ensures that every student gets individual attention and can be challenged and supported be it academically, creatively or physically via sports. Britannica International School delivers the highest level of British education for students aged 5-18 and operates full primary and secondary phases plus a Sixth Form. The enhanced educational programme is based on the English National Curriculum and caters for students from over 50 different nationalities. Ecuador’s only truly British international school, where the English National Curriculum is taught with strong links to local language and culture. We are a community school in the sense that we ensure all members of our community can learn effectively together in an environment that supports their individual needs. We welcome the involvement of parents so that we can ensure the right support and challenge is in place. From next year all schools teaching Chinese children aged 7 to 15 will have to use a lottery to determine which applicants win a place. It means that schools will no longer be able to select the pupils they believe will best fit in with their style and pace of teaching. Independent schools have been advised to “stop, wait and see” before they proceed with plans to open in China or expand their presence there until new draconian rules on admissions bed in. House structure with strong pastoral support Outstanding results at GCSE and A-level
<urn:uuid:5df7e742-e66d-4b75-951e-539087429c76>
CC-MAIN-2022-33
https://suzanneguillette.com/2019/09/15/is-british-education-the-best/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00478.warc.gz
en
0.926485
466
2.578125
3
Issue Date: February 12, 2007 Journal Cover Art Stephen Ritter asked recently, "Does [scientific art] on journal covers serve a purpose in the Internet age?" (C&EN, Nov. 6, 2006, page 24). My reply is, "Yes, certainly!" Cover art helps emphasize the connection of chemistry to the world. Chemistry draws from the world around us, and its value lies in what it returns in our understanding of how the world works, contributing to the survival and advancement of our species. The art also prepares the reader for what he or she is about to study, setting a framework for the concepts to be presented. But that's not entirely why I think the cover art is important. We may be intensely studious with our science, yet it is not an end in itself. If we take a wider world view, we make our work more relevant, and art invites us to communicate on a different level. To be aware of wonders causes us to value them, and that helps to preserve them while also enriching our lives. When I see the connection between molecules and the natural world, I am delighted. At its best, art does more than illustrate, it entreats and delights. It adds feeling, begging that some emotional investment be derived from the text and glyphs of our science printed within. No matter how specialized a journal is there will be content that individual readers find somewhat foreign to their experience. It is the art that tells us, "Look closer, there is a kind of beauty there." Cover art would work best if related directly to the content of the current issue. However, it would still be effective if it made a stand-alone statement from the chemist's perspective. Specific art would have to be produced before the issue deadline, unless specific art could be taken from a pool. If ACS opened a channel for art contribution from the chemist community, I believe a nice collection would grow, and more of us could have the opportunity to "make the cover." - Chemical & Engineering News - ISSN 0009-2347 - Copyright © American Chemical Society
<urn:uuid:f9c1441a-f0e8-40e5-a98e-d2ca6eaf1c27>
CC-MAIN-2017-04
http://cen.acs.org/articles/85/i7/Journal-Cover-Art.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00164-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940641
434
2.109375
2
Bluebulb Projects' The Measure of Things presents: 82,000,000 is about two times the number of people in The State of California. In other words, it's 2.139 times the count of people in The State of California, and the count of people in The State of California is 0.4675 times that amount. (2014 figures) (Department of Finance estimate) California, the most populous state in the United States, is home to 38,340,000 people (larger than the population of the entire country of Canada, with 35,540,419 people). Over ten percent of the population — 3,904,657 people — reside in the city of Los Angeles.
<urn:uuid:025a4697-c8be-4fe9-ae30-25d99bcb3016>
CC-MAIN-2017-04
http://bluebulbprojects.com/CountOfThings/singleresult.php?coeff=x&c=82000000&i=562
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00283-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919628
147
2.484375
2
Together, we prevailed in a campaign in which the Republicans said I was too young and too inexperienced to be Commander-in-Chief. Sound familiar? It didn’t work in 1992, because we were on the right side of history. And it won’t work in 2008, because Barack Obama is on the right side of history. His life is a 21st Century incarnation of the American Dream. His achievements are proof of our continuing progress toward the “more perfect union” of our founders’ dreams. The values of freedom and equal opportunity which have given him his historic chance will drive him as president to give all Americans, regardless of race, religion, gender, sexual orientation or disability, their chance to build a decent life, and to show our humanity, as well as our strength, to the world.
<urn:uuid:4e812dfc-5f91-4c90-8add-c110d9e66cd7>
CC-MAIN-2017-04
http://grand-divisions.blogspot.com/2008/08/regardlessof-sexual-orientation.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00224-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971139
169
1.742188
2
How much income inequality is explained by varying parental resources? Let me suggest a rough calculation that gives an approximate answer. The recent paper by Chetty et al. finds that the regression of kids’ income rank on parents’ income rank has a coefficient of 0.3. (See Figure 1.) That implies an R2 for the regression of 0.09. In other words, 91 percent of the variance is unexplained by parents’ income. I would be willing venture a guess, based on adoption studies, that a lot of that 9 percent is genetics rather than environment. That is, talented parents have talented kids partly because of good genes. Conservatively, let’s say half is genetics. That leaves only 4.5 percent of the variance attributed directly to parents’ income. Now, if you let me play a bit fast and loose with the difference between income and income rank, these numbers suggest the following: If we had some perfect policy invention (such as universal super-duper pre-school) that completely neutralized the effect of parent’s income, we would reduce the variance of kids' income to .955 of what it now is. This implies that the standard deviation of income would fall to 0.977 of what it now is. The bottom line: Even a highly successful policy intervention that neutralized the effects of differing parental incomes would reduce the gap between rich and poor by only about 2 percent. This conclusion does not mean such a policy intervention is not worth doing. Evaluating the policy would require a cost-benefit analysis. But the calculations above do suggest that all the money the affluent spend on private schools, etc., explains only a tiny fraction of the income inequality that we observe. Addendum: A few readers seem confused about how to infer an R2 from a coefficient. The key is that the left and right hand side variables in the regression have the same variance. In this case, the R2 is the square of the coefficient. This conclusion is a standard result for AR(1) models, which is what we have here, as applied to generational data. (Also, a few readers are confused when they look at the paper's Figure 1. The points plotted are not the raw data but binned averages, so you cannot see the R2 in the plot.)
<urn:uuid:a873f7e8-04bc-412b-96e0-d4e494d42682>
CC-MAIN-2017-04
http://gregmankiw.blogspot.com/2014/01/how-much-inequality-does-parental.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00542-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944385
478
2.5
2
How to Select the Right Ultrasound Tech Training Program near Bull Shoals Arkansas Since you have decided to obtain an ultrasound technician degree near Bull Shoals AR, the next step is to begin the process of selecting a school. To begin with, you need to find the right program that will furnish the appropriate instruction to become a qualified professional. And given that some states do require that sonographers be either licensed or certified, depending on your residence you may also need to be prepared to pass a certification or licensing examination. So it’s extremely important that you investigate each college so that you can assess and compare your alternatives. But just where does one start? A number of potential students will start by looking for schools that are within commuting distance of their residences and then by comparing tuition. Certainly cost and location need to be considered when making a decision, but there are additional important factors also. Such as, if the ultrasound technician schools are accredited or if they provide internship programs. These and additional qualifications will be addressed more in depth later in this post. But to start with, let’s go over what an ultrasound tech does and the degrees and online education options that are available. Sonogram Tech Occupation Description There are several professional titles for ultrasound techs (technicians). They are also referred to as ultrasound technologists, sonogram techs, and diagnostic medical sonographers (or just sonographers). Regardless of name, they all have the same basic job function, which is to implement diagnostic ultrasound techniques on patients. Even though many practice as generalists there are specializations within the field, for example in cardiology and pediatrics. The majority work in Bull Shoals AR hospitals, clinics, private practices or outpatient diagnostic imaging centers. Common daily job duties of a sonogram technician can consist of: - Preserving records of patient case histories and specifics of each procedure - Counseling patients by explaining the procedures and answering questions - Preparing the ultrasound machines for testing and then cleaning and recalibrating them - Moving patients to treatment rooms and ensuring their comfort - Utilizing equipment while limiting patient exposure to sound waves - Reviewing the results and determining need for supplemental testing Sonographers must regularly assess the safety and performance of their machines. They also must adhere to a high ethical standard and code of conduct as health practitioners. In order to maintain that level of professionalism and remain up to date with medical knowledge, they are required to enroll in continuing education programs on a regular basis. Sonogram Tech Degrees Available Sonogram technician enrollees have the choice to acquire either an Associate or a Bachelor’s Degree. An Associate Degree will usually require around 18 months to 2 years to accomplish based upon the course load and program. A Bachelor’s Degree will require more time at as long as 4 years to finalize. Another option for those who have previously obtained a college degree is a post graduate certificate program. If you have received a Bachelor’s Degree in any major or an Associate Degree in a relevant health sector, you can instead choose a certificate program that will require only 12 to 18 months to complete. One thing to keep in mind is that almost all sonographer colleges do have a practical training element as a portion of their course of study. It can often be fulfilled by participating in an internship program which many schools organize through Bull Shoals AR hospitals and clinics. After you have graduated from any of the degree or certificate programs, you will then have to comply with the certification or licensing requirements in Arkansas or whatever state you decide to practice in. Sonogram Tech Online Colleges As earlier discussed, virtually all ultrasound tech schools have a clinical component to their programs. So although you can obtain a degree or certificate online, a significant part of the training will be either conducted in an on campus lab or at an approved off-campus medical care provider. Practical training can often be satisfied through an internship at a local Bull Shoals AR hospital, outpatient clinic or private practice. But the remainder of the training and classes may be attended online in your Bull Shoals home. This is particularly beneficial for those individuals that keep working while getting their degrees. In addition online colleges are often less costly than on campus options. Costs for study materials and commuting can be reduced also. But similarly as with any sonographer program you are considering, make sure that the online program you select is accredited. Among the most highly regarded accrediting agencies is the Commission on Accreditation of Allied Health Education Programs (CAAHEP). Accreditation is especially important for licensing, certification and job placement (more on accreditation later). So if you are disciplined enough to attend classes outside of the classroom in the comfort of your own home, then an online school could be the right option for you. Subjects to Ask Sonogram Tech Schools After you have decided on the type of degree or certificate that you would like to obtain, you can initiate the process of evaluating and comparing ultrasound tech schools. You will first probably want to choose whether you will attend classes online or commute to a college campus in the Bull Shoals AR area. Naturally location will be important if you select the latter, and the price of tuition no doubt will be an initial qualifier as well. But there are other variables that you should also take into account, for example if the colleges are accredited and if they offer internship programs. So in order to complete your due diligence so that you can arrive at your final selection, following are several questions that you need ask each sonographer program before deciding. Are the Ultrasound Tech Programs Accredited? A large number of ultrasound technician schools have acquired some form of accreditation, whether regional or national. Nevertheless, it’s still important to verify that the program and school are accredited. One of the most highly respected accrediting organizations in the field of sonography is the Joint Review Committee on Education in Diagnostic Medical Sonography (JRC-DMS). Programs obtaining accreditation from the JRC-DMS have gone through a rigorous review of their instructors and educational materials. If the program is online it can also obtain accreditation from the Distance Education and Training Council, which targets distance or online education. All accrediting organizations should be recognized by the U.S. Department of Education or the Council on Higher Education Accreditation. In addition to ensuring a superior education, accreditation will also help in getting financial aid and student loans, which are frequently not accessible for non-accredited programs. Accreditation might also be a pre-requisite for certification and licensing as required. And numerous Bull Shoals AR health facilities will only hire a graduate of an accredited college for entry-level openings. Are Internships Sponsored? Inquire if the sonogram technician colleges you are interested in have partnerships with Bull Shoals AR hospitals or clinics for internship programs. Not only are internships an excellent manner to get practical training in a clinical setting, they are also a means to fulfill the clinical training requirement for most programs. As an ancillary benefit, they may help students and graduates establish professional connections in the Bull Shoals health care community and assist with job placement. Is Job Placement Assistance offered? You will probably want to hit the ground running after graduating, but getting that initial job in a new profession can be challenging without support. Find out if the sonographer programs you are assessing have job assistance programs and what their success rates are. Rapid and high placement rates are a good indication that the schools have substantial networks and good relationships with Arkansas healthcare employers. It also confirms that their students are highly regarded and sought after. Where is the School Located? For a lot of students, the college they select will have to be within commuting distance of their Bull Shoals AR home. Individuals who have chosen to attend online classes obviously will not have to worry themselves with the location of the campus. However, the availability of local internships will be of importance. Something to bear in mind is that if you decide to enroll in a program that is out of state or perhaps out of your local area, you may be required to pay a higher tuition. State colleges generally charge higher tuitions for out of state residents. And community colleges normally charge a higher tuition for those students that live outside of their districts. How Big are the Classes ? Unless you are the sort of student that prefers to sit way in the back of class or get lost in the crowd, you will undoubtedly prefer a small class size. Small classes enable more individual participation and one-on-one instruction. Ask the colleges you are looking at what the typical student to teacher ratio is for their classrooms. If practical you may prefer to monitor one or more classes before making your ultimate decision. This will also give you a chance to talk with a few of the instructors and students to get their perspectives regarding the sonogram tech program also. Does the School Accommodate your Schedule? And finally you must confirm that the ultrasound tech school you ultimately choose can offer the class schedule you need. This is especially crucial if you opt to continue working while attending school. If you must schedule evening or weekend classes in the Bull Shoals AR area, confirm that they are available. If you can only attend part-time, verify if that is an alternative and how many credit hours or courses you would need to enroll in. Also, find out what the protocol is for making up any classes that you might miss as a result of illness, work or family emergencies. Ultrasound Tech Schools Near Me Bull Shoals Arkansas Picking the right ultrasound tech degree or certificate program is a vital first step to starting a fulfilling new career furnishing diagnostic services to patients. Ultrasound tech programs require that you have a high school diploma or equivalent. In addition to meeting academic standards, you should be in at least reasonably good physical health, able to stand for lengthy time frames with the ability to regularly lift weights of 50 pounds or more, as is it typically necessary to adjust patients and move heavy machinery. Other preferred skills include technical proficiency, the ability to keep levelheaded when faced with an angry or anxious patient and the ability to converse clearly and compassionately. You originally came to this website due to an interest in Ultrasound Tech Schools Near Me and wanting more information on Sonography Classes Near Me. However, as we have covered in this post, there are multiple questions that you should ask each college you are reviewing. This is true whether you select an online degree or commute to the school campus to attend classes. And by asking the right questions so that you can evaluate each college, you can narrow down your alternatives until you are left with the ideal program for your education. And with the right training, dedication and motivation to succeed, you can reach your objective to work as an ultrasound technologist in Bull Shoals AR. More Ultrasound Locations in Arkansas Bull Shoals, Arkansas Bull Shoals is a city in Marion County, Arkansas, United States, founded in 1954. The population was 1,950 at the 2010 census. Primarily a retirement and vacation center, Bull Shoals is bordered in three directions by the clear, deep, man-made Bull Shoals Lake. Bull Shoals Dam and the town of Bull Shoals developed together. The developers bought several tracts of the former Newton Flat settlement when they learned that the government planned to build a flood-control and power-generating concrete dam at the site. Construction of the dam took four years, from 1947 to 1951, resulting in one of the largest dams built in the nation at that time. As of the census of 2010, there were 1,950 people, 1,014 households, and 650 families residing in the city. The population density was 403.0 people per square mile (155.7/km²). There were 1,226 housing units at an average density of 247.0 per square mile (95.4/km²). The racial makeup of the city was 98.05% White, 0.30% Black or African American, 0.45% Native American, 0.25% Asian, 0.10% Pacific Islander, 0.10% from other races, and 0.75% from two or more races. 1.05% of the population were Hispanic or Latino of any race. Business Results 1 - 10 of 1
<urn:uuid:e5a9c528-7206-45dc-afe6-b8679c1c4606>
CC-MAIN-2022-33
https://medsonographyedu.info/arkansas/ultrasound-technician-schools-bull-shoals-ar-72619
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00069.warc.gz
en
0.954013
2,492
1.75
2
Peter F. Drucker, in full Peter Ferdinand Drucker (born November 19, 1909, Vienna, Austria—died November 11, 2005, Claremont, California), Austrian-born American management consultant, educator, and author, whose writings contributed to the philosophical and practical foundations of the modern business corporation. He was also a leader in the development of management education, and he invented the concept known as management by objectives. Drucker, who received a doctoral degree in international and public law at the University of Frankfurt (1931), worked as a journalist in Germany but fled to England when Adolf Hitler rose to power in 1933. He remained in England until 1937, when he moved to the United States to work as an adviser to British banks and as a foreign correspondent for several British newspapers; he became a U.S. citizen in 1943. Drucker later taught at New York University (1950–71) and at Claremont Graduate University (1971–2005). Although Drucker was known to shun the term consultant, it was through consulting that he wielded the greatest influence, starting with his 1943 invitation to analyze the organizational structure of the General Motors Corporation. The resulting book, Concept of the Corporation, offered the first complete assessment of a large corporation as a social institution. Drucker later served as a consultant to a number of corporations, organizations, and governments. Some observers divide Drucker’s numerous books and articles into four categories. His early works—such as The End of Economic Man (1939) and The New Society (1950)—discuss the nature of industrial society. A second line of books—including Concept of the Corporation (1946) and The Practice of Management (1954)—explains general ideas about modern business management. A third body of work—including America’s Next Twenty Years (1957) and Technology, Management and Society (1970)—offers speculation on the future impact of such developments as technological change. Finally, there are writings that address questions of practical corporate management, notably Managing in Turbulent Times (1980) and the essay collection The Changing World of the Executive (1982). He vitalized the concept of the entrepreneur with Innovation and Entrepreneurship (1985). Drucker also wrote two novels. In 1990 the Peter F. Drucker Foundation for Nonprofit Management (renamed the Leader to Leader Institute in 2003) was established in his honour.
<urn:uuid:e9830b49-7dea-4ecc-bb9c-db37f4ffa96d>
CC-MAIN-2017-04
https://www.britannica.com/biography/Peter-F-Drucker
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00220-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961629
486
2.34375
2
Last week's unexpected decision by the ECB to set the rate on bank excess reserves to -0.2% is sending liquidity holders scrambling. The idea behind negative rates is to penalize cash position holders. The amount of reserves in the Eurosystem is constant at any one time, so the penalty-carrying reserves just bounce around from bank to bank like a "hot potato". The ones stuck with liquidity overnight will pay the 20bp penalty. The ECB hopes this will force the banking sector into more lending, with some lenders preferring extra credit risk over the pain of holding reserves. Of course a great deal of this is wishful thinking, as undercapitalization and deleveraging (combined with tepid demand) will continue to plague credit creation. Quite soon the Eurozone banks will be forced to raise massive amounts of equity capital in order to improve leverage ratios (see story) and additional lending would require even more capital raising. The timing is not great. So what are banks doing with their cash? The easiest option is to buy sovereign debt, particularly short term notes. Government paper has minimal to no impact on regulatory capital needs and does not cost banks the 20bp charged by the ECB. That's why banks (and others) are willing to (in effect) pay the German government to hold some of their excess liquidity. Below is the chart of German 6-month bill yield. Banks are also trying to lend to each other as liquidity sloshes through the system. Taking bank credit risk does raise capital requirements, but if limited to the higher rated banks, the marginal capital needs for those loans are relatively small. Of course the better rated banks are taking advantage of this situation by funding themselves in the interbank market at zero to negative rates. The chart below is the EONIA (overnight) interbank rate (equivalent to the Fed Funds rate in the US). Moreover, the forward markets are now pricing EONIA rates to stay firmly planted in the negative territory through at least the mid-2016. The chart below shows the forward curve before and after the ECB action. As the ECB expands its balance sheet via the TLTRO program, excess reserves in the banking system will grow. This liquidity will become increasingly expensive due to sheer size of cash balances that are costing banks 20bp. That's why the market expects even lower EONIA rates going forward, as banks pay more to avoid getting stuck with large overnight reserve balances. Just as Japan is getting caught in what is becoming a perpetual quantitative easing program (see discussion), the Eurozone is looking at negative rates for some time to come. The unprecedented monetary experiments by global central banks will be with us far longer than originally expected. Sign up for our daily newsletter called the Daily Shot. It's a quick graphical summary of topics covered here and on Twitter (see overview). Emails are distributed via Freelists.org and are NEVER sold or otherwise shared with anyone. From our sponsor:
<urn:uuid:b1fce12d-eb3a-459d-85bf-f584e5f4c1da>
CC-MAIN-2017-04
http://soberlook.com/2014/09/markets-expect-negative-overnight-rates.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00476-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947373
605
2.171875
2
Jerusalem Online News reported that in the midst of a Knesset discussion on the Jewish right to have pilgrimages to the Temple Mount, Balad MK Jamal Zahalka yelled out: “There is no Temple Mount! It’s virtual. There is only the Al Aqsa Mosque.” It’s very interesting that MK Zahalka denies the Jewish connection to the Temple Mount, when previous generations of Muslims and Islamic religious sources recognized that the Al Aqsa Mosque was built right on top of King Solomon’s Temple and that the Jewish people have a historic connection to the Temple Mount. In fact, the reverence that Islam holds for King Solomon as a prophet is one of the main reasons why the Arab forces sought to build a mosque in Jerusalem, instead of leaving the Temple Mount in ruins like their Byzantine predecessors did. According to the American archaeologist Eric Cline, writing in his book Jerusalem Besieged, “The first qibla that Mohammed proposed for Moslems—-probably in about 621 CE, while he was still in Mecca—-was towards Jerusalem, in part because the Temple of Solomon had been built there. A variety of ancient sources report that when Umar entered Jerusalem, he asked to be taken to the Temple Mount, wanting to see the site where Solomon’s Temple had once stood.” Cline emphasized that Caliph Umar was shocked to witness the “rubbish, dung and the shattered remains of destroyed buildings” left by his Byzantine predecessors. According to Cline, “Umar knelt down and began to clean the area himself, putting handfuls of refuse into his own cloak and then carrying away the accumulated garbage and debris. His followers followed suit, and soon the ancient Temple Mount was cleansed of the debris of five centuries.” Afterwards, a mosque was erected at the site, not only because Muslims believe that it is the spot where Mohammed went on his nocturnal journey into heaven, but also out of Islam’s reverence for King Solomon. Caliph Umar was far from the only Muslim to recognize the historic connection between King Solomon and the Temple Mount. GLORIA: the Global Research in International Affairs reported, “In Sura 17:1 of the Koran, the farthest mosque is called the al Masjid al-Aqsa. The Tafsir al Jalalyn, a well-respected Sunni exegesis of the Koran from the 15th and 16th centuries, notes that the ‘Farthest Mosque’ is in reference to the Bayt al Maqdis in Jerusalem. In Hebrew, the Jewish Temple is often referred to as the Beit Al-Miqdash, nearly identical to the Arabic term.” GLORIA furthermore noted, “In the commentary of Abdullah Ibn Omar al-Baydawi, who authored several prominent theological works in the 13th century, the Masjid is referred to as the Bayt al-Maqdis because during Mohammed’s time no mosque existed in Jerusalem.” The report added, “Koranic historian and commentator, Abu Jafar Mohammed al-Tabari, who chronicled the seventh century Muslim conquest of Jerusalem, wrote that one day when Umar finished praying, he went to the place where the ‘Romans buried the Temple at the time of the sons of Israel.’” Additionally, eleventh century Muslim historian Ahmad al-Maqdisi and fourteenth century Iranian religious scholar Hamdallah al-Mustawfi both stressed that the Al Aqsa Mosque was built on top of King Solomon’s Temple. Sheikh Dr. Muhammed Al-Husseini has also argued that “the traditional commentators from the eighth and ninth centuries onwards have uniformly interpreted the Koran to say explicitly that Eretz Yisrael has been given by G-d to the Jewish people as a perpetual covenant. There is no Islamic counterclaim to the land anywhere in the traditional corpus of commentary.” Aside from the fact that the existence of the Kotel alongside numerous other archaeological finds within the Old City of Jerusalem attest to the existence of a Holy Jewish Temple in the location of the Temple Mount, MK Zahalka has no Islamic nor historical basis for denying the Jewish historical connection to the Temple Mount. If he truly cared about what was best for Arab citizens of Israel, he should be calling on Jews and Muslims to pray side by side in harmony within the holy site, not denying facts that his own Muslim ancestors confirmed to be true.Rachel Avraham About the Author: Rachel Avraham is a news editor and political analyst for Jerusalem Online News, the English language internet edition of Israel's Channel 2 News. Rachel is the author of "Women and Jihad: Debating Palestinian Female Suicide Bombings in the American, Israeli and Arab media." The book may be purchased on Amazon.The author's opinion does not necessarily reflect the opinion of The Jewish Press. If you don't see your comment after publishing it, refresh the page. Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost. If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.
<urn:uuid:39ac5a1c-d1f6-4108-82b5-4c69af27677a>
CC-MAIN-2017-04
http://www.jewishpress.com/blogs/daughters-of-zion/mk-zahalka-the-temple-mount-does-exist/2013/11/05/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00140-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952486
1,118
2.578125
3
Last Updated on May 6, 2015, by eNotes Editorial. Word Count: 175 This long short story is double-plotted; that is, it is actually two stories that enhance and comment on each other. While the story of the events at the Kleynhans place receives the most attention, it is frequently interrupted by abrupt and often darkly comic sections devoted to the ape attacks. Only gradually does it become clear that the two plots are related in that they both illuminate, albeit in very different ways, the cancerous intolerance at the core of South African society. The characters of Charles, Eddie, Vusi, and especially Joy are fully rounded, replete with complex motivations and very human shortcomings. The white suburbanites of the ape sections, on the other hand, are frequently stereotypes, monsters of egotism and self-absorption whose personalities are exposed rather than developed. Through her manipulation of these interlocking plots, Gordimer manages to mimic in her fiction what she sees the South African government doing in fact: treating one segment of society as a community of responsible, dignified individuals, the other segment as a simpleminded, inflammatory, and potentially dangerous rabble. Last Updated on May 6, 2015, by eNotes Editorial. Word Count: 2188 With strikes and riots against apartheid once again making headlines all over the world, Nadine Gordimer’s newest collection of stories, Something Out There, takes on a special urgency and relevance. Unlike sociopolitical extremists, however, Gordimer refuses to be led into the simplistic thinking that lies behind political slogans. In this respect, her ninth collection of stories resembles her previous eight, although if one compares Something Out There with her prize-winning collection, Friday’s Footprint (1960), an intensifying of political concern becomes evident. In Friday’s Footprint, nearly all the characters were white, and the tensions of the stories were those between man and wife, or between individual white characters and white society. Something Out There looks more directly at blacks within white South Africa. Nevertheless, Gordimer never deals in abstract political problems and still less in abstract or ideal solutions; rather, she sees all such issues and all those affected by them as complex. This is not to say that she waffles on the moral issues—apartheid is clearly repugnant to her—but she is an artist first and a propagandist not at all. She refuses to identify supporters of the present system with evil or its opponents with good. In Gordimer’s fiction, the human dimension is more important than the political. The lead story, for example, “A City of the Dead, a City of the Living,” appears for most of its length to be a casual, even aimless description of life in Number 1907, Block C—a government-housing development for blacks. Into the lives of Nanike Moreke and her husband, Sampson, comes Nanike’s cousin Shishonka, a black revolutionary hiding from the authorities because of his participation in the bombing of a police station. Nanike cooperates fully in Shishonka’s precautions against discovery and, then suddenly, on the pretext of going out to buy milk for her baby, reports him to the police. The story is stunning in the casual, meandering way that it leads to this devastating ending, a conclusion that rings true because it is so quintessentially, irrationally human. No motives for Nanike’s actions are offered, though each reader may supply plausible explanations of his own. Such behavior is illogical yet completely understandable. Gordimer risks incurring the reader’s irritation in thus pursuing her truth; she gambles on the ability of her art to transcend racial issues and political propaganda. In sharp contrast to the naturalistic style of the preceding story is “At the Rendezvous of Victory,” written in the manner of a political fable. The story could be subtitled “A Myth for Our Time,” because the characters and situations are twentieth century archetypes. The protagonist is Sinclair “General Giant” Zwedu, a resourceful bush fighter who succeeds in driving the white colonial government from his African homeland. Like so many revolutionary figures, however, he lacks the political sophistication of lesser men, and after the revolution he is outmaneuvered and relegated to a minor role in the new government, reduced in the process from a man of dignity and bravery to a petty dissolute. His story is emblematic on several levels, reminding the reader that the simple hero—direct, honest, outspoken, slightly naïve—has no role in a world run by wily bureaucrats and political expediency. Whether the citizens of a nation are black or white, their leaders turn out to be gray. This story, incidentally, bears comparison with Gordimer’s novel, A Guest of Honour (1970). The human effects of the systematically oppressive governments headed by these gray men are explored in “Crimes of Conscience,” reminiscent of John le Carré’s novels in its atmosphere of moral nullity. Alison Ross is a correspondence-school teacher, an occupation that suggests isolation, but her profession is misleading, for Alison is active in a South African civil rights group, not violently revolutionary but motivated by a respect for human dignity and a passion for justice. At a political trial she meets Derek Felterman, recently returned from five years abroad, where he had been recruited by the secret police. Their relationship grows from friendship to intimacy, though he is spying on her. In spite of himself, he becomes sympathetic to her point of view, and one night after making love to her he confesses his treachery. Gordimer’s description of the moment is intensely moving:Her face drew into a moment of concentration akin to the animal world, where a threatened creature can turn into a ball of spikes or take on a fearsome aspect of blown-up muscle and defensive garishness. The moment left her face instantly as it had taken her. He had turned away before it as a man does with a gun in his back. She shuffled across the bed on her haunches and took his head in her hands, holding him. This passage is especially moving because it is the one moment of emotional heat in a story otherwise detached, cool, and matter-of-fact. Her commitment, his spying, their love life are all presented as parts of the coldly manipulative world in which secret police recruit spies to report on citizens whose only crime is an acute conscience. Though obviously set in South Africa, the story could occur anywhere in the modern world, wherever men and women of principle are assumed to be threats to the existing order. Regrettably, a certain impersonality weakens the impact, for the characters are shown from the outside only, as emblematic rather than individual figures. Shadowy as they are, they make a potent statement, though as more complex characters they might have made a powerful one. “Blinder” looks at oppression from the black point of view, not by directly attacking government policies but by describing quietly and sympathetically the plight of Rose, a black servant whose lover, Ephraim, is killed in a bus accident. Rose is an alcoholic and lucky, therefore, that her mistress is compassionate and enlightened, concerned enough for her welfare to have tolerated Ephraim and encouraged Rose to attend Alcoholics Anonymous. The lady of the house, as Gordimer calls her, is sensitive and understanding during Rose’s mourning, and in fact the whole family could be called exemplary. Rose is loved and respected by them all—in the same sense that black mammies were in the United States. The evils of this paternalism are not visible through most of the story because the main problem seems to be Rose’s alcoholism, and that appears only tangentially related to race or politics. The reader eventually learns, however, that Ephraim was killed because he had to return to his native village to oversee his family’s interests in a dispute over ancestral lands that the white government suddenly claimed. Thus, the story of Rose and Ephraim turns out to be one of a million incidental tragedies of the white man’s presence in Africa. No one is to blame for the fact that Ephraim had to leave his wife and children, his tribe and traditional homeland, in order to find work in the city, just as no one is to blame for Rose’s alcoholism or the situation which led to her illicit but tacitly approved relationship with a married man. Nevertheless, it is appropriately ironic that in the end, Rose decides to leave her white “family” and join Ephraim’s wife in Umzimkulu. Some commentators on Gordimer’s fiction have noted the recurrence of betrayal in her works, and indeed it is a unifying link in all the political stories of Something Out There. Behind this theme, however, lies another which seems closer to the heart of these stories—the evils of “the system.” Gordimer does not use this term, but she dramatizes it, making it so much a part of the moral landscape that no character can escape its influence. Apartheid in her fiction resembles atmosphere in Joseph Conrad’s, an indefinable but palpable presence affecting everyone. Gordimer does not naïvely reject all organization, but she subtly exposes the impersonal and mindless way human relationships are damaged by the inevitable conflicts between an unjust social order and its citizens, whether they are among the oppressed or the oppressors. Readers are thus moved to anger or fear in a story such as “A Correspondence Course.” Here again, Gordimer moves indirectly, in this instance examining the lives of Pat Haberman and her daughter Harriet. They are quiet and conscientious, liberal in their sympathies. Harriet’s innocuous article on “Literacy and the Media” draws the attention of Roland Carter, a political prisoner with whom she subsequently corresponds for more than a year. Then, Carter escapes, and suddenly Harriet’s innocent letters link her in police minds and files with a dangerous escapee. The two women secretly cheer his liberation and hope that he has found safety in a bordering country. The police do not even visit the house. Then one morning, Pat, looking for the newspaper, finds a bundle of clothes carefully hidden in the bushes: “In just this way [Harriet] had put out milk for the fairies (or stray cats?) when she was a little girl.” A few evenings later, Roland Carter appears at their door. Recognizing him from a newspaper photograph, Pat retreats into her bedroom, to grieve “for what she had done, done to her darling girl, done for.” In one swift and quiet stroke, Gordimer evokes the terror that accompanies any resistance of the state and its omniscient secret police. The same nameless fear inhabits the longest and best of these tales, “Something Out There.” Two plots are juxtaposed in this sometimes humorous but ultimately serious study of South African life. In one, a white couple exploits the racial stereotypes and assumptions of the ruling minority to rent a house in the country as cover for two black guerrillas intent on blowing up a power station. In the other, some animal (baboon? escaped chimpanzee?) terrorizes an affluent suburban neighborhood, killing pets, stealing food, scaring the inhabitants and their servants. The monkey is an effective symbol for the unspoken fears that give rise to the laws of apartheid, laws which the revolutionaries are attempting to destroy. The most chilling part of the story occurs after the power station has been damaged and the security police begin their investigation. While city police were unable to deal with the rampaging monkey, the security forces prove alarmingly thorough and effective in tracing the revolutionaries. Once again, much of Gordimer’s effect derives from her ability to depict frightening events with the utmost in stylistic aplomb. The apparent indifference of her tone mirrors a world in which both terrorism and Draconian police have become part of everyday life. Not all the stories in this collection touch on race and politics. “Letter from His Father” is a brilliant satire cast as a letter from Franz Kafka’s father in response to Kafka’s “Letter to His Father.” Here, the ultimate Jewish father both spurns and takes credit for the accomplishments of his son. “Sins of the Third Age” resembles Doris Lessing’s “To Room Nineteen” in depicting a marriage that appears to succeed by intelligence and common sense but in the end falls victim to the irrational. Other stories in the volume suggest that people have little control over their lives, personal or political, and that to expect human beings to be other than what they always have been is foolish. This idea is extended in a poignant way by “Terminal.” An elderly man and his wife have always promised each other that in case of an incurable illness one would help the other to die quietly and painlessly. The wife, having survived an operation for bowel cancer, cannot tolerate the prospect of living with an unsightly bag at her side. She takes an overdose of sleeping pills, secure in the knowledge that her husband will honor their pact. He does not. Irrational love has overcome reasoned choice, just as in “Sins of the Third Age” it spoiled the retirement plans of Peter and Mania. Betrayal thus takes on a new dimension, becoming in this instance a higher form of loyalty. Something Out There demonstrates once again that Gordimer is an intelligent, sympathetic, and alert interpreter of her times. How many of these stories will outlast their contemporary relevance? That will depend less on thematic concerns than on style and form, and here matters are not quite so clear. Gordimer has long since mastered short-story technique; her sense of form, rhythm, and timing is superb. In this collection, however, her style seems to have lost its edge a bit. She writes with grace and clarity, and her accustomed lyricism shines through in moments of emotional stress, but for some readers at least these qualities will not compensate for a certain thinness of texture. Explicit statement would sometimes profit from increased suggestiveness and subtlety, just as her admirably sketched characters would engage readers at deeper levels if they were developed in more detail. Perhaps for this reason, the characters in the title story are the most alive and convincing as individuals. Nevertheless, Something Out There demonstrates the vitality of the short-story form and the continuing growth of a significant voice in modern fiction. Last Updated on May 6, 2015, by eNotes Editorial. Word Count: 63 Sources for Further Study Christian Science Monitor. LXXVI, August 9, 1984, p. 24. Library Journal. CIX, July, 1984, p. 1346. Los Angeles Times. July 31, 1984, V, p. 5. Ms. XIII, July, 1984, p. 33. The New York Review of Books. XXXI, August 16, 1984, p. 3. The New York Times Book Review. LXXXIX, July 29, 1984, p. 7. Newsweek. CIV, July 9, 1984, p. 71. Publishers Weekly. CCXXV, April 20, 1984, p. 82. Time. CXXIV, July 23, 1984, p. 95. The Wall Street Journal. CCIV, July 9, 1984, p. 22.
<urn:uuid:d5187aa7-447f-44e6-bf0b-f25a7c0ce637>
CC-MAIN-2022-33
https://www.enotes.com/topics/something-out-there/in-depth
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00266.warc.gz
en
0.965175
3,228
1.992188
2
At Shropshire Falconry we are often contacted when people have lost birds, found birds, or find injured Birds and Owls We are more than happy to care for any injured Bird of Prey handed to us, and where possible will release the bird back into the wild. If you find an Injured or Lost Bird of Prey in Shropshire Please call us on 07968 715564 / 01939 236541 We will endeavour to offer you advise over the phone, or arrange to take the bird to our specialist vets for immediate treatment, we can also give the bird respite care until it can be re-released when possible. We have also re-united many Falconers with their lost birds or even taken birds in for re-homing. If you are not in a position to look after or exercise your bird anymore. We can offer them a new home. We never sell any bird given to us for re-homing. If you find a bird please remember the follow information.. First and foremost, take a moment to discern if the bird is truly injured. Is it limping, dragging its wing or falling over? Then it probably is hurt. However, just because the little flyer is perched on the ground does not mean it’s injured. If there is no evidence of injury leave it alone. The same rule of thumb goes for any other small animal. The accepted rule of thumb is the “20 minutes rule”. Observe the bird or other animal for about 20 minutes to really find out if it is injured and in need of rescue. It is important, especially in the case of small animals, to remember mothers often leave their young to feed and always return very shortly to continue caring for their babies. If you pick up and remove the baby you could do more harm than good. If you then think the bird needs attention please take note of the following information.. Important – Please note the following In common with most other wild creatures, birds of prey fear man more than anything else. Any raptor which allows itself to be picked up is very ill and probably close to death. Unnecessary handling will only jeopardize its chances of survival. Injured birds of prey require immediate, specialist care and any delay in administering this attention could seriously reduce the possibility of the bird making a full recovery. The successful rehabilitation and re-release of wild raptors requires specialist knowledge and proper facilities. The following rescue technique would be suitable in most circumstances, however these are only guidelines and we should stress that each case is different and should be treated on its merits. - Obtain a cardboard box of a suitable size to accommodate the bird to be rescued. Ensure that the box is well ventilated. - You will require a towel or blanket large enough to completely cover the bird. - Position yourself between the bird and any possible hazards, such as roads, rivers or ditches. - Approach the bird slowly, but positively. Place the towel or blanket over the bird. - Expect the bird to struggle when first covered. Quickly restrain the bird under the covering. - Once it has calmed down, ensure that the bird is completely covered. - Using both hands, pick up the bird complete with towel or blanket and place it into the box. - The box should then be put in a quiet, dark and warm position. Resist any temptation to look at the bird, as this can often do more harm than good. DO NOT ATTEMPT TO FEED THE CASUALTY. 9. Contact us immediately 07968 715564 / 01939 236541 or ring a local veterinary practice, or the RSPC
<urn:uuid:d6269227-8ed6-41c0-be19-b4be051cad7f>
CC-MAIN-2022-33
https://www.shropshirefalconry.co.uk/rescue-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00474.warc.gz
en
0.946566
773
1.734375
2
S: Adventures of Punky and Pedro FC: Egypt 2012 1: Exploring Maadi 2: The prayers and smoke of sacrifice 'Mid rites of priests and pomp of kings Again the seated Memnon sings. We watch the palms along the shore, And dream of what is here no more. "he who rides the Nile must have sails of patience" 3: Stars Centre, Heliopolis Cairo .....now this was one big shopping centre! 4: Temples, temples and more temples... 5: Stepping back in time, such a surreal feeling | Standing where kings had walked 6: Anywhere in the world, the pied piper of children makes a new friend 7: T | Cruise up the Nile from Luxor to Aswan | Ipet-Isut, means "the most perfect of places", Karnak was the center of worship in Egypt for nearly 1500 years. 8: Pyramids of Giza | A beautiful day to kiss the sphinx 9: The Great Pyramid of Giza is made from over 2-1/2 million blocks of limestone and 203 steps to its summit (454 feet high) 10: The camel and his driver - each has his own plan African Proverb | The barking of a dog does not disturb the man on a camel Egyptian Proverb | Camelus Dromedarius 11: Life is like a camel; you can make it do anything except back up | camels - we ain't smoking them 12: thank goodness for scarves... 14: Our own Cairo Time 16: We're not in Cairo anymore 19: White Desert 20: A night with a bedouin 25: Hot Air Balloon ride in Luxor
<urn:uuid:3d9c1b9e-6723-4e49-9a06-a2e8b2b156ef>
CC-MAIN-2017-04
https://www.mixbook.com/photo-books/travel/egypt-2012-7169167?vk=1UxlaJLogz
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00274-ip-10-171-10-70.ec2.internal.warc.gz
en
0.923481
357
1.71875
2
Ellicott Tyson was born September 13, 1795 at Ellicott's Mills in is now Howard County, Maryland. She lived in Maryland until her death age 78, in 1873. Tyson was an antislavery advocate, a supporter of rights, a wife, and a mother of twelve children. Martha Ellicott Tyson's belief in the fundamental principle of the Quaker religion (Society of Friends) proved to have a major impact on her life. At the age of 35, she was appointed to the responsible position of an Elder of the Meeting ( a minister of the Society of Friends). Despite her reluctance to take the appointment, feeling she could not spare the time being a mother of such a large family, she nevertheless accepted the position and for many years fulfilled her duties to the great satisfaction of the church members. In addition, she raised her twelve children with a strong focus on the importance of education for both the girls and the boys. In her lifetime Martha Ellicott Tyson was also the author of several works, including A Sketch of the Life of Benjamin Banneker, a brief account of The Settlement of Ellicott's Mills, and a fascination description of the visit of Little Turtle and other Indian chiefs to her home during Christmas week in 1807. In her sixties, Martha Ellicott Tyson wrote accounts of her father's intercourse with the United States government relative to the Indians of the northwest. In 1862, she edited, with much ability, and interesting journal of Gerald T. Hopkins, who in company with her father, George Ellicott, visited the Indians of Fort Wayne in northeastern Indiana in 1804, under the direction of the Baltimore Yearly Meeting of Friends. As a result of her dedication, support, and profound interest in education, Martha Ellicott Tyson helped to establish the second coeducation college in the United States, Swarthmore College. After ten years of unsuccessful efforts to get the college started, Martha Ellicott Tyson invited about 30 leaders of the Society of Friends from Maryland, Pennsylvania, and New York to her home to get the process moving forward. The meeting was the impetus needed to get the college created. Founded in 1860, Swarthmore College provided educational opportunities to young women that weren't previously available to women in America. The founders were also reacting to the politics of the time (1850-1860), leading up to the Civil War with the intention of creating "A better educated generation that could achieve freedom, peace, prosperity, and righteousness." Martha Ellicott Tyson came from a tradition that encouraged and appreciated the intellectual accomplishments of the family's women. During her life, Tyson, continued to encourage and support the rights of women and slaves to achieve the freedom necessary to reach their full potential. As a pioneering spiritual leader and minister of the Society of Friends, her life was moved by a desire to do good. A favorite sentiment of Martha's was, "Count the day lost, whose low descending sun marks, in its course, no genuine action done."
<urn:uuid:0cdb8ecd-632d-479e-9ee2-2cb53a7e4620>
CC-MAIN-2016-44
http://www.mdarchives.us/msa/educ/exhibits/womenshall/html/tyson.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00354-ip-10-171-6-4.ec2.internal.warc.gz
en
0.965938
620
2.828125
3
Real life isn't all about travel and wanderlust. For most people, life is about working for The Man, making the most of your weekends, enjoying family and friends and looking for success in your own backyard My life used to be all about that before I threw it away to travel the world, and believe it or not, I was pretty good at it. So, before I forget what life was like when I had to wear a suit and tie, here are my tips for those looking to make it big in the corporate world: 1. Fit the role, and play the part. When you are going for a job interview, have the humility to know no one really cares that much about who you actually are. All your employers want to know is, "Can you be the person we are looking for?" So, can you play the part? How are your acting skills? The most important factor in getting a job is first understanding what is important to the interviewer, and then simply reflecting that in your answers. As I'll elaborate on later, perception is everything. 2. Work on your presentation and appearance. Again, it's all about perception. Whether you have the job and have been there for years, or you are going for the interview today, exude humility, speak with confidence and address everyone as if he or she were your uncle or aunt. You know, treat people like that uncle or aunt you see every so often and are totally comfortable around, but have never really sat down and contemplated the world with. If you can do it with them, you can do it at work. Be yourself. 3. Be a jack of all trades rather than a master of one. What you'll realize after a while is there really aren't many geniuses in the world. In fact, most people are just doing their best to put food on the table. You don't have to be the next Stephen Hawking. Just do your best, have a general knowledge on most facets of the popular world and always have a crack. 4. Get a qualification. The fact is, we are in a time when jobs aren't the easiest to come by. What this does is make it a lot easier for recruiters to up the standards of their interviewees. Unfortunately, in this generation, a degree is as good as a high school diploma was for our parents. If you don't have one, you probably won't get past the first cut, regardless of your talent. 5. Meet people, and build a network. It's not a surefire strategy, but more often than not, the corporate world is about who you know, not what you know. It's the foot in the door. Go to Meetup events. Go to mixers and cocktail nights. Throw away the awkward questioning of yourself, and just say hi to people. You miss 100 percent of the chances you don't take. 6. Remember your boss is just an older version of you. People seem to get so caught up with nerves whenever their bosses talk to them or growl at them, as if they are these holier spirits or upper-class citizens. Get that out of your head. Your boss is simply a more experienced version of you. If he or she was any more elite or extraordinary, this person wouldn't be your boss; he or she would be working for NASA. When you get that in your head, you will treat him or her like your equal, with humility and self-respect. Your boss will feel this and treat you with more of the same tone. 7. Don't take life too seriously. At the end of the day, a bad day at work or missing a deadline isn't going to start World War III. It's not going to change your life substantially, and it's not going to be remembered in a year. When you stop taking work so seriously and give it your best shot, you surprisingly end up doing a better job. You come off more relaxed and in control, and as a result, people feel this and feel more confident in you. It also clears your head for more rational thought. 8. Remember your priorities in life. As an extension of my last point, your job is simply something you do. It can change, and you can change. If you don't like it, leave. But always remember life is so much more than just your work. Friends and family should always come first. 9. Perception is 90 percent of reality. This is one of corporate life's biggest truths. No one really knows you. No interviewer really knows your competencies unless you undertake rigorous testing. If you present yourself as in control, confident in your abilities, humble in your mannerisms and driven in your outlook, you will always have a much better chance than the genius looking at his shoelaces, questioning his abilities. Walk with a bounce in your step, and keep your head held high. Exude who you want to be. 10. Most of success is just showing up and giving your best. At the end of the day, you have to be in it to win it. If you don't turn up or submit that application in the first place, you will never get anywhere in life. Don't be afraid to fail, and don't be afraid to succeed. Take every chance you can, and watch where your life takes you.
<urn:uuid:f941a38f-ceec-4efb-8614-aa64cd90a567>
CC-MAIN-2022-33
https://www.elitedaily.com/life/ways-catch-break-corporate-world/1330105
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00077.warc.gz
en
0.977693
1,119
1.648438
2
April 20th, 2012 11:01 EST Taking It Out On People You Know Will Not Make Your Stresses Go Away When feeling stressed or anxious, some people sometimes take it out on there loved ones or somebody they know. There is a better way to deal with your stresses and anxieties besides taking it out on somebody else. As a result, here is a list of techniques that a person can use to help manage their stresses, anxieties, and fears. First and foremost, seek help and treatment from a counselor or psychologist. Getting help from a counselor or other professional is very important and can provide you assistance for your situation. Seeking the services of a professional should be the first thing you do if you have trouble managing your stresses. Find the reason why you are feeling anxious or stressed. Maybe you had a bad day at work or maybe your kids are giving you a hard time. Ask yourself what is making me feel stressed and then try to find effective solutions that will manage the problem. Sometimes, certain events may happen all at once. When this happens, stop what you are doing and take a deep breath. Try to find something fun to do or read a good book. Doing something that makes you happy will get rid of the stresses of the moment. Don`t let your negative thoughts get the best of you. If you get a negative thought, try to think of something positive. Also, focus on the next time you will go on vacation. Thinking of something that will make you happy will help calm you down. Do something enjoyable that will make you feel better. If you like to watch a baseball game, then take the afternoon off and go to a game. If you like to go fishing then do that. Doing something you like to do will help you to forget your current problem and give you some time to relax. Managing your fears and anxieties will take some work on your part but you can be successful. Remember that there are better ways to deal with your fears, anxieties, and stresses than blaming it on your loved ones or friends. Stan Popovich is the author of "A Layman`s Guide to Managing Fear Using Psychology, Christianity and Non Resistant Methods" - an easy to read book that presents a general overview of techniques that are effective in managing persistent fears and anxieties. For additional information go to: http://www.managingfear.com.
<urn:uuid:fc95b185-2102-4b05-b364-f0a4b3949b1c>
CC-MAIN-2017-04
http://thesop.org/story/20120420/taking-it-out-on-people-you-know-will-not-make-your-stresses-go-away.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00438-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945432
493
1.960938
2
By Haroon Khalid Dec 2, 2018 Looking back, it seems like a strange coincidence how I met Iqbal Qaiser, my mentor. A slight variation in circumstances and the story would have turned out to be completely different. I was in the last year of college and was being increasingly drawn towards exploring signs of history and heritage across the country. History, as a subject, is not taught in Pakistan. What is taught instead is an ideological course, designed to churn out students who parrot the narrative of the state. What that means is that, one after another, there have been generations of students in the country who have had no exposure to non-Muslim history or non-Muslim narrative of history. This, however, is not the only problem. Even the subject that is taught is completely divorced from the history of the geographical realities of the students, from their cities, villages and towns. History is taught from a macro level, recalling tales of rulers and their exploits with no mention about how localities reacted to these political realities. Thus, as the years of my formal education were coming to a close, I increasingly felt a void in my understanding of history. Around this time, I was also being increasingly drawn towards politics of non-violence, reading Gandhi, Abdul Ghaffar Khan, Martin Luther King Jr. and Nelson Mandela. The day Iqbal Qaiser was invited for a talk at my college, I was reading a biography of Guru Nanak. While the spiritual aspect of the message was there, I was also fascinated by his non-violent political struggle. I interpreted his confrontation and discourse with the Mughal Emperor Babur at Eimanabad through this framework of non-violent politics. Could Nanak too be seen as an adherent of non-violent political struggle? If yes, then how is one to interpret his message in the context of the histories of the latter Gurus, particularly Guru Hargobind and Guru Gobind Singh, both of who found it completely legitimate to use violence in defence from an oppressive force. It is with these questions that I approached Iqbal Qaiser, a Punjabi poet, and author of several books, including Historical Sikh Shrines in Pakistan, and most recently Ujre Daraan de Darshan, a compilation of his visit to several historical Jain shrines around the country. Here was a historian who not only could answer my questions about Guru Nanak, but also help me explore traces of history around the country, in the form of gurdwaras, temples and other old structures. We travelled over thousands of kilometres, spending hours together, engaged in conversations about history, politics, religion, and culture. It was the beginning of my informal education, the most constructive phase of my learning. In Iqbal Qaiser, I had found my teacher, my murshid, my guru. On one of these journeys, I found myself at Nankana Sahib, the home of Guru Nanak, on the occasion of gurpurab. While the city is hardly an hour from Lahore, my hometown, it felt like a different world. There were thousands of Sikh pilgrims everywhere. The entire city had been lit up in celebration of Guru Nanak. Visiting one was a far cry, I had never seen a gurdwara (besides Gurdwara Dera Sahib facing Lahore Fort, which no Muslim is allowed to enter), and here was an entire city of gurdwaras. Every important moment of Nanak’s spiritual life had been captured in a structure. At Gurdwara Janamasthan, the grandest gurdwara in the city, I could imagine Bibi Nanki fetching water from the village well, which had been preserved. At Gurdwara Bal Lila, a short walk from Nankana Sahib, I imagined children, one of them Nanak, playing with other children. Next to Gurdwara Bal Lila was Patti Sahib, where Nanak first learned to write. It is here that a poet was born, a poet who through the magic of his words was to sway the world in the years to come. As a handful of Sikh devotees performed religious rituals inside the gurdwara, I could imagine a young Nanak writing on his Patti. Not far from here is Gurdwara Tambu Sahib, the site of the historical jungle where a young Nanak hid, afraid of the wrath of his father after his Sacha Sauda. Walking under the canopy-like structure of these trees, which had been preserved within the precincts of the gurdwara, I could imagine an adolescent boy sitting under them, as the day sank into a cold evening. I had my first experience of langar at this gurdwara, a communal experience that was first instituted by Nanak. Here, I sat as a Pakistani Muslim along with hundreds of others, some Sikhs, others Hindus, sharing a hot meal. With every bite of the meal, all distinctions, decades of antagonism and the sins of Partition melted away. Here there was no Hindu, no Muslim, as Nanak proclaimed. It was my most intimate experience with history, a pilgrimage of sorts, that brought deeper insights of not just Nanak’s message and his philosophy but also my own culture and history. I began realising that these artificial divisions between Hindu, Muslim and Sikh histories that had been raised by a colonial regime for its own political agenda were as artificial as distinctions between exclusive identities that Nanak vehemently spoke against. Nanak, I realised, was not just part of Sikh heritage, but my history and culture. But not all the gurdwaras I visited were as grand. There were many which had been abandoned, taken over by squanderers. Right on the border of India-Pakistan, I visited Gurdwara Rori Sahib in the village of Jhaman. Here, just outside the village in an open field, a few steps from the international border was this dilapidated gurdwara, commemorating a spot where Nanak once visited along with Bhai Mardana. While the structure was in a bad shape, on the top floor, inside the dome, there were still remains of the old frescoes, pictures of gurus. In most of these pictures, the faces had been spoiled, perhaps as an expression of people’s understanding of Islam’s opposition to iconoclasm. While it is likely that before Partition some Muslims of the village also visited the gurdwara, finding parallels between Nanak’s insistence on monotheism and their own religious beliefs, after Partition, it seemed the building had slowly been ‘otherised’ remnant of a past the community would rather forget. On the other hand, however, there were also places where some traces of these syncretic traditions, aligned with Nanak’s message, had survived. In Chuhrkhana, while Gurdwara Sacha Sauda is a well-maintained massive gurdwara, Gurdwara Sacha Khand is a comparatively lesser-known structure, a single storey simple building standing behind Gurdwara Sacha Sauda. While the Gurdwara Sacha Sauda had been preserved and renovated, somehow this building had been bypassed. Here I met devotees of a Sufi pir who had established himself in the precincts of this abandoned gurdwara and was now buried in front of it. As Iqbal Qaiser and I sat with his devotees, one of them narrated to us stories of Guru Nanak’s miracles that he had heard from his ancestors, who had heard them from the Sikhs when they used to live here. “Guru Nanak was a true devotee of God,” he said as he finished the story. Lying in the middle of these two extremes is the story of Gurdwara Beri Sahib in Sialkot, where Nanak is believed to have encountered the arrogant Sufi Hamza Ghous, and also Maula Karar. Here just next to the partially renovated structure was an old berry tree, lending this gurdwara its name. Sometime after Partition, a grave had appeared under the tree converting this space into a Muslim shrine. There were dozens of devotees of the shrine sitting around the gurdwara engaged in different activities. This was an example of cultural appropriation where a sacred space of one religion had been appropriated by a different culture as a sacred space, as the social and political realities changed. However, while I was visiting Nanak the Guru through a pilgrimage to his shrines, I was also exploring Nanak the poet. As I delved deeper into his philosophy, it became harder for me to reconcile these two distinct personalities. Nanak the poet spoke against superstitions and associating stories of magic with saints, while the entire hagiography of Nanak is filled with stories of his miracles. Nanak the poet wrote against institutional religion, criticising dogmatic rituals, while the religion he founded eventually became one of the most prominent institutionalised religions of the world. While undertaking pilgrimages to different religious shrines, he spoke about their futility; his gurdwaras today have become major pilgrimages. It seemed the more I learned about Nanak, the more questions I ended up with. Where do these two stories merge and from where begins the story of the latter Gurus?
<urn:uuid:6f8e7f9a-43cb-47b3-8d1d-e5a3ffa2952c>
CC-MAIN-2022-33
https://www.newageislam.com/spiritual-meditations/haroon-khalid/guru-nanak-true-devotee-god/d/117045
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00070.warc.gz
en
0.982334
2,029
1.898438
2
Even at the age of 5 I knew you had to use your fingers to play a piano. But right before my eyes was evidence to the contrary. How could that piano be playing all by itself? The keys danced up and down, up and down, several at a time even! And as the keys danced you could hear the most beautiful melody. I'm not sure if I was more fascinated with the keys moving up and down by themselves or the song that was playing. I'd sat at that piano many times in my short life and plunked away at the keys, making sounds that my mom and grandma used to cringe at. It was just a big version of the piano I had at home. Or so I thought. I had no idea the piano was magical and could play by itself! I rattled off questions as fast as they popped into my head. "How does it do that?", "How does it know which keys to press down?", "How did it decide to play that song?", "Does it know any other songs?", "Why didn't it play like that when I sat at it?", "Can we get one for our house?", "Please, please, please, mommy!" As my mom sat at the piano with the parlor blanket over her lap she explained to me that this was no ordinary piano, it was a player piano. When the song ended she explained that there were foot pedals in the bottom of the piano and then she pulled the blanket back to show them to me. "You pump the pedals and it makes the piano roll go around", she explained. "What's a piano roll?" "It a paper scroll with holes in it." She opened the little doors with knobs on them on the front of the piano. I'd opened those same doors before but never saw a paper scroll with holes in it. "Where did the piano roll come from?" "Grandma has a whole bunch of them in the closet." "Let's play more, mommy. Can we?" "Let's play this one again and then we'll play a different one", she replied. "Where did those pedals come from? I've never seen them before." "They're hidden behind this door. You have to pull this lever to open the door and pull them out." She pointed to a lever under the keyboard that I'd never noticed before. "Can I pump the pedals, mommy?! Please!" "You can try, but I don't think your legs are long enough to reach the pedals yet." I did try and my legs weren't long enough to reach the pedals when seated. If I leaned back against the piano bench with my elbows braced on top I could just reach the pedals but I didn't have enough weight or muscle to pump them. They required quite a bit of effort as I would learn in later years once my feet did reach the pedals. That magical player piano was a gift to my grandmother Sophie Mizera Lisowski, from my grandfather Vincent Lisowski, on her 31st birthday (June 1925). My mom, who would have been almost 7 at the time, remembered the day the piano was delivered. It was quite a novelty and the talk of their immigrant working class neighborhood. At that point in time, my grandparents had been married for 9 years, and had 3 children. It had been 12 years since my grandmother immigrated to the USA from Poland, 13 years for my grandfather. The piano was a Bush and Lane Cecilian. My grandfather paid $1075.00 for it. The receipt indicates that my grandfather put $300 down on it and the other side of the receipt shows he paid the remaining $775.00 three months later in September of 1925. BUSH & LANE CECILIANAccording to my mother, neither my grandmother or grandfather ever took piano lessons, nor did my mom's brother. She and her sister took lessons for a short time as children but they never became accomplished players. The joy and entertainment they received from that piano over the years came from the "player" aspect of it. They bought a number of piano rolls and had a variety of music. This famous name, which has been known in the piano players' industry for a score of years, is owned by the Bush & Lane Piano Co. and is used to designate the players' pianos of the Bush & Lane and Victor lines. The Cecilian players' action, manufactured exclusively by the Bush & Lane Piano Co., contains many valuable improvements and special features to humanize the playing that is not found in other players. It's ease of operation. It's freedom from trouble, its responsiveness to the controls that enable the operator to produce artistic musical effects place the Cecilian in a class by itself and. Coupled with the excellent pianos in which it is installed, the Bush & Lane and Victor, it produces musical instruments of the most advanced type, capable of operation easily with the most charming musical effects even by those who have no technical knowledge of music or of the piano keyboard. [From BlueBookOfPianos.com] I like to imagine that the family gathered around the piano at Christmas and sang along to Christmas carols. But the truth is, I'm not sure if there were piano rolls available for Polish Christmas carols. And I don't know how familiar the family might have been with English carols. It's not likely they would have heard them at church since they attended a Polish Catholic church. But according to the 1930 census, they did have a radio at home, so presumably they would have heard some Christmas songs that way. It's just another of the many things I wish I'd asked my mom about before she died. And I'll hang on to my image of the family gathered around the piano in the parlor because it pleases me to do so. When I was about 10 or so my grandmother told my mom to take the piano since I was the only one of the grandchildren to show an interest in it. But my mom and dad's house was just a small bungalow with no good place to put a piano. My mom paid for movers to move it to her house anyway and they put it in the only place there was room for it, in the basement. Our basement was "semi-finished" meaning the floor was tiled and there was a single wall dividing the basement in half. But the exterior walls were cinder block, uninsulated, and cold. The basement was lit by fluorescent lights and was always cool and damp, definitely a bad environment for a piano. I was really excited when we first got the piano and I have happy memories of my mom and I sitting side by side and taking turns pumping the pedals and singing along to the songs (the words were printed on the piano rolls so you could see them as you played -- karaoke 1920's style!). I took piano lessons for a year or so but my heart wasn't in it. I hated practicing in the cool, damp, basement where the spiders were. The piano was badly in need of tuning but my mom said she wasn't going to pay for tuning unless I was going to take my lessons and practicing more seriously. I gave up and once more the piano only got played when we put a piano roll in. As a teenager it provided great entertainment for me and my friends. They always enjoyed coming over and playing the old songs on the old piano. Eventually, the damp environment took its toll on the piano and the piano rolls. The sound got worse and worse and the piano rolls got brittle and crumbled. Fast forward to the early 1990s when my daughter was about 6-7 years old. One day when she was spending the weekend at my mom's house, my mom asked her if she wanted to take that piano home with her. Mind you, I had the perfect place for it in my house at the time and I would have LOVED to have had it. But did my daughter say, "Yes!" like any other kid would? No. She said, "I don't think my mom would let me have it." I don't know why she thought that or said that or why my mom took that as the gospel truth but she did. No one said anything to me about it and the next time I was over at my mom's house I noticed the piano was gone. I asked her where in the world it went and she said, "I gave it to your brother. He had the movers come over yesterday and they took it right out." To which I said, "Oh mom, I didn't know you wanted to give it away. I would have loved to have it!" To which she replied, "I asked your daughter if she wanted it and she said she didn't think you'd let her have it, so I gave it to your brother." I stood there, disbelieving. There was nothing else to be said at that point. I'd always thought of it as my piano at her house. After all, my grandmother told my mom to take it so I could play it. But now it belonged to my brother who never took lessons or showed any interest in it. Oh well. That piano still exists at my brother's house to this day. He has talked of restoring it one day but he hasn't gotten around to it yet. The piano's cabinet looks its age but the inside looks pretty well in tact. I can honestly say I'm not bitter that my brother has the piano but I sure wish he'd get it restored so I could hear it play again!!!
<urn:uuid:31b7a4f0-4547-44e1-a762-10fdeed50e1c>
CC-MAIN-2016-44
http://creativegene.blogspot.com/2009/10/magic-in-grandmas-parlor.html?showComment=1257565611414
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00240-ip-10-171-6-4.ec2.internal.warc.gz
en
0.991848
1,976
2.171875
2
Randall’s ESL cyber listening lab Randall’s ESL cyber listening lab is a free listening website for English learners, from basic to advanced level. An evaluation of this language tool is available. |Type:||Listening practice, Tutorial| |Requires additional equipment:||Internet browser, Media player| |Availability:||Free of charge| |Where to find:||http://www.esl-lab.com| The site provides an ample choice of listening activities and navigation within the various sections is quite easy. It offers different types of listening activities like conversations, listening quizzes, etc. The general listening section is divided into three different levels (easy – medium – difficult) and deals with functional language skills and everyday conversations and topics. Furthermore, learners find listening quizzes for academic purposes, which offer topics of academic nature that might help students preparing for their jobs/ profession and TOEFL or similar tests. Additionally, one can find vocabulary lessons/activities which help the learners to build their skills in preparation for the listening activities. Usage in the language-class The site was mainly designed for self-access learning where learners engage in the listening activities on their own. However, the site can definitely also be used in the language classroom, e.g. when teachers ask their students to complete certain exercises as a means of supplementing their classroom activities. Furthermore, the pre-listening and post-listening activities contain various open questions for brainstorming and discussion. This could also be done in a classroom setting, in groupwork or in pairwork. Students can engage in different conversational activities to apply what they already know or expect about the topic or what they have learned / heard in the listening activity. The website is also ideal for independent learning in between face-to-face sessions. Teachers can ask their students to do the prelistening activity and the listening activity itself at home (including vocabulary work). They can then further work on the topic in a face-to-face session and discuss the questions in the post listening or follow- up activities in class. This website can also be used as a round up/ revision of a topic that was worked on in class. Or teachers can tell their students to do one of the online investigations. This website also contains handouts that can be used to help teachers and students keep track of their learning on this site. Teachers are welcome to copy and distribute these materials for personal or classroom use. Name and contact-information of the evaluator Reidl Petra firstname.lastname@example.org Please download the full evaluation of the tool here: Randalls_ESL_cyber_listening_lab.pdf
<urn:uuid:945e34cb-8706-4235-9c3a-a9016f19cd41>
CC-MAIN-2017-04
http://www.poliglotti4.eu/php/language-tools/details.php?lt_id=60&lg=en
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00541-ip-10-171-10-70.ec2.internal.warc.gz
en
0.9326
563
2.265625
2
Last year when AMD launched their brand new RX 6000 series graphics card, they also introduced the Smart Access Memory (SAM) technology, claiming that there will be an additional in-game performance boost when pairing the RX 6000 series graphics cards with AMD 5000 series processors. Then NVIDIA jumped out and responded that SAM is nothing new but an existing technology that relies on the basic attribute of PCI Express: Resizable BAR. NVIDIA graphics card users could also benefit from additional FPS boosts with some simple motherboard BIOS, graphic driver and VBIOS updates, and such upgrade is not limited to AMD or Intel CPUs. Now everybody is talking about Resizable BAR, but what exactly is Resizable BAR? BAR: Allowing CPU To Access The Memory Of PCI Express Device To answer this question, you need to know what BAR (Base Address Register) is first. Inside a computer, the CPU can only access the RAM(Random Access Memory) directly. If the CPU wants to access the memory space of other devices, such as PCI Express devices (ex. a graphics card), it will need the help of RC (Root Complex) for stretching the data from external devices and write these data into the RAM with TLP (Transaction Layer Packet) for further access. However, every PCI Express device has a different combination of internal memory space. Some of them can be accessed, while some others cannot. And all of the information, including the size of the memory space and additional attributes will be recorded into the Configuration BAR. The computer will read these BAR after booting on for dispatching associated RAM space for these PCI Express memory spaces and write back the address of RAM into BAR. So whenever the CPU needs to access the memory space of PCI Express devices, it will find the associated BAR inside the RAM, and RC will take over for further accessing of the memory space of PCI Express. Resizable BAR:Allowing CPU To Access More Memory Space of PCI Express Devices So Resizable BAR means that the size of BAR could be further adjusted. In the past, only 256MB of the memory space on PCI Express devices could be mirrored to RAM for access by CPU. But with Resizable BAR, the volume of data mirrored to RAM will not be limited. But you may ask: can I have an additional performance boost just by adjusting the size of BAR? The games nowadays are getting more complex, featuring an incredible amount of scenes, textures, shaders, and geometry. All these need to be processed by the graphics card, and it also means more and more data need to be processed between the CPU and the GPU. We can tell it from the usage of VRAM on a graphics card: even with 10G of memory space, all of the spaces will be occupied by AAA game titles on RTX 3080. So the limitation of the 256MB BAR size will somehow result in a bottleneck to graphic performance. But thanks to resizable BAR, the CPU could access more memory space on the graphics card, promising no data queue between the CPU and the GPU for better gaming performance. According to our internal testing, we found there is approximately 6~8% of FPS boost after enabling the resizable BAR. GIGABYTE Motherboard & Graphics Card Support Resizable BAR The world-renowned gaming brand GIGABYTE offered a series of products that are Resizable BAR-ready, including Intel Z590/H470/B460 and AMD 500 series motherboards. As for the graphics cards, all RTX 30 series graphics cards from GIGABYTE could take advantage of this technology as well. Simply update the motherboard BIOS, graphics driver, and VBIOS, and you will be set for the smoothest gameplay ever with GIGABYTE gaming motherboards and graphics cards! More about NVIDIA and AMD Tech: Learn More :
<urn:uuid:f9ca1715-196e-44ec-927e-0ecd697dae0c>
CC-MAIN-2022-33
https://us.aorus.com/blog-detail.php?i=936
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00469.warc.gz
en
0.916623
782
2.03125
2
If you have any comments or new information about this record, please email us. |Type of record:||Monument| |Name:||Village cross, Stretham| Summary - not yet available |Grid Reference:||TL 512 746| |Parish:||Stretham, East Cambridgeshire, Cambridgeshire| - CROSS (Medieval - 1066 AD to 1539 AD) R2, Village cross (c 1400 AD) photo AO/ M/51/19. O2, Village cross, C15, octagonal base with quatrefoil frieze, tapered shaft, top with four flat arched niches. O3, A lantern headed village cross comprising head, shaft, socket stone and base, the whole mounted on a C19 / C20 circular brick plinth. Local informants state that there were steps surrounding the plinth "many years ago" but these are no longer evident. The shaft is octagonal in plan but squares into a socket hole, it does not have the weathered appearance of the head and base, suggesting restoration. The decorated socket stone sits on a high tapered base and the head is fine and original. See photograph(with PRC).In excellent condition, the monument has an overall height of approximately 5,0m.Correctly published on MSD. <R1> 1903, OS 6 inch map (Map). SCB8952. <R2> Rutler F, 1947, Guide to Cambridgeshire, p. 86 (ill) (Bibliographic reference). SCB14025. <R3> Pevsner, N., 1954, The Buildings of England: Cambridgeshire, 1970, 376 (Bibliographic reference). SCB17744. Sources and further reading |<R1>||Map: 1903. OS 6 inch map. | |<R2>||Bibliographic reference: Rutler F. 1947. Guide to Cambridgeshire. p. 86 (ill). | |<R3>||Bibliographic reference: Pevsner, N.. 1954. The Buildings of England: Cambridgeshire. 1970, 376. | Search results generated by the HBSMR Gateway from exeGesIS SDM Ltd.
<urn:uuid:20665be6-b3da-4420-87f0-fa018851b5c0>
CC-MAIN-2017-04
http://www.heritagegateway.org.uk/Gateway/Results_Single.aspx?uid=MCB8590&resourceID=1000
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00565-ip-10-171-10-70.ec2.internal.warc.gz
en
0.832554
489
1.945313
2
Skip to Main Content It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results. Model Citation for an Article in a Book Works Cited Entry, Basic Form Author Name, Reversed. (Date). Title of article. In Editor of book (Ed.), Title of book (pp. Pagination). Location: Publisher. - Provide the author's name in reversed order using only initials of given names (Surname, Initials of Given Names). Editors' names are given in direct order and with only initials for given names. - Use the prescribed punctuation between each element of the citation. - Title of the article is not in double quotes. Title of the book is in italics. - Include pagination of the entire article (not just the page you are quoting or referring to). - Use hanging indent (all lines after the first indented). Article in a Book Dewey, J. (2006). Common sense and scientific inquiry. In S. Haack (Ed.), Pragmatism old & new: selected writings (pp. 443-463). Amherst, NY: Prometheus Books. Article in a Reference Book Meyers, A. W., & Steenbergh, T. A. (2010). Gambling addiction. In I. B. Weiner & W. E. Craighead (Eds.), The Corsini encyclopedia of psychology (Vol. 2, pp. 693-695). New York: Wiley, Inc. Article in an Online Reference Book Orbuch, T. L., & Sprecher, S. (2006). Attraction and interpersonal relationships. In J. Delamater (Ed.), Handbook of social psychology (pp. 339-362). New York: Springer. Retrieved from http://ebooks.ohiolink.edu/xtf-ebc/view?docId=tei/sv/038736921X/038736921X.xml For more details on citing articles in books, see Publication manual, 7.02, examples 24-30, pp. 204-205. Citation Management Tools Free tools to assist you in the creation and management of citations in MLA style, APA style, and other formats.
<urn:uuid:817c9a58-bba4-4742-8a1c-ba2ae305ec51>
CC-MAIN-2022-33
https://library.marietta.edu/c.php?g=693170&p=4910978
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00066.warc.gz
en
0.748056
514
2.71875
3
Super PACs Having Negative Impact, Say Voters Aware of ’Citizens United’ Ruling As campaign advertisements funded by Super PACs dominate the airwaves in the lead-up to the South Carolina primaries this Saturday, 54% of registered voters say they have heard about the 2010 Supreme Court decision that allows corporations and individuals to spend as much money as they want on political advertising as long as it is not coordinated with candidate campaigns. Fully 65% of those who are aware of the new rules on independent expenditures say they are having a negative effect on the 2012 presidential campaign. And among those who have heard a lot about these new campaign finance rules, 78% say the effect has been negative. There is no substantial partisan divide in awareness and opinions of the new campaign spending rules. Roughly half of Republicans, Democrats and independents alike have heard about the court decision allowing unlimited independent expenditures. And among those who have heard about it, comparably wide majorities in each group say it is having a negative effect on the campaign this year. Men are more likely than women to say they have heard at least a little about the Supreme Court decision and its effects, and awareness is also higher among college graduates. There is little difference in awareness across age or region of the country. Among those who have heard about the decision, majorities of all groups see the impact on the 2012 presidential campaign as negative.
<urn:uuid:790d8e83-e3ba-4def-9510-87bddd840b53>
CC-MAIN-2016-44
http://www.people-press.org/2012/01/17/super-pacs-having-negative-impact-say-voters-aware-of-citizens-united-ruling/?src=prc-headline
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00055-ip-10-171-6-4.ec2.internal.warc.gz
en
0.973835
280
1.734375
2
The exhibition Icons of Modern Art. The Shchukin Collection opens on October 22, 2016 and runs until February 20, 2017. Bernard Arnault shares his insights on the renowned art collector Sergei Shchukin and the exceptional collection he created. The exhibition Icons of Modern Art. The Shchukin Collection, which we are extremely proud to present at the Fondation Louis Vuitton, offers me an opportunity to pay tribute to the legacy of one of the greatest collectors and patrons of modern art of the early 20th century, Sergei Shchukin. His passion, his visionary taste, his personal relationships with artists who defined modern art, and his commitment to creating a “gallery of paintings dedicated to the education of the public” constitute an exemplary model of private philanthropy in the area of art. A prominent Moscow industrialist, Sergei Shchukin in 1898 became an early member of the Paris circle supporting impressionist, post-impressionist and modernist artists. With great passion, he set about forming an exceptional collection of some of the most avant-garde art of his time. Modern art was at the dawn of an extraordinary period of influence that spanned the entire 20th century, and Shchukin was a pioneering proponent. Keenly aware of the innovative – and sometimes provocative – nature of the works he had collected, Sergei Shchukin ensured that they would be widely accessible by opening his galleries to the general public in 1908. Art lovers, artist and intellectuals alike visited the collection, contributing to early discovery of the French avant-garde and significantly influencing contemporary artistic creativity in Russia. Personally, I see Sergei Shchukin’s commitment as a patron and indeed militant supporter of the most innovative art as an example and approach to be emulated. His fiery devotion to modern art is clearly echoed in the passion with which his legacy is celebrated by his grandson, André-Marc Delocque-Fourcaud, who has overcome numerous obstacles to realize the dream of presenting his grandfather’s collection – displayed together for the first time in Paris – in close coordination with the Hermitage Museum in Saint Petersburg and the Pushkin State Museum in Moscow, where the majority of the works are held. The exhibition Icons of Modern Art. The Shchukin Collection counts iconic masterpieces by Monet, Cézanne, Gauguin, Rousseau, Derain, Matisse, Picasso and others. Following the discerning suggestion of our Russian friends, we also wanted this exhibition to include a dialogue between these masters of modernity and the young generation of Russian avant-garde artists who were shaped by their discovery of the collection in Moscow at the invitation of Sergei Shchukin. Displaying these works together recreates the shockwave – both emotional and in the artworks themselves – triggered by the collection. It is most certainly no understatement to say that the quality of the works displayed makes this a truly historic exhibition. For the LVMH Group, this event also continues nearly 25 years of corporate philanthropy partnerships with leading museums in France and around the world. The Fondation Louis Vuitton will present the most emblematic works from a major modern art collection together for the first time in nearly a century. The historic nature of this memorable exhibition marks a decisive milestone in deploying the artistic vision of the Foundation. Chairman and Chief Executive Officer of LVMH President of the Fondation Louis Vuitton
<urn:uuid:f45b0ad9-222e-42e2-9b87-d0442ad87efc>
CC-MAIN-2022-33
https://www.lvmh.com/news-documents/news/a-tribute-to-sergei-shchukin-and-his-exceptional-collection-by-bernard-arnault/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00477.warc.gz
en
0.952985
712
1.632813
2
The Seven Tablets of Creation, by Leonard William King, , at sacred-texts.com 1. When the gods Ana, Enlil, and Enki p. 126 p. 127 2. Through their sure counsel and by their great commands 3. Ordained the renewal of the Moon-god, 4. The reappearance of the moon, and the creation of the month, 5. And ordained the oracle of heaven and earth, 6. The New Moon did Ana cause to appear, 7. In the midst of heaven he beheld it come forth. 8. [Version]. When Anu, Bêl and Ea, 9. The great gods, through their sure counsel 10. Fixed the bounds of heaven and earth, 11. (And) to the hands of the great gods entrusted 12. The creation of the day and the renewal of the month which they might behold, 13. (And) mankind beheld the Sun-god 1 in the gate of his going forth, 14. In the midst of heaven and earth they duly created (him). 127:1 I is interesting to note that in the Semitic version the creation of the sun is substituted for that of the moon, although in the preceding line the renewal of the month is referred to.
<urn:uuid:ec1520e7-6e58-4888-b21b-7f4c96c7b4a2>
CC-MAIN-2016-44
http://sacred-texts.com/ane/stc/stc13.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00044-ip-10-171-6-4.ec2.internal.warc.gz
en
0.906576
276
2.8125
3
The New York Times reports that a formal Dallas study shows that dogs reduced stress for heart patients by 24 percent. In the first controlled study of the effects of pet therapy in a random sample of acute and critically ill heart patients, anxiety as measured on a standard rating scale dropped 24 percent for those visited by a dog and a human volunteer, by 10 percent for those visited by a volunteer alone and not at all for those with no visitors. Similar results were found in measures of heart and lung function. A separate study said heart patients shouldn’t ride roller coasters. Kathie M. Cole, a nurse at the University of California, Los Angeles, said 76 patients with heart failure, a condition that affects an estimated five million Americans, were randomly assigned one of the three visit types. The dogs, from 12 breeds, were screened for behavior and disease before participating in the study. Some patients in the first group, Ms. Cole said, “began to smile and immediately engaged in conversation with dog and volunteer.” Their worries seemed to vanish from their faces, she said. Besides the anxiety measurement, researchers found, patients’ levels of epinephrine, a hormone the body makes when under stress, dropped 17 percent when visited by a person and a dog, and 2 percent when visited by only a person. Epinephrine levels rose an average of 7 percent in the unvisited group in the study, which was financed by the Pet Care Trust Foundation, a nonprofit group. Pressure in the heart’s top left chamber dropped 10 percent after a visit by volunteer and dog. The same pressure rose 3 percent for those visited by a volunteer and 5 percent for the unvisited group. Pressure in the pulmonary artery dropped 5 percent during and after a visit by volunteer and dog, but rose in the other two groups.
<urn:uuid:c9a5db1a-6f55-4b06-9b03-12a4ee5b016e>
CC-MAIN-2017-04
http://americasroof.com/archives/696
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00345-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959492
378
2.625
3
To get the slabs statistics, use the stats slabs command, or the API equivalent. The slab statistics provide you with information about the slabs that have created and allocated for storing information within the cache. You get information both on each individual slab-class and total statistics for the whole slab. STAT 1:chunk_size 104 STAT 1:chunks_per_page 10082 STAT 1:total_pages 1 STAT 1:total_chunks 10082 STAT 1:used_chunks 10081 STAT 1:free_chunks 1 STAT 1:free_chunks_end 10079 STAT 9:chunk_size 696 STAT 9:chunks_per_page 1506 STAT 9:total_pages 63 STAT 9:total_chunks 94878 STAT 9:used_chunks 94878 STAT 9:free_chunks 0 STAT 9:free_chunks_end 0 STAT active_slabs 2 STAT total_malloced 67083616 END Individual stats for each slab class are prefixed with the slab ID. A unique ID is given to each allocated slab from the smallest size up to the largest. The prefix number indicates the slab class number in relation to the calculated chunk from the specified growth factor. Hence in the example, 1 is the first chunk size and 9 is the 9th chunk allocated size. The parameters returned for each chunk size and a description of each parameter are provided in the following table. |Space allocated to each chunk within this slab class.| |Number of chunks within a single page for this slab class.| |Number of pages allocated to this slab class.| |Number of chunks allocated to the slab class.| |Number of chunks allocated to an item..| |Number of chunks not yet allocated to items.| |Number of free chunks at the end of the last allocated page.| |Number of get hits to this chunk||1.3.x| |Number of set commands on this chunk||1.3.x| |Number of delete hits to this chunk||1.3.x| |Number of increment hits to this chunk||1.3.x| |Number of decrement hits to this chunk||1.3.x| |Number of CAS hits to this chunk||1.3.x| |Number of CAS hits on this chunk where the existing value did not match||1.3.x| |The true amount of memory of memory requested within this chunk||1.4.1| The following additional statistics cover the information for the entire server, rather than on a chunk by chunk basis: |Total number of slab classes allocated.| |Total amount of memory allocated to slab pages.| The key values in the slab statistics are the chunk_size, and the corresponding used_chunks parameters. These given an indication of the size usage of the chunks within the system. Remember that one key/value pair is placed into a chunk of a From these stats, you can get an idea of your size and chunk allocation and distribution. If you store many items with a number of largely different sizes, consider adjusting the chunk size growth factor to increase in larger steps to prevent chunk and memory wastage. A good indication of a bad growth factor is a high number of different slab classes, but with relatively few chunks actually in use within each slab. Increasing the growth factor creates fewer slab classes and therefore makes better use of the allocated pages.
<urn:uuid:8fc15de8-413c-48b0-b730-84e3997f4e2b>
CC-MAIN-2017-04
http://dev.mysql.com/doc/mysql-ha-scalability/en/ha-memcached-stats-slabs.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00018-ip-10-171-10-70.ec2.internal.warc.gz
en
0.763427
736
1.710938
2
Commitment as philosophers have traditionally accomplished (Searle Gilbert,,b; Shpall,,it truly is questionable irrespective of whether commitment is applicable to young young children. This is due to the fact the strict sense of commitment place forward by Gilbert (b),Searle ,and also other philosophers presupposes an understanding of common know-how: an agent only undertakes a commitment to contribute to a joint action if she expresses her willingness toFrontiers in Psychology www.frontiersin.orgJanuary Volume ArticleMichael et al.Minimal Commitmentdo so to some other agent,who acknowledges that expression below situations of common information. While one particular must be wary about ascribing the requisite cognitive sophistication to understand these types of conceptual relations to really young kids,there’s evidence that very young children may well in actual fact have an understanding of and respond to commitments in some sense. PubMed ID:https://www.ncbi.nlm.nih.gov/pubmed/24690597 By months,kids can solve joint problemsolving tasks,in which two agents need to perform complementary actions in the same time so that you can IMR-1A web obtain a joint objective,like pulling at opposite ends of a tube so as to open it up and retrieve the stickers hidden inside,(Warneken et al. These tasks implement a general structure in which it would be all-natural for the agents,if they have been adults,to sense that an implicit commitment were in location: because every single individual action is only efficacious in the event the other action can also be performed,every agent is implicitly relying on the other to contribute her component. It is interesting to note,then,that when the experimenter abruptly abandoned the joint action,quite a few from the montholds attempted to reengage him. The authors in reality suggested that this obtaining is proof that the children understood that the experimenter was committed towards the joint action and hence obligated to continue till it was completed to each parties’ satisfaction. Following up on this study,Gr enhain et al. compared a situation in which the experimenter made an explicit commitment towards the joint action in addition to a situation in which she basically entered into the action with out generating any commitment. Interestingly,yearolds,but not yearolds,protested drastically a lot more when a commitment had been violated than when there had been no commitment. In Experiment of your similar study,the tables were turned plus the youngsters have been presented with an enticing outdoors selection that tempted them to abandon the joint action. The young children were much less most likely to succumb to the temptation if a commitment had been made. In instances in which they did succumb,they had been additional probably to `take leave,’ to appear back at the experimenter nervously,or to return right after a brief absence. Within a study by Hamann et al. ,a single kid her a part of a joint reward from a joint activity just before her companion the other aspect,therefore tempting her to abandon the joint process before her partner her reward. The majority of the young children nevertheless remained engaged,suggesting that they sensed an obligation to stay engaged until each achieved their aim . One particular interpretation of those findings is the fact that youngsters,contra the aforementioned theoretical reservations,do have an understanding of commitments within the strict sense by around . When this may perhaps well be correct,you will find also findings indicating that a higher degree of caution is warranted right here. Take into consideration a study conducted by Mant and Perner ,in which children had been presented with vignettes describing two youngsters on their way home from school,Peter and Fiona,who go over irrespective of whether to meet up and go swimming later on. In 1 condition,they make a.
<urn:uuid:6ced617a-6090-4a54-a111-ccdec480d8ef>
CC-MAIN-2022-33
https://www.axlinhibitor.com/2018/09/30/10024/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00466.warc.gz
en
0.961192
766
2.921875
3
Three Layers of Ego In order to understand the Internal Structures of Ego which we also refer to as “Houses of Ego”, it requires the awareness that there are three main layers the 1st Chakra of the Unconscious Mind, the 2nd Chakra of the Instinctual Mind and the 3rd Chakra of the Conscious Mind. The three layers of mind work together to serve the functions of the ego in all human beings. Each energetic layer has separate functions yet all three layers are interconnected and directly impact each other. As we learn about the layers in the internal structure of the ego, this clarifies the purpose of identifying what the ego is and how it operates within us. When we understand how Ego Filters operates inside our mind we are better equipped to heal the energetic imbalances stemming from the Negative Ego or Predator Mind. 1D Memory Storage |1. Abuse 2. Trauma 3. Shock 4. Devastation| First Internal Layer: This is the root layer of our unconscious mind and it functions like a hard drive for the ego. In this hard drive is the cellular memory storage from all of one’s lifestreams. This means that cellular memories from past lives, present lives and future lives may all be stored in this memory hard drive. These memories are not given value when they are recorded, whether one may perceive them as good or bad, these many multiple memories are stored on the root hard drive of every human being. Whether one was a fetus, baby, in between lifetimes, or unconscious when the body suffered “abuse”; it was recorded in one’s memory storage whether one currently remembers that event consciously or not. Because the planet was invaded and our individual memory and identity erased from those tragic events, most all human beings have four main areas of cellular memory record in their unconscious mind at varying degrees. Those four main areas are: Abuse, Trauma, Shock and Devastation. Some people will feel these painful memories but not know what caused them or where they came from. Others will suffer from shock and will have shut these memories down completely as a coping mechanism. Others are very successful clearing these memories through emotional clearing practices such as with hypnosis and past life regression. Since this 1D unconscious mind controls our autonomic nervous system and autonomic bodily functions, unhealed memory trauma in these four main areas creates many kinds of physical symptoms and disease. These devastating memories have been partially described in twisted half-truths in the fall of humankind, or the genesis story of Adam and Eve in the bible. Starseeds and Indigos have an earth mission to heal these memories (and timelines) in a multitude of ways. 2D Walls of Separation |1. Unworthiness 2. Shame / Guilt 3. Lack of Trust / SelfDoubt 4. Betrayal / Abandonment 5. Anger / Rage 6. Fear 7. Entrapment / Enslavement Second Internal Layer: This is the instinctual layer of ego which for many people remains a part of the unconscious mind as many do not pay attention to the cause of their instinctual drives or addictions. The first part of healing is to be willing to pay attention to drives though dedicated self-awareness. The second layer is directly impacted by the first layer to the degree the painful memory is experienced in the person’s hard drive. This second layer could also be called the pain body. It is the location where unresolved pain memories will manifest as instinctual drives within the person’s ego. If the 1D storage memories are not identified or cleared, the pain of these memories creates “walls of separation” in the 2D layer as a pain body. The pain body further creates “walls of separation” which manifest in the ego as seven primary mental and emotional states identified above. These walls of separation isolate the ego self in the person and as the person identifies with that ego state, they become disconnected from their inner spirit. This disconnection from the inner spirit creates a wall where another part of the ego identity may split off and may hide itself. This identity could have been created when one is a baby, a six year old child, teenager, or even in other timelines. This phenomenon is called ego sub-personalities, and they may be hidden behind the walls as a result from deeply experienced trauma. These traumatized sub-personalities also hold a fragment of our spiritual energy. The goal of Satanic Ritual Abuse (SRA) is to intentionally create these traumatized sub-personalities which fragment the mind and spiritual body, thereby causing harm to the internal energy structures of the person’s aura. The current way this is enforced en masse on planet earth by the N.A.A. is through the Victim/Victimizer software program. When we are separated from our inner spirit, we are disconnected from our experience with God Source. The result is more Pain, Disconnection and Disease which exacerbates the ego walls and perpetuates the cycle of misery. The goal of our inner spirit is to find and locate those sub-personalities to heal them, reclaim them as Children of God, so that the spiritual light can be reintegrated and brought back into wholeness. 3D Houses of Ego |1. Addiction / Lust 2. Wrath / Rage / Vengeance 3. Greed / Avarice 4. Envy / Jealousy 5. Gluttony / Waste 6. Laziness / Discouragement 7. Pride / (+/-) Self-Importance Third Internal Layer: This is the conscious mind layer of the ego of which we all perceive as a self or personality. If one pays attention to their conscious thoughts, one becomes aware if they are having negative ego thoughts as defined above by the Seven Houses of Ego. All Houses of Ego are formed by making judgments of people and the external circumstances. The third layer is directly impacted by the first and second layer to the degree the painful memory has created walls of separation and traumatized sub-personalities. If the main areas of the walls of separation are not dismantled and sub-personalities brought into transparency for healing, these hidden influences control and manipulate the strength and power within the person’s Houses of Ego. Essentially the more weak and in pain a person is, the more strong their walls of separation (pain body) which create the judgments which build the Houses of Ego. In most cases the houses are also created as a coping mechanism to deal with the harshness experienced in the 3D world. The Houses of Ego are a direct rejection of God’s spirit and repel the Christos spirit from dwelling within one’s body. If the Houses of Ego are extremely strong and the person replays its characteristic behavior repeatedly, that ego behavior builds an internal “house” which then attracts a “spirit”. As example, if a person has an addiction problem sourcing from unhealed trauma and replays the addictive behavior repeatedly, a “House of Addiction” will be built as an internal structure of the ego mind. Once that “House of Ego” is built internally, it attracts a spirit, the same consciousness energy that will match the vibrational quality in the internal house. The Spirit of Addiction is a demonic spirit. So as one builds a House of Addiction inside their mind and body, it attracts a demonic spirit to dwell within their house. As the laws of energetic structure states, one has built an internal house and has thus created the energetic agreement for a demonic spirit to dwell inside that house. This is the consensual agreement that unaware humans make for demonic spirits to dwell inside their body and then later, the consent they give the predator force to use their body as a dark portal. Primordial Imprints of Separation When we came from the potential of the 12 Strand DNA consciousness and came into a body on the earth in two strand DNA consciousness, the pain of that separation was pretty devastating to the human collective soul. The Guardian Host describes the core separation imprint in the human soul that now which every other trauma and every other fear grows off of as the Seed Fear that recorded into the Three Layers of Ego. So after the Imprint of Separation, let's say if we go back into the moment of time where consciousness actually decided to come in to form at this level of density and experience polarity and duality consciousness and these imprints, there was a direct, at the individuation level, an imprint of separation and through those imprints, through our Consciousness and through our experiences in these lower form worlds, we started to form different emotions that had different energy signatures, but yet they were all still related to the Imprint of Separation. I am going to go through these right now with you and if you are called to as well, when we’re doing holographic re-patterning or as you listen to this recording later you may want to look at the primordial imprints of separation and clear these from your holographic consciousness. The Primordial Imprints of Separation, the first level is shock, trauma and devastation; the second level is the lack of trust, lack of trust in spirit of course; number three is the betrayal and its polarity, abandonment, the two work together the betrayal and abandonment come in together so it's listed as one. The next one is fear, the next one is cosmic rage of cosmic anger, the next one unworthiness, the next one is shame and guilt, apparently that's the same vibration and the next one is feeling entrapped, so entrapment. - Shock, Trauma and Devastation - Lack of trust, Lack of trust in Spirit - Betrayal and Abandonment - Cosmic Rage of Cosmic Anger - Shame and Guilt During the Ascension Cycle, those particular energies of the Primordial Imprints of Separation amplify greatly in the worldscape, in order for us to see them surfacing and shift their impact on our consciousness. Let's say fear and unworthiness, the primordial imprints as we list them out, they actually became like physical things, like planes of vibration and these planes of vibration over eons of time of human evolution and having experience that imprint of separation; we started to now create, because these particular energies and these particular experiences had not been experienced before and all of a sudden they are created in the planetary fields and in the human consciousness. So we start to actually have these particular emotions and experiences that all come off the Imprint of Separation that we originally went through in order to have this experience on earth. http://www.energeticsynthesis.com/index.php/resource-tools/news-shift-timelines/2260-internal-structures-of-ego Internal Structures of Ego, August 2013 Newsletter]
<urn:uuid:ff65c9a8-dcf1-4c90-acec-ea04479e0991>
CC-MAIN-2017-04
http://ascensionglossary.com/index.php/Three_Layers_of_Ego
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00376-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943106
2,245
2.09375
2
Burn management has also made marked improvements. Two decades ago, a healthy young person with burns to 70% percent of his body had only a 20 percent chance of survival. Dr. Lindsay explains, “Burn mortality has been significantly reduced by our management of the burn wound itself. We more accurately replenish the massive fluid loss and use topical anti-bacterial substances to control infection. We also aggressively excise the wound earlier, replacing it with a dressing or skin graft.”
<urn:uuid:2cdd54ab-b704-49d8-9ebf-a85b0169ed41>
CC-MAIN-2022-33
http://cfbts.org/burn-management/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00666.warc.gz
en
0.97262
97
2.46875
2
Under Siege: Jabalia Refugee Camp, Gaza Israeli Bulldozers Destroy Palestinian Farmland near Jabalia Refugee Camp The Israeli occupation forces destroyed Palestinian farmland today near Jabalia Refugee Camp in the Gaza Strip. Israeli bulldozers destroyed a large area planted with fruit trees and several greenhouses, while Israeli tanks fired ammunition and sound bombs so that the air was filled with bad-smelling smoke and the Palestinian residents could not see what the bulldozers were doing. This is part of an ongoing Israeli policy of destroying any sources of income within Gaza. The Israeli soldiers also killed a 12-year-old boy, Iyad Muhammed Ibrahim, from Jabalia Refugee Camp. This Israeli aggression is part of an ongoing invasion of the area which started three days ago; 18 Palestinians have been killed so far and over 50 people wounded. The Israeli forces have also destroyed four houses and placed the entire area under siege so that Palestinian residents could not leave the camp, even to get food or medicine.
<urn:uuid:5c116413-6f1a-4fce-9403-2a4be5a6f5b9>
CC-MAIN-2017-04
http://palestinesolidarityproject.org/2006/11/23/under-siege-jabalia-refugee-camp-gaza/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00336-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957974
200
1.8125
2
What Are Articles? Articles are words that define a noun as specific or unspecific. Consider the following examples: English has two types of articles: definite and indefinite. Let’s discuss them now in more detail. The Definite Article The definite article is the word the. It limits the meaning of a noun to one particular thing. For example, your friend might ask, “Are you going to the party this weekend?” The definite article tells you that your friend is referring to a specific party that both of you know about. The definite article can be used with singular, plural, or uncountable nouns. Below are some examples of the definite article the used in context: The Indefinite Article The indefinite article takes two forms. It’s the word a when it precedes a word that begins with a consonant. It’s the word an when it precedes a word that begins with a vowel. The indefinite article indicates that a noun refers to a general idea rather than a particular thing. For example, you might ask your friend, “Should I bring a gift to the party?” Your friend will understand that you are not asking about a specific type of gift or a specific item. “I am going to bring an apple pie,” your friend tells you. Again, the indefinite article indicates that she is not talking about a specific apple pie. Your friend probably doesn’t even have any pie yet. The indefinite article only appears with singular nouns. Consider the following examples of indefinite articles used in context: Exceptions: Choosing A or An There are a few exceptions to the general rule of using a before words that start with consonants and an before words that begin with vowels. The first letter of the word honor, for example, is a consonant, but it’s unpronounced. In spite of its spelling, the word honor begins with a vowel sound. Therefore, we use an. Consider the example sentence below for an illustration of this concept. Similarly, when the first letter of a word is a vowel but is pronounced with a consonant sound, use a, as in the sample sentence below: This holds true with acronyms and initialisms, too: an LCD display, a UK-based company, an HR department, a URL. Article Before an Adjective Sometimes an article modifies a noun that is also modified by an adjective. The usual word order is article + adjective + noun. If the article is indefinite, choose a or an based on the word that immediately follows it. Consider the following examples for reference: Indefinite Articles with Uncountable Nouns Uncountable nouns are nouns that are either difficult or impossible to count. Uncountable nouns include intangible things (e.g., information, air), liquids (e.g., milk, wine), and things that are too large or numerous to count (e.g., equipment, sand, wood). Because these things can’t be counted, you should never use a or an with them—remember, the indefinite article is only for singular nouns. Uncountable nouns can be modified by words like some, however. Consider the examples below for reference: Water is an uncountable noun and should not be used with the indefinite article. However, if you describe the water in terms of countable units (like bottles), you can use the indefinite article. Note that depending on the context, some nouns can be countable or uncountable (e.g., hair, noise, time): Using Articles with Pronouns Possessive pronouns can help identify whether you’re talking about specific or nonspecific items. As we’ve seen, articles also indicate specificity. But if you use both a possessive pronoun and an article at the same time, readers will become confused. Possessive pronouns are words like his, my, our, its, her, and their. Articles should not be used with pronouns. Consider the examples below. The and my should not be used together since they are both meant to modify the same noun. Instead, you should use one or the other, depending on the intended meaning: Omission of Articles Occasionally, articles are omitted altogether before certain nouns. In these cases, the article is implied but not actually present. This implied article is sometimes called a “zero article.” Often, the article is omitted before nouns that refer to abstract ideas. Look at the following examples: Many languages and nationalities are not preceded by an article. Consider the example below: Sports and academic subjects do not require articles. See the sentences below for reference: What is an article? An article is a word that comes before a noun to show if it’s specific or general. Specific nouns use the article the and general nouns use the article a (or an if the next word starts with a vowel sound). What is an example of an article in grammar? “The hammer” refers to only one hammer, but “a hammer” refers to any hammer. When should we not use articles? You don’t use articles with uncountable nouns or possessive pronouns. Certain nouns such as nationalities, school subjects, and sports don’t need articles, especially if they refer to abstract ideas. What are definite and indefinite articles? Definite and indefinite articles refer to whether they describe something specific or general. “The” is the definite article and “a” and “an” are indefinite articles.
<urn:uuid:71600685-9f77-455d-bd80-1656b62a2775>
CC-MAIN-2022-33
https://www.grammarly.com/blog/articles/?src=blog_article_intermediate_words_afrikaans
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00666.warc.gz
en
0.904812
1,188
4.1875
4
Fiber Bragg Grating (FBG) A Fiber Bragg Grating is a periodical variation of the refractive index along the length (several millimeter or centimeter) of the fiber’s core. When the light passes through it just the part with a wavelength equal to Bragg’s wavelength is reflected. Any external disturbance (like variation in strain or temperature) can be the reason of a variation in grating period and consequently a shift in Bragg’s wavelength. Contributor: Antoine Bassil (ESR2)
<urn:uuid:cea240c4-1b8b-4d79-8e8f-cda40b62dc15>
CC-MAIN-2022-33
https://trainingschool.infrastar.eu/resources-and-downloads/glossary/fiber-bragg-grating-fbg/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00278.warc.gz
en
0.837162
119
3.53125
4
Since his inauguration on Friday (January 20), President Donald Trump has signed executive orders covering a range of issues. Today, January 23, he covered abortion, federal hiring and trade. Reproductive Health Rights Trump signed an executive order preventing nonprofits from receiving federal funding if they provide, refer or promote abortion procedures in countries outside the United States. Also known as the “Mexico City policy” and the “Global Gag Rule,” this rule was put into place by President Ronald Reagan in 1984 and rescinded by subsequent Democratic presidents. Trump’s executive order could result in abortion clinics closing around the world and jeopardize the safety of women seeking reproductive information and care. Trump signed an order for a government-wide hiring freeze for all non-military federal employees. According to the Washington Post, White House press secretary Sean Spicer said the freeze was a way to convey “respect” for the American taxpayer. Trump withdrew the United States from the Trans-Pacific Partnership (TPP), a deal with 12 nations that are responsible for 40 percent of global trade. The trade deal was intended to boost economic growth and reduce tariffs and regulations. The TPP had been negotiated by Obama but not yet ratified by Congress. Trump’s executive order drew encouragement from former presidential candidate Bernie Sanders, a critic of the TPP. Trump also signaled his intent to renegotiate the North American Free Trade Agreement (NAFTA). On Inauguration Day, he signed orders affecting Obamacare and federally backed mortgages. The Affordable Care Act Trump’s executive order reflected the intent to repeal and replace the Affordable Care Act (ACA). Trump also directed federal agency heads to waive any provisions of the ACA that placed financial burdens on insurers, health care providers and patients. Federal Housing Administration Mortgages The president cancelled a .25 percentage point cut in Federal Housing Administration (FHA) mortgage premiums that were set to kick in on January 27. The FHA backs mortgages for homebuyers with less-than-perfect credit scores or who put down small down payments. According to USA Today, the FHA backs about 16 percent of American mortgages. On the Senate floor, Chuck Schumer (D-N.Y.) said the cut would have saved mortgage holders an average of $500 a year.
<urn:uuid:d041476d-fe64-4ea2-acf8-2144f4f220bd>
CC-MAIN-2022-33
http://www.colorlines.com/articles/trumps-first-week-begins-executive-orders-trade-reproductive-rights-and-federal-hiring
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00071.warc.gz
en
0.956841
472
2.46875
2
Dry Chemical Extinguishers come in a variety of types. You may see them labeled: "DC" short for "dry chem" "ABC" indicating that they are designed to extinguish class A, B, and C fires "BC" indicating that they are designed to extinguish class B and C fires. ABC extinguishers are red and range in size from 5 lbs to 20 lbs on campus. Read the labels and know their locations! You don't want to mistakenly use a "BC" extinguisher on a Class A fire, thinking that it was an "ABC" extinguisher. An "ABC" extinguisher will have a label like this, indicating that it may be used on class A, B and C fires. Dry chemical extinguishers put out fire by coating the fuel with a thin layer of dust, separating the fuel from the oxygen in the air. The powder also works to interrupt the chemical reaction of fire, so these extinguishers are extremely effective at putting out fire. These extinguishers will be found in a variety of locations. New buildings will have them located in public hallways. They may also be found in laboratories, mechanical rooms, break rooms, chemical storage areas, offices, college vehicles, etc. Dry chemical extinguishers with powder designed for Class B and C fires may be located in places such as commercial kitchens or areas with flammable liquids.
<urn:uuid:72d4b4a0-dcca-4800-b9e5-079cef59d6ff>
CC-MAIN-2017-04
http://www.cvcc.edu/About_Us/HR/Occupational_Safety/Fire/Dry.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00172-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961472
289
2.984375
3
Restoration unveils boiling pools, bubbling mud and a once lively geyserAnew project to restore an iconic geothermal wonderland has uncovered some long-hidden treasures. Boiling pools, bubbling mud and a geyser once famous for its lively displays have been unveiled after months of clearing scrub at Rotorua's Te Whakarewarewa Valley, with the promise of more to come. The work by maintenance staff at Te Puia/New Zealand Maori Arts and Crafts Institute has opened up expansive views across the area's geothermal features. Palisades in different parts of the valley, including some using trees from the Ruawahia peak on Mt Tarawera which were stripped bare by the eruption of 1886, have also been revealed. Te Puia's visitor experience manager Taparoto Nicholson told the Herald that 30 years ago the valley was largely a bare geothermal field pocked with mud pools and crossed by rough walking tracks. Part of a three-year programme, clearing work has already revealed views of the palisades, Te Puia's waka shelter, and uncovered Ngapuna Tokotura mud pools and the dormant Papakura Geyser. The geyser, named after well-known guide Maggie Papakura and situated near the Ngararatuatara cooking pool, had been a major attraction in the valley until it cooled and ceased erupting in 1979. "Simply by clearing away vegetation, we are changing the landscape," Mr Nicholson said. "It's a simple thing but it is already making a big difference and gradually making the valley once again look as it would have when tourists first started coming here more than 100 years ago." There are plans to restore other areas of the valley after this summer's peak visitor season, including overgrown tracks in the southernmost part of the reserve. The rediscoveries come as new signs of life in the valley's Waikite Geyser excite geologists. Once capable of spouting steam 20m into the air, a change in geothermal levels had indicated a possible reawakening after 40 years of silence.
<urn:uuid:e31c9c69-d501-4b04-b536-4b48fcae902c>
CC-MAIN-2017-04
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10860818
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00449-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957404
438
2.296875
2
Participants Site Details Here is the detail of our participants Mesothelioma And Lung Disease This site is dedicated to providing up to date information and research into mesothelioma and Keep Working On My blog is all about giving information to aspiring individuals who want to start an online job What Is Mesothelioma? What is mesothelioma? mesothelioma is a rare form of cancer that attack the layers of Peritoneal mesothelioma is a rare form of cancer caused by asbestos exposure. peritoneal Mesothelioma Cell Types Cell types.when examined under a microscope,mesothelioma cell types fall into three categories:
<urn:uuid:182203fb-c745-46c2-80d3-20d207686a07>
CC-MAIN-2017-04
http://www.ongsono.com/website_information/mesothelioma-working.blogspot.com
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00268-ip-10-171-10-70.ec2.internal.warc.gz
en
0.810593
153
1.742188
2
From when we’re first taught how to brush our teeth as children all the way through the rest of our lives, we’re told to brush our teeth twice a day. But how important is brushing twice daily, really? Is it really so bad if you only brush your teeth once a day? Life is crazy and busy, with school, with work, with kids, and after a late night out with friends or after a long, long day, it can be so tempting to just curl up in bed and forego your evening brushing. The American Dental Association recommends, you guessed it, brushing your teeth twice a day for two minutes both times. Some dentists recommend that you brush after every meal. So, what happens if you only brush your teeth once a day? Why Brush Your Teeth Twice A Day? We get it drilled into us that we should brush twice a day due to the fact that when you eat and drink beverages other than water, film forms on your teeth that contains bacteria. Brushing twice a day removes this buildup of bacteria. If you only brush your teeth once a day, then that plaque and bacteria will accumulate in your mouth. This can lead to all sorts of problems, from bad breath to cavities to gum disease. Sure, you’re still brushing your teeth. And perhaps you assume that so long as you brush in the morning and get rid of that morning breath, you’re good to go. This isn’t true. What Happens When You Don’t Brush Your Teeth At Night Brushing your teeth in the morning is important both for the sake of your oral hygiene and for the freshness of your breath. If you are someone who will only brush your teeth once a day, chances are that you do it in the morning for both of these reasons, and that you skip your nighttime brushing, either because you forget, you’re exhausted from a long day, or it’s become an ingrained habit. However, it’s crucial that you brush your teeth twice a day. If you only brush your teeth once a day, then you’re letting all that bacteria and all of those food particles build up in your mouth and stay there for approximately the 24 hours that goes between your brushings. You’re basically just letting all of that bacteria sit on your teeth all night and all day long. This can result in all manner of dental problems. The Consequences Of When You Only Brush Your Teeth Once A Day So, if you only brush your teeth once a day, you’ll probably have some oral hygiene issues. But you’re still brushing your teeth! How can this be? As previously mentioned, you need to brush your teeth twice a day in order to remove plaque and bacteria buildup and food particles from on and around your teeth. When you only brush your teeth once a day, you’ll end up with issues such as cavities – especially if the only time you brush your teeth is in the morning and you’ve let food sit on your teeth all night long. You could also end up with gum disease, if the bacteria that can cause it isn’t disrupted soon enough. Additionally, if you only brush your teeth once a day, chances are that you think your breath will probably be fine, so long as you clean away the morning breath. However, by not brushing twice daily, that lets plaque build up, which can cause nasty breath that you’ll need gum and mints in order to cover up. One thing always leads to another when it comes to your oral health. If you only brush your teeth once a day, you could end up needing dental work, from the inevitable cavities to more intensive conditions. What If You Only Miss The Occasional Brushing? If you only brush your teeth once a day every once in a while and you don’t make a habit out of it, you’ll likely still need to worry about cavities, but ultimately, it’s not going to kill you. Still, you should always strive for brushing your teeth twice a day. It’s only 2-3 minutes, after all, and those 2-3 minutes every day can go a long way to preserve your oral health and prevent you from needing to have costly dental work done. If you need any advice on techniques to make brushing your teeth easier or more comfortable, Northview Dental is here to help. Contact us today to learn more about why you should brush your teeth twice a day or to schedule an appointment.
<urn:uuid:cf14b504-73c5-4f92-8694-dd7671e4ce09>
CC-MAIN-2022-33
https://www.northviewdental.com/brush-your-teeth-once-a-day/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00678.warc.gz
en
0.941012
956
2.46875
2
Money on the sidewalk prank This is a funny prank to pull on unsuspecting pedestrians. Take some spare change, and super glue outside on sidewalk. Choose a place that you can see from, your house or a shop window, where people tend to walk past. When you glue the money on the sidewalk, use a penny, nickel, and quarter and put them so it looks like it could have been dropped. Wait until somebody walks by, and to their amazement, can't pick up the money!!! Big LOL :) Click here to post comments Join in and write your own page like this! It's fun and easy to do. How? Simply click here to start @ Perfect Pranks. FUN & FUNNY PRODUCTS Our recommendation lists makes it easier to find the perfect product. There are more than 30 categories. Click on any image below to view. More than 25 000 fun ideas posted over the years, including but not limited to: free printable goodies, party ideas for old and young, fun games, amazing arts and crafts, funny stuff, free templates and so much more - LOOK HERE! + follow us!
<urn:uuid:d6483a41-f625-4588-82fb-bebb41e5164b>
CC-MAIN-2022-33
https://www.fun-stuff-to-do.com/money-on-the-sidewalk-prank.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00474.warc.gz
en
0.916095
249
1.8125
2
Despite being written thousands of years ago, there are still new subtleties to be derived from the study of ancient Jewish and Christian sources. Caitlin Ganter spoke to Dr Ruth Sheridan who is reading the scripture in a new light. When a text is as old as the Gospel of John, one might think the entire tale has been told. Yet ACU Adjunct Research Fellow Dr Ruth Sheridan has examined the scriptural citations in the Gospel of John and made some interesting conclusions. Her book Retelling Scripture: The Jews and the Scriptural Citations in John 1:19-12:15 is an expansion on the Doctor of Philosophy degree she completed at ACU in 2011. “A lot of the previous literature on the subject looked at the Gospel author’s method of citation, or tried to determine the textual form of the citations, for example which precise text from the Old Testament was the author relying on,” said Dr Sheridan. “One of the main objectives of my research was to understand the extent to which the Gospel author deviated, if at all, from his source texts and then to make judgments about that deviation. Usually the conclusions tended in the direction of saying something about the Gospel’s Christology – its theological ideas about Jesus. “My thesis took into account all of that research, but brought a different methodological focus to the problem. I wanted to see what rhetorical function the scriptural citations had at the level of the Gospel narrative, particularly how they worked to shape the characterisation of the speaker and listeners in the narrative of the Gospel. “I began to notice that there were certain patterns at work in this: a character group bluntly called ‘the Jews’, were the audience for most of the citations in chapters 1 to 12, and these citations carried their own unique introductory formula. “I built on other research to argue the citations functioned to negatively characterise ‘the Jews’ and to implicitly encourage an ‘ideal reader’ of the Gospel to do the same. My research interest was squarely on the issue the anti-Judaism of the Gospel. I wanted to see how the Gospel’s scriptural hermeneutic tied in with this issue, and it opened up to an oft-noted paradox in the research, that the Gospel appears both very ‘Jewish’ and at the same time, most ‘anti-Jewish’. “However, this is a bit of an uneven paradox, so my further research will look into demonstrating how the negative connotations associated with the character group ‘the Jews’ in the Gospel outweigh the positive ones, not just statistically, but in the intensity of their vituperative rhetoric and what implications this has for how scholars perform historiographical research on the Gospel community.” The research is innovative, and Dr Sheridan won the prestigious 2013 Manfred Lautenshlaeger Award for Theological Promise (formerly called the John Templeton Award) for her book. The international award is made for the best first book published by the winning candidate after they receive their doctorate and before they turn 35-years-old. Dr Sheridan is only the second Australian to win the highly coveted award. “When I found out it felt weird, and then, when I got used to the idea, really incredible. At first I thought someone was playing a trick on me... it’s just one of those things that no sensible person ever expects to win – it’s just so ridiculously competitive. So when I got the email I actually couldn’t believe it. “It was all the more wonderful because when I wrote the thesis, I was in a really unique space. I’d just given birth to my first son and balanced writing with caring for my new baby. Being a mother helped me to break through all barriers of procrastination and doubt, and enabled me just to do the thesis without any concern for whether I passed or failed, or whether or not it was good. “Sometimes working in the Australia-Pacific region can feel isolating. I really felt that cultural difference in the US last year at a conference where one could sense the notion that status attaches to geography or a particular college. But winning the award helped me to believe in myself a bit more despite those superficial issues.” With one largely successful publication behind her, Dr Sheridan continues to keep busy and has many new projects in the works. “I am currently working as a post-doctoral research fellow at Charles Sturt University, which has been an absolutely wonderful job. Two articles, both on the Gospel of John and anti-Judaism, will appear this year as a result of this funding,” she said. “I am also writing another book on the Gospel of John and intertextuality for T & T Clark/Bloomsbury, and that should be done by the middle of next year, as well as working on other projects. I do keep busy, but also try to keep sane, and not cave to the ‘publish-or-perish’ mentality. After all, as someone told me, writing is not about being a machine, and I think my best writing comes from a patient place.”
<urn:uuid:571ed388-4c32-4952-b954-0e07e5bb5393>
CC-MAIN-2017-04
http://www.acu.edu.au/about_acu/our_university/publications/insight/2013/winter/retelling_scripture
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00252-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968291
1,095
2.265625
2
|Otieno, DO; Kreyling, J; Purcell, A; Herold, N; Grant, K; Tenhunen, J; Beierkuhnlein, C; Jentsch, A: Drought responses of Arrhenatherum elatius grown in plant assemblages of varying species richness, Acta Oecologica, 39, 11-17 (2012)| |Stichworte: EVENT 1| Evidence exists that plant community diversity influences productivity of individual members and their resistance and resilience during and after perturbations. We simulated drought within the long-term EVENT experimental site in the Ecological-Botanical Garden, University of Bayreuth to understand how Arrhenatherum elatius (L.) responds to water stress when grown in three different plant assemblages. The set-up consisted of five replications for each factorial combination of drought and plant assemblages differing in functional diversity. Leaf water potential (ΨL), leaf gas exchange, natural 13C, plant biomass and cover were measured. Imposed drought had different effects on A. elatius, depending on plant assemblage composition. Severe water stress was however, avoided by slowing down the rate of decline in ΨL, and this response was modified by community composition. High ΨL was associated with high stomatal conductance and leaf photosynthesis. Biomass production of A. elatius increased due to drought stress only in the least diverse assemblage, likely due to increased tillering and competitive advantage against neighbours in the drought treated plants. Our results indicate that beneficial traits among plant species in a community may be responsible for the enhanced capacity to survive drought stress. Resistance to drought may, therefore, not be linked to species richness, but rather to the nature of interaction that exists between the community members.
<urn:uuid:cde6eaef-3753-4ec9-9d58-54d3b0bc05c5>
CC-MAIN-2022-33
http://www.biogeo.uni-bayreuth.de/biogeo/de/pub/pub/pub_detail.php?id_obj=102613
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00271.warc.gz
en
0.922637
407
2.21875
2
[rfc-i] Fwd: Comment on headers-and-boilerplates touch at ISI.EDU Wed Dec 17 16:37:02 PST 2008 -----BEGIN PGP SIGNED MESSAGE----- I agree there is utility in stating whether a doc is standards track or not standards track. I don't agree that there is utility in explaining how each document has been vetted - or not. Many independent-stream docs have been reviewed more throughly and competently than some in the IETF stream. There is no useful information in explaining the details of what makes a document part of a given stream. In either case, we don't need to explain the details in each document (of how it is reviewed, or what each waypoint in the standards track process means); we can easily point to other doc(s) that provide details, just as other docs now provide the details of IPR issues Cullen Jennings wrote: > One of the most valuable things the IETF has is the brand around term > RFC. People want to have their protocol be an RFC because that > implements a level review and consensus around the solutions. People > are often willing to give up change control of a proprietary protocol > in trade for the type of acceptance that many RFCs imply. I want to be > careful not to create an environment that slowly erodes away any value > of an RFC. > Clearly there are people that think all RFC are standards, and we need > to educate them, but these people do actually read the RFCs. They > often implement them and they often specify them as requirements to > other people that need to implement them. I regularly have to deal > with vendors and customers that are do not realize any RFC are > different from others RFCs - I'm sure you have all had similar > experiences. I think the boiler plates are really most important for > the people that are not familiar with the streams and tracks. Because > of this I would like whatever we choose to have a few properties (and > it arguable that it already has all of these) > 1) Things that are not standards track are identified as not an > standard. I understand that argument that it's nuts try and list > everything that something is not but I find it very useful to be able > to point out a specific document and point out that it says it's not a > standard right on the front page of the document. I think this > negative property is worth identifying. > 2) I want to differentiate the breadth and type of review that a > document received. I want to clear identification of the different > type of review an Informational or experimental document gets from > IETF LC, vs IRTF, vs Independent. For things that were not reviewed > by IETF, I want to be clear there we not reviewed by the IETF. I am > fine an IETF stream informational documents that are not IETF LC end > up marked as not reviewing by IETF. > All of the things being proposed here are significantly weaker than > what gets currently used on some documents. That being > The IETF disclaims any knowledge of the > fitness of this RFC for any purpose and in particular notes that > the decision to publish is not based on IETF review for such > things as security, congestion control, or inappropriate > interaction with deployed protocols. > I understand the desire not to put such negative sounding language on > everything, and I understand the total insanity of clamming that a > document from the "Internet Congestion Control Research Group" > authored by Sally Floyd would have a note on that indicates it was not > reviewed for congestion control. But that said, I do think that on > many documents we need to be clear about the limitations if they are > going to be RFC. > For an Independent stream Information, today we would often have: > This memo provides information for the Internet community. It > does not specify an Internet standard of any kind. Distribution of > this memo is unlimited. > This RFC is not a candidate for any level of Internet Standard. > The IETF disclaims any knowledge of the fitness of this RFC for any > purpose and in particular notes that the decision to publish is not > based on IETF review for such things as security, congestion control, > or inappropriate interaction with deployed protocols. The RFC > Editor has chosen to publish this document at its discretion. > Readers of this document should exercise caution in evaluating its > value for implementation and deployment. See RFC 3932 for more > The middle ground text that Olaf send 12/12 would result in the > following headers on > This memo is not an Internet Standards Track specification; <it is > published for other purposes>. > This memo provides information for the Internet > community. This memo does not specify an Internet standard of > This document is a contribution to the RFC > Series, independently of any other RFC stream. The RFC Editor has > chosen to publish this document at its discretion and makes no > statement about its value for implementation or deployment. It > is not a product of the IETF stream and is therefore not a > for any level of Internet Standard; see section Section 2 of > I think I can live with this though I find the lack of cautionary > statements somewhat troubling. I agree the word stream is a bit weird. > I do think it is critical that it continues to say it is not an a > product of the IETF and not a standard. > This was a very long winded email to get to the point of, I could live > with the Olaf middle ground text send 12/12 and I'd be happy to see > that rephrased to get rid of the word stream. But if we want to move > text that does not say it is "not a product of IETF", then I would be > arguing for an IESG note closer to the current text instead of having > no IESG note. From a point of view of please make it easy for the IESG > to be lazy, I would clearly prefer the IESG not having to think about > IESG notes and believe that is better for everyone from authors, to > stake holders in other steams, to IESG. > Thanks, Cullen > rfc-interest mailing list > rfc-interest at rfc-editor.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org -----END PGP SIGNATURE----- More information about the rfc-interest
<urn:uuid:b3852180-a184-45cd-b92a-fc7468784813>
CC-MAIN-2017-04
http://www.rfc-editor.org/pipermail/rfc-interest/2008-December/001121.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00346-ip-10-171-10-70.ec2.internal.warc.gz
en
0.935568
1,465
1.59375
2
TOC-4200 is granted MCERTS accreditation The TOC-4200 online total organic carbon analyser has been granted MCERTS accreditation based upon the performance standards and test procedures set for continuous water monitoring equipment. MCERTS is the Environment Agency of England & Wales (UK) Monitoring Certification Scheme. It provides the framework for businesses to meet quality requirements. Compliance with MCERTS gives the Environment Agency confidence in the monitoring of emissions to the environment. MCERTS is quickly becoming an internationally required performance and reliability standard by companies and authorities around the world that want to ensure that they are doing their utmost to protect the environment around them by using equipment with this accreditation. Requirements to gain this certificate include laboratory testing and a 3-month field test under real conditions. The TOC-4200 achieved 100% uptime in the field test highlighting its robustness. The TOC-4200 is the only online TOC analyser that utilises catalytic combustion oxidation technology, with MCERTS accreditation, available on the market. This technology is a clear advantage for anyone interested in analysing water and effluent that has a high salt content, suspended solids, or particulates, and the most complex of organic compounds. The certificate (MC160311/00) covers the ranges, 0-100, 0-500, 0-1000 and 0-10,000 mg/L of Total Organic Carbon. Utilising the automatic conversion function of the TOC-4200 to determine COD values.
<urn:uuid:7d3ff6fe-87c7-4ebf-a758-d8f8e579dd24>
CC-MAIN-2022-33
https://www.shimadzu.eu/mcerts-accreditation
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00670.warc.gz
en
0.908233
322
1.6875
2
Eliud Kipchoge in action in Vienna (© Michael Gruber) World Athletics Heritage is delighted to celebrate 200 years of running on Vienna’s famous Prater Hauptallee, with the award of World Athletics Heritage Plaque in the category of ‘Landmark’. The Prater, one of the most famous city parks in the world, covers an area of 6,000,000m2 in the centre of the Austrian capital. Traversing the park is the Hauptallee, a flat 4.3-kilometre-long paved route, lined with chestnut trees, which is closed to traffic and is easily accessible. This morning, the Mayor of Vienna Michael Ludwig received the Heritage Plaque in a ceremony at Vienna City Hall. The plaque will be displayed permanently next to the Prater Hauptallee, which has been the home of organised running races since 1 May 1822. Vienna Mayor Michael Ludwig and Vienna City Marathon race director Wolfgang Konrad with the Heritage Plaque (© VCM / Leo Hagen) "The City of Vienna is proud to be the recipient of the World Athletics Heritage Plaque for the Prater Hauptallee," said Ludwig. "This international award makes us aware of what a globally outstanding place the Prater Hauptallee is for running and running events. Sports history and the present are linked in a large, urban green space. I thank the Vienna City Marathon for its initiative and hope that the World Athletics Heritage designation for the Hauptallee will motivate even more people than before to enjoy running and being active here." The World Athletics Heritage Plaque, a location-based recognition, is awarded for “an outstanding contribution to the worldwide history and development of the sport of track and field athletics and of out of stadia athletics disciplines such as cross country, mountain, road, trail and ultra-running, and race walking”. The Prater Hauptallee is Austria's No.1 running location, the venue for about 30 running events a year. These include the Vienna City Marathon and the Austrian Women's Run. The area made global history on 12 October 2019 when Eliud Kipchoge ran the world’s first sub-two-hour marathon. A brief history of running events on the Prater Hauptallee 1822 to 1847 ‘Lauferfest’ (Runners' Festival) Race between the professional runners (footmen) of the nobility in Vienna. A race of about 9-10km with tens of thousands of spectators was held on 1 May each year. 1919 to 1966 ‘Quer durch Wien’ (Across Vienna) The extraordinarily popular historic relay race ‘Quer durch Wien’, which was held from 1919 without interruptions until 1966, always had its finale along the Prater Hauptallee to sports ground of Wiener Athletiksport Club. Frequent running events since 1977: including Vienna City Marathon Austria's largest sporting event with up to 42,000 participants. World Athletics Label. Founded in 1984. A quarter of the VCM route runs over the Prater Hauptallee. Austrian Women's Run First held in 1988, this event has been held in the Prater and on the Hauptallee since 1992, with a brief interruption. Up to 35,000 women take part over 5km and 10km. Wien Energie Business Run Annual running event for company teams in the Prater, held since 2001. Up to 30,000 participants. INEOS 1:59 Challenge On 12 October 2019, the Prater Hauptallee was the venue for the first marathon run within two hours. Eliud Kipchoge clocked 1:59:40.2 hours in front of 120,000 spectators in a specially prepared race. Chris Turner for World Athletics Heritage
<urn:uuid:e30e43ed-bd28-4c1d-8328-d5f5726c1ebe>
CC-MAIN-2022-33
https://www.worldathletics.org/heritage/news/heritage-plaque-prater-hauptallee
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00268.warc.gz
en
0.923122
824
2.015625
2
Dylan turned 74 on his birthday, May 24, 2015. Dylan was born a Jew named Robert Allen Zimmerman (Hebrew - Shabtai Zisel (or Zushe) ben Avraham) in 1941 in Duluth, Minnesota, and raised there and in Hibbing, Minnesota. His paternal grandparents, Zigman and Anna Zimmerman, emigrated from Odessa, Russia around 1905. His mother's grandparents, Benjamin and Lybba Edelstein, were Lithuanian Jews who arrived in America in 1902. His paternal grandmother's maiden name was Kyrgyz and her family originated from Istanbul. Dylan’s parents were Abram Zimmerman and Beatrice "Beatty" Stone. When Dylan was six, his father was stricken with polio. The family returned to Hibbing, where Zimmerman grew up. A few years back Dylan recorded a Christmas album. Ryan McDuff, from the blog Bully! Pulpit reported: LOS ANGELES, Calif -- Bob Dylan is recording his first Christmas album, Bullypulpit.com has exclusively learned and has been quietly compiling a collection that includes both Christmas carols and modern songs. At least four songs have reportedly been recorded for the album including, “Must Be Santa,” “Here Comes Santa Claus,” “I’ll Be Home For Christmas" and “O Little Town of Bethlehem.”Dylan's spiritual pendulum swings back and forth. In 2007 Dylan went to Chabad Lubavitch for Yom Kippur, where he got an aliyah to the Torah. JTA Reported back then: The recording sessions have been taking place at fellow recording artist Jackson Browne's Groove Master’s Studios in Santa Monica, California, where Browne produced his album, "I’m Alive." Prominent media expert and best-selling author Michael Levine said the move by Dylan was "completely consistent with his longstanding tradition of doing the unexpected. Concerning Bob Dylan literally nothing would surprise me which of course is part of his lasting appeal. He confounds like no other pop artist ever." The inclusion of “O Little Town of Bethlehem," written by an Episcopal priest named Phillips Brooks in 1867 after a pilgrimage to the Holy Land, is likely to fuel speculation about Dylan's religious beliefs that have swirled ever since he publicly converted to Christianity in 1979, recorded explicitly religious material on three subsequent albums and for a time refused to play his old songs. Religious references on subsequent recordings became less overt after 1981's "Shot of Love." The other three songs, “Must Be Santa” by Hal Moore and Bill Fredricks, “Here Comes Santa Claus” by Gene Autry and Oakley Haldeman and “I’ll Be Home for Christmas” by Buck Ram, Kim Gannon and Walter Kent were all written between 1943 and 1960. "A Christmas album by Bob Dylan in the pipeline doesn't really shock me," said Scott Marshall, author of a forthcoming book on the singer, "God and Bob Dylan: A Spiritual Life". "At first glance it may sound bizarre, but I don't think Dylan cares much about what his detractors might make of it. Dylan still sings songs from "Slow Train Coming" to this day and he's both never renounced being Jewish or renounced his experience with Jesus some three decades ago. He remains enigmatic and this will probably be talked about for years to come." Bob Dylan's religious odyssey took a turn home on Yom Kippur.As always be sure to see my friend Larry Yudelson's Tangled Up In Jews site for more background on the Jews and Jewishness connected with Bob Dylan. The folk legend attended services at the Chabad-Lubavitch of Atlanta... Dylan was born Jewish but has dabbled in several faiths. He arrived at morning services wearing a ski cap and a tallit, and stayed for the duration, the Web site said. Dylan was called to the Torah for an aliyah by his Hebrew name, Zushe ben Avraham, according to the Chabad outpost's rabbi, Yossi Lew. Dylan was in Atlanta for a concert following the holiday.
<urn:uuid:353c3b9d-dbcf-4159-9ad8-e02576eee51f>
CC-MAIN-2016-44
http://tzvee.blogspot.com/2007/09/bob-dylan-goes-chabad-lubavitch-for-yom.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00025-ip-10-171-6-4.ec2.internal.warc.gz
en
0.97427
863
2
2
Michael Ernest is correct when he says in his letter ("Democrats are to blame for the government shutdown," Oct. 15), that "It is a fact that House members have the right to make such spending decisions." Similarly, the president of the United States and the U.S. Senate have a right to veto or vote against such spending decisions. They also have a right to veto or vote against every single spending bill brought by the House unless the House votes in specified ways. Just like the House has a right to prevent any bill to come up for a vote that does not contain a repeal of Obamacare. Is all this constitutional? Sure. But as Justice Antonin Scalia says, "A lot of stuff that's stupid is not unconstitutional." Legislative extortion is stupid, even if it is not unconstitutional. Steve Cohen, South Windsor, Conn.
<urn:uuid:43f8dca8-674e-47ad-9620-50b3d19d9321>
CC-MAIN-2016-44
http://www.ctnow.com/bs-ed-democrats-letter-20131016-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00199-ip-10-171-6-4.ec2.internal.warc.gz
en
0.97064
171
1.664063
2
Sweet’s syndrome, named after the physician who first described the condition, is also known as acute febrile neutrophillic dermatosis. The initial manifestations of this condition are non-specific and often overlooked. These include fever, elevated white blood cell count and flu-like symptoms. As the condition progresses, the patient will abruptly develop numerous tender, red or purple, plaques and papules on the arms, head, neck and trunk. Sweet’s syndrome is a relatively unusual but not rare dermatologic condition. It demonstrates a female prevalence; occurring about four times more commonly in women than men. The exact mechanism underlying Sweet’s syndrome is not known at this time. One of the current hypotheses equates the disease to the body developing a hypersensitivity reaction to an underlying infection, autoimmune disease, medication or cancer. The role of the neutrophil, which is a specialized form of white blood cell, in Sweet’s syndrome is thought to be an inappropriate response to cellular signals known as cytokines and growth factors. When present in excess amounts, cells like neutrophils will respond to theses signals and infiltrate the skin leading the characteristic rash. The cutaneous manifestations of Sweet’s syndrome include tender, non-itchy, red-to-purple papules and plaques that can enlarge as the disease progresses. Sometimes these lesions enlarge and may coalesce to cover large areas of the body. Patients can also develop significant swelling within and around the rash that give them a blister-like appearance. The distribution of skin lesions has a predilection for the head, neck and arms. In cases where Sweet’s syndrome is secondary to an underlying disease, the eruption becomes more widespread, occurring anywhere on the body. Furthermore, up to 80% of individuals develop a fever >100.4F and upper respiratory flu-like symptoms. Criteria for the diagnosis of Sweet’s syndrome include 2 major criteria and 4 minor criteria. To confirm the diagnosis, both major and 2 additional minor criteria must be met. They include: - Sudden onset of classical skin lesions - Histological examination consistent with Sweet’s syndrome - Fever or constitutional signs and symptoms - Elevated number of white cells in the blood - Marked improvement to the administration of steroids - Associated with malignancy, inflammatory disorder, drug exposure, vaccination or infection Sweet’s syndrome in and of itself is a benign condition. If left alone, the lesions will resolve spontaneously but may recur in up to 30% of patients. If the disease is secondary to an underlying disease, treatment of the primary condition is recommended. The traditional therapy for Sweet’s syndrome is oral prednisone at doses of 0.5-1.0mg/kg/day for 4-6 weeks. Alternatives to prednisone include dapsone, potassium iodine and colchicine. Back to Index The medical information provided in this site is for educational purposes only and is the property of the American Osteopathic College of Dermatology. It is not intended nor implied to be a substitute for professional medical advice and shall not create a physician - patient relationship. If you have a specific question or concern about a skin lesion or disease, please consult a dermatologist. Any use, re-creation, dissemination, forwarding or copying of this information is strictly prohibited unless expressed written permission is given by the American Osteopathic College of Dermatology.
<urn:uuid:f14a5ced-1d70-41ed-be4e-a2ac4d7ecb64>
CC-MAIN-2017-04
http://www.aocd.org/page/SweetsSyndrome/Sweets-Syndrome.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00281-ip-10-171-10-70.ec2.internal.warc.gz
en
0.929656
713
3.109375
3
Conflicts regarding the Anti defection law. Its issues With the ongoing developments in Rajasthan once again this topic comes into play. The purpose of anti-defection law was to prevent Member of Parliament or state legislature not to switch any party. Hence providing that politician would remain intact to the mandate of the people. This would also prevent corruption among the political party.52nd Amendment Act of 1985 provided for the disqualification of the Member of Parliament and state legislature on ground of defection from one political party to another. Later 91st Amendment Act of 2003 made one change in the provision of 10th schedule. In case of split the disqualification on the ground of defection won’t be applicable. When a political member does is disqualified? If he voluntarily gives up the membership of the political party he is from. If he votes or abstains from voting which goes to the contrary to any direction issued by his political party without prior permission. Such act can be forgive by the party within 15 days When an independent member does is disqualified? Independent candidate who was elected without being a member of political party but joins the political party after election, his membership is cancelled. When a nominated member does is disqualified? A nominated member is disqualified on the ground if one joins the political party after the expiry of six months. Every law comes up with some exemption what they are, Let’s have a look. If a member goes out of this party as a result of a merger of the party with another party. A merger will take place only he has 2/3rd of the member who is willing to with merger. If a member after being elected as presiding officer of the house gives up the membership of the party and rejoins the party after he quits the job of presiding officer. This exemption is given in order to give the office of presiding officer to be impartial. Who has the deciding authority? The decision of the presiding officer is final. In the original act decision of the presiding officer is final and could not be challenged in any court. In Kihoto Holohan Case the basic question that was raised whether by giving absolute power to the speaker through the 10th schedule violates the basic structure doctrine. Majority Judgement : The speaker of the Lok Sabha and the Chairman of the Rajya Sabha are the guardian of the rights of an privileges of the house. Ensures greater stability in the elected government Facilitates democratic realignment of parties in the form of merger. Reduces corruption in the party level so that none of the member of the parliament or Legislative assembly is carried away by the bribes from the opponent party. It fails to differentiate between dissent and defection. Member could not express his view if it goes against the party. Member is bound to follow whatever is pre decided.
<urn:uuid:ee89b5d7-753a-454f-85fc-00ae3e438e9a>
CC-MAIN-2022-33
https://study1here.com/anti-defection-law/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00666.warc.gz
en
0.975242
598
2.140625
2
The P/E ratio is important because it provides a measuring stick for comparing whether a stock is overvalued or undervalued. A high P/E ratio could mean that a stock's price is high relative to Ratios Can’t Always Tell if a Stock is Undervalued. Last Updated: June 11, 2019 By Shailesh Kumar, MBA . Learn to Beat the Market | Get the Value Investing Case Studies | Get Our Value Stock Picks. Financial ratios are an integral part of a value investor’s arsenal. But, they do not always tell the full story. An undervalued asset is an investment that can be purchased for less than its intrinsic value. For example, if a company has an intrinsic value of $11 per share but can be purchased for $8 per share, it is considered undervalued. Intrinsic Value. An investment is either overvalued or undervalued relative to its intrinsic value. This undervalued stock is trading at a rock-bottom 0.6 PEG ratio, with the majority of its shares owned by institutions. Third-quarter sales rose 21% over the same period last year. If P/E ratio of your stock is lower than the majority of relevant competitors, then it’s undervalued and can be considered for investing after further research. Another best way to use the profit to earnings ratio to know when a stock is overvalued or undervalued is to compare it with the industry average P/E ratio. See a list of Undervalued Growth Stocks using the Yahoo Finance screener. Create your own screens with over 150 different screening criteria. Investors who purchase stocks that are below their intrinsic value are called “ value investorsStock Investing: A Guide to Value InvestingSince the publication of " 1 Apr 2013 Many investors pay close attention to price-earnings ratios for clues on whether a stock is overvalued or undervalued. But that approach 22 Aug 2016 So we find that the rate of return an investor receives is simply earnings yield (r = e / p), the inverse of the common P/E valuation ratio. 24 Jun 2018 In absolute terms, stock prices aren't overvalued or undervalued. such undervalued stocks that are available at lesser PE multiple ratios than Generally, when a PEG ratio comes in lower relative to its peers, the more the stock may be undervalued based on its earnings performance. A PEG ratio below one is typically thought to indicate 30 Jan 2020 Below we've highlighted a list of 25 pot stocks with P/B Ratios that could be viewed as undervalued and therefore might make attractive value It is price to earning ratio. It explain the relationship between stock price and companies earning. It indicate what market is willing to pay for the companies earning. 1 Jan 2020 A price to book ratio of less than 1 means that the company is undervalued compared to what it possesses. This might be because the company The EV/EBITDA ratio is often used by value investors to identify undervalued For these reasons, screening for stocks with low EV/EBITDA ratios is a great way 24 May 2019 For example, a lower P/E ratio could mean that a stock is undervalued. But it can also mean that investors believe the company's earnings are Undervalued Growth Stocks Graham Number > Current price AND PB X PE <= 22.50 AND PEG Ratio >0 AND PEG Ratio <1 AND Altman Z Score >=2.5 AND 11 Feb 2020 A ratio of 1 means that the company is fairly priced, while a ratio of less than 1 means that the company is undervalued. The reason I prefer this The P/E ratio varies across industries and a stock is undervalued or overvalued . See a list of Undervalued Growth Stocks using the Yahoo Finance screener. Create your own screens with over 150 different screening criteria. 17 Dec 2019 Other investors like to look solely at price-to-earnings (P/E) ratios or Here are seven Dow stocks that are viewed as undervalued for 2020. 3 Jan 2020 Apple stock's PE ratio has doubled in the past 12 months. Investors are confident in the firm's expansion into new markets and popularity of new An undervalued stock will usually have a low PE ratio. For example, a PE ratio of 10 is much better than a PE ratio of 20. Some high-flying Internet stocks had PE The P/E ratio varies across industries and a stock is undervalued or overvalued . 3 Dec 2007 Overall, more research is needed to develop the model to be utilized in practice. Keywords: discriminant analysis, stock valuation, financial ratio Valuation ratios put that insight into the context of a company's share price, ratio (P/E) looks at the relationship between a company's stock price and its A PEG of 1 or less is typically taken to indicate that the company is undervalued. Undervalued stocks: Trade at price to book rapos below the median for the sector ,(2.05), generate returns on equity higher than the sector median (11.82%) and 17 Dec 2019 Other investors like to look solely at price-to-earnings (P/E) ratios or Here are seven Dow stocks that are viewed as undervalued for 2020. 3 Jan 2020 Apple stock's PE ratio has doubled in the past 12 months. Investors are confident in the firm's expansion into new markets and popularity of new 24 Jan 2020 Several ratios can be useful in assessing a stock's value. Here are some of the most important: Price-to-earnings ratio (P/E). The price-to-earnings Market value ratios are also used to analyze stock trends. For example, a company's low price-earnings ratio may indicate the stock is an undervalued bargain in How to Find Undervalued Stocks – Top 4 Stock Metrics. Price to Earnings Ratio; Growth Rate (PEG Ratio); Dividend Growth Rate; Dividend Yield The graph shows the ratio price to fair value for the median stock in the selected The further it moves below 1.00, the more the median stock is undervalued. View a list of stocks with low price-to-earnings growth (PEG) ratios at MarketBeat. A PEG of less than 1 is considered to indicate a stock that is undervalued 1 Feb 2018 Here are seven signs a stock could be undervalued. 1. The Current Ratio. The current ratio is simply a company's current assets divided by 28 Feb 2020 Value stocks are often classified by low valuation ratios. deal, because investors can earn sizable returns by buying undervalued stocks.
<urn:uuid:ddc91e5f-30ce-4f43-a005-bba06f402063>
CC-MAIN-2022-33
https://platformmflcvbj.netlify.app/siruta3731coq/undervalued-stocks-ratios-pexo.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00274.warc.gz
en
0.936109
1,348
2.28125
2
Georg H. Endress (9 January 1924, in Freiburg im Breisgau, Germany – 14 December 2008, in Arlesheim, Switzerland) was a German-Swiss entrepreneur in the area of measurement and control technology, and founder of the company Endress+Hauser. Life and work Georg Endress was born the son of a factory director. As a young man he moved to Zagreb with his family, where he went to school. He attended further schools in Basle (Switzerland) where he passed school-leaving exams, and then took an apprenticeship as a mechanic, after which he studied engineering in Zürich. He worked for several Swiss companies, and one English firm, before founding a sales company for level measuring devices in Loerrach in 1953 together with the banker Ludwig Hauser, which later became Endress+Hauser AG. The firm began producing its own instruments in 1956. After achieving success in Europe subsidiaries were opened in the USA and Japan (1970) and China (1980). In 1995 Georg Endress handed over control of the firm to his son Klaus Endress. Georg Endress felt a particular responsibility towards the Dreiländereck (“three-country-corner”) where Germany, France and Switzerland meet, where he wanted, as he himself said, to remove psychological national barriers. He initiated Tri-Nation Apprentice and Engineering education opportunities in the upper Rhine area, promoted international courses at the University Loerrach. The tri-nation BioValley-Organisation was formed on his initiative. In addition, he was involved in Baden Trade Organisation (WVIB, Wirtschaftsverband industrieller Unternehmen Baden) and the Regional Trade Association Black Forest and Upper Rhine. (Regio-Gesellschaft Schwarzwald-Oberrhein) He married Alice Vogt in 1946; of their eight children five were active in Endress+Hauser AG at the end of 2008. Honours and awards - Federal Cross of Merit, 1st Class - Honorary Doctorate of the University of Basle - Honorary Doctorate of the University of Freiburg - Medal of Service of the State of Baden-Württemberg - Chevalier de la Legion d‘Honneur 2000 - Honorary President of the Bio-Valley and Trade Association WVIB - Honorary Citizenship of Indianapolis (USA) and the community of Maulburg (Baden-Wuerttemberg) - The Upper Rhine University Prize Prix Bartholdi was awarded to Georg Endress posthumously in 2011. - Together with Lothar Spaeth, Martin Saettler, Rainer Roeder und Dieter Pfister) Technologietransfer in Konzeption und Praxis (Technology Transfer, Conception and Practice). Poller, Stuttgart 1987, ISBN 3-87959-305-1 - Veröffentlichungen des International Hightech Forum, Basel 3). (Publication International Hightech Forum, Basel 3). - Knowledge, Education, Quality. Georg H. Endress on his 80th birthday The Significance of the Educated Entrepreneur and Manager for a Complete and Sustainable Development in Space and Time, Basle, 2005) - Felix Erbacher: Out of the Garage and into the World. Georg H. Endress (1924-2008), a charismatic thinker and visionary, in:Basler Zeitung, 29. Juli 2013, S. 27.
<urn:uuid:21fca289-06f6-4750-899b-72d09b53e337>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/Georg_Endress
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00269.warc.gz
en
0.896774
790
1.578125
2
What can I use to get rid of geckos? I need something that can be sprayed in the house as they seem to get inside a lot. There are no toxic products labeled for geckos, lizards or any reptiles or amphibians, and given the highly beneficial nature of these creatures there is not likely to be any products for them any time soon.The reason they are on your property are because they can find food and proper habitat. Take away their food and they will forage somewhere else. Take away the conditions they need for hiding and they will seek refuge someplace else. You really have two options here: 1.Exclusion. Total exclusion can be hard to achieve particularly around the roof-line where there are going to be gaps that would be very hard to close off, but there also could be some obvious flaws such as broken vent screens, holes around cables, pipes or wires, or gaps under doors. All of these can easily be closed with brush strips, caulking, copper mesh (Stuf-Fit), or some other suitable material. Exclusion is the best choice, because it is permanent, and eliminates or reduces the problem in the future too. 2.Outdoor habitat modification. In short, get rid of the reasons geckos are there in the first place. They are there because they are finding the food they need to survive (insects) and a place to harbor. If you can eliminate either of these essentials, you can get rid of the geckos. Spray a good residual insecticide such as Cyper WP around the outside of your home to help cut down on the number of insects the geckos are eating. If geckos cannot find enough food they will either move on or starve. Eliminate as much clutter and debris around the outside of your home as possible to eliminate the places geckos like to hide. Rake back mulch or rocks at least 6 inches from the structure. If you need to get rid of the geckos that are already indoors the only options are catching them by hand or using glue boards placed in areas where the geckos travel. Answer last updated on: 10/06/2010
<urn:uuid:1174e9fc-877e-419e-bd1b-c548e43e0527>
CC-MAIN-2017-04
http://www.domyownpestcontrol.com/what-can-use-to-get-rid-of-geckos-qa-1758.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00157-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952453
451
1.703125
2
What happens when you bring together an auditory specialist, a Hispanic newspaper publisher, a games and simulation designer, a cognitive skills specialist, a neurosurgeon, and an educational entrepreneur? Not much, you might think. Well, we’re out to prove you wrong, oh doubtful one! Therefore, Eye2theWorld announces the formation of a special E2TW Consortium. It is charged with both advising us as per our direction and providing us with tangible assistance when possible. All of the members are very busy with their own activities. But they are demonstrating a common commitment to education and life long learning. Who are they? Check their biographical sketches below. When we originated Eye2theWorld our goal was not to have an organization tailored solely to the gospel of “St. Joseph”. Rather it was to be an organization using the backgrounds, talents, and perspectives of many people to present a variety of ideas helpful as we move through the 21st century. Some of those ideas will be and have been presented in this Ezine; some are in books and other media that we recommend. We share a belief that there is no one road to a successful future; but that whatever roads are taken, they must be paved with life long learning. We asked members to tell us what they thought Eye2theWorld’s overarching goals should be. Here are their answers: * inspire and transform education as we shift into the technological worlds of the 21st century. * secure funding for all schools so that all students have equal opportunity to learn. * expose all students to cognitive training until they are able to function at grade level or above in all subjects. * support or develop programs that allow all students to develop to their fullest potential by providing maximum cognitive, learning, emotional training and support in a positive environment. * help individuals achieve their dreams and lead successful, productive lives in the world of tomorrow. Some might say statements such as these are like being “for motherhood” and “agin sin”. They may be right. But that’s how programs are started. You begin with very broad goals and then fit more specific objectives and detailed programs into them, always keeping our eyes on the prize. Do you have comments? Please let us know. Eye2the World Consortium Members Joe Rueff is an educator with more than a half century of experience at all levels of learning, from pre-school through adult and community education. Programs related to innovative ideas for life long learning are in his blood. He’s been a teacher, a coordinator, director, lecturer, and founding presidents of four educational non-profits. He coordinated programs in both career and economic education and was responsible for program evaluation in the Elkhart Community Schools. Projects he has directed have received local, state, and national awards. In 1990 Joe founded the Learning Society, a local advocacy organization for life long education. In 1991 he founded Views on Learning, Inc., (VOL) with support from a colleague Bob Hostetler, former CEO of CTS Corporation and subsequently president of several wireless cable television companies. VOL’s mission was to secure FCC licenses for educational television programming called Instructional Television Fixed Service (ITFS) in conjunction with wireless cable companies. From 1991 to 2005 VOL secured 22 licenses nationally and became a leading company in the industry. Currently it is moving into the broadband internet arena. Joe was founding President of the Indiana Distance Learning Association in 1999 and remains a member of its Board of Directors. Recently Joe left VOL and has founded Eye2theWorld. It is built upon the basic ideas central to both The Learning Society and Views on Learning. Rita Zimmerer has a list of accomplishments that could fill more than one of our pages. Let me summarize some of her outstanding achievements here. She is the Founder and CEO of Twinlights Studios Ltd. Twinlights Studios developed the first Interactive Video Training Product, which has been defined as the most innovative training product in the last twenty years. Ms. Zimmerer is a recognized international expert in the gaming and training industry. Throughout her career she has led start-up companies to international recognition through successful launches of innovative and top-selling digital products. She has held multiple senior executive positions in the video industries and interactive electronics. She has authored, produced and marketed over hundred-fifty video games and PC products winning multiple awards in the gaming and toy industry. She spent ten years in Corporate Management where she developed expertise in business operations, development on all digital platforms, product research and development, production, sales, sales management, marketing, promotional advertisement, licensing and distribution. She has been demonstrating an excellent sense of content, creativity and cultivated marketplace instincts. Peter M. Carney, MD Williams College: BA 1958 Western Reserve School of Medicine: MD 1962 Intern in Surgery: Yale 1962-63 Resident in Neurosurgery: Yale 1963-68 Instructor in Neurosurgery: Tufts New England Medical Center: 1968-1971 Neurosurgeon: Cape Cod Hospital: 1971-1977 Neurosurgeon: King Faisal Specialist Hospital, Riyadh, Saudi Arabia: 1977-83 Mellon Fellow at MIT: 1984-5 Neurosurgeon: Elkhart General Hospital: 1985-present Special Interests: Neuroplasticity as a means to improve cerebral function; Ethics in Medicine and Society Dorinne S. Davis is the President and Founder of The Davis Center, Rockaway, NJ. She is an Educational and Rehabilitative Audiologist with 30+ years experience. Dorinne earned her Bachelor’s degree in Speech & Hearing and Speech & Drama; then a Master’s of Audiology / Deaf Education, both at Montclair State College, NJ. She is certified in Speech Correction, Pre-school Education, Speech & Drama, Teacher of the Hard of Hearing, and Supervision by the NJ Department of Education. She is licensed as an Audiologist in NJ, NY, and PA. As an international lecturer in the field of hearing education, Dorinne has received outstanding awards and honors, which include recognition in over thirty Who’s Who publications. Her conference presentations are in high demand by many professional and civic organizations, as well as parent advocacy groups. Dorinne not only provides audiological consultation to diverse medical professionals, she implements cutting edge alternative therapies. Dorinne articulates the affects of sound on the body during a recent interview with New Visions Magazine (2/2000 issue). Dorinne has a variety of published works and is the author of three books, the primer of sound-based therapy, “Sound Bodies through Sound Therapy”, the highly acclaimed “Otitis Media: Coping with the Effects in the Classroom”, and “A Parent’s Guide to Middle Ear Infections”. Additional publications include a chapter on Television Amplification Devices in “Communication Access for Persons with Hearing Loss”, edited by Mark Ross, and numerous professional articles. In the field of Sound Based Therapies, Dorinne is a certified practitioner in Berard Auditory Integration Training (AIT), Tomatis’, Fast ForWord Language®, Fast ForWord Language to Reading®, Fast ForWord Middle & High School® (and all other Scientific Learning Programs), and is a BioAcoustic Research Associate. She is a certified provider for The Listening Program® and is also trained in Read-Spell-Comprehend®, Samonas®, Interactive Metronome®, Earobics®, Lipreading, and Aural Rehabilitation. Books by Dorinne Davis (click on a book title for purchasing information or reviews) Zulma Prieto was born in New York but her family is originally from Colombia, South America. She was raised in Colombia and Spanish is her first language. She attended Universidad Nacional de Colombia, where she finished her Philosophy and Humanities studies. She holds a Masters Degree from the Associated Mennonite Biblical Seminary on Peace and Justice Studies and an Indiana Teaching License with a minor in ESL. Zulma is married to Jimmer Prieto and they have two children Yizzar and Zuleyja. In 1990 she came back to US and in 1992 she founded El Puente, the First Hispanic language newspaper in the state of Indiana. Peter Kline is the author or co-author of The Everyday Genius, Why America’s Children Can’t Think, School Success, The Genesis Principle, The Butterfly Dreams, Ten Steps to a Learning Organization, and the forthcoming The Shakespeare Mysteries. He is the founder of Thornton Friends School, has authored a highly successful reading instruction program and is now working on a mathematics instruction program. He has been working with accelerated learning in schools, corporations, government organizations and in private tutoring situations since 1972. Peter’s work in cognitive development is at the forefront of efforts to merge the latest theories in brain development with educational psychology. This is an imperative move if the advances in neuroscience are to have an impact on instructional programs.
<urn:uuid:bed66126-4565-4866-b008-c6a1b7424df6>
CC-MAIN-2022-33
https://eye2theworld.net/article-1-announcing-the-eye2the-world-consortium/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00276.warc.gz
en
0.953728
1,882
1.71875
2
November's Surface Trade Rises 6 Percent WASHINGTON — Trade using surface transportation (truck, rail, pipeline, mail) between the U.S., Canada and Mexico totaled $81.5 billion in November, the Bureau of Transportation Statistics (BTS) reported. Compared to the same month last year, that's a 6.2 percent increase. Total U.S. trade moved by truck was $56.2, $14.9 billion moved by rail, and $5.9 billion moved by pipeline, BTS said. U.S.-Canada surface trade was $46.7 billion. Michigan led all states in surface trade with Canada, at $6.6 billion. The top commodity traded between Canada and the U.S.? Vehicles and parts.
<urn:uuid:e3a6d0f3-8dab-41a6-9ff7-7e5bd454e7d7>
CC-MAIN-2016-44
http://www.todaystrucking.com/novembers-surface-trade-rises-6-percent
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00436-ip-10-171-6-4.ec2.internal.warc.gz
en
0.951726
158
2.0625
2
I can explain. It was definitely all the cat’s fault. Felines are supposed to be wise, intelligent creatures, but I think she led me astray. It all started with telling me that we deserved our share of the Halloween candy stash, then the trash-diving for Thanksgiving leftovers. And, let’s forget the Christmas tree mishap. But, I’ve learned my lesson—rather, lessons. After my stint in the veterinary hospital recovering from surgery to remove those turkey bones, I am never going to listen to the cat again. During my hospitalization, I met other pets who had run afoul of holiday misadventures. I didn’t realize celebrating with my family could create so many hazards. Since I’m a smart dog and I’ve learned from my mistakes, next year will be better. And, remember—this was all the cat’s fault, so I think I deserve at least a small gift for being a good dog. In fact, skip the cat and give me her share, since she was naughty this year. I take a size extra-large in bones. See you under the tree, Future Good Doggo Top holiday hazards for pets As the end-of-year holidays draw near, two- and four-legged mischief-makers are working hard to end up on Santa’s nice list. With the many opportunities for mishaps, you must keep a close eye on your pet to ensure she stays out of trouble and rings in the New Year at home with you, rather than at the veterinary hospital. Here is a list of the top holiday hazards to watch for: - Suspicious leftovers — Thanksgiving leftovers are a glorious part of the holiday, and although you’d rather share them with your pet than anyone else, keep them to yourself. When tossing leftovers or scraps into the trash, check your trash can’s security. Garlic mashed potatoes, rich gravy, turkey drumsticks, fruit-filled bread pudding, and sweet pumpkin pie can tempt the most steadfast of pets into trash-can diving. Holiday foods are often comfort foods high in fat and sugar, and laden with spices and seasonings, which can wreak havoc on your pet’s gastrointestinal tract. Some foods can be life-threatening, leading to pancreatitis, foreign body obstruction, anemia, or kidney failure. If you do toss your leftovers, remember that food in the trash can quickly rots, and although your pet’s taste buds won’t mind a moldy holiday dinner, her GI tract will. Remove suspicious leftovers before they cause issues. - Costume malfunctions — With the Super Bowl a few months away, there’s no reason to practice a wardrobe malfunction now, or ever. Pets dressed up as elves and reindeer are adorable, but festive costumes can pose a threat to their health. Choking hazards abound in buttons, zippers, ties, and other small parts, while a too-snug fit can restrict breathing. Avoid embarrassing and hazardous wardrobe malfunctions by letting your pet remain au naturel. - Poisonous plants — While your Christmas tree may be a vision of beauty, your pet may view it as an oversized chew toy. A feisty kitten loves to bat glass ornaments to the ground and watch them shatter, while a Labrador will encourage you to join in her game of fetch, although the “branch” is greatly oversized. Also, avoid seasonal plants, such as holly, mistletoe, and lilies, which can lead to vomiting, diarrhea, heart problems, and kidney failure. After all, you don’t need mistletoe as an excuse to smooch your pet. - Shocking decorations — A warm glow from strands of lights brightens the holiday season, but also serves as a beacon to naughty pets. Cats and dogs may nibble on electrical wires, strands of lights, or battery packs, and end up with a shocking surprise, from oral burns to cardiovascular problems. - Social anxiety — The holidays are a time for the biggest social events of the year, when you celebrate with good food, drinks, and company. But, your pet may not enjoy the festive gatherings, and choose to cower in the corner. Many pets are unsure around strangers, and when their home is overrun with a large crowd, they become anxious and stressed. Avoid a party panic attack by setting up a quiet VIP suite with your pet’s favorite treats and toys where she can enjoy the holidays away from the commotion. If your pet is a mischief-maker who likely will end up writing an apology letter to Santa, keep our number close by to help solve any holiday mishaps.
<urn:uuid:127a15c8-add7-4254-a745-0fdd3c7964c7>
CC-MAIN-2022-33
https://www.belmontanimalhospital.com/2019/11/21/letter-to-santa-help-your-pet-stay-off-the-naughty-list/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00275.warc.gz
en
0.932104
989
1.640625
2
with the price of 12-inch silicon wafers falling manufacturers are rapidly making the shift to the larger wafers, and in turn are causing a shortage. according to g. dan hutcheson, president of vlsi research, “supply is very tight for 300-mm silicon wafers.” he went on to say that shortages were great enough to cause supply constraints. though the sudden upturn in the chip market is good news, it is compounding the problem. not only are manufacturers switching to 12-inch wafers at a rapid rate, but demand is increasing at the same time. manufacturers with long term wafer contracts will likely see little impact from the shortage, but smaller manufacturers without contracts could see substantial waits and higher prices, not what they expected given the improving chip forecast. user comments 17 comment(s) |i'm worried….. (3:19pm est mon dec 22 2003) should this shortage cause amd to not meet cpu demand just as they have their new amd64 chips? – by james beatty |nope (5:28pm est mon dec 22 2003) amd are still on 9-inch wafers. intel are the ones on 12-inch wafers, though quite a lot of their production is still on the 9-inchers. – by big fred |amd shortage (5:33pm est mon dec 22 2003) correct me if i'm wrong, but i think amd uses primarily 8 inch wafers, so their current production should be relatively unaffected by the shortage. now this might mean without a long term contract, they could have a bit of trouble in the transition once they have completed construction (or have they already?) of their new fabs that work on 300mm wafers. i'm sure a company that big could get shipment priority if they push their weight around though – by noved |oh, come on… (6:32pm est mon dec 22 2003) if there is one component in the entire chip-building industry that has huge elasticity (of sourcing), it is the wafer-supply itself. i'm sorry, although it is very “high tech”, it is also intrinsically appealling to those who see their people making millions'n'millions of “stuff” all the same, day to day. innovation 'zero'. and, by the way, wasn't there predicted to be an enormous memory shortage around this time because of the raw-wafer shortage that [oh so mysteriously] didn't materialize? point is — i don't believe predictions about whole segments like this. if anything, all the wafermakers out there are saying (and i apologize for the asian references, but hey – most wafers come from the far east), lee: “look, chow. our competitors over at east dragon beautiful sand are probably going to ramp up, so we better as well – even though a shortage would benefit both of us. what do you think?” chow: “fer sure, lee. in fact, lets stockpile a bunch, in case there's a huge windfall to be had. hire hire hire! if it doesn't materialize, we all take vacations, and fire, fire, fire!” – by goatguy |don't diss the substrate, gg! (7:24pm est mon dec 22 2003) substrates are getting complex. 300 mm silicon has to be a perfect lattice all the way out 150mm from center, and they grow these things slooowwlly. then you have to slice the ingot and cmp the individual wafers(both sides, for 300mm: rough grind, then finer and finer grinds) to achieve a good flatness. the wafer maker has to invest a whole bunch of money in new cmp tools for the 300mm wafer size. there are hickups and learning to be accomplished. and what is a “good” flatness, for 90nm? i mean something extraordinarily flat. flatness must be less than 90 nm over the stepper's field of view. otherwise one part of the die will be in focus and another part wont. there is a mundaneness to making standard silicon wafers. but with the strained silicon techniques, soi, and other tricks the big logic makers use at 90nm, i'm not surprised there are shortages and hickups. this stuff is getting very challenging, and the best substrates do help make the best products, and the best yield. if for no other reason (and i'm sure there are arcane ones) but that the slight irregularity of flatness at the substrate level influences cmp (a technique for eliminating irregular topgraphy introduced in the normal processing of the wafer). any irregularities at the bottom layer, the substrate, will exert an influence over every subsequent layer. i believe “chow” may be struggling with building 300mm factories, getting his polishers working, making soi, strained silicon, and the stringent site tir necessary for 90nm. i feel for “chow”. he may be throwing out or coin rolling a high fraction of this product, with only a minority meeting spec. – by ben |fair 'nuf (7:42pm est mon dec 22 2003) your points are well taken, ben. i was trying to point out that the enterprise of making “blanks” – no matter how precise, how high-tech it is – is also very “elastic” to demand. the machines that pull the boules of silicon from the spin-melt achieve their single-crystal-across-300mm just as easily as the 200 millimeter pullers did their job. the rate-of-pull is essentially the same, and therefore, the same number of boules per day can be made. likewise, the cmp chemo-mechanical polishing techniques requiring successily finer grits, vacuums, all sorts of fluid wizardry, ph balancing, admixture of surfactants, inhibitants, mixed-grade grits, and more … is itself a huge science. but it is not the art-craft of the cmp wafer makers. they buy 55 gallon drums of the “right stuff” to do the processing. in fact, almost none of the 200 millimeter processing techniques have been changed moving to 300 millimeters. not really. just a bigger wafer. now, “chow” may or may not be struggling to fab the 300mm's. he's not making soi wafers, he's not making soi (since that is done during processing with silicon-germanium filled vias, and overlays of silicon nitride passivation). its all a question of whether the “lee” and the “chow” of the above parable get the hint, and begin to stockpile plates in advance. my point there was – like the predicted memory shortage (that has turned, as i expected, into a surplus), like that, i expect that the savvy, the shrewd, the forward thinking wafer makers will be ramping up … just in time for future demand … which will keep their pricepoint where it needs to be. and no – i'm not “dissin' the wafer”. we thank you for outlining the complexities of chemomechanical polishing. the average geek would be fairly amazed, i should think, to see the kind of emperical methods that are used to prepare the wafers at the outset. very refreshingly “primative” at its core, with a lot of fine science behind all of it. – by goatguy |sweeeeet (1:01am est tue dec 23 2003) i learn more about electronics here than i every have at school. at least…the interesting parts……well, i guess all of it is interesting….. well, thank you guys for the electroenlightenment. – by dixoncider |who's gobbling up the 12″ wafers? (1:14am est tue dec 23 2003) on a similar thread some weeks ago, it actually came up that 8″ wafers were still the dominant wafer size in the world. so the 12″ shortage must mean that all the companies with 300 mm fabs are now definitely ramping their stuff (most likely 90 nm stuff). – by fc |well, on second thought… (12:03pm est tue dec 23 2003) gg is right about 300 mm wafers, i think. it really is just stamping out blanks. once you get the process set, and focast demand, you're sitting pretty. still, i know the shortage (and present atmospheric cost) of 300 mm silicon is real. i think it must be the over-caution of companies just now coming out the worst downturn the semi industry has ever had. i know wacker siltronics shut down some (all?) of their wafer factories a year or two ago, and other wafer makers must be really hurting bad. plus those 300mm polishers are seriously expensive. perhaps what we are seeing is a fundamental change in the industry. some wafe companies may have decided enough is enough and just aren't going to invest much in the next generation product, at least for a few years, until they can get their present generation factory (200 mm) to pay for itself, and even, god forbid, make some profit. it would be ironic if the industry's pace was set by lowly silicon makers, but if 300mm wafer prices don't come down soon, it may actually impact the 300mm roll-out schedule of logic and dram makers. of course, those high prices equal big profit for those silicon makers who take the plung into 300mm. or at least big profit when they get the process worked out. everything comes at a price, in this industry. there sure doesn't seem to be any free lunch. the question is this: is the greatest value/least risk obtained continuing to sell 200mm wafers, in a mature but now marginally profitable business, or invest like crazy to ramp up 300mm production, making substantial profits initially, but taking a big risk if demand doesn't materialize, the market is glutted, etc. i can really understand those companies who want to tread cautiously, and let the shortages actually materialize before investing. – by ben |more false information (4:09pm est wed dec 24 2003) >>> now, “chow” may or may not be struggling to fab the 300mm's. he's not making soi wafers, he's not making soi (since that is done during processing with silicon-germanium filled vias, and overlays of silicon nitride passivation).>>> this makes no sense. in fact, it's 'pure nonsense'. soi wafers are made either with the smartcut method or with simox. neither of these have anything to do with sige… let alone vias! (and apparently ben thinks you buy strained silicon wafers… sigh.) – by double sigh |very sorry – a typo (10:40pm est wed dec 24 2003) it should have been “now 'chow' may or may not be struggling to fab the 300 mm wafers. he's not making soi, and he's [definitely not making “strained silicon”] (since that…) see – it fits. i wasn't paying attention to the text as i was typing it. sorry. merry christmas – by goatguy |still incorrect (12:09am est tue dec 30 2003) but strained silicon has nothing to do with putting sige into vias. in fact, that's a rediculous thing to do. vias are used to connect different metal levels together. they're usually filled with metal(!) unless it's via 0 in which it's a tungsten plug. yes, there are a dozen ways to “strain the silicon” in the channels, but they have nothing to do with putting sige in vias. – by triple sigh |ergsrtehsrt (4:43am est mon feb 16 2004) – by srgdrzagrg |sdgzedhtxdrhr (4:43am est mon feb 16 2004) – by zsdrgrdgerh |silicon wafer price (9:25am est tue apr 12 2005) could somebody tell epitaxial silicon wafer please? thank you – by miss monboisset |silicon wafers price (9:27am est tue apr 12 2005) could somebody tell me an average price for an 8-inch blank epitaxial silicon wafer please? thank you. – by miss monboisset |200mm/300mm wafer pricing (4:45pm est fri may 13 2005) can someone update me on the 200mm and 300mm wafer pricing in 2004 vs 2005 may and what the trend has been in pricing in 04 vs 05. whats the story with poly wafers too… – by kumu
<urn:uuid:bfa1f2a4-2618-4a41-b08b-562e1f8327ed>
CC-MAIN-2017-04
http://www.geek.com/chips/shortage-of-12-inch-wafers-looming-551457/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00388-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946315
2,803
2.0625
2
Provide related nonfiction pages and turn your students loose on these activities to connect the facts to the fiction. Look for or compose articles on cattle drives, frontier life or hydrophobia, among other topics. Combine details from the novel, a passage about frontier houses, and math when students make scale models of the home in which Travis and his family lived. Use modeling clay, paper or dowels, or have snacks at the same time with pretzels and peanut butter as building materials (being mindful of food allergies). Head ‘Em Up, Move ‘Em Out Help students visualize the setting when they draw maps on which they chart the most famous cattle drive routes, as well as those in the site of the novel. Encourage them to create illustrations that symbolize facts about the different trails. Numbers, Numbers, Numbers Reinforce the use of skills from other school subjects by having students write math word problems based on ideas from the book. More Info, Please Introduce students to annotated bibliographies by asking them to create “Recommended for Further Reading" lists of books or websites about topics in the book. The list should include a correctly formatted bibliography entry and a summary of the book or site.
<urn:uuid:61c77b8c-b347-4460-be14-b75e49c564cc>
CC-MAIN-2017-04
http://www.brighthubeducation.com/middle-school-english-lessons/119120-interactive-activities-when-reading-old-yeller/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00351-ip-10-171-10-70.ec2.internal.warc.gz
en
0.931484
255
4.34375
4
Built for independent schools We understand that every independent school has its own way of working. That’s why our platform has flexible modules that can be tailored to your school’s approach to: - Lesson observations and feedback - Teacher appraisals - Pupil progress and attainment data from Reception to Sixth Form - Parent communications ProgressTeaching is the only platform that seamlessly links together all these key areas of leadership and management. It is also the only platform that allows you to manage pupil data from Prep all the way through to Sixth Form. Refine your strategy through a data-driven approach to these aspects of school leadership with ProgressTeaching. Our platform saves your teachers and leaders valuable time by streamlining administrative processes so they can focus on helping pupils to reach their full potential. ProgressTeaching is a modular, cloud-based teaching improvement platform. It can be customised to suit your individual requirements. For schools who want something more ready-made, we can provide ‘out of the box’ templates and processes based on tried and tested methods used in some of the highest-performing state and independent schools in the country. However you decide to configure the platform, our dedicated onboarding team will work closely with you to make sure ProgressTeaching helps your school to achieve its goals. “We were so impressed by the capability of the ProgressTeaching platform to provide easy access to key core information for teachers, enabling them to do their best job in the classroom. Data is pulled through from SIMs in an instantly accessible, easy to view format for teachers, Heads of Department and Heads of Year. This enables rapid sharing of information and quick intervention, to facilitate the teaching and learning process, and good educational outcomes.” Fiona Allen, Deputy Head, St Benedict’s School “ ProgressTeaching will promote a shared language and understanding about data which will enable more effective intervention at the right times and with the right pupils. We are excited that the platform can evolve with us over time, so that it can be a vehicle to improve our current quality assurance systems and support our overall goal of a developmental and coaching approach.” Hannah Blake, Senior School Deputy Head (Academic) and Whole School Vice Principal, Ewell Castle School Price is based on module use. Our platform is a SaaS solution, meaning we take care of all the hosting and updates. This guarantees that you are always on the latest version and you have access to the platform 24/7 from anywhere, on any device including mobiles and tablets. Training of your core users in their relevant areas is also included. Our simple license fee covers all setup and any hand-holding you need to import the data from your MIS. Our team are happy to supply you with a no-obligation quote, detailing which options are available to you. Simply complete the form below.
<urn:uuid:713193cb-6c0c-484d-9319-fdd3eefb2e22>
CC-MAIN-2022-33
https://progressteaching.com/who-we-help/independent-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00275.warc.gz
en
0.953133
605
1.59375
2
Sometimes a judge just decides to opine on the state of the law, as I fondly remember Judge Edward Becker doing: often enough, a Judge Becker opinion would tour both the basics and the intricacies of the area of the law at issue in a case, whether the tour was necessary to get to the final destination or not. So it is here, in a case about two parties who both wish to use the term ULTRA on equine grooming products. In 1984, Schneider began selling ULTRA horse grooming products. It registered its marks in 1985. In 1990, unaware of Schneider, Best Shot began selling ULTRA grooming products targeted at a variety of animals, but not horses. In 2001, Best Shot expanded to horses, using ULTRA WASH, ULTRA PLENISH, and ULTRA VITALIZING MIST. Before registering the marks for equine care, Best Shot had a trademark search done. The search turned up Schneider’s marks and the trademark attorney expressed some concern, though the attorney noted that there were a large number of ULTRA registrations and uses, making the mark likely weak. Best Shot applied for and received a registration, though it didn’t explain to the PTO that the marks were intended for use in the field of equine care, nor did it disclose the existence of the Schneider products. (The registrations are for “animal/pet grooming products”; from what I saw online, Best Shot sells the products for cats and dogs as well.) Schneider didn’t contest any of the applications, but the court considered this of negligible significance in this case, though noted that matters might be different if a registrant failed to contest a new mark that was subject to an “extremely public unveiling” prior to registration. (The Travatan v. Xalatan case I was involved in litigating is an example of a case where the competitor, Pharmacia, should have objected when the registration was published, because so much was at stake and Pharmacia knew so much about Travatan.) Scheider hasn’t identified any customer confusion, though Schneider’s sales decreased in the only catalog known to carry both parties’ products. Schneider alleged that Best Shot’s marks were counterfeit. The court granted Best Shot summary judgment on this issue. Counterfeiting requires a lot more than infringement; it requires that a mark be identical to, or substantially indistinguishable from, a registered mark. Summary judgment is usually appropriate if word marks differ by two or more letters. Schneider argued that the marks were “identical” because they both use ULTRA, but the court thought that was in direct contravention of the statutory scheme, which reserves counterfeiting liability for the worst of the worst, not arguable cases of infringement. Reasonable consumers would not believe that the junior mark was the senior mark; there was no counterfeiting as a matter of law. The Best Shot marks include an entire word that the Schneider marks don’t, and the commercial appearance differs. The court commented that some cases suggest that the inquiry is “not really whether the marks are substantially indistinguishable, but whether the marks are employed in such a way as to cause a consumer to believe that the product itself is counterfeit.” But the court thought that standard, whatever its practical merits given the lay meaning of “counterfeit,” clearly conflicted with the statutory language, which focuses on the mark. Best Shot asked for attorneys’ fees on this claim; the court denied the request, even though Congress wanted to discourage plaintiffs from making frivolous allegations of counterfeiting in an average infringement case, so as not to raise the specter of treble damages where they’d be inappropriate. The court thought that interpreting “counterfeit” was a relatively new area of law involving a number of judicial glosses; Best Shot would be allowed to renew its motion at the conclusion of the case if appropriate. The court found material issues of fact on many of the relevant factors. Strength: Schneider argued that its marks were strong because they were incontestable. The court took the (better) view that likelihood of confusion is a separate issue from validity. Some courts treat incontestability as creating a rebuttable presumption of strength, but the analysis should be separate: “there is no apparent reason that the incontestable status of a mark should automatically translate into a well-known mark.” On to the evidence, then: Best Shot’s expert did a survey that allegedly proved ULTRA weak. The court found this consumer survey to be “strong and currently uncontroverted evidence” of weakness. Best Shot also argued that there was extensive third-party use of “ultra,” which may weaken the mark even if used on other goods, but Best Shot had the classic problem at this stage—it didn’t show that the “ultra” marks were actually used in the marketplace, as opposed to being registered at the PTO. Schneider argued that its marks were strong because Schneider had used ultra for 23 years and spent considerable money on promotion. Schneider could use this evidence to persuade a jury, but a reasonable jury could consider the marks weak. Relatedness of goods: They’re the same, which weighed heavily in favor of finding likely confusion. In a European context, or in an earlier period in American trademark law, same goods plus use of highly similar mark would be the end of the story. The court found that the “better” cases relying on a presumption of confusion in such circumstances require identical use plus a clear intention by the junior user to derive a benefit from the senior mark. The court even went out of its way to identify a “misstatement” of law in AMF, Inc. v. Sleekcraft Boats, 599 F.2d 341, 348 (9th Cir. 1979), which said: “When the goods produced by the alleged infringer compete for sales with those of the trademark owner, infringement usually will be found if the marks are sufficiently similar that confusion can be expected. When the goods are related, but not competitive, several other factors are added to the calculus.” This was not a misstatement at the time. It may be so now. As Mark McKenna has noted elsewhere, the multifactor confusion test now so dominates that it seems to have erased even judicial memory of the simpler tests once used for directly competing goods. The court rejected any “[rigid] rules” enabling a confusion finding, even a presumption of confusion where the marks are similar and the goods are the same, noting that this is one reason summary judgment in infringement cases is rare. Nonetheless, identical goods substantially increase the likelihood of confusion where the marks are similar. So, similarity: First, the court concluded that standing alone, Best Shot’s addition of a word or words did not render the marks dissimilar. Given the products at issue, “plenish,” “vitalizing mist,” and “wash” were not sufficiently distinctive in themselves to render the marks dissimilar. Similarity still exists when the marks have the same overall connotation. However, the use of “Best Shot” as a house mark would allow reasonable jurors to find less likelihood of confusion (or more, if they found that consumers would think Best Shot had been licensed to use the mark). The court commented that, were it the factfinder, it would be persuaded by the licensing argument because the products serve identical functions, but a reasonable jury could disagree. (And I hope it would, with a mark as inherently weak as ULTRA.) The court concluded that the similarity of the logos gives Best Shot “an extremely steep challenge at trial on the question of similarity,” but the house mark plus the additional words still create a genuine issue of fact. Actual confusion: No evidence of it, which a jury would weigh in Best Shot’s favor. The court commented that, were it not bound by precedent, it would conclude that the absence of substantial confusion could often by itself answer the question of whether there’s a likelihood of confusion. “If consumers are exposed to substantial marketing efforts from both companies, yet no evidence shows that any consumers have actually been confused, there is substantially less likelihood that consumers do or will find the marks confusing.” But binding precedent is to the contrary, and anyway even this conclusion wouldn’t entitle Best Shot to summary judgment, because both parties have a fairly small market share and there’s no evidence of extensive marketing to a unified customer population. Some evidence supported the inference of likely confusion. Schneider argued that consumers generally don’t allow unauthorized products to be used on their horses. Thus, consumers “constantly” return products because someone mistakenly bought the wrong product for them. If consumers have been confused by the marks, then, some record of confusion ought to exist. Marketing channels: both use the internet and catalogs, and the customer base overlaps. But there was only one catalog that carried both, and no evidence that the same websites carried both. The court quoted one case holding that when both parties use the internet, confusion is more likely—which means that the likelihood of confusion, or “confusion in the air,” if you will, has simply increased over the past ten years. A reasonable jury could conclude that this factor favors Schneider, or could accord it little weight. Degree of purchaser care: Schneider’s sworn testimony was that customers of horse grooming products exercise little care. Horses are expensive, but consumers might still just use any old shampoo on them, just as the owner of an expensive car may use the same car wash as the owner of a cheap car. (Horse lovers, don’t come after me: not my analogy.) Best Shot argued that end users, though, do exercise substantial care. The court concluded that Schneider had the better argument. Purchasers can have big effects on trademark value even if they’re not users. End users might stop requesting a particular product if purchasers keep bringing back the wrong product; or end users might decide to try the new product and switch. Anyway, where the marks are similar, purchaser care becomes less relevant—confusingly similar marks may lead a careful purchaser to nonetheless assume affiliation or other connection. Since the marks here are quite similar, the degree of purchaser care is less significant. (I think this does exactly what the court cautions against elsewhere: risks reducing infringement to circularity. If the marks weren’t similar, you wouldn’t be doing a confusion inquiry at all. If purchaser care is to be a meaningful factor, it must affect likelihood of confusion when the marks are similar enough to create a dispute.) Intent: Good faith is rarely relevant, but bad faith is—it allows a factfinder to assume that a party’s intent to cause confusion was successful. Schneider argued that Best Shot’s knowledge of Schneider’s marks allowed an inference of intentional infringement. But Best Shot argued that it was just expanding its own marks from other animal care markets. A jury could agree with Best Shot, creating a material issue of fact. The court commented that the current law of intent is messed-up, though “the ship has likely long-since left the port on this point.” Within the multifactor test, intent is circular: presume bad intent because the marks are similar and presume that the marks are similar enough to confuse because of the bad intent. It might be better to consider intent only when there’s direct proof of intentional infringement. Ultimately, “Best Shot has an unquestionably difficult task before a jury,” and the court commented that as the finder of fact it might well find infringement, but that wasn’t the court’s job. Finally, the court held that, though the issue was a close call, Schneider might be able to get an accounting of profits or damages if it prevailed. First, the court held that—given the 1999 amendments to the Lanham Act, and despite some older precedent—willfulness is not a prerequisite to an accounting of profits, and anyway Schneider had enough evidence of willfulness to go to a jury. Schneider could also get damages even if it couldn’t prove particular diverted sales, as long as it showed some damage. (Showing infringement alone wouldn’t be enough.) But there was testimony that Schneider saw a drop in sales in the one catalog where the parties competed. Schneider had enough to survive summary judgment on both profits and damages.
<urn:uuid:3c7dc856-afb5-40a9-8493-0bfb6b0288a1>
CC-MAIN-2017-04
http://tushnet.blogspot.com/2009/04/lather-rinse-repeat-horse-shampoo-tm.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00230-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958797
2,633
1.617188
2
Seventeen decorated caves of the Paleolithic age were inscribed as an extension to the Altamira Cave, inscribed in 1985. The property will now appear on the List as Cave of Altamira and Paleolithic Cave Art of Northern Spain. The property represents the apogee of Paleolithic cave art that developed across Europe, from the Urals to the Iberian Peninusula, from 35,000 to 11,000 BC. Because of their deep galleries, isolated from external ... Source: UNESCO TV / © NHK Nippon Hoso Kyokai
<urn:uuid:ff663e6d-32fb-4110-b7d8-fae9e2166a19>
CC-MAIN-2017-04
http://whc.unesco.org/en/list/310/video
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00324-ip-10-171-10-70.ec2.internal.warc.gz
en
0.92309
116
3.046875
3
- Elgar original reference Edited by Christopher J. Coyne and Rachel L. Mathers 21 Dynamics of military occupation Michael Hechter and Oriol Vidal-Aparicio 21.1 INTRODUCTION The recent American invasion of Iraq and Afghanistan has revived interest in the outcomes of military occupation, which is the most extreme form of alien rule. In contrast to annexation and colonialism, in this chapter military occupation refers to a type of alien rule that is imposed on the native society by a foreign power, and that the international community refuses to recognize as constituting permanent sovereign1 control.2 There is a pervasive consensus that alien rule, at least in modern times, is invariably malign, illegitimate and unsustainable (Hechter 2009a). This conclusion is far from wholly mistaken; there are many reasons why the histories of occupation in country after country have so often been unhappy. Occupation is generally disparaged because it entails major uncertainty and a high risk of loss for the bulk of those who are subjected to it. Occupation ushers in great uncertainty – this is why people flee the impending arrival of an occupying army en masse. Whose justice will rule the land? The common expectation is that it will not be the native’s justice. If alien soldiers confiscate or destroy native private property, will the alien rulers be motivated to seek justice? If occupying soldiers rape native women, will the occupying authorities step in to halt the practice?3 If most people dislike uncertainty, they are also quite averse to the prospect of certain loss (Kahneman and Tversky 1979). Especially for native elites, occupation typically results... You are not authenticated to view the full text of this chapter or article. Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage. Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use. Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.
<urn:uuid:acc5616f-ac2a-4890-8b5f-999558857536>
CC-MAIN-2017-04
https://www.elgaronline.com/view/9781848442481.00032.xml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00437-ip-10-171-10-70.ec2.internal.warc.gz
en
0.915711
443
2.46875
2
It is rumoured England is facing potentially its worst flu season in fifty years. Public Health England has released statistics around the suspected deadly ‘Aussie flu’ outbreak in the UK that has thus far triggered over 1000 cases. There are concerns that the epidemic could overwhelm the NHS; having affected over 90,000 people in Australia, the disease is now set to strike the UK in a potentially similar fashion. Flu and the UK The annual death rate for flu in the UK is approximately 12,000, usually affecting the most vulnerable of the population – including the sick and elderly. Routine surgeries have been cancelled nationwide ahead of the peak flu season to ensure that there are less vulnerable patients in the wards, and to keep those most at risk safe. There is already a nationwide bed shortage following a spike in norovirus in wards across the country. 170,000 cases of flu have been reported across Australia this season; two and a half times more than the previous year. The specific H3N2 strain of flu which hit is a mutation of the flu virus, and meant that the vaccine was less effective than normal. Usually the UK will be hit by just one sub strain per year, but this year we are expected to receive two separate sub strains of the virus. What to look out for The symptoms of the Aussie flu strain are similar to those of normal flu, but more severe. “Symptoms include a high temperature or fever along with coughing, sneezing and a runny nose. Likewise, it can also bring on aches and pains, with feelings of weakness or fatigue,” explained Dr Steve Iley, Medical Director for Bupa UK, in the Standard. If you find that you are suffering a significant amount after seven days there is a chance it is something more concerning than the standard flu bug. Most at risk are the elderly, pregnant women, young children and anyone suffering from a chronic disease. If you find yourself fitting one of these categories, and feel unwell over the coming weeks, seek advice from a medical professional. The flu vaccine is still recommended as an important line of defence against the flu season – including these strains we’re now seeing. Nick Phin of Public Health England has stated: “The circulating flu strains match those in the current flu vaccine, so the vaccine remains the best defence against the virus.”
<urn:uuid:e12054a6-2c09-4307-90c0-51abab8752d0>
CC-MAIN-2022-33
https://flucamp.com/blog/aussie-flu-in-the-uk/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00671.warc.gz
en
0.968957
488
2.75
3
As DNA sequencing technology has markedly advanced in recent years2, it has become increasingly evident that the amount of genetic variation between any two individuals is greater than previously thought3. In contrast, array-based genotyping has failed to identify a significant contribution of common sequence variants to the phenotypic variability of common disease4,5. Taken together, these observations have led to the evolution of the Common Disease / Rare Variant hypothesis suggesting that the majority of the "missing heritability" in common and complex phenotypes is instead due to an individual's personal profile of rare or private DNA variants6-8. However, characterizing how rare variation impacts complex phenotypes requires the analysis of many affected individuals at many genomic loci, and is ideally compared to a similar survey in an unaffected cohort. Despite the sequencing power offered by today's platforms, a population-based survey of many genomic loci and the subsequent computational analysis required remains prohibitive for many investigators. To address this need, we have developed a pooled sequencing approach1,9 and a novel software package1 for highly accurate rare variant detection from the resulting data. The ability to pool genomes from entire populations of affected individuals and survey the degree of genetic variation at multiple targeted regions in a single sequencing library provides excellent cost and time savings to traditional single-sample sequencing methodology. With a mean sequencing coverage per allele of 25-fold, our custom algorithm, SPLINTER, uses an internal variant calling control strategy to call insertions, deletions and substitutions up to four base pairs in length with high sensitivity and specificity from pools of up to 1 mutant allele in 500 individuals. Here we describe the method for preparing the pooled sequencing library followed by step-by-step instructions on how to use the SPLINTER package for pooled sequencing analysis (http://www.ibridgenetwork.org/wustl/splinter). We show a comparison between pooled sequencing of 947 individuals, all of whom also underwent genome-wide array, at over 20kb of sequencing per person. Concordance between genotyping of tagged and novel variants called in the pooled sample were excellent. This method can be easily scaled up to any number of genomic loci and any number of individuals. By incorporating the internal positive and negative amplicon controls at ratios that mimic the population under study, the algorithm can be calibrated for optimal performance. This strategy can also be modified for use with hybridization capture or individual-specific barcodes and can be applied to the sequencing of naturally heterogeneous samples, such as tumor DNA. 24 Related JoVE Articles! An Allele-specific Gene Expression Assay to Test the Functional Basis of Genetic Associations Institutions: University of Oxford. The number of significant genetic associations with common complex traits is constantly increasing. However, most of these associations have not been understood at molecular level. One of the mechanisms mediating the effect of DNA variants on phenotypes is gene expression, which has been shown to be particularly relevant for complex traits1 This method tests in a cellular context the effect of specific DNA sequences on gene expression. The principle is to measure the relative abundance of transcripts arising from the two alleles of a gene, analysing cells which carry one copy of the DNA sequences associated with disease (the risk variants)2,3 . Therefore, the cells used for this method should meet two fundamental genotypic requirements: they have to be heterozygous both for DNA risk variants and for DNA markers, typically coding polymorphisms, which can distinguish transcripts based on their chromosomal origin (Figure 1). DNA risk variants and DNA markers do not need to have the same allele frequency but the phase (haplotypic) relationship of the genetic markers needs to be understood. It is also important to choose cell types which express the gene of interest. This protocol refers specifically to the procedure adopted to extract nucleic acids from fibroblasts but the method is equally applicable to other cells types including primary cells. DNA and RNA are extracted from the selected cell lines and cDNA is generated. DNA and cDNA are analysed with a primer extension assay, designed to target the coding DNA markers4 . The primer extension assay is carried out using the MassARRAY (Sequenom)5 platform according to the manufacturer's specifications. Primer extension products are then analysed by matrix-assisted laser desorption/ionization time of-flight mass spectrometry (MALDI-TOF/MS). Because the selected markers are heterozygous they will generate two peaks on the MS profiles. The area of each peak is proportional to the transcript abundance and can be measured with a function of the MassARRAY Typer software to generate an allelic ratio (allele 1: allele 2) calculation. The allelic ratio obtained for cDNA is normalized using that measured from genomic DNA, where the allelic ratio is expected to be 1:1 to correct for technical artifacts. Markers with a normalised allelic ratio significantly different to 1 indicate that the amount of transcript generated from the two chromosomes in the same cell is different, suggesting that the DNA variants associated with the phenotype have an effect on gene expression. Experimental controls should be used to confirm the results. Cellular Biology, Issue 45, Gene expression, regulatory variant, haplotype, association study, primer extension, MALDI-TOF mass spectrometry, single nucleotide polymorphism, allele-specific Visualization of Mitochondrial Respiratory Function using Cytochrome C Oxidase / Succinate Dehydrogenase (COX/SDH) Double-labeling Histochemistry Institutions: Karolinska Institutet, National Institute on Drug Abuse (NIDA). Mitochondrial DNA (mtDNA) defects are an important cause of disease and may underlie aging and aging-related alterations 1,2 . The mitochondrial theory of aging suggests a role for mtDNA mutations, which can alter bioenergetics homeostasis and cellular function, in the aging process 3 . A wealth of evidence has been compiled in support of this theory 1,4 , an example being the mtDNA mutator mouse 5 ; however, the precise role of mtDNA damage in aging is not entirely understood 6,7 Observing the activity of respiratory enzymes is a straightforward approach for investigating mitochondrial dysfunction. Complex IV, or cytochrome c oxidase (COX), is essential for mitochondrial function. The catalytic subunits of COX are encoded by mtDNA and are essential for assembly of the complex (Figure 1). Thus, proper synthesis and function are largely based on mtDNA integrity 2 . Although other respiratory complexes could be investigated, Complexes IV and II are the most amenable to histochemical examination 8,9 . Complex II, or succinate dehydrogenase (SDH), is entirely encoded by nuclear DNA (Figure 1), and its activity is typically not affected by impaired mtDNA, although an increase might indicate mitochondrial biogenesis 10-12 . The impaired mtDNA observed in mitochondrial diseases, aging, and age-related diseases often leads to the presence of cells with low or absent COX activity 2,12-14 . Although COX and SDH activities can be investigated individually, the sequential double-labeling method 15,16 has proved to be advantageous in locating cells with mitochondrial dysfunction 12,17-21 Many of the optimal constitutions of the assay have been determined, such as substrate concentration, electron acceptors/donors, intermediate electron carriers, influence of pH, and reaction time 9,22,23 . 3,3'-diaminobenzidine (DAB) is an effective and reliable electron donor 22 . In cells with functioning COX, the brown indamine polymer product will localize in mitochondrial cristae and saturate cells 22 . Those cells with dysfunctional COX will therefore not be saturated by the DAB product, allowing for the visualization of SDH activity by reduction of nitroblue tetrazolium (NBT), an electron acceptor, to a blue formazan end product 9,24 . Cytochrome c and sodium succinate substrates are added to normalize endogenous levels between control and diseased/mutant tissues 9 . Catalase is added as a precaution to avoid possible contaminating reactions from peroxidase activity 9,22 . Phenazine methosulfate (PMS), an intermediate electron carrier, is used in conjunction with sodium azide, a respiratory chain inhibitor, to increase the formation of the final reaction products 9,25 . Despite this information, some critical details affecting the result of this seemly straightforward assay, in addition to specificity controls and advances in the technique, have not yet been presented. Cellular Biology, Issue 57, aging, brain, COX/SDH, histochemistry, mitochondria, mitochondrial disease, mitochondrial dysfunction, mtDNA, mtDNA mutations, respiratory chain Monitoring Dynamic Changes In Mitochondrial Calcium Levels During Apoptosis Using A Genetically Encoded Calcium Sensor Institutions: University of Texas Medical Branch. Dynamic changes in intracellular calcium concentration in response to various stimuli regulates many cellular processes such as proliferation, differentiation, and apoptosis1 . During apoptosis, calcium accumulation in mitochondria promotes the release of pro-apoptotic factors from the mitochondria into the cytosol2 . It is therefore of interest to directly measure mitochondrial calcium in living cells in situ during apoptosis. High-resolution fluorescent imaging of cells loaded with dual-excitation ratiometric and non-ratiometric synthetic calcium indicator dyes has been proven to be a reliable and versatile tool to study various aspects of intracellular calcium signaling. Measuring cytosolic calcium fluxes using these techniques is relatively straightforward. However, measuring intramitochondrial calcium levels in intact cells using synthetic calcium indicators such as rhod-2 and rhod-FF is more challenging. Synthetic indicators targeted to mitochondria have blunted responses to repetitive increases in mitochondrial calcium, and disrupt mitochondrial morphology3 . Additionally, synthetic indicators tend to leak out of mitochondria over several hours which makes them unsuitable for long-term experiments. Thus, genetically encoded calcium indicators based upon green fluorescent protein (GFP)4 targeted to mitochondria have greatly facilitated measurement of mitochondrial calcium dynamics. Here, we describe a simple method for real-time measurement of mitochondrial calcium fluxes in response to different stimuli. The method is based on fluorescence microscopy of 'ratiometric-pericam' which is selectively targeted to mitochondria. Ratiometric pericam is a calcium indicator based on a fusion of circularly permuted yellow fluorescent protein and calmodulin4 . Binding of calcium to ratiometric pericam causes a shift of its excitation peak from 415 nm to 494 nm, while the emission spectrum, which peaks around 515 nm, remains unchanged. Ratiometric pericam binds a single calcium ion with a dissociation constant in vitro of ~1.7 μM4 . These properties of ratiometric pericam allow the quantification of rapid and long-term changes in mitochondrial calcium concentration. Furthermore, we describe adaptation of this methodology to a standard wide-field calcium imaging microscope with commonly available filter sets. Using two distinct agonists, the purinergic agonist ATP and apoptosis-inducing drug staurosporine, we demonstrate that this method is appropriate for monitoring changes in mitochondrial calcium concentration with a temporal resolution of seconds to hours. Furthermore, we also demonstrate that ratiometric pericam is also useful for measuring mitochondrial fission/fragmentation during apoptosis. Thus, ratiometric pericam is particularly well suited for continuous long-term measurement of mitochondrial calcium dynamics during apoptosis. Cellular Biology, Issue 50, Ratiometric pericam, mitochondria, calcium, apoptosis, staurosporine, live cell imaging Visualization of Mitochondrial DNA Replication in Individual Cells by EdU Signal Amplification Institutions: University of Michigan, University of Michigan, University of Michigan. Mitochondria are key regulators of cellular energy and mitochondrial biogenesis is an essential component of regulating mitochondria numbers in healthy cells1-3 . One approach for monitoring mitochondrial biogenesis is to measure the rate of mitochondrial DNA (mtDNA) replication4 . We developed a sensitive technique to label newly synthesized mtDNA in individual cells in order to study mtDNA biogenesis. The technique combines the incorporation of 5-ethynyl-2'-deoxyuridine (EdU)5-7 with a tyramide signal amplification (TSA)8 protocol to visualize mtDNA replication within subcellular compartments of neurons. EdU is superior to other thymidine analogs, such as 5-bromo-2-deoxyuridine (BrdU), because the initial click reaction to label EdU5-7 does not require the harsh acid treatments or enzyme digests that are required for exposing the BrdU epitope. The milder labeling of EdU allows for direct comparison of its incorporation with other cellular markers9-10 . The ability to visualize and quantify mtDNA biogenesis provides an essential tool for investigating the mechanisms used to regulate mitochondrial biogenesis and would provide insight into the pathogenesis associated with drug toxicity, aging, cancer and neurodegenerative diseases. Our technique is applicable to sensory neurons as well as other cell types. The use of this technique to measure mtDNA biogenesis has significant implications in furthering the understanding of both normal cellular physiology as well as impaired disease states. Neuroscience, Issue 45, mitochondria, mitochondrial DNA (mtDNA), 5-ethynyl-2'-deoxyuridine (EdU), labeling, tyramide signal amplification, mtDNA biogenesis, dorsal root ganglion neurons Determination of Protein-ligand Interactions Using Differential Scanning Fluorimetry Institutions: University of Exeter. A wide range of methods are currently available for determining the dissociation constant between a protein and interacting small molecules. However, most of these require access to specialist equipment, and often require a degree of expertise to effectively establish reliable experiments and analyze data. Differential scanning fluorimetry (DSF) is being increasingly used as a robust method for initial screening of proteins for interacting small molecules, either for identifying physiological partners or for hit discovery. This technique has the advantage that it requires only a PCR machine suitable for quantitative PCR, and so suitable instrumentation is available in most institutions; an excellent range of protocols are already available; and there are strong precedents in the literature for multiple uses of the method. Past work has proposed several means of calculating dissociation constants from DSF data, but these are mathematically demanding. Here, we demonstrate a method for estimating dissociation constants from a moderate amount of DSF experimental data. These data can typically be collected and analyzed within a single day. We demonstrate how different models can be used to fit data collected from simple binding events, and where cooperative binding or independent binding sites are present. Finally, we present an example of data analysis in a case where standard models do not apply. These methods are illustrated with data collected on commercially available control proteins, and two proteins from our research program. Overall, our method provides a straightforward way for researchers to rapidly gain further insight into protein-ligand interactions using DSF. Biophysics, Issue 91, differential scanning fluorimetry, dissociation constant, protein-ligand interactions, StepOne, cooperativity, WcbI. Rapid and Efficient Zebrafish Genotyping Using PCR with High-resolution Melt Analysis Institutions: University of Utah School of Medicine, University of Utah School of Medicine, University of Utah School of Medicine, University of Utah School of Medicine, University of Utah School of Medicine. Zebrafish is a powerful vertebrate model system for studying development, modeling disease, and performing drug screening. Recently a variety of genetic tools have been introduced, including multiple strategies for inducing mutations and generating transgenic lines. However, large-scale screening is limited by traditional genotyping methods, which are time-consuming and labor-intensive. Here we describe a technique to analyze zebrafish genotypes by PCR combined with high-resolution melting analysis (HRMA). This approach is rapid, sensitive, and inexpensive, with lower risk of contamination artifacts. Genotyping by PCR with HRMA can be used for embryos or adult fish, including in high-throughput screening protocols. Basic Protocol, Issue 84, genotyping, high-resolution melting analysis (HRMA), PCR, zebrafish, mutation, transgenes Single Oocyte Bisulfite Mutagenesis Institutions: Schulich School of Medicine and Dentistry, University of Western Ontario, Schulich School of Medicine and Dentistry, University of Western Ontario, Children's Health Research Institute. Epigenetics encompasses all heritable and reversible modifications to chromatin that alter gene accessibility, and thus are the primary mechanisms for regulating gene transcription1 . DNA methylation is an epigenetic modification that acts predominantly as a repressive mark. Through the covalent addition of a methyl group onto cytosines in CpG dinucleotides, it can recruit additional repressive proteins and histone modifications to initiate processes involved in condensing chromatin and silencing genes2 . DNA methylation is essential for normal development as it plays a critical role in developmental programming, cell differentiation, repression of retroviral elements, X-chromosome inactivation and genomic imprinting. One of the most powerful methods for DNA methylation analysis is bisulfite mutagenesis. Sodium bisulfite is a DNA mutagen that deaminates cytosines into uracils. Following PCR amplification and sequencing, these conversion events are detected as thymines. Methylated cytosines are protected from deamination and thus remain as cytosines, enabling identification of DNA methylation at the individual nucleotide level3 . Development of the bisulfite mutagenesis assay has advanced from those originally reported4-6 towards ones that are more sensitive and reproducible7 . One key advancement was embedding smaller amounts of DNA in an agarose bead, thereby protecting DNA from the harsh bisulfite treatment8 . This enabled methylation analysis to be performed on pools of oocytes and blastocyst-stage embryos9 . The most sophisticated bisulfite mutagenesis protocol to date is for individual blastocyst-stage embryos10 . However, since blastocysts have on average 64 cells (containing 120-720 pg of genomic DNA), this method is not efficacious for methylation studies on individual oocytes or cleavage-stage embryos. Taking clues from agarose embedding of minute DNA amounts including oocytes11 , here we present a method whereby oocytes are directly embedded in an agarose and lysis solution bead immediately following retrieval and removal of the zona pellucida from the oocyte. This enables us to bypass the two main challenges of single oocyte bisulfite mutagenesis: protecting a minute amount of DNA from degradation, and subsequent loss during the numerous protocol steps. Importantly, as data are obtained from single oocytes, the issue of PCR bias within pools is eliminated. Furthermore, inadvertent cumulus cell contamination is detectable by this method since any sample with more than one methylation pattern may be excluded from analysis12 . This protocol provides an improved method for successful and reproducible analyses of DNA methylation at the single-cell level and is ideally suited for individual oocytes as well as cleavage-stage embryos. Genetics, Issue 64, Developmental Biology, Biochemistry, Bisulfite mutagenesis, DNA methylation, individual oocyte, individual embryo, mouse model, PCR, epigenetics DNA Fingerprinting of Mycobacterium leprae Strains Using Variable Number Tandem Repeat (VNTR) - Fragment Length Analysis (FLA) Institutions: Colorado State University. The study of the transmission of leprosy is particularly difficult since the causative agent, Mycobacterium leprae , cannot be cultured in the laboratory. The only sources of the bacteria are leprosy patients, and experimentally infected armadillos and nude mice. Thus, many of the methods used in modern epidemiology are not available for the study of leprosy. Despite an extensive global drug treatment program for leprosy implemented by the WHO1 , leprosy remains endemic in many countries with approximately 250,000 new cases each year.2 The entire M. leprae genome has been mapped3,4 and many loci have been identified that have repeated segments of 2 or more base pairs (called micro- and minisatellites).5 Clinical strains of M. leprae may vary in the number of tandem repeated segments (short tandem repeats, STR) at many of these loci.5,6,7 Variable number tandem repeat (VNTR)5 analysis has been used to distinguish different strains of the leprosy bacilli. Some of the loci appear to be more stable than others, showing less variation in repeat numbers, while others seem to change more rapidly, sometimes in the same patient. While the variability of certain VNTRs has brought up questions regarding their suitability for strain typing7,8,9 , the emerging data suggest that analyzing multiple loci, which are diverse in their stability, can be used as a valuable epidemiological tool. Multiple locus VNTR analysis (MLVA)10 has been used to study leprosy evolution and transmission in several countries including China11,12 , the Philippines10,13 , and Brazil14 . MLVA involves multiple steps. First, bacterial DNA is extracted along with host tissue DNA from clinical biopsies or slit skin smears (SSS).10 The desired loci are then amplified from the extracted DNA via polymerase chain reaction (PCR). Fluorescently-labeled primers for 4-5 different loci are used per reaction, with 18 loci being amplified in a total of four reactions.10 The PCR products may be subjected to agarose gel electrophoresis to verify the presence of the desired DNA segments, and then submitted for fluorescent fragment length analysis (FLA) using capillary electrophoresis. DNA from armadillo passaged bacteria with a known number of repeat copies for each locus is used as a positive control. The FLA chromatograms are then examined using Peak Scanner software and fragment length is converted to number of VNTR copies (allele). Finally, the VNTR haplotypes are analyzed for patterns, and when combined with patient clinical data can be used to track distribution of strain types. Immunology, Issue 53, Mycobacterium leprae, leprosy, biopsy, STR, VNTR, PCR, fragment length analysis Demonstrating a Multi-drug Resistant Mycobacterium tuberculosis Amplification Microarray Institutions: Akonni Biosystems, Inc.. Simplifying microarray workflow is a necessary first step for creating MDR-TB microarray-based diagnostics that can be routinely used in lower-resource environments. An amplification microarray combines asymmetric PCR amplification, target size selection, target labeling, and microarray hybridization within a single solution and into a single microfluidic chamber. A batch processing method is demonstrated with a 9-plex asymmetric master mix and low-density gel element microarray for genotyping multi-drug resistant Mycobacterium tuberculosis (MDR-TB). The protocol described here can be completed in 6 hr and provide correct genotyping with at least 1,000 cell equivalents of genomic DNA. Incorporating on-chip wash steps is feasible, which will result in an entirely closed amplicon method and system. The extent of multiplexing with an amplification microarray is ultimately constrained by the number of primer pairs that can be combined into a single master mix and still achieve desired sensitivity and specificity performance metrics, rather than the number of probes that are immobilized on the array. Likewise, the total analysis time can be shortened or lengthened depending on the specific intended use, research question, and desired limits of detection. Nevertheless, the general approach significantly streamlines microarray workflow for the end user by reducing the number of manually intensive and time-consuming processing steps, and provides a simplified biochemical and microfluidic path for translating microarray-based diagnostics into routine clinical practice. Immunology, Issue 86, MDR-TB, gel element microarray, closed amplicon, drug resistance, rifampin, isoniazid, streptomycin, ethambutol Profiling of Estrogen-regulated MicroRNAs in Breast Cancer Cells Institutions: University of Houston. Estrogen plays vital roles in mammary gland development and breast cancer progression. It mediates its function by binding to and activating the estrogen receptors (ERs), ERα, and ERβ. ERα is frequently upregulated in breast cancer and drives the proliferation of breast cancer cells. The ERs function as transcription factors and regulate gene expression. Whereas ERα's regulation of protein-coding genes is well established, its regulation of noncoding microRNA (miRNA) is less explored. miRNAs play a major role in the post-transcriptional regulation of genes, inhibiting their translation or degrading their mRNA. miRNAs can function as oncogenes or tumor suppressors and are also promising biomarkers. Among the miRNA assays available, microarray and quantitative real-time polymerase chain reaction (qPCR) have been extensively used to detect and quantify miRNA levels. To identify miRNAs regulated by estrogen signaling in breast cancer, their expression in ERα-positive breast cancer cell lines were compared before and after estrogen-activation using both the µParaflo-microfluidic microarrays and Dual Labeled Probes-low density arrays. Results were validated using specific qPCR assays, applying both Cyanine dye-based and Dual Labeled Probes-based chemistry. Furthermore, a time-point assay was used to identify regulations over time. Advantages of the miRNA assay approach used in this study is that it enables a fast screening of mature miRNA regulations in numerous samples, even with limited sample amounts. The layout, including the specific conditions for cell culture and estrogen treatment, biological and technical replicates, and large-scale screening followed by in-depth confirmations using separate techniques, ensures a robust detection of miRNA regulations, and eliminates false positives and other artifacts. However, mutated or unknown miRNAs, or regulations at the primary and precursor transcript level, will not be detected. The method presented here represents a thorough investigation of estrogen-mediated miRNA regulation. Medicine, Issue 84, breast cancer, microRNA, estrogen, estrogen receptor, microarray, qPCR Primer Extension Capture: Targeted Sequence Retrieval from Heavily Degraded DNA Sources Institutions: Max-Planck Institute for Evolutionary Anthropology, Leipzig. We present a method of targeted DNA sequence retrieval from DNA sources which are heavily degraded and contaminated with microbial DNA, as is typical of ancient bones. The method greatly reduces sample destruction and sequencing demands relative to direct PCR or shotgun sequencing approaches. We used this method to reconstruct the complete mitochondrial DNA (mtDNA) genomes of five Neandertals from across their geographic range. The mtDNA genetic diversity of the late Neandertals was approximately three times lower than that of contemporary modern humans. Together with analyses of mtDNA protein evolution, these data suggest that the long-term effective population size of Neandertals was smaller than that of modern humans and extant great apes. Cellular Biology, Issue 31, Neandertal, anthropology, evolution, ancient DNA, DNA sequencing, targeted sequencing, capture Detecting Somatic Genetic Alterations in Tumor Specimens by Exon Capture and Massively Parallel Sequencing Institutions: Memorial Sloan-Kettering Cancer Center, Memorial Sloan-Kettering Cancer Center. Efforts to detect and investigate key oncogenic mutations have proven valuable to facilitate the appropriate treatment for cancer patients. The establishment of high-throughput, massively parallel "next-generation" sequencing has aided the discovery of many such mutations. To enhance the clinical and translational utility of this technology, platforms must be high-throughput, cost-effective, and compatible with formalin-fixed paraffin embedded (FFPE) tissue samples that may yield small amounts of degraded or damaged DNA. Here, we describe the preparation of barcoded and multiplexed DNA libraries followed by hybridization-based capture of targeted exons for the detection of cancer-associated mutations in fresh frozen and FFPE tumors by massively parallel sequencing. This method enables the identification of sequence mutations, copy number alterations, and select structural rearrangements involving all targeted genes. Targeted exon sequencing offers the benefits of high throughput, low cost, and deep sequence coverage, thus conferring high sensitivity for detecting low frequency mutations. Molecular Biology, Issue 80, Molecular Diagnostic Techniques, High-Throughput Nucleotide Sequencing, Genetics, Neoplasms, Diagnosis, Massively parallel sequencing, targeted exon sequencing, hybridization capture, cancer, FFPE, DNA mutations RNA Catalyst as a Reporter for Screening Drugs against RNA Editing in Trypanosomes Institutions: McGill University, McGill University, McGill University. Substantial progress has been made in determining the mechanism of mitochondrial RNA editing in trypanosomes. Similarly, considerable progress has been made in identifying the components of the editosome complex that catalyze RNA editing. However, it is still not clear how those proteins work together. Chemical compounds obtained from a high-throughput screen against the editosome may block or affect one or more steps in the editing cycle. Therefore, the identification of new chemical compounds will generate valuable molecular probes for dissecting the editosome function and assembly. In previous studies, in vitro editing assays were carried out using radio-labeled RNA. These assays are time consuming, inefficient and unsuitable for high-throughput purposes. Here, a homogenous fluorescence-based “mix and measure” hammerhead ribozyme in vitro reporter assay to monitor RNA editing, is presented. Only as a consequence of RNA editing of the hammerhead ribozyme a fluorescence resonance energy transfer (FRET) oligoribonucleotide substrate undergoes cleavage. This in turn results in separation of the fluorophore from the quencher thereby producing a signal. In contrast, when the editosome function is inhibited, the fluorescence signal will be quenched. This is a highly sensitive and simple assay that should be generally applicable to monitor in vitro RNA editing or high throughput screening of chemicals that can inhibit the editosome function. Genetics, Issue 89, RNA editing, Trypanosoma brucei, Editosome, Hammerhead ribozyme (HHR), High-throughput screening, Fluorescence resonance energy transfer (FRET) Infinium Assay for Large-scale SNP Genotyping Applications Institutions: Oklahoma Medical Research Foundation. Genotyping variants in the human genome has proven to be an efficient method to identify genetic associations with phenotypes. The distribution of variants within families or populations can facilitate identification of the genetic factors of disease. Illumina's panel of genotyping BeadChips allows investigators to genotype thousands or millions of single nucleotide polymorphisms (SNPs) or to analyze other genomic variants, such as copy number, across a large number of DNA samples. These SNPs can be spread throughout the genome or targeted in specific regions in order to maximize potential discovery. The Infinium assay has been optimized to yield high-quality, accurate results quickly. With proper setup, a single technician can process from a few hundred to over a thousand DNA samples per week, depending on the type of array. This assay guides users through every step, starting with genomic DNA and ending with the scanning of the array. Using propriety reagents, samples are amplified, fragmented, precipitated, resuspended, hybridized to the chip, extended by a single base, stained, and scanned on either an iScan or Hi Scan high-resolution optical imaging system. One overnight step is required to amplify the DNA. The DNA is denatured and isothermally amplified by whole-genome amplification; therefore, no PCR is required. Samples are hybridized to the arrays during a second overnight step. By the third day, the samples are ready to be scanned and analyzed. Amplified DNA may be stockpiled in large quantities, allowing bead arrays to be processed every day of the week, thereby maximizing throughput. Basic Protocol, Issue 81, genomics, SNP, Genotyping, Infinium, iScan, HiScan, Illumina A Restriction Enzyme Based Cloning Method to Assess the In vitro Replication Capacity of HIV-1 Subtype C Gag-MJ4 Chimeric Viruses Institutions: Emory University, Emory University. The protective effect of many HLA class I alleles on HIV-1 pathogenesis and disease progression is, in part, attributed to their ability to target conserved portions of the HIV-1 genome that escape with difficulty. Sequence changes attributed to cellular immune pressure arise across the genome during infection, and if found within conserved regions of the genome such as Gag, can affect the ability of the virus to replicate in vitro . Transmission of HLA-linked polymorphisms in Gag to HLA-mismatched recipients has been associated with reduced set point viral loads. We hypothesized this may be due to a reduced replication capacity of the virus. Here we present a novel method for assessing the in vitro replication of HIV-1 as influenced by the gag gene isolated from acute time points from subtype C infected Zambians. This method uses restriction enzyme based cloning to insert the gag gene into a common subtype C HIV-1 proviral backbone, MJ4. This makes it more appropriate to the study of subtype C sequences than previous recombination based methods that have assessed the in vitro replication of chronically derived gag-pro sequences. Nevertheless, the protocol could be readily modified for studies of viruses from other subtypes. Moreover, this protocol details a robust and reproducible method for assessing the replication capacity of the Gag-MJ4 chimeric viruses on a CEM-based T cell line. This method was utilized for the study of Gag-MJ4 chimeric viruses derived from 149 subtype C acutely infected Zambians, and has allowed for the identification of residues in Gag that affect replication. More importantly, the implementation of this technique has facilitated a deeper understanding of how viral replication defines parameters of early HIV-1 pathogenesis such as set point viral load and longitudinal CD4+ T cell decline. Infectious Diseases, Issue 90, HIV-1, Gag, viral replication, replication capacity, viral fitness, MJ4, CEM, GXR25 An Affordable HIV-1 Drug Resistance Monitoring Method for Resource Limited Settings Institutions: University of KwaZulu-Natal, Durban, South Africa, Jembi Health Systems, University of Amsterdam, Stanford Medical School. HIV-1 drug resistance has the potential to seriously compromise the effectiveness and impact of antiretroviral therapy (ART). As ART programs in sub-Saharan Africa continue to expand, individuals on ART should be closely monitored for the emergence of drug resistance. Surveillance of transmitted drug resistance to track transmission of viral strains already resistant to ART is also critical. Unfortunately, drug resistance testing is still not readily accessible in resource limited settings, because genotyping is expensive and requires sophisticated laboratory and data management infrastructure. An open access genotypic drug resistance monitoring method to manage individuals and assess transmitted drug resistance is described. The method uses free open source software for the interpretation of drug resistance patterns and the generation of individual patient reports. The genotyping protocol has an amplification rate of greater than 95% for plasma samples with a viral load >1,000 HIV-1 RNA copies/ml. The sensitivity decreases significantly for viral loads <1,000 HIV-1 RNA copies/ml. The method described here was validated against a method of HIV-1 drug resistance testing approved by the United States Food and Drug Administration (FDA), the Viroseq genotyping method. Limitations of the method described here include the fact that it is not automated and that it also failed to amplify the circulating recombinant form CRF02_AG from a validation panel of samples, although it amplified subtypes A and B from the same panel. Medicine, Issue 85, Biomedical Technology, HIV-1, HIV Infections, Viremia, Nucleic Acids, genetics, antiretroviral therapy, drug resistance, genotyping, affordable Polymerase Chain Reaction: Basic Protocol Plus Troubleshooting and Optimization Strategies Institutions: University of California, Los Angeles . In the biological sciences there have been technological advances that catapult the discipline into golden ages of discovery. For example, the field of microbiology was transformed with the advent of Anton van Leeuwenhoek's microscope, which allowed scientists to visualize prokaryotes for the first time. The development of the polymerase chain reaction (PCR) is one of those innovations that changed the course of molecular science with its impact spanning countless subdisciplines in biology. The theoretical process was outlined by Keppe and coworkers in 1971; however, it was another 14 years until the complete PCR procedure was described and experimentally applied by Kary Mullis while at Cetus Corporation in 1985. Automation and refinement of this technique progressed with the introduction of a thermal stable DNA polymerase from the bacterium Thermus aquaticus , consequently the name Taq PCR is a powerful amplification technique that can generate an ample supply of a specific segment of DNA (i.e., an amplicon) from only a small amount of starting material (i.e., DNA template or target sequence). While straightforward and generally trouble-free, there are pitfalls that complicate the reaction producing spurious results. When PCR fails it can lead to many non-specific DNA products of varying sizes that appear as a ladder or smear of bands on agarose gels. Sometimes no products form at all. Another potential problem occurs when mutations are unintentionally introduced in the amplicons, resulting in a heterogeneous population of PCR products. PCR failures can become frustrating unless patience and careful troubleshooting are employed to sort out and solve the problem(s). This protocol outlines the basic principles of PCR, provides a methodology that will result in amplification of most target sequences, and presents strategies for optimizing a reaction. By following this PCR guide, students should be able to: Set up reactions and thermal cycling conditions for a conventional PCR experiment Understand the function of various reaction components and their overall effect on a PCR experiment Design and optimize a PCR experiment for any DNA template Troubleshoot failed PCR experiments Basic Protocols, Issue 63, PCR, optimization, primer design, melting temperature, Tm, troubleshooting, additives, enhancers, template DNA quantification, thermal cycler, molecular biology, genetics An Allelotyping PCR for Identifying Salmonella enterica serovars Enteritidis, Hadar, Heidelberg, and Typhimurium Institutions: University of Georgia. Current commercial PCRs tests for identifying Salmonella target genes unique to this genus. However, there are two species, six subspecies, and over 2,500 different Salmonella serovars, and not all are equal in their significance to public health. For example, finding S. enterica subspecies IIIa Arizona on a table egg layer farm is insignificant compared to the isolation of S. enterica subspecies I serovar Enteritidis, the leading cause of salmonellosis linked to the consumption of table eggs. Serovars are identified based on antigenic differences in lipopolysaccharide (LPS)(O antigen) and flagellin (H1 and H2 antigens). These antigenic differences are the outward appearance of the diversity of genes and gene alleles associated with this phenotype. We have developed an allelotyping, multiplex PCR that keys on genetic differences between four major S. enterica subspecies I serovars found in poultry and associated with significant human disease in the US. The PCR primer pairs were targeted to key genes or sequences unique to a specific Salmonella serovar and designed to produce an amplicon with size specific for that gene or allele. Salmonella serovar is assigned to an isolate based on the combination of PCR test results for specific LPS and flagellin gene alleles. The multiplex PCRs described in this article are specific for the detection of S. enterica subspecies I serovars Enteritidis, Hadar, Heidelberg, and Typhimurium. Here we demonstrate how to use the multiplex PCRs to identify serovar for a Salmonella Immunology, Issue 53, PCR, Salmonella, multiplex, Serovar Ratiometric Biosensors that Measure Mitochondrial Redox State and ATP in Living Yeast Cells Institutions: Columbia University, Columbia University. Mitochondria have roles in many cellular processes, from energy metabolism and calcium homeostasis to control of cellular lifespan and programmed cell death. These processes affect and are affected by the redox status of and ATP production by mitochondria. Here, we describe the use of two ratiometric, genetically encoded biosensors that can detect mitochondrial redox state and ATP levels at subcellular resolution in living yeast cells. Mitochondrial redox state is measured using redox-sensitive Green Fluorescent Protein (roGFP) that is targeted to the mitochondrial matrix. Mito-roGFP contains cysteines at positions 147 and 204 of GFP, which undergo reversible and environment-dependent oxidation and reduction, which in turn alter the excitation spectrum of the protein. MitGO-ATeam is a Förster resonance energy transfer (FRET) probe in which the ε subunit of the Fo -ATP synthase is sandwiched between FRET donor and acceptor fluorescent proteins. Binding of ATP to the ε subunit results in conformation changes in the protein that bring the FRET donor and acceptor in close proximity and allow for fluorescence resonance energy transfer from the donor to acceptor. Bioengineering, Issue 77, Microbiology, Cellular Biology, Molecular Biology, Biochemistry, life sciences, roGFP, redox-sensitive green fluorescent protein, GO-ATeam, ATP, FRET, ROS, mitochondria, biosensors, GFP, ImageJ, microscopy, confocal microscopy, cell, imaging Methods to Assess Subcellular Compartments of Muscle in C. elegans Institutions: University of Nottingham. Muscle is a dynamic tissue that responds to changes in nutrition, exercise, and disease state. The loss of muscle mass and function with disease and age are significant public health burdens. We currently understand little about the genetic regulation of muscle health with disease or age. The nematode C. elegans is an established model for understanding the genomic regulation of biological processes of interest. This worm’s body wall muscles display a large degree of homology with the muscles of higher metazoan species. Since C. elegans is a transparent organism, the localization of GFP to mitochondria and sarcomeres allows visualization of these structures in vivo . Similarly, feeding animals cationic dyes, which accumulate based on the existence of a mitochondrial membrane potential, allows the assessment of mitochondrial function in vivo . These methods, as well as assessment of muscle protein homeostasis, are combined with assessment of whole animal muscle function, in the form of movement assays, to allow correlation of sub-cellular defects with functional measures of muscle performance. Thus, C. elegans provides a powerful platform with which to assess the impact of mutations, gene knockdown, and/or chemical compounds upon muscle structure and function. Lastly, as GFP, cationic dyes, and movement assays are assessed non-invasively, prospective studies of muscle structure and function can be conducted across the whole life course and this at present cannot be easily investigated in vivo in any other organism. Developmental Biology, Issue 93, Physiology, C. elegans, muscle, mitochondria, sarcomeres, ageing Pyrosequencing: A Simple Method for Accurate Genotyping Institutions: Washington University in St. Louis. Pharmacogenetic research benefits first-hand from the abundance of information provided by the completion of the Human Genome Project. With such a tremendous amount of data available comes an explosion of genotyping methods. Pyrosequencing(R) is one of the most thorough yet simple methods to date used to analyze polymorphisms. It also has the ability to identify tri-allelic, indels, short-repeat polymorphisms, along with determining allele percentages for methylation or pooled sample assessment. In addition, there is a standardized control sequence that provides internal quality control. This method has led to rapid and efficient single-nucleotide polymorphism evaluation including many clinically relevant polymorphisms. The technique and methodology of Pyrosequencing is explained. Cellular Biology, Issue 11, Springer Protocols, Pyrosequencing, genotype, polymorphism, SNP, pharmacogenetics, pharmacogenomics, PCR Molecular Evolution of the Tre Recombinase Institutions: Max Plank Institute for Molecular Cell Biology and Genetics, Dresden. Here we report the generation of Tre recombinase through directed, molecular evolution. Tre recombinase recognizes a pre-defined target sequence within the LTR sequences of the HIV-1 provirus, resulting in the excision and eradication of the provirus from infected human cells. We started with Cre, a 38-kDa recombinase, that recognizes a 34-bp double-stranded DNA sequence known as loxP. Because Cre can effectively eliminate genomic sequences, we set out to tailor a recombinase that could remove the sequence between the 5'-LTR and 3'-LTR of an integrated HIV-1 provirus. As a first step we identified sequences within the LTR sites that were similar to loxP and tested for recombination activity. Initially Cre and mutagenized Cre libraries failed to recombine the chosen loxLTR sites of the HIV-1 provirus. As the start of any directed molecular evolution process requires at least residual activity, the original asymmetric loxLTR sequences were split into subsets and tested again for recombination activity. Acting as intermediates, recombination activity was shown with the subsets. Next, recombinase libraries were enriched through reiterative evolution cycles. Subsequently, enriched libraries were shuffled and recombined. The combination of different mutations proved synergistic and recombinases were created that were able to recombine loxLTR1 and loxLTR2. This was evidence that an evolutionary strategy through intermediates can be successful. After a total of 126 evolution cycles individual recombinases were functionally and structurally analyzed. The most active recombinase -- Tre -- had 19 amino acid changes as compared to Cre. Tre recombinase was able to excise the HIV-1 provirus from the genome HIV-1 infected HeLa cells (see "HIV-1 Proviral DNA Excision Using an Evolved Recombinase", Hauber J., Heinrich-Pette-Institute for Experimental Virology and Immunology, Hamburg, Germany). While still in its infancy, directed molecular evolution will allow the creation of custom enzymes that will serve as tools of "molecular surgery" and molecular medicine. Cell Biology, Issue 15, HIV-1, Tre recombinase, Site-specific recombination, molecular evolution Purification of Mitochondria from Yeast Cells Institutions: Concordia University. Mitochondria are the main site of ATP production during aerobic metabolism in eukaryotic non-photosynthetic cells1 . These complex organelles also play essential roles in apoptotic cell death2 , cell survival3 , mammalian development4 , neuronal development and function4 , intracellular signalling5 , and longevity regulation6 . Our understanding of these complex biological processes controlled by mitochondria relies on robust methods for assessing their morphology, their protein and lipid composition, the integrity of their DNA, and their numerous vital functions. The budding yeast Saccharomyces cerevisiae , a genetically and biochemically manipulable unicellular eukaryote with annotated genome and well-defined proteome, is a valuable model for studying the molecular and cellular mechanisms underlying essential biological functions of mitochondria. For these types of studies, it is crucial to have highly pure mitochondria. Here we present a detailed description of a rapid and effective method for purification of yeast mitochondria. This method enables the isolation of highly pure mitochondria that are essentially free of contamination by other organelles and retain their structural and functional integrity after their purification. Mitochondria purified by this method are suitable for cell-free reconstitution of essential mitochondrial processes and can be used for the analysis of mitochondrial structure and functions, mitochondrial proteome and lipidome, and mitochondrial DNA. Cellular Biology, Issue 30, subcellular fractionation, organelles, organelle purification, mitochondria Rapid Genotyping of Mouse Tissue Using Sigma's Extract-N-Amp Tissue PCR Kit Institutions: University of California, Irvine (UCI). Genomic detection of DNA via PCR amplification and detection on an electrophoretic gel is a standard way that the genotype of a tissue sample is determined. Conventional preparation of tissues for PCR-ready DNA often take several hours to days, depending on the tissue sample. The genotype of the sample may thus be delayed for several days, which is not an option for many different types of experiments. Here we demonstrate the complete genotyping of a mouse tail sample, including tissue digestion and PCR readout, in one and a half hours using Sigma's SYBR Green Extract-N-Amp Tissue PCR Kit. First, we demonstrate the fifteen-minute extraction of DNA from the tissue sample. Then, we demonstrate the real time read-out of the PCR amplification of the sample, which allows for the identification of a positive sample as it is being amplified. Together, the rapid extraction and real-time readout allow for a prompt identification of genotype of a variety different types of tissues through the reliable method of PCR. Basic Protocols, Issue 11, genotyping, PCR, DNA extraction, Mice
<urn:uuid:47fa1a08-26da-418b-83a4-213a6e7807b2>
CC-MAIN-2017-04
http://www.jove.com/visualize/abstract/20020064/fluorescent-duplex-allele-specific-pcr-amplicon-melting-for-rapid
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00339-ip-10-171-10-70.ec2.internal.warc.gz
en
0.902766
10,634
1.984375
2
In the wake of the difficult 1919 Paris Peace Conference negotiations and the U.S. Senate’s rejection of the Treaty of Versailles, a group of diplomats, financiers, scholars, and lawyers concluded that Americans needed to be better prepared for significant responsibilities and decision-making in world affairs. With this in mind, they founded the Council on Foreign Relations in 1921 to “afford a continuous conference on international questions affecting the United States, by bringing together experts on statecraft, finance, industry, education, and science.” CFR’s early members believed it was important for the institution to be both nonpartisan and noncommercial. Members were chosen for their knowledge of foreign affairs and their ability to contribute to discussions and debate. Important statesmen were invited to speak and answer questions at meetings, and small groups were formed to discuss serious issues of the day and publish their findings. These traditions continue as an important part of CFR’s mission. For a more complete account of CFR's founding and history, view Peter Grose's book Continuing the Inquiry. Former secretary of state and Nobel Peace Prize winner Elihu Root (second from left) was one of the founders of the Council on Foreign Relations. He is shown here (left to right) with CFR President John W. Davis, U.S. secretary of war Newton D. Baker, and Foreign Affairs editor Hamilton Fish Armstrong. Membership Application Deadlines: November 1 and March 1 Term Membership Application Deadline: January 3, 2017 Membership in the CFR Corporate Program is tailored to meet the needs of your organization. To learn more, please visit the About Corporate page, view a printable brochure, and see our current list of members. To find out if Corporate membership would benefit your company, contact the Corporate Program at email@example.com or 212.434.9684. Published by the Council on Foreign Relations since 1922 CFR offers exceptional opportunities for individuals at all levels in their careers.Foreign Affairs Job Board Search the ultimate resource for careers in international affairs. Learn more about CFR’s mission and its work over the past year in the 2016 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »
<urn:uuid:dd05c8b9-3451-485a-a036-1cd08f5e3afe>
CC-MAIN-2017-04
http://www.cfr.org/about/history/cfr/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00392-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948422
484
1.929688
2
With Instructables you can share what you make with the world, and tap into an ever-growing community of creative experts. Tell us about yourself! Introduction to Canning & Preserving LEDs and Lighting Class Hand Sewing Class Harbor Fright cheap set of lath tools. Cheap tools all around. After you find the ones you really like then go buy the good ones. Christmas Ornament, Inside Out Turning How to Build a Circle Cutting Jig for Your Router Cut the wood plate down the center where the dowel fits in (long oval hole). So you have one long continuous hole the dowel will fit in. Cut the dowel top off and add a screw and washer on top of the dowel. So you can loosen and tighten the dowel. That way you can adjust the jig to size just by loosening the dowel to the radius of the circle you want.I hope you get that. Wooden Mallet Using Dowels Great job. I like the fastness of the video. I love watching lath vids but sometimes they drag. Ink jet to wood using rice paper and polyurethane LED Fairy Light Globes Sweet. I will say even this, having less tools then you I would still go the long route. I bought exacto knives and just use them. Great Job. I was thinking put some magnets on the base so the stack stays on better. Also I was wondering how you kept the pipe stack in the hole on top. You have no pictures of that. Great idea. How about we use what most of married men have in the house. Nail polish and remover. Between my kids and wife, I can mark the world. Make Conductive Glue and Glue a Circuit Make Your Own Boombox Join 2 million + to receive instant DIY inspiration in your inbox. © 2016 Autodesk, Inc.
<urn:uuid:3777df5d-ad17-4ddd-af71-5fbb3493fb12>
CC-MAIN-2017-04
http://www.instructables.com/member/IanC113/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00151-ip-10-171-10-70.ec2.internal.warc.gz
en
0.912605
403
1.835938
2
Saskatchewan needs to do its part in reducing emissions of greenhouse gases by conserving energy and adopting sustainable energy options to minimize our use of fossil fuels. The Saskatchewan Environmental Society’s energy policy work and conservation projects are making a significant contribution to the solutions. Saskatchewan is fortunate to have a remarkable wind, solar, and biomass resource that is currently under-utilized. Public policy is critically important to the development of a low carbon, renewable energy future. SES has developed several policy documents on renewable energy and has encouraged the Saskatchewan government to move forward with these policies. The need to do so is made more urgent by climate change. In 2016, the Saskatchewan Environmental Society organized Saskatchewan’s first solar power co-op – a way to offer hassle-free renewable power with economies of scale. Learn more about the SES Solar Co-operative Ltd., or contact by email: email@example.com. Check out the Renewable Energy Toolkit if you are thinking about starting a renewable energy co-op in your community. The toolkit includes seven steps for forming a renewable energy co-op, renewable energy installation tips, lessons learned, important co-operative documents and forms, templates for bylaws, contracts and business plans, and more. SES is actively engaged in providing energy audit services to businesses and non-profits. Learn more about our Efficiency for Organizations and Building Operator Training programs. Both are focused on improving energy efficiency. Every person in a building has a role to play in energy conservation. By turning off equipment when not in use, not blocking heating and ventilation equipment, making smart purchases, and being generally aware of how our actions affect energy use, energy consumption can be reduced by 5-10%. For a presentation on how to achieve this kind of reduction in your workplace, see our Energy Awareness Training. SES has also developed a series of innovative stories and videos from businesses, organizations, communities, and farms in rural and small town Saskatchewan that are making changes that are good for the climate and good for their bottom line. Small changes add up and can have significant long-term impacts. SES advocates for government policies that will help energy to be used more efficiently in Saskatchewan. We are also encouraging SaskPower to move away from coal-fired power plants and to focus on building a renewable energy future for our province. Part of that process will be supporting the Saskatchewan workforce from non-renewable to renewable jobs. Read about good policy measures for planning for the transition in a carbon-constrained world.
<urn:uuid:3cfaeb8f-7dd3-47e8-a040-39533e2cdfb7>
CC-MAIN-2022-33
https://environmentalsociety.ca/issues/energy-solutions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00674.warc.gz
en
0.941645
522
2.96875
3
Rare Earth Elements are vital to the development and manufacturing of high-tech devices such as computers, cell phones, and our national defense systems,” said U.S. Secretary of Energy Rick Perry. CHEYENNE, Wyo. (PRWEB) June 28, 2019 Additional surveys and drilling at the REE Magnesium Inc mine site have confirmed the existence of rare earth elements (REE) in conjunction with the already proven reserves of 22 million tons of magnesium oxide. REE Magnesium Inc will be the refiner of REE and magnesium from that mine. In addition to the confirmation of commercially viable rare earth elements, REE Magnesium Inc has entered into a partnership with CVMR® (USA) Inc. (CVMR®) to design, build and operate the refinery. CVMR® will assist REE Magnesium Inc in importing heavy REE to the United States from three African countries to refine. This will create one of the largest “World Class” metal refining establishments in the United States that can refine heavy rare earth elements, magnesium, vanadium, nickel, and cobalt using CVMR®’s proprietary processes and technologies without any impact on the environment. CVMR®’s technologies also allow extraction of REE from coal ash. REE Magnesium Inc has been licensed by CVMR® to use these technologies in its refining operations in the United States. The refinery will be refining magnesium, energy-related metals, and rare earth elements. On November 29, 2017, U.S. Department of Energy’s (DOE) National Energy Technology Laboratory (NETL) announced that it had found high rare earth element (REE) concentrations in coal samples taken from Illinois, Northern Appalachian, Central Appalachian, Rocky Mountain Coal Basins, and the Pennsylvania Anthracite region. These highly concentrated samples are greater than 300 parts per million (ppm). “Rare Earth Elements are vital to the development and manufacturing of high-tech devices such as computers, cell phones, and our national defense systems,” said U.S. Secretary of Energy Rick Perry. “The current difficulties and high expenses associated with REE extraction have left the U.S. dependent on foreign REE imports. Supporting innovative research and development to establish efficient, cost-effective REE extraction methods is critical to our country’s energy and national security.” Developments within the U.S. government will directly influence metal markets and the application of advanced technologies for production and use of various metals. U.S. government developments are focused on metals and metal products that are used in batteries, electronic devices, aerospace, the automotive industry, and defense-related systems. The U.S. government’s overall strategy is to: 1. Establish stockpiles of ores, processed metals and concentrates, and recycled materials 2. Support production capacity in the form of sustained resources and needed investments for an integrated US capability 3. Encourage new technology development and improvements in the production processes 4. Drive the recovery, reuse, and recycling of strategic materials by U.S. government agencies through life cycle planning and the design of recovered constituents as an end-use disposition The technologies of CVMR® are well-positioned to support the United States strategy, and in partnership with REE Magnesium Inc's resources and strategic capabilities, together they can provide advanced metal refining and the production of progressive metal forms that make product innovation in this field a reality. Section 14 of the Strategic and Critical Materials Stock Piling Act, the U.S. Department of Defense (DOD) assessment of potential U.S. problems regarding strategic and critical non-fuel materials in the context of a congressionally-mandated Base Case planning scenario, identifies 23 materials that are considered by the intelligence community, along with input from the DOD and the Department of the Interior to have a shortfall—insufficient supply to meet demand. In the past year, the prices of many of the strategic metal elements, assessed by the DOE to be of strategic importance, have been highly volatile; in some cases, they have increased tenfold. In recent years, demand for almost all of the 23 materials examined has grown more rapidly than demand for commodity metals such as steel. The growing demand for the materials studied by the DOE is derived, in part, from clean energy technologies as well as consumer products such as cell phones, computers, and flat panel televisions. In general, global materials supply has been slow to respond to the rise in demand over the past decade due to a lack of available capital, required long lead time, trade policies, and other factors. For many key materials, market response is further complicated by the complexities of production. In addition, for some key materials, the market’s lack of transparency can affect its ability to function efficiently. Many governments recognize the growing importance of raw materials to economic competitiveness and are taking an active role in mitigating supply risks. REE Magnesium Inc is responding to these market opportunities by offering additional sources of supply and a World Class refining complex in the heart of the United States, using CVMR®’s proprietary technologies and know how. The capital requirement for this project exceeds $500 million. The first phase is estimated to cost approximately $60 million and is well underway. For more information, contact Cliff Boyd.
<urn:uuid:e2a63957-cd88-4c67-b285-2195d1e7d89b>
CC-MAIN-2022-33
https://www.prweb.com/releases/a_world_class_refinery_of_strategic_metals_in_the_united_states/prweb16410309.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00077.warc.gz
en
0.931074
1,113
2.015625
2
When they print "pit bull attack" articles. This one was written by Leisa Boysen and can be found on the BSL Workshop site. I have added a comment at the bottom. The Media and BSL by Leisa Boysen As we are all well aware…the media holds a tremendous amount of power over public perception of any given issue reported on. We feel it is time to begin focusing on the media directly and asking hard hitting questions of THEM regarding the information they are putting out there regarding dog bites, dog attacks and breed No one should ever be subjected to being approached by a loose dog or to a dog bite. Children should never have to endure being in harms way with a dog nor should our pets be at risk in their own yards or How can these issues be addressed and community safety be provided? By focus on those who are irresponsible owners and those parents who do not properly supervise their children. We have put together a list of questions we would like to see people from across the country flood mailboxes with in the instance of a less-than desirable account in the media of our breeds. There is usually a link for the reporter and searching the "Contact Us" link will usually produce the Editor's contact information, as well. We encourage all to take a proactive stance and email/call or fax questions to reporters to find out exactly where they got their information and urge them to focus on the true issues at hand. Some questions to ask have been listed below. You do not need to use all of the questions and please add your own questions/information as *Who identified the breed involved in this story? *Who was responsible for the dog (s) (and child if appropriate)in *What is this communities dog at large law? *Do you forsee the responsible party being held accountable for this *Are there Responsible Dog Owners groups in your area? *Does Animal Control have a timely response to dog at large calls? *What exactly is the dog at large call procedure in this community? *Will you be doing a follow up on this story regarding the issue of *I would encourage you, as a media source, to do some type of follow up which would include a true community service by bringing up what responsible dog ownership entails. I have taken the liberty of including an informational sheet which highlights many things responsible dog owners do in order to provide safety for their pets and those in their community, as well. *Not only are media sources responsible for bringing us our news they are also responsible for truth in journalism and providing their community and readers with helpful information that enhances and encourages learning and change. I feel one of the greatest accomplishment and public service a news source can provide is accurate information and and what can be done to address the true issue of the story. I would encourage you to follow up your story with information which would focus on the irresponsible party and what your community can do to address this issue. Me again (Laura) Here are a few comments that I included in a recent letter to a reporter (I copied the News Editor and the General Manager of the TV station as well as a number of advocates). While I understand that the phrase "pit bull" creates quite a buzz for news stories, so-called pit bull attacks are reported at a rate of up to 91:1 over attacks of SIMILAR SEVERITY by dogs of other breeds. As evidence, I submit the fact that a Doberman attack on an Indianapolis toddler (the child required about 300 stitches) went virtually unnoticed by media while the two recent "pit bull" stories are getting heavy coverage. For more information, please refer to the attached item from the National Canine Research Council. (*a printout of this report was attached: http://www.animalfarmfoundation.org/top ... 5&topic=18 As you contemplate coverage of dog attacks in the future you should be aware that, by perpetuating the misperception of pit bulls as inherently more dangerous than other dogs, you are (presumably unwittingly) perpetuating their marginalization by society and, as a result, the staggering abuse and profound suffering of an entire population of dogs. Additionally, you are misleading the public and causing misperceptions about dog safety which could have lethal repercussions. If you are going to report dog attacks, please report ALL attacks or none at all. Anything less would be unethical, irresponsible, inhumane, and flat-out sensationalism There's a fine line between genius and insanity. I have erased this line.
<urn:uuid:54caef17-7e7b-407c-a706-eb9a3a872e60>
CC-MAIN-2016-44
http://www.pitbulltalk.com/viewtopic.php?p=133508
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00055-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940158
1,007
1.960938
2
The value of Continuous Refactoring Refactoring is one of those skills that programming classes tend to ignore. But everyone has to refactor code. Refactor is evening one of the stages of the TDD cycle: Red, Green Refactor. So, if refactoring is that important, why it is a skill that we should learn by ourselves? Why we leave the job to benevolent Senior Developers in our teams? Why we approach it as a skill that will come through experience? As a skill that doesn't require training? For sure is something that experience will bring. But we are responsible for making it a structured practice since the early days. And that requires learning. Learning code smells, refactoring tactics, best practices, etc. Otherwise, most of the times someone refactors the code, they are just re-writing it differently, not better. But, more important than knowing it or following the techniques, is to make it a habit. Refactoring should be part of the job. It shouldn't be an occasional task. Something that you do when everything seems messy. If we keep the house arranged every single day, the job becomes easy. What takes more time? Keeping the house in order as we go or tidying up once a month? We should aim for a continuous refactoring practice. Nevertheless, sometimes the codebase can be in bad shape. On those cases, we need to push harder in the beginning. When the task seems impossible, there's nothing better than being bold. Otherwise, we may not be able to create a habit, because every time you want to do something, it will be too painful. The results of starting big and painful refactor may be what you need to see the value of keeping the house clean.
<urn:uuid:6f5bba15-faa8-47d3-b443-e52b0ac2d0b1>
CC-MAIN-2022-33
https://gsferreira.com/archive/2020/09/the-value-of-continuous-refactoring/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00477.warc.gz
en
0.959065
366
1.96875
2
This stretch of the California coast south of Monterey looks like a flight of stairs. The crust in this region is still being uplifted. Between episodes of uplift, the waves wear away the rocks creating a cliff and a flat terrace offshore. Uplift raises the rocks and the process begins all over again. Notice that each higher step is more rounded than those below it, because it has been subject to erosion longer. Created 25 November 2005, Last Update 14 December 2009 Not an official UW Green Bay site
<urn:uuid:9d27405a-c137-49ba-a049-1acdbdb719f6>
CC-MAIN-2017-04
http://www.uwgb.edu/dutchs/GeolColBk/CaCoast.HTM
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00146-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955826
105
2.03125
2