text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Court system essential part of democracy: Canadian Bar Association Association head rejects Tory claims the courts are undermining democracy Canadians should not be worried about the judicial system undermining democracy, says the president of the Canadian Bar Association, in response to recent comments by Conservative parliamentarians criticizing and questioning the judiciary. “The courts are essential and integral to a democracy. They play a very important role in the citizens’ ability to see that justice is done, to protect their rights and to see that laws are adopted and applied properly, Fred Headon told CBC Radio’s The House in an interview. Courts accused of 'end run' A week ago, Conservative MP Dan Albas said some groups are now using courts to do an “end-run” around the democratic process. Albas suggested citizens are losing if “unelected judges” can overturn policy decisions made by the government. Responding to those comments, Headon said Canadian judges are acting with “a fair degree of deference to Parliament” and that the scope given to the courts is defined by law. Heaton argues that parliamentarians have plenty of ways of pushing back. “You can advise or ask the government to appeal that decision, and if that doesn’t lead to a satisfactory outcome for you, as a parliamentarian, can actually adopt another law,” said Headon. A larger concern for Headon is the possibility that this questioning of judges and courts will ultimately undermine Canadians’ confidence in the court system. “In our reactions we need to recall the role that they [judges] play and be respectful of it. It could be very harmful if we lose sight of that,” said Headon.
<urn:uuid:2e340f75-46d2-410b-b22a-b5dcad047440>
CC-MAIN-2022-33
https://www.cbc.ca/news/politics/court-system-essential-part-of-democracy-canadian-bar-association-1.2718383
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00674.warc.gz
en
0.954083
365
2.3125
2
So, the weather has been insanely hot over the last two days and tomorrow is supposed to bring more of the same. Hopefully, all of you have stayed cool and safe. The temperatures are hotter than they should be for this time and year, but it is making things grow really fast. This can be good and bad. Bad because it probably means that my sugar snap peas will stop producing sooner than later, but it also means that my seeds are sprouting like crazy. I will say that I am very glad that we did not go into this kind of heat without a few good days of rain under our belts. Hot weather with a bit of a breeze can dry things out so very quickly. For a bit of trivia for you to test your plant loving friends. How any gallons of water can a 90 ft tall and wide tree loose on a 90 degree day with a slight amount of wind? Over a 100 gallons of water. Trees need on average 1-1 1/2 inches of rain per week. How much does turf need to survive? On average 3/4 inch per month. So there is something to go out and see if your garden friends know. So back to discussing the sprouting side of things. The other day I showed a picture of two tiny lettuce seed sprouts, now look at the thing… Then there is the pot in which I planted basil seeds. These were planted on June 4th. I seeded a bit heavier than I probably need to to since the seed was from 2009. As seeds get older their germination rate drops. Apparently the basil didn’t realize that it was from a few years ago. Some seeds keep their viability longer than others. Usually I just increase the amount of seed I use if it’s older seed. If you have leftover seed from this year and would like to save it until next year, store in a cool dry place. This is just way too many seedlings for one pot. I’ll end up thinning down most of them and transplanting a few to other pots. I make a lot of pesto during the summer, it’s a really and easy to make. If you want to make pesto, you don’t have to use pine nuts, use walnuts instead. Pine nuts are insanely expensive and pesto should be easy. I’ll do a post later it the season about using basil to make fresh pesto. The potatoes are also starting to flower. These potatoes have been in the ground since sometime in March. I don’t remember the exact date, but it was the earliest I ever have planted anything. Usually when potatoes start to flower it means that the tubers are starting to form underground and could be dug soon if I wanted, but I’m going to wait longer to give them some more time to grow. If you want storage potatoes, you’ll let these stay in the ground until the top of the plant turns brown. This gives the potatoes time to develop a tougher skin making them better for storage. If you’re wondering, these are Yukon Gold potatoes. I love these potatoes more so than traditional white potatoes. And for some last bit of garden eye candy…the okra and cucumbers have also sprouted. So, keep an eye on the moisture in your garden especially with this hot weather. If you’re wondering whether or not to water, stick your fingers about an inch down into the soil, if it’s wet than don’t worry about watering, if it’s dry grab the hose.
<urn:uuid:05bc2d80-4ce7-44b0-9990-4f12558d45aa>
CC-MAIN-2022-33
https://thegardensprout.com/2011/06/07/staying-cool/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00476.warc.gz
en
0.963333
749
1.734375
2
Date of Birth: 12 May 1931 Harry Baird played in 2 movies in the Drama, Fantasy, Action, Comedy genres. Harry Baird didn't achieve real success and got average imdb rating 4.8. Players in a number of racially-motivated British films during the 1950s and 1960s, actor Harry Baird was born in Georgetown, Guyana (then called British Guiana) on May 12, 1931 and received his tutoring both in Canada and England. Famed helmsman 'Carol Reed (I)' (qv) gave Harry his film discontinuation in 1954 at period 23 when he cast the actor in the smallish job of a black boxer named Jamaica in _A Kid for Two Farthings (1955)_ (qv), a tale that dealt with the tense ethnic struggles of Londo... Read more
<urn:uuid:3040f3e2-399c-47ec-b1a2-850b2678d2bd>
CC-MAIN-2017-04
http://full-movie-downloads.net/actor_director/Harry_Baird
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00567-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969901
170
1.554688
2
The history, scenery and water quality of a historic property in Aldie, Virginia will forever be protected by NVCT for future generations. This marked our 103rd conservation easement since our founding nearly 25 years ago. The historic land is home to the Old Aldie Rectory built in 1803 and is also located within the Civil War Battlefield of Aldie. In fact, Union and Confederate cavalry columns converged near this site. Running through the 5.5 acre property is a stream that drains into the Little River and eventually flows into the Chesapeake Bay. The preservation of the land and water upstream will protect the water quality all the way downstream. Much of the drinking water supplied to residents of Northern Virginia comes from the Potomac River, making the protection of this watershed crucial to the health of our local communities. 20 Acres of Open Grassland in Loudoun County PROTECTED! In Loudoun County near Round Hill, a family completed an easement that protects the 20 acres surrounding their home. They first purchased land to build their energy-efficient dream house, then bought the parcel next door to help keep it in open grassland. The donors worked with NVCT over the course of two years to create a conservation easement that protects rural scenic views in the Beaverdam Creek Historic Roadways District. The land features an old orchard, brand new hop trellises, milkweed for monarch butterflies, and a stream in the Goose Creek watershed. Loudoun County: Conserving a Sense of Place NVCT holds 22 conservation easements and owns one parcel in Loudoun County. Of the more-than 1,400 acres the Trust has conserved in Loudoun County, more than half is working farmland. By preserving their lands in perpetuity, these dedicated landowners are creating a sustainable lifestyle for themselves and their families while conserving scenic open space for all to enjoy. Loudoun County landowners have worked with the Trust to protect other remarkable sites like these: 89 acres surrounding EcoVillage, an innovative, environmentally friendly development near Lovettsville; 4 acres protecting open space and a Revolutionary War-era stone wall in Middleburg; 135 acres of open farmland that protects the public view between Harpers Ferry Road, a designated Scenic Byway, and Short Hill. The Trust is involved with the Blue Ridge Conservation Alliance, a collaborative effort to build appreciation and protection of the Blue Ridge Mountains between Shenandoah National Park and Harpers Ferry. NVCT welcomes opportunities to engage with the community, and we are eager to meet with landowners about prospects for permanently protecting important lands. Open space and natural areas in Loudoun County This map shows public land and parks in bright green, NVCT conserved lands marked with blue dots, and other private easements in dark green.
<urn:uuid:8947281b-7fb8-4773-9514-005992b1fe93>
CC-MAIN-2022-33
https://www.nvct.org/wherewework/loudoun-county
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00067.warc.gz
en
0.933504
574
2.234375
2
We’re thrilled to publicize the release of online colorizing of photos, a groundbreaking function to automatically colorize your white and black pictures, which generates amazing results. Pictures give a distinctive look at in to the lifestyles of our ancestors and relatives, but viewing them in white and black locations them in a certain distance. Viewing exactly the same pictures in color provides those to lifestyle like hardly anything else can. Colorized historical photos can ignite interest previously, and allow us to associate more individually to occasions and folks from times removed by. It allows us to look at these photographs inside an completely new way, giving us new perspectives on the people and locations who made us who we have been today. Imagine viewing your grandparents’ wedding ceremony photo colored for the first time, or noticing the small details portraying lifestyle in the roads of the latest York a hundred in the past. Once you view the colorized images next to the initial monochrome photos, you will be amazed by the distinction. How it operates The Photo Colorized that capabilities this feature was licensed by Colorize Photo from DeOldify, developed by software program designers Jason Antic and Dana Kelley. An earlier edition in the DeOldify technology was offered by Antic to the general public domain in Nov 2018. Antic and Kelley up-to-date it in May 2019. Ever since then, they have ongoing to improve and fine-track the technologies commercially. Their newest edition generates colorized pictures of unparalleled high quality and is presently only at Lunapic . We feel this is the best technology inside the world for colorizing black and white photos. The technology was skilled using millions of photos, and it has created an understanding of our world along with its colors. The results are more realistic and also fine quality to those produced by other automated colorization resources now available. The white and black pictures remain undamaged and are not altered by the colorization procedure, which generates new photos together with the initial types. Photoshop functions on all photos – even washed out pictures that still possess some color in them. The shades you’ll see inside your pictures are simulated instantly from the colorization algorithms – there is no manual retouching included. Once you publish your picture, you’ll be asked to sign approximately Algorithmia to colorize your pictures. Signing up is free of charge. If you currently have a Photoshop accounts, and you haven’t recorded in earlier, simply select the “Log in” option at the base from the popup. Colorizing a picture normally takes just a few seconds, depending on its dimension and degree of details. Throughout the colorization procedure, a spinning preloader will animate in the middle of the picture. When the colorized picture is ready, it will likely be displayed. The original monochrome photo continues to be intact, and you get a new, colorized photo that is kept separately, within the same resolution as your original photo. You will be able to drag the slider over the picture to view the before and after effect of colorizing your photo, or use the icons in the top right to toggle rapidly involving the black and white and colorized versions. You should share the colorized photo on social media with your friends and family. The reactions of the family and friends will be invaluable, and they also can then consider the ability to colorize their particular white and black photos. Included in our persistence for conserving the genuineness of historical documents, we take the added step of distinguishing colorized photos from these photographed originally in color using a special embossed palette sign towards the bottom left area of colorized pictures. We hope that the accountable exercise is going to be adopted by others who use picture colorization technologies, to mdrmca that fact can be recognized from fiction. Whilst extremely practical, photos that are colorized using Colorize Photo have colors that are simulated by automatic sets of rules, and these colours may not be just like the true-life colors when the original photo was used. Colorizing pictures currently on Lunapic If you have a Color Surprise AI accounts, and also a family tree in the platform, you might be one of our numerous customers who collectively submitted hundreds of countless historical pictures to Colorize Photo. You can now colorize any picture that you already have on Color Surprise AI, thanks to a built-in colorization function that we have just added. To accomplish this, first choose “My Photos” from your Family members Plant tab to access your pictures.
<urn:uuid:9c1fdf7e-867a-45c0-873a-1dd5e79835c2>
CC-MAIN-2022-33
https://brownscheapshop.com/8995/image-colorized-read-this-post/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00477.warc.gz
en
0.938773
936
1.929688
2
[The current reform package] mandates that health insurance premiums for older Americans be no more than twice the level of that for younger Americans. That's much less than the actual health spending gap between young and old. Spending for those age 60 to 64 is four to five times greater than those 18 to 24. So, the young would overpay for insurance that -- under the House bill -- people must buy: Twenty- and thirtysomethings would subsidize premiums for fifty-and sixtysomethings. (Those 65 and over receive Medicare.)What happened to people saving for their own retirement / declining health in their golden years while they're still young? What sort of incentive will exist for people to actually take care of themselves? Oh Really, Meryl? Packers/Cowboys Game Blew Away Golden Globes In The Ratings Suspect Behind Istanbul Nightclub Attack Captured Trump Just Met With Top SCOTUS Candidate Obama Fades Away As Trump Laughs At His Enemies Where Are They Now? These 23 Celebrities Said They'd Move If Trump Won
<urn:uuid:a2aecc22-0351-4a8f-b33d-93b2228fbed3>
CC-MAIN-2017-04
http://townhall.com/tipsheet/townhallcomstaff/2009/11/23/re_mccain_tells_sr_citizens_to_cut_up_their_aarp_cards
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00324-ip-10-171-10-70.ec2.internal.warc.gz
en
0.906358
218
1.898438
2
<< -- 3 -- Robert Anderson FASCINATING SUGGESTIONS While discussing the Op 30 sonatas, Richard Kramer is beguiled by the odd notion of equating Beethoven's 'eviscerating' of Mozart with the encounter of Oedipus and Laius at the crossroads. His very proper interest in the piano sonatas of the same period leaves Kramer hardly enough space for the violin works themselves. As Suhnne Ahn indicates, the 'Kreutzer' sonata stands apart, not only because its finale was written first, having been found too forceful a conclusion for Op 30 No 1 (all but the crash of its initial chord); but also for its 'molto concertante' style, almost like a concerto in its technical demands. William Drabkin takes up a lead from Tovey on the introduction to the 'Kreutzer' in rigorous argument vis-à-vis relevant works of Mozart and piano concertos 3 and 4 of Beethoven. He ranges impressively over both precedents and consequents. Maynard Solomon also finds himself in Classical pastures when invoking Oedipus and Adonis as heroes of the pastoral life (rather than risky love affairs), precisely where he would maintain the Op 96 G major sonata has its essential being. If Solomon's imagination runs away with him, this is not for the first time in his career; a searching and provocative Beethoven biographer, he is less sure-footed when facing the music. All in all, the book needed more rigorous editing than it received; if boredom sets in, I can strongly recommend a play-through of any sonata or, as second best, recourse to a score and CD. Copyright © 14 November 2004 Robert Anderson, London UK The Beethoven Violin Sonatas History, Criticism, Performance Edited by Lewis Lockwood and Mark Kroll University of Illinois Press, Urbana and Chicago, 2004 ISBN 0-252-02932-1, hardback, 164 pages
<urn:uuid:7f5aeb82-5ba0-4919-b8e8-1bb5521b559a>
CC-MAIN-2017-04
http://www.mvdaily.com/articles/2004/11/kroll3.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00534-ip-10-171-10-70.ec2.internal.warc.gz
en
0.883602
448
1.554688
2
Investment Risk Management (Financial Markets and Investments) is published by Oxford University Press in January 2015. This book has 712 pages in English, ISBN-13 978-0199331963. All investments carry with them some degree of risk. In the financial world, individuals, professional money managers, financial institutions, and many others encounter and must deal with risk. Risk management is a process of determining what risks exist in an investment and then handling those risks in the best-suited way. This is important because it can reduce or augment risk depending on the goals of investors and portfolio managers. The main purpose of Investment Risk Management is to provide an overview of developments in risk management and a synthesis of research involving these developments. The book examines ways to alter exposures through measuring and managing those exposures and provides an understanding of the latest strategies and trends within risk management. The scope of the coverage is broad and encompasses the most important aspects of investment risk management. Its 30 chapters are organized into six sections: (1) foundations of risk management, (2) types of risk, (3) quantitative assessment of risk, (4) risk and risk classes, (5) hedging risk and (6) going forward. The book should be of particular interest to sophisticated practitioners, investors, academics, and graduate finance students. Investment Risk Management provides a fresh look at this intriguing but complex subject.
<urn:uuid:9dc52c7c-83d1-472b-bad0-6fc632394c1e>
CC-MAIN-2017-04
https://bookdl.com/978-0199331963/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00495-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932566
280
1.96875
2
Microaggressions in a Relationship: A Couple's Worst Enemy Microaggressions are a hidden form of psychological abuse based on persistent, daily snubs–the kind of humiliation where the other person uses jokes or mockery to whittle away at your self-esteem. Microaggressions in a relationship can be even more insidious. This is the type of abuse you don’t hear about as much because it’s not as obvious. It doesn’t leave marks, and a lot of the time neither the abuser nor the victim are aware of the fact that something so destructive is going on. Here are some examples to help explain what we’re talking about. It’s common for both men and women to tell each other things like: “I love how clumsy you are, it always makes my day when you break things.” “I had better do the talking, you might mess it up if you do it”, “Wait, don’t, just let me do it. With those butterfingers of yours, you’ll probably break it.” As you can see, there’s a certain sense of love and intimacy in these statements, but it actually just puts all the control in one person’s hands and denies it to other person. We encourage you to dig deeper into this topic and learn more about this type of verbal abuse. It can happen to any one of us, whether with a partner, at work, school, or in any other part of your daily life. Characteristics of microaggressions A couple builds a relationship on a series of fundamental pillars: respect, patience, empathy, intimacy, and mutual understanding. When one of these dimensions fails, the rest become weaker. Without good communication, for example, it’s impossible for there to be true empathy. Without empathy, it’s impossible for there to be true mutual understanding. A happy, healthy relationship is like a strong fabric full of different colors that go well together. The differences are okay because there’s a balance between all the threads making up the fabric. Now, microaggressions are like pulling out one small thread every day. You don’t really notice it at the time, but it eventually weakens the whole thing and leaves holes that happiness and harmony escape out of. Let’s look at the main characteristics of microaggressions in a relationship. Microaggressions in a relationship Inattentiveness and underestimation Inattentiveness and underestimation basically involve a noticeable lack of interest in the other person. This means it’s the kind of relationship microaggression that happens on a daily basis. Here are a few little examples of a couple’s “worst enemy:” - Making fun of what the other person likes. - Lacking the kind of thoughtfulness that keeps relationships going. - Never having time to do what the other likes to do (“it’s never a good time”). - Mocking what the other person likes in front of other people (“she just spends all day reading, what a waste of time…”) Rejecting the other person, making them feel dumb This is definitely one of the most common characteristics of microaggressions in a relationship, and in general. The complicated part is that it often starts as a way of spoiling the other person. In other words, you might do it thinking it’s innocent, just another way to show love and affection. Here are some examples to give you an idea: - The other person starts to take charge of things because they claim that “they do it better than you, and that way it’ll save you some work.” - They might talk about your supposed flaws in front of friends and family. “She just can’t cook, anything she touches she breaks, you should see what she did to the computer…” - All of this is very harmful and erodes your sense of identity and self-esteem. I Was in a Toxic, Damaging Relationship Too Lack of trust in the other person As you keep on getting hit with these microaggressions, you might start to go through personal changes. Besides noticing that it’s destroying your self-esteem, you might also realize that you don’t trust the other person anymore. - You avoid doing certain things because you’re afraid of being chastised or criticized. - You also stop being able to comfortably communicate with them because their language is always full of harmful sarcasm. It’s also common for abuse victims to be very slow to react to this kind of microaggression. You internalize the idea that an abuser hits with their hands, raises their voice, or inhibits your freedom, and that this doesn’t count. Microaggressions are like microscopic assaults, you hardly notice them, But, they are assaults. Don’t forget why: - They’re based on tearing the other person down. - They reject the other person for the sake of gaining power. - They don’t let the other person be themself or feel whole and happy for being who they are and liking what they like. - Microaggressions make it so your good points, strengths, and achievements don’t matter anymore. The other person uses them to make those things fade away. Learn to identify microaggressions in a relationship. Be strong and have the courage to face them.
<urn:uuid:94a8710b-04bf-4e56-8169-132fe70145f7>
CC-MAIN-2022-33
https://steptohealth.com/microaggressions-couples-worst-enemy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00668.warc.gz
en
0.938025
1,192
2.28125
2
A NEW BOOK AND A LECTURE Webb, meantime, had pushed the Frog book along. The proofs had been read and the volume was about ready for issue. Clemens wrote to his mother April 15th: My book will probably be in the bookseller’s hands in about two weeks. After that I shall lecture. Since I have been gone, the boys have gotten up a “call” on me signed by two hundred Californians. The lecture plan was the idea of Frank Fuller, who as acting Governor of Utah had known Mark Twain on the Comstock, and prophesied favorably of his future career. Clemens had hunted up Fuller on landing in New York in January, and Fuller had encouraged the lecture then; but Clemens was doubtful. “I have no reputation with the general public here,” he said. “We couldn’t get a baker’s dozen to hear me.” But Fuller was a sanguine person, with an energy and enthusiasm that were infectious. He insisted that the idea was sound. It would solidify Mark Twain’s reputation on the Atlantic coast, he declared, insisting that the largest house in New York, Cooper Union, should be taken. Clemens had partially consented, and Fuller had arranged with all the Pacific slope people who had come East, headed by ex-Governor James W. Nye (by this time Senator at Washington), to sign a call for the “Inimitable Mark Twain” to appear before a New York audience. Fuller made Nye agree to be there and introduce the lecturer, and he was burningly busy and happy in the prospect. But Mark Twain was not happy. He looked at that spacious hall and imagined the little crowd of faithful Californian stragglers that might gather in to hear him, and the ridicule of the papers next day. He begged Fuller to take a smaller hall, the smallest he could get. But only the biggest hall in New York would satisfy Fuller. He would have taken a larger one if he could have found it. The lecture was announced for May 6th. Its subject was “Kanakadom, or the Sandwich Islands” —tickets fifty cents. Fuller timed it to follow a few days after Webb’s book should appear, so that one event might help the other. Mark Twain’s first book, ’The Celebrated Jumping Frog of Calaveyas County, and Other Sketches’, was scheduled for May 1st, and did, in fact, appear on that date; but to the author it was no longer an important event. Jim Smiley’s frog as standard-bearer of his literary procession was not an interesting object, so far as he was concerned—not with that vast, empty hall in the background and the insane undertaking of trying to fill it. The San Francisco venture had been as nothing compared with this. Fuller was working night and day with abounding joy, while the subject of his labor felt as if he were on the brink of a fearful precipice, preparing to try a pair of wings without first learning to fly. At one instant he was cold with fright, the next glowing with an infection of Fuller’s faith. He devised a hundred schemes for the sale of seats. Once he came rushing to Fuller, saying:
<urn:uuid:12bb846d-73db-4de6-a0c7-0a076fb5a14d>
CC-MAIN-2017-04
http://www.bookrags.com/ebooks/2988/181.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00303-ip-10-171-10-70.ec2.internal.warc.gz
en
0.986209
698
2.171875
2
This morning, I read Hendrik Herzberg’s article, “Exhilaration” in the comment section of the New Yorker, in which he describes the historic primary battle between Barack Obama and Hilary Rodham Clinton. In general, it’s a pretty fair treatment, but he sure needs a more nuanced history of gender and race in the United States. According to Herzberg: “Competitions among grievances do not ennoble, and both Clinton and Obama strove to avoid one; but it does not belittle the oppressions of gender to suggest that in America the oppressions of race have cut deeper. Clinton’s supporters would sometimes note that the Constitution did not extend the vote to women until a half century after it extended it to men of color. But there is no gender equivalent of the nightmare of disenfranchisement, lynching, apartheid, and peonage that followed Reconstruction, to say nothing of “the bondsman’s two hundred and fifty years of unrequited toil” that preceded it. Nor has any feminist leader shared the fate of Medgar Evers, Martin Luther King, Jr., and Malcolm X. Clinton spoke on Saturday of “women in their eighties and nineties, born before women could vote.” But Barack Obama is only in his forties, and he was born before the Voting Rights Act redeemed the broken promise of the Fifteenth Amendment.” Now, there may be some truth to this, but I find there are two things wrong with this paragraph: 1. He assumes all women are white — what about the African-American women who faced the threat of rape by white men, who would go unpunished since all black women were considered “sluts” and “temptresses” who deserved what they got, even if they were five years old? Or the Native American women who were forced on a death march to “Indian territory” by Andrew Jackson, only to be thrown off that land half a century later? 2. I would consider the English common law practice of “femme covert” or legal death of women upon marriage to be equivalent to debt peonage at the very least. Women lost control of their property, their children, and even their bodies. Also, until women were denied access to many educational and professional opportunities, until the Civil Rights Act of 1965 and Title IX. Women who fought for suffrage and equal rights were imprisoned, labeled “insane,” and trivialized, even by men on the left. Anyone else care to contribute?
<urn:uuid:147db509-7ad1-48bd-b788-28d77b9848d4>
CC-MAIN-2017-04
https://knittingclio.org/2008/06/19/hendrik-herzberg-needs-a-history-lesson/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00237-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973442
541
2.6875
3
Match for mutts? New website helps people adopt the best dog People looking for the perfect family pet tend to choose a dog based on appearance or breed - but that's barking up the wrong tree. "If you think they're cute, you bring them home," said Jodi Andersen, a dog trainer and author. That's why Andersen, along with MaryAnn Zeman and Sharon Mosse, founded the new online business How I Met My Dog. It works like Match or eHarmony, fitting humans with dogs based on what really matters: personality, lifestyle and behavior. Several other online services match people with pets, but the founders of How I Met My Dog say they take things to a new level with a more detailed, science-based questionnaire that narrows the number of dogs that meet a human adopter's lifestyle and expectations. The service is needed because about 4 million dogs per year are handed over to shelters and rescues, they said. Too many end up back in shelters, and too many are being euthanized because they can't find good homes. "The system we're using now is broken and has to be fixed," Andersen said. Placing a pet in the wrong home is one of the biggest concerns at the Massachusetts Society for the Prevention of Cruelty to Animals, which finds homes for thousands of dogs and other animals every year, spokesman Rob Halpin said. Persuading adopters not to fall in love with the first dog they see is a major issue. "Sometimes our emotions take leave of our senses," said Halpin, who was not familiar with How I Met My Dog. The MSPCA has "adoption counselors" who try to ensure people are matched with the right dogs, but Halpin embraced the idea of services that smooth that process. "We welcome the notion of technology helping people do some of the hard work it takes to pick the right pet," he said. How I Met My Dog, which also helps people who want to find a new home for a dog they just can't live with anymore, so far has partnered with 24 Boston-area shelters and rescues. The plan is to roll it out nationally by the end of the year. A person looking to adopt fills out what the founders call a "PET profile" for personality, expectations and training style. Are you a couch potato or an active athlete? Do you want a dog that gets along with children? Are you a disciplinarian when training a dog or more laid back? The dog profiles are completed either by the shelter staff or the current owner. The algorithm matches the humans with dogs that complement their lifestyle. "For example, if you have kids, you will never see a dog from us that doesn't get along with kids," Zeman said. Once the website matches someone with a dog, it's up to the adopter to meet that dog in person. The shelter or owner ultimately determines whether there's a match. Pawfect Life Rescue, of Uxbridge, Massachusetts, was one of the first rescue organizations to sign on with How I Met My Dog. "They have been pretty spot on so far with having the right people come and look at the right dog," Pawfect Life founder and president Julie Uthoff said. The Fredette family, of Waltham, Massachusetts, adopted their dog, Roscoe, from Pawfect Life after being matched through How I Met My Dog. Kate Fredette, her husband and two children had been thinking of getting a new dog for about a year, but they just didn't know how to ensure they would get a good fit. "It was confusing," Fredette said. They obviously wanted a dog that gets along with children. They wanted a dog they could take on family trips. They wanted a social dog they could take to the park. They couldn't be happier with Roscoe, a 4-month-old mixed breed. "Mornings are so much better around here," Fredette said. Also on WBALTV.com:
<urn:uuid:3bc0d342-94e5-414b-ba0b-6d535131f7f6>
CC-MAIN-2022-33
https://www.wbaltv.com/article/match-for-mutts-new-website-helps-people-adopt-the-best-dog/9541700
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00667.warc.gz
en
0.972548
840
1.609375
2
I find it interesting that BP is investing in a wind farm. What do you make of it. Here is some text from the article I read and a link to read it entirely. Dec. 27—The largest wind farm to be built in Kansas is set to begin operation by the end of the year. Flat Ridge 2, jointly owned by BP Wind Energy and Sempra U.S. Gas & Power, is on a 66,000-acre site covering parts of Harper, Barber, Kingman and Sumner counties in southern Kansas. The project has 274 wind turbines, each with capacity to generate 1.6 megawatts of electricity or a total of 438 megawatts. That's enough to supply electricity to 160,000 homes. Besides being the largest wind farm in Kansas, the $800 million project is the largest ever to be built all at once, instead of in phases. The owners said the giant wind farm was built in Kansas in part because of its business environment but largely because of its wind resources, which have been ranked the second best in the United States.
<urn:uuid:ad649aa2-8614-48da-87f3-58c1f7cd01d5>
CC-MAIN-2017-04
http://www.thomhartmann.com/forum/2013/01/bp-invests-largest-us-windfarm-kansas-what-do-you-make
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00164-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966885
224
1.710938
2
Min. of Maritime Affairs, Transport, & Infrastructure Sinisa Hajdas DONCIC Min. of Regional Development & European Funds Min. of Science, Education, & Sports Min. of Social Welfare & Youth Policy Min. of Tourism Min. of War Veterans Governor, Croatian National Bank Ambassador to the US Permanent Representative to the UN, New York NOTE: 1) The information regarding Croatia on this page is re-published from the 2013 World Fact Book of the United States Central Intelligence Agency. No claims are made regarding the accuracy of Croatia Chiefs of State 2013 information contained here. All suggestions for corrections of any errors about Croatia Chiefs of State 2013 should be addressed to the CIA. 2) The rank that you see is the CIA reported rank, which may habe the following issues: a) They assign increasing rank number, alphabetically for countries with the same value of the ranked item, whereas we assign them the same rank. b) The CIA sometimes assignes counterintuitive ranks. For example, it assigns unemployment rates in increasing order, whereas we rank them in decreasing order
<urn:uuid:4d32a5aa-6746-46b3-811c-4e726a5e3696>
CC-MAIN-2022-33
https://geographic.org/world_fact_book_2013/croatia/croatia_chiefs.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00678.warc.gz
en
0.794183
287
1.671875
2
SB 455 - This act creates numerous revisions to laws concerning charter schools. SECTION 160.400 - Current law states that charter schools are independent, publically supported schools. This act alters the aforementioned statement to read that charter schools are independent, public schools. The act expands the list of possible locations where Charter schools may be operated to include large school districts that have been designated as either provisionally accredited or unaccredited. Also, charter schools may be operated in the currently authorized territories, even if the existing school district no longer exists or includes that territory. The act clarifies that charter schools may be sponsored by any public 4-year college or university with an approved teacher preparation program. The act alters the provision concerning school buildings owned or controlled by a school district in which charter schools may be established. The act caps expenses associated with sponsorship of a charter School to three percent. Prior to granting or renewing a charter, sponsors must complete criminal background checks on the members of the Board of Directors applying to establish a charter school. No member of a charter school board may be employed by the charter school nor have substantial interest in any entity employed by or contracting with the board. The act requires timely submission of data required by the State Board of Education. SECTION 160.405 - This section revises the procedure and time line for chartering a school. A charter school proponent shall provide the local school district and the State Board of Education with copies of the charter school application within five days of submitting the application to the proposed sponsor. The sponsor's decision of approval or denial must be made within 90 days of filing the proposed charter (rather than the current 60); if the charter is denied, written notice must be served on the State Board of Education within five days. The State Board has 90 days to deny or grant a proposed charter and shall provide reasons for denial in writing. Charter schools are required to publish audits and financial reports. Charter schools may publish audit reports and annual financial reports via the internet on the secretary of state's website in lieu of other publishing requirements. A charter may be revoked for failure to provide necessary compliance information, or the sponsor may require specified remedial action of the school. SECTION 160.410 - Charter schools must make available the charter, the results of background checks, and the public report card to the parent of guardian of any pupil eligible to seek to enroll at the school. Reasonable fees may be charged for such copies. SECTION 160.415 - This section includes provisions relating to Charter schools becoming local education agencies and includes alterations regarding the payment mechanism to charter schools. If DESE overpays or underpays the amount due the charter school, such over or under payment shall be repaid by the public charter school or credited to the public charter school in twelve equal payments in the next fiscal year. Any dispute between DESE, the school district, and a charter school regarding funding shall be resolved by the administrative hearing commission, with the option of judicial review. If a dispute should occur, DESE is mandated to make every administrative and statutory effort to allow the continued education of children in their current public charter school educational setting and not take action which prevents (either directly or indirectly) the continued operation of a charter school. Further, DESE is forbidden to make an arbitrary and capricious decision which negatively impacts the education of a child. SECTION 160.420 - This section allows district teachers employed in charter schools to retain tenure status and seniority rights for three years. Charter schools are permitted to hire non-certificated administrators. SECTION 167.349 - This section allows any campus of the state university located in a county of the third classification (University of Missouri-Rolla) to sponsor charter schools.
<urn:uuid:2143f191-0814-4c60-87e6-54e1222b7575>
CC-MAIN-2017-04
http://www.house.mo.gov/content.aspx?info=/bills051/bills/SB455.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00357-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945005
762
1.8125
2
First inspection and a mystery bee The temperatures rose to 15C yesterday in Hampshire in England, so I was able to open the hives safely for my first time this season. And the news is good — all seven colonies have come through with a laying queen and healthy brood pattern. Some were getting a little low on stores, but a few frames of stores inserted in a few colonies should avert any problems. The extent of brood ranged from 3 sides in a nucleus to a staggering nine sides in a large colony that had been united from two colonies last autumn. There was one peculiarity, however. I almost mistook one bee for a beetle. But no, it was a honeybee, just very, very black for some reason (see photo). Turlough, Vita’s guest beekeeper blogger
<urn:uuid:bb67f4e3-a8b2-4543-bd5e-d2df8799edd5>
CC-MAIN-2022-33
https://www.vita-europe.com/beehealth/sl/blog/first-inspection-mystery-bee/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00667.warc.gz
en
0.966026
167
1.65625
2
Global Vegan Food Market is valued approximately at USD 13.28 Billion in 2020 and is anticipated to grow with a healthy growth rate of more than 9.46% over the forecast period 2021-2027. Vegan food has become popular among the population as it is environment friendly and provides various health benefits. The major driving factor for the market growth is growing chronic diseases such as blood pressure, diabetes and others. According to the World Health Organization, of about 422 million people, worldwide, suffer from diabetes, while approximately 1.13 billion people suffer from blood pressure. Another driving factor for the market growth is the increasing vegan population worldwide. According to the sentientmedia.org, U.S., witnessed 300% increase in vegan population between 2004 and 2019. Likewise, as per foodrevolution.org, the vegan population in UK, grew by 350%, from 2010 till 2020. The other driving factor for the market growth is increasing awareness towards health-conscious and vegan diet as vegans have the greatest fibre consumption and the lowest fat intake. Furthermore, rise in product launches with innovative ingredients and increasing demand for environmental-friendly production and consumption of vegan food products, will provide new opportunities for the global Vegan Food industry. For instance: in September 2021, Hershey’s launched vegan chocolate bar made with oats and rainforest alliance certified cocoa. However, vitamin-B12 deficiency in vegan products may impede market growth over the forecast period of 2021-2027. The regional analysis is segmented based on the key regions such as Asia Pacific, North America, Europe, Latin America, and Rest of the World for the global Vegan Food Market. North America is the leading region across the world in terms of market share owing to increase in number of vegan populations, increase in consumer awareness and favourable initiatives such as product launch & partnership in the region. Whereas Asia-pacific is anticipated to exhibit the highest CAGR over the forecast period 2021-2027 due to increasing concerns regarding environment impact, rising government initiatives, launching innovative vegan food products, rising mortality owing to heart diseases in the region. Major market player included in this report are: The Archer Daniels Midland Company Daiya Foods, Inc. Plamil Foods Ltd. Tofutti Brands, Inc. VBites Foods Ltd. Vitasoy International Holdings Ltd. Eden Foods, Inc. The objective of the study is to define market sizes of different segments & countries in recent years and to forecast the values to the coming eight years. The report is designed to incorporate both qualitative and quantitative aspects of the industry within each of the regions and countries involved in the study. Furthermore, the report also caters the detailed information about the crucial aspects such as driving factors & challenges which will define the future growth of the market. Additionally, the report shall also incorporate available opportunities in micro markets for stakeholders to invest along with the detailed analysis of competitive landscape and product offerings of key players. The detailed segments and sub-segment of the market are explained below: By Product Type: By Distribution Channel: Rest of the World Furthermore, years considered for the study are as follows: Historical year – 2018, 2019 Base year – 2020 Forecast period – 2021 to 2027. Target Audience of the Global Vegan Food Market in Market Study: Key Consulting Companies & Advisors Large, medium-sized, and small enterprises Value-Added Resellers (VARs) Third-party knowledge providers
<urn:uuid:b0dd3aec-6d3c-4d9c-baf4-46f732129acb>
CC-MAIN-2022-33
https://www.bizwitresearch.com/reports/global-vegan-food-market-to-reach-usd-23-76-billion-by-2027/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00478.warc.gz
en
0.917446
804
1.9375
2
|Classification and external resources| Mastitis (also called mammitis) is inflammation of breast or udder tissue usually due to infection. Staphylococcus aureus is the most common pathogen responsible, but S. epidermidis and streptococci are occasionally isolated as well. Mastitis can be classified as milk stasis, non-infectious or infectious inflammation and abscess. It is impossible to correlate this classification with clinical symptoms. In particular, milk stasis, non-infectious and infectious inflammation can be distinguished only by leukocyte count and bacteria culturing. Symptoms like fever, intensity of pain, erythema or rapid onset of symptoms can not be used to distinguish these. Early stages of mastitis can present with local pain, redness, swelling, and warmth. Later stages also present with systemic symptoms like fever and flu-like symptoms and in rare cases an abscess can develop. However it is pretty common that symptoms develop very quickly without any warning. Except in severe cases it is not necessary to wean a nursling because of mastitis; in fact, nursing is the most effective way to remove the blockage and alleviate the symptoms. Sudden weaning can cause or exacerbate mastitis symptoms and cause hyponatremic shock in the infant. Continued breastfeeding does not present any risk to the nursing infant and is very beneficial for the mother. The word mastitis uses combining forms of mast- + -itis. The word mammitis (//) uses combining forms of mamm- + -itis. They are synonymous in modern usage, and mastitis is the more commonly used synonym. - 1 Terminology - 2 Signs and symptoms - 3 Causes - 4 Types - 5 Diagnosis - 6 Treatment - 7 Complications - 8 Other animals - 9 History - 10 Etymology and pronunciation - 11 See also - 12 References - 13 External links Popular usage of the term mastitis varies by geographic region. Outside the US it is commonly used for puerperal and nonpuerperal cases, in the US the term nonpuerperal mastitis is rarely used and alternative names such as duct ectasia, subareolar abscess and plasma cell mastitis are more frequently used. Chronic cystic mastitis is a different (older) name for fibrocystic disease. American usage: mastitis usually refers to puerperal (occurring to breastfeeding mothers) mastitis with symptoms of systemic infection. Lighter cases of puerperal mastitis are often called breast engorgement. In this Wikipedia article, "mastitis" is used in the original sense of the definition as inflammation of the breast with additional qualifiers where appropriate. Signs and symptoms Lactation mastitis usually affects only one breast and the symptoms can develop quickly. The signs and symptoms usually appear suddenly and they include: - Breast tenderness or warmth to the touch - General malaise or feeling ill - Swelling of the breast - Pain or a burning sensation continuously or while breast-feeding - Skin redness, often in a wedge-shaped pattern - Fever of 101 F (38.3 C) or greater - The affected breast can then start to appear lumpy and red. Some women may also experience flu-like symptoms such as: Contact should be made with a health care provider with special breastfeeding competence as soon as the patient recognizes the combination of signs and symptoms. Most of the women first experience the flu-like symptoms and just after they may notice a sore red area on the breast. Also, women should seek medical care if they notice any abnormal discharge from the nipples, if breast pain is making it difficult to function each day, or they have prolonged, unexplained breast pain. A breast abscess is a collection of pus that develops into the breast with different causes. During lactation, breast abscess develops only rarely, most sources cite about 0.4–0.5% of breastfeeding women. Known risk factors are age over 30, primiparous and late delivery. No correlation was found with smoking status however this may be in part because much fewer smoking women choose to breastfeed. Antibiotics were not shown effective in prevention of lactation abscess but are useful to treat a secondary infection (see the section on the treatment of breast abscess in this article). Since the 1980s mastitis has often been divided into non-infectious and infectious sub-groups. However, recent research suggests that it may not be feasible to make divisions in this way. It has been shown that types and amounts of potentially pathogenic bacteria in breast milk are not correlated to the severity of symptoms. Moreover, although only 15% of women with mastitis in Kvist et al.'s study were given antibiotics, all recovered and few had recurring symptoms. Many healthy breastfeeding women wishing to donate breast milk have potentially pathogenic bacteria in their milk but have no symptoms of mastitis. Mastitis typically develops when the milk is not properly removed from the breast. Milk stasis can lead to the milk ducts in the breasts becoming blocked, as the breast milk is not being properly and regularly expressed. It has also been suggested that blocked milk ducts can occur as a result of pressure on the breast, such as tight-fitting clothing or an over-restrictive bra, although there is sparse evidence for this supposition. Mastitis may occur when the baby is not appropriately attached to the breast while feeding, when the baby has infrequent feeds or has problems suckling the milk out of the breast. Some women (approximately 15% in Kvist et al. study) will require antibiotic treatment for infection which is usually caused by bacteria from the skin or the baby's mouth that entering the milk ducts through skin lesions of the nipple or through the opening of the nipple. Infection is usually caused by staphylococcus aureus. Mastitis is quite common among breastfeeding women. The WHO estimates that although incidences vary between 2.6% and 33%, the prevalence globally is approximately 10% of breastfeeding women. Most mothers who develop mastitis usually do so within the first few weeks after delivery. Most breast infections occur within the first or second month after delivery or at the time of weaning. However, in rare cases it affects women who are not breastfeeding. Infectious pathogens commonly associated with mastitis are Staphylococcus aureus, streptococcus spp., gram-negative bacilli such as Escherichia coli. Salmonella spp., mycobacteria, candida, and Cryptococcus have been identified in rare instances. Recent research suggests that infectious pathogens play a much smaller role in the pathogenesis than was commonly assumed only a few years ago. Most detected pathogens are very common species that are natural part of the breast fauna and simple detection of their presence is not sufficient to prove a causative role. Furthermore, there are indications that treatment with antibiotics may have minimal impact, and over-all there is insufficient evidence to confirm or refute the effectiveness of antibiotic therapy for treating lactational mastitis. The presence of cracks or sores on the nipples increases the likelihood of infection. Tight clothing or ill-fitting bras may also cause problems as they compress the breasts. There is a possibility that infants carrying infectious pathogens in their noses can infect their mothers; the clinical significance of this finding is still unknown. Mastitis, as well as breast abscess, can also be caused by direct trauma to the breast tissue (breast injury). Such injury can occur for example during sports activities or due to seat belt injury. In some rare cases mastitis can also occur in men. Women who are breastfeeding are at risk for developing mastitis especially if they have sore or cracked nipples or have had mastitis before while breastfeeding another baby. Also, the chances of getting mastitis increases if women use only one position to breastfeed or wear a tight-fitting bra, which may restrict milk flow |This section does not cite any sources. (June 2015) (Learn how and when to remove this template message)| Breast engorgement or mastitis occur frequently after weaning. The pregnancy/lactation related hormones usually return to normal levels shortly after weaning but for some women it can take several months and there is an increased risk of rebound lactation and mastitis before hormone levels settle. Avoiding stress is important because the same hormones are also stress hormones. Even after hormone levels settle it takes some time for the breast gland to rebuild to its nonlactating state and it may be particularly prone to mastitis during this time. Most cases of post weaning mastitis or breast engorgement resolve with relatively little treatment. Recurrent post weaning mastitis on the other hand can be an indication of a developing hyperprolactinemia or thyroid disorders and endocrinological examination must be considered. Cold compresses, lactation inhibiting herbs or medication can be used. Salvia officinalis is commonly used for weaning (Veldhuizen-Staas C. 2007), but no peer reviewed literature is known on this subject. Chasteberry extract can improve prolactin levels which may reduce risk of recurrence but no data is available for use in mastitis. Prolactin lowering medication has been frequently used for weaning in the past but is much less used since Parlodel (bromocriptine) approval for weaning has been withdrawn in the US over safety concerns. While the question of bromocriptin safety for weaning purposes was never completely resolved it became apparent that it was not very effective in the prescribed dose and did rarely justify the unpleasant side effects. Granulomatous (non-puerperal) mastitis is known to occur on average 2 years and almost exclusively up to 6 years after pregnancy. It is an extremely rare condition and believed to be in many cases related to an autoimmune reaction to milk proteins following incomplete inhibition of milk secretion and hyperprolactinemia. Distinction between puerperal (but post-weaning) and nonpuerperal mastitis is somewhat arbitrary. It is called puerperal mastitis (or lactation mastitis or lactational mastitis) when it occurs in lactating mothers and non-puerperal (or nonlactational) otherwise. Mastitis can, in rare cases, occur in men. Inflammatory breast cancer has symptoms very similar to mastitis and must be ruled out. The symptoms are similar for puerperal and nonpuerperal mastitis but predisposing factors and treatment can be very different. Puerperal mastitis is the inflammation of the breast in connection with pregnancy, breastfeeding or weaning. Since one of the most prominent symptoms is tension and engorgement of the breast, it is thought to be caused by blocked milk ducts or milk excess. It is relatively common; estimates range depending on methodology between 5–33%. However, only about 0.4–0.5% of breastfeeding mothers develop an abscess. Some predisposing factors are known but their predictive value is minimal. It appears that proper breastfeeding technique, frequent breastfeeding and avoidance of stress are the most important factors that can be influenced. Light cases of mastitis are often called breast engorgement; the distinction is overlapping and possibly arbitrary or subject to regional variations. The term nonpuerperal mastitis describes inflammatory lesions of the breast occurring unrelated to pregnancy and breastfeeding. This article includes description of mastitis as well as various kinds of mammary abscesses. Skin related conditions like dermatitis and foliculitis are a separate entity. Names for non-puerperal mastitis are not used very consistently and include mastitis, subareolar abscess, duct ectasia, periductal inflammation, Zuska's disease and others. However, if the doctor is not sure whether the mass is an abscess or a tumor, a breast ultrasound may be performed. The ultrasound provides a clear image of the breast tissue and may be helpful in distinguishing between simple mastitis and abscess or in diagnosing an abscess deep in the breast. The test consists of placing an ultrasound probe over the breast. In cases of infectious mastitis, cultures may be needed in order to determine what type of organism is causing the infection. Cultures are helpful in deciding the specific type of antibiotics that will be used in curing the disease. These cultures may be taken either from the breast milk or of the material aspirated from an abscess. Mammograms or breast biopsies are normally performed on women who do not respond to treatment or on non-breastfeeding women. This type of tests is sometimes ordered to exclude the possibility of a rare type of breast cancer which causes symptoms similar to those of mastitis. Breast cancer may coincide with or mimic symptoms of mastitis. Only full resolution of symptoms and careful examination are sufficient to exclude the diagnosis of breast cancer. Lifetime risk for breast cancer is significantly reduced for women who were pregnant and breastfeeding. Mastitis episodes do not appear to influence lifetime risk of breast cancer. Mastitis does however cause great difficulties in diagnosis of breast cancer and delayed diagnosis and treatment can result in worse outcome. Breast cancer may coincide with mastitis or develop shortly afterwards. All suspicious symptoms that do not completely disappear within 5 weeks must be investigated. Breast cancer incidence during pregnancy and lactation is assumed to be the same as in controls. Course and prognosis are also very similar to age matched controls. However diagnosis during lactation is particularly problematic, often leading to delayed diagnosis and treatment. Some data suggest that noninflammatory breast cancer incidence is increased within a year following episodes of nonpuerperal mastitis and special care is required for follow-up cancer prevention screening. So far only data from short term observation is available and total risk increase can not be judged. Because of the very short time between presentation of mastitis and breast cancer in this study it is considered very unlikely that the inflammation had any substantial role in carcinogenesis, rather it would appear that some precancerous lesions may increase the risk of inflammation (hyperplasia causing duct obstruction, hypersensitivity to cytokines or hormones) or the lesions may have common predisposing factors. A very serious type of breast cancer called inflammatory breast cancer presents with similar symptoms as mastitis (both puerperal and nonpuerperal). It is the most aggressive type of breast cancer with the highest mortality rate. The inflammatory phenotype of IBC is thought to be mostly caused by invasion and blocking of dermal lymphatics, however it was recently shown that NF-κB target genes activation may significantly contribute to the inflammatory phenotype. Case reports show that inflammatory breast cancer symptoms can flare up following injury or inflammation making it even more likely to be mistaken for mastitis. Symptoms are also known to partially respond to progesterone and antibiotics, reaction to other common medications can not be ruled out at this point. In lactation mastitis, frequent emptying of both breasts by breastfeeding is essential. Also essential is adequate fluid supply for the mother and baby. Use of pumps to empty the breast is now considered somewhat controversial. For breastfeeding women with light mastitis, massage and application of heat prior to feeding can help as this may aid unblocking the ducts. However, in more severe cases of mastitis heat or massage could make the symptoms worse and cold compresses are better suited to contain the inflammation. In lactation mastitis, antibiotics are not needed in the overwhelming majority of cases and should be used only for bacterial infections. Dicloxacillin or cephalexin are sometimes recommended, because of the high rates of penicillin resistant staphylococci. Nonpuerperal mastitis is treated by medication and possibly aspiration or drainage (see in particular treatment of subareolar abscess and treatment of granulomatous mastitis). According to a BMJ best practice report, antibiotics are generally to be used in all nonpuerperal mastitis cases, with replacement of the antibiotics by an antifungal agent such as fluconazole in cases of deep fungal infections, and corticosteroids are to be used in case of granulomatous mastitis (with differential diagnosis to tuberculosis infection of the breast). An abscess (or suspected abscess) in the breast may be treated by ultrasound-guided fine-needle aspiration (percutaneous aspiration) or by surgical incision and drainage; each of these approaches is performed under antibiotic coverage. In case of puerperal breast abscess, breastfeeding from the affected breast should be continued where possible. A recent review article suggested the following line of treatment for suspected breast abscess: initially, antibiotics treatment, ultrasound evaluation and, if fluid is present, ultrasound-guided fine needle aspiration of the abscess with an 18 gauge needle, under saline lavage until clear. The exudate is then sent for microbiological analysis for identification of the pathogen and determination of its antibiotic sensitivity profile (antibiogram), which may in turn give an indication for changing the antibiotics prescription. At follow-up, a mammography is performed if the condition has resolved; otherwise the ultrasound-guided fine-needle aspiration with lavage and microbiological analysis is repeated. If three to five aspirations still do not resolve the condition, percutaneous drainage in combination with placement of an indwelling catheter is indicated, and only if several attempts at ultrasound-guided drainage fail, surgical resection of the inflamed lactiferous ducts (preferably performed after the acute episode is over) should be considered. It is noted, however, that even the excision of the affected ducts does not necessarily prevent recurrence. Nonpuerperal breast abscesses have a higher rate of recurrence compared to puerperal breast abscesses. There is a high statistical correlation of nonpuerperal breast abscess with diabetes mellitus (DM). On this basis, it has recently been suggested that diabetes screening should be performed on patients with such abscess. Although there are a number of recommendations regarding the treatment of breast abscesses, a 2015 review found not enough evidence regarding if needle aspiration is comparable to incision and drainage, or if antibiotics should generally be given to women undergoing incision and drainage. Recurrence: women who have had mastitis once are likely to develop it again with a future child or with the same infant. Recurrence appears especially in cases of delayed or inadequate treatment. Milk stasis: this is another complication that may arise from mastitis and it occurs when the milk is not completely drained from the breast. This causes increased pressure on the ducts and leakage of milk into surrounding breast tissue, which can lead to pain and inflammation. Abscess: delayed treatment or inadequate treatment, especially in mastitis related to milk stasis, may lead to the formation of an abscess within the breast tissue, that is, a collection of pus that develops into the breast. The abscess is the most severe complication that women can get from this condition. An abscess ultimately requires surgical drainage. It is a major condition in some species, like dairy cows. It is the cause of much unwanted suffering for the dairy cows. It is of tremendous economic importance for the dairy industry, and it is also of concern for public health. The same considerations apply to mastitis in sheep and goats and other milk producing females. It is also of economic importance in the sow, but, in this species, it is not related to public health. In other domestic females (queen, mare, etc.), it is more an individual illness dealt with by veterinary practitioners. Udder of a Roux du Valais sheep after a healed mastitis, one teat was lost due to the disease. Serous exudate from bovine udder in E. coli mastitis at left. Normal milk at right. Etymology and pronunciation The word mastitis (//) uses combining forms of mast- + -itis. The word mammitis (//) uses combining forms of mamm- + -itis. They are synonymous in modern usage, and mastitis is the more commonly used synonym. - Medscape: Medscape Access - Peters J (2004). "[Mastitis puerperalis – causes and therapy]". Zentralbl Gynakol (in German). 126 (2): 73–6. doi:10.1055/s-2004-44880. PMID 15112132. - Barbosa-Cesnik C, Schwartz K, Foxman B (2003). "Lactation mastitis". JAMA. 289 (13): 1609–12. doi:10.1001/jama.289.13.1609. PMID 12672715. - "Symptoms of mastitis". Retrieved 2010-04-20. - "Symptoms". Retrieved 2010-04-20. - "Breast Infection Symptoms". Retrieved 2010-04-20. - Segura-Sampedro JJ, Jiménez-Rodríguez R, Camacho-Marente V, Pareja-Ciuró F, Padillo-Ruiz J (Oct 2015). "Breast abscess and sepsis arising from oral infection.". Cir Esp. 93 (8): ,. doi:10.1016/j.ciresp.2015.05.007. PMID 26148851. - Kvist, Linda J; Larsson, Bodil; Hall-Lord, Marie; Steen, Anita; Schalén, Claes (1 January 2008). "The role of bacteria in lactational mastitis and some considerations of the use of antibiotic treatment". International Breastfeeding Journal. 3 (1): 6. doi:10.1186/1746-4358-3-6. PMC . PMID 18394188. - "Non-infectious mastitis and milk stasis". Retrieved 2010-04-20. - "Breastfeeding Mastitis Causes and Symptoms". Retrieved 2010-04-20. - "Exams and Tests". Retrieved 2010-04-20. - "Breast Infection Causes". Retrieved 2010-04-20. - "Causes of mastitis". NHS. Retrieved 2010-04-20. - W Lynn; Lockie, F; Lynn, W (2003). "The challenge of mastitis". Archives of Disease in Childhood. 88 (9): 818–821. doi:10.1136/adc.88.9.818. PMC . PMID 12937109. - Antibiotics for mastitis in breastfeeding women. Cochrane Database of Systematic Reviews, PubMed Health. Review published 2013; Review content assessed as up-to-date: November 23, 2012. - Amir LH, Garland SM, Lumley J (2006). "A case-control study of mastitis: nasal carriage of Staphylococcus aureus". BMC Family Practice. 7: 57. doi:10.1186/1471-2296-7-57. PMC . PMID 17032458. - Dilip R. Patel; Donald E. Greydanus (2010). Adolescents and Sports. Elsevier Health Sciences. p. 711. ISBN 1-4377-2006-4. - Mastitis and breast abscess, BMJ Best Practice (last updated 5 September 2014) (subscription-limited access) - "Risk factors". Retrieved 2010-04-20. - Middleton LP, Amin M, Gwyn K, Theriault R, Sahin A (2003). "Breast carcinoma in pregnant women: assessment of clinicopathologic and immunohistochemical features". Cancer. 98 (5): 1055–60. doi:10.1002/cncr.11614. PMID 12942575. - Shousha S (2000). "Breast carcinoma presenting during or shortly after pregnancy and lactation". Arch. Pathol. Lab. Med. 124 (7): 1053–60. doi:10.1043/0003-9985(2000)124<1053:BCPDOS>2.0.CO;2. PMID 10888783. - Peters F, Kiesslich A, Pahnke V (2002). "Coincidence of nonpuerperal mastitis and noninflammatory breast cancer". Eur. J. Obstet. Gynecol. Reprod. Biol. 105 (1): 59–63. doi:10.1016/S0301-2115(02)00109-4. PMID 12270566. - Kusama M, Koyanagi Y, Sekine M, et al. (1994). "[A case of inflammatory breast cancer successfully treated with 5'-DFUR and MPA]". Gan to Kagaku Ryoho (in Japanese). 21 (12): 2049–52. PMID 8085857. - Yamada T, Okazaki M, Okazaki A, et al. (1992). "[A case of inflammatory breast cancer treated with medroxyprogesterone acetate (MPA) in combination with intra-arterial infusion chemotherapy]". Gan to Kagaku Ryoho (in Japanese). 19 (11): 1923–5. PMID 1387777. - Van Laere SJ, Van der Auwera I, Van den Eynden GG, et al. (2006). "Nuclear factor-kappaB signature of inflammatory breast cancer by cDNA microarray validated by quantitative real-time reverse transcription-PCR, immunohistochemistry, and nuclear factor-kappaB DNA-binding". Clin. Cancer Res. 12 (11 Pt 1): 3249–56. doi:10.1158/1078-0432.CCR-05-2800. PMID 16740744. - Van Laere SJ, Van der Auwera I, Van den Eynden GG, et al. (2007). "NF-kappaB activation in inflammatory breast cancer is associated with oestrogen receptor downregulation, secondary to EGFR and/or ErbB2 overexpression and MAPK hyperactivation". Br. J. Cancer. 97 (5): 659–69. doi:10.1038/sj.bjc.6603906. PMC . PMID 17700572. - van der Burg B, van der Saag PT (1996). "Nuclear factor-kappa-B/steroid hormone receptor interactions as a functional basis of anti-inflammatory action of steroids in reproductive organs". Mol. Hum. Reprod. 2 (6): 433–8. doi:10.1093/molehr/2.6.433. PMID 9238713. - Spencer JP (September 2008). "Management of mastitis in breastfeeding women". Am Fam Physician (review). 78 (6): 727–31. PMID 18819238. - Trop I, Dugas A, David J, El Khoury M, Boileau JF, Larouche N, Lalonde L (October 2011). "Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up". Radiographics : a Review Publication of the Radiological Society of North America, Inc (review). 31 (6): 1683–99. doi:10.1148/rg.316115521. PMID 21997989., p. 1684 - Howard Silberman; Allan W. Silberman (28 March 2012). Principles and Practice of Surgical Oncology: A Multidisciplinary Approach to Difficult Problems. Lippincott Williams & Wilkins. p. 301. ISBN 978-1-4511-5323-1. - Trop I, Dugas A, David J, El Khoury M, Boileau JF, Larouche N, Lalonde L (October 2011). "Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up". Radiographics : a Review Publication of the Radiological Society of North America, Inc (review). 31 (6): 1683–99. doi:10.1148/rg.316115521. PMID 21997989., Fig. 9 on p. 1696 - Trop I, Dugas A, David J, El Khoury M, Boileau JF, Larouche N, Lalonde L (October 2011). "Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up". Radiographics : a Review Publication of the Radiological Society of North America, Inc (review). 31 (6): 1683–99. doi:10.1148/rg.316115521. PMID 21997989., p. 1691 - Trop I, Dugas A, David J, El Khoury M, Boileau JF, Larouche N, Lalonde L (October 2011). "Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up". Radiographics : a Review Publication of the Radiological Society of North America, Inc (review). 31 (6): 1683–99. doi:10.1148/rg.316115521. PMID 21997989., p. 1692–1693 - Trop I, Dugas A, David J, El Khoury M, Boileau JF, Larouche N, Lalonde L (October 2011). "Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up". Radiographics : a Review Publication of the Radiological Society of North America, Inc (review). 31 (6): 1683–99. doi:10.1148/rg.316115521. PMID 21997989., p. 1694 - Trop I, Dugas A, David J, El Khoury M, Boileau JF, Larouche N, Lalonde L (October 2011). "Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up". Radiographics : a Review Publication of the Radiological Society of North America, Inc (review). 31 (6): 1683–99. doi:10.1148/rg.316115521. PMID 21997989., abstract - Rizzo M, Gabram S, Staley C, Peng L, Frisch A, Jurado M, Umpierrez G (March 2010). "Management of breast abscesses in nonlactating women". The American Surgeon. 76 (3): 292–5. PMID 20349659. - Verghese BG, Ravikanth R (May 2012). "Breast abscess, an early indicator for diabetes mellitus in non-lactating women: a retrospective study from rural India". World Journal of Surgery. 36 (5): 1195–8. doi:10.1007/s00268-012-1502-7. PMID 22395343. - Irusen, H; Rohwer, AC; Steyn, DW; Young, T (17 August 2015). "Treatments for breast abscesses in breastfeeding women.". The Cochrane database of systematic reviews. 8: CD010490. doi:10.1002/14651858.CD010490.pub2. PMID 26279276. - Kvist LJ, Hall-Lord ML, Larsson BW (2007). "A descriptive study of Swedish women with symptoms of breast inflammation during lactation and their perceptions of the quality of care given at a breastfeeding clinic". Int Breastfeed J. 2: 2. doi:10.1186/1746-4358-2-2. PMC . PMID 17244353. - Kvist LJ, Hall-Lord ML, Rydhstroem H, Larsson BW (2007). "A randomised-controlled trial in Sweden of acupuncture and care interventions for the relief of inflammatory symptoms of the breast during lactation". Midwifery. 23 (2): 184–95. doi:10.1016/j.midw.2006.02.003. PMID 17052823. - "Complications". Retrieved 2010-04-20. - Kandasamy S, Green BB, Benjamin AL, Kerr DE. Between-cow variation in dermal fibroblast response to lipopolysaccharide reflected in resolution of inflammation during Escherichia coli mastitis. J Dairy Sci. 2011 Dec;94(12):5963-75. doi:10.3168/jds.2011-4288 PMID 22118085
<urn:uuid:dd016b4b-b1ae-448b-b64a-3c26cb9391a5>
CC-MAIN-2017-04
https://en.wikipedia.org/wiki/Mastitis
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00536-ip-10-171-10-70.ec2.internal.warc.gz
en
0.875624
6,898
3.4375
3
Sankeien Garden is a popular tourist destination in Yokohama. Here, you can enjoy the seasonal scenery while having a walk in the garden with beautiful flowers and trees planted in the vast area. There are a lot of architectures of Important Cultural Properties of Japan in the garden and it is a recommended tourist spot where you can feel yourself close to traditional buildings and history. Go for a walk in Sankeien Garden! Visit the historic buildings in Yokohama Sankeien Garden was open to the public in 1906 after the purchase of land in the Sankeien area in Yokohama of Kanagawa Prefecture by a businessman Hara Sankei. The garden has a large area of 175,000 square meters. After the start of its construction around 1902, buildings of historic importance from places such as Kyoto and Kamakura were reconstructed in the garden. The outer garden was finished in 1914 while the inner garden was finished in 1922. After that, The Second World War caused great damage to the garden and the property was transferred and donated from the Hara family to Yokohama city in 1953. Restoration works have been carried out until this day. Now in modern times, you can see ponds, planted seasonal flowers and trees in the garden with events held during flowering seasons. Highlights of Sankeien Garden There are 10 buildings of the Important Cultural Properties in the garden and you can witness the valuable historic buildings closely. A visit to enter the interior of the building is not usually allowed, but it is possible during events. In addition, a variety of flowers bloom and decorate the garden throughout a year so you can enjoy the different scenery of each season. For example, there are cherry blossoms and wisteria in spring, lotus and hydrangea in summer, ginkgo and maple in autumn and camellia and plum in winter. If you want to walk around the entire area slowly, the recommended duration to visit here is about 2 hours. There are three restaurants in the garden, offering Japanese-style meals and desserts. In the lobby of the garden's memorial, you can taste Matcha for a small fee. The garden's museum shop sells original goods and sweets. Information about Sankeien Garden Opening hours are from 9:00 ~ 17:00. Last entrance is 30 minutes before closing. The garden is closed from 12/29 to 12/31 (may be temporarily closed). Admission fee is 700 yen for adults (15 years old and above) and 200 yen for children (14 years old and under). Visitors can now enjoy a guided tour through the garden by volunteers who will provide visitors with information in English. The guided tours are available only on Monday, Wednesday, Thursday, Saturday and Sunday (Except 12/29 ~ 1/3). The departure time is 14:00 and the tours are about an hour long. It is limited to 20 visitors as well. The tour may be called off due to reasons such as rough weather and volunteers' unavailability. Access to Sankeien Garden Since Sankeien Garden is located far from the nearest train station, it is recommended that you use public transport such as buses to access. You can take a municipal bus at Yokohama station and then get off at the "Sankeien-Iriguchi" bus stop and walk for about 5 minutes. - Spot name: Sankeien Garden - Street Address: 58-1, Honmoku Sannotani, Naka-Ku, Yokohama, Kanagawa - Access: Take a municipal bus at Yokohama Station. Ride for about 35 minutes and get off at "Sankeien-Iriguchi" bus stop. Then walk for about 5 minutes. - Wi-Fi: Available - Language: English - Ticket: Sold at the counter at the front gate - Credit cards: Not accepted
<urn:uuid:286f219c-eae8-4079-b48d-2b20b68a0894>
CC-MAIN-2022-33
https://www.fun-japan.jp/en/articles/10008
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00065.warc.gz
en
0.951554
794
2.015625
2
Pathology is a course of health care science that promotions with diseases or a lot more particularly pathogens that bring about illnesses. Every form of pathogen has a different outcome on the human body and the organs. They can hamper the ordinary performance of the overall body and trigger a number of concerns which can make a standard human being unwell. The illness can change from viral fever, typhoid, dysentery, vomiting, urinary tract bacterial infections and many others. Pathological labs can help in conducting these checks and diagnose the different brings about of the illnesses in sufferers. Seeking for pathological labs in the vicinity of me can support clients in acquiring a checklist of the most effective pathological labs in the place. Approaching a pathological lab can aid in the assortment of samples and conducting the a variety of checks as recommended by a wellbeing skilled. Pathological labs near me are a single of the reliable techniques to come across the very best pathology labs in a locality. The Cause why Pathology Exams are Done Pathology assessments are performed as proposed by a physician or a expert to obtain out the induce and the extent of an infection in the affected individual. Some health conditions may possibly come with blended indicators and indicators and can make it really hard for the health professionals to recognize what type of pathogens must be leading to the disorder and dependent on which the therapy can be instructed. Down below are some of the most popular causes and benefits of getting a pathology exam performed: 1. Diagnosing the Problem The specific pathology examination can support in figuring out the suitable bring about for the illness and hence support the doctor come to a decision on the right study course of procedure that can be presented to the affected individual. When the signs of a ailment are not obvious and intervention is necessary, a pathology check can be purchased. A pathology take a look at can assist in generating the prognosis of the ailment in the affected person, which implies the chart of occasions that are most probable as a outcome of the said infection – this sort of as in the scenario of most cancers or an organ malfunction. 3. Forensic Evidence In instances in which there has been a crime, forensic pathology is most helpful in pinpointing the legitimate reason for the demise of a patient and consequently is extremely critical to both the medication and lawful enforcement team. 4. Monitoring the Procedure Pathology tests can enable in figuring out no matter if the recent therapy is performing for the patient or if the treatment method methodology requirements to be switched up for the affected person 5. Frequent Pathology Tests Pathology checks have so numerous added benefits for the two medical practitioners and individuals. Applying pathology checks several diseases are discovered and taken care of today. Below are the most frequent tests that are accomplished in Pathological labs in close proximity to me: Urine, which is the byproduct of the body’s drinking water consumption, is entire of squander materials and toxic compounds. It can determine the widespread pathogens in the body and the level of operation of the kidney. A blood check is most suited for all sorts of bacterial infections in the entire body and assists in identifying the pathogens, the abnormality in the overall body centered on the amount of white blood cells, the deficiency in the blood, and so forth. Stool assessments are most important for gastrointestinal health conditions that pertain to challenges of the digestive tract. They can be examined to know the pathogens in the bowels and the abdomen and the amount of operation of the liver, pancreas and spleen. Supply website link
<urn:uuid:49853c59-9e28-42bd-a9ef-b2dc9d4ed329>
CC-MAIN-2022-33
https://xacobeogalicia.org/what-are-the-basic-pathology-tests.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00071.warc.gz
en
0.945136
741
2.546875
3
Tips for new Facebook parents We have previously written about how you can monitor your child on Facebook. But what about setting the account up in the first place? If you are not a Facebook user yourself, it’s easy to be blindsided by a sudden request for an account from your child. A flat refusal might work for a while, but with over 70 percent of teens using Facebook on a regular basis, your child may start to feel left out. The last thing you want him or her to do is resent your intransigence and open an account without your knowledge. If you are unfamiliar with Facebook or are not sure what’s the right approach for a tween or young teen, here are a few tips to help get you started: Use your own e-mail address to open the account If you are setting up an account for a tween or young teen, use your own e-mail address or an e-mail address that you both have access to. This way, you will see friend requests as they come in and any other notifications like tags (your child’s name) in posts or photos. You will also know if your child tries to change the password! Quality not quantity When younger kids (and some adults) first open a Facebook account, there is a tendency to equate the number of friends they have with how popular they are. That usually results in a mad dash to friend everyone they know…and quite a few people they don’t! Help them resist the temptation. Building a friend list slowly but surely will make for a much more satisfying Facebook experience. Don’t allow Facebook to choose friends for your child After you open an account, Facebook starts suggesting lots of friends for you based on previous Facebook accounts run off the same computer (very sneaky!) or your early friend choices. It will also ask for permission to search your e-mail account, so it can suggest even more friends. Ignore them all! You and your child should carefully add friends based on your own preferences, not Facebook’s. Choose the Profile Photo carefully The photo on your child’s Facebook profile is very important. It can say volumes about how they see themselves, as well as what you, as a parent, think about them. Cutesy is OK, provocative is a no-no. If you’re not comfortable having a photo of your child up there at all, then think about using a picture of a favorite pet, or maybe an avatar. (That’s a cartoon-style image, not the tall blue lady from the movie!) Be selective about the Profile Information Although the account will be live straight away, you still need to complete the Profile Information. Click on your child’s name which appears in the blue menu bar and click Update Info. Here, you can edit your Basic Info,Contact Information, Work and Education, and the things you are interested in like Sports and Arts & Entertainment. When filling out your Profile Information, make sure that the default privacy setting is always “Friends” and not “Public.” Although Facebook allows you to hide Contact Information, you should leave that blank anyway. Once you have completed the Profile Information, go back to the menu bar and click on the little wheel next to Home. From the dropdown menu, click on Privacy Settings. Here you will be able to change the default privacy settings when your child posts updates and photos, control how your child connects with other people on Facebook, and control whether your child’s Facebook account can be found through public search. When you have updated the privacy settings, click on Timeline and Tagging. Here you will be able to control who can add things to your child’s timeline and how to manage “tagging.” Always err on the side of caution and make sure contact is restricted to “Friends” wherever possible. Remember, Facebook has a strong tendency towards openness, which may be fine later in life. When your child starts out in the social networking world, the emphasis should be on privacy. Be careful about adding older Friends Be careful about who you and your child add as friends. That 19-year-old cousin might be a great guy at Thanksgiving dinners and family reunions but if he’s just started college and likes to party, there may be things on his Facebook page that you would rather your child didn’t see. Remember, Facebook works both ways: Your child will be able to see everything that is posted to her friends’ pages and even to some friends of friends’ pages. Teach what’s appropriate Once your child’s account is up-and-running, spend some time together discussing what’s appropriate to write or post and what’s best left off the site. Teach them to ask permission before posting photos of other people. (Particularly photos of Mommy in a swimsuit!) Talk about updates and photos that are posted by your child’s friends and what you like or don’t like about them. As we suggested before, set-up the right way, Facebook can provide an invaluable opportunity for parents to teach cyber awareness and appropriate online behavior. Grab the opportunity before it’s too late! Do you have other tips for kids – and their parents – starting out on Facebook? Share them with The Online Mom!
<urn:uuid:944ffc69-8cfb-4879-b0ed-9603d4cc2b33>
CC-MAIN-2017-04
http://www.theonlinemom.com/tips-for-new-facebook-parents/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00438-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927216
1,123
2.109375
2
#AHS12 – Day 3 recap The third and final day of the 2012 Ancestral Health Symposium started (for me) with a talk from the original caveman himself, Dr. Boyd Eaton. His 1985 piece in the New England Journal of Medicine: “Paleolithic nutrition. A consideration of its nature and current implications” opened the gates for the movement we see here today. Eaton himself has been eating and living a paleo lifestyle for 30 years now, so his talk focused on his own 30-year n=1 paleo “experiment”. He appears to be in impressive health for a 75-y.o. man, and he presented some basic bloodwork and coronary CT scans that verified these assumptions. Interestingly, Eaton’s take on “paleo” appears to have been formed in the 80’s and, unlike others in the community, he does not appear to have evolved his thinking since then. For example, he views legumes and shredded wheat as reasonable foods for someone new to the diet because they lack sugar and salt. This simplistic and seemingly uninformed viewpoint garnered much shock from an audience that focuses more on intestinal permeability, gut flora and hormonal regulation. That said, even for a guy that eats lean meats and does isolation exercises, there is no doubt he is in phenomenal health, so even if Eaton’s paleo isn’t the same as Sisson’s, Wolf’s or anyone else’s, it is working from him so who are we to judge? I give tremendous credit to Eaton for publishing his landmark paper in NEJM, and I commend him on his great health. The next presentation was from Mike Mew, a British orthodontist. (Oh, the irony.) He discussed craniofacial dysrtophy, also known as melting faces, and the factors causing them. As could be expected, Mew discussed the work of Dr. Weston A. Price, a dentist who traveled the world and studied tribal civilizations to determine what foods provide optimal health and dental structure, two factors that he found went hand-in-hand. Price found that consumption of nutrient-dense foods, specifically consumption of the fat-soluble vitamins A, D, E and K2 and avoidance of Western foods such as refined grains and sugars, led to the most robust and optimal health for populations worldwide. Mew’s presentation seemed to align with Price’s conclusions, noting that orthodontists don’t know the cause of malocclusions and they blame it on being “multifactorial” (i.e. they haven’t a clue), but Mew brought up an additional hypothesis for the cause. He blames the current soft foods we eat as making us lazy and weak-jawed. He believes we need to have “lips together, teeth together, tongue on the roof of your mouth” for best craniofacial posture. He even called out Keith Norris for having a phenomenal physique yet very poor dental health. That orthodontist has got some brass balls! Though I’m not sure I agree with his assessment that entire civilizations have poor dental structure because “they’re lazy”, I like that he is an orthodontist challenging the mainstream approach and trying to focus on prevention rather than just slapping on braces. I’m sure his recommendations for better dental posture are good ones, but having read Dr. Price’s book “Nutrition and Physical Degeneration, I am more convinced that it is a factor of poor nutrition rather than plain old laziness. Dr. Robert Lustig gave the next presentation I sat in on. (It was Day 3… my ability to sit through consecutive sessions was at an all-time low, so apologies if I missed presenters). He discussed, you guessed it, sugar. For those who are unaware of Lustig’s crusade against all things fructose, I recommend you watch his infamous presentation Sugar: The Bitter Truth. Although he was speaking to a crowd that needs no convincing on the dangers of sugar consumption, he presented some rather compelling arguments and interesting facts. Here are a few notable ones: - Malaysia and Saudia Arabia have the highest rates of Type 2 Diabetes. Why? They don’t have alcohol, so citizens look to sugary drinks for their fix instead. - There is no HFCS in Australia, yet they are the 3rd fattest country in the world and they suffer from the same diseases we do. This disproves the notion that HFCS is the culprit and regular table sugar is fine and dandy. ALL sugar is equally problematic. - Obese people and cocaine addicts show the same downregulation of D2 receptors (dopamine tolerance), thus showing similar addictive qualities of sugar and cocaine. He also presented some unpublished data demonstrating some striking findings about excess calories when coming from soda, but we were told not to blog about that and I may have already said too much, so we’ll just have to wait for the publication hopefully later this year. Ultimately, Lustig advocated for intervention to reduce soda consumption. He doesn’t want to ban it, but he discussed how education about the dangers of a product is ineffective (e.g. the war on drugs) and how taxation is the only solution he believes will be effective. He notes how taxation on cigarettes has shown to be effective, and that for taxation to affect someone’s buying decisions the price of the product has to double. The libertarians in the room **cough*RobbWolf*cough** didn’t really like this governmental intervention, but his argument appears to have some points. Guess we’ll see how things pan out with Bloomberg’s plan in NYC… Up next was Dr. Terry Wahls who (sorry to link to another long video) has basically reversed her multiple sclerosis (MS) through a paleo diet. It’s quite a remarkable story. I highly recommend watching it. Specific to her diet, she eats 9 cups of green veggies per day and she advocates foods like liver and fish. Seems to be the going message in paleo these days, so I think we’re all on the right track. She also recommends not cooking food too much so as to preserve nutrient content. She ended her talk noting that “The doctor of the future will give no medicine. You are the doctors of the future. I salute you.” Right back at ya, Terry. …then came the power-hitters of AHS. Chris Kresser presented on the dangers of hemochromatosis (aka iron overload), a disorder that many clinicians do not fully understand but is starting to become more widely acknowledged and properly diagnosed. HC generally results from a genetic mutation that occurs in a few different forms. Essentially, if iron accumulates in the body, individuals are at a higher risk for cardiovascular disease, cancer, early mortality, gout, metabolic diseases, thyroid problems, arthritis… and the list keeps going . This is due to the fact that iron enhances oxidation of lipids, stimulating gluconeogenisis and inducing insulin resistance. Signs of HC include fatigue, joint pain, impotence, skin bronzing, palpitations, depression and abdominal pain. Men, especially older men and those of northern European descent, are more susceptible. Treatment includes either regular blood donations or drug chelation. For those unable to donate blood, Chris recommends chelation by apolactoferrin 300mg 2x/day between meals. For additional information, including dietary recommendations, Chris has uploaded a few select slides from his presentation at chriskresser.com/ahs12. Now that our brains were warmed up, we had the pleasure of listening to Stephan Guyenet‘s presentation on digestive health, inflammation and metabolic syndrome. He gave overviews of trials that showed 1) visceral fat (and not subcutaneous fat) having a causal role in insulin resistance and 2) gut flora having a causal role in obesity. He showed how altering gut bacteria and intestinal permeability can cause metabolic syndrome in mice, and how fermentable fiber (i.e. from whole foods) prevents this metabolic syndrome development. In addition, he showed that through the Hypothalmus-Pituitary-Adrenal (HPA) axis, stress combined with poor diet leads to accumulation of visceral fat and then metabolic syndrome. Ultimately, Stephan’s talk played in nicely with MasterJ’s talk the day before. They both showed mechanisms that can have causal roles in insulin resistance, oxidative stress and metabolic syndrome, mechanisms different from the run-of-the-mill “you ate too much of this or that”. These two are at the forefront of bringing to light the real causes of our current obesity epidemic. Up next was Dr. Grayson Wheatley, a vascular surgeon from the Arizona Heart Institute who presented a discussion on the evolving healthcare environment and how to best facilitate communications between patients and physicians. His approach focused on a different kind of “farm-to-table” approach, one that brings ancestral health practices to the operating table. Wheatley notes that it takes roughly 10 years for anything innovative in the literature to become available for medical professionals. With this lag in innovation availability, even if a substantial amount of evidence comes out supporting ancestral nutrition, there will be a grace period before physicians begin adopting it as standard-of-care. For this reason, it is important for us as patients to bring peer-reviewed literature to our physicians, discuss with them what we know, and let it all sink in. It took all of us a period of time to dismiss the heart-lipid hypothesis and let go of our precious bagels and pasta, so we can’t expect physicians to “get it” immediately either. The final presentation of the conference was the ever-hysterical and far-too-brilliant Denise Minger. After last year’s How to Win an Argument with a Vegetarian presentation, this year she extolled the superior health benefits of organ meats over muscle meats… a surefire way to immediately end any conversation with a veg. Denise presented a slew of awesomely grotesque but strangely appetizing photos including chicken foot soup, goat’s head and a deranged Easter Bunny (ok, maybe the Easter Bunny wasn’t appetizing, but it was funny nonetheless). She compared the nutritional value of organ meats versus muscle meats and came away with the same conclusions that Mat Lalonde had done on Day 1 – organ meats are where it’s at. She noted that regular consumption of red muscle meat can lead to hemochromatosis (similar to Chris Kresser’s presentation just a few hours prior) and she added in one additional method for reducing iron accumulation that Kresser had forgot to mention, blood-letting via Mike Tyson ear removal. The most surprising part of her talk was, surprisingly, not when she admitted to having eaten a raw goat testicle (awesome), but when she admitted to not liking the taste of bacon – gasps and then silence all around! Despite this betrayal of our delicious meat candy, Denise has been an invaluable wealth of information to our community, so I think we’ll find it in our hearts to forgive her. Thanks for everything, Denise! After Denise’s talk, the AHS organizers gave their thanks and spoke a little about the future of the Ancestral Health Society. From a recent email: “The Ancestral Health Society will be rolling out membership very, very soon. Benefits of membership include reduced Symposium registration fees, involvement in society governance and operations, volunteer opportunities, advance access to society publications and literature (with the Journal of Evolution and Health, and more, in the works) as well as access to the online member directory and forums for social networking and business connections. Details on how to become a member will be made available before September 1.” That about wraps up my coverage of the 2012 Ancestral Health Symposium. It was a pleasure getting down and nerdy with you! All of my #AHS12 links:
<urn:uuid:51069ef0-3412-40be-ab49-812d84873383>
CC-MAIN-2017-04
http://www.ultragrassfed.com/ahs12-day-3-recap/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00556-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958499
2,521
1.523438
2
Teaching with ICT prepares teachers to teach with ICT rather than focusing on technologies. This book shows teachers how ICTs can be used effectively as learning tools. It introduces the key theories for integrating ICTs into lessons, and explains the types of ICTs that are currently used in the field of education. It draws on useful concepts from developmental psychology so that the ICTs used at the different grades are age-appropriate. In addition, the book examines local and international policy initiatives that try to harness the potential of ICT learning. - Personal and critical reflection boxes: Opportunities for students to reflect on their own use and practice of technologies in their own lives as well as with learners during teaching practice. - Tips for teachers. - Detailed lesson plans illustrating how ICT can be incorporated in a range of subjects and grades and involving the Technological Pedagogical Content Knowledge (TPACK) paradigm. This will incorporate practical tips or guidelines related to when and how to integrate ICT into the lesson. - End-of-chapter questions for discussion. - A list of useful websites for each chapter. Additional learner and student resources are available on the OUPSA website Learning Zone for institutions that prescribe the book. Part 1: The big picture 1Digital pedagogy: An introduction to theories of learning and teaching with technology 2ICT for teachers 3Risk management when teaching with ICT 4ICT and identity 5Teaching with ICT in a global and local context Part 2: Putting theory into practice 6Age-appropriate ways of teaching with technology in the Foundation Phase 7Using the TPACK and SAMR models when integrating ICT in the Intermediate Phase 8Teaching with interactive simulations and geobrowsers to increase flow experiences in the Senior Phase 9Bloom's revised digital taxonomy and the optimal use of ICT in the FET phase 10Reconfiguring technology for active learning 11Working with the affordances and constraints of your environment Teaching with information and technology (ICT) is a valuable resource for both pre-service teachers taking modules on using ICT in teaching and learning as part of a B.Ed degree and in-service teachers.
<urn:uuid:d35341be-150a-49f1-8f9a-a8eb2345b3aa>
CC-MAIN-2022-33
https://www.oxford.co.za/book/9780190443689-teaching-with-information-and-communication-technology-ict
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00674.warc.gz
en
0.912794
461
3.765625
4
This standard was last reviewed and confirmed in 2021. Therefore this version remains current. ISO 3928:2016 specifies - the die cavity dimensions used for making fatigue test pieces by pressing and sintering, together with certain dimensions of the test piece obtained from such a die, and - the dimensions of the test pieces machined from sintered and powder forged materials. ISO 3928:2016 is applicable to all sintered metals and alloys, excluding hardmetals. Status : PublishedPublication date : 2016-11 Edition : 3Number of pages : 8 Technical Committee:Sampling and testing methods for sintered metal materials (excluding hardmetals) Buy this standard
<urn:uuid:c1ac4802-7398-46dc-8d71-4e7f73f5f43e>
CC-MAIN-2022-33
https://www.iso.org/standard/65279.html?browse=tc
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00670.warc.gz
en
0.803444
176
1.945313
2
Main post link -> http://en.wikipedia.org/wiki/Orderofoperations This post is meant to poll your opinion. I have received clarifications about how an equation should be interpreted, which indicates that the student doesn't understand how Order of Operations work. Example 1: In the problem regarding \( a + b \times c = 100 \), some students are confused about whether it means \( a + ( b \times c) = 100 \) or \( (a+ b) \times c = 100 \). Example 2: In the problem regarding \( 6 \div 2 \times 3 \), some students are confused about whether it means \( ( 6 \div 2) \times 3 \) or \( 6 \div ( 2 \times 3) \). Are there countries which use a different system of order of operations, in which you would choose the second expression in either of the above examples?
<urn:uuid:5cfac1b8-dd87-4ed0-8cb8-38922e29a16b>
CC-MAIN-2016-44
https://brilliant.org/discussions/thread/order-of-operations/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00395-ip-10-171-6-4.ec2.internal.warc.gz
en
0.908422
190
3.078125
3
Medical > Vets Our hospital contains all the things you’d expect in a modern day veterinary practice. This means we have many elaborate pieces of equipment. Our hospital is equipped to perform most types of surgery with modern anaesthetic machines, cardiac and respiratory monitors, patient warmers and critical care monitors. Our surgery can handle any sized pet (cat or dog), and our anaesthetics are very similar to an operating theatre in a human hospital. Many different types of operations are performed by our veterinarians, such as de-sexing, exploratory surgery, caesareans, tumour and lump removals, wound stitch-ups, intestinal obstructions, knee reconstructions (cruciate repairs) and dentistry to name a few.
<urn:uuid:2e02b717-7d4f-4edf-aaad-bd2e46a6277f>
CC-MAIN-2022-33
https://aussiebusiness.online/View/ELTHAM-VETERINARY-PRACTICE-2836?url=
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00676.warc.gz
en
0.936398
154
2
2
Just last week, Kate Middleton made a rare but inspirational speech where she outlined her reasons for supporting children’s mental health causes and charities. Kate admitted that as a child she had been ‘lucky’ to have a ‘wonderful and secure childhood’ surrounded by supportive parents and teachers. But stressed, that even those who come from happy and stable homes can still suffer from mental health issues. She stated: ‘As today’s theme reminds us, many children – even those from stable, happy homes – are finding that their heads are just too full. It is our duty, as parents and as teachers, to give all children the space to build their emotional strength and provide a strong foundation for their future.’ The children’s mental health charity Place2Be, which was recently supported by the Duchess of Cambridge, has launched a Children’s Mental Health Awareness Week for 2016, which will take place from the 8th – 14th February. By launching this special national event, Place2Be hope that children will have the time and the space to open up freely about their feelings, get help if needed, and learn that asking for help is not a sign of weakness. According to Place2Be, three children in every classroom have a diagnosable mental health problem. In contrast to this worrying statistic, it has also been proven that children who receive support from a younger age are less likely to suffer from mental health difficulties later on in life. To help children and young people cope with their emotions, anxieties and stresses, numerous schools across the UK have begun to introduce meditation and Mindfulness into the classroom. There is a wealth of research out there that suggests Mindfulness sessions for children have so many benefits, from decreasing bullying and aggression, to increasing optimism, happiness, encouraging compassion and empathy for others. With every Mindfulness workshop we deliver, we hope that we are providing children and young people with tools they can use anytime and anywhere: tools to calm down, slow down, and hopefully feel better. Imagine if all the children around the world learnt to use these tools during their childhoods. What a change our world would experience within just one generation! Love Victoria and the One Day team x
<urn:uuid:178b3bc0-0fd7-40b0-94d5-9ba4d3b4bc82>
CC-MAIN-2022-33
https://onedaycreative.com/helping-young-minds/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00470.warc.gz
en
0.975917
461
2.890625
3
India owns a rainbow like cultural spectrum. Mirroring the same is a challenge for a writer. This collection of short stories evolves from the engagements of personal and social relations and from the contemporary conditions, which shape them. On a stage where masculinity calls the shots, India being a male dominant society, some of the stories try opening emotional outlets for women, too. Lady protagonists occupying centre stage deal with the challenges in different ways. Though the characters and situations in these short stories are drawn from everyday life, happening in instantly recognizable places, they are capable to spring surprises even for those who are familiar with Indian life and culture. In most of the stories, care has been taken to keep the characters ordinary, not making them extraordinary or unbelievable. Readers may find common themes running through some of the stories, feeling a sense of continuity. Nevertheless, each story stands alone in its own right. (Images courtesy wikimedia Commons) The thread running through the story is fear factor. A short Story Narrating the helplessness of weak at the hands of the Strong. The short story narrating a reunion of the separated lovers. The story narrates how a woman, standing on a strange curve of her life, finds out an unprecedented solution. This is the story of a son who finds out a real mother in his step-mother. In The Handicapped a boy struggles for becoming an entrepreneur. It's a story of a woman who shows courage to face the strange odds of her life. They Aren't Beggars
<urn:uuid:58af8094-1c3c-4cf5-beff-7625dacfa611>
CC-MAIN-2017-04
http://cleanfiction.blogspot.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00562-ip-10-171-10-70.ec2.internal.warc.gz
en
0.928817
312
2.015625
2
THE Lord Mayor of Bradford is backing the appeal to raise funds for a memorial to the city's World War One heroes. The Honour the Pals appeal has seen Bradford Council and the Telegraph & Argus, supported by the Bradford World War One Group, team up to commemorate the Bradford Pals who fought in the Battle of the Somme in 1916. An estimated 1,394 men ‘went over the top’ on July 1,1916 and 1,017 of them were either killed or injured in that one dreadful day. People from across the district are being asked to donate money to help fund a new memorial, which would hopefully be unveiled in a ceremony in France to mark the centenary of the start of the battle on July 1, 2016. The Lord Mayor of Bradford, Councillor Mike Gibbons, said he was more than happy to support the appeal, and said a commemoration to the Pals in France was "long overdue". He said: "I think it is a great idea. I'm very happy that the initiative is under way. "It would be wonderful to see such a commemoration and a long-overdue placement of a stone in recognition of the Bradford Pals." Last month, the Lord Mayor was among dignitaries who turned out to pay respects to those who gave their lives in the battle. The event is held in Bradford city centre each year on the anniversary of the Somme, July 1. At this year's event, Cllr Gibbons gave a speech about the parents of soldiers who would have been at home, dreading a knock at the door with a telegram telling them their son had been killed. He said: "The Bradford Pals service I attended at the cenotaph was extremely well-attended and left me in no doubt that there is still a very strong recognition of what the Pals did for Bradford and for their country. "I think this commemorative stone would be an extension and a representation of that feeling." The Honour the Pals appeal is also being held in memory of all those from the Bradford district who fought and died in the First World War, such as those from the Territorials and the 10th Battalion West Yorks. Anyone who backs the appeal can also leave messages of dedication to the soldiers who fell during the First World War, including at the Somme, by filling out the special section of the Honour The Pals Appeal coupon which is printed with this story. The messages, to be of a maximum of 50 words, will be uploaded in the special Bradford At War section.
<urn:uuid:06bdba1d-29ff-4686-ac12-6d2049671b4b>
CC-MAIN-2017-04
http://www.thetelegraphandargus.co.uk/news/11415085.Lord_Mayor_backs_Bradford_Pals_memorial_appeal/?ref=var_0
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00162-ip-10-171-10-70.ec2.internal.warc.gz
en
0.982403
537
1.539063
2
The Great Neck home where F. Scott Fitzgerald began writing "The Great Gatsby" in the early 1920s is on the market for $3.88 million, says one of the listing agents for the property. Fitzgerald and his wife, Zelda, rented the home from 1922 to 1924, and Fitzgerald wrote the early chapters of the classic in a room above the garage that is now one of the home's seven bedrooms, says Nurit Weiss of Coldwell Banker Moves, who is listing the property with Inbar Mitzman. Author Maureen Corrigan writes about the time Fitzgerald spent in the house and the work he did there in her new book "So We Read On: How the Great Gatsby Came to Be and Why It Endures" (Back Bay, $16). Great Neck and Kings Point served as the inspiration for the novel's nouveau-riche West Egg, a counterpoint to the old-money East Egg, or Sands Point. The Mediterranean-style home, built in 1918, has been renovated through the years, but still retains many original details, including arched windows and a wood-burning fireplace.
<urn:uuid:df3507d0-5fa9-49d4-bf60-0bd1ce967652>
CC-MAIN-2017-04
http://www.newsday.com/classifieds/real-estate/f-scott-fitzgerald-s-great-neck-home-where-he-wrote-the-great-gatsby-on-sale-for-3-88-million-1.10454521
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00576-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947059
239
2.15625
2
An owner of registered land may convey, mortgage, lease, charge, or otherwise deal with the same as fully as if it had not been registered. An owner of registered land may use any form of deed, mortgage, lease, or other voluntary instrument sufficient in law for the purpose intended. No voluntary instrument of conveyance purporting to convey or affect registered land, except a will, and a lease for a term not exceeding three years, shall take effect as a conveyance, or bind or affect the land, but shall operate only as a contract between the parties, and as authority to the registrar to make registration. The act of registration shall be the operative act to convey or affect the land. The registrar of titles may require that the owner of a parcel of unplatted registered land, who conveys any part thereof which is not a full government subdivision, or simple fractional or quantity part of a full government subdivision, shall first file with the registrar of titles a drawing in triplicate of said parcel of unplatted land, showing the tract or tracts being or to be conveyed, which drawing shall be known as a "registered land survey." (a) A full government subdivision is defined as a government lot, a quarter-quarter section, a quarter-quarter-quarter section ad infinitum; (b) A simple fractional part of a full government subdivision is defined as: one-half; two-thirds; one-fourth, and similar fractions; (c) A simple quantity part of a full government subdivision is defined as: 20 acres; 200 feet, ten chains, and similar quantities. The registered land survey shall correctly show the legal description of the parcel of unplatted land represented by said registered land survey and the outside measurements of the parcel of unplatted land and of all tracts delineated therein, the direction of all lines of said tracts to be shown by angles or bearings or other relationship to the outside lines of said registered land survey, and the surveyor shall place monuments in the ground at appropriate corners, and all tracts shall be lettered consecutively beginning with the letter "A." A registered land survey which delineates multilevel tracts shall include a map showing the elevation view of the tracts with their upper and lower boundaries defined by elevations referenced to a mean sea level adjusted datum benchmark. None of said tracts or parts thereof may be dedicated to the public by said registered land survey. A licensed land surveyor shall certify that the registered land survey is a correct representation of said parcel of unplatted land. The certification shall be properly acknowledged by the land surveyor on the registered land survey before a notarial officer. All signatures on the registered land survey shall be written with black ink and shall not be written with ball point ink. The registered land survey shall be prepared on transparent reproducible film or the equivalent with a minimum thickness of four mil, and shall be prepared by a photographic process. Sheet size shall be 22 inches by 34 inches. A border line shall be placed one-half inch inside the outer edge of the sheet on the top and bottom 34-inch sides; and the right 22-inch side; and two inches inside the outer edge of the sheet on the left 22-inch side. Text used on the registered land survey shall not be smaller than eight-point type. If the registered land survey consists of more than one sheet, the sheets shall be numbered consecutively. The registered land survey shall be labeled "OFFICIAL," and any copy shall be labeled "copy" in the center of the top margin. Before filing, however, any survey shall be approved in the manner required for the approval of subdivision plats, which approval shall be endorsed on it or attached to it. At the time of filing, a registered land survey shall contain a certification by the proper county official that there are no delinquent taxes owed and that the current year's payable taxes have been paid in accordance with section 272.12. Notwithstanding any provisions of subdivision 5 to the contrary, no other copies of the survey need be filed. The registrar shall duly certify and furnish to any person a copy of said registered land survey, which shall be admissible in evidence. The registered land survey shall be filed in the office of the registrar of titles, who shall number each registered land survey, the numbers to run consecutively beginning with the number "1." One copy of each registered land survey shall be retained by the registrar of titles as a master copy, one copy filed in a registered land survey register in the registrar's office and made available to the public, and one copy delivered to the county auditor who may thereafter refer to it in connection with the tax descriptions when convenient. Thereafter the tracts in each registered land survey shall be known as Tract ....., registered land survey No. ...., and all conveyances shall describe said property accordingly; but the registrar shall not accept for filing and registration any conveyance of unplatted registered land if the land is described in the conveyance according to a registered land survey which has not been approved as provided in subdivision 4 unless the approval of the body authorized to approve subdivision plats is endorsed thereon or attached thereto. Nothing in this section shall operate to change the tax classification of the lands in the registered land survey or otherwise in any way affect the land. The purpose of this section is to simplify the description and designation of the registered land in connection with its transfer. Land conveyed by reference to a registered land survey shall be deemed to be conveyed by metes and bounds. The provisions of this section shall also be applied to the transfer of parts of lots, outlots and unlotted blocks, when the language necessary to describe the parts in other than by simple fractional or quantity parts thereof. (8293) RL s 3415; 1905 c 305 s 45; 1951 c 566 s 1; 1953 c 504 s 1; 1959 c 380 s 1; 1961 c 626 s 1,2; 1967 c 470 s 1; 1971 c 63 s 3; 1974 c 493 s 2; 1978 c 499 s 3; 1983 c 92 s 12; 1985 c 16 s 1,2; 1985 c 281 s 14; 1985 c 300 s 27; 1986 c 444; 1994 c 388 art 3 s 14; 1999 c 11 art 1 s 21; 2008 c 225 s 5; 2015 c 7 s 13 Copyright © 2016 by the Revisor of Statutes, State of Minnesota. All rights reserved.
<urn:uuid:0d3ed756-1a7e-4bea-8d62-675cedb2afc3>
CC-MAIN-2017-04
https://www.revisor.mn.gov/statutes/?id=508.47
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00378-ip-10-171-10-70.ec2.internal.warc.gz
en
0.892857
1,329
1.78125
2
Bahujan Samaj Party supremo Mayawati appears as the least seriously taken politician in the country. The former vice-president of the BJP in Uttar Pradesh, Dayashankar Singh branded her a "prostitute" a few days ago. Once can also recall the case of BJP spokesperson Shaina NC, remarking in 2014 that she was confused if Mayawati was a “he or she” – saying something only a sexist man would say but making it a hundred times more pathetic by being a woman. Setting aside the sexism and aesthetic “requirements” of no one less than Madhubala or Rakhi Sawant deserving to be the Prime Minister, Mayawati is perhaps the most hated politician in the eyes of the mainstream media and political class. The aforementioned comments were only a drop in the ocean of insults hurled at the BSP leader throughout her career. Certain female politicians, such as Sonia Gandhi and Shiela Dikshit of the Congress, Brinda Karat of the CPI(M) and Sushma Swaraj of the BJP, are treated as states(wo)manly enough to be regarded as major politicians in their own right – having the agency to form their own views (nevermind that Sushma Swaraj threatened to shave her head if Sonia Gandhi became Prime Minister). Mayawati is not the typical elite English speaking politician. Other major female politicians, such as Jayalalithaa, Mayawati and Mamta Bannerjee are treated as loud troublemakers, branded Amma, Behenji and Didi respectively — their agency reduced to all whim and no intellect, despite them being the autocratic heads of their respective parties. The overwhelming remainder of female politicians is, it is futile to disclose, treated as cattle that provide voice votes or press the roll call when required. I am sorry to say, the BJP has historically abetted that very culture of sexism that former HRD Minister Smriti Irani still complains about. The more assertive women have always been slandered, including Indira Gandhi. Strangely, the BJP forgets its sexism and its distaste for female agency when it comes to the borderline-illegal actions of Sadhvi Prachi, Sadhvi Pragya, Maya Kodnani and Vasundhara Raje. Mayawati, however, has been the subject of an altogether lower discourse at the hands of the political establishment and corporate media, as compared to any other female political leader. She has been the most powerful female leader of a non-Congress Party, and was the first chief minister of Uttar Pradesh to complete a full five-year term. Unlike Jayalalithaa and Mamata Bannerjee, Mayawati is not a Brahmin, and only she has truly crusaded against Brahmanical male dominance – the CPI(M) is also a Brahmin party in Bengal, and in Tamil Nadu the opposing DMK is the non-Brahmin party. One need only recall the Guest House incident in which Mayawati was attacked and threatened with rape and murder by Samajwadi Party activists that her defiance was seen as an altogether new level of blasphemous. By virtue of social origin, the political elite will always see Mayawati as an upstart. However, Mayawati’s career, ideals and style of politics betray a completely different narrative to the one constructed by her powerful detractors. Unlike Ambedkar who spoke for all Dalits but was popular mostly among Mahars – Kanshi Ram and Mayawati were able to garner the support of backward groups and scheduled communities beyond their own caste. They realised that scheduled seats in a general electorate did not empower Dalits as much in reality as on paper. In a reserved constituency, where candidates from each party are from the scheduled category, the upper caste vote decides the winner, which is in any case a party and not a candidate or community in that constituency. Being one of the harbringers of the coalition era, the BSP has an altogether different notion of political power – as well as nation. They seek to win enough seats within a state to form a coalition or play kingmaker – punching above their weight to have a seat at the table. They realised they did not need a brute majority to safeguard Dalit interests. In the 1930s, Ambedkar noted that Dailts, unlike Muslims in pre-Partition India, were scattered geographically all over India, with no meaningful demographic concentration to translate into electoral clout – which led him to push for separate electorates. He also saw that increased federalism would not be of any benefit to the backward groups, and advocated for a strongly centralized state. In addition to breaking the caste bloc limitations that Ambedkar had as a mass leader, Kanshi Ram and Mayawati truly form the logical evolution of what Ambedkar started. At the national level, they seek a coalition, or support governments from outside in exchange for pro-Dalit policy. Unlike other regional parties such as the DMK which has no ambitions other than regional and ministerial, the BSP enters into national alliances to make a national policy difference. Kanshi Ram and Mayawati consistently challenged major establishment Dalit leaders electorally, accusing them of being mere puppets and “chamchas” of the Brahmanical parties. They fought several high profile Lok Sabha elections in the 1980s, against VP Singh, Rajiv Gandhi, Meira Kumar, and Ramvilas Paswan. In each case they came second, and Ramvilas Paswan (who fought in each election) third, with a margin that exposed Paswan as the political “spoiler” who denied a BSP victory rather than the other way around. The result: Mr. Paswan never fought an election from UP again. Mayawati herself spent over a decade crisscrossing the country multiple times on a bicycle (and several more times throughout UP) engaging in political mobilization and pan-Dalit cultural solidarity. Like Ambedkar, she saw it as her duty to represent and politicize every section of Dalits all over the country. In this, compared to Ambedkar, and more than any other major female politician, Mayawati has truly been a grassroots activist. While VP Singh has been given credit for implementing the Mandal Commission recommendations, and while his henchmen Mulayam Singh, Sharad Yadav and Lalu Prasad Yadav became the main political beneficiaries of the increasingly assertive OBC politics - one should never forget that it was Kanshi Ram and Mayawati who were constantly agitating for the implementation from 1980 itself all the way till VP Singh put his stamp on it – unlike the others. Allying with Mulayam Singh of the Samajwadi Party, Mayawati had prevented the rise of a BJP-led government in Uttar Pradesh in the first election after the demolition of the Babri Masjid. Further, she did not hesitate to withdraw support that Mulayam government, and from the two subsequent coalitions she had with the BJP, with the main concern being violence against Dalits and the main perpetrators being the OBC community – giving up political power while taking the reins of the movement for social justice. The BSP under Mayawati has been the only party to ever enter into an alliance with the BJP and walk out the main beneficiary. The alliance with Nitish Kumar’s Janata Dal (United) party in Bihar gave the BJP a footing in the state that it never had before – enabling it in 2014 to win 22 out of the 38 Lok Sabha seats in Bihar to JD(U)’s 2 seats. The NDA alliance as a whole won 31 seats. Electoral alliances in Jharkhand, Orissa, Uttarakhand, Assam, and Punjab yielded similar benefits to the BJP. Despite the RSS having been founded and having its headquarters in Nagpur, the BJP was never the major political force. The long-term alliance with the Shiv Sena allowed the BJP to build up over the years, overrun the state of Maharashtra and by 2014 install its first chief minister in the state - Devendra Fadnavis. The Shiv Sena, however, is currently sulking in seclusion as the junior-most partner, while its influence remains limited to a zone as small as the RSS once had. In fact, the BJP emerged far worse off in UP from its alliance days with Mayawati. If Mayawati is to be demonized for simply allying with the BJP at all – well, the CPI(M) too supported the VP Singh government in 1989 along with the BJP, and had a much smaller role other than printing anti-communalism literature (and allying with the Congress) in combating the BJP where the BJP was dominant, statistically speaking. Under the Mayawati government (2007-12), despite the disdain for her among the upper caste bureaucratic class, and an outwardly dull rule, there were some startling measures in Uttar Pradesh, some of which were never well reported on. The police examination answer scripts were uploaded online for transparency for the first time. Public doctors who skipped compulsory duty in rural areas were dismissed. Maintenance of law and order under the Mayawati government was exceptional; caste atrocities and communal violence were at a record low. Part of this has to do with the fact that like Ambedkar, Mayawati views the Dalits as a national minority and not as the lower caste segment of a majority – always a section to protect. From the perspective of the minorities in that sense, Mayawati’s rule had been on the better side. In comparison to the Samajwadi Party that took the Muslim vote for granted and went on to abet the riots in Muzaffarnagar, the BSP’s record on communalism and violence against minorities has been one of integrity and consistency despite having allied with the BJP. As a national leader with regional clout, Mayawati regularly intervenes on Dalit issues across the country – as she had in the Rohith Vemula case, and on the ill treatment of Dalits in Gujarat. A major limitation of the BSP is that it is a one-issue party that governs rather starved of ideology in other spheres. This also gives it attributes other parties do not share. Unlike the BJP and the Congress, the BSP would not pay heed to pleasing American interests (or in the case of the Communist party in the 1950s, the erstwhile USSR). Under a party like BSP, India may just witness an independent foreign policy for the first time since Nehru. While local BSP leaders are ingratiated to local economic elites, the BSP does not base its decisions on the interests of big business, unlike the Congress and BJP and dozens of regional parties. It can be reliably expected to play a more evenhanded role when it comes to secularism, as compared to the opportunistic secularism and soft Brahmanical communalistic trend that the Congress has historically shown. The BSP has no vested interest in promoting neoliberalism. By virtue of the backwardness of its political constituency, it is obligated to expand education as the only way to expand total number of reserved seats. It is the only party that seriously pursues filling vacancies in reserved category seats in education and public sector jobs at the lower level. Out of all the parties, only the BSP has a serious stake in promoting Dalit entrepreneurships, whether for small business and economic self sufficiency or for organized sector employment of Dalits and filling the Party coffers. In many ways, simply by not having a status quo to uphold, the BSP still offers a challenge to national establishment politics. Regarding the trope of Mayawati being the most corrupt politician there is, (along with Lalu Prasad Yadav) – it would be pertinent to note whether Lalu’s fodder scam or Mayawati’s Taj Corridor ‘scam’ really match up to the reputations created by the mainstream media. One would just need to ask whether either of these two scams is larger than: - The 2G scam - The ISRO scam - The Vyapam scam - Coal scam - Commonwealth games scam - The charges for which BS Yeddirappa had to resign as chief minister of Karnataka - The DDCA scam Sadly, it nigh impossible to find a scam in which either of the two national parties (the BJP and the Congress) is implicated in the past few decades and the value of the quid pro quo subject ends up lower than any of the scams Mayawati is accused of. Attacking the smaller regional outfits becomes a way to cover up for the close links between the corporate media and the two major national parties, both of which are socially conservative and neoliberal in economic outlook. For example, during the 2G scam controversy, The Indian Express consistently defended Ratan Tata and went as far as to publish an op-ed by him on its front page, ostensibly in the name of an ‘exclusive’. The Gujarat BJP government and Bihar NDA governments’ “development” stories were unquestioningly endorsed and propagated by the media, never mind that Gujarat’s case was woefully exaggerated and Bihar’s case dependent on increased central funding, public construction expenditure and mushrooming liquor license sales in that period. The media cannot be an effective watchdog when it belongs to the same special interests involved in corporate fraud and public corruption. To deal with the issue of party funds and the lavish display of those by Mayawati having to do with “corruption”, one must keep in mind that India does not have campaign finance disclosure laws worth their salt, and every major party is privy to political contributions from billionaires and corporations. The BSP, however, is less so, in addition to historically being more transparent regarding the source of its income. Many people are not aware that in the 1980s itself, Kanshi Ram under the banner of DS4 and BAMCEF formed a consistent fundraising machinery among backward caste government employees. If every backward caste employee donated a certain percentage of his/her income every year to the BAMCEF and subsequently to BSP - the numbers do really add up, and most of the BSP income comes from this source. Consider if every RSS member donated an even smaller percent of their income to the organization – the total would make the RSS the richest organization in India by far. Other major parties (including even the Aam Admi Party) have to rely on corporate donations and money bundled from NRI groups. If a politician is in the pocket of one’s donors, the Mayawati is in the pocket of exactly the people she claims to represent and protect, unlike every other major party. The expenditure on land acquisition for parks and statues she has been accused of “wasting” marks yet another difference – at least most of the land in question that was acquired remained as public property in the form of parks or highways, rather than private property in the form of malls, private hospitals, and SEZs. One need only think of the throwaways given to DLF in areas like Gurgaon, Singur and Nandigram in West Bengal, land grants and mining licenses in the tribal belts (party lines blur when it comes to local oligarchies), and the massive acquisition of land during the Commonwealth Games in Delhi to compare. One need not mention the large swathes of coastline handed over to the Adani group when PM Modi was the Chief Minister of Gujarat. Lastly, when it comes to concrete policy and special interests, the GST Bill and the nuclear deal and the FDI that the BJP was dead against while it was in the Opposition - it now supports. In the midst of all the shameful talk of “prostitution”, who has truly sold out? Not Mayawati. And the slander shows that she is the most seriously taken politician of all, especially with the election in Uttar Pradesh approaching. The facts that the mainstream media doesn’t offer show us that despite not being the ideal politician by far, Mayawati has more integrity than most politicians by all standards other than those set by the oligarchy to cloak themselves.
<urn:uuid:bd8284cf-1b40-4232-8543-fb9c5cc9a598>
CC-MAIN-2017-04
http://www.firstpost.com/politics/mayawati-trailblazer-with-more-integrity-than-most-has-been-the-biggest-threat-to-establishment-politics-2911998.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00143-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970457
3,363
1.625
2
The primary purpose of a battery system is to provide power to the rig. In addition, a system has to: - Connect physically to the camera/rig - Allow for adapters and cable management - Provide charging, testing and display - Provide voltage and power management Let me outline the basic building blocks of a battery system. Let’s start with the battery: The battery is mounted on a battery plate or bracket: Wait a minute. Why do we need a plate? The bracket is screwed on to the rig, so that every time you need to change the battery you don’t need to bring out the screwdrivers. Also, when a battery dies for good, which it will at some point, you don’t need to pay for the plate again. This kind of modularity has great benefits on professional rigs. Every project is different. A race car changes tires depending on track conditions – you don’t force someone to change the whole car every time you need to change tires! Some companies have the opposite philosophy. I avoid these companies for professional setups. Sometimes the bracket can also charge the battery: If it doesn’t, you’ll need a charger to charge the batteries: Professional battery systems have a proprietary P-tap or D-tap connector, from which you run a cable that connects to your camera. Usually, when you’re buying a plate, it is custom-made to fit the DC port of your camera, like this: If you want a solution that isn’t custom-made, you could try something like this: If you want, you can split P-taps to power multiple devices: The system is designed to provide for one or more D-tap connectors, so it can power more than one device. Since each device might have its own connector (DC, XLR, LEMO, P-tap, etc.), you’ll need an adapter cable: For D-tap to XLR, make sure to have the same pin configuration as your gear: To convert DC voltages, you’ll need something that’s called a buck-boost converter, to raise or lower the DC voltage according to the device used. Take great care, as an error here will destroy your gear. If you don’t know what you’re doing, don’t do it. This is what it looks like: Some battery manufacturers make direct converters from one voltage to another. If you have access to it, buy that instead of DIY solutions. See how the system works? If you need to upgrade batteries, you can, without changing everything else. The charger can take many kinds of batteries, too. When you change your camera, all you need to do is change an adapter cable and the voltage. A typical battery on a broadcast camera helps it become ‘center-back’ heavy. A smaller, lighter battery does not provide for much support. We’ll look at this in depth later, but you get the picture. These components make the foundation of a battery system. On the opposite end, the simplest rechargeable battery system is: One last piece of gear to consider is the DSLR battery grip, like this one from Nikon: This fits at the bottom, and comes with two trays – one for the original battery and another for 8 AA batteries. The battery grip is more of a photographer’s necessity, but it has the advantage of taking another battery: Each DSLR camera ‘type’ has its own battery grip, and I recommend using the grip the manufacturer provides, if you want to go that route. We now have enough information to put together our own system. In the next part let’s put together a custom battery system for the Canon C300.
<urn:uuid:7815d2aa-00e7-4fb1-8582-101220283980>
CC-MAIN-2016-44
http://wolfcrow.com/blog/comprehensive-guide-to-rigging-any-camera-14-power-supplies-part-3/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00395-ip-10-171-6-4.ec2.internal.warc.gz
en
0.936434
799
2.796875
3
The main topic of this comprehensive monograph is a detailed study of Lie algebras over an algebraically closed field of zero characteristic. The first ten chapters summarize basic results from commutative algebra, topology, sheaf theory, Jordan decomposition and basic facts on groups and their representations. The following seven chapters review required facts from algebraic geometry. The next part of the book (nine chapters) contains a detailed study of the relationship between algebraic groups and corresponding Lie algebras. The next two chapters contain the theory of representations of semisimple Lie algebras and the Chevalley theorem on invariants. Then the author introduces S-triples and describes properties of nilpotent orbits in semisimple Lie algebras. The final chapters are devoted to symmetric Lie algebras, semisimple symmetric Lie algebras, sheets of Lie algebras and a study of properties of the coadjoint representation. The main advantage of the book is a systematic treatment of the field, including detailed proofs.
<urn:uuid:ded119bb-a943-4f9f-bd45-693630bb8a46>
CC-MAIN-2022-33
https://euro-math-soc.eu/review/lie-algebras-and-algebraic-groups
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00478.warc.gz
en
0.874507
225
2.125
2
Many people in the skeptical movement worry aloud that attempts to increase the power women have within skepticism will decrease the amount of power that men have. They are all for equality, sure, and for “empowering women” just so long as it does not come at the expense of “disempowering men.” It’s all fine and well to help women, but not if it hurts men unfairly, because that would be, well, unfair. These people express these concerns when it is brought up that special efforts should be made to make skepticism a more welcoming environment for women, and when it’s said that skepticism would be better off if more women were participating. “Empowering women within skepticism” is a vague phrase that refers to a lot of different things. When women have more representation in skepticism (say, half), they will have more power to freely participate. They will be treated as professional equals, they will have equal time to express themselves, their words will be taken with equal consideration, the issues they value will be addressed equally often, they will not be judged by different standards, and they will be shown equal respect as human beings. This kind of environment–in which women as a group are treated as intellectual resources instead of tolerated as guests and groupies–empowers individual women because it enables them to be creative and outspoken, it drastically lessens their fears about being able maintain their personal boundaries (and, sadly, sometimes their safety), and it paves the way for them to take on leadership roles. Right now, most women do not have this power in skepticism, because the skeptical community has not prioritized creating an environment in which women can do these things (in great part because the values of the skeptical community are set by the people in it rather than out of it; yes, it’s a vicious cycle). If women are empowered to participate, skepticism’s membership will increase, and it will have a broader focus that can reach more segments of the general population. This makes the skeptical community stronger. In short: When the skeptical community truly welcomes women, they will be empowered as a group because they will be fully represented in membership and leadership and can direct skepticism to address their needs too, and they will be empowered as individuals because they will have more opportunities to work as skeptics without being distracted or intimidated by things like hostility and sexism. When they encounter hostility or sexism, the community will support them towards solving the problem instead of attacking them as creating a bigger one. Which brings up to how empowering women will disempower men. Yes, it’s true. When women as a group are represented within skepticism in equal numbers to their presence in the general population, they will want to spend half of skepticism’s time working on the projects they value. They will want to assume half of the leadership positions and speak for half the time at skeptical meetings, and fill up half the space in the newsletter. Right now, even though they only represent half of the general population, men make more than half the decisions about what projects skepticism should pursue. They hold more than half of the leadership positions and they speak more than half the time at skeptical meetings, and they appear in more than half of the space in the newsletter. When women are fully represented in skepticism and claim their half of the power, the power that men as a group have will be less. They will be disempowered. I don’t know how much control they have over skepticism now (85 percent? 75 percent?*), but they are going to lose a large chunk of it. The amount of their power is going to go down. Probably pretty far down–all the way to half. When women as a group are fully represented in the active skeptical movement, men as a group are only going to be in power of half of it. But that’s OK. They really shouldn’t have more than half of it now (and they really shouldn’t be complaining so vehemently about having to share, but that’s just like my opinion, man). *I don’t consider the number of female attendees and speakers at TAM to be very representative of the skeptical movement, so please don’t bring up “40%” and “50%” respectively in response to this post, even though the progress TAM has made with improving said numbers is admirable and encouraging and a good model for what other skeptical event organizers should aim for. But that’s just the power that men as a group will lose. Men as individuals have nothing to worry about. When women as individuals are fully empowered within the skeptical movement, it will not affect the level of individual men’s empowerment at all. They will still be able to address the topics they value, assume leadership positions, express themselves, take risks, and have their personal boundaries respected just like they have always had and just like they have now. Their opportunities to work on skepticism without encountering distractions or hostility will be unchanged, and they will continue to be valued as humans, allies and as skeptical, intellectual partners. They will lose none of these privileges by extending them to women. Unlike the dynamics of two groups of people sharing power (see above), individuals interacting with each other is not a zero-sum game.
<urn:uuid:5ebccc8c-7c63-4ef5-a7ff-5e7705538bcc>
CC-MAIN-2017-04
https://morewomeninskepticism.wordpress.com/2011/08/02/22-accept-that-empowering-women/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00161-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971565
1,092
2.390625
2
| Fenugreek in Alabama | Answered by: Inge Poot Question from: Dr. Russell Page Posted on: September 16, 2008 With our heat I have had no success with fenugreek in the spring. Could it perhaps be a successful fall planting here in Zone 8B Alabama, USA? It certainly seems worth a try. We have not had anyone reporting to us on growing fenugreek in hot climates so I can only guess. I would start plants in pots indoors in late summer and put them outside as soon as the worst heat is over. Otherwise you may not get enough growing season to mature the plants. If winter does come before maturity, you might be wise to have some bubble wrap ready to put over the plants on cold nights, making sure that the edges are held down properly -- maybe with boards and rocks -- so no frosty air can sneak under the cover. Remove after sun-up.
<urn:uuid:772da078-7aae-4771-a1bd-a64ad3095986>
CC-MAIN-2022-33
https://www.richters.com/show.cgi?page=QandA/Growing/20080916-2.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00674.warc.gz
en
0.977717
205
1.992188
2
Reopening to local tourism Sector that supplies nearly a quarter of GDP looks to be filled domestically for now, writes Eric Chiang of Moody's Analytics published : 23 Jul 2020 at 04:00 newspaper section: Business As many countries are still struggling with the Covid-19 pandemic and international travel restrictions to curb the spread, Thailand is restarting its crucial tourism sector to help counter a recession, starting with domestic tourists. According to the World Travel & Tourism Council report, the tourism sector accounted for 19.7% of Thailand's GDP in 2019. From that, 5.2% of GDP is generated from domestic tourism. The sector is also an important source of employment, contributing 21.4% of total employment in 2019. However, the coronavirus outbreak in the first half of the year and subsequent preventive measures, including banning incoming commercial passenger flights temporarily, caused a plunge in air traffic. Aircraft movements and passenger traffic through the country's airports between January and May decreased by 55% and 66%, respectively. Airports of Thailand Plc expects it will be October 2022 before flight and passenger numbers recover to the levels seen in 2019. The country has entered the fifth phase of its reopening since the lockdown was imposed in March. Despite no confirmed local transmissions of Covid-19 since May 25, authorities continue to ban inbound flights for general tourists, as there are second-wave spikes in many countries. As part of the economic recovery effort, the cabinet has approved three tourism campaigns aimed to kick-start the recovery of the domestic sector from July to October. The Tourism Authority of Thailand earlier projected 12 million outbound travellers in 2020 before the coronavirus outbreak and is planning to convert 6 million of them into domestic tourists. Funding for the packages will come from the 400-billion-baht economic recovery spending plan approved in April, and is worth 22.4 billion baht to boost domestic tourism by subsidising hotels and air tickets for 4 million residents, as well as free trips for 1.2 million medical personnel. The cabinet also approved additional public holidays to create two four-day weekends in July. During the first long weekend from July 4-7, Apple's mobility trends report showed a 28% spike in requests for driving directions in Thailand on the Apple Maps app over the previous weekend. The data is compared to a baseline volume of requests set on Jan 13. The requests during the long weekend were the highest since the pandemic began, suggesting some form of economic recovery as movement restrictions were eased. The total contribution of travel and tourism to Thailand's GDP and employment has been rising steadily since 2012. However, the Covid-19 outbreak has affected economic activities more severely in all aspects. Although Thailand has been cited as a success story in containing the coronavirus outbreak, tough times lie ahead for the tourism sector. The impact depends on the restrictiveness of the measures implemented and how long the pandemic will last. Tourism will not be the same after Covid-19. Travellers will need to adopt "new normal" practices and maintain social distancing and safety precautions such as wearing masks and regular hand washing wherever they go. For the next phase of lockdown easing, it may be necessary to issue measures to cap the number of visitors to tourist spots, similar to limiting the number of people going to shopping malls. Statistics from the Tourism and Sports Ministry revealed foreign tourist arrivals hit a record 39.8 million in 2019. However, a gloomy outlook for the tourism industry means the government will have to widen stimulus for domestic tourism. If 75% of the 400 billion baht spent by Thais travelling abroad last year can be redirected to local tourism, and domestic tourism revenue estimated at 600 billion baht for 2020 takes hold, income from domestic travel will reach 900 billion -- close to the figure of 1.28 trillion baht generated from tourism in primary cities last year. Eric Chiang is an economist at Moody's Analytics.
<urn:uuid:7d347b6a-3368-40bf-9b1f-2875d4ad9936>
CC-MAIN-2022-33
https://www.bangkokpost.com/business/1956091/reopening-to-local-tourism
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00074.warc.gz
en
0.95201
819
1.609375
2
Amnesty concert draws 55,000... Organizers proclaimed the ''Conspiracy of Hope'' tour a success as the series of concerts to raise money for human rights wound up in Giants Stadium yesterday. Amnesty International drew 55,000 fans to a show featuring jazz, folk, rock and reggae greats such as Miles Davis, Joan Baez and the Police. Even, Yoko Ono said, John Lennon was ''here in spirit'' to benefit human rights around the world. Davis, the legendary jazzman; Ono, Lennon's widow; and the folk group Peter, Paul and Mary were among the first to take the stage yesterday. The Police, who had reunited for part of the Amnesty tour, ended the concert. ''I don't know of any other way you can make a household name in two weeks, but we did it,'' said Jack Healey, executive director of Amnesty International-USA, the U.S. chapter of the Nobel Prize-winning human rights organization. The six-city tour, which was expected to net $3 million, was ''bigger and better than I ever thought this could be,'' Healey said. He praised the ''total cooperation'' of the musicians who donated their services. The final 12-hour concert yesterday included such stars as Sting, Peter Gabriel, U2, Joni Mitchell, Ruben Blades, Lou Reed, Jackson Browne and the folk group Peter, Paul and Mary. Ono sang the slain Beatle's idealistic vision of world harmony, 'Imagine', introducing it to the cheering audience with: ''John is here in spirit with us.'' ''This is dedicated to all the people in South Africa who have been imprisoned this weekend,'' said Peter Gabriel, leading into a song titled 'Biko' about the South African labor activist who died while in police custody. The noon-to-midnight concert at Giants Stadium at the New Jersey Meadowlands was the last in the series organized to celebrate Amnesty International's 25th anniversary, raise money and bring in new members. Mary Daly, an Amnesty International spokeswoman, estimated that 25 million people watched or listened to the star-studded final concert, which was broadcast by MTV, the rock music cable channel, and by Westwood I and other radio networks. U2 got the day's most tumultous response, a standing ovation before they even reached the stage as darkness fell. (c) The San Diego Union-Tribune
<urn:uuid:af1330b1-960f-4b0f-b0c9-bc858b800956>
CC-MAIN-2022-33
https://mrexpiredl.sting.com/tour/date/1544
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00667.warc.gz
en
0.9511
506
1.59375
2
Everybody wants to be completely flawless, right from the head to the toes. But acne is a major cause of concern for many. People stress about acne and acne scars and I am sure they’d do just about anything to get rid of them forever. Acne on the back is quite common. Well I wish I had stopped at common, but back acne is irritating, ghastly and embarrassing too. Imagine going backless at the pub with back acne or sporting a back full of acne breakouts at the pool, I am sure you want to get rid off those little breakouts and show off a clear, smooth back. Here are some simple home remedies that’ll save you from the dermatologist’s long bills. Home Remedies For Back Acne Aloe vera has bactericidal and soothing properties. It removes the acne causing microbes and soothes your irritated skin. Cut open an aloe vera stem and extract the gel. Apply this fresh gel all over the back taking care to cover all the acne. Leave on till it dries and then wash off using water. Aloe vera will also help you diminish the ugly scars left behind by the acne. Oatmeal works by exfoliating the back thoroughly and preventing excess sebum secretion. It helps unclog the pores thereby eliminating the back acne. Cook some oatmeal and let it cool down so that it reaches room temperature. Add a tablespoon of honey to the prepared oatmeal and massage it on the back. Leave it on for about 15-20 minutes. Wash off with cold water. Do this at least 4 times a week. Basil has anti-microbial properties and helps in getting rid of back acne very easily. Boil a cup of water and add 3 heaped tablespoons of dried basil leaves to it. Let the mixture remain in an undisturbed state for 20 minutes. Cool it down and apply the liquid to the affected areas using a cotton ball. Arthritis / Joint Pain Lime And Rose Extract juice of a lime and add equal quantities of rose water. Mix well and apply the mixture on the back. Make sure you cover the acne affected areas. Rub in well with your palms. Keep it overnight and wash off in the morning. Lime juice cleans your skin, removes spots and eliminates secretion of extra oils thereby unclogging the pores. Sandalwood powder is really effective against all kinds of acne. Mix some rosewater to sandalwood powder and make a smooth paste. Make enough paste to cover your whole back. Apply the paste and let it dry. This will take about 20-30 minutes depending on the quantity of rose water used. Wash off with cold water. Cinnamon is a mild astringent. It helps to remove oil and dirt from the pores of the skin and cleans it. It helps in eliminating acne and pimples. Ground some cinnamon and mix honey with it. Mix thoroughly and apply on the affected areas. Let it dry before washing off with warm water. Garlic is an excellent remedy for back acne. The bactericidal property of garlic exterminates microbial colonies and cleans the skin. It also prevents excessive sebum secretion. Extract some fresh garlic juice and rub it on the back. Mild irritation is normal when garlic is applied. Wash off with cold water after the juice dries up. Caution: Please use Home Remedies after Proper Research and Guidance. You accept that you are following any advice at your own risk and will properly research or consult healthcare professional.
<urn:uuid:78caed80-7577-4e6f-8da5-bb63996e0b2c>
CC-MAIN-2017-04
http://www.findhomeremedy.com/home-remedies-for-back-acne/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00121-ip-10-171-10-70.ec2.internal.warc.gz
en
0.914157
724
1.773438
2
History as a Social Science: An Essay on the Nature and Purpose of Historical Studies ISBN/ASIN: 9789024703333,9789401164252 | 1960 | English | pdf | 97/104 pages | 1.98 Mb Publisher: Springer Netherlands | Author: Folke Dovring (auth.) | Edition: 1 This essay has grown out of an attempt to find the answers to problems basically inherent in the making of historical re search. Widespread among humanists is a vagueness of con cepts which many times makes it difficult or impossible to translate our way of thinking into the terms of natural science or vice versa. It sounds, sometimes, as if humanistic studies were a world of its own, rather than a part of the natural world we all1ive in. How long can we go on believing that there are different kinds of knowledge ~ To this conflict of theory, another is added: a feeling of urgency about cultural problems that are too often left to the future to solve. History is not, as some natural scientists tend to believe, a matter of no practical consequence. It is a virulent factor in political and social conflicts and a basic substance in the structure of our personalities. The present dynamic epoch raises with particular stress the problem of understanding the conditioning influence which the past exercises upon the present in each particular community. Such a substance is neither a toy for pastime hobbies nor an innocent weapon in the hands of dictators. Which is, then, the responsibility of the historian, both for what he does and for what he abstains from doing ~ The necessity to stay independent in order to approach objectivity makes for no easy answer.
<urn:uuid:a15a98a8-bdf5-42a8-9176-c48184278142>
CC-MAIN-2017-04
http://avaxbooks.me/folke-dovring-auth-history-as-a-social-science-an-essay-on-the-nature-and-purpose-of-historical-studies-1-english-pdf.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00454-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936126
340
1.820313
2
Archive for June, 1997 Posted on 10. Jun, 1997 by Ryan. 50th ANNIVERSARY: FIRST SAAB UNVEILED TO THE WORLD JUNE 10, 1947 Fifty years ago, the cover was whisked off the first Saab automobile at a press conference in Linkoping, Sweden. The hand-built prototype was created by a dedicated team of aircraft engineers from the Swedish Aircraft Company (Svenska Aeroplan Aktiebolaget or Saab) , and featured a unique aerodynamic body shaped in a wind tunnel. Its styling was unlike any other car of the era. Powered by a transverse-mounted, two-cylinder, two-stroke engine, the small car was remarkably lively and sure-footed in all weather conditions. That first Saab 92 prototype was based on design parameters that still apply to today’s Saab 900 and 9000 cars: performance with efficiency, front-wheel drive, and an exceptionally strong structure for optimum occupant safety. Over the decades, Saab has pioneered many safety and performance innovations, including side-impact protection, self-restoring bumpers, affordable turbocharging and an active head restraint system, scheduled to debut on the next generation Saab 9-5 in 1998. SAAB FOR 1997: 50th ANNIVERSARY A TRADITION OF INDIVIDUALITY: SAAB CELEBRATES 50 YEARS OF CAR PRODUCTION Posted on 01. Jun, 1997 by Ryan. SAAB FOR 1997: 50th ANNIVERSARY A TRADITION OF INDIVIDUALITY: SAAB CELEBRATES 50 YEARS OF CAR PRODUCTION Swedish Aircraft Company Switched From Wings to Wheels in 1947 NORCROSS, Ga. — Fifty years ago, the first hand-built prototype from a new automobile marque was unveiled to the automotive press in Linkoping, Sweden. The curvy black coupe received rave reviews for its unusual engineering features and unprecedented aerodynamic profile, which resembled the cross section of an aircraft wing. The car’s shape reflected its heritage; it was the first four-wheeled offering from SAAB, acronym for the aircraft manufacturer Svenska Aeroplan Aktiebolaget or Swedish Aircraft Company. The unique two-cylinder, two-stroke Saab represented more than the birth of an automaker. Saab’s advanced and innovative engineering skills, enthusiasm and progressive management and manufacturing techniques would henceforth be a challenge to the automotive mainstream. Since 1947, Saab has established itself in 48 markets around the world, but despite its global reach, the company has never abandoned its philosophy of engineering and building unconventional cars. A distinctively streamlined body, performance with efficiency, front-wheel drive and exceptionally robust body construction for occupant safety were some of the initial design parameters that continue to be the foundation of Saab’s current line. Saab was established in 1937 as a manufacturer of military aircraft, a pedigree that has been evident in Saab design and engineering ever since. Saab automobiles also owe some of their technological roots to the Scania and Vabis companies, makers of wheeled vehicles ranging from trucks and buses to tanks and trains. Vabis was founded in 1891 near Stockholm and produced its first kerosene-powered, nine-hp automobile in 1897, followed by its first production motor vehicle in 1902: a truck, exhibited at the Swedish International Motor Exhibition in 1903. It wasn’t the only truck on display, however. Its competitor was a two-cylinder truck made by Scania, based in southern Sweden. The two companies competed until 1911, when they consolidated, becoming Scania-Vabis. Saab merged with Scania-Vabis in 1969 to become Saab-Scania. In 1990, General Motors Europe (AG) acquired 50 percent of Saab Automobile AB from Saab-Scania, which signaled new opportunities for cost savings and additional resources for new product development. Saab Cars USA, Inc. is a wholly owned subsidiary, located in Norcross, Ga., just outside of Atlanta. The History of Saab In the mid-1930s, Sweden realized that its Royal Swedish Air Force needed to be strengthened to help defend the nation’s neutrality from the imminent World War. In 1937, the Swedish Aircraft Company was founded, abbreviated as SAAB and later Saab. Based in Trollhattan, the company manufactured hundreds of “anti-war” aircraft of many different designs. Saab’s aircraft program began with a Junkers-derived B3 bomber with a light-alloy fuselage, and a single-engine B5 fighter-bomber under license from the American company, Northrop. After these initial projects, Saab soon was working on its own designs and in 1939, the plant size in Trollhattan was doubled. A radical new aircraft design went into production: the J21, featuring an aft-mounted, “pusher” propeller engine and twin tail booms. Because of this unique configuration, forward visibility was excellent and weapon systems could be concentrated in the nose of the single-engine aircraft. A problem that remained was the danger of the rear propeller to the pilot if forced to bail out. The Saab solution was a revolutionary invention: the ejector seat. The Saab J21 was the first production aircraft in the world to be equipped with the life-saving innovation. When the war ended in Europe in 1945, Saab realized that it must diversify its manufacturing capacity. In addition to newly designated civil aviation projects, the company decidedto draw upon its abilities in the field of precision design to build automobiles. In 1946, Saab aircraft engineer Gunnar Ljungstrom, designer Sixten Sason and a staff of 15 craftsmen hand-built automobile prototype 92.001, unveiled to the public and approved for production in 1947. The new car’s model number was the first available non-military project number: 92. Numbers up to 89 had already been assigned to military projects; 90 and 91 were dedicated to Saab’s first commercial and private aircrafts. Saab was one of the few carmakers of the 1940s to utilize wind tunnel testing, achieving an air resistance coefficient of only 0.30 Cd, a respectable figure even today. Production of the Saab 92 started in Dec. 1949. Available only in military-aircraft green for the first couple of years, the four-passenger 92 was powered by a two- cylinder, two-stroke engine with an output of 25 hp. In a remarkable victory for a brand-new marque, a Saab 92 driven by Rolf Mellde (Saab’s development manager) took first place in an important 500-mile cross-country Swedish rally in 1950. Greta Molander won the women’s class, also in a Saab 92. Subsequent rally triumphs over the next several decades — including a consistent string of victories by rally legend Erik Carlsson throughout Europe — firmly established Saab as a contender on the international rally circuit. The History of Saab Saab Comes to the United States Saab’s first major evolution was the 1956 Saab 93, equipped with a 33-hp, three-cylinder, two-stroke engine. The new Saab made its U.S. debut at the 1956 New York Auto Show. Ralph Millet, who was the American buying agent for Saab aircraft parts, was persuaded to expand his business to include importing Saab cars. “On the first day of the New York Auto Show,” Millet recalled, “I was an expert on spare parts for aircraft. By the final day, I was in the car business with Saab.” Millet founded Saab Motors, Inc. in 1956 in New York City. The company leveraged the Saab’s 93’s front-wheel drive, excellent handling on snow and ice, its powerful heating and robust construction to concentrate on sales in the U.S. Northeast. Great publicity and interest in the new Swedish import was generated when three Saabs entered and finished the three-day, 1,500-mile Great American Mountain Rally over snow-covered roads, with one Saab the overall winner. In 1957, the first full year of U.S. sales, 1,400 Saab 93s were sold. A station wagon, the Saab 95, was introduced in 1959, followed by the 1960 Saab 96 two-door. A new four-cycle V-4 engine replaced the three-cylinder in 1967. The first Saab with an inline four-cylinder was the 99, introduced in 1968. The larger Saab 99 pioneered several Saab world innovations: headlight washers/wipers (1 970), electrically heated seats (1971), 5-mph self-repairing bumpers (1971) and side-impact door beams (1972). Saab research into active and passive safety systems began with the first Saab prototype, and has intensified ever since. Saab’s safety engineering team analyzes real-world data by investigating all major collisions in Sweden that involved a Saab automobile. More than 5,000 actual accidents have been studied over the past 25 years. The 1974 Saab 99’s radical new “WagonBack” styling combined the comfort and sportiness of a sedan with the load capacity of a station wagon. With a large hatchback door, bumper-height liftover and fold-down rear seat, Saab’s utility set a standard that helped maintain an almost cult-like following of loyal owners in the U.S. Although a few other carmakers had dabbled in turbocharging, or offered turbos on high-dollar, limited-production sports cars, Saab was the first automaker to integrate a variable-boost turbocharger into a mass-produced family-type car for extra power and low-end torque on demand. The Saab Turbo concept debuted in 1976, and saw wide-spread production on the Saab 99 Turbo in 1978. Pre-production test vehicles provided to automotive journalists worldwide in 1977 received enthusiastic reviews. The era of the modern Saab began with the unique three-door and five-door hatchback versions of the Saab 900 in 1979. The 900 Turbo quickly became an enthusiast’s favorite. World innovations on the Saab 900 included a cabin air filter (1979), asbestos-free brake linings (1982), 16-valve turbo engine (1985), distributorless Saab Direct Ignition (1985) and award-winning Saab Trionic 32-bitelectronic engine management (1991). New Saab Models for the ’80s Saab introduced its “Large Car” platform, the Saab 9000, in 1986. In a spectacular demonstration of Saab durability and turbo reliability, three stock Saab 9000 Turbos were driven at top speed continuously for 100,000 kilometers (62,000 miles) during “The Long Run” at Talladega Speedway. Along the way, they set 21 world and international endurance records by averaging 131 mph over a period of 20 days. The Saab 900 Convertible also debuted in 1986. After convertibles had disappeared from the American marketplace in the early ’80s, then-Saab President Bob Sinclair realized that there was a tremendous market niche waiting to be refilled. While the hatchback Saab was not quite suitable for conversion, a limited run of two-door Saab 900 coupes with conventional trunks sparked Sinclair’s interest. He commissioned a prototype soft-top Saab 900 based on the coupe. The pearl-white convertible was shown at the 1983 Frankfurt Auto Show as a “design study.” Overwhelming media response and consumer interest prompted Saab to draw up plans for production. The first Saab 900 Convertibles were 16-valve Turbos, shipped in 1986 to the U.S., by far the largest market for the new Swedish soft-tops. By 1989, 10,000 Saab Convertibles had been produced. Currently, about one-quarter of Saab’s U.S. sales are 900 Convertibles. After a production run of 15 years, the Saab 900 underwent a major redesign in 1994, emerging with stronger four-cylinder engines and Saab’s first six-cylinder, a 2.5-liter V6. Available initially as a five-door hatchback, the new 900 line was joined by a high-performance three-door 900 Turbo Coupe and sleek 900 Convertible in 1995. Current car lines include the three body styles of the 900, available with a choice of three powerplants and two trim levels, S and SE. The popular 9000 line is comprised of the CS with award-winning Light Pressure Turbo (LPT) engine; 9000 CSE with choice of turbo or 3.0L V6 engines; and 9000 Aero, Saab’s performance flagship with its impressive 225-hp turbocharged engine. Posted on 01. Jun, 1997 by Ryan. NORCROSS, Ga. — To commemorate five decades of unique design and quality manufacturing, Saab presents a limited-production 50th Anniversary Edition Saab 9000 CSE Turbo. Only 300 examples will be produced for the United States market, each featuring an exclusive leather interior and a host of other enhancements inside and out. In addition to body-colored bumpers, front and rear spoilers, and aerodynamic body cladding, the special-edition Saab features low-profile, high-performance 16-inch tires and three-spoke Super Aero light alloy wheels. The car’s leather upholstery — in two-tone Sand Beige and Alpaca tan — features Saab’s classic stylized aircraft logo embossed in the backrests of the front and rear seats. Special textile floor mats and leather trim steering wheel complete the package. Four exterior colors are available: Black, Scarabe Green, Midnight Blue and Amethyst Violet, a color exclusive to this car in the 9000 line. The 50th Anniversary Edition Saab 9000 CSE is powered by a 200-hp turbocharged 2.3L engine and is offered with either a five-speed manual or four-speed automatic transmission. Standard features on this and every Saab 9000 CSE include a power glass sunroof, walnut-trimmed instrument panel, Automatic Climate Control and a Harman/Kardon stereo system with CD player and ten acoustically engineered speakers. Posted on 01. Jun, 1997 by Ryan. SAAB UNVEILS ALL-NEW SAAB 9-5 LUXURY SPORT SEDAN World-first technologies showcased at European launch TROLLHÄTTAN, Sweden – Sporting world-first safety and performance technologies and a lengthy list of new customer convenience features, the all-new Saab 9-5 today made its European debut at Saab Automobile AB world headquarters in Trollhättan, Sweden. The newest member of the Saab car family goes on sale in over 45 markets this fall, and arrives on North American shores in the Spring of 1998. The Saab 9-5’s aerodynamic body has a drag coefficient of only 0.29, making it the sleekest production Saab ever. It combines a thoroughly sporty stance with distinctive Saab design cues, such as the trademark Saab swooping beltline and grille. The spacious 5-passenger sedan features larger rear leg room than even the ultra-roomy current Saab 9000. New Engine Range The engine options for the new Saab 9-5 have been developed under the Saab Ecopower concept, which combines multiple valves with advanced turbocharging technology. This provides a unique combination of responsive performance, low exhaust emissions and high fuel efficiency. A newly-developed 2.3L , four-cylinder, light pressure turbocharged (LPT) engine is lighter than Saab’s current 2.3L four and generates less internal friction, improving fuel consumption by about five per cent. This Saab powerplant also integrates a new smaller, more responsive Saab light pressure intercooled turbo (LPT) system, delivering strong off-the-line torque of 206 ft. lbs. at just 1,800 rpm. The world’s first asymmetric Turbo 3.0L V6 engine develops 200 hp and a muscular torque of 229 ft. lbs. at 2,100 rpm. This engine option will be available during the first half of 1998. A new generation of Saab’s award-winning Trionic engine management system now also adds throttle control to its fuel injection, ignition timing and turbo boost pressure functions, effectively eliminating any possibilities of turbo lag. New platform and suspension systems The new Saab 9-5 follows Saab’s traditional philosophy that responsive performance and good handling are a major contribution to driving safety. The body platform is a new design on a 106.4-inch wheelbase developed uniquely for this model with new Saab-patented safety concepts in the front-end structure. Strut type front suspension is matched to a new independently suspended rear axle used for the first time on a Saab. The total chassis system has been developed to provide predictable and responsive control, as well as stable, well balanced and extremely forgiving behavior in difficult driving All versions of the new Saab 9-5 are equipped with a new generation of electronically controlled ABS as standard equipment with large diameter disc brakes front and rear. This system also incorporates electronic brake force distribution that comes into effect under hard braking before the ABS is activated. It automatically maximizes the grip available at each wheel independently to reduce stopping distances. World’s First Active Head Restraint System Reduces Whiplash The Saab 9-5 features the world’s first whiplash-reducing active head restraint system as standard equipment. This simple mechanical system is designed to limit head movement during rear-end collisions. The padded head support is connected by a linkage to a pressure plate in the back rest of the seat. In certain types of rear collisions, the occupant’s body will be pushed into the Saab seat backrest, which moves the pressure plate toward the rear. Subsequently, the head restraint is moved upwards, and forward, to meet the head before the dangerous whiplash movement has started. The new system is designed to activate in rear end collisions equivalent to a barrier impact of 9-11 mph. The precise activation of the system is determined by the force with which the occupant’s back is pressed against the backrest, the magnitude of the collision force and the individual’s weight. Saab 9-5 Safety Innovations Focus on Real-Life Occupant Protection The new Saab 9-5 has been designed using real-life safety data accumulated by Saab experts in studies of more than 5,000 actual road accidents. As a result, the front structure incorporates three robust load paths that optimize and distribute crash loads more effectively. Combined with energy absorbing systems that collapse progressively in proportion to the impact speed, crash behavior is virtually independent of what the vehicle hits. The safety cage around the passenger compartment is an extremely rigid structure of high-tensile steel members. Its reinforcement is so innovative that it is covered by eight Saab patent applications. Studies of side impact injuries have resulted in the design of a special side structure impact behavior, that Saab calls a “collision deflector.” This system channels collision forces downward during a side impact. All five seating positions incorporate three-point inertia reel seat belts with semi-automatic height adjustments and anti-submarining ramps. European variants feature a standard driver’s side airbag, and optional passenger and side airbags. US models will feature driver and passenger airbags in addition to side airbags, as standard equipment. Numerous Technical Innovations The new Saab 9-5 continues Saab’s long tradition of technical innovation with a number of new features, many of which are destined to become standard on competitive models in the future. In addition to the new asymmetric Turbo V6 engine, rigid safety cage, triple-path five-stage front-end crash structure, Saab Active Head Restraints (SAHR), side airbags and “collision deflector” side impact protection, the Saab 9-5 features the passenger car industry’s first ventilated front seats, among many other distinctive features. Other technical highlights include six high-pressure jet windshield washer nozzles and even a “smart” automatic audio volume control that compensates for background noise according to the chosen setting, not just the vehicle speed. The new Saab 9-5 is manufactured in Trollhättan, Sweden, where Saab has been building cars for 50 years. It is a completely new model that extends the Saab range of passenger cars into the premium sedan segment. The Saab 9-5 increases Saab’s European model line from two to three — the Saab 900 in three-door, five-door and convertible form, the Saab 9000 hatchback and now the new Saab 9-5 four-door luxury sedan. In North America, the Saab 9000 line will be available until the Saab 9-5 debuts in the Spring of 1998. North American Saab 9-5 specifications will be available in early 1998. Posted on 01. Jun, 1997 by Ryan. 1997 SAAB 900 COUPE EMBODIES HIGH PERFORMANCE, PURE PRACTICALITY Stronger Brakes, New Wheels Emphasize Saab Commitment to Continuous Improvement Saab for 1997 – Ever since Saab debuted the aerodynamically-advanced two-door Saab 92 prototype 50 years ago, fastback coupes have been an integral part of the carmaker’s model mix. The 1997 Saab 900 Coupe continues the heritage as a premium hatchback that offers value and utility as well as impressive performance. NORCROSS, Ga. — From the first Saab 92 prototype unveiled 50 years ago, to today’s 1997 Saab 900 S and SE, coupe body styles have been an integral part of Saab’s heritage. In 1974, the aerodynamic two-door Saab 99 evolved into an innovative new concept known as the Combi Coupe or WagonBack, which offered the practicality of a large, lift-up tailgate with folding rear seats. This new type of premium hatchback proved immensely popular with buyers who realized that they could have both dynamic styling and pure practicality in one fun-to-drive car. The 1997 Saab 900 Coupes showcase Saab’s most distinctive design cues in a package that combines high performance with the kind of functional utility that Saab owners demand. The Saab 900 SE Turbo Coupe has the acceleration numbers to back up its aggressive appearance. With a five-speed manual transmission, the turbocharged 900 reaches 60 mph in a mere 6.5 seconds. And with powerful new brakes, the 1997 Saab 900 returns to a standstill even quicker. Brake discs and calipers on both front and rear wheels of the 1997 Saab 900 are larger, improving overall braking performance. Front brakes are approximately 13.5 percent larger, while rear discs increase by 5 percent. Calipers and brake pads are now positioned further from the disc center, allowing more braking torque. In addition to shorter braking distances, these changes result in a more progressive pedal feel. Ten percent larger front brake pads are composed of a new friction material, extending their useful life by about 15 percent. A four-channel anti-lock braking system (ABS) with Electronic Brake force Distribution (EBD) continues to provide further braking security. EBD precisely controls the braking pressure between front and rear wheels, regardless of the car’s load. Wheel width has been increased to 6.5 inches for the 1997 Saab 900 S Coupe, which sports an attractive new wheel design. A new three-spoke 15-inch wheel, light alloy with visible lug nuts and a distinctive Griffin center emblem, is standard on the 900 S Coupe, giving it a sportier, more aggressive appearance. The 900 SE Turbo Coupe is fitted with a revised “Viking Aero” 16-inch light-alloy wheel, also with exposed lug nuts and Griffin center emblem. Tires are low-profile, high-speed-rated radials. Both the 900 S and SE Coupe make an additional sporty statement with a rear spoiler as standard equipment. Drivers who choose the five-speed manual transmission will appreciate a revised gear shift mechanism that enables more positive, precise gear changes. Front seats of the Saab 900 Coupe models have been slightly elongated for better thigh support, and are reshaped to provide a more supportive and comfortable seating position. Deeper side bolstering provides more lateral support. Flexible storage pockets are now provided at the forward edge of both front seats for added convenience. Other changes for 1997 include new luxury velour upholstery for the 900 S, two new Mica-metallic paint choices and rear badging that identifies the engine type and size. Rear fog lights, standard on all Saab cars, have been redesigned to turn off automatically when the ignition is switched off, so they won’t inadvertently be left on when the car is restarted. Sporty and Fun. But Always Safe A high-performance car should offer a high degree of driving excitement, but not at the expense of occupant protection. Every Saab has been engineered with an extremely high level of passive and active safety. In fact, many of the same handling, braking and acceleration characteristics that make Saab cars especially fun to drive also enable drivers to more easily avoid accidents. Daytime running lights are another proven accident-prevention device, making the vehicles more visible to other drivers during daytime hours. When a collision does occur, the Saab 900 Coupe includes a lengthy list of standard safety features to help minimize the chance of injury. Such passive safety items include dual air bags, ABS, lap and shoulder safety belts and head restraints in all five seating positions (optional rear seat center head restraint), side-impact reinforcement, the innovative rear “Saab Safeseat” and Saab’s renowned safety cage construction with front and rear crumple zones. To reduce damage to the car in a low- speed collision, the Saab 900 uses industry-leading 5-mph self-restoring bumpers. Saab’s commitment to safety goes beyond the crash-test laboratory. Since 1972, Saab safety engineers have investigated thousands of accidents involving Saabs in Sweden. Crucial information about how Saabs respond in real-world accident situations is continuously integrated into the design and engineering of all Saab cars. With the rear seat in its locked upright position, the unique “Saab Safeseat” design can be fully appreciated. This design, shared by all Saab 900s, integrates special crossbeams under the seat and at the top of the rear seatback. The sturdy upper crossbeam not only provides a cross-car reinforcement in the even of a side collision, but also anchors the rear headrests and three lap-and-shoulder safety belts. In addition, it serves as a bulkhead to protect passengers from shifting cargo in the luggage compartment. The “Saab Safeseat” complements the Saab 900’s side impact reinforcement, built into the rear panels of the 900 Coupe (or rear doors of the five- door). The roomy Saab 900 Coupe shares the same platform as the 900 five-door, and therefore has the same generous passenger space and impressive cargo capacity with the rear seat folded down. Designated a “Mid-size” car by the EPA, the spacious Saab 900 Coupe or five-door accommodates five adults. Rear seat passengers can enter and exit the 900 coupe with ease, courtesy of doors that are nearly nine inches wider than the five-door 900 model. Active lifestyles demand sufficient capability to haul lots of recreational gear. The Saab’s 40/60/100 split-folding rear seat has a pass-through opening behind the center armrest, and folds down partially or fully. With a simple push of a release button, the rear crossbeam fold down with the seatbacks to fully open the rear areas for maximum hauling capacity of a cavernous 49.8 cubic feet. Saab 900 S Coupe: Saab’s Value Leader The Saab 900 S Coupe qualifies as Saab’s lowest priced car, but its list of standard equipment is far from entry-level. Luxury features abound, even on this Saab value-leader. In addition to sporty new 15-inch alloy wheels and four-wheel disc brakes with ABS, the 900 S Coupe is equipped with a lengthy list of standard features including a premium stereo with power antenna, heated seats, power windows and locks, CFC-free air conditioning and remote lock/alarm. The sophisticated alarm system includes an engine-immobilizing feature, intrusion sensors for the doors, hood and hatch and a glass-breakage sensor. Upholstery for the Saab 900 is an attractive new luxury velour, with an elegant quilted, coarse-weave design. The new upholstery’s pattern is easier to keep clean, as dust and lint does not readily adhere to it. For maximum comfort and optimal driving position, the steering column adjusts telescopically, front safety belts are height adjustable, the driver’s seat features a variable lumbar support and the front seats are heated. The 900 S is powered by Saab’s dual-earn 150-hp 2.3L naturally aspirated four- cylinder engine, with counter-rotating balance shafts for smoothness, matched to either a five-speed manual or electronically controlled four-speed automatic transmission. A new three-spoke light-alloy wheel give the 900 S a dramatically sportier look. World-Class Sports Car Performer: Saab 900 SE Turbo Coupe Saab’s powerful 2.0L Turbo, one of the automaker’s Ecopower engines, is the standard powerplant on the exhilarating Saab 900 SE Coupe. Like all of Saab’s turbo Ecopower motors, the key features of the 2.0L four-cylinder are four valves per cylinder with center-located spark plug, intercooled turbocharger, Saab Trionic electronic engine management, preheated oxygen sensor and a catalytic converter positioned close to the engine for quick warm-up. Ecopower advantages include high torque at low engine speeds and generous horsepower with commendably low exhaust emissions and fuel consumption. The low-inertia, full-boost turbocharger ensures an aggressive torque curve and strong acceleration, with boost pressure monitored by Saab’s Automatic Performance Control (APC). Saab turbochargers, with water-cooled bearings and maintenance-free operation, are an integrated part of the engine, and is designed to last the life of the vehicle. The Turbo engine is offered with a five-speed manual or optional electronically controlled four-speed automatic transmission with three driver-controlled shift modes: sport, normal and winter. The 185-hp 2.0L Saab four-cylinder Turbo engine delivers a potent match of torque and horsepower, while a standard rear spoiler, lowered sport chassis and 16-inch high-performance tires mounted on newly styled “Viking Aero” alloy wheels contribute to the 900 Coupe’s handling prowess. The “Viking Aero” three- spoke wheels now have visible lug nuts and Griffin center emblem, along with slightly revised styling for a more aggressive appearance. The 900 SE pampers its occupants with additional luxury features, such as sumptuous leather upholstery, leather-wrapped steering wheel and manual shift boot, power front seats with three-position driver’s memory, power sliding glass sunroof, Automatic Climate Control (ACC), a 160-watt stereo system with eight speakers and a multi-function trip computer that, at the push of a button, calculates distance-to-empty, average fuel use, average speed and additional information. New Mica Metallic Paint Classic Saab 900 Coupe colors — Black and Imola Red — continue for 1997, along with Cirrus White, metallic Scarabe Green, Citrin Beige and Silver. New for 1997 are two Mica-metallic paints — Midnight Blue and Cayenne Red, both available with Taupe velour on the 900 S or Sand Beige leather. Saab’s new Mica paints contain a high metallic flake content that diffuses reflected light, producing a deeper luster and richer color. In addition to Saab’s four-year/50,000 mile bumper-to-bumper protection with 24-hour roadside assistance, the first maintenance service at 5,000 miles is performed free of charge. Perforation coverage extends for six years with no mileage limit. 94 (Sonett I) (14) Formula Junior (3) Quantum IV (10) 97 (Sonett II & III) (47) 600 Lancia (4) 900 NG (33) 9-3 SS (182) 9-5 NG (131) 9-3 NG (8) 92001 (Ursaab) (5) Quantum I (2) Quantum II (3) Quantum III (5) Quantum V (3) 900 Cabriolet Prototype (1) 900 SPG Prototype (1) 900 Concept Coupe (2) Bertone Novanta (1) 9-3 Sport-Hatch (5) 9-3 BioPower Hybrid (10) 9-7X Aero (1) 9-5 BioPower 100 (9) 9-4X BioPower (58) 9-X BioHybrid (50) 9-X Air (12) 210 Draken (1) J 29 (Tunnan) (2) J 32 (Lansen) (3) J 35 (Draken) (8) JA 37 (Viggen) (17) JAS 39 (Gripen) (9) Wind Turbines (2) Saab Clubs (32)
<urn:uuid:037c9c22-d2c8-498e-9c2f-4d2b69048828>
CC-MAIN-2017-04
http://www.saabhistory.com/1997/06/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00277-ip-10-171-10-70.ec2.internal.warc.gz
en
0.915116
7,235
2.140625
2
The center of gravity for e-mail archiving is shifting from the IT server room to the boardroom via the courtroom, and the technologies and business processes associated with e-mail archiving are shifting as well. By Dave Vellante and Michael McCreary —For several years, the growth of unstructured content has been substantially more rapid than structured information. Because they contain highly structured data and metadata, applications such as ERP, financials, CRM, supply chain, etc., can be credibly used to indisputably re-create a sequence of events such as who placed the order, for what, for how much, when, and on what terms. In contrast, unstructured information such as e-mails, documents, spreadsheets, voicemail, and pictures are masses of stored information where it's much more difficult to determine what's relevant and replicate a decision flow in a manner that is provable with a reasonable degree of certainty. This represents a huge liability for organizations as information uncertainty grows daily and exponentially. (See figure, below.) The legal community has discovered that unstructured information in general, and e-mail archives in particular, represent a new source of revenue, leading to a large number of lawsuits in which old e-mails become the key piece of evidence used to confirm charges of corporate wrongdoing. What's more, changes to the Federal Rules of Civil Procedure (FRCP) adopted late in 2006 now require civil litigants to consider electronic evidence as part of the discovery process. Not only is e-mail a prime candidate to look for a "smoking gun," but the procedures by which e-mail is managed are also coming under attack and intensified scrutiny. Sometimes, it is easier to attack a firm's business policies and procedures than it is to argue the pure merits of a case. E-mail management has become fertile ground for these types of attacks. Organizations that are unable to demonstrate clear, well-defined, and followed policies, procedures, and tools for e-mail management are open to accusations of systematic destruction or spoliation of e-mail-based evidence. Penalties for these types of violations can be severe, ranging from sanctions all the way to an adverse inference whereby the court essentially states that the evidence not produced by an organization should be assumed adverse to their case, effectively shifting the burden of proof. Policies and procedures for retention, backup, departing staff, disaster recovery, security, and access control are all fair game and may come under scrutiny. As a result, e-mail archiving capabilities should not only focus narrowly on IT interests (e.g., holding down the cost of storing e-mails), but also begin to align with business imperatives, especially from the legal function within organizations. Legal departments view e-mail archives as critical to their day-to-day operations, and e-mail has become a mission-critical application. As such, while storage cost containment remains important, and in some respects is under even greater pressure than ever, successful e-mail archive initiatives emphasize not just reducing the cost of writing e-mail to an archive, but also querying e-mail that is necessary to support an efficient and effective discovery process. As shown in the table below, the business dynamics and corollary IT/storage administration implications of this imperative are evolving. Evolution of unstructured archiving systems and storage/IT roles The two main drivers behind this trend are the need to better support the legal activities of the corporation (i.e., reduce exposure to expensive lawsuits) and the necessity to maintain compliance with increasingly information-oriented regulations. It is important to note that the shifting center of gravity for e-mail archiving from the IT server room to the courtroom will evolve still further. The technologies, functionality, and business capabilities associated with being able to query, extract, and rapidly decipher large amounts of unstructured data will eventually find themselves at the center of boardroom discussions as organizations attempt to proactively verify that business practices and employee behaviors are consistent with the cultural and policy edicts of the organization. Furthermore, over time, line-of-business executives will begin to demand a payback on e-mail archiving investments, beyond risk reduction, deriving more value from information assets and directly improve the performance of their businesses (Stage 5 of table). These trends have three significant consequences for storage administrators: Over the next few years, we expect to see significant new case law test the limits and requirements of e-mail archiving, which will continue to drive new investment in these technologies. We will also start seeing businesses further experiment with the capabilities created by e-mail archiving in other business domains in an attempt to affect document and information lifecycle management (ILM) strategies beyond e-mail. IT's role should be to facilitate the transition to a legal business-driven e-mail archiving approach, recognizing that approach will evolve with increased focus on access to unstructured data. However, IT organizations must also help the business fully factor, in a more comprehensive way, how messaging technology affects business risk and opportunity by addressing new e-mail technologies (e.g., hosted e-mail) as well as other messaging technologies (e.g., instant messaging and voicemail) that employees use to perform both business and personal communications today. IT organizations must also recognize that as the economics and value proposition of e-mail archiving and other messaging and content technologies shift, their centers of expertise will also shift to initially serve corporate counsel in support of electronic discovery activities and over time to radically re-architect the unstructured information infrastructure of the organization. IT serves many masters E-mail managers are under pressure to ensure the cost, performance, responsiveness, and validity of e-mail archives are maintained. Users and senior managers notice when things go wrong or performance is not adequate. At the same time, the legal and compliance functions are responsible for ensuring organizations are adequately protected from outside (or internal) exposures. To IT, e-mail archiving systems should be implemented in ways that have minimum impact on operations—but this is not always easy. For example, the simplest way to populate an e-mail archive system is to use the daily backup as a source of record. However, using the e-mail backup copy will not ensure all the e-mails are captured. E-mails immediately deleted by users, for example, will not be accessible because they'll never be backed up. The alternative method of using a journaling feed ensures every e-mail is captured. However, journaling introduces overhead and complexity that may impact the production e-mail system and may also increase storage costs substantially. We have heard storage and/or e-mail managers argue: "We don't need to install journaling; it's an unnecessary expense because we already back up and archive the vast majority of e-mails that come in to the organization." This line of thinking misses the business requirement by a mile. The truth is that counsel must be able to say they have included all e-mails in a discovery request. If users can "shred" e-mails by deleting them immediately, they will, and often do so as a normal course of their daily routines. If that e-mail is discovered in, say, another organization, counsel has lost all credibility, and the organization will lose the trust of any court. This exposure can far outweigh the incremental costs and overhead of installing journaling. It is a cost of business to ensure all e-mails are captured, and that the legal department has a comprehensive understanding of the e-mail content in question. It must be assumed that opposing legal counsel will mercilessly exploit any weakness in your e-mail systems. IT must ensure the business clearly specifies the requirements for e-mail archiving, including the needs for provenance, permanence, comprehensiveness, and deletion policies; otherwise, any supposed legal umbrella will be illusionary. Impact on users E-mail is the lifeblood of most enterprises. Its value to the business is speed, flexibility, and lack of formal structure. Any initiative that seeks to change this must include an evaluation of the risk/reward equation. As such, a primary requirement of e-mail archiving initiatives is to make activities as non-disruptive as possible for users. Unfortunately, that's not always feasible. While today's best-of-breed e-mail archiving systems preserve as much of the user footprint as possible (e.g., folder structures) user disruption is inevitable. Newly introduced policies and consequent migration activities will invariably introduce change. For example, in an effort to keep costs down and e-mail manageable, an organization might mandate that after 60 days, e-mails be migrated to more cost-effective storage tiers. Users will at that time have access to a "stub" while the e-mail itself resides in the archive. Users will find the performance of accessing this migrated file to be much lower than what they've been conditioned to expect. The key to managing this disruption is communicating the benefits to users. The two main benefits are virtually unlimited mailbox sizes, and simplification of e-mail management (e.g., elimination of managing .pst files). On balance, users will find they are much more productive with the new system in place; however, it will take time for them to realize these benefits, and IT can expect some friction in the transition process. Moreover, the availability of free, Web-based, consumer e-mail services forces firms to complement efforts to implement the right mix of e-mail archiving technology with the right mix of end-user education. Use of internal e-mail systems can be monitored to verify that guidelines are being followed. However, users increasingly can circumvent an organization's e-mail mandates by using third-party e-mail services such as gmail, yahoo, and hotmail to conduct company business. It's clear that the courts expect firms to be able to access and provide copies of any digital communication conducted in support of business. It's not clear if the courts will relax this expectation simply because a business document was created and distributed over a third-party mail system. As a result, e-mail governance policies must include users' activities with third-party e-mail systems, with special efforts made to determine the risk to the firm posed by third-party e-mail provider archiving practices. Bad user behavior will trump any technology implementation, necessitating clear policies regarding third-party services. The bottom line is that e-mail archiving will require introducing changes to the way users work. With older e-mails, response times will be slower and certain activities more restrictive. But users will ultimately be freed from the hassles of running out of mailbox space and dealing with .pst files. Technology integration actions Case studies of large and mid-sized organizations show that as much as 50% of file-based storage (e.g., NAS) is allocated to storing .pst files, often a huge amount of storage. This is not surprising given the overlap in e-mail content as, for example, the same attachment goes to 10 different users. The good news for storage administrators is that a comprehensive e-mail archive system can get rid of .psts over time, freeing up storage space. The better news is storage administrators receive this benefit on the coattails of a wider corporate e-mail archiving initiative. Storage managers should move legacy .pst files to the slowest, least-expensive devices and over time phase out .psts through attrition, depending on legal retention policies. New .pst files should be aggressively deleted as the new archive will house the e-mails of record. The challenge is that e-mail archiving initiatives will create truckloads of more storage that needs to be managed, especially as journaling is introduced. Technologies such as thin provisioning, data de-duplication, and low-cost SATA arrays should be aggressively investigated. As well, N-tier storage strategies make sense with e-mail archiving as newer e-mails will reside on near tier-1 storage (let's call it T1-B) and will be migrated to T2 and T3 tiers as archived over time to save additional costs. This will require clear policies, data classification efforts, and technologies to automate the migration of files. It is important to note that data classification must be automated at the point of creation or use; otherwise, classification efforts will become impossible to maintain (Stage 4 of table). This is challenging because tools and metadata are often lacking, especially for unstructured content, although e-mails contain plenty of metadata that serve as a good starting point for auto-classification efforts. Over time, more business-relevant metadata can be introduced, including user-driven classification schema. Also noteworthy is that installing journaling requires additional overhead on both the processor and the network and often requires changes to the core e-mail system to ensure application performance and behavior is predictable. While journaling is necessary to ensure all e-mails are captured, it will require more storage, servers, and I/O performance. On the flip side, restoration of e-mail backups is dramatically simplified because the first line of restoration is the e-mail archive (versus e-mail backup media that must be accessed in snapshots of time). Interestingly, we have begun to see some courts and attorneys start to question the authenticity of electronic evidence. As any IT professional knows, electronic files are not the same as paper, and proving authenticity is difficult to impossible in many cases. As a consequence, several additional technology integration points are worth noting: E-mail archiving shows up as the tip of the iceberg when it comes to managing, securing, and exploiting the unstructured data within an organization. While some vendors are trying to integrate the pieces into a single solution, no vendor has articulated a complete and scalable technology road map to achieve this. Today's e-mail archiving products can largely be viewed as point solutions that either focus on infrastructure challenges, or attempt to solve end-user problems for archiving or e-discovery. Many solutions fail to provide adequate functions for users, or provide user functions without adequate performance, scalability, or integration with other unstructured data in the organization. The market will likely bifurcate, and users should expect products that concentrate either on data infrastructure or best-of-breed functionality. As such, in designing strategies for unstructured data in general, and e-mail archives in particular, IT organizations should avoid dependence on single-vendor products that try to integrate the infrastructure and end-user functions within the same solution. The likelihood of success in the long run is limited. Short-term tactical adoption of these products is necessary, but the business case should assume a cost of migration to other products within five years as technology advancements are rapid. Information as an asset Much, if not most, of today's activity around e-mail archiving is being driven by the need to reduce corporate exposure. Organizations realize, however, that the broader use and integration of unstructured information systems brings potentially enormous value in terms of improved opportunity mining, cross-selling, and massive productivity enhancements. These initiatives will require storage administrators to consider accommodating the policy edicts of many other parts of the organization within the process framework of the e-mail archiving infrastructure. This means balancing the needs of maturing e-mail archiving processes with other document and ILM activities, and integrating what may be "siloed" security, compliance, retention, and other practices. Developing cross-organizational standards today will dramatically accelerate integration efforts down the road. We are just beginning to understand this vision in terms of business requirements, key metrics, technologies, and challenges. Nonetheless, mid- and long-term plans must begin to incorporate the notion that information value can be viewed and measured using a balance-sheet metaphor, where information assets and liabilities, while evolving, can be observed as snapshots in time. The composition of that information balance sheet can be measured, albeit somewhat subjectively, and affected by specific strategies and actions that, like a balance sheet, can become an indicator of health, viability, and opportunity. David Vellante is a co-founder of The Wikibon Project (www.wikibon.org), an open-source research and advisory community of practitioners and consultants dedicated to improving the adoption of technology and business systems. Michael McCreary is senior director, legal business technology, at Pfizer and is a member of the Wikibon community. The views and opinions expressed in this article are his own and should do not necessarily represent those of his employer.
<urn:uuid:bd4efe21-e285-49ff-95e8-6daf7a391457>
CC-MAIN-2016-44
http://www.infostor.com/index/articles/display/303100/articles/infostor/top-news/focus-on-e-mail-management-and-archiving.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00499-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940975
3,434
1.53125
2
Budgets are about choices. The great joy for me is that budgets make the Government reveal their preferences. While the Government has chosen to talk about jobs, jobs, jobs, its revealed preference is that it wants to hand out money to high income earners. One of the centrepieces of the Budget is bringing forward income tax cuts at a cost of $18 billion. Handing out money to high income earners is not an effective way to boost employment. High income earners in ordinary times save around a quarter of their incomes. But these are not ordinary times and that means those on high incomes are likely to save more. Stimulus saved does not flow into the economy. It does not increase demand. It does not boost employment. Stimulus saved is stimulus wasted. The Australia Institute has done a rapid analysis on who gets the tax cuts. This financial year it mostly goes to high income earners with the top 20 per cent getting over 40 per cent of the benefit. The tax cut this year includes bringing forward stage 2 (which mostly benefits high income earners) and the Low- and Middle-Income Tax Offset (LMITO) which benefits low- and middle-income earners at the end of the financial year. The breakdown of the beneficiaries by decile is in Figure 1. Next year the LMITO is removed and the temporary tax cut to low- and middle-income earners disappears. All that is left is stage 2, which sees almost all the benefit go to high income earners. The top 20 per cent get over 90 per cent of the benefit. The bottom 30 per cent get nothing and the bottom half get just four per cent. The distribution of the tax cuts by decile for next financial year is shown in Figure 2. It is clear that most of this tax cut will go to those who are far more likely to save it. Saving the tax cut is made worse during an economic crisis. People who are worried about losing their job are not keen to spend. Any additional money they get is likely to be used to pay down debt and increase savings in order to create a buffer against the growing uncertainty that they are feeling. Australian Bureau of Statistics figures have shown the average savings rate has increased from six per cent to 20 per cent. The Australia Institute has crunched the numbers and we calculate that, even assuming that none of the tax cuts were saved, they would only create 30,000 additional jobs next year. This is much less than the estimate of 50,000 extra jobs that the Treasurer announced. But even 50,000 is far less than the number of jobs that would be created if the Government had invested the same amount of money in employment intensive industries like universities, childcare, creative and performing arts, age care and healthcare. If the Government had invested the tax cuts into these industries, then it would have created 210,000 jobs, or 160,000 more than the Government is estimating. The most perverse outcome of these tax cuts is in the fact that a large part of the tax cut going to low- and middle-income earners is temporary while all the tax cut that is going to high income earners is permanent. This leads to a situation where low- and middle-income earners will pay more tax next financial year than they pay this year. Effectively they face a tax increase next year when compared to this year.
<urn:uuid:8d3c979f-d735-4863-af5c-17409237ac3a>
CC-MAIN-2022-33
https://australiainstitute.org.au/post/income-tax-cuts-as-stimulus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00471.warc.gz
en
0.9691
681
2.21875
2
Writing on PhRMA’s blog The Catalyst, PhRMA’s Emma Van Hook reports that this news confirms the growing role of personalized medicine as an approach to treatment that can improve outcomes for patients and also create important efficiencies in the health care system. Personalized medicine is an emerging field of medicine that uses diagnostic tools to identify specific biological markers to help assess which medical treatments and procedures will be best for each patient. In what has already been noted as a banner year for new medicines, with 45 novel new drugs approved in 2015, the new analysis indicates that 28 percent of novel new drugs approved by the Food and Drug Administration in 2015 were personalized, or precision, medicines. This continued growth from the year before, where 21 percent of approvals were found to be personalized medicines, is reflective of the rapid progress we’re seeing in advancing targeted treatments for patients and affirms that personalized medicine has become an established approach to fighting a range of diseases. Previously, there were just a handful approved each year. “The new analysis today affirms the biopharmaceutical industry’s commitment to developing personalized medicines. The continual increase of approved targeted therapies indicates where the science, research and the industry are all heading,” noted Edward Abrahams, president of PMC. In recent years, we’ve seen tremendous advances in targeted therapies for diseases like cystic fibrosis, hepatitis C and many other conditions. But, without a doubt, we’ve seen the greatest transformation in oncology. A growing understanding of the molecular underpinnings of what was once referred to as a singular disease is enabling targeted therapeutic approaches for many forms of cancer. In 2015, 35 percent of new cancer medicines were found to be personalized medicines. Some of the personalized medicine highlights from 2015 include: - Two new medicines for patients with different forms of non-small cell lung cancer; - A new combination therapy for patients with cystic fibrosis; - Two new medicines to help patients with a difficult-to-treat form of high cholesterol; and - A new targeted therapy for melanoma. America’s biopharmaceutical companies have long been committed to accelerating the development of personalized medicines. The pipeline has never been more promising, with more than 40 percent of compounds in development having the potential to be personalized medicines. In cancer, that number is ever greater with 73 percent of cancer medicines in the pipeline potentially personalized. The era of targeted therapy is rapidly transforming care for patients; we’re eager to see what 2016 will bring. To learn more about the biopharmaceutical industry’s commitment to discovering new treatments and cures for cancer, visit www.fromhopetocures.org/cancer and www.innovation.org. The Pharmaceutical Research and Manufacturers of America (PhRMA) represents the country’s leading innovative biopharmaceutical research companies, which are devoted to discovering and developing medicines that enable patients to live longer, healthier, and more productive lives. Since 2000, PhRMA member companies have invested more than $600 billion in the search for new treatments and cures, including an estimated $51.2 billion in 2014 alone.
<urn:uuid:d388ebb7-67c2-4305-ad10-08f9039acad3>
CC-MAIN-2022-33
http://www.innovationnj.net/news/2015-was-a-banner-year-for-personalized-medicine-phrma-reports
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.937027
661
2.40625
2
Pronunciation: ( —n.es'ā for 1, 2; es'ā, e-sā' for 3–5; —v. e-sā'),[key] —n. 1. a short literary composition on a particular theme or subject, usually in prose and generally analytic, speculative, or interpretative. 2. anything resembling such a composition: a picture essay. 3. an effort to perform or accomplish something; attempt. 4. Philately.a design for a proposed stamp differing in any way from the design of the stamp as issued. 5. Obs.a tentative effort; trial; assay. —v.t. 1. to try; attempt. 2. to put to the test; make trial of.
<urn:uuid:bc7ccdc6-2417-492a-a847-c48a71d9cb09>
CC-MAIN-2017-04
http://dictionary.factmonster.com/essay
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00328-ip-10-171-10-70.ec2.internal.warc.gz
en
0.90042
159
2.125
2
Northland State Employees Take Tribal Relations Training In the future UMD wants to visit Red Lake and Grand Portage for more training. Two thousand Northland employees are better equipped to handle tribal relations after taking a special training course. In just a day and a half state employees from more than 20 agencies learned about building better relationships with Native Americans and the tribal government. The training is a collaboration between the University of Minnesota Duluth Continuing Education, Department of American Indian Studies and the Minnesota Department of Transportation. “It’s an opportunity for state agency employees to interact with tribal staff, to have an opportunity to ask questions to tribal leaders and to hear from tribal leaders; that’s an important piece in the program,” said Roxanne Richards. “They also get an opportunity to talk with or interact with their tribal liaisons.” Minnesota has 11 sovereign tribal nations. There are different laws for tribal nations. The laws of states don’t apply on reservations. “They found that they can not only avoid conflicts by going to this training and maybe some lawsuits, but also do constructive things together,” said American Indian Studies Professor Tadd Johnson. “Tribal governments and state governments can work together for the betterment of the entire community and that’s what we’re trying to achieve in this training.” The training happens at tribal locations throughout out the state and the tribal state relations program received a state government innovation award in 2016.
<urn:uuid:0077f1fe-edd5-42f6-9e78-dac48e0a041e>
CC-MAIN-2022-33
https://www.fox21online.com/2018/01/12/northland-state-employees-take-tribal-relations-training/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00273.warc.gz
en
0.946192
310
2.328125
2
It seems whenever we cover "international" emcees we have the tendency to contextualize our coverage in terms of the particular country or scene that emcee belongs to. I can only imagine it must be quite frustrating for those emcees as I doubt American rappers get the same treatment. Certainly rap is as American as apple pie, but rap is also as universal as failure and success. Increasingly, these competing concepts tend to be the fuel for most "successful" rap music and they are not exclusive to the United States. Wretch 32 possesses equal parts failure and success. Though he consistently references his failures throughout "Black and White," it is his current success that defines Wretch 32's appeal. Yet, without his past failures to reflect on and draw inspiration from, Wretch 32 would not have found the success he has today. The challenge of balancing both those concepts is clear on "Black and White" and thanks to Wretch 32's ear for interesting and catchy beats, the album is a success for the most part. In years past, most emcees would include a biographical song on their debut album which would succinctly summarize the rapper's life, challenges, affiliations, and character. In fact, such a song would likely pin point the city, neighborhood, street, and possibly even apartment building the rapper lived in. Today, rappers don't feel the need to delve into such minutia. In fact, most rappers tend to generalize as much as possible in order to avoid alienating fans. Wretch 32 is no different as he presents us with little more than details of his life scattered through out the album. On "Please Don't Let Me Go" he states: "Now this is probably the first sign of madness But as a little boy I was going through mad stress I turned man of the house when my dad left But I never had rent Hit sixteen on a bad flex Mom told me hit the road with my bags then Yeah, I was going through a phase, never had sense I was just acting Cause I was close to a dead end Cut school on your own with your friends then I said I was cool, I was fending I was pretending But I thank her for all of that Cause she taught me how to walk without falling back And now I'm running full with no falling back This is what you call a rap" Wretch gives us enough information to sympathize with his situation, but doesn't give us enough to alienate anyone. He implies he was left to be the "man of the house," but concedes he "never had rent." His lyrics are purposefully vague so they can appeal to anyone from children of divorce to children who literally had to work to pay the rent at a young age. Walking this tight rope allows him to appeal to the largest audience possible and he performs the routine well. On "I'm Not The Man" he once again refers to a hard childhood, but the larger purpose of the track is to address the concept of expectations, pressure, and stress that affect us all. That's not meant to dismiss Wretch 32 as a generic every man rapper, but instead it's meant to highlight his ability to make good music that appeals to all. "Black and White" is equal parts reflective tracks about the hardships of life and energetic songs meant to get the party started. "Traktor" is the best known single off the album and features a bouncy beat with stuttering drums and a eclectic mix of synths. Rather than go with a typical "southern" sounding party track, "Traktor" uses similar elements but with a unique twist. "Never Be Me" features a similar combination of unorthodox drums giving life to synths and vocal samples that would not have stood out on their own. "Sane's The New Mad" sports a beat that captures the title well as the synths are a dark cascade of hectic energy. The production stands out on tracks like this as it is different from the usual, but still captures the vibe of the respective songs perfectly. Even when the production veers into the pop and formulaic, Wretch 32 gives the tracks a cocky twist that keeps them from sounding cheesy. "Unorthodox," "Hush Little Baby," and "Don't Go" are all tracks that would fail without the proper emcee to balance their pop melodies. Overall, Wretch 32 gives us a fresh take on a common story. Some of the production may venture outside the realm of comfort for traditional hip-hop fans, but it provides a much needed reinvention of what popular hip-hop can sound like. Though the production is the strong point of the album, Wretch 32 is an emcee that is capable of appealing to a large audience without coming off as contrived or forced. The combination makes for an appealing album and should guarantee Wretch 32 continued success. Music Vibes: 7.5 of 10 Lyric Vibes: 6.5 of 10 TOTAL Vibes: 7 of 10 Originally posted: September 20th, 2011
<urn:uuid:63d03a1d-6148-4644-8682-b4b8c8c820c8>
CC-MAIN-2017-04
http://www.rapreviews.com/archive/2011_09_wretch32black.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00392-ip-10-171-10-70.ec2.internal.warc.gz
en
0.979159
1,047
1.53125
2
The ADA National Network provides information, guidance and training on how to implement the Americans with Disabilities Act (ADA) in order to support the mission of the ADA to “assure equality of opportunity, full participation, independent living, and economic self-sufficiency for individuals with disabilities.” Funded by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR), the network consists of ten Regional ADA Centers located throughout the United States and an ADA Knowledge Translation Center (ADAKTC). Each Regional ADA Center focuses on its region’s unique needs. This regional focus is critical to ensuring that ADA National Network services meet the needs of a diversity of populations and stakeholders throughout the country. Over 56 million people in the United States have a disability.* * The Survey of Income and Program Participation (PDF | 622 KB) (SIPP), 2010. How has the ADA National Network supported ADA implementation?[Captioned Video – 1:36 min.] What is the ADA? The ADA is the first comprehensive civil rights act for people with disabilities. It was passed by Congress and signed into law by President George H. W. Bush on July 26, 1990. The ADA protects people with disabilities from discrimination in all aspects of employment, in access to public programs and services such as transportation, and in access to public places like businesses, restaurants, stores, hotels, places of entertainment, and other service establishments. Why is the ADA Important? The ADA has empowered people with disabilities by banning discrimination on the basis of their disability and by making it possible for them to participate more inclusively in their communities. Although there have been significant changes since the ADA was passed in 1990, people with disabilities continue to encounter barriers that affect their ability to live, work, and recreate freely in their communities. Whom does the ADA National Network Serve? Since the ADA National Network was started in 1991, it has served all sectors of society, including those with responsibilities under the ADA such as businesses, employers, state and local governments, architects, disability organizations and individuals with disabilities whose rights are protected under the ADA. What is the ADA National Network?[Captioned Video – 1:49 min.] What services are provided by the National Network? Information and Guidance from an ADA Specialist ADA specialists in each of the ten Regional ADA Centers provide information and guidance to anyone requesting ADA information through 1-800 calls, emails, and in-person consultations. ADA specialists address complex questions on a wide range of ADA topics such as reasonable accommodations at work, building codes for new construction projects, accessible housing, and transitioning from school to work. ADA specialists also address questions about other disability laws, such as the: - Fair Housing Act - Individuals with Disabilities in Education Act - Rehabilitation Act Providing ADA information In collaboration with the ADAKTC, Regional ADA Centers develop evidence-based factsheets and guidebooks on high priority and timely ADA topics such as service animals, effective communication, accessible parking, and how to plan accessible events. ADA Centers also develop and provide information specific to their state laws and regulations, and offer an extensive network of regional referrals. Training and Outreach The ADA National Network offers a variety of training, from basic to advanced, on all ADA topics such as: - Accessible information technology - ADA and education (pre-K through post-secondary) - Accessible architectural design - ADA and employment - Accessible health care - Emergency preparedness - ADA and hospitality Training is provided in-person or through distance technology such as webinars, podcasts and web courses. The majority of training activities are conducted at the local, state or regional level and are tailored to meet the needs of each specific audience. The following brochure includes a description of the national informational and training projects of the ADA National Network. National Informational & Training Projects Brochure (PDF | 139 KB) To contact an ADA specialist, call the toll free number
<urn:uuid:264cc45e-28c1-440a-aed9-58f435d6e432>
CC-MAIN-2017-04
http://adata.org/national-network
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00344-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945243
833
3.46875
3
Why use a hop-up step? When you need a lightweight and stable platform to complete odd jobs, hop-up steps are an excellent solution. They can be easily folded, transported, and opened wherever they’re needed. Our hop-ups are made of robust aluminium so they won’t tarnish, this means they can be stored easily and used time and time again! Wondering if our hop-up steps will work for you? Get in touch with the Ladders UK Direct team to discuss any questions you may have. What is a hop-up in construction? A hop-up is a small platform, often only a few feet in height that allows you to 'hop up' and reach heights that are just out of reach or as a work platform to work against. Hop-ups tend to be manufactured using high-quality, sturdy materials that are lightweight and easy to transport such as aluminium. This makes a hop-up the perfect piece of equipment for tradespeople who are often the move! Coupled with the ability to be folded thanks to the hinged legs on either side of the platform, hop-ups are able to be easily stored, making them a go-to for many workers across a variety of industries. How do I use a hop-up safely? Using a hop-up safely often comes down to common sense as it is a very simple piece of equipment to use. Ensure the maximum weight capacity isn't exceeded so that you remain stable when using a hop-up. Do not jump up and down whilst standing on top of a hop-up and do not overreach. What types of hop-ups are available? When it comes to the different types of hop-up available, you have a range to choose from. Many of the world's top ladder manufacturers such as Werner and Hailo offer hop-ups to suit a variety of different needs. Some hop-ups are wide, some are compact. Some are designed with additional handles for easier transport and some are designed with only one set of legs specifically designed to be used on stairs.
<urn:uuid:c63fe628-46ec-4eb8-a6a8-c500b4161a29>
CC-MAIN-2022-33
https://www.laddersukdirect.co.uk/shop/work-platforms/hop-ups
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00678.warc.gz
en
0.96344
431
1.765625
2
Basketball Player Quotes What could be better when you’re down but reading the words of other basketball players who you can relate to? How about famous basketball players? You know, the ones you’ve been looking up to all your life. Michael Jordan quotes. Magic Johnson quotes. Larry Bird quotes. Yeah, those guys! Many current and former players have said exactly what you need to be hearing right now. Because of space restrictions, we couldn’t list all the great basketball player quotes for each player here. However, on our Superhero Basketball Quotes page, you can find a more in-depth collection of quotes for each player. Additionally, in our Great Basketball Quotes area, you’ll discover hundreds of more quotes relating to the game of basketball or motivation. Enjoy the following basketball player quotes! Now, on to the Basketball Player Quotes! Basketball Player Quotes (1-5) - “If you want consistency, then you perform. This is a performance job. You get paid to perform. Your money is guaranteed, but your minutes are not.” – Isiah Thomas - “You’re the only one who can make the difference. Whatever your dream is, go for it.” – Magic Johnson - “If you have ability in a certain area, why not capitalize on it and improve it and use it?” – Wilt Chamberlain - “The time when there is no one there to feel sorry for you or to cheer for you is when a player is made.” – Tim Duncan - “Concentration and mental toughness are the margins of victory.” – Bill Russell Basketball Player Quotes (6-10) - “The only difference between a good shot and a bad shot is if it goes in or not.” – Charles Barkley - “Leadership is diving for a loose ball, getting the crowd involved, getting other players involved. It’s being able to take it as well as dish it out. That’s the only way you’re going to get respect from the players.” – Larry Bird - “I’ve missed more than 9000 shots in my career. I’ve lost almost 300 games. 26 times, I’ve been trusted to take the game winning shot and missed. I’ve failed over and over and over again in my life. And that is why I succeed.” – Michael Jordan - “Great players are willing to give up their own personal achievement for the achievement of the group. It enhances everybody.” – Kareem Abdul-Jabbar - “I just do what I got to do and go out and be myself, on and off the court, and take care of my obligations. That’s generally your own destiny—knowing what you have to take care of.” – LeBron James Basketball Player Quotes (11-15) - “You always have to be on edge. You always have to take every practice, every game, like it is your last.”– Kobe Bryant - “The key to success is to keep growing in all areas of life – mental, emotional, spiritual, as well as physical.” – Julius Erving - “Leadership is getting players to believe in you. If you tell a teammate you’re ready to play as tough as you’re able to, you’d better go out there and do it. Players will see right through a phony. And they can tell when you’re not giving it all you’ve got.” – Larry Bird - “If somebody says no to you, or if you get cut, Michael Jordan was cut his first year, but he came back and he was the best ever. That is what you have to have. The attitude that I’m going to show everybody, I’m going to work hard to get better and better.” – Magic Johnson - “This is a tough game. There are times when you’ve got to play hurt, when you’ve got to block out the pain.” – Shaquille O’Neal Basketball Player Quotes (16-20) - “You have to be able to center yourself, to let all of your emotions go… Don’t ever forget that you play with your soul as well as your body.” – Kareem Abdul-Jabbar - “There are plenty of teams in every sport that have great players and never win titles. Most of the time, those players aren’t willing to sacrifice for the greater good of the team. The funny thing is, in the end, their unwillingness to sacrifice only makes individual goals more difficult to achieve. One thing I believe to the fullest is that if you think and achieve as a team, the individual accolades will take care of themselves. Talent wins games, but teamwork and intelligence win championships.” – Michael Jordan - “If all I’m remembered for is being a good basketball player, then I’ve done a bad job with the rest of my life.” – Isiah Thomas - “I’ve always believed that if you put in the work, the results will come. I don’t do things half-heartedly. Because I know if I do, then I can expect half-hearted results.” – Michael Jordan - “So much of becoming a good athlete involves bringing other things to the table, other than physical skills. It involves intelligence, it involves many of the things that you learn during the process of being educated. How to analyze, how to assess, how to equate, how to reason.” – Julius Erving END: Basketball Player Quotes
<urn:uuid:d272bc28-8122-403e-81a4-71327f2c2d73>
CC-MAIN-2016-44
http://www.basketball-plays-and-tips.com/basketball-player-quotes.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00065-ip-10-171-6-4.ec2.internal.warc.gz
en
0.96109
1,239
1.570313
2
Gradescope is an online suite of tools designed to accommodate a common grading workflow. Usually, students or instructors scan and upload hand-written homework or exams. Instructors create a living rubric that allows for speedy grading. Gradescope supports workflows for both individual student assignments (homework) and instructor upload of assessments (exams). In addition to paper-based assignments, Gradescope also supports fully online assignments where no paper is required, assignments combining online and paper-based approaches, and programming assignments. Using Gradescope speeds up your grading process by allowing you to apply rubrics and comments across students for specific questions. It is especially useful for assignments where the students need to complete their work by hand (for example, Math or Economics assignments). Use Cases and Key Benifits: Assignment Type Flexibility: Deliver, collect, and grade almost any type of assignment - whether on paper or digital. Gradescope also supports Bubble Sheets (answer sheet exams) and Code/Programming assignments Rubric Flexibility: Create rubrics on the fly, import from previous assignments, and share with other faculty. Gradescope rubrics are dynamic, meaning they can be changed at any point in the grading process and automatically updated for all submissions previously graded. They can also include LaTeX, markdown, and images to help deliver feedback in the right format to students Grading Workflows: Easily grade by yourself or divide the grading among multiple graders. Rubrics are associated with each question (rather than the entire submission) and remain consistent for all students, regardless of who grades their work. This helps ensure fairness, reduce bias, and improve equity with grading. Answer Grouping (for paper-based assessments): Group similar answers and grade them once, instead of grading each individually. This can allow you to grade hundreds of students with a few clicks, even for free-response questions. - Student Feedback and Analytics: Students can see exactly what mistakes they made and why they missed points, as well as request, regrades for individual questions directly via Gradescope. Instructors can analyze assignment- and question-level data, as well as customize data via tags to better understand key concepts and learning objectives. Need Help? Gradescope’s Customer Happiness Team is available and happy to answer any questions you may have at firstname.lastname@example.org. For additional questions or assistance please contact the ATC (email@example.com)
<urn:uuid:e18420ae-7e89-4984-987b-b45d90abf95b>
CC-MAIN-2022-33
https://www.bentley.edu/atc/instructional-resources/gradescope
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00273.warc.gz
en
0.934429
532
2.09375
2
|Administrative||Current Events||Internet Resources| |Exams and Homework||Lectures||Feedback| Homework 1- Assigned, Thurs, 30-September, due Tuesday, 5-October in class. Homework 2- Assigned, Thurs, 14-October, due Thursday, 21-October in class. Quiz 1 key can be found here. Homework 3 assigned Tuesday, 2-November, due Thursday, 11-Nov. Quiz 2 key can be found here. Quiz 3 key can be found here. Homework 4- Assigned, Tuesday, 23-November, due Thursday, 2-December. Lecture 1- Introductions, course questionaire, and an introduction to motion. Lecture 2- More motion- acceleration, force and mass. Interactive Lecture Demonstration (ILD). Application: the ubiquitous automobile. Lecture 3- Gravity, work, and energy. Application: hydroelectricity. Lecture 4- Well, it actually was a lab, Lab 1. If you missed it, see the instructor ASAP. Lecture 5- Problem-solving examples, , introduction to electricity. Lecture 6- More electricity fundamentals-- current, circuits, resistance and Ohm's law. Lecture 7- Resistance, Ohm's law, power, magnets, motors and electrical generators. Lecture 8- Magnetic and electric fields, waves, electromagnetic radiation, the solar collector. Lecture 9- Lab Day! Lecture 10- . The Science of Spectra. Intro to Heat and Temperature. Lecture 11- Review of black body radiation, heat, temperature, work on gases, First Law of Thermodynamics. Lecture 12- Adiabatic compression, absolute zero, First Law of Thermodynamics, heat transfer, Heat Capacity, Heat Engines and Efficiency. Lecture 13- Heat transfer, energy conservation in the home, specific heat, heat engines and efficiency. Lecture 14- Heat heat redux, climate and weather, the hydrological cycle. Lecture 15- , feedback loops in nature, combustion and fuels. Lecture 16- Exponential Growth and its Implications. Lecture 17- Energy Use Patterns and Fossil Fuels in the Mix. Lecture 18- Atoms and Chemistry. Lecture 19- Global Warming Redux Send comments to Dean Livelybrooks, Instructor
<urn:uuid:f9f45eb7-0595-4a2f-a09e-131b2f289c85>
CC-MAIN-2017-04
http://hendrix2.uoregon.edu/~dlivelyb/phys161/home.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00348-ip-10-171-10-70.ec2.internal.warc.gz
en
0.822598
527
2.859375
3
Financial Crisis and Sticky Expectations We utilize the Kalman filter and instrumental variable methods to estimate consumption growth persistence for the U.S. Results show that prior to the financial crisis, the stickiness parameter beta was around 0.7. However, when the sample is extended until 2009.Q1, the estimates of beta declined to around 0.5. Extending the sample beyond 2009.Q1 show mild increase in beta. Our findings imply that during the crisis consumers' attentiveness to aggregate information has slightly increased, thereby reducing the persistence of aggregate consumption growth. |Date of creation:||May 2013| |Date of revision:| |Contact details of provider:|| Postal: Commerce House, 360 Queen Street, Private Bag 92006, Auckland 1020| Phone: +64 9 917-9721 Fax: +64 9 917-9976 Web page: http://www.aut.ac.nz/business/working-paper-series More information through EDIRC Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.: - Ferson, Wayne E. & Constantinides, George M., 1991. "Habit persistence and durability in aggregate consumption: Empirical tests," Journal of Financial Economics, Elsevier, vol. 29(2), pages 199-240, October. - Wayne E. Ferson & George M. Constantinides, 1991. "Habit Persistence and Durability in Aggregate Consumption: Empirical Tests," NBER Working Papers 3631, National Bureau of Economic Research, Inc. - Sommer Martin, 2007. "Habit Formation and Aggregate Consumption Dynamics," The B.E. Journal of Macroeconomics, De Gruyter, vol. 7(1), pages 1-25, August. - Carroll, Christopher D. & Slacalek, Jirka & Sommer, Martin, 2008. "International evidence on sticky consumption growth," CFS Working Paper Series 2008/09, Center for Financial Studies (CFS). - Christopher D. Carroll & Jiri Slacalek & Martin Sommer, 2011. "International Evidence on Sticky Consumption Growth," The Review of Economics and Statistics, MIT Press, vol. 93(4), pages 1135-1145, November. - Christopher D. Carroll & Jiri Slacalek & Martin Sommer, 2008. "International Evidence on Sticky Consumption Growth," NBER Working Papers 13876, National Bureau of Economic Research, Inc. - Christopher D. Carroll & Jiri Slacalek & Martin Sommer, 2008. "International Evidence On Sticky Consumption Growth," Economics Working Paper Archive 542, The Johns Hopkins University,Department of Economics. - Carroll, Christopher D. & Slacalek, Jiri & Sommer, Martin, 2008. "International evidence on sticky consumption growth," Working Paper Series 0886, European Central Bank. - Hall, Robert E, 1978. "Stochastic Implications of the Life Cycle-Permanent Income Hypothesis: Theory and Evidence," Journal of Political Economy, University of Chicago Press, vol. 86(6), pages 971-87, December. - Gruber, Joseph W., 2004. "A present value test of habits and the current account," Journal of Monetary Economics, Elsevier, vol. 51(7), pages 1495-1507, October. When requesting a correction, please mention this item's handle: RePEc:aut:wpaper:201305. See general information about how to correct material in RePEc. For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Gail Pacheco) If references are entirely missing, you can add them using this form.
<urn:uuid:384b3170-0619-4964-bcbf-f9b279ab0f88>
CC-MAIN-2016-44
https://ideas.repec.org/p/aut/wpaper/201305.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00076-ip-10-171-6-4.ec2.internal.warc.gz
en
0.729052
826
1.570313
2
The Governance Slack Model. A Cash Flow Approach for the Budgeting and Accountability of some Corporate Governance Issues This paper introduces a cash flow model to budget and monitor distinctive matters usually arising in corporate governance. By enlarging the standard cash flow model widely used in Finance, and avoiding some of its downsides, it sets up a composite of cash flows called governance slack, which amounts to a comprehensive budget for the most usual governance issues. This slack has a dual structure whose dynamics keeps track of uses and sources of its components, preventing likely agency problems and improving not only disclosure but accountability as well. |Date of creation:||Mar 2002| |Date of revision:| |Contact details of provider:|| Postal: Av. Córdoba 374, (C1054AAP) Capital Federal| Phone: (5411) 6314-3000 Fax: (5411) 4314-1654 Web page: http://www.cema.edu.ar/publicaciones/doc_trabajo.html More information through EDIRC Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.: - Rafael La Porta & Florencio Lopez-de-Silanes & Andrei Shleifer & Robert W. Vishny, 2000. "Agency Problems and Dividend Policies around the World," Journal of Finance, American Finance Association, vol. 55(1), pages 1-33, 02. - Rafael La Porta & Florencio Lopez-de-Silane & Andrei Shleifer & Robert Vishny, 1998. "Agency Problems and Dividend Policies Around the World," NBER Working Papers 6594, National Bureau of Economic Research, Inc. - Rafael La Porta & Florencio Lopez-de-Silanes & Andrei Shleifer & Robert W. Vishny, 1998. "Agency Problems and Dividend Policies Around the World," Harvard Institute of Economic Research Working Papers 1839, Harvard - Institute of Economic Research. - Eric S. Maskin, 1999. "Recent Theoretical Work on the Soft Budget Constraint," American Economic Review, American Economic Association, vol. 89(2), pages 421-425, May. - János Kornai, 2014. "The soft budget constraint," Akadémiai Kiadó, Hungary, vol. 64(supplemen), pages 25-79, November. - Pagano, Marco & Panetta, Fabio & Zingales, Luigi, 1996. "Why Do Companies Go Public? An Empirical Analysis," CEPR Discussion Papers 1332, C.E.P.R. Discussion Papers. - Marco Pagano & Fabio Panetta & Luigi Zingales, . "Why Do Companies Go Public? An Empirical Analysis," CRSP working papers 330, Center for Research in Security Prices, Graduate School of Business, University of Chicago. - Marco Pagano & Fabio Panetta & Luigi Zingales, 1995. "Why Do Companies Go Public? An Empirical Analysis," NBER Working Papers 5367, National Bureau of Economic Research, Inc. - Aswath Damodaran, 1999. "Value Creation and Enhancement: Back to the Future," New York University, Leonard N. Stern School Finance Department Working Paper Seires 99-018, New York University, Leonard N. Stern School of Business-. - Rodolfo Apreda, 1999. "The Cash Flow Model with Float: A New Approach to Deal with Valuation and Agency Problems," Journal of Applied Economics, Universidad del CEMA, vol. 2, pages 247-279, November. - Guofu Tan & Justin Yifu Lin, 1999. "Policy Burdens, Accountability, and the Soft Budget Constraint," American Economic Review, American Economic Association, vol. 89(2), pages 426-431, May. - Mark S. Carey & Stephen D. Prowse & John Rea & Gregory F. Udell, 1993. "The economics of the private placement market," Staff Studies 166, Board of Governors of the Federal Reserve System (U.S.). When requesting a correction, please mention this item's handle: RePEc:cem:doctra:212. See general information about how to correct material in RePEc. For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Valeria Dowding) If references are entirely missing, you can add them using this form.
<urn:uuid:bfaadede-bd1c-4ec6-bc90-bfdbe019e5a9>
CC-MAIN-2017-04
https://ideas.repec.org/p/cem/doctra/212.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00539-ip-10-171-10-70.ec2.internal.warc.gz
en
0.740541
990
1.515625
2
Canadian Grant for Hiring Young Engineers The Science and Technology Internship Program offers a wage subsidy of up to $13,200 towards hiring of a recent science or engineering post-secondary graduate for a maximum of 52 weeks. This subsidy is available to Canadian geomatics, geology, mining, forestry or energy businesses, organizations and institutions. Eligible intern candidates must have graduated within the last two years from a Canadian institution and be under 30 years of age. The intern offered position should be newly created, potentially lead to full time employment, plus provide marketable work experience and training in the graduate’s field of study. Moreover, the hired intern is to collaborate with applicant researchers in the undertaking of a commercially relevant scientific or technical research project. Project examples include bench level research, scale-up testing, pilot plant operations, analytical testing, calibration, technical documentation, and field tests. The Career Focus program will contribute 50% funding up to $20,000 towards work placements in food processing facilities. Employers must offer work terms of between 4 and 8 months at a full-time capacity of at least 30 hours per week. All occupations are eligible for funding, including but not limited to placements in: - Business Administration - Marketing , Promotion, and Sales - Quality Assurance & Food Safety - Processing Operations - Product Development - Food Science Eligible candidates must be post-secondary graduates who are between 15 and 30 years old, unemployed, not receiving Employment Insurance (EI) benefits, and have Canadian citizen, permanent resident, or refugee status. Application intake begins Thursday May 2, 2013. Positions are limited, and INAC Services urges employers to apply as soon as possible. The Sectoral Career Focus program is reopening soon and will cost-share the hiring of post-secondary graduates for work placements. Eligible employers must offer work terms of between 4 and 12 months at a full-time capacity of at least 30 hours per week. The fund will be distributed over selected sectors and will include support for 50% of wages up to maximums greater than last year’s, which were: - $15,000 per Food Processing placement - $10,000 per Information Technology placement - $15,000 per Biotechnology placement - $13,750 per Printing & Graphic Communications placement - $12,750 per Supply Chain & Logistics placement - $15,000 per Steel Trades placement - $12,500 per Energy sector placement - $12,500 per Aviation &Aerospace placement Preference may be given to employers holding sector-council memberships. Graduates must be 15 to 30 years old, unemployed, not receiving Employment Insurance (EI) benefits, and have Canadian citizen, permanent resident, or refugee status. Stay tuned for more alerts from INAC Services as funding becomes available and application intake begins for the various sectors.
<urn:uuid:60c84fa5-8dbd-485b-ae44-0690715b5b2f>
CC-MAIN-2022-33
https://inacservices.com/category/career-focus/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.927114
603
1.765625
2
Working out mechanisms of controlled/physiologic inflammation in the GI tract - First Online: - Cite this article as: - Rabinowitz, K. & Mayer, L. Immunol Res (2012) 54: 14. doi:10.1007/s12026-012-8315-5 - 233 Views The mucosal immune system is distinct from its systemic counterpart by virtue of its enormous antigenic exposure (commensal flora, food antigen, pathogens). Despite this, the mucosal immune system maintains a response defined as controlled or physiologic inflammation. This is regulated by many different mechanisms, among which there are physical, cellular and soluble factors. Our laboratory has focused on unique Tregs in the gut controlled by, in one instance, intestinal epithelial cells that serve as non-professional antigen-presenting cells. We believe that intestinal epithelial cells, expressing classical and non-classical MHC molecules, serve to activate Tregs and thus maintain controlled or physiologic inflammation. In this review, we describe regulatory cytokines and T cells that are one part of the emphasis of our laboratory.
<urn:uuid:7dd7b760-ea03-4a4d-83ea-e4b521fee227>
CC-MAIN-2016-44
http://link.springer.com/article/10.1007%2Fs12026-012-8315-5
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00303-ip-10-171-6-4.ec2.internal.warc.gz
en
0.882119
231
1.992188
2
Today a two-year ban on three insecticides called neonics (neonicotinoids) came into force across the European Union (EU). The neonics are used as seed dressings to reduce pest attacks. Their names are clothianidin, imidacloprid and thiamethoxam. The neonics have been temporarily banned because they kill bees and other insects that we want to avoid killing. Insects which pollinate crops and which are essential in many other ways, providing ‘ecosystem services’. You could follow my tag ‘neonicotinoid’. Yesterday Dave Goulson in the Ecologist wrote that this temporary fix isn’t good enough because it doesn’t tackle other problems that good insects face. Also yesterday, Philip Case in Farmers Weekly wrote that the ban might make things worse because it provides farmers with an incentive to use even ‘dirtier’ pesticides. Both quite negative, eh? I haven’t yet seen happy buzzing about today’s change in the law as a sweet honeypot. But for… View original post 43 more words
<urn:uuid:716d69f3-d53d-4e53-a114-a2d76fb8c900>
CC-MAIN-2022-33
https://havehest.wordpress.com/2013/12/02/neonic-ban-starts-today/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00066.warc.gz
en
0.933377
236
2.0625
2
Sunitha Krishnan – Anti-trafficking crusader! - 3 Articles - Age 27 I got to know Dr. Sunitha Krishnan when I was researching human trafficking and measures to prevent it. I thought she might be a person related to the media or an NGO. I started researching with a TED talk show. The introduction of the video was utterly shocking. Children as young as ages three and four were being raped and sold into the flesh trade. I really didn't know that innocent children are forced into such activities. I was really moved by what Sunitha was saying about these children. My heart skipped a beat when I thought that we are living in this world with all these bloody cruel things happening around us. Who is Sunitha Krishnan? She was born in 1972. At a very young age, she wanted to help the poor children of a village near home city, so she went to college to become a social worker. One day as she was organizing the village to teach the children, a gang of eight men did not like that a woman was interfering with what they claimed as "man's society." The male dominancy of Indian society influenced the eight men to rape her, beating her so badly that she is partially deaf in one ear. She has had to deal with all that and more. Though violated, she refused to be broken and she gave birth to an institution that assists trafficked women and girls to find shelter. This definitely requires more courage and boldness since this Indian society always presses women, isolates and stigmatizes rape victims. Did you know that she is 4.5 feet tall? Don't let her height fool you... she is a world changer. Today, Sunitha is a leading advocate for the fight against Sex Trafficking. Not a victim, releasing anger Sunitha explains in the video that the rape did not cause her to become a victim but rather it has released this anger. Not just any anger, but pure fury. She dedicated her life after that to being an activist and to fight against the same thing that happened to her. In an interview she said, "What affected me more was the way society treated me, the way people looked at me. Nobody questioned why those guys did it. They questioned why I went there, why my parents gave me freedom. And I realized that what happened to me was a one-time thing. But for many people it was a daily thing." What does this mean to you? According to me, mental torture and emotional fears are worse than murder. No one can understand, feel the pain or fear like the women who have suffered from rape. Just imagine living with all the pain, fear, and isolation every second in your life. I will say each second is like a murder that occurs to that woman. On Inspiration and Prajwala Sunitha believes that rapists should be ashamed and punished. Her courage, conviction, determination and her fighting spirit is an inspiration to all of us. “Society makes you feel cheap. I chose not to feel like a victim. I am not a victim. I am a survivor. I speak about it with a lot of pride, because I am proud of what I have become today. I have not done a mistake. I don’t want my face to be blurred. I am not to be ashamed for. The guys that have done it should be hiding their faces and they should be blurring their faces.” – Sunitha She co-founded Prajwala (meaning, eternal flame) in 1996 with late Brother Jose Vetticatil. The journey began by converting a brothel in India’s southern city of Hyderabad into a school for the children of sex workers. Since then, she has braved threats and physical assaults. One particular attack left her with an irreparably damaged ear - but an undaunted Krishnan has managed to rescue some 8,000 girls. Those rescued are rehabilitated. Shelters have been built and a factory has been opened where skills like carpentry, welding, etc. are taught to the girls. Prajwala also tries to unite the victims with their families. Sometimes, the victims are not accepted back by the families owing to the backwardness of our views on women. At such times, Prajwala takes full responsibility of these victims. Some women and girls are also married off by Prajwala in its endeavour to integrate the victims back into society. Prajwala also takes care of the last rites of the victims who pass away. In all these tasks, Prajwala faces stiff opposition from the orthodox and male dominated Indian society. Is Sunitha's work noteworthy? Sunitha have won many awards for her courageous and exemplary work. Her programs on rescue and rehabilitation of victims of trafficking are sought after all around the world. Even state governments are listening to Sunitha for the prevention of trafficking. All this will surely help in minimising this crime. Sunitha has said that the silence of the society towards human trafficking has to change. Let us salute her, join hands with this brave lady. As responsible humans, we must take oath to contribute something to end human trafficking. When a child grows, when a teen-age aspires, she always wanted to be an actor, doctor, teacher, astronaut, scientist, lawyer, president, princess, etc. Remember, prostitution or flesh business is not on the list and it will not be. END HUMAN TRAFFICKING. Not for sale. I am not for sale. You are not for sale. No one should be for sale. Become an abolitionist. End Human trafficking!
<urn:uuid:5efa7dbf-9d44-45fc-8fb9-5498167362da>
CC-MAIN-2016-44
http://www.voicesofyouth.org/fr/posts/sunitha-krishnan---anti-trafficking-crusader-
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00128-ip-10-171-6-4.ec2.internal.warc.gz
en
0.979935
1,181
1.679688
2
Our handling of what we call biblical law veers between controversy and neglect. On the one hand, controversy arises when Old Testament laws seem either odd beyond comprehension (not eating lobster) or positively reprehensible (executing children). On the other, neglect results when we consider the law obsolete, no longer carrying any normative power (tassels on clothing, making sacrifices). Even readers who do attempt to make use of the Old Testament law often find it either irrelevant, hopelessly laden with thou shalt nots, or simply so confusing that they throw up their hands in despair. Despite these extremes, people continue to propose moral principles from these laws as the biblical view and to garner proof texts to resolve issues that arise in society. The result is that both Christians and skeptics regularly abuse the Torah, and its true message often lies unheard. Walton and Walton offer in The Lost World of the Torah a restorative vision of the ancient genre of instruction for wisdom that makes up a significant portion of the Old Testament. In the ancient Near East, order was achieved through the wisdom of those who governed society. The objective of torah was to teach the Israelites to be wise about the kind of order needed to receive the blessings of God's favor and presence within the context of the covenant. Here readers will find fresh insight on this fundamental genre of the Old Testament canon. The books in the Lost World Series follow the pattern set by Bible scholar John H. Walton, bringing a fresh, close reading of the Hebrew text and knowledge of ancient Near Eastern literature to an accessible discussion of the biblical topic at hand using a series of logic-based propositions.
<urn:uuid:b6bc588c-9371-43d9-ad20-419ef2c11c8b>
CC-MAIN-2022-33
https://www.cokesbury.com/9780830852413-The-Lost-World-of-the-Torah
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00267.warc.gz
en
0.911161
343
2.84375
3
when should i start baby food? Olga - posted on 11/16/2009 i think u have to start give the baby food when he-she is ready. i gave my son rise cerial when he was about 2 months. lie 2 spoons per day. since 4 months old he is eating all 1st stage fruits and veggies. i even tried to give him meat (aslo found 1st stage) but he is not ready and didnt like it. i suggest to give first rise cerial (no allergies at all), then u can try oatmeal cereal, and at like 4 months u can start give veggies first and then only fruits (cause if u gonna give fruits first, they not gonna like veggiesm cause fruits are sweet) Angela - posted on 11/13/2009 We are following our pediatrician's suggestions. We started rice cereal for breakfast and dinner when she was 4 months old. Now, at 5 months, we've added a vegetable or fruit at lunchtime. Her first vegetable was squash, and she loved it!!! Dianne - posted on 11/12/2009 Started rice cereal at 17 weeks and oatmeal at 19 weeks the started mixing the two to give him a variety in taste , I plan to start him on yellow veggies at 21 weeks. He salivates and screams when we eat and I have to apologise to him now he won't let me eat without sitting on my lap and attempting to grab the plate, lol Miranda - posted on 11/12/2009 We were going to wait until 6 months, as breastmilk is keeping her fat and happy but she's taken to staring at us when we eat and lunging with her whole body if we are holding her and trying to eat. She literally did a face plant on a piece of pizza in my husband's hand a few days ago. So we are trying her on avocado this weekend. Karissa - posted on 11/11/2009 My baby had a couple of "tastes" from her father (even though I told him no:)) and yesterday she turned 5 months and we started with mashed banana. She loves it!!!!! She definitely lunges for the spoon and it was fun to watch her try to feed herself already. They grow too fast..... Ashley - posted on 11/11/2009 I started with both my girls at 4 months. It took 2 weeks before she was actually eating the food though. They say you're supposed to try it, but if your baby doesn't swallow it and instead pushes the food back out of her mouth, then wait a week and try it again. Join Circle of Moms Sign up for Circle of Moms and be a part of this community! Membership is just one click away.Join Circle of Moms
<urn:uuid:40e648f9-f191-4628-bfca-ea1f0c6c43f3>
CC-MAIN-2017-04
http://www.circleofmoms.com/june-2009-babies/when-should-i-start-baby-food-414972
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00220-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981257
579
1.570313
2
LOIN: The unceasing sweep is of the tides. Last summer, Los AngelesTimes dance critic Lewis Segal suggested that ballet is dying an ugly, boring death. As always with this sort of thing, sides were taken, battle lines were drawn, letters and counterpoint articles were written. The take-home, however, shouldn’t be that in these times of iPhones and astro-diapers the tale of a half-swan/half-woman can’t be relevant — if that were true, we’d be throwing La bohème, Hamlet, and Great Expectations out the window as well. And yet, there is a problem with ballet these days: too many companies presenting mediocre dances and dancers. Which is why the US debut at Jacob’s Pillow of the Swiss company Ballet du Grand Théâtre de Genève was such an unexpected gift. Neither of the two pieces BGTG performed, Japanese choreographer Saburo Teshigawara’s Para-Dice and Belgian choreographer Sidi Larbi Cherkaoui’s Loin, was classical, and I did hear one woman in the parking lot complain that when a company has the word “ballet” in its title, there should be ballet. But symphony orchestras present new compositions alongside centuries-old works, and ballet companies have to do the same. BGTG comprises a broad range of ethnicities and heights — no cookie-cutter corps de ballet here — and yet this is true ensemble dancing. Para-Dice is a paean to air — its currents in the world as well as the breath inside us — and the eight dancers project this most abstract of concepts. The women’s swooping undulations in their backs seem a soft antithesis to the sharp contractions of Martha Graham. The exploration of air became an exploration of space, and then, perhaps inevitably, of time. Ferried by the now pulsating, now ambient “sound creation” of Willi Bopp, the men cut through space with vigor and purpose, or the dancers lie down one by one. Women walk forward, as if in a trance, then fall into the arms of the men, who fluidly pull them backward. The sequence is repeated again and again, and it looks deliriously addictive, like a dream you don’t want to wake from. Loin was equally mesmerizing. The long, straight line that the dancers keep returning to hardly seems an interesting motif, but Cherkaoui more than compensates by having the dancers intone or mime hilarious tales involving the difficulties of touring (complete with the “monster” cockroaches who shared stages with them) or by moving the dancers through a polite ballroom dance of intertwining arms and foreheads resting against one another. The comedy of the stories does nothing to prepare one for the all-out dance phrases. The dancers are up, and then they’re down, with nary a sound. The sheer inventiveness of how they get there — now in quicksilver sweeps to the knee, now through the back by way of a shoulder — feels like a quick lesson in dance evolution, from folk dance to hip-hop. Whereas in Para-Dice the dancers are carried by air currents, in Loin, the unceasing sweep is of the tides.
<urn:uuid:8927acd1-aa0b-4208-96c3-77f3f795ab34>
CC-MAIN-2017-04
http://thephoenix.com/Boston/arts/45502-pillow-talking/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00058-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95866
711
1.523438
2
“We are trying to have a school our kids can safely walk to, just like any other neighborhood,” said Annie Lee, organizer of the group School Movement on the Hudson. Lee lives in Jacob’s Ferry in West New York, one of numerous upscale communities along the waterfront stretching from Weehawken to North Bergen and beyond. Public school students in Lee’s area are currently bused up the hill to local facilities, or sent to neighboring towns or private schools. “Very few parents send them up on the hill,” said Lee. “It’s considered a dangerous route. They can’t walk safely. A lot of them actually send their children to neighboring towns. I believe there is a charge if you send them to other towns. And then a lot of them go to private schools in Hoboken, Jersey City, Englewood.” School Movement on the Hudson was established to lobby for a school to serve the waterfront communities. “We are embracing any type of school movement, whether it is public, charter, or private,” said Lee. “I don’t want to put my 5-year-old on a bus for an hour fighting either George Washington traffic or Lincoln Tunnel traffic to go to or come home from school.” Countdown to kindergarten According to Lee, new parents along the waterfront feel a “countdown” when their children begin approaching school age. They must weigh the available options for schooling, and many elect to move away rather than choose from what they perceive as unacceptable alternatives. “I now have a 15-month old,” said Lee. “And I’m thinking, why do all my neighbors move when the kids turn five? I don’t want to move. I’ve been here for 14 years. This is a perfect neighborhood for us to commute and to live.” So Lee reached out to the members of a local moms’ group in West New York and Guttenberg. “I sent an e-mail to everybody: Does anybody have any concerns about school? How are you sending your kids there? Is there anybody trying to make a school? Can I help? Within a matter of a week I had 100 e-mails back. And we got together in March and said let’s see if there’s anything we can do.” “I’ve seen so many close friends leave as soon as their kids reach the age of kindergarten.” –Henry Song “We approached the [West New York] municipality to try and do something,” he continued, “but mostly there’s been no response. So we decided to take matters into our own hands.” That meant doing their own research into the possibility of creating a new school on the waterfront. “In the end of the day, this is for all these towns,” said Leung. “Because if we get a school down here, whether it be public, private, or charter, everyone down here is involved.” “We’re not yet sure how these things work,” said Lee. “If it’s a private school I guess we need to attract a private investor or organization who would possibly want to build a school here and fund a lot of it so that kids can attend. If it’s a charter school then we need to apply to the state to get a charter school approved. If it’s a public school then we need to know how to go about it. What kind of requirements does the state have to put up a new school, if there’s a minimum population, if there’s any maximum or minimum income, whatever that is, we need to learn.” Most charter schools accept kids primarily from the district in which they are situated. It’s not clear yet which town would host a new school. To get started, the group began collecting funds, starting with a silent auction on Sunday, Aug. 17 at a community barbecue in Jacob’s Ferry. All the items were donated by community members, raising $3,500 for the group and spreading awareness of their cause throughout the area. “The goal of these funds is first off to get expert analysis consultants to guide us through the process of making a school,” said Leung. “It’s going to take more than just moms and dads in the community doing this in our spare time.” Recognizing that real estate along the waterfront is premium property, they plan to reach out to Roseland, the primary developer in the region, for their input on a viable location. “We’re also reaching out to Arthur Imperatore and seeing whether he can provide some insight or guidance since he’s been crucial and critical to the development of everyone here,” said Leung. “We’re very much looking forward to meeting him to discuss the possibility of having a school for his legacy.” Board of Education candidates “We no longer feel that we can just make a phone call and pray and hope to God that [the West New York administration] will respond,” said Leung. “So we’re putting up candidates to run for the Board of Education. This is maybe a stroke of luck, but for the first time ever, West New York’s Board of Ed is up for election [in November]. And we feel with their $100 million plus budget something has to be done not just for our community but for the education system in the entire township. It’s ludicrous how poor the schooling is and I’m sure everyone feels that way, regardless of where they live, whether down here or up there.” The school board in West New York has nine members, each serving two or three year terms. Leung is running for one of four seats that will be up for election this November. Joining him from the School Movement are Monica Parra, Anna Cerqueira, and Henry Song. Song, a resident of Grandview in West New York since 2007 and a real estate agent at Hudson Club, began soliciting candidates to run for the board months ago. When he encountered the School Movement, he knew he had found like-minded souls. “I’ve seen so many close friends leave as soon as their kids reach the age of kindergarten,” he said. “They’ve moved on into Bergen County, into different school districts, they’ve been sending their children to private preschools and things of that nature. A lot of them held out for as long as they could and just felt as though, because the education system here in West New York is average at best, they just wanted to put their children into a better system.” With a 4-year-old and a 2-year-old, Song is experiencing the countdown. “I don’t want to put them into private school. I want to put them in public elementary schools,” he said. “I don’t think that the public school system in West New York is terrible. But I also don’t think it’s great. And I think everybody shares the views and I think it’s fairly well known. But we also see that the Board of Education in this town, it’s an absolute farce. There are some members who have done some good, but there are other members who have no business being on a Board of Education. It’s terrible. It’s cronyism at its worst.” Regarding the School Movement, he said, “We realized if we had any chance of actually having a charter school open, first of all we would have to have it approved by the Board of Education. And by having a puppet board controlled by the administration, this wouldn’t work. Secondly, we don’t want to just have a charter school for the waterfront and see the rest of the town go down. That just doesn’t make sense. We would like to have a charter school but we’d like to fix the education system in general. It would make a lot more sense to do it concurrently, to have everything get bolstered up. To see the entire system get repaired.” “We need members of the Board of Education that really care about the education of the children, have no political affiliations, have no aspirations to be politicians, and have no incentive in doing this other than the welfare of the children of this town,” he concluded. Art Schwartz may be reached at firstname.lastname@example.org.
<urn:uuid:08209a51-5ffd-4f4c-866c-566e2540f106>
CC-MAIN-2017-04
http://www.hudsonreporter.com/view/full_story/25692359/article-Fighting-for-education--Parents-push-for-charter-school-along-waterfront--
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00320-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972652
1,841
1.90625
2
By Marion Cochard and Danielle Schweisguth On 29 May, the European Commission sent the members of the European Union its new economic policy recommendations. In these recommendations, the Commission calls for postponing the date for achieving the public deficit goals of four euro zone countries (Spain, France, Netherlands and Portugal), leaving them more time to hit the 3% target. Italy is no longer in the excessive deficit procedure. Only Belgium is called on to intensify its efforts. Should this new roadmap be interpreted as a shift towards an easing of austerity policy in Europe? Can we expect a return to growth in the Old Continent? These are not trivial matters. An OFCE Note (no. 29, 18 July 2013) attempts to answer this by simulating three scenarios for fiscal policy using the iAGS model. It appears from this study that postponing the public deficit targets in the four euro zone countries does not reflect a real change of course for Europe’s fiscal policy. The worst-case scenario, in which Spain and Portugal would have been subject to the same recipes as Greece, was, it is true, avoided. The Commission is implicitly agreeing to allow the automatic stabilizers to work when conditions deteriorate. However, for many countries, the recommendations with respect to budgetary efforts still go beyond what is required by the Treaties (an annual reduction in the structural deficit of 0.5 percent of GDP), with as a consequence an increase of 0.3 point in the unemployment rate in the euro zone between 2012 and 2017. We believe, however, that a third way is possible. This would involve adopting a “fiscally serious” position in 2014 that does not call into question the sustainability of the public debt. The strategy would be to maintain a constant tax burden and to allow public spending to keep pace with potential growth. This amounts to maintaining a neutral fiscal stimulus between 2014 and 2017. In this scenario, the public deficit of the euro zone would improve by 2.4 GDP points between 2012 and 2017 and the trajectory in the public debt would be reversed starting in 2014. By 2030, the public deficit would be in surplus (0.7%) and debt would be close to 60% of GDP. Above all, this scenario would lower the unemployment rate significantly by 2017. The European countries could perhaps learn from the wisdom of Jean de La Fontaine’s fable of the tortoise and the hare: “Rien ne sert de courir, il faut partir à point“, i.e. Slow and steady wins the race.
<urn:uuid:2d2b787c-a7a6-4276-b240-9d9638b75f31>
CC-MAIN-2022-33
https://www.ofce.sciences-po.fr/blog/austerity-in-europe-a-change-of-course/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00066.warc.gz
en
0.936708
523
1.96875
2
(6601 quotes found) “Autumn is a second spring where every leaf is a flower” “You must take personal responsibility. You cannot change the circumstances, the seasons, or the wind, but you can change yourself. That is something you have charge of.” “Expect to have hope rekindled. Expect your prayers to be answered in wondrous ways. The dry seasons in life do not last. The spring rains will come again.” Sarah Ban Breathnach “And you would accept the seasons of your heart just as you have always accepted that seasons pass over your fields and you would watch with serenity through the winters of your grief.” “Love is the only flower that grows and blossoms Without the aid of the seasons.” “The events of childhood do not pass, but repeat themselves like seasons of the year” “To be interested in the changing seasons is a happier state of mind than to be hopelessly in love with spring.” “Take a music bath once or twice a week for a few seasons, and you will find that it is to the soul what the water bath is to the body.” Oliver Wendell Holmes Jr. “These are the seasons of emotion and like the winds they rise and fall...Upon us all a little rain must fall.” “Excess generally causes reaction, and produces a change in the opposite direction, whether it be in the seasons, or in individuals, or in governments.” Quotes Daddy offers a number of tools for developers and bloggers to integrate quotes into their site including customizable widgets, embeddable quotes and API. Over 1,000,000 famous quotes and user quotes that you can save to your favorites, share with friends and add to your site, blog or social network.
<urn:uuid:eab40467-49e9-46b6-b4cd-f7838b35fa9d>
CC-MAIN-2017-04
https://www.quotesdaddy.com/tag/Seasons/1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00353-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937077
393
1.515625
2
This dissertation has been submitted by a student. This is not an example of the work written by our professional dissertation writers. Innate immunity is the ancient defence system against infection that is conserved in most of organisms including prokaryotes and invertebrates throughout evolution. Among the cells that participate in the early innate immune response, natural killer (NK) cells occupies special positions, not only owing to its unique cytotoxic ability but its role between the innate and adaptive immunity put it to the high level of interest. The NK cells were first discovered in 1975 by two groups, R.Kiessling and R.Herberman when studying specific cytotoxic effect of lymphocytes against target tumour cells. The observation of the NK cells brought many controversial issues because of its reactivity level was observed from not only limited to the animals showing the active immune response, but also to those non-immunised one. After several studies suggested the capacity to kill the tumour cell without prior sensitisation, NK cells has been accepted as a sub-population of the lymphocytes, which conduct highly regulated killing mechanism. The current understandings of NK cells originate from the models of missing-self and induced-self recognition. These models introduce that NK cells unlike other T or B lymphocytes do not recognise foreign antigens but are initiated by detecting changes in the surface molecules of the cells. Such phenomenon describes that certain cells expressing less major histocompatiblity complex (MHC) class I are the major target of the NK cells. This MHC class I dependent recognition is responsible for the killing of virus-infected or malignant tumour cells with deficient expression of MHC class I are attacked by NK cells, whereas normal healthy cells are not. However, missing-self model does not provide sufficient explanation on how the NK cells recognise their target cells, when those autologous cells that do not express MHC class I molecules, such as erythrocytes are counted. The 'self-induced' hypothesis complements the 'missing-self' model by proposing that NK cell detects cell stress-induced self-ligands that trigger activation of NK cells. Taken together, it is now well established that activation of NK cells depends on a delicate balance between activating and inhibitory signals. Normal autologous cells express inhibitory signals and no activating ligands, whereas malignant or stressed cell actively expresses activating NK ligands with downregulated MHC class I molecules. Upon the activation, NK cell functions can be categorised into three; I. Cytotoxicity: NK cells perform their cytotoxicity by conducting two mechanisms. First, they exocytose cytotoxic granules containing perforin and various granzymes, resulting in the apoptotic death induced by permeated granzymes. Second, they express tumour necrosis factor (TNF) receptor superfamily (TNFRSF) members such as FAS that engage with corresponding ligands to induce apoptosis. Third, NK cells hire TNF-related apoptosis-inducing ligand (TRAIL) as a cytotoxic effector molecule. II. Regulation of immune response through various cytokine production: NK cells produce many cytokines such as IFN-g, IL-3, GM-CSF, TNF-a and chemokines such as MIP-1, RANTES and IL-8 III. Direct contact co-stimulation: Via costimulatory ligands, such as CD40 and OX40L, NK cells induce T cells and B cells stimulation. Recently, Tbox21 transcription factor (T-bet) is emerging as a crucial factor in NK cell development and maturation. Several studies have demonstrated the defected functions of T-bet KO NK cells in the aspect of cytokine production and NK cell mediated killing. How T-bet transcription factor participates in the NK cell development will be discussed in detail in the introduction. NK cell development The interactions between the precursor NK cells and bone marrow stromal cells are pivotal in the development of NK cells. The NK precursor cells in mice showing high expression of CD122, one of the four subunits of IL-2/IL-15 receptor are constantly influenced by IL-15 in the early stages of NK-cell development, especially during the stage of cellular expansion. These immature NK cells that express NK1.1, acquire CD94-NKG2 heterodimer on their surface as well as Ly49 receptor prior to the proliferation phase. After proliferation, terminal maturation is accompanied by the expression of high levels of CD11b and CD43 along with the perfected cytolytic function and IFN-g production. These interaction with various cytokines are not only confined to the mice NK cells, but immature human NK cells are observed to be perform their cytotoxicity in the manner of TNF-related apoptosis-inducing ligand and release type 2 cytokines in their early development. To elucidate the NK cell development, transcription factors are undeniably key elements as several studies already revealed several transcription factors including interferon regulatory factor(IRF)-1, IRF-2, ETS-1 and T-bet regulates the ability and development of NK cells. For instance, those mice missing GATA-3 transcription factor that are important in Th2 cytokine production, produce NK cells with immature phenotype and also influence the production of IFN-g. Additionally, Ets-family member myeloid elves like factor (MEF) also participates in the determination of NK cell function that its deficiency leads to the failure of expressing perforin and have cytotoxicity. Furthermore, the T box 21(T-bet) transcription factor knockout mice are found to carry significantly less number of NK cells expressing reduced levels of CD43 and CD11b and show receded IFN-g production. T-bet transcription factor will be discussed in more depth later. Once fully matured NK cells are emerged, it is interferons and cytokines that affect expansion and modulate the function of NK cells. As mentioned briefly, IL-15 and IL-15 receptor (CD122) plays pivotal role in the early development of NK cells. Having said that, IL-15 and its receptor also contribute to the survival and maintenance of mature NK cells. However, it seems CD122, the IL-15 receptor is not solely functioned by the interacting with IL-15 as NK cells from the IL-15R KO mice develop as normal when transferred to a host where the non-hematopoietic cells express IL-15R. Rather, the concentration of IL-15 on stromal cells is decisive in the maturation of NK cells. Having said that IL-15 contributes to the early development and maturation of the NK cells, IL-21 rather enhances the cytotoxic ability and production of IFN-g. Yet, the clear role of IL-21 is still controversial, since the earlier results claiming the importance of IL-21 for the differentiation of NK cells conflict with the latter showing the normal development of NK cells regardless neither the existence nor the concentration of IL-21. Nevertheless, some studies suggested the antagonistic influence of IL-21 on the cellular expansion of NK cells. Transcription Factors in NK cell development It is now a well-known fact that, as with all cells of the hematopoietic system, NK cells are derived from bone-marrow hematopoietic stem cells. From the previous studies, it has been generally accepted that NK cells development is defined into several stages including precursor NK cell (pNK), immature NK cell (iNK), and mature NK cell (mNK). According to the recent publish by Vosshenrich et al, six stages are suggested (Fig1), taking into account up-to-date studies. The first stage A is the precursor NK cells as defined by Rosmaraki et al that express high CD122 (IL-2Rb) but lack other known NK cell marker including NK1.1, DX5 and Ly49R. The two subsequent stages, B and C are immature NK cells (iNK). At stage B, the cells are yet inadequately cytotoxic, but start to possess exclusive NK markers, NK1.1 and NKG2D (but not DX5 nor Ly49R). Ly49 receptor begins to show in the following stage. Vosshenrich defined the mature NK cells by observing high expression of DX5 which appears from the stage D. Two additional markers that are initially appearing from the stage C are upregulated as a functional markers; CD11b expression is elevated first (stage E), followed by CD 43(stage F). The fully matured NK cells attain the cytotoxic ability and also can pr NK cells are fully functional and also can produce IFN-g after the stimulation. These mNK cells will then migrate to the periphery via blood. Each developmental stage of NK cells is sophisticatedly controlled by diverse transcription factors. These factors can be grouped into three, according to the stages they correlate to (Table 1); the first group includes Ikaros, Id2, Ets-1 and PU.1 and are known to control the population size and maintenance of early precursor NK cells. Additionally, these transcription factors are essential to establish the early expression of CD122 (IL-15Rb), that the previous studies by two different groups, Ikawa et al and Boggs et al both observed the impaired expression of CD122 from Id2 KO and Ikaros KO mice respectively and therefore, reduced population of NK cells along with severely defected cytotoxic ability and cytokine production are observed. The second group of the transcription factors includes Gata-3, IRF-2 and T-bet. These appear to be primarily involved in the maturation of the NK cells specifically the induction of cytotoxic ability as well as migration to the peripheral site. Each deficiency results in the decreased population of NK cells in the liver, spleen and all the peripheral regions respectively, yet the normal NK cell population in the bone marrow is found. Additionally, the peripheral NK cells missing those transcription factors are found to be immature as they adapt low expression of CD11b and CD43. These functionally defected phenotypes are well demonstrated that severely decreased production of IFN-g is resulted from all IRF-2, Gata-3 and T-bet deficient NK cells. However, the defected NK cells from Gata-3 and T-bet KO mice performs essentially normal cytotoxicity while IRF-2 deficient NK cells exhibit severely reduced cytotoxic ability. This observation support the previous reports that the maturation marker, CD11b and CD43 may not have high correlation with cytotoxic ability, rather DX5 has higher association. The third group of the transcription factors includes myeloid elf factor (MEF), microphthalmia-associated transcription factor(MITF) and CCAAT/enhancer binding protein-g (CEBP-g). These TFs are reported as a regulator of functional development of NK cells as their deficiency results in the significantly reduced cytotoxic ability and to produce cytokines after stimulation. Secretroy lysosome in NK cells and lytic synapses NK cells produce cytolytic granules during their development and maturation. These granules that possess acidic lumens as well as several lysosomal hydrolases and marker proteins hire their own special transport systems that allow highly regulated secretion and fusion with the plasma membrane. Defects in the formation or trafficking of the lysosome result in severe immunodeficiency. Upon the target cell recognition, these granules are trafficking to the site of NK cell-target contact site and fuse with the plasma membrane. Subsequently, several soluble effector molecules and lysosomal hydrolases are secreted into the lytic synapses. Structurally, lytic granules formed in the NK cells are defined as secretory lysosomes that are distinguished from a conventional lysosome due to the specialised transport systems. Nevertheless, these granules have structural similarities to the conventional lysosomes in the manner that both lysosomes are accessible via the endocytic pathway. Conventional lysosomes usually have multi-vesicular structure, whereas secretory lysosomes have dense cores or multi-laminar appearances. Both conventional and secretory lysosomes possess specialised functional proteins such as lysosomal acid hydrolase, receptor proteins and heat shock 70 family proteins. Each is responsible for degradation of 'old protein', recognition and delivery respectively. There are also other resident membrane proteins such as Lamp1 and CD63 which are largely used as activation markers of cytolytic cells including CTL and NK cells. Lamp1, also known as CD107a will be discussed in detail later in this chapter. In addition to the common components in both conventional and secretory lysosomes, there are exclusive lytic molecules in the granules secreted by NK cells. These include Granzyme A & B, Granulysin, and perforin. The detailed function of these molecules will not be discussed here. Exocytosis of lytic granules in the NK cell involves several stages beginning with target cell recognition. Most importantly, NK cell-lytic synapses are constructed in where NK cells directly contact to the target cells. The formation of lytic synapses is defined into a series of distinct steps. The first step is the initiation stages that include establishing a close-cell to cell contacts. NK cells either accidentally or possibly by chemotactic attraction, gets in contact with target cells. This step involves the interaction between NK receptors and various ligands on the surface of the target cells such as NKG2DL. The initial contact could subsequently lead to the adherence of NK cell to the target cell, followed by activation of NK cells. The integrin family of adhesion molecules expressed on NK cells including lymphocyte function-associated antigen 1 (LFA1) and macrophage receptor 1 (MAC1) build the firm adhesion to the target cells that facilitate the maturation of the lytic synapses. Additionally, integrins may also participate in signalling that can fully activate some NK cells. Yet, it may not involve the full achievement of NK cytotoxic abilities. Importantly, these initial steps in the formation of the NK cell lytic synapse probably occur before molecular patterning or polarisation are evident and completed quickly. Whether the NK cell progresses to molecular reorganisation at the synapse seems to depend on the level of signals received through inihibitory receptors such as killer cell immunoglobulin like receptors, which can establish the so-called inhibitory synapses. Such regulation ensures that NK cells effectively carry out their surveillance function by leaving most cells undisturbed while being ready to destroy cells that are diseased. The inhibitory synapses are especially elegant in that it directly interferes with the ability of the lytic synapse to progress past the initiation stage. The subsequent stage is the effector stage. Here, the cruicial steps of the granule exocytosis take place; 1. Formation of an immunological cleft where the granules are secreted. 2. Trafficking of granules towards the synapses, 3.fusion of the granule membrane with plasma membrane for the release of the lytic molecules. Under the condition that synapse initiation has occurred in the absence of the inhibitory signals, reorganisation of the immunological synapse is initiated. This begins from the actin reorganisation that involves the formation of F-actin networks from the cellular pool of monomeric globular actin (G-actin) in association with Wiskott-Aldrich syndrome protein (WASP). The absence of WASP is reported to have decrease in the F-actin accumulation at the synapse and NK cell cytotoxicity. As actin reorganisation is processed, following events occurs; receptor clustering, lipid-raft aggregation, further activation signalling, and lytic granule redistribution. Although the detail of such events is not clarified, it seems that these are essential for both cell adhesion and triggering of cytotoxicity. Especially, it has been only shown that although receptor clustering is crucial in the signalling within the NK cells, so far, microclusters has been indentified at supramolecular inhibitory cluster. During the effector stage of lytic synapse, polarisation of lytic granules also takes place. The granule moves along the microtubules towards the microtubules organising centre (MTOC) in association with motor proteins such as Kinesin family proteins; Kinesin protein families have a range of motor proteins that are largely involved in the intracellular trafficking of vesicles and organelles, yet the exact motor used is not revealed. MTOC, in the mean time, begins to polarise towards the immunological synapses, and consequently, the granules move to the NK-target cell contact site. Prior to the fusion of lytic granules to the plasma membrane, there are few final steps of effector stage, which are docking of lysosomes to the synapse and vesicle priming. The vesicle priming is the essential preparation step for fusion through acquisition of biochemical attributes. After vesicle priming, the lytic granules can fuse with the plasma membrane, releasing the granule contents into the cleft between the cells. the mechanism underlying these steps still needs to be elucidated, but information from CTL may give a clue to this process. In CTLs, docking to the plasma membrane requires members of the RAB family of small GTPases, which are important regulators of vesicle trafficking and compartmentalisation. It undergoes post-translational prenylation to gain hydrophobicity which facilitates its interaction with a target membrane. Rab27a is found in NK cells and shown to interact with Unc13D (also known as Munc13-4) for the vesicle priming. Rab27a-Unc13D complex targets solule N-ethylmaleimide0sensitive0factor accessory-protein receptor (SNARE) family protein acting upon the facilitation the fusion of membranes. SNARE proteins are categorised into two; proteins that can be found on the vesicle membrane is called vSNARE whereas those present on the target membrane is tSNARE. Interaction between tSNARE and vSNARE is required for membrane fusion. So far, Vamp7 is the only identified tSNARE protein that involves in NK cell killing. The Final stage of lytic synapse is the termination stage after the lytic granules are exocytosed. This stage involves a period of inactivity and downmodulation of the accumulated activating receptors followed by detachment of NK cells from the target cells. Once the NK cells exert its cytolytic function, it detaches from the target cell and restore its cytolytic potential by regenerating new lytic granules and re-expresses activating receptors. Activation signal of NK cells. Unlike T and B cells, NK cells do not have antigen specific receptors, instead Dendritic Cell and NK cell interaction There have been significant advances in the understanding of the activation and function of NK cells both in human and mice. Since the report by Fernandez at al in 1999 described the DC-NK interaction, it is now well-understood that NK cells and DCs activate one another during an immune response. DC are crucial regulators of both innate and adaptive immune response. As an antigen presenting cell (APC), DC efficiently process antigens in association with MHC molecules. Yet, their functions are followed by the complete maturation of DC triggered by direct encounter to microbial ligands. Once exposed to the pathogen, DC migrate to the T cell area of lymph nodes at where APC-T cell interaction begins. DC-Mediated NK cell activation: How DC contribute to the activation of the NK cells has been well documented by many different experimental systems using different sources of DC including mouse DC cell lines, mouse bone marrow derived DCs, human monocyte derived DCs and human cord-blood-derived DCs. While these studies generally agree on the key role of DC-derived cytokines and surface molecules in driving NK cell cytotoxicity, the mechanisms involved has been emerged carefully suggested to explain the IFN-g production both in human and mice: 1) Direct cell contact induces the production of IL-12 necessary for NK activation, and other cytokines. 2) DC-derived IL-2 promotes NK cell functions in association with other cytokines.(Fig1). In addition, the maturation state of the DCs might influence their ability to activate NK cells. Several studies have shown that immature DCs require a maturation stimulus to activate NK cells, whereas others have shown that immature and mature DCs are equivalent in their ability to activate NK cells. Nevertheless, it is inevitable to accept that both IL-12 and IL-2 are the key cytokines for the NK cell activation process. IL-12 released after DC-NK direct cell contact appears to be presented to NK cells through the formation of some kind of "synapse" which greatly increases the efficiency of IL-12 even in the low dose. Many studies suggested the role of IL-12 as a key modulator that induces NK cytotoxicity, yet it is still unclear as there has been a suggestion of possible need of other soluble factors. In addition to IL-12, other cytokines such as type 1 IFN and IL-18 may sustain the functions of NK cells in terms of IFN-g production, migration, cytotoxicity and proliferation. IL-18 appears to be playing central role in promoting the migration of NK cells to secondary lymphoid organs where they encounter DC and produce high level of IFN-g once exposed to IL-12, IL-2 and TNF-a. In addition, NK cells showed enhanced cytotoxicity in association with IL-18. IL-2 is now generally accepted as a key cytokine to generate the NK cell activation both in vivo and in vitro, but it had been excluded from the list of those activating NK cells in vivo as it had been understood as an exclusive product of T cells. Soon as it was figured that IL-2 was also produced from activated DC during the first hours of stimulation, Zanoni and his colleagues has established a work based on the theory that IL-2 may have a physiological role in activating NK cells. They discovered that TLR-dependent full maturation stimuli drove DC to elicit NK cell activation via IL-2 interaction whereas TLR-independent stimuli did not induce the release of IL-2, neither the activation of NK cells. Moreover, NK cell activation process in human has also been revealed recently by Newman et al that the capacity of human NK cells to produce IFN-g is dependent upon cell contact-dependent and IL-2 mediated signal derived from myeloid DC, and this interaction may be driven via cell-cell direct contact in association with TNF expressed by DC that binds to RNFR2 on the surface of NK cells. Having said that NK cells mediate their cytolytic ability upon their activation via various stimuli, it is an interesting question to address how NK cells will react to the different strength of activating signals. Besides, NK cells can also be activated by both immature and mature DC in vivo. Thus, it is worth to assess the effect of both immature DC and mature DC on NK cell activation using various conditions. The aim of the first part of this study is to investigate the expression level of CD107a on NK cells activated by either different strength of stimuli or different maturation state of DC. This will be done by using mouse splenic NK cells. With these NK cells, it should be able to observe the response of NK cells under different conditions and DC-mediated NK activation. Lastly, there has been many data published on Tbox21 transcription factor (T-bet) as a essential regulator of NK cell development and maturation. It is well-established that T-bet deficient NK cells have diminished functional activities such as cytotoxicity or cytokine production. However, it is uncertain whether this diminished cytolytic abilitiy is owing to reduced number of lysosome or due to disturbance in the lysosomal trafficking. Thus, it brings an interesting point to have a look at the underlying mechanism of how T-bet is involved in the NK cell mediated killing. The aim of the second part of this study is to compare the quantity of lysosomal content in both WT and T-bet KO NK cells. Subsequently, RNA level of genes that are likely to be involved in the lysosomal trafficking will be investigated using real-time PCR techniques. This should be able to show the influence of T-bet transcription factor on NK cytolytic abilities, and hopefully identify the genes involved in the trafficking mechanism. Materials & Methods Mice and Regents. BALB/c and C57BL/6 mice were obtained from Harland UK and T-bet KO mice from (Taconics, USA). Cell lines and primary cells were maintained in medium containing RPMI supplemented with Penicillin/Streptomycin, 10% FCS (fetal calf serum), L-glutamine, non-essential amino acid, pyruvate, hepes, and 2-mercaptoethanol. The mice were sacrificed by cervical dislocation. Mice were placed on their right side and an incision was made on the left side skin with a pair of scissors. The incision was made approximately 2.5 cm long, from between the last rib and the hip joint. Another incision (1-2 cm) was made in the peritoneal wall and the spleen, a red enlongated bean-shape organ, was pulled onto the exterior wall. The spleen was removed by cutting off the mesentery and connective tissues attaching the spleen to the abdominal cavity. NK Cell Enrichment (DX5 positive enrichment & KIT negative enrichment) Splenic NK cells obtained from BALB/c, C57BL/6 and T-bet KO mice were enriched using two MACS enrichment protocols; DX5 Positive enrichment and KIT negative enrichment. - DX5 positive enrichment: splenocytes were obtained extracted using MACs buffer (Sterile PBS with 2nM EDTA and 10% FCS) and centrifuged for 5min at 1200rpm. Using 10ml of MACs buffer, the cells were resuspended, and then counted with trypan blue dye at 50% concentration. Once the cell number was determined, remaining cells were centrifuged for 10min at 1200rpm and resuspended with MACs buffer (amount varies). Subsequently, DX5 microbeads (Miltenyi) was added to the cell according to the manufacturer instruction and incubated in fridge for 10min. The cells were then washed twice with MACs buffer and resuspended with selected amount of MACs buffer. (Amount varies according to the cell count). Using the LS column (Miltenyi), NK-depleted splenocytes were isolated by MACS magnetic cell sorting (Miltenyi). After three times wash, remaining NK cells in LS columns were collected. - KIT negative enrichment: splenocytes were obtained extracted using MACs buffer (Sterile PBS with 2nM EDTA and 10% FCS) and centrifuged for 5min at 1200rpm. Using 10ml of MACs buffer, the cells were resuspended, and then counted with trypan blue dye at 50% concentration. Once the cell number was determined, remaining cells were centrifuged for 10min at 1200rpm and resuspended with MACs buffer (amount varies). According to the manufacturer instruction, biotin antibody cocktail (Miltenyi) was added to the cell and incubated in fridge for 10min, followed by microbeads coated with anti-biotin(Miltenyi) and another 15min incubation. The cells were then washed twice with MACs buffer and resuspended with selected amount of MACs buffer (Amount varies according to the cell count). Using the LS columns (Miltenyi), flow-through containing NK cells were isolated by MACs magnetic cell sorting (Miltenyi). Additional 3ml of MACs buffer was applied to the LS column to collect all NK cells. NK cell Sorting using FACS Aria The splenic NK cells were obtained from WT and T-bet KO mice and enriched using magnetic cell sorting method. The enriched cells were counted with trypan blue dye. Once the cell number was determined, they were stained with either NKp46-Alexa647 or NKP46-biotin followed by Streptavidin-PE, and CD3-APC or CD3-FITC. After the 30min incubation period, enriched NK cells were washed three times with MACs buffer and analysed using FACs Aria II(BD Science) to check the purity. NK cell purity was 60~80% after MACs cell enrichment. Enriched CD3- NKP46+ NK cells were sorted using FACs Aria. Purity after sorting was 97~99%. Sorted cells were directly frozen in Trizol and kept under -80oC. Plate coating and FACs staining of splenic NK cells The high-binding well plate coated with a-NK1.1 and aNKG2D was prepared a night before the NK cell stimulation. To prepare the antibody coated plate, the mastermix was prepared at two different concentrations; 50ug/ml and 10ug/ml for a-NK1.1 and a-NKG2D. Each mastermix contained 100ul of carbonate buffer with 5ul or 1ul of antibodies according to the concentration. As a control mastermix, 1ul of isotype antibody was mixed into 100ul of carbonate buffer. The mastermix was dispensed to the well plates and gently swirled for the even spread-out. The plate was incubated in the fridge over night. Next day, splenic NK cells were obtained from C57BL/6 mice. After the cell enrichment, the NK cells were centrifuged and resuspended with the mastermix containing 4ml of medium, 2.6ul golgi stop and 30ul a-CD107a Alexa488 (The amount was determined according to the manufacturer instruction). Prior to the dispense of NK cells onto the well plate, the plate was washed three times with medium. In each well, 200ul of cells were applied and spun for 5min at 800rpm. Subsequently, it was incubated for 4hrs at 37oC. After the incubation period, the cells were transferred to the regular 96 well plate and washed three times with medium. The second mastermix were prepared according to the manufacturer instudction. It contains ;1) 1.25ml of MACs buffer with 10ul CD3-APC and 20ul NKP46-biotin 2) 1.25ml of MACs buffer with 8ul streptavidin-PE. NK cells were resuspended with the mastermix containing CD3-APC and NKP46-biotin and incubated on ice for 30min. Next, it was washed three times with MACs buffer and stained with the second mastermix with streptavidin-PE. After the incubation, the cells were washed three times and analysed with LSRII (BD science). Propidium Iodide was added just before the analysis in order to recognise the dead cell population. DC culture & NK stimulation After removing all muscle tissues with gauze from the femurs and tibias, the bones were placed in a 60-ram dish with 70% alcohol for 1 min, washed twice with PBS and transferred into a fresh dish with RPMI 1640. Both ends of the bones were cut with scissors in the dish, and then the marrow was flushed out using 2 ml of RPMI 1640 with a syringe and gauge needle. The tissue was suspended, passed through nylon mesh to remove small pieces of bone and debris, and red cells were lysed with lysis buffer. After washing, lymphocytes and Ig positive cells were killed with a cocktail of mAbs and rabbit complement for 60 min at 37oC. The mAbs were GK 1.5 anti-CD4, HO 2.2 anti-CDS, B21-2 anti-Ig, and RA3-3A1/6.1 anti-B220/CD45R. 7.5-10 x 10 s cells were placed in 24-well plates in 1 ml of medium supplemented with 500-1,000 U/ml GM-CSF. The cultures were usually fed every 2 d by gently swirling the plates, aspirating 75% of the medium, and adding back fresh medium with GM-CSF. An object of these washes was to remove non-adherent granulocytes without dislodging clusters of developing dendritic cells that were loosely attached to firmly adherent macrophages. DC maturation was induced by incubating the cell overnight with 0.5ug/m; of LPS. DC was co-cultured with splenic NK cells negatively sorted by NK cell isolation KIT. After 4 hr incubation, NK cells were labelled with CD3-APC, NKP46-Biotin, Streptavidin-PE and analysed by flow cytometry. 4x106 WT NK cells and 2.3x106 T-bet KO NK cells were kept in trizol under -80oC. 0.2ml of chloroform was added to the sample and centrifuged at 12,000g for 15min. The Top layer containing RNA was extracted and mixed with 500ul of isopropanol. Subsequently, the samples were centrifuged at 12,000g for 10min and 1ml of 75% ethanol was added. Samples were centrifuged at 74,000g for 5min and excess ethanol was carefully removed. Samples were allowed open in air to dry any remaining enthanol. 20ul of nuclease free water was added. Nanodrop (spectrometer) was used to analyse the samples. The amount of RNA from WT and T-bet KO NK cells were 71.5 and 38.6ng/uL respectively. Reverse Transcription PCR. cDNA was synthesised using the RNA obtained from WT and T-bet KO splenic NK cells. Mastermix was prepared containing Oligo dT(2ul), PCR Mastermix (4ul), Reverse transcriptase (1ul for RT+) and nuclease free water. 4 PCR eppendorf tubes were labeled as WT+ WT- T-bet+ and T-bet- (negative sign indicates RT- tubes for control). The equal amount of RNA was applied to each tube, followed by the mastermix prepared. The samples were placed in the PCR machine and amplified as the program instructed: 90min 42oC, 5min 85oC. The amount of RNA of interest in splenic NK cells was determined using real-time PCR. The mastermix was prepared containing Taqman mastermix, Beta-actin control, Gene expression assay and cDNA prepared. As instructed, duplex PCR was performed using total volume of 10ul. On the 384 well plate, 5ul of Taqman mastermix, 0.5ul of gene expression assay, 0.5ul of ß-actin control, 3ul of nuclease-free water and 1ul of sample was applied to each well. Once prepared, the 384 well plate was placed in the real-time PCR machine and run as instructed. CD107a expression is elevated on NK cells following the stimulation. To investigate whether the activation of NK cells is influenced by intensity of stimulus, the CD107a expression was examined using two different conditions. As previously reported, CD107a is a marker for cytotoxic ability of NK cells and CD8+ cytotoxic T cells as it is expressed at high levels upon both cells being stimulated. Two different concentrations of either a-NK1.1 or a-NKG2D were harboured. Both NK1.1 and NKG2D are reported as receptors of activation of which initiate transmembrane signals that activate cytotoxicity. Freshly isolated splenic NK cells from C57/BL6 mice were incubated on the high-binding 96 well plate coated with a-NK1.1 and a-NKG2D. Each antibody was coated at two different concentrations of 10ug/ml or 50ug/ml. After 4hr incubation, NK cells were stained for CD3 and NKP46. Representative data from one subject is shown in Fig. 1. Surface expression of CD107a was low in unstimulated NK cells (0.32%) (Fig.1A). Unpurified spleen NK cells stimulated by a-NK1.1 at two different concentrations expressed CD107a at much elevated levels (9.35% and 9.31% for 50ug and 10ug concentration respectively) (Fig.1C,D). The unpurified spleen NK cells stimulated with a-NKG2D at 50ug/ml and 10ug/ml both showed increased expression (8.28% and 8.45% respectively), yet it is faintly lower than those stimulated with a-NK1.1. Compared to the unpurified splenocytes, the negatively sorted spleen NK cells by NK cell isolation KIT showed inconsistency that, although the expression of CD107a was all increased on NK cells stimulated with NK1.1 or NKG2D at both concentrations, the degree of elevation was minor except those stimulated with NK1.1 at 50ug/ml concentration (7.32%). Other three showed 4.28%, 3.92%, 3.3% at NK1.1 10ug/ml, NKG2D 50ug/ml, and 10ug/ml respectively. Taken together, these data demonstrate that CD107a is highly upregulated on the surface of NK cells following stimulation, but the intensity of stimuli did not greatly affect on the activation level. Having said that the CD107a expression was upregulated following the stimulation using a-NK1.1 and a-NKG2D, DC-mediated NK cell activation was subsequently examined, as DC is a source of cytokines required to activate NK cells in vivo. To assess whether the DC-mediated NK cell activation is regardless the maturation of DC, bone-marrow DC from C57BL6 mice (approximately 80% purity) was subdivided into two populations; one incubated overnight with LPS for the stimulation, and the other left untreated as a immature DC. Negatively sorted splenic NK cells by NK cell isolation KIT was co-cultured with DC in the well plate and incubated for 4hrs. Next, NK cells were stained for CD3 and NKP46. As a control, purified NK cells with no culture were hired to compare the CD107a expression. In a control group, hardly detectable expression of CD107a (0.02%) was observed, indicating most of the NK cells were left inactivated as expected (Fig.2.A). The frequency of activated NK cells co-cultured with iDC was appeared to have higher; 3.05% and 2.31% for iDC co-culture at 1:1 and 1:5 ratio (NK:DC) respectively. It clearly demonstrates that iDC can induce the activation of NK cells. However, it should be noted that the LPS-stimulated DC co-culture did not induce the activation of NK cells so efficiently as the immature DC as expected (0.8%, 1.77% and this conflicts with other data published by others that the mature DC elevates the NK functions in all manners. This may be due to the ratio adopted here that NK cells possibly induce their cytotoxic ability upon DC when there is too large number of DC. To assess such an issue, further investigation is required by adopting various environments of DC stimulation such as IFN-a or CD40L. However, although the expression of CD107a on NK cells simulated by LPS-stimulated DC was beyond the expectation, these results demonstrated DC can mediate NK cell activations regardless their maturation. Taken together, CD107a is upregulated upon the activated NK cells stimulated by either a-NK1.1 and/or a-NKG2D or bone-marrow DC, indicating that NK cells initiates the production of cytolytic molecules. Both results may indicate that the activation of NK cells is regardless to the intensity of stimulation since different concentration of a-NK1.1 or a-NKG2D, or different ratio of DC:NK does not produce noticeable difference in the CD107a expression. However, further investigation is evitable as these data were obtained from only limited number of mice, and repeated procedures shall be cruicial in order to reveal more precise correlation between intensity of stimuli and NK cell activation. T-bet--/- NK cells has higher RNA level of CD107a than WT NK cells Following the demonstration that NK cells mediate their cytolytic functions upon the activation, I subsequently assessed to determine whether T-bet transcription factor influence the CD107a expression by looking at the RNA levels in both WT and T-bet. From the previous findings, it is now a known fact that T-bet-/- NK cells mediate less functional activities in both cytotoxicity and cytokine production. However, it is not revealed whether T-bet deficiency results in reduced amount of cytolytic vesicles or disturbance in the trafficking of the lysosomes. In order to address this remaining question, RNA extent of CD107a was measured in both C57/BL6 WT mice and T-bet KO transgenic mice by real-time PCR technique. Splenic NK cells were extracted from WT and T-bet KO transgenic mice and purified by NK isolation KIT. Subsequently, NK cells were stained for CD3 and NKP46 and sorted using FACs AriaII. Purity after sorting on NK cells from both sources were upto 98%. NK cells were kept in the trizol under -80oC. Next, RNA was separated from the cells using chloroform, isopropanol and ethanol and kept frozen under -80oC. The extracted RNA was hired to synthesise complementary DNA strand by reverse transcription PCR technique and readied to perform the real-time PCR. Gene expression assays were purchased from Applied Biosystem according to the genes of interest. These genes are as follow: CD107a, Rab27a, Unc13d, Vamp7, Wipf1, Dnm2. Additionally, gene expression assays for IFN-g and T-bet were also taken into account to examine the corresponding RNA levels. Using the Taqman PCR mastermix, ß-actin, and gene exression assay, the real-time PCR was performed on those eight genes of interest. Subsequently, Delta-delta CT method was hired to calculate the RT-PCR results. As the PCR was repeated several times, the ratio between delta CT values from WT and T-bet-/- NK cells was calculated and averaged. The representative data from one subject is shown in Fig.3. As a control, T-bet was examined on both WT and T-bet-/-NK cells. As expected, T-bet was not found in the T-bet deficient cells whereas WT NK cells have much higher levels. By looking at the results, the RNA level of CD107a was observed repeatedly to be higher in T-bet deficient NK cells than WT NK cells (Supplementary data 1). The averaged ratio indicated that CD107a RNA was 1.7 times higher in T-bet-/- cells. This result directly conflicts with the phenotype of T-bet-/- NK cells to have reduced ability to killing. Other possible explanation can be that the capability of cytolytic vesicle production may not be defected, but the trafficking of such vesicles could be diminished. To address the following question, RT-PCR was performed on the genes possibly involved in the lysosomal trafficking. First, Member RAS oncogene family 27a (Rab27a) was tested, which belongs to the small GTPase family, RAS family that are important regulators of vesicle trafficking and compartmentalisation. According to the RT-PCR results, T-bet deficient NK cells produce a reduced amount of Rab27a in terms of its RNA extent that the mean ratio of T-bet KO cells was 85% compared to the WT. Considering that Rab27a participate in the lysosomal trafficking, it is possible that reduced cytotoxic ability is due to the defect in the trafficking, not the amount of lysosomal vesicles. Subsequently, dynamin 2(Dnm2) was examined. This gene is the isoform of the conventional dynamin family of large GTPase that participate in the receptor mediated endocytosis and membrane remodelling. Additionally, it also localises with lytic vesicle and regulates the fusion to the plasma membrane. By looking at the RNA levels, it was elevated in T-bet deficient NK cells unlike Rab27a. Average, it was one half folds higher than WT NK cells', indicating that defect in cytotoxic ability is not owing to the final fusion of the vesicles to the plasma membranes. Next, Wipf1 belonged to Wiskott-Aldrich syndrome (WAS)/WASL interacting family was examined. Wipf1 is known to be involved in the initiation step of NK cell lytic-synapse formation. From the previous findings, the phenotype of defect in this gene shows NK cells with decreased cytolytic ability, nevertheless, overexpression in Wipf1 results in the enhanced ability. Taken into account that T-bet deficiency brings defected ability of cell killing, it was a surprise to see that Wipf1, like CD107a or Dnm2, was more produced in terms of its RNA level in T-bet-/- NK cells. The RT-PCR result revealed that it was almost two fold higher than WT (1:1:97 in WT : T-bet KO). This demonstrates that the formation of lytic synapses is not manipulated by T-bet transcription factor, at least not by Wipf1. Following the Wipf1, the next gene tested was Unc13d (also known as MUNC13-4). This gene belongs to the Unc13 family, which is known to involve in the vesicle maturation and regulation of cytolytic vesicle release. It interacts with Rab27a and primes the lytic vesicles for fusion with plasma membrane at lytic-synapse. Again, T-bet deficient NK cells had higher RNA extent of Unc13D (1:1.56 to T-bet KO). Lastly, Vamp7 was tested. In fact, Vamp7 was the most highly expected gene to test, because previous findings describe its essential role in target cell killing. To be brief, Vamp7 is known as Vesicle Associated Membrane Protein 7 that is found to be colocalise with CD107a molecules and participate in the fusion of transport vesicle to the target membrane. Although any trace of Vamp7 RNA was not found in both WT and T-bet-/- NK cells, it was not surprising fact, because Vamp7 is the soluble N-ethylmaleimide-sensitive-factor accessory-protein receptor (SNARE) among which present on target membranes (t-SNARE). As a matter of fact, this can explain how NK cells can be protected from their own lysosomal vesicles. In the absence of t-SNARE proteins, lytic synapses cannot be constructed, therefore for those NK cells missing Vamp7 is safe from its own vesicles. Following the investigation on genes of which participate in the lysosomal trafficking, level of IFN-g was also quantitated. Although the RNA level does not directly reflect the IFN-g production, it is worth have a look to assess whether T-bet deficiency influences the RNA transcription. As a matter of fact, T-bet deficient NK cells seem to have a higher IFN-g RNA level than WT that it was approximately 37% elevated. Based upon the previous studies, IFN-g production is diminished in the absence of T-bet, yet its RNA level indicates T-bet is not directly acting on the RNA production but on the translation pathways. Taken together, how T-bet deficiency affects on the lysosomal trafficking was tracked by looking at the RNA levels of genes supposed to be involved in the formation of lytic-synapses. Except Rab27a, other four genes were shown to be elevated in the absence of T-bet deficiency whereas Vamp7 was not found on both types of cells. This indicates that Rab27a is involved in unknown mechanism of lysosomal trafficking, which results in the functional defects in T-bet-/- NK cells. The findings presented here have demonstrated the activation of NK cells in different environments and the effect of T-bet deficiency on the genes believed to be involved in lysosomal trafficking. Resting NK cells show minimal functional activities in order to prevent unnecessary cell killing, yet once stimuli is detected, it rapidly induces its lytic functions against the target cells. However, the question I tried to address was whether the different strength of stimuli would make any difference in the NK cell activation. Considering that NK cells mainly target stressed or virus-infected cells, they should be highly sensitive enough to detect any small stimulus, otherwise it may result in the massive infection or even worse, cancer. This study has shown that the stimulation of resting NK cells boosts up the expression of CD107a, yet the intensity of expression may not be proportional to the strength of stimuli given. CD107a, which is the lysosomal associated protein representing approximately 50% of the proteins embedded on the lysosomal membrane, has been hired as a functional marker for the NK cell activity. Given that CD107a reflects the cytolytic activity of NK cells, it seems that activation of NK cells is irrelevant to the strength of stimuli. By using the different concentration of a-NK1.1 and a-NKG2D, those provide direct activation signals, this study demonstrated that the CD107a was upregulated on NK cells following the stimulation, indicating the production of lysosomes of NK cells. Moreover, the level of its expression was not noticeably varied when different concentration of stimulatory antibodies was used so that shows NK cells can mediate their cytolytic ability even with small stimulus detected-thereby provide rapid response and protection against any danger signal. Dendritic cells have been shown to be involved in the activation of resting NK cells once they have been matured after the exposure to the antigen. DC produces various cytokines necessary for NK activation, such as IL-2, IL-12, IL-18, IFN-a/b, as a response, NK cells achieve their cytolytic functions as well as cytokine productions. Here, immature DC and LPS-stimulated DC were used at different ration to NK cells to observe change in the expression of CD107a. As expected, LPS-stimulated DC elevated the CD107a expression and this result explains the key role DC during the early events of immune response, that once DC encounter with a pathogen, they release various cytokines that ;IL-2 and IL-15 to induce activation and/or proliferation of NK cells, IL-12 for induction of IFN-g by NK cells, IL-18 to direct NK cells capable of migrating to secondary lymphoid organs where they can interact with DC. However, albeit elevation of CD107a in both ratio used, it was noticeably increased when the DC ratio to NK was higher. Once DC is matured, IL-1b is produced which, along with high mobility group B1 (HMGB1) factor, protect DC from NK cell mediated killing. Thus, DC can keep mediate NK cell activation without themselves being killed. Additionally, sufficient DC in the environment would provide more cytokines, thus resulting in the higher activation rate. Immature DC, however, have shown the opposite results that the low ratio in NK:iDC mediated more expression of CD107a. Although the underlying mechanisms are elusive so far, iDC has been reported to be capable of inducing NK activation. In fact, NK cells interact with iDC to polarise and secrete IL-18 through synaptic cleft, thus initiate their activation. In turn, activated NK cells produce HMGB1 that induce DC maturation as well as protection against NK-mediated DC killing. Thus it is natural to see the elevated expression of CD107a in the co-culture with iDC. Then why the expression is low in the high NK:iDC ratio? Study by Piccoli et al has proposed the killing of DC by NK cells in infected tissues to amplify the stranger/danger signal derived from the invading pathogens. Although DC can secrete lysosomal hydrolases, this can be defeated by high NK/DC ratio. Thus, high NK/DC ratio rather kills DC rather than maturation and consequently, this results in the reduced number of DC in the NK-DC co-culture, followed by less activation of NK cells. Only those cells received HMGB1 survives and produce cytokines to activate remaining resting NK cells. Despite the fact that these results all successfully demonstrated the activation of NK cells in various environments, it still leaves few laments for the further investigations. First, due to the limited resources and time, these experimentations were carried out once and thus there was no sufficient data to confirm the analysis in depth. Repetition on these investigations is inevitable to construct more firm and detailed analysis that are more feasible with other findings. Second, what I intended to assess through the project is the functional aspect of NK cells in relation to T-bet transcription factor. Thus, further investigation is required on looking at CD107a expression on both WT and T-bet -/- and this will advance the understandings on NK cells and its function. It is now well-established that T-bet deficient NK cells have imperfect functions in every aspect, that they show decreased cytotoxicity and cytokine productions. Given that T-bet transcription factor is involved in the early development of NK cells, it is not so surprising fact to have such a consequence. However, the underlying mechanism on diminished cytolytic function is so far elusive and therefore it is still not clear whether T-bet deficient NK cells produce less lytic vesicles or it is due to the disturbance in the lysosomal trafficking. Based upon the preliminary results from Dr.A Martin-Fontecha,which demonstrate that the lysosomal content of T-bet deficient NK cell is reduced compared to the WT NK cells, real-time PCR was performed on those genes that may participate in the lysosomal trafficking to determine whether both results agrees upon each other. By targeting the five genes, CD107a, Rab27a, Unc13D, Vamp7, Dnm2 and Wipf1, I have shown that T-bet transcription factor contributes on all genes except Vamp7 that had no trace on both WT and T-bet deficient NK cells. CD107a encodes the highly glycosylated protein that contributes half of the proteins on the lysosomal membrane. Thus, it has been used as a NK degranulation marker. This study has shown that mRNA content of CD107a was consistently higher in T-bet deficient NK cells than the control. This result implies that there may be defective formation of cytolytic vesicles as the lysosomal content was found to be reduced. The vesicles may simply possess more CD107a protein or possibly their size may vary, yet any of this has not been determined. CD107a closely interacts with Unc13D protein (also known as Munc 13-4), the member of Munc13 family of proteins, and it is probably responsible for vesicle priming. The targets of Unc13D are members of the SNARE family which can be defined into vSNARE and tSNARE; vSNARE are the SNARE proteins found on the vesicle and tSNARE are those present on target membrane. SNARE proteins interact in a coordinated manner to facilitate the fusion of two distinct membrane. Unc13D has been suggested to interact with SNARE protein and mediate the membrane fusion. Moreover, it has been found to be closely related to CD107a molecules that previous finding has demonstrated CD107a expression is significantly decreased when Unc13D has been mutated, as well as NK cytolytic ability. Often, their close interaction allows using the expression of CD107a as a screen tool of familial hemophagocytic lymphohistiocytosis (FHL), the defective genetic disorder on NK cells by mutated Unc13D. In this study, I have demonstrated that T-bet deficient NK cells possess higher content of Unc13D mRNA, which is consistent to the CD107a mRNA level that has also been found to be upregulated in T-bet deficient NK cells. These two positively regulated genes in the absence of T-bet transcription factor may suggest that lytic vesicles in the cell can possibly be primed and fuse to the target membrane more than the normal level. As a matter of fact, overexpression of Unc13D enhances the degranulation of lysosomes. Thus, at the baseline, this may explain how T-bet deficient NK cells can still induce cytotoxicity even if reduced content of lytic vesicle is synthesised. In addition to CD107a and Unc13D, Rab27a is a member of Rab family of small GTPases that are important regulators of vesicle trafficking and compartmentalisation. The protein encoded by Rab27a gene undergoes post-translational prenylation to gain hydrophobicity, which facilitate the interaction with target membrane. Consequently, the interaction mediates the docking of lytic granules. In addition to that, Rab27a is a direct partner of Unc13D that both proteins are normally found in not only NK cells but CTL and mast cells where these two colocalise on the lytic vesicles. Unc13D protein binds to the Rab27a, forming a Rab27a/Unc13D complex that plays a essential role as a SNARE complex regulator. Thus, defects in Rab27a would prevent formation of the complex therefore lead to the functional inability to secrete the lysosomal content. I have shown that T-bet deficiency reduced the mRNA level of Rab27a, the only gene showing reduced level among the genes tested. This may suggest the reason why T-bet deficient NK cells has attenuated cytotoxicity, that reduced level of Rab27a leads to downregulated expression of the protein and therefore, Rab27a/Unc13D complex was not fully constructed as in the WT NK cells. Taken together, diminished cytolytic ability in the absence of T-bet transcription factor is not only owing to the decrease in lysosomal content, but the trafficking of lysosomes was also disrupted by less number of SNARE complex. Nevertheless, it should be noted that this defective phenotype can be reversed by culturing NK cells in the presence of IL-2. It may not induce increased production of Rab27a in both RNA or protein level, but would trigger alternative pathway for Rab27a function. Further investigation is needed to determine whether T-bet deficient NK cells recover their functional activity in the presence of IL-2, and this would clarify the role of Rab27a. As like those genes showing elevated mRNA levels, Wipf1 was also higher in the absence of T-bet deficiency. Considering the function of protein encoded by Wipf1, it may not be the main cause of the reduced ability of NK cells. Wipf1 encoded protein, WIP is known to be important in the NK cell cytotoxicity as previous finding demonstrated WIP knockdown completely deters cytolytic function whereas overexpression enhances the killing. Its initial role is to bind to a region of WAS protein and stabilises filamentous actin and consequently, regulate the cytoskeleton rearrangement. This can be also found in the macrophage for the podosome formation, but in the NK cells, it is crucial for immune synapse dynamics. Moreover, it associates with lytic vesicles in the NK cells and participate in the lysosomal polarisation to the lytic-synapse. Altogether, deficiency in T-bet transcription factor elevates the Wipf1 mRNA level, but this may not be directly responsible for the reduced functional activity of T-bet deficient NK cells, since its elevation would increase the functional activity. At the baseline, it suggests that formation of lytic-synapse is not directly regulated by T-bet transcription factor. Lastly, this study has shown the complete absence of Vamp7 in both WT and T-bet deficient NK cells. This was an unexpected result as many studies previously demonstrated that Vamp7 deficient NK cells show significant decrease in their cytolytic ability. Despite repeated RT-PCR was performed, Vamp7 was not found in any results. This may be due to the systematic errors during the performance, yet, it is still not easy to understand why Vamp7 did not produce any results or show extremely low level while other genes tested together worked fine. Possible reasons can be either problem with sample NK cells used or gene expression assay. Nevertheless, it is also hard to believe WT and T-bet deficient NK cells both do not produce any Vamp7 RNA. It is very likely it is the problem with Vamp7 gene expression assay, but to clarify, further investigation is required. Taken together, this study have demonstrated the activation of NK cells in the various environments and RNA levels of genes believed to be involved in the lysosomal trafficking. NK cells, as a pivotal player in the immune response, it induces its cytolytic effects upon its stimulation by various types of stimuli. However, its activation may not totally depend on the intensity of the stimuli. There can be other possible underlying mechanisms in the activation of NK cells. Through this study, immature DC shows its ability to induce the activation of NK cells just like mature DC. However, as iDC express low level of MHC class I molecules, it easily becomes the target of NK cell mediated killing, and as a consequence, high NK:DC ratio may kill iDC rather than maturation. On the other side, mature DC can protect themselves from NK cells, thus stably can mediate activation of NK cells. Lastly, T-bet deficiency was shown to affect RNA levels of many genes involved in the lysosomal trafficking. Especially, mRNA content of Rab27a was noticeably reduced while other genes of interest increased. This suggests that reduced amount of Rab27a protein leads to the less SNARE complex and therefore, disturbs the overall lysosomal trafficking.
<urn:uuid:8c934498-71c1-49a9-8a35-319300a9a1e3>
CC-MAIN-2017-04
https://www.ukessays.com/dissertation/examples/health/innate-immunity.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00330-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95244
13,211
2.578125
3
In my previous annotation, I left a question hanging regarding Fr. Salví's legend of the Chinaman, St. Nicholas, and the giant crocodile: What are the implications of turning the devil itself into stone? Tilde made much headway into this question in the mother of crocodiles, a take that includes an overview of things-thus-far in this exchange as well as a lizard's eye view of the electoral results. In . Tilde used the image of Sobek, an Egyptian god who, along with the expected might and ferocity, possesses also the attributes of a creator god and a collector of things lost or abandoned upon the Nile. Since Sobek's visage guides this annotation, I now aim to temper the view of the croc. We remember how Fr. Salví thought it a menace of the highest order, saw it as the devil incarnate. In his story, at least two religions converge upon the Pasig river: Fr. Salví's catholicism and the Chinaman's unspecified heathen faith. In his encounter with evil, the Chinaman was "inspired by God" to call on St. Nicholas. In . Perhaps we have two incursions: a foreign man upon the local river, and in the mind of this man, a foreign god. There is symmetry if we assume that catholicism is native to the river, God's voice and the Devil's reptile thus come as opposite (but complementary) functions of the same conversion process: positive and negative reinforcement. However, what if there are three cultures at play here? The Chinese and the Spanish are both players but the silenced native is merely terrain, perhaps a prize. Another possibility: what if the crocodile is the unconverted native, the wild and disobedient? Maybe we are dealing with a muted native divinity, one re-purposed by the dominant power as an emblem of terror. Maybe the crocodile is not pure fable, perhaps we are looking at banditry here, the fearsome who prey upon river folk, who likely keep a keen eye on lightly guarded merchants and priests. Or these feared are the river folk themselves, Fr. Salví's story thus an assertion of power in order to submerge a great insecurity: what if they rise from the water to take what belongs to them? If so, then Fr. Salví's crocodile is a demonization of the native. If so, then it is the effective inverse of Old Selo's crocodile ("Make believe you lost the thirty pesos gambling, or that you dropped them in the river and a crocodile swallowed them." In ) where the animal is a naturalization of the foreign evil. Open Season | crocs across, beyond pages | Grounds for Sport | Word Magicks | the mother of crocodiles José Rizal. El Filibusterismo. Trans. by Leon Maria Guerrero. Quezon City: Guerrero Pub., 1996: 21-22. Rizal: 25-26.
<urn:uuid:0b7bb4b9-a770-43c9-a395-90bd2a978d0c>
CC-MAIN-2017-04
http://tekstongbopis.blogspot.com/2013/05/a-hidden-worship-fourth-annotation.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00523-ip-10-171-10-70.ec2.internal.warc.gz
en
0.934656
616
2.78125
3
Fabrication process of microtubes by rolled-up nanotech. During the first step (photolithography) (A), the photoresist is spin-coated onto a substrate, prebaked, and exposed to UV light through a mask before it is developed. During the electron beam evaporation (B), the nanomembranes are deposited on an angle onto the sacrificial photoresist layer. The roll-up (C) is achieved by etching the sacrificial layer. (B) and (C) modified from ,.
<urn:uuid:e34f45e7-9571-4b33-83d5-8d55c345a0cc>
CC-MAIN-2022-33
https://jrobio.springeropen.com/articles/10.1186/s40638-014-0011-6/figures/1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00269.warc.gz
en
0.912052
118
2.8125
3
[Please note that this page contains affiliate links. If you choose to purchase after clicking a link, I may receive a commission at no extra cost to you.] Everyone experiences times throughout their lives when an increase in anxious thoughts occurs. Perhaps it’s due to stress at work, or there is fighting in a relationship, or there is too much going on all at once. However, you may notice a lot more nervous energy during those times. Victims of childhood trauma will sometimes battle with grounding because of the chaos during childhood. They learned to stay under a specific amount of emotional dysregulation, and relaxing activities may feel stressful. For some people, grounding techniques can increase anxiety because of the amount of focus and quiet involved; occasionally, it is vital to start with a more active interest to reduce anxious thoughts. 5-Step Exercise to Redirect Anxious Thoughts: - Think of the first song to come to mind. It doesn’t matter what song, but it’s simpler to start with a well-known pop song with easy t0 following lyrics. Then, sing the lyric that comes to your mind, only stopping when you can’t think of more words. - Continue by singing a lyric with the last word sung from your previous song. You can start anywhere if the word of the previous song is in the new one. Keep singing until you can’t remember any more words. Then, you can try and hum the comments if you can place the sounds and not the terms. - Please keep it going until your silliness reaches maximum potential. It is even more beneficial to laugh. It is good when you mess up and don’t know where to start back over, as this signifies that you’re focusing your energy on the song. The laughter creates endorphins that help alleviate stress, well-improving focus on the task, and dramatically decrease anxious thoughts. - By the end of it, feel the feelings in your body. Do you recognize a decrease in anxious thoughts? Perhaps your jaw or shoulders are more relaxed. Maybe you forgot about it, perhaps only for a few minutes, what you were feeling anxious about. Your laughter increases your serotonin levels, with known antidepressant effects that help decrease the negative feelings and thoughts you are experiencing, even if it is just for a little while. - Repeat if needed.
<urn:uuid:b615c494-54e5-46b2-9234-0759801beb70>
CC-MAIN-2022-33
https://minddebris.com/alleviating-anxious-thoughts-in-5-simple-steps/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00068.warc.gz
en
0.95812
486
2.234375
2
Fracking poses a significant health risk to workers involved in the shale gas drilling process being pushed by Whitehall. A study from the US, where fracking is making big inroads, found that workers risked developing a disease that caused inflammation and scarring to the lungs - and had the potential to cause lung cancer. Prime Minister David Cameron said that fracking was essential to the UK's energy mix. It would make Britain more energy-efficient, create jobs and reduce energy bills, he claimed. Writing in the Daily Telegraph, the prime minister said the country had to "get behind fracking". "If we don't back this technology, we will miss a massive opportunity to help families with their bills and make our country more competitive," he said. "Without it, we could lose ground in the tough global race." Fracking stimulates the flow of oil and natural gas from tight rock formations by injecting a fluid mix of water, sand and chemicals into a well at high pressure. It has gone on in the US since 1949. Concerns over its safely and environmental impact were raised in the 1980s and are still being debated today. Energy bills in the US have been reduced and the country recently announced plans to export fracked gas. However, a study by the National Institute of Occupational Safety and Health (NIOSH) found that workers at 11 hydraulic fracturing sites in five states were exposed to high levels of crystalline silica dust. Normally, the sand used for fracking is silica. Small particles of the mineral can enter people's lungs as respirable crystalline silica and causes silicosis, a disease that inflames and scars lungs, making it difficult to breath. Exposure to silica was also believed to cause lung cancer. The NIOSH study found that over 100 tested air samples contained high concentrations of silica dust. Concentrations were above the permissible exposure limit recommended by NIOSH. Katie Weatherford, from the activist group Centre for Effective Government, said stricter limits could save 60 lives every year. "Until the White House stops delaying this important rule from moving forward, workers across the nation will continue to be inadequately protected," she wrote. "Every year that OSHA's rule is delayed, the friends and families of dozens of workers across the nation will lose a loved one to a disease that could easily be prevented." Cameron said: "If neighbourhoods can really see the benefits - and get proper reassurance about the environment - then I don't see why fracking shouldn't get real public support." Greenpeace energy campaigner Leila Deen said: "The prime minister's claim that UK shale gas will reduce energy prices doesn't stack. Experts from Ofgem to Deutsche Bank to drilling company Cuadrilla itself agree UK shale will not bring down bills, because unlike the US, the UK is part of a huge European gas market. The government must come clean about where it's getting its advice from, and the role shale gas lobbyists are playing in it. "If this is David Cameron's attempt to reassure his party and voters, he'll have to up his game. We've seen that foisting fracking on communities - South or North - doesn't work, and his comments are likely to further stir rebellion in the Home Counties, not quell it."
<urn:uuid:6bde7a98-d064-4a30-ac62-b2eed5d792aa>
CC-MAIN-2017-04
http://www.ibtimes.co.uk/fracking-causes-lung-inflammation-scarring-cancer-workers-498503
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00174-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969859
671
3.3125
3
Human infertility is the inability of reproducing by natural means. The most common causes of infertility are ovulatory problems and deficiencies in the semen, and semen quality. Infertility can influence on all aspects of the infertile couples’ life (Stellar et.al, 2016). Low self-esteem, depression, dissatisfaction and anxiety are the results of this crisis situation for couples with infertility problem (Steril, 2006). The other problems are the relationship between the infertile patients with their spouse, friends, and colleagues, a negative impact on their adherence performance, impulsive angry behaviors, feelings of helplessness and worthlessness, concerns of sexual attraction, feeling of isolation, physical complaints, difficulty in sexual relationships, and sexual dissatisfaction (Ramezanzadeh, 2004; Slade, 2007).
<urn:uuid:4d0cf5ab-ce38-4a36-88e3-bba54871fb3b>
CC-MAIN-2022-33
https://parssuren.com/fa/fertility-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz
en
0.895163
164
2.578125
3
In summer, there is a place in North Iceland, where the sun never sets. Around midnight, it will sink to the ocean and move along it, only to come up again a few hours later. It is a place so beautiful that all of us should see it. It is a miracle of nature and a visual delight. This short film, aptly named 'Midnight Sun', was made out of 38,000 photos taken by a single photographer over 17 days. See the wonder for yourselves.
<urn:uuid:e74251fd-250e-4c54-9c64-f6a22ebefbae>
CC-MAIN-2016-44
http://www.ba-bamail.com/content.aspx?emailid=656
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00003-ip-10-171-6-4.ec2.internal.warc.gz
en
0.974199
100
1.59375
2
It may not be music to your ears when listen to your community orchestra at the park this summer. The economic downturn is forcing professional and community orchestras alike to cutback on rehearsal time, shorten their schedules and scale back productions. “In a safe performance," Wroe said, "when the musicians are trying to keep it as controlled as possible, emotional intensity is compromised, I believe, and the audience does feel that.” Musicians who make their money playing in professional orchestras in and around New York City are having a hard time making ends meet. Side jobs are drying up for Broadway musicians and substitute jobs have become harder to find. “It has forced me into a part-time, hand-to-mouth existence,” Gabriel Schaff, a violinist, told The New York Times. “We regret the need to take this action, but feelit is the most responsible action to economic climate," Chairman of the Board Norman Raben said. Small orchestras in the suburbs that use professionals have also had to tighten their belts. Community orchestras in Long Island, New Jersey and Westchester often perform at local parks on the weekends throughout the summer. The orchestras are typically made up of amateurs who work for little to no compensation. However, they often employ paid "ringers" to fill out certain sections of the orchestra. The harsh economic climate may force them to cut back on the hiring of professionals, or worse, cancel shows.
<urn:uuid:5ae9aea0-e02a-492c-b529-d267057df535>
CC-MAIN-2017-04
http://www.nbcnewyork.com/news/business/Economy-Threatens-to-Quiet-Summer-Music-.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00263-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966744
305
1.664063
2
Bankwest Stadium has announced it has achieved LEED v4 Gold Certification from the US Green Building Council. The intention of LEED, or Leadership in Energy & Environmental Design, is to create healthy buildings for occupants and for the environment. It is the most widely used green building rating system in the world. The design and delivery of Bankwest Stadium focused on initiatives within multiple key categories, including innovation, water savings, energy efficiency, transportation options and materials selection during construction. Acting Minister for Sport Geoff Lee said this achievement in sustainability shows Bankwest Stadium is much more than just a great place to watch footy. Read the full media release.
<urn:uuid:aafa33ea-f616-4542-9900-2d94bd36af17>
CC-MAIN-2022-33
https://infrastructure.nsw.gov.au/projects-nsw/western-sydney-stadium/news-container/2020/may/26/bankwest-stadium-achievies-world-gold-standard/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00666.warc.gz
en
0.955983
132
1.703125
2
Biblio::LCC - parse and normalize LC-style call numbers use Biblio::LCC; $normalized = Biblio::LCC->normalize('PS3573.A472242 A88 1998'); ($begin, $limit) = Biblio::LCC->normalize_range('E184.5-E185'); @parts = Biblio::LCC->parse($call_number); $call_number = Biblio::LCC->add($class, $offset); Biblio::LCC parses Library of Congress classification ranges and call numbers and normalizes them into a form suitable for a straight ASCII sort. $normalized = Biblio::LCC->normalize('PS3573.A472242 A88 1998'); Convert an LC-style class (e.g., 'PS' or 'E184.5') or call number (e.g., 'PS3573.A472242 A88 1998') into a string that may be compared to other normalized call numbers (see normalize_range below). ($begin, $limit) = Biblio::LCC->normalize_range('E184.5-E185'); Parse a call number range, producing a pair of strings B and L such that a call number falls within the range if and only if its normalized form, in a straight lexicographic ASCII comparison, is greater than or equal to B and strictly less than L. The range may be specified in one of three ways: A pair of call numbers; the range includes the beginning call number, the ending call number, and any call numbers that have the ending call number as a prefix. For example, the (unnormalized) range AS131-AS142 encompasses any class or call number from AS131 up to but not including In this form, the alphabetic string that begins the second call number may be omitted, so (for example) E184.5-185 is equivalent to Space is optional around the hyphen. A single class or call number, in unnormalized form. This is equivalent to a pair in which each call number is the same. For example, the unnormalized range QA141.5.A1 encompasses call numbers from QA141.5.A1 up to but not including A pair of call numbers; the range includes the first call number and any call number up and not including the ending call number. For example, the unnormalized range DT6.7<DT7 includes everything greater than DT6.7 and less than In this form, the alphabetic string that begins the second call number may be omitted, as in the form of range that uses a hyphen to separate the parts. Space is optional around the less-than sign (<). ($alpha, $int, $frac, $rmdr) = Biblio::LCC->parse($call_number); Split an LC call number into alphabetic, integer, decimal fraction, and remainder (i.e., everything else). $call_number = Biblio::LCC->add($class, $offset); Add an offset (e.g., '180.3') to a base LC class (e.g., 'GN1600') to produce another LC class (e.g., 'GN1780.3'). The base class may have only alphabetic and integer parts; an exception will be thrown if it has a fractional part (e.g., as in 'GN1600.1') or a remainder (e.g., as in 'GN1600 R5'). Call numbers are first analyzed into four parts. For example, take the call number GB1001.72.M32 E73 1988. The one to three alphabetic characters that begin the call number. An integer from 1 to 9999 that follows. Digits that follow a decimal point after the integer part. M32 E73 1988 Everything that follows. The LC Classification allows for a wide range of possible call numbers that do not fall into the simple (alpha, integer, fraction, remainder) model that this module implements. For example, the following are all valid call numbers: It may be that in some cases further analysis, and fully correct sorting, are not possible without hardcoded knowledge of the LC classification. In many cases, however, a more sophisticated parsing model, while more complex, would result in better normalization. There are no known bugs. Please report bugs on this module's RT page: http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Biblio-LCC. new method and rewrite other methods so they may be used as class or instance methods. Special handling of "special" call numbers (e.g., in the Gs). Allow caller to specify prefixes to strip (e.g., "Folio"). Parse straight from the 050 or 090 field of a MARC record. Better error reporting. Paul Hoffman (nkuitse AT cpan DOT org) Copyright 2007-2008 Paul M. Hoffman. This is free software, and is made available under the same terms as Perl itself.
<urn:uuid:35258a2f-ec1e-4a02-a742-dc9c3c88473d>
CC-MAIN-2017-04
http://search.cpan.org/~nkuitse/Biblio-LCC-0.09/lib/Biblio/LCC.pm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00536-ip-10-171-10-70.ec2.internal.warc.gz
en
0.793235
1,121
1.671875
2
Hi everyone. I'm preparing for a test tomorrow and there are concepts and methods, which I seem to have forgotten or never understood properly. For eksample there are these exercises, which I'm having difficulties with, if someone could help me throught them, it would be nice : 1) Explain why the -modules and have finite lenght and write a chain of composition. 2) Find the associated primes and the support of the above -modules 3) k is a field. Explain why is the only prime ideal in . Is a simple R-module? 4) Are some of the three -modules , , isomorphic? Are some of them isomorphic as rings? Now, in 1) I would say that and therefore and so so ? So thus the lenght is three in both cases and thus finite? In (4) I would say that the two last are isomorphic, because you can make an ismomorphism from to by sending X to Y, Y to X and 1 to 1. Correct?
<urn:uuid:ece86a21-116b-47f9-95f7-8a6a63441ad9>
CC-MAIN-2017-04
http://mathhelpforum.com/advanced-algebra/108725-rings-modules.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00485-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961458
220
2.40625
2
Budding film-makers at Middlesbrough College have broken the golden rule of showbiz never to work with children or animals. St Peters School in South Bank commissioned creative media production students at the College to make an introductory film based on the school’s “Little Book of Worries”. The book identifies the children’s biggest worries about starting secondary school, such as getting lost, and reassures them that these things won’t happen to them at St Peter’s School. All the “worries” are presented by two children at the school and are filmed in black and white, with the “reality” of the situation then shown in colour. Amy Glanville, the teacher at St Peters who commissioned the film, said: “The Middlesbrough team worked tirelessly on the project, with a level of professionalism that can only be described as impressive.” The film, from initial storyboarding to filming and editing, is the work of five BTEC creative media production Level 3 students; Liam Emmerson, Emily Tatters, Adam Angell, Amy Fall and Dan Charlton, and their tutor Tony Brown.
<urn:uuid:a11f9228-fe47-47df-be9b-1c8413293aa7>
CC-MAIN-2022-33
https://feweek.co.uk/lights-camera-action-at-middlesbrough-college/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00077.warc.gz
en
0.955917
246
1.773438
2
Today, Islam has been presented as the religion of hatred, cruelty and darkness. Thanks to our Wahabi brothers and Western community for degrading Islam! The two main evident sources to degrade and show a wrong picture of Islam is the western community and the wahabi sect of Islam. You can read an old interview of Stephen Schwartz with Kathryn Jean Lopez on the topic The Good & the Bad. The reason why Ahl-e-Hadees changed their name to Wahabi is that they never followed any Hadith. But every Wahabi and every person from the Western Community is not wrong. Still the average population of Wahabi sect and the Western Community is destroying Islam. I hope Pakistani Wahabis are less dangerous as compared to the foreign Wahabis. Actually, Islam is not as strict as Wahabis have shown to invite their ally Western Community to criticize on it. Let’s only talk about the Perda/Perde (پردا) issue. There are very clear verses in the Holy Qur’an telling about this matter in Chapter # 24: قُلْ لِّلْمُؤْمِنِيْنَ يَغُضُّوْا مِنْ اَبْصَارِهِمْ وَيَحْفَظُوْا فُرُوْجَهُمْ ۭ ذٰلِكَ اَزْكٰى لَهُمْ ۭ اِنَّ اللّٰهَ خَبِيْرٌۢ بِمَا يَصْنَعُوْنَ وَقُلْ لِّلْمُؤْمِنٰتِ يَغْضُضْنَ مِنْ اَبْصَارِهِنَّ وَيَحْفَظْنَ فُرُوْجَهُنَّ وَلَا يُبْدِيْنَ زِيْنَتَهُنَّ اِلَّا مَا ظَهَرَ مِنْهَا وَلْيَضْرِبْنَ بِخُمُرِهِنَّ عَلٰي جُيُوْبِهِنَّ ۠ وَلَا يُبْدِيْنَ زِيْنَتَهُنَّ اِلَّا لِبُعُوْلَتِهِنَّ اَوْ اٰبَاۗىِٕهِنَّ اَوْ اٰبَاۗءِ بُعُوْلَتِهِنَّ اَوْ اَبْنَاۗىِٕهِنَّ اَوْ اَبْنَاۗءِ بُعُوْلَتِهِنَّ اَوْ اِخْوَانِهِنَّ اَوْ بَنِيْٓ اِخْوَانِهِنَّ اَوْ بَنِيْٓ اَخَوٰتِهِنَّ اَوْ نِسَاۗىِٕهِنَّ اَوْ مَا مَلَكَتْ اَيْمَانُهُنَّ اَوِ التّٰبِعِيْنَ غَيْرِ اُولِي الْاِرْبَةِ مِنَ الرِّجَالِ اَوِ الطِّفْلِ الَّذِيْنَ لَمْ يَظْهَرُوْا عَلٰي عَوْرٰتِ النِّسَاۗءِ ۠ وَلَا يَضْرِبْنَ بِاَرْجُلِهِنَّ لِيُعْلَمَ مَا يُخْفِيْنَ مِنْ زِيْنَتِهِنَّ ۭ وَتُوْبُوْٓا اِلَى اللّٰهِ جَمِيْعًا اَيُّهَ الْمُؤْمِنُوْنَ لَعَلَّكُمْ تُفْلِحُوْنَ (24:30) Direct the believing men to keep their eyes always lowered and guard their private parts. That is purer for them. Surely Allah is Well Aware of the (works) which they are busy doing. 31. And direct the believing women that they (too) must keep their eyes lowered and guard their chastity, and must not show off their adornments and beautification except that (part of it) which becomes visible itself. And they must keep their veils (and head-coverings) drawn over their chests and breasts (too), and must not display their adornments (to anyone) except their husbands, or their fathers or the fathers of their husbands, or their sons or the sons of their husbands, or their brothers or the sons of their brothers or the sons of their sisters, or (the women of) their (own faith, the Muslim) women or their female slaves or such male servants as are free from any lust and sexual urge, or the children who (being minor) have (yet) no sense of women’s private parts. (They too are exceptions.) Nor must they (while walking) strike their feet (on the ground in such a manner that ornaments jingle and) thus get revealed and known which they are keeping hidden (under the command of Shari‘a). And turn to Allah all of you in repentance, O believers, so that you may prosper (by implementing these Commandments). The person who want to criticize will always try to find defects in these verses and he will try to call it the “cruel rule” of Islam or the “dark rule” of Islam. Here, if you just see with open eyes, before commanding the believing women to observe Perde, the believing men are commanded to observe the Perde. The Parda of men is to keep their gazes low and protect their private parts. I hope this is not cruel. If you go beyond this, you’ll become unsocial like the animals of jungle. The non-Muslims don’t feel anything even if someone come to their daughter, fulfill his lust and go away. This is the rule of animals of jungle. But Muslims, especially the South-East side, feel bad if any one look to their daughter with a bad eye because they think their daughters as a part of them. Holy Prophet ﷺ said that Fatima (SA), daughter of Holy Prophet ﷺ, is a part of him and whoever hurts her will actually hurt him and whoever hurts him will actually hurt Allah (swt). So, we, Muslims, don’t treat our children like animals. Animals leave their children in the jungle of cruel rules to wander and find their own way and live their own life. Animals only care for their children until they don’t learn to walk alone. The Parda of women comes after men and it is explained in more details. If you just read the verse, there is a long list of people in front of whom a believing women don’t have to observe the Perde. The list include all the near relatives, all the women and all those men who either don’t know about private parts of women or are free from the lust of sexual urge. Now, what is left behind? Only the men with sexual urge and the grown up children who know about the private parts of women. Is it wrong? I don’t think so. You have a full freedom to not observe Perde in front of your family, your friends and even non-friend women. What do you need more? Perda have many categories. The more you observe Perde, the more modest you are. Holy Prophet ﷺ commanded extra Perde for his wives and children. The last boundaires of Perda are very clearly defined in the verse 31 “must not show off their adornments and beautification except that (part of it) which becomes visible itself.” Now, the traditions tell us the visible part includes face, hands and feet. Now you can not even blame a believing woman to be a terrorist hiding his/her face. If you need to investigate any case, you can see the face of a believing woman and even you can take her fingerprints? What’s left behind? Still cruel Islam? Or still these verses are interpreted wrongly? One question might arise in your mind that Muslim woman cover her head and whole body, but what about the face, hands and feet? Would they not attract you towards the sexual urge? Let me remind you that both of the verses, mentioned above, clearly states that both, the believing men and believing women, should keep their gazes low. If both of them keep their gazes low and do not have any face/eye contact, how can this possibility occur? If you say, why the believing woman should cover her arms and legs? So, my question is that why you want to see the arms and legs of someone who is not related to you? For sexual lust? Is this is what your religion teach? Isn’t this a jungle rule of animals? Secondly, when a Muslim woman covers her body, you criticize it, but when a nun or a Princess of England cover her body, why you don’t criticize it? Instead, if, to-be-princess Kate Middleton don’t wear a Royal Dress, you criticize her. Why this totally opposite rule for a Muslim and a non-Muslim? See the news by Yahoo! Kate Middleton criticized for wearing sheer blouse: How will her style have to change as a princess? “When we think of royal women we picture long, ladylike coats, fancy hats, and elegant cocktail dresses. What we don’t conjure up: jeans, miniskirts, leather jackets, and sheer tops.” Why do you have this distinction between a Royal Family Member and an ordinary public member? Do you think them to be greater in status than you? Still you claim your teachings as more peaceful and greater than Islam teachings while Islam teaches that everyone is equal in the sight of Allah, the Almighty. Only that person have a higher status who is more pious (observe TAQWA). Who is greater now? Allama Iqbal said about HIJAAB عزت ہے محبت کی قائم، اے قیس حجابِ محمل میں محمل جو گیا، عزت بھی گئی، غیرت بھی گئی، لیلا بھی گئی Secondly, if you think the Royal Family Members to be superior, then, what you think about them is superior in your sight. If you think that a Royal Family Member should cover his/her full body in public, then this must be the superior rule in your sight. Then why you criticize Islam for the same rule? Just because it was given 1400 years ago? Just because Islam gave Light to the dark world too early when Science was buried in dark caves. Who explore laid the bases of sciences and who discovered the science of old scientists and presented it to the world? Those were the Muslims when they ruled Greece. The base of every science was laid by Muslims because they explore Science in the light of Qur’an. Islam says that man and woman are equal but not in the way as you people say. Islam have given a specific field where the man is ruling individually, the woman is ruling individually and the field where both rule equally. If you think that woman is given the house, and that’s why house is nothing to be considered other than a cell of jail, you are like the person in the story Overcoat. At last, I’ve a question for you: If you still think that you are satisfying your statement “Men and Women are equal”, then can you tell me the reason for different men and women teams in sports? Why they are not equal? Why you don’t put men and women equal in every field? You say that women are superior to men because men don’t have another X chromosome in their sex chromosome. Can you tell me how women can live without a single man living in the community? They’ll fulfill their desires from other women and animals and this act has already invited the foreign diseases in humans. This act is condemned in the Bible. “Professing themselves to be wise, they became fools, and changed the glory of the incorruptible God for the likeness of an image of corruptible man, and of birds, and four-footed beasts, and creeping things. Wherefore God gave them up in the lusts of their hearts unto uncleanness, that their bodies should be dishonored among themselves: for that they exchanged the truth of God for a lie, and worshipped and served the creature rather than the Creator, who is blessed for ever. Amen. For this cause God gave them up unto vile passions: for their women changed the natural use into that which is against nature: and likewise also the men, leaving the natural use of the woman, burned in their lust one toward another, men with men working unseemliness, and receiving in themselves that recompense of their error which was due.” (Romans 1:22-27 American Standard Version)
<urn:uuid:9a5f3ece-207f-44ff-82f5-ee6040386e7d>
CC-MAIN-2017-04
https://rhythmaticlife.wordpress.com/2011/01/11/why-perde-%D9%BE%D8%B1%D8%AF%D8%A7-is-not-criticized-if-not-in-islam/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00120-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937579
3,273
1.929688
2
Power in the Fellowship of Trinity Towardness So what were they doing before creating the physical realm? What were they doing? John gives a hint: In the beginning was the Word, and the Word was with God, and the Word was God. He was in the beginning with God. Twice this passage reveals their engagement: the Word was with God. Okay, so they were with each other. But that doesn’t tell us what they were doing, at least, not in English. The English “with” describes the proximity of one thing to another. The Word being with God is not much different than Sue being with Jim. The Greek pros (translated “with” in this passage) portrays a meaning more active than just a position. Pros relays direction–the destination of something, a motion towards, or forward. Most often pros is translated “to” rather than “with,” though there’s not really an English equivalent. And so, in the beginning, the Son wasn’t just biding His time beside God. Throughout eternity the Son was towards God. His destination was God, a forward motion, constantly moving towards the other’s nurture and well-being. We call this other-focused relationship “towardness,” Father, Son and Holy Spirit, interwoven in an intricate dance of forever moving forward toward each other, building kingdoms, creating beings as one thrilling, communion of other-focused passion. Even after becoming flesh the Son continued this motion toward His Father, a truth that provoked most violent persecution. “I and My Father are one” He announced, inciting the religious crowd to throw stones meant to kill. “He claimed to be the Son of God,” they tattled to Pilate demanding crucifixion as punishment. How terribly awesome, how beautiful, how true and mysterious, this Triune communion, this perfect, undiluted, untainted, wholly satisfying, ever moving, eternal community. But even more mysterious, more staggering to our limited minds, the words of The Word, just before His sacrifice, inviting us to join Him in this relationship of Trinity towardness: “I do not pray for these alone, but also for those who will believe in Me through their word; that they all may be one, as You, Father, are in Me, and I in You; that they also may be one in Us, that the world may believe that You sent Me . . . I in them, and You in Me; that they may be made perfect in one (John 17:20-23, NKJV). …the birthing of true Christian community. God exists in eternal towardness, and He created us in that image. Our fellowship is neither Christian nor true if not beginning, ending, and saturated within the communion of the Trinity, through listening prayer, saturation of His word, and loving others. The evidence that we abide in fellowship with God is in how we reflect Trinity towardness in our relationships. They will know we are Jesus’ disciples if we have love for one another. As we worship our Lord in spirit and truth, it’s more than just a feel-good act of music and praise. It’s a lifestyle of drawing close enough to God that His image is burned into and reflected from us to others. As God moves toward us, we move toward Him, become more like Him, and reflect this fellowship in our community relationships. Isaiah 57:15; Revelation 1:8; Hebrews 2:7-9; John 1:1-2; 5:19-23; 10:30; 13:35; 15:1-8; 19:7; Philippians 2:1-10; 1 John 1:3,7; 2:24-25 Learn more about the the power of towardness in your life and leadership in Keith’s book, Mastering the Art of Presence-Based Leadership – Patricia Tillman
<urn:uuid:8f914c30-8cdb-4214-8dfd-51461e02acbd>
CC-MAIN-2017-04
http://christcenteredleaders.org/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00165-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964209
838
2.328125
2
Hoosier ReLeaf is excited to present this very special event…”Soil-to-Soil”… in recognition of Earth day, Arbor Day, Enviro Day, Eco Day, and World Soil Day. From wetlands to city parks; from birds-of-prey to honeybees; from trees and plants to the chairs you sit on and the food on your table…this commemorative celebration features 50+ public, private, and not-for-profit groups representing local, state, and national environmental interests. Participants include: • Master Gardeners/Steve Pawloski • Indiana DNR • Boy Scouts & Girl Scouts • 3 Rivers Fruit Growers • Local/Area Elementary & High Schools • US Forestry Service • ACRES • River Watch • St Joe Watershed Initiative • Plus many more! The April 25th event will feature displays, educational activities, presentations, demonstrations, tree grafting, tree planting, chainsaw woodcarvings, food, a silent auction…and more. It is co-sponsored by Indiana Michigan Power & Granite Ridge Builders • 5:30pm Keynote speaker Tim Womick…”the Modern-day Johnny Appleseed” • 5pm-8pm Winetasting hosted by Two EE’s & Country Heritage Wineries • 6:30pm-7:30pm Live bluegrass music by the “Kitchen Table Players” Plus special guest Mascots: • “Treeture Creatures” Steward and Woody the Sap Tapper • Smokey Bear • Johnny TinCap • Dr. I.C. Coldwater • Kingston Parkview Field Home of the Fort Wayne TinCaps 1301 Ewing Street • Fort Wayne IN 46802 Monday, April 25, 2016 – 3pm to 8pm Admission is FREE and open to the public A complete list of participants is available at www.HoosierReLeaf.com and Facebook.com/HoosierReLeaf “Soil-to-Soil” is an official event of the Indiana Bicentennial. It is designed to help raise awareness regarding issues confronting our environmental future, and educate people about the importance of being good stewards of our planet. Life begins with the soil…it provides the link between food, water, clothing, shelter, climate, biodiversity, and ecosystems. Through recycling, composting and responsible use of resources, we give it back. It’s the environmental cycle of life. Founded in 1991, Hoosier ReLeaf is a not-for-profit education and action organization aimed at improving our environment through more and better trees. Hoosier ReLeaf encourages citizens across the state of Indiana to preserve the environment and to reforest local communities through its sponsorship and coordination of tree-planting projects and environmental education programs. It is a volunteer organization supported by limited funding from state and national grants, and donor contributions.
<urn:uuid:f27c85ed-e109-4e18-8f52-ce19b31cf263>
CC-MAIN-2022-33
https://fort-wayne-news.com/2016/04/23/soil-to-soil-this-monday-hoosier-releaf/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00067.warc.gz
en
0.888359
611
1.867188
2
Gills Onions, LLC of Oxnard, CA is initiating a voluntary recall of a single day’s production of diced and slivered red and yellow onions and diced celery and onion mix because they may be contaminated by Listeria monocytogenes. No illnesses have been reported in connection with this recall, and no other Gills Onions products are affected by this recall. A list of recalled products is provided at the end of this release. Listeria monocytogenes is an organism that can cause serious and sometimes fatal infections in young children, frail or elderly people, and others with weakened immune systems. Healthy individuals may suffer only short-term symptoms such as high fever, severe headache, stiffness, nausea, abdominal pain and diarrhea. Listeria infection can cause miscarriages and stillbirths among pregnant women. The recalled products, which are packaged under the brand “Gill’s Onions,” were shipped between July 2-4, 2012 directly from Gills Onions to retailers in Canada and the following U.S. states: California, Montana, Oklahoma, Oregon, Pennsylvania, Texas, Utah and Washington. This voluntary recall was initiated when the company was notified by the U.S. Food and Drug Administration that a random sample of diced yellow onions taken at retail tested positive for Listeria monocytogenes. As a precautionary measure, Gills Onions is recalling all products processed on the same day and on the same line as the sample that tested positive. Gills Onions is notifying all customers who received the recalled product directly from the company and requesting that they remove it from commerce. We are also asking our direct customers to notify their customers of this recall. Gills Onions is keeping the U.S. Food and Drug Administration informed of its recall process to assure that consumers are properly alerted.
<urn:uuid:5821bfc1-2977-4c36-bf52-69691bdbbe18>
CC-MAIN-2017-04
http://www.listeriablog.com/listeria-recalls/california-gills-onions-recalled-due-to-listeria-risk/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00130-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959442
385
1.921875
2
Volume I contains the first three Thorndyke novels, published in 1907, 1911, and 1912, respectively. Set in London during the time that Sherlock Holmes was still in practice, these introduce us to Thorndyke and his world, as well as painting a vivid picture of the London of that era. Volume II contains roughly the first half of the Thorndyke Short Stories. In all, there are over forty Thorndyke short stories, spread over six books. This volume contains the fifteen short stories from the first three, John Thorndyke’s Cases, The Singing Bone, and The Great Portrait Mystery. When Sherlock Holmes began his practice as a “Consulting Detective”, his ideas of scientific criminal investigations caused the London police to look upon him as a mere “theorist”. And yet, through his work, the science behind catching criminals became so important that it’s hard to now imagine the world without them. Many famous Great Detectives followed in Holmes’s footsteps – Nero Wolfe and Ellery Queen, Hercule Poirot and Solar Pons – but before they began their careers, and while Holmes was still in practice in Baker Street, another London consultant – Dr. John Thorndyke – opened his doors, using the scientific methods developed and perfected by Holmes and taking them to a whole new level of brilliance. MX Publishing is proud to announce the return of Dr. Thorndyke in a collection of omnibus editions, bringing these masterful adventures of one of the world’s greatest detectives together in an easily available format for modern readers. “Thorndyke will cheerfully show you all the facts. You will be none the wiser … .”– Dorothy L. Sayers, Chronicler of Lord Peter Wimsey “This latest two-volume set would sit proudly on any mystery readers bookshelf! Excellent!” – Raven’s Reviews
<urn:uuid:9c993789-816d-4ce8-ab20-28498c08ad4b>
CC-MAIN-2022-33
https://mxpublishing.me/tag/r-austin-freeman/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00077.warc.gz
en
0.947966
407
1.617188
2
If you have suffered emotional harm due to another person’s negligence, you may have a claim for intentional infliction of emotional distress. After sustaining this type of injury, it’s important to understand the other party’s potential liability and your rights. The first step is to find out more about your injury. So, what is intentional infliction of emotional distress? What is Intentional Infliction of Emotional Distress? Intentional infliction of emotional distress is a tort liability claim involving someone causing another person extreme emotional harm through reckless or negligent conduct. The elements of this claim will vary by state, but generally, the following factors are required to establish an intentional infliction of emotional distress claim: - Intentional or reckless behavior - Extreme or outrageous conduct - Causing injury-emotional distress - Resulting in severe distress When establishing this claim, the injured party will have the burden of proving that they were significantly emotionally impacted and that the responsible party acted intentionally in an outrageous and extreme manner. What is “Extreme and Outrageous” Conduct? Determining what meets the definition of extreme or outrageous conduct can be complicated. Generally, this would include behavior that goes so far outside of the bounds of ordinary conduct as to be shocking. In deciding whether something meets that definition, the court can consider past decisions, the facts of the case, and any extraordinary circumstances. Damages and an Intentional Infliction of Emotional Distress Claim Intentional infliction of emotional distress damages can range by case and according to the laws of the applicable jurisdiction. In some cases, there will be statutory limits on the amount an injured party can recover for their emotional harm. In others, courts will also determine the damages by precedents established in past cases. Generally, intentional infliction of emotional distress claims will include the party’s actual expenses and the costs associated with their pain and suffering. However, unlike a physical injury which can be proven with medical tests and bills, emotional injuries can vary significantly from person to person. Therefore, quantifying these expenses can sometimes prove to be difficult. It’s generally not necessary for a plaintiff to have physical injuries from their emotional distress. However, if the injured party was physically harmed, that fact will most likely be considered when assessing damages. If the actions of another have emotionally harmed you or a loved one, you should contact an experienced personal injury attorney as soon as possible to review your case. Your lawyer can help you evaluate your emotional damages and determine the most effective ways to prove your claim. The “Impact Rule” In some states, there is something called the “impact rule,” which is used to assess how the culpable party’s actions affected the injured person. Under this rule, an injured party would not be able to recover damages if they did not suffer an injury. However, in many jurisdictions, the rule has been modified to allow for recovery for emotional trauma regardless of physical injury. There may also be a basis to recover for infliction of emotional distress when a party witnesses the injury or death of a loved one. Under the “bystander rule,” someone close to the injured party who witnessed an event such as the death of a loved one due to intentional or negligent conduct may also have a cause of action for intentional infliction of emotional distress. Typically, the person hurt or killed must be a parent, spouse, child, sibling, grandparent, or grandchild for the injured bystander to have a claim. Contact an Experienced Personal Injury Attorney Establishing the elements of an intentional infliction of emotional distress claim can be complicated. If you or a loved one have been emotionally harmed by another party’s willful or reckless conduct, you should contact an experienced personal injury attorney as soon as possible to review your case. At The Daily Firm, P.C., we are experienced personal injury attorneys who understand how intentional infliction of emotional distress cases work. We can help you evaluate your case and determine your available damages. Our dedicated attorneys are ready to fight for you!
<urn:uuid:b6ca19ca-1106-4283-a38d-e4d20a319cba>
CC-MAIN-2022-33
https://daileylawyers.com/blog/what-is-intentional-infliction-of-emotional-distress/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00673.warc.gz
en
0.945498
856
1.507813
2
Let’s have a glance at troubleshooting dockers issues. As a part of our server management services, we use to handle several such Docker-related issues. You can also consult our technical team support for further assistance. Fixing the error. One of our client reports where he tries to run the below command to install Docker on the ubuntu server. sudo docker pull busybox The following error was displayed on the screen Pulling repository busybox 2021/03/16 09:37:07 Get https://index.docker.io/v1/repositories/busybox/images: dial tcp: lookup index.docker.io on 127.0.1.1:53: no answer from server How to resolve the error In order to resolve this problem, we first create a systemd drop-in directory for the Docker service and then execute the command. Later, create a file called /etc/systemd/system/docker.service.d/http-proxy.conf that adds the HTTP_PROXY environment variable: Note: In case, if you have internal Docker registries then contact without proxying you can specify them via the NO_PROXY environment variable: Executive the commands to flush the changes. $ sudo systemctl daemon-reload Run the command to verify whether the configuration is loaded or not. $ sudo systemctl show --property Environment docker Run the following command in order to restart the docker $ sudo systemctl restart docker This will fix the error. In short, follow the methods to resolve the docker errors. Need further assistance to fix any sort of error, get in touch with us with 24/7 technical support.
<urn:uuid:e68bea15-1602-4df1-b8f2-e8eb6b05cf74>
CC-MAIN-2022-33
https://www.skynats.com/blog/unable-to-download-docker-images/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00666.warc.gz
en
0.717503
475
2.078125
2
"Maximum Clarity" and Other Writings on Music Normal Price: $81.00 Your Price: $72.90 AUD, inc. GST Shipping: $7.95 per order You Save: $8.10! (10% off normal price) Plus...earn $3.65 in Boomerang Bucks Availability: Available to Backorder, No Due Date for Supply Maximum Clarity and Other Writings on Music by Ben Johnston Book DescriptionDescribed by New York Times critic John Rockwell as "one of the best non-famous composers this country has to offer," Ben Johnston reconceives familiar idioms--ranging from jazz to Southern hymns--using just intonation. Johnston studied with Darius Milhaud, Harry Partch, and John Cage, and is best known for his String Quartet No. 4, a complex series of variations on Amazing Grace. This volume reveals he is also a truly literate composer, who writes and speaks about music with eloquence and charm. "Maximum Clarity" and Other Writings on Music spans forty years and brings together forty-one of Johnston's most important writings, including many rare and several previously unpublished selections. They include position papers, theoretical treatises, program notes, historical reflections, lectures, excerpts from interviews, and letters, and they cover a broad spectrum of concerns--from the technical exegesis of microtonality to the personal and the broadly humanistic. The volume concludes with a discography of all commercially available recordings of Johnston's music. Buy "Maximum Clarity" and Other Writings on Music book by Ben Johnston from Australia's Online Bookstore, Boomerang Books. Book DetailsISBN: 9780252030987 (5830mm x 3895mm x 865mm) Imprint: University of Illinois Press Publisher: University of Illinois Press Publish Date: 25-Nov-2006 Country of Publication: United States Books By Author Ben Johnston Engibear's Dream, Hardback (August 2012)» View all books by Ben Johnston Meet Engibear...This engineer dreams of designs and starts building a Bearbot to help him at work. Early versions fail - often spectacularly. However, Engibear keeps trying. Follow him as his designs improve and the amazing Bearbot takes shape. » Have you read this book? We'd like to know what you think about it - write a review about "Maximum Clarity" and Other Writings on Music book by Ben Johnston and you'll earn 50c in Boomerang Bucks loyalty dollars (you must be a member - it's free to sign up!) Author Biography - Ben Johnston Ben Johnston taught theory and composition from 1951 to 1984 at the University of Illinois at Urbana-Champaign School of Music. Now retired, he lives in Rocky Mount, North Carolina. Bob Gilmore is a reader in musicology at Dartington College of Arts in England. He is the author of Harry Partch: A Biography. Bestselling Books: Our Current Bestsellers | Australia's Hottest 1000 Books | Bestselling Fiction | Bestselling Crime Mysteries and Thrillers | Bestselling Non Fiction Books | Bestselling Sport Books | Bestselling Gardening and Handicrafts Books | Bestselling Biographies | Bestselling Food and Drink | Bestselling History | Bestselling Travel Books | Bestselling School Textbooks & Study Guides | Bestselling Children's General Non-Fiction | Bestselling Young Adult Fiction | Bestselling Children's Fiction | Bestselling Picture Books | Top 100 US Bestsellers Phone: 1300 36 33 32 (9am-5pm Mon-Fri AEST) - International: +61 2 9960 7998 - Online Form Address: Boomerang Books, 878 Military Road, Mosman Junction, NSW, 2088 © 2003-2017. All Rights Reserved. Eclipse Commerce Pty Ltd - ACN: 122 110 687 - ABN: 49 122 110 687 For every $20 you spend on books, you will receive $1 in Boomerang Bucks loyalty dollars. You can use your Boomerang Bucks as a credit towards a future purchase from Boomerang Books. Note that you must be a Member (free to sign up) and that conditions do apply.
<urn:uuid:911d23da-4d4c-42bc-9df2-3c2fbe17953c>
CC-MAIN-2017-04
http://www.boomerangbooks.com.au/Maximum-Clarity-and-Other-Writings-on-Music/Ben-Johnston/book_9780252030987.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00270-ip-10-171-10-70.ec2.internal.warc.gz
en
0.899335
888
1.554688
2
After this Jesus, knowing that all was now finished, said (to fulfil the scripture), "I thirst." A bowl full of vinegar stood there; so they put a sponge full of the vinegar on hyssop and held it to his mouth. When Jesus had received the vinegar, he said, "It is finished"; and he bowed his head and gave up his spirit. It is worth noting that Jesus died with none of the comforts of the Sacraments. From a purely rational viewpoint, we can, of course, reply, "Well, he didn't need them" which is perfectly true. But still, anyone with a heart can only appreciate more the sheer magnitude of the self-sacrifice he made for us. Most of us will die in our beds, surrounded by family and friends, comforted by the sacraments of the Church and with caregivers giving care. He died stark naked, covered with the blood of his scourging and the spit of his enemies, in murderous pain while the laughter of strangers rang in his ears. It is grace beyond description that a race such as ours, dealing out death such as that, could receive in return the gift of Viaticum, the final Eucharist for our journey to heaven. When he cried for drink in his death agonies, we gave him vinegar. When we cry for mercy, he feeds the very flesh and blood we tortured to death on the cross. What love!
<urn:uuid:0a6ceb96-eb80-4b4b-8fee-76d756637ded>
CC-MAIN-2016-44
http://catholicexchange.com/viaticum
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00488-ip-10-171-6-4.ec2.internal.warc.gz
en
0.988103
295
1.71875
2
Hollywood seems to be running out of original ideas. Instead of admitting this industry execs argue that the demand for sequels and remakes has never been higher. That might appear true, at first glance. Eleven of the top 100 films of all time were remade in 2014, and thirteen were remade in 2015). What industry insiders really mean is that reusing intellectual property has proven more financially rewarding. Yet, this strategy is nearing nears inevitable end. The real problem: the writing. I just watched a film two nights ago that was incredibly original in terms of its production values. It had an amazing cast and a good amount of action for a drama. The film had incredibly poor storytelling, however. Nothing made sense. The characters did not ask smart questions–either of others or themselves. As a result, I did not feel emotionally involved, as the story became more and more absurd. The film was not a financial, nor critical, success. This same lack of artful storytelling has plagued recent big blockbuster remakes like Magnificent Seven, Ghostbusters, and Batman Vs. Superman. Worse yet, audiences are noticing and have been trained to want better by that more creative medium, television. The way scripts get written in Hollywood has become dysfunctional. Few writers have creative control over projects. Instead, most big budget movies cycle through half a dozen writers. A pitch intrigues an exec or producer, and the writer who has come up with the idea will be paid a fee to throw a script together. Then another writer is hired to “clean up” the first writer’s work. This process happens two, three, and sometimes four times before the studio finally considers it has a shooting script in hand–one with sufficient “audience bait.” What this process does to the actual story is usually disappointing. Frankenstein’s Monster and most Hollywood scripts share many similarities: they are cobbled together from various dead precedents by a mad scientist attempting to usher in some new form of life. Instead, the creature repulses us, and even he asks, “What am I?” Meanwhile, in TV land, writers are treated in comparison like royalty, because a TV studio needs a show that will run for six seasons. They treat their goose well, so he or she (and their team) will continue to lay the golden eggs. Film studios have not realized that treating their writers as so many birds of one feather doesn’t equate to great storytelling. All this leads up to an interesting development: Writing and pitch competitions. Over the past few years, along with the growing popularity of film festivals, writing festivals have come into vogue. One of the largest and most prestigious is the Austin Film Festival, which, despite its name, places most of its emphasis on writers. Hopefuls may enter scripts for film, TV, and participate in the very popular pitch competition. The Austin Film Festival and others like it provide opportunities for Hollywood to discover fresh talent. Even so, the real problem remains how the film industry treats its talented writers.
<urn:uuid:6720f773-ec4f-4975-b1dc-b9bea87e38e5>
CC-MAIN-2022-33
https://scenesmedia.com/2016/09/hollywood-film-studios-cannot-tell-good-story/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00470.warc.gz
en
0.966283
639
1.554688
2
A logic circuit simulator, featuring a simple drawing-program interface, graphical simulation of circuit behavior, and hierarchical design capabilities. This is a larger project, with about 60,000 lines, nearly all of which are written in Java. Another logic circuit simulator, currently in the very rudimentary stages, which should eventually to do everything Logisim does except better. his project currently incorporates about 8,000 lines of C#/Mono code. |Electra's Candy Factory A command-line tool for applying a simple SQL query (without joins) to a tab-separated-value text file. As an example, suppose we have a file counties.txt where each line has a county name, the state name, and county population, separated by tabs; and suppose that we want to compute the total population for each U.S. state. Our command would be: txtselect 'c2, sum(c3) from counties.txt group by c2' This is a tiny project developed in Python. It fits into a single 400-line file. An IDE for developing Java programs designed for beginning students of computer programming. (Developed in conjunction with Hendrix faculty and students.) |The com.cburch.editor package A library of Java 5.0 classes intended to facilitate text editor development. This was developed for Jigsaw but could easily be used in other programs also. Models of computation series (SOCS) |PNM Viewer (Java application)| |SimHYMN (Java application) A simulator and assembler for a simple 8-instruction CPU. |Robot API (Java API) A library of classes useful for illustrating simple, imperative programs written in Java. |Automaton Simulator (Java application)| |Grammar Editor (Java application)| |Lambda Calculator (Java application)| |The Un-Mouse (Java application)| |Visigrade, a grade visualizer (Java application)| |Karatsuba multiplication (C code)|
<urn:uuid:121e07bc-a902-4020-accd-c4811dd1df08>
CC-MAIN-2017-04
http://cburch.com/proj/prog.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00515-ip-10-171-10-70.ec2.internal.warc.gz
en
0.89442
421
2.3125
2
Multiple opinion leaders have pointed out that hostility was rampant in Korean society during the Moon administration. In order to secure votes and supporters, politicians nurtured hostile feelings toward those who are different from the majority of us, better than we are in some way, or richer than the rest. As a result, hostilities are now endemic in our community, an ordeal with which we have to live every day. Hostilities stem from grudges and resentment against others and thus gravely endanger the public health of our society. To make matters worse, hostile sentiments inflict unbearable psychological pain on us, leave indelible scars in our hearts, and make our souls incurably ill. If we harbor hostile feelings, grudges, and resentments, it will make our lives small and petty until the day we die. Why, then, would we want to hold onto hostile feelings? If someone has done harm to us, we may harbor hostile feelings against that person. However, the hostilities in our society are mostly ideological, instigated by ideology-obsessed politicians under the pretense of social justice, fairness and equality. Thus, we are hostile to those who have never done harm to us directly. Instead, we hate them simply because they have different opinions, more privileges or better chances. A 2017 American Western film, “Hostiles,” is a powerful movie that explores the problems of such negative human abhorrence. The film begins with a horrid scene set in 1892, when Comanche warriors attack settler Rosalee Quaid’s home in New Mexico, brutally killing her husband and three children. Hiding in the forest, she barely survives. Grief-stricken as she has lost everyone she loves, Rosalee’s hatred and resentment toward Native Americans is beyond description. Meanwhile, at nearby Fort Berringer, US Army Capt. Joseph Blocker, too, hates Native Americans because they have killed so many of his soldiers cruelly on battlefields. One day, by President Harrison’s orders he has to escort cancer-stricken Cheyenne Chief Yellow Hawk and his family back to their land in Montana. Thus, Blocker sets out to Montana with the Native American chief and his family, full of hostility toward them. On their way to Montana, they come across Rosalee Quaid’s house. Blocker persuades traumatized Rosalee to join them until the next stopover in Colorado. She agrees to do it, but detests the Cheyenne chief and his family, who remind her of the Comanche warriors who killed her husband and children in cold blood. In her eyes, all Native Americans are the same. During their journey to Montana, however, they encounter several eye-opening incidents. First, when the ambushed Comanche attack them, Yellow Hawk asks Blocker to unchain him and his family, so they could be of help in times of future Comanche attack. Then, Blocker and Rosalee witness that unchained Cheyenne kill the Comanche for the safety of the white people who loathe them. Watching Yellow Hawk and his family, both Blocker and Rosalee come to realize that not all Native Americans are wicked or bad. Furthermore, after three white fur traders abduct and rape the Cheyenne chief’s wife, daughter and Rosalee, they realize that people can be bad whatever race they are. Just as they arrive on Cheyenne tribal land in Montana, Yellow Hawk dies of cancer. As they bury his body in the Cheyenne territory, a white rancher and his three hands appear and claim that it is their land now, and thus forbid the burial of the Cheyenne chief’s body there. When Blocker refuses, shooting begins. During the shootout, the ranchers are killed. The Cheyenne chief’s wife and daughter, together with a white soldier, die as well. This time, Blocker and Rosalee can see why Native Americans harbor such intense hostility toward the white settlers. Their journey to the Native American territory is a series of mind-opening scenes for them. At the end of the journey, Blocker and Rosalee are no longer hostile toward Native Americans. Instead, they now can embrace their enemies and reconcile with them. At the end of the movie, Roslaee decides to take Yellow Hawk’s orphan son Little Bear with her to Chicago. The film enlightens us with a profound insight that nurturing hostile feelings is absurd and harmful by nature and we should put an end to our hostile feelings toward other people. It also suggests that we should try to understand others who are different from us, and overcome our resentment and grudges. Indeed, we should build a society, based on reconciliation and understanding, not hostility and resentment. In our society, there are intense hostilities between the left and the right; between progressives and conservatives; and between the poor and the rich. Hostilities also deteriorate friendships between the young and the old -- and even between men and women. It is high time that we put an end to the hostilities that have plagued our society. Kim Seong-kon Kim Seong-kon is a professor emeritus of English at Seoul National University and a visiting scholar at Dartmouth College. The views expressed here are his own. -- Ed. By Korea Herald (email@example.com
<urn:uuid:2a98da95-f2d8-433c-a939-7bfd7da39883>
CC-MAIN-2022-33
http://www.koreaherald.com/view.php?ud=20220614000802&np=2&mp=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00069.warc.gz
en
0.961933
1,118
2.9375
3
Bing’s Webmaster Guidelines have been released finally, much to the relief of webmasters trying to acquire traffic from search engines other than Google. It is very well-known that Google has been the dominating figure in the SE market until now, catering to webmasters by offering them handy tools, information, and programs for optimizing their websites. Bing had slowly and steadily risen to be a worthy competitor to Google by updating its webmaster tools, and now by introducing its Webmaster Guidelines to help webmasters have their content found and indexed within the Bing SERPs. Bing Guidelines Overview Content – Fresh content is what Bing seeks. Websites publishing in-depth, clear content is likely to be rapidly indexed and shown in the search results. The content should be worthy enough to engage the visitors and provide them the information they require. Links – Authoritative and useful links on websites help Bing to locate new content and create a vote of confidence between the interlinked websites. In the Guidelines, Bing has also included a section on link building mentioning that the first preference goes for organic links, and the best sources to build quality links are unique content, code snippets, and social sharing. Social Media – Social media is important in the search engine marketing industry. Webmasters must now give more importance to the social aspect of Bing’s indexing and ranking. This is in view of the Microsoft/ Facebook partnership, which brings about an integration of Facebook with Bing. Bing includes a visitor’s Facebook friends in their search results as a means of influencing them. This will also generate positive signals that can have an impact on organic rankings. Indexation – Bing defines variant ways for the content to be indexed by the search engine. Links pointing to the content or usage of features such as Submit URL and Sitemap within Bing webmaster tool leads to quick content indexing and displaying in the SERPs. Advanced Crawl Control feature helps to manage the crawl action of Bingbot. Technical – This segment of the Bing Guidelines lists some technical aspects that have an impact on the crawling, indexing and ranking features of a website. The section provides instructions related to aspects such as page load time, robots.txt, sitemap, site technology, redirects and canonical tags. SEO – Effective search engine optimization helps to enhance a website and make the content easily accessible for both humans and search engines. The Guidelines describes the various SEO techniques webmasters must focus on when optimizing the websites. These include Title tags, Meta Description, Alt tags, header tags, internal and external links, social sharing, crawlability of XML, robots, navigation, site structure, rich media warnings, and detailed information about some on-page SEO factors to follow. Avoid – This section of the Guidelines spells out the don’ts for webmasters. Over optimization techniques such as cloaking, link schemes – link farms, three way linking; social media schemes, Meta refresh redirects, and duplicate content are techniques that can badly affect the rankings of a website. Bing’s Webmaster guidelines are almost the same as Google’s and covers some of the basic things. Many of the professional SEO companies have already started following these guidelines and optimizing their client websites for Microsoft’s own search engine.
<urn:uuid:a7e23a92-0a4e-4586-bc71-8f9525ec1954>
CC-MAIN-2017-04
http://www.viralseoservices.com/blog/2012/12/great-news-for-webmasters-seeking-traffic-from-bing.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00181-ip-10-171-10-70.ec2.internal.warc.gz
en
0.909509
686
1.84375
2
You may not have had your first LCD television until the early years of the 21st century, but Liquid Crystal Display technology has actually been around since the 70s. Our calculator displays were LCD, your Casio digital watch was LCD, and to this day, even the ultra-modern LED televisions that cost a fortune are still, at their core, still just LCD screens. It really is an ingenious technology, where electricity and molecules of liquid crystals dance together to manipulate the light that is passing through to give us the incredibly realistic and dynamic digital images we are so used to today. The biggest and most powerful businesses have been reaping the benefits of applying LCD screen technology across their operations for years, but as research and development sped ahead, and the costs became widely accessible, it’s finally time your organisation started to leverage the power of LCD screens, too. While LCD screens were initially no more complex than your Casio digital watch of the 80s, these days they have been made big, beautiful, intelligent, durable and versatile – with a huge range of products specifically designed for exactly the business you run. Hospitality, retail, advertising, franchise-based, you name it – the benefits of LCD for your operation will overtake the initial costs in rapid-fire time. So how will your LCD screen work hard for your business? - They’re made for business Whatever you’re using your LCD screens for, be it digital advertising, signage, customer interaction, or one of the hundreds of other potential deployments across the industry spectrum, these days they are literally made for business. Once you get yours up and running, you want to know it was specifically designed to make your business more powerful and profitable, rather than open you up to the likelihood of constant repairs, replacements, modifications or money not-well-spent. - They’re highly adaptable Unlike that Casio watch, your LCD screen won’t be able to do just one thing – they’ll be capable of doing it all. Now not only affordable for every type of business but also built to last according to the way you’ll use it, your business-grade screens and monitors will work hard throughout the day and night in harsh operating conditions, doing the tasks you imagined with incredible flexibility and adaptability. And when you consider that you’ve been able to hand-pick the exact specifications and features that work best for your business, that’s like a Holy Grail for any organisation. - They’re cost-saving It goes without saying to point out that if you’re replacing your static advertising or signage with LCD screens, it won’t take long before the constant printing and installation costs are fully repaid – and then you’re saving on those sorts of ongoing costs each and every day going forward. But there’s also no doubt that today’s eye-grabbing LCD images, and the fact that you can bring those images to life and constantly update them to your heart’s desire, will simply attract more customers and clients – which is why so much R&D went into making them easier to see in all light conditions and from all angles, and to work just as hard as the machines on the production line or the staff on the ground. - They’re easy If you’ve been thinking the benefits of LCD are not worth all the complicated wiring and setup difficulties, the product failures and downtime, the electrical safety hazards, the need for complex training and all the other headaches of implementing next-generation technology in your business – we’ve got good news for you. Once this sort of technology enters the for-profit world of commercial enterprise, it speeds up, simplifies, improves, gets tougher, more secure, more powerful, longer lasting, more feature-rich and generally business-friendly at an astronomical rate. So all that’s left to do is to start browsing for the LCD systems that will start doing the profit-boosting, cost-saving, productivity-supercharging and customer-pleasing that you’re dreaming of. Have fun!
<urn:uuid:10c01588-df43-4f90-80f7-4c960a821817>
CC-MAIN-2022-33
https://www.clicktechtips.com/the-4-ways-lcd-screens-will-work-hard-for-your-business/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00077.warc.gz
en
0.954404
852
1.585938
2
a disease caused by toxoplasmas, transmitted chiefly through undercooked meat, or in soil or cat feces. Symptoms generally pass unremarked in adults, but infection can be dangerous to unborn children. This is a photo of the disease Toxoplasmosis under a microscope. this desae is passed through the contamint of raw or under cooked meats. - swollen glands - muscle aches and pain this is chart of how Toxoplasmosis passes from animals to humans. this tells abToxoplasmosisout the disease that pass through animals mainly dogs and cats mainly Toxoplasmosis. This video tells how cats spread Toxoplasmosis and the effects it has on pregnet women.
<urn:uuid:c2021b17-16cc-44c1-bbaf-e0482d531a59>
CC-MAIN-2016-44
https://tackk.com/dl5a7m
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718296.19/warc/CC-MAIN-20161020183838-00540-ip-10-171-6-4.ec2.internal.warc.gz
en
0.921252
152
3.484375
3
Expectations for the Afghan peace process should be measured. With the Taliban’s increasing leverage in negotiations and refusal to join in the talks, lasting peace remains elusive. - By Marvin G. WeinbaumDr. Weinbaum is currently a scholar-in-residence at the Middle East Institute. Hopes for reviving the Afghan peace process have risen once again. Meetings on Jan. 11 and Jan. 18 in Islamabad and Kabul brought Afghan and Pakistani officials together with representatives from the United States and China in order to chart a path toward resuming peace negotiations. Discussions with the Taliban broke off in early July when Afghan sources revealed that the insurgency’s spiritual leader, Mullah Omar, had been dead for two years. It was with Omar’s supposed blessing that Mullah Akhtar Mansour, his second-in-command, participated in the Pakistan-hosted July meeting. Mansour’s cover-up of Omar’s death reportedly angered many within the Taliban’s senior command, and his self-appointment as successor brought about challenges to his leadership, including those from his chief rival Mullah Mohammad Rasool. A harried Mansour then backed out of a second round of talks. The Taliban was notably absent from the two quadrilateral discussions intended to restart the negotiations. Despite some positive signs, there is no assurance that any senior leader will attend the next round of talks scheduled for Feb. 6, or that any participants can speak for the now fragmented Taliban movement. Mansour’s rivals include several who are firmly opposed to negotiations and are determined to achieve military victory. Their resolve has undoubtedly been strengthened by the steady setbacks suffered by government forces in what is usually the offseason for violent battles, and exemplified by the steady gains made by the Taliban in Helmand province. Reportedly, one-third of the country’s almost 400 districts are contested or under insurgent control. Although the Mansour faction has retained its political office in Qatar, its field commanders show no interest in curtailing their attacks in the interest of negotiations. Nor has Mansour seemed anxious to join in peace talks. On Jan. 24, his spokesman at an international conference in Qatar did not budge from the Taliban’s long-standing set of preconditions for entering negotiations, including demands that all foreign forces must first leave Afghan soil and Taliban prisoners be freed. Mansour was also reported on Jan. 7 to have expelled two senior members of his leadership council who had been part of a team slated to participate in the aborted talks in July. Still, the disarray within the Taliban’s leadership could improve the chances for negotiations. By entering talks, participating Taliban leaders may see an opportunity to gain factional advantage through the international recognition they receive. Leadership divisions may also allow Pakistan to increasingly lean on those elements of the insurgency over which it has some influence. But thus far, presumptive Taliban pragmatists have shown no signs of softening their demands or yielding to appeals from Pakistan to negotiate. President Ashraf Ghani’s political problems may also impede peace negotiations. Although supportive of the latest diplomatic initiatives to revive talks, he is still recovering from popular suspicions that he betrayed Afghan interests with his conciliatory approaches to Pakistan. Ghani’s domestic critics continue to doubt Pakistan’s sincerity in pursing negotiations. Additionally, critics in Afghanistan fear an agreement could compromise political and social progress from the last 14 years. As a response to his critics, Ghani, in a Dec. 28 meeting with Pakistani army chief Raheel Sharif, insisted that any new talks must be clear on three points: Afghans need to feel confident that Pakistan is cooperating honestly in regards to the peace process; any agreement must protect Afghanistan’s democratic institutions; and Taliban participants must represent their respective groups and not a parallel Afghan government. Pakistan may overcome Afghan doubts about its intentions, but the other two declared red lines involving democracy and Taliban identity are more daunting. The Taliban, for whom state legitimacy rests on having a government strictly compliant with Sharia law, has long expressed its contempt for the Afghan political system, specifically its democratic elections and constitution. Taliban interlocutors are also unlikely to disavow their identification with an Islamic Emirate, as became clear at the Pugwash conference. Ghani has set yet another condition by saying that Afghanistan would refuse to negotiate with any group it considers terrorists. However, the Kabul government contradicted this stance at the January Islamabad meeting, appearing to go along with a Pakistani proposal that all groups should be allowed to participate in negotiations without preconditions in peace talks. The door must always remain open to serious Taliban peace overtures. Yet, the relentless search for Taliban peacemakers carries notable drawbacks. The most obvious concern is that negotiations will unavoidably confer legitimacy on a movement that has long coveted international approval. Formal talks also stand the danger of confounding for undecided Afghans whether the Taliban is the enemy or a negotiating partner. Afghan government officials, including both former president Hamid Karzai and Ashraf Ghani, have further sowed confusion by referring to Taliban members as “brothers” in efforts to draw their leaders into negotiations. The very prospect of negotiations has led the United States and its allies to pull their punches politically and militarily against mainstream Taliban leadership within Pakistan. Washington has never placed the Taliban on the list of Designated Foreign Terrorist Organizations, which mandates sanctions, and it is no secret that while targeting the Haqqani Network, ISIS, and other militant groups with drone strikes, the United States has spared the Quetta-based Taliban. While pressing Pakistan to end its practice of differentiating between its good and bad extremists, Washington appears to want Islamabad to distinguish those Afghan insurgents liable to join negotiations from those it wants killed. Negotiating and fighting simultaneously is a time-honored strategy. One can obviously leverage the other. But when the strategy is taken from a position of growing weakness, it is more likely to be used to stave off defeat than to facilitate compromise. The Taliban easily interprets the eagerness of the Kabul government and its international backers to begin talks as evidence of their desperation. But should some Taliban factions finally decide to attend peace talks, anyone pinning hopes on an early end to fighting through a grand political deal should bear in mind that negotiations in far less complex conflicts have, as a rule, stretched over years. A full appraisal must further consider that without reversing the deteriorating military situation, the Taliban and not the Afghan government will hold the bargaining advantage. And even were an agreement negotiated, there is reason to doubt its winning broad acceptance and having effective mechanisms of enforcement. Realistically, the Afghan conflict’s eventual outcome will most probably be decided on the battlefield. SHAH MARAI/AFP/Getty Images
<urn:uuid:dbfe1bdb-2b0c-40bc-95d2-4bca00557d10>
CC-MAIN-2017-04
http://foreignpolicy.com/2016/02/05/straight-talk-on-afghan-peace-talks/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00409-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965707
1,386
1.992188
2
Using database field validations in your LANSA functions |Product/Release:||LANSA - All Platforms| |Abstract:||Existing database field validations can be used in a LANSA function without having to add lots of checks to individual functions.| |Submitted By:||LANSA Technical Support| In many batch and/or print functions, a selection screen is displayed where certain details can be selected. Function A, for example, is used to print a list of all the orders for a given customer and a given period. The user can choose a customer and a start and end date. The function checks that the customer number exists and that the date fields are valid dates. Function B is used to print a list of all invoices for a selected customer for a given period. This function performs the same validations as function A. These validations can be centralised in the data dictionary instead of being executed in each function by defining a dummy file in LANSA. This file can contain all the possible selection fields and their validations defined with the option ADDUSE (LANSA will only perform the validation when the field is included in the GROUP_BY). Example of a validation: All validations in the function can now be replaced by ONE command: INSERT(selection fields) TO_FILE(selection file) CHECK_ONLY(*YES) Example RDML of a function: * Define screen GROUP_BY NAME(#GB_SEL) FIELDS((#SELNUM) (#SELDATF)(#SELDATT)) FUNCTION OPTIONS(*DIRECT *NOMESSAGES) BEGIN_LOOP * Initialise screen fields CHANGE FIELD(#GB_SEL) TO(*DEFAULT) * Request selection details REQUEST FIELDS((#GB_SEL)) * Validate selection fields INSERT FIELDS((#GB_SEL)) TO_FILE(ASPSEL) CHECK_ONLY(*YES) * Call print function SUBMIT PROCESS(ASPTEST) FUNCTION(ASPT002) EXCHANGE(#GB_SEL) JOB(PRTSKIL) OUTQ(*USRPRF) END_LOOP If there are too many selection fields, it is possible to define a dummy file per application.
<urn:uuid:dbabeaf6-ce40-41fd-892b-4fa66a084317>
CC-MAIN-2017-04
http://www.lansa.com/support/tips/t0088.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00533-ip-10-171-10-70.ec2.internal.warc.gz
en
0.694857
493
1.617188
2
Two years ago, everything about Obamacare was in the future. Recall the revealing comment at the time by then-Speaker Nancy Pelosi (D–CA) that Congress had to pass the legislation to see what was in it. Now that the disputed law is in its implementation stage, Americans are beginning to see what is in it and what it means for them. Welcome to the future. The Patient Protection and Affordable Care Act, better known as Obamacare, is the centerpiece of the current progressive agenda. At its core is the requirement for individuals—under penalty of law—to buy health insurance. As we have argued before, this requirement is unprecedented and unconstitutional. The concern is that if government can regulate inactivity, it can do anything and everything. We now see how this new regime will operate. Massive regulatory authority over one-sixth of the American economy is transferred to a collection of more than 150 federal agencies, bureaus, and commissions, along with an unprecedented delegation of power to the Secretary of Health and Human Services. As a result, key policy decisions are given over to bureaucrats whose “rules” in the guise of “regulations,” mostly unaccountable and invisible to the public, have the full force and effect of laws passed by Congress. This new bureaucratic reign, its arbitrary discretion, and the resulting potential for cronyism can be seen in Obamacare’s earliest actions. Even before the law is fully implemented, administrators have granted almost 2,000 waivers (mostly for union and business friends) to its own health care regulations. One whole program (the CLASS Act, Obamacare’s long-term care insurance plan) has been unilaterally cancelled as completely unworkable—but kept on the books for possible future implementation. We now have the first real taste of what is to come. Not only do we have to buy health insurance, but now they’re telling us what that health insurance will look like. It turns out that under Obamacare—earlier denials to the contrary notwithstanding—all insurance plans must cover, at no charge, abortion-inducing drugs, contraceptives, sterilization, and patient education and counseling for women of reproductive age. Religious employers such as Catholic hospitals, Christian schools, and faith-based pregnancy care centers will have to provide and pay for such coverage for their employees regardless of their religious beliefs. Although religious institutions vehemently objected that the proposed rule would force them to provide services that as a matter of faith they find morally objectionable, Health and Human Services issued the final rule in its entirety and without the slightest change. This is not a one-time exception to the rule of Obamacare; it is the establishment of the rule itself. One can only imagine what life will be like when the Independent Payment Advisory Board (IPAB) begins rationing health benefits to reduce Medicare spending. It is not the details in Obamacare that are the real problem but the form of governance it establishes, by which unelected experts are empowered to make the rules as they go along. What is happening has little to do with health care or even public policy and everything to do with the role of government in the most immediate and intimate matters of our lives. All is subject to government control, regulatory dictate, and administrative whim. Nothing will be allowed outside of the new regulatory scheme: no independent state programs, no individuals or businesses permitted not to participate, no true private market alternatives. There should be no surprise here. This is the heart of the progressive project. It is what happens when a model of government focused on determining outcomes, despite good intentions, finally acquires the unlimited authority to reshape society to its bureaucratic blueprint.
<urn:uuid:362d3e4f-16e4-4c50-b24b-883c0428ccca>
CC-MAIN-2017-04
http://dailysignal.com/2012/02/22/despotism-thy-name-is-obamacare/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00434-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962706
742
1.84375
2
by Nona Estrin Walking the path south of our yard, to see a broad-winged hawk nest, I’m noticing something curious. I’ve seen it before, but for how long? Occasional tufts of dried maple leaves are here and there. They’ve been pulled together and partly down into a worm-sized hole! This and the mid-May snow … how strange. At the nest, still visible before the leaves come out completely, there’s the familiar form of the female, sitting tight, only her head showing as she starts the long process of brooding, even as it snows lightly.
<urn:uuid:04ae872b-8362-4dc7-9d99-f65ff806cb5f>
CC-MAIN-2022-33
https://montpelierbridge.org/2016/05/nature-watch-time-for-brooding/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00074.warc.gz
en
0.958389
137
1.671875
2
Guest Author - Mindy Graham Adoption in itself is one of the greatest gifts. It gives to all sides. The child, the family, and the community all benefit. In some cases however that truth expands beyond the family, beyond the friends, beyond the local community, and on to the world. This is precisely what Reece’s Rainbow does. Down syndrome is a life changing diagnosis, and unfortunately abroad many people are blind to the gifts of these wonderful children. Reece’s Rainbow is changing the world one family at a time. In a dual mission they fight to find these kids a loving home and to raise awareness about the potential of these little ones. They have already had vast success, having brought home close to two dozen children with Down syndrome and other disorders. Those that are home are flourishing in loving and supportive families and they are exceeding everyone’s expectations. The list of families committing to adopt grows daily. But so does the list of newly “discovered” children who need homes. Some of these kids are in dire need help. In fact many of these children face an institution around the age of four, an often unpleasant place that caters to regression. As hard as these children worked to gain the skills they do have they will lose many of them while confined to their cribs with little stimulation. In some countries once they enter these institutions they are no longer eligible for adoption so there is a literal hour glass for these “older” angels. Until the world understands the beauty in front of them the best chance for these young children is with new families who are devoted to teaching them new skills and helping them obtain their full potential. There is an ever changing list of Down kids who are just waiting for a family and all have been waiting for far too long. There is also the “Other Angels” who come very all regions of the world with a vast variety of conditions and the sweetest faces you can imagine. There is one (little girl) in particular on this site who breaks my heart. Some of these kids have no intellectual challenges and will still spend the rest of their days in an institution if a family is not found in time. Not every family can adopt – but everyone can help! You can sponsor a waiting angel and fund a grant for their future parents, or you can help a family in their quest to bring home their own bundle of joy. Or you could simply spread the word and help Reece’s Rainbow reach your part of the world! Please visit reecesrainbow.com
<urn:uuid:8e9f6430-04f9-4c81-8ec3-0d6efa4cc231>
CC-MAIN-2017-04
http://www.bellaonline.com/articles/art56677.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00565-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963124
530
1.679688
2
Georgia Wildlife Resources Division 2067 U.S. Hwy. 278, SE, Social Circle, GA 30025 Three exotic pastures grasses are common in Georgia: Bermuda, bahia and fescue. These grasses were introduced for soil erosion control, hay production and forage crop for grazing animals. While they work well for these purposes, unfortunately they provide poor conditions for bobwhite quail and also are invasive, often outcompeting desirable plants. Habitat Problems with Exotic Grasses Bobwhite quail need a mosaic of annual and perennial weeds and grasses along with shrub and briar thickets. Examples of good native weeds and grasses for bobwhites include: beggarweeds, partridge peas, ragweeds, lespedezas (not sericea), milk peas, wild beans, broomsedge, Indian grass, etc. These plants provide nesting and brood-rearing cover along with food. Dead leaves from the previous years growth of clumped native grasses provide important nesting material. With the introduction of exotic pasture grasses like Bermuda, bahia and fescue, native weeds and grasses are often out-competed and largely absent from pastures, hay fields and idle areas around farmlands. Exotic grasses are aggressive and encroach into areas where they are not desired. Often times Bermuda grass is seeded into filter strips or farm roads and continually encroaches into crop fields, requiring constant vigilance by the farmer. These grasses are hard to control and pose a continuous challenge in areas around farmlands that are managed for bobwhites, for example field borders, hedgerows and field corners. Bobwhite Ecology Problems with Exotic Grasses Perhaps the most negative impact of pasture grasses is through the reduction of brood-rearing habitat. Brood-rearing cover (areas that were burned or disked the fall-winter before the hatch) consists of plants like ragweed that provide a canopy of overhead cover with open ground underneath, which facilitates mobility. These areas provide chicks with an abundance of insects, which is important for rapid growth and development, protection from predators and shade for cooling. Hens typically will select a nesting site near quality brood habitat so chicks can be led to the area to forage for insects quickly. When matted grasses are present, chicks must attempt to walk or climb over these sites. This results in a reduction in insect foraging time, increased energy expenditures, increased exposure to predators and perhaps increased air temperatures. These factors work together to lead to reduced chick survival. Control of Exotic Pasture Grasses Herbicides provide the only effective method for the control of exotic grasses. Complete elimination is best, but often times may be impossible to achieve. Depending on the situation, the best approach may be to selectively treat the worst spots on a periodic basis to maintain the majority of the site in a useable condition for quail. The choice of chemical(s) to use varies by the type of vegetation present and other site conditions. For specific recommendations, contact your local County Cooperative Extension Specialist. Fact Sheet: Herbicide Control of Bermudagrass
<urn:uuid:a20625cc-af1d-4a91-af81-f1078b3a8f4f>
CC-MAIN-2017-04
http://www.georgiawildlife.com/print/2248
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00246-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933778
656
3.171875
3
Nepali will soon launch a cholera vaccination drive after a deadly outbreak that started early last month killed at least six people and affected over a thousand so far in several villages Nepali will soon launch a cholera vaccination drive after a deadly outbreak that started early last month killed at least six people and affected over a thousand so far in several villages. The World Health Organization (WHO) has confirmed to provide over 250,000 oral vaccines to mitigate the situation. The outbreak--first reported in the first week of October--spread over at least two districts of Lumbini province, killing six people, including three children, and hospitalizing hundreds of people. Initial efforts by health authorities failed to contain the disease, which later spread to nearby villages. The Ministry of Health and Population has now decided to launch a vaccination campaign in the affected villages. In a statement on Sunday, the ministry said, “The World Health Organisation’s International Coordinating Group (ICG) Cholera Secretariat has informed us that our effort to get the oral cholera vaccine from the global stockpile has succeeded.” The government will soon receive 252,363 doses of oral cholera vaccine for the disease-hit areas and a vaccination program will be launched, an official of the health ministry confirmed. “Vaccination is needed in the disease-hit areas to contain a further spread,” Bikash Devkota, the secretary for Provincial Ministry of Health and Population, was quoted as saying by the Kathmandu Post. If we do not launch a vaccination drive, he added, the deadly disease could remain in society as chronic a problem. Nepal, which has poor public health infrastructure, often struggle to contain contagious disease like cholera. The primary reason is the lack of safe drinking water and a proper sanitation system. Aid agencies operating in the country along with health authorities will carry out the vaccination drive. In 2014, during one such outbreak, the government had carried out a ring vaccination drive in the affected areas with the help of aid organizations.
<urn:uuid:2f8200ef-1f18-4ff1-8577-fc46ea6ac392>
CC-MAIN-2022-33
https://www.southasiamonitor.org/index.php/nepal/nepal-launch-cholera-vaccination-drive-after-outbreak-kills-six
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00073.warc.gz
en
0.958858
431
2.171875
2
The first Federalist essay appeared in The Independent Journal in October 1787, just 4 weeks after the Constitutional Convention presented the U.S. Constitution to the states for ratification. It was one of an eventual 85 such essays, which argued in strong support of the Constitution, and which were published serially in New York newspapers during the next 6 months. Later compiled into a single volume entitled The Federalist, the collection of essays is considered to be one of the most important articulations of American political philosophy to this date. The political philosophy contained in The Federalist is based on the theories of the European philosophes of the Enlightenment, historical examples, and the experience of the United States under the Articles of Confederation. The essays not only provided historical arguments and philosophical theories about the nature of individuals and government, but also strong criticisms of the weaknesses inherent in the Articles of Confederation The overall purpose of the essays was to convince the people that a more energetic and stronger centralized government would be more protective of their liberty. The European philosophers influencing the statement of political philosophy in The Federalist included John Locke, Jean Jacques Rousseau, Montesquieu, and Thomas Hobbes. These philosophes thought in terms of natural rights, and described the forms of government best suited to protect these rights. They acknowledged that an individual's impulse towards self-preservation, liberty, and self-interest would fundamentally come into conflict with the competing needs of other individuals. Therefore, the best form of government balanced the selfish needs of the individual with the need to protect the whole community. The theoretical idea that too much liberty can be bad for an orderly society was evidenced by the U.S government during the years of the Articles of Confederation. The Articles provided for only a loose confederation of independent states, and the national government rested in a single legislative body called Congress that was vested only with the authority to legislate on matters related to mutual defense. Fearful of creating a strong central government similar to Great Britain, delegates placed significant power with the state governments and greatly restricted the powers of the national government. Congress was hampered by its own lack of power to enforce its laws, collect funds, regulate trade, or to provide uniform and binding judgment upon each of the member states. Many far-sighted leaders realized that the self-interests of the states would eventually tear the union apart, and that the Articles of Confederation provided no legal or political means to stop it. States quarreled with one another over land claims, commerce regulations, and frequently erected imposts against neighboring states. Although strictly forbidden by the Articles, states established relations and treaties with foreign nations and refused to send much needed tax money to Congress. Due to the difficult amendment process, attempts to endow congress with greater authority to tax and to regulate commerce could be stopped by the refusal of a single state. Interested in bringing a degree of unity to at least trade and commerce, the Virginia legislature called a meeting of delegates from states interested in devising uniform trade regulations. Despite the sparse attendance of states at the Annapolis Convention in 1786, this meeting inspired another meeting for the express purpose of revising the Articles of Confederation. Leaders' worries about the chaos that results from too much liberty came to fruition with Shays' Rebellion in the winter of 1787. A disgruntled farmer named Daniel Shays demonstrated the inability of a weak central government to stand in the way of personal liberty and self-interest. When he staged a rebellion against unfair tax laws in Massachusetts, he provided all the incentive needed for 12 of the 13 states to attend the Constitutional Convention in Philadelphia that following May. The state could barely stop the rebellion, and the national government had no power to do so. The experience during the Articles of Confederation led delegates to believe that a weak central government did not have enough authority to provide order and security or to protect the rights of individuals. They agreed to do away with the old system completely, and at the end of the summer of 1787, the convention presented a new plan of government entitled the U.S. Constitution. This document called for a strong central government, one that would be the authority over all the state governments and that would provide a unified authority on legislating, enforcing and judging laws. The Federalists applauded the document for bringing such energy to a centralized body. The Anti-federalists feared what the new plan would do to encroach upon individual rights and liberty. The federalist papers provided strong and rational justifications for each choice made by the Constitutional Convention, and also persuaded citizens that by placing less power in the hands of the people, the government could provide greater protection for the people. The authors of the federalist essays, Alexander Hamilton, James Madison and John Jay, sought to explain the superiority of the new plan through the use of historical examples, references to the natural rights and behaviors of man, and by appealing to the reader's sense of patriotism. Although the document originated with Alexander Hamilton's concern about ratification of the U.S. Constitution in the state of New York, leaders in many states used the arguments constructed in the essays to support ratification of the Constitution. Since both Hamilton and Madison had served as delegates to the Constitutional Convention, the essays were all published under the name Publius. They felt their arguments would be criticized as subjective because they took a large part in crafting the very document they defended. The struggle for ratification in New York and Virginia, two of the most powerful states, continued even after the Constitution received the required 9 of 13 state approvals. Technically, the Constitution would have gone into effect whether New York or Virginia ratified or not. But the composing of the federalist essays was not a pointless exercise, despite the fact that the Constitution became effective without New York's support. In attempting to convince the American audience that they had the unique opportunity to be a part of the first experiment with a federal republic, Publius succeeded in articulating a uniquely American political philosophy, practical in nature, yet founded on solid historical examples, philosophical theories, and most importantly on the experience of a nation that had actually struggled to achieve the much theorized balance between liberty and order. Take a Study Break!
<urn:uuid:c28c4955-6cb7-425c-8091-d9a4c64b3141>
CC-MAIN-2017-04
http://www.sparknotes.com/history/american/federalist/context.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00458-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958513
1,252
3.953125
4
Top Benefits of Using Managed Ethernet Switches When choosing between managed and unmanaged industrial Ethernet switches, it is a simple calculation: the more complex or likely a network will grow in the future, the more managed switches are needed. A managed vs. unmanaged switch ultimately comes down to control and what level users want. Managed switches are often referred to as “intelligent switches”, offering advanced control and used for applications requiring network traffic monitoring or segmentation and a high bandwidth. They use software to analyze and improve network performance and users are able to choose the optimal operating parameters for the application at hand. In this white paper, we will explore some of the top benefits of using industrial managed Ethernet switches: 1. Advanced management & troubleshooting capabilities Finding data and functionalities you need in a switch can be frustrating if you do not have the ability to manage and monitor diagnostics and network performance capabilities. With these types of tools, users can get help with field troubleshooting in industrial applications, verifying the first-line connection in the same network, log system messages based on severity level and more. In addition to these features, some managed switches also offer fiber SFP monitoring. This monitoring system allows users to see “Temp,” “Tx/Rx Power,” “Voltage” and get automatic warnings sent directly to “E-mail,” “SNMP” or “Log.” 2. Network traffic optimization With managed switches, users have the ability to examine how much data — and the various types — that are being received and sent from each port. With the ability to examine the traffic flow, comes the ability to decide how to control and optimize it, such as network segmentation with multiple groups. Managed switches are able to logically group devices together to isolate traffic between groups, even when the traffic is passing over the same physical switch. Also, the Internet Group Management Protocol (IGMP) capability allows a switch to “listen in” (commonly called “IGMP Snooping”) on network multicasts. The switch then delivers traffic to ports where the attached device signals that it is available to listen to the broadcast. 3. Virtual Local Area Networks distribution Managed network switches may be programmed to distribute data to Virtual Local Area Networks (VLANs). VLANs are subgroups of data interfaces, created by programming instead of wired connections. There are two basic types of VLANs: • With an IEEE 802.1Q VLAN, the switch inserts a VLAN header in each information packet to identify VLAN recipients. • With a Tag VLAN, the VLAN is assigned to a specific port. All users of the port must be members of the same VLAN, which simplifies network management. A single connection can be used to manage multiple VLANs – physical location is irrelevant. 4. Cybersecurity – features & security access Switches can limit network access to only trusted devices and prevent users from setting up an unauthorized sub-network. Managed switches also limit management plane access via user authentication such as RADIUS, LDAP and more. 5. Redundancy & resilience Redundancy — where mission-critical components and functions are duplicated — is the surest path to system reliability. Avoiding unplanned downtime in industrial applications is For example, you can reduce redundant network cabling and planning costs through “self-healing X-Ring™ recovery technology” of managed Ethernet switches available from B+B SmartWorx powered by Advantech. The sub-20ms self-healing X-Ring ™ rapid auto recovery technology allows different ring-healing methods to coexist in one switch and supports different topology options, providing a substantial improvement over Spanning Tree and Rapid Spanning Tree. The original redundant ring technology, Spanning Tree Protocol or STP, allowed ring recovery times of 30 seconds, which is too slow for many industrial applications. Different ring-healing methods include couple-ring, dual-homing 6. Flexibility & future expansion Network change and expansion Ethernet can transmit data from a variety of older technologies and has effectively extended the life of these technologies into the foreseeable future. It is also leading-edge in its potential for speed and applications. History suggests Ethernet will long be the standard, meeting the demands of new technologies. Managed switches will likely continue to be essential components of advanced networks.
<urn:uuid:d61284e4-43c3-48d6-b8cb-fe3d447c7b46>
CC-MAIN-2022-33
https://www.advantech.com/resources/white-papers/ee6c56ab-f963-4e46-bcdf-f61cc57295b7
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00476.warc.gz
en
0.904064
941
1.960938
2