text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
I had the privilege last month of traveling with World Vision to the district of Sinazongwe, Zambia, where rolling hills covered in acacia, cacti, and fruit trees look remarkably like parts of Southern California. But tucked among them are mud brick huts with thatched roofs, small vegetable gardens by muddy pools, and high racks where cobs of maize dry beyond the reach of animals. We pass a small roadside market, where women sell tomatoes, carrots, potatoes, and stalks of sugar cane beside a banana grove. The statistics of this region belie the bucolic scene. Malaria plagues a quarter of children under 5, often fatally, and affects 9 percent of the overall population, according to Rose Zambezi, World Vision's technical adviser for health. HIV and AIDS persist, too, affecting 14 percent of Zambians. As a children’s book author, I’m especially interested in these statistics as I’m working on a story about an African family that strives to create a “healthy village.” The heartening news: Families in Sinazongwe, on the swampy, malaria-prone shores of Lake Kariba, are improving their health statistics and practices. After World Vision distributed more than 7,000 insecticide-treated bed nets here in 2009, just before the rainy season when mosquitoes breed, malaria incidence fell by up to 70 percent year-on-year. Lodiaís smiles because she is healthier now that she no longer suffers from malaria because she sleeps under a mosquito net from World Vision. ©2009 Collins Kaumba/World Vision What’s more, volunteer community hygiene promoters are helping households to understand the best ways to stay healthy, through explaining the causes of diseases like malaria and diarrhea. They promote drinking only clean water, building and using latrines, washing hands, and drying dishes on racks. “Now, people use bednets for protecting against malaria,” said Rose, “instead of catching fish with them, which they did at first!” She also notes that World Vision has drilled and outfitted 99 boreholes (training local water, sanitation, and hygiene committees to maintain them) to bring fresh water to the district. Our first stop is the home of Emily Syabubila, who has made the most of many of these interventions. A ball of vitality measuring well under five feet, she tells us that her family suffered a serious health blow in 1997, when she was just 29: Her husband died of cerebral malaria. After his death, his family dealt Emily and her three children a crippling economic blow: “My husband’s family wanted me to marry a relative to keep our property, but I refused, and they took all our livestock, furniture, and crockery. I had nothing for me and the children but a roof over our head.” She applied for and won a year-long contract with World Vision to teach weaving to other women. When that finished, she worked as a seamstress to make ends meet. But in 2006, she seized an opportunity that would be life-changing: World Vision microfinance partner Harmos came to her village, offering small loans and business training to would-be entrepreneurs. Emily applied. Similar to the trajectory of Kojo, the main character of my book "One Hen: How One Small Loan Made a Big Difference," Emily’s livelihood and ability to care for her family has been transformed by microloans. With her first, about $75, she bought her own sewing machine and grew a business making school uniforms. A year later, after repaying that loan, Harmos lent her a second loan of $120, which she used to start a fish-trading business. “I would buy fish from the fisherman of Lake Kariba,” said Emily, “then freeze them and twice a month take them on the night bus to Lusaka [the capital, a seven-hour drive] to sell.” With her profits, Emily managed to put all three of her children -- Monga, 25, Stephen, 22, and Faith, 19, through high school, a huge feat in a zone where thousands of primary school graduates compete for 360 spots to board at the government secondary school. With a third loan, of $180, she went into agriculture, buying seed and fertilizer and growing vegetables to trade -- reminiscent of the Duarte family in my 2010 book on food security for kids, "The Good Garden: How One Family Went from Hunger to Having Enough." (It includes a profile of World Vision's agricultural training.) Emily repaid her farm loan and garnered a fourth loan to expand both of her trading businesses. With a recent fifth loan of $400, she has expanded again and bought furniture for her home. “Now, I can grow food that lasts until the next season,” says Emily. “I never thought I would be a businesswoman, but when my husband died, God gave me that.” After hearing this first part of Emily's story, I learned how she is giving back. Stay tuned next week on the World Vision Blog for the second part of Katie's post about Emily and her trip in Zambia. Katie Smith Milway is the children's book author of "One Hen", "The Good Garden", and forthcoming, "The Healthy Village". She also serves on the board of World Vision U.S.
<urn:uuid:c0b35496-2f5a-45f4-a43c-f2e1e0187aa5>
CC-MAIN-2016-44
http://blog.worldvision.org/comment/12198
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00385-ip-10-171-6-4.ec2.internal.warc.gz
en
0.970198
1,127
2.9375
3
As the weather turns warmer and people spend more time outdoors, tick control becomes more important. Ticks spread diseases that can make humans and pets ill. Learn about these common tickborne diseases and how to properly control ticks in your environment. Diseases Caused by Ticks Since a tick feeds by taking in a blood meal, when it attaches to a person, it can spread bacteria through the feeding process. Some tickborne diseases go unnoticed as they do not cause severe symptoms, but others may require medical intervention. Diseases spread by ticks vary based on where you live, but the following are the most common tickborne illnesses in the United States: - Lyme Disease - Rocky Mountain Spotted Fever - Colorado Tick Fever Mild symptoms to look for after a tick bite are fatigue, headaches, fever and, sometimes, a rash. If recognized early enough, most of these diseases can be treated with a round of antibiotics. Best Ways to Prevent Tick Bites Before traveling to an area where ticks are suspected, make sure to spray yourself with an insect repellant that is known to keep ticks at bay. Ticks tend to live in tall grasses and shrubbery so stay close to clear trails to decrease the chances of stepping into their habitat. It is best to wear light-colored clothing that completely covers the legs and arms. By wearing light colors, it is easier to locate any ticks that may have attached to you. Once inside, check your entire body, plus your pets, for any ticks. Ticks must be latched onto a host for several hours before they can transmit disease so early removal decreases your chances of catching a disease. By following a tick control protocol, including tick repellants, adventures in the outdoors can be less hazardous. By properly preparing, you can prevent the spread of common diseases to you and your family, including the furry members.
<urn:uuid:ea113e27-567f-4f62-839a-42b62b4495a2>
CC-MAIN-2022-33
https://www.aanvang.net/combatting-tickborne-diseases.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00478.warc.gz
en
0.949977
394
3.53125
4
ROCKY RUN ROAD AT ROCKY PEN RUN RESERVOIR CLOSES TODAY Stafford, Va. – Stafford County officials remind the public that the portion of Rocky Run Road located at the Rocky Pen Run Reservoir is closed as of today. There are signs in place at Rocky Run Road warning of the closure. Motorists are advised to avoid the area as water levels will begin to rise from the roadbed to the tree line. The area is not safe for motorists. The Rocky Pen Run Reservoir is the largest public works project in Stafford’s History. Rocky Pen Run will join Abel Lake and Smith Lake in supplying water to County customers. The new reservoir will draw water from the Rappahannock River, doubling the safe yield capacity of the water supply system from what exists today.
<urn:uuid:66e119c1-6b81-4906-af85-391c79146ef7>
CC-MAIN-2016-44
http://www.staffordsheriff.com/apps/public/news/newsView.cfm?News_ID=560
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00374-ip-10-171-6-4.ec2.internal.warc.gz
en
0.948271
166
1.703125
2
In 2012, a teen-wellness center opened inside the Gaston County Department of Health and Human Services, offering girls ages 12 to 19 physicals, immunizations, birth control and pregnancy testing. Architects of the center took input from actual teens when designing it, painting the walls bright colors and making it a secluded part of the department. The goal was to reduce teen pregnancy rates in the county, which were among the highest in the state. And it worked. In two years, the rate has reduced by 28 percent, according to N.C. Health News. The county dropped from having the 28th highest teen-pregnancy rate of N.C.'s 100 counties to the 48th. The pregnancy rate for white teenagers in the county was 41.4 per 1,000 15-to-19-year-olds in 2012, down from 52.5 in 2010. The Latina teen-pregnancy rate was 64.3 per 1,000 in 2012 for the same age category, compared with 73.3 in 2010. For black teenagers aged 15 to 19 years old, the 2012 rate was 40.4 per 1,000, compared with 84 in 2010. Roshini Amarasinghe, a junior at Forestview High School in Gastonia, helped design the center. High school students serve on a Teen Action Council, of which Amarasinghe is a member, that launched in May 2011. Along with health department staff and clinicians, interior designers and community members, teens on the council helped plan the center before it opened and gave tours once it did. The group also selected the colors; chose the name; and helped design the logo, fliers and other promotional materials. There are also now three satellite centers in the county. Learn more about the center and its initiatives here. My aunt Debbie passed away several years ago.She was the most incredible women. I miss… Date night at Studio Cellar! Couples painting done on 2 separate canvases but only complete… Natural insect repellent proves to be a boon as it works as the best precaution…
<urn:uuid:f371fe11-9e5e-4f87-b12d-9b6e5fd9d9ab>
CC-MAIN-2017-04
http://clclt.com/theclog/archives/2014/03/26/gaston-county-reduces-teen-pregnancy-rates-with-realistic-approach
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00308-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959882
430
2.15625
2
Catalyst India WRC conducted the third session of its three-part series of virtual discussion forums, on Addressing Biases That Hold Women Back at Work on the 26h of June 2014. The panellists who participated in the webinar were: Shachi Kaul, Head, Talent, Development & Diversity, Deutsche Bank India; Rajita Singh, Head, HR, Broadridge Financial Solutions (India) Pvt. Ltd. and Priyanka Sudarshan, General Manager, Human Resources, Wipro. The basis of this event was Catalyst's new tool Making Change in India Inc.: —Addressing Workplace Biases That Hold Women Back. This tool addresses how companies can assess themselves on the prevalence of biases that hold women back, and identify opportunities for the organization to tackle bias. The webinar was moderated by Aarti Shyamsunder, PhD, Director, Research, Catalyst India WRC. The session commenced with the acknowledgment that while there are several terms related to bias (such as stereotypes, discrimination, prejudice), there has been a lot of recent interest in ‘unconscious’ or ‘implicit’ bias, which refers to the automatic or unconscious judgement made by people based on memberships to particular groups (such as gender, religion, disability status). Most people are unaware that they are even making these biases, as they are hidden and unconsciously affect behaviour, preferences and interactions. These biases then cascade throughout organizational systems to produce what appear to us as the symptoms – gender gaps in representation and pay for instance What underlies these symptoms are often biases and stereotypes about men and women in society, such as “Think Manager, Think Male” and “Women are the caregivers, Men are the breadwinners”. Women also tend to suffer from doublebinds based on stereotypes and biases such as women being seen as competent but unliked, too tough or too soft. Women are also more likely to be promoted on performance, where as men are more likely to be promoted on potential. Research shows that becoming more aware of one’s own implicit biases against certain groups may backfire, leading some people to become anxious when dealing with those of the other group, or even refusing to take action, blaming their discriminatory behaviors on their ‘unconscious’! Instead of solely focusing on awareness, therefore, organizations must focus on building more inclusive behaviors and dispelling systemic biases. In their presentations, each panellist elucidated upon what their respective companies were doing to create an inclusive workplace and positive work culture. They expressed that some of the key factors to addressing gender bias in the workplace: - Eliminate systemic biases in processes such as hiring, performance management etc. - Put into place policies (such as flex work time and crèches) which are gender neutral and will benefit both genders - Create mentoring and sponsorship programmes - Identify individual champions especially those in leadership roles, who would act as role models and change agents - Increased corporate governance by setting up a sustainability council with direction and progress reviews of inclusivity initiatives - Measurement of inclusive initiatives with benchmarking and metrics - Defining roles for both men and women, with career conversations with managers - Focus on aspirational roles, opportunities, domains and locations The discussion concluded with the fact that it is possible to address gender bias in the workplace with the coupling of both awareness that it exists and with companies putting into place policies and programs to eliminate systemic biases and encourage inclusive leadership behaviors. For further details about this event, contact [email protected].
<urn:uuid:80ed9a7d-031f-489e-a5c9-3e7f30569fdd>
CC-MAIN-2017-04
http://www.catalyst.org/events/catalyst-virtual-discussion-forum-addressing-biases-hold-women-back-work
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00242-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957962
733
1.601563
2
A new study published on the preprint server bioRxiv* reports the identification of a cluster of monkeypox virus A.2 lineage genomes from three countries that are distinct from the much larger B.1 lineage responsible for the current outbreak. These observations suggest that A.2 monkeypox cases are not part of the current global 2022 outbreak of the monkeypox virus and instead occurred through a different chain of transmission. Study: A Distinct Phylogenetic Cluster of Monkeypox Genomes Suggests an Early and Cryptic Spread of the Virus. Image Credit: joshimerbin / Shutterstock.com Until recently, the monkeypox virus was endemic to several central African countries and typically caused single or multiple vesicular lesions that often resolve spontaneously. Infection with the monkeypox virus was previously associated with contact with wild game animals or with infected symptomatic individuals. Since early May 2022, the monkeypox virus has been identified in multiple non-endemic regions of the world. These patients have rarely reported a history of travel to endemic countries, with about 75% reporting recent travel to another European country. Those infected in the current outbreak are almost exclusively men who have sex with men (MSM), with the virus appearing to be primarily spread through sexual contact. The symptom profile of the monkeypox infection during the current outbreak has also shifted from previous phenotypes, thus indicating significant changes in virus biology. The first monkeypox infection of the current outbreak was traced back to a European event where the virus could have been transmitted to many people. Thereafter, the virus spread to 75 countries, with over 20,000 new cases reported by the end of July. Currently, the monkeypox virus outbreak has been designated as a public health emergency of international concern by the World Health Organization (WHO). As a result, increased genomic surveillance and molecular testing have been conducted, with multiple sequenced genomes uploaded to the Global Initiative on Sharing All Influenza Data (GISAID) database. The monkeypox genome has about 200 kilobase pairs comprising its deoxyribonucleic acid (DNA) double strand. Recently, nine genomes were uploaded onto GISAID from the United States, Thailand, and India from six clinical isolates that map to a different lineage, A.2. This lineage consists of 16 unique mutations, nine of which are non-synonymous. Following the phylogenetic model, the researchers at the CSIR Institute of Genomics and Integrative Biology (CSIR-IGIB) attempted to estimate the time from the most recent common ancestor (tMRCA) of this lineage. The tMRCA of the A.2 lineage was on June 25, 2021. The average rate of nucleotide substitutions was much lower than that of the B.1 lineage at 5.53 x 10-5 as compared to 1.13×10-4, respectively, with the B.1 substitution rate increasing. Thus, the A.2 lineage might have started to spread even years before the early 2022 outbreak, especially since the earliest genome was from a sample collected in July 2021. The genomes analyzed in the current study were obtained from men who had traveled to the United Arab Emirates or Nigeria. This indicates a separate chain of transmission between humans without direct zoonotic transmission across international boundaries. Importantly, this spread remained unrecognized until the current study. This transmission chain may not be linked to the large outbreak of monkeypox which occurred in 2022 and has been potentially uncovered due to heightened awareness, surveillance and the wider availability of diagnostics.” The study findings emphasize the importance of genomic surveillance of all newly emerging pathogens for public health policies and epidemiologic insights. bioRxiv publishes preliminary scientific reports that are not peer-reviewed and, therefore, should not be regarded as conclusive, guide clinical practice/health-related behavior, or treated as established information. Posted in: Genomics | Medical Science News | Medical Research News | Disease/Infection News Tags: Diagnostics, DNA, Genome, Genomic, Influenza, Monkeypox, Nucleotide, Public Health, Virus Dr. Liji Thomas is an OB-GYN, who graduated from the Government Medical College, University of Calicut, Kerala, in 2001. Liji practiced as a full-time consultant in obstetrics/gynecology in a private hospital for a few years following her graduation. She has counseled hundreds of patients facing issues from pregnancy-related problems and infertility, and has been in charge of over 2,000 deliveries, striving always to achieve a normal delivery rather than operative. Source: Read Full Article
<urn:uuid:a9d5b71d-6827-4447-9672-fc1fc68dae92>
CC-MAIN-2022-33
https://beyondfitnessforever.com/health-news/analysis-of-monkeypox-virus-genomes-suggests-that-it-spread-early-and-cryptically/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00677.warc.gz
en
0.953599
951
3.109375
3
As a DBA, you often perform special operations such as shutting down or starting up a database. Because only a DBA should perform these operations, the database administrator usernames require a secure authentication scheme. This section contains the following topics: Administrative privileges that are required for an administrator to perform basic database operations are granted through two special system privileges, SYSOPER. You must have one of these privileges granted to you, depending upon the level of authorization you require. SYSOPERsystem privileges allow access to a database instance even when the database is not open. Control of these privileges is totally outside of the database itself. SYSOPER privileges can also be thought of as types of connections that enable you to perform certain database operations for which privileges cannot be granted in any other fashion. For example, you if you have the SYSDBA privilege, you can connect to the database by specifying CONNECT AS SYSDBA. |System Privilege||Operations Authorized| Effectively, this system privilege allows a user to connect as user This privilege allows a user to perform basic operational tasks, but without the ability to look at user data. The manner in which you are authorized to use these privileges depends upon the method of authentication that you use. When you connect with SYSOPER privileges, you connect with a default schema, not with the schema that is generally associated with your username. For SYSDBA this schema is SYSOPER the schema is This example illustrates that a user is assigned another schema ( SYS) when connecting with the SYSDBA system privilege. Assume that the sample user oe has been granted the SYSDBA system privilege and has issued the following statements: CONNECT oe CREATE TABLE admin_test(name VARCHAR2(20)); oe issues these statements: CONNECT oe AS SYSDBA SELECT * FROM admin_test; oe now receives the following error: ORA-00942: table or view does not exist Having connected as oe now references the SYS schema, but the table was created in the Database Administrators can authenticate through the database data dictionary, (using an account password) like other users. Keep in mind that beginning with Oracle Database 11g Release 1, database passwords are case sensitive. (You can disable case sensitivity and return to pre–Release 11g behavior by setting the SEC_CASE_SENSITIVE_LOGON initialization parameter to Operating system (OS) authentication A password file Strong authentication with a network-based authentication service, such as Oracle Internet Directory These methods are required to authenticate a database administrator when the database is not started or otherwise unavailable. (They can also be used when the database is available.) The remainder of this section focuses on operating system authentication and password file authentication. See Oracle Database Security Guide for information about authenticating database administrators with network-based authentication services. Operating system authentication takes precedence over password file authentication. If you meet the requirements for operating system authentication, then even if you use a password file, you will be authenticated by operating system authentication. Your choice will be influenced by whether you intend to administer your database locally on the same machine where the database resides, or whether you intend to administer many different databases from a single remote client. Figure 1-2 illustrates the choices you have for database administrator authentication schemes. If you are performing remote database administration, consult your Oracle Net documentation to determine whether you are using a secure connection. Most popular connection protocols, such as TCP/IP and DECnet, are not secure. Oracle Database Security Guide for information about authenticating database administrators with network-based authentication services. To connect to Oracle Database as a privileged user over a nonsecure connection, you must be authenticated by a password file. When using password file authentication, the database uses a password file to keep track of database usernames that have been granted the SYSOPER system privilege. This form of authentication is discussed in "Using Password File Authentication". You can connect to Oracle Database as a privileged user over a local connection or a secure remote connection in two ways: If the database has a password file and you have been granted the SYSOPER system privilege, then you can connect and be authenticated by a password file. If the server is not using a password file, or if you have not been granted SYSOPER privileges and are therefore not in the password file, you can use operating system authentication. On most operating systems, authentication for database administrators involves placing the operating system username of the database administrator in a special group, generically referred to as OSDBA. Users in that group are granted SYSDBA privileges. A similar group, OSOPER, is used to grant SYSOPER privileges to users. This section describes how to authenticate an administrator using the operating system. Two special operating system groups control database administrator connections when using operating system authentication. These groups are generically referred to as OSDBA and OSOPER. The groups are created and assigned specific names as part of the database installation process. The specific names vary depending upon your operating system and are listed in the following table: |Operating System Group||UNIX User Group||Windows User Group| The default names assumed by the Oracle Universal Installer can be overridden. How you create the OSDBA and OSOPER groups is operating system specific. Membership in the OSDBA or OSOPER group affects your connection to the database in the following ways: If you are a member of the OSDBA group and you specify AS SYSDBA when you connect to the database, then you connect to the database with the SYSDBA system privilege. If you are a member of the OSOPER group and you specify AS SYSOPER when you connect to the database, then you connect to the database with the SYSOPER system privilege. If you are not a member of either of these operating system groups and you attempt to connect as CONNECT command fails. See Also:Your operating system specific Oracle documentation for information about creating the OSDBA and OSOPER groups Create an operating system account for the user. Add the account to the OSOPER operating system defined groups. CONNECT / AS SYSDBA CONNECT / AS SYSOPER For the Windows platform only, remote operating system authentication over a secure connection is supported. You must specify the net service name for the remote database: CONNECT /@net_service_name AS SYSDBA CONNECT /@net_service_name AS SYSOPER Both the client computer and database host computer must be on a Windows domain. This section describes how to authenticate an administrative user using password file authentication. If not already created, create the password file using the ORAPWD FILE=filename ENTRIES=max_users See "Creating and Maintaining a Password File" for details. When you invoke Database Configuration Assistant (DBCA) as part of the Oracle Database installation process, DBCA creates a password file. Beginning with Oracle Database 11g Release 1, passwords in the password file are case sensitive unless you include the Y command-line argument. REMOTE_LOGIN_PASSWORDFILE initialization parameter to EXCLUSIVE. (This is the default). REMOTE_LOGIN_PASSWORDFILEis a static initialization parameter and therefore cannot be changed without restarting the database. Connect to the database as user SYS (or as another user with the administrative privileges). If the user does not already exist in the database, create the user and assign a password. Keep in mind that beginning with Oracle Database 11g Release 1, database passwords are case sensitive. (You can disable case sensitivity and return to pre–Release 11g behavior by setting the SEC_CASE_SENSITIVE_LOGON initialization parameter to SYSOPER system privilege to the user: GRANT SYSDBA to oe; This statement adds the user to the password file, thereby enabling connection See Also:"Creating and Maintaining a Password File" for instructions for creating and maintaining a password file. Administrative users can be connected and authenticated to a local or remote database by using the SQL*Plus CONNECT command. They must connect using their username and password and the AS SYSDBA or AS SYSOPER clause. Note that beginning with Oracle Database 11g Release 1, passwords are case-sensitive unless the password file was created with the For example, user oe has been granted the SYSDBA privilege, so oe can connect as follows: CONNECT oe AS SYSDBA oe has not been granted the SYSOPER privilege, so the following command will fail: CONNECT oe AS SYSOPER Note:Operating system authentication takes precedence over password file authentication. Specifically, if you are a member of the OSDBA or OSOPER group for the operating system, and you connect as SYSDBA or SYSOPER, you will be connected with associated administrative privileges regardless of the username/password that you specify. If you are not in the OSDBA or OSOPER groups, and you are not in the password file, then attempting to connect as SYSDBA or as
<urn:uuid:3ae973aa-7606-43e9-afe3-3bef23f3f59d>
CC-MAIN-2017-04
http://docs.oracle.com/cd/B28359_01/server.111/b28310/dba006.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00136-ip-10-171-10-70.ec2.internal.warc.gz
en
0.841575
1,947
3.015625
3
Cleft sentences are complex sentences that have a meaning we can express by a simple sentence. They are used to emphasize one part of a clause. 'Cleft' means 'divided' or 'split.' In every language, there are various ways to put emphasis or focus on different parts of a sentence. One way is by changing the word order. What Are Cleft Sentences? Why Do We Need to Use Cleft Sentences? Cleft sentences are used especially in spoken English to join the part of a meaning that is understood to the part of the meaning that is new to the listener. Using a cleft sentence is one way to add emphasis to what we want to say. In a cleft sentence, a single message is divided (cleft) into two clauses. This allows us to focus on the new information. Cleft Sentences: Types There are different types of cleft sentences in the English language. Here are some of the most common ones: - Wh-cleft (also called Pseudo-cleft) - Reversed wh-cleft (also called Inverted pseudo-cleft) - Inferential cleft - If-because cleft The most common type of cleft sentences is it-cleft sentences. The information that comes in the 'it-clause' is the focus of our sentence. The clause that follows the it-clause contains information that is already understood. 'Jennifer's car got stolen last night, right?' 'No. Generally, 'that' is a conjunction that connects the clause which follows the it-clause. When 'that' is the object of the verb, we often omit that in spoken English. 'You've met my sister, right?' 'No, 'Who' instead of 'That' When the focus of our sentence is a plural subject, 'it + be' remains the same, only the verb becomes plural. The 'it-clause' can also be in a negative strcture. Generally, wh-cleft (also called pseudo-cleft) sentences begin with 'What,' but they can also begin with other wh-words such as why, where, how, etc. Typically the wh-clause has old or understood information, while the following clause's information is new and in focus. 'I have no idea what you want.' ' Reversed Wh-cleft Sentences In a reversed wh-ceft (also called Inverted pseudo-cleft) sentence, the nominal relative clause comes at the end of the sentence. Some peace and quiet is Chasing the giraffe is All-cleft sentences emphasize the object of the verb. It is possible to form questions from all-cleft sentences, but negative sentences are not very common. This sentence is grammatically correct, but it sounds weird and is not very common. Inferential Cleft Sentences Inferential Cleft Sentences tell us about what others may wrongly assume. Inferential Cleft clauses normally start with: - It's not that ... - it was that ... - It is only that ... - It's just that ... - It may be that ... There-cleft Sentences have a similar function to an it-cleft. They indicate the existence of something for emphasis. If-because Cleft Sentences If-because Cleft Sentences function similarly to inferential cleft sentences. They emphasize that an assumption that people might make is not valid or true. A cleft-sentence is usually a simple sentence that has turned into a complex sentence to emphasize a particular constituent. It is usually formed by an empty introductory word such as it or that. There are types of cleft-sentences as mentioned in the following list. - Reversed wh-cleft A warm bath is exactly - Inferential cleft - There-cleft sentences - If-because cleft sentences
<urn:uuid:ce04daee-1eb9-4db8-9666-f7fab9815803>
CC-MAIN-2022-33
https://langeek.co/en/grammar/course/267/cleft-sentences
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00073.warc.gz
en
0.936146
910
4.25
4
- Investor Relations Marlborough, MA – December 7, 2016 – Large terabit-scale DDoS attacks will continue to wreak havoc and become a regular occurrence in 2017 unless Internet Service Providers harden their DDoS defenses, according to 2017 predictions from Corero Network Security (LSE: CNS), a leading provider of real-time security solutions against DDoS attacks. With 2016’s rear-view mirror showcasing significant, new high-volume attacks, Corero’s threat predictions for 2017 include: The Mirai botnet, which was responsible for a string of attacks in recent months including the DDoS attack against DNS provider Dyn in October, will continue to evolve as hackers take advantage of the billions of poorly-secured, Internet-connected devices currently in use worldwide. In terms of its size, the Mirai botnet is currently believed to have a population of around 300,000 Internet-connected devices, but its population could increase significantly if hackers amend the source code to include root credentials for other types of vulnerable devices. Corero predicts that the Mirai botnet will also become more complex in 2017, as hackers evolve and adapt the original package, equipping it with new methods of launching DDoS attacks. Mirai is currently believed to contain around ten different DDoS attack techniques – or vectors – which can be utilized by hackers to leverage an attack. Corero believes this will increase during 2017 as attackers develop new methods, and then make them open source and available for anyone to leverage. “While the Mirai botnet is certainly fearsome in terms of its size, its capacity to wreak havoc is also dictated by the various attack vectors it employs. If a variety of new and complex techniques were added to its arsenal next year, we may see a substantial escalation in the already dangerous DDoS landscape, with the potential for frequent, Terabit-scale DDoS events which significantly disrupt our Internet availability,” said Dave Larson, CTO and COO at Corero Network Security. “While the motivations for such attacks are endless, the range of potential political and economic fallouts from such attacks could be far-reaching. Our entire digital economy depends upon access to the Internet, and so organizations should think carefully about business continuity in the wake of such events. For example, it may be prudent to have back-up telephone systems in place to communicate with customers, rather than relying solely on VOIP systems, which could also be taken down in the event of an attack.” As an example of the pace of change in the DDoS landscape, the Corero Security Operations Centre recently warned of an extremely powerful new zero-day DDoS attack vector which utilizes the Lightweight Directory Access Protocol (LDAP), and has the potential to amplify attacks by as much as 55x. “Certainly the Internet community needs to prepare for potent attack vectors like this to be added to botnets like Mirai. The combination of zero-day DDoS vectors, Mirai delivery mechanisms and attacker ingenuity would seem to indicate that Terabit-scale attacks could occur more frequently next year and internet availability in states, major geographic regions or even countries could be impacted significantly,” said Larson. “Individual DDoS attacks tend to cost large enterprises $444,000 per incident in lost business and IT spending, so the combined economic impact from an entire region being affected would be extremely damaging.” Action by ISPs While much of the focus in the wake of recent IoT-related DDoS attacks was put on encouraging manufacturers to install proper security controls on internet-connected devices before they are issued, ISPs also have an important role to play in reducing the number of future DDoS attacks. At a local level, ISPs could significantly reduce the overall volume of DDoS attacks across their networks by employing systems to detect and remediate infected bots that are used to launch DDoS attacks. Further, best practices exist and can be leveraged to utilize ingress filtering to remove the problem of spoofed IP addresses that are widely used in reflection DDoS attacks. This simple improvement to service provider hygiene would be a great initial step at reducing the overall volume of DDoS traffic. Dave Larson explains: “ISPs will find themselves at an important crossroads next year. By working together with governments and the international community, ISPs can strengthen the underpinning infrastructure of the Internet and significantly reduce the volume of malicious traffic flowing across their networks. “These methods aren’t a quick fix, and they certainly can’t protect against the full spectrum of DDoS attacks, but they would be a vital first step in speeding up our global response to attacks. I’m hopeful that the future of volumetric DDoS attacks in two or three years’ time will be significantly reduced by the combined efforts of ISPs, device manufacturers, security vendors and even government entities. As this community rallies together to better protect the integrity of the Internet we may see ourselves in a very different place down the line. “ About Corero Network Security Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and online enterprises rely on Corero’s award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This next-generation technology provides a First Line of Defense® against DDoS attacks in the most complex environments while enabling a more cost effective economic model than previously available. For more information, visit www.corero.com Kaspersky DDoS Report, 2014 https://media.kaspersky.com/en/B2B-International-2014-Survey-DDoS-Summary-Report.pdf
<urn:uuid:e6dd8b57-5bb2-4f27-8523-30b89e7e88f3>
CC-MAIN-2017-04
https://www.corero.com/company/newsroom/press-releases/terabit-scale-multi-vector-ddos-attacks-to-become-the-new-normal-in-2017-predict-ddos-experts-/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00475-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94614
1,179
1.640625
2
Describes hatcheries located near the towns of Leavenworth, Entiat, and Winthrop in north central Washington state. Introduces hatchery history, daily operations, varieties of fish reared, the salmon life cycle, and the work of hatchery volunteers and community partners. Features visitor information, fish returns, events, and educational programs. From the U.S. Fish and Wildlife Service.
<urn:uuid:a9d50d56-af4a-4d19-8e02-efc9cab6e36c>
CC-MAIN-2017-04
http://ipl.org/IPL/Display?key=res:lii-7222&layout=blank
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00431-ip-10-171-10-70.ec2.internal.warc.gz
en
0.890899
81
2.109375
2
Castle Otttis was created as an original landscape-sculpture... ”Done in Remembrance of Jesus Christ.” A landscape-sculpture is defined as a structure built to adorn or to view the landscape. Castle Otttis is an impression of an Irish castle of 1,000 years ago. The interior was created under guidance of historians from the Catholic Diocese of Northeast Florida to replicate an atmosphere of an Abbey(or Christian church) in Ireland during the same period. The Castle is made available by appointment to schools, churches, colleges, universities, institutions and community groups for academic and spiritual environments and has provided a unique setting for small, intimate wedding ceremonies. The Castle is located on highway A1A three miles north of St. Augustine, Florida. For further information: P. O. Box 1754 St. Augustine, Florida 32085 Phone: (904) 824-3274 Visit the official Castle Otttis webpage: Castle Otttis
<urn:uuid:fbb33778-819d-49b4-9910-17092151a6a2>
CC-MAIN-2017-04
http://www.dupontcastle.com/castles/otttis.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00310-ip-10-171-10-70.ec2.internal.warc.gz
en
0.942668
203
2.25
2
CEDAR RAPIDS, Iowa (KCRG) – Cedar Rapids Police explained thefts of catalytic converters are going on in all quadrants of the city. They’ve had close to 30 studies of stolen catalytic converters considering that November. Zoe Canfield, who life on the northeast aspect of the metropolis, reported she was asleep in her house when the theft of the automobile section transpired. “People walked correct up my driveway, suitable up to my Prius, and stole the catalytic converter suitable off the, underneath of it,” Canfield stated. Canfield’s car was just toes away from her dwelling, her sister was awake to see the full point. “She woke us up so yeah, they had been long gone presently and there was practically nothing else we could do about it,” Canfield claimed. It is a concept that is been occupying mechanics at Denny’s Muffler Centre, in Marion, considering the fact that November. “I signify listed here, we have found a few dozen I would say,” Zach Willson, supervisor of the store, stated. Willson mentioned for thieves, it’s most most likely about the funds. “They have treasured metals in them so their worthy of income scrap which is generally 100 bucks, plus,” Willson explained. Willson reported if your catalytic converter gets taken you will know as shortly as you try to travel. “As before long as I turned the automobile on, it was creating this loud like groggy noise, like you could in all probability hear it around the block,” Canfield said. It’s irritating for vehicle proprietors like Canfield who have to pay for the repair. “It could be anyplace from a number of hundred bucks up to a few thousand dependent on the motor vehicle. So, typical is most likely $700-$800,” Willson explained. Not all tried thefts in the region have absent as prepared, but even a work fifty percent-done demands an costly substitute. Willson reported they’ve observed circumstances where the catalytic converter is only fifty percent lower off. “Not always profitable, at times they must get interrupted I would guess,” Willson stated. Copyright 2021 KCRG. All legal rights reserved.
<urn:uuid:e4536d81-8370-470e-9171-e13df5c1a788>
CC-MAIN-2022-33
https://apteka-kamagra.net/catalytic-converters-are-remaining-snatched-off-automobiles-in-cedar-rapids.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00076.warc.gz
en
0.965806
501
1.5625
2
The new MS3 is the successor to MS2A and was developed by CSIRO (Commonwealth Scientific and Industrial Research Organization) in collaboration with leading museums in Australia and Europe. Carl Villis, Senior Conservator of Paintings at the National Gallery of Victoria (NGV) comments: "MS3 is clearer and more consistent in its appearance than the earlier resin as a direct result of the flow chemistry process employed by CSIRO's scientists." MS3 Special Resin 200 g MS3 is a synthetic varnish material of the latest generation, developed for applications in the field of restoration and preservation of monuments. Compared to its predecessor MS2A, the clarity of the colour and the wetting of the surfaces have been improved. With MS3 the chemical composition of MS2A has been carefully reproduced. This has been achieved by using a sustainable yet advanced production technology called "flow chemistry". This new cyclohexanone resin meets the demand for reversibility for restorers and works of art, as well as the European standard for the preservation of cultural heritage. Furthermore the characteristics of MS3 are recommended by the European Committee for Standardization (CEN). MS3 was developed by CSIRO (Commonwealth Scientific and Industrial Research Organization) in collaboration with leading museums in Australia and Europe.
<urn:uuid:d3b68a29-c30a-4efb-9f43-cce36ab7dc16>
CC-MAIN-2022-33
https://deffner-johann.de/en/ms3-special-resin-200-g.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00078.warc.gz
en
0.954102
263
2.125
2
After a year correcting serious engine problems, the Mitsubishi J2M Raiden (“Thunderbolt”) known by the Allied forces as “Jack”, finally arrived in front line squadrons February 1944. Primarily designed to defend against the Boeing B-29 Superfortress, and still handicapped by poor engine performance, pilots would use its four-cannon armament and dive and zoom tactics to great effect. J2Ms operated from Guam and Saipan and a small number of aircraft were deployed to the Philippines. Some Raiden’s were based in Chosen airfields, Genzan (Wonsan), Ranan (Nanam), Funei (Nuren), Rashin (Najin)to fight against Soviet Naval Aviation units. 1x Squadron Box of 6x metal Mitsubishi J2M Raiden aircraft Generic IJNAF Decals Sheet Aircraft Trait cards Pilot skill discs Advantage Flying bases Models supplied unassembled and unpainted
<urn:uuid:bf4c99af-77a0-4e32-9b93-50478b11ef3c>
CC-MAIN-2022-33
https://www.fantasystronghold.de/Blood-Red-Skies-Japanese-Mitsubishi-J2M-Raiden-squadron
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00665.warc.gz
en
0.937789
223
1.84375
2
Three Horizons – Multi-Actor Mapping To bring in multiple perspectives on a Three Horizon Map to enrich understanding and inform possibilities of “convening the future” to take action. When to use? As a second stage of building Three Horizons Mapping, especially useful if the team is all from one organisation and needs to broaden their perception and understanding of the dynamics that will shape H3 and how they might need to relate to other actors to bring about desired transformation. Each actor perspective requires the set up for the whole group, or break out group, described in Three Horizons Mapping. - A Three Horizon map as seen from each of the chosen actor perspectives. - A combined 3H map that tells a story combining the perspectives. - The clustered H2+ and H3 material is suitable as input to the Three Horizons Action Planning method. Step 1: Brainstorm List of Actors - Explain purpose is to generate a list of candidates from whose perspective different 3H maps will be explored. You want to get both obvious ones and ones currently on the margin. Prime them to consider the unexpected players by using contemporary examples “Who would have thought x years ago that we would see y starting to do z”. - Trigger question: “Considering our scope, which actors, or classes of actors, might be influential in shaping the third horizon that will emerge?” - Use usual brainstorm approach of capturing whatever comes up in a list on flip charts Step 2: Select Actors for Mapping - Decide how many actors you are going to develop maps for – typically three to five. Working in parallel in smaller groups is a good way to generate energy and diversity into the thinking and is better than taking them all through every actor. - Give everybody in the group the same number of votes as the number of actors to be selected. Get them to vote by coming up and placing a tick against an actor for each vote, without discussion. Tell them to use each vote for a different actor, and to select a set that would interest them most. - Review the collective choice, picking out the ones with the most votes, and where there is a tie having a discussion to choose a set that are interestingly different. Step 3: Build Actor Maps - Divide up into breakout groups to develop the maps. Give them a simple set of trigger questions for the three horizons, to work in order H1, H3, H2, and let them self-facilitate. Encourage them that they should do this by role playing, fully inhabiting the perspective of the chosen actor and trying to see the world through their eyes. - Ask each group to prepare to tell the story of their actor’s map. Step 4: Share Actor Stories - Each group tells the story of its map to the whole group and discusses it. - Take pictures of the maps before going on to the next step. Step 5: Combine Maps - Set up an H2+ flip chart and an H3 flip chart - Ask each group to identify the H2+ stickies on their map, and transfer them to the H2+ flip chart - Take all the H3 stickies and put them on the H3 flip chart - Use Silent Clustering on H3. - Work through the clusters discussing and labelling them. As each cluster is named, write the name on a hexagon and place it appropriately back on the main 3H map. - Repeat for H2+ Step 6: Tell a Story - Develop a story of the combined map, exploring in particular where the points that have emerged that influence the different perspectives to combine or compete in their journey to H3. See Three Horizons Mapping for guidance. Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license framework. How to Use this License This license allows reusers to distribute, remix, adapt, and build upon the material in any medium or format, so long as attribution is given to the creator. The license allows for commercial use. If you remix, adapt, or build upon the material, you must license the modified material under identical terms.Read about Open Access to H3Uni Methods and Materials
<urn:uuid:71e692e4-8b4b-43a8-8e88-ac7d2beda53c>
CC-MAIN-2022-33
https://h3uni.org/facilitation-guide/three-horizons-multi-actor-mapping/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00470.warc.gz
en
0.920244
908
2.578125
3
Nicole Barchilon Frank: It’s A Small World After All… Shouldn’t We Act Like It? “It’s a small world after all.” That was my favorite song when I was little and I guess, in many ways, it still is. As I rush around getting ready for Pesach (Passover) and also for a trip to Spain and Morocco WAHOOOOOOOOOO! I’m a little bit more crazy than usual. And, I am trying to ride the WAVE of this time, rather than get smashed by it. My name, Barchilon, comes from my paternal grandmother’s Moroccan name Perla Barchilon. My paternal Moroccan grand-father’s name was Jaime Cohen. When my father came to this country after WWII he didn’t want the name Cohen. It was way too Jewish and so he took his mother’s name Barchilon. Barchilon is a Jewish name too, it comes from the city of Barcelona, most likely. When my grandmother Perla’s ancestors were expelled from Spain in 1492 (the year the Jews were forced to flee Spain, convert or be killed), like many immigrants, the name of place left became the new name. The name Barchilon may also come from the Hebrew bar shelanu, or some form of those words which mean “son of ours.” This journey I am going on with our son Ethan is through his school, the Northcoast Preparatory Academy. When I heard about this trip I told him, YOU ARE GOING! Then he asked me to come along. What’s money anyway? Who needs it? So, despite the cost and the challenges, I decided to come along. My mother and my step-father graciously offered to help and since this is a once in a lifetime opportunity for me with my sixteen year old, I am on board. My husband also felt that it was of great benefit and supported the choice. Part of why this trip appealed to me for our son Ethan, is that he and the other students going are acting and performing in a play in Barcelona. This play, The Sheep and The Whale, was written by Moroccan playwright Ahmed Gazhali. The play is about crossing the Straight of Gibraltar and about illegal immigration, the hunger for a better life, murder, violence, poverty, and the longing for home and country that lives in the heart of many immigrants. It is based on a true story: “June 8th, 1992, at 2 a.m. a small wooden boat transporting 20 Moroccan illegal immigrants sank in the Strait of Gibraltar. A Russian freighter, that happened to be passing through the Strait as the drama was unfolding, managed to save one person and to pull out several bodies from the sea. In order to return the survivor and the bodies to the Moroccan authorities, the freighter was obliged to pay right-of-entry fees to the Port of Tangier. Negotiations dragged on until dawn…This event occurred a few days before Aïd Elkebir, The Festival of Sacrifice.” ~From the Moroccan newspaper, L’Opinion, 11th of June, 1992 Well, my father illegally crossed the Straight of Gibraltar as a young man on a fishing boat under a tarp of fish. He was with one other young man, they were both fleeing Nazi-occupied Morocco to join up with the Free French Forces who had a large fleet ship in the port of Gibraltar. My father made it to that ship and joined the Free French Forces. He emigrated to this country after the war and that’s how I got here, although I was born in Paris. My father will turn 90 in Paris, while my 16-year-old son plays an Islamic Moroccan immigrant in a show in Barcelona. How could I not have my son be part of this story about crossing the Straight illegally and going to Marrakesh and Barcelona? My father’s family lived in Morocco for over 500 years. It is only in his generation that they left Morocco. Before they left Morocco, they were in Spain, and before that they lived in the Holy Land of Ancient Israel and Palestine. I have one Uncle still living in Morocco, my Uncle Maurice Cohen, whom everyone calls Bébé (which means baby, since he was the youngest). My Uncle Bébé is now 86. He was a Moroccan tennis star when he was younger. Another small world connection, Ethan loves tennis and is currently number two on the “ladder” at his school. We will see my uncle when we go to Marrakesh; he lives in the mountains about two hours from there. It feels absolutely monumental to me that I am getting to have this experience, earth-movingly huge. I am crossing the globe, this small planet with my son, flesh of my flesh of my father’s flesh, of his parents flesh, etc… back to our homes from not so long ago and from VERY long ago. Our family stories cycle in many many ways. This particular circling is one of choice and joy and yet, I can’t help but be thinking about all the folks forced to flee their homes seeking a better life or respite from war, famine, and oppression. My own life has been one of abundance and love, with plenty of hurt and mess too, but not because of oppressive governments, war, religious intolerance or grueling poverty. The story of my people is one we tell every year in the present tense, never in the past. As long as there are people oppressed and endangered, the story of fleeing oppression is not over. My son accompanies me on this journey, where he plays an illegal immigrant, a man torn in two by his need to connect with his people, his family and his home in Morocco and also a man who loved a woman and hoped for a different life. The character named Hassan is forced to confront his story on the freighter amidst great turmoil. He’s been living a life of lies with his Parisian wife and the story unfolds on stage and in real life, every day. So, as many of you sit down for your Seders or celebrate spring in all the various ways we do in this country, I hope you will remember that the story is not over. Our re-telling and remembering must be followed up with ACTIONS to make this whole small world a place of peace, justice, kindness and goodness. A place where the flavors, colors and tastes of home are not forfeited as the price for the possibility of living with dignity and hope. Isn’t it time, really time, now to see everyone on this planet as members of our own family and to embrace them, not shun them, for their differences, languages, practices, gifts or wounds? It’s a small world after all. Nicole will be winging her way to Barcelona and Marrakesh as you read these words, she will try to pen some thoughts while in the lands of her ancestors, and she sends you wishes for sumptuous feasts around your tables, with room for guests unknown and perhaps who don’t have home, but who might find it at your table if you invite them in.
<urn:uuid:6832188e-e07b-46e7-b6c9-98c1c864cecb>
CC-MAIN-2017-04
http://www.arcataeye.com/2013/04/nicole-barchilon-frank-its-a-small-world-after-all-shouldnt-we-act-like-it/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00373-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978133
1,508
1.757813
2
Pregnancy is not a disease, but a wonderful time in the life of every woman, in which certain changes in the body of the expectant mother are simply necessary for the development of the child. In this regard, many pregnant women have a number of questions. For example : is discharge during pregnancy normal? Do you need to worry about the slightest change? When to go to the doctor? Let’s see what “bad” signs during pregnancy require seeking medical attention. Reason to see a gynecologist 1. You are pregnant but have bleeding. The bleeding is accompanied by painful sensations in the abdomen, similar to pain during menstruation. This is a direct threat of termination of pregnancy (miscarriage). The appearance of acute pain in the lower abdomen is a sign of ectopic pregnancy. You need to immediately consult a doctor, and it is best to call an ambulance. Only in a medical institution are they able to help maintain pregnancy. Ectopic pregnancy requires the intervention of a surgeon. 2. White cheesy discharge. Why it happens: Pregnancy is a double burden on a woman’s body. Against this background, immunity usually decreases, thrush develops. Thrush, a fungal infection (candidiasis), is often diagnosed in pregnant women. Cheesy discharge during pregnancy can be the result of increased levels of female hormones. The main goal of treating such a condition is to completely get rid of the symptoms of thrush and restore the microflora of the vagina in order to avoid a second course of treatment in the future. Treatment of thrush should be comprehensive. Medicines are prescribed by a doctor. No self-medication for thrush during pregnancy can be carried out. 3. Bloody spotting and pain syndrome, reminiscent of pain with delayed menstruation. This condition is very common with an ectopic pregnancy. These symptoms cannot be ignored, because the fallopian tube may burst. Signs that the tube has ruptured: moderate bleeding and a feeling of pressure in the lower abdomen (due to the accumulation of blood in the abdominal cavity); the rapid development of bleeding and a decrease in blood pressure. The woman may pass out. 4. Natural discharge increased. This is usually not a sign of illness. Unless the discharge during pregnancy is accompanied by itching in the vagina. A similar clinical picture indicates a sexually transmitted infection. An accurate diagnosis can only be made by a doctor based on special studies. The same symptoms (discharge and itching) are characteristic of bacterial vaginitis. The expectant mother should clearly understand that any infection can harm the baby or cause premature birth. To avoid undesirable consequences, treatment must be started urgently. Control over the situation A discharge with a small amount of blood may appear unexpectedly. Moreover, bleeding can be throughout pregnancy. Perhaps this is a lack of the hormone “progesterone” in the body of a pregnant woman. It is necessary to contact a gynecologist and undergo an appropriate examination, which will allow avoiding problems in the future. Discharge in the form of blood clots in the 1st and 2nd trimester of pregnancy may indicate fetal hypoxia. The doctor observing the pregnancy must be informed about this in order to correct the situation in a timely manner. Women in an interesting position need to clearly understand that pregnancy is the case when you have to play it safe a thousand times. If you have any doubts, you can and should consult a doctor. As a rule, timely medical assistance is a good application for maintaining pregnancy and giving birth to a healthy baby.
<urn:uuid:7683f994-7ac6-40ff-b95e-40ee86e1954e>
CC-MAIN-2022-33
https://clomid-info.com/blog/the-most-serious-diseases-of-the-adrenal-glands/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00075.warc.gz
en
0.936085
735
2.359375
2
SAN FRANCISCO -- Expensive prostate cancer treatments are winning out over the old standards, driving up the cost of treatment before there's clear evidence that they improve outcomes, researchers here asserted. Robotic and laparoscopic procedures jumped from 1.5% to 28.7% of radical prostatectomies in the Medicare population between 2002 and 2005 (P<0.0001), according to a group led by Paul L. Nguyen, MD, of the Dana-Farber Cancer Institute and Brigham and Women's Hospital in Boston. This exponential growth appears to have run ahead of the evidence, which includes a prior analysis by a Brigham and Women's team showing that minimally invasive prostate surgery doubles risk of genitourinary complications despite shorter hospital stays, and another study suggesting neither benefit nor harm. The change was even more dramatic for intensity-modulated radiation therapy, Nguyen reported here at the Genitourinary Cancers Symposium. - Explain to interested patients that this study showed new and expensive techniques for treating prostate cancer are being adopted before they've been shown to be more effective than older procedures. - Note that this study was published as an abstract and presented at a conference. These data and conclusions should be considered preliminary until published in a peer-reviewed journal. That technique virtually took over among external beam radiation treatments -- from 28.7% in 2002 to 81.7% in 2005 (P<0.0001) and likely at 100% by now, Nguyen said. Within brachytherapy, the addition of intensity-modulated radiation therapy jumped from 8.5% to 31.1% over the same period (P<0.0001). Observational studies have begun to show benefits compared with traditional, three-dimensional conformal radiation. One retrospective analysis found it resulted in a lower incidence of rectal bleeding, suggesting that it may be cost-effective. But this evidence is only accruing after the fact -- once the trend is unstoppable, Nguyen cautioned at the session. "We have to ask ourselves, 'Did we do this backward?'" he said. His group analyzed treatment of 58,581 men 65 and older with nonmetastatic prostate cancer that was diagnosed from 2002 through 2007 and recorded in the national Surveillance, Epidemiology and End Results (SEER) tumor registry linked to the Medicare claims database. Medicare reimbursement for intensity-modulated radiation therapy was $27,000 compared with $12,800 for traditional conformal radiotherapy at one large academic center in 2006, Nguyen noted. For minimally invasive prostate surgery, the only robot available is the Da Vinci system, which costs hospitals $1.4 million up front, plus $140,000 a year for maintenance, he said. How much this is costing Medicare, and thus society as a whole, is not clear, although Nguyen's group has such a study under way. He called it a cautionary tale for those considering the adoption of proton beam therapy as centers open around the U.S. "It's going to happen again and again and again with new technology," he said, unless they are made to prove themselves in randomized trials before widespread adoption. Nguyen blamed widespread reimbursement preceding the research, as well as patient demand. "Patients are very excited and believe the marketing that the new technologies are better," Nguyen told MedPage Today. However, hospitals share the blame for adopting technologies to keep up with their competitors and then promoting them heavily to pay the high cost, commented Viraj A. Master, MD, PhD, of Emory University in Atlanta. "Americans are very technology-driven and progress-driven," he said in an interview. "We're only seeing the tip of the iceberg. Proton beam therapy will dwarf the cost of any other therapy." With a growing older population, society needs to consider the costs, Nguyen said. Nguyen and colleagues reported no conflicts of interest. Master reported no conflicts of interest. ASCO Genitourinary Cancers Symposium
<urn:uuid:9303370e-7039-443a-a3a9-69a7d8abf214>
CC-MAIN-2022-33
https://www.medpagetoday.com/meetingcoverage/ascogu/18866
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00073.warc.gz
en
0.949784
839
1.8125
2
Solomon Islands’ first Domestic Violence Counselling Guidelines will soon be available publicly to help improve support to victims of gender-based violence. “I’m thrilled to see that we now have a framework that represents the voices of Solomon Islanders from various settings including the most remote and rural communities,” said Vaela Ngai, Supervising Director for the Women Development Division, Ministry of Women Youth Children and Family Affairs. “These Guidelines are significant as evidence shows the most effective programmes are those that are tailored to the specific contexts in which they operate,” said Ms Vaela. The Guidelines’ development is led by the Ministry of Women Youth Children and Family Affairs (MWYCFA) in partnership with UN Women through the Pacific Partnership to End Violence Against Women and Girls (Pacific Partnership) funded by the European Union and Australian Government with support from UN Women. The strategic development of the Guidelines is the result of extensive nation-wide consultations and the recent two-day national Validation Workshop, held from 4-5 September in Honiara, on the second draft of the Guidelines workshop, involving national and provincial government, non-government, faith-based and other organisations from all nine provinces. Importantly, they have been designed by, and for, Solomon Islanders. They provide guidelines and minimum standards for domestic violence (DV) counselling services, and support DV counsellors to provide better quality support to victims, usually referred to as survivors. “MWYCFA strongly acknowledges UN Women and the Pacific Partnership programme, supported by the European Union and Australian Government, in assisting with the process of conducting country wide consultations for the national Framework,” Ms Vaela said. “These Guidelines will contribute to strengthened domestic violence counselling skills at national and regional levels, supporting DV counsellors working with many of the 64 per cent of the nation’s women experiencing physical or sexual intimate partner violence‒ twice the global average,” she said. Soon to be endorsed by the Cabinet of Solomon Islands, the Guidelines will require DV counselling service-providing organizations to meet minimum accreditation and registration counselling standards in order to be registered in the Government’s Domestic Violence Counselling Registry. The Registry includes a Code of Ethics and Practice standards as well as clarity around training requirements and support. The quality of domestic violence counselling will also be strengthened through the planned clinical supervision of, and support for, domestic violence counsellors at national and regional levels. “The aim of becoming registered is to ensure public safety for victims/survivors of genderbased violence seeking domestic violence counselling services,” said Ms Vaela. The Guidelines national consultations involved the SAFENET Referral and Response Network of government and non-government organisations who provide services for survivors of sexual and gender-based violence (SGBV). Members of the SAFENET network in Solomon Islands continue to grow, and include: MWYCFA, Ministry of Health and Medical Services; Royal Solomon Islands Police Force; Public Solicitors Office; Family Support Center; Christian Care Center; and Solomon Islands Planned Parenthood Association. SAFENET is supported by UN Women through the Pacific Partnership in collaboration with UN agencies and partners, building on previous joint programmes such as the UN-Solomon Islands Government Joint Programme and the United Nations Joint Global Programme on Essential Services for Women and Girls Subject to Violence (Essential Services Package or ESP). The ESP was piloted worldwide, including in Solomon Islands and Kiribati with support from UN Women and the United Nations Population Fund (UNFPA) with funding from the Australian Government. Media enquiries should be directed to: SAFENET: SAFENET is a network of government and non-government organizations aiming to strengthen referral and coordination of sexual and gender-based violence (SGBV) services in the Solomon Islands. It aims to streamline the assistance being provided to survivors and help them access more timely and necessary services. It has four inter-connected components: SGBV direct services and support; referral to other service providers through an agreed and coordinated formal referral process; prevention and advocacy programmes; and a governance and accountability framework. The SAFENET network is led by the Ministry of Women, Youth, Children and Family Affairs (MWYCFA) supported by UN Women, through the Pacific Partnership to End Violence Against Women and Girls (Pacific Partnership). Pacific Partnership to End Violence Against Women and Girls: The Pacific Partnership to End Violence Against Women and Girls (Pacific Partnership) brings together governments, civil society organisations, communities and other partners to promote gender equality, prevent violence against women and girls (VAWG), and increase access to quality response services for survivors. The programme will build on the decades of work led in the region by civil society and governments to address this issue. The EUR 19.5million programme is funded primarily by the European Union (EUR 12.7m) with targeted support from the Australian Government (EUR 6.2m) and cost-sharing from UN Women (EUR 0.6m). The Pacific Partnership is being jointly coordinated by the Pacific Community (SPC), the Pacific Islands Forum Secretariat (Forum Secretariat) and UN Women Fiji Multi-Country Office.
<urn:uuid:20c50af7-ca3e-41a1-901d-27e5518e01bb>
CC-MAIN-2022-33
http://www.mwycfa.gov.sb/resources-2/media-releases/45-better-counselling-services-for-domestic-violence-victims-gets-national-support.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00270.warc.gz
en
0.917246
1,254
1.867188
2
"Markandeya said, 'Then the Brahmarshis, the Siddhas and the Devarshis, with Havyavaha as their spokesman, sought the protection of Brahma. And Agni said, 'That powerful son of Visrava, the Ten-headed cannot be slain on account of thy boon! Endued with great might he oppresseth in every possible way the creatures of the earth. Protect us, therefore, O adorable one! There is none else save thee to protect us!' "Brahma said, 'O Agni, he cannot be conquered in battle by either the gods or the Asuras! I have already ordained that which is needful for that purpose. Indeed his death is near! Urged by me, the four-headed God hath already been incarnate for that object. Even Vishnu, that foremost of smiters will achieve that object!' "Markandeya continued, 'Then the Grandsire also asked Sakra, in their presence, 'Be thou, with all the celestials, born on earth! And beget ye on monkeys and bears, heroic sons possessed of great strength and capable of assuming any form at will as allies of Vishnu!' And at this, the gods, the Gandharvas and the Danavas quickly assembled to take counsel as to how they should be born on earth according to their respective parts. And in their presence the boon-giving god commanded a Gandharvi, by name Dundubhi saying, 'Go there for accomplishing this object!' And Dundubhi hearing these words of the Grandsire was born in the world of men as the hunchbacked Manthara. And all the principal celestials, with Sakra and others begot offspring upon the wives of the foremost of monkeys and bears. And those sons equalled their sires in strength and fame. And they were capable of splitting mountain peaks and their weapons were stones and trees of the Sala and the Tala species. And their bodies were hard as adamant, and they were possessed of very great strength. And they were all skilled in war and capable of mustering any measure of energy at will. And they were equal to a thousand elephants in might, and they resembled the wind in speed. And some of them lived wherever they liked, while others lived in forests. And the adorable Creator of the Universe, having ordained all this, instructed Manthara as to what she would have to do. And Manthara quick as thought, understood all his words, and went hither and thither ever engaged in fomenting quarrels."
<urn:uuid:49634509-3330-42d5-be29-5370e329fbbb>
CC-MAIN-2017-04
http://sacred-texts.com/hin/m03/m03274.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00465-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975761
536
2.03125
2
Don't mention the climate By The Economist | NEW YORK WHAT do the Christian Coalition, GM, General Electric and Shell have in common with the NRDC, the BlueGreen Alliance and the AFL-CIO? They all signed their names to this statement: How will America take back control of its energy future while enhancing our national security? When will the U.S. economy regain its competitive edge instead of letting other countries corner the emerging global clean energy market? How can we get the U.S. back on track by creating American jobs in the new low-carbon economy? How can we protect our natural resources and future generations from climate change? We believe it's time for Democrats and Republicans to unite behind bi-partisan, national energy and climate legislation that increases our security and limits emissions, as it preserves and creates jobs. Notice what comes first ("national security"), second ("competitive edge") and third ("creating American jobs"). Now notice what has to wait until fourth place ("protect...future generations from climate change"). It's going to take a lot of bottom-up pressure of this kind to make any greenhouse-gas bill happen in 2010. Arguments based on the climate alone—let's not destroy the climate system in defence of our inalienable right to get eight miles to the gallon—have little traction in the country right now. So its proponents are trying everything else they can: stop sending money to terrorists! Beat China in this round of high-tech competition! Create jobs! Oh, and mumble mumble climate mumble mumble. This is the kind of thing Lindsey Graham tried out on angry constituents after signing an op-ed with John Kerry on limiting emissions. And notice the title of the Senate bill: "Clean Energy Jobs and American Power Act". No "climate" to be found. This is the only way to sell it. And even then, it's a hard sell. Thinning out the field of Democrats could focus minds on the way to Iowa’s caucuses Matt Bevin, the unpopular incumbent, hopes to survive a formidable challenge by aligning himself with the president The gerrymandering fix could help Democrats keep the House in 2020
<urn:uuid:c14b250e-2c31-48d9-8732-6bfc96390eb1>
CC-MAIN-2022-33
https://www.economist.com/democracy-in-america/2010/01/21/dont-mention-the-climate
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00465.warc.gz
en
0.907123
455
1.609375
2
squat_university- Do you have anterior hip pain that limits your ability to squat to full depth? Often the go-to fix many show is a banded joint mobilization to address the mobility of the joint itself by stretching the hip capsule (a stiff glove-like covering around the joint). This can be a great help for many who have hip impingements – however sometimes there is another problem creating the problem! . This pain can also come out when the muscles of the lateral hip (like the glute medius and portions of the glute max) aren’t working correctly. . Placing a band across your knees and performing a very slow descent on your warm up sets can help you activate these muscles. As you descend, pause just above the pinch sensation and feel for the lateral hip muscles turn on as you jam you foot into the ground and push out against the band resistance. Eventually you should be able to descend deeper into your full depth squat.. If this exercise is right for your body, you should start to notice less and less of that pinching pain in your hip without the band and an ability to squat to your regular full depth. Always use the test retest method to figure out if the corrective exercise you’re performing is right for your body. If you notice a small improvement in your symptoms – you’re likely on the right track..To learn more about hip impingements, check out the blog article linked in my bio . Thank you @3d4Medical & the app Complete Anatomy for the visual of the body.
<urn:uuid:232cf048-4baf-49fd-a5f9-2efb15330d7a>
CC-MAIN-2022-33
https://www.powerliftingwatch.com/node/37466
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00265.warc.gz
en
0.924501
323
1.617188
2
Hidalgo has long served an important role in the production and distribution of energy, being a net exporter to other regions of Mexico. The state is well served with energy infrastructure and possesses strong transport connectivity to the rest of the country. Furthermore, the local administration has established energy as one of its main strategic sectors for development, and has been proactive in attracting both domestic and international investment, notably in the renewables segment. While changes in national policy have brought uncertainty to the sector, the state finds itself well placed to take advantage of the opportunities available. Playing host to a range of significant energy infrastructure facilities and intersected by oil and gas pipelines, Hidalgo is the fifth-largest energy-producing state in Mexico. The country’s largest oil refinery is located in Tula, a city in the west of the state, along with a major thermoelectric plant. Furthermore, a hydroelectric plant is located in Zimapán, damming the Moctezuma River. These facilities ensure the state operates with an energy surplus, becoming a net exporter, a role supported by Hidalgo’s close proximity to Mexico City and well-developed offering of transmission lines. While increasing private investment in the state and an expected uptick in regional economic activity appear likely to boost demand within Hidalgo, these investments also appear set to expand supply. One of the most important new facilities is the Juandhó combined-cycle power station in the municipality of Tetepango, work on which broke ground in December 2018. Upon completion, the facility – which is being developed by domestic company Akraan, with the support of the German industrial conglomerate Siemens – will have a daily capacity of 650 MW, enough to satisfy all of Hidalgo’s current energy needs. The plant is expected to generate around 1100 jobs and attract MXN10bn ($517.1m) in private investment. There has also been an increase in investment in the renewables segment, with the opening of the Guajiro solar project in the municipality of Nopala de Villagran in June 2019. The facility, which is contracted under a long-term power purchase agreement with Mexico’s Federal Electricity Commission (Comisión Federal de Electricidad, CFE), was developed by the Chile-headquartered solar generation platform Atlas Renewable Energy – which is backed by the emerging markets private equity firm Actis – who purchased the contract from the US green-energy firm SunPower. Atlas Renewable Energy invested over $118m in the project, with an additional $88.5m in financing coming from the state export-import investment bank Bancomext. The state’s new solar park is expected to generate 300 GWh per annum, generating clean energy to more than 120,000 families each year, while saving more than 215,000 tonnes of annual CO emissions. In addition to these new developments, as of early 2019 the state had signed contracts for a pipeline of new energy projects with a total value of MXN34bn ($1.8bn). In January 2019 Mexico faced temporary fuel shortages following attempts by the administration of President Andrés Manuel López Obrador, better known by his acronym AMLO, to tackle theft from pipelines. While the state-owned hydrocarbons company Petróleos Mexicanos struggled to maintain supply in the face of these disruptions, the US-based multinational ExxonMobil chose to bypass the national pipeline network and deliver fuel via rail through a deal with Kansas City Southern de México and the US logistics firm Bulkmatic. These events highlight the important, expanded role the private sector can play in both the storage and distribution of oil and gas, a role traditionally reserved in Mexico for state-owned firms. “Simply put, if more private investment in storage and transport of fuel had taken place, January’s crisis would not have happened,” José Luis Romo Cruz, secretary of public policy of Hidalgo, told OBG. Recognising this potential, the administration of Omar Fayad Meneses, the current governor of Hidalgo, has been proactive in attracting investment in the energy sector, in terms of both power stations and fuel. In June 2018 Bulkmatic announced that Tula would be the site of its newest fuel storage facility, where the company already operates two terminals. “Tula is in a great strategic location to store energy for the Mexico City metropolitan area, Hidalgo and other neighbouring states,” Francisco Melo Valdés, commercial director for chemicals and hydrocarbons at Bulkmatic, told OBG. “The region offers great connectivity in terms of trains and roads, as well as proximity to oil and gas pipelines and refineries.” In order to facilitate investment in the sector and improve the local business environment, the local authorities undertook two major reforms of the state’s energy laws in March 2018. The first of these entailed reformulating the Hidalgo State Energy Commission into the State Energy Agency (Agencia Estatal de Energía, AEE), a more decentralised public body. The new agency has expanded powers to assist private companies interested in investing in the energy sector, including through public-private partnerships (PPPs), along with powers to propose and manage subsidies and other incentives for energy investors. “Not many states have taken such extensive measures as Hidalgo,” Andrés Manning, head of the AEE, told OBG. “We cooperate with companies looking to invest in the energy sector, managing their arrival and facilitating communications with municipalities as well the federal government.” Manning added that, “This is important because energy projects have run into trouble in the past due to lack of prior agreements with municipalities.” The second reform, called the Law for Promotion of Sustainable Energy Development, provides a legal framework to govern the state’s business environment in the sector. This includes the establishment of rules governing communication between the state and municipalities in order to better streamline procedures and facilitate development in the sector. These legislative changes leave Hidalgo well placed to take advantage of the opportunities that have emerged following the liberalisation of the national energy system. Mexico’s energy reforms began with changes to the country’s constitution in 2013, which enabled private and foreign investment across the whole energy value chain. Not only did these reforms open the door for entities other than state-owned companies to generate and transport energy, it also removed subsidies from the CFE and left energy prices to market forces. Following price liberalisation electricity costs rose swiftly across the country, inhibiting growth for many domestic firms. Nevertheless, these changes provided Hidalgo with opportunities, as energy price flexibility gives the state a chance to develop its competitive advantages. Indeed, the state’s rising infrastructure capacity and energy surplus should keep prices low, while the proximity of Hidalgo to areas of high consumption such as Mexico City and the Bajío industrial region provide it with a growing export market. Furthermore, while public sector providers still produce the majority of the state’s energy output, its position as an energy exporter should benefit from the openness of Hidalgo to private sector energy providers. In 2018 Hidalgo’s energy generation capacity stood at 2651.2 MW, of which 13% came from clean energy sources. However, the contribution of renewables to the state’s energy mix is growing, with the new Guajiro solar power plant coming on-line in June 2019. Furthermore, the state benefits from significant renewable energy resources, notably solar and wind. The state is ideal for solar energy generation, combining year-long sunshine of at least 5.7 hours per day, with lower temperatures than other areas owing to its high altitude, which makes the photovoltaic panels more efficient, according to Atlas Renewable Energy. This high altitude also makes the state suitable for wind generation, though this segment remains comparatively underdeveloped, with only one 100-MW wind farm in operation in mid-2019, operated by the private firm Mexican Renewable Energy. Alongside its resources, the state is also able to leverage its location and pre-existing infrastructure to attract further investment in its renewables segment. “Being so close to Mexico City facilitates the operation of and access to the site,” Camilo Serrano, general manager for Mexico of Atlas Renewable Energy, told OBG. In addition, the Guajiro project is less than 3 km from CFE’s Dañú substation, allowing it to efficiently provide electricity to the national grid. “Many power generation projects do not materialise because of the distances to transmission lines,” Manning told OBG. “In Hidalgo this is not the case; this means that the state has the ability to become a supplier to the central part of Mexico.” In February 2019 the AMLO administration cancelled the country’s fourth long-term electricity auction, causing uncertainty among investors. This major shift in national policy does not mark the end of private energy generation, nor Hidalgo’s ambition to attract more domestic and international investment. These changes do, however, appear to mean that new power plants will have to seek private clients, rather than secure agreements with the CFE through public energy auctions. While this shift in policy presents challenges, it also presents opportunities for Hidalgo. The state is well equipped with transmission lines and strategically positioned in the centre of the country, close to the capital and major industrial areas. “Under this new normal without electricity auctions, the proximity and connectivity of a project to where the energy is consumed becomes an even more important consideration,” Serrano told OBG. “Therefore, if you need a large industrial customer for your project, it makes much more sense to be geographically close to them.” Hidalgo is, therefore, an “ideal place” to sell to private parties, Serrano added. Furthermore, the state has an administration committed to attracting investment and expanding the output of the sector, one that has demonstrated its willingness to operate as a de facto energy broker between private firms. Conscious that energy costs can be a deal-breaker for companies when they are deciding where to invest, Hidalgo is looking to help potential energy providers find consumer partners and sign power purchase agreements. In so doing, the state government hopes to create a virtuous circle, whereby more power plants are established, thereby lowering the cost of electricity for potential investors in the state and thus attracting more companies. Nevertheless, while the Guajiro solar power plant has an installed capacity of 129.5 MW, while the company with the highest consumption of energy in the state uses 28 MW. This highlights that electricity producers wishing to develop new facilities will need to establish several, smaller private contracts if they remain unable to sell directly to the national grid. Therefore, on top of its existing agreement with CFE, Atlas Renewable Energy announced in mid-2019 that it would also seek to secure private clients for its new solar power station. While this risks slowing down the construction of new power stations, Hidalgo appears well placed to gain the greatest benefit from the situation. A further example of a challenge emerging as the result of decisions made on the national level is the issue of transmission lines. In December 2018 the new government announced the end of PPPs for transmitting electricity, despite strong interest from the private sector. As such, transmission remains fully under the administration of the CFE. While the longer-term impact of this policy remains to be seen, the policy change has sparked fears that the supply of new transmission lines will be unable to keep up with demand. While Hidalgo is currently has well-developed transmission lines, this will need to increase to keep pace with demand. The state may be able to attract energy generation companies and connect them to a sufficient number of clients. However, for these investments to prove successful, electricity will need to be able to be transmitted from the power station to the end consumer. “One thing that concerns us, now that the government is taking on a more centralised role in the energy sector, is whether transmission lines have the capacity to match our pipeline of investments,” Manning told OBG. “However, we are negotiating with the federal government so that their planning in the transmission sector is aligned with the investments arriving in Hidalgo.” The state may also be set to experience administrative delays as the result of issues with the Energy Regulatory Commission (Comisión Reguladora de Energía, CRE), the government entity responsible for allocating operating licences to both customers and independent power producers, wanting to participate in the wholesale market. The CRE has faced budgetary constraints under the new administration, along with the resignation of four of the body’s seven commissioners since December 2018. While the energy sector faces challenges as a result of decisions made on the national level, Hidalgo appears well positioned to take advantage of the situation. The state’s role as a net energy exporter with developed infrastructure, coupled with its location close to both Mexico City and major industrial areas, provides it with significant opportunities to continue to develop its energy offering. Furthermore, the state remains open to private investment and has committed itself to facilitating deals between energy providers and consumers. You have reached the limit of premium articles you can view for free. Choose from the options below to purchase print or digital editions of our Reports. You can also purchase a website subscription giving you unlimited access to all of our Reports online for 12 months. If you have already purchased this Report or have a website subscription, please login to continue.
<urn:uuid:84dfcbda-cbd9-400d-bf70-976eaf487703>
CC-MAIN-2022-33
https://oxfordbusinessgroup.com/analysis/virtuous-circle-federal-government-supports-private-investment-boost-output-and-leverage-position
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00669.warc.gz
en
0.949131
2,836
1.835938
2
Canyon has a population of 12,875 and is located in Randall county. The average in-state tuition for full time undergraduate students in criminal justice schools in Canyon during the 2009 - 2010 school year was $4,028.00. The average tuition was $10,676.00 for non-residents studying in Texas. The average cost of books and supplies for criminal justice schools in Canyon is $1,000.00. Students living on campus at criminal justice schools in Canyon paid an average of $5,726.00 for room and board during the 2009 - 2010 school year. Students living at home incurred costs of $7,450.00. Students have a choice of one criminal justice college in Canyon to attend. Criminal Justice programs in Canyon reportedly graduated 22 students in the 2008 - 2009 school year. |Profession||Average Salary||Number Employed in City| |First-Line Supervisors/Managers of Correctional Officers||$42,660.00||170| |Correctional Officers and Jailers||$32,520.00||1,220| |Detectives and Criminal Investigators||$55,220.00||60| |Police and Sheriff's Patrol Officers||$47,390.00||Not available|
<urn:uuid:c22d0fae-7f01-48cb-a3cb-6edb46934e40>
CC-MAIN-2017-04
http://www.unixl.com/dir/criminal-justice/texas/canyon/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00463-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947437
261
1.515625
2
This file is part of UnxUtils. Pageant.exe is developed by Braindonors.net. Pageant.exe is usually located in the %PROGRAM_FILES% sub-folder and its usual size is 126,976 bytes. The pageant.exe process is safe, and you can safely disable it. We also recommend optimizing your computer. Author: Braindonors.netPart Of: UnxUtilsCommon path(s): subfolder in %PROGRAM_FILES%Filesize(s): 126,976 bytes, 192,512 bytes No comments found
<urn:uuid:acacaea0-9c49-44dd-813d-e663bf52537c>
CC-MAIN-2016-44
http://www.fileinspect.com/fileinfo/pageant-exe/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719155.26/warc/CC-MAIN-20161020183839-00332-ip-10-171-6-4.ec2.internal.warc.gz
en
0.92943
128
1.5625
2
Gender inequality in education Sep 10: THE ILO's finding that the illiteracy rate among adult Pakistani women is over 25 percentage points higher than that of the adult male population is not really surprising. Statistics show that gender inequality in Pakistan is a given fact - be it in health, education, employment or any other area of national life. Unfortunately, this has been known for a long time, but no concerted efforts have been made to address this concern. Primarily because ours is a patriarchal society, there is an ingrained perception of women being naturally inferior in status to men. To be sure, gender-sensitive policies are officially claimed to be the guiding principle - they are enshrined in the millennium development goals which the government has signed. But moves to enhance women's reproductive health facilities, ensure their political empowerment in the assemblies, and to increase the enrolment of girls in schools do not go far enough. They have helped only in a small way to decrease the socio-economic gap between the two As long as women and girls are not accepted as individuals in their own right, and are seen merely as wives, mothers and daughters, and as long as laws and traditions continue to discriminate against them, there is little chance of their catching up with the men. It is this non-acceptance of women as equal beings that has permeated all walks of life, as in the case of education. However, in this sector, things could be looking up slightly for the female population, not so much because there is greater awareness of its right to be part of the mainstream as the need to harness its economic potential that can be augmented by proper schooling. For instance, parents in many rural areas today are no longer averse to sending their daughters to school. Many years ago this would have been unthinkable for cultural constraints. Now that attitudes are changing, it is a pity that the government has not capitalised on that. Quite often girls are not being educated due to the inaccessibility of schools. Which parent would want to send their daughter to a remote school exposing her to the dangers that lurk in the way? In other cases, poor toilet facilities at school keep the girls from attending. Unfortunately, these drawbacks have not led parents to demand strongly enough that better educational facilities nearer their homes be provided to their children. This betrays a general lack of awareness of education being the basic right of every child. Moreover, despite the growing realisation of the obvious advantages of education, pockets of deep conservatism still exist around the country, more specifically in the NWFP and Balochistan. In the latter case, the stronghold of the feudal system, with all its attendant evils, has made education a pipedream - especially so for women. In this province, the literacy rate of the female population is a mere 19 per cent, much below the national average. It is keeping this picture in mind that the government must set about improving educational facilities for girls. However, such an action would only be cosmetic unless accompanied by a strong effort to change existing mindsets that currently see women as unequal to
<urn:uuid:4169e580-c7f4-4970-8710-ddf8cb258659>
CC-MAIN-2017-04
http://www.interface.edu.pk/students/Sep-07/Gender-inequality.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00030-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964071
666
2.90625
3
Social Norms Health Awareness Campaign The purpose of the campaign is to correct misperceptions about UAlbany students by providing students with accurate information about peers. By learning that healthy choices are the norm, students will be better able to make well informed decisions about their health. The information comes from a randomly selected, representative sample of UAlbany students who take anonymous health surveys. [+] Samples of Past Posters [+] Graduate Student Internship Program
<urn:uuid:d41bb5c5-7d1e-47a3-9cd2-5574e3477edb>
CC-MAIN-2017-04
http://www.albany.edu/counseling_center/social_norms.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00247-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933814
98
2.078125
2
Effective water quality management requires careful consideration of pollutant fate and transport, proper estimation of non-point source loadings, and maximum allowable allocation of point source discharges. A decision support system (DSS) that addresses all these issues is developed in this study by embedding mass-balance expressions, GIS, and a remote-sensing-based non-point source loading scheme into a hybrid goal-programming approach and is applied to the rapidly growing Arroyo Colorado River watershed along the US-Mexico border. The model components were favorably evaluated against field data and previous studies. The DSS was used to evaluate the carrying capacity of the river, defined based on the water quality standards for biochemical oxygen demand, dissolved oxygen, and minimum in-stream flow requirements. The results indicated that on a macro-scale, the current stresses utilize about 40 % of the maximum carrying capacity. However, the most upstream and downstream sub-watersheds are currently over stressed and need to reduce their loadings. The assimilative capacity of the river is not sufficient to carry current flows at their permitted discharge concentrations implying an inequity among discharges with regard to treatment cost burden. Sensitivity analyses indicated that the carrying capacity was more affected by policy choices made for water quality standards then where they were to be enforced (i.e., compliance locations). Urban areas currently cover 13 % of the watershed but contribute nearly 45 % of the total non-point source loadings. Therefore, the urbanization in this watershed must be carefully planned with emphasis on stormwater treatment and management to sustain this valuable resource for future generations. - Water quality planning
<urn:uuid:3b5aea0f-21d1-42b6-ba33-a0b0b0b1a112>
CC-MAIN-2022-33
https://scholars.ttu.edu/en/publications/an-assessment-of-optimal-waste-load-allocation-and-assimilation-c-6
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00268.warc.gz
en
0.941438
351
2.578125
3
Individual differences | Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | Biological: Behavioural genetics · Evolutionary psychology · Neuroanatomy · Neurochemistry · Neuroendocrinology · Neuroscience · Psychoneuroimmunology · Physiological Psychology · Psychopharmacology (Index, Outline) Postsynaptic potentials are changes in the membrane potential of the postsynaptic neuron. Postsynaptic potentials are graded potentials. They are caused by the presynaptic neuron releasing neurotransmitters from the terminal button at the end of an axon into the synaptic cleft. The neurotransmitters bind to receptors on the postsynaptic neuron. These are collectively referred to as postsynaptic receptors, since they are on the membrane of the postsynaptic cell. Neurotransmitters bind to their receptors by having a particular shape or structure, somewhat like the way a key fits into certain locks. The role of ions Edit One way receptors can react to being bound by a neurotransmitter is to open or close an ion channel, allowing ions to enter or leave the cell. It is these ions that alter the membrane potential. Ions are subject to two main forces, diffusion and electrostatic repulsion. Ions will tend towards their equilibrium potential, which is the state where the diffusion force cancels out the force of electrostatic repulsion. When a membrane is at its equilibrium potential, there is no longer a net movement of ions. Two important equations that can determine membrane potential differences based on ion concentrations are the Nernst Equation and the Goldman Equation. Relation to action potentials Edit Neurons have a resting potential of about -70mV. If the opening of the ion channel results in a net gain of positive charge across the membrane, the membrane is said to be depolarized, as the potential comes closer to zero. This is an excitatory postsynaptic potential (EPSP), as it brings the neuron's potential closer to its firing threshold (about -55mV). If, on the other hand, the opening of the ion channel results in a net gain of negative charge, this moves the potental further from zero and is referred to as hyperpolarization. This is an inhibitory postsynaptic potential, as it changes the charge across the membrane to be further from the firing threshold. It is important to note that neurotransmitters are not inherently excitatory or inhibitory: different receptors for the same neurotransmitter may open different types of ion channels. EPSPs and IPSPs are transient changes in the membrane potential, and EPSPs resulting from transmitter release at a single synapse are generally far too small to trigger a spike in the postsynaptic neuron. However, a neuron typically receives synaptic inputs from about 10,000 other neurons, so the combined activity of afferent neurons can cause large fluctuatons in membrane potential. If the postsynaptic cell is sufficiently depolarized, an action potential will occur. Action potentials are not graded; they are all-or-none responses. Termination of postsynaptic potentials Edit Postsynaptic potentials begin to be terminated when the neurotransmitter detaches from its receptor. The receptor is then free to return to its previous structural state. Ion channels that had been opened by the receptor when the neurotransmitter was bound to it will now close. Once the channels are closed, ions return to their equilibrium states, and the membrane is returned to its equilibrium potential. Algebraic summation Edit Postsynaptic potentials are subject to summation, either spatially or temporally. Spatial summation: If a cell is receiving input at two synapses that are near each other, their postsynaptic potenials add together. If the cell is receiving two excitatory postsynaptic potentials, they combine so that the membrane potential is depolarized by the sum of the two changes. If there are two inhibitory potentials, they also sum, and the membrane is hyperpolarized by that amount. If the cell is receiving both inhibitory and excitatory postsynaptic potentials, they can cancel out, or one can be stronger than the other, and the membrane potential will change by the difference between them. Temporal summation: When a cell receives inputs that are close together in time, they are also added together, even if from the same synapse. Thus, if a neuron receives an excitatory postsynaptic potential, and then the presynaptic neuron fires again, creating another EPSP, then the membrane of the postsynaptic cell is depolarized by the total of the EPSPs. - Action potential - Goldman equation - Membrane potential - Nernst equation - Synaptic potential |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:0a5a30e7-36d2-4648-ac8c-8288c9f2347b>
CC-MAIN-2017-04
http://psychology.wikia.com/wiki/Post-synaptic_potentials
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00190-ip-10-171-10-70.ec2.internal.warc.gz
en
0.902606
1,010
3.328125
3
I am a geek and proud of it. Now what exactly is a geek, you might ask? Sure, most people have heard the word before; it is often used as a derogatory term that is interchangeable with words like nerd, dweeb and dork. However, nowadays more and more people are viewing the word “geek“ in a positive light, and it has even become a source of pride for some people, like myself. The word’s origins aren’t exactly positive though. Versions of the word are present in various dialects such as Low German, Dutch and Afrikaans and they translate to fool, freak, or alternatively, crazy. How insulting is that? I mean, I may be a crazy freak, but I am definitely no fool. Anyway, back to the definition. Well, not really, because in fact there is no clear-cut definition. It is a term whose meaning is constantly disputed. I could ask ten people to define the word “geek” for me and I would most likely receive ten different definitions, albeit with some similarities between them. My personal definition of “geek” is a little complicated, but basically it amounts to a person who either has a wide variety of interests in the less socially acceptable subjects, or who has a specific area of interest within these subjects. And just to clarify, when I say “less socially acceptable subjects”, I mean things that are not considered “cool”, like Sci-Fi, Fantasy, video games, Anime, Star Trek, etc. I’m not talking about things that are really socially unacceptable like bestiality or public nudity. Just so we’re clear. In addition, geeks tend to have a love for technology. They need not be master computer hackers or anything though; it’s the interest that counts. And it needn’t even involve computers either; many geeks have a love for the latest phone technology, cameras, tablets, MP3 players, TVs, etc. The list goes on. Why all the interest? Because first of all, gadgets and gizmos are fun to play with. Secondly, they are intricate and require in-depth knowledge to use to their fullest potential. And herein lies another key trait of the geek: Passion for knowledge. Geeks are very passionate about their subject(s) of choice. Whether it be about books, games, movies, technology, etc., geeks love to analyze and theorize and discuss and debate. They love to pick apart the minutiae of the subject at hand. In fact, the word “geek” is starting to refer to just about anyone with a passion for something. We’re seeing car geeks, sports geeks, art geeks, science geeks, blog geeks ;) , pretty much anything under the sun geeks. The word is truly evolving all the time. Many people also tend to associate the term “geek” with someone who is antisocial, but I believe that to be false. While it’s true that many geeks (but not all) feel uncomfortable at the bar and club scenes, it’s not because they are unable to socialize with those around them, it’s just that this type of atmosphere holds little to no interest for them. Conversely, take a dancing party girl and plunk her in the middle of a group of geeks re-enacting Monty Python’s Dead Parrot sketch (“He’s not dead! He’s pining for the fjords!) or playing an MMORPG such as WOW (translation: Massively Multiplayer Online Role-Playing Game and World of Warcraft, respectively) and let’s see how uncomfortable and “antisocial” she becomes. More and more, the word “geek” is being redefined to refer to someone who is individualistic, creative, intelligent, and moreover, as someone who is unafraid to show it. I believe that most people are more geeky than they’d care to admit. To them I say, take pride in your uniqueness! Dress up as a Star Wars character, wear T-shirts emblazoned with in-jokes, discuss the logic of the plot of the Lord of the Rings (why couldn’t the eagles just fly them to Mount Doom already?). The point is, you’re allowed to like these things, even if many people think it makes you “uncool”. A little eccentricity never hurts. And hey, the more people who actually admit to liking these things, the cooler these things become in all of society, not just within the world of geeks. And you’ll see, soon enough that world of geeks will be named… Earth. (mwahaha)
<urn:uuid:2a9e9786-829b-4039-b160-d114daa69d26>
CC-MAIN-2017-04
https://randomdeviations.wordpress.com/2012/04/18/and-the-geeks-shall-inherit-the-earth/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00083-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949098
1,022
2.1875
2
Carbon dioxide curing was adopted to accelerate the hydration of foam concrete samples with a lower bulk density level of around 450 kg/m3 and a higher level of around 1150 kg/m3. The bending strength, compressive strength and ultrasonic transmission velocity of carbonated harden foam concrete were tested, the hydration products were analyzed by means of XRD and TG/DSC. The results show as: (1) By comparing with standard curing samples, there are more than 47% increments of specific strengths of carbonated foam concrete with the higher density level at a certain curing time before 14d. However, for the lower density level one, there is just a significant improvement of specific bending strength obtained before 7d. (2) The carbonated foam concretes with the lower density level show lower ultrasonic transmission velocity than standard curing ones. The velocities have hardly difference for both carbonated and standard curing samples with the higher density level. (3) Vaterite can’t be found in carbonated foam concrete with the lower density level at curing time before 28d, while it becomes a common phase in 3d’s carbonated sample with the higher density level. Vaterite was considered to be an important factor that influences the ultrasonic transmission velocity.
<urn:uuid:ce3a62a2-6229-41b3-8798-dcba16587491>
CC-MAIN-2017-04
http://www.scientific.net/AMR.374-377.1764
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00035-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936248
263
2.15625
2
It’s not uncommon to hear people say that the stigma around HIV is the most difficult thing about living with the virus. There is still a lot of fear and misunderstanding about HIV. Many people living with HIV experience stigma and discrimination on a daily basis. As well as being hurtful, stigma can get in the way of preventing new transmissions. Some people are too scared to get tested, in case they have the virus. Why is there stigma? The fear surrounding HIV is a hang over from the AIDS epidemic of the 1980s. Little was known about HIV and how to prevent it. Some of the common myths about HIV are: - HIV and AIDS are always associated with death. - HIV is always associated with behaviours that some people don’t agree with (homosexuality, drug use, sex work). - HIV is only transmitted through sex, which is taboo in some cultures. - HIV is a result of someone’s personal or moral failure and they deserved to be punished. These myths are simply wrong. They are also out of step with the values that hold us together as a community. Let’s end stigma You can help end HIV stigma by: - Knowing the facts about HIV and challenge misunderstanding wherever you can. - Educating others when the opportunity arises. People are most likely to be open to new information when they are presented with the facts in a respectful manner by someone they have a good relationship with. - Chose your words carefully. For example don’t use terms like ‘clean’ to describe someone who does not have HIV. It implies that people who are living with HIV are ‘dirty’ which is untrue and shaming. - Supporting people living with HIV in whatever social or practical way that you can.
<urn:uuid:5a9658b7-c4ff-4138-822e-0adbd1968d01>
CC-MAIN-2022-33
https://pamoja.co.nz/hiv/hiv-stigma/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00277.warc.gz
en
0.961624
371
3.46875
3
Governments across the world support the nonprofit sector through various measures. One of the most common and visible of these are tax incentives on charitable donations made by individuals and corporates. The Centre for Social Impact and Philanthropy (CSIP), Ashoka University, and Centre for Budget and Governance Accountability (CBGA) conducted a study on the relationship between tax incentives and philanthropic giving. The study compares India’s incentive policy with that of 11 countries, namely Bangladesh, Brazil, China, France, Mexico, Norway, Singapore, South Africa, South Korea, UK and US, selected for the diversity of their economic status and models. India falls somewhere in the middle because the rate of incentives offered has declined due to tax policy changes of 2017 and the introduction of a ‘dual tax structure’ in 2020. Lower personal income tax rates and the abolition of inheritance and wealth taxes have further reduced the attractiveness of tax incentives for philanthropy. France, UK and Singapore have most generous tax incentives Broadly speaking, France, Singapore, and the UK seem to have the most generous tax incentive structures in the sample of 12 countries, while Bangladesh, Brazil and Mexico seem to be on the other side of the spectrum. The extent of generosity of incentives is higher in these countries for different reasons. For example, in France, it is because the incentive is in the form of a credit. In the case of Singapore, it is because of the high rates of incentive and high ceiling, and in the case of the UK, it is the combination of the tax rate, form and rate. Bangladesh’s lower level of generosity is mainly on account of its lower rate of incentive, while for Brazil and Mexico, it is due to low ceilings. India in the middle India is somewhere in the middle in terms of the generosity of its tax incentives. Under its most popular tax incentive scheme (Section 80G of the Indian tax code), India allows a 50% deduction for donations to charitable organisations. The distinctive feature in India is that it is the only country among the 12 surveyed where donations to government entities and funds also attract tax incentives. Further, the tax incentives provided to some government entities and funds are relatively more generous (with 100% deduction allowed). This difference in the level of generosity holds even in the case of the ceiling that applies to donations to charitable organisations on the one hand and select government entities and funds, on the other. While donations to charitable organisations has a ceiling of 10% of taxable income, that on donations to select government entities and funds has a much higher ceiling of 100%. What can the Indian Government do? Governments have an important role to play in encouraging charitable organisations and this role involves two broad considerations:framing policies with the objective of encouraging the charitable sector, and designing policies such that they are effective. Given the fact that tax incentives for charitable donations already exist, India fulfils the first consideration. However, there is considerable scope to improve on the second aspect, which is to design policies that are effective in achieving the objective of increasing the resources of the charitable sector. 4 things the Indian government could do: 1. Rigorous studies for evidence-based policy making There is a need to carry out rigorous studies on the impact of tax incentives on the charitable sector in India to understand their role and effectiveness. Indeed, some recent studies are available for certain other types of tax incentives that analyse whether these tax incentives helped in increasing employment and/or investment. These studies are important as they help provide a sense of whether tax incentives have been effective in achieving their intended objectives. However, there is an acute lack of literature that assess the effectiveness of tax incentives for charitable donations and how they impact charitable organisations. Hence, it is necessary to undertake studies to assess the importance of tax incentivised charitable donations from the point of view of charitable 2. Improve availability of tax data For informed policy-making, it is important that more disaggregated data (such as on the number of corporates/individuals donating, the amount donated by different tax slabs donors fall under, the sectoral composition of donations, etc.), are made available by the government. The government of India provides aggregate numbers on revenue forgone for charitable donations to charities in the statement “Revenue Impact of Tax Incentives under the Central Tax System” in the Union Budget. However, the reporting structure on tax revenue forgone does not provide any further details that can help understand the amount donated by different sets of donors and the nature of the donations. In the Financial Year 2012-13, the Income-tax Department introduced an e-filed return (ITR-7) for charitable entities in which information on the donations received by the entity has to be provided. Similarly, all persons with incomes above Rs. 5 lakh are compulsorily required to file returns electronically. With regard to the 80G deduction, the tax return of the donor contains the details of the donee and her/his Permanent Account Number (PAN) along with the amount on which the deduction has been claimed. Therefore, data capturing the details of the donation made by a donor along with details of the recipient is available with the Tax Department. The government should consider making such data public, in line with good practices in other countries, such as the USA. 3. Raise the level of incentives provided In light of the massive gaps in India’s achievement of the Sustainable Development Goals, which have been exacerbated by the impact of the COVID-19 pandemic, an increase in the rate of incentive provided as well as raising of the ceiling would send a strong message to donors on the desirability of philanthropic contributions. 4. Re-introduce taxes that affect higher-income groups Given the significant increase in inequality, particularly amid the COVID-19 pandemic, it is recommended that the government re-introduce wealth and inheritance tax, and provide incentives on them for charitable donations. The scale of importance of tax incentivised charitable donations from the point of view of charitable organisations. The scale of recorded charitable donations in countries such as India and China is much smaller compared to countries such as the UK and the USA, even after accounting for differences in the level of income. The absence of wealth and inheritance tax is regarded as one of the reasons for the lower level of philanthropic giving. These taxes were removed on the ground that the administrative costs associated with collecting revenue outweigh the amount of revenue collected. However, this logic may not hold true anymore as with the digitalisation of tax returns as well as other measures, administrative costs are likely to have come down, whereas revenue collection from these taxes can be significant given the increase in wealth held by the rich. Reintroduction of these taxes, along with incentives on them for philanthropic giving, will not only result in additional tax revenue for the government, it will also increase the resources of the charitable sector.
<urn:uuid:b42b2e75-45b7-417a-966b-a09742a0360d>
CC-MAIN-2022-33
https://thecsrjournal.in/tax-incentives-philanthropy-study-france-india/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00268.warc.gz
en
0.95266
1,423
2.484375
2
Issue No. 04 - July (1982 vol. 8) W.E. Howden , Department of Electrical Engineering and Computer Science, University of California at San Diego Different approaches to the generation of test data are described. Error-based approaches depend on the definition of classes of commonly occurring program errors. They generate tests which are specifically designed to determine if particular classes of errors occur in a program. An error-based method called weak mutation testing is described. In this method, tests are constructed which are guaranteed to force program statements which contain certain classes of errors to act incorrectly during the execution of the program over those tests. The method is systematic, and a tool can be built to help the user apply the method. It is extensible in the sense that it can be extended to cover additional classes of errors. Its relationship to other software testing methods is discussed. Examples are included. testing, Complete, effective, mutations W.E. Howden, "Weak Mutation Testing and Completeness of Test Sets", IEEE Transactions on Software Engineering, vol. 8, no. , pp. 371-379, July 1982, doi:10.1109/TSE.1982.235571
<urn:uuid:c8f09995-8202-49be-8e9c-88b74107a0ff>
CC-MAIN-2017-04
https://www.computer.org/csdl/trans/ts/1982/04/01702959-abs.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00194-ip-10-171-10-70.ec2.internal.warc.gz
en
0.918461
244
2.859375
3
Bullock, Blake Lively, John Goodman, Emeril Lagasse, Lenny Kravitz, Dave Matthews and other celebs have banded together to film this PSA, asking everyone to sign an online petition urging restoration and protection of the American Gulf Coast -- the very area decimated by the BP Deepwater Horizon oil spill. The Gulf Coast is one of the most fragile ecosystems on the planet. In addition to extensive environmental damage, the area's already suffering economy -- based almost entirely on fishing and tourism -- has been decimated. Run by activist group Women of the Storm, the Be the One campaign aims to keep pressure on Congress to restore the affected area, still not fully recovered from the devastation of Hurricane Katrina, to its previous pristine glory. In a statement on their website, the group says: "Anything less than complete coastal restoration is unacceptable. This nation requires a healthy Gulf of Mexico for a number of reasons involving domestic energy, shipping, seafood, ecology, recreation and culture. America's Gulf produces nearly half of the US domestic energy supply, and more than two thirds of the nation's shrimp and oysters. Seven of the nation's largest 10 ports are located in the Gulf of Mexico. The Gulf is a flyway for 40-percent of North America's duck, geese, swan and eagle populations. Much of the continent's waterfowl population winters along the Gulf Coast. And because millions of people annually visit Gulf beaches, embark on fishing trips, participate in water sports and otherwise enjoy this national treasure, the impact of a healthy Gulf on the quality of life in the region and beyond is immeasurable." Join Sandra Bullock and your other favorite celebs by signing the petition yourself at RestoreTheGulf.com. And you'll see personalized content just for you whenever you click the My Feed . SheKnows is making some changes!
<urn:uuid:47d758fb-a2a8-4a3e-9782-dfa4feedd117>
CC-MAIN-2017-04
http://www.sheknows.com/entertainment/articles/816432/sandra-bullock-pleads-for-help-in-gulf-oil-spill-1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00225-ip-10-171-10-70.ec2.internal.warc.gz
en
0.924891
384
1.75
2
Walnut-Chancellor Historic District National Register Historic District The Walnut-Chancellor Historic District comprises three residential/commercial blocks and a portion of a fourth in the Rittenhouse area of Philadelphia. It is important as a surviving document of 19th century social and architectural history because it conveys both by its individual buildings and their relationship to each other a sense of the process by which Rittenhouse was developed as well as its social and architectural ambiance, during its Golden Age, 1850-1900. During the 18th Century the southwest quadrant of William Penn's original city was an area one" traveled through to reach either Gray's Ferry or the ferry at. Market (High) Street. There was no permanent settlement before the Revolution. The first half of the 19th century saw the quadrant dotted with brickyards; several glass and china factories lined the swampy banks of the Schuylkill River with coal docks in between. When Southwest (Rittenhouse) Square was laid out in 1825, several brickyards surrounded it. There were concentrations of working class residents around the Western Methodist Church, called the Bricklayers' Church, on 20th and Rittenhouse (formerly Murray) Street. Few "squares" or blocks west or south of Rittenhouse Square were subdivided in the 1830's or 1840s and residential settlement was haphazard. Rows of modest houses and workers' courts with their wooden barns and outhouses were often found in the center of the squares; narrow alleys and cartways crisscrossed the larger squares. By the early 1840s, as the business and commercial center of Philadelphia pushed westward, so did an increasingly middle class residential settlement. Block by block, the brickyards, malt houses and textile mills gave way to houses west of Broad Street. By the l850s Rittenhouse Square and its nearby streets provided the most fashionable addresses for the city's leaders in banking, transportation, manufacturing, law and medicine. The 2000 block of Walnut - one block from the Square - was especially attractive following the residential development of the Square throughout the l850s and the building of Holy Trinity Episcopal Church in 1859. This western end of Walnut Street was an undeveloped major street where one's home could be built to be seen. The corner lots of the Walnut-Chancellor District were occupied by the mansions of Henry C. Lea, Edward T. Stotesbury and Walter Lippincott (southeast and northeast corner, 20th & Walnut, and northwest corner, 21st & Walnut, respectively). The buildings and the people who lived and worked in them represent a way of life and an urban social structure which lasted from shortly before the Civil War until the turn of the century. Upper middle class residents occupied imposing houses, some by major architects, on the south side of Walnut Street. Their servants, with their families, occupied the carriage houses on the rear alleyway, Chancellor St. The north side of Walnut Street contained substantial but somewhat narrower houses. Middle class residents lived close by around the corner on 21st Street, one owner occupying the flamboyant Frank Furness-designed detached house known as the Hockley House. In relation to Walnut Street today, a street which is almost entirely commercial from river to river, the houses of the Walnut-Chancellor District recall a period in our history of tremendous growth and assurance. Confident that they controlled their own destiny, the residents of Rittenhouse in its "Golden Age" were the sort who privately mounted a national Centennial Exhibition in 1876 when Congress did not provide timely funds; initiated a public referendum to relocate City Hall westward near Rittenhouse (perhaps reflecting their new influence) and supported the erection of the largest "public buildings" in the world at that time. The houses of Walnut-Chancellor reflected the aspirations and accomplishments of a manufacturing and mercantile aristocracy that was alert to the inventions and opportunities of the last half of the 19th century while eager to identify with European cultural influences. Many of the owners were quick to use mechanical lifts and electricity and one of them, John Wanamaker, revolutionized mass merchandising by creating in the U.S. what we know as the department store, initiating the practice of fixed prices on goods in his store, the Grand Depot, adjacent to the new City Hall under construction during the same years. Banker and lawyer Jonathon D. Sergeant, merchant John Wanamaker, Caleb J. Milne and Herman P. Kremer, dry goods manufacturers, Craige Lippincott and James Elverson, publishers, and John Price Wetherill, manufacturer of white lead, were some of the notable Philadelphians who lived in the extant houses on the south side of Walnut St. The owners' carriage houses at the rear, 2006-32 Chancellor, formed a cohesive household-related environment, reflecting the social structure of the era. Gustavus A. Benson, lawyer and banker, District Attorney Peter F. Rothermel, William W. Porter, Judge of the Superior Court, Charles Whelen and Solomon Levy, stockbrokers, surgeon John Chalmers-DaCosta, Justice Cox, Jr., iron and steel merchant, and Jay Cooke, Jr., the financier, all lived in the houses on the north side of the street.2 The five houses on 21st Street, built in the l870s and l880s after the block's character was assured, completed the residential ensemble. The First Presbyterian Church (formerly Second Presbyterian) at the southeast corner of 21st and Walnut Streets forms the physical, architectural and social connection for the Walnut Street mansions, the Chancellor Street carriage houses, the houses on 21st Street and many of the people who lived there. The District is of great significance for the architectural historian because of the presence of several buildings by three major Philadelphia architects, Theophilus P. Chandler, Henry Sims and Frank Furness, each of whom is represented by one or more important works. T.P.Chandler is the architect of 3 buildings: the Scott-Wanamaker House of 1882, the chapel of the First Presbyterian Church of 1884, and the Sartain House of 1888 (2006). Collectively, these 3 buildings demonstrate the sophisticated design skills of Chandler, ranging from Renaissance Classicism to French and English Gothic styles, perhaps not surprising for the founder of the School of Architecture at the University of Pennsylvania and a graduate of the Ecole des Beaux Arts in Paris. Henry Sims is represented by his finest work, the First Presbyterian Church which, with its polychrome Gothic Revival stonework and remarkable wood truss-spanned interior, is a major landmark in the neighborhood. Two works by Frank Furness survive at the western end of the District. They are his tower for the Presbyterian Church of 1900 with its emphatic silhouette of exaggerated crockets, finials, and caricature gargoyles and the powerful polychrome molded and corbelled brick Hockley House of 1875. No other section of Philadelphia contains two such distinctive surviving designs by Furness nearly side by side. (Although a few altered buildings by Chandler and Furness and one church by Sims survive within a six-block radius of the District, they are scattered and cannot be seen in relation to each other.) Although the number of significant architects and the quality and range of their works as represented in the District would appear to warrant designation on the basis of their importance to architectural historians, the Anglo-Italianate houses on both the north and south sides of Walnut Street provide yet another reason for designation and protection. This type of rowhouse, with its high front steps with service entry below, at, or near street level is extremely rare in Philadelphia. The more common practice was 3 or 4 front steps with a first floor close to the sidewalk level and service access from a mews or alley at the rear. It may be that the use of a full height English basement on this fashionable block reflected both the need for greater separation of the major first floor rooms from increasing traffic on Walnut Street and an awareness that the high front stoop with service entry below was commonly used in New York at the time. The English basement afforded a greater degree of light and dryness to the service floor. Its use required a six foot set-back of the facade to accommodate the high entrance steps, giving the sidewalk the greater width warranted by the unified Italianate Renaissance monumentality of much of these blockfronts. Thus the buildings in the District are significant as a social document, as examples of some of the finest works of major Philadelphia architects, and as survivals of a rare building type in Philadelphia - two facing rows of Anglo-Italianate houses. Today the District continues to convey a discreet sense of time and place because it is bounded by emphatic physical barriers which consist of either high-rise buildings, i.e., the Embassy Apartments and 2101 Walnut to the west and the Chatham Apartments to the east, or open space, i.e., the parking lot at the southeast corner of 21st and, Walnut (being held for future high-rise development) which is as effective a spatial definition as high-rise buildings. The southern boundary of the District is dominated by the high-rise apartment building, 2031 Locust Street, and the 2000 block of St. James Street, a service alley on which no buildings front. Finally, the northern boundary of the District is the 2000 block of Moravian Street, also a service alley. Deed research indicates that the few structures fronting on this street were erected in the very late 19th century and are not integral to the District. To its north, the 2000 block of Sansom St. forms an almost continuous retail/commercial street of 2 and 3-story structures of minor historical or architectural significance. Thus the District boundaries are formed by abrupt shifts in scale of buildings, period of construction of the high-rises, lots held for future development, or changes in land use. The internal cohesion of the District is conveyed by: similarities of scale in the nearly uniform height and the remarkably similar cornice line of the Walnut Street blockfronts; the similar uses of sandstone, brownstone and brick (except where certain alterations have occurred); the similar arrangements of dominant window openings at the first floor level with successively smaller openings up to dormer or attic windows; and the similar enframement of door and window openings by sills, pediments, flanking pilasters, etc. All these characteristics contribute to the visual cohesiveness of the District, yet provide a varied and rich streetscape. The Walnut-Chancellor District contains the largest single group of 19th century residential structures to survive on Walnut Street, which was lined until World War I with 19th century houses from Broad Street almost to the Schuylkill River. School District: Philadelphia
<urn:uuid:58d4dc5f-dea2-4738-9d8d-8a65921f5cae>
CC-MAIN-2017-04
http://www.livingplaces.com/PA/Philadelphia_County/Philadelphia_City/Walnut-Chancellor_Historic_District.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00573-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965542
2,246
2.890625
3
I am currently doing a self-study of Bridge course chapter 3 from Cisco. In this chapter, they explain how WLANs work. I have a question about this part: Does this mean that a 11mbits network is actually 5.5 mbits? And a 54 mbits actually 27 mbits? Thanks. No, I can't ask my teacher, it's 9 pm here and I am taking the test tonight.
<urn:uuid:5a5ab4ef-8903-45bd-be7d-08c6492929b7>
CC-MAIN-2016-44
http://www.osnn.net/threads/wlan-question.37431/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00301-ip-10-171-6-4.ec2.internal.warc.gz
en
0.969667
87
2.296875
2
The linear slope of the stress-strain diagram describes the Young’s Modulus of a material. This reflect the proportional relationship between stress and strain that can be seen by the deformation of a solid body with linear-elastic behavior. The Young’s Modulus is dependent of the direction and varies therefore especially if anisotropic behavior in a material can be found. This is also true for cristalline materials. The higher the Young’s Modulus the more the material resiststhe elastic deformation. Plastics have a rather small Young’s Modulus compared to steel. In addition to that the modulus depends on temperature as well. Exmaples at 20 °C: ABS: 1,9 – 2,6 GPa PA6: 3,0 – 3,5 GPa PC: 2,2 – 2,4 GPa PP: 1,3 – 1,8 GPa HDPE: 0,5 – 1,2 GPa
<urn:uuid:7060ad0b-5ca6-471d-83f2-6a6ba6c4afcc>
CC-MAIN-2022-33
https://www.plexpert.ca/glossary/youngs-modulus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00073.warc.gz
en
0.81446
220
3.0625
3
ProVeg International supported a large-scale study into the effects of different types of canine nutrition. Findings show that nutritionally complete vegan diets are the healthiest option and expose dogs to the least food-related hazards. Research was conducted by a team of scientists across the U.K. and Australia. The project was the largest of its kind to date. More than 2,500 dogs were assessed in the study. Three forms of nutrition were compared: vegan, conventional processed meat, and raw meat dog diets. Results were published in the peer-reviewed science journal PLOS. the conclusion was that a properly balanced vegan diet offers the most health benefits to dogs. Getting to the bottom of an age-old myth For years, pet lovers have been fed the idea that dogs need meat and are carnivores. In reality, they are omnivores and can thrive on plant-based nutrition. “Research on this scale about dogs is the first to be published and clearly demonstrates that the healthiest and least hazardous diets for dogs are nutritionally sound vegan diets,” Professor Andrew Knight, research team leader, said in a statement. “The pooled evidence conclusively dispels the myth that feeding dogs vegan food somehow compromises their welfare.” 2,536 dog guardians provided data about their companions’ eating habits. 54 percent were fed a conventional processed meat diet, 33 percent were given raw meat meals, and 13 percent were vegan. All dogs followed the same diet for at least a year. Metrics for assessing health included the number of vet visits, any medication use, guardian opinion, and more. Overall, dogs fed raw meat were identified as being marginally healthier than all others, but this demographic was also younger, meaning they were less likely to be ill in general. Looking at specific health issues, the vegan diet-fed dogs were shown to be significantly less likely to fall prey to common disorders, with 36 percent suffering from something, compared to 49 percent of processed meat-fed dogs. “Accordingly, the pooled evidence to date indicates that the healthiest and least hazardous dietary choices for dogs are nutritionally sound vegan diets,” the study states. The same research team has previously looked at the likelihood of acceptance of plant-based diets in dogs and the nutritional soundness. Findings concluded that dogs enjoyed vegan diets as much as meat-based ones. It was also revealed that plant-based diets can offer a balanced source of nutrition. The vegan dog food industry rejoices The number of plant-based dog food companies is increasing exponentially. New research supporting their formulations will add further fuel to the industry and make it an even more attractive option for investors in the future. Vet-backed U.K. vegan dog food brand Omni has welcomed the study findings. In particular, it celebrated the use of surveys for data, instead of laboratory conditions. “Survey based studies have their merits over kennel/lab orientated ones as they can better represent the natural living environment of dogs,” Dr Guy Sandelowsky, co-founder of Omni and veterinarian said in a statement. The company has announced plans to support the recent findings with controlled lcinical trials of its own, to add extra weight to the conclusions. Elsewhere, fellow U.K. brands Hownd and The Pack have both released statements welcoming the latest findings and confirming that they have been founded on scientific research to the same effect. The Pack and Omni both reiterated that vets do not recommend raw meat feeding, due to the increased risk of contamination. Lead photo by Goochie Poochie at Pexels.
<urn:uuid:043c7cb6-36c7-4897-a531-0956bab4fc62>
CC-MAIN-2022-33
https://www.greenqueen.com.hk/amp/vegan-diets-dogs-study/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00668.warc.gz
en
0.972249
746
3
3
Pennsylvania Twin Registry (PAtwins) Pennsylvania Longitudinal Study of Parents and Children and Pennsylvania Twin Registry Multiple-birth families are an important resource for researchers interested in investigating how social and genetic influences work together to influence health-related behaviors. The Pennsylvania Longitudinal Study of Parents and Children (PALSPAC) study examine the lives of twins and their families. All the information in the study is confidential. Many families find that participating in research is interesting, gives insight into their children's development, and provides an opportunity to contribute to what we know about social and health behaviors. PALSPAC is approved by the Penn State University Institutional Review Board and provides financial compensation to participants. Interested in Participating? If you are interested in registering your family to take part in the PALSPAC study, please visit the Consent and Enrollment page. The Consent and Enrollment link will take you to the forms that further describe the study and allow you to enroll. When joining the PALSPAC study you will also have to option to indicate that you are OK being contacted to potentially take part in other research projects (all of which will be approved by a university Institutional Review Board). Questions about the PALSPAC study as well as the PATwins Registry generally should be directed to PAtwins@psu.edu. General questions about research at Penn State should be directed to the Office of the Vice President for Research.
<urn:uuid:a6b13228-7954-4fad-98e2-88120d3991c0>
CC-MAIN-2017-04
http://hhd.psu.edu/hdfs/labs/PAtwins
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00223-ip-10-171-10-70.ec2.internal.warc.gz
en
0.942028
297
1.648438
2
SheepNet exchanges tools to disseminate Body Condition Score and discusses benefits from Precision Livestock Farming SheepNet recently held its fourth Transnational Workshop in Alghero. Alghero is a town in the north-west of Sardinia where there is an important sheep farming industry focusing on the production of cheese. The workshop was attended by over 80 participants representing stakeholders from the 7 SheepNet countries and from Hungary, Israel, Brazil and Finland. The meeting had a full program and focused on sharing and evaluating tools used in different countries to disseminate the Body Condition Scoring (BCS) ewes. The meeting also focused on the uptake of Precision Livestock Farming (PLF) and its potential benefits to the sheep sector. On the first day the delegates visited two dairy sheep farms. The Michele Piras’ farm is medium sized with 420 Sarda ewes averaging 350 kg milk per lactation. The farmer also sold pedigree ewes and rams which formed an important portion of his income. The farm consisted of 90 ha: 20 woodland and 70 arable. The diet was based on grazing plus a unified or total mixed ration. Mean consumption per ewe annually is 400 kg maize silage, 150 kg ryegrass hay, 150 kg commercial concentrate and 125 kg cereals grain. Ruminal EID boluses and stick readers were used to identify animals for annual inventory and selection purposes (pedigree and monthly milk recording). Body condition score was undertaken by the farmer without any support of digital tools to collect and store data. The second farm visited was Gianfranco Mangatia’s farm. This is a large farm consisting of 1,020 ewes, averaging 374 kg milk per lactation. The whole farm totalled 472 ha which included a tillage enterprise producing grass based forage crops, legume based forage crops, hay, haylage, barley and fava beans. The flock diet was based on grazing plus a unified or total mixed ration. Mean consumption per ewe annually is 230 kg of a mixture of barley, field beans, soya bean meal and beetroot pulp plus 330 kg of a mixture of grass hay, legumes hay and haylage. This farm used PLF for farmer management decisions. Ruminal EID boluses were used to record individual ewes for daily milk yield using a panel reader in the milking parlour. Pregnancy scanning and BCS data for individual ewes were recorded and stored through a stick reader linked to a smartphone with software for storing individual data and then producing the whole flock statistics. Both farms showed good results in terms of efficiency. The comparison of the two farms animated the discussion between delegations during the workshop. The workshop started with the presentation of the Italian sheep sector. In Italy, the sheep dairy sector is more important than the sheep meat sector. Sardinia contains approximately forty-five percent of the Italian sheep flock (around three millions ewes) and produces sixty-five percent of the Italian sheep milk production: around 300 million kg of milk processed into 50,000 tons of cheese. The most important product is the PDO Pecorino Romano cheese of which the majority is exported to the US. The tools used in the participating countries to disseminate the BCS practice were presented. The delegations had the opportunity to appraise the different approaches and to propose new tools and systems to improve the transfer of knowledge in relation to BCS. The main conclusions were that dissemination efficiency may be improved by using either computer simulations to illustrate the innovative techniques or social networks to share updates and data, as well as specific training programs at school/college level. The main tools for PLF and its applications for management were presented and demonstrated under the following headings: monitoring & flock management; health management & shed environment; nutrition, automatic feeders & feeding needs; reproduction, lambing & artificial insemination; pasture management, grazing, hill grazing; milking & milk. Each participant had the opportunity to visit three of these presentations and score the most interesting tools/applications. The three which achieved the highest scores were the EID weigh crate with auto drafter, walk over weighing scales and the GPS collars. These tools will be presented during the final SheepNet seminar in France next September. The workshop continued with an interesting debate between the participants and a panel of four farmers from France, Italy Turkey and UK, who routinely rely on EID to manage their farms. The main conclusion was that PLF generally increases efficiency and profitability of sheep farms but its implementation must be accurately modulated according to the farm size. The cost of PLF was a limiting factor with many farmers stating it would not be a viable purchase without grant aid support. A practical course on lambing was undertaken at the Faculty of Veterinary Medicine of Sassari which included practical demonstrations of lambing rope placement; stomach tubing lambs; injecting glucose into hypothermic lambs; colostrum assessment and storage, lamb post mortem examination…etc. Videos showing the contents of the course will be available soon on the SheepNet website. At the AGRIS centre of Bonassai, the SheepNet national network facilitators had an interesting debate with Italian stakeholders on the main issues and opportunities of the sheep sector in Europe. The main questions were on which policies may be implemented to increase the profitability of sheep farming and to maintain this economic activity in less favoured areas. SheepNet will hold its next transnational workshop in Ireland next June. SheepNet will hold its final seminar in France at the beginning of September 2019. SheepNet is open to all EU countries, stakeholders, sheep producers
<urn:uuid:7e768757-32d9-4291-bc1a-978c76292493>
CC-MAIN-2022-33
https://eurosheep.network/sheepnet_communicati/press-release-9-sheepnet-exchanges-tools-to-disseminate-body-condition-score-and-discusses-benefits-from-precision-livestock-farming/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00071.warc.gz
en
0.956034
1,165
2.078125
2
Franklin's Flying Bookshop Franklin’s Flying Bookshop is an easygoing narrative about sharing the love of reading with friends. This light-hearted tale offers a novel, fantastical take on the idea of the bookmobile. Most of the dragons in fiction books are tough, fire-breathing, people-scaring, and powerful nemeses. Which is why Franklin, our protagonist dragon, is typically reading to bats, mice, and fireflies inside his cozy cave on the outskirts of town. Franklin is a reader through and through with stories and books covering his home and floating around his mind, but he struggles to find a more interactive companion than bats and mice. Each time he approaches human civilization, people hide, become startled, run for their lives, or otherwise avoid interaction. When he encounters a young lady, Luna, something sparks between them and things begin to change. They talk books, and books, and books. While trading their favorite stories and characters, Franklin and Luna find they have a common goal. Both dream of taking books out into the world for others to enjoy. They brainstorm and enact a plan to do so. With a bookshelf, sofas, firefly lanterns, and snacks securely tied to Franklin’s back, the pair flies into town to meet and great the townsfolk. Luna serves as a people ambassador of sorts to calm the fears of Franklin’s presence and explain why they have come; however, she is more confrontational then necessary. She makes a stern declaration almost daring people to mess with the dragon. There is some confusion as to what their intentions are. It takes acrobatic bats, singing mice, and cake before a few intimidated customers climb up onto Franklin and settle in on the sofas. Franklin goes a step further and even offers to fly these brave souls closer to the bright reading light of the glowing moon. The End. Book lover outcast meets book lover innocence. The two team up. There is not much else going on; this is a pretty straight forward, gentle story. Some random story choices pop up which at first seem important, but then fail to manifest into anything further. “Luna and Franklin feel like they are made out of stories.” Is one such statement, intriguing, but not pursued. Another occurs when the two friends are landing in the town. The text says that Luna shouts at the townspeople with “a fierce look in her eyes.” Why is she so defensive and angry at the frightened crowd? Why is it necessary to create a standoff between her and Franklin versus the people? The dynamic seems a misplaced fabrication, and is then dropped. The illustrations, while entertaining, simply follow along with the flow of the story. Harnett uses the same styles, colors, layouts, designs as she employed in Ivy and the Lonely Raincloud, even Luna is a red-headed, white-skinned version of Ivy. The illustrations are certainly sweet, but there is nothing else in them that contributes to the plot or the characters that isn’t already told in the text. In the end, though, the love for books remains crystal clear and front and center. Luna and Franklin do indeed care about sharing stories with their community. A little magical fantasy goes a long way in achieving that purpose.
<urn:uuid:91ecd49a-b499-477b-9563-b024a6d2b659>
CC-MAIN-2022-33
https://www.nyjournalofbooks.com/book-review/franklins-flying-bookshop
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00067.warc.gz
en
0.959264
686
2.140625
2
It hasn't been a good summer for the St. Johns River. Massive fish kills. As bad as it's been, the year 2012 could very well herald even worse times for the health of the St. Johns. By the fall of that year, the Georgia-Pacific paper mill in Palatka wants to have completed a pipeline that would carry the mill's pollution into the heart of the river. As a reminder, the pipeline would run four miles and would put 23 million gallons of polluted effluent into the river daily. Since 1947, the mill has dumped its polluted waste into Rice Creek, a tributary of the St. Johns. The company maintains that despite spending $200 million in the last decade to make environmental improvements at the mill, it still can't meet water quality standards in Rice Creek. Its solution is to move the pollution to the St. Johns. For many long-time residents, Rice Creek stirs memories of a stench that burned eyes and made them gag. But after the improvements made at the mill, this is how Georgia-Pacific describes Rice Creek today on its website: "Rice Creek has a thriving fish community comprised of small fish, gambusia (mosquitofish), minnows, catfish (white, yellow and bullheads), gar, bowfin, shad and sportsfish such as sunfish, crappie and largemouth bass ... "A rich and varied range of vegetation is encountered along the banks of Rice Creek ... "Rice Creek residents include the great blue heron and the American egret. Wood ducks, gallinule, swallow-tailed kites and hawks also can be found." Question: If Rice Creek is doing so swimmingly well, why not leave the mill's effluent there rather than gambling with the health of the St. Johns? Georgia-Pacific deserves credit for the improvements it has made, but if close to $40 million is spent on building the pipeline, that will be the mill's permanent answer to its pollution problem. That answer follows the ridiculous notion that the solution to pollution is dilution. The real answer to pollution is not to pollute in the first place. Technological advances in the past decade have allowed Georgia-Pacific to make improvements. More are likely around the corner. If what Georgia-Pacific says about the condition of Rice Creek today is true, it would make more sense to spend the money looking for those advances instead of building a pipeline that would add even more nutrients to the nutrient-saturated St. Johns. During a meeting last week of the city's Environmental Protection Board, in which Georgia-Pacific presented its case, Riverkeeper Neil Armingeon pointed out that the paper mill is second only to JEA in the amount of nutrients discharged into this part of the river. Of the fish kills and algal blooms, Armingeon said, "I'm not saying Georgia-Pacific is the cause. "It's one of the causes." We all are, and all of us, including Georgia-Pacific, need to do more to protect the St. Johns. email@example.com, (904) 359-4284
<urn:uuid:9daafa7d-d5f4-4b9a-8e1c-2b72d60fa14d>
CC-MAIN-2017-04
http://jacksonville.com/opinion/blog/401026/ron-littlepage/2010-08-17/fight-pollution-rice-creek-protect-st-johns-river-too
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00221-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952167
668
2.640625
3
What do they have in common? Their colleagues publicly treated both of them as members in good standing of their respective professional communities, until they did things that embarrassed those communities. In each case it was the embarrassment, not the bad behavior, that was the problem. Thomas was widely known as a left-wing crank who abused the deference she was shown at press conferences to engage in rude harangues of officials under the guise of asking questions. The inappropriateness of her behavior was obvious not only to her fellow journalists but to anyone who watched her performances on television. Conservative media commentators and bloggers complained about her for years. Yet her behavior was not an issue in her professional and political circles until she publicly made anti-Jewish comments that merely echoed what she had said for years in private in the presence of other journalists. Blagojevich, the disgraced ex-governor of Illinois, was a corrupt hack. Everyone in Illinois knew it. Yet he was a member in good standing of the Democratic establishment until he got caught on tape in the act of attempting to sell a Senate seat. Like Thomas, he became an instant pariah. Also like Thomas, he became a pariah not because of his corruption but because he was clumsy or cocky enough to let himself be caught. The petty sagas of these two people reveal more about the values and integrity of our media and political establishments than they do about Thomas or Blagojevich as individuals.
<urn:uuid:29085d6d-7c73-423c-8b87-62e53ba5a6a7>
CC-MAIN-2022-33
https://chicagoboyz.net/archives/13500.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00268.warc.gz
en
0.989473
299
1.5625
2
Today I’ve reviewed the seventeenth story in my series on the science fictional media landscape of the future. John Brunner explores how total immersion media, one organ in a vast futuristic fair designed to satiate the masses, can transform fear within the broken. Previously: John D. MacDonald’s “Spectator Sport” in Thrilling Wonder Stories, ed. Sam Merwin, Jr. (February 1950). You can read it online here. Up Next: TBD 4.5/5 (Very Good) John Brunner’s “Fair” first appeared in New Worlds Science Fiction, ed. John Carnell (March 1956) under the pseudonym Keith Woodcott. You can read it online here. It also appeared in his first collection No Future In It (1962). I recently devoured Jad Smith’s short monograph John Brunner(2012) in the Modern Masters of Science Fiction series for Illinois University Press. Not only did the book rekindle my desire to tackle more of Brunner’s short fiction but I also bought copies of The Squares of the City (1965) and Quicksand (1967). I might even reread The Shockwave Rider (1975) in the near future. If you are at all interested in John Brunner’s science fiction I recommend acquiring a copy. Smith identifies “Fair” (1956) as Brunner’s “finest achievement during this [early] period” (Smith 28). I’d rank it right under his spectacular generation ship short story “Lungfish” (1957). As with many of Brunner’s best works, “Fair” had a contested publication history–in this instance John Carnell only accepted it under the pseudonym “Keith Woodcott” to “fill out an issue” (Smith 29). The identity of the consummate wordsmith didn’t last long as Carnell accidentally revealed his identity in next issue when the story came in second in the reader’s poll! Preliminary note: This is a review of the original 1952 novella. You can read it online here. Philip José Farmer published a novelization in 1961. While the novel was frequently republished, the original novella was not anthologized until 2003 (bibliography). I am in half a mind to read the 1961 version and analyze the changes! This is a review that I wish I didn’t have to provide a rating as my lukewarm response to the story might obfuscate my fascination with its thematic contents and larger historical context. Philip José Farmer’s novella “The Lovers” (1952) is, without doubt, historically important for the development of the SF genre as it introduced a transgressive mix of sex (mostly implied), unusual xenobiology, and colonial critique. It shocked and fascinated readers at the time. In a letter published in the September issue of Startling Stories, Farmer himself predicted the “Reverberations from THE LOVERS should be really bouncing” later in the year (136). And he was right! Which books/covers/authors intrigue you? Which have you read? Disliked? Enjoyed? 1. The Lovers, Philip José Farmer (1961) From the back cover: “In 1952, Philip José Farmer excited instant acclaim in the science fiction field with the publication of a short story, THE LOVERS. In 1961, he wrote and published the full-length novel based on that short story. And in 1972, Ballantine Books is proud to bring this classic work back into print. Mr. Farmer, who is known for his explorations into the psychological byways of odd relationships, here postulates a love affair which might well have surprised even Haverlock Ellis. but words such as ‘normal’ or ‘abnormal’ simply have no application in the original concepts to which Mr. Farmer’s imagination gives rise. The book remains unique and fascinating.” In the past year or so I’ve put together an informal series on the first three published short fictions by female authors who are new(ish) to me and/or whose most famous SF novels fall mostly outside the post-WWII to mid-1980s focus of my reading adventures. So far I’ve featured Carol Emshwiller (1921-2019), Nancy Kress (1948-), Melisa Michaels (1946-2019), Lee Killough (1942-), and Eleanor Arnason (1942). I do not expect transformative or brilliant things from first stories. Rather, it’s a way to get a sense of subject matter and concerns that first motivated authors to put pen to paper. Today I’ve selected Josephine Saxton (1935-), an author whom I’ve long known about–I reviewed The Hieros Gamos of Sam and An Smith (1969) back in 2012–but never read any more of her work. Due to Rich Horton’s review of Saxton’s Vector for Seven (1970), my interest in an important voice of the English New Wave movement suddenly rekindled. Her 60s and 70s stories appeared in many of the influential New Wave (and adjacent) anthologies–including Judith Merril’s England Swings SF (1969), Harlan Ellison’s Again, Dangerous Visions (1972), Robert Silverberg’s New Dimensions 1 (1971), Samuel R. Delany and Marilyn Hacker’s Quark/3 (1971), and Damon Knight’s Orbit 9 (1971). In her first three stories, Saxton deploys sculpted landscapes as metaphysical traps that allegorize the internal struggles of her characters. In the language of the New Wave, inner space manifests as a nightmarish landscape that one must try to traverse. Her prose, even in her weakest tales, is measured and poetic. See SF Encyclopedia for discussion of her later fiction. Let me know which Josephine Saxton fictions–perhaps from much later in her career–resonate with you. “The Wall” first appeared Science Fantasy, ed. Kyril Bonfiglioli (November 1965). You can read it online here. It also appeared in Saxton’s collection The Power of Time (1985), which is where I read it. Which books/covers/authors intrigue you? Which have you read? Disliked? Enjoyed? 1. Courtship Rite, Donald Kingsbury (1982) From the inside flap: “Gaet, Hoemei and Joesai are three clone brothers, survivors of the rigorous and deadly process of nurture and weeding that produces people of high kalothi, people worthy of surviving on the inhospitable planet of Geta. Geta was settled many thousands of years ago by human starships, but only legends of the people’s origins remain, memories that have become myths. Stephen Goldin gathers together twelve original short stories–including six by women authors and two co-written with women–on the theme of the alien condition . Despite the “Average” overall rating, The Alien Condition gathers a fascinating range of science fiction with three spectacular visions by Vonda N. McIntyre, Kathleen Sky, and James Tiptree, Jr. I was also pleasantly surprised by Alan Dean Foster’s take on the theme considering my previous exposure to his fiction. Today I’ve reviewed the sixteenth story in my series on the science fictional media landscape of the future. John D. MacDonald tortures a time-traveler with an immersive TV experience! Thank you “Friend of the Site” John Boston for suggesting I track this one down for my media series. “Friend of the Site” Antyphayes also brought up the story in a discussion way back in 2018… Previously: Theodore Sturgeon’s “And Now the News…” in The Magazine of Fantasy and Science Fiction, ed. Anthony Boucher (December 1956). You can read it online here. Up Next: John Brunner’s “Fair” in New Worlds Science Fiction, ed. John Carnell (March 1956) (as Keith Woodcutt). You can read it online here. John D. MacDonald’s “Spectator Sport” first appeared in the February 1950 issue of Thrilling Wonder Stories, ed. Sam Merwin, Jr. You can read it online here. Note: this is a very short story and my review will contain unavoidable spoilers. John D. MacDonald (1916-1986), best known for his massive Travis McGee series (1964-1985) and the twice-adapted psychological thriller The Executioners (1957), wrote three SF novels and was a regular in SF magazines in the 40s and 50s (with a handful appearing later). SF Encyclopedia claims erroneously that none of his later “ebullient pessimism” is present in his early SF. “Spectator Sport” embodies “ebullient pessimism” by creating a future where everyone is excited about slipping into delusion. On twitter, I recently learned from Jay O’Connell (cover artist and author) that all of Roger Zelazny’s work will be back in print. What exactly “everything back in print” means in reality I’m not entirely sure–will it include only the best known novels? All the short stories? Are works Zelazny wanted to “kill off” like To Die in Italbar (1973) really going to get reprints? Regardless, I was inspired to look back at the non-English language covers his work has received over the years. Naturally, as I moved to the fantastic Italian presses, I re-encountered and fell in love (again) with Allison’s evocative take on Zelazny’s Chronicles of Amber (Corwin) five-novel sequence. I appeared in my first ever podcast–Postcards from a Dying World with David Agranoff–last week. Organized around a series of interview questions, David and I ended up discussing vintage SF for a good hour. I cover how studying history has inspired my project, reasons for my focus on SF from post-WWII to the mid-1980s, favorite authors and themes, etc. Please check out his twitter and website as well. I have gathered together a list of the SF works I mention in the interview with links to my reviews when applicable. I hate listening to myself as I am far too excited about vintage SF! (but is that a surprise?)
<urn:uuid:4c395be0-1cb9-497a-a96c-5251ad8a1fd1>
CC-MAIN-2022-33
https://sciencefictionruminations.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00271.warc.gz
en
0.937974
2,262
1.554688
2
Talbot House Offer Reward for their Lost "Robin" 29 July 2013 In December 1915 two British army chaplains - the Reverends Phillip "Tubby" Clayton and Neville Talbot - opened a soldiers' rest and recreation centre, named Talbot House, in Poperinge, Talbot House was styled as an "Every Man's Club", where all soldiers were welcome, regardless of rank, to enjoy rare moments of peace and entertainment. Nearly a century on, Talbot House needs your help. On 15 December 1921, at the now-demolished Grosvenor House in Park Lane, London, a "Round Robin", was signed by all those present, who wished the text on the document to be read aloud once again on the centenary of the opening of Talbot House (also known as Toc H). The original document , was last seen at the Toc H archives in London but now appears lost. Have you seen If you have any further information concerning the "Round Robin" that could help to retrieve the document, please don't hesitate to
<urn:uuid:2ff5a978-da8a-4c4a-8e3b-08edf7005cca>
CC-MAIN-2017-04
http://www.cwgc.org/news-events/news/2013/7/talbot-house.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00151-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955692
234
1.679688
2
Women who regularly eat fast food and not enough fruit are more likely to struggle to conceive, a study suggests. A survey of 5,598 women found those who ate fast food four or more times a week took nearly a month longer to get pregnant than those who never or rarely ate it. Regular junk food eaters were also less likely to conceive within a year, the report in Human Reproduction found. Experts said it suggested a good diet boosted the chances of conceiving. However, there were some limitations to the study, including that it relied on women having to remember what they had eaten before pregnancy. Women in Australia, New Zealand, the UK and Ireland were quizzed about what they had eaten in the month before they became pregnant with their first child. Midwives visited the women when they were about 14-16 weeks pregnant and asked them how often they ate fruit, green leafy vegetables and fish, as well as foods, such as burgers, pizza, fried chicken and chips, from fast food outlets. Researchers found the women who had eaten fruit less than one to three times a month took on average half a month longer to become pregnant than those who had eaten it three or more times a day. They also calculate that the women with the lowest intake of fruit had a 12% risk of having been unable to conceive within a year, while this was 16% for those who had eaten fast food four or more times a week. This compared with a risk of 8% in the group as a whole. Couples were excluded from the analysis if the male partner was receiving fertility treatment. Prof Claire Roberts, from the University of Adelaide, Australia, who led the study, said: "These findings show that eating a good quality diet that includes fruit and minimising fast food consumption improves fertility and reduces the time it takes to get pregnant." You may also be interested in: However, while researchers found an association between the consumption of fruit and fast foods and the time it took to get pregnant, perhaps surprisingly their study found no link with eating green leafy vegetables and fish. Although the study was large, it incorporated only a limited range of foods. Information on the fathers' diets was not collected, and it is possible that other unknown factors might have affected the results, researchers said. But experts said it still added to evidence that women's diet before pregnancy had an impact on their chances of conceiving. Dr Gino Pecoraro, a senior Lecturer at the University of Queensland, who was not involved in the research, said: "Generally, the study does support what most health professionals would intuitively believe – having a healthy diet is good for couples trying to conceive."
<urn:uuid:380d284d-9d01-4ed6-aeda-3e8ed72d4b54>
CC-MAIN-2022-33
https://dailycambridge.co.uk/2018/05/05/regular-fast-food-eating-linked-to-fertility-issues-in-women-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00066.warc.gz
en
0.990369
556
2.609375
3
Monkeypox is breaking out in Europe, and it appears it might break out here. Officials report a case in Massachusetts, the first first case of the pox in the country this year: [T]he patient is an adult male who recently traveled to Canada. The department completed initial testing Tuesday and was confirmed by the Centers for Disease Control and Prevention. “The case poses no risk to the public, and the individual is hospitalized and in good condition,” MDPH stated in a press release. “DPH is working closely with the CDC, relevant local boards of health, and the patient’s health care providers to identify individuals who may have been in contact with the patient while he was infectious.” [1st monkeypox case in US this year reported in Massachusetts, by Mary Kekatos, ABC News, May 18, 2022] Seven cases have been diagnosed in England. Seven cases in UK could be tip of iceberg— English Flowers (@FlowersEnglish) May 18, 2022 First time ever spreading in community and appears to be transmitting via sex Can kill one in 10 but milder strain is transmitting in UK, which kills one in 100. DOVER INVASIONhttps://t.co/0TaIcNzRUq via @MailOnline “Four more cases of monkeypox have been identified in the UK, bringing the total number of confirmed cases of the disease to seven,” The Guardian reported two days ago: Three of the cases were detected in London, and one in the north-east of England. … The cases do not, however, seem to be connected to the previous confirmed cases of monkeypox in the UK announced on 14 May, nor the first UK case announced on 7 May, which has led to concerns that there has been community transmission of the virus. The first case was a person who had recently travelled to Nigeria, which is where they are believed to have contracted the infection before travelling to the UK. UKHSA added that all four of the most recent cases are men who identify as gay or bisexual. [Four new cases of monkeypox identified in the UK, bringing total to seven, PA Media, May 16, 2022] Officials report eight cases in Spain and five in Portugal: Portugal is reporting 5 monkeypox cases and 20 suspected cases.— Dr Alexandra Phelan (@alexandraphelan) May 18, 2022 All cases are young men, healthy and stable, presenting with lesions. With outbreaks in UK and Portugal, Europe needs to enhance surveillance, with non-stigmatizing public health comms.https://t.co/WMViIeu1vx Two cases were found in the United States last year, and 46 in 2003 among imported mammals, the Centers for Disease Control’s Monkeypox page says. Someone traveling to Africa and back might contract the pathogen. Or maybe, just maybe, the African “migrants” who are browning Europe have inoculated the West with this virus. Meanwhile, border agents handled almost 250,000 “migrants” who jumped the border with Mexico, and Let’s Go Brandon released more than 117,000. Just keep repeating, “diversity is our strength” ... even if it kills us!
<urn:uuid:6c71b0b4-bb84-447f-b1aa-4f1523b476cf>
CC-MAIN-2022-33
https://vdare.net/posts/monkeypox-outbreak-hits-europe-case-found-in-massachusetts-diversity-is-our-strength
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00277.warc.gz
en
0.954977
689
1.882813
2
Individual wrote:These views seem to simplify Buddhist history as an interaction between the two sects of Theravada and Mahayana, but it seems likely to me to have been more complicated than that. The past importance (that is, the relevance or coherence to early Buddhism) of views held by now dead sects cannot be underestimated. Some sects now dead may have actually held views closer to early Buddhism than any living Buddhist sect today. Conversely, all living Buddhist sects today may hold views not held by early Buddhists. It seems at least historically significant that Pudgalavada (the idea of personhood, with personhood being notself) was a mainstream view at one point, What I mean is, that's a very big change to happen -- it's impossible to suggest that Theravada is early Buddhism unchanged. Mahayana, for instance, may have had more than one origin -- perhaps some early Mahayanists were in fact forest monks one theory of their origin, not necessarily being known as Mahayana at that time and possibly composed of various "schools" (among the early 18) and Theravadins or whatever they may have been called at that time, or whatever number, name, or sectarian division they might have been, may have been composed of scholastic monks. It seems reasonable to me that the context in which the dhamma was practiced -- the division between monks focusing on memorizing, maintaining, and teaching scripture vs. monks focusing on solitary meditation could lead to a division and social bigotry, by which you have one side of over-analytic dogmatists, while on the other side, you have blathering pseudo-nihilistic poets (see the list of the ten defilements of insight in the Theravadin commentaries and the 10 bhumis of Mahayana for examples of both). clw_uk wrote:However i want to get as close as i can to the earliest teachings and since Theravada and the Pali canon is the oldest i follow that clw_uk wrote:Mahayana is a complicated issue, no real set explanation on how it came to be from what i have read. I did read however that it seems to have been an attempt to go back to the forest instead of the towns (although later this changed) tiltbillings wrote:Actually, there is no point in commenting on following paragraphs other than to ask where are getting this stuff? There are very good histories out there you might care to study. Craig - However i want to get as close as i can to the earliest teachings and since Theravada and the Pali canon is the oldest i follow that Indiv. No, the Nikayas of the Pali canon (which are the Agamas of the Mahayana canon) and some Mahayana sutras are the earliest. Mahayana is a complicated issue, no real set explanation on how it came to be from what i have read. I did read however that it seems to have been an attempt to go back to the forest instead of the towns (although later this changed) Indiv. But then what about the Rhinoceros Sutra -- a very early Buddhist text which advocates the solitary ascetic lifestyle? I thought that this was an ideal of Theravadins, like the Thai Forest tradition, and only Zen Buddhists and some Tibetans hold this same view? Users browsing this forum: Google [Bot], Javi and 34 guests
<urn:uuid:b862263a-768f-431a-aa68-16ddce10bf53>
CC-MAIN-2017-04
http://www.dhammawheel.com/viewtopic.php?f=16&t=1884
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978967
723
2.65625
3
Thinking about following YouTube instructional videos on your drive? As videos of data recovery techniques in America has skyrocketed in the last few years, it may seem like a logical thing to try. One of the most common phrases that we hear is “I’m in I.T. and I’ve opened the drive.” Watching some videos on YouTube about data recovery may even provide a better insight on that individuals techniques, good or bad, but be warned, without a proper understanding of how a drive accesses data and functions, you may be in for an irrevocable disaster. Most of the videos found and highly ranked are from companies or individuals just starting out in the industry that are taking advantage of their large fanbase and seeking to increase their revenue from popularity through the general public. While it may seem cool or even exciting to give it a try on your own, it’s very important to first understand why a hard drive has failed in order to proceed with any feasible data recovery attempt. Once we can diagnose the initial problem correctly without causing further damage, you may then make an educated decision on attempting this task yourself without professional tools and experience, or letting the engineer proceed with the attempt. Most cases from a drop or bang result with the drive clicking or beeping, which almost always indicates head damage and requires a cleanroom, designated tools and much needed experience. Based on a common three level data recovery model, three being the most advanced, these cases are considered level three. A less severe case could consist of bad sectors or media damage which would be considered a level two recovery but still requiring experience and professional equipment to target the user data without reading unnecessary sectors and causing more strain on the drive which could lead to a potential head crash. The high ratings of some of the videos found on YouTube do not necessarily indicate that the technique is good or even safe. The people rating these videos are mostly spectators, and to the untrained eye it may be hard to differentiate. A good rule of thumb to follow when considering attempting data recovery on a damaged drive would be, Is the data important? If it is, just stop and call a professional service after researching online. One mistake could render a drive unrecoverable by anyone. A computer technician is not the same as a data recovery engineer. Most of us in professional data recovery started out in I.T., including myself, but there is a right way and a wrong way to transition into the position. Learning from YouTube videos and reading information on forums may provide some insight, but by no means is this proper training for the title. Many companies, even “data recovery companies”, have underqualified and trained personnel working on client hard drives. Many times these cases are passed off as unrecoverable with vague answers as to why, or outsourced to a third party for a final, less likely attempt. In conclusion, if this is something that you are truly interested in learning, practice away. Just don’t do it on a drive with important data. Anyway that you look at it, it will be costly. Parts and equipment required to do the job are not cheap. My recommendation would be to start out in logical data recovery, which is considered level one data recovery to most companies and does not require the costly equipment, rather some good paid software programs such as UFS, or R-Studio, time, and a basic understanding of HEX. Anything further will require more of a substantial personal investment. DATA is not just random documents and images, but the fuel that runs a company and the memories that tend to fade over time… Don Anderson had an interest in I.T. back when he was a teen reading PC World magazines in the early 90's, until he was finally old enough to work as a computer repair tech. Graduating from college he worked many contract positions throughout his twenties including IBM, SAP and Dell. He now has control of several companies and is a renowned expert in the field of Data Recovery and Digital Forensics with expert witness experience. Not to mention an animal lover.
<urn:uuid:5ebccd0d-175b-4d1d-aed0-c0d830ae18cf>
CC-MAIN-2022-33
https://tristatedata.com/thinking-about-diy-data-recovery-following-youtube-instructional-videos/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00270.warc.gz
en
0.965374
829
1.726563
2
This morning Washington, D.C. woke up to joyful news. For the first time in seven years, there is a new little cub hanging out with her mother, the Giant Panda Mei Xiang. Visitors flocked to the Zoo when baby Tai Shan was born. Because of an agreement with Chinese officials, all giant pandas born at the Zoo have to be returned for breeding. The Smithsonian wished Tai Shan a heartfelt farewell with a charming video. The Zoo reports the new cub was born at 10:46 p.m., Sunday, September 16. “Mei Xiang is behaving exactly the same way she did when Tai Shan was born,” says chief veterinarian Suzan Murray. “She is cradling her cub closely, and she looks so tired, but every time she tries to lay down, the cub squawks and she sits right up and cradles the cub more closely. She is the poster child for a perfect panda mom.” For now, the staff will have to monitor the giant panda from afar, giving the mother time to bond with the cub. One of the caretakers, Juan Rodriguez says the team is now surveying the pair 24-7; “We’re rotating amongst the keepers, overnight shifts.” The cub was first discovered when one of Rodriguez’ colleagues just happened to turn on the panda cam at home and noticed some funny noises, indicating Mei Xiang might have some company. “They’re very vocal when they’re young,” explains Rodriguez. The team has largely been observing the pair of pandas through audio cues. “We really havent gotten the chance to get a good visual yet, just a few glimpses here and there, but we have been hearing the baby.” According to Chinese tradition, says Rodriguez, the cub won’t be named until 100 days after the birth, just in time for holiday season. Name suggestions have already come rolling into Smithsonian magazine’s twitter feed, including Shu Yun, which means gentle cloud and Country Crock, a riff on older brother Tai Shan’s nickname Butterstick. Like Tai Shan, the new cub will eventually have to go to China for further breeding. Though that transfer usually occurs when the panda is around two years old and would be independent in the wild, Tai Shan was granted a two-year extension. After seven years and five failed pregnancies, the giant panda population (only around 1,600 in the wild) can claim another victory. “Everyone’s very, very excited,” says Rodriguez. “Just statistically, the numbers were very, very low, so this is a very pleasant surprise. We’re ready to take on the responsibility now.” Rodriguez explains, “The first month is one of the most crucial in terms of the survival of the cub,” but, he says, the team has no reason to worry. “She’s a very good mom.” Rodriguez says the entire effort has been immense. “It’s a lot of work from different departments working together to help an endagnered species, the fact that you have the rebirth team, the veterinary staff, the animal care staff and even the public relations staff, it’s just so intricate and everyone is working together as a team and that team effort is what brought about the whole process.” “Now we’re just very eager to see this cub develop and partake in the betterment of the species,” says Rodriguez. For now, the public can get updates on the cub from the camera feed online. Staff expects the new baby will be on view in four to five months. Leah Binkovitz contributed reporting to this article.
<urn:uuid:77857ff9-c21d-43bd-bcd2-4b25a89abcc7>
CC-MAIN-2017-04
http://www.smithsonianmag.com/smithsonian-institution/a-panda-cub-a-panda-cub-mei-xiang-gave-birth-38893272/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00476-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954254
797
2.28125
2
Little sleep, lots of stress, daily pollution, smoking, bad dietary habits, smartphones and so on – and we wonder why our skin bursts into zits, pimples, blemishes, wrinkles or spots while looking tarnished, tired, saggy and lusterless? A glowing face skin is a healthy skin, one that can endure all these damaging factors and then some – but is it absolutely necessary to invest in dozens of cosmetic products and subject ourselves to all sorts of procedures? According to clinical nutritionists”Everything you eat becomes a part of not only your inner being, but the outer fabric of your body as well. The healthier the foods are that you consume, the better your skin will look.”The reverse is also completelytrue – our diets directly affect our skin health and beauty. A proper dietary plan is not only for weight loss or waist slimming – its effects impact our skin health and beauty, our hair health and our psychologicalstate, among others. Today we will take a look at ten nutrition tips for glowing skin and the foods we should focus on. 1. There’s something Fishy Going On And something fishy should be going on in your kitchen at least once a week. Surely you have heard about omega-3 fatty acids. These elements are not naturally produced by our bodies; therefore, we have to take them from food. While there are many varieties of fatty acids found in several types of foods, when it comes to skin glow and skin health, we are talking about fatty, healthy, delicious fish. Salmon is among the rockstars in this category, but don’t overlook mackerel, sardines, carp, herring or lake trout. Also, seafood like oysters and shrimps are excellent sources of healthy fatty acids, minerals, healthy protein and fibers. Cooking fish is not complicated, but specialists recommend grilling it, baking it in the oven, boiling it, steaming it or eating the smoked versions. As a general rule, don’t deep-fry fish, as you will add extra bad fats to your diet. 2. Avocado and Its Confusing Status While avocado is a fruit, we all know it is used more as a vegetable in salads and dressings. But it doesn’t matter how you eat it as long as you have them regularly. Avocados contain two essential vitamins for skin health and glow: E and C. These, together with the healthy fats in avocado stimulate the formation of collagen, improving your skin’s texture. Avocado keeps your skin moisturized and hydrated – essential conditions to keep it clean, supple, firm and glowing. As a powerful source of biotin, avocado also improves the health of your hair and nails. 3. Crack Some Eggs but Skip the Bacon The good old fashioned egg is a stellar source of healthy proteins. If you wonder what is the relationship between proteins and glowing skin, you should know that eggs’ proteins contain all the essential amino-acids that our bodies cannot produce on their own – and collagen is made of protein. Eggs also contain sulfur that helps with vitamin B absorption, liver function and the production of collagen and keratin, directly impacting the glow of your skin and the strength and shine of your hair and nails. - If you like eggs, you can have two a day, in the morning - Try to eat them boiled or poached – omelets and fried eggs come with extra bad fats - You can have an egg at lunch or dinner if you boil it and slice it over a delicious veggie salad. Keep in mind that you can also have a raw egg once in a while (if you can handle it) and use eggs for homemade beauty and healthy masks. As a matter of fact, if you whisk an egg white to foam and use it as a face mask, the foamy white helps you to shrink your pores. 4. Add an Extra Tomato to Your Salad Tomatoes are rich in lycopene and vitamin C and boostyour overall health. Vitamin C increases your collagen levels – alsobeneficial for your hair, nails, and connective tissue. Studies show that the regular consumption of tomatoes leads to lesser sunburns, pollution and smoke effects, fewer wrinkles and furrows or fine lines, blemishes and sagging skin. Tomatoes are also rich in vitamin A, folic acid, choline, beta-carotene, and lutein, among others. This is what you should know before incorporating tomatoes into your diet: - Eat at least one tomato a day at room temperature - Don’t refrigerate them, as they lose their nutritive elements - Mix tomatoes with olive oil in salads, as their nutritive elements combined turn the salad into a superfood (that protects you from sunburn and strengthens your heart and circulatory system). - Cooked and stewed tomatoes are even healthier than fresh ones as heat encourages the release of all the vitamins, antioxidants, and fibers. 5. A Strawberry a Day Keeps the Dermatologist Away A cup of strawberries a day, in fact, offers you 130% of the daily recommended dose of Vitamin C. Specialists can’t emphasize enough the importance of vitamin C for our skin health and strawberries are one powerful and delicious source. More strawberries mean fewer wrinkles, age spots, fine lines, and lusterless cheeks. Strawberries also contain ellagic acid – an incredible antioxidant that protects the skin’s elastic fibers – thus preventing the skin from sagging. - Eat fresh strawberries when theseason comes and frozen ones when season passes. - Mix them with low-fat yogurt for a sweet and healthy breakfast delight. - Refrain from adding sugar to your strawberries. 6. Garlic as Nature’s Best Medicine Garlic’s health benefits are so many and so diverse they can easily make the subject of a lengthy research paper. When it comes to skin health and glow, things are pretty straightforward: garlic acts as a natural antibiotic, antiseptic, anti-inflammatory, anti-fungal and so on. Garlic also influences blood circulation and acts as a pores’ minimization agent, anti-aging remedy, and antioxidant. - Never run out of fresh garlic in your kitchen and add raw, chopped cloves to salads, foods, and dressings. - Boiled or baked garlic in cooked dishes is also beneficial for your overall health, skin, hair and nails. - Burnt or deep-fried garlic should be avoided, 7. Olive Oil and the Miracle of Life One of the most essential ingredients in some of the healthiest diets (Mediterranean comes to mind), olive oil needs little to no presentation. Olive oil does not only contain some of the best fats for our health, but it is also a rich source of polyphenols–serious and appraised free radicals’ fighters. Olive oil’s antioxidant properties are legendary, and you should introduce it into your diet without having second thoughts. Dress all your salads with it and add it to whatever you cook – especially if the other ingredients are tomatoes, garlic, fish, scented herbs and spices, pasta or other vegetables. 8. Watercress or How to Deliciously Detox Your Body This world is full of information on why detoxification is the key to maintaining our health and keeping our skin clean and spotless. But before investing in detox products, give watercress a try and use it instead of the all-times boring salad. Watercress has a fresh, vaguely peppery taste and a crisp texture that you will fall in love with. Should we mention that watercress is fully packed with antioxidants that flush out the toxins in your body like a charm? Its minerals also boost your overall health and the strength and shine of your hair and nails. - Eat at least two cups of fresh watercress daily and mix it with other healthy vegetables and oils (olive, avocado, sesame). - If you want to cook it, try steaming it instead of fully boiling it. 9. Pumpkins are Not Only for Halloween Fall and early winter turn into a pumpkinfrenzy and for all the good reasons. We have pumpkin pie and pumpkin smoothies and spiced pumpkin recipes, and we should all embrace them. The bright orange color of pumpkins comes from beta-carotene – an antioxidant that converts into vitamin A-loving skin. - One cup of cooked pumpkin (baked) provides you with 763% of your vitamin A DV. - Pumpkin smoothies and pies should be made with as little sugar as possible to enjoy the full pumpkin benefits while avoiding all the refined sugar’s negative - Also eat pumpkin seeds – they regulate sebum and do wonders to those with oily skin. There are dozens of pumpkin skin benefits, so embrace this fun vegetable and make sure you keep your plate full the entire autumn season. 10. Whole Grains are more than Just Food – TheyAre a Lifestyle In comparison to processed and refined grains, whole grains make one of the most important pillars to build your health on. Rich in fibers and essential good carbohydrates, eating whole grains should become a daily habit. They are packed with antioxidants, anti-inflammatory nutrients, and B-vitamin biotin and so on. As long as you eat whole grains (sugar-free, of course), chances are your skin will turn firmer, more elastic and shinier – with the added benefit of not developing acne or age spots. - Whole grains mean: oats, barley, buckwheat, quinoa, farro, rye, millet and so on. These are just ten of the most important foods that do miracles to your skin. One thing you should always remember is that you should drink plenty of water daily, exercise, give up smoking and junk food and get as much resting sleep at night as you can. Your skin will glow in no time!
<urn:uuid:bafaa2c2-fce0-4194-909d-f55976bb75f4>
CC-MAIN-2017-04
http://www.fitnistics.com/10-essential-nutrition-tips-for-glowing-skin/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00213-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933419
2,062
2.390625
2
Home Page | Cemeteries | Battles | Descendants | Find A Soldier | Towns | Units | Site Map Sulham, Jonas G. Age: 40, credited to Hyde Park, VT Unit(s): 1st VT CAV Service: enl 8/15/62, m/i 9/26/62, Pvt, Co. I, 1st VT CAV, wdd, Aldie, 3/2/62, pow, Aldie, 3/2/63, prld, 4/7/63, pow, Reams's Station, 6/29/64, Andersonville, 4/28/65, m/o 7/3/65 See Legend for expansion of abbreviationsVITALS Birth: 05/20/1822, Danville, VT Burial: Main Street Cemetery, Hardwick, VT Marker/Plot: Not recorded Gravestone researcher/photographer: Deanna French Findagrave Memorial #: 93499208 Alias?: None noted Pension?: Yes, 9/7/1865 College?: Not Found Veterans Home?: Not Found (If there are state digraphs above, this soldier spent some time in a state or national soldiers' home in that state after the war) 2nd Great Grandfather of Grant C. Sulham, Tacoma, WA 2nd Great Grandfather of Vaughn Douglass, - 2nd Great Grandfather of Katherine Kitterlin, Bentonville, AR (Are you a descendant, but not listed? Register today) Main Street Cemetery, Hardwick, VT Check the cemetery for location/directions and other veterans who may be buried there. Jonas G. Sulham,for years a resident of Hyde Park, died at his home in West Woodbury Monday, Sept. 8, 1902. The deceased was 80 years and five months old. He was the youngest of 11 children, all of whom lived to the age of 80 years or more. Mr. Sulham was a soldier in the war of the rebellion and served the entire period of the war, coming home July 14, 1865. He received many wounds in battles, had one shoulder very nearly disabled by a minnie ball and received a cut across the scalp from a sword, besides numerous other slight injuries. He was twice married; the first time to Nancy B. McKinistry, who bore him five children of whom three survive him. His second wife was Miss Seloma Ingles and she bore him eight children, three boys and five girls. Jonas Sulham has been in poor health for the past eleven years and for the past year his death has been expected at any time. He leaves besides his children numerous relatives and friends to mourn the loss of him. The funeral took place Wednesday and the interment was in the Hardwick cemetery. Source: Hardwick Gazette, September 25, 1902. Courtesy of Tom Boudreau.
<urn:uuid:377ec33e-41e6-43a0-b24f-f5b00958a968>
CC-MAIN-2022-33
http://www.vermontcivilwar.org/get.php?input=30330
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.951671
665
1.601563
2
United Arab Emirates Air Force Receives First Pratt & Whitney-powered C-17 Aircraft The United Arab Emirates Air Force recently received its first C-17 Globemaster III, powered exclusively by four Pratt & Whitney F117 engines. The UAE Air Force is slated to receive a total of six C-17s by 2012. Pratt & Whitney is a United Technologies Corp. (NYSE:UTX) company. The UAE Air Force received its first new C-17 in a ceremony at Boeing's final assembly site in Long Beach, California in mid May. "We are proud to power the C-17s being purchased by the UAE," said Bev Deachin, vice president, military programs and customer support at Pratt & Whitney. "We are confident the UAE Air Force will benefit from the outstanding airlift capability of the C-17." The C-17 Globemaster III – the world's premier heavy airlifter – is powered by four F117 engines. With more than 8 million hours of proven military service and 45 million hours in commercial use, the F117/PW2037 has consistently proven itself as a world-class dependable engine. Pratt & Whitney's ongoing investment in product improvements has enabled the engine to continuously surpass established goals for time on wing, in-flight shut downs and support turnaround time. Pratt & Whitney has delivered more than 1,070 F117 engines worldwide. The U.S. Air Force – including active National Guard and Reserve units – has taken delivery of 210 C-17s. In addition to the UAE Air Force, other international customers include the United Kingdom's Royal Air Force, the Qatar Emiri Air Force, the Canadian Forces Air Command, the Royal Australian Air Force, and the 12-member Strategic Airlift Capability initiative of NATO and Partnership for Peace nations. Pratt & Whitney is a world leader in the design, manufacture and service of aircraft engines, space propulsion systems and industrial gas turbines. United Technologies, based in Hartford, Conn., is a diversified company providing high technology products and services to the global aerospace and building industries. Please visit www.utcaero.com for news from Pratt & Whitney and United Technologies at the Paris Air Show 2011. This press release contains forward-looking statements concerning future business opportunities. Actual results may differ materially from those projected as a result of certain risks and uncertainties, including but not limited to changes in the Globemaster III funding related to the C-17 aircraft and F117 engines, changes in government procurement priorities and practices or in the number of aircraft to be built; challenges in the design, development, production and support of technologies; as well as other risks and uncertainties, including but not limited to those detailed from time to time in United Technologies Corporation's Securities and Exchange Commission filings.
<urn:uuid:48023c88-2dab-4f97-8c17-c5d94d8f5a46>
CC-MAIN-2017-04
http://www.pw.utc.com/Press/Story/20110620-1500/2011/All%20Categories
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00330-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930783
569
1.789063
2
The DNA and RNA World: 1. Over the years after Mendel, the nature of the genetic material was investigated, resulting in the realisation that DNA is the genetic material in majority of organisms. 2. Deoxyribonucleic acid (DNA) and Ribonucleic acid (RNA) are the two types of nucleic acid found in living systems. Nucleic acids are polymers of nucleotides. 3. DNA acts as a genetic material in most organisms, whereas RNA acts as a genetic material in some viruses. 4. RNA mostly functions as messenger. RNA has other functions as adapter, structural or as a catalytic molecule. 5. Structure of Polynucleotide Chain (i) A nucleotide has three parts, i.e. a nitrogenous base, a pentose sugar (deoxyribose in DNA and ribose in RNA) and a phosphate group. (ii) Nitrogenous bases are purines, i.e. adenine, guanine and pyrimidines, i.e. cytosine, uracil and thymine. (iii) Cytosine is common for both DNA and RNA and thymine is present in DNA. Uracil is present in RNA at the place of thymine. (iv) A nitrogenous base is linked to the pentose sugar through a N-glycosidic linkage to form a nucleoside, i.e. adenosine and guanosine, etc. (v) When a phosphate group is linked to 5′ —OH of a nucleoside through phosphodiester linkage, a corresponding nucleotide is formed. (vi) Two nucleotides are linked through 3′ -> 5′ phosphodiester linkage to form a dinucleotide. (vii) Several nucleotides can be joined to form a polynucleotide chain. (viii) The backbone in a polynucleotide chain is formed due to sugar and phosphates. (ix) The nitrogenous bases linked to sugar moiety project from the backbone. (x) The base pairs are complementary to each other. 6. In case of RNA, every nucleotide residue has an additional—OH group present at 2-position in the ribose. Also, the uracil is found at the place of thymine (5-methyl uracil). 7. Discoveries Related to Structure of DNA (i) Friedrich Meischer in 1869, first identified DNA as an acidic substance present in the nucleus and named it as ‘nuclein’. (ii) James Watson and Francis Crick, proposed a very simple double helix model for the structure of DNA in 1953 based on X-ray diffraction data. (iii) Erwin Chargaff proposed that for a double-stranded DNA, the ratios between adenine and thymine and guanine and cytosine are constant and equals to one. 8. Salient Features of Double-helix Structure of DNA (i) DNA is a long polymer of deoxyribonucleotides. It is made up of two polynucleotide chains, where the backbone is constituted by sugar-phosphate and the bases project inside. (ii) The two chains have anti-parallel polarity, i.e. 5′ > 3′ for one, 3′ > 5′ for another. (iii) The bases in two strands are paired through hydrogen bond (H—bonds) forming base pairs (bp). Adenine forms two hydrogen bonds with thymine from opposite strand and vice-versa. Guanine bonds with cytosine by three H—bonds. Due to this, purine always comes opposite to a pyrimidine. This forms a uniform distance between the two strands. (iv) The two chains are coiled in a right-handed fashion. The pitch of the helix is 3.4 nm and there are roughly 10 bp in each turn. Due to this, the distance between a base pair in a helix is about 0.34 nm. (v) The plane of one base pair stacks over the other in double helix. This confers stability to the helical structure in addition to H—bonds. 9. The length of a DNA double helix is about 2.2 meters (6.6 x 109 bp x 0.34 x 10-9 m/bp) Therefore, it needs special packaging in a cell. (i) In prokaryotic cells (which do not have a defined nucleus), such as E.coli, DNA (being negatively charged) is held with some proteins (that have positive charges) in a region called as nucleoid. The DNA in nucleoid is organised in large loops held by proteins. (ii) In eukaryotes, there is a set of positively charged proteins called histones that are rich in basic amino acid residues, lysines and arginines (both positive). Histones are organised to form a unit of eight molecules called histone octamer. The negatively charged DNA is wrapped around the positively charged histone octamer to form a structure called nucleosome. (iii) A typical nucleosome contains 200 bp of DNA helix. Nucleosomes constitute the repeating unit of a structure in nucleus called chromatin (thread-like stained structure). Under electron microscope, the nucleosomes in chromatin can be seen as beads-on-string. This structure in chromatin is packaged to form chromatin fibres that further coils and condense to form chromosomes at metaphase stage. (iv) The packaging of chromatin at higher level requires additional set of proteins which are collectively called Non-Histone Chromosomal (NHC) proteins. (v) In a nucleus, some regions of chromatin are loosely packed (stains light) called euchromatin (transcriptionally active chromatin). In some regions, chromatin is densely packed (stains dark) called heterochromatin (inactive chromatin). 10. Transfonning Principle (i) Frederick Griffith (1928) carried out a series of experiments with Streptococcus pneumoniae (bacterium causing pneumonia). (ii) According to him, when the bacteria are grown on a culture plate, some produce smooth shiny colonies (S), while others produce rough (R) colonies. (iii) This is because the S-strain bacteria have a mucous (polysaccharide) coat, while R-strain does not. (iv) Mice infected with S-strain (virulent) die from pneumonia but mice infected with R-strain do not develop pneumonia. (v) Griffith killed bacteria by heating and observed that heat-killed S-strain bacteria injected into mice did not kill them. On injecting mixture of heat-killed S and live R bacteria, the mice died. He recovered living S-bacteria from dead mice. (vi) From this experiment, he concluded that the ‘R-strain bacteria’ had been transformed by the heat-killed S-strain bacteria. Some transforming principle transferred from heat-killed S-strain, had enabled the R-strain to synthesise a smooth polysaccharide coat and become virulent. This must be due to transfer of the genetic material. 11. Biochemical Nature of Transforming Principle (i) Oswald Avery, Colin MacLeod and Maclyn McCarty, worked to determine the biochemical nature of transforming principle in Griffith’s experiment. (ii) They purified biochemicals (proteins, RNA and DNA, etc) from heat-killed S-cells and discovered that DNA alone from S-bacteria caused R-bacteria to be transformed. (iii) They also discovered that protease (protein digesting enzyme) and RNAases (RNA-digesting enzymes) did not affect transformation. (iv) Digestion with DNAse did inhibit transformation, indicating that DNA caused transformation. (v) They concluded that DNA is the hereditary material. But, still all the biologists were not convinced. 12. DNA is the Genetic Material (i) Alfred Hershey and Martha Chase (1952) gave unequivocal proof that DNA is the genetic material. (ii) In their experiments, bacteriophages (viruses that infect bacteria) were used. (iii) They grew some viruses on a medium that contained radioactive phosphorus and some others on sulphur containing radioactive medium. (iv) Viruses grown in the presence of radioactive phosphorus contained radioactive DNA but not radioactive protein because DNA contains phosphorus but protein does not. In the same way, viruses grown on radioactive sulphur contained radioactive protein, but not radioactive DNA because DNA does not contain sulphur. (v) Radioactive phages were allowed to attach to E. coli bacteria. As the infection proceeded, viral coats were removed from the bacteria by agitating them in a blender. The virus particles were separated from the bacteria by spinning them in a centrifuge. (vi) Bacteria which were infected with viruses that had radioactive DNA were radioactive, indicating that DNA was the material that passed from the virus to the bacteria. (vii) Bacteria that were infected with viruses that had radioactive proteins were not radioactive. This indicated that the proteins did not enter the bacteria from viruses. It proved that DNA is a genetic material that is passed from virus to bacteria. 13. Properties of Genetic Material (i) It became establised that DNA is the genetic material from the Hershey-Chase experiment. (ii) In some viruses, RNA was also reported as genetic material, e.g. Tobacco mosaic viruses, QB bacteriophage, etc. (iii) Characteristics of a Genetic Material (a) It should be able to replicate. (b) It should be chemically and structurally stable. (c) It should provide scope for slow changes (mutation) that are required for evolution. (d) It should be able to express itself in the form of ‘Mendelian characters’. (iv) According to the above mentioned rules, both the nucleic acids (DNA and RNA) have the ability to direct duplications. Stability can be explained in DNA as the two strands being complementary if separated by heating come together in appropriate conditions. (v) The 2′ — OH group present at every nucleotide in RNA is a reactive group and makes RNA labile and easily degradable, hence it is reactive. (vi) DNA is chemically less reactive and structurally more stable when compared to RNA. Thymine also confers additional stability to DNA. So, among the two nucleic acids, the DNA is a predominant genetic material. (vii) Both RNA and DNA are able to mutate. Viruses having RNA genome and having shorter life span mutate and evolve faster. (viii) DNA is dependent on RNA for protein synthesis, while RNA can directly code for it. The protein synthesising machinery has evolved around RNA. This concluded that the DNA being more stable is suitable for storage of genetic information, while for the transmission of genetic information, RNA is suitable. 14. Francis Crick proposed the central dogma in molecular biology, which states that the genetic information flows from 15. Replication Scheme for replication of DNA termed as semiconservative DNA replication was proposed by Watson and Crick (1953). According to it, (i) The two strands would separate and act as a template for the synthesis of new complementary strands. . (ii) After replication, each DNA molecule would have one parental and one newly synthesised strand. 16. Experimental proof that DNA replicates semiconservatively, comes first from E. coli and later from higher organisms, such as plants and human cells. Matthew Meselson and Franklin Stahl performed the following experiments to prove this in 1958. (i) E. coli was grown in a medium containing 15NH4C1 as the only nitrogen source for many generations. 15N got incorporated into newly synthesised DNA (and other nitrogen containing compounds). This heavy DNA molecule could be distinguished from the normal DNA by centrifugation in a cesium chloride (CsCl) density gradient. (ii) They then transferred the cells into a medium with normal 14NH4Cl and took samples at various definite intervals as the cells multiplied and extracted the DNA that remained as double stranded helices. DNA samples were separated independently on CsCl gradients to measure DNA densities. (iii) The DNA that was extracted from the culture, one generation (after 20 min) after the transfer from 15 N to 14N medium had a hybrid or intermediate density. DNA extracted from the culture after another generation (after 40 min) was composed of equal amounts of this hybrid DNA and of light DNA. (iv) Very similar experiments were carried out by Taylor and Colleagues on Vicia faba (faba beans) using radioactive thymidine and the same results, i.e. DNA replicates semiconservatively, were obtained as in earlier experiments. 17. DNA replication machinery and enzymes process of replication requires a set of catalysts (enzymes). (i) The main enzyme is DNA-dependent DNA polymerase, since it uses a DNA template to catalyse the polymerisation of deoxynucleotides. The average rate of polymerisation by these enzymes is approximately 2000 bp/second. (ii) These polymerases has to catalyse the reaction with high degree of accuracy because any mistake during replication would result into mutations. DNA polymerisation is an energy demanding process, so deoxyribonucleoside triphosphates serve dual purposes, i.e. act as substrates and provide energy for polymerisation reaction. (iv) Many additional enzymes are also required in addition to DNA-dependent DNA polymerase. (v) (a) Replication in DNA strand occurs within a small opening of the DNA helix, known as replication fork. (b) DNA-dependent DNA polymerases catalyse polymerisation only in one direction, i.e. 5′ -> 3. It creates additional complications at the replicating fork. Consequently, on one strand (template 3′-5′), the replication is continuous, while on the other strand (template 5′-3′), it is discontinuous. The discontinuously synthesised fragments called Okazaki fragments are later joined by DNA ligase. 18. Origin of Replication (i) DNA polymerases cannot initiate the process of replication on their own. Also, replication does not initiate randomly at any place in DNA. So, there is a definite region in E.coli DNA where the replication originates. The region is termed as origin of replication. (ii) Due to this requirement, a piece of DNA, if needed to be propagated during recombinant DNA procedures, requires a vector. The vectors provide the origin of replication. 19. RNA world RNA was the first genetic material. There are evidences to prove that essential life processes, such as metabolism, translation, splicing, etc., have evolved around RNA. (i) There are some important biochemical reactions in living systems that are catalysed by RNA catalysts and not by protein enzyne. (ii) DNA has evolved from RNA with chemical modifications that make it more stable because RNA being a catalyst was reactive and hence, unstable. 20. There are following three types of RNAs: (i) mRNA (messenger RNA) provides the template for transcription. (ii) tRNA (transfer RNA) brings amino acids and reads the genetic code. (iii) rRNA (ribosomal RNA) plays structural and catalytic role during translation. All the three RNAs are needed to synthesise a protein in a cell. 21. Traription is the process of copying genetic information from one strand of the i DNJS. into RNA. The principle of complementarity governs the process of transcription, except the adenosine now forms base pair with uracil instead of l thymine. (i) In transcription, only a segment of DNA is duplicated and on Iv one of the strands is . copied into RNA. Both the strands are not copied because • If both the strands code for RNA, two different RNA me’ ^cules and two different proteins would be formed, hence complicating the genetic information transfer machinery. • Since two RNA produced would be complementary to each other, they would form a double-stranded RNA without translation, making the process of transcription futile. (ii) A transcription unit in DNA is defined by three regions in the DNA which are as follows: (a) A promoter (b) The structural gene (c) A terminator (iii) The two strands of DNA have opposite polarity and the DNA-dependent RNA polymerase also catalyse the polymerisation in only one direction that is 5′ -» 3′. (iv) The strand that has the polarity 3′-» 5′ acts as a template and is referred to as template strand. The other strand which has the polarity (5′ -> 3′) and the sequence same as RNA (T at the place of U) is displaced during transcription. This strand is called as coding strand. (v) The promoter and terminator flank the structural gene in a transcription unit. (vi) The promoter is located towards 5′ end (upstream) of the structural gene. (vii) It is the DNA sequence that provides binding site for RNA polymerase and the presence of promoter defines the template and coding strands. By switching its position with terminator, the definition of coding and template strands could be reversed. (viii) The terminator is located towards 3f-end (downstream) of the coding strand and it usually defines the end of the process of transcription. (ix) There are additional regulatory sequences that may be present further upstream or downstream to the promoter. Transcription Unit and the Gene (i) A gene can be defined as the functional unit of inheritance. (ii) A cistron is a segment of DNA coding for a polypeptide. (iii) The structural gene in a transcription unit could be said as monodstronic (mostly in eukaryotes) or polycistronic (mostly in bacteria or prokaryotes). (iv) The coding sequences or expressed sequences are defined as exons. Exons appear in mature or processed RNA. The exons are interrupted by introns. (v) Introns or intervening sequences do not appear in mature or processed RNA. (vi) Sometimes, the regulatory sequences are loosely defined as regulate 5: even though these sequences do not code for any RNA or protein. 22. Transcription in prokaryotes occur in the following steps: (i) A single DNA-dependent RNA polymerase catalyses the transcription of all types of RNA in bacteria. (ii) RNA polymerase binds to promotor and initiates transcription (initiation). (iii) It uses nucleoside triphosphates as substrate and polymerises in a template depended fashion following the rule of complementarity. It also facilitates opening of the helix and continues elongation. (v) Once the polymerase reaches the terminator region, the nascent RNA falls off, so also the RNA polymerase. This results in termination of transcription. (vi) RNA polymerase is only capable of catalysing the process of elongation. It associates transiently with initiation-factor (a) and terminator factor (b), to initiate and terminate the transcription, respectively. Thus, catalysing all the three steps. (vii) Since, the mRNA does not require any processing to become active and also since transcription and translation take place in the same compartment, many times the translation can begin much before the mRNA is fully transcribed. As a result, transcription and translation can be coupled in bacteria. 23. Transcription in eukaryotes have additional complexities than prokaryotes. (i) There are at least three RNA polymerases in the nucleus other than the RNA polymerase in organelles. The RNA polymerase I transcribes rRNAs (28S, 18S and 5.8S). RNA polymerase III is responsible for transcription of fRNA, 5srRNA and SnRNAs (small nuclear RNAs). RNA polymerase II transcribes precursor of mRNA, the heterogenous nuclear RNA (/mRNA). (ii) Another complexity is that, the primary transcripts contain both the exons and the introns and are non-functional. Hence, subject to a process called splicing. In this process, introns are removed and exons are joined in a definite order. (iii) /mRNA undergoes additional processing called as capping and tailing. In capping, an unusual nucleotide is added to the 5′-end of /mRNA. In tailing, adenylate residues (200-300) are added at 3′-end in a template. It is the fully processed /mRNA, now called mRNA, that is transported out of the nucleus for translation process. Significance of these complexities are: (i) The split gene arrangements represent an ancient feature of genome. (ii) The presence of introns is reminescent of antiquity. (iii) The process of splicing represents the dominance of RNA world. The DNA and RNA World:
<urn:uuid:f2b24e8f-ee04-4210-988a-1efbbdaac3f6>
CC-MAIN-2022-33
https://coolgyan.org/revision-notes/cbse-class-12-biology-notes-chapter-6
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00672.warc.gz
en
0.936708
4,515
4.0625
4
17 May, 2011 The S-word. It’s become so dominant and overused in green, business and societal discourse that it has become emptied of meaning. This elusive word is used all the time now, (nearly as much as eco-everything) especially by green-washing corporate PR machines, as well as, disappointedly, the green movement(s). It drives me crazy. Corporations, with varying degrees of authenticity and intent, aim to incorporate social, economic and environmental matters into their business. Green groups enter into dialogue with business to bring about “sustainability”. So there seems to be a broad consensus that sustainability, even if the word has multiple, contested and conflicted meanings, is a good thing; good for the planet, good for our grandchildren, good for corporate growth. This broad consensus can be dangerous. The “sustainability movement” has created an apolitical construct that is seemingly best developed by technical, scientific and managerial elites, who fly at 10,000 metres from conference to conference, exhibiting naïve optimism that they can manage earth’s complex systems. For many, sustainability is about creating a (mystical?) future in which humans live in harmony with nature. Sounds so simple. As if such there was an old-age, or future-age balance, that can be restored or achieved. Our defence of a so-called “fragile nature” seems to occur mainly through the tortuous (and dare I say largely ineffective) process of national and global policymaking. Is there something wrong here? I think so. Sustainability has been dumbed down, in spite (or because) of the abundance of sustainability consultants, reports and conferences. It has been emptied of the hard work and messiness of creating “sustainable” communities on the ground, at a particular place. It has been emptied of the need to understand the politics of how our world became “unsustainable”. It has brushed aside questions of power, hegemony and inequality. It reinforces the notion of nature as a collection of resources for human use and appropriation. Sustainability is applied as a band-aid, a cure-all, a slogan that can be applied to almost everything. It has become bland, globalising and homogenising and failed to deliver the particulars (the nitty gritty) involved in a transition to a more “sustainable” world. Sustainability, as a concept, and even as a practice, seems blind to the needs of nature itself. Its human-centredness disappears the crucial support provided by nature and creates the idea that human cleverness can supply all the things we need. Indeed, the idea of natural systems having autonomous rights of existence and their own agency is left almost totally undiscussed. One reason why mainstream sustainability is so compelling is that it seems to fit well into existing structures of power. It seems obvious to me that without a radical restructuring of our present systems they can never become sustainable, irrespective of the gains from material and energetic efficiencies. Any sustainability movement must, by definition, be a radical challenge to the existing system. The tragedy continues to unfold as ecological, social and economic systems degrade further and further. Inequality, hunger, dispossession, the degradation of living systems, continues unabated, some 25 years after sustainability entered mainstream thinking. “The evil that men do lives after them, The good is oft interred with their bones …” The evil of the age of excess, of empire and domination, and even of “sustainability” will, to the detriment of our descendants and other species, live on. The good intentions of sustainability will be interred along with all the glossy sustainability reports and conference proceedings. Et tu, sustainability? (With apologies to Shakespeare. Quotation from Julius Caesar.)
<urn:uuid:4f60759c-03e1-4acf-bb2a-702f3b2bb2da>
CC-MAIN-2016-44
http://imaginal.com.au/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00118-ip-10-171-6-4.ec2.internal.warc.gz
en
0.95619
804
1.710938
2
- Stage Director Vito Taufer - Set and Costume Designer Samo Lapajne - Lighting Designer Pascal Mérat - Choreographer Miha Krušič Orphée aux enfers, whose title translates from the French as Orpheus in the Underworld, is an opéra bouffe, or opéra féerie in its revised version. Its score was composed by Jacques Offenbach to a French text written by Ludovic Halévy and later revised by Hector-Jonathan Crémieux. The work, first performed in 1858, is said to be the first classical full-length operetta. Offenbach’s earlier operettas were small-scale one-act works, since the law in France did not allow full-length works of certain genres. Orpheus was not only longer, but more musically adventurous than Offenbach’s earlier pieces. This also marked the first time that Offenbach used Greek mythology as a background for one of his pieces. The operetta is an irreverent parody and scathing satire on Gluck and his Orfeo ed Euridice and culminates in the risqué Galop infernal(“Infernal Galop”) that shocked some in the audience at the premiere. Other targets of satire, as would become typical in Offenbach’s burlesques, are the stilted performances of classical drama at the Comédie-Française and the scandals in society and politics of the Second French Empire.
<urn:uuid:8fb41d33-384a-4647-9916-d28c67691fbd>
CC-MAIN-2022-33
http://darjin.net/portfolio/orfej-v-peklu/?replytocom=21978
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00273.warc.gz
en
0.94632
325
2.3125
2
The process involves changing old materials into something new and preventing them from going to the landfill for a longer period, but the main question is can cardboard boxes be recycled? Both Paper and Cardboard are valuable recyclable materials. This helps to extend the product’s lifespan and also positively impacts the environment. …. The most commonly used Cardboard you’ll see is corrugated boards made out of cardboard waste, along with the Cardboard used in packaging for food and drinks, which is actually good idea for using recycling boxes as different types of cardboard items can be made from it. These include Snack boxes, cereal boxes containers, pizza boxes and boxes from online deliveries. The majority of packaging is recyclable by waste management. However, consumers must always inquire with authority in their area. - It is not possible to recycle damaged Cardboard that has paint, food, or dirt even mixed with water. - You must remove any materials such as packaging tapes, inserts of polystyrene, or the void fill in cardboard packaging to be recycled. - Make sure to check your online shopping carts for staples and stitching. These may need to be removed before recycling. - All glittery greeting cards cannot be reused. - You can compost your home with Cardboard, which means it doesn’t need to be thrown in the curbside recycling. Similar to Cardboard, it is possible to reuse paper; however, it must be clean before entering the recycling process. Paper products that are safe to recycle are as follow: - Brochures and magazines - Brown and white papers (like the computer papers or packaging) - Shredded paper An excellent tip is to scrunch a piece of paper. Then, if it doesn’t come back, it could be reused. - There is no way to reuse soiled paper the same way as Cardboard. Paper that has been contaminated with grease, such as the wrappers you use to take your food away. - The glossy gift wrap shouldn’t go in the recycling bin. - There is no way to recycle cotton wool, makeup pads, wipes, and sanitary products. What happens to Cardboard and paper reused? If Cardboard and paper are collected to be recycled and sent to a recycling facility to sort. The materials are separated into different grades and then sorted to be processed. After that, the material is cleaned to remove inks, adhesives, and any other substances that can contaminate the paper. After being washed, your recyclable becomes a slurry blended with different meanings to create a new newspaper, cardboard reels, or maybe even office papers. Reducing the amount of waste your customers can recycle If you utilize any kind of cardboard or paper packaging for your business, It is crucial to inform people how they can recycle the materials. In the present, many people don’t know what materials are recyclable. Making sure your packaging is clearly labeled so that consumers understand what recyclable items are, is a huge help and contributes to your ethical business policies. Cardboard packaging for food Many people think that cardboard packaging for food items such as sandwich boxes and takeaway containers is recyclable and free. However, that’s not the case in all cases. Chapelton aids food producers in finding the best, non-plastic takeaway food packaging options, and in this blog, we discuss some of the most important issues. You’ve probably noticed that single-use plastics are a hot topic in the media. Pressure is being placed on everyone, from the service and supermarket chains to takeaway and fast-food restaurants, to cut down on plastic waste and stop selling single-use plastics. Food packaging used for takeaway is the most frequent target of government officials, activists, and the general public since it is, by definition, a product that can be recycled. Of course, everyone with the supply chain is aware that food packaging for takeaway serves an even more important job than the average consumer believes. Sandwich boxes or salad trays, and other wraps have to be used to pack food items from the manufacturing line to the point that a consumer gets the thing to keep it intact and fresh all the way through. Hot food takeaway containers and another packaging for fast food need to warm food and stop water from getting out when a delivery driver or customer takes it from the shop to home. Plastic has always played a crucial role in the food-to-go industry, helping drive expansion by keeping costs down and extending fresh products’ shelf-life. Can I recycled cardboard at Home Depot? Home Depot also brings the lifecycle of their Cardboard in a full circle by turning the waste of Cardboard into moving boxes. It is estimated that Home Depot recycled 230,000 tons of Cardboard alone in 2017 and has recycled more than 1 million tons of Cardboard to date. If reuse is not feasible, The Home Depot looks to the most environmentally responsible recycling process. 5 reasons to choose Cardboard as the ideal packaging material Cardboard can be repurposed to fit a variety of products with different dimensions and shapes. Utilizing cutting-edge designs, cardboard packaging can be used for multiple purposes or make forms that you never imagined possible. In certain instances, companies have designed their cardboard packaging to provide further use following the packaging. This helps extend the life of the product and demonstrates the brand’s desire to reduce waste. For instance, clothing brands can use cardboard packaging that can be turned into hangers for clothes and benefit consumers from their packaging. With its flexibility, it is possible to package a variety of items using similar materials. For instance, Wabs Print & Packaging offers on-demand box manufacturing technologies, Box on Demand, so you can find the perfect packaging for your product and reduce waste. 2. Perfect branding Although plain Cardboard can be an efficient shape for packaging in its own right, Cardboard is easily transformed by the use of colour, body, and branding. In addition, it is simple to print or embossed to create truly personal packaging. With the help of logos and colours, Cardboard is quickly transformed from boring packaging to colorful and thrilling protection that helps your brand spot. Take the cardboard material as a blank piece of paper that you can alter by adding your own words and images to let your products fly from the shelf. Another significant benefit of using cardboard packaging is that it can be recycled. For consumers, this has many advantages since it’s easily recyclable and doesn’t require special treatment to dispose of it. The majority of councils pick up Cardboard as part of their recycling collection programs. In addition, there are a variety of recycling facilities across the UK. Additionally, Cardboard is made from recycled materials too. At Wabs Print & Packaging, our boxes are made of 100% recycled materials and are recyclable at the end of their life. 4. Reduce transportation costs (and reduce carbon emissions) Since Cardboard is light, this means that packaging doesn’t make a significant contribution to the overall weight of the item. The more lightweight packaging makes it easier to transport the product and cost-effective since you can save fuel by reducing weight. In addition to saving energy, the cost of transportation will be reduced significantly. Not only will you benefit from savings in fees, but you also reduce the carbon footprint by using less fuel. When it comes to transport, Cardboard is extremely tough, which makes it the most suitable packaging material for businesses. In addition, it can prevent moisture from infiltrating into the product. This is essential for items that must endure long periods of transportation as well as protect foodstuffs. In comparison to other packaging materials, Cardboard boxes are feasible option for companies regardless of size. Cardboard is thought to be the most affordable when compared to other more costly packaging solutions like plastic. When evaluating solutions like corrugated Cardboard, they are very cheap because they use less material than standard Cardboard but provide sturdy protection and light. When you order large quantities of Cardboard typically, you will cut down on the cost of packaging. In addition, cardboard packaging generally is delivered flat-pack so you can buy it in bulk and still have space to store it so that it’s there whenever you require it; however, it doesn’t consume a lot of space. Choose Cardboard boxes as your packaging solution as your products packing boxes. If you’re looking for the right product for your packaging requirements, talk to Wabs Print & Packaging’s experts. Wabs Print & Packaging. Wabs Print & Packaging has a wide range of cardboard packaging options that are both recyclable and adaptable. From basic boxes to custom packaging solutions, custom product packaging suppliers solution that will meet your requirements. Additionally, Wabs Print & Packaging work with all types of businesses, providing affordable solutions for both big and small businesses.
<urn:uuid:f6b7e9bb-19c1-44b6-8c87-ac3bc30bd193>
CC-MAIN-2022-33
https://iterd.com/can-cardboard-boxes-be-recycled/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00668.warc.gz
en
0.939437
1,895
2.984375
3
How to Kill a Giant 1 Samuel 17 As the mist cleared from the valley, the men on both sides knew the time had come. Before this day was done, many men would die. The soldiers of the army of Israel checked their weapons, made sure their uniforms were ready, and grabbed a quick bite of bread and cheese. Older soldiers took a swig of wine from the flask and spit it out. They had the hardened look of men who knew what was to come. The younger ones were quiet—all the bragging of the night before was gone. They were too scared to tell jokes and too ashamed to admit their fear. As they looked across the Elah Valley, they saw on the other side the men whom they would soon meet in battle. The Israelites were on one slope, the Philistines on the other. In between was a valley, in the valley was a ravine, in the ravine was a wadi, a dry creek bed. Soon that valley would be a battlefield. The story begins this way in I Samuel 17:1-3: Now the Philistines gathered their forces for war and assembled at Socoh in Judah. They pitched camp at Ephes Dammim, between Socoh and Azekah. Saul and the Israelites assembled and camped in the Valley of Elah and drew up their battle line to meet the Philistines. The Philistines occupied one hill and the Israelites another, with the valley between them. Before we go on, it will help to know that the Philistines had started this war. Somehow the ragtag army of Hebrew farmers had defeated them just a few months earlier at the Battle of Michmash (1 Samuel 13-14). It had been a stinging, humiliating defeat. The Philistines meant to pay them back with interest. Now the day has come. Indeed the moment has come. The Israelites are ready to do battle. Each man has a club, a hoe, a spear, a bow and arrow. Each man is ready to die for his country. When the word is given, the battle will begin. I. The Challenge But the word is not given because a strange thing happens. The Philistines are not coming down the slope. They aren’t coming! And at first, the men of Israel think maybe they’ve won by forfeit. But before they can celebrate, a sight unfolds before them, the likes of which they have never seen before. Something is moving down the slope. Something big. Something huge. It’s like a tree maybe or a mountain. Whatever it is, it is covered with glittering bronze. It looks like a tank only they didn’t have tanks back then. The thing got to the middle ground near the ravine and suddenly a shudder ran through the men of Israel. It’s a man. The biggest man they’ve ever seen. First Samuel describes him in detail. He stands six cubits and a span. That doesn’t mean anything to us but if you convert it to our system of measurement, it means he was 9 feet 9 inches tall. We’re told other interesting things about him. His name, of course, is Goliath. He’s clad from head to toe in armor. He wore a bronze helmet and a bronze coat of armor that weighed nearly 125 pounds. He wore bronze shin guards and had a bronze javelin slung over his back. His spear was like a weaver’s beam, meaning it was a thick shaft of wood, like a small log. The head of the spear had an iron point weighing 17 pounds. Ahead of him marched a soldier carrying a shield large enough to protect his entire body. Having gotten their attention, this is what Goliath says: “Why do you come out and line up for battle? Am I not a Philistine, and are you not the servants of Saul? Choose a man and have him come down to me. If he is able to fight and kill me, we will become your subjects; but if I overcome him and kill him, you will become our subjects and serve us.” Then the Philistine said, “This day I defy the ranks of Israel! Give me a man and let us fight each other” (verses 8-10). What Goliath proposes is the ancient tradition of single combat. A little game of one-on-one, winner take all. One man from your side, one from mine. He would represent the Philistines and someone would represent the Israelites. They would fight to the death and the army of the winner would win the entire battle. This plan saved time and potentially avoided useless bloodshed, but it only worked if someone accepted the challenge. It only takes one giant to stop you as long as you look at life from the human level. When Goliath says, “Am I not a Philistine?” (v. 8), the Hebrew text actually reads, “Am I not the Philistine?” Meaning, “I’m the baddest man the Philistines ever had. If you want to find out how bad I am, just come on down and fight me.” Arrogance drips off every word. Now what would you do? Would you go and fight Goliath? Maybe you’re 5’ 8”, 5’ 10” tops, 25 years old, a hard-scrabble farmer from Hebron. You’ve got a wife and three kids back home. Would you go and fight Goliath? It would be suicide. At least that’s the way the men of Israel felt. Verse 11 says, “Saul and all Israel were dismayed and terrified.” Even Saul was terrified. Why? Because now he’s on his own. He wanted to do his own thing so God said, “Fine, go do it.” And the Spirit of the Lord had left him. Without the Spirit of the Lord, Saul has nothing with which to face the giant. God had lifted the divine energy shield for Saul and now he is filled with terror. And so the challenge went unmet. Goliath went back to his camp. But it’s not over, not by a long shot. Verse 16 tells us that Goliath came out 40 days straight, twice a day, morning and evening, to challenge the men of Israel. Each day it was the same: No one would answer the challenge. God’s people were losing the battle before it started. I imagine that the military men of Israel got together each night and tried to formulate a plan. I’m sure they talked strategy and tactics. Saul was there along with Big Abner and the top brass. Maybe they even set up a model battlefield: Two clumps of dirt with the valley in between. They probably prayed, “O God, help us defeat the Philistines.” The next day would come, they would line up along the lip of the valley, Goliath would come out, yell and swear, and the whole army would run away. For 40 days! No one knew what to do. It only takes one giant to stop you as long as you look at life from the human level. Our lens picks up a giant ahead and suddenly he fills the whole screen until the giant is all we can see. At ground level, giants unglue us and we can’t go on. The problem is not how big the giant is, it’s how small he makes us feel. So small that we don’t have a chance. Giants defeat us not because they’re big but because they make us feel small. II. The Hero Enter David, the hero of the story. But when we meet him, he’s not the hero. He’s the grocery boy. By this time, David is back tending the sheep at Bethlehem while his three oldest brothers are in the army. David’s father Jesse wants to get a report from the battlefield so he decides to send David with some food for his brothers. Actually, it’s a hefty load—five pounds of roasted grain, ten loaves of bread, ten cheeses. It’s 18 miles from Bethlehem to the Elah Valley. David runs all the way. He gets there just as Goliath is making his daily rounds for the 40th time. This is pretty old stuff by now. Verse 23 says that Goliath was spouting his “usual defiance.” He comes out, makes a few threats, curses the men of Israel, and then goes back to his lines so he can toss off a couple of drinks at the Officer’s Club. But this time things will be different. David was no match for Goliath but when that uncircumcised Philistine took on God, he got in over his head. David hasn’t heard a thing about Goliath and his challenge. He’s just excited to be on the battlefield and away from those sheep. So he asks, “What’s going on? Why doesn’t somebody take care of that loud-mouth?” Look at the answer in verse 25: “Do you see how this man keeps coming out? He comes out to defy Israel. The king will give great wealth to the man who kills him. He will also give him his daughter in marriage and will exempt his father’s family from taxes in Israel.” It’s not a bad deal except for the part about Saul’s daughter. She was no prize. But notice David’s answer. It’s the key to the whole story. “What will be done for the man who kills this Philistine and removes this disgrace from Israel? Who is this uncircumcised Philistine that he should defy the armies of the living God?” (1 Samuel 17:26). Wait a minute, did you get that? “The armies of the living God.” Not “the armies of Saul” or “the armies of Israel.” That makes all the difference in the world. The soldiers are saying, “Do you see that guy? He’s like a mountain out there. You wouldn’t last five seconds.” David, don’t you see him? Yes, David sees him. But he also sees something else that nobody in the army of Israel had seen. David saw that Goliath was not only defying Israel, he was defying Israel’s God. David looks at life differently. Israel saw Goliath—that brazen giant—as an immovable object. David saw him from God’s point-of-view. “He’s blocking the way of God. Let’s go get him.” David was no match for Goliath but when that uncircumcised Philistine took on God, he got in over his head. This is not braggadocio or big talk. No, it’s entirely different. This is a man who sees Goliath from above. It’s like looking down at Shaquille O’Neal from the top of the Sears Tower. At ground level, you look up at him. From the top floor, you need binoculars to find him. It’s all a matter of perspective. David’s screen was filled with God and therefore everything else was whittled down to proper size. He saw Goliath but he also saw God. And that made all the difference. Think of it this way. Take a piece of paper and write two words on it: Now try it the other way: When God is in his right place, Goliath shrinks down to the proper size. When Goliath replaces God, then you’ll run away in terror every time. How big is your God? III. The Doubters But before he goes after Goliath, he’s got to convince the doubters. The first one is his older brother Eliab who questions David’s motives: “Why have you come down here? And with whom did you leave those few sheep in the desert? I know how conceited you are and how wicked your heart is; you came down only to watch the battle” (1 Samuel 17:28). Eliab’s problem is two-fold. First, he’s a jerk. Second, he’s a coward. He can’t stand the thought that his kid brother could do something he couldn’t do. David answered in the words of younger brothers and sisters everywhere: “Now what have I done?” (v. 31). The sling in David’s day was a deadly weapon — like an early version of the Israeli Uzi. And David’s got a five-round clip. But still he wasn’t ready to go fight Goliath. Word comes to Saul that at last a man has been found. When Saul finds out it’s David, he can’t believe it. David in his eyes is just a kid. No chance in the world he could beat Goliath. He tells David, “You are only a boy, and he has been a fighting man from his youth.” David’s answer is classic: “Your servant has killed both the lion and the bear; this uncircumcised Philistine will be like one of them, because he has defied the armies of the living God. The Lord who delivered me from the paw of the lion and the paw of the bear will deliver me from the hand of this Philistine” (1 Samuel 17:36-37). Behind these brave words lies an important truth: Every giant in your path is also in God’s path if you are going in God’s direction. “Hey, God, guess what? We’ve got another giant.” “Good. Let’s go get him.” If you are in the will of God, the giants who fight you are actually fighting God. That’s why God sends giants in our path on a regular basis: First, to see if we will run or fight. Second, to allow us an opportunity to honor our God. IV. The Battle Off he goes into battle with his staff and sling. As he heads down the slope, he pauses at the creek bed to pick up five smooth stones. We’ve tended to romanticize this part of the story but the sling in David’s day was a deadly weapon — like an early version of the Israeli Uzi. And David’s got a five-round clip. While studying for this sermon I learned that these stones were not necessarily pebbles or small rocks. One authority said they were usually round, smooth stones that could be as large as a baseball. In the hands of an expert slinger, the stones were like a Josh Beckett fastball. They would leave the sling at speeds approaching 100 miles per hour. By this time David is coming near Goliath. Behind his shoulder, the whole army is watching. “Go get him David. You can do it.” As he walked, Goliath got bigger and bigger and bigger. On the other side, somebody spots David and the Philistines start laughing. Another fellow starts taking bets on how long it will take Goliath to break him in two. Don’t tell God how big your giants are. Tell your giants how big your God is. But before they could fight, there was one more thing they had to do. In single combat, the fighters would first yell at each other, sort of an Old Testament version of trash talking. So Goliath says to David, “Come on over here and I’ll feed you to the birds and the beasts.” Notice how David answers back in verses 45-47. This is one of the great statements of faith in all the Bible. You come against me with sword and spear and javelin, but I come against you in the name of the Lord Almighty, the God of the armies of Israel, whom you have defied. This day the Lord will hand you over to me, and I’ll strike you down and cut off your head. Today I will give the carcasses of the Philistine army to the birds of the air and the beasts of the earth, and the whole world will know that there is a God in Israel. All those gathered here will know that it is not by sword or spear that the Lord saves; for the battle is the Lord’s, and he will give all of you into our hands.” Notice what David does and what he doesn’t do. He doesn’t return insult for insult or slander for slander. He doesn’t need to boast or to call names. After all, in himself David is no match for Goliath. It’s not a fair fight. But when you bring God into the equation, everything changes. Here’s the point: Don’t tell God how big your giants are. Tell your giants how big your God is. David is saying, “I come to you in the name of all that my God is. Watch out, Goliath. My God is bigger than you and he’s gonna lay your body down.” With that, David suddenly starts to run. As he runs, he puts a stone in his sling and cocks his arm. He’s like Eli Manning on a rollout. Run, load, fire, all in one motion. The stone came in right between the eyes and lodged in his forehead. Goliath never knew what hit him. Such a thing had never entered his mind before. One moment he’s watching David run, the next everything goes black. And with a mighty crash he falls to the ground…stoned out of his mind. Verse 50 emphasizes how it happened: “So David triumphed over the Philistine with a sling and a stone; without a sword in his hand he struck down the Philistine and killed him. What appeared to be a purely military conflict turns out to be a spiritual conflict as well. One other little detail. David had promised to cut off his head but he didn’t have a sword. So he borrows Goliath’s and starts hacking away. Meanwhile, the soldiers on both sides can’t believe what they’ve just seen. From the north end of the valley, the men of Israel are cheering, whooping, hollering. One grizzled old sergeant says, “Let’s go get ’em, boys.” On the other side, sheer panic. Here come the Israelis. There go the Philistines. It was a slaughter. The road back to Gath was littered with dead Philistines. Then the Jews went back to the battlefield and plundered their tents. It was the most one-sided duel in history and Israel’s greatest military victory. All because one man saw life from God’s perspective. A whole nation saved, revived, and energized because a young shepherd dared to see life from the top down. David arrived early in the morning a grocery boy; by sundown he is a national hero. For that one act of bravery, he was enshrined forever in history. Never again would he be overlooked. Never again would he be taken for granted. V. The Application I want to ask and answer three questions and then we’re through. 1. What would qualify as a giant today? Sometimes we will find ourselves in situations similar to the one in which David found himself—in a valley, alone, facing a giant. But it’s not likely that we will find ourselves up against a literal giant like Goliath. How, then, does this story fit our lives? Usually the inner giants defeat us much faster than any giant we face on the outside. The point to remember is the one David made in verse 26, again in verse 36, and again in verse 45. In defying the armies of Israel, Goliath was actually defying the God of Israel. What appeared to be a purely military conflict turns out to be a spiritual conflict as well. We may face exactly that kind of conflict today. In fact, there are numerous warnings in the New Testament to expect opposition from the world, the flesh and the devil. Consider Acts 14:22, “We must go through many hardships to enter the kingdom of God.” 1 Peter 5:8 warns us to “be self-controlled and alert. Your enemy the devil prowls around like a roaring lion looking for someone to devour.” Remember Paul’s sober words in 2 Timothy 3:12, “Everyone who wants to live a godly life in Christ Jesus will be persecuted.” We need not think of persecution in a narrow or limited sense. The whole Christian life is one battle after another and most of us will face a whole army of giants before the story is fully told. To answer the basic question, a giant is any situation in our path which blocks the way God wants us to go. It might be a person who opposes us or it might be a combination of circumstances which when taken together block us from doing what God wants done. For most of us, the greatest giants are the ones we face on the inside: Fear of failure Usually those inner giants defeat us much faster than any giant we face on the outside. It’s in the mind where the battle of David versus Goliath must be fought and won every single day. David needed Goliath. In that sense, many of us face a giant right now. It may be an impossible situation at work or at home. It may be a financial difficulty or a broken relationship. It may be a task before you that you know you can’t handle. It may be a dream that seems unreachable. Giants by definition are enormous, threatening, intimidating. They fill the screen until we can see nothing else. 2. Why does God put giants in our path? Primarily because soldiers grow up on the battlefield, and we will never grow up until we dare to go out and face Goliath head on. There is nothing like war to turn a boy into a man. As long as we run when the giant rears his ugly head, we’ll have to face him tomorrow and tomorrow and tomorrow. He won’t go away until we stand up and fight him. Please note that last sentence. Goliath never leaves on his own. In the story Goliath came back twice a day for 40 days until David finally went down to face him in the valley. Your giants are the same way. They will never leave on their own. Why should they? Until you stand and fight in Jesus’ name, they win every time. Whenever we stand up to a giant and fight him in the name of the Lord, mighty miracles begin to take place. God wants us to grow up and we can’t until we go out and fight in the name of the Lord of Hosts. Though it may sound strange to say it, giants are absolutely necessary for our spiritual growth. Martin Luther commented that three things are necessary for the development of a man of God: Meditation on the Word of God By “temptation” Luther meant the daily testings we all face. Reading the Bible is good, and prayer is even better. But Goliath will never be defeated merely by having your Quiet Time. As long as we cower in the rocks instead of going down into the valley to face the giant in our path, we can never become all that God intended us to be. Goliath never had a chance. He was just a paper giant. Think of it this way. David needed Goliath. He didn’t realize it, of course. To him fighting Goliath was simply the next thing God had called him to do. But he needed Goliath in order to gain the confidence of the people that he truly was qualified to be their king. The people had to know that the man they followed was worthy of their trust. David proved it by defeating Goliath. In the same way you need your giants because you’ll never become all that God wants you to be without them. Though today you pray to be delivered from them, God intends to use the struggle you face to make you stronger. 3. What lesson was God trying to teach David? You might say it many ways but at the heart it was the lesson of faith. David had to learn what faith in God could do. Naked faith. Unarmed faith. Faith plus nothing and minus nothing. Faith in God’s power in the face of impossible odds. Faith, mighty faith, the promise sees, And looks to God alone, Laughs at impossibilities, And cries, “It shall be done!” This truth comes into focus if we ask what might seem like an obvious question: At what point did Goliath die? When did David kill him? You say, “Easy. When he cut off his head.” No, not really. “When the stone hit him.” No, not even then. Go back a little bit. Was it when he picked up the five smooth stones? No. Was it when he told Goliath what he was going to do? No, but you’re close. Was it when he refused to wear Saul’s armor? No, but you’ve passed over it. “Faith is belief plus unbelief and acting on the belief part.” Between those two events something critical happened. First Samuel 17:40 tells us that after David picked up the five stones, he “approached the Philistine.” When he took that first step, Goliath was a dead man. He just didn’t know it yet. David won the victory with that first step. The rest is history. David possessed Goliath’s head while it was still attached to Goliath’s shoulders. Goliath never had a chance. He was just a paper giant. Many years ago I heard a definition of faith that has never left me. It goes like this: “Faith is belief plus unbelief and acting on the belief part.” Did David know something the other men of Israel didn’t know? No, he didn’t. They also knew God was great and mighty and powerful. They knew he was the Lord of Hosts. It wasn’t a matter of knowledge. Any one of them could have killed Goliath if they had been willing to take that first step in the name of the Lord. The difference between David and the other soldiers was not that he had faith and they had doubts. Or that they had doubts and he had none. The difference is this: David acted on his belief and ignored his doubts while they acted on their doubts and ignored their belief. Big talk will never slay Goliath. Faith is not waiting for 100% assurance. Faith is not waiting until all your doubts are gone. If you wait for that, you’ll wait forever. Faith is seeing the giant, understanding the odds, believing that God wants him dead, and then taking that first step. If you can do that, the rest is easy. The First Step is the Hardest Now apply this truth to your own life. What giants stand in your way today? Name them. Write them down. Think about how the giants of circumstance and opposition have combined to keep you enslaved to fear and sometimes have driven you almost to the brink of despair. How much longer will you hide in the rocks of fear? When are you going to step into the valley and face the giant eyeball to eyeball? But the giant is big, you say. True, that’s why they call him a giant. He’s fearful. I’m sure he is. I might get hurt if I stand up against him. That’s true. There are always a thousand reasons to run away when Goliath stands before you. But whenever you are tired of running, the Lord stands ready to walk into the valley with you. Sooner or later you’ve got to peek over the top of the ridge, look into the valley and take that first step forward. It won’t be easy and there are no guarantees. But you’ll never know until you take your heart in your hands and step forward by faith. Faith is not talking about the giant, analyzing the giant, or praying about the giant. Big talk will never slay Goliath. Faith is taking that first step—knees knocking, hands shaking—with fear and trembling going into the valley in the name of the Lord of Hosts. You take that first step not because you think you can do it but because you know you can’t. Therefore, you know that if the giant is defeated, it is because God has done it through you. The reason this story is in the Bible is because there are still giants in the land and God is looking for some Davids. Do you have any thoughts or questions about this post? If you have a Facebook account, you may comment below: © Keep Believing Ministries Permissions and restrictions: You are permitted and encouraged to use and distribute the content on Keep Believing Ministries free of charge. If you choose to publish excerpts from a sermon or article, please provide a link or attribution back to KeepBelieving.com’s version of this article. The content of KeepBelieving.com must not be redistributed at a fee beyond the cost of reproduction. If you wish to support Keep Believing Ministries, your prayers and donations are appreciated, and further enable this worldwide ministry to distribute all materials free of charge. Topics in this messageGod | Sin | Work | War | Marriage & Family | Ruth | Bible | Faith | Heaven & Hell | Family | Death and Dying | Prayer | Trust | Grace | Courage | Anger | Doubt | Fear | Paul | Conflict and Confrontation | Magi (Wise Men) | Suffering/Trials | Peter | Unity | Marriage | David | God's Will | Spiritual Growth | Failure | Temptation | Timothy | Youth | Common Problems | Saul (OT) | Unbelief | Persecution | Discouragement | Spiritual Warfare | Suicide |Current sermon series: David--The Early Years » SEE SERMONS IN THIS SERIES
<urn:uuid:c2b29f83-e712-4741-89b4-f9fcff8d4ac1>
CC-MAIN-2016-44
http://www.keepbelieving.com/sermon/how-to-kill-a-giant/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00551-ip-10-171-6-4.ec2.internal.warc.gz
en
0.967738
6,446
2.578125
3
SAN FRANCISCO – Saying the Middle East is on the cusp of "great potential," King Abdullah II of Jordan paid a visit to the Bay Area to discuss topics ranging from the Palestinian-Israeli conflict to the Middle East's burgeoning young population. Speaking for the second time in San Francisco in just nine months as a guest of the World Affairs Council of Northern California and the Commonwealth Club, Abdullah held court in front of a sellout crowd of more than 500 at the Fairmont Hotel. He said the near-term could bring a real turning point in the fractured Middle East. "Experience teaches us the historic breakthroughs are easier to spot after the fact than before," the 42-year-old ruler said. "But this much is certain: The next few, critical months will set the course and speed of progress in my region for a long time to come. A promising but extremely tough journey has begun." Abdullah, who was crowned king in 1999, said the United States will play a critical role in that journey, both in its handling of Iraq and its continuing efforts to bring a peace accord between Israelis and Palestinians. He called on all of the people of Iraq to reject any interference in Iraq's internal affairs and help construct a constitution that represents all citizens. "Let's keep the goal in sight: a sovereign, pluralistic, violence-free Iraq that gives its people a future," Abdullah said. "It is in all our interests — and it is the right thing to do — to work together to support and assist that process." Abdullah said it is a goal of Jordan's to promote "unity, stability and development throughout the Arab world." He said the Middle East will achieve those goals only through a commitment to real changes — such as better educating the young. "Fifty percent of the Middle East is under 18," he said. "The overwhelming majority of these individuals need countries, including Jordan, to reach out to them. All these young people want a chance at life." The audience rewarded his 20-minute speech with a standing ovation. "He laid the foundation of peace — justice, truth and love," said Robert Boody, president and founder of Royal American Institute for World Peace, who attended the speech. "He's a very genuine man." Sam Bazzi made the commute all the way from the South Bay to see Abdullah, partly because of the aura he feels the king brings with him. "He is very much accepted here in the West," Bazzi said. "People here are excited about him. I wanted to hear him speak."
<urn:uuid:59b5afa2-4c00-48b2-a28d-d2b91ffe418b>
CC-MAIN-2017-04
http://sambazzi.com/blogs/category/society/royalty/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00007-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970492
533
1.5625
2
Claim Cargo & Clean Truck Fees Collection Effective February 18, 2009, marine container terminals began electronic gate access at the Ports of Los Angeles and Long Beach. Electronic gate access determines whether a truck entering the marine container terminal is operating under a valid port concession and allowed entry or if the truck is prohibited by the Clean Trucks Program's progressive truck ban. Trucks without a Radio Frequency Identification (RFID) tag, which identifies the vehicle as working under a valid port concessionaire, will not be allowed entry into the Ports' container terminals. Also as of February 18, 2009, the Ports of Long Beach and Los Angeles require that marine container terminal operators collect the Clean Trucks Fee (CTF). The $35/TEU fee will be assessed on every loaded container move performed by trucks that are not fully or partially exempt from the CTF. Click here for more information about the CTF and which trucks are exempt from the fee. In order to enter the ports' marine container terminals on and after February 18th, all trucks operating for a Licensed Motor Carrier (LMC) with a valid port concession are required to be registered in the Ports' Drayage Truck Registry (PDTR) and have obtained and mounted a working RFID tag. Trucks that do not meet these requirements will not be permitted into the ports' marine container terminals. The Licensed Motor Carrier is responsible for assuring that the information on each truck is correct in the PDTR. If you have recently replaced a defective RFID tag please make sure that the new RFID number is recorded in the PDTR. More information can be found at https://www.pierpass-tmf.org.
<urn:uuid:ac72cfe0-c838-45a6-9253-2d0bffd9226e>
CC-MAIN-2017-04
https://www.portoflosangeles.org/ctp/ctp_portcheck.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00310-ip-10-171-10-70.ec2.internal.warc.gz
en
0.91949
342
1.679688
2
Mass is celebrated every day of the week except Monday. It is also held at the Golden Living Center the first Friday of the month at 10:00 am. First Communion is offered for children in second grade, after completion of preparatory classes. For information regarding First Reconciliation or First Communion, contact Eric Russek at email@example.com While they were eating, Jesus took bread, said the blessing, broke it, and giving it to his disciples said, “Take and eat; this is my body.” Then he took a cup, gave thanks, and gave it to them, saying, “Drink from it, all of you, for this is my blood of the covenant, which will be shed on behalf of many for the forgiveness of sins.” And a voice came down from the heavens, “You are my beloved Son; with you I am well pleased." Matthew 26: 27-30
<urn:uuid:eae36b7c-d7bf-427b-8aac-bbec3e920a02>
CC-MAIN-2022-33
https://delanocatholic.com/Our-Parish/Sacraments/Holy-Eucharist
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00068.warc.gz
en
0.980053
205
1.664063
2
Monitoring memory and CPU usage of programs¶ Estimating the amount of memory an application will use during execution is often non trivial, especially when one uses third-party software. However, this information is valuable, since it helps to determine the characteristics of the compute nodes a job using this application should run on. Although the tool presented here can also be used to support the software development process, better tools are almost certainly available. Note that currently only single node jobs are supported, MPI support may be added in a future release. The user should be familiar with the Linux bash shell. Monitoring a program¶ To start using monitor, first load the appropriate module: $ module load monitor Starting a program, e.g., simulation, to monitor is very straightforward $ monitor simulation monitor will write the CPU usage and memory consumption of simulation to standard error. Values will be displayed every 5 seconds. This is the rate at which monitor samples the program’s metrics. Since monitor’s output may interfere with that of the program to monitor, it is often convenient to use a log file. The latter can be specified as follows: $ monitor -l simulation.log simulation For long running programs, it may be convenient to limit the output to, e.g., the last minute of the programs execution. Since monitor provides metrics every 5 seconds, this implies we want to limit the output to the last 12 values to cover a minute: $ monitor -l simulation.log -n 12 simulation Note that this option is only available when monitor writes its metrics to a log file, not when standard error is used. Modifying the sample resolution¶ The interval at which monitor will show the metrics can be modified by specifying delta, the sample rate: $ monitor -d 60 simulation monitor will now print the program’s metrics every 60 seconds. Note that the minimum delta value is 1 second. Some programs use temporary files, the size of which may also be a useful metric. monitor provides an option to display the size of one or more files: $ monitor -f tmp/simulation.tmp,cache simulation Here, the size of the file simulation.tmp in directory tmp, as well as the size of the file cache will be monitored. Files can be specified by absolute as well as relative path, and multiple files are separated by ‘,’. Programs with command line options¶ Many programs, e.g., MATLAB, take command line options. To make sure these do not interfere with those of monitor and vice versa, the program can for instance be started in the following way: $ monitor -delta 60 -- matlab -nojvm -nodisplay computation.m The use of -- will ensure that monitor does not get confused by Subprocesses and multicore programs¶ Some processes spawn one or more subprocesses. In that case, the metrics shown by monitor are aggregated over the process and all of its subprocesses (recursively). The reported CPU usage is the sum of all these processes, and can thus exceed 100 %. Some (well, since this is a HPC cluster, we hope most) programs use more than one core to perform their computations. Hence, it should not come as a surprise that the CPU usage is reported as larger than 100 %. When programs of this type are running on a computer with n cores, the CPU usage can go up to n x 100 %. monitor will propagate the exit code of the program it is watching. Suppose the latter ends normally, then monitor’s exit code will be 0. On the other hand, when the program terminates abnormally with a non-zero exit code, e.g., 3, then this will be monitor’s exit code as well. When monitor has to terminate in an abnormal state, for instance if it can’t create the log file, its exit code will be 65. If this interferes with an exit code of the program to be monitored, it can be modified by setting the environment variable MONITOR_EXIT_ERROR to a more suitable value. Monitoring a running process¶ It is also possible to \”attach" monitor to a program or process that is already running. One simply determines the relevant process ID using the ps command, e.g., 18749, and starts monitor: $ monitor -p 18749 Note that this feature can be (ab)used to monitor specific subprocesses. Help is available for monitor by issuing: $ monitor -h
<urn:uuid:1ff24662-429b-431f-9be9-36b8d808b398>
CC-MAIN-2022-33
https://docs.vscentrum.be/en/latest/jobs/monitoring_memory_and_cpu_usage_of_programs.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00669.warc.gz
en
0.885603
1,002
2.609375
3
If you’ve been around the blockchain or into the crypto space you’ve probably heard about Web3.0. So let’s understand this in simple layman’s terms and how this could change the internet forever. Well, before jumping straight to web 3.0 first understand why it’s called Web3.0 and not Web1.0. Web2.0 was more of a” Taker ” you will gradually know why it a called “Taker” as we evolved from 2004 till this time internet has grown a lot. websites and applications could connect and interact with each other, Now we get information from pages but in return, the web pages would ask for your information too, they wanted to know their end-users, so businesses can serve better content, targeted ads, meaning minting more money while making us stay longer on their website. but the user has to give up his privacy for that. Web3.0 will be an open and decentralized version of the internet. essentially, an internet powered by blockchain technology and the tools of decentralization, where everything is transparent and you don’t really need an intermediary or a regulator to operate. So you will be the owner of your content and will be able to sell it if you choose to. So far we understood Blockchain technology is the only solution to centralization and I assume you know about blockchain technology & how it works if not, then I recommend you read our post on what is blockchain technology? and we know that today’s internet is backed by tech giants and somebody who owns a central server has the power and authority to override users and its developers anytime they wish. But Web3 will revamp and transform everything around you data will be interconnected in a decentralized way which would be a huge jump, it will be an uncensored and permissionless version of what we are seeing now where it can’t be manipulated, Secured, as stated earlier there are no CEOs, No authority complete autonomous also know to DAO (Decentralized Autonomous Organization) We do see that Web3.0 already existed for a long time before bitcoin and Crypto. Protocols like BitTorrent, onion (tor), garlic (i2p), fediverse (peer tube, mastodon, etc), matrix (element) are all pretty old and are used to build decentralized networks. All these protocols don’t rally on crypto. So is Web3.0 is a Crypto A marketing gimmick or just a phase of new technology or big concept, run by a foundation to get you hyped up for the next step to buy their tokens. As the word spreads we see many big players are jumping into it, so will it be a truly decentralized web or not only time can tell that.
<urn:uuid:e386cc1c-62de-4a51-b73e-47bf15ab7c16>
CC-MAIN-2022-33
https://techlizzard.com/is-the-fate-of-the-internet-permissionless-web3-0-explained/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00071.warc.gz
en
0.936917
676
2.109375
2
Paul Bisceglio flags a study that explains how we evolved to distinguish between genuine and feigned laughter: Genuine laughs are produced by an emotional vocal system that humans share with all primates,” [Gregory] Bryant says in a press release. This system seems to have really strong control over our windpipes, so it allows us to shoot out quicker breaths of air when we laugh for real than when we fake it. We laugh faster as a result. This speed difference between real and fake laughter is subtle, but not small enough to escape the perceptive powers we’ve honed over millennia of human evolution. Our senses are fine-tuned to pick up the most minute acoustic variations—and for good reason, Bryant and [Athena] Aktipis write. Detecting feigned laughter is an important survival tool. “You have to be vigilant,” Bryant says, “because you want to discern whether people are trying to manipulate you against your best interests or whether they have authentic cooperative intentions.”
<urn:uuid:d1f9c06d-788f-46f1-98a8-df3bdb38889f>
CC-MAIN-2022-33
http://dish.andrewsullivan.com/2014/05/06/everyone-knows-when-youre-faking-it/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00077.warc.gz
en
0.951075
215
2.703125
3
The Mass Communication Foundations (MCF) - Visual Documentation is a dual discipline course teaching practical concepts and skills needed by visual information specialists to capture still imagery and motion video in uncontrolled environments such as expeditionary, humanitarian and other contingency operations. Students learn and apply hands-on techniques for documentation and communication of Department of Defense (DOD) themes and messages. This imagery is a fundamental tool for strategic and operational planning and decision-making by DoD leadership. Instruction includes training on techniques for documenting legal and battle damage; capturing investigative, medical and intelligence imagery; using a camera with night vision equipment; and different methods of transmitting imagery in an operational environment. Students also learn the strategic role of photographers and videographers deployed in various operational environments, using an Operations Order and how to prepare and After-Action Report. Students will develop and apply their skills by completing several scenario-based individual and group exercises. Each scenario is designed to challenge students’ decision-making and problem-solving skills. Students prepare mission strategy worksheets from operation briefings to plan their imagery requirements to meet strategic objectives. Students will be expected to complete post-production tasks and transmit imagery within established time constraints. In the capstone event, students will apply their learning to a multi-day uncontrolled action performance exam involving multiple scenarios. Each student will use their imagery from this exercise to prepare and present a mission debrief, and compile a portfolio and demonstration reel of their coursework. Each student will receive feedback and critique on their presentation. This course consists of both still photography and videography instruction. By Memorandum of Agreement, select service members may participate in parallel tracks for either still photography or videography. Students enrolled in parallel tracks will complete all training concurrent with students enrolled in the dual discipline course. All resources supporting the concurrent tracks are the same as those listed in the Course Design Resource Estimate in this document. Location: 6500 Mapes Road, Ft. Meade, Md.
<urn:uuid:d02e72d5-2318-4b93-8713-1f95fba31f68>
CC-MAIN-2022-33
https://www.dinfos.dma.mil/Academics/DINFOS-Course-Catalog/DINFOS_MCF_VD/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00270.warc.gz
en
0.931401
397
2.40625
2
The current and future executive directors of the Equal Rights Center (ERC), Rabbi Bruce Kahn and Donald Kahl, are intent on debunking the myths about their Washington, D.C.-based nonprofit. Though the multifamily industry only knows about the ERC from its major lawsuits, Kahl, who stepped into his role in August, says that litigation is only a small part of what the ERC does. In fact, he says most of the ERC's time is spent on research, education, outreach, and counseling. And any settlement money is used for those purposes. For instance, Kahl says it has used money in the past to hire a full-time attorney and to develop knowledge databases. “The ERC does not look at litigation as a profit center,” Kahl says. “Unfortunately, there are situations where there's no choice. When that happens, there is an economic affect on the organization. It may be good, or it may not be.” Kahl and Kahn use that logic to justify some of the money the organization has collected in its high-profile settlements. After settling with REIT Archstone-Smith in June 2005, six months after filing the original lawsuit, the ERC received $1.4 million in damages, attorneys' fees, and litigation expenses. “If you spend six months negotiating, the legal costs go up tremendously,” Kahl says. “This notion that we're this money-hungry group is absolutely, 100 percent, profoundly absurd.” The non-profit contends that its funding mainly comes from contributions and grants. In 2006, the year it filed suits against Post Properties and Equity Residential, the ERC received $220,000 in grants from the U.S. Department of Housing and Urban Development (HUD), which uses private firms under the Fair Housing Initiatives Program as educators and enforcers of fair housing laws. But when it brought more suits in 2007, the ERC received no HUD funds. Kahn says the agency ran out of money for its particular grant that year and ran into more problems in 2008. “For 2008, our application for a three-year grant was not reviewed due to a technical error by HUD,” Kahn says. “We did not pursue it because there was already so much other work on our plate. We have applied for a HUD education and outreach grant for 2009.” HUD, which invited Kahn to present at its biennial National Policy Board Meeting, declined to comment on those specific years. But Bryan Greene, deputy assistant secretary for enforcement and programs in HUD's Office of Fair Housing and Equal Opportunity, says that to receive HUD funding, a group must show need in the community. “We don't look to see how active you've been,” Greene says. “There may be some situations where funding is needed simply because there hasn't been a fair housing group in their community.
<urn:uuid:6b92be98-3779-4794-8333-9750c3096c55>
CC-MAIN-2017-04
http://www.multifamilyexecutive.com/property-management/the-money-trail_o
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00222-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97764
604
1.617188
2
The German Navy has released new video showing the 5 April 2010 hijacking of the German containership MV Taipan by pirates some 500 miles off the Somali coast. In the video, filmed by a naval helicopter from the Dutch frigate HNLMS Tromp German P-3C Orion maritime surveillance aircraft, you can see a pirate skiff approach the vessel at high speed as the crew tried to ward off the attack using fire hoses and barbed wire. Later in the video, you can see pirates aboard two skiffs were able to board the vessel as it sat dead in the water. The MV Taipan is the same ship seen in the below now-classic clip showing Dutch marines storming the ship and arresting the pirates just hours after the initial hijacking. We know from reports back in 2010 that the crew was able to muster in a citadel and cut power to the ship. As it turns out, the video here and the aircraft surveillance provided the intel the boarding team needed, such as the pirates’ locations and proof that the crew was likely hiding in a citadel, in order to regain control of the ship without harm to crewmembers. All 15 crewmembers were later found unharmed, hiding in the ships citadel. No word on why the video is just now being released.
<urn:uuid:063ea3d6-e01a-4a0c-9c4c-e46b0f00ba06>
CC-MAIN-2017-04
http://gcaptain.com/new-video-shows-2010-mv-taipan-hijacking-by-somali-pirates/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00266-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962012
273
1.601563
2
ClassDojo is a tool that helps teachers, especially those with younger learners, deliver feedback on student performance to students and parents. It popped up on my radar again recently and I was surprised to discover that I had not yet written anything up on it yet, so let’s see what it is all about. ClassDojo can be used as both a website or an app, which is available for both Android and iOS devices, thus making it very versatile. For today’s purposes, I will mostly be examining it through the website. The main page has a nice introductory video and a summary of all the things that you can do with ClassDojo. For students, for example, you can encourage them and track their progress, while for parents, you can send messages, images, and announcements with read receipts so that you know who has seen the information. Additionally, the home page has testimonials and promotes the fact that ClassDojo is completely free for teachers. Based on the overall design of ClassDojo, you can immediately tell that, like GoNoodle, it is really geared towards younger learners, probably K–6. To get started, you have to register for an account. To do that, click “Sign up” and choose “Teacher.” Then complete the form with your name, email address, and password. That is it! Now you are ready to explore all that ClassDojo can do. The first step is really to experiment, which you can do by working from your dashboard and playing around with the demo class that is provided for you. Then you will want to create your own classes and add your students to them. Finally, if you run into any issues, read through the tips that are available on the website or even visit YouTube to find tutorials. I have found some excellent reviews and tutorials created by educators on all sorts of resources, so YouTube has become my go to for learning new things. When you are viewing a class in ClassDojo, you will see that the main features are arranged under three tabs. The first one is Classroom. In Classroom you can award plus points to students or groups of students for positive actions and give them minus points for inappropriate classroom behavior. Use points as a way of instantly communicating with students that they are doing a great job on and where they need to improve. Using ClassDojo will allow you to quickly provide this feedback, so that you can focus more on teaching and less on classroom management during class time. Review the reports outside of class to help you spot trends on class and individual performance. The second tab is Class Story, which resembles a simplified version of a Facebook profile. This is what you use to share what is going on in your class. The last tab is Messages, where you can communicate directly with parents. Use the data from reports to tailor your feedback for parents throughout the year. ClassDojo seems pretty awesome, but you do not have to take my word for it. Visit Graphite to read a review where it is ranked four out of five stars (by teachers). There are also over 100 reviews from teachers that use ClassDojo, so you can see what other educators are saying about it. If you have already started using ClassDojo, leave a review on Graphite while you are there to help other educators considering adopting it—and/or leave one here! How would you use ClassDojo? Leave a comment below to share your thoughts and experiences with this and other similar tools.
<urn:uuid:f4d59a46-e197-4df2-8b88-add2e4f0b08d>
CC-MAIN-2022-33
http://blog.tesol.org/classdojo-for-feedback-and-communication/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00665.warc.gz
en
0.968232
720
1.773438
2
By Fares Akram and Joseph Krauss Gaza City: Israel killed a string of senior Hamas military figures on Wednesday and pounded three multi-storey towers as it hammered the Gaza Strip with airstrikes and militants in the territory fired rocket barrages. Dozens have died in the worst violence since a 2014 war, with no resolution in sight. The fighting has taken on many hallmarks of that devastating 50-day conflict between Israel and Hamas, but with a startling new factor: a burst of fury from Israel’s Palestinian citizens in support of those living in the territories as well as counter-violence by Jewish Israelis. In response, Israel deployed border guards in two mixed Arab-Jewish cities that saw unrest in previous days, including the burning of a Jewish-owned restaurant and a synagogue, the fatal shooting of an Arab man and attacks on Arab-owned cars. It was a rare use of the paramilitary force, which normally puts down protests by Palestinians in the West Bank and east Jerusalem. Palls of gray smoke rose in Gaza, as Israeli airstrikes struck apartment towers and blasted multiple Hamas security installations. In Israel, hundreds of rockets fired by Gaza’s Hamas rulers and other militants at times overwhelmed missile defences and sent air-raid sirens and explosions echoing across Tel Aviv, Israel’s biggest metropolitan area, and other cities. The death toll in Gaza rose to 53 Palestinians, including 14 children and three women, according to the Health Ministry. At least 320 have been wounded, including 86 children and 39 women. Seven have been killed on the Israeli side by rocket fire, including the first death of an Israeli soldier in this round of conflict. The other deaths have been civilians, including three women and two children, one of them a 6-year-old killed in a rocket strike on an apartment building in city of Sderot. Dozens in Israel have been wounded. There was no sign that either side is willing to back down. Prime Minister Benjamin Netanyahu has vowed to expand the offensive, saying it “will take time”. Hamas has called for a full-scale intifada, or uprising. The last such uprising began in 2000 and lasted more than five years. The latest eruption of violence began a month ago in Jerusalem, where heavy-handed police tactics during the Muslim holy month of Ramadan and the threatened eviction of dozens of Palestinian families by Jewish settlers ignited protests and clashes with police. A focal point was the Al-Aqsa Mosque compound, a site sacred to Jews and Muslims. Hamas, claiming to be defending Jerusalem, launched a barrage of rockets at the city late on Monday, escalating the ground tensions into a new Israel-Hamas punching match. Since then, militants have fired more than 1050 rockets from Gaza, according to the Israeli military, and Israel has conducted hundreds of strikes in the tiny territory where 2 million Palestinians have lived under a crippling Israeli-Egyptian blockade since Hamas took power in 2007. Two infantry brigades were sent to the area, indicating preparations for a possible ground invasion. On Wednesday, Israel stepped up its targeting of Hamas’ military wing. The military and internal security agency said they carried out a “complex and first-of-its-kind operation” that killed the Hamas commander in charge of Gaza City, the highest-ranking Hamas military figure killed by Israel since 2014, and several other senior militants involved in rocket production. Israel has struck 350 targets and killed at least 30 militants since Monday night, 14 of them on Wednesday, Israeli military spokesman Lieutenant Colonel Jonathan Conricus said. In one of the fiercest attacks, Israeli fighter jets dropped two bombs on a 14-storey building in Gaza City, collapsing it. The building, located on the busiest shopping street in the Roman neighbourhood, housed businesses in addition to offices for Hamas’ Al-Aqsa satellite channel. Airstrikes also brought down a 12-storey office building that housed Hamas offices as well as other businesses, and heavily damaged a nine-storey building with residential apartments, medical companies, a dental clinic and, Israel said, Hamas intelligence offices. In both cases, Israel fired warning shots, allowing people to flee. Soon after, Hamas fired 100 rockets at the Israeli desert town of Beersheba in what it said was retaliation. Samah Haboub, a mother of four in Gaza, said she was thrown across her bedroom in a “moment of horror” by an airstrike on an apartment tower next door. She and her children, ages 3 to 14, ran down the stairway of their apartment block along with other residents, many of them screaming and crying. “There is almost no safe place in Gaza,” she said. One strike hit a taxi in Gaza City, killing a man, woman and driver insider, and a second strike killed two men nearby on the street, witnesses who brought the bodies told The Associated Press at the hospital. Several other bystanders were wounded. In the Israeli city of Lod, a 52-year-old Arab Israeli citizen and his 16-year-old daughter were killed when a rocket from Gaza hit the courtyard of their home. An Israeli soldier was killed in a strike by an anti-tank missile from Gaza. The Jerusalem turmoil and the ensuing battle come at a time when the long-stalled Israeli-Palestinian peace process is virtually non-existent, fuelling Palestinian frustration. It has been seven years since the two sides held formal negotiations. Israel’s political scene pays little attention, and the peace process was hardly an issue in the country’s recent elections. Arab nations, including several that recently reached normalisation deals with Israel, rarely push for any resolution. The result has left the nearly 5 million Palestinians in the West Bank, Gaza Strip and east Jerusalem living in a limbo. Now the recent fighting has unleashed protests in Arab communities in Israel. “An intifada erupted in Lod, you have to bring in the army,” the central Israeli city’s mayor, Yair Revivo, said. Lod saw heavy clashes after thousands of mourners joined a funeral for an Arab man killed the previous night, the suspect a Jewish gunman. With the deployment of border guards in Lod and the coastal city of Acre, Netanyahu warned that he was prepared to use “an iron fist if necessary,” and urged Arab Israeli leaders to bring calm. Still unclear is how this new outburst of fighting will effect Netanyahu’s political future. He failed to form a government coalition after inconclusive parliamentary elections in March, and now his political rivals have three weeks to try to form one. The longer the fighting drags on, the more it could hamper their attempts at a coalition. It could also boost Netanyahu if yet another election is held, since security is his strong suit with the public. Israel and Hamas have fought three wars since the Islamic militant group seized power in Gaza from rival Palestinian forces. The conflicts ended after regional and international powers persuaded both sides to accept an informal truce. Israel faced heavy criticism over the bombing of residential buildings in Gaza during the 2014 war, one of several tactics that are now the subject of an investigation by the International Criminal Court into possible war crimes. Israel is not a member of the court and has rejected the probe. In a brief statement, ICC prosecutor Fatou Bensouda said she had noted “with great concern” the escalation of violence and “the possible commission of crimes under the Rome Statute” that established the court. Conricus, the military spokesman, said Israeli forces have strict rules of engagement, follow international laws on armed conflict and are trying to minimise civilian casualties. But Israel has said it has no choice because Hamas fires rockets from residential areas. Hamas has also come under international criticism over its indiscriminate rocket fire at Israeli population centres. What in the World A note direct from our foreign correspondents about what’s making headlines around the world. Sign up for our weekly newsletter here.
<urn:uuid:3f7338c3-11b9-4930-afac-f4bdadad8640>
CC-MAIN-2022-33
https://www.smh.com.au/world/middle-east/escalating-violence-bears-hallmarks-of-gaza-war-20210512-p57rcx.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00469.warc.gz
en
0.965795
1,650
1.570313
2
The V International Conference on Particle-Based Methods (PARTICLES 2017) will be organised on 26 - 28 September 2017 in Hannover, Germany. The four previous conferences on this series were held in Barcelona on 25-27 November 2009 and 26-28 October 2011, in Stuttgart on 18-20 September 2013, and in Barcelona on 28-30 September 2015. PARTICLES 2017 will address both the fundamental basis and the applicability of state-of-the-art particle-based computational methods that can be effectively used for solving a variety of problems in engineering and applied sciences. The denotation "Particle-Based Methods" basically stands for two different computational models in solid and fluid mechanics. On the one hand it represents discretization concepts in which the response of a continuum is projected onto "particles" carrying the mechanical information during deformations. Typical representatives are Meshless Methods, Smoothed Particles Hydrodynamics (SPH), Moving Particle Simulation (MPS), Particle Finite Element Method (PFEM), Material Point Method (MPM) and the Lattice-Boltzmann-Method (LBM). On the other hand the notion expresses the computational representation of physical particles existing on different scales. Classical versions are Molecular Dynamics (MD) or the Discrete (Distinct) Element Method (DEM). Here either the particles exist a priori like in granular matters or they evolve during the loading process. In some cases the two models of discretization and physical particles are even interconnected. PARTICLES 2017 covers both concepts because of their strong interrelation in their computation as well as application point of view.
<urn:uuid:22675a39-cab6-42fb-8200-d2d23366639e>
CC-MAIN-2022-33
http://congress.cimne.com/particles2017/frontal/Objectives.asp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00070.warc.gz
en
0.908036
358
1.765625
2
AMARI AIR BASE, Estonia -- Lessons learned in the foothills of Colorado are taking flight in the Baltic Sea nation of Estonia. “I’m not a dreamer who thinks that Estonia will have a big strike air force. That is not something that 1.3 million taxpayers can sustain,“ said Lt. Col. Jaak Tarien, chief of staff of the Estonian air force and a 1998 graduate of the U.S. Air Force Academy in Colorado Springs, Colo. “But we are in NATO for a reason and we are a true partner in NATO.“ Tarien made the comments in an interview with a U.S. Air Force public affairs specialist as about 150 U.S. airmen were staying and operating at his country’s Amari Air Base, an air readiness center that had its first test as a fully-operational tactical air base during the exercise in June. Asked what he learned at USAFA that has been most helpful to him in his military career, Tarien does not pause: “I learned that we have good allies.“ As the chief of staff of the Estonian air force, Tarien is the second in command of the 300-person force. The word around Estonia is that he is in line to become the commanding general of the Air Force later this summer. Not bad for a former law student who learned about opportunities for exchange students at the U.S. service academies by seeing an ad in a newspaper in Tallinn, the capital city of Estonia. Each of the U.S. service academies allow a small handful of students from allied nations to attend the academy on an exchange program each year. The exchanges promote partnerships and build alliances between the U.S. and various nations around the world. The year Tarien entered the Air Force Academy, 1994, was the first year that Estonia was invited to submit a candidate to compete for a spot at the prestigious institution. “There I was in Colorado. And my English was, um,“ he shrugs and pauses, “so and so,“ he says with a smile. “The first days I was there, many of my classmates were under a lot of stress with the yelling and the push-ups. Perhaps being away from home for the first time. I felt like I was in a movie. I was constantly excited. The first three months or so I was at the Academy, I could not believe that I was actually living that life, it seemed just like an exciting movie," said Tarien, who spent two years as a Black Panther in Cadet Squadron 29 and then was in the Dirty Dozen of Cadet Squadron 12. After graduating from USAFA, Tarien returned home to Estonia and was assigned to a major’s billet, working in air surveillance. At the time, there were only 90 people in the entire Air Force and the country was only a half dozen years removed from being part of the Soviet Union. Estonia gained independence in 1991. Since then, Tarien has worked in several positions as his country’s military has grown. Joining NATO in 2004 was a key moment, he said. “No one wants a war with NATO. We do not anticipate a war. We are concerned, however, about a strategic miscalculation by some country,“ Tarien said. “We work closely with NATO and want no one to make a doubt that we are a partner with NATO, in case there is a strategic miscalculation.“ Tarien said Estonia’s goal is to continue to work actively with Latvia and Lithuania in an air surveillance partnership and to be able to provide an air field and the logistical support that can allow other NATO partner countries to project air power from Estonia, if such a contingency is needed. “That is the power of the NATO partnership,“ Tarien said. “Many allies working together.“ That’s a lesson Tarien first learned in Colorado Springs in the 1990s. “There I learned that the American military is people who are willing to stand up for what they believe in, to stand up for what is right.“ Tarien says he learned that in Colorado Springs – along with a lot of chemistry and math and history. “It was a well-rounded education that we did not always appreciate as cadets, that we made many comments about it,“ he said. “But all of it has helped me to understand the world, to see the big picture, to gain understanding, to be a better officer in my Air Force.“ This work, USAF Academy grad helps lead Estonia air force, by TSgt Daniel Heaton, identified by DVIDS, is free of known copyright restrictions under U.S. copyright law.
<urn:uuid:e6bc9765-de00-490f-bedc-2219d09c9676>
CC-MAIN-2017-04
https://www.dvidshub.net/news/90040/usaf-academy-grad-helps-lead-estonia-air-force
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00124-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976691
1,003
1.53125
2
You might read a headline once in a while about a Miami car accident caused by a motorist falling asleep at the wheel, but you would probably never expect to be personally involved in a drowsy driving crash. Unfortunately, statistics reveal that fatigue is common among drivers and it can be a key factor in serious accidents. The Governors Highway Safety Association (GHSA) estimates that there are around 328,000 drowsy driving collisions every year in the US; approximately 6,400 of these incidents were deadly and another 109,000 caused injuries to at least one person. However, GHSA notes that there is some margin of error on fatigued driving crashes figures due to reporting issues. If you or a loved one was involved in a drowsy driving collision, it is important to consult with a Miami car accidents attorney right away about your legal options. Plus, some information on the dangers may help you avoid becoming a victim. The Dangers of Drowsy Driving Lack of sleep adversely affects a driver’s ability to safely operate a vehicle in a number of ways, including slowed reaction time, impaired decision-making, and lapses in attention. In fact, GHSA points out that driving while fatigued is similar in some ways to drunk driving. For instance: - Going without sleep for 24 hours is the equivalent to driving with a blood alcohol concentration (BAC) of .10%; - Driving after not sleeping for 21 hours is approximately the same as operating a car while at Florida’s legal drunk driving limit of .08%; and, - Driving after staying awake for 18 hours puts a motorist at a BAC of .05%. Why Motorists Fall Asleep at the Wheel It is easy to say that lack of sleep is the primary cause of fatigued driving crashes, since more than one-third of Americans do not get the recommended seven to nine hours of sleep per day. However, drowsy driving can be a product of many other underlying factors, one of the most common of which is alcohol consumption. In addition, a motorist may also fall asleep or nod off behind the wheel due to: - Road Trips and Long Drives: The monotony of the road, especially in rural conditions, can lead a diversion of the driver’s attention. Stretches of highway can put a motorist into a daze or trance, leading to dozing off. - Medical Conditions: Even when a person gets sufficient sleep, some drivers suffer from undiagnosed sleep disorders, such as narcolepsy and sleep apnea. - Stress: Anxiety sometimes does not go away at night, so it can disrupt normal sleep patterns – especially REM sleep that provides the brain with effective rest time. It can then affect a person during waking hours. Our Miami Auto Accidents Lawyers can Explain Your Rights Getting hurt in any type of motor vehicle crash can be devastating, so you may be relieved to know that there are legal remedies for victims. You may be able to recover compensation for your losses, and our team at Gerson & Schwartz, PA can assist with the process. For more information, please contact our offices in Miami, Fort Lauderdale, or West Palm Beach, FL to schedule a free case evaluation.
<urn:uuid:4df993ee-1996-40b2-a241-7b0ecb12e777>
CC-MAIN-2022-33
https://www.miamiinjurylawyerblog.com/the-extreme-dangers-of-drowsy-driving-in-miami/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00278.warc.gz
en
0.952539
668
2.484375
2
Content of the material - How Conventional Vehicle Batteries Work - Battery Light FAQs - What Does It Mean When the Battery Light Comes On? - Is It Safe to Drive My Car With the Battery Light On? - What Do You Do When the Battery Light Comes On? - How Can You Tell If It’s the Battery or the Alternator? - Will a Car Start With a Bad Alternator? - 3 FAQs About Battery Light Activation - 1. How Does A Vehicle Battery Work? - 2. What Does The Battery Light Do? - 3. Is It Safe To Drive With My Battery Light On? - What Is a Car’s Charging System? - Is it safe to drive with the alternator warning light on? - What to Do When Your Car Battery Light Is (Still) On How Conventional Vehicle Batteries Work Batteries are used to store energy to keep the vehicle and its power accessories working. Chemical energy stored in the battery is how the vehicle can be started initially and then as it runs, the battery is recharged. Recharging happens when the crankshaft pulley turns the alternator belt (also known as serpentine belt or accessory belt) which spins a rotor inside the alternator (which is sometimes referred to as a generator). The alternator takes kinetic energy from the rotating pulley and converts some of this energy into AC power, which is then converted into DC current and stored in the battery. This energy is then used to power things such as headlights, power windows, heated seats, radio, air conditioner, DVD players, and cell phone chargers. Note: Older vehicles may use a dynamo (also called a DC generator) instead of an alternator. The voltage regulator maintains the desired voltage while charging the battery. It is often a component of the engine control unit (ECU). The current (made of electrons) flows from one post of the battery, through the accessories, then into the other battery post. Various wires around the engine bay called ground straps connect parts of the wiring harness to the chassis, which help complete different circuits. Battery Light FAQs You have the questions, The Drive has the answers! What Does It Mean When the Battery Light Comes On? It means there’s an issue with the vehicle’s charging system, which includes the battery, the alternator, the wires, and the ECU. Is It Safe to Drive My Car With the Battery Light On? If something in the vehicle’s charge system isn’t functioning properly, there is risk of the car shutting off without warning. It’s also possible that if the vehicle dies, it might not be possible to start it back up. Because of this, we do not recommend or suggest driving with the battery light on to any place other than back to your house or a service center. If the light comes on before driving, we do not recommend driving. What Do You Do When the Battery Light Comes On? Slowly drive your car home, to a service center, or to an auto parts store. Then, diagnose and fix. How Can You Tell If It’s the Battery or the Alternator? Use a multimeter to check the voltage on both the battery and alternator to verify they’re functioning at the correct levels. Will a Car Start With a Bad Alternator? It is possible for a car to start with a bad alternator, but it will likely immediately die. 3 FAQs About Battery Light Activation Here are answers to the three most commonly asked questions related to car battery light activation: 1. How Does A Vehicle Battery Work? A vehicle battery stores and converts chemical energy into electrical energy (electricity). Usually, your car battery would contain a set of six electrochemical cells that generate a total of 12 Volts. The vehicle’s battery powers the ignition system, air conditioner, interior lights, power windows, and more. Essentially, the battery brings to life the different electrical components in your vehicle! But won’t the battery run out of juice from powering so many things? Typically, it wouldn’t. And it has to do with how your vehicle’s battery system works: - Once the battery starts your engine, a component known as the crank pulley uses the power generated by your engine to turn the alternator belt or serpentine belt - This alternator belt then spins your alternator, power steering pump, and more to generate kinetic energy - The alternator then converts this kinetic energy into electrical energy - And the electrical energy is used to charge your vehicle’s battery, power your interior lights, and do so much more In short, once the engine is fired up, the vehicle’s battery usually has the means to charge itself. 2. What Does The Battery Light Do? Every time you start your car, the dashboard lights come on. This includes the check engine light, brake light, coolant warning light, power steering light, the battery dashboard warning light, etc. And, in a few seconds, these lights would go off. However, if the car battery light (aka charging system light or battery indicator light) doesn’t turn off for some reason and stays on while you’re driving, you might have a problem on your hands. The battery light staying on is your vehicle’s way of indicating that there are issues with the: - Battery voltage or battery power that’s generated - Battery charging system - Electrical system or electrical components, etc. 3. Is It Safe To Drive With My Battery Light On? While it could be possible to drive your car with the battery light on, we advise against it. Chances are that your vehicle’s battery is running on whatever juice was left from the last battery recharge cycle. But there’s a high chance that the battery power will get drained entirely, and your engine may stop running. Essentially, you might not be able to drive for very long with the battery indicator light on. Moreover, if you turn off your engine, you may be unable to restart the ignition system without: - Jump starting your battery with jumper cables - Fixing the underlying issue causing the car battery light to come on - Or getting a new battery for your vehicle What Is a Car’s Charging System? A modern vehicle’s charging system, which functions to keep the battery charged, includes a battery, wiring, an alternator, and the electronic control unit (ECU). Older vehicles also had a voltage regulator. Alternator: The alternator accepts mechanical energy from the engine and turns it into electrical energy to power accessories and charge the battery. Battery: The battery provides energy to start the vehicle and to power its electronics. ECU: The electronic control unit, not to be confused with the engine control unit, is a device that manages the linked electronic system. It regulates where, when, and how power is held or flowing. Is it safe to drive with the alternator warning light on? When this light is illuminated, your car is still somewhat safe to drive as you will have enough battery power to run the engine. However, it is still dangerous to continue driving for long distances or at high speeds as the battery will run out of juice and the car will be harder to stop without the assistance of the engine. If you are on the freeway and this light comes on, you should pull off the freeway and move to lower speed areas as soon as possible. What to Do When Your Car Battery Light Is (Still) On You’ve checked for and cleaned off any corrosion, and you’ve tightened up any loose battery cables. But your battery light is still on?! The culprit could be a mechanical issue, like a problem with the alternator or voltage regulator. Or, it could be something systematic, like faulty wiring. What’s next? Head to Firestone Complete Auto Care for a fast and free battery check. We’ll take a look at your battery’s health, then recommend repairs or a new battery if needed. Don’t get stranded because of battery issues! Find your nearest Firestone Complete Auto Care today and recharge your peace of mind.
<urn:uuid:42944996-0047-45ab-bbd4-604cfe0c16a2>
CC-MAIN-2022-33
https://avtograd-yar.ru/auto/what-does-the-alternator-warning-light-battery-warning-light-mean/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00473.warc.gz
en
0.914002
1,756
3.28125
3
- The Barnes Foundation - Good lord, that's an awful painting. It lives at the Barnes Foundation in Philadelphia. As I've written before, Renoir painted fruit well, and he painted women. Problem is, he painted women like fruit. Exhibit A above. So I was none too excited by the prospect of reviewing Renoir, the new film. But! My review: There would appear to be nothing promising in a film that takes place when Renoir is creating his late nudes on the sunny French Riviera: They are kitsch for repressed pervs. Renoir is one of the most uneven artists in the history of brush to canvas. But Renoir, this new feature film by Gilles Bourdos, is actually interesting. It begins with the death of his wife, and throughout, women are far more than pretty subjects for looking at. It’s 1915, the war is ongoing, and Renoir’s injured son Jean—the eventually famous film director—comes home to convalesce. He meets Renoir’s beautiful red-haired nude model, the woman who eventually becomes Jean’s leading actress and first wife. What happens onscreen involves dappled light, yes, and a hallowed painter, but also delicately, and in few words and not too much melodrama, raises the subjects of art’s place in wartime, the early tension between painting and cinema, and the power and variety of women despite their regular flattening into a crew of fleshy nudes. Yay for the closing credits, an encouragement to seek out the real-life films that feature said model, Catherine Hessling. She died an unknown; she’s less so now. Here's a clip of Catherine Hessling. She just got such good roles! Um...
<urn:uuid:8d50c7d1-ac3c-437a-b52b-4e71ce733b83>
CC-MAIN-2017-04
http://www.thestranger.com/slog/archives/2013/05/02/renoir-the-new-movie-better-than-renoir-the-painter
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00049-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96672
373
1.523438
2
Arteriovenous malformations (AVMS) are tangles of dilated, thin-walled blood vessels that occur anywhere within the brain or on the dura mater (the covering of the brain). If an AVM ruptures, it can cause a stroke, brain damage, or death. AVMs occur in less than 1 percent of the population (300,000 Americans) and are more common in males than in females. On average, there is a 1% per year likelihood of intracranial bleeding. Patients can have no symptoms or may present with headaches, seizures, or progressive neurological loss of function. If a hemorrhage occurs, the patient may experience severe headache, stroke-like symptoms, or loss of consciousness. Upon arrival to the hospital, patients will be stabilized, undergo CT and be admitted to the intensive care unit. An angiogram is often performed to identify if there are any urgent attributable risk factors for bleeding that merit earlier rather than later treatment, such as an associated aneurysm. Treatment of AVMs may include observation, embolization, radiation treatment or surgical excision. In many cases, embolization is used to decrease the blood supply to the AVM to make it safer for a more definitive treatment such as surgical excision or radiation treatment. Before a patient is treated he or she may undergo a series of tests such as MRI, functional MRI, CT, and CT angiography. A multidisciplinary team of physicians including a neurointerventionalist, neuroradiologist, neurosurgeon, and stroke neurologist carefully review this data to propose the best plan. Embolization Treatment of AVM Embolization is performed under general anesthesia. An artery in the groin is accessed with a catheter, and brought up to the neck to take pictures of the arteries going to the brain. Using this map, a smaller catheter is placed through the guide catheter in the neck, and navigated into the arteries supplying the AVM. Liquid embolic agents are then injected, such as ONYX or N-butyl cyanoacrolate in a mixture with radio-opaque material. This process is repeated after which the catheters are removed. The patient is awakened from anesthesia and transferred to the Neurointensive care unit for careful monitoring of his or her blood pressure and neurological condition. Patients are usually in the hospital for elective procedures for 3 days. Blood flow to the AVM may be treated in stages to prevent thrombosis or hemorrhage from occurring. In some cases, embolization alone may fully treat a lesion, but most patients will require adjunctive surgical resection or radiation therapy. The Spetzler Martin Grading Scale estimates the risk of open neurosurgery for a patient with AVM, by evaluating AVM size, pattern of venous drainage, and eloquence of brain location. A Grade 1 AVM would be considered as small, superficial, and located in non-eloquent brain, and low risk for surgery. Grade 4 or 5 AVM are large, deep, and adjacent to eloquent brain. Grade 6 AVM is considered not operable. Note however, that this scale does not necessarily correlate with risk of treatment by embolization or radiosurgery. Size of AVM Small (<3 cm) 1 Medium (3-6 cm) 2 Large (>6 cm) 3 Noneloquent site 0 Eloquent site* 1 *Sensorimotor, language, visual cortex, hypothalamus, thalamus, brain stem, cerebellar nuclei, or regions directly adjacent to these structures. - Spetzler RF, Martin NA. A proposed grading system for arteriovenous malformations. J Neurosurg 1986;65:476-83. - Iancu-Gontard D, Weill A, Guilbert F, Nguyen T, Raymond J, Roy D. Inter- and intraobserver variability in the assessment of brain arteriovenous malformation angioarchitecture and endovascular treatment results. Am J Neuroradiol 2007;28(3):524-7.
<urn:uuid:6fc28e85-d5c1-4357-9f5a-935af600d99a>
CC-MAIN-2022-33
https://www.bmc.org/stroke-and-cerebrovascular-center/services/arteriovenous-malformations-avms
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.908722
880
2.890625
3
Using Talk to Support Writing presents a new and innovative approach to the teaching of early writing. The authors discuss both theoretical and practical issues around using talk in the classroom to support children as they learn to write. Set within the context of national concern for achievement in the development of writing ability, it addresses the gap in understanding early teaching and focuses on the exploration of talk and writing interface. Chapter 8: Managing Talk for Writing in the Classroom Managing Talk for Writing in the Classroom So far in this book we have considered what previous research has shown us about the relationship between talk and writing. We have looked at how undertaking research can help you in your role, whether as a class teacher or otherwise involved in working in schools. We have also looked very carefully at how the three different strategic elements of talk worked with children in the classroom. We have examined how this talk can come through in their writing and we have also reported what children told us about what they think about writing. For the final chapter, the focus turns to the teacher. We worked with six excellent teachers on the project. ...
<urn:uuid:a758f09c-067b-4147-a14d-856f56bd9cb0>
CC-MAIN-2022-33
https://sk.sagepub.com/books/using-talk-to-support-writing/n8.xml
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00276.warc.gz
en
0.978415
235
3.515625
4
JOHNSTON, R.I. USA—Although the pandemic continues to dominate the world’s attention, risks related to the changing climate are never far from the minds of businesses and their risk managers, especially with spring flood season upon North America as well as hurricane and wildfire season just around the corner. Dr. Louis Gritzo, vice president and manager of research and Katherine Klosowski, vice president and manager of natural hazards at FM Global, one of the world’s largest commercial property insurers, will explore those challenges in a 60-minute virtual session titled Climate Risk and Your Path to Resilience. The session will be held on Tuesday, April 20 from 1–2 p.m. ET, as part of the upcoming RIMS LIVE 2021 Annual Conference. A recording of the educational workshop will be accessible online to all conference attendees for 60 days. The virtual session will examine how climate risk plays out in different ways in different regions where a company may have critical dependencies. Attendees will gain the latest insights into how climate risk is changing the impact natural hazards can have on their organizations and deepen their understanding of what is the credible science worth paying attention to in order to inform their climate-related risk management decision making. Additionally, attendees will discover the most effective ways to help preserve their businesses’ value and resilience and the practical solutions that can safeguard their organizations’ bottom line against the damage a changing climate may cause. For more information on protecting property from a changing climate, visit fmglobal.com/climaterisk. About RIMS LIVE RIMS, the world’s largest society of risk managers, has transformed its annual conference into a 10-day virtual event scheduled from April 19-30, bringing more than 100 hours of education, advanced network-building capabilities and more to the world’s risk management community. Register here. About FM Global Established nearly 200 years ago, FM Global is a mutual insurance company whose capital, scientific research capability and engineering expertise are solely dedicated to property risk management and the resilience of its client-owners. These owners, who share the belief that the majority of property loss is preventable, represent many of the world’s largest organizations, including one of every three Fortune 1000 companies. They work with FM Global to better understand the hazards that can impact their business continuity in order to make cost-effective risk management decisions, combining property loss prevention with insurance protection.
<urn:uuid:82e00752-ee58-47c1-abbb-0d9863449b69>
CC-MAIN-2022-33
https://newsroom.fmglobal.com/releases/fm-global-to-host-virtual-session-on-climate-risk-and-your-path-to-resilience-at-rims-live-2021-conference-tuesday-april-20
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00266.warc.gz
en
0.936568
505
1.976563
2
"From the Heart of the Qur'an Belt" Carl W. Ernst Religious Studies News, May 2003 Last summer, the oldest public university in America was sued for requiring students to read a book. The lawsuit seeking to block the assignment was dismissed on appeal, for sound constitutional reasons. After reading the book over the summer, 2260 first-year students met on August 19 for one 2-hour session to discuss Michael Sells' Approaching the Qur’an. The “required” sessions went off smoothly, without assigning grades or taking attendance, while dozens of news reporters crawled over the campus seeking sound bites. Students wondered what all the fuss was about. What was really going on in this controversy? When the Summer Reading Program Committee at UNC asked me if there was a good translation of the Qur'an that would be suitable for its program, I immediately thought of Michael Sells' translation of the short suras from the end of the Qur’an. If this particular book were not available, I cannot think of any other translation of the Qur'an that I would have recommended to assign to our incoming students. As I thought over the obvious pedagogical reasons for this choice, it occurred to me to wonder whether the selection might prove controversial, but at the time, that seemed a remote possibility. To my surprise, there was significant resistance among some students and faculty on the committee to a translation of the Qur’an. The questions raised were phrased in terms of the difficulty of the text and its strangeness to most students, but there was a tension beneath these discussions that would soon be reflected in public debate. Eventually, however, the committee chose this book, although with a divided vote. What were the underlying issues? First, the conservative Virginia-based Family Policy Council initiated a lawsuit charging that a reading and discussion assignment involving a partial translation of the Qur’an amounted to proselytism, and was an attempt to convert students to Islam. This was an attack on the academic and comparative study of religion, going against well-established Supreme Court guidelines on teaching about religion (as opposed to teaching religion in religious communities). With considerable hypocrisy, this group accused UNC of violating the separation of church and state, though they made it clear they would welcome a reading assignment involving the Bible. Next, this controversy helped bring to the surface a strong current of anti-Muslim prejudice that had lain dormant since President Bush’s post-9/11 pronouncement that “Islam is not the enemy.” Quite clearly, there are many Americans who disagree with President Bush on that point. This anti-Muslim prejudice goes back to the middle ages, but has become especially virulent in the colonial encounters of the past two centuries. It has much in common with anti-Semitism and racism as a powerful form of bigotry, although it is much more acceptable in public today. Subsequent attacks on the Prophet Muhammad by well-known Christian fundamentalist leaders indicate that this entrenched bias will continue to be a major controversial theme in our immediate future. The Qur’an incident also revealed how dominant fundamentalist modes of thinking are today, not only within major religious traditions, but also in the interpretation of other religions; the attacks on Islam not only assumed that Muslim fundamentalists represent “true” Islam, but also applied (negative) fundamentalist interpretive techniques to the text of the Qur’an. But the attack on the summer reading program was actually launched by conservative commentators on Rupert Murdoch’s Fox News TV channel, demonstrating the important role of the news media in creating and sustaining stories about religious controversy. There was a wide range, however, of media reporting on this incident. Some journalists indulged in Muslim-baiting tactics; the host of Fox’s “O’Reilly Factor” program compared the Qur’an to Hitler’s Mein Kampf, which he also would have prohibited students from reading. As Sells has pointed out in a valuable summary on his web page (http://www.haverford.edu/relg/sells/UNC_ApproachingTheQur'an.htm), journalists for Time magazine and some major newspapers trivialized the issue, and certain conservative commentators blatantly and irresponsibly distorted the facts of the situation. On the whole, however, I found that most journalists recognized how close is the connection between academic freedom and freedom of the press. Many of them showed remarkable professionalism and insight, and it is particularly notable that local North Carolina journalists provided some of the most accurate and telling accounts of the entire episode. One of the best stories is an extended piece by the Religion and Ethics Newsweekly television program on PBS (21 August 2002). The UNC Qur’an story received its share of international attention as well, including a feature on the BBC radio news hour. The funniest story was on Comedy Central’s “The Daily Show,” in a hilarious piece by Mo Rocca. The other major public forum for this controversy was the state of North Carolina, which for many years has had a love-hate relationship with the flagship campus of the state university in Chapel Hill. UNC-CH Chancellor James Moeser from the beginning provided solid and unflinching support for the Qur’an selection, despite receiving a flood of mail, including many complaints about the assignment. The university did blink a bit, however, in mid-July, clarifying that students who found the assignment “offensive” could avoid reading the book, but that they should write a 1-page essay explaining why they could not do so. Those critics who wished to spare our freshman the shock of reading a non-Christian text evidently would have been surprised to learn that North Carolina requires the study of non-European religions in the junior high school social studies curriculum. The lawsuit against UNC galvanized the faculty by its threat of outside control of University. But when members of the UNC Board of Governors on Aug. 9 proposed a resolution affirming the principles of academic freedom, the measure failed to pass, ostensibly for technical reasons. A few days later, the UNC Faculty Council resoundingly passed a motion in favor of academic freedom. Simultaneously, the North Carolina House of Representatives passed a budget including an amendment to deny funding to any UNC summer reading program assignment devoted to one particular religion, unless it includes “all known religions.” Legislators saw the Qur’an assignment as equivalent to support for Muslim terrorists. "I see this as insensitive, arrogant and poor timing to allow students to read about our attackers," said Rep. Gene Arnold, a Republican from Nash County. The amendment ultimately disappeared in budget negotiations with the Senate. Two federal courts dismissed the lawsuit against UNC, and the discussion sessions took place without a hitch on August 19. Belatedly, several days later the UNC Board of Governors approved unanimously a resolution in favor of academic freedom. Faculty members, administrators, students, and staff at UNC supported the summer reading program enthusiastically. The 178 volunteer discussion leaders included the chancellor and provost, the chair of the Board of Trustees, Jewish and Christian chaplains of student religious organizations, librarians, graduate students, and faculty from many different departments and schools. In representing the university to the press, members of the Summer Reading Program Committee took a leading role, especially committee chair Robert Kirkpatrick, a professor of English literature. I myself gave dozens of interviews. Chancellor Moeser appeared in countless venues, including NPR’s “Morning Edition,” ABC’s “Nightline”, plus “Good Morning America.” The university news staff worked heroically to manage the demand for interviews. A media consultant coached me and Provost Robert Shelton in the techniques of producing sound bites for television reporters. The experience was both exhilarating and exhausting. Dozens of letters and emails from around the country and from overseas addressed this controversy, with about four out of five that I received being strongly in favor of UNC and the assignment. Critics included conservative Christians as well as secularized Muslims, who were equally outraged that the Qur’an should be read instead of refuted. Supporters of the assignment, from many different religious and non-religious backgrounds, praised UNC for advocating knowledge over ignorance during a time of panic. My favorite comment came from Malaysian human rights activist Chandra Muzaffar: “There was a report in yesterday's newspapers here in Kuala Lumpur about the controversy, with a picture of you. UNC’s intellectual integrity and moral courage are a beacon of hope for the academic community, worldwide. Irrational fear, prejudice and suspicion will remain the enemies of justice, truth and honesty for a long while to come. Here in Malaysia we have to combat another type of irrationality - the irrationality of those who subscribe to a dogmatic approach to Islam. Their thinking is as pernicious as that of individuals who fear any contact with the religion.” This summer reading program was not a revolution. The percentage of participation by students – about 65% -- was about the same as last year’s, and the discussion sessions varied considerably in quality. But a couple of things were achieved in this process. First, the university community made a strong affirmation of academic freedom in the face of attempts by outside religious and political forces to control what books are read. Second, the university declared by this example that it is time to make understanding Islam part of a liberal arts education. Both these conclusions should be kept in mind as we face the challenges ahead of us.
<urn:uuid:af9d52cd-9f1a-43bb-9146-b03a9318e30e>
CC-MAIN-2017-04
http://www.unc.edu/~cernst/rsnews.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00412-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966722
1,960
1.867188
2
I jumped when I heard my name in the toiletries aisle at the neighborhood Kroger. Recognition was the last thing I expected when weighing the merits of Powder Fresh vs. Clean Linen scents in aisle 6. I turned to see an old friend, Carrie, waving with one hand and using the other to wrestle a bag of kale from the clutches of her infant son. I knew Carrie had a baby, just as I knew the extent of her recent work projects and the issues she faced in finding a reliable sitter. Thing is, I knew all of this despite not having spoken to or seen Carrie in over a year. Two years? When was the last time I saw Carrie… Between the blur of Yahoo news, Gmail, e-blasts and social networking sites, we are all informed. Each of us can carry a conversation (with varying degrees of accuracy) about The State of the Union Address. Or Gun Control. Or J.J. Abrams and the new Star Wars movie. Or which of our friends just got married/had a baby/got a new job. We live our lives little short of a click away from being a wiki-expert in nearly every subject, because information, these days, is available in spades. By and large, this is a good thing. Much of human history has been marked — and marred — by the power of knowledge: who has it, who has access to it, and how to keep it out of the "wrong" hands. Knowledge? It's a powerful thing. And a slippery slope. And a double-edged sword. And a veritable cornucopia of other well-worn clichés. Because in today's marketplace, most Americans have unlimited access to storehouses of information. Need to know if a restaurant's good? Yelp will tell you. Need recommendations for a t.v. show? Netflix can offer options based on your personal, previous preferences. Need to know what Carrie's been up to? No need to pick up the phone and call, as 10 seconds spent on FaceBook will provide all the answers. But at what cost? As social stewards, you and I are in the business of communication. To communicate effectively, we must therefore be informed on a variety of issues. That's just gospel. But is information enough? Representatives of any constituency have always needed to be informed about their base, but the means by which modern reps gather intel has changed, and not necessarily for the better. Because Yelp can't tell you why certain restaurants in your district are struggling. Netflix can't stream you a cop-drama solution to the proposed pension cuts for local policemen. And FaceBook may tell you what the middle school principal had for lunch today, but it won't shed light on whether or not a county-wide anti-bullying campaign is yielding results. A face-to-face meeting will. A handshake will. Engagement will. Friends, I fear we've settled for a substitution – one we shruggingly accept as "progress." In this period of technological "progress," I fear we are, in fact, regressing in a key area where our predecessors were forced to excel: engagement. We have foregone the face-to-face in favor of FaceBook, and the results are far from flattering. Fellow stewards, we are exchanging first-hand experiences for second-hand data; we're forgoing life experience for pre-packaged thought processes; we're sacrificing engagement on the cold, hard altar of information. And we have to stop. Because we'reour greatest source of empirical knowledge – first-hand experience – to Wikipedia. To "pen" this article, I used one word-processing program, one design program, and about a half-dozen internet sites. I didn't pick up the phone once. I didn't have to. I had all the information I needed. What do you think? Tell us in the comment box below.
<urn:uuid:cab9a4e7-664a-47f9-819e-2749c313e21e>
CC-MAIN-2017-04
http://americancityandcounty.com/blog/engage-google-it
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950882
824
1.617188
2
CORNELL (US)—The answer may depend on religious affiliation. Protestants who are reminded of their religion do more good deeds and trust that other people will do so, as well, a new study shows. The research also suggests that when Catholics are reminded of their religion, they do less public service and are less trusting that others will do so. Previous work on the effect of religion was based on correlations. For example, “People find [that] a sample of Protestants is more hard working than Catholics, and they want to conclude from that that it’s some sort of effect from Protestantism,” says Daniel Benjamin, assistant professor of economics at Cornell University and coauthor of the study, which is published as a National Bureau of Economic Research working paper. “But Protestants, Catholics and Jews differ in all sorts of ways besides their religion, and those other factors—some of which might be very hard to measure—could in fact be what’s responsible for the difference in behavior,” he says. To isolate the effect of religion, Benjamin and co-authors James Choi of Yale and Cornell undergraduate Geoffrey Fisher ’10 used a method developed by psychologists called priming in which 827 Cornell students unscrambled sentences. One group’s sentences contained words associated with religion—sacred, God, prophet—and the second group’s did not. “Each of us has multiple identities. I’m white, I’m Jewish, I’m an economist,” says Benjamin. “But the extent to which my behavior is affected by any of those identities depends on how salient that aspect of my identity is at a particular moment.” Belief-related words made the subjects’ religious identity salient by “activating neural connections related to whatever sort of norms of behavior the subjects associate with their religion, in ways they might not be conscious of,” Benjamin explains. The researchers then observed the behavior of the primed and unprimed subjects in a series of economic games, which allowed them to infer that whatever differences they uncovered were the causal effect of the religious identity norms. They then analyzed the data separately by stated religion of the participants, and tested various hypotheses. “We found support for the hypothesis, for example, that Protestants who were exposed to the religious prime would give more money than Protestants [whose] religion was not made salient,” says Benjamin, and “that the primed Catholics contributed less to the public good. That was exactly consistent with the existing hypothesis literature.” However, the researchers “found no effect of priming religion on any measure of work ethic [or] for the idea that religion makes people more forward looking, more willing to delay gratification,” Benjamin says. The study produced mixed evidence about risk taking: Primed Protestants were less inclined to take risks, while primed Catholics took more risks. Interestingly—and unpredicted by any pre-existing hypothesis—Jews who were primed were more reciprocal, repaying kindness with kindness, than Jews who were not primed. “Another interesting thing we found is that Protestants who believe more in divine punishment give more to the public good when primed,” Benjamin says. The research was funded by the National Institutes of Health’s National Institute on Aging in two separate grants, one to the National Bureau of Economic Research and one to Cornell’s Institute for the Social Sciences. More news from Cornell: www.news.cornell.edu/
<urn:uuid:ef90d482-b576-4531-b96e-cc7bf40a663a>
CC-MAIN-2017-04
http://www.futurity.org/do-religious-reminders-encourage-goodness/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00206-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967274
728
3.15625
3
The best file sharing websites As we become ever more reliant on our computers and other devices, the switch to digital is having an impact on other aspects of life as well. Instead of sending letters, people send emails. Instead of using film, we upload pictures to the computer, and rather than hard copies, people now use digital files for their paperwork. While this switch has made it easier to store your files and clean up clutter, it does present a new challenge about the best way to share, send and store documents and photos. Today, file sharing websites make it easy to securely send your most important – and sensitive – files with others, and with the help of the internet you can upload and send things in seconds. Choosing a reliable site Online security is one of the most important factors to consider if you’re looking for a site that makes it easy to share files online. Most emails will only send messages of a certain size, and can slow down or even crash in your inbox when you try to open them. So if you’re planning on sending files regularly, or storing larger files like videos, making use of a file sharing site can make the whole process easier. Most of the reputable file sharing sites take extra security measures to make sure your files are being safely stored and sent. No matter which site you choose to help you share your files with friends, colleagues and family members, the speed of your internet will always be an important factor in how quickly files upload. If you don’t have a large broadband package at home or are considering sending very large files, you should be prepared for the process to take a little more time. Most smaller files like documents and photos will send very quickly – it’s when you are sending a much larger volume that this can be more problematic. If you find your internet is too slow or not reliable enough to upload and share your largest files, it may be easier to load them onto a USB drive and send them the old fashioned way in the post – the files will take a little more time to arrive at their destination, but it won’t put a strain on your home or office internet connection when you’re trying to use it for other things. Some of the most popular file sharing sites to try Dropbox – Dropbox has a huge following of fans and it’s not difficult to see why once you get started. New users are offered 2GB of free storage, and with the option to share individual files or entire folders with others, access them from your computer when you’re offline or from the internet on the go, Dropbox makes it very convenient to store your most important digital files in the cloud. Google Drive – If you have a Google account or are a Gmail user already, Google Drive is an easy solution and can help you share and store files quickly. From your Google Drive you can upload documents, choose other people to share them with using their email address, and even create and store your own files – like Word and Excel documents – from another computer by working online. This is a great option if you’re frequently on the go and using different devices because you can log in and access your files from anywhere. WeTransfer – Unlike some of the other choices on our list, WeTransfer was created specifically for file sharing. If you simply want to send a file, not store it, this is the option for you. The free service lets users send files up to 2GB at a time and keeps the upload live for 7 days so the other person can access it. There is also a premium option called Plus, an annual membership that gives you access to larger file transfers (up to 5GB) as well as password-protected transfers and additional storage. iCloud – If you’re an iPhone or iPad user, or have a Mac computer at home, then you can have access to its excellent file-sharing service iCloud. It’s naturally set up to automatically store your files and photos in the cloud and make them available on other devices, so for example if you take a picture using your iPhone, you’ll be able to see it in your photo stream on your Mac computer just moments later. If you are mostly concerned with uploading and sharing files between your own devices, Apple’s offering is one of the most seamless products on the market. Latest posts by Silversurfers Editor (see all) - Win 1 of 10 copies of the iconic Dairy Book of Home Cookery - January 18, 2017 - Is sleeping in separate beds the beginning of the end? - January 16, 2017 - Get back to doing the things you enjoy - January 16, 2017 - Are you a Flexitarian? - January 14, 2017 - Why you should be setting sail on an ocean cruise this year - January 13, 2017 Leave a Comment! Community Terms & Conditions These content standards apply to any and all material which you contribute to our site (contributions), and to any interactive services associated with it. You must comply with the spirit of the following standards as well as the letter. The standards apply to each part of any contribution as well as to its whole. be accurate (where they state facts); be genuinely held (where they state opinions); and comply with applicable law in the UK and in any country from which they are posted. Contributions must not: contain any material which is defamatory of any person; or contain any material which is obscene, offensive, hateful or inflammatory; or promote sexually explicit material; or promote violence; promote discrimination based on race, sex, religion, nationality, disability, sexual orientation or age; or infringe any copyright, database right or trade mark of any other person; or be likely to deceive any person; or be made in breach of any legal duty owed to a third party, such as a contractual duty or a duty of confidence; or promote any illegal activity; or be threatening, abuse or invade another’s privacy, or cause annoyance, inconvenience or needless anxiety; or be likely to harass, upset, embarrass, alarm or annoy any other person; or be used to impersonate any person, or to misrepresent your identity or affiliation with any person; or give the impression that they emanate from us, if this is not the case; or advocate, promote or assist any unlawful act such as (by way of example only) copyright infringement or computer misuse. Nurturing a safe environment Our Silversurfers community is designed to foster friendships, based on trust, honesty, integrity and loyalty and is underpinned by these values. We don't tolerate swearing, and reserve the right to remove any posts which we feel may offend others... let's keep it friendly!
<urn:uuid:a5b95bbf-457f-4fa1-8356-49691c533ad8>
CC-MAIN-2017-04
https://www.silversurfers.com/best-of-the-web/best-file-sharing-websites/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00184-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936693
1,390
1.546875
2
It was on the 16th of March, 1751, that the little boy who was to be our fourth President, first opened his eyes in the world. He was born in his grandfather's house at Port Conway, King George County, Virginia, but he was still very young when he went to live on his father's great farm at Montpelier. This place was in the beautiful country of the Blue Ridge, only twenty-five miles away from Jefferson's home at Monticello. That was almost next door in the thinly settled country, of Virginia, and the two were all their life great friends. There is not much to be said about James Madison's boyhood. He was not a bit like Washington and Jefferson. While they were busy at out-door life, hunting, riding, working, he was as busy reading and studying. He was a homebody, fond of books, and caring very little for play and the rough sports of hearty boys. Shy and thoughtful, he seemed, like a little man before he was a big boy. What do you think of a boy who could read French and Spanish while he was quite young, and who was already hard at work at Greek and Latin? I think it would have been better for him to have mixed a good deal of play with his hard study. The old saying goes that "All work and no play make Jack a dull boy." All study and no play are not much better. When James Madison was seventeen years old he went to Princeton College, at the quiet little college town of Princeton, in New Jersey. Here he was more of a student than ever. Such a tireless bookworm has not often been seen. He wanted to know everything. He gave himself, we are told, only three hours' sleep out of the twenty-four. All other time was given to his books and his classes, none of it to play. What must the fun-loving college boys have thought of such a hopeless case as that? No doubt they made fun of him ; but he went on all the same. He made himself a fine scholar, it is true, but he injured his health so that he was never strong, and passed many a miserable day in later life. That is what comes of overwork of any kind. Our bodies and our constitutions are not given us to deal with as though they were as tough as hickory wood. It is a wonder that his twenty-one hours of study in a day did not kill him in college. But he came of sound stock and lived to be an old man. When his college life was over he studied law. He was a small-sized, pale, delicate young man, with a grave, serious face. He hardly knew what it was to laugh, and was often so miserable that he made up his mind he was near the end of his life. He was already being punished for studying too much, as others arc punished for eating or drinking too much. All the better people thought Madison did right not to try and win votes by making the voters drunk. He was made a member of the Governor's Council when Patrick Henry and Thomas Jefferson were governors, and both these great men had a high regard for him. After Jefferson's wife died and he grew sad and lonely, he tried to get some of his friends to come and live near him, so that they could meet and have long and pleasant talks. Madison was one of these. Jefferson wanted him to take a little farm near his own, and live in a small old house on it. But Madison did not care to give up his fine home at Montpelier, and live in a rude farm-house, even to meet and talk with Jefferson. The young student was elected to the Continental Congress in 1780. This was a high honor for one not thirty years old, but Virginia had come to look on him as one of its great statesmen. He stayed there three years, and stormy years they were, for they were the closing years of the Revolutionary War. But he found it a splendid school in politics, even if it was a trying one for a quiet man like him. From this time on Madison took an active part in all that went on in the new Republic. When he got back in the Virginia legislature in 1784, he and Jefferson worked hard to do away with the bad old religious laws, which made everybody pay taxes to support the Episcopal Church, which was the government church in Virginia. He did not believe in the union of Church and State, and he wrote a powerful paper against it which put an end to it in Virginia Since then religion has been free in all parts of this country, and no one can be taxed for its support. All money for religion must be a free-will offering. And now Madison became a leader in the greatest work of the times. After the Revolution the young nation was in a sad way, It was over head and ears in debt; the States were jealous of one another ; what was called the Union was no stronger than a rope of sand; it must be bound by something as strong as an iron chain or it would soon fall apart. Madison was one of the first to see this. A strong government must be formed or there would soon be no united government at all. Washington said, "We are one nation to-day and thirteen to-morrow." Madison saw that we must to-day form one powerful nation or we would soon break up into thirteen weak ones, which England might pick up again, one by one. Let us see what steps were taken, The first was a meeting held at Mount Vernon in 1785 to settle disputes about the waters between Virginia and Maryland. Madison was there, and when he went back to the Assembly of Virginia he had a law passed to call a convention at Annapolis the next year to regulate commerce between the States. Here he and Alexander Hamilton brought up the question of a stronger union of the States, and it was decided to call another convention, to meet at Philadelphia in 1787, to see what could be clone to increase the powers of the Federal Government. It was his great service in bringing this about that gave Madison the proud title of "The Father of the Constitution," for it was this convention that formed the Constitution of the United States, and established in this country the powerful Union it now possesses. I am not going to tell you the story of that great convention, with Washington at its head, and Franklin, Hamilton, Madison, and other great men among its members. Never was there an abler body of men. Some of them wanted to revise the old Articles of Confederation formed during the Revolution, but Madison and Hamilton said that would be a waste of time. There must be a new system or none at all. They had their way, and the new Constitution was formed. What took place in that convention, which sat for six months behind closed doors, we know mostly from Madison. He made notes of all that went on, and these were published after his death, and very useful reading they are. When the Constitution was offered to the country there was a desperate fight over it. Madison and Hamilton and John Jay wrote splendid essays about it, and these were published in a work called " The Federalist." And while Hamilton was fighting for it in New York, Madison was fighting for it in Virginia. Here he made the greatest speeches of his life. He had against him such splendid orators as Patrick Henry and George Mason, yet he won his cause and brought Virginia into the Union. When the First Congress of the United States met, in the old City Hall of New York, Madison was one of its members. Washington wanted to make him Secretary of State, and also asked him to serve as Minister to France, but he declined both. He was democratic in his views, like Jefferson, and did not like Hamilton's ideas about a strong central government. But he held back, for he was never fond of controversy. Now let us step aside a while from politics, and follow Madison into other and more flowery fields. Like Jefferson, he fell in love twice. The first time was with a pretty girl of sixteen named Catharine Floyd. The two were engaged, but the girl saw somebody she liked better and she threw her old lover aside. Madison moped for a while, but Jefferson told him to go back to his books and he would soon forget the pretty face. Jefferson had done the same thing himself. Eleven years passed before Madison fell in love again. He was now forty-three and the lady was a lovely young Quakers of twenty-two. She was a very young widow, named Mrs. Dorothy Todd. Madison met her one day when he was out walking in Philadelphia and fell in love with her sweet face at sight. He tried to get an introduction, and soon got one. We have a letter from Mrs. Todd to a friend, in which she said, "Thou must come to me. Aaron Burr says that 'the great little Madison' has asked to be brought to see me this evening." Mrs. Todd did not throw her lover overboard. Though he was nearly twice her age, she accepted the great little Madison." In September, 1794, the dainty young widow went to her sister's house at Harwood, in Virginia, and here soon after the wedding took place. It was a gay one, as was the habit in that old time. So pretty and sweet was the bride that in her earlier days, when she wore her quiet little Quaker gown of gray, a friend said to her: " Dolly, truly thou must hide thy face, so many stare at thee." Dolly Madison, as she was afterward known, needs a good introduction, for she was to play a large part in American life. For sixteen years she was to be the mistress of the White House, twice as long a term as any other woman enjoyed. And a cherished and favorite mistress she was for all that time. When Washington retired from the Presidency in 1797, Madison went home to Montpelier. There had been talk of nominating him to succeed Washington, but he positively declined. He wanted some home life. He was rich, he was famous, he was delicate, he had a charming young wife, and Montpelier was a delightful home. It lay between Jefferson's and Washington's homes, and was as comfortable a country mansion as either of these. And there were his cherished books. There he lived in peace and happiness for four years. Then Jefferson was elected President and selected Madison for his Secretary of State. For the next sixteen years he made his home in Washington, which had been made the National Capital in 1800. The new President had long been a widower, and the duties of mistress of the White House fell upon Dolly Madison. And she filled them with a charm and ease and a gracious dignity that won all hearts. She was kind and thoughtful and had a social gift and tact that made her hosts of friends. It is said that "Mrs. Madison never forgot a name or a face," and that is a faculty of rare value in high places. For eight years Madison held his important office. France and England were then at war, and were interfering with American ships and sailors in a way that made our people very angry. It was no easy matter to keep the country out of war, but Jefferson and Madison both wanted peace, and managed to preserve it. But little Madison was elected in spite of his pipe-stem queue, and by a large majority. He might not have been, if all the voters had been barbers. Madison as President tried as hard to keep the country out of war as he had done while Secretary of State. But it could not be done. From taking sailors out of American merchant ships, England began to insult our men-of-war, and took steps that would ruin our commerce. Matters grew so bad that Congress declared war against Great Britain, and on June 8, 1812, President Madison signed the declaration of war. Dolly Madison now showed herself a woman of nerve. She got all the papers and the plate, but she would not leave till a large portrait of Washington, which was screwed against a wall, was secured. The cannon were sounding loudly and the British soldiers were near at hand when she got into her carriage with the papers, plate and portrait and drove away. She had not been gone long before the city swarmed with soldiers, and that night all the public buildings were in flames. Mrs. Madison spent the night in a little tavern in an apple orchard, while a furious rain-storm raged outside. The wind was so strong that the apples were flung like musket balls against the house. Here the President joined her, but at midnight a scared courier rode up and told him that the British were close on his track. His friends made him go out into the storm, and he spent the rest of that night in a wretched hovel in the woods. The next day word came that the British were leaving, and the fugitives made their way back. They reached Washington to find the Capitol and the White House heaps of blackened ruins. They had gone through an experience which no other American President has had anything to match. When Mrs. Madison got to the Long Bridge on the way back, she found that it was barred at both ends. There was an officer there in charge with a ferry boat, but he did not know the lady and refused to take her across. Her husband had sent her word to go home in disguise, but after begging for a while in vain, she had to tell the officer her name. Then he ferried her and her carriage across the river, and she made her way through the desolate and ash-covered streets to the ruins of what had been her home. A little more than two years later President Madison's second term reached its end, and he left Washington for his quiet, beautiful home at Montpelier. Here, in his "dear library," in taking care of his estate, in generous hospitality, and in happy domestic life the scholarly Madison spent the remainder of his days. In 1829 he took part in the work of the convention to make a new Constitution for Virginia. That was his last public work. He died on the 28th of June, 1836. The delicate scholar had lived to be eighty-five years old. His beloved wife survived him for thirteen years. She had business troubles towards the end. There had been losses. But Congress purchased her husband's valuable papers, and her difficulties came to an end. Comfort and peace lay around her later days. But there is an incident which goes to show that she was growing tired of life. One of her nieces went to her for sympathy in some slight trouble. "My dear," said the old lady, " do not trouble about it. There is nothing in this world really worth caring for. Yes." she continued, looking intently out of a window, " I who have lived so long, repeat to you, there is nothing in this world here below worth caring for." Source: "The Lives of the Presidents and How They Reached the White House" by Charles Morris, LL.D., 1903. Copyright, 2005-2010 by Webified Development all rights reserved.
<urn:uuid:3869823f-8a77-45ca-a555-793941469152>
CC-MAIN-2017-04
http://www.all-biographies.com/presidents/james_madison.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00246-ip-10-171-10-70.ec2.internal.warc.gz
en
0.994178
3,148
2.53125
3
- 1 How many games will MLB Play 2021? - 2 How many baseball games are there in a season? - 3 Why did MLB go to 162 games? - 4 What months do you play baseball? - 5 Why do baseball teams play 3 games in a row? - 6 How long is a game of baseball? - 7 What is the average MLB salary? - 8 Did the Yankees win the World Series in 1961? - 9 Is baseball boring to watch? - 10 Will MLB allow fans 2021? - 11 Will MLB have fans 2021? - 12 What season is baseball played in high school? How many games will MLB Play 2021? Schedule. Major League Baseball announced the 2021 regular season schedule on July 9, 2020. A full 162-game season is planned. How many baseball games are there in a season? The typical 162-game scheduled ultimately was shortened to 60 games, and teams played in empty ballparks due to health and safety protocols. Why did MLB go to 162 games? In order to keep its schedule balanced, the American League season was extended by eight games. Previously, teams had played 154 games (22 games per opponent), but from 1961 AL teams would play opponents 18 times each for a total of 162 games. What months do you play baseball? The regular season runs from late March/early April to late September/early October, followed by the postseason which can run to early November. Why do baseball teams play 3 games in a row? Playing teams in a three-game series allows for the players and all team members to enjoy more days off during the regular season. Major League Baseball agreed to extend the length of their regular season to 187 total days back in 2018. How long is a game of baseball? How long is a game of baseball? The duration of a baseball game varies, but the average Major League Baseball game lasts for just over three hours. MLB, minor league and college baseball games all consist of nine innings, although minor league and collegiate games don’t take as long in general. What is the average MLB salary? Average MLB salary at $4.17 million, down 4.8% from 2019. Did the Yankees win the World Series in 1961? New York Yankees over Cincinnati Reds (4-1) Is baseball boring to watch? One major issue facing Major League Baseball right now is many sports fans consider baseball to be slow and boring compared to other sports. This has caused fan engagement to suffer. In a 2018 Gallup poll, only 9 percent of Americans said baseball was their favorite sport to watch. Will MLB allow fans 2021? Major League Baseball 2021 Opening Day is here. MLB commissioner Rob Manfred informed teams that they could permit fans to attend games, beginning for the spring training exhibition games. However, to start the regular season, fan attendance for the 2021 MLB regular season won’t be the same at each ballpark. Will MLB have fans 2021? As Opening Day of the 2021 MLB season approaches on Thursday, April 1, fans across the country will soon return to their home teams’ ballparks — in most cases for the first time since the coronavirus pandemic began. What season is baseball played in high school? The high school baseball season will now officially begin in mid-March in those eligible counties, with the exact date differing from region to region. The California high school baseball season typically begins at the end of February.
<urn:uuid:7dc83665-d05e-45fc-bd55-7061a75c3262>
CC-MAIN-2022-33
https://ctdistrict4.com/baseball/faq-how-many-baseball-games-in-a-season.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00473.warc.gz
en
0.974239
723
2.203125
2
detour(redirected from detours) Also found in: Dictionary, Thesaurus, Encyclopedia, Wikipedia. detournoun alternate route, by-pass, by-passage, cirruitous route, deflection, departure, deviation, deviation from a direct course, digression, diversion, excursion, indirect path, loop, roundabout course, temporary route, wrong course Associated concepts: detour from course of employment, frolic and detour detourverb aberrare, alter one's course, avoid, change direction, change the bearing, circuit, deflect, depart from, depart from one's course, deviate, deviate from a direct course, digress, divert, divert from its course, drift, encircle, excurse, go around, go out of one's way, go out of the path, go out of the way, go round about, make a circuit, meander, perrorm a circuit, ramble, sidestep, skirt, stray, swerve, take a circuitous route, take a roundabout course, take a tempooary route, take an alternate highway, take an alternate route, take an indirect way, turn aside, vary, veer Associated concepts: detour from course of employment, frolick and detour See also: avoidance, deter, deviation, digress, digression, evasion
<urn:uuid:0b5a0835-248e-4ff8-b862-72645ca6c163>
CC-MAIN-2017-04
http://legal-dictionary.thefreedictionary.com/detours
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.822172
289
2.109375
2
Considered a month of rebirth and renewal, like the other months of spring, May is also known as Arthritis Awareness Month. This month offers Americans the opportunity to become familiar with the most effective arthritis prevention and control strategies, and make a difference in the lives of people of all ages, who have already been diagnosed with this disease. At this point, according to the numbers provided by Arthritis Foundation, this prominent health concern affects the lives of more than 50 million U.S.-based individuals, and constitutes the leading cause of disability nationwide. These numbers are alarming, considering that they suggest the fact that 1 in every 5 American adults suffer from arthritis. The same disease impacts the wellbeing and development of 300,000 children and their families. Understanding the Life-Changing Effects of Arthritis The Arthritis Foundation is giving people the chance to gain an important advantage in the battle with arthritis and its life-changing effects by offering them access to its resources, tools and advanced scientific research, meant to help arthritis patients improve their level of comfort and their quality of life. Aside from being the number one cause of disability in the U.S., arthritis is an important negative factor that stops people from pursuing academic and employment opportunities matching their goals, aspirations and qualifications. According to the statistics made public by The Arthritis Foundation, working-age people with ages ranging from 18 to 64 who are diagnosed with arthritis are less likely to get the job that they have applied for than those whose lives are not disrupted by this disease. Moreover, arthritis also impacts the wellbeing, productivity, health and financial security of one third of all working-age individuals who work full time or part time, taking into consideration that arthritis and other health concerns that can be linked to this disease are associated with 1 million hospitalizations on an annual basis, leading to expenses estimated at $156 billion per year in medical costs and lost wages. Exploring the Most Effective Treatment Options for Arthritis Unlimited access to information can help patients and their families employ the most efficient arthritis prevention and control strategies. Physical therapy and positive lifestyle changes play an important part in this equation, proving that the best treatment for arthritis doesn’t have to come from a medicine bottle. Any specialist in physical therapy can affirm the fact that exercise is the healthiest and most effective method to relieve stiff joints and the discomfort caused by arthritis. Even though most people who are in pain prefer to stay in bed and avoid any type of movements, exercising is the best way to improve joint health and mobility. Strength-training, stretching exercises and aerobics are incredibly helpful, and can be personalized to meet the specific needs, age, medical history and physical condition of each patient to deliver the most remarkable results. Physical therapy is a key component of treatment in individuals diagnosed with arthritis. Regular workouts, therapy modalities that can reduce inflammation and decrease pain (such as Ultrasound and Electrical Stimulation (E-Stim), in addition to doctor-approved exercises that are safe to perform, and adequate physical therapy, can boost flexibility and mobility and help patients maintain an ideal weight. At the same time, these two essential elements can prevent further complications associated with arthritis and a sedentary lifestyle, such as obesity and diabetes. For instance, a comprehensive wellness program like MoveWell can engage older clients in adequate fitness measures. This whole person wellness program is suitable for those who want to maintain an active lifestyle and minimize the effects of debilitating conditions, such as arthritis. MoveWell is based on Core Four – a sum of the four principles of physical wellness – Strength, Endurance, Balance and Flexibility. Unlike other similar wellness programs, MoveWell is both exciting, beneficial to one’s health, and socially engaging. Clients enrolled in this program have discovered a new method to preserve their independence, strengthen their bodies and prevent limitations associated with aging or debilitating health conditions by improving their lung and heart health, building muscle and stronger bones. MoveWell is only one of the beneficial programs developed by HTS to improve the lives of the aging population. Healthcare Therapy Services, Inc. offers a wide array of wellness services and onsite contract physical, occupational and speech therapy specially designed to match the specific needs of senior living communities. These services are created to promote safety and independence, and to give seniors a chance to improve their quality of life. A senior living community, CCRC/Life Plan Community, assisted living and even long term care can address the special non-medical and medical needs of patients with arthritis by offering them access to information, medication and physical therapy adapted to their age and medical history. At the same time, it’s safe to say that anyone can help improve the lives of people whose mobility, flexibility, state of health, finances, and every other aspect of their existence has been dramatically changed by arthritis. People can support this case by becoming an Arthritis Foundation Advocate, or sign up to attend one of the events organized by The Arthritis Foundation to help raise money for further scientific research and a cure for the disabling condition that stops nearly 53 million Americans from reaching their full potential. By accepting the Become a Champion of Yes Challenge, everyday people get the opportunity to make their voice heard, and share their story with millions of people who are also struggling to explore new methods to get relief from arthritis. During Arthritis Awareness Month, individuals diagnosed with arthritis are encouraged to inform and educate others by speaking openly about the hopes, accomplishments, obstacles and challenges that they have experienced during their fight with arthritis. Those who want to support the efforts of the Arthritis Foundation can make a donation to support the progress towards a cure and enhance access to resources and tools developed and implemented to improve lives.
<urn:uuid:8bc29ef9-9e4b-43d4-b29b-a2ea5cff09db>
CC-MAIN-2022-33
https://www.htstherapy.com/2016/05/13/arthritis-awareness-month-fighting-the-battle-against-arthritis-with-physical-therapy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00278.warc.gz
en
0.955674
1,155
2.578125
3
URBANA – As the COVID-19 pandemic continues, it will be important for scientists to track how the novel coronavirus, SARS-CoV2, is mutating, say researchers at the University of Illinois at Urbana-Champaign. As the virus spreads from person to person, random mutations can lead to the creation of different strains over time. Understanding how those mutations affect the virus’ properties is important for the development of treatments and vaccines, says U of I professor Gustavo Caetano-Anolles. For that reason, when the COVID-19 pandemic hit this spring, Caetano-Anolles, who was teaching a graduate-level bioinformatics class, pivoted to have his students research how the novel coronavirus was mutating over time. They tapped into databases compiling the genetic sequences of more than 15,000 coronavirus samples that were collected between January and May. The students’ study was recently published in the journal “Evolutionary Bioinformatics.” The group’s results are consistent with those of other researchers who had set out with the same goal. They identified early mutations in the gene encoding the virus’ “spike” protein — which helps the virus penetrate cells — that made it more stable and better at spreading. That mutation ended up taking over the entire SARS-CoV2 population by June. The U of I team also found that the virus’ mutations rate was rapid at the start of the pandemic but slowed down beginning in April, and they identified more than two dozen other mutations that cause fundamental changes among the proteins in the virus. For example, the researchers found that in April, two other SARS-CoV2 proteins mutated in a way that made them more stable: the NSP12 polymerase protein, which helps replicate the virus’ genetic material, and the NSP13 helicase protein, which plays a “proofreading” role in the virus, examining duplicated RNA strands for possible errors. Caetano-Anolles says some of the mutations his team identified seem to be expanding throughout the virus population, leading to greater diversity. Grad student Tre Tomaszewski, the study’s lead author, says those mutations are not in the parts of the virus most COVID-19 vaccines in development are targeting, which is good news. “We’re glad that we found that,” Tomaszewski says. “But it also is necessary to keep tracking this because if anything were to change, it’s important to know as soon as we can.” Caetano-Anolles says he hopes to continue to apply the methodology developed by his students to the ever-increasing number of coronavirus sequences that are becoming available for analysis as the pandemic carries on. Researchers elsewhere continue to study how SARS-CoV2 is mutating, with the goal of identifying proteins that may be blocked by drugs or targeted by a vaccine. Others are doing experiments aimed at predicting which mutations are likely to be important — making the virus better or worse at evading a person’s immune system or eluding vaccines developed against it.
<urn:uuid:393d3dd7-1608-497a-a13f-75df9d9fe41d>
CC-MAIN-2022-33
https://illinoisnewsroom.org/u-of-i-researchers-coronavirus-mutations-are-important-to-track-as-pandemic-continues/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00473.warc.gz
en
0.961525
675
3.046875
3
A gambler’s decision to stay or fold in a game of cards could be influenced by a chemical in the brain, suggests new research from the University of British Columbia. The rise and fall of dopamine plays a key role in decisions involving risk and reward, from a baseball player trying to steal a base to an investor buying or selling a stock. Previous studies have shown that dopamine signals increase when risky choices pay off. “Our brains are constantly updating how we calculate risk and reward based on previous experiences, keeping an internal score of wins and losses,” says Stan Floresco, co-author and professor in UBC’s Dept. of Psychology. “Dopamine appears to play an important role in these processes, influencing our everyday choices.” The study saw rats choose between safe and risky rewards – similar to what investors face on Wall Street. Pressing one lever gave the rodents a small, but guaranteed reward, not unlike a bond. The other lever yielded a large reward or nothing, similar to a high-risk stock. Researchers altered the rats’ decision-making process by shutting down or turning on the dopamine signals in their brains. When the rats played risky and lost, researchers turned on dopamine signals when normally they would have decreased. Subsequently, the rats made riskier decisions. Conversely, when the rats played risky and won, researchers turned dopamine signals off. Here, the rats began to play more conservatively. “By temporarily knocking these chemical signals out, it demonstrates how significant they are in altering our decisions, even if it’s against our better judgment,” says Floresco. Abnormal dopamine levels are associated with several psychiatric disorders, including schizophrenia, depression and drug addiction. Current treatments for these disorders involve drugs that heighten or lower dopamine levels, but not immediately following a risk and reward decision, like the rats experienced. Therefore, the potential clinical application of the approaches used in the study is unclear. “The timing of the stimulation is important,” explains Floresco. “By understanding how these signals work to influence our behaviour, these findings can provide insight into what happens when these signals go awry, as may occur in numerous psychiatric disorders.” The study, Overriding Phasic Dopamine Signals Redirects Action Selection during Risk/Reward Decision Making, is published in Neuron. Floresco’s co-authors are Colin Stopper, Maric Tse, David Montes and Candice Wiedman of UBC’s Dept. of Psychology and the Brain Research Centre.
<urn:uuid:891fe3c6-63d8-4892-87a3-66c57fa674d9>
CC-MAIN-2022-33
https://news.ubc.ca/2014/09/11/risky-decisions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00068.warc.gz
en
0.938228
539
2.9375
3
Many people asked me during course if the ability to automatically deploy to Windows Azure Web Sites is restricted only to those people that are using TF Service (TFS on the cloud), or if they can deploy with an on-premise installation of TFS. The answer is clearly YES, and I strongly suggest you to watch the Continuous Deployment with Microsoft Visual Studio session of Brian Randell to have a deep explanation of all the possibilities you have to achieve automatic deployment of your applications from Team Foundation Server. Deploying from on-premise TFS to Azure Web Site is simple, because it is only a matter of configuring msbuild to use the right publish file. The difference from an automatic deploy with TF Service is: when you publish from TF Service, the web site has a nice “deployment” tab listing all the deployment done with TF Service and a connection with Build Details, while if you publish from on-premise you loose this data and the Web Site completely ignores who and when the site was deployed. To deploy on Azure from on-premise TFS you just need to download the publish profile of the Web Site into a local folder. Figure 1: Download the publish profile Then you can right-click your web project node from the Solution Explorer in Visual Studio and choose “publish”, from there you can “import” the file you just downloaded. Figure 2: Import the publish profile This file contains all the information needed to publish against that Web Site, you can modify as you need Figure 3: Details of the publish definition. From the list of definition (Figure 2) I usually rename the publish file to something more useful, as an example AzureDemoWebSite. Figure 4: Rename your publish file I usually modify the publication file to include publishing the database to the Azure Database, you do not need to specify the connection string of the database, it will be taken from the profile and the only piece of information that the script needs is the relative path of the .dacpac file to deploy. Figure 5: Modification done to the publishing profile to deploy a database project Now you should check-in everything and you are only one step away from publishing from azure. Just create a standard build, but instruct MSBUILD that you want to also deploy with a specific publication profile. This can be done in the Advanced section of the Build Process Figure 6: Instruct MSBuild with custom Arguments to deploy the site. The whole string is this one /p:DeployOnBuild=true /p:PublishProfile=AzureDemoWebSite /p:AllowUntrustedCertificate=true The tricky part is specifying correct credentials. You can find username and password directly opening the original publication profile file you downloaded from azure. Publish file in Visual Studio or your standard Azure credential wont work. The username is usually in the form $websitename and the password is a long sequence of characters and numbers, you cannot miss it. Figure 7: The original content of the publication profile, it contains the username and password that you need to publish to that web project Now you can simply fire the build, wait for it to complete and your web site will be automatically deployed. Figure 8: Build succeeded and site was deployed Figure 9: Site was deployed Publishing on on-premise IIS is quite the same, it is just a matter of creating the right publish file and use it to deploy during a build.
<urn:uuid:8de60f8a-5bef-47da-9ad6-8aae010a2de6>
CC-MAIN-2017-04
http://www.codewrecks.com/blog/index.php/2013/07/05/deploying-on-azure-web-sites-from-on-premise-tfs/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00328-ip-10-171-10-70.ec2.internal.warc.gz
en
0.896326
729
1.539063
2
M.C. Escher Poster Box No artist ever worked harder to render the visions of his mind's eye than M. C. Escher. The visions themselves were remarkable enough: for Escher, the skin of the visible world was nothing more than a piece of cloth that could be cut, folded, shaped and rearranged in marvellous ways. A superb draughtsman, he set himself the challenge of portraying these otherwordly transformations of space within the familiar borders established by a sheet of paper. The resulting images have become the favorite artworks of tens of thousands of viewers around the world. From 1919 to 1922 Escher studied at the School of Architecture and Ornamental Design in Haarlem and was instructed in graphic techniques by S. Jessurun de Mesquita, a strong personality who greatly infl uenced Escher's further artistic development. In 1922 he went to Italy and settled in Rome in 1924. During his ten-year stay in Italy, he made many study tours, visiting Abruzzia, the Amalfi coast, Calabria, Sicily, Corsica and Spain. In 1934 he left Italy and spent two years in Switzerland and five years in Brussels, before moving back to Baarn in Holland. Specifications of M.C. Escher Poster Box Write a review Note: HTML is not translated! Rating: Bad Good Enter the code in the box below:
<urn:uuid:4e15a5f4-1b17-4d50-bf8e-eafe699af890>
CC-MAIN-2017-04
http://ergodebooks.com/m.c.-escher-poster-box-DADAX1435126777
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00264-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927234
291
2.046875
2
NTSE Scholarship 2020: National Talent Search Examination is one of the most Competitive and scholarship scheme exam in India. For Class 10 students it’s a prestigious scholarship program from all over the country. NCERT Conducts exam for class 10 students every year, 1000 meritorious students are selected for NTSE Scholarship. NTSE Scholarship is awarded to selected students all through the different stages of their education. In this article, we will provide all the necessary information about NTSE Scholarship money. In 2020, scholarships have been increased from 1000 to 2000. Read on to find more about the NTSE Scholarship amount, NTSE Scholarship Form. NTSE Scholarship 2020 Central Government provides scholarships for students all through their education. NTSE Scholars Students receive a scholarship at different stages of their education: |Scholarship during Class 11 and 12||Rs. 1250 per month| |Scholarship during UG and PG||Rs. 2000 per month| |Scholarship during Ph.D.||As per UGC norms| NTSE Scholarship Other Advantages Of Being An NTSE Scholar Apart from the above-mentioned scholarship, NTSE Scholars receive a scholarship throughout their education and advantages as well. Various advantages of being an NTSE Scholar as listed below: - Appearance and preparing for NTSE build confidence in students to appear for various competitive exams as well. Most of the students who have appeared in NTSE Scholars become top rankers in Competitive exams like JEE Main, JEE Advanced, AIIMS, and NEET.Fp NTSE Scholarship will become a gateway to topmost colleges in India. In many colleges in India, students have reserved seats for NTSE Scholars. - Students planning to join foreign universities for their higher studies get an edge over other students if they are NTSE scholars - NTSE Scholar will get high preferences when it comes to a job in the government and private sector. - Students of NTSE Scholars also get preferences in the selection of NDA. - For NTSE Scholars there are different courses and study materials are available at discounted prices. As you can see NTSE Scholarship is helpful in every aspect of academic life and career. Students who are studying in class 10 must appear for NTSE and give their best in the NTSE Exam. NTSE Exam Overview - Name of the Exam: National Talent Search Examination (NTSE) - Conducting Body: NCERT - Level of the Exam: National - Mode of the Exam: Offline - Exams: Mental Aptitude Test, Scholastic Aptitude Test - Class level: 10th standard - Exam duration: 120 minutes for both MAT and SAT - Application Form Availability: August 2020 - Total Scholarships: 2000 - Scholarship amount: - Higher Secondary level – Rs. 1250/- p.m. - Graduate and Post Graduate – Rs. 2000/- p.m. (3 Years), - For a Ph.D. degree 2000/- (four years) – As per UGC norms - Official Website: http://www.ncert.nic.in Students who are going to appear for the exam must have knowledge about NTSE Syllabus and NTSE Exam Pattern. We hope the NTSE Scholarship is helpful. we hope we have provided all the necessary information about NTSE Scholarship. If you have any doubts regarding this post or NTSE Scholarship Please comment in the comment section we will get back to you at the earliest.
<urn:uuid:972fae03-0d6c-4702-9cf1-871f332108e3>
CC-MAIN-2022-33
https://www.learncbse.in/ntse-scholarship/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00472.warc.gz
en
0.928739
725
1.734375
2
Where did we even save our files before? Floppy disks, CDs, and removable drives? Thanks to advanced cloud storage services like Google Drive, we can now store files and documents online and access them anytime, anywhere. Since Google Drive was launched in 2012, it has taken the world by storm. It has even reached the point that it’s hard to move forward and progress with our jobs without it. Although it’s simple and easy to use, especially on our Android devices, this cloud storage service has exciting features that can be confusing to use for newbies. That is why we came up with this post to teach you how to use Google Drive. The Basics of Google Drive Before we explain how Google Drive works, allow us to share a few necessary things you need to know about the Google Drive app. The first and most important thing is the need for a Google account to be able to use the cloud service. Don’t worry because setting up a Google account is free, easy to do, and can be done in a couple of minutes. Once you have a Google account, you can access a plethora of Google services such as YouTube, Play Store, Gmail, and Google Drive. - To set up a Google account, directly go to this link: https://accounts.google.com/sigNup and follow the instructions provided. - Once you have an account, you can access Google Drive via the web by typing drive.google.com in your browser or by opening the Google Drive app. Another thing you have to know about Google Drive is its storage space. Google Drive can be used for free with a 15GB storage space shared between Photos, Gmail, and Drive. However, if that is not enough, you can upgrade to a 100GB, 1TB, or 10TB plan, which costs $2, $10, and $100 per month respectively. Uploading and Downloading Files If you are using an Android device, uploading files to Google’s cloud is easy as pie. Follow these steps: - Open the Google Drive app on your device. - Log in using your Gmail If this is your second time using the app, you can proceed to the next step. Otherwise, you have to enter your login details and tap on the Sign In button. - Click the blue + icon in the bottom-right portion of the screen, and choose the file you want to upload. If you wish to find the file or folder you want to upload, enter the file or folder name in the search bar at the top-most portion of your screen. For videos and photos, you want to upload to Google Drive from your device’s default Gallery, navigate to the video or picture you want to upload. Long-press it, select Share and choose Google Drive from your list of options. By doing this, the selected file uploads to your Google Drive account. Organizing, Sharing, and Deleting Files Organizing files in your Drive are fast and easy. You have to create folders and begin sorting. To create a new folder on Google Drive using a mobile device, you have to tap the blue + button and select Folder. To move files from one folder to another folder using a different Android device, tap the More Actions icon, which is represented by three vertical dots and is located next to the selected file. Then, tap on the Move option and select the new folder location for the file. Now, how do you delete a file? Open the Google Drive app, search for the file you want to delete, tap the More Actions button next to the file and tap the Remove option. The file should then be deleted from Google’s cloud. Because you already know how to organize and delete files on Google Drive, we’ll teach you how to share them. Yes, it is possible to share files on Google Drive. If you are using your Android device, search for the file, tap on the More Actions button, next to the file you want to share, and enable the Link Sharing option. By doing that, the link will be copied automatically, so you can easily share the link through messaging apps or email it to a friend. - Compose a new email on Gmail. - Tap on the Paper Clip icon located at the top right corner of your screen. - Select Insert from Drive. - Locate and select the file you want to add. Tap the Send button on your email. - If you want to send the file to somebody without a Google account, you have a few Sharing options you can choose from. Choose the option Anyone with the Link. After that, tap on the Can View option to grant permissions whether you want the user to view or edit the file. If the person already has a Google account, enter the email address of the recipient. Viewing the Files and Folders on Google Drive To view the items you have on your Google Drive, launch the Google Drive app, tap on the My Drive options, and press the Refresh icon. By refreshing your Drive, you can ensure that all files on your Drive will show. Third-Party Applications and Google Docs One reason why many businesses prefer to use Google Drive is that it is already connected to the office productivity suite of Google, which includes Google Sheets, Slides, and Docs. You can automatically create and save documents, spreadsheets, and slideshow presentations in your Drive. If you are using the mobile app, you can tap on the blue New button in the bottom-right portion of your screen. Decide whether you want to create a Google Doc, Google Sheet, or a Google Slide. Tap on the document type you want to create. Select Google Docs if you want to create a new document file, Google Sheet if you’re going to create a new spreadsheet file, or Google Slide if you want to create a new slideshow presentation. If the Google Docs, Google Sheet, or Google Slide app is already installed on your Android device, it will automatically open up so you can start working. If you don’t have these apps yet, you will be redirected to Google Play Store. Aside from Google’s office productivity suite, Google Drive is integrated with other third-party apps, such as DocHub, Draw.io, and Pixlr Express. Just because Google Drive is connected to Google’s cloud does not mean you cannot use it without the Internet connection. Believe it or not, even if you are not online, you can access Google Docs. You can also create, view, or edit Google Sheets, Docs, and Slides. Once an Internet connection is established, all the changes will just be synced automatically. - On your mobile device, launch the Google Drive app, tap on the More Actions icon, and tap on the Available Offline option. Why Google Drive? There are a lot of different cloud storage services available to date, but why Google Drive? If you choose Google Drive, you can easily access and store files from different computers and devices because it’s in the cloud. It also allows you to collaborate and share photos, documents, and notes with other individuals. Below are three of the major advantages of using Google Drive: - Files are accessible on any devices, anywhere. - Files can be collaborated and shared with colleagues, family members, friends, and workmates. - Files are automatically saved, so you don’t have to worry about power outages that cause you to lose files. If you’ve made it this far, you are equipped with the right knowledge on how to use the Google Drive app using your Android device. But before you go on exploring the other features of Google Drive, be sure your Android device can keep up with the memory and storage requirements of the activities you are about to do. Download and install android cleaning app to close programs and background applications that cause your Android device to lag as well as remove junk files that are consuming your device’s storage space. With this app on your device, you can go ahead and use Google Drive worry-free! What are your thoughts on this article? Let us know by leaving comments below.
<urn:uuid:9de48e1c-5350-4526-97db-d4e7d11d06ad>
CC-MAIN-2022-33
https://softwaretested.com/android/how-to-use-google-drive-using-your-android-device/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00666.warc.gz
en
0.910975
1,706
2.1875
2
AU President Pat Pitney. Photo courtesy of UA. If you haven’t noticed already, the University of Alaska Anchorage is a large organization with a bewildering list of titles, positions, and departments: dean, president, chancellor, director, professor, assistant, associate professor, etc To help clear things up, here is an overview of the UAA’s organizational structure. John Nofsinger, dean of the College of Business and Public Policy, also answered a few questions during an interview with The Northern Light to shed some light on the organization. University of Alaska It makes sense to start at the top, and you can’t go much higher than the University of Alaska. Commonly referred to as UA or Statewide, you have already interacted with this umbrella organization if you have enrolled in courses or done anything through UAOnline. The AU oversees the three publicly funded universities in Alaska: University of Alaska Fairbanks, University of Alaska Southeast, and University of Alaska Anchorage. It can be easy to confuse the abbreviations for UA and UAA. The management consists of a 9-member board of directors chosen by the governor. The board selects a president for the organization. Recently, Pat Pitney was selected after serving as interim president. “Interim” is a prefix meaning temporary and applies when a person is in a position while a search for a permanent replacement is in progress, although it is common to see people move from interim to permanent, as in the case of President Pitney. What exactly does UA do? You can get an idea by looking at the different departments attached to the president: general legal advice, human resources, planning and budget, IT, students and research. These functions are things that have been centralized under UA, Nofsinger said. He also said the organization is responsible for preparing budgets for individual universities and presenting them to the state legislature as one piece of legislation. The annual budget to operate the three universities is nearly $1 billion, and the state pays about a third of that amount. The rest comes from tuition, grants, and federal funding. Providing a united front, the AU advocates for the university system with the legislature and receives input regarding state priorities and what is needed to produce a budget that will pass a vote. The organization also organizes the Juneau Student Trip each year where students from the three universities travel to the capital to speak with lawmakers and advocate for the universities. Technically, UA is the employer of everyone working at UAA. Additionally, they are in contentious bargaining with the faculty union, United Academics, as The Northern Light reported earlier this summer. University of Alaska at Anchorage The University of Alaska Anchorage is its own fully accredited university. The highest leadership position is called Chancellor and is currently held by former Alaska Governor Sean Parnell. Parnell was selected after a search for candidates by AU President Pitney. Under Parnell, the management of the university fell into two main categories: teaching and administration. Vice-chancellors oversee administrative departments such as student affairs, administrative services, academic advancement, and research. Below them, the university organization is divided into many different departments. Some of these departments, like Athletics, have a large staff with dozens of people, others only a handful. A common term to describe the heads of these various departments is “director”, although you may occasionally find associate vice chancellor, coordinator and general manager. “Director” is also the term used to describe the leaders who oversee UAA’s satellite campuses, such as Kodiak College. On the academic side, Provost Denise Runge is responsible for the various colleges in UAA – College of Arts and Sciences, College of Public Affairs and Policy, etc. – and academic affairs. The term “provost” generally refers to a person whose job it is to provide leadership for several colleges, although Runge’s full title also includes vice-chancellor. Below Provost Runge are the deans of the various colleges and below them are the chairs of specific college departments. As for dealing with issues in the classroom, Nofsinger said that ideally students would move from teacher to department head and then to associate deans. For larger systemic issues, students can approach the Associate Deans directly. If a student does not wish to resolve an issue within a specific department, there is the Office of the Dean of Students, headed by Benjamin Morton, who can also handle issues. On the other hand, the Dean of Students is the department that handles disciplinary action against students for issues raised by faculty and staff. While enrolling in courses or looking at different departments, you might have noticed that there are a large number of titles for the faculty. Nofsinger said UAA has a few different types of faculty teaching on campus. First there are the teachers. When they start, they are called “assistant professors” and can later be promoted to “associate professors”. Finally, they can be tenured and promoted to “professor”. These teachers are often tenured and represent the long-term core of the university. They also have more rights than other teaching positions — tenured professors have the most — Nofsinger said. Then come the “full-term professors”. Nofsinger said these faculty members must be rehired every year and have fewer rights and benefits than full-time employees. Finally, there are the “helpers”. They are often professionals who are actually working in their respective fields and they are hired to teach related courses. It can be tempting to think that professors are superior to adjuncts, but Nofsinger said adjuncts bring real-world experiences and knowledge to the classroom, and for this reason, many students enjoy taking classes with them. . The University of Alaska Anchorage Student Union is the student government of UAA. The assembly is made up of a president, a vice-president, 10 senators, two delegates from each college and three liaison officers. Katie Scoggin is the current president. Vice President Shanone Tejada answered some questions about how the organization works and what it does. USUAA is one of the ways students influence university policy, Tejada said. Although the assembly cannot hire and fire people, or appropriate funds, it can pass laws defending the interests of students. This legislation can be important when the university needs to write policy, show support for an initiative, or secure funding, Tejada said. A good example of this was at a recent USUAA meeting when Executive Director of Campus Services David Weaver provided an update on the return of shuttle services to campus – closed due to covid – and thanked the USUAA for its legislation that had called for a return to services, saying it was helpful in securing funding. Tejada said the legislation is important because it creates a history of student priorities and what they are asking for. USUAA members can also be good resources when trying to solve problems on campus. Tejada said he gained increased knowledge of campus resources through meetings and conversations he had with campus management. Finally, through Presidential Appointments, students can serve on various campus boards, committees, and organizations, giving them the opportunity to gain leadership experience and have a seat at the table when it comes to life. is about deciding campus policies.
<urn:uuid:a1cacf9f-f603-4421-81c9-ff1dee0faeb5>
CC-MAIN-2022-33
https://lanzaroteagenda.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00274.warc.gz
en
0.967307
1,557
1.945313
2
PARIS — Angela Merkel, Germany’s chancellor, finds herself once again in the politically perilous position of balancing the future of Europe and its common currency against a German public that is unhappy at the price the country will have to pay. And, as before, as the euro crisis has unfolded, she finds herself fighting for measures that most experts have already dismissed as inadequate. Mrs. Merkel needs parliamentary support to carry out decisions made more than two months ago in Brussels, and to bolster her case she met with the Greek prime minister, George A. Papandreou, on Tuesday evening in Berlin. It was a kind of morality play, intended to show to skeptical German voters how the Greek government intends to keep its promises to continue cutting public spending and services to meet stiff deficit requirements, despite increasing political opposition. Mr. Papandreou spoke again of the “great will for change” in Greece, while Mrs. Merkel talked once more of her “confidence” that her wavering parliamentary coalition would vote on Thursday for an expansion of the European bailout fund, which was agreed to more than two months ago in Brussels. By the time the entire process is finished, about mid-October if all goes well, Europe’s leaders will have a newly expanded European Financial Stability Facility that most analysts say will be, at $600 billion, grossly inadequate to extinguish the crisis, since it lacks the means to cope with the larger economies of Italy and Spain.Continue reading the main story It seems another example of too little, too late on the part of the leaders of the 17-nation euro zone. But it is also another example of sharply differing analyses of the core problem of the euro, making a solution hard to reach. The German analysis, shared by the Dutch and others in prosperous northern Europe, like the Finns, sees as the main problem the indiscipline and profligacy of others, especially in the south, like Greece, Portugal, Italy and Spain, which have run up high debts or fiscal deficits. To rebuild confidence, this analysis says, the sinners must repent, restructure their economies and fix themselves. The road to redemption requires hard work, discipline, sacrifice and pain, even punishment for previous misbehavior. Mr. Papandreou, acutely aware of this strain of thought and the threat it poses to Greece, sought on Tuesday to calm passions. “We must stop blaming each other for our different weaknesses and unite together with our different strengths,” he said in a speech to a business group in Berlin. “Even Germany depends on Europe, its biggest trading partner, for growth and jobs.” The problem with the German analysis, notes Simon Tilford, chief economist for the Center for European Reform in London, is that it is not simply self-righteous, ignoring the bad loans German banks made to the troubled nations, but arguably wrong. It is “probably incompatible,” he added, with the survival of the euro zone, which all leaders insist is their aim. Growth is the key, the counter-argument goes, not austerity. Everyone agrees that countries like Greece need to cut their deficits. But if everyone is cutting at the same time, and in an uncoordinated way, the result may be a fierce economic contraction for Europe as a whole. And without growth, there is very little hope of getting out of the “debt trap,” whereby more cuts in government spending result in recession, lower tax receipts and larger deficits. “If there is austerity everywhere, where is the engine for growth?” said Jean-Paul Fitoussi, professor of economics at the Institute of Political Studies in Paris. “If there is no consumption, no reason to invest, difficulty in accessing the credit market, where is the growth? The only engine that is functioning in this view is the engine of depression, and this will worsen the sovereign debt and deficit problem.” The Germans and northerners, Mr. Fitoussi said, still believe that austerity and recession eventually will lead to stability, confidence and growth. “But there is no way what the Germans are saying can be true without divine intervention or a belief in miracles,” he said. “No austerity program can lead to growth in a period of discontinuity in the global economy and slowing economic activity everywhere.” Mr. Fitoussi has just done a study of economic growth in France, which is currently nearly flat, and which will have a growth rate of about 0.8 percent in 2012 if little changes, he said. “But if all the countries in Europe follow this austerity program,” Mr. Fitoussi said, France also will fall into recession, and its economy will shrink by 1 percent. Restructuring Greek debt will not solve its competitiveness problem, which could take 10 to 15 years, said Martin Kocher, a professor of economics at the University of Munich. “Greece will only be able to achieve higher levels of growth when it becomes more competitive again.” Mr. Tilford and others argue that countries like Germany, which benefit from very low interest rates given the panic about other countries’ sovereign debt, need to raise their economic activity and consumption, while the European Central Bank, which raised interest rates in July out of misplaced fears of inflation, should cut them again and pump more money into the euro zone. But such a policy runs against the German analysis of the problem and of the role of the central bank. And major institutional reform of the euro zone — like forming a common treasury — would require a sacrifice of sovereignty that seems to exceed the political appetites of Europe’s leaders. The German enthusiasm for further European integration seems to be waning, unless it is on German terms, which would mean no transfer of money from creditors to debtors. In recent days, European leaders have felt increasing pressure to deal effectively with the debt crisis from the United States and Asia, where financial markets took a beating last week on fears of contagion. Mrs. Merkel has had to expend considerable political capital to get even her own coalition and the German parliament ready to endorse the decisions of July 21, and a majority in her own coalition is not yet solid. She particularly wishes to avoid having to rely for a majority on the opposition Social Democrats and Greens, which would be a blow to her authority. But she has to get the measure passed. “Anything else would be a catastrophe for the government at this point,” said Gero Neugebauer, a political scientist at the Free University of Berlin. Yet, those decisions have already been discounted by the markets and are being overrun by events. They will have to be quickly followed by others of a larger magnitude, or the crisis will return in greater force. “That such a moderate agreement is inciting and inflating so much ill feeling in Germany is very worrying,” Mr. Tilford said. “It casts doubt that in the next six to nine months Germany will move fast and far enough to keep the car on the road.”Continue reading the main story
<urn:uuid:8e2fbb92-e570-4561-9d74-0fd21c63cd7b>
CC-MAIN-2017-04
http://www.nytimes.com/2011/09/28/world/europe/europe-nears-agreement-on-bailout-fund-that-may-be-inadequate.html?hp&_r=0
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00235-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961954
1,464
1.664063
2
Homeopathy Programs in Michigan - MI Online homeopathy programs in Michigan address all aspects of the discipline, including its historical roots, theoretical concepts and practical application of training. Students engage in courses that enable them to review relevant literature and to explore the kinds of treatments and remedies that can be used to treat the ill. In addition to understanding how best to diagnose and to care for those who are sick, homeopathy students examine the legalities and ethics of natural health careers to make certain that they abide by the highest standards once they become homeopathic practitioners. Most students must complete a hands-on learning experience near the conclusion of their homeopathy training. This allows them to identify connections between their textbook studies and real-world patient conditions so that are better prepared to practice in the field. This site-based learning is monitored by an experienced homeopath, as are internships and mentor programs in which students may participate to complement their online studies. They may find that cities such as Detroit, Warren and Grand Rapids provide an excellent opportunity to work with patients who may wish to pursue alternative medical treatment either instead of or in addition to care at, for example, William Beaumont Hospital and Henry Ford Hospital. Online programming affords individuals the opportunity to earn either a Bachelor’s degree in alternative medicine or various certificates and diplomas. After finishing the required training, they may seek homeopathic certification.
<urn:uuid:85ef9423-2f3f-4a11-8bff-400662e4cf0f>
CC-MAIN-2017-04
http://www.alliedhealthworld.com/homeopathy-training-in-michigan.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00386-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952794
280
2.15625
2
As of January 1, 2018 the mortgage rules for Canadians has changed. What that means is that if you are getting, renewing or refinancing a mortgage you might have to prove that you would be able to handle a hike in interest rates that are a lot higher than the current contract rate. The new rules mean that even borrowers with a down payment of 20 per cent or more will now face what is called a ‘stress test’. This has already been the case since last year for applicants with smaller downpayments that require mortgage insurance. So what does that mean? In a nutshell about 10 per cent of Canadians who DID get an uninsured mortgage between mid-2016 and mid-2017 would not have qualified under the new standards, as suggested by a recent analysis by the Bank of Canada. The rules will affect homebuyers, who would qualify for a mortgage for their preferred house today, but will likely fail the stress test for an equally large loan next year according a report. Here’s how the new guidelines might affect you: If you’re planning to buy a house with a downpayment of 20 per cent or more next year The stress test means that financial institutions will vet your mortgage application by using a minimum qualifying rate equal to the greater of the Bank of Canada’s five-year benchmark rate (currently 4.99 per cent) or their contractual rate plus two percentage points. If you’re going be house-hunting next year, this may force you to settle for a less expensive home than you would be able to buy today. Or, you might have to wait and save up for a larger down payment. The rules might force Canadians to set their eyes on homes that are up to 20 per cent cheaper. Experts say that about half will be able to make a different purchase than they had planned. The rest will give up on a home purchase. If you’re renewing your mortgage next year Lenders don’t have to apply the stress test to clients renewing an existing mortgage. This means that if you fail the stress test, you’ll probably get stuck renewing with your current financial institution, without being able to shop around for a better rate. If you’re refinancing your mortgage If you’re planning on refinancing your mortgage, you’ll have to qualify according to the higher stress-state rates rather than your existing contractual mortgage rate. So, say, for example, that you bought a $400,000 home and have a $100,000 mortgage balance left. You’d like to borrow $50,000 more for a renovation. You have a five year fixed-rate mortgage at 3.3 per cent. Today, your lender would make sure that you can take on a $150,000 loan at 3.3 per cent. Starting next year, your financial institution would have to vet that $150,000 loan using a 5.3 per cent rate. If you’re close to the borrowing limit today, you might have to settle for a smaller loan. Four cases in which the rules likely won’t affect you As they generally do, financial regulators have allowed for measures that will ease the transition, making sure the new rules don’t disrupt transactions that are underway by not yet completed in early 2018. If you signed a purchase agreement on a new home before Jan. 1., lenders won’t have to apply the stress test even if you apply for a mortgage in the new year. This also goes for for pre-construction sale and purchase agreements. If you are pre-approved for a mortgage, some lenders will give you 120 days starting Jan. 1 to buy your new home without worrying about the new rules. The same holds for mortgage refinancing. If you have a mortgage refinance commitment in place by Dec. 31, you have 120 days to follow suit. Of course, the stress test won’t have much of a concrete impact on you if you pass it. About credit unions The Office of the Superintendent of Financial Institutions (OSFI) rules only apply to federally regulated financial institutions, meaning Canadians might be able to continue borrowing without a stress test if they turn to provincially-regulated credit unions. In the past, however, credit unions have voluntarily adopted new federal standards on mortgage rates. Still, adopting rules on a voluntary basis means they would be able to make some exceptions. The stress test measures only one of three risk metrics lenders look at. Essentially, it ensures that borrowers’ housing expenses compared to their income remain below a certain threshold even if rates rise. But when evaluating a borrower, financial institutions also look at the size of the loan compared to the price of the house, as well as credit scores. A credit union that has voluntarily adopted the stress test, might make an exception for a family with very strong credit scores and a down payment considerably higher than 20 per cent, even if they fail to qualify under the new rules by a small margin. To receive similar content, “Like” us on Facebook @ https://www.facebook.com/niagarabuzz.ca
<urn:uuid:1218eda8-714d-43a8-b892-1620cf1e1a1e>
CC-MAIN-2022-33
https://www.niagarabuzz.ca/2018/01/11/home-and-garden/mortgage-rules-2018-new-stress-test-may-affect-purchasing-power/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00476.warc.gz
en
0.960366
1,075
1.9375
2
Posted on June 11, 2015 by Kaitlin Koch, Michigan State University Extension With Michigan’s growing season nearly upon us, it can be helpful to stop and consider new markets for your products this year. Depending on what type of operation you have, most of your product may already have a destination. Other growers may not have such a clear idea of where their products will end up. This article provides an overview of “Farm to Institution” and could help farmers determine if selling to Michigan institutions, like schools and hospitals, is the right thing to do. There are many benefits to selling to institutions if you can successfully establish a relationship with an institutional purchaser. These purchasers are often looking for large volumes of products, on a regular and predictable schedule. Many institutions are willing to accept seconds, depending on the product, and could provide a market for goods that are otherwise difficult to sell in direct markets. Some purchasers are willing to create a plan with growers for the upcoming season and commit to purchasing specific quantities.
<urn:uuid:84f7cb83-9c61-4e0b-981b-e7349efc2027>
CC-MAIN-2022-33
https://www.cultivatemichigan.org/news/2015/08/02/selling-your-crop-michigan-institutions-summer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00064.warc.gz
en
0.961873
208
2.03125
2
I found this video interesting, as posted by Nancy. I watched this months ago, and I thought it challenges us to re-think about how we teach, and how our students learn. I tend to believe that students do have certain preference in their learning, especially for the teenagers and adults. However, they may still be expected to perform to the standards stipulated in standardized curriculum. Most “digital youths, natives, digital visitors and residents” have certain learning practices and expectations that are unlike “our good days of learning”. There are fundamental challenging question for educators: 1. What should be the roles of educators in the education and learning process (or journey)? Should educators shape, or adapt, or to conform with the education system? What are the merits and demerits in shaping, adapting and conforming to the education system? 2. What should be changed to support and help both educators and learners to learn, strategically, operationally, and tactically? 3. How would educators adopt technology in enhancing educational and learning experience in an open learning platform and environment? 4. What can educators learn from students, colleagues and workers? Postscript: This video sounds interesting and it relates to the role of the teachers using technology in a classroom environment in schools.
<urn:uuid:8303b367-d5a3-4735-b2c6-f9d7b03563bf>
CC-MAIN-2017-04
https://suifaijohnmak.wordpress.com/2012/03/23/change11-cck12-what-can-educators-learn-from-students-colleagues-and-workers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00539-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95805
266
3.125
3
September 22, 2010 Titan's northern hemisphere is set for fine spring weather, with polar skies clearing since the equinox in August of last year. Cassini's Visual and Infrared Mapping Spectrometer (VIMS) instrument has been monitoring clouds on Titan continuously since the spacecraft went into orbit around Saturn. Now, a team led by Sebastien Rodriguez from the AIM laboratory at the Universite Paris Diderot has used more than 2,000 VIMS images to create the first long-term study of Titan's weather that includes the equinox using observational data. Together with Saturn in its 30-year orbit around the Sun, Titan has seasons that last for 7 terrestrial years. The team observed significant atmospheric changes between July 2004, early summer in the southern hemisphere, and April 2010, the very start of northern spring. The images show that cloud activity has recently decreased near both of Titan's poles. These regions had been heavily overcast during the late southern summer until 2008, a few months before the equinox. "Over the past 6 years, we've found that clouds appear clustered in three distinct latitude regions of Titan — large clouds at the north pole, patchy cloud at the south pole, and a narrow belt around 40° south," said Rodriguez. "However, we are now seeing evidence of a seasonal circulation turnover on Titan — the clouds at the south pole completely disappeared just before the equinox, and the clouds in the north are thinning out. This agrees with predictions from models, and we are expecting to see cloud activity reverse from one hemisphere to another in the coming decade as southern winter approaches." The team has used results from the Global Climate Models (GCMs) developed by Pascal Rannou from the Institut Pierre Simon Laplace in France to interpret the evolution of the observed cloud patterns over time. By a constant influx of ethane and aerosols from the stratosphere, northern polar clouds of ethane form in Titan's troposphere during the winter at altitudes of 19-31 miles (30-50 kilometers). In the other hemisphere, the upwelling from the surface of air enriched in methane produces mid- and high-latitude clouds. Observations of the location and activity of Titan's clouds over long periods are vital in developing a global understanding of Titan's climate and meteorological cycle. Since Cassini reached Saturn, VIMS has acquired more than 20,000 images of Titan. The VIMS instrument consists of two detectors, one that maps in visible wavelengths and the other that maps in infrared, which also gather spectral information about the composition of observed targets. Rodriguez and his colleagues filtered the images to eliminate nighttime and distorted views, ending up with around 2,000 that were useful for identifying cloud activity. However, with the need to analyze each pixel in each image to identify the spectral properties of clouds, this was too vast a dataset for the team to evaluate manually. "Even having eliminated 90 percent of the images, we were still left with several million spectra to analyze," said Rodriguez. We developed a computer program that picked out the cloudy pixels, and we then went back and visually checked the detections to make sure that they were relevant." In February 2010, the Cassini mission was extended to a few months past Saturn's northern summer solstice in May 2017. This means that Rodriguez and his team will be able to observe seasonal changes from mid-winter to mid-summer in the northern hemisphere. "We have learned a lot about Titan's climate since Cassini arrived at Saturn, but there is still a great deal to learn," said Rodriguez. "With the new mission extension, we will have the opportunity to answer some of the key questions about the meteorology of this fascinating moon."
<urn:uuid:05efe93a-e34a-45a0-b81a-dad0419ef9ab>
CC-MAIN-2017-04
http://astronomy.com/news-observing/news/2010/09/spring%20on%20titan%20brings%20sunshine%20and%20patchy%20clouds
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00122-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965564
768
3.390625
3
When Europe went to war in 1914, it did so in a mood of joyous certainty. Both sides were confident that their cause was just, that their armies were invincible, and that their consequent victories would be glorious, overwhelmingly and practically immediate. So inexhaustible are the springs of human optimism that it was some time before the nations as a whole realised that the war was not progressing in accordance with their first ingenuous suppositions, and that they would be called upon to pay for their days of ardour throughout the years of pain and anguish. Such optimism as was so clearly manifest in the opposing armies in the late summer and autumn of 1914 was coincidentally reflected in their colourful uniforms; but all too soon, as the "Doctrine of Attrition" of doubtful inspiration entrenched the belligerents on the Western Front, the magnificently decorative military dress of the old world gave way to the muted, coloured "protective clothing" of today. As an example, it was not until one whole year after the commencement of hostilities that France forswore her brightly-coloured, pre-war uniforms and adopted horizon blue. This volume covers the peace-time and field uniforms of the metropolitan armies and aviation services, which fought in Europe at the heart of the struggle in World War I. This is Andrew Mollo’s twelfth book on military uniforms. When not writing books, he works as an historical consultant and has co-directed two highly-acclaimed feature films, It Happened Here and Winstanley. - Title: Uniforms of World War I - Period: World War One, 1914–1918 - Type: Uniformology - Author: John Mollo - Illustrator: Pierre Turner - Format: 220-page Book with 245 Colour Illustrations - Language: English - Publisher: Blandford Press Ltd., Poole, Dorset - ISBN: 0713715332 - Published: 1977 - Uniform Notes - Great Britain - United States of America - Notes to Plates - Index to Illustrations Uniforms of World War I is a comprehensive resource for figure painters, diorama builders, and wargamers interested in raising armies for the Great War, 1914–1918. The illustrations are based on actual people like Austrian Archduke Eugène, Archduke Joseph, Lieutenant Godwin von Brumowski, Bulgarian General Jekoff, French General Foch, Lieutenant Charles Nungesser, 2nd Lieutenant René Fonck, Sergeant Aviator James Roger MacConnell, Kaiser Wilhelm II., Field-Marshal von Hindenburg, Lieutenant-General von Watter, Crown Prince William of Prussia, Prince Rupprecht of Bavaria, Leutnant Rudolf von Eschwege, Rittmeister Freiherr Manfred von Richthofen, Brigadier General F. W. Ramsey, Field Marshal Sir Douglas Haig, Brigadier General Nesle, Lieutenant Colonel A. E. Cator, Captain W. G. Barker, Capitano-Piloto Natali Palli, Lieutenant General Armando Diaz, King Nicholas of Montenegro, Commandant Jósef Pilsudski, General of Division Jósef Haller, Tsar Nicholas II., Lieutenant General Frederick von Brincken, Podporuchik Alexei Shivkov, Major General Heroys, Brigadier General Douglas MacArthur, General John J. Pershing, 2nd Lieutenant E. Kindley, Captain Eddie V. Rickenbacker, among others. The descriptions of the colour illustrations are quite short, compared to those found in similar Blandford uniform books, because most of the important detail is covered in the uniform notes sections of the individual armies. Packed with information, John Mollo’s Uniforms of World War I offers good value for money.
<urn:uuid:7ad1881f-c319-4794-9fa2-22d2ffb6a1bc>
CC-MAIN-2022-33
https://www.miniatures.de/book-blandford-mollo-uniforms-world-war-one.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00276.warc.gz
en
0.906969
869
2.703125
3