text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Join Date: May 2003 Thanked 0 Times in 0 Posts Rep Power: 0 A few years ago, there was a photo of a guy in a Macgregor 25 who had hit a floating hazard in New York harbor, and holed his boat. He was able to motor back into his point of origin, with about 12 inches of freeboard, due to the built in flotation. The original version of the Pearson Ensign (3000 lb displacement) had no flotation, and several people were drowned when caught by bad weather while racing in San Francisco harbor. Subsequently, all Ensigns sold had foam flotation built in. Other similar sized boats having flotation (Air tanks or sealed compartments) include the Soling and the J-22. A friend left the flotation compartment on his Soling open, and had to hire a crane to retrieve his boat after it capsized and sank. My first sailboat was a wooden 16 footer with a fixed keel and a 19 foot wooden mast. It was very easy to capsize and sank like a rock, but sat upright after sinking. I was careful not to sail in deep water so I could retrieve it if I capsized. Since then, I have stuck with boats having flotation.
<urn:uuid:953946be-b8df-4b47-8c19-59d85e6acf58>
CC-MAIN-2017-04
http://www.sailnet.com/forums/433609-post20.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00282-ip-10-171-10-70.ec2.internal.warc.gz
en
0.985965
261
2.203125
2
The importance of breathing is vital to our very existence and helps us to stay truly in the PRESENT! The Importance of Oxygen I would like to take this time to address the most essential element that is important for our day to day survival and that is…”oxygen” or O2. We can survive without food for days, survive without water for a few days, but we cannot survive without oxygen if we are deprived of it for more than 2 minutes. Getting Oxygen through Breathing The way that we get this essential element is by “breathing.” We either breathe in through our nose or in through our mouth. We take this automatic function for granted and at times do not realize how often we are not truly breathing to our utmost full capacity. When we are either under stress, angry, frustrated or afraid we hold our breath in response. Less Oxygen Means More Tension Over time when our bodies are placed in these situations we unconsciously start to breathe less and less to the point where all of a sudden we are short of breath, have sleep apnea, or as extreme as needing an oxygen tank to breathe. We learn to operate with less oxygen and hence we start to develop tighter muscles, decreased flexibility and wonder why we don’t get as much rest when we sleep at night. Our bodies soon become bundles of stress and tension which eventually leads to an increase in blood pressure, cholesterol, digestive problems, pains, more frequent colds, and even as extreme as cancer. Types of Breathing – Is there a right way to breathe? I have had the privilege for the past 12 years to witness all types of breathing- breathing in through the nose or in through the mouth; chest breathing, diaphragm breathing, and different yogic breaths. It still is amazing for me to see someone breathe not only into their stomach but eventually throughout their whole entire spine from the tailbone up through the top of their head. A Deep Breath Makes all the Difference It truly is a “very, very good” job when someone takes a deep breath throughout their whole entire body and become connected with one’s own internal rhythm and knowingness. I am truly blessed to be present as my practice members take the time out of their hectic schedules and life to take the time to prioritize themselves. Teaching the body how to breathe even in the midst of stress, anger or fear is something that I strive to instill in all of my practice members in the first months of care. Breathing helps us to bring more oxygen into our bodies, which helps all of our cells to regenerate, heal, and grow. Breathing also brings us back to the PRESENT moment. When you consciously take a breath in, you truly become present with your body and become aware of deep, short, restrictive, easy breaths. If you have never been to one of my life talks, I would like to entreat you to try this one breathing exercise, which seems rather simple but will show how breathing truly brings us into the present moment. Breathing Exercise and BE-ing the PRESENT Here is the breathing exercise – try and think about a past event that was either a happy moment or a very challenging event and hold onto this moment in your mind. As you hold onto this moment, you will likely feel a corresponding emotion and as you continue to hold this memory in your mind, try and take some deep breaths in and at the same time try to hold onto this memory. See if you can hold onto this memory or is it a struggle? As bizarre as it may seem, it is almost impossible to hold onto a past memory or event when you are taking deep breaths. The reason being is that when you focus on your breath, you literally force yourself to feel your lungs expand and contract as you breathe in and out. It is truly hard to not stay in the present moment as you feel your breath enter and exit your body. My Personal Experience with Breath I realized this simple concept upon reflecting a time when I was around 9 years old and came running to my mom full of anger due to something that just happened to me and my mom simply told me, “Chad, please just take seven deep breaths.” Of course I being the stubborn and willful soul that I was, did not want to breathe, but wanted to complain about how angry and hurt I was. My mom just persisted and said, “Please humor me Chad and take 7 deep breaths.” So I said I would if she would listen to my complaint once I was done with my 7 deep breaths. As I started to take the deep breaths in, even though I was still angry and hurt, as I got to the third breath and then the fourth breath I started to get calmer and not as angry. By the time I got to my seventh breath, the most amazing thing happened which was that I truly forgot what I was angry about and walked away in a better space than before. The Essence of the Body Learning How to Breathe I share this funny story about something that happened to me a long time ago and it was not until 12 years ago did I see how important it is for us to breathe deeply, but more importantly for our bodies to have the ability to breathe even in the midst of stress, anger or fear. By receiving the breath of life and by breathing to the fullest of our lung capacity is a gift of truly being in the PRESENT. I suggest for you to take the time to be aware of your breath and see what happens when you get angry, focused or stressed. By taking the time to breathe and to just be, is a precious gift that you can give to yourself and your loved ones too. We can remind ourselves to breathe with our minds, but the moment we focus on a project, get bombarded with assignments or different things happening all at once, we forget to breathe consciously. So why not get your body to learn how to breathe in the midst of chaos or stress, so that way your mind can stay clear and figure out the appropriate response to the stress? The moment our bodies learn how to breathe in all different situations – good or bad; is when we achieve the benefit of not holding onto and storing stress in our muscles and bones. This new found strategy of our body breathing frees our mind to be aware of and conscious of other goals or things we want to accomplish and experience. Please share any comments and experiences
<urn:uuid:9bc6787f-37f6-425c-b9e3-07c9161c4e8e>
CC-MAIN-2022-33
https://www.infinitebodyawareness.com/breathing-is-essential/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00277.warc.gz
en
0.969779
1,329
2.3125
2
Guy Gibson was one of Bomber Command’s most famous officers duringWorld War Two. Gibson was awarded theVictoria Cross for his leadership during the legendary Dambuster Raid of 1943. As follow-up Lancaster bombers from 617 Squadron approached their target, Gibson flew his Lancaster alongside them to effectively double-up the amount of fire from the aircrafts that could be aimed at German gun emplacements based on top of their targeted dam. Gibson was seen as too valuable in terms of his propaganda value to be allowed to fly after the raid. He toured America and Britain and was effectively retired from engaging the enemy by his superiors. After a great deal of pleading, Gibson was allowed to fly ‘in anger’ and on the return from one of his missions over Europe, Gibson’s Mosquitocrashed and Gibson and his navigator, Jim Warwick, were killed in September 1944. The official cause of the crash has always attracted a degree of scepticism among aviation historians. As no one could officially say what happened two theories were forwarded: the first was that Gibson ran out of fuel and crashed as a result. Critics of this cause countered it with their belief that Gibson was too skilled as a pilot to allow something so basic to bring him down. It was also said that if Gibson could fly a Lancaster bomber at such low heights as the Dambuster Raid required, he was certainly skilled enough to glide down a Mosquito to enable a decent crash landing even if he had run out of fuel. The second cause was that Gibson was flying his Mosquito very low, which he was certainly skilled enough to do, but was hit by enemy ground fire. However, in October 2011 a new cause was forwarded to explain Gibson’s death. Newly found evidence indicates very clearly that Gibson’s Mosquito was brought down by what is now termed ‘friendly fire’ – that a British bomber returning from a mission over Nazi Germany mistook the low-flying Mosquito as a Luftwaffe aircraft and shot at it accordingly. Both Lancaster reports also stated that they were flying just three minutes flying time from Steenbergen in the Netherlands which is where Gibson crashed. Both combat reports were made classified by the RAF and have only recently been unearthed in the National Archives. In his tape recording, McCormack described the moment when he was questioned by a RAF Intelligence officer. “We were on the way back over Holland and then all of a sudden this kite comes right behind us twin engines and a single rudder – and it comes bouncing in towards us so we opened fire and we blew him up. “When we got back we claimed a Ju 88 show down. The following day we were called in to the office and we were quizzed again. “(RAF Intelligence Office) ‘What made you think it was a Ju 88?’ We said ‘it had twin engines and a single rudder.’ He said: ‘So has a Mosquito.’ “Well supposing – he put it very nicely – he said, ‘supposing a Mosquito – his radio and his radar was knocked out an he was lost and he spotted a Lancaster – he would only want to follow it home wouldn’t he? And it turned out it was ‘Gibbo’ we shot down.” Some still believe that Gibson crashed for other reasons. Gibson had a huge belief in his own ability to fly. He was undoubtedly a highly skilled Lancaster pilot. However, he never completed a course in how to fly a Mosquito, an aircraft that handled very differently to a Lancaster. The ‘Wooden Wonder’ was much faster, more agile and a completely different flying experience. Jim Warwick, his navigator, was also flying on a Mosquito for the first time. It would have been his job to check the fuel tanks and the level of fuel on board during the flight. Some still believe that Gibson’s Mosquito simply ran out of fuel or that it had a faulty fuel gauge on board which gave misleading readings. Bernard McCormack, however, clearly believed that it was the 600 rounds he fired at the ‘Junker-88’ that brought down the aircraft that he was later told was Gibson’s Mosquito.
<urn:uuid:e501cd1e-4d8c-4813-9d35-b165722029e5>
CC-MAIN-2017-04
http://www.historylearningsite.co.uk/world-war-two/the-bombing-campaign-of-world-war-two/the-death-of-guy-gibson/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00550-ip-10-171-10-70.ec2.internal.warc.gz
en
0.993628
895
2.6875
3
Effective Methods To Improve Cash Flow For Small Businesses Improving cash flow is quite challenging for businesses, but if one manages to fix these issues one can gain great financial returns and take his business to the next level. Without required money on hand business owners cannot make payrolls, pay taxes, or bills. Managing cash flow, the right way will help one to make his business stronger in the long run. Among the various methods to improve cash flow, invoice factoring is one. What is invoice factoring? Also known as accounts receivable or debt factoring, invoice factoring is nothing but a mechanism used mainly by small businesses wherein they sell a few of their invoices to a third party at a discounted rate to improve cash flow and revenue stability. Businesses get immediate money for those unpaid invoices which are due within ninety days span. The factoring company will immediately pay the business the outstanding invoice amount and will collect it later directly from the client’s customers. How does invoice factoring actually work? The procedure for this mechanism is super simple. Here’s how it works: Step 1: Businesses provide goods/services to their regular customers. Step 2: Businesses invoice their customers for selling goods/services. Step 3: Now it sells those raised invoices to the factoring company and in return the factoring company after verifying the invoices pays the businesses with immediate cash in bulk (almost 80 to 90 percent of the total invoice value). Step 3: The customer then pays the outstanding invoice amount directly to the factoring company. If necessary, the factoring company also chases the customers for invoice payment. Once they receive the full payment from the customers, the factoring company pays the remaining amount to the businesses after deducting a fee for their service. Why do most small businesses prefer factoring? Here are the major advantages of factoring: - Predictable & improved cash flow– Through this method, one can get a bulk amount immediately to pay the immediate necessary bills. This particular method helps both small and large-scale businesses to plan and forecast more accurately. - Makes the backbone of the business stronger– Better cash flow makes one’s business stronger. Often businesses fail to flourish due to poor cash flow. If one uses this method carefully one can get great benefits in the long run. - Easier and cheaper method than a bank loan– When one takes a bank loan, one has to pay a hefty amount as interest against the loan. The fee for debt factoring is relatively much lesser than bank interests. - Reduces business overheads– Though there are fees associated with this method of generating cash flow yet it is lesser than paying a team of dedicated professional credit control team. Moreover, chasing payments is one of the most hectic and stressful works done by businesses on a daily basis. Invoice factoring is a great method for businesses to generate cash flow that has a huge customer base. However, this method might not be helpful for businesses with fewer customers. Also, if the customers are not quite cooperative this method might not work. Businesses need to assess their customer base and use this method wisely & tactfully to get maximum benefits out of it.
<urn:uuid:36038def-37cf-4822-a792-1bf6925530ad>
CC-MAIN-2022-33
https://politistick.com/effective-methods-to-improve-cash-flow-for-small-businesses/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00473.warc.gz
en
0.956645
667
2.015625
2
With all the hype around bots and the messaging economy, it’s easy to see why most people would miss the bigger picture. The harsh truth is that bots in isolation will not deliver any benefits to the enterprise; they will probably turn into a net cash and resource drain, instead. The challenge for bots is that they need to deliver real economic and customer satisfaction benefits to the enterprise that deploys them. There is no arguing with the fact that 4 billion people are using messaging apps, and they’re likely to be the future of customer-to-enterprise communication. It’s easy to get caught up in the hype and assume you just need to get a bot launched to keep up with your competition. Unfortunately, getting the funds approved to acquire, deploy, and maintain a bot will require a real business case to justify and pay for the new tech. As you dig into the details of a customer service strategy — the area bots will fit into — you’ll quickly realize that a bot on its own can only handle a tiny slice of an enterprise’s inbound customer care traffic. The enterprise has successfully been migrating customers away from analog communication (phones) and onto digital channels for the past decade. Digital Care can make up anywhere from 10-50 percent of enterprise customer care these days. (Digital Care can be defined as all customer contacts coming through channels such as messaging, mobile apps, chat, web search, email, and even SMS.) Companies with large customer care needs have known for the last 10 years that customers’ preference for contact has been steadily shifting from phones toward all digital channels (smaller organizations avoid phones because they’re too expensive). Messaging is only the latest flavor in this general shift toward the speed, convenience, and consistent answers that digital channels can deliver. It’s no surprise that only 12 percent of millennials would choose to contact a business over the phone, making it absolutely last on a list of choices. Mary Meeker presented the information clearly in her most recent Internet Trends report. And building a chatbot independently of all other Digital Care channels will just create a mess, setting up your organization for a serious maintenance headache down the road. Here is a very simple example: On Thursdays, your business hours change from 9-5 to 9-9. Do you want to train your Facebook chatbot, then your Twitter chatbot, then your web search product, then your mobile app, then your email auto-responder etc., etc…? When you are continuously training a system to understand new customer questions and make changes based on business needs every day, training in multiple locations is just creating work and opening the opportunity for inconsistency across channels. When you accidentally miss training one channel (which will happen when updates need to happen 100 times a day) and you are giving different answers on different channels, you will irritate the hell out of your customers. Sounds like insanity — who would set themselves up for that mess? The secret to a great automated Digital Care strategy is to nail the system training and do it from a centralized system. You need to analyze every question from every customer every day from every channel and use that data to continuously train a centralized Digital Care solution. With this requirement to continuously feed the system, doing it more than once for each new question/solution is madness. It seems clear then that the only way to effectively deploy chatbot tech within an overall Digital Care strategy is to have a centralized training mechanism where training will be done once and will then be available to all automated Digital Care channels. This requires a platform at the heart of your Digital Care strategy, not a bunch of standalone bots serving each channel independently. By analyzing all customer behavior and applying machine learning in this centralized analysis and training framework, you will continuously improve all of your digital channel responses. High customer satisfaction and real economic benefits will quickly follow. To focus exclusively on chatbot tech is amazingly short-sighted. The statistics are simple and clear; customers are contacting businesses through all digital channels. To focus all of your attention on one digital channel, or to build something independent for this single channel, will just waste a lot of enterprise resources. So if you’re seriously thinking about deploying a chatbot, take a moment to think about the big picture and save you company from a very short-term solution that may create a long-term mess. VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn more about membership.
<urn:uuid:22c1c2ba-a655-4650-acd4-a5ced4ca0cc2>
CC-MAIN-2022-33
https://venturebeat.com/business/customer-service-chatbots-miss-the-big-picture/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00669.warc.gz
en
0.933839
926
1.679688
2
It may be Cinco de Mayo elsewhere in the world, but we Germans would say it is the fünfter Mai. And on the fifth of May in 1886, Clara Vogel was born in Jacob, Illinois. I knew that after looking in our German Family Tree, I was quite sure that I was not going to find much else in our research library to help with Clara’s story because there are just a few records in the Christ Lutheran Church books for her. How wrong I was! When I arrived at the shelves containing family binders in our library, I saw this in front of my eyes. I was reaching for one of the large binders when my eye spotted the smaller green book on the left. The surname Lohrmann got my attention because today’s story has Clara Vogel marrying a Lohrmann. I pulled this book off the shelf. Once I looked inside, I realized I was no longer in the position of not having much information for today’s story, but now I had too much. It became a matter of what I was going to use in this post and what I was going to have to ignore. One of the church records we have for Clara Vogel is her baptism record. Clara was the daughter of Henry and Amalie (Palisch) Vogel. She was baptized at Christ Lutheran Church in Jacob, Illinois. The baptism record is in two images. Clara grew up in this Vogel house. This photo was taken much later when her parents were celebrating their 40th wedding anniversary in 1915. Six years before Clara was born, Justus Lohrmann was born in Macomb County, Michigan. Justus was born on April 16, 1880. He was the son of Carl and Mary (Heinemann) Lohrmann. Carl Lohrmann was a Lutheran minister. The 1880 census shows Justus as a newborn baby. In 1902, we find Justus Lohrmann listed in a city directory for Springfield, Illinois. He was a student at Concordia College. Justus was studying to become a pastor, just like his father. In 1904, when it was time for Justus to serve his vicarage, he was sent to be a vicar at Christ Lutheran Church in Jacob, Illinois where Rev. P.S. Estel would be his mentor. Rev. Estel also had Perry County roots. There is a story that is told in this family. It is reported that when the newly-arrived vicar went to visit the Vogel family, Clara did not want to meet him, and she hid behind a door. We have this photo of Clara that I figure must have been taken at about this time in her life. That situation, however, apparently did not last long because on April 30, 1905, Justus and Clara were married at Christ Lutheran. Here is the church record for that marriage. We also have this couple’s wedding photograph. After Justus was ordained, his first call was to Marion Springs, Michigan. He was there for only a short time, and then took a call to Trinity Lutheran Church in Muskegon, Michigan. It was during their time at Muskegon that the photograph below was taken with their first two children. There is a story that says that Clara returned to Jacob, Illinois to have her second child, Reinhold. That story is backed up by a document in the Christ Lutheran books. We find Reinhold’s baptism record there. Just a quick side note: Our German Family Tree does not have any Lohrmann surnames in it. In the case of Justus, his name is misspelled in the GFT. He is referred to as a Lohmann, which is a common Perry County name. If you look at the above record, the name Lohrmann written in cursive can easily be read as Lohmann. The Lohrmann family had many children. A family history on Ancestry.com shows ten of them. The 1910 census shows that the Lohrmann family had moved back to Illinois where Rev. Lohrmann was the pastor in Covington. Here is a photograph of St. Luke’s Lutheran Church in Covington, Illinois. In 1915, Justus took a call to become the pastor at St. John’s Lutheran Church in Baldwin, Illinois. While he was in Baldwin, Rev. Lohrmann had to fill out his World War I draft registration. This photograph of the interior of St. John’s Lutheran Church says that many children in this Lohrmann family were baptized there. There were still a few other locations for Pastor Lohrmann to serve. He went to Altamont, Illinois to assist his son, Marcus, who was also a Lutheran minister. He went there in 1938. In 1943, he became the pastor at Trinity Lutheran Church in Darmstadt, Illinois. Then in 1955, Rev. Lohrmann retired and moved to Okawville, Illinois. While in Okawville, Justus and Clara celebrated their golden wedding anniversary. A photograph was taken on that occasion. You can see that this family has grown quite large. I am going to put a few other photos in a gallery. You can click on the thumbnails to enlarge them. They have their own captions. There is also this photograph that includes many relatives of Clara from the Vogel side of the family. Included in the front row, along with three Lohrmann boys, you will find Buddy Fick, whose story was told in the post, Hulda’s Boys & the Loss of Her Buddy. I also just have to show this photo of Clara working in her kitchen. This photo really caught my eye because I have a pot that used to belong to my parents. My father always placed it under a downspout at our house and used the rain it gathered to water plants. This looks identical to the one that Clara is holding. Justus died in 1960; Clara died in 1965. They are buried in the Immanuel Lutheran Cemetery in Okawville, Illinois. There are so many other stories and photographs I could have used in this post. If you are interested in finding out more about this family, I suggest you visit our museum and look at the book that we have. I can guarantee that you will spend quite a bit of time paging through it. When I went to find a Vogel binder in our library, I was especially looking for a Vogel family photograph that I have used on this blog before. I knew Clara was in the photo, but I was not sure which one she was. I found that photo in the book I located, and it is labeled with all the persons being labeled. Now you also know who all the people are in this photograph.
<urn:uuid:b20b1047-4149-4940-a52d-8301736c9bec>
CC-MAIN-2022-33
https://lutheranmuseum.com/2019/05/05/clara-finds-justus-in-jacob-or-did-justus-find-clara/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00479.warc.gz
en
0.988584
1,435
2.203125
2
Infinite Tuesday: An Autobiographical Riff by Michael Nesmith Reviewed by Greg Beets, Fri., Dec. 15, 2017 Texas native Nesmith didn't get cast as the philosophical Monkee for nothing. Surreal humor of cartoonist Paul Crum as titular inspiration, Nez winds through his life segueing from an enlivening friendship with author Douglas Adams to growing up the only child of a single mom who invented Liquid Paper in hyper-conservative Dallas. The most salient Monkees passages include co-conspiring on the movie Head with Jack Nicholson and the 1968 Nashville sessions that presaged country rock's ascendancy. Otherwise, the author doesn't dwell on his pre-fab four and doesn't need to. His spiritual journey away from and back to Christian Science, and his earnest if not entirely successful attempt to use his fortune to promote thought leadership are more interesting stories. Not to mention laying the groundwork for MTV, producing Repo Man, and winning a $47 million judgment against PBS for fraud. Deeply thought out, Infinite Tuesday adds yet another notch to Michael Nesmith's Renaissance-like credentials. Infinite Tuesday: An Autobiographical Riffby Michael Nesmith Crown Archetype, 306 pp., $28
<urn:uuid:13aaeca7-8f6d-4c1c-89e9-7b0cb8b438cd>
CC-MAIN-2022-33
https://www.austinchronicle.com/music/2017-12-15/infinite-tuesday-an-autobiographical-riff-by-michael-nesmith/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00469.warc.gz
en
0.926136
260
1.546875
2
What is Public Cloud Computing? Public Cloud is a Cloud Computing service provided to the general public. We stayed registering as a user or can directly use the existing services. Many Public Cloud services are free, and there is also a need to pay to be able to enjoy the service. Examples of the free Public Cloud include Twitter, Facebook, GMail, Windows Live Mail, etc. Examples of paid Public Cloud include Amazon EC2, Windows Azure, Adobe Creative Cloud, Office 365, SalesForce, etc. - We do not need investment and maintaining the infrastructure, platform or application. Stay put for free (for a service which is free) or pay-as far as we use (pay as you go). - Depends on the quality of internet services we use, if the internet connection dies, we cannot use the service. For that we need to think carefully its internet infrastructure. - Not all service providers, ensure the security of our data. For that we need to be careful to choose the provider’s Public Cloud. Learn in detail about the profile and the Service Level Agreement of the service provider.
<urn:uuid:69b13694-91f8-4552-a888-5a03596d6a30>
CC-MAIN-2017-04
http://inspirationseek.com/what-is-public-cloud-computing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00160-ip-10-171-10-70.ec2.internal.warc.gz
en
0.910943
229
2.453125
2
Presentation on theme: "The cathedral of Santa Maria del Fiore complex. The cathedral complex - including the Baptistery and Giottos bell tower - are part of the Unesco World."— Presentation transcript: The cathedral of Santa Maria del Fiore complex The cathedral complex - including the Baptistery and Giottos bell tower - are part of the Unesco World Heritage Site covering the historic centre of Florence. The cathedral, usually called the Duomo, was started in 1296, in the Gothic style to the design of Arnolfo di Cambio who was also architect of the church of Santa Croce and Palazzo Vecchio. He designed three wide naves ending under the octagonal dome with the middle nave covering the area of Santa Reparata. The complex of the cathedral was finished in 1436 with the completion of the dome by Filippo Brunelleschi. It was the first octagonal dome to be constructed without a temporary wodden structure. The brick dome on the Basilica is still the largest brick dome ever constructed. Brunelleschi was born in 1377 and died in He was most known for the dome on the Cathedral, but he also helped in building many other churches including Santo Spirito, San Lorenzo and the Pazzi Family chapel. Brunelleschi invented linear perspective, creating the illusion of space. The exterior of the Cathedral is faced with polychrome marble panels in various shades of green and pink bordered by white. The façade is by Emilio de Fabris ( ) and is all dedicated to the Mother of Christ. As you can see there is a central nave of four square bays, with an aisle on either side. The chancel and transepts are of identical polygonal plan, separated by two smaller polygonal chapels. The plan forms a Latin cross. The nave and aisles are separated by wide pointed Gothic arches, resting on composite piers. Central nave Bays Aisle Transept Chancel Composite pier The inside of the church can look bare or empty to some people. Most of the artifacts that were in the Cathedral were moved to the Museo dellOpera del Duomo. The floor of the church was relaid in marble tiles in the 16th century. The church was built with money provided by the people of Florence, thats why some important works of art honour famous Florentine people. Dante before the City of Florence Domenico di Michelino (1465) Funerary Monument to Sir John Hawkwood Paolo Uccello (1436) – Monochrome fresco Equestrian statue of Niccolò da Tolentino Andrea del Castagno (1456) - Fresco Above the main door A giant clock with fresco portraits of the four prophets by Paolo Uccello (1443). This one-handed liturgical clock shows the 24 hours of the hora italica, a period of time ending with sunset at 24 hours. Coronation of the Virgin Donatello (1434) designed this stained-glass window in the drum of the dome. Giottos Bell Tower The Bell Tower stands adjacent to the Duomo, it is 84.7 metres high and is divided into five sections. You can climb to the top of the bell tower and see a breathtaking view of Florence, it is 414 steps to the top. Giotto was appointed to Master of the Works. This means he had to design and construct the bell tower in 1334 when he was 67. The first stone was laid in 1334 and Giotto would not live to see it completed.When Giotto died (in 1337) only the first floor of the bell tower was completed. The marble that is laid on the bell tower is white (from Carrara), green (from Prato) and red (from Siena). On the first floor of the tower the hexagonal panels, by Giotto and Andrea Pisano. show the history of man, starting from Genesis in the Old Testament. In 1343 Andrea Pisano continued the construction of the bell tower following Giottos design, adding a second fascia decorated with lozenge-shaped panels. He built two more levels with four niches on each side and each level containing statues representing different prophets which are now in the Museo dellOpera del Duomo. It stands in both Piazza del Duomo and Piazza di San Giovanni in the center of Florence, in front of the Duomo and Giottos Bell Tower It is one of the oldest buildings in Florence. It was built from 1059 to 1128, in the Florentine Romanesque style. The Baptistery is famous for its bronze doors. The doors on the South were made by Andrea Pisano. The doors on the North and East were made by Lorenzo Ghiberti. The doors on the East were called by Michelangelo The doors of Paradise. The Plan The octagon had been a common shape for baptisteries for many centuries since early Christian times. The number eight is a symbol of regeneration in Christianity,signifying the six days of creation, the Day of Rest, and a day of recreation through the Sacrament of Baptism. The South Doors by Andrea Pisano ( ) The North Doors by Lorenzo Ghiberti ( ) The East Doors Doors of Paradise by Lorenzo Ghiberti ( ) History Until the end of the 19th century, all Florentine Catholics were baptized inside the Baptistery. Dante Alighieri and many members of the Medici family were also baptised here. The Restoration of the Paradise Doors The restoration began in They have been in restoration for 25 years and they are now in the Museo dellOpera del Duomo. The doors you can see at the Baptistery are a copy of the original ones.
<urn:uuid:8d2ebf4c-abf0-4883-b73e-343708e18641>
CC-MAIN-2017-04
http://slideplayer.com/slide/1461639/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00284-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955328
1,235
3.421875
3
ASSESSMENT OF PATIENT SATISFACTION: A STUDY OF CORE AND SECONDARY ATTRIBUTES OF HOSPITAL HEALTHCARE SERVICESHTML Full Text Received on 24 August, 2013; received in revised form, 09 October, 2013; accepted, 26 December, 2013; published 01 January, 2014 ASSESSMENT OF PATIENT SATISFACTION: A STUDY OF CORE AND SECONDARY ATTRIBUTES OF HOSPITAL HEALTHCARE SERVICES Yash Pal Taneja*1, Anand Sharma 2 and Ruchika Shah 2 GGDSD College 1, Chandigarh affiliated to Panjab University, Sector 32 C, Chandigarh, India Department of Management, National Institute of Pharmaceutical Education and Research 2, SAS Nagar, Mohali, Punjab, India ABSTRACT: This research evaluates patient satisfaction with the core and secondary attributes of hospital healthcare service, using two conventional methods, stated and derived importance explaining pros and cons related to each method. The study shows the significance of some of the core attributes and secondary attributes are recoverable equally well, regardless of the method. On the other hand, satisfaction obtained through some attributes diverges depending on the evaluation method. This variation is systematic and the reason for the variation is explained which provides the basis to researchers to employ both stated and derived methods for assessing the genuine measurement of satisfaction. Further article identifies the influence of demographics on satisfaction derived through core and secondary attributes and the relation between demographics and the type of hospital visited (i.e. govt. or private). Again the gap analysis and the correlation between satisfaction and recommendation provides better picture of opportunities or gaps live in hospital healthcare services and the directions to combat these gaps or exploit opportunities respectively. Attributes, Demographics, Correlation INTRODUCTION:Hospital industry is an important component of the value chain in Healthcare industry rendering services and recognized as healthcare delivery segment of the healthcare industry. In various countries, the provision of hospital care is turning into an industry with the rising presence of huge corporate hospital chains. While the demand for hospital care has augmented, public, charitable and private hospital care providers failed to deliver not only in terms of quantity (or volume i.e. number of beds) but also in term of quality of care. With such an untapped market and a favorable environment, corporations see a tremendous growth potential in hospital care 1. Again, in recent years, quality assurance has emerged as an internationally important aspect in the provision of health care services. Consumer satisfaction is recognized as an important parameter for assessing the quality of patient care services. Therefore there is a need to analyze the health care system as often as possible. Each organization in every industry these days is concerned with satisfying the users of its products or services, they are identified as clients, customers, consumers or patients. Satisfaction is a psychological concept which is easy to understand but hard to define. The concept of satisfaction overlaps with similar themes such as happiness, contentment, and quality of life. The definition of customer satisfaction has been widely debated as organizations increasingly attempt to measure it. It is a highly personal assessment that is greatly affected by customer expectations. Satisfaction also is based on the customer’s experience of both contact with the organization (the “moment of truth” as it is called in business literature) and personal outcomes. Some researchers define a satisfied customer within the private sector as “one who receives significant added value” to his/her bottom line- a definition that may apply just as well to public services 1. Customer satisfaction differs depending on the situation and the product or service. A customer may be satisfied with a product or service, an experience, a purchase decision, a salesperson, store, service provider, or an attribute or any of these.1 Satisfaction is not some pre-existing phenomenon waiting to be measured, but a judgment people form over a time as they reflect on their experience. A simple and practical definition of satisfaction would be the degree to which desired goals have been achieved 3. Customer satisfaction is a collective measure of entirety purchase and consumption experience 1 (Anderson et al., 1994, pp.54). It is a composite and multidimensional phenomenon consisting of many different inter-reliant parts. For example, a hospital healthcare service is a composite of elements such as technical quality of care, attitudes of healthcare professional, finances, physical facilities etc.2 (Mary Draper et al., 1995), including both core and secondary attributes. The core and secondary attributes can be discussed in terms of process/outcome satisfaction. Factors influencing “decision process satisfaction” might be different from factors influencing “outcome or consumption satisfaction”. Typically, past research focused on satisfaction with the final outcome (i.e., the satisfaction obtained after receiving the services). However, consumers may also form satisfaction judgments during the decision making process 2 (Zhang and Fitzsimons, 1999), which encompasses not only the decision making process, but also the purchase experience 7 (Engel and Blackwell, 1982; Fitzsimons et al., 1997). In keeping with the conceptualization above, the core attributes will be important for both “decision making process satisfaction” and “outcome satisfaction”, but secondary attributes are relevant specifically in relation to “decision making process satisfaction”. Stated importance reflects the attributes that are critical when patients make their hospital choice. On the contrary, derived importance represents the effectiveness of attributes in driving overall satisfaction. Customers can identify the differences between direct and indirect importance dimensions of product /service attributes; and, core attributes have both high direct and indirect importance. In order to verify this proposition, two sets of satisfaction attributes are considered: 1) Core attributes relating to satisfaction with various activities; and 2) Secondary attributes relating to satisfaction with various other decision drivers. In hospital healthcare service, core attributes comprises technical quality of care, art of care, finances, while secondary attributes includes physical environment, patient convenience and accessibility. Although satisfaction with core attributes is generally considered as the main determinant of overall satisfaction, secondary attributes, too, influence patients' overall satisfaction, as well as the choice of product/service 4. (Rong huang et al., 2008) This paper aims at assessment of patient satisfaction with respect to hospital healthcare service located in tricity of Chandigarh, Mohali and Panchkula. We have assessed overall satisfaction [Calculated Patient Satisfaction Index (PSI) by using both stated and derived importance methods]; satisfaction with core and secondary attributes; and the drivers of overall satisfaction, by using conventional stated and derived importance methods [Systematically assessed core and secondary set of attributes for obtaining PSI]. We further studied whether the selection of a type of a hospital (i.e. private or govt.) is affected by demographics of patients (i.e. age, gender, income, insurance level etc.) and also observed the impact of demographic profile on patient satisfaction. Stated Importance versus Derived Importance Methods: Stated importance is defined as the clear-cut customer preferences for the influence of a satisfaction criterion, while derived importance is estimated by a regression-type quantitative technique using patient judgments for the performance of this set of criteria 2. It is not irrational to say that patients tend to rate every criterion as important, when asked freely 3. Because of the tendency of patients to rate almost everything as important, the researchers are often wary of self-explicated importance data and derived importance data are considered generally more trustworthy. Nevertheless, the comparison between derived and stated importance can give valuable information. Consider the following example: If customers of an airline are offered with a list of attributes and are asked how important the attributes ‘safety’ and ‘timely reach’ are, they may rate them as extremely important. Compared with these attributes, which obviously are basic factors (‘quality of food’ or ‘attentiveness of flight attendants’) are certainly less important. If ‘safety’ and ‘timely reach’ are delivered at a satisfactory level, their impact on satisfaction found to be low. If flight attendants are perceived as very attentive and food quality is good, these attributes will strongly affect customer satisfaction. Hence, their relative importance is high. Thus, it suggests that customers’ stated importance does not adequately measure the relative importance (derived importance) of attributes. Derived importance refers to the statistical association between attribute ratings (predictors) and overall rating (criterion). The derived importance of an attribute is statistically determined from this relationship using various techniques including: 1) Pearson correlation; 2) Standard regression coefficient or beta weight; 3) The product of the beta weight and the corresponding Pearson calculation; and, 4) The coefficient of part determination 2. Therefore implicitly derived importance may differ from the customers’ self-stated importance. FIGURE 1 EXPLANATION OF THE BASICS OF THE MODEL BEING USED Methods: Requisite information has been gained through a questionnaire consisting of four sections. The first and second sections consist of general information and demographics relating to patients respectively. In the third section, respondents rate the importance of 16 core attributes presented in 3 categories: Technical Quality of Care, Art of Care and Finances. Under each category, specific activities are listed and respondents rate their relative importance from 1 (not at all important) to 5 (very important). In addition, respondents rate the importance of other decision drivers (secondary attributes), including 17 items relating to Accessibility, Patient Convenience and Physical Environment. The forth section concerns respondents' overall satisfaction, as well as their satisfaction with each of the 16 prime traits (core attributes) and 17 decision drivers. The survey has been administered on patients who already experienced healthcare service provided by hospital industry in tricity of Chandigarh, Mohali and Panchkula and out of which 400 then were included. RESULTS: Table 1 provides the basic idea of sample composition and demographic profile of patients that helps to understand patient-sample distribution among different categories. When the patients were asked to mention their source of information regarding the selection of particular hospital for availing health care services, Word of mouth (Friends, family & relatives) (58.6%) comes out to be a major source of information followed by Doctor Referral (33.3%). TABLE 1: DEMOGRAPHICS AND SAMPLE COMPOSITION |Demographics||Categories||Numbers||Percentage||Overall Satisfaction Mean| |Type of Hospital Visited||Private||208||52.5||3.71| |More than 75||28||7.07||3.43| |Monthly Income level||Less than 5000||120||30.3||3.67| |More than 30000||76||19.2||3.67| |Insurance Coverage||Full coverage||100||25.2||3.52| TABLE 2: IMPACT OF DEMOGRAPHICS ON TYPE OF HOSPITAL VISITED |Chi-Square Test Significance| |Gender * Type of hospital visited||0.045*| |Age * Type of hospital visited||0.000**| |Monthly Income level * Type of hospital visited||0.000**| |Insurance Coverage * Type of hospital visited||0.198| *Shows significant values of probability Table 2 depicts via chi-square test the impact of demographics on type of hospital visited. The type of hospital visited is dependent on demographics like gender, age and income level, but not on insurance coverage status. The results shows here that males tend to go to private hospitals more compared to females. The age group of 15-34 years is being inclined to private hospitals more compared to others. As the income level increases, patients are more aligning themselves towards private hospitals. Primarily, Efforts were concentrated to explore the measurement of Patient Satisfaction with respect to Hospital Service Industry based on six major dimensions. A Patient Satisfaction Index (PSI) is executed on the satisfaction ratings with respect to prime traits of hospital service and decision drivers, respectively, by both stated and derived importance approaches. Stated importance is estimated by a procedure by Bhote (1998) and derived importance and overall CSI by Anton's (1996) method. PSI with respect to Prime Traits of Hospitals (Core Attributes): In order to determine dimensions underlying patients' satisfaction, a factor analysis was performed on satisfaction ratings of the 16 prime attributes prior to both stated and derived importance approaches. The resultant dimensions were used in succeeding analyses. A factor analysis using the principal component method with Varimax rotation has been implemented. Table 3 displays factor loadings, eigenvalues, and the explained variance. In addition, alpha coefficients for items in each factor are provided. The factor analysis reveals three factors representing 80.94% of the total variance. The first factor – Technical Quality of Care – includes a variety of attributes related to technical skills of healthcare professionals. The second factor summarizes attitudes, care, concern, consideration, friendliness, patience and sincerity related attributes of healthcare professionals and is labeled as Art of care. Finances, the third factor, include 3 variables; cost, flexibility of payment mechanism and Comprehensiveness of insurance coverage. Table 3: Dimensions of satisfaction rating of core factors for Hospital |Factor 1||Factor 2||Factor 3| |Technical Quality of Care||Art of Care||Finances| |Availability of physicians, nurses & other staff||0.68| |How well the doctors kept you informed about your condition and what to expect next (communication)||0.784| |How well the doctors explained your tests and treatment||0.846| |Adherence to high standards of diagnosis & treatment||0.805| |Technical soundness & modernisms of equipments and facilities||0.737| |Ability of doctor to treat problems||0.798| |Outcome of treatment||0.791| |Extent to which healthcare providers pay attention to details||0.726| |Being treated with respect and courtesy||0.774| |Amount of time spent by healthcare providers||0.678| |Attitudes of healthcare providers||0.87| |Courtesy shown towards your family and friends||0.863| |Responsiveness of healthcare providers||0.822| |Cost of treatment||0.798| |Flexibility of payment mechanism||0.884| |Comprehensiveness of insurance coverage||0.806| |% of variance||63.922||10.753||6.279| FIGURE 2: IMPACT OF VARIOUS PARAMETERS ON CORE ATTRIBUTES The impact of various parameters on prime traits (including all three) has been analyzed (Figure 2). Type of Hospital Visited affected the satisfaction achieved through art of care and finances. Here t-test showed there exists a significant difference in overall satisfaction achieved through Art of Care and Finances (significance = .000) with respect to type of hospital visited. Again the bar diagrams reveals that higher satisfaction through art of care and lower through finances is achieved in patients visiting private hospitals. Again for gender, independent samples test showed that there is no impact of gender on core attributes [no significant difference in overall satisfaction achieved through technical quality of care (significance =.078), art of care (significance =.374) and finances (significance = .795) with respect to gender]. For Income Level,ANOVA shows that there exists a significant difference in satisfaction achieved through Art of Care and Finances with respect to income level. Here from post-hoc and bar diagrams, it is clear that the satisfaction achieved through art of care is different between lower income group (monthly income less than 5000) and higher income group (monthly income greater than 30000). For finances, the fourth income group (monthly income 20000-30000) having significant higher satisfaction compared to second group (5000-10000) and fifth group (>30000). Finally, Insurance affected all Core Factors.Anova showed that for all core factors there exists a significant difference in satisfaction. Post–hoc and bar diagram revealed that the Group II (semi covered) is having higher satisfaction compared to others. Derived Importance of Core Attributes Related to Patient Satisfaction: Derived importance results from regression analysis with overall patient satisfaction as criterion and the three prime traits as predictors. First two factors (Technical quality of Care and Art of Care) are found statistically significant in explaining the overall satisfaction with core attributes (Table 4). In order of importance, Technical quality of Care (beta = 0.613) is followed by Art of Care (beta = 0.2) and in presence of these two, finances become insignificant (unimportant) but is retained in subsequent analysis for the sake of comparison with findings from the stated importance approach. The overall PSI from derived importance is 54.19, which is not revealing at face value. It is appropriate to benchmark this figure against CSI measured over time. Technical quality of Care (77.98) and Art of Care (21.00) dimensions contribute most to the overall PSI. Stated Importance of Core Attributes Related to Patient Satisfaction: Table 5 represents the findings of PSI obtained from the stated importance approach. Among the three factors, Technical Quality of Care has the highest average importance rating (4.6), followed by Art of Care (4.23). The least important dimension is Finances (3.98). There is not much difference in satisfaction ratings of all three prime traits. The overall PSI is 73.15. Here, all three (Technical Quality of Care, Art of Care and Finances) are the equally important dimension in driving overall PSI. The mean importance ratings for the three dimensions are higher than their respective satisfaction mean ratings. Comparison of Stated versus Derived Importance of Core Attributes: 1) The overall satisfaction obtained from the stated versus derived approaches are analogous. Nevertheless, the stated approach emerges to give a more favorable view of satisfaction (since PSI resulting from stated importance is higher than PSI from the derived mportance). In any case, the overall PSI scores should not be interpreted at face value as they are only meaningful when compared against a benchmark. 2) Both approaches consistently identify the top most important dimension explaining the overall PSI, namely, Technical Quality of Care. Hence, parallel validity linking the two approaches seems to exist, which is a promise for managers who strive to establish the most important dimensions underlying overall satisfaction. But again, stated importance depicts that all three prime traits are more or less equally important (stated satisfaction 17.32, 14.92, 14.52 respectively) while derived importance discovered that Technical Quality of Care is most factor in generating satisfaction followed by Art of Care and Finances found to be unimportant (derived importance 42.26, 11.38, 0.55). Thus interestingly, Cost, which is found insignificant in the derived approach, turns out to be among the important dimensions in the stated approach. Hence consumers when asked to attach importance, they portray all the dimensions as important, but satisfaction is most derived by Technical Quality of Care. 3) Activities ascribing higher importance ratings are not receiving higher satisfaction ratings. This finding is conceivable due to the fact that there are so many opportunities or gap still exist to be met in hospital industry. The mean satisfaction rating of each dimension is less than its mean importance rating, suggesting that the decision drivers may be short of meeting patient expectations. TABLE 4: RESULTS OF DERIVED IMPORTANCE APPROACH TO CSI OF CORE FACTORS |Items||S||ASI||PSI||Beta||PSI * Beta||Score| |Technical Quality of Care||68.9||0.613||42.26||77.98| |Availability of physicians, nurses & other staff||3.74||61.5| |How well the doctors kept you informed about your condition and what to expect next (communication)||3.66||67.6| |How well the doctors explained your tests and treatment||3.75||73.6| |Adherence to high standards of diagnosis & treatment||3.71||69.5| |Technical soundness & modernisms of equipments and facilities||3.77||64.4| |Ability of doctor to treat problems||3.84||72.9| |Outcome of treatment||3.90||73.1| |Art of Care||56.9||0.2||11.38||21.00| |Extent to which healthcare providers pay attention to details||3.58||64.5| |Being treated with respect and courtesy||3.64||54.6| |Amount of time spent by healthcare providers||3.39||49.5| |Attitudes of healthcare providers||3.51||59.5| |Courtesy shown towards your family and friends||3.46||56.3| |Responsiveness of healthcare providers||3.56||56.9| |Cost of treatment||3.67||43.8| |Flexibility of payment mechanism||3.58||43| |Comprehensiveness of insurance coverage||3.68||50.4| Goodness-of-fit. R: .777 F: 196.756, R squared: .603 Sig: 0.00. TABLE 5: RESULTS OF STATED IMPORTANCE APPROACH TO CSI OF CORE FACTORS |Attributes||Factor Loading||I||S||I * S||Score| |Technical Quality of Care||4.60||3.77||17.32||37.04| |Availability of physicians, nurses & other staff||0.68||4.50||3.74||16.85| |How well the doctors kept you informed about your condition and what to expect next (communication)||0.78||4.57||3.66||16.71| |How well the doctors explained your tests and treatment||0.85||4.47||3.75||16.77| |Adherence to high standards of diagnosis & treatment||0.81||4.55||3.71||16.89| |Technical soundness & modernisms of equipments and facilities||0.74||4.59||3.77||17.31| |Ability of doctor to treat problems||0.80||4.74||3.84||18.22| |Outcome of Treatment||0.79||4.76||3.90||18.55| |Art of Care||4.23||3.52||14.92||31.91| |Extent to which healthcare providers pay attention to details||0.73||4.44||3.58||15.87| |Being treated with respect and courtesy||0.77||4.28||3.64||15.59| |Amount of time spent by healthcare providers||0.68||4.20||3.39||14.24| |Attitudes of healthcare providers||0.87||4.25||3.51||14.91| |Courtesy shown towards your family and friends||0.86||4.01||3.46||13.87| |Responsiveness of healthcare providers||0.82||4.23||3.56||15.06| |Cost of treatment||0.80||4.04||3.67||14.84| |Flexibility of payment mechanism||0.88||4.01||3.58||14.36| |Comprehensiveness of insurance coverage||0.81||3.90||3.68||14.36| PSI of Decision Drivers (Secondary Attributes): Further, similar but independent analysis was performed on various decision drivers to obtain their stated and derived importance ratings. This analysis provides a healthier understanding of overall satisfaction, a multifaceted construct that may rely not only on satisfaction with prime traits (core attributes) but also on decision drivers (secondary attributes). Furthermore, it allows us to explore generalizability of our findings from the previous analysis of prime traits. A principal component with Varimax rotation analysis produces a three-factor solution explaining 69.85% total variance. Table 6 displays factor loadings, eigenvalues, the explained variance and alpha coefficient for each factor. The emergent factors are clear-cut. The first one, Physical Environment, includes pleasantness, physical comfort, ambience related to hospital service and the presence of associated facility (Pathlab, Pharmacy, Food, Banking etc.). Factor two, labeled Patient Convenience, includes convenience of location and timings. Factor three – Accessibility– includes brand name, hospital size and level of accreditation. |TABLE 6: DIMENSIONS OF SATISFACTION RATING OF SECONDARY FACTORS FOR HOSPITAL| |Factor 1||Factor 2||Factor 3| |Physical Environment||Patient Convenience||Accessibility| |Pleasantness of the atmosphere||0.789| |Physical Comfort & Attractiveness of rooms||0.813| |Clarity of signs and directions||0.809| |Privacy you felt during the registration||0.751| |Availability of Path lab facility||0.775| |Availability of Pharmacy facility||0.819| |Availability of Radiology facility||0.8| |Availability of Food services (Cafeteria)||0.817| |Availability of Banking services||0.502| |Ease of making an appointment||0.723| |Convenience of location||0.736| |Hours during which care can be obtained||0.709| |Clarity of information for accessibility||0.829| |Consideration of needs & wants||0.772| |Level of accreditation||0.857| |% of variance||45.555||12.714||11.582| The impact of various parameters on secondary attributes (including all three) has been analyzed (Figure 3). Type of Hospital Visited affected Secondary Factors. T-test showed that there exist a difference in satisfaction derived from Physical Environment (significance = .000) and Patient Convenience (significance =.025), but not from Accessibility (significance =.180) with respect to type of hospital visited. Again, Bar diagram revealed that higher satisfaction achieved in case of private hospitals. For Gender, Independent sample t-test showed that there is no significant difference in satisfaction derived from physical environment (significance = .837), patient convenience (significance =.879) and accessibility (significance =.927) with respect to gender. With Income Level Anova revealed that there exists a significant difference in satisfaction derived through Physical Environment and Accessibility with respect to income level. Further post-hoc and bar diagram showed that patients of group I (monthly income less than 5000) are having significantly low satisfaction compared to others for physical environment and group having monthly income less than 20000 (group I, II, III) separates out (being low satisfied) from the higher income groups (IV , V) for satisfaction derived through accessibility factors. And finally with Insurance Coverage, Anova showed that there is no significant difference in satisfaction derived from physical environment (significance =.152), patient convenience (significance =.395) and accessibility (significance =.060) with respect to insurance coverage. FIGURE 3: IMPACT OF VARIOUS PARAMETERS ON CORE ATTRIBUTES Derived Importance of Decision Drivers: All three decision driver dimensions are significant in explaining overall satisfaction (Table 7). Patient Convenience explains the most variance (Beta=0.299), followed by Physical Environment (Beta=0.242). The least powerful dimension is Accessibility (Beta=0.209). The overall PSI is 28.18. Stated Importance of Decision Drivers: Among the three dimensions Patient Convenience has the highest average importance rating of 4.12, followed by Physical Environment with 3.8, and finally, Accessibility with 3.67. Interestingly, Accessibility, which is found less contributing in the derived approach, turns out to be among the important dimensions in the stated approach which signifies that patients portray that branding, hospital size and level of accreditation are among important factors to satisfy from particular hospital healthcare service but indeed they derive very less of satisfaction from them. The overall PSI from stated importance approach is 63.83 (Table 8). Comparison of Stated Versus Derived Importance of Decision Drivers: - The stated importance approach presents a more favorable view of satisfaction since the PSI from stated (63.83) is higher than that of derived importance (28.18). This finding is consistent with that of the prime traits above, as well as Chu's (2002) 3. - Differences exist between the importance ratings and satisfaction ratings of Physical Environment and patient convenience dimensions. Most strikingly, Accessibility, which is not much contributing in explaining the overall satisfaction in the regression model, is ranked as the second important contributor to the overall PSI in the stated importance approach. This discrepancy may be due to a systematic bias in the stated approach: When directly asked, respondents tend to mark all the attributes as important, making it difficult to identify what really is important. Overstated importance ratings exaggerate the PSI. The mean satisfaction rating of each dimension is less than its mean importance rating, suggesting that the decision drivers may be short of meeting patient expectations. TABLE 7: RESULTS OF DERIVED IMPORTANCE APPROACH TO CSI OF SECONDARY FACTORS |Items||S||ASI||PSI||Beta||PSI * Beta||Score| |Pleasantness of the atmosphere||3.36||45.6| |Physical Comfort & Attractiveness of rooms||3.31||47.3| |Clarity of signs and directions||3.357||54.3| |Privacy you felt during the registration||3.33||41.2| |Availability of Path lab facility||3.48||39.7| |Availability of Pharmacy facility||3.52||45| |Availability of Radiology facility||3.25||32.2| |Availability of Food services||3.11||31.3| |Availability of Banking services||2.78||14.5| |Ease of making an appointment||3.50||32.6| |Convenience of location||3.70||31.5| |Hours during which care can be obtained||3.58||39.3| |Clarity of information for accessibility||3.60||35.2| |Consideration of needs & wants||3.45||49.4| |Level of accreditation||3.60||39.9||PSI||28.18||100| |TABLE 8: RESULTS OF STATED IMPORTANCE APPROACH TO CSI OF SECONDARY FACTORS| |Attributes||Factor loading||I (importance)||S (satisfaction)||I * S||Score| |Pleasantness of the atmosphere||0.79||4.06||3.36||13.66| |Physical Comfort & Attractiveness of waiting rooms||0.81||3.64||3.31||12.07| |Clarity of signs and directions||0.81||3.57||3.36||11.99| |Privacy you felt during the registration||0.75||3.75||3.33||12.48| |Availability of Path lab facility||0.78||4.05||3.48||14.11| |Availability of Pharmacy facility||0.82||4.01||3.52||14.12| |Availability of Radiology facility||0.80||3.89||3.25||12.64| |Availability of Food services||0.82||3.77||3.11||11.72| |Availability of Banking services||0.50||3.44||2.78||9.56| |Ease of making an appointment||0.72||4.09||3.51||11.86| |Convenience of location||0.74||4.03||3.70||14.16| |Hours during which care can be obtained||0.71||4.10||3.58||13.56| |Clarity of information for accessibility||0.83||4.15||3.60||14.96| |Consideration of needs & wants||0.77||4.21||3.45||14.53| |Level of accreditation||0.86||3.79||3.60||13.64| Goodness-of-fit, R: .580 F: 65.658, R squared: .337 Sig: 0.00. Further, T-test showed that there exist a significant difference between expectation & satisfaction for all dimensions (significance = .000 for all 5 dimensions) except accessibility factors (significance = .741) (Figure 4). There exist a high correlation (.740) between overall satisfaction and recommendation for a particular hospital. FIGURE 4: GAP ANALYSIS I= Importance and S= Satisfaction DISCUSSION AND IMPLICATIONS: This research uncovers the major six dimensions of patient satisfaction including core (Technical Quality of Care, Art of Care, Finances) and secondary (Physical Environment, Patient Convenience, Accessibility) attributes. Again study finds that the overall patient satisfaction level evaluated by derived versus stated importance techniques is analogous, but not the same. Again, it demonstrates that importance scores for core and secondary attributes diverge with derived versus stated methods. Given discrepant satisfaction scores and attribute importance, this study provides supplementary insight for picking up a suitable method. The two approaches appear to be quantifying different fundamental constructs; and so, the variations innately lie in the approaches. Stated importance characterizes what attributes are important when patients are making their hospital healthcare service choice, or what traits patients are seeking in the hospital healthcare service. In contrast, derived importance signifies the effectiveness of attributes in driving overall satisfaction. Core attributes, illustrated by high explicit and implicit importance 3 (Vavra, 1997), are recovered equally well by the stated or derived methods. Importance of secondary attributes, on the other hand, varies depending on the evaluation method. Hence, derived methods are more effective in recovering importance of secondary attributes. In general, patients tend to allocate higher importance ratings to features with the stated method. In reality, Finances and Accessibility dimensions, which are insignificant or less significant in the derived importance model, is assigned high importance in the stated ratings. They are something expected and important, but they do not essentially add significantly to the prophecy of overall satisfaction, as long as they exit at an expected level. Although Finances and Accessibility at the current level may not appear as an important factors contributing toward overall satisfaction, failure to maintain the expected level of both may lead to Finances and Accessibility becoming the important determinants of overall satisfaction. Managers therefore must vigilantly understand results from the two methods in order to obtain full appreciation of the condition. Here, among core attributes, all three dimensions receive more or less equal score (Technical quality of care = 37.04, Art of care = 31.91, Finances = 31.05) when measured through stated importance method. And thus revealing the fact that people attach equal importance to every dimension when asked, but in reality when they experience the service finances dimension becomes insignificant or not important if they are getting satisfied for technical quality of care and art of care (Derived score for Technical quality of care = 77.98, Art of care = 21.00, Finances = 1.01). Among secondary attributes, patient convenience is the major decision driver (stated score = 36.24 derived score = 39.89). Physical environment was found to be less important compared to accessibility in stated importance method (Physical environment = 30.72, Accessibility = 33.04), but over passing the score of accessibility in derived satisfaction method (Physical environment = 33.50, Accessibility = 26.61), thus revealing the fact that people attach less importance to physical environment, as it is expected attribute of the service and thus the minimum expected level of the attribute should always be present and in reality when people experience the service, the satisfaction is derived from this attribute. Moreover, Study finds that type of hospital visited i.e. govt. or private is affected by demographics such as gender, age and income level. Type of Hospital Visited and Income Level influence satisfaction derived from core as well as secondary factors thus being most influencing demographics in hospital selection, while Insurance Coverage only concern satisfaction relating to secondary factors. Furthermore, a handful of opportunities exist for satisfying the patient needs as there are significant gaps live for many of attributes seen through differences between importance and satisfaction. There exist a high correlation between overall satisfaction and recommendation for a particular hospital, thus, the healthcare service experience with a particular hospital will definitely provide some inputs for revisit and recommendation. Further, we found out that the primary source of information is friends, family and relatives (WOM), thus recommendation is being of utmost importance and thus attention should be paid to provide a praiseworthy experience to patients. - Bertrand Lefebvre, Hospital Chains in India: The Coming of Age, Centre Asie Ifri, January 2010 - Mack Hanan and Peter Karp, Customer Satisfaction: How to Maximize, Measure, and Market Your Company’s “Ultimate Product” (New York: American Management Association, 1989), xii - Rodrigo A. Padilla, “Literature Review on Consumer Satisfaction in Modern Marketing.” Seminar in Consumer Research, Faculty of Commerce and Administration, Concordia University, December 5, 1996, http://pages.infinit.net/rodrigo/satisfaction.html. - Measurement of Patient Satisfaction Guidelines, Health Strategy Implementation Project 2003, The Health Boards Executive - Anderson EW, Claes F, Lehmann DR. Customer satisfaction, market share, and profitability: findings from Sweden. J Mark 1994;58(3):53–66. - Mary Draper and Sophie Hill, The role of patient satisfaction surveys in a national approach to hospital quality management, Department of Human Services and Health; October, 1995 - Zhang S, Fitzsimons GJ. Choice-process satisfaction: the influence of attribute alignability and option limitation. Org Behav Human Decis Processes 1999;77(3):192–214. - Engel JF, Blackwell RD. Consumer behavior. NewYork: Holt, Rinehart and Winston; 1982. - Rong Huang, Emine Sarigöllü, Assessing satisfaction with core and secondary attributes, Journal of Business Research 61 (2008) 942–949 - E. Grigoroudis and O. Spyridaki, Derived vs. Stated Importance in Customer Satisfaction Surveys, Operational Research. An International Journal. Vol.3, No.3 (2003), pp.229-247 - Naumann E. and K. Giel (1995). Customer Satisfaction Measurement and Management: Using the voice of the customer. Thomson Executive Press, Cincinnati. - Green PE, Krieger AM. Attribute importance weights modification in assessing a brand's competitive potential. Mark Sci 1995;14:253–70. - Bhote KR. The customer loyalty audit. Alexandria, VA: Cambridge Strategy Publications; 1998. - Anton J. Customer relationship management: making hard decisions with soft numbers. Upper Saddle River, NJ: Prentice-Hall; 1996. - Chu R. Stated-importance versus derived-importance customer satisfaction measurement. J Serv Mark 2002; 16(4):285–301. - Vavra TG. Improving your measurement of customer satisfaction: a guide to creating, conducting, analyzing and reporting customer satisfaction measurement program. Milwaukee, WI: ASQC Quality Press; 1997. How to cite this article: Taneja YP, Sharma A and Shah R: Assessment of patient satisfaction: A study of core and secondary attributes of Hospital Healthcare Services. Int J Pharm Sci Res 2014; 5(1): 228-39.doi: 10.13040/IJPSR. 0975-8232.5(1).228-39 All © 2013 are reserved by International Journal of Pharmaceutical Sciences and Research. This Journal licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Yash Pal Taneja*, Anand Sharma and Ruchika Shah Assistant Professor, GGDSD College, Chandigarh affiliated to Panjab University, Sector 32 C, Chandigarh, India 24 August, 2013 09 October, 2013 26 December, 2013 01 January, 2014
<urn:uuid:90f6d70b-86eb-4adf-a46e-cafb175e2fd0>
CC-MAIN-2022-33
https://ijpsr.com/bft-article/assessment-of-patient-satisfaction-a-study-of-core-and-secondary-attributes-of-hospital-healthcare-services/?view=fulltext
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
en
0.896941
9,358
1.953125
2
Auxentius (fl. c. 370), of Cappadocia, an Arian theologian of some eminence (see Arius). When Constantine deposed the orthodox bishops who resisted, Auxentius was installed into the seat of Dionysius, bishop of Milan, and came to be regarded as the great opponent of the Nicene doctrine in the West. So prominent did he become, that he was specially mentioned by name in the condemnatory decree of the synod which Damasus, bishop of Rome, urged by Athanasius, convened in defence of the Nicene doctrine (A.D. 369). When the orthodox emperor Valentinian ascended the throne, Auxentius was left undisturbed in his diocese, but his theological doctrines were publicly attacked by Hilary of Poitiers.
<urn:uuid:47fd7bb5-2447-4b30-b6ac-8669ad3eb356>
CC-MAIN-2022-33
https://chestofbooks.com/reference/Encyclopedia-Britannica-1/Auxentius.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00468.warc.gz
en
0.977434
171
3
3
The following is a rebuttal to many common arguments that the oil and gas industry uses to "educate" the public about hydraulic fracturing. Hydraulic fracturing and its associated drilling operations are not exempt from environmental regulations -The Energy Policy Act of 2005 reduced energy regulations under the Safe Drinking Water Act, which allows the EPA to regulate “underground injection.” [Title III - Oil and Gas, Subtitle C - Production, Section 322 - Hydraulic fracturing] amends paragraph 1 of Section 1421(d) of the Safe Drinking Water Act to exclude “hydraulic fracturing operations” from the EPA’s definition of “underground injection.” Opponents of hydraulic fracturing have cited this as an example of inadequate regulation because no regulations exist for drinking water contamination, specifically. Other exemptions include the Resource Conservation and Recovery Act, the Emergency Planning and Community Right to Know Act, the Clean Air Act, the Clean Water Act, the National Environmental Policy Act, and the Comprehensive Environmental Response, Conservation, and Liability Act (Superfund). Methane in well water occurs naturally in areas where hydraulic fracturing is occurring - The study, “Methane contamination of drinking water accompanying gas-well drilling and hydraulic fracturing”, Osborn et al. Nicholas School of the Environment - Duke University, sampled water from wells near where hydraulic fracturing was and was not occurring. It draws a direct correlation between the distance from the drilling operation and methane concentration in the water. Of the active extraction areas, nearly all had water samples with methane concentrations above the “Action Level for Hazard Mitigation”. By measuring the degree of carbon isotopes in the methane, Osborn showed that methane in the water samples matched methane from the gas wells exactly and was not related at all to naturally occurring methane. This results in a causal link between the drilling and water contamination. The methodology corrected for error by taking samples from geologically identical areas. We can create 200,000 new jobs from hydraulic fracturing - Economic benefits of hydraulic fracturing actually are largely short-lived. According to the Pennsylvania Department of Labor and Industry, over 70% of the jobs related to hydraulic fracturing are out of state hires. The highest paying jobs are transient; they move from state to state, depending on where drilling is occurring. As a result, the Department concluded, the jobs that are created when drilling occurs are low-paying and last only as long as drilling progresses. The Department reported that Pennsylvania gas development created 10,600 total jobs, roughly 70% being from out of state. There is no factual information to even suggest that 200,000 jobs could be created. Hydraulic fracturing has been used safely for decades - In fact, it has not been industrialized to the degree it is now until after the Energy Policy Act of 2005 exempted the process from the Safe Drinking Water Act. Chemicals used now number in the thousands; the previous process used mainly explosives without large amounts of fracturing fluid. Water supplies are protected by thousands of feet of rock/wells are encased in concrete - In fact, water contamination has been documented in six states thousands of times. Without regulations, industry will cut corners, leading to major consequences, as seen by many studies that have proven hydraulic fracturing's contamination of water. Shale gas from hydraulic fracturing is cleaner than coal/oil/gas - Actually, shale gas is DIRTIER than coal, oil, and conventional gas. This is due to several factors discussed in our summary of the Cornell University study on the scientific conclusions page. Shale gas is a bridge/transitional fuel - The conclusions of the Cornell study on our scientific conclusions page say otherwise. Shale gas is in fact the dirtiest fuel we could use in the coming decades. ODNR provides adequate regulation of the process - The 2011 Ohio energy law actually reduces regulations at the state level. In their report on Ohio, Common Cause writes, “Companies engaged in fracking contributed $2.8 million to state candidates, political committees, and parties in Ohio from 2001 through June 2011, helping the natural gas industry preserve what are some of the nation’s most lenient fracking regulations.” Bill Batchelder (Speaker of the Ohio House, Representative from Medina County) specifically received $71,195 from hydraulic fracturing interests over that period. Also note that Ohio does not require full disclosure, so the number may be much higher. With lenient regulations, Ohio is not in a position to safely exploit oil and gas. States are better suited to regulate drilling - However, the reason that the Safe Drinking Water Act was called for in the 1970s, was precisely because hydrologic features do not stop at state boundaries. This means that federal regulations are important; but currently, they are inadequate.
<urn:uuid:ae39b667-2090-4e37-a3a7-620a1508917b>
CC-MAIN-2017-04
http://fracking.weebly.com/rebuttal-to-industry-arguments.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00214-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95107
974
2.609375
3
HTML5 banners refer to banner ads that use HTML5 elements, which specifically means that the banners often offer interactive elements or contain more advanced visual elements compared to standard graphic banners. Due to the format’s greater potential in terms of creativity and a proven higher CTR, HTML5 banners are a popular choice amongst advertisers. In addition to providing more space for freedom with the visuals, various other benefits come with the popular banner type. One of the biggest advantages of HTML5 banners is that they can be used across platforms and devices, as you can incorporate responsive elements in the banners, so they adapt to the given device or format in a very simple manner. An example of an HTML5 banner could be a video banner on which a video launches as soon as the user hovers over the ad. The market is experiencing an increase in smartphone users on the internet, which also means that ads are increasingly being browsed on phone screens. While this might not sound like groundbreaking news, incorporating this fact into your banner design, does indeed have an impact. Banner ads should be as visually pleasing whether viewed on a smartphone or on a laptop. It is crucial that the user experience is the same level of excitement regardless of device and platform. Some elements that work perfectly when viewed on a larger computer screen may not always translate directly into a smaller mobile screen. However, this does not mean that you have to sit down and manually edit every single banner in your advertising campaign, as our best friend – HTML5 – does the job for you in the best automatic way possible. In other words, the HTML5 format gives you the opportunity to develop banners that are mobile-friendly, responsive and rich in content as well as features. In this way, you ensure that your ads are competitive and well-suiting for the smartphone-dominated market. In addition to the fact that ads should preferably be mobile-friendly, you can also take advantage of HTML5 banners capability to include video elements. In digital marketing and display advertising, the usage of video is growing drastically. In Europe alone, the usage of video ads has tripled compared to ads without video elements. The usage of video in your HTML5 banners makes your ad appear more authentic and creates a better connection with the user, which helps in conversion and sales. Moreover, video banners are a genius tool for the stylish business that wants to brand itself as aware of quality. At a basic level, you can use video in your banner as the background, or potentially as part of the banner animation. It can e.g., be a trailer that ends with a call to action (CTA) frame. The massive competition in the banner ad world means that you only have a few seconds to convince the user that your particular product or company is worth learning more about, which the video format is great for conveying. HTML5 banners come in both static and animated versions, but there is a growing popularity in the usage of animated HTML5 banners. A simple banner with an image and text that animates into the banner during the first three seconds can perfectly convey a message if you for example design banners for a florist and thus can use pictures of the floral decorations on the banner. It is a classic way to design HTML5 banners, that can be very successful, but there are also plenty of opportunities to take the HTML5 banners to the next level, by developing them into animated and interactive banners. Whether the HTML5 banner is static or animated, there are various benefits of using them in marketing. The biggest aspect is, as mentioned, that no matter what device or browser you are viewing the ad on, the animation displayed will be the same because the HTML5 format allows great opportunities for customizing the format. Despite this, size and format also mean something in terms of the conveyance of the message of the banner. A banner with too much text can easily look cool when viewed on a laptop, but it may be blurred or unreadable when viewed on a phone. This should therefore be taken into account when designing your HTML5 banner. If you choose an animated HTML5 banner, you also open the door to a world of creativity since you no longer are forced to squeeze all the information into a single image nor forcing all of your content to be displayed at once. HTML5 banners also have a bigger tendency to be remembered, because let’s face it: we love shiny and flashy things that have a professional look. When creating and designing your HTML5 banner, you are able to have a much greater influence on whether the user remembers the ad, as you can draw on elements like the aforementioned. Not to say that all HTML5 banners are exaggerated – users are just more likely to remember ads with a bit of a kick to them, compared to plain, still images. Because HTML5 banners can come in so many different sizes and designs, this also opens up the possibility of a greater reach when it comes to audiences. Some users tend to like text while others worship videos. HTML5 banners contain all of it and you therefore have the opportunity to convey to a much larger audience, as well as adapt your banners specifically to smaller target groups. When creating the layout of your banner ad, there are specific requirements for the pixels and measurements that the banner must meet. Depending on the platform or device you are designing the banner for, there are various different recommendations for banner sizes. If you use Zuuvi’s platform to develop your banners, you can create the same design in several sizes just by one click. In that way you save time, and you are able to produce several banners all at once. Banners come in many different sizes whereof the most common ones are “half page” (300×600), “leaderboard” (728×90) and “medium rectangle” (300×250). Which size that is the ideal for your particular situation is necessary to consider, as the size is not completely indifferent in terms of the communication of your messages within the banner. Are you in doubt about which banner size to start out with? Read more about what the different sizes are best suited for in our Cheat Sheet. If you are having difficulties with where to start, you can find inspiration from our templates and develop your design from there. We help you along the way with a predetermined color palette and animates that you can later edit to fit your visions of a gorgeous banner. If you already know exactly what you want, you can also start from scratch with a blank canvas and create from there. Start by choosing the right background and try out different fonts until you find the one that suits your brand and message the best. Remember to add your company’s logo to the banner, to ensure brand recognition. When producing HTML5 banners, the control you have over the design is almost limitless. Our platform makes it easy for you to edit all elements of the banner, so all you need to focus on is unfolding your creativity. Despite all of the smart tech making the development process easier for you, there are still a few things you need to bear in mind. Images you want to include on the banner should not exceed 4000×4000 pixels e.g. In fact, it is best to use as few pixels as possible without compromising with the quality of the image of course. The fewer pixels, the lighter the banner will be in terms of volume. Once your design is ready and the message is conveyed, it is time to add what is one of the most exciting features of HTML5 banners – the animations. You can add animation effects to your text, icons or the CTA buttons. This is where you get the opportunity to put your creativity to the test and explore the world of graphic animation. It is a good idea to keep in mind that just because you can animate everything, it does not mean that you should. Everything in moderation and limit your animations so it does not seem as if you are overusing your tools. In that way, you maintain a stylish banner that reflects your brand’s or business’ personality. In Zuuvi, we have a wide range of best-practice templates available to you when producing banners. This is how you can quickly get started producing a banner package. When you are happy with your HTML5 banner and its look, you can explore the different sizes available for download that our platform generates for you. Download the banner you need and upload it to the desired website or platform.
<urn:uuid:f8b65860-0f6e-446c-968e-89952420ca74>
CC-MAIN-2022-33
https://www.zuuvi.com/html5-banners
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00078.warc.gz
en
0.944492
1,736
1.539063
2
102 KAR 1:135. Interest credited to accounts. RELATES TO: KRS 161.440, 161.580, 161.705 STATUTORY AUTHORITY: KRS 161.310 NECESSITY, FUNCTION, AND CONFORMITY: KRS 161.440 provides for crediting interest, as defined in KRS 161.220(13), to the various funds of the Teachers' Retirement System, and KRS 161.580 requires that individual accounts be maintained for each member of the system. This administrative regulation sets out the procedures to be followed in crediting interest to each member's account. Section 1. Interest at the rate of three (3) percent shall be credited to all member accounts as long as the member is in active status with the retirement system. Section 2. For purposes of this administrative regulation "active status" means that time during which the member has valid service credit with the retirement system. Section 3. No interest shall be credited to member accounts during the first fiscal year of membership. Subsequent to the first fiscal year of membership, interest shall be credited as of June 30 of each year of active status. Section 4. Interest shall be assigned from the guarantee fund to each of the other funds, except the expense fund, at the end of each fiscal year. Interest shall be assigned to individual funds as follows: (1) The teachers' savings fund and the state accumulation fund shall be assigned equal amounts of interest in accordance with Sections 1, 2, and 3 of this administrative regulation. (2) The voluntary fund shall be assigned interest in accordance with 102 KAR 1:122. (3) All other funds, except the expense fund, shall be assigned interest based upon the average month end balance of the fund for each fiscal year. (TRS-17(a); 1 Ky.R. 462; eff. 3-12-75; Am. 2 Ky.R. 7; eff. 9-10-75; 17 Ky.R. 2476; eff. 4-5-91.)
<urn:uuid:585cedd0-b5b8-4a3e-9c27-4c3cd3939bbf>
CC-MAIN-2017-04
http://www.lrc.ky.gov/kar/102/001/135.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00465-ip-10-171-10-70.ec2.internal.warc.gz
en
0.942146
427
1.5625
2
Hinterland Goldenes Dreieck Loulé: Municipal market Loulé is the economically most important city in the hinterland of the Algarve. The "Mercado "Municipal", one of the landmarks in the Algarve, is the vivid centre, every Saturday attracting thousands of locals and tourits to buy fresh fish and seafood, regional specialties and agricultural produce from the neighbouring Alentejo. Loulé: Festival Med End of June the old city center of Loulé is transformed into a giant Mediterranean bazaar with music, food and activities for the whole family. It is one of the most popular summer events in the Algarvesince several years, attracting visitors from near and far. Loulé is famous for its colourful carnival procession, which is reminiscent of Brazil’s celebrations. The Avenida José da Costa Mealha and the Largo de Gago Coutinho are the main centres for the procession, where visitors pay a moderate fee to view the parade. Loulé: Noite Branca Loulé, capital of the Algarvian carnival, is also celebrating during the summer a great nocturnal street party, where visitors from near and far com dressed in white, and the city centre is decorated in white as well. Loulé: City gate Portas do Céu The city gates Portas do Céu were one of the entrances to the old part of the town found within the Moorish castle. The parish church of São Clemente is situated nearby. Loulé: Gipsy market The weekly gipsy market takes place at the western exit of Loulé. In the backgrond you can see the pilgrimage church Nossa Sra. da Piedade. Alte Keramik Atelier Alte Ribeira Bachlauif 3 Fonte Benemola Gewässer Mit Schilf Fonte Benemola Schilfweg The church is situated on hilltop in the centre of the hamlet. Querenca: Tourist Info The tourist information is situated next to the communal administration. The building includes a museum (Pólo Museologico de Água – Querença) about water, a natural richness of the area. Rocha da Pena: Flora In April the flora of the Barrocal landscape is flourishing lavishly. Rocha da Pena View from Rocha da Pena to eastern direction towards the Barrocal landscape near Pena.
<urn:uuid:617c17c8-a87c-4125-bd8e-0df1456e2184>
CC-MAIN-2022-33
http://www.algarve-portal.com/gallery.php?id=378
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00076.warc.gz
en
0.897146
553
1.757813
2
Does an AUC Decision Support Tool Improve Appropriate Use of Imaging Tests? Use of a multimodality appropriate use criteria decision support tool (AUC-DST) at the point of care not only enabled rapid determination of test appropriateness, but was also associated with decreased testing for inappropriate indications, according to results from a new study published in the Journal of the American College of Cardiology. Overall, use of an AUC-DST was associated with increases in appropriate testing and decreases in inappropriate testing over the study period. For tests ordered in the first two months compared to the last two months, appropriate tests increased from 49 percent to 61 percent (p=0.02), while inappropriate tests decreased from 22 percent to 6 percent (p<0.001). During this period, intended changes in medical therapy increased from 11 percent to 32 percent (p = 0.001), possibly as a result of the decreasing number of inappropriate studies over the course of the intervention. In addition to changes in appropriate and inappropriate testing, the AUC-DST was also found to be a quick and immediate source of feedback, with users reporting the tool took an average of approximately 2 minutes to determine the category of appropriateness based on AUC ratings developed by the American College of Cardiology. "Given the immediacy of feedback, the AUC-DST offered an educational component as well, which may have been associated with the observed trends towards increased intended changes in medical therapy changes without affecting intended rates of downstream testing," the authors said. "To our knowledge, this study is the first to evaluate the use of an AUC-DST to describe behavior of physician-preferred over policy-based testing, as well as the first to relate levels of appropriateness across multiple CAD imaging modalities to test results and future intended treatment plans. The authors point out that their study results differ from prior studies in that "patient- and scenario-specific educational feedback was provided necessarily as a function of using the AUC-DST in a manner that promoted learning and quality improvement through 'hands-on' usage rather than formal didactics; continuously as opposed to sporadically; from a multimodality rather than single modality perspective; and as a method for avoidance time-consuming RBM processes." In addition, the AUC-DST was used at the time of test ordering vs. later in the CAD evaluation process. However, they also acknowledge that the current study does not directly compare AUC-DST performance to RBMs in terms of test appropriateness rates, costs and clinical outcomes – a comparison they suggest now appears warranted. In the meantime, the authors point out that the study results may prove relevant to policymakers seeking to reduce unnecessary health care costs. "The results of our study suggest that a computerized point-of-order decision support system can reliably track physician behavior and that favorable changes can occur, even in the absence of RBM prior authorization requirements," the authors said. "Our results engender promise of the value of such an AUC-DST for improving appropriate testing, enhancing transparency, and reducing administrative burden." Keywords: Myocardial Perfusion Imaging, Quality Improvement, Echocardiography, Stress, Health Care Costs, Feedback, United States < Back to Listings
<urn:uuid:7d1f4af3-d67d-4081-8c15-8c9137c0ff51>
CC-MAIN-2017-04
http://www.acc.org/latest-in-cardiology/articles/2013/05/21/14/47/does-an-auc-decision-support-tool-improve-appropriate-use-of-imaging-tests
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00576-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953282
678
1.773438
2
|Date Added: August 30, 2011| |Favorited: 4 (view)| |Views: 0 in last hour, 4 in last day, 31 in last week, 65788 total| |Tags: how to draw robots, draw for kids| Description: Well, I think it’s about that time that we call it a night for me and for my tutorial day. Even though I’m leaving you all, that doesn’t mean that I won’t be back. To end things in a good way, I thought a simple tutorial on "how to draw a robot for kids", step by step would be a good call. I know I have been uploading so many cartoon style stuff including animals and characters, I have a wonderful drawing day ahead for you guys tomorrow. I will try to submit everything early so when you come home from school you have something to look forward to when you visit Dragoart again. A robot or robots are simple figures to create, but they can be complex if you are going for something detailed. This concept was specially made for those of you that haven’t a clue how to go about drawing a robot. The idea for a mechanical man replacement can vary, but I made sure that a very basic version was drawn. I think that you will find this a helpful tutorial because at least you can teach yourself something that you were thinking about tackling, in a very common or original way. That’s all I have for this description so I advise you to try out the submission and let me know what you thing about drawing a robot for kids. Adios my fellow artists and remember, don’t let the drive to draw die!
<urn:uuid:6fde14ba-baf8-410f-aab6-dd3c86c22c3e>
CC-MAIN-2022-33
https://dragoart.com/tut/how-to-draw-a-robot-for-kids-9234
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00275.warc.gz
en
0.96685
378
2.921875
3
Instructions: In 750-1,000 words, create an analysis of how a Christian worldview could Disney’s Mission and Vision statements and its business practices. Include the following: - Review the company’s Mission and Vision statements. - Describe elements of your company’s Mission and Vision statements that reflect the organization’s commitment to the greater social good - Explain how the company’s commitment to the greater social good relates to elements of a Christian worldview. - Are the company’s practices consistent with a Christian worldview? Explain. Be sure to cite three to five relevant and credible sources in support of your content. Use only sources found at the GCU Library or those provided in the topic Resources
<urn:uuid:22b255bd-d049-4a1d-90a1-51f27e4b7377>
CC-MAIN-2022-33
https://essaysprings.com/2022/07/04/instructions-in-750-1000-words-create-an-analysis-of-how-a-christian-worldview-could-disneys-mission-and-vision-statements-and-its-business-practices-include-the-following-review-the-companys-m-5/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00674.warc.gz
en
0.852434
152
2.390625
2
A lot of people are starting to ask about the security and privacy implications of the “Internet of Things”. Once there’s software in everything, what will go wrong? We’ve seen a botnet recruiting CCTV cameras, and a former Director of GCHQ recently told a parliamentary committee that it might be convenient if a suspect’s car could be infected with malware that would cause it to continually report its GPS position. (The new Investigatory Powers Bill will give the police and the spooks the power to hack any device they want.) So here is the video of a talk I gave on The Internet of Bad Things to the Virus Bulletin conference. As the devices around us become smarter they will become less loyal, and it’s not just about malware (whether written by cops or by crooks). We can expect all sorts of novel business models, many of them exploitative, as well as some downright dishonesty: the recent Volkswagen scandal won’t be the last. But dealing with pervasive malware in everything will demand new approaches. Our approach to the Internet of Bad Things includes our new Cambridge Cybercrime Centre, which will let us monitor bad things online at the kind of scale that will be required.
<urn:uuid:ecff3c5d-31ba-49ae-8e01-5df11135a00e>
CC-MAIN-2022-33
https://www.lightbluetouchpaper.org/2015/11/13/internet-of-bad-things/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.946249
252
2.421875
2
Hadi Partovi wants more kids to learn to code. Bill Gates, Mark Zuckerber, Sheryl Sandberg, and many others agree. Partovi wants all high schools to offer computer science classes because it represents a growing cluster of job skills but one that few schools teach–particularly schools attended by low income and minority kids. To fix the problem Hadi launched Code.org. The initial strategy is inspiration and advocacy. His site is packed with stats that make the case for coding (including the video below). For example, did you know that coding jobs aren’t just in tech? In fact, almost 70% of them are in other sectors–most businesses need people that can code. However, there are fewer schools, teachers, and computer science students in the US than 10 years ago. By contrast, every high school graduate in China must take 4 credits of Computer Science–and yet in the US it’s not even on the menu in most schools. The next step is to find a place on the master schedule of high schools around the country. He’d like to see computer science added to list of math and science classes kids can take to satisfy state graduation requirements. He’s fond of startups like CodeHS that are building computer science curriculum to take their rightful place in high school catalogs. Hadi also appreciates folks like Project Lead The Way making Computer Science a priority (see recent Getting Smart PLTW feature). Hadi is looking for ways to support teacher professional development for math and science teachers that can teach coding. He thinks there’s plenty of demand, “it’s a lack of teachers and budget that are holding us back.” Code.org advocacy appears to be working. When his video is shown in a high school, “we get a three to four fold increase in enrollment.” I asked Hadi why we couldn’t just rely on commercial sites like Udemy or Lynda to learn programs like Ruby. He said “Learning Ruby may be one of the best vocational things anyone could learn, but I wouldn’t recommend putting it in high school curriculum.” Hadi would rather “teach basic problem solving strategies like loops, functions, not specific languages.” “Coding is at intersection of tech ed and edtech,” said Partovi. “People get online Computer Science,” and “It may be an easier sell to blended Computer Science than blended math.” Hadi has a big fundraising goal–but he’s got allies that appreciate his objectives. For more on Code.org check out the video below.
<urn:uuid:a421fb7e-4b7d-450b-86e0-d684de59d1ee>
CC-MAIN-2017-04
http://www.gettingsmart.com/2013/05/teaching-kids-to-code-an-economic-social-justice-issue/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00218-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954602
554
2.828125
3
There are a whole lot of reasons to start working out, some of them including finding the right routine or the perfect exercise which will greatly benefit the way in which you will find the purpose of such exercise. Not only is working out great for maintaining a desired body shape or just losing some weight but it will also help in recovering from injuries and lead to a general better lifestyle. The desired results will immediately be seen by following procedures. Exercise generally benefit our bodies but improve the psychological aspects as well. People who work out often have shown to increase the way in which they recover and obtain energy levels which will help them go throughout the day. Not only will you live longer and happier but exercising regularly will generally improve the way in which you will lead your life. People Who Work Out are generally Happier People are generally a whole lot happier when working out despite them not even knowing the fact. Not only will people enjoy life more but they will also make sure that they will remain in this state of happiness even when not working out. Having a healthy lifestyle and at the same time adding some extra intensity to your workout routine will go a long way in terms of making people feel better about them. Learn How to Organize Yourself There are a whole lot of advantages in terms of working out and people who wish to do so will make sure that they will get highly organized. Irrespective of the fact that they are either increasing their miles when going for a run session or increasing your weights, people who are working out have a better understanding on how to achieve goals and how to set them properly. Not only will people achieve goals faster and easier but they will organize themselves better in terms of how to achieve these goals. People who keep a great track on how they lead their lives are generally more successful and effective in what they do, either in workout sessions or at their jobs. Improves the Quality of Sleep People who are working out are generally prone to some intense physical activities, thus improving the way in which people sleep. This fact is achieved by strengthening circadian rhythms and will generally improve the way we sleep throughout the night. These effects come extremely quick and improvements will surely be seen even from the first sessions. Starting on a workout will go a long way in making sure that people are achieving the best possible sleep whilst at the same time achieving their ideal bodies.
<urn:uuid:67543897-eb2e-4791-82cb-b44995a454bd>
CC-MAIN-2022-33
https://tgdaily.com/health/working-routines-greatly-improve-the-way-we-live/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00475.warc.gz
en
0.970331
477
2.203125
2
Schneier: Enjoy surveillance while it is still visible Measures such as ID cards are a temporary measure before biometric technology becomes ubiquitous; That was the warning from security guru Bruce Schneier this week who claims that surveillance technology will get more sophisticated and, more importantly, smaller and harder to detect. "We live in a very unique time in our society. The cameras are everywhere and you can still see them," said Schneier, BT's chief security technology officer. "Five years ago they weren't everywhere, five years from now you are not going to see them." As well as camera technology becoming less obtrusive, Schneier said that ID checks would also become less obvious and may not even require the obvious cooperation of the individual being checked. "Five years ago there weren't ID checks everywhere," he said. "But five or ten years from now they will happen in the background. It will be an Radio Frequency Identification (RFID) chip in your wallet, you won't even know its being checked." Biometric technologies such as face recognition, or systems based on a particular type of mobile phone owned or even clothes, may also be used for identity checks. The increase in background ID checks means that the current debate around national ID cards in the UK is only a short-term issue, according to Schneier. "I know there are debates on ID cards everywhere but in a lot of ways, they are only very temporary. They are only a temporary solution till biometrics takes over," he said. Eventually, even airports won't actually require people to show ID, as the checks will just happen in the background while you queue for check-in or move through the terminal. "When you walk into the airport they will know who you are. You won't have to show an ID – why bother? They can process you quicker," he said. Schneier also amused the audience by admitting that he used an ID card that he had made himself to gain entry to the security event he was speaking at. "We all had to show an ID before we got our RSA badge. I actually showed one I made at home. They asked for a photo-ID not an ID that was endorsed by anyone. It is endorsed by me and I guarantee that it is correct," he said. "It works everywhere but airports I find." The UK recently launched the first batch of its proposed national ID card scheme which is being mandated for foreign workers from November. The cards will slowly be applied to other groups, including eventually a voluntary national distribution but which will also include the addition of driving licences to the national ID database.
<urn:uuid:7b8c347e-1352-4fc5-8373-b21d23c9519d>
CC-MAIN-2017-04
http://www.h-online.com/security/news/item/Schneier-Enjoy-surveillance-while-it-is-still-visible-737847.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00439-ip-10-171-10-70.ec2.internal.warc.gz
en
0.983549
535
1.578125
2
Please help my solve this question: Two rockets are shot into the air from the same location. The paths of the rockets are given by #1: y = -0.025x^2 + 3x - 52.5, and #2: y = -0.04x^2 + 0.1x + 40. Which rocket goes higher, and by how much? I'm uncertain as to how I should solve this. Assistance would be much appreciated. Thank you.
<urn:uuid:1ab12db3-11e2-4474-8f47-1f2fd0fb83e0>
CC-MAIN-2017-04
http://mathhelpforum.com/algebra/27800-comparing-quadratics.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00465-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964193
102
2.6875
3
The Era Of Ambient Computing Has Begun With Its Role In IoT And Smart Tech Computing has changed the way how we all see the world. A new way of computing has just started to evolve. It is called ambient computing. Ambient computing is all about A.I. decisions made without human involvement, and it has big implications for the world of technology. There are several stages in ambient computing and these include the Internet of Things (IoT), machine learning, conditional rules, and seamless integration. Though we are far from a perfect ambient computing system, a few places where they are being used include chatbots on social media or websites, microphone software in an audiovisual room to auto-connect to calls, sensors in industrial equipment, electrical grids, in trains and freight cars to monitor the weight, and even in autonomous cars. They are also being used in the Nest Smart Thermostat, newer versions of Apple AirPods, and medical alert technology in smartwatches like the Apple Watch. Privacy is one of the most-discussed topics ever since smart devices have come into the picture. This is one area where ambient computing lacks clarity. Since all the interactions are machine to machine and less human interaction and oversight, there can be data breaches without anyone’s knowledge. The only solution to avoid this is to have some manual privacy measures such as a physical camera shutters, mic switches, and cloud data disposal. With smart home technology growing at a rapid pace, in future, there will be more machine interactions which will help in cutting out interactions that we have with the machine today. Check Out The Top 12 Smart Devices To Build A Smarter Home! Be The Superhero Of Your Smart Home You can teach an old 🏡 new tricks with smart devices. Whether your house is one or one hundred years old it can be a smart home. Sign up today to see the top 12 smart devices to build your smarter home. 🙂 Are you more interested in a Google smart home or an Amazon smart home? Let us know above.
<urn:uuid:2b596558-9dc4-4ccb-a1c1-151a7d7aa7b8>
CC-MAIN-2022-33
https://getsmarthomedevices.com/the-era-of-ambient-computing-has-begun-with-its-role-in-iot-and-smart-tech
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00667.warc.gz
en
0.927571
439
3
3
United States v. Denver & Rio Grande Ry. Co. Annotate this Case 150 U.S. 1 (1893) - Syllabus | U.S. Supreme Court United States v. Denver & Rio Grande Ry. Co., 150 U.S. 1 (1893) United States v. Denver and Rio Grande Railway Company Argued October 10, 1893 Decided October 23, 1893 150 U.S. 1 After the expiration of the time limited by the Act of June 8, 1872, 17 Stat. 339, c. 354, for the completion of its road to Santa Fe, if not before that time, the Denver and Rio Grande Railway Company was entitled to claim the benefit of the Act of March 3, 1875, 18 Stat. 482, c. 151, upon complying with its conditions. The Act of March 3, 1875, 18 Stat. 482, c. 151, granting a right of way to railroads through the public lands, and authorizing them to take therefrom timber or other materials necessary for the construction of their roadways, station buildings, depots, machine shops, sidetracks, turnouts, water stations, etc., permits a railway company to use the timber or material so taken on portions of its line remote from the place from which it is taken. In its ordinary acceptation and enlarged sense, the term "railroad" includes all structures which are necessary and essential to its operation. While it is well settled that public grants are to be construed strictly as against the grantees, they are not to be so construed as to defeat the intent of the legislature or to withhold what is given. General legislation offering advantages in the public lands to individuals or corporations as an inducement to the accomplishment of enterprises of a quasi-public character through undeveloped public domain should receive a more liberal construction than is given to an ordinary private grant. It is not decided that the Act of March 3, 1875, gave a right to take timber from the public domain for making rolling stock, nor what structure, if any, not enumerated in that act would constitute necessary, essential, or constituent parts of a railroad. The case is stated in the opinion.
<urn:uuid:7dd7b14a-68d5-4a29-a2aa-98d759518c08>
CC-MAIN-2017-04
https://supreme.justia.com/cases/federal/us/150/1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00115-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961826
464
1.859375
2
Do you have an impedance mismatch problem? Users speak up! Second series of user reports published. I have started a new series of interviews with users of technologies for storing and handling persistent objects, around the globe. 6 additional user reports (12-17/08) have been published, from the following users: - Ajay Deshpande, Persistent - Horst Braeuner, City of Schwaebisch Hall - Tore Risch, Uppsala University - Michael Blaha, OMT Associates - Stefan Keller, HSR Rapperswil - Mohammed Zaki, Rensselaer The complete initial series of user reports is available as always for free download. Here I define “users” in a very broad sense, including: CTOs, Technical Directors, Software Architects, Consultants, Developers, Researchers. I have asked 5 questions: Q1. Please explain briefly what are your application domains and your role in the enterprise. Q2. When the data models used to persistently store data (whether file systems or database management systems) and the data models used to write programs against the data (C++, Smalltalk, Visual Basic, Java, C#) are different, this is referred to as the “impedance mismatch” problem. Do you have an “impedance mismatch” problem? Q3. What solution(s) do you use for storing and managing persistence objects? What experience do you have in using the various options available for persistence for new projects? What are the lessons learned in using such solution(s)? Q4. Do you believe that Object Database systems are a suitable solution to the “object persistence” problem? If yes why? If not, why? Q5. What would you wish as new research/development in the area of Object Persistence in the next 12-24 months? More information here.
<urn:uuid:4cfb6264-58a8-4840-8848-700d51d3bb5f>
CC-MAIN-2017-04
http://www.odbms.org/blog/2008/09/second-series-of-user-reports-published/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00552-ip-10-171-10-70.ec2.internal.warc.gz
en
0.895655
403
1.6875
2
We are searching data for your request: Upon completion, a link will appear to access the found materials. No one likes writing a resume, but it's a critical part of the job search in all fields. In academics, the resume is called a curriculum vitae (or CV) and it is even less fun to write. Unlike a resume which presents your experience and skills within a 1-page format, the curriculum vitae has no page limit. The most prolific professionals I have encountered have CVs that are dozens of pages long and bound as books. That's highly unusual, of course, but the point is that the CV is a comprehensive list of your experiences, accomplishments, and the products of your work. Your mentor likely has a CV of 20 pages or more, depending on his or her productivity, rank, and experience. Beginning graduate students usually start out with 1 page CVs and work hard to flesh them out into multiple page documents. It can be easy to add pages when you consider what goes into a CV. The CV lists your education, work experience, research background and interests, teaching history, publications, and more. There's lots of information to work with, but can you include too much information? Is there anything that you should not include on your CV? Don't Include Personal Information It was once common for people to include personal information on their CVs. Never include any of the following: - Social security number - Marital status - Height, weight, hair color, or other personal attributes - Number of children It is illegal for employers to discriminate against potential employees on the basis of personal characteristics. That said, people naturally judge others. Allow yourself to be judged only on your professional merits and not on your personal characteristics. Don't Include Photos Given the ban on personal information, it should go without saying that applicants should not send photographs of themselves. Unless you are an actor, dancer, or another performer, never attach a picture of yourself to your CV or application. Don't Add Irrelevant Information Hobbies and interests should not appear on your CV. Include only extracurricular activities that are directly related to your work. Remember that your goal is to portray yourself as serious and an expert in your discipline. Hobbies can suggest that you're not working hard enough or that you are not serious about your career. Leave them out. Don't Include Too Much Detail It's an odd paradox: Your CV presents detailed information about your career, but you must take care not to go into too much depth in describing the content of your work. Your CV will be accompanied by a research statement in which you walk readers through your research, explaining its development and your goals. You will also write a statement of teaching philosophy, explaining your perspective on teaching. Given these documents, there is no need to go into minute detail describing your research and teaching other than the facts: where, when, what, awards granted, etc. Don't Include Ancient Information Do not discuss anything from high school. Period. Unless you discovered a supernova, that is. Your curriculum vitae describes your qualifications for a professional academic career. It is unlikely that experiences from college are relevant to this. From college, list only your major, graduation year, scholarships, awards, and honors. Do not list any extracurricular activities from high school or college. Do Not List References Your CV is a statement about YOU. There is no need to include references. Undoubtedly you'll be asked to provide references but your references do not belong on your CV. Don't list that your "references are available upon request." Surely the employer will request references if you're a potential candidate. Wait until you are asked and then remind your references and tell them to expect a call or email. Do Not Lie It should be obvious but many applicants make the mistake of including items that are not entirely true. For example, they might list a poster presentation that they were invited to give but didn't. Or list a paper as under review that is still being drafted. There are no harmless lies. Don't exaggerate or lie about anything. It will come back to haunt you and ruin your career. Although you should never lie, don't give employers a reason to dump your CV in the trash-pile. That means don't spill the beans unless you are asked. If they're interested and you're offered the job you may be asked to consent to a background check. If so, that's when you discuss your record - when you know that they are interested, Discuss it too soon and you may lose an opportunity. Don't Write in Solid Blocks of Text Remember that employers scan CVs. Make yours easy to read by using bold headings and short descriptions of items. Do not include big blocks of text. No paragraphs. Don't Include Errors What's the fastest way to get your CV and application tossed? Spelling mistakes. Bad grammar. Typos. Do you prefer to be known as careless or poorly educated? Neither will help you advance in your career. Always review your CV carefully before submitting. Don't Include a Touch of Flair Fancy paper. Unusual font. Colored font. Scented paper. Although you want your CV to stand out, be sure that it stands out for the right reasons, such as its quality. Do not make your CV look different in color, shape, or format unless you want it passed around as a source of humor.
<urn:uuid:37397e2e-1a2c-491f-bb59-cc795f5cde9e>
CC-MAIN-2022-33
https://tz.leskanaris.com/4272-items-to-exclude-from-your-curriculum-vitae-cv.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00274.warc.gz
en
0.958181
1,142
2.390625
2
The Secret to Building a Salad Keyhole Garden A keyhole garden is a remarkably adaptable element that works in a range of garden styles. Visiting other people’s gardens is a lovely way to peek into their passions and interests. Some gardeners are completely devoted to one type of plant, while others have a set purpose in mind, such as growing and harvesting herbs and vegetables. I’ve always been a bit of an equal-opportunity gardener: a few veggies, some blooms, and a few foundation trees for structure. But this year I’ve decided to focus my gardening efforts on a new type of themed garden: a salad keyhole garden. What is a Keyhole Garden? Raised beds are nothing new. The idea is to elevate the garden to maximize drainage, improve the soil, and enhance access. Keyhole gardens are a riff on that idea, with one addition: a center compost area that works as a self-fertilizing element for the plants. A salad keyhole garden takes it a step further, by planting specific vegetables and herbs together–to be picked at the same time–to create a delicious dish. What’s most interesting about keyhole gardens is their bountiful history. They began as an invention of charitable organizations to help people in poor countries create a self-sustainable, controllable food source. Considering that the construction of keyhole gardens often utilizes recycled materials – think cast-off tin and upcycled bricks – schools in some of those countries utilize the gardens as a way to both grow nutritious ingredients for school lunches and as a learning tool, for children to take the idea home to their parents. The center compost bin serves a dual purpose: it provides nutrients to the plants and offers a spot for recycling kitchen waste. One of the biggest attractions of a keyhole garden is its ease of construction. Nearly any material that will withstand the stressors of weather–rock, stone, bricks, metal–will work for the walls. Although there’s no right or wrong height, a keyhole garden typically maxes out at about 6 feet wide, but smaller diameters will work well too. The access notch makes the garden look like a keyhole, and leads to the composting center. That’s often placed on the least sunny side of the bed (usually north), to allow the plants to better capture sun. Why Should I Use a Keyhole Garden? Most landscapes pack in a lot of function, sometimes into a very small area. Some gardeners would love a compost bin, for example, but feel they don’t have room or aren’t even sure how to get started. Others may want a raised bed devoted to vegetables or a particular flower type, but aren’t positive how to include it in their yard. A keyhole garden is an easy way to incorporate compost of already used food scraps, while growing new, fresh produce or beautiful flowers. Many of us (me included) forget to fertilize flowerbeds, or irregularly add an extra layer of compost or mulch to replenish depleted soil. But plants thrive on rich organic materials (i.e. compost) and a keyhole garden does the work for us very busy gardeners. That easy-to-produce compost is like gardener’s gold. On one hand, it gives plants a super-juiced supply of nutrients for optimal growth, and on the other hand it conserves every drop of moisture, which is important for drought-challenged parts of the country. Because they’re raised, keyhole gardens are also much easier to work in, often enabling maintenance without tiresome bending over. That’s particularly attractive for people with mobility issues or for young children. Keyhole gardens are also incredibly adaptable to a variety of design aesthetics. Traditionalists can add a pretty climbing trellis, while the cottage gardener may opt for a rambling, flowering vine that flows over the keyhole garden’s side. How is a Keyhole Garden Constructed? Despite all of its function, the setup of a keyhole garden is fairly simple. Using a garden hose, mark out a circle about six feet wide. Then, mark a notch out of the circle roughly a foot wide that narrows slightly toward the center (think of a slice of pizza with a flattened end instead of a point). At the center of the circle, create another smaller circle (about a foot wide): this will be your compost bin. Next, you’ll need to create the sides of your keyhole garden and give some structure to the center compost bin. We’ll use bricks as an example: Simply alternate the bricks in a dry stack (meaning no mortar necessary), circling around in layers until you reach about waist height. At the center of the keyhole garden, add the compost basket. Typically this circle is surrounded by a material such as chicken wire and is about one to one-and-a-half feet wide. The goal is to hold the compostable materials in place while allowing for drainage out to the surrounding garden. For added stability, countersink the chicken wire into the ground. The top of the compost basket often extends above the top of the soil in the bed, and some bins use a cap to deflect water into the garden itself. The first few inches of the compost basket’s bottom are filled with drainage materials such as rocks, the rest holds kitchen and yard waste that decomposes and turns into compost. Although the compost bin is filled with kitchen waste, the planting space of the keyhole garden should be filled with easily biodegradable materials, such as newspaper, shredded old phone books, and cardboard, for example, as well as garden soil. The top of the soil in the planting area should gently slope away from the compost basket to encourage drainage and the movement of compost into the keyhole garden’s growing area. Plants and Planting for a Salad Keyhole Garden Nearly any plant combination will work in a keyhole garden, but theming the planting is a fun method to try out. For my salad garden, I’m planting a range of crunchy, yummy plants. Some will be ready for early springtime salads, while others will add flavor later in the season. The key plants I’m planning to include are: - Arugula and other specialty greens - Green onions - Carrots (to harvest as baby carrots) - Cherry tomatoes There are two ways of grouping plants in a salad keyhole garden. You can group the individual plants together (all the lettuces, for example) or you can plant taller items at the center of the garden, with lower-growing salad fixings at the front. You’ll need to water well until the plants are established – then sit back, watch your salad keyhole garden grow, and eat the tasty results of your labor.
<urn:uuid:b0b568cd-28c9-4661-bec2-732027bb3fb9>
CC-MAIN-2017-04
https://www.fix.com/blog/building-a-salad-keyhole-garden/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00294-ip-10-171-10-70.ec2.internal.warc.gz
en
0.92307
1,464
2.484375
2
Toyota implementing technology from i-unit Even though the i-unit made a funky debut last year, Toyota says it is adapting the fiber body part technology to make interior parts. The i-unit body is made from kenaf fiber, which Toyota calls "carbon neutral." In other words, the carbon dioxide released by burning the plants to make the parts is offset by the carbon dioxide the plant absorbs while growing. Bioplastics made from plants are used in some applications such as the floor mats and spare tire cover on the Raum compact car in Japan. Toyota says it wants to replace every plastic component in a car with a plant-based material. Mitsubishi is also working on a tailgate interior surface made from bamboo panels, and a bio-fabric floor mat is also being developed. Officials say production costs for plant-based materials can be up to 30 percent higher than conventional plastics but may become cheaper as petroleum-based products become more expensive. In other applications, Honda may be the first to offer bio-fabric seats in a future fuel-cell vehicle. Officials admit potential problems with durability, sun exposure and rough texture. [Source: Japan Times] - Most and least efficient car companies - Fastest-depreciating cars in the United States - Find and compare 2017 Models
<urn:uuid:e6a51ad9-0c03-432d-9d4a-d37f8fee7f3e>
CC-MAIN-2017-04
http://www.autoblog.com/2006/09/14/toyota-implementing-technology-from-i-unit/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00180-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950178
273
2.375
2
2007 Schools Wikipedia Selection. Related subjects: Sports Badminton is a racquet sport played by either two opposing players (singles) or two opposing pairs (doubles). The players or pairs take positions on opposite halves of a rectangular court that is divided by a net. Unlike many racquet sports, badminton does not use a ball: badminton uses a feathered projectile known as a shuttlecock. Since the shuttlecock is strongly affected by wind, competitive badminton is always played indoors. The players strike the shuttlecock with their rackets so that it passes over the net and into the opponents' half of the court. The rally ends once the shuttlecock touches the ground: every stroke must be played as a volley. In doubles, either player of a pair may hit the shuttlecock (except on service), but only a single stroke is allowed before the shuttlecock passes again into the opponents' court. Players are awarded a point if the shuttlecock lands on or within the marked boundary of their opponents' court, or if their opponent's stroke fails to pass the net or lands outside the court boundary. A rally begins with the service, in which the serving player must strike the shuttlecock so that, if left, it would land in the diagonally opposite service court. In doubles, only one player, the receiver, may return the service (thereafter either player may hit the shuttlecock); the order of doubles service is determined by the Laws, which ensure that all the players shall serve and receive in turn. If the server wins the rally, he will continue serving; if he loses the rally, the serve will pass to his opponent. In either case, the winner will add a point to his score. A match consists of three games; to win each game players must score 21 points (exceptions noted below). There are five events: men's singles, women's singles, men's doubles, women's doubles, and mixed doubles (each pair is a man and a woman). History and development Badminton is widely believed to have originated in ancient Greece about 2000 years ago. From there it spread via the Indo-Greek kingdoms to Indian and then further east to China and Siam (now Thailand). In England since medieval times a children's game called Battledore and Shuttlecock was popular. Children would use paddles (Battledores) and work together to keep the Shuttlecock up in the air and prevent it from reaching the ground. It was popular enough to be a nuisance on the street of London in 1854 when the magazine Punch published a cartoon depicting it. In the 1860s, British Army officers in Pune, India, began playing the game of Battledore and Shuttlecock, but they added a competitive element by including a net. As the city of Pune was formerly known as Poona, the game was known as Poona at that time. About this same time, the Duke of Beaufort was entertaining soldiers at his estate called " Badminton House", where the soldiers played Poona. The Duke of Beaufort’s non-military guests began referring to the game as "the badminton game", and thus the game became known as "badminton". In 1877, the first badminton club in the world, Bath Badminton Club, transcribed the rules of badminton for the first time. However, in 1893, the Badminton Association of England published the first proper set of rules, similar to that of today, and officially launched badminton in a house called 'Dunbar' at 6 Waverley Grove, Portsmouth, England on September 13 of that year. They also started the All England Open Badminton Championships, the first badminton competition in the world, in 1899. The International Badminton Federation (IBF) was established in 1934 with Canada, Denmark, England, France, the Netherlands, Ireland, New Zealand, Scotland, and Wales as its founding members. India joined as an affiliate in 1936. The IBF now governs international badminton and develops the sport globally. Scoring system development In the traditional scoring system, games were played to 15 points, except for women's singles which was played up to 11. A match was decided by the best of three games. Only the serving players were able to score a point. In doubles, both players of a pair would serve before the service returned to the other side: in order to regain the service, the receiving pair had to win two rallies (not necessarily consecutively). In 1992, the IBF introduced new rules: setting at 13-all and 14-all. This meant that if the players were tied at 13-13 or 14-14 (9-9 or 10-10 for women's singles), the player who had first reached that score could decide elect to set and play to 17 (or to 13 for women's singles). In 2002 the IBF, concerned with the unpredictable and often lengthy time required for matches, decided to experiment with a different scoring system to improve the commercial and especially the broadcasting appeal of the sport. The new scoring system shortened games to 7 points and decided matches by the best of 5 games. When the score reached 6-6, the player who first reached 6 could elect to set to 8 points. Yet the match time remained an issue, since the playing time for the two scoring systems was similar. This experiment was abandoned and replaced by a modified version of the traditional scoring system. The 2002 Commonwealth Games is the last event used this scoring system. In December 2005 the IBF experimented again with the scoring system, intending both to regulate the playing time and to simplify the system for television viewers. The main change from the traditional system was to adopt rally point scoring, in which the winner of a rally scores a point regardless of who served; games were lengthened to 21 points. However, the new scoring system makes the game duration significantly shorter. The experiment ended in May 2006, and the IBF ruled that the new scoring system would be adopted from August 2006 onwards. This scoring system is described in full in Scoring system and service, below. Laws of the Game The following information is a simplified summary of the Laws, not a complete reproduction. The definitive source of the Laws is the IBF Laws publication, although the digital distribution of the Laws contains poor reproductions of the diagrams. Playing court dimensions The court is rectangular and divided into halves by a net. Courts are almost always marked for both singles and doubles play, although the laws permit a court to be marked for singles only. The doubles court is wider than the singles court, but the doubles service court is shorter than the singles service court. The full width of the court is 6.1 metres, and in singles this width is reduced to 5.18 metres. The full length of the court is 13.4 metres. The service courts are marked by a centre line dividing the width of the court, by a short service line at a distance of 1.98 metres from the net, and by the outer side and back boundaries. In doubles, the service court is also marked by a long service line, which is 0.78 metres from the back boundary. The net is 1.55 metres (5 ft 1 inch) high at the edges and 1.524 metres (5 ft) high in the centre. The net posts are placed over the doubles side lines, even when singles is played. Surprisingly, there is no mention in the Laws of a minimum height for the ceiling above the court. Nonetheless, a badminton court will not be suitable if the ceiling is likely to be hit on a high serve. The Laws specify which equipment may be used. In particular, the Laws restrict the design and size of rackets and shuttlecocks. The Laws also provide for testing a shuttlecock for the correct speed: - To test a shuttle, use a full underhand stroke which makes contact with the shuttle over the back boundary line. The shuttle shall be hit at an upward angle and in a direction parallel to the side lines. - A shuttle of the correct speed will land not less than 530 mm and not more than 990 mm short of the other back boundary line.... Scoring system and service A point shall be added to a player's score whenever he wins a rally. A match consists of the best of three games; a game is won by the first player to score 21 points, except if the score reaches 20 points each; in this case, play shall continue until one player either achieves a two point lead (such as 24-22), or his score reaches 30 (the score shall not extend beyond 30: 30-29 is a winning score). At the start of a match a coin toss is conducted between the players or pairs. The winners of the coin toss may make one of two choices: they may choose whether to serve or receive first, or they may choose which end of the court they wish to occupy. After they have made this choice, their opponents shall exercise the remaining choice. In less formal settings, the coin toss is often replaced by hitting a shuttle into the air: whichever side it points to shall serve first. In subsequent games, the winners of the previous game shall serve first. For the first rally of any doubles game, the serving pair may decide who serves and the receiving pair may decide who receives. The players shall change ends at the start of the second game; if the match proceeds to a third game, the players shall change ends both at the start of the game and when the leading pair's score reaches 11 points. In singles, the server shall stand in his right service court when his score is even, and in his left service court when his score is odd; his opponent shall stand in the diagonally opposite service court. In doubles, the players shall remember their service positions from the previous rally; the receivers shall remain in the same service courts. When a receiving pair wins a point and thereby regains the service, they shall not change their service court positions. If their new score is even, then the player in the right service court shall serve; if their new score is odd, then the player in the left service court shall serve. Thereafter, if they continue to win points, the server shall alternate between the service courts, so that he serves to each receiver in turn. There are several notable consequences of this system. First, rally point scoring ensures that the start of the game is fairer than under the older scoring system; without rally point scoring, serving at the start of the game is a significant advantage. Second, there is no "second server", unlike under the older scoring system. Third, each time a pair regains the service, the service court laws ensure that the server shall be the player who did not serve last. The server and receiver must remain within their service courts, so that their feet do not touch the boundary lines, until the server strikes the shuttle. The other two players may stand wherever they wish, so long as they do not unsight the opposing server or receiver. Players win a rally by striking the shuttle onto the floor within the boundaries of their opponents' court. Players also win a rally if their opponents commit a fault. The most common fault in badminton is when the players fail to return the shuttle so that it passes over the net and lands inside their opponents' court, but there are also other ways that players may be faulted. The following information lists some of the more common faults. Several faults pertain specifically to service. A serving player shall be faulted if he strikes the shuttle from above his waist (defined as his lowest rib), or if his racket is not pointing downwards at the moment of impact. This particular law changed in 2006: previously, the server's racket had to be pointing downwards to the extent that the racket head was below the hand holding the racket; now, any angle below the horizontal is acceptable. Neither the server nor the receiver may lift a foot until the shuttle has been struck by the server. The server must also initially hit the base (cork) of the shuttle, although he may afterwards also hit the feathers as part of the same stroke. This law was introduced to ban an extremely effective service style known as the S-serve or Sidek serve, which allowed the server to make the shuttle spin chaotically in flight. Each side may only strike the shuttle once before it passes back over the net; but during a single stroke movement, a player may contact a shuttle twice (this happens in some sliced shots). A player may not, however, hit the shuttle once and then hit it with a new movement, nor may he carry and sling the shuttle on his racket. It is a fault if the shuttle hits the ceiling. If a let is called, the rally is stopped and replayed with no change to the score. Lets may occur due to some unexpected disturbance such as a shuttle landing on court (having being hit there by players on an adjacent court). If the receiver is not ready when the service is delivered, a let shall be called; yet if the receiver makes any attempt to return the shuttle, he shall be judged to have been ready. There is no let if the shuttle hits the tape (even on service). Racquet: A racquet is a vital piece of equipment in badminton. Traditionally racquets were made of wood. Later on, aluminium or other light metals became the material of choice. Badminton racquets are composed of carbon fibre composite ( graphite reinforced plastic), with titanium composites ( nanocarbon) added as extra ingredients. Carbon fibre has an excellent strength to weight ratio, is stiff, and gives excellent kinetic energy transfer. They are two types of racquet: isometric (square) and oval. Racquets normally weigh between 80-95 g but weight differs between manufacturers, as it can affect how fast the racquet can swing. Grip: Grip is the interface between the player's hand and the racquet. Type, size and thickness are three characteristics that affect the choice of grip. There are two types of grips: synthetic and towel. Synthetic grips are less messy and provide excellent friction. Towel grips are usually preferred as they are usually more comfortable and absorbent of sweat. Both have disadvantages as synthetic grips can deteriorate if too much sweat is absorbed and towel grips need to be changed often. String: Perhaps one of the most overlooked areas of badminton equipment is the string. Different types of string have different response properties. Durability generally varies with performance. Most strings are 21 gauge in thickness and strung at 18 to 30 lbf (80 to 130 newtons) of tension. Racquets strung at lower tensions (18 to 21 lbf or 80 to 95 N) generate greater power while racquets strung at higher tensions provide greater control (21 lbf, over 95 N). Simply, a higher tension rewards hard hitting, while it robs power from a light hitter. Conversely, a lower tensioned string helps light hitter with a better timed trampoline effect. Shuttlecock: A shuttlecock has an open conical shape, with a rounded head at the apex of the cone, they are made of cork and overlapped by sixteen goose feathers. There are different speeds and weights, but for easy classification, 75 is regarded as slow and 79 is the fastest shuttlecock. The feather shuttle is fairly brittle and thus for economical reasons this has been replaced by the use of a plastic (usually nylon) or rubber head and a plastic (usually nylon) skirt for practice use. Shoes: Because acceleration across the court is so important, players need excellent grip with the floor at all times. Badminton shoes need gummy soles for good grip, reinforced side walls ( lateral support) for durability during drags, and shock dispersion technology for jumping; badminton places a lot of stress on the knees and ankles. Like most sports shoes, they are also light weight. They have a thin but well supported sole with good lateral support to keep the player’s feet close to the ground, allowing for speed and ankle bending directional changes with lower chance of injury; light weight for faster foot movement. There are many strokes in badminton; below is a list of basic strokes, which is divided into strokes played from the forecourt, midcourt, and rearcourt (the forecourt is the part of the court near the net, the rearcourt is the part of the court farthest away from the net, and the midcourt is the area in between them). This list does not include every possible stroke, but only the strokes that are commonly played from that part of the court. The descriptions also assume that the players are of a very high standard and are making sensible choices of strokes. Strokes played from the forecourt - The serve begins a rally. Serves are subject to several service laws that limit the attacking potential for service. The overall effect of these laws is that the server must hit in an upwards direction; "tennis serves" are prohibited. The serve is always cross court (diagonal). - Low serve - The low serve travels into the receiver's forecourt, to fall on or just after the opponents short service line. Low serves must travel as close to the net tape as possible, or they will be attacked fiercely. In doubles, the straight low serve is the most frequently used service variation. - High serve - The high serve is hit very high, so that the shuttle falls vertically at the back of the receiver's service court. The high serve is never used in doubles, but is common in singles. - Flick serve - Although the flick serve is hit upwards, the trajectory is much shallower than the high serve. - Drive serve - Drive serves are hit flat to the back of the receiver's service court. The drive serve is almost never used in elite games, because it relies on the receiver being unprepared. If the receiver reacts well, then the drive serve will be severely punished. - A netshot is played into the opponent's forecourt, as close to the net as possible. - Net kill - The net kill is a shot which aims to kill the shuttle into the floor very close to the opponent's side of the net. The trajectory is almost vertical. It is commonly used to punish a poor low serve. The net kill is executed with a sudden, powerful 'tapping' motion produced by the wrist. This technique helps to eliminate the danger of hitting the net. - Long kill - The long kill is a net kill that is not so steep and therefore travels towards the rearcourt. A long kill is only used if a steeper kill cannot be played. It is similar to a net drive, but much more aggressive. The long kill can be played when returning a poor low serve. - Net drive, net push, net lift - These strokes are all the same as their midcourt counterparts, which are described below. Strokes played from the midcourt With the exception of the smash, all midcourt strokes are played with the shuttle either near the ground, or about net height, or slightly higher than net height. If the shuttle is ever high in the midcourt, a powerful smash will be played to finish the rally. - A drive is played when the shuttle is near net height, at the side of the player's body. Drives pass with pace into the opponent's midcourt or rearcourt. Although drives are played with pace, very high shuttle speed is not desirable because the shuttle will go out at the back. The trajectory of a drive is approximately flat. - Half-court drive - A drive played from in front of the body, usually hitting the shuttle from nearer the net than an ordinary drive. - A push is played from the same situation as a drive, but played softly into the opponent's forecourt or front midcourt. - Half-court push - A push played from in front of the body, usually hitting the shuttle from nearer the net than an ordinary push. - A lift is played upwards to the back of the opponent's court. Midcourt lifts are most commonly played in response to a smash or well-placed push. - Defensive lift - A lift that is hit very high, so that the player gains time for recovery to a good base position. Defensive lifts, because of the flight characteristics of a shuttlecock, force the opponent to hit from the extreme back of the court. - Attacking lift - A lift that is hit more shallowly, so that the opponent is forced to move very quickly to prevent the shuttle from travelling behind him. Attacking lifts, because of the flight characteristics of a shuttlecock, may be intercepted slightly earlier than defensive lifts. - See the smash entry under rearcourt strokes, below. A midcourt smash is especially devastating. Strokes played from the rearcourt In the rearcourt, most strokes are played overhead. If the shuttle has dropped low in a player's rearcourt, so that he is unable to play an overhead stroke, then he is at a great disadvantage and is likely to lose the rally. The following strokes are all played from overhead: - A clear travels high and to the back of the opponent's rearcourt. - Defensive clear - A clear that is hit very high, so that the player gains time for recovery to a good base position. Defensive clears, because of the flight characteristics of a shuttlecock, force the opponent to hit from the extreme back of the court. - Attacking clear - A clear that is hit more shallowly, so that the opponent is forced to move very quickly to prevent the shuttle from travelling behind him. Attacking clears, because of the flight characteristics of a shuttlecock, may be intercepted slightly earlier than defensive clears. - A smash is a powerful stroke, played so that the shuttle travels steeply downwards at great speed into the opponent's midcourt. - Jump smash - A smash where the player jumps for height. The aim of a jump smash is to hit the smash at a steeper angle. Jump smashes are most common in men's doubles. - A dropshot is played downwards into the opponent's forecourt. Dropshots are usually disguised as smashes or clears, so that the opponent cannot anticipate the dropshot. Advanced strokes are typically variations on a basic stroke. Often the purpose of an advanced stroke is to deceive the opponent, but advanced strokes may also be used to manipulate the flight path of the shuttlecock by introducing spin. Spin may cause the shuttlecock to follow a curved path and to dip more steeply as it falls. A common technique for advanced strokes is slicing, where the shuttle is hit with an angled racket face. Often players brush the racket face around the shuttlecock to achieve more spin from their slice. Slices can be used to deceive opponents about the direction in which the player is going to hit the shuttle, and to make apparently powerful strokes that travel slowly (a dropshot may be disguised as a smash). The lightness of modern rackets allows good players to play many strokes with a short swing. This skill provides opportunities for deception, because the player may pretend to play a soft stroke (such as a netshot), but then accelerate the racket at the last moment to play a more powerful stroke (such as a lift). This form of deception may also be reversed: players may pretend to play a powerful stoke, but then decelerate the racket at the last moment to play a soft stroke. In general, the former type of deception is more common towards the front of the court, whereas the latter type of deception is more common towards the back of the court. Another technique for deception is double motion. In this technique, the player will make an initial motion towards the shuttlecock and then quickly withdraw the racket to hit the shuttlecock in a different direction. The aim is to show the opponent one direction but then quickly place the shuttlecock elsewhere. Some players may even use triple motion, although this is much rarer. The following lists are not comprehensive; the scope for advanced strokes in badminton is large, in particular for deceptive strokes. - Sliced dropshot - A sliced dropshot allows the player to deceive his opponent about both the power and direction of the stroke. For example, the opponent may expect a straight clear or smash, but receive a crosscourt dropshot instead. Slicing the shuttlecock heavily will cause it to follow a curved path and dip more sharply as it crosses the net. There are two types of sliced dropshots - the normal slice and the reverse slice. The normal slice is played so that the shuttle goes left while the receiver thinks it goes right, however the reverse slice requires more of a brushing motion in order to slice the shuttle to the right while the opponent thinks the drop is being played to the left. - Sliced smash - A sliced smash allows the player to deceive his opponent about the direction of his smash. Slicing a smash also allows players to hit in directions that they might otherwise find impossible given their body position on the court. - Spinning netshot (also called a tumbling netshot) - Slicing underneath the shuttlecock allows the player to spin the shuttlecock so that it turns over itself several times as it crosses the net. The opponent will be unwilling to address the shuttlecock until it has corrected its flight. The spin also makes the shuttlecock fall tighter to the net. - Sliced low serves - Slicing the low serve may be used both for the straight low serve and for the wide low serve to the left side lines (for a righthander). - Sliced straight low serve - The purpose of slicing this serve is to not to change the direction, but to make the shuttle dip more steeply as it passes the net. The slicing may also cause the shuttle to wobble or shake in the air (introducing precession to the shuttle's flight), making it harder for the receiver to time and control his reply. - Sliced wide low serve - The purpose of slicing this serve is to deceive the opponent into believing that a straight serve, either low or flicked, is being played. For a righthander, the racket head will move at least slightly from left to right, but the shuttlecock will be sent to the left. Deceptive strokes from the net - Deceptive lift (hold and flick) - The player holds the racket ready for a netshot, but at the last moment flicks the shuttlecock to the rearcout instead. This is mainly used in singles. - Deceptive crosscourt netshot (breaking the wrist) - The player holds the racket ready for a straight netshot, but at the last moment turns the racket face sideways to play the shuttle across the net instead. This is so called since the action required to perform this manoeuvre looks as if the wrist has been twisted badly in the opposite direction to the original movement; hence the name - breaking the wrist. - Racket head fakes - The player begins a stroke from the net in one direction, but then slightly alters the direction by rotating the racket head during the hitting. This can be used to make it harder for opponents to return net drives and pushes. A more pronounced racket head fake may be produced by using double motion, but this requires that the player have more time to perform the lengthier deception. Specialised net kill techniques - Short-action net kill - This is a technique for killing shuttecocks that are close to the net tape. The player uses a very short forwards tapping motion to avoid hitting the net tape (which is a fault). The tapping action makes use of sudden tightening of the fingers to create power. - Brush net kill - This is a more difficult technique for killing shuttlecocks that are extremely close to the net tape. The player swipes the racket nearly parallel to the tape instead of hitting forwards. With a slight turning of the racket face during the swipe, the shuttlecock may be struck steeply downwards and in the direction of the swipe. For both forehand and backhand brush net kills, the swiping action is inwards to the centre. To win in badminton, players need to employ a wide variety of strokes in the right situations. These range from extraordinarily powerful jumping smashes to soft, delicate tumbling net returns. The smash is a powerful overhead stroke played steeply downwards into the middle or rear of the opponents' court; it is similar to a tennis serve, but much faster: the shuttlecock can travel at 300 km/h (186 mph). This is a very effective stroke, and pleases the crowds, but smashing is only one part of the game. Often rallies finish with a smash, but setting up the smash requires subtler strokes. For example, a netshot can force the opponent to lift the shuttle, which gives an opportunity to smash. If the netshot is tight and tumbling, then the opponent's lift will not reach the back of the court, which makes the subsequent smash much harder to return. Deception is also important. Expert players make the preparation for many different strokes look identical, so that their opponents cannot guess which stroke will be played. For many strokes, the shuttlecock can be sliced to change its direction; this allows a player to move his racket in a different direction to the trajectory of the shuttlecock. If an opponent tries to anticipate the stroke, he will move in the wrong direction and may be unable to change his body momentum in time to reach the shuttlecock. In badminton you use your wrist a lot and pressing of fingers to a full-body smashes and clears. Doubles: In doubles, each side has two players. Both sides will try to gain and maintain the attack, hitting downwards as much as possible. Usually one player will strive to stay at the back of the court and the other at the front, which is an optimal attacking position: the back player will smash and occasionally drop the shuttlecock to the net, and the front player will try to intercept any flat returns or returns to the net. Typical play involves hitting the shuttle in a trajectory as low and flat as possible, to avoid giving away the attack. A side that hits a high shot must prepare for a smash and retreat to a side-by-side defensive position, with each player covering half of the court. The first serve is usually a low serve to force the other side to lift the shuttle. A "flick serve", in which the player will pretend to serve low but hit it high to catch the receiver off-guard, is sporadically used throughout the game. Doubles is a game of speed, aggression, and agility. Singles: Players will serve high to the far back end of the court, although at the international level low serves are now frequently used as well. The singles court is narrower than the doubles court, but the same length. Since one person needs to cover the entire court, singles tactics are based on forcing the opponent to move as much as possible; this means that singles shots are normally directed to the corners of the court. The depth of the court is exploited by combining clears (high shots to the back) with drops (soft downwards shots to the front). Smashing is less prominent in singles than in doubles because players are rarely in the ideal position to execute a smash, and smashing out of position leaves the smasher very vulnerable if the shot is returned. At high levels of play, singles demands extraordinary fitness. It is a game of patient tactical play, unlike the all-out aggression of doubles. Mixed doubles: In this discipline, a man and a woman play as a doubles pair. Mixed doubles is similar to "level" doubles where pairs are of the same gender. In mixed doubles, both pairs try to maintain an attacking formation with the woman at the front and the man at the back. This is because the male players are substantially stronger, and can therefore produce more powerful smashes. As a result, mixed doubles requires greater tactical awareness and subtler positional play. Clever opponents will try to reverse the ideal position, by forcing the woman towards the back or the man towards the front. In order to protect against this danger, mixed players must be careful and systematic in their shot selection. Five regional confederations are associated with the IBF: - Asia: Asian Badminton Confederation (ABC) - Africa: Africa Badminton Federation (ABF) - Americas: Pan American Badminton Confederation (North America and South America belong to the same confederation; PABC) - Europe: European Badminton Union (EBU) - Oceania: Oceania Badminton Confederation (OBC) There are several international competitions organized by the IBF. The Thomas Cup, a men's event, and the Uber Cup, a women's event, are the most important ones. The competitions take place once in two years. More than 50 national teams compete in qualifying tournaments within the scope of continental confederations for a place in the finals. The final tournament now involves 12 teams after an increase in 2004 (8 teams). The Sudirman Cup is a mixed team event which is hosted once in two years starting from 1989. It is divide into seven group based on the performance of each country. Only the group that comes out best can win the event. The goal of the competition is to see the balance between the performances of men's badminton and women's badminton. Like soccer, it features the promotion and relegation system in every group. In the individual competitions, badminton became a Summer Olympics sport at the Barcelona Olympics in 1992. Before that, it was a demonstration event in the 1972 and 1988 Summer Olympics. Only the 32 best badminton players in the world can participate in the competition based on their IBF ranking and each country can only submit three players to take part. The IBF World Championships is another event for players to show their true abilities. Only the best 64 players in the world, and a maximum of 3 from each country, can participate in any category. All these competitions are graded 7-star tournaments as well as the World Junior Championships. In the regional events of each continent, mainly the competitions in Asia and Europe are gaining attention by the media because of the world's highest ranked players are participating in these continents. The Asian Badminton Championships (open for Asia players) and the European Badminton Championships (open for European players) are the two major regional events in the world. As of the start of 2007, the IBF introduces the New Tournament Structure, known as Super Series. The 6-star tournament (level 2) will play in 12 countries with a minimum prize of USD$200,000 ( All-England, China, Denmark, France, Hong Kong, Indonesia, Japan, South Korea, Malaysia, Singapore, Switzerland). The participants limited to 32 players form previous 64. The players have to collect the points in ability to play in season-ending masters event, aas well as in China with a grand prize of USD$500,000. With the introduction of the Super Series, IBF also standardized all the badminton events that start in 2007. The Grand Prix Gold open tournament (level 3, 4-star) will be offering USD$125,000 in prize money. 10 countries will be selected to organise a tournament in this event. The Grand Prix Gold event will combine with Grand Prix event (3-star), which offer the prize money of USD$50,000. The fourth level event (A-star), known as International Challenge, offers USD$15,000. The International Series, offer USD$5,000, as the competition tries to gather more junior players into the tournament. The 28 and 55 tournaments are scheduled for both events respectively. The most powerful stroke in badminton is the smash, which is hit steeply downwards into the opponents' midcourt. The maximum speed of a smashed shuttlecock exceeds that of any other racket sport projectile. The recordings of this speed measure the initial speed of the shuttlecock immediately after it has left the player's racket. Men's doubles player Fu Haifeng of China set the official world smash record of 332 km/h (206 mph) on June 3, 2005 in the Sudirman Cup. The fastest smash recorded in the singles competition was 298 km/h (185 mph) by Kenneth Jonassen of Denmark. Comparisons with other racquet sports Badminton is frequently compared to tennis. The following is a list of uncontentious comparisons: - In tennis, the ball may bounce once before the player hits it; in badminton, the rally ends once the shuttlecock touches the floor. - In tennis, the serve is dominant to the extent that the server is expected to win most of his service games; a break of service, where the server loses the game, is of major importance in a match. In badminton, however, the serving side and receiving side have approximately equal opportunity to win the rally. - In tennis, the server is allowed two attempts to make a correct serve; in badminton, the server is allowed only one attempt. - In tennis, a let is played on service if the ball hits the net tape; in badminton, there is no let on service. - The tennis court is larger than the badminton court. - Tennis rackets are much heavier than badminton rackets, which may weigh as little as 75 grams. Tennis balls are also heavier than shuttlecocks. - The fastest recorded tennis stroke is Andy Roddick's 153 mph serve; the fastest recorded badminton stroke is Fu Haifeng's 206 mph smash. Comparisons of speed and athletic requirements Statistics such as the 206 mph smash speed, below, prompt badminton enthusiasts to make other comparisons that are more contentious. For example, it is often claimed that badminton is the fastest racket sport. Although badminton holds the record for the fastest initial speed of a racket sports projectile, the shuttlecock decelerates substantially faster than other projectiles such as tennis balls. In turn, this qualification must be qualified by consideration of the distance over which the shuttlecock travels: a smashed shuttlecock travels a shorter distance than a tennis ball during a serve. Badminton's claim as the fastest racket sport might also be based on reaction time requirements, but arguably table tennis requires even faster reaction times. There is a strong case for arguing that badminton is more physically demanding than tennis, but such comparisons are difficult to make objectively due to the differing demands of the games. Some informal studies suggest that badminton players require much greater aerobic stamina than tennis players, but this has not been the subject of rigorous research. A more balanced approach might suggest the following comparisons, although these also are subject to dispute: - Badminton, especially singles, requires substantially greater aerobic stamina than tennis; the level of aerobic stamina required by badminton singles is similar to squash singles, although squash may have slightly higher aerobic requirements. - Tennis requires greater upper body strength than badminton. - Badminton requires greater leg strength than tennis, and badminton men's doubles probably requires greater leg strength than any other racket sport due to the demands of performing multiple consecutive jumping smashes. - Badminton requires much greater explosive athleticism than tennis and somewhat greater than squash, with players required to jump for height or distance. - Badminton requires significantly faster reaction times than either tennis or squash, although table tennis may require even faster reaction times. The fastest reactions in badminton are required in men's doubles, when returning a powerful smash. Comparisons of technique Badminton and tennis techniques differ substantially. The lightness of the shuttlecock and of badminton rackets allow badminton players to make use of the wrist and fingers much more than tennis players; in tennis the wrist is normally held stable, and playing with a mobile wrist may lead to injury. For the same reasons, badminton players can generate power from a short racket swing: for some strokes such as net kills, an elite player's swing may be less than 10cm. For strokes that require more power, a longer swing will typically be used, but the badminton racket swing will rarely be as long as a typical tennis swing. It is often asserted that power in badminton strokes comes mainly from the wrist. This is a misconception and may be criticised for two reasons. First, it is strictly speaking a category error: the wrist is a joint, not a muscle; its movement is controlled by the forearm muscles. Second, wrist movements are weak when compared to forearm or upper arm movements. Badminton biomechanics have not been the subject of extensive scientific study, but some studies confirm the minor role of the wrist in power generation, and indicate that the major contributions to power come from internal and external rotations of the upper and lower arm. Modern coaching resources such as the Badminton England Technique DVD reflect these ideas by emphasising forearm rotation rather than wrist movements. Distinctive characteristics of the shuttlecock The shuttlecock differs greatly from the balls used in most racket sports. Aerodynamic drag and stability The feathers impart substantial drag, causing the shuttlecock to decelerate greatly over distance. The shuttlecock is also extremely aerodynamically stable: regardless of initial orientation, it will turn to fly cork-first, and remain in the cork-first orientation. One consequence of the shuttlecock's drag is that it requires considerable skill to hit it the full length of the court, which is not the case for most racket sports. The drag also influences the flight path of a lifted (lobbed) shuttlecock: the parabola of its flight is heavily skewed so that it falls at a steeper angle than it rises. With very high serves, the shuttle may even fall vertically. Balls may be spun to alter their bounce (for example, topspin and backspin in tennis), and players may slice the ball (strike it with an angled racket face) to produce such spin; but, since the shuttlecock is not allowed to bounce, this does not apply to badminton. Slicing the shuttlecock so that it spins, however, does have applications, and some are peculiar to badminton. (See Basic strokes for an explanation of technical terms.) - Slicing the shuttlecock from the side may cause it to travel in a different direction from the direction suggested by the player's racket or body movement. This is used to deceive opponents. - Slicing the shuttlecock from the side may cause it to follow a slightly curved path (as seen from above), and the deceleration imparted by the spin causes sliced strokes to slow down more suddenly towards the end of their flight path. This can be used to create dropshots and smashes that dip more steeply after they pass the net. - When playing a netshot, slicing underneath the shuttlecock may cause it to turn over itself (tumble) several times as it passes the net. This is called a spinning netshot or tumbling netshot. The opponent will be unwilling to address the shuttlecock until it has corrected its orientation. Due to the way that its feathers overlap, a shuttlecock also has a slight natural spin about its axis of rotational symmetry. The spin is in an anticlockwise direction as seen from above when dropping a shuttle. This natural spin affects certain strokes: a tumbling netshot is more effective if the slicing action is from right to left, rather than from left to right.
<urn:uuid:695bc668-5027-4408-8deb-e08be7f0f8c6>
CC-MAIN-2017-04
http://www.cs.mcgill.ca/~rwest/wikispeedia/wpcd/wp/b/Badminton.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00484-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958623
9,073
3.390625
3
A sentence using the word petrified. Writers, word game players, & those learning a new language may enjoy the contents of this post. The lines of text below use petrified in a sentence, and provide visitors a sentence for petrified. - Cecilia was petrified by a gentle tapping at her door. (10) - He doubted, and stood petrified between the double question. (10) - She stood there, with a face like a petrified Irish outcry. (10) - The door was half open, and passing through it might be seen the petrified figure of a fine man. (10) - The ill-advised woman remained kneeling for a moment with her ingratiating smile hardening on her face, while the sense of her blunder petrified the rest. (9) - Up went his eyebrows, wrinkling arches over a petrified stare. (10) - Wrinkled with incongruous clothing from head to foot, and dazed by the light, he peered on them, like a mouse magnified and petrified. (10) Glad you visited this page with a sentence for petrified. Perhaps also see a sentence for promise and ways to use pension in a sentence. Now that you’ve seen how to use petrified in a sentence hope you might explore the rest of this educational reference site Sentencefor.com to see many other example sentences which provide word usage information.
<urn:uuid:193db94e-cc72-4148-bb05-c878ae6d84ec>
CC-MAIN-2017-04
http://sentencefor.com/petrified/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00054-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962891
305
2.734375
3
Baxter and walton, 1970. assuming that their estimate of global cement production in 1969 was the same as that reported by the usgs usgs, ds140, etc., their estimate of emissions from cement production in 1969 would have been 256mtco2. in a landmark paper of 1973, charles keeling presented a systematic analysis of emissions from fossil.Consult Now Oct 24Cement Industry Works 2 cement production also is a key source of co2 emissions, due in part to the significant reliance on coal and petroleum coke to fuel the kilns for clinker production. globally, co2 emissions from cement production were estimated at 829 mmtco2 in 2000 7, approximately 3.4 of global co 2. A total of 210 large cement plants account for a combined installed capacity of 410 mt in the country, whereas, 350 mini cement plants make up for the rest. of the total 210 large cement plants in india, 77 are in the states of andhra pradesh, rajasthan and tamil nadu. sales of cement in india stood at rs 58,407 crore us 8.29 billion in 9mfy20. Actual cost estimates may vary for your city. please check with your contractor or visit our nearest ubs store for a custom cost estimate as per your requirement. this amount is an approximate amount for construction area amp it does not include compound wall area. available at ultratech building solutions outlets. Baxter and walton, 1970. assuming that their estimate of global cement production in 1969 was the same as that reported by the usgs usgs, ds140, etc., their estimate of emissions from cement production in 1969 would have been 256mtco2. in a landmark paper of 1973, charles keeling presented a systematic analysis of emissions from fossil. Calculation of cost for 1m3 of concrete. lets consider the concrete mix of m15 11.53, where, 1 is the part of cement, 1.5 is the part of fine aggregates and 3 is the part of coarse aggregates of maximum size of 20mm. the watercement ratio required for mixing of concrete is taken as 0.45. 1. assumptions. California is the secondlargest cement producing state in the united states after texas. californias eight cement plants together produced 10 million metric tonnes mt of cement and emitted 8.2 mtco 2 in 2017 this also includes indirect emissions from electricity consumption. Californias nine cement plants together produced about 10 million metric tonnes mt of cement and emitted 7.9 mt of co 2 pollution in 2015. more than 70 percent of the energy used in californias cement industry is coal and petroleum coke, which are two of the most air polluting fossil fuels. californias cement industry used. Cement imports to great britain by importer 20052019 global cement demand forecast 2016 with forecasts for 2018 and 2020 global cement capacity utilization 2013. Cement is produced in more than 150 countries all over the world. cement, as the most important ingredient of concrete, is essential in the development of infrastructure and construction in general. the level of advancement in cement and concrete supply chain management scm can facilitate or constrain world economic development. Cement manufacturers association cma is the apex body of large 1 million tonnes capacity per annum and more cement manufacturers in india. it plays a catalytic role in bridging the gap between the government and the indian cement industry towards shaping important policy matters in relation to cement. Cement plant cost profiles international cement review cost profiling across geographies can help cement plant investors help to find the most profitable location to operate a plant there are a number of reasons why profiling the cost of cement factories in different geographies of the world is useful. Cement plant locations and information on united states can be found below. for full access to the database, purchase the global cement report, 14th edition. purchase. summary. cement capacity mt integrated plants. 96. clinker plants. 0. Cement plants near the ports, for instance the plants in gujarat and visakhapatnam, will have an added advantage for export and will logistically be well armed to face stiff competition from cement plants in the interior of the country. indias cement production capacity is expected to reach 550 mt by 2025. Cement production in the u.s. amounted to an estimated 90 million metric tons in 2020. that year, texas, missouri, california, and florida were the leading states in terms of cement production. Cement was produced at 96 plants in 34 states, and at 2 plants in puerto rico. u.s. cement production continued to be limited by closed or idle plants, underutilized capacity at others, production disruptions from plant upgrades, and relatively inexpensive imports. Clinker and cement everyting for clinker and cement. 0the total electric power 558990 gwh generated in 200708 by thermal power plants in india. thus, the total co 2 emissions can be an estimated as about 523 million tons from all the thermal power plants in india. in these estimations, it is assumed that 12 of the carbon is lost as bottom and fly ash. Consumption of cement in india to touch 600 million tonnes by the year 2020.this is truly the california gold rush of the new century. with an 8 gdp growth rate, governmental infrastructure augmentation and population expansion, the indian cement industry is a market of opportunities waiting to be tapped. Cost of clinker grinding plant india clinker grinding unit of cement plant estimate of cement plant 300tph grinding unit in india,mobile stone . cost in india for setup a mini ciment mill plant. to setup mini grinding unit for cement cost cost to setup mini cement plant in india 7 minghao yangcement plant . pre nachaa quary in ghana . Cost of mini cement plant india royal rajasthan on wheels. cement plant project cost mini cement plant project report india price of 50 tpd cement plant manufacturers chinacost of 50 tpd mini cement plant to erect a 300 000tpa mini cement plant with a. Cost of setting up a cement plant in india. cement industry in india an overview ezinearticles 183 at least 125 plants set up by the big companies in india with about 300 other small scale cement manufacturers to fulfill the growing demand of cement. get price. get detail estimate to start a cement manufacturing plant. Cost to setup mini cement plant in india ceueu. mini cement plant cost india grinding mill equipment. cost of mini cement plant indiavcareindia in cost of mini cement plant indiacost to build a cement plant in india what is the cost of building how much cost is required for small cement plant setup cost to set up mini cement plant in india cost to set up mini cement. Estimate of cement plants in india how many cement plants are producing in india 2020 cement production in india increased at a compound annual growth rate cagr of 9.7 percent to 272 mt over fy 0613. as per the 12th five year plan, production is expected to. Estimate of cement plants in india oman is said to mull cement stake sale in privatization push oman cement has lost around half its market value in the past five years, according to data compiled by bloomberg.oman is the largest middle eastern crude exporter outside of opec, pumping around. Estimate of cement plants in india. a total of 210 large cement plants account for a combined installed capacity of 410 mt in the country whereas 350 mini cement plants make up for the rest of the total 210 large cement plants in india 77 are in the states of andhra pradesh rajasthan and tamil nadu sale of cement in india stood at rs 63771 crore us 905 billion in fy20. Estimated cost to setup a cement plant in india. mini cement plant project cost in sudan. india lanco industries to set up mini cement plant. lanco industries ltds borad of directors have approved a project to erect a 300000tpa mini cement plant with a rotary kiln at an estimated cost of us22. tpd cement plant cost estimates panola mining. Estimated project report of 100tpd cement plant mini cement plant project report india pdf rotary kiln cement manufacturing plant project report industry india capita but substantially below the world average 270kg and the regional averag. Estimates of emissions from coal clinker and cement. the total electric power 558990 gwh generated in 200708 by thermal power plants in india. thus, the total co 2 emissions can be an estimated as about 523 million tons from all the thermal power plants in india. in these estimations, it is assumed that 12 of the. Find here opc cement, gray cement manufacturers, suppliers amp exporters in india. get contact details amp address of companies manufacturing and. Generally, the cost of house construction primly depends on the type and quality of construction required by homeowners.. c class local lowclass bricks and sand, lowcost cement and steel, cheapest fixtures and fittings b class local grade bricks and sand, medium rate cement and steel, medium cost fixtures and fittings a class best in class resources. How to start a cement manufacturing factory standard bank. start a cement factory in south africa we show you how and youll be a cement factory for sale will cost you about r379 292 0426 to r1 137 876 1279 contributing on average 94.7.
<urn:uuid:639ccf1a-3615-4a8d-853d-94c38e5e0211>
CC-MAIN-2022-33
https://pzgchojnice.pl/Apr/11-37ezmxg4/estimate.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00069.warc.gz
en
0.900087
2,006
2.890625
3
The Human Planet This week: a review of a new book by photographer George Steinmetz with essays by Andrew Revkin. “The Human Planet: Earth at the Dawn of the Anthropocene” is a collection of stunning photographs of our planet taken from above. The photos are evocative, powerful, emotional and stunning encapsulations of Nature and, for better and for ill, the aspirations of civilization. The Human Planet: Earth at the Dawn of the Anthropocene is a collection of astonishing images of our planet from above, taken by photographer George Steinmetz, with essays and captions by journalist, teacher, and environmental advocate Andrew Revkin, released in April by art publisher, Harry Abrams, New York. You must discover this book for yourself at your local independent bookstore. I cannot show you the pictures, but I can quote and paraphrase briefly from the text. The primary, strategic characteristic of Steinmetz’s photographs, Revkin writes in his Introduction, is: “vantage point… the overview effect (that) describes a special sense of awe and deep respect for our planet experienced by astronauts as they have observed Earth first from orbit and then from the moon. That feeling of reverence derives mainly from how Earth’s expanse of blue, green, and white glows, in miraculous, sobering contrast, against the blackness and vacuum of space.” In the chapter, Our Dynamic Earth, Revkin describes: “the face of the planet (that) still holds vestiges of many early chapters, from craters formed by meteorite collisions to ancient hulks of 1.7-billion-year-old rock that rise like the rusting superstructures of time- worn battleships from South America’s seas of forests and savannas.” Landmarks that we take for granted as static geographic or ecological features are newborn on planetary timescales. Their stories are also extraordinarily interconnected, with many of today’s deserts formed of sand transported by long-vanished rivers. And that sediment is still in motion. Scientists recently found that, over millions of years, iron-rich dust blown west from the vast Sahara Desert acted as fertilizer for the marine organisms that built the white calcium carbonate Bahama Banks on which the islands of that name sit today. When that African dust is flowing west a mile or two high over the Atlantic, it can disrupt hurricanes before they grow to threaten the Caribbean; some of this dust flows on from its sere source to fertilize the humid forests of the Amazon basin thousands of miles away.” In the next chapter, Harvesting the Biosphere, Revkin writes: “In the warm interval since then, something in the human story profoundly changed. The domestication and spread of rice and millet starting ten thousand to seven thousand years ago, along with early irrigation canals, waves of deforestation and other landscape changes, and the spread of our livestock, left a growing human mark. Then came a cascade of innovations in mining and metalworking, forges and furnaces, machinery and weaponry, wind power and waterpower. Seas were conquered. Peoples were conquered. Some species were hunted to the vanishing point, while invasive hangers-on [like rats] spread with us, amplifying ecological disruption.” And finally, in the last chapter, The Human Footprint, he concludes: “Humanity is rapidly becoming an urban species. If cities, throughout human history a distinguishing mark of the human footprint on Earth, are designed well, ongoing urbanization can be a powerful driver of sustainable development. If urban influxes result in the kind of suburban sprawl that was typical in the mid-twentieth century, cities will remain part of the problem, not a path to a balanced relationship between people and the planet.” Revkin offers persuasive argument, but Steinmetz provides the evocative power, through images of seaweed islands and sand dunes, coral reefs and waves, wind towers, fishing fleets, and floating cities, that by their inclusive distance literally shock our emotions , by the hand of Nature and the aspirations of civilization. This book is filled with contained revelation and emotion; it takes the slow, meditative turning of the pages to release this power into our selves, one stunning photograph at a time. It’s all there for the seeing.
<urn:uuid:e425aca1-7117-4600-a7fa-cd57220d47aa>
CC-MAIN-2022-33
https://thew2o.medium.com/the-human-planet-75bb35045b53?source=post_internal_links---------6----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00064.warc.gz
en
0.936406
897
2.859375
3
In Situ Object Counting Systems (ISOCS) ISOCS Shield Systems This ISOCS (In Situ Object Counting System) Shield (Figure 1) has been designed as the optimum in convenience and functionality for in situ gamma spectroscopy with a germanium detector. The system is supplied with both 25 mm and 50 mm lead shielding which gives the user the ability to utilize the sensitivity and low background capabilities of a laboratory grade germanium spectrometer directly on site, regardless of where that site is located. Unshielded, the detector has a nearly 360° field of view, and can be used for 4π counting of the walls/floors/contents of an entire room. The field of view can be reduced (Figure 2) by adding the shield and collimators to provide fields of view of 30°, 90°, and nearly 180° by simply sliding the appropriate shield components on the mounting rails. In addition, a completely shielded sample chamber can be assembled by combining the components from the two systems. Its standard wheeled mounting frame makes it easy to move the shield to the assay site, and the individual rear wheel brakes keep it at the desired location. The mounting frame features both an upper (for 1 meter detector/ground counting) and lower (normal) detector mounting location. The detector can be rotated 180° from down to up, and stopped at any position, not just a few fixed positions, for maximum positioning flexibility. The detector holder even includes a laser pointer to aid in aiming the detector at remote objects. Whatever the sample and wherever it's located, the ISOCS Shield System has the versatility and flexibility to count it. - Portable Germanium detector shield system for in situ assays. - Includes 25 mm and 50 mm thick lead shields. - Reduces interfering 1000 keV radiation by a factor of 7.5 (25 mm) and 60 (50 mm) - Modular design for easy handling - Epoxy paint on all exterior surfaces for ease of cleaning - Includes 30°, 90°, and 180° collimators (each thickness) plus solid end caps for background measurements - Includes a rear shield set (requires RDC option on detector) - Wheeled mounting stand with brakes for ease in moving the shield from one sample to the next - Large wheels for easy movement: 40 cm (16 in.) at rear, 20 cm (8 in.) in front - Upper and lower detector mounting positions, with 180° detector rotation at either location - Easy to assemble and to change detector positions - Built-in laser aiming device - Components from 25 mm and 50 mm shields may be combined to build a sample ISOCS Calibration Software The ISOCS (In Situ Object Counting System) Calibration Software brings a new level of capabilities to gamma sample assay by eliminating the need for traditional calibration sources during the efficiency calibration process. By combining the detector characterization produced by the MCNP modeling code, mathematical geometry templates, and a few physical sample parameters, the ISOCS Calibration Software gives you the ability to produce accurate qualitative and quantitative gamma assays of most any sample type and size (Figure 1). In addition to saving money by eliminating the need to purchase, track, and dispose of many calibration sources, ISOCS calibration also saves time in the field. Instead of hours spent in traditional source preparation and long calibration counts, an ISOCS calibration for a new geometry requires only a few seconds of computer calculations. With the ISOCS software you have the flexibility to design your setup, define your geometries, and analyze data in the office; reducing actual time in the field to the system setup and sampling time, no matter how many different geometries you're measuring. And now this capability is available for LaBr3 and NaI scintillators too. The secret to this capability is twofold: - The energy/efficiency/spatial response profile of the detector has been characterized by CANBERRA with the well-known MCNP Monte Carlo modeling code. - Mathematical templates have been created for most of the sample geometries that will be encountered – planar surfaces, rectangular boxes, barrels, pipes, beakers, etc. To a basic geometry template, add the specifics for a given sample – its size, density, distance from the detector, etc. – and at the click of a button the ISOCS Calibration Software generates a custom efficiency calibration specifically tailored for that detector, sample, and geometry. The remainder of this document will describe how this is done and how the various standard geometry templates are used. - Eliminates the cost of purchasing, tracking, and disposing of radioactive standards - No radioactive sources needed for accurate efficiency calibrations - New: Calibrations valid from 10 to 7000 keV - New: 3D visualization speeds geometry creation and error identification - New: Uncertainty Estimator and Assay Planning tool - New: Advanced Collimator designs include liners and back shielding - Calibrations valid from detector face out to 500 meters - Operates with Germanium, NaI and LaBr3 detectors characterized by CANBERRA - Includes 21 geometry templates for common container shapes and sample distributions - Calibrations accurate at any angle from detector, not just on center line - Ideal for In Situ applications, where large and various sample types are often encountered - Sample size can be point-like, or up to 500 meters in size - Includes library of common absorber materials and tools to create new material types - Custom templates can be provided to meet special application needs - Multi-Efficiency program allows creation of compound efficiencies for multiple detectors, multiple locations or multiple sources - Geometry Composer Report summarizing all information defined for a given geometry can be displayed and printed - Compliant with 2009 NRC Regulatory Guide 1.21 ISOCS In Situ Accessories Model INSITPOD Lightweight Collapsible Tripod - Detector height adjustable ~35 - ~100 cm - Weighs 3.2 kg (7 lb) - Legs stay in fixed position for quick and easy movement between measurement points - Small shipping package: - Legs easily removed and collapse to fit in 60 cm long package - Attachment plate can stay connected to detector carrier - Accommodates both MAC and Big MAC - Accommodates both Slimline or Flanged preamplifiers, with or without RDC - Will not carry any additional weight (e.g. shield/collimators) Model 7411 Detector Submarine - Accommodates single-port MAC - 6 m (20 ft) umbilical hose (longer available) - Ballast for fresh or salt water (specify) - Body dimensions - 178 mm diameter x 591 mm long (7 x 23.25 in.) - Shipping weight - 20 kg (45 lb) Model 717 Portable Detector Shield - For MAC or Big MAC - 89 mm I.D. x 165 mm long (3.5 x 6.5 in.) - 25 mm (1.0 in.) thick lead - Brass lined-steel jacketed - Shipping weight - 34.5 kg (76 lb) Model 7413, 7413F Detector Tripod - For field measurements - Heavy duty construction - 7413 accommodates Slimline, MAC or Big MAC - 7413F accommodates Flanged, MAC or Big MAC - Detector element elevation (<30 cm to >120 cm) - Built-in level - Shipping weight - 9 kg (20 lb) The ISOCS™ System For In Situ measurements, the ISOCS™ system has become the most widely accepted measurement tool in the world. The ISOCS system is commonly used to measure contaminated materials and areas, both in place or after removal from the facilities. It is also used for final status measurements to allow release of areas for general use, or general demolition activities. - Immediate, accurate, nuclide-specific results for field measurement of any object or surface - Sourceless detector-specific calibrations generated by software as the sample is being counted - Calibrations generated for any object/surface that can be approximated by plane, cylinder, box, sphere, well/Marinelli or pipe - Mobile detector positioning device includes 25 mm and 50 mm collimators and backshields, and accommodates any detector orientation - Complex pipe template allows modeling of complex, multi-layer pipes and drums - ISOCS Uncertainty Estimator tool (IUE) helps minimize uncertainty and improve results
<urn:uuid:28ee4355-de7c-40c5-8e35-22666cd2d5f4>
CC-MAIN-2017-04
http://www.canberra.com/products/insitu_systems/isocs.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00438-ip-10-171-10-70.ec2.internal.warc.gz
en
0.862108
1,814
2.125
2
Many digital marketers online never experienced solid marketing planning process. This is why there are so many digital marketers who lack the “sophistication” that other more experienced marketers have. That becomes evident when they create marketing plans. Often, they turn up marketing plans that were obviously patterned after a marketing plan made by another inexperienced digital marketer which he or she probably got from some marketing 101 class taught by a professor who never actually did marketing, just wrote books on it. The bottomline, there is a huge difference between marketing plans done by experienced marketers and those done by wannabee marketers. In this series of articles, I will be sharing the marketing planning process we go through in the traditional world. We use different marketing/advertising plan formats. Although you will need to add and revise this to make it more appropriate to different digital requirements, these marketing plan formats will lay the foundation to any kind of digital requirements. For this article, I will be discussing the 3 Cs. The 3Cs stands for Competition, Client and Customer. These are the three most important things you need to understand when you are going to create a marketing plan. Start by understanding your client. What is his product or brand? What does he want to accomplish? What makes him believe in his product? What is its position in the market? What is the need the product is addressing? What is he really selling? Is he selling a soap or the effects of the soap? Know the companies, products and brands that are competing against your product. Do your homework and know even the potential competition or past competition. Know their current promotions or marketing efforts. Know their market position and get as much statistics as you can get. Know their unique selling proposition and know what they offer that you don’t. Know what the market likes about them and even their history. Finally, know your target market. Know their needs and their product preference and their buying habits. Know what makes them tick and what motivates them to buy something. Know their demographic (age, social status, gender, etc) but, more importantly, know their psychographics (habits, likes and dislikes, where they hang out, what influences them, etc). Knowing these three things will not be enough for a marketing plan but this will set the groundwork. You will know what you have and what you don’t have. After knowing all these, you need to get down to specifics. Ideally, once you have the 3 Cs, you will know what your challenge is. Here is a diagram of the process. Now, that’s a little confusing. Let’s apply it. The diagram below is the theoretical visualization of the concept. Let’s take a fictional case. Let’s say you were approached by a new company that manufactures and sells portable speakers. Let’s call the brand Little Speakers. Please take note that the case below is fictional. Little Speakers are designed for mobility. They have different types of speakers to accommodate any budget and purpose. They have speakers for as low as $7. They also have 5.1 mini speakers for those who prefer sophisticated sound don’t want to carry big speakers. They currently make their sale through local stores in Florida. They do consignment. They want to expand their market but don’t have yet the budget so they want to do it online. - X-Mini - An established mini speaker brand that goes for $30. This is 100% less than the Apple mini speaker but their quality is just as good. They have Bluetooth and wired speakers. They own 30% of the market share. - Capsule - This is the#1 low end mini speaker brand made in China. They have speakers for as low as $4 and are available nationwide. Their most expensive line is $20. They don’t do any advertising or marketing. Young professionals or artists whose line of business requires them to use quality speakers. Now let’s put that in the diagram. Those three elements in the middle, complement each other. You will see that neither X-Mini nor Capsule offer 5.1 mini speakers and that is what the market needs. You just found your hero product and your unique selling proposition. Your marketing plan, of course, doesn’t end there but now, you have somewhere to start with. From here, the next question is the Barrier. Amazon Price: $160.00 Buy Now (price as of May 6, 2014) Knowing the barrier is another significant part of the marketing planning process. The barrier is the factor that’s preventing your client from achieving its objective. Sometimes, the client already knows what the barrier is. Other times, they don’t. Whatever the case may be, you need to identify it. What is the problem that is preventing your client from making the market buy their 5.1 quality mini speakers? Is it simply lack of awareness? Is it a matter of not knowing where to find the market? It could also be behavioural. For example, mini speakers are mostly impulse buy. It’s something they buy when they are buying something other computer-related products and a store but not something they actively plan for. Those who go for quality speakers mostly request from their company and don’t buy it themselves. Now that you know what your problem is, you need to find the solution. There are different ways on finding the solution but the most effective way is to get to know your Target Market is. Amazon Price: $27.50 $10.99 Buy Now (price as of May 6, 2014) Getting to know the target market is probably the most critical step in a marketing planning process. There are two things you need to find out: Demographics and Psychographics. - Demographics are age, social status, gender and location. - Psychographics include their behaviour, character and habits. It is not enough to know how if they are female or male, teen-ager or middle age. You need to know their media consumption, work habits, who influence them, sites they visit, things they eat, places they hangout, things they like to do, etc. From here, you will find how you can take down the barrier. For example, if the barrier is really just lack of awareness of the fact that they can buy a 5.1 mini speaker, then it’s just a matter of knowing where they are on the web and what they do. Then you can come up with a plan that will catch their attention on these sites. Let’s apply it. Demographics: Young professional, male and female They are the multi-screen, multi-income, multi-interest generation. At any one time, they are on at least two screens: TV and computer, computer and phone, phone and TV, etc. They expect all screens to be connected and seamless. For example, when they see something on TV, they expect to find out more about it if they search for it online. When they store a file on their cloud using their tablet, they expect to be able to access that when they use their phone. 90% of their offline purchase begins online. They do at least two of the following: - consult friends about products, do side by side product comparisons - read reviews and/or look for sites that provide coupons or discounts on the brands they are considering. When it comes to tech products, their priority is durability, performance and price. In that order. Psychographics of target market must be researched. However, there are companies that regularly do market study about different products. Some of these are published online. If you have no research, then make on but never ever invent this part. If you anchor your campaign on an assumption, you will most likely fail. Now that you know your target market, you will be able to pull information from it to create the insight. The insight is the answer to your challenge. The next question is, what is an insight? How do I get it from the Target Market Psychographics? How do I use it for the marketing plan?
<urn:uuid:d414bbbf-f255-406d-80b8-dfa51dd9872b>
CC-MAIN-2017-04
http://www.infobarrel.com/Marketing_Planning_Process_Part_1_3Cs
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00238-ip-10-171-10-70.ec2.internal.warc.gz
en
0.96137
1,706
1.515625
2
The semiconductor industry’s march toward broader 3D IC integration marked an important milestone today at ECTC 2013, with the report of an advanced new temporary bonding solution for 3D Through-Silicone-Via (TSV) semiconductor packaging. The breakthrough was unveiled today during ECTC’s 3D Materials and Processing session, when Ranjith John, materials development & integration engineer at Dow Corning, presented a paper co-authored by Dow Corning, a global leader in silicones, silicon-based technology and innovation, and SÜSS MicroTec, a leading supplier of semiconductor processing equipment. The paper, titled Low Cost, Room Temperature Debondable Spin on Temporary Bonding Solution: A Key Enabler for 2.5D/3D IC Packaging, details the development of a bi-layer spin-on temporary bonding solution that eliminates the need for specialized equipment for wafer pretreatment to enable bonding or wafer post-treatment for debonding. Thus, it greatly increases the throughput of the temporary bonding/debonding process to help lower the total cost of ownership. “This advance underscores why Dow Corning values collaborative innovation. Combining our advanced silicone expertise with SÜSS MicroTec’s knowledgeable leadership in processing equipment, we were able to develop a temporary bonding solution that met all critical performance criteria for TSV fabrication processes. Importantly, the spin coat-bond-debond process we detailed in our co-authored paper takes less than 15 minutes, with room for further improvement,” said John. “Based on these results, we are confident that this technology contributes an important step toward high-volume manufacturing of 2.5D and 3D IC stacking.” Both 2.5D and 3D IC integration offer significant potential for reducing the form factor of microelectronic devices targeting next-generation communication devices, while improving their electrical and thermal performance. Cost-effective temporary bonding solutions are a key enabler for this advanced technology by bonding today’s ultra-thin active device wafers to thicker carrier wafers for subsequent thinning and TSV formation. However, in order to be competitive, candidate temporary bonding solutions must deliver a uniformly thick adhesive coat, and be able to withstand the mechanical, thermal and chemical processes of TSV fabrication. In addition, they must subsequently debond the active and carrier wafers without damaging the high-value fabricated devices. Through their collaboration, Dow Corning and SÜSS MicroTec were able to develop a temporary bonding solution that met all of these application requirements. Comprising an adhesive and release layer, Dow Corning’s silicon-based material is optimized for simple processing with a bi-layer spin coating and bonding process. Combined with SÜSS MicroTec equipment, the total solution offers the benefits of simple bonding using standard manufacturing methods. In their co-published paper, the collaborators report a solution exhibiting a total thickness variation of less than 2 µm for spin-coated films on either 200- or 300-mm wafers. The bonding material exhibited strong chemical stability when exposed to phosphoric acid, nitric acid, organic solvents and other chemicals familiar to TSV fabrication. In addition, the bonding solution and paired wafers showed good thermal stability when exposed to the 300°C temperatures common to the TSV process. Dow Corning builds on a long history of silicon-based innovation and collaboration in semiconductor packaging. From die encapsulants for stress relief, to adhesives for sealing and bonding, to thermal interface materials for performance and reliability, Dow Corning’s well-established global infrastructure ensures reliable supply, quality and support, no matter where you are in the world.
<urn:uuid:80c2779d-049c-44de-b114-adc87020f96e>
CC-MAIN-2017-04
http://www.azom.com/news.aspx?newsID=36944
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00218-ip-10-171-10-70.ec2.internal.warc.gz
en
0.90094
778
1.578125
2
We demonstrate experimentally and theoretically the importance of electrohydrodynamic (EHD) flows in continuous-flow electrophoresis (CFE) separations. These flows are associated with variations in the conductivity or dielectric constant, and are quadratic in the field strength. They appear to be the main cause of extraneous and undesired flows in CFE which have degraded separation performance and have until now not been explained. We discuss the importance of EHD flows relative to other effects. We also describe possible techniques for reducing the associated degradation of CFE separations. |Original language||English (US)| |Number of pages||5| |Journal||Applied and theoretical electrophoresis : the official journal of the International Electrophoresis Society| |State||Published - 1991| ASJC Scopus subject areas
<urn:uuid:8f12e7f3-0a81-4702-9057-f73a15cb7344>
CC-MAIN-2022-33
https://experts.arizona.edu/en/publications/electrohydrodynamic-effects-in-continuous-flow-electrophoresis
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00273.warc.gz
en
0.845228
211
1.96875
2
On the weekend, I went for a walk with my dog, Murphy, and we found ourselves approaching a large green tree that has a nest in it. As we approached the tree, I was not surprised when Murphy started barking, something he probably has had all his life. But when he started barking, he started barking in a way that was quite unusual for a smaller dog. He started barking in a way that made us smile to see such a beautiful thing happening. As Murphy continued to bark, I could feel his pain. He was in lots of pain. His back hurt, his legs hurt, his tongue hurt. It was clear that he had been injured he his little dog. I was going to put him in the nest. At that moment, I thought it would be good for him to be in a larger space where he might not have the chance to get hurt. But then, I thought about why he needed to be in the nest at all. I started thinking about what this looked like. If my dog had been in a great cat house like the “Terningert Park” (though I haven’t gotten my share of the bird, cat, or animal options), would he have to leave the nest? Would he end up with a painful relationship as a result of Using cruelty to Prevent cruelty? Would I have to put my dog through some horrible thing if I tried to hurt him and then have him return to the same damn spot he was on when I found him hurt? If Murphy had not been forced to leave the nest, it would have been so much more peaceful if he would have remained there and not explored this world at all. So, I decided to put Murphy in the nest and take him home. As I ran towards the dog house, I could hardly believe my eyes. I was surrounded by thousands of dogs and cats. All of them were looking out for their own “home”. I experienced just about the total confusion of what I had perceived to be “my house” was around me. And to add insult to injury, there were dead dogs that looked as though they had been run over by a semi. They all looked so very sad and emaciated. What is all the commotion about and how does this relate to a dog leaving the nest? Try this. Close your eyes. Take a slow breath. See if you can picture your own “home” in the back of your mind. Do you know exactly where your home is? Do you know exactly what you can and cannot do to make your home happy? Can you leave anything there? The reason you want to take this out of your head and heart is because you now have to and are going to pay real attention here and now. I believe a dog leaves that “home” every day of their life. Your “home” may be only a few feet away, but you must be honest NOW and see if you are truly leaving that “home” every day. It may be the amount of time you spend on your computer, it may be sitting in front of the TV, it may be how much you spend on the internet, but ask yourself honestly. Where are you going in life? Are you taking those daily steps to really get to the place you want to be? If you are not, then you are not going in your life. I quickly learned that if I wanted my dog brain to be working in a way that was going to help me into what I really wanted, I had to focus on a different thing. Every day, I took my dog to the park. No exceptions. Every day. So many people like pets. It’s a part of the American culture. Dibaca juga : Pokerstars – The Place For Online Poker But the thing that made all the difference in the world was that while I was walking to the dog house, something really cooking in my brain came to the surface. Before the dog came home I had a very intense conversation with myself. I was going to leave my dog with Murphy in the nest. I picked up all the discomforts of my home. We all have them. They are habits. The dog came in and behaved as if he was from another planet. He played, he ran, and Universally, I felt I was going to have to “oys” and move every single item in my home and office to another space. That is what it’s going to take to move your mind now. To stop taking ownership of those habits. Love is essential to truly living. It all comes down to the Law of Attraction and Attraction only. You need a new habit. All the-time. Like if you want to attract money, but you are constantlyreciation more stuff. You put out that head vibrating and sense of positive energy, you will be sending a lot of good vibrations out to the Universe, which will return to you just a lot more stuff.
<urn:uuid:3068fb61-a390-4c05-b616-05e3f42a89ed>
CC-MAIN-2022-33
http://reichstadt.info/you-have-a-chronic-healing-easiness-problem/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.992283
1,028
1.875
2
Children are full of wisdom and humor and truth. If you pay attention, you can learn a lot, but don’t read any of these while sipping your coffee or we can’t be responsible for your keyboard. When I asked my son about his girl friend on the play ground: Him: She makes me so mad. Me: Why does she make you so mad? Him: Because she wants to kiss me ALL THE DAYS. Me: And you don’t like that? Him: No, I’m not a grown-up who likes KISSING. I just like to kiss Mama, and that’s it. “I told my son that he shouldn’t say “OH MY GOD!!!” unless he is praying because some people will find that offensive. So now, when he wants to pray, he doesn’t start out with “Dear God.” You guessed it. This morning? “OH MY GOD, why do we only have two arms?” After I sing “Rock-a-bye Baby” to my son: Him: What are they talking about, “the BOUGH breaks?” Me: It’s a branch. The crib is in a tree, and the branch breaks, and the baby falls out. Him: WHAT?!? HAHAHAHAHAHA!! He would be, like, thrown off the branch, and then hit the branch, and he would be dead already. “When the wind blows, the baby will die” is how it should be. Me: Yeah, that makes more sense. Pretty dark, though. Him: Mama, that is messed up. The baby is DEAD. When I asked my youngest why he and his brothers couldn’t get along: “I am NEVER going to be friends with my brothers, even when they have a million dollars. They are too mean to deserve it.” My younger brother complaining about the accuracy of weather reporting: “Remember last year when the weatherman kept saying it would snow and then it didn’t snow, and kept saying it would snow and then it didn’t snow, and KEPT SAYING IT WOULD SNOW, and then it DIDN’T SNOW? Well, if that happens again this year, I am DONE with the news.” My small cousin was listening to us talking about how much drinking and driving there is where her moms lives, and she pipes up with, “My daddy drinks while he drives, even when I tell him not to! He doesn’t listen to me!” We ask her what he drinks. “Coffee!” To my seven-year-old son, trying to prompt him to tell me that he should be washing his face after eating dinner: Me: Okay, so now it’s time to wash your f… ??? Him: (hardly paying attention) Fagina. Me: WHAT?! NO! FACE! Him: Ohhh! Haha. Face. That makes MUCH more sense because I don’t HAVE a fagina.
<urn:uuid:c00f60da-1ddc-4477-bfca-12730d32ecf4>
CC-MAIN-2022-33
https://sweatpantsandcoffee.com/sweatpants-humor-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00676.warc.gz
en
0.959184
689
1.59375
2
KPI Analysis Charts¶ There are many powerful features built into KPI analysis charts. This topic introduces chart and results table features. KPI Analytics charts display differently, depending on the analysis type: - Monitoring: a bar chart that displays counts, and the display can be switched back and forth between 'bar' and 'line' chart. - Discovery: a bubble chart in which the size and placement of each bubble displays the value relative to the whole, when three or more group results by settings are configured in the analysis, the analysis results display in a bubble chart with weighted percentages. Here are features that apply to all analysis charts: - Interactive Selections: select a bar or line in a monitoring chart and its correlate row in the results table is highlighted, and vice versa. - Bar and Line Chart Toggle: at the top of a monitoring chart, there are two icons you can click to toggle between bar and line chart display. - Hover Information Display: hover the mouse over a line, bubble, or bar to see the extended value (beyond the decimal) of that point, Chart and Results Table user interface¶ This annotated image displays many KPI analysis chart and results table features: Chart Red vs. Selection Red¶ Unique Red: when you click a bar or line in a monitoring chart, the selected bar/line turns red; to explain, this example talks about bar charts only. Since some bar charts may already have a red bar as part of the normal chart display; we developed a unique red color to symbolize selection, so users can differentiate between a red bar that has been selected and a red bar that is just red. This image shows a snippet of a bar chart on the top that has a green bar (third bar from the left). When I select that bar, it turns to the color red in the bottom row. You can see that the selected bar red is lighter and brighter than the red of a non-selected bar. Analytics charts display the following information on the chart axes: - X-Axis—the count or percentage of the first "Group Results By" selection. If nothing is selected for grouping the results, the system automatically applies "Date" and "month" to display the analysis results. - Y-Axis—the count or percentage of the KPI value. Any questions left? Except where otherwise noted, content on this site is licensed under the MindSphere Development License Agreement.
<urn:uuid:76972414-7924-404c-945b-854b48353681>
CC-MAIN-2022-33
https://documentation.mindsphere.io/MindSphere/apps/operations-insight/KPI-analysis-charts.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00265.warc.gz
en
0.859879
520
1.828125
2
Here it is! Mama & Littles Bible Study Salt & Light. Why salt and light? Because it’s an important lesson. It’s a great concept to discuss as a family as we all transition our of summer and into school routines. Family Plan // Included in the printable study is a place for you to make a plan as a family for being salt and light in your home, community, and world. Draw Your Light // Included in the printable study is a place for kids (and you) to draw how they can be light. Glow Stick Bath // See how lights dispel darkness by playing in a bath tub with glow sticks. It’s also pretty entertaining for witching hour. Salt Art // Construction paper + glue + salt + watercolors. See how salt adds to the art. It also adds to the mess, but it’s totally worth it. Make Candles // This might take a little more effort but can always be fun. Especially if you need some teacher or grandparent gifts (grandparents day is coming up!) You can by the wax sheets and have your kids roll a candle. Easy and fun! Candle in a Jar // This is my favorite activity. Get a small candle and a jar. Light candle, then place the jar over the top of it. Watch the flame go out. The lesson is not to let anyone make you hide your light. Hide it under a bushel….NO! Let it shine. Salt Scrub // Can also be another gift. Easy to see how salt can be used. Shadow Puppets // This doesn’t have to be an elaborate activity. Scripture Memory // Learn the scripture. Even if it’s the summary. AFFILIATE LINKS USED. FIND THE FULL DISCLOSURE HERE. IF YOU BUY THROUGH THESE LINKS, KNOW WE’RE THANKFUL AND APPRECIATE IT! If you have any feedback, I’d love to hear it. Any requests for a specific scripture to study with your kids? I’d also love to know what you’d like to learn about!!
<urn:uuid:80765873-ee73-4fa7-9336-32c70a7095cd>
CC-MAIN-2022-33
https://laceyrabalais.com/salt-and-light/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00265.warc.gz
en
0.894973
463
1.617188
2
- Rig Rundowns - Premier Blogs Where the Difference Lies The book is structured upon an enthralling narrative with scrupulous documentation that is carried without a hitch by of endless photos regarding the Vox history. It covers all aspects of Vox amplifiers from before their inception in 1957 through the end of the JMI-era in the late 1960s including an insider's perspective on the rise and fall of Jennings Musical Industries and Vox amplifiers. Don't think a book of nearly 700 pages of narrative and photos can push you along? Well, the basic narrative foundation is assisted with numerous charts, sidebars, and illustrations. The kicker that really exemplifies Elyea's dedication is the running item called, "Setting the Record Straight," in which he clears up many popular myths with the information you uncovered through his years of searching. No bones about it, this book will set a standard for future projects attempting to cover guitar or amp companies and their respective history. In our upcoming January issue, PG staff writer, Chris Burgess tackles this monster and had these thoughts regarding the book, "It’s not just that the text and the photography are equally edifying, organized and easy to navigate, or even just that it covers so much territory, from history to field guide, to reference manual, to nostalgic coffee table book. What sets it apart is its depth of detail. It must have been Elyea’s obsession with Vox amps that started it, but his quest to find out everything that could be found out about Vox Amplifiers in the early years can only be described as relentless. In addition to the aforementioned text and photographs, there are included copies of original schematics and diagrams. While they aren't intended to be provide a how-to guide in Vox AC30 replication, these visual copies of history truly make this a complete package for a fan of Vox amps the infamous artists that played them. Breakdown of the Book - In twelve chapters, Section 1 details the history of JMI and Vox in pictures, and in the words of those who were there. - In eighteen chapters, Section 2 investigates every physical aspect of the amplifiers themselves, from cabinets and control knobs to valves and vent covers, and all elements in between—this section features loads of charts and timelines. - In four chapters, Section 3 treats the design, manufacturing and promotional history the amplifiers. - In twelve chapters, Section 4 covers each of the Vox amp designs, with the more famous among them receiving their own chapters. - Section 5 is a short reference guide to dating your Vox amplifier. - In four chapters, Section 6 discusses The Shadows, The Beatles, and the other groups that made Vox a name heard everywhere. - Finally, Section 7 contains as appendices all of the additional material and organization that makes the book such a useful reference manual: a list of JMI people, a chronology, a glossary, notes and indexes, etc. For more info: Vox Amps: The JMI Years
<urn:uuid:72064cd0-5bef-4da9-8794-7d87d9e918ae>
CC-MAIN-2017-04
http://www.premierguitar.com/articles/Vox_Amplifiers_The_JMI_Years_Book_Release_Party?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00510-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944729
620
1.710938
2
Alright, Christmas and the Holidays, and a trip home, is finally over. So, now that I’m back behind my computer, I can get back to the Alternate History making! In the words of the most famous Italian in history, “Letsa Go!” And enough with the exclamation marks! I mean it! Chapter One: The Rough Road to Great Power (Jan. 1936-Sept.1938) Benito Mussolini was not a happy little Fascist dictator at the end of September, 1938. Traveling back to Rome from Munich, and the handover of the Sudetenland by Czechoslovakia, Il Duce was silently furious at Hitler, not to mention the detestable Neville Chamberlin and the French President Albert Leburn, for handing that madman even more land! The Anschluss of Austria only five months before was perhaps the greatest wakeup call to Mussolini that Hitler was not to be trusted. That alone had destroyed the long buildup of trust that the great Italian state had put into the Nazi’s running Germany. Italy, while still on speaking terms with Germany, was prepared to start beginning their own run for Empire, and with Hitler trying to grab every little country he could, that was going to get very dicey very quickly! However, Hitler’s attempts to influence Italy seem to have come to a halt after Anschluss, which Mussolini silently thanked God for. |Kinda funny how Prague is almost completely surrounded, huh?| |Geeze, at this rate, Luxembourg will out build me…| |At last! The first step to Empire is secured! We have conquered a nation with almost nothing!| |Franco is in trouble now…| |…What the Hell is he doing? A yearlong siesta?| |Those damn Germans! Right on our doorstep now! And those muddy jackboots!| On June 21, the decision was made to replace Minister of Security Guido Buffarini-Guidi with Arturo Bocchini. Although Bocchini was a frightful man, using very violent techniques, he was producing some results. |‘Prince of Terror’, eh? Well, he should terrorize me some results then!| |Hey hey hey! It’s not the size that matters, but what you do with it!| Previous entry: Prologue Next entry: TBA * * * Tyler Bugg, who goes by “Tbguy1992” on the Internet, is an aspiring writer, a history student, gamer, and Canadian. You try to figure out what he likes best. His first published work, “Enigma to Paradox” can be found in the short story anthology, Substitution Cipher.
<urn:uuid:e1e38c3d-fdfb-419c-a829-9cf217820f0d>
CC-MAIN-2017-04
http://alternatehistoryweeklyupdate.blogspot.com/2013/01/industria-tecnologia-potenza-italy-aar.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00001-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958392
587
1.554688
2
Credit Crunch Threatens New Medicines SWINDON, England, Oct. 27, 2008 - The global financial crisis could seriously delay the discovery and production of many new life-saving medicines, warns a major international conference today (Monday). Investment into research for new drugs - which globally runs into the billions – is now seriously at threat as former investors in the drug companies shy away as a result of the economic meltdown. Professor David Wield, Director of the Economic and Social Research Council's (ESRC) Edinburgh-based Innogen Centre, and chair of the 'Genomics and Society: Reinventing Life?' conference, delivered a stark warning prior to the gathering of over 200 experts at conference in London. Professor Wield said: "Investing in biotech companies is now seen as risk taking, and will not be for the timid. What will happen to investment in biotech research if finance cannot even be found for relatively everyday expenses which are increasingly becoming more of a struggle? "Drug discovery depends on long-term finance with high risk of failure – and lots of it. Financing of biotechnology companies hit $50bn in 2007. And overall, these biotechs only made profits for the very first time last year, amounting to $1bn on revenues of $59bn." According to Professor Wield, in addition to the impact on the basic research performed at biotechnology companies, development of medicines by pharmaceutical companies has also been hit by the credit crunch. "Like many other sectors, the pharmaceutical industry has had tough times recently – there is seemingly no way to speed up and improve the drug discovery pipeline, and heavily increased R&D has not increased the number of new drugs." "As a result, big companies have been laying-off staff and closing down research units, instead looking to biotechnology start-ups for new ideas," he added. In recognition of the significant long term and immediate challenges faced by the pharmaceutical sector the UK Research Councils are working to help underpin future development of the sector for example to find new ways of enabling effective drug trials that enjoy public confidence; and building new research partnership with the sector. This impact of the credit crunch on research into new medicines and treatments will be considered at the conference as part of a debate featuring two eminent economics experts, Professor Gary Pisano of Harvard University, and Professor William Lazonick of the University of Massachusetts Lowell. The session will be chaired by BBC business journalist, Simon Gompertz. With so much of the life sciences already intertwined with our everyday life, further conference sessions will concentrate on whether society is keeping pace with advances in biology. These include issues surrounding the use and safekeeping of our personal biological information, the development of sustainable biofuels, and the creation - for stem cell research - of human-animal hybrids. Other topics to be discussed range from the ethical impacts of emerging disciplines such as synthetic biology - which attempts to recreate living systems in the laboratory and may one day produce artificial life-forms - to the likely contributions the life sciences will make to global challenges such as food security and climate change. The gathering is the annual conference of the ESRC's Genomics Network, and it brings together social and natural scientists with policymakers and commentators, from all over the globe. This year it has been organised by the network's Innogen centre, which is based at the University of Edinburgh and the Open University. FOR FURTHER INFORMATION, CONTACT: For interviews with Professor Wield or other speakers in advance of the conference please contact Dave Stevens (Tel: 0131 651 4747/ 07967 819277 email email@example.com) Media places are limited so if you wish to attend, please contact Lara Crossland (Tel: 0131 650 2842, email firstname.lastname@example.org) NOTES TO EDITORS: 1. Genomics and Society: Reinventing Life? 9am – 5pm 27 October -28 October 2 Savoy Place, London WC2R 0BL (The full programme can be downloaded at www.genomicsandsociety.org) Welcome from Professor Charlie Jeffery, Chair of the ESRC Strategic Research Board Keynote lecture by Professor Paul Rabinow, University of California at Berkeley on the implications of synthetic biology – including its potential to create 'artificial life'. safeguarding DNA databases sustainable biofuel development the use of human-animal hybrids in research life sciences in developing countries innovation in the pharmaceutical industry meet the authors: 'Genomes and What to Make of Them' life sciences and the credit crunch Keynote lecture from Professor Bartha Maria Knoppers, University of Montreal on the ethics of the use of the human genome. The Knowledge Exchange – debates on (1) the regulation of stem cell therapies and (2) the importance of life sciences to national economies, job creation and sustainable development within the EU Genomics Futures Panel – a discussion over the future roles for the life sciences in tackling major issues such as climate change, human diseases and food security. Closing Keynote lecture from Dr Iain Gillespie, Head of Biotechnology Division, Organisation for Economic Cooperation and Development (OECD) on how policy can ensure genomics serves society. 3. The ESRC Genomics Network Launched in 2002 to examine the social and economic consequences surrounding the development and use of genomics, the Economic and Social Research Council (ESRC) Genomics Network is one of the ESRC's largest social science investments. The Network.consists of: Cesagen (Centre for Economic and Social Aspects of Genomics) a Cardiff-Lancaster collaboration led by Professor Ruth Chadwick; Egenis (ESRC Centre for Genomics in Society) headed by Professor John Dupré at Exeter; and Innogen (ESRC Centre for Social and Economic Research on Innovation in Genomics) - collaboration between the University of Edinburgh and the Open University, directed by Professor David Wield; and the ESRC Genomics Policy and Research Forum, led by Professor Steve Yearley, Professor of the Sociology of Scientific Knowledge at University of Edinburgh. http://www.genomicsnetwork.ac.uk/ 4. The Economic and Social Research Council (ESRC) is the UK's largest funding agency for research and postgraduate training relating to social and economic issues. It supports independent, high quality research which impacts on business, the public sector and the third sector. The ESRC's planned total expenditure in 2008/09 is £203 million. At any one time the ESRC supports over 4,000 researchers and postgraduate students in academic institutions and research policy institutes. Contact: Kelly Barnett Economic & Social Research Council Posted: October 2008 Recommended for you
<urn:uuid:ed883958-01c0-469a-96cb-bda35c486636>
CC-MAIN-2016-44
https://www.drugs.com/news/credit-crunch-threatens-new-medicines-14358.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719155.26/warc/CC-MAIN-20161020183839-00332-ip-10-171-6-4.ec2.internal.warc.gz
en
0.911093
1,404
1.921875
2
I’m listening right now to On Point*, where the topic is Pushing E-Health Records. The only case against electronic health records (EHR, aka electronic medical recordsk, or EMR) is risk of compromised privacy. Exposure goes up. The friction involved in grabbing electronic medical records is lower than that involved in grabbing paper ones, especially with the Internet connecting damn near everything. Here’s the problem with privacy in the Internet Age (which we are now in, with no hope of ever getting out, unless we live the connectionless life): the Net is a big copy machine. It’s amazing how a fact so simple escapes attention until a first-rate metaphorist such as Kevin Kelly comes along to expound on what ought to be obvious: The internet is a copy machine. At its most foundational level, it copies every action, every character, every thought we make while we ride upon it. In order to send a message from one corner of the internet to another, the protocols of communication demand that the whole message be copied along the way several times. IT companies make a lot of money selling equipment that facilitates this ceaseless copying. Every bit of data ever produced on any computer is copied somewhere. The digital economy is thus run on a river of copies. Unlike the mass-produced reproductions of the machine age, these copies are not just cheap, they are free. Our digital communication network has been engineered so that copies flow with as little friction as possible. Indeed, copies flow so freely we could think of the internet as a super-distribution system, where once a copy is introduced it will continue to flow through the network forever, much like electricity in a superconductive wire. We see evidence of this in real life. Once anything that can be copied is brought into contact with internet, it will be copied, and those copies never leave. Even a dog knows you can’t erase something once it’s flowed on the internet. We’re not going to fix that. The copying nature of the Net is a feature, not a bug. We can fight some of it with crypto between trusting parties. But until we find ways to make that easy, the exposure is there. And, as long as it is, we’re going to have people who say risk of exposure overrides other concerns, such as the fact that dozens of thousands of people in the U.S. alone die every year of bad health care record keeping and communications — in other words, of bad data. Still, if we want good medical care, we need EHR. That much is plain. The question is, How? The answer will not be an information silo, or a set of silos. We have too many of those already. That’s the problem we have now — both on paper and in electronic formats (as I discovered last year in one of my own medical adventures). The patient needs to be the point of integration for his or her own data, and the point of origination about what gets done with it. Even if the patient’s primary care physician serves as a trusted originator of medical decisions, the patient needs to anchor the vector of his or her own care, for the simple reason that the patient is the one constant as he or she moves through various medical specialties and systems. The patient needs to be the platform. Not Google, or Microsoft, or your HMO, or the VA, or some kieretsu involving Big Pharma, Big Software Companies and Big Equipment Makers. This requires classic VRM: tools of independence and engagement. That is, tools that enable the patient to be independent of any health care provider, yet better able to engage any provider. In other words, while the answer needs to be systematic, it does not need to be A Big System (which I fear both BigCos and BigGovs whish to provide). The answer needs to come from geeks who know how to eliminate big problems with simple solutions. For example, - Consider how the Internet Protocol solved the problem of multiple networks that didn’t get along. - Consider how email protocols such as SMTP, POP3 and IMAP solved the problem of multiple email systems that didn’t get along. - Consider how the XMPP protocol solves the problem of multiple instant messaging systems that don’t get along. We need new ways of organizing our own health care data, and communicating that data selectively to trusted health care providers through open and standard protocols (that may or may not already exist… I don’t know). I wanted to get those thoughts down because there’s a bunch of stuff going on around health care right now (including two conferences in Boston), detailed to some degree in Health Care Relationship Management, over at the ProjectVRM blog. * On WBUR, a Boston station I pick up here in Santa Barbara over my Public Radio Tuner.
<urn:uuid:9693c5d9-83c6-41dd-909b-aa2641c253f4>
CC-MAIN-2016-44
http://blogs.harvard.edu/doc/tag/hcrm/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00105-ip-10-171-6-4.ec2.internal.warc.gz
en
0.939237
1,028
2
2
The altar is composed of solid marble pieces. The mensa is a 15″ thick single piece of marble stone with carvings on all four sides and top. The mensa rests on four solid stone legs. In the middle under the mesa at the floor is a Bronze Reliquary. The reliquary is embedded into the floor and is visible between the legs.
<urn:uuid:60d70be7-ee01-4656-91e2-8f7a9ee9438d>
CC-MAIN-2022-33
https://liturgical-consultants.org/?attachment_id=1921
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00678.warc.gz
en
0.971019
78
1.71875
2
If you have you been told that you cannot wear contact lenses because of an irregular cornea or other problems, you may want to ask Dr. Murray Johnson about Scleral Contact Lenses. - If you want to wear contact lenses but have had trouble wearing them in the past — or you've been told you are not a good candidate for contacts — scleral contact lenses may be the solution you are looking for. - If you have an eye condition that prevents you from wearing regular contact lenses, such as corneal irregularities (i.e. keratoconus), post corneal transplant, severe dry-eye, or an unusually high refractive error, scleral contact lenses may be the right option for you. What are Scleral Lenses? Scleral contact lenses are large-diameter gas permeable lenses specially designed to fit over the cornea and extend onto the white of the eye which is known as the sclera. Scleral lenses functionally replace the irregular cornea with a perfectly smooth optical surface to correct vision problems caused by keratoconus and other corneal irregularities. The space between the cornea and the back surface of a scleral lens acts as a fluid reservoir to provide comfort for people with severe dry eyes who otherwise could not tolerate contact lens wear. Why Use Scleral Lenses? Scleral Contact Lenses are used to correct vision in a number of conditions, such as: - Corneal trauma - Post refractive surgical corneal issues and deformities - High Myopia - Dry Eye Syndrome - Ocular surface disease - Severe refractive errors - Inability to easily fit conventional lenses, or lack of stability with traditional contacts How Do We Determine if Scleral Lenses are Suitable for You? Technically, any patient can wear a scleral lens. They are most beneficial for patients with corneal diseases, dystrophies, and degenerations (i.e. keratoconus), patients who have corneal scars and irregularities, and patients who have had a corneal transplant or refractive surgery (i.e. LASIK and RK). In many of these cases the corneas are altered in some way. If the cornea does not have a perfect convex or dome shape, vision will be poor through both glasses and traditional contact lenses. Because scleral lenses are larger than conventional lenses, they are more stable on the eye. They also provide comfort similar to soft lenses. At your contact lens exam and fitting, Dr. Johnson will tell you if scleral contact lenses are right for you and which type will be best for you. At ECLANT Scleral Contact Lenses are custom fit. We use advanced technology with images and maps to accurately find the best fit. We carefully map the cornea using the latest corneal topography equipment. This generates a detailed diagram the cornea, which is used to make customized scleral contact lenses. Scleral lenses require precise customization, and every patient’s case varies in degrees of severity and corneal measurements. Scleral lenses are custom fit lenses which require in depth knowledge, expertise and the use of advanced diagnostic equipment. Dr. Johnson is known for his special expertise in fitting scleral contact lenses. If you think you may be a candidate for scleral contact lenses CONTACT US FOR A CONSULTATION
<urn:uuid:f705ee92-0406-42b8-8d0d-75cc431e9a1c>
CC-MAIN-2022-33
https://www.eyestexas.com/our-specialties/scleral-lenses/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00266.warc.gz
en
0.921254
729
2.5625
3
Though the first year of college can be exciting for so many entering their freshman year, it can also be scary for those first-generation students who do not have a family member or mentor to guide them through this new experience. “My dream is that we create an organization that provides equal resources and access to first-generation Latino youth so that they can make their college dreams a reality,” says Shirley Acevedo Buontempo, Founder and Executive Director of Latino U College Access. She herself moved to the U.S. from Puerto Rico when she was 10 and did not speak English, but became the first in her family to graduate from college and later obtain a graduate degree. While helping her daughter go through the college application process, she realized it was not easy. So she founded Latino U College Access, a non-profit located in Westchester County, New York, a fairly affluent area not far from New York City. The program was created in an effort to provide first-generation students, specifically Latinos, with the tools and guidance they need to navigate the college application process. Most recently, the organization launched its newest program, “College Bound Scholars,” where two students were selected to receive a mentor for their freshman year and a $1,000 scholarship for dorm and school supplies. Angela Leis will be attending SUNY New Paltz, and Kevin Tejada will be attending Bates College in the fall. Tejada was the first to participate in Latino U’s college coaching program. He received help applying for college and filling out the financial aid application. He is going to Bates on a full scholarship. Once in college, the two incoming freshmen will be mentored by Amy Peck, the creator of the College Bound Scholars program, and Doreen Gadigan, a Latino U College Access volunteer and special education teacher. The two women will keep in touch with the students constantly and guide them on topics such as handling finances, getting along with a roommate and other challenges first-year students encounter. Latino U College Access holds bilingual FAFSA (financial aid application) workshops for parents, as well as intensive SAT/ACT preparation workshops for students. Every student interested in receiving aid from the organization is welcome to attend the workshops and is given a coach who guides them through the application process. The program launched last year and has already made partnerships with five school districts. The schools provide awareness of the program to students who might be interested in attending Latino U events. “As a new organization, we are privately funded by individuals and we are looking for donors that want to support our efforts and we are looking for Latino professionals who would like to serve on our board and be mentors,” says Acevedo. “The Latino community recognizes how important an education is, we are working to establish programs in other communities,” says Acevedo.
<urn:uuid:a5b66d53-c6e9-41f6-8416-e708ba339fa9>
CC-MAIN-2016-44
http://nbclatino.com/2013/07/26/a-latinas-goal-to-steer-first-generation-students-to-college-success/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00157-ip-10-171-6-4.ec2.internal.warc.gz
en
0.973772
594
2
2
Today is the Autumnal equinox. Astronomically, the equinoxes are when Earth’s equatorial axis is perpendicular to the Sun. From our perspective, it is when the hours of day of night are (theoretically, at least) equal. The first, waxing half of the wheel (from Aries in March through Virgo in September) is when the energy pushes outward to reach its fullness. The second, waning half of the wheel (from Libra in September through Pisces in March) is one of involution and introspection, when the energy is turned inward. Indeed, ‘fall’ is related to the period when the ebbing of the Sun (which began back in June at the summer solstice) becomes noticeable. For people connected to nature, this time of year, when the Sun rises from the same place on the horizon for three days, is the time to begin the harvest – of food and of animals. Not only would the food, grains and wood get cut, dried and put up for winter. Too, those animals which could not be fed over the winter (based on the success of the harvest and the age and health of the animal) would be culled. It’s a hard truth but the outcome was that the family would be fed over the winter and the remaining animals would also have what they needed to survive the cold months. With the Autumnal equinox, we are entering the third-quarter of the wheel. The first quarter (from the left edge to the bottom) shows the time from conception to birth. The second quarter is indicative of the time we learn of ourself as a unique person in a certain family. The third quarter of the wheel shows the time we begin to interact with others on a one-to-one basis. The third quarter of the wheel is trans-personal, it’s when we move beyond the self and begin learning how to interact with others in an equal way (giving/receiving, listening/speaking, etc.). In the third quarter we experience the power of love, how it taps into energy that can lead to a reality that is greater than the sum of its individual parts. There is an intense, do-or-die quality to the third quarter which is sometimes referred to as the Quadrant of Manifestation. [Image from sharethyknowledge.quora.com] Architects of many ancient cultures built special features into their buildings that only showed themselves twice a year. The location, shape and details of many important buildings synchronized with the Spring and Autumnal equinoxes. The Great Pyramid in Egypt was built so that, at midnight on the Autumn equinox, certain alpha stars of specific constellations shone straight down a specific narrow descending passageway. (In 3350BC and 2170BC, it was Thuban, alpha star of the constellation Draco, and in 2004AD, it was Polaris, alpha star of Ursa Minor.) [Image from landlopers.com] The stepped pyramids of Chich’en Itza, Mexico are another astronomical wonder. The pyramids, which are dedicated to Kukulcan, the feathered serpent, have snakes running down the steps that appear to undulate with the sun of the Autumnal equinox. (They appear to undulate back up the pyramid with the sun of the Spring equinox.) At the equinox, when the Sun moves into Libra, we have an opportunity to synchronize ourselves with Nature, ourselves, and our life. If this is important to you, reserve some time this afternoon (at 3:30pm or anytime of the day and night of September 22 or 23) to meditate. Balance and harmony are the themes.
<urn:uuid:45a967f1-c589-4ecc-ace4-cb8f5e2b47f4>
CC-MAIN-2022-33
https://qualityastrology.net/tag/autumn/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00073.warc.gz
en
0.957996
784
2.15625
2
Recently, there has been much attention paid to an article entitled “ADHD Doesn’t Exist” that appeared in a number of major U.S. publications, based on a book of the same name just published by Richard Saul, MD. Dr. Saul, who describes himself as a behavioral neurologist, makes his point by describing cases of children who came to him exhibiting signs suggestive of ADHD (difficulty concentrating, poor academic work etc), but who turned out upon closer examination to instead have a learning disorder, anxiety, impaired vision, or even bipolar disorder. His implication is that all children who are referred for attention or behavior problems will be found instead to have another condition that accounts for their symptoms. Abundant evidence indicates otherwise. Any reputable, knowledgeable mental health practitioner will take care to rule out these alternative conditions as the exclusive or primary cause of a child’s attention or behavior problems before diagnosing ADHD. But after other possible disorders are ruled out, a significant number of children meet the formal criteria for ADHD, as described in the Diagnostic and Statistical Manual. These are: (1) symptoms of inattention and/or hyperactivity-impulsivity that are extreme for the child’s age; (2) that occur both at home and at school; (3) with clear evidence that the symptoms reduce the quality of the child’s social, academic, or occupational functioning; (4) that are chronic, starting before age 12 and lasting at least 6 months; and (5) are not explained by another disorder. Evidence that ADHD is a real disorder—and specifically a brain disorder—comes from several major sources. Neuroimaging has demonstrated that children with ADHD show (a) structural size differences in relevant brain areas and (b) less activation of brain regions that control attention, impulses and motor activity, organization, and planning, and that many of these differences persist to adulthood as well. Finally, family studies indicate that the condition is highly heritable and point to a genetic predisposition in the great majority of cases. The unfortunate impact of this and other publications that are not fact-based is that they add to the stigma of ADHD and hinder the diagnosis and treatment of thousands of people who do have ADHD, and whose lives would be significantly improved with treatment. Mary V. Solanto, PhD, is associate professor of psychiatry and director of the ADHD Center in the Division of Child and Adolescent Psychiatry at Mount Sinai School of Medicine. She is a member of the advisory board of the Journal of Child Psychology and Psychiatry and of the editorial boards of the Journal of Attention Disorders and The ADHD Report. Dr. Solanto serves on the professional advisory boards of Children and Adults with ADHD (CHADD) and the American Professional Society of ADHD and Related Disorders (APSARD). She is the author of Cognitive-Behavioral Therapy for Adult ADHD: Targeting Executive Dysfunction (Guilford Press, 2011).
<urn:uuid:f2a5adbb-1d93-4fb0-9cbf-48ced6f577f3>
CC-MAIN-2017-04
http://chaddleadershipblog.blogspot.com/2014/03/the-myth-that-adhd-doesnt-exist.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00445-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954135
600
3.0625
3
Obama's Way Forward On Energy and Climate Change Another major piece of the Obama agenda expressed yesterday is on energy and climate change issues. The President called for a cap and trade system to shrink carbon emissions: Thanks to our recovery plan, we will double this nation’s supply of renewable energy in the next three years. We have also made the largest investment in basic research funding in American history – an investment that will spur not only new discoveries in energy, but breakthroughs in medicine, science, and technology. We will soon lay down thousands of miles of power lines that can carry new energy to cities and towns across this country. And we will put Americans to work making our homes and buildings more efficient so that we can save billions of dollars on our energy bills. But to truly transform our economy, protect our security, and save our planet from the ravages of climate change, we need to ultimately make clean, renewable energy the profitable kind of energy. So I ask this Congress to send me legislation that places a market-based cap on carbon pollution and drives the production of more renewable energy in America. And to support that innovation, we will invest fifteen billion dollars a year to develop technologies like wind power and solar power; advanced biofuels, clean coal, and more fuel-efficient cars and trucks built right here in America. First to what has already been passed. There are great incentives through tax breaks and public investment programs in the stimulus pacakge to get people to change their lifestyles to a more green and energy-efficient one. The build-out of a national clean-energy smart grid is one of the most exciting infrastructure projects of the past 30 years. Too much of our wind and solar energy systems would be best placed in areas that are not currently fed by high-voltage transmission lines back to any grid. Streamlining this would save billions in power already generated by reducing congestion and inefficiency, and open large spaces up to renewable energy. But the biggest two parts of this, the legislation that Obama is calling for, are the RES (renewable energy standard) and a cap-and-trade system. The RES has the votes and will get done, and hopefully the Congress will shoot for a high percentage of electricity from renewables by 2020 (50%? Dare to dream?). As for cap and trade, here are some details: On energy policy, Mr. Obama’s budget will show new revenues by 2012 from his proposal to require companies to buy permits from the government for greenhouse gas emissions above a certain cap. The Congressional Budget Office estimates that the permits would raise up to $300 billion a year by 2020. Since companies would pass their costs on to customers, Mr. Obama would have the government use most of the revenues for relief to families to offset higher utility bills and related expenses. The remaining revenues would cover his proposals for $15 billion a year in spending and tax incentives to develop alternative energy. This may be surprising to Congressional Dems, some of whom may expect to be using for a variety of energy and environmental purposes. But I’ve been saying for a while that, as a matter of politics, the vast majority of the revenues from the auction will need to be returned to taxpayers — that is to say, the vast middle class. I think at least 60% to 80% needs to be refunded to start with, rising to 80% to 90% within 10 years. Otherwise conservative opponents will simply attack this entire effort as a tax. Yes, they’ll do so anyway, but if the bottom of three to four quintiles are made whole, the argument can be refuted. What is cap and trade? Kevin Drum has a pretty thoughtful article about it at Mother Jones. The theory is straightforward. Suppose you have two plants, and the first one is able to eliminate one ton of pollutants at a cost of $10,000. The second plant, perhaps because it uses a different fuel or newer boiler technology, can do the same for only $4,000. Under command and control, if you required them to remove one ton each, the cost would total $14,000. But what if all you mandated was that two tons of pollutants be removed overall (the cap part) and allowed the plants to work out how to do it? Naturally, the first plant would just pay the second plant $4,000 to remove an extra ton of pollutants from its emissions (the trade part). At first this seems suspect: The first plant is being allowed to merrily pollute away. But you've still removed two tons of pollutants, and since it was done more cheaply—for $8,000 instead of $14,000—you can afford to ratchet down the cap. You can require that three tons of pollutants be eliminated overall, and since this still costs only $12,000, everyone comes out ahead. The public gets cleaner air, and the plants save money. There are ways to make cap and trade essentially a carbon tax refunded to consumers, and that's by ensuring that the carbon credits are sold at auction. There are drawbacks to it, particularly if the rest of the world doesn't go along, but Europe is already on board, and while initially the results were mixed, they are effectively pricing carbon now, and we can learn from their early mistakes. It's not the end of the fight, but it's a good tool. Drum concludes: "Cap and trade is just a tool," says the NRDC's Bryk. It might be the backbone of any effective long-term carbon reduction policy, but it's not the only tool we need. Or even necessarily the best. If you want to improve vehicle mileage, for example, raising federal fuel-efficiency standards is "much cheaper for consumers than raising the price of gas," she says. Michael O'Hare, a public-policy professor at UC-Berkeley, emphasizes the need for the government to take a more active role than just setting carbon prices. Sure, higher energy prices might motivate people to change their behavior. "But," he points out, "even if I want to take the tram, I can't do it if there's no tram." In other words, command and control will remain absolutely necessary. As will taxes. Even with a well-designed cap-and-trade plan in place, we'll need tougher efficiency standards, higher fuel taxes, more sensible land-use policies, green research programs, and plenty more. But in the same way that cutting calories is the core of any weight loss no matter which fad diet you follow, raising the price of carbon is the core of any climate plan. With luck, this could be the year we finally figure that out. Ultimately, I think technology is the killer app here. Raising the price for carbon output will spur the innovation to find clean energy solutions, and if industry is successful, we'll see a major paradigm shift. What's most important about this is that those solutions will eventually require millions of green jobs and a return to the American manufacturing base that held us in good stead from the beginning of the Industrial Revolution to the beginning of the outsourcing craze. Major legislation on the climate wouldn't just be good policy - it's essential. You can become a Climate Precinct Captain able to help with building a grassroots movement around these issues at 1sky.
<urn:uuid:4851433e-bec7-4577-92a2-5312b25a87af>
CC-MAIN-2017-04
http://d-day.blogspot.com/2009/02/obamas-way-forward-on-energy-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00428-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959871
1,504
1.953125
2
From what you eat to how you live, it is the little things you do that add years to your life. Consider this: In the 20th century, the average life expectancy shot up 30 years—the greatest gain in 5,000 years of human history. And this: Centenarians—folks who make it into the triple digits—aren't such an exclusive club anymore, increasing 51 percent from 1990 to 2000. How to account for these dramatic leaps? Advances in health, education, and disease prevention and treatments are high on the list, and that makes sense. But what you may not know is that seemingly unimportant everyday habits, or circumstances in your past, can influence how long and how well you'll live. Here, the latest research on longevity—science-based signs you're on a long-life path, plus tips on how to get on track. You have a (relatively) flat belly after menopause Women who are too round in the middle are 20 percent more likely to die sooner (even if their body mass index is normal), according to a National Institute on Aging study. At midlife, it takes more effort to keep waists trim because shifting hormones cause most extra weight to settle in the middle. If your waist measures 35 inches or more (for men, 40 inches or more), take these steps: 1. Work two or three 20-minute strength-training sessions into your weekly exercise regimen to preserve lean muscle mass and rev metabolism. 2. Eat a daily serving of omega-3s (in salmon, walnuts, and flaxseed) to help combat inflammation and seven daily servings of fruits and vegetables, loaded with disease-fighting antioxidants. 3. Get 25 percent of your daily calories from healthy fats—such as monounsaturated fatty acids—which protect your heart and may help you store less fat in your belly (for a 1,600-calorie diet, that's 44 g). You were a healthy-weight teen A study in the Journal of Pediatrics that followed 137 African Americans from birth to age 28 found that being overweight at age 14 increases your risk of developing type 2 diabetes in adulthood. Adults with diabetes are two to four times more likely to develop heart disease than those without the condition, according to the American Heart Association. You like raspberries in your oatmeal Most Americans eat 14 to 17 grams of fiber per day; add just 10 g and reduce your risk of dying from heart disease by 17 percent, according to a Netherlands study. Dietary fiber helps reduce total and LDL ("bad") cholesterol, improve insulin sensitivity, and boost weight loss. One easy fix: Top your oatmeal (1/2 cup dry has 4 g fiber) with 1 cup of raspberries (8 g) and you get 12 g of fiber in just one meal. Other potent fiber-rich foods: 1/2 cup of 100% bran cereal (8.8 g), 1/2 cup of cooked lentils (7.8 g), 1/2 cup of cooked black beans (7.5 g), one medium sweet potato (4.8 g), one small pear (4.3 g). You make every calorie count Researchers in St. Louis reported that men and women who limited their daily calories to 1,400 to 2,000 (about 25 percent fewer calories than those who followed a typical 2,000-to 3,000-calorie Western diet) were literally young at heart—their hearts functioned like those of people 15 years younger. "It's about not just eating less but getting the most nutrition per calorie," says study author Dr. Luigi Fontana, associate professor of medicine at Washington University School of Medicine. Study subjects stuck to vegetables, whole grains, fat-free milk, and lean meat and nixed white bread, soda, and candy. If you cut empty calories and eat more nutrient-rich foods, your health will improve, says Fontana. You're a tea lover Both green and black teas contain a concentrated dose of catechins, substances that help blood vessels relax and protect your heart. In a study of more than 40,500 Japanese men and women, those who drank 5 or more cups of green tea every day had the lowest risk of dying from heart disease and stroke. Other studies involving black tea showed similar results. You really need only one or two cups of tea daily to start doing your heart some good—just make sure it's a fresh brew. Ready-to-drink teas (the kind you find in the supermarket beverage section) don't offer the same health benefits. "Once water is added to tea leaves, their catechins degrade within a few days," says Jeffrey Blumberg, a professor of nutrition science and policy at Tufts University. Also, some studies show that adding milk may eliminate tea's protective effects on the cardiovascular system, so stick to just lemon or honey. You skip cola (even diet) Scientists in Boston found that drinking one or more regular or diet colas every day doubles your risk of metabolic syndrome—a cluster of conditions, including high blood pressure, elevated insulin levels, and excess fat around the waist, that increase your chance of heart disease and diabetes. Controlling blood pressure and cholesterol levels, preventing diabetes, and not smoking can add 6 to 9 1/2 healthy years to your life. One culprit could be the additive that gives cola its caramel color, which upped the risk of metabolic syndrome in animal studies. Scientists also speculate that soda drinkers regularly expose their tastebuds to natural or artificial sweeteners, conditioning themselves to prefer and crave sweeter foods, which may lead to weight gain, says Dr. Vasan S. Ramachandran, a professor of medicine at Boston University School of Medicine and the study's lead researcher. Better choices: Switch to tea if you need a caffeine hit. If it's fizz you're after, try sparkling water with a splash of juice. You eat purple food Concord grapes, blueberries, red wine: They all get that deep, rich color from polyphenols—compounds that reduce heart disease risk and may also protect against Alzheimer's disease, according to research. Polyphenols help keep blood vessels and arteries flexible and healthy. "What's good for your coronary arteries is also good for your brain's blood vessels," says Robert Krikorian, director of the Cognitive Disorders Center at the University of Cincinnati. Preliminary animal studies suggest that adding dark grapes to your diet may improve brain function. What's more, in a recent human study, researchers found that eating one or more cups of blueberries every day may improve communication between brain cells, enhancing your memory. You don't like burgers A few palm-size servings (about 2 1/2 ounces) of beef, pork, or lamb now and then is no big deal, but eating more than 18 ounces of red meat per week ups your risk of colorectal cancer—the third most common type, according to a major report by the American Institute for Cancer Research. Colorectal cancer risk also rises by 42 percent with every 3 1/2-ounce serving of processed meat (such as hot dogs, bacon, and deli meats) eaten per day, the report determined. Experts aren't sure why red and processed meats are so harmful, but one of their suspects is the carcinogens that can form when meat is grilled, smoked, or cured—or when preservatives, such as nitrates, are added. "You can have an occasional hot dog at a baseball game, but just don't make it a habit," says Karen Collins, RD, a nutrition advisor at AICR. And when you do grill red meat, marinate it first, keep pieces small (kebab-size), and flip them often—all of which can help prevent carcinogens from forming. If you're baking or roasting it, keep the oven temp under 400°F. You run for 40 minutes a day Scientists in California found that middle-aged people who did just that—for a total of about 5 hours per week—lived longer and functioned better physically and cognitively as they got older; the researchers tracked runners and nonrunners for 21 years. "What surprised us is that the runners didn't just get less heart disease—they also developed fewer cases of cancer, neurologic diseases, and infections," says study author Eliza Chakravarty, MD, an assistant professor of medicine at Stanford University School of Medicine. "Aerobic exercise keeps the immune system young." If you don't like to run, even 20 minutes a day of any activity that leaves you breathless can boost your health, she says.
<urn:uuid:497610ee-9944-4add-aa06-90da38288739>
CC-MAIN-2017-04
http://www.foxnews.com/health/2012/10/19/surprising-signs-youll-live-to-100.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00223-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943379
1,797
2.65625
3
Frank has various medical problems that make mobility difficult. He has a lot of experience in getting equipment to help him live independently. "I’ve had two strokes and I have type 2 diabetes and, more recently, a triple heart bypass. I couldn’t be discharged from hospital until the hospital discharge team had made adaptations or had checked out the house. The repairs and the adaptations were done by the council in the main. One is a stair lift, which is designed to swivel at the top landing so that my feet can go down on a firm surface. The cost of that was £6,500, paid for by the council. They said, ‘We’ll put in a downstairs loo,’ and they did lots of handrail supports all over the house. Decking was put in to completely flatten out a slope outside so that we could put bins out safely and access the garage. There’s a bath chair that rises and lowers by remote control so I can get in and out of the bath. There’s a bed head lift, which is typical of a hospital bed that lifts the pillows so that I can get in and out of the bed more easily and be more comfortable. There’s also a bed rail, which is a most used, most valuable device and probably the cheapest. It helps me get out of bed with minimal assistance. It’s quite a catalogue, isn’t it? Understanding the system But finding your way through the labyrinth of different departments at the local council takes real skill. They tend to be autonomous, they tend not to talk to each other, they don’t communicate well. I'm dealt with by the adult section of the social care department, but when I need something doing like a handrail putting up or a stair lift putting in, that has to come from the repairs and adaptations department. When I needed a chair from which I could be lifted to avoid my blood pressure going up and being made breathless because of my heart condition, that was another department. Each department has their own application forms, some of which are 45 pages long, most of which are means related. I hold all my data on a computer ready to be lifted from the last application and dropped into the new application, which is very valuable. 'I hold all my data on a computer ready to be lifted from the last application and dropped into the new application.' You have to know how to fill in the forms and even when you’ve done so and they say, sorry, but you’re not having it, you’ve got to know how to appeal and to whom to appeal to. I’ve got pretty good at that. I had to appeal three times for my chair. I also asked the council for a scooter and they said, ‘No we can’t.’ Then I had to write about 20 letters to 20 different charities, most of which were replied in the negative, but two were positive and provided £2,000 towards the scooter, plus £500 from me. I first started applying in March and the scooter was delivered in August, so like most things to do with charities and social workers, it can take a few weeks." - Home care and support services: explains the wide range of services available to help people live independently for longer. - Financing care at home: explains your choices if you have concerns about funding care. - Self-funding home alterations: information about the options available if you need to self-fund alterations to the home. Page last reviewed: 31 December 2015 Next review due: 30 April 2017
<urn:uuid:baf8b878-230e-4f45-a7c5-ccb68026858b>
CC-MAIN-2017-04
http://www.which.co.uk/elderly-care/financing-care/financing-home-alterations/352398-frank-s-story
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00246-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978796
763
1.914063
2
They are elasticity, resistance and versatility themselves Polyurethanes (PU) are synthetic polymers made up of a chain of urethane bonds. They are thermoplastic elastomers that exhibit elastic features typical of elastomers, but with a mechanical resistance closer to thermoplastic materials. Polyurethanes offer exceptional mechanical properties such as excellent abrasion resistance making them suitable for use in many applications. They stand out for their load capacity, wear resistance, and smoothness. In addition to classic polyurethanes for hydraulic applications, ATP has developed other compounds with specific characteristics that provide superior performance in particular applications. The improvement of resistance to hydrolysis and sanitising products allows, for example, SINTEK HTPU to be used in many applications in the food and pharmaceutical industries, while the presence of additives with low coefficient of friction in other polyurethanes makes for better resistance to dry sliding. Finally, the increase in the hardness of the compound allows the achievement of excellent load resistances.
<urn:uuid:54efcec1-c2cb-49a7-a15a-05cf641282d6>
CC-MAIN-2022-33
https://www.atpgroup.it/en/materials/polyurethanes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00270.warc.gz
en
0.932384
210
2.890625
3
SECTION 1302. OPEN BURNING: Burning brush, leaves, trash or debris is not allowed in the Village of Essex Junction. Cooking or outdoor fireplaces are allowed with proper fuels to include charcoal, firewood, liquid propane (LP) or natural gas. In no circumstance shall an otherwise permissible fire be allowed that creates, in the discretion of the Village or its designate, a public nuisance. Fires must be attended at all times with an extinguishment resource within twenty (20) feet of the fire. Fires must be ten (10) feet away from a structure and must be built where they will not escape. A person starting a fire is responsible for preventing its escape. This prohibition shall not include training exercises by the Essex Junction Fire Department. The Village Trustees, with the concurrence of the Essex Junction Fire Chief, may approve a burn permit for a community event provided that the Essex Junction Fire Department is present. Chapter 13 13-2 SECTION 1303. PENALTIES: a. An Issuing Municipal Official is authorized to recover civil penalities in the following amounts for each violation of Section 1302 or waive if appropriate:
<urn:uuid:a6c458cd-5af3-49ee-a944-b2fdb73e6360>
CC-MAIN-2022-33
https://www.essexjctfire.org/custom.html?id=25630
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00670.warc.gz
en
0.898283
234
1.828125
2
Celebrating more music programmes in our schools across Barnsley! Barnsley Music Education Hub released their annual report and are pleased to announce that over the last year, more schools have engaged with music services than ever before. Over the last year, 100% of primary and secondary schools, and a record number of students have benefited from access to music education thanks to the combined efforts of the Music Hub and partners such as Barnsley Youth Choir. Hannah Fouracre, Director of Music Education, Arts Council England, outlines: “We continue to celebrate the extraordinary value of the Music Education Hub network that is now in its tenth year. These place-based partnerships engage in conversations with community and cultural partners, schools, and young people themselves to ensure children can sing, learn an instrument and play together. During a challenging year, Barnsley Music Education Hub’s positive engagement with schools, particularly with singing, is pleasing to see.” During COVID-19 it was as important as ever that young people had access to music education, as learning music can help focus on learning and relieve stress while boosting confidence. Barnsley Music Education hub provided virtual lessons and access to hundreds of free videos to encourage young people to keep learning and play at home. Cllr Tim Cheetham, Barnsley Council’s Cabinet Spokesperson for Place (Regeneration and Culture), said: “It’s fantastic that more schools are engaging with our music services. Music opens so many possibilities, and it’s great to see so many young people taking the opportunity to develop their skills, talent and creativity, while fulfilling their learning potential.” The Musical Education Hub is now gearing up for a busy year, with ‘The Big Sing’ scheduled for summer 2022, which sees over 200 children from six primary schools across the borough coming together to work with professional singers and musicians. You can find out more about the Barnsley Music Education Hub on their website.
<urn:uuid:bb22fb40-f168-4d91-abed-3152d1e821ee>
CC-MAIN-2022-33
https://www.newsanyway.com/2022/02/07/celebrating-more-music-programmes-in-our-schools-across-barnsley/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00068.warc.gz
en
0.960709
414
1.820313
2
Clinical Herbalist Reviewed on April 15, 2009 by Paulina Nelega, RH Posted in Dogs During the springtime, most people attempt to lose the pounds they gained during the winter for a sleeker body for the summer time. This should stand true for your pets as well, particularly dogs who have remained inside the house during most of the winter. A recent study that was done by the Association of Pet Obesity Prevention stated that 45 percent of dogs are overweight, including 9 percent that are truly obese, according to Ernie Ward, DVM, and president of the association. Exercising with your dog will not only help the both of you to lose weight, but it will also help to improve your relationship as well. By spending such quality time with your dog you both will benefit from the emotional and physical aspects of exercising together. One of the easiest ways for you and your dog to lose weight is by walking, but not just a leisurely stroll. In order to get the maximum benefit of walking, you will need to learn to differentiate between walking for pleasure and walking for fitness. Dr Ward explains it this way: “When people take their dogs out for social walks, we find they typically do about an 18-22 minute per mile pace. That is slower than you can walk because you’re stopping. The dog is checking the urine from another dog. A twig gets his attention. Walking for weight loss is different. We really need to get them into that aerobic heart rate zone. We don’t really tell people to measure heart rates on their dog, but we can tell them if it’s anything more than a 15-a-minute-per-mile pace, they’re probably not walking (for weight loss). A 15-minute-per-mile walk for a person feels like a good, brisk, steady walk.” Dr Ward also stated that dogs should be taught that the first half of a walk should be focused on exercising and the second half will then be for the dog to explore the different sights and sounds that he see and smells on the way back home. “If people would start to train their dogs this way, they will find the dog will get very focused,” Dr Ward said, “They will get out there and briskly walk, and they will know when it’s time to turn around. And when they turn around, they start to head back to the house, they start to check all those interesting smells and sights and sounds.” Before heading out the door with your dog for a walk, consider the following points first: * Make sure that both you and your dog have the correct walking gear. Instead of using your dog’s regular collar and leash, which can compress the windpipe when pulled and cause difficulty breathing or even injury, use a walking harness that has wide, soft, padded straps and is made of breathable materials. A retractable leash that is about 12 feet is perfect to keep your dog close by to maintain a steady walking pace. *In conjunction with the walking harness, a head halter is also another great way to train your dog to heel during an invigorating walk and to pay attention to your commands. *Consider the season: during the colder, winter months make sure that your dog is wearing the correct size and fit of winter booties; during the warmer, summer months where the temperatures lie between 80 to 85 degrees, or even on walks that last longer than 30 minutes, make sure that you always bring a bottle of clean, cool water for both you and your dog to drink. Proper hydration is very important. *Whilst walking, keep your dog close by your side, at least two to four feet on the side away from the street, and be sure to start at a pace that you feel that you and your dog can comfortably maintain. The perfect walk should be brisk and should cause you to break out into a light perspiration. *Keep up the pace. Do not let your dog become intrigued with something on the ground. Be persistent with your dog and keep a tight rein on his leash, but never jerk it! Give your dog a strong command such as ‘No’ or ‘Come’ to keep his attention focused on the walk itself. *Start your walking regimen slowly and try to eventually build up to walking at least 30 minutes per day. *Weigh your dog on a monthly basis to make sure that he is not losing too much or too little. *After every walk, check your dog’s paw pads and nails. Sometimes they can become ripped or torn whilst walking over gravel or twigs. Be sure to have some Heal Care Ointment on hand to apply to your dog’s paw pads to relieve any pain and discomfort they may have. You do not want your dog to associate your walks together with pain of any sort as that will prevent him from wanting to go out and walk with you again. *Keep in mind that exercising is a very important part of a dog’s behavior training. Well exercised dogs are happy, albeit tired, dogs. *Before you start a walking program with your dog, take him to your vet first for a physical examination. Talk with your vet about your dog’s current weight, his weight loss goal and whether brisk walking would be a good fit for your dog or not. Some breeds of dogs are not able to walk briskly and doing so could cause more damage to the dog’s lifestyle. *Finally, remember to pick up after your dog and be observant of other doggie rules, especially if you are taking your dog for a walk around a public park. Phot Credit: exfordy Sign up for our newsletter and receive more articles and the latest pet health updates and special offers. Janice Huntingford, DVM, has been in veterinary practice for over 30 years and has founded two veterinary clinics since receiving her Doctor of Veterinary Medicine at the Ontario Veterinary College, University of Guelph. She has studied extensively in both conventional and holistic modalities. Ask Dr. Jan
<urn:uuid:394283d7-ccc3-40a5-bceb-d5a0640bbcb3>
CC-MAIN-2017-04
http://www.petwellbeing.com/blog/general-pet-blog/doggie-fitness
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00289-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964705
1,271
2.46875
2
EMARGENCY RESPONSE FUND Since 2017, Canada Zakat has helped to support over 150 individuals and families with emergency Zakat Assistance. These typically include smaller one-time payments ranging from a few hundred dollars to a couple of thousand dollars each, depending on the nature of the applicants’ needs. Canada Zakat also comes across individuals and families in dire need who require a larger amount of financial assistance, under $10,000, or those who require assistance in smaller instalments spread over a period of time. Help support Canada Zakat’s Emergency Response Fund Campaign and help us raise $200,000 to support between 20-30 such families before next Ramadan! PN: This project is eligible for both your Zakat, Sadaqa and other monetary donation types. Canada Zakat is a project of DawaNet Canada. DawaNet is a federally registered Canadian not- for-profit organization that is focused on community service, education and bridge building. DawaNet currently does not have charitable status and therefore cannot issue charitable donation receipts for tax purposes.
<urn:uuid:ce9fb1ce-a536-44c0-bea5-22015afac07e>
CC-MAIN-2022-33
https://canadazakat.org/emergencyresponsefund/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00472.warc.gz
en
0.946919
221
1.609375
2
A long tradition of community newspapers in Yancey County Burnsville's first newspaper published in 1896 by Lyon and Lewis It was in April, 1896, the year that William Jennings Bryan captured the Democratic National Convention and was nominated to make his first race for the presidency, that Burnsville's first newspaper began publication. The publication of the first issue of the Black Mountain Eagle began what was to be a 40-year newspaper partnership between brothers-in-law, J.M. Lyon and O.R. Lewis. Lewis, the publisher, was born in Tennessee. At the age of 12 he moved to Texas, and shortly after that, his father, a doctor, decided to return to his boyhood home in Yancey County to practice medicine. Lewis married the former Margaret Ray and they had three sons and two daughters. J.M. Lyon, who edited the Eagle, was born in Tennessee in 1861. In 1884, he married Mary Lewis, eldest sister of O.R. Lewis. They had three sons and three daughters. Lyon inherited the talents of his grandfather and father, who spent many years in the newspaper business. The publication of the Black Mountain Eagle was made possible by the subscriptions of a number of stockholders who felt the need for a county newspaper. They advanced the cash to purchase the material, which consisted of a Washington Hand Press and 200 pounds of type. The stockholders were to receive the paper for one year for each dollar subscribed. Subscribers included J.W. Higgins, G.D. Ray, E.I. Watson, J.E. Evans, I.E. Briggs, S.G. Byrd, M.C. Honeycutt, J.S. Huskins, J.A. Higgins and others. Joseph A. Higgins hauled the press and material from Asheville to Burnsville. It required four days for him to make the trip with wagon and four-horse team. The name of the paper was changed to The Burnsville Eagle at one time, but for 40 years, neither the ownership nor the names of the editor and publisher ever changed. However, around 1914, during Lyon's absence, Charles Ray assisted Lewis in the publication of the paper. Around 1916, the old worn-out press and type were discarded and new material was installed. The presses were operated electrically, but the composition was done by hand. In 1935, Lewis and Lyon retired and sold the weekly Burnsville Eagle to S.T. Henry of Spruce Pine who combined it with the Tri-County News. A group of Burnsville citizens felt that Yancey County should have its own newspaper. So, in 1937 the four established The Yancey Record. They were Mrs. C.R. Hamrick, Dover Fouts, Clyde Bailey and B.R. Penland. Mrs. Hamrick served as editor. These four published the newspaper until 1950 when it was sold to Arney and Trena Fox of Burnsville. Archie Ballew printed the newspaper. Arney and Trena published The Yancey Record until March of 1969 when they sold it to Edward and Carolyn Yuziuk who moved to Burnsville from Florida where Ed worked for the Miami Herald. In April of 1972, they changed the name of the newspaper to The Yancey Journal after a legal conflict with a newspaper chain that had bought a controlling interest. Ed took the matter to court and won back full ownership. In 1985, the Yuziuks sold the newspaper to the J. Ardell Sink family. In the late 1980s, they sold the Yancey Journal to Trib Publications, a Georgia-based newspaper chain. In 1990, Jody Higgins started the Yancey County Common Times, and was joined in the operation by Pat Randolph and Anna Webb, long-time employees of the Yuziuks. In 1995, the Common Times and the Yancey Journal merged, with Higgins, Randolph and Webb sharing ownership and running the paper with Trib Publications. The Yancey County Common Times Journal, or Times Journal as it is known, has been serving the community since 1990. Pictured is Burnsville Eagle publisher O.R. Lewis in 1928. Lewis and partner J.M. Lyon published the Yancey County newspaper, first as the Black Mountain Eagle and later changed the name to the Burnsville Eagle.
<urn:uuid:9c3cc645-3c07-4b99-bd01-58c8587879ed>
CC-MAIN-2017-04
http://yanceytimesjournal.com/index.php?option=com_k2&view=item&layout=item&id=5&Itemid=6
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00396-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977672
905
2.296875
2
VFFC's Heart of Vermont Agriculture development project will address the region's need for agricultural infrastructure to support local farmers and value added food businesses to reach larger markets and innovate new products. We will construct a new facility for centralized aggregation, storage, and distribution, as well as rehabilitate an existing historic structure for commercial kitchen space and processing facility for culinary education and value added food products. The project will turn VFFC into a truly regional food hub while providing more business opportunities and jobs for the Rutland area. We will construct a Produce Packing Center and Commercial Kitchen on our 2.93 acre campus, at 251 West Street in Rutland, Vermont. Located on a former industrial site with four existing buildings, these two facilities will form the Heart of Vermont Agriculture Food Hub within an Opportunity Zone adjacent to downtown Rutland. Our Food Hub’s goal over the next five years is to help over 50 farm business and local food entrepreneurs generate $2 million dollars in annual sales by increasing profit margins and/or decreasing per unit costs and prepare 25 students for the culinary job market. Other site facilities: Farmers Hall, approximately 15,000 square feet, includes a large multi-use event space, which hosts the Rutland Winter Farmers Market and which can seat 500 individuals and 1,100 individuals standing; a Community Learning Kitchen, available not only for VFFC's Farmacy and other cooking classes, but also for events which take place in the Hall. Rotary Educational Greenhouse, home to our FABEL and other hands-on gardening programs.
<urn:uuid:bce2d5ad-6a67-48c7-8435-215c7828f0af>
CC-MAIN-2022-33
https://www.vermontfarmersfoodcenter.org/campus
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00473.warc.gz
en
0.922231
319
1.585938
2
As individuals, we believe every human being working in the film industry has a right to enjoy a life outside of their work, including family, friendships and sleep. As managers, we believe that while occasional long days can be an acceptable part of our work, repeated excessive shifts and frequent insufficient turnarounds are not. As crafts-people and technicians, it is our responsibility to initiate discussions about these concerns and to look out for the well-being of everyone on our sets. As human beings, we believe that every person’s health, safety and life is worth more than any product we can produce while jeopardizing same. As an organization, our responsibilities include developing and disbursing educational materials to promote these basic rules of humane and responsible filmmaking. #1 No more than 12 hours of Work #2 No less than 12 hours of Turnaround #3 No more than 6 hours between Meals A 12on12off hat can be ordered A victory for 12on12off, crew members, and all those who have been fighting to have the industry-wide health and safety issue of chronic long hours officially acknowledged --- the Long Hours Resolution was adopted by the 67th Quadrennial IATSE Convention, the 805 delegates in attendance passed the resolution unanimously. Purchasing a 12on12off HAT to wear on the set will be an effective reminder for this call to action that the resolution represents. We need to keep our Union accountable and committed to a solution. The complete resolution can be read in the 12on12off BLOG JOIN us on facebook
<urn:uuid:dd931cc5-466b-4344-8dc3-619ac39af5e5>
CC-MAIN-2017-04
http://12on12off.weebly.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00495-ip-10-171-10-70.ec2.internal.warc.gz
en
0.924647
329
1.523438
2
Raj Batra, president of industry automation division for Siemens Industry Inc., says the new Simatic CP and Scalance communications processor products with firewall and virtual private network (VPN) features help ratchet up security. But he also warns that there's no "silver bullet" to today's threats. "The introduction of our new Simatic CP and Scalance products only help to bolster Siemens' industrial security portfolio, but as we stress to our customers, there is no silver bullet to cybersecurity threats," Batra says. "Maintaining security is an ongoing process for plants and enterprises requiring collaboration at all levels." Since Stuxnet, Siemens has been hammered by various security researchers who have poked numerous holes in the manufacturer's products, forcing Siemens to find security religion in a staid industry where air gaps traditionally were assumed enough to protect critical infrastructure. Stuxnet effectively burst that bubble of air gap protection for good, and Siemens has spent the past two years scrambling to shore up security in its products. "During the past two years, Siemens has made several strategic decisions that have been well-received by both internal and external audiences, including developing new industrial security products and solutions, providing software updates incorporating security enhancements, increasing our communication and collaboration with key partners, including ICS-CERT and other government agencies, as well as the research community," Siemens' Batra says. "We have also developed consultative services to support our customers throughout the life cycle of their products or projects." [ A look back at one of the industry's most complex attacks -- and the lessons it teaches. See Stuxnet: How It Happened And How Your Enterprise Can Avoid Similar Attacks. ] One of Siemens' first public moves post-Stuxnet was to send a representative to Black Hat USA last summer to respond at a session exposing embarrassingly simple holes in its programmable logic controllers (PLCs). Researcher Dillon Beresford demonstrated how a backdoor in Siemens S7-300, S7-400, and S7-1200 devices allowed him to get inside and capture passwords and reprogram PLC logic in such a way that he could shut down the systems altogether or cause them to eventually crash. He staged a live demonstration of how he could control the Siemens devices, which are used in power and manufacturing plants worldwide. Siemens' Thomas Brandstetter, then-acting head of Siemens Product CERT, took the stage at the Black Hat session briefly with Beresford to confirm that Siemens was working on fixing the flaws in its devices. He later said that Siemens had created its CERT eight months before (which was just after Stuxnet) to handle vulnerabilities in its products and to work more closely with the security community. Since then, Siemens has joined the Software Assurance Forum for Excellence in Code (SAFECode), with the head of its software initiatives Frances Paulisch now a member of SAFECode's board. SAFECode is an industry-led group that promotes best practices in software development and services. Siemens also has been accredited to test its products for Wurldtech's Achilles Communication Certification, a benchmark for security of critical infrastructure products. But it was Siemens' press release late last month announcing new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 processors -- which now contain a firewall and VPN feature and better secure connections to the Simatic S7-300 and S7-400 controller series -- that caught the attention of SCADA security experts. Still unclear, however, is exactly how the new security features are applicable to the Siemens products that Stuxnet targeted, the Simatic WinCC and PCS 7 systems. The new security features address secure remote access to process controllers, as well. "The Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 Advanced communications processors with extended functional scope enable connection to the S7-300 or S7-400 controllers via VPN. It is also possible to define more detailed security settings and access rights via the integrated firewall. Through this function, the communications processors secure access across the entire plant network. The integrated switch also supports secure connection of the lower-level controllers and HMI and I/O devices," according to the Siemens product announcement. SCADA experts say the new products are a start, but whether it would stop a Stuxnet-type attack is debatable. "Siemens officially announced a firewall and VPN solution that should prevent the Stuxnet attack on the S7 PLC ... The obvious question is why didn't Siemens offer a similar capability as a firmware upgrade to the currently deployed systems?" wrote Dale Peterson, founder and CEO of Digital Bond, a SCADA consultancy, in a blog post. Peterson says the new communications processor for the S7 300 and S7 400 PLCs with firewall and VPN "should prevent an attacker with logical access to the PLC network from uploading rogue ladder logic a la Stuxnet," and the new Simatic NET CP 1628 module for HMI with the firewall and VPN also appears to be able to communicate with S7 PLCs. Another industry expert who asked not to be named says Siemens' announcements are "baby steps," and that these new features would not have stopped Stuxnet. The other challenge is the long life cycle of SCADA systems, he says. "The next-generation secure controller is going to take a long time before customers move and migrate to a more secure platform," he says. Neil McDonnell, CEO of WurldTech, says Stuxnet was a wake-up call for all process control vendors -- not just Siemens. "All manufacturers are vulnerable. The approach Siemens has taken and will continue to take is a journey, which is great, starting to build more and better protection into all of their systems and their process control products," McDonnell says. "[Security] is becoming more front and center for them. But that's not to say they didn't do anything before. They've taken the next step in moving it along." Siemens did not elaborate further on its new products beyond the press release, which also announced a new secure router. "The router is ideal for secure communication to and from distributed automation cells via VPN, such as the supply stations of a water utility company or mobile plants that have to be centrally monitored or controlled remotely from a control center," according to Siemens' announcement. Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
<urn:uuid:e5a7b429-9d7d-4929-9ec0-45ec5797df87>
CC-MAIN-2022-33
https://www.darkreading.com/vulnerabilities-threats/siemens-enhances-security-in-post-stuxnet-scada-world
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00478.warc.gz
en
0.956091
1,369
1.617188
2
Privacy Impact Assessment Philadelphia/Camden High Intensity Drug Trafficking Area (P/C HIDTA) Computerized Search Request System June 18, 2004 The FBI's Philadelphia Field Office is developing a computerized system for receiving routine search requests from law enforcement agencies for FBI criminal justice information and for reporting the results back to the inquiring agency. The database will be housed on the Philadelphia/Camden High Intensity Drug Trafficking Area (P/C HIDTA) computer network and will be available to all agencies participating in the P/C HIDTA. In order to make a search request, an agency will complete and submit a search request form. The request will include information about the requesting officer such as name, telephone number, unit/squad, and employing agency. The officer will then include certain search criteria, such as the name of the subject, organization, address, phone numbers, e-mail, date of birth, social security account number, and other personal identifiers that will facilitate a search of FBI records. The request form also includes a "justification" field in which the officer describes exactly what information is being requested and why. The users and purpose of the database are limited to State, local, and Federal agencies engaged in criminal justice for law enforcement purposes. FBI employees (Information Research Coordinators or IRCs) will have automated access to the search requests and will be responsible for searching FBI records for responsive records. Responses will be forwarded to the requesting agency in paper format. In addition, certain information duplicative of the information in the paper response may also be posted in the database and accessible by the requesting agency. Each participating agency will be provided with a password, with which it can access its own information in the database regarding requests and responses. An agency other than the FBI cannot view the information submitted by or provided to another agency. Philadelphia anticipates that the incoming search requests and responses will be maintained in the database for at least one year so that they may be continually compared against other FBI systems, allowing continual ready reference to the data. A. What information is being collected? This database consists of two major sections: "Search Request" and "Search Results." The Search Request section is used to make the original search request and is completed by the requesting investigator using the best information available. The Search Results section is used by the FBI IRC who performs the search and reports the findings. The data appearing in this section are not a new collection but merely derivative from information already found in existing FBI files by the IRC. Occasionally an IRC's findings will produce results that are different from the original search criteria; for example, a name may be spelled differently in FBI files from that requested by an investigator. Although the original request is preserved as it was received, the data reported by the IRC in the search results may be different from the original request. These differences are explained in the response by the IRC. The process begins as the investigator completes the Search Request form. This form is in two parts: the first part records some required preliminary information, which identifies the investigator and the authorized law enforcement agency. The second part contains the fields which make up the criteria for the search. These fields must be sufficiently detailed to identify the subject of the search, and justify the release of confidential information. Time and date of request. Requesting agency: The drop-down menu provides a list of authorized requesting agencies. Unit/Squad: This is the unit or squad to which the investigator is assigned (i.e., Homicide, Narcotics Bureau, etc.) Telephone number of the investigator. Requesters's file number. HIDTA file number assigned by the HIDTA for requests made through the Watch Center. Requests made from agency terminals will leave this field blank. Search Criteria (Every search benefits from having as many known values entered as possible.) Name: For an individual, this is first name, middle name or initial, and last name; additional nicknames and aliases may be entered into the free text section called "Specific Information Requested/Justification" described below. License tag number. SSAN-Social Security Account Number. Date of birth. SID-State Identification Number. PPD/ID: This is the Philadelphia Police individual identification number also known as the photo number. Other ID number: This is any other number not described above (with a short description). Specific information requested/justification: This is a free text field used by the requester to describe exactly what information is being sought and why. The FBI may by law disseminate information from its files for legitimate purposes to qualified law enforcement agencies. This field serves to satisfy the "legitimacy" requirement imposed on the FBI by Federal law. Multiple requests may be entered for the same investigative file without repeating the Preliminary Information above. IRCs assigned to search incoming requests will query FBI systems based upon the search criteria provided to them. The IRC's will be responsible for searching FBI systems, determining whether references are identical or not identifiable, securing the permission of the substantive FBI desk for dissemination, and preparing a document for dissemination and a disclosure-accounting form. Search results are reported in the same fields as appear in the request. Additional data resulting from the search, which logically can be placed into structured fields, is done by the analyst. These are the same structured fields that appear in the "Search Request" This enables a particular search to be located, or to be electronically compared with other databases. The IRC uses a free text field to summarize findings and report conclusions. (In some case this field may contain reference to an FBI document that is disseminated by separate communication.) Copies of relevant file documents will be provided by IRC's to substantive squad supervisors for review with all references highlighted. If necessary, supervisors will redact sensitive information from these copies, which will be retained to substantiate both supervisory review and the information authorized for dissemination. Redacted copies of documents may be disseminated to the requesting agency, or in the case of lengthy documents, may be summarized in the Search Results section of the database. In either case a letter will be prepared by the IRC to the requesting agency. This letter will reference the request and an enclosed redacted document, or a report from the Search Request database summarizing the information. In the case of references contained in documents classified higher than Law Enforcement Sensitive, information can still be disseminated to the requesting agency under separate cover at the discretion of the FBI in accordance with established procedures for such disseminations. B. Why is the information being collected? Information sharing works best when it is supported by a system that is both simple to use and provides timely disseminations to those who need them. The "FBI Search Request"database is an important component of this system. It provides a continuous connection between Information Research Coordinators (IRCs) who perform FBI file searches, and investigators who make requests. It relies on data fields frequently used by all law enforcement to uniquely identify the subject of the search. These same fields are also used to track both the request and the information disseminated as required by Federal law. C. What is the intended use of the information? The names of requesting individuals and their agencies will be retained in order to maintain a trail of who asked for information, what they received, and by what authority. To the extent not otherwise present in FBI case files, the information on subjects queried will augment information available to the FBI on persons already under FBI investigation and provide leads regarding subjects not already under FBI investigation. D. With whom will the information be shared? This database will be lodged on the Philadelphia/Camden High Intensity Drug Trafficking Area (P/C HIDTA) computer network and be available only to Federal, State, and local law enforcement agencies participating in the P/C HIDTA. Initially, search requests will be facilitated by the P/C HIDTA Watch Center. After an initial assessment, those agencies or police units most frequently using the system will be provided direct access to the database. These expanded connections will not change the way FBI IRCs view or receive the data. Sole control of dissemination will remain with the FBI. Only the requester, through the use of a confidential code, will be able to view his/her own original request and the search results provided. E. What opportunities will individuals have to decline to provide information or to consent to particular uses of the information? There are no opportunities for subjects to decline or consent to particular uses of information. Requesters have the opportunity to decide whether or not to query the database, F. How will the information be secured? Sole control of dissemination will remain with the FBI. The requester will be provided a confidential code for use in viewing the original request and the search results. G. Is this a system of records? Yes, but to the extent that it may be considered to be an FBI system, it is covered under an existing FBI system of records notice. The data collected in the system includes identifiable personal information about individuals and, therefore, are Privacy Act records. The data will be retrieved by personal identifier, such as name; therefore, the information collected in the system qualifies as a Privacy Act system of records. However, the database will reside on the P/C HIDTA computer network. This raises issues of ownership of the system/data. Philadelphia should coordinate with the P/C HIDTA to resolve ownership of the system/data with regard to Privacy Act system of records responsibilities. To the extent this database is to be treated as an FBI Privacy Act system of records, the FBI's established Central Records System (CRS, Justice/FBI-002) already provides the requisite public notice for such case-support databases. Philadelphia can readily bring the proposed system under CRS coverage by either serializing/indexing all requests and responses, or by providing written notice to the Field Privacy Control Officer so that any incoming Freedom of Information Act (FOIA) or Privacy Act requests can be appropriately addressed. The Privacy Act requires that agencies keep an accounting of each external disclosure from a system of records for five years or the life of the record whichever is longer. Program management responsible for the system must thus ensure that a viable means exists to provide the requisite accounting for any covered disseminations made from the database. The Privacy Act accords the FBI considerable flexibility on how to structure such accountings. The necessary information need not all be collated within any particular file, so long as the FBI can construct a document with the requisite accounting information if called upon to do so. Use and retention of FBI/DOJ Form FD‑159 (Record of Information Furnished Other Agencies) would provide such an accounting. Generally speaking, the database is automating a function that is currently done manually, either by phone call or letter. While the retention of search requests for automated querying against other FBI systems may be a new function, it is something that is already being done in the manual environment, albeit not as efficiently. The added efficiency is not such as to raise any significant privacy issues. In addition, the system does not appear to involve any new collection techniques or processes that may be controversial or invasive of personal privacy. The dissemination of the information is limited to legitimate law enforcement purposes in compliance with allowable disclosures for information contained in FBI systems of records. Based on the foregoing, the FBI Senior Privacy Official has determined that the proposed database presents no noteworthy privacy concerns and approves the system. The database involves limited use and access; as such, OMB guidance does not require the more extensive PIA analysis that must accompany the development of major information systems. A new Privacy Act system notice is not required. Completion of a full PIA and referral to the FBI Privacy Council also are not required. 5 U.S.C. § 552a(a)(4) defines a "record" as any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph. A "system of records" means a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual. 5 U.S.C. § 552a(a)(5). 5 U.S.C. § 552a(c). The accounting must include the date, nature, and purpose of each disclosure of a record to any person or to another agency, and the name and address of the person or agency to whom the disclosure is made.
<urn:uuid:76ffcaef-af4c-46af-b372-2fcce2f37411>
CC-MAIN-2017-04
https://www.fbi.gov/services/records-management/foipa/privacy-impact-assessments/high-intensity-drug-trafficking
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00067-ip-10-171-10-70.ec2.internal.warc.gz
en
0.918805
2,634
1.53125
2
The NHS England National Prevent Sub Group is a multi-disciplinary team made up of nursing, safeguarding, security management, emergency preparedness and management specialists. The group was established to work together on the latest chapter of our safeguard duties that protect vulnerable individuals from being groomed in to terrorist activity or supporting terrorism. What we do The group provides national leadership to support healthcare organisations implement their contribution to the Government’s Prevent strategy and in doing so fulfil their statutory duties to prevent vulnerable individuals being exploited by criminals. The team meet regularly to interpret national guidance and directives to ensure the Prevent programme is delivered consistently, proportionately and appropriately to across the health sector. The aims of the group include: - Adopting a shared learning approach, creating a repository for national best practice to be shared and arranging national learning events. - Developing mechanisms to assure NHS England that the health sector contribution to HM Government Prevent Strategy is being realised. - Identifying and developing a national leadership network for Prevent. - Reporting to and making recommendations to the National Safeguarding Steering Group – Chaired by Hilary Garratt (Director of Nursing – Commissioning and Health Improvement). The NPSG feeds in to the NSSG and uses members from each region to allow the flow of information to and from CCGs, NHS Trusts, NHS Foundation Trusts to ensure they are able to identify and appropriately support children and adults who may be vulnerable to radicalisation. Later in 2015/16 this will extend to private and voluntary sector organisations working with those most at risk of radicalisation. Regional Prevent Coordinators (RPCs) are appointed from Home Office funding to support the operational delivery of Prevent in healthcare organisations commissioned in priority areas across England. The group helps partner agencies understand the health sector contribution to the Prevent strategy and strengthen partnership arrangements by developing the knowledge of our Prevent Lead network. The group also supports healthcare organisations to understand their statutory or contractual obligations to implement Prevent and provide them with advice and tools to support their delivery that ensures consistent and relevant messages are relayed to staff. The group is committed to helping healthcare staff understand their role in noticing individuals who may be at risk of radicalisation, and advise them on how best to share their concerns with their organisations. To date the group has successfully: - Formed a network of Prevent Leads in all NHS commissioning and provider organisations across England. - Formed a network of WRAP Facilitators to enable delivery of Workshops to Raise Awareness of Prevent (WRAP), and enable experienced WRAP Facilitators support the development and experience of new WRAP Facilitators. - Supported the Home Office delivery of events to consult specified authorities to develop legislation to ensure public sector organisations take necessary action to prevent individuals they work with from being groomed in to terrorist related activity. - Supported the Home Office delivery of events to raise awareness of Prevent related statutory duties that came in to effect on 1 July 2015. - Provided support to CCGs and NHS Trusts/FTs regarding the requirements to implement their statutory duties pertaining to Prevent and Channel, and support them with guidance. - Facilitated healthcare representation on multi-agency panels (Channel Panels) established to assess if individuals are at risk of being groomed in to terrorist activity. - Disseminated communications that allow organisations to raise general awareness of Prevent amongst the workforce and a Prevent Policy template organisations can work with rather than start afresh. The group hopes to establish relations with the European Union Radicalisation Awareness Network to facilitate the flow of international data for research and development to improve UK Prevent delivery and training. Due to an increasing number of FOI requests relating to the Prevent Programme, the Department of Health, Home Office and NHS England have established guidance to assist you in determining how your organisation should respond to Prevent FOI requests. If you receive an FOI that you require further advice on please contact Chris Whitehill, FOI Manager, NHS England: 07876 851749, firstname.lastname@example.org. The recent terrorist attacks in Europe are a reminder of the continued threat that we face from terrorism and the important role that individuals and organisations play in helping to keep the country safe. The purpose of this letter is to seek CCG support for the Government’s Prevent programme by ensuring that your NHS mental health providers fully engage with the Channel process and are represented on Channel panels.
<urn:uuid:708e92b7-6098-41b8-926f-6d04a66c564a>
CC-MAIN-2016-44
https://www.england.nhs.uk/ourwork/safeguarding/our-work/prevent/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00128-ip-10-171-6-4.ec2.internal.warc.gz
en
0.926361
905
1.742188
2
Bitcoin is a new form of money that is the first decentralized e-currency not controlled by a single organization or government; all operations are made on the basis of Peer-To-Peer technology (P2P). It is backed by the capitalist law of supply and demand and is the open source software that ensures its consistency. Launched in 2009, Bitcoin is one of the most popular payment methods among high-yield investment programs (HYIPs). Unlike standard e-currency Bitcoin system has no bodies of control, respectively, the instability is minimal. The issue of new title Bitcoin characters is limited (total number of bitcoins is capped at 21 million), programmed and known to all the participants in the system. As Bitcoin system is based on the principle of the limited total number of coins, the currency is subjected to the deflationary process. This predictable deflation stimulates using Bitcoin accumulation for speculations. This should be considered when you are going to exchange Bitcoin to USD or any local currency. Bitcoin’s high cryptographic security allows processing transactions in a very efficient and inexpensive way. You can make and receive payments using the Bitcoin network with almost no fees. In most cases, fees are not strictly required but they are recommended for faster confirmation of your transaction. International wire transfers takes from a few days to more than a week, whereas Bitcoin transactions are generally confirmed within an hour. Bitcoin is the only payment method that is 100% irreversible and cannot be charged back. For this reason you should be careful when sending Bitcoins; be sure that you are sending them to a trusted vendor. All financial and technical data related to the Bitcoin network can be found in a Bitcoin charts. Deposit and Withdrawal methods Deposit methods: Coinabase (a Bitcoin wallet with the option of buying or selling bitcoins using a US bank account), Bitcoin exchange markets, Bitcoin exchanges, International Wire Transfer, Bank wire, other e-currencies, Bitcoin debit cards, Bitcoin POS-terminals, Bitcoin mining, Bitcoin faucet. Withdrawal methods: Coinabase, Bitcoin markets, Bitcoin exchanges, Bank wire, Wire Transfer, Visa/MasterCard cards, other e-currencies, Bitcoin debit cards, Bitcoin-ATMs. - No third-party seizure - Zero or low fees - Fast international payments; - No Risk of “Charge-backs” - Аccounting transparency - High-level user’s account security; - Protection against fraud - Bitcoins are not widely accepted - Bitcoin valuation fluctuates - Built in deflation
<urn:uuid:40284513-d3b7-41aa-a152-f459a6ec31e6>
CC-MAIN-2017-04
http://hyip.com/2016/05/20/loop-bitcoin-hyip-payment-method/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00056-ip-10-171-10-70.ec2.internal.warc.gz
en
0.910247
524
2.390625
2
Mounting Windows SMB File Shares Using Cifs Posted by ryan in linux In the world of linux and Samba File Shares, there are essentially two ways to mount your SMB shares. Of course, you can always access your shares via the Places->Network dialog, where you can go to town looking through your shared drives. Of course, this has some major downfalls. Primarily, most applications don't recognize the network folders as legitimately mounted disks (because they're not). In other words, try opening up a shared music file in Audacious (or your favorite music player). Did it work? Well, if you're more clever than me, perhaps. The true way to handle your shared files is by mounting them. Then we'll have a legitimately mounted drive, with which we can do whatever we want. Like I said, there are two ways to mount your filesystem. The first is the original smbfs, and the latter is the newer and more preferred method of cifs. While I originally used smbfs (it made sense, its name looks just like what I'm trying to mount), today (Nov 16, 2007), when I did the ubuntu system update, everything went crazy. All of a sudden, my smbfs mounted drives ground to a halt - each request took about 1-2 minutes to fulfill. I could still browse the files quickly through Places->Network, but my smbfs shares were crawling. But then I remembered that there's an alternative, and now that I have it up and running, I can say that it's quite easy and quite fast. Here's what you do: Firs, we need to install cifs, which comes right alongside smbfs. If you have smbfs, then you have cifs. If you don't, open up a terminal and get it: sudo apt-get install smbfs Next, all mounted drives need to mount to some folder on your local drive. I prefer to mount mine in the /media folder, which makes sense, as your cdrom is mounted there along with other drives, including things like external and thumb drives. Type the following, replacing my_share with whatever folder name you want your share to be (this doesn't matter at all, it can be called anything and go anywhere). sudo mkdir /mount/my_share Now, while we're going to perform some permanent mounts later (so that the disk mounts after a restart), let's start with a manual mount. sudo mount -t cifs //192.168.1.102/share_name /media/my_share -o username=theuser,password=thepass,iocharset=utf8,file_mode=0777,dir_mode=0777 Let me explain. The mount -t cifs command simply instructs the system to mount the following parameters via cifs. The next argument: //192.168.1.102/share_name consists of 2 parts. The first is the ip address of the computer with the shares. This can also be "net bios name", but since that was giving me a headache, I simply used the ip address. The second part: share_name is the name of the share on the hosting computer. Under Places->Network, you should see the computer that you are trying to connect to. If you double click into that computer, you will see (you may have multiple) the name of the share (something like my-external-drive perhaps). Use that value in place of share_name. The next part of the command: /media/my_share is that directory that we created earlier. After the mount is successful, the contents of the share will be accessible via this directory. Finally, everything that comes after the -o are the options. First, we have the username and password. These should be set to the username and password of the windows computer to which you are trying to connect. For me, my "windows" computer was a windows computer at all, but rather an ubuntu server (we have many types of computers needing to connect to it). In this case, I used the username and password of my ubuntu use. Exact same idea. The things after that shouldn't need modification. They set the charset to utf8 (so that we're nice to foreign character sets), and make the mount read/write. Now, if it worked, you should see your mount right on the desktop. Browse through it, play music from it, watch movies from it (network speed permitting). Here are some common errors: - mount error: can not change directory into mount target... - either you didn't create your /media/my_share directory or specified it wrong in your mount command. - mount error 13 = Permission denied - your username and password are being rejected. Try some other combinations - mount error 6 = No such device or address - the share_name that you specified in your mount command is not being found on the host computer. Browse the network, find that computer, and check to make sure you see the exact share name. We now have proof of concept, but we want the drive to mount automatically on restart. First, let's unmount the drive so that we can test our remounting of it later. The following should do it. sudo umount //192.168.1.102/share_name The share should've disappeared from your desktop. Important, we will use the /etc/fstab file to mount the share by inserting a similar command as above into that file. This file can be read by anyone on your computer, which would mean that anyone could read the username and password you specify for you mount. If you don't care (come on guys, care a little), then simply do the following: sudo nano /etc/fstab ...and add the following to the bottom, updating as necessary: //192.168.1.102/share_name /media/my_share cifs username=theuser,password=thepass,iocharset=utf8,file_mode=0777,dir_mode=0777 0 0 For the rest of us who desire a little more security, the following is the clever way of hiding the username and password. sudo nano /root/.smbcredentials and enter in the file: username=theuser password=thepass Now, let's make sure only root can read this file: sudo chmod 700 /root/.smbcredentials Now, we simply need to replace the username and password portion of the fstab file with a handly credential option. sudo nano /etc/fstab and make your mount command look like this: //192.168.1.102/share_name /media/my_share cifs credentials=/root/.smbcredentials,iocharset=utf8,file_mode=0777,dir_mode=0777 0 0 And we're done. You can now either restart to test, or simple run the following command, which remounts all the drives in the /etc/fstab file that are not currently mounted (very handy): sudo mount -a If you saw your share pop up on the desktop, then you're done. Your brand new cifs file share will mount each time you boot up your computer.
<urn:uuid:9627b310-0309-45b2-98d5-f0db71502d52>
CC-MAIN-2016-44
http://www.thatsquality.com/articles/mounting-windows-smb-file-shares-using-cifs
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00281-ip-10-171-6-4.ec2.internal.warc.gz
en
0.936513
1,551
1.8125
2
The U.S. Environmental Protection Agency (EPA) sent out a press release recently noting that it waived a limitation on selling fuel that is more than 10 percent ethanol for model year 2007 and newer cars and light trucks.This will allow fuel that contains up to 15 percent ehtanol (or E15) for most newer vehicles. The waiving of this limitation signals the first of a number of actions that are needed to move toward commercializing E15 gasoline blends. According to the release, EPA Administrator Lisa P. Jackson made the decision after a review of the Department of Energy’s (DOE) extensive testing and other available data on E15’s impact on engine durability and emissions. “Thorough testing has now shown that E15 does not harm emissions control equipment in newer cars and light trucks,” said EPA Administrator Lisa P. Jackson. “Wherever sound science and the law support steps to allow more home-grown fuels in America’s vehicles, this administration takes those steps.” A decision on the use of E15 in model year 2001 to 2006 vehicles will be made after testing sometime around this November. At this time, no waiver is being granted this year for E15 use in model year 2000 and older cars and light trucks or in any motorcycles, heavy-duty vehicles, or non-road engines. The EPA says that since 1979, up to 10 percent ethanol or E10 has been used for all conventional cars and light trucks, and non-road vehicles. The EPA notes that everal steps are being taken to help consumers easily identify the correct fuel for their vehicles and equipment. The EPA is proposing E15 pump labeling requirements, including a requirement that the fuel industry specify the ethanol content of gasoline sold to retailers. There would also be a quarterly survey of retail stations to help ensure their gas pumps are properly labeled – which is hugely important to motorized enthusiasts who need fuel to power their vehicles, especially modified vehicles. The EPA has more information on the status here. Respond to this blog and express your thoughts on the ethanol situation. Do you think it’s a good move in terms of environmental consciousness, or do you worry about how it might impact your vehicles’ engines?
<urn:uuid:a5e461b8-1dd5-4b2f-b5a6-0bde08ea852a>
CC-MAIN-2017-04
http://www.off-road.com/blog/2010/10/14/epa-grants-e15-waiver-for-newer-vehicles/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00463-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932124
459
2.015625
2
Experienced Legal Counsel for Wrongful Termination in Hackensack The New Jersey economy is always changing and, unfortunately, many employers slash payrolls to save on costs. However, some layoffs are illegal under New Jersey law. Employers either illegally target employees for retaliation or discrimination, or they completely ignore the terms of a binding employment contract. If you think you were fired illegally, please contact Zatuchni & Associates today. Our New Jersey wrongful termination lawyer can review the facts of your case in a confidential consultation. It might be possible to sue for lost compensation and other damages, but you should reach out to our firm as soon as possible. What is Wrongful Termination? New Jersey is an at-will employment state. That means that, unless you have an employment contract, your employer can fire you at their discretion. You have no legal right to employment, so it is not against the law to let you go for any reason. Nevertheless, both state and federal laws place some limits on this discretion. For example, an employer cannot fire an employee for an illegal reason, and if they do, then employees can sue. What Are Examples of Wrongful Termination Claims? Some of the more common wrongful termination claims include allegations that you have been fired for the following reasons: - Discrimination. Both state and federal laws prohibit discrimination on the basis of certain protected characteristics, such as age, sex, sexual orientation, gender identity, race, religion, and national origin, among others. - Retaliation. An employer cannot retaliate against an employee for exercising a right. For example, you have the right to take protected family leave or to report a hostile work environment. If you do and your employer retaliates by firing you, you have a wrongful termination claim. - Requiring an employee to break the law. No employee can be forced to engage in illegal activity. For example, an employer might require a manager to illegally dump toxic chemicals into a river. If the employee refuses, it is wrongful termination to fire him for that reason. - Breach of contract. A valid employment contract is legally binding, and an employer cannot simply ignore its provisions, such as a “just cause” provision allowing an employer to terminate employment for only specific reasons. - Violation of company procedures. Many workplaces have employee handbooks or manuals which lay out procedures an employer will follow. Although these are not exactly employment contracts, they can provide rights to employees. For example, a handbook might identify a progressive discipline scheme requiring that an employee be suspended without pay for a violation. If your employer goes right ahead and fires you instead, you might have a wrongful termination claim. What Remedies Are Available for a Wrongful Termination? Being fired illegally can dramatically reduce a family’s income. More than one person has been forced into bankruptcy because they have lost a job. The purpose of a wrongful termination claim is to seek some remedy. Depending on the case, you might request any of the following: - Reinstatement to your old job - Front pay - Reasonable accommodations - Compensatory damages for emotional distress, pain, and suffering - Punitive damages for egregious violations - Attorneys’ fees At our firm, we work closely with clients to identify what they want. Many of our clients do want to return to their old job, especially if they were subject to harassment or discrimination. But some do. We listen carefully to our client’s goals and develop a litigation strategy to accomplish them. Are Wrongful Termination Claims Hard to Bring? Yes. We would be remiss if we did not tell people that the playing field is tilted in favor of employers. For one thing, they have in their possession all relevant communication and other data relating to termination. Few are eager to hand it over, even when requested. For example, a supervisor might have admitted in an email that a company wants to lay off all employees over age 50 in order to bring in a “fresh perspective.” Obtaining evidence like that is critical for bringing a successful claim. Discharged employees also must follow certain administrative procedures before they can file a lawsuit. As an example, they might need to file a discrimination charge with the EEOC or the New Jersey Division on Civil Rights before heading to court. Our Hackensack lawyer can help you in all phases of a claim, including analyzing your rights, requesting information from an employer, interviewing witnesses, and filing all claims and lawsuits. Some wrongful termination claims helpfully settle without any need for a trial, and we can aggressively seek the maximum settlement to protect your dignity and rights. Contact Our Hackensack Wrongful Termination Lawyer Today Losing a job is a scary experience. Fortunately, our legal team can help when an employer terminates you in violation of law or public policy. Give Zatuchni & Associates a call today to schedule a confidential case evaluation at a convenient time.
<urn:uuid:d42d184b-52d1-4c34-a845-9d79e32bfbbf>
CC-MAIN-2022-33
https://www.zatlaw.com/hackensack/wrongful-termination-lawyer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00276.warc.gz
en
0.942194
1,027
1.515625
2
Description of the exhibition : Permanent Exhibition of Ancient and Modern Ceramics The exhibition is located in comune di San Lorenzello in the province of Benevento. The ‘Nicola Giustiniano’ Association was established in 1994 to strengthen, protect and promote the historical, artistic and craft traditions of the town of San Lorenzo and the Titerno Valley. The antique ceramics department was created thanks to the generosity and willingness of private citizens who wished to donate or entrust valuable ceramics to the Association, bringing the finds to the display case carefully set up by an expert craftsman. Over the years, numerous 18th and 19th century ceramics have been purchased thanks to regional contributions. The modern ceramics department has developed thanks to members who wanted to exhibit the works of Italy’s most renowned ceramists. Over the years, the department grew steadily thanks to the ‘Rassegna della Regione Ceramica Italiana’, an event that took place between 1995 and 2004. Valuable ceramists from all over Italy donated their creations to the association, and the exhibition currently includes around 300 pieces. The exhibition was previously based in Telese Terme and Cerreto Sannita. It was moved back to San Lorenzello in 2015. Accessible to the disabled. Via Pasquale Sasso, 82030 San Lorenzello, Campania. Opening on demand.
<urn:uuid:b75bbe43-0bd0-4dfc-8ff4-9c4c0129a51b>
CC-MAIN-2022-33
https://www.eptbenevento.it/en/mostre/permanent-exhibition-of-ancient-and-modern-ceramics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00674.warc.gz
en
0.958857
316
1.507813
2
Please help keeping these websites open for everybody as long as possible cellular organisms - Eukaryota - Viridiplantae - Streptophyta - Streptophytina - Embryophyta - Tracheophyta - Euphyllophyta - Spermatophyta - Magnoliophyta - eudicotyledons - core eudicotyledons - rosids - eurosids II - Sapindales - Rutaceae - Citrus Fruit anatomy, fruit and leaf absission zones Citrus fruit is considered a berry because it has many seeds (pips), is fleshy, soft and develops from a single ovary; (this specific type of berry is called hesperidium - a berry with leathery rind). Citrus fruit is characterized by non-climacteric Tissue surrounding a seed that develops from the ovary wall of the flower. Also peel or exocarp; rind contains numerous pits containing volatile oil glands. Mesocarp; a spongy white tissue on the inside of the rind. Albedo consists of spongy layers of perenchymatus cells rich of glycosides (flavanones). Pectin and pectic enzymes make it bitter. The thread-like vascular bundles run from the albedo along the fruit's axis forming a network outside the carpels. They are rich in peroxidase. Or epicarp; external colored part of the rind. - Albedo Mesocarp; a spongy white A fleshy interior (endocarp) of the citrus fruit - Carpel Sections of the citrus fruit - Juice sac is specialized hair cell. - Rind Also peel or exocarp; orange - Pericarp Tissue surrounding a seed that develops from the ovary wall of the flower. zone A distinct process that culminates in the shedding of plant parts due to a series of physiological and biochemical events that lead to cell wall breakdown in the few rows of cells on either side of the fracture line and, ultimately, to detachment of the organ; mature citrus fruits require unusually large forces to remove them from the tree, and this has been an obstacle to efficient and economical mechanical harvesting; it is why citrus fruit abscission and its regulation attracts much attention of researches. zone This AZ is located between the branch and the petiole. zone This AZ is located between the petiole and the leaf blade. zone A This AZ is located between the branch and the fruit penduncle. zone C this AZ is located in the fruit calix (cup-like structure at the end of the fruit where the fruit is attached to the penduncle). Back to top Back to top - Iglesias DJ et al. Physiology of citrus fruiting. Centro de Genómica, Instituto Valenciano de Investigaciones Agrarias, Apdo.Nov. 2007 (.pdf)
<urn:uuid:a2e77726-3b95-461b-a058-ab1e028e4302>
CC-MAIN-2017-04
http://www.geochembio.com/biology/organisms/citrus/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00125-ip-10-171-10-70.ec2.internal.warc.gz
en
0.845281
640
3.453125
3
Assuming you know how to extract a year, a month, or a day from a given date, then the first of month should be a no brainer since it's always 1. To get the end of the month for a given month, subtract one day from the month following the month of the date you're interested in. No announcement yet. RPGLE and datesPage Title Module Move Remove Collapse
<urn:uuid:24de621f-d84a-4af9-9176-f5b60eda0952>
CC-MAIN-2017-04
http://www.mcpressonline.com/forum/forum/programming/rpg/12939-rpgle-and-dates?12472-RPGLE-and-dates=
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00078-ip-10-171-10-70.ec2.internal.warc.gz
en
0.826705
84
1.53125
2
Way back in the early years of this century (being able to say that makes me smile), the spark of the idea that would become the Tufa struck me at the National Storytelling Festival in Jonesborough, Tennessee. Also at that festival, I first heard Sheila Kay Adams at one of the midnight sessions, in a huge tent on a warm summer night. So her stories and music, and my fictional Tufa, have always been spiritually, if not literally, entwined. Sheila Kay is a traditional ballad singer, a woman who has dedicated her life to making sure that these old songs survive into the next generation. Over Home: Love Songs from Madison County is a documentary that takes us into her life, and shows how she’s passing on her traditions to the YouTube and iTunes generation. I first mentioned it here, when I interviewed director Kim Dryden during the film’s post-production. You can watch the trailer: and additional clips can be found here. Sheila Kay learned these songs the old way, “knee to knee” on front porches from relatives who still gathered to share songs and stories when other more urban families were beginning to turn away from each other, to television, radio and other forms of passive mass communication. “They did not call them ballads,” she says in the film. “They called them love songs. And the gorier they were, the more I liked them. And if they mentioned cutting off heads and kicking them against the wall, I was all over it.” These were songs that came originally from Ireland, Scotland and other Celtic countries, brought with the first settlers and maintained intact among the isolated hills and hollows of Appalachia. This is old stuff, literally and figuratively, if you’re a fan of my novel The Hum and the Shiver. But unlike my fictional Cloud County, the Madison County of this film is a real place, and the people you see in the film are genuine. Most compelling of the newcomers is sixteen-year-old Sarah Tucker, who bridges the traditional and the modern in a way that gives you real hope for the future of this music (and music in general). The scenery is expansive and beautiful, as are the Smoky Mountains themselves, but the most fascinating landscape of all is Sheila Kay Adams’s face as she talks about how music helped her persevere through personal tragedy. Over Home is currently making the rounds of film festivals, and hopefully will soon be available on DVD and streaming. If it comes to a festival near you, definitely check it out (and if you have any pull in festival scheduling, I heartily recommend scheduling it).
<urn:uuid:803c612e-7f0a-4444-8b72-6ec1d2fc04fb>
CC-MAIN-2016-44
http://alexbledsoe.com/2012/12/31/film-review-over-home-love-songs-from-madison-county/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00095-ip-10-171-6-4.ec2.internal.warc.gz
en
0.965138
555
1.726563
2
Road Trip Close to Home: Wave Hill Garden & Cultural Center in the Bronx Nature is at the height of its powers over at Wave Hill Garden & Cultural Center in Bronx's Riverdale area. The history of this 28-acre property dates back to the 1800s, but it wasn't a public garden until 1960. Now, visitors can bird watch, work on a family art project, have a bite in the café, or check out the tropical and desert plants in the greenhouse. There are also seasonal activities for the winter and spring, and even public art. The site is a quiet, intimate getaway that can feel like someone has traveled miles away from home until they see the George Washington Bridge. Tickets can be bought online. Wave Hill is offering a membership for those looking to frequently visit the area. Benefits include admission year-round and other discounts.
<urn:uuid:014dbd98-60d8-401e-b44a-48e6a6dcb363>
CC-MAIN-2022-33
https://bronx.news12.com/road-trip-close-to-home-wave-hill-garden-and-cultural-center-in-the-bronx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00073.warc.gz
en
0.951652
176
1.804688
2
1.The power transformers manufactured with silicon steel sheet and high-quality oxygen-free enamelled copper wire 2.Beautiful aluminum chassis and panel with logo window and steel heavy duty chassis. 3.This processor employs cathode followers to improve your audio system. It outputs the same voltage as it receives. The voltage gain approaches 1. It also adds tube audio quality to digital audio, reduces work load of a receiver (or an amplifier), and makes speakers sound warmer and more finer. 4.This processor can be connected in various configurations. It is to be installed between an audio source and a receiver (or an amplifer). The audio sources can be a solid state CD/DVD player, MP3 player, iPod, electric guitar, or computer audio output. 5.Dual power supply voltages are available on this unit, 115VAC for North America, 220VAC for Asia and Europe. Tubes:6N8P × 2 (Cathode followers,it can be replaced with 6SN7) Output Jacks: Two channels with two gold plated RCA jacks Input Jacks: Two channels with two gold plated RCA jacks Input Impedance: 100KΩ Distortion of Harmonic Wave: ≤0.03%(1KHz input) Signal to Noise Ratio: >75 dB Frequency Response: 10Hz ~ 100KHz (-0.1dB) Supply Voltage: AC115V 60Hz Power Consumption: 15W Dimension: 17cm(W) x 20cm(D) x12cm(H) (7” x 8” x 5”) Shipping Dimension: 27cm x 23cm x 21cm Net Weight: 2.5kg (5.5lb) Gross Weight: 3.2kg (7lb) A Yaqin SD-CD3 Processor with two tubes A Power Cable Customer Questions & Answers - Previous Page - Next Page
<urn:uuid:9f121b1f-65c6-4435-a644-49100478b1b9>
CC-MAIN-2017-04
https://www.shenzhenaudio.com/yaqin-sd-cd3-6n8p-tube-signal-upgrade-hi-end-buffer-processor-for-cd-player.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00338-ip-10-171-10-70.ec2.internal.warc.gz
en
0.796857
418
1.539063
2
Plocamium polyhalogenated monoterpenes are metabolites first isolated from the red algae Plocamium cartilagineum, featuring several units of unsaturation, as well as multiple halogens, including two contiguous stereogenic chlorine-bearing carbons. These molecules possess a wide range of biological activity, but most notably show cytotoxicity against a range of solid-tumor cancer cell lines. This promising activity has caught the attention of William Gerwick (Scripps Institution of Oceanography) and Dr. Fred Valeriote (Henry Ford Medical Center). The testing of several members of the Plocamium polyhalogenated monoterpene family suggests only moderate cytotoxicity levels, initial results indicate that these compounds are selective for solid tumors, while remaining nontoxic to healthy cells. However, due to the low abundance from natural sources, these compounds were only isolated in small quantities, and in vivo studies could not be conducted. The Vanderwal group at the University of California Irvine aims to develop the first synthesis of members of the Plocamium polyhalogenated monoterpenes, The proposed synthesis is concise and modular, allowing for multiple members of the class to be synthesized, as well as a host of unnatural analogues, with only minor modifications to the procedure. Initial results on the synthesis of simplified model systems are promising, and once completed, the Plocamium polyhalogenated monoterpene natural products will be synthesized. Through collaboration with Gerwick and Dr. Valeriote, the synthesized compounds will be tested for biological activity, and in the case of known bioactive members, continue in vivo studies. The field of chemotherapeutics is always in need of drugs that are not only potent to the cancer cells, but remain nontoxic towards healthy cells. The outlined chlorinated natural products show promising activity against a range of solid tumors, as well as remaining nontoxic to other cells, but are difficult to obtain from their natural sources. The Vanderwal group has outlined a strategy to synthesize this group of compounds in order to further test their activity.
<urn:uuid:153063b5-5f2f-4005-97cf-15d4165746a5>
CC-MAIN-2016-44
http://grantome.com/grant/NIH/F31-CA174176-02
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00066-ip-10-171-6-4.ec2.internal.warc.gz
en
0.948312
430
2.28125
2
April 5, 1999 - Added the testimony of Rivka Yosselevska at the Eichmann trial. Added the testimony of V. Burnosova on the execution of Jews in the town of Sebezh. Added the testimony of Heinrich, a member of the 307 Police Battalion. Added a series of 8 photographs from the Lodz ghetto. Added the testimony of D. Kahane on the Massacre of the Jews in Lvov during the First Days of the Occupation April 3, 1999 - Added a series of photographs from the Lublin Ghetto. Added the eyewitness accounts of Dina Mironovna Vasserman and Esther Goldstein. Updated the bibliography. Added photograph of excavation of mass grave in Tarponol. March 27, 1999 - Added The Einsatzgruppen and Gas Vans - Murder from the Crimea to the Caucasus. January 2, 1999 - Added Evidence and Arguements on Important Aspects of the Case - A. Seclections from Evidence and Arguements of the Prosecution - I. Introduction. Added photograph of Jews forced to dig graves in Poland. December 28, 1998 - Added Operational Situation Report USSR No. 80. Added Extracts from the Testimony of Defendant Nosske. Added photograph of Nazi youth watch as Viennese Jews are forced to scrub the streets in November 1938. December 26, 1998 - Added an Extract from the Closing Brief of Defendant Blobel. Added photograph of an einsatzgruppen action in the occupied USSR. Added photograph of poster announcing boycott of Jewish-owned shops in Berlin. Added The Humilation of a Whole Community - four photographs of the humilation of the Jews of Baden-Baden. Added photograph of Jews executed and left hanging in a Rumanian town. Added Extracts from Closing Statement of the Defense on Behalf of Defendant Naumann. December 22, 1998 - Added a photograph of partisans in uniform. Contrary to the claims of holocaust deniers posing as revisionists, the Hague Convention provided partisans with full protection as soldiers. November 28, 1998 - Added a section on the Krakow ghetto.
<urn:uuid:2e31f603-e04e-49ba-8418-b1b65c4b2104>
CC-MAIN-2016-44
http://www.nizkor.org/hweb/orgs/german/einsatzgruppen/esg/additions.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00303-ip-10-171-6-4.ec2.internal.warc.gz
en
0.888147
440
1.789063
2
This method entails holding a beating tray (white canvas stretched over a 1-metre square frame or even an inverted umbrella) under a bush, branch or other suitable habitat, and then sharply hitting the branch with a heavy stick to dislodge any insects. These fall directly into the tray and can be collected using an aspirator or fine paint brush dampened with alcohol. This method has an advantage over collecting with a sweep net in that it may be used for thick heavy vegetation unsuitable for sweeping (eg very thorny bushes, or even bare branches). The disadvantages are obvious. The catch is substantially smaller because many insects escape, and it can only be used if the vegetation is reasonable high. Beating is best done in cool weather or early or late in the day when insects are least active (3) Pyrethrum spraying This is a method of obtaining insects from dead or rotten wood or from habitats unsuitable for sampling by other means. It can also be used to collect insects from small bushes or single branches. A polythene sheet is spread under a piece of vegetation or rotten wood which is then sprayed with a pyrethroid (sold for domestic purposes as an aerosol fly-killer, eg RAID®). Dying insects, as well as those falling out of crevices or holes in bark, etc. will fall onto the sheet and can be collected using an aspirator, fine brush or forceps, or funneled into a into a suitable receptacle. This operation must obviously be undertaken when there is no breeze. Other disadvantages are that smaller individuals may get trapped in minute droplets of spray on leaves, bark, etc. and specimens may become stiff and difficult to relax, which hinders mounting. (4) Canopy fogging This is a development of the aerosol spraying method described above. It is especially successful for sampling taller trees or the canopy of tropical forests. It is one of the most productive methods of collecting many groups of chalcidoids, eg Eupelmidae, Encyrtidae, Aphelinidae, Signiphoridae and Trichogrammatidae). A variation of the method has been described by Davis & Stork (1996) and involves knocking down insects from the canopy using a pyrethroid insecticide transported by means of a heated oil carrier. This is produced using a two-stroke insecticide fogging machine. As the carrier is warmer than the surrounding air rises by convection into the canopy even if released from ground level and the canopy is 40m high. Falling insects are collected by means of canopy funnels or sheets slung between trees or from ropes. A suitable collecting pot is positioned in the centre of the funnel or sheet. This is separated from the funnel or sheet by a 1cm wide strip of fine mesh that is fine enough to allow alcohol to pass through but not the smallest Hymenoptera. After an hour or so the insects that have fallen onto the funnels are washed into the collecting bottles by means of a fine spray of alcohol administered by a knapsack sprayer or alcohol squirted from wash bottles. To prevent wastage, a low concentration of alcohol (10-20%) can be used for this operation, but it must be replaced as soon as possible with 70% alcohol in the collecting bottles. This is probably the most rewarding method of collecting chalcidoids, since the biological information gathered may prove of great value to the taxonomist as well as to those working in biological control. The main drawback is the considerable time and effort that is required to locate suitable hosts. Also a lower diversity of species can be collected in any given time compared with that obtained by sweeping or other sampling techniques. Most immature and mature stages of the higher orders of insects provide hosts for chalcids, eg Hemiptera, Coleoptera, Diptera, Lepidoptera. Some chalcids are phytophagous, and many are associated with the reproductive organs of pines, fruits of various flowering plants, flowering heads and stems of various grasses and also fig fruit (Ficus spp.). The latter usually harbour a particularly rich chalcid fauna that can be reared easily (see Boucek, et al. 1981). Whatever likely hosts are collected it is best to put them in a suitable receptacle to await the emergence of the parasitoid(s), eg glass tube with a cotton wool plug, brown paper bag, gelatin capsule, polythene bag. Parasitized hosts can often be distinguished from healthy hosts by their slightly different colouration or behaviour. Parasitized hosts may be darker than healthy ones or may move at a different pace or in a different way from healthy ones. On rare occasions it may be advisable to put vegetation harbouring hosts into an emergence box.The emerging insects are attracted to the light and collected into a glass tube placed over an inverted glass filter-funnel placed on the roof or sides of the box. This prevents return of the insects into the box. One disadvantage of the emergence box is that a fairly large proportion of the parasitoids may not find their way into the collecting tubes and therefore it should only be used where a high parasitoid infestation is likely. Another disadvantage is that there may be several possible hosts in a sample from which the parasitoids are reared. It is essential that wherever possible suspected parasitized insects are individually segregated to reduce the risk of specimen being labelled with incorrect and often misleading biological information. It is very easy to put an aphid mummy, attached to a small piece of leaf, inside a glass tube and assume that a chalcidioid found wandering around the inside of the tube has come from the aphid whereas it actually emerged from undetected agromyzid puparium in the piece of leaf. Parasitoids found in a tube containing coccids on a twig may actually have come from lepidopteran or heteropteran eggs intermixed with the coccids. Where possible, parasitized hosts must be isolated from plant or other material to prevent erroneous records. Also the remains of the host must be retained together with the resulting parasitoid, perhaps kept in a suitable gelatin capsule pinned with the specimen or even glued on the same card as the specimen. (6) Malaise trap Together with the advent of Critical Point Drying to dry specimens from alcohol (see below), the use of Malaise traps for collecting chalcidoids has probably revolutionised the study of chalcidoids. A Malaise trap is used to collect large number of flying and occasionally flightless insects. A suitable design for collecting chalcidoids has been described by Townes (1972). The mesh of the net must be fine enough to prevent smaller chalcidoids from passing through easily. A Malaise trap, if correctly constructed and sited, will provide a representative sample of chalcids to be sound in an area and will collect even the smallest insects, eg Megaphragma spp. The trap may be run dry with an insecticidal fumigant in the collecting pot but in this instance the material may be damaged by other dying insects. They may also be covered in moth scales and nany insects may not even reach the collecting pot. However, if 70-80% alcohol is used as the killing agent, the size of the catch will be greatly increased, possibly because there is a certain amount of attraction to the alcohol itself (many insects are associated with rotting or fermenting fruit). Two advantages of the Malaise trap are that it need only be visited once every week or two weeks for emptying and it can be serviced by a non entomologist. It is, however, wise to empty the trap more frequently than once a week to ensure that spiders have not spun webs in the entrance to the collecting head, and to check that the trap has not been fallen down or damaged. In hotter areas smaller insects may deteriorate rapidly in warm alcohol (>25°C) for more than a few days. The fact that the catch of chalcidoids collected into alcohol is usually larger, more diverse and cleaner than that obtained using a fumigant, outweighs the preference for dry-collected specimens (see section on preservation). (7) Flight intercept trap This is a type of trap much favoured by coleopterists (see Peck & Davis, 1980; Masner & Goulet , 1981; Davis & Stork, 1996), but it is also an excellent way of collecting microhymenoptera. The trap consists of a 1m high, 2-3m wide length of black terylene netting slung vertically between two trees or posts. It is protected from rain by a transparent polythene roof that extends about 0.5m either side of the vertical netting for at least its length. A number of pans are placed beneath the netting for the whole of its length. The pans contain water with a drop or two of detergent, a saturated salt solution, a 50/50 ethylene glycol/water mix or some other suitable collecting medium (see comments below under yellow pan traps. Flying insects hit the vertical net and fall into the pans. They can then be collected at regular intervals using the same method described below for yellow pan traps. The catch can be increased by spraying the netting with a long-lived contact insecticide such as Ambush®. Last updated 19-Aug-2003 Dr B R Pitkin
<urn:uuid:0aede369-a5d8-432e-bf5d-88bce2aced79>
CC-MAIN-2017-04
http://www.nhm.ac.uk/our-science/data/chalcidoids/collecting2.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00082-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938079
1,946
3.375
3
Horseradish itself has plenty of health benefits and together with beetroots they create really powerful combo. Beets can support your digestive system and alleviate inflammation. They are packed with nutrients such as folate, manganese, copper and potassium. Horseradish is naturally antibacterial, helps with digestion and speeds up metabolism. It is also full of nutrients such as calcium, folate, magnesium, potassium and zinc to name just a few. Our beet and horseradish relish is made of grated beetroots and horseradish roots with a touch of sugar and vinegar to elevate the flavours. Grated beetroot 80%, horseradish 8%, water, sugar, vinegar, acidity regulator, lemon acid, salt
<urn:uuid:8da2f1b7-0b4a-430c-b5fe-83f7529fa585>
CC-MAIN-2022-33
https://www.everydayvegangrocer.com/products/sedno-beet-horseradish-relish-300g
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00076.warc.gz
en
0.911658
165
1.53125
2
A study by World Health Organization (WHO) indicated that 241 million children (68%) in India between the age group of 1 to 14 years are at risk for parasitic intestinal worms. Studies indicate that intestinal worms can cause chronic intestinal blood loss that result in anemia, under nutrition and impairment of mental and physical development. AdvertisementGovernment of India has already launched National Deworming Day in 11 States/UT of India namely Assam, Bihar, Chhattisgarh, Dadra Nagar Haveli, Haryana, Karnataka, Rajasthan, Madhya Pradesh, Maharashtra, Tamil Nadu and Tripura. The Salient Features Of This Initiative Are As Follows: - All pre-school and school-age children (enrolled and non-enrolled) between the ages of 1 - 19 years were administered deworming drug i.e. Albendazole tablets through the platform of schools and anganwadi centres in order to improve their overall health, nutritional status, access to education and quality of life. - Anganwadi workers provided deworming drug to all pre-school children (1-5 years) and all out of school children (6-19 years) at the Anganwadi centres and School teachers provided deworming drug to all school enrolled children of 6-19 years age as per the National guidelines. - In addition, Government has provided detailed guidelines for implementation of deworming intervention alongwith training, awareness generation and ensuring sufficient stock supply of deworming drug. There are specific guidelines / protocols for adverse event management as well. - National Deworming Day was launched in 280 districts across 11 States/UT. With an aim to avoid duplication of intervention, lymphatic filariasis endemic districts in these 11 states were excluded as administration of Albendazole is part of Mass Drug Administration (MDA) regime under lymphatic filariasis program.
<urn:uuid:0b8643b5-9a4e-4779-9a68-19d85e7f07bf>
CC-MAIN-2017-04
http://www.medindia.net/news/national-deworming-drive-launched-in-11-states-of-india-147056-1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00511-ip-10-171-10-70.ec2.internal.warc.gz
en
0.915559
394
3.03125
3
Rather than bore you with technical requirements when assessing whether your loved one needs care, you should consider whether the individual has a diagnosis or receives medical treatment that limits the individual’s ability to manage his/her own care or maintain himself or herself in their home independently. If he/she is unable to manage care independently, your loved one may need additional services – whether provided in home, or in a facility. To meet the nursing home level of care requirement, the individual who needs assistance must be unable to manage three Activities of Daily Living (ADL). ADLs include: feeding, bathing, dressing, walking, transferring, and continence. Many of our clients may have sufficient needs, but are still able to manage their ADLs. As a result, a nursing home is not a suitable placement. When individuals are able to manage the majority of their ADLs, but are unable to perform Instrumental Activities of Daily Living (IADL), such as cooking, driving, shopping, managing finances, managing medication, cleaning, etc., we recommend less restrictive care options. Many clients who have some impairment can sufficiently live independently, or remain in their home with minimal assistance. Other clients may need to be placed into a more structured environment for more intensive oversight. Whether your loved one needs immediate care, is in a financial crisis, or whether your loved one should start planning in light of possible long-term care needs down the road, we can help assess care options and financing. Hook Law Center: Kit Kat, what can you tell us about voles? Kit Kat: Well, it turns out a lot. I’ve written previously on moles and mice, but the prairie vole it turns out has a lot to offer, too, in the way of contributing to scientific research and its applicability to humans. Researchers at the University of Virginia have chosen them as research subjects, because they are a lot like humans with regard to mating and parenting. The prairie vole breeds year round and can have as many as 4 pups per litter. They are found in the central part of the United States from New Mexico to Ohio and West Virginia. They are small and never weigh more than 3 ounces! Anyway, there is a relatively new field in science call behavioral epigenetics in which cell changes from environmental factors are examined. The cell itself does not really change, but how it reacts can change depending on things that happen to it. Additionally, some scientists believe that these cell reactions can be passed down to future generations. ‘Offspring of low-care parents (voles) become low-care parents themselves, and this alters the epigenome of the next generation of offspring,’ says Kelly Wroblewski (UVA Grad ’20). It happens through a process called methylation, in which the effectiveness of the gene is reduced. In the case of prairie voles, they found that voles with parents who spent little time with them had more trouble bonding with potential mates and their own offspring. The implication for humans is that offspring of parents with mental health weaknesses such as depression or victims of trauma could be pass their impaired coping mechanisms down through the generations. More research needs to be done, but it is intriguing that this humble creature is very useful to humans in their quest to understand how emotions and their resulting behaviors can be passed down to offspring, just as much as a predisposition to acquire certain physical ailments. (“What can voles tell us about ourselves,” UVA Magazine, Fall 2016, p. 45) Distribution of This Newsletter Hook Law Center encourages you to share this newsletter with anyone who is interested in issues pertaining to the elderly, the disabled and their advocates. The information in this newsletter may be copied and distributed, without charge and without permission, but with appropriate citation to Hook Law Center, P.C. If you are interested in a free subscription to the Hook Law Center News, then please telephone us at 757-399-7506, e-mail us at firstname.lastname@example.org or fax us at 757-397-1267.
<urn:uuid:e1f30944-c68d-4b3d-ad9d-f0c687562bee>
CC-MAIN-2017-04
http://www.kazor.com/2016/09/determining-the-appropriate-level-of-care/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95658
849
2.03125
2
The London Borough of Sutton has suffered significantly from flooding. As climate change is predicted to further increase the frequency and intensity of flood events, Sutton?s local planning authority has developed spatial planning policies to address the risk of all forms of flooding, along with other climate change impacts, to and from new developments and to promote the role of sustainable urban drainage systems in managing surface water runoff. The Borough is affected by a number of different sources of flood risk, including fluvial (river) flooding, surface water flooding, sewer flooding and groundwater flooding. The aim has been to ensure that the Council?s planning policies on climate change adaptation and flood risk avoid, reduce and manage flood risks while promoting the multi-functional benefits of green and blue infrastructure. Such benefits include: increased green and blue space, which helps the area to adapt to increasing temperatures and the urban heat island effect; provision of recreational amenities; improved health and quality of life for the local community; and? increased biodiversity. The process of implementing the initiative involved integrating the policies into the Local Plan, which sets out the spatial strategy and policies for the development and use of land in the local authority?s area. One of the main obstacles was the limited cross-departmental information exchange, which was overcome by the establishment of a Flood Group, comprising representatives from the departments of planning, environment, emergency planning, highways and external parties. An evidence base was required, which used information from the UK Climate Impacts Programme, a Local Climate Impact Profile and a Strategic Flood Risk Assessment. In support of this, existing good practice was drawn upon, including the handbook produced by the UK Town and Country Planning Association ?Climate change adaptation by design?. Stakeholder and public engagement also formed a key part of the implementation process. Progress made as a result of the project is monitored and evaluated annually through an annual monitoring report, sustainability appraisal and the Code for Sustainable Homes. The inclusion of adaptation approaches to flooding within Sutton?s planning policies has the potential to considerably affect the form and function of new development sites. Source: Kazmierczak, A. and Carter, J. (2010) Adaptation to climate change using green and blue infrastructure. A database of case studies.
<urn:uuid:ea139c32-61f1-4723-b464-69afff7a9b34>
CC-MAIN-2022-33
https://healthsustainabilityplanning.co.uk/environmental-sustainability/case-studies/london-borough-sutton-adaptation-flooding-via-local-planning-policies/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00278.warc.gz
en
0.943774
454
3.09375
3
Quite frankly the biggest enemies of poland were your neighbours, Islam was your enemies but that was centuries ago. A pattern of abuse would make any country say enough is enough regardless of who the aggressor was (past, present and future). The Earth has 36.5 billion acres of land. All of Poland consist of only about 77 million acres. So there is plenty of room for foreigns and their religious groups to reside elsewhere. If you want to trade with Poland then great. Send us your money in exchange for our exports. You can come as a tourist for a short visit and take some nice photos and good memories of our exquisite food, rich history, and unique culture back home with you. Why did Poland join? Like other countries at the time Poland needed to restructure and grow its economy after decades of dystopian and dysfunctional communist occupation. It was also in Poland's security interests to free itself once and for all from Russia's orbit. Even though Poland had to make very difficult domestic sacrifices at the time, the terms and conditions for EU membership seemed reasonable; i.e., to become part of a common market place which still respected national sovereignty. There were no imploding economies within the EU until the PIIGS (Portugal, Italy, Ireland, Greece and Spain) began to squeal for bailouts. There was no manufactured "refugee" crisis with quotas being mandated for resettlement. All of that happened much later and had absolutely nothing to do with Poland's membership. Brussels is to blame for all of it and now they want to socialize the pain and for Poland to be nothing more than a giant disposable sponge and absorb it.
<urn:uuid:ab2087ff-0324-480b-869a-c927c54e68e7>
CC-MAIN-2022-33
https://polishforums.com/history/poles-biggest-hypocrites-world-78159/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00071.warc.gz
en
0.982711
343
2.140625
2
The possibility of war with Iraq could prove to be a divisive issue for the eight Democrats now running for president in 2004. It may seem early to be thinking about next year's presidential election, but eight Democrats have already announced intentions to seek the White House in 2004, and up to five more candidates could join the field in the next few weeks. The two most recent candidates are adding a distinctly anti-war flavor to the race for the Democratic Party's presidential nomination. Ohio Congressman Dennis Kucinich and former Illinois Senator Carol Moseley-Braun both oppose war in Iraq. Congressman Kucinich is the only one of five members of Congress now running for president who voted against the congressional resolution giving President Bush the authority to use military force to disarm Saddam Hussein. "This war is wrong. It puts at risk the lives of servicemen and servicewomen," he said. "It puts at risk the lives of innocent Iraqi citizens. Surely, everyone understands that, if we kill thousands of innocent civilians, anger against America will rise, and we will increasingly become less safe here at home." Four congressional Democrats now running for president supported the resolution on the use of force. They are Congressman Richard Gephardt of Missouri and Senators Joseph Lieberman of Connecticut, John Kerry of Massachusetts and John Edwards of North Carolina. Carol Moseley-Braun, the only African-American woman ever elected to the U.S. Senate, says she will challenge those Democrats who support the president. "The Constitution of the United States calls on Congress to make declarations of war. And, frankly, I think the people who voted for that [congressional] resolution were wrong to do so," she said. "You can't just abdicate as profound a responsibility as war and peace to the executive." Two other Democratic contenders, former Vermont Governor Howard Dean and New York civil rights activist Al Sharpton, also oppose war in Iraq. That means the eight-person Democratic field is evenly split on the issue. Washington-based political analyst Stuart Rothenberg says Congressman Kucinich's decision to enter the presidential campaign means that Iraq will be, at least in the short term, a prominent issue in the battle for the Democratic presidential nomination. "Dennis Kucinich has no chance of winning the Democratic nomination," he said. "But I don't think that is why he is running. He is running to bring the issue to the forefront, to try to galvanize public opposition against the war and, in fact I think, to nudge other Democratic politicians to increase their criticism of President Bush." Despite the addition of anti-war candidates, those Democrats who supported the congressional resolution on the use of force are standing by their decision. "I believe Saddam is a serious threat," said Senator John Edwards of North Carolina. "I believe he must be disarmed. It is a belief that is a principled belief for me, and, I think, we should be willing to use military action, if necessary." But even those Democratic candidates who support the president's stand on Iraq have criticized the administration for alienating some U.S. allies over the use of force. Public opinion polls indicate about 60 percent of Americans support the president on Iraq. But those same surveys suggest that nearly 50 percent of Democratic voters oppose war. Analyst Stuart Rothenberg says that puts some of the Democrats running for president in a difficult position. "They want to seem loyal and patriotic and tough on Saddam Hussein and al-Qaida," he said. "And at the same time, they know that the grass roots Democrats are not enthusiastic about a war, and are worried about the president going too far too fast. And when you want to have it both ways, often, you are kind of frozen in an ambiguous position, where you can't be supportive entirely, but you can't attack entirely, and that is where most of the Democrats [running for president] are." As crowded as the eight-person Democratic field is at the moment, it could get bigger. At least five other Democrats are considering a run for the White House next year, and some of them could join the field within the next few weeks.
<urn:uuid:54e1b4db-4c83-4286-9f5c-f70d72fb0c8a>
CC-MAIN-2017-04
http://www.voanews.com/a/a-13-a-2003-02-22-17-iraq-66844457/375436.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00565-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966524
864
2.109375
2
Local Voices Network is a program of Cortico that aims to surface the perspectives and concerns of residents through facilitated community conversations (in-person or online) that invite anyone and everyone to the table to share their story and be heard. Conversations are recorded and transcribed with the goal of always centering the stories and experiences of those most impacted when important community priorities are being set. LVN launched in Wisconsin in 2019 and now actively works with partners across the United States. Conversations are led by trained facilitators, and are generally organized by LVN partners who are engaging in an intentional listening campaign to inform their work. In-person conversations take place around a Digital Hearth, which records the discussion and enables partners to share stories from across conversations in order to cross-pollinate voices and perspectives across community boundaries. Online conversations utilize the same structure and features, but use the videoconferencing platform Zoom to record. The conversations are transcribed to make them machine readable, and then analyzed with AI-based tools –– all with the goal of offering local community members and leaders a new window into the issues important to the community.
<urn:uuid:6227c854-f465-4f12-9a9c-06137e825d51>
CC-MAIN-2022-33
https://help.lvn.org/hc/en-us/articles/1500011581662-What-is-the-Local-Voices-Network-LVN-
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00668.warc.gz
en
0.952695
229
1.890625
2
Las Vegas-based Filipino artist Gig Depio, acclaimed by critics in Nevada for his murals depicting socio-political issues in Philippine and American society, will hold his first one-man show in Manila, titled “Bring Home the Bacon: From Feudal to Neoliberal,” at the National Commission for Culture & the Arts (NCCA) Gallery in historic Intramuros, Manila. The exhibit will be held throughout the month of June to coincide with Philippine Independence Day June 12. The reception day will be on June 21. A dozen intense, large-scale paintings will be on display, including a 24 foo teach wide quadriptych on the influence of capitalism on Southeast Asian culture: a 16 feet wide diptych on issues surrounding immigration and the global exploitation of human labor; and a 7 foot wide work focusing on Philippine-America history at the turn of the 20th century. “I see the show as a culmination point wherein all the major pieces I’ve painted in the past several years are in fact related to one another and are also a manifestation of my own socio-political and economic concerns,” says the artist. The exhibit is curated by leading social realist Edgar T. Fernandez. “I am honored to be working with Egai Fernandez,” declared Depio. “We proudly share the same aspirations for Filipino artists.” In a statement, Fernandez said “Gig’s imagery compels us to look back at history and its connection to contemporary political life. He will be using images like the Pinatubo eruption as a political message, as well as a changing landscape. I’m very much excited by this kind of work.” Depio has mounted three solo shows in the state of Nevada and has participated in many group exhibits. Reviewing a group show of contemporary Nevada artists, Amanda Horn of the Nevada Museum of Art declared: “Gig is my favorite in the show because this has a socio-political commentary but he does it in a non-threatening way. There’s almost a cartoon-like quality to his work which makes it approachable.”
<urn:uuid:e91541a6-fe73-46ee-9427-d2df892c5f00>
CC-MAIN-2022-33
https://ncca.gov.ph/2018/06/04/us-based-muralist-gig-depio-holds-homecoming-show-at-ncca-gallery/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00264.warc.gz
en
0.957482
449
1.554688
2
On this page: - Definition of the noun aeneas - Phrases with Aeneas - Printed dictionaries and other books with definitions for Aeneas - Online dictionaries and encyclopedias with entries for Aeneas - Photos about Aeneas - Video about Aeneas - Scrabble value of A1E1N1E1A1S1 - Anagrams of AENEAS - Share this page |Play/pause||Buy footage||Find more| Definition of the noun aeneas What does aeneas mean as a name of something? noun - plural: - - a mythical Greek warrior who was a leader on the Trojan side of the Trojan War; hero of the Aeneid - Aeneas: In Greco-Roman mythology, Aeneas was a Trojan hero, the son of the prince Anchises and the goddess Venus. His father was the second cousin of King Priam of Troy, making Aeneas Priam's second cousin, once removed. He is a character in Greek mythology and is mentioned in Homer's Iliad. Aeneas receives full treatment in Roman mythology, most extensively in Virgil's Aeneid where he is an ancestor of Romulus and Remus. He became the first true hero of Rome. - Aeneas: The fictional representation for Aeneas, a Greek mythological figure. - Aeneas: Second Women is a fictional character from the 2005 film Dido & Aeneas: A Choreographic Opera. Who is Aeneas? Aeneas is a character in the New Testament. According to Acts 9:32-33, he lived in Lydda, and had been a cripple for eight years. When Peter said to him, "Jesus Christ heals you. Get up and roll up your mat," he was healed and got up. Aeneas a.k.a. Aeneas, Washington is an Unincorporated community in Okanogan County in the U.S. state of Washington. - read more about Aeneas, Washington The Aeneas was a wooden sailing ship named after the Trojan hero of the Iliad. Phrases with Aeneas Phrase starting with the word Aeneas: Phrases ending with the word Aeneas: - Parides Aeneas - Ooencyrtus Aeneas - Androctonus Aeneas - Species Edaphus Aeneas - Species Parides Aeneas - Species Ooencyrtus Aeneas - Species Androctonus Aeneas Other phrases containing the word Aeneas: - Papilio Aeneas Damis - Papilio Aeneas Linus - Parides Aeneas Didas - Parides Aeneas Tucha - Papilio Aeneas Locris - Parides Aeneas Lamasi - Parides Aeneas Lucasi - Parides Aeneas Huallaga - Parides Aeneas Linoides - Subspecies Papilio Aeneas Damis - Subspecies Papilio Aeneas Linus - Subspecies Parides Aeneas Didas View more phrases with the word Aeneas in thesaurus! Printed dictionaries and other books with definitions for Aeneas Click on a title to look inside that book (if available): While Pius Aeneas is a prime candidate for the Piccolomini manuscript, it would be short-sighted to limit the possibilities to only the family's most famous son. Two nephews of Pius II, Francesco Todeschini Piccolomini and Agostino Patrizi ... by David Riggs Jupiter becomes a cynical pederast; Aeneas is a hollow man and a heartless prig ; Dido, the victim, bears witness to the fraudulence of Roman piety. Whenever Marlowe first conceived of it, Didu falls within the festive tradi— tion of inversion ... by Michael Gagarin Aeneas was a minor Trojan prince and warrior, son of the goddess Aphrodite ( Roman Venus) and Anchises, a mortal. In Homer the god Poseidon foretells that Aeneas will survive Troy's destruction and rule over the Trojans (Iliad 20.302– 312). The Encyclopedia of Hell (2015) by Miriam Van Scott Aeneas adventure begins at LAKE AVERNUS (located outside Naples, Italy), a flaming black pool in the heart of a dense forest. A pitch-dark cavern leads down to the gates of the netherworld, where the two must face monsters of Disease, ... by Arthur Cotterell The Romans believed that an important element among them came from Asia Minor—Trojans who escaped the sack of Troy by the Greeks and followed Aeneas. This myth received classic statement in Virgil's Aeneid, an account of the ... Online dictionaries and encyclopedias with entries for Aeneas Click on a label to prioritize search results according to that topic: Photos about Aeneas Click on an item to view that photo: Photo credit: Metaphox - Aeneas' father Photo credit: Pedro Nuno Caetano - Dido welcomes Aeneas Photo credit: Lilu1982 - Aeneas (Steamship) in Melbourne Official Number 131305 -- Built in 1910 by Workman Clark & Co Ltd : Belfast -- Gross Ton 10049 -- Owner, Ocean Steam Ship Co Ltd Photo credit: paelocalhistory - Mount Aeneas, Flathead National Forest USFS Photo by Liz Rohde Photo credit: Forest Service - Northern Region - Dido & Aeneas Photo credit: villunderlondon View more pictures about Aeneas Williams. If you need related images for an article or a report, you can download stock photos: Video about Aeneas Video shows what Aeneas means. A Trojan hero and the legendary ancestor of Romans.. .. Aeneas pronunciation. How to pronounce, definition by Wiktionary ... See also the pronunciation examples of Aeneas! Scrabble value of A1E1N1E1A1S1 The value of this 6-letter word is 6 points, but it's not an accepted word in the Official Scrabble Players Dictionary. Anagrams of AENEAS What do you get if you rearrange the letters? See also the blanagrams of Aeneas! Share this page Go to the usage examples of Aeneas to see it in context!
<urn:uuid:2004b6a6-f09b-4218-809d-c0369d00a683>
CC-MAIN-2017-04
http://www.omnilexica.com/?q=Aeneas
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00357-ip-10-171-10-70.ec2.internal.warc.gz
en
0.859131
1,431
3.28125
3
You’re not in this alone “For the Word of the Lord is right and true; He is faithful in all He does.” – Psalm 33:4 The Lord is faithful in all He does, and “all” means all. Whatever the age, condition, or circumstances of hopeful parents-to-be, there are always elements of uncertainty. It’s normal to feel discouraged if things don’t – or might not – work out as you’ve planned. On difficult days, remind yourself that God’s ways are above our ways (Isaiah 55:9). Although His will and timing may seem mysterious from our limited perspective, there are no unanswered prayers. If you’ve prayed, kept the faith and prepared as best you can, you can relax and trust the Lord – completely. Whatever the outcome and wherever life takes you, He’s got this. Things to consider when it’s hard to get pregnant When it comes to getting pregnant, no two people or couples are alike. Your doctor can help you make a plan that is customized for you and your husband. Some things to consider include: Your age when trying to get pregnant Most women begin ovulating as teens when pregnancy chances are high if monthly cycles are regular. Fertility typically peaks in the early 20s, but women can have healthy pregnancies in their 30s and 40s. After age 35, the health and quality of eggs, and overall fertility, tend to decline as a woman approaches menopause – usually around 51 years of age. Most men are fertile into their 60s. Although the fertile seasons of life are relatively short for both men and women, with God all things are possible. (Matthew 19:26). While you’re trying to get pregnant, remember that the author of life, who knew you before you were born (Jeremiah 1:5), is still in charge. Staying healthy improves fertility When you’re trying to get pregnant, smart choices support health, hormonal balance, and regular cycles. Choose a healthy diet, exercise regularly, sleep well and manage stress. Avoid alcohol, tobacco, and drugs. Dietary details matter – from fiber and carbs to correcting nutritional imbalances. Your doctor can suggest ways to improve health and correct imbalances, including vitamins and supplements to prepare for pregnancy.
<urn:uuid:4ca7e441-ace4-41fa-8f93-9b377c350763>
CC-MAIN-2022-33
https://community.chministries.org/blog/why-is-it-so-hard-to-get-pregnant?hsLang=en
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00468.warc.gz
en
0.957284
495
1.8125
2
DEVELOPING AN Effective, Diverse, and Collaborative Health Workforce What is the Center for Interprofessional and Community Health Education? On July 1, 2022, the Center for Interprofessional Health Education (CIHE) joined forces with the Area Health Education Center (AHEC) to establish the Center for Interprofessional and Community Health Education (CICHE), in a true community-campus collaboration to strengthen the development and distribution of an effective, diverse, and collaborative health workforce for the Commonwealth of Kentucky and beyond. Affecting the distribution of health professionals throughout KY Affecting interprofessional team collaboration What Can We Help With? Area Health Education From UK health professions student rotations to mobile simulators, UK AHEC facilitates many operations to serve all Kentucky regions. CICHE and its partners are devoted to facilitating interprofessional education experiences. Check out our center directory and get connected to one of our staff. CICHE Board of Directors The CICHE Board of Directors meets twice annually and is composed of Deans of nine colleges here at UK: - Agriculture, Food and Environment - Communication and Information - Health Sciences - Public Health - Social Work Click HERE to learn more about our Board of Directors Center for Interprofessional Community Health Education On July 1, 2022, the University of Kentucky Area Health Education Center (AHEC) joined forces with the Center for Interprofessional Health Education (CIHE) to establish the Center for Interprofessional and Community Health Education (CICHE), in a true community-campus collaboration to develop an effective, diverse, and collaborative health workforce for the Commonwealth of Kentucky and beyond. Area Health Education Center Through UK AHEC, CICHE is engaged in a collaborative effort with the University of Kentucky, the University of Louisville Health Science Center and eight regional centers to positively affect the distribution of health professionals throughout the Commonwealth of Kentucky. The eight regional centers, or AHECs are strategically located throughout the state. To learn more about the importance of AHECs, please visit the National AHEC Organization Website. Center for Interprofessional Health Education The Center is dedicated to providing leadership and sustaining the infrastructure that enables our students to acquire the critical competencies of interprofessional team-based care. CIHE got its name in 2014 when the University of Kentucky Center for Interprofessional HealthCare Education, Research and Practice decided to focus on the educational implications of interprofessional education. The original center was established on June 14, 2010, by the University of Kentucky Board of Trustees for the explicit purpose of promoting teamwork and excellence in patient- and community-centered care through interprofessional education, research, and practice. Core Competencies of Interprofessional Team-based Care 1) Values / Ethics - Work with individuals of other professions to maintain a climate of mutual respect and shared values 2) Roles/Responsibilities - Use the knowledge of one’s own role and those of other professions to appropriately assess and address the healthcare needs of the patients and populations served 3) Interprofessional Communication - Communicate with patients, families, communities, and other health professionals in a responsive and responsible manner that supports a team approach to the maintenance of health and the treatment of disease. 4) Teams and Teamwork - Apply relationship-building values and the principles of team dynamics to perform effectively in different team roles to plan and deliver patient- and population-centered care that is safe, timely, efficient, effective, and equitable. These competencies are taken from the Interprofessional Education Collaborative's Core Competencies for Interprofessional Collaborative Practice.
<urn:uuid:0077b007-e0a7-4188-980c-e81b5ab5b939>
CC-MAIN-2022-33
https://ciche.uky.edu/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00264.warc.gz
en
0.898041
764
1.945313
2
The objective of this study is to provide a long-term perspective for the ongoing policy dialogue on the management of labor migration in Europe and the Middle East and North Africa (MENA) countries. It is organized as follows. Chapter one puts the report and migration in the context of the economic and social development in MENA countries. Chapter two provides the historical context of MENA migration patterns and an overview of the presence and skill characteristics of migrants in Organization for Economic Co-operation and Development (OECD) countries today. This chapter also discusses the potential for insourcing, that is, migration of jobs into the region as an alternative or complement to labor migration. Chapter three analyzes the demand and supply framework for migration, the determinants of migration patterns, and the potential demand for labor in the European Union (EU), and the characteristics and trends of MENA labor supply. Chapter four looks to the worldwide impact of demographic and labor force developments in the decades ahead and their implications on labor and job mobility. The chapter analyzes the likely population and labor force growth in Europe and MENA, the challenges this growth poses, and the scope for demographic arbitrage between the two regions. This chapter provides the basis for the fifth and concluding chapter. Chapter five covers the institutional setup and the various economic and social protection policies and practices worldwide that have a strong and positive bearing on migration flows and presents a conceptual framework on both the labor and job sending and receiving sides that can be used by policy makers to articulate, defend, and implement a collaborative approach to the challenges ahead.
<urn:uuid:3b6cf3a4-da0b-45c4-b902-ebfea30b24fc>
CC-MAIN-2022-33
https://akb.au.int/handle/AKB/12849
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00466.warc.gz
en
0.931408
312
1.875
2
Texas: Advocates Pessimistic About Needle-Exchange Law January 7, 2011 In the current political climate, Texas harm-reduction proponents believe prospects are poor for passing legislation that would allow needle-exchange programs (NEPs) to operate legally in the state. "Trying to get a bill like this might be a little more difficult," said Randall Ellis, senior director of government relations at Legacy Community Health Services in Houston. "We know the House has shifted to the right. This is traditionally something the far right has been opposed to." In 2009, state Sen. Bob Deuell (R-Greenville) introduced NEP legislation that passed the Senate but died in the House. Deuell, a physician, said he will not introduce similar legislation this year. The Senate would probably approve any favorable NEP legislation the House sent over, he said, though such passage is unlikely. State Rep. Ruth Jones McClendon (D-San Antonio) is sponsoring legislation to allow counties with more than 300,000 residents to operate NEPs, including through local governments or private groups. State drug paraphernalia laws would remain in effect, though the new bill would allow an individual to argue in court that a syringe was obtained lawfully through an NEP. It would be left to local prosecutors to decide whether to press charges. In Houston, Legacy could operate an NEP for about $250,000 each year, according to an estimate by the Access Project, which advocates for NEPs in Texas. Local and private sources, rather than state revenues, would be used to fund the program. "I cannot in good conscience balance the public policy contradiction in waging a concerted effort against illegal drug use while providing the tools used in taking these illegal drugs," said state Sen. Craig Estes (R-Wichita Falls). Gov. Rick Perry "remains opposed to a program that would create an incentive to continue illegal drug use," said his spokesperson, Lucy Nashed. Texas Tribune (Austin) 01.06.2011; Julie Chang This article was provided by CDC National Prevention Information Network. It is a part of the publication CDC HIV/Hepatitis/STD/TB Prevention News Update. Add Your Comment: (Please note: Your name and comment will be public, and may even show up in Internet search results. Be careful when providing personal information! Before adding your comment, please read TheBody.com's Comment Policy.)
<urn:uuid:21821cb4-2f64-4376-bcf0-69ee604fc768>
CC-MAIN-2017-04
http://www.thebody.com/content/art60111.html?ic=4003
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00461-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952657
510
1.695313
2
The old Red House, built by an early Goldendale businessman for his bride, is filled with narrow hallways and tiny stairs. It truly resembles a dollhouse and is Goldendale’s treasured mystery. The Goldendale Observatory is now a part of the Washington State Parks system. From its vantage point on the hills above the city of Goldendale, the telescope gives unobstructed views of the stars. The Presby Mansion, now a museum honoring the history of Klickitat County, was built prior to 1912. Its Victorian design is a shiny example of many homes in Goldendale. Windsurfing on the Columbia River has become a very popular activity and since it is just a few miles from Goldendale, it’s another attraction that draws people to the small community. The Goldendale Library is one of the few libraries in the Northwest which still pay architectural homage to Andrew Carnegie, who put up millions of dollars to build libraries in small frontier communities across the United States.
<urn:uuid:eadb69b3-2e2a-4424-aab6-29d8b8fbb49c>
CC-MAIN-2017-04
http://t.dailysunnews.com/photos/galleries/2013/aug/08/golden-treasures-landmarks-can-be-found-goldendale/?templates=tablet
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00488-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949519
203
1.945313
2
The Vietnam Research Library is located at the Institute of Vietnamese Studies Southern California campus. Established in February 2000, the library provides access to materials about Vietnam. Its regular patrons include teachers, researchers, students and administrators at other teaching institutions. In the near future, the library plans to extend its services by cooperating with other Vietnam Studies libraries in United States as well as around the world. The library is collecting books and manuscripts relating to the earliest period of Vietnam's history. The collection's range extends from the establishment of the country, through the Chinese and French colonial periods, to Vietnam's recent wars and the modern lives of Vietnamese refugees. Văn bản điện tử mới trong tủ sách Sử Showing 5 files from page Sử. Văn bản mới trong tủ sách Ngôn Ngữ Showing 5 files from page Ngôn Ngữ. Văn bản mới trong tủ sách Văn Học Showing 5 files from page Văn Học. Văn bản mới của các thân hữu Showing 3 files from page Thân Hữu.
<urn:uuid:39b3f05c-38d7-4826-92fe-71c84f99dbdb>
CC-MAIN-2017-04
http://www.viethoc.com/viet-hoc-thu-quan-1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00399-ip-10-171-10-70.ec2.internal.warc.gz
en
0.84273
322
1.695313
2
What is activated oxygen? Activated oxygen also known as ozone, or O3 is defined by Merriam-Webster dictionary as: 1. a form of oxygen that is found in a layer high in the earth’s atmosphere. 2. fresh healthy air especially near the sea. Activated oxygen is a three atom oxygen molecule. This three atom molecule is a colorless gas with powerful oxidizing properties, formed from oxygen by electrical discharges or ultraviolet light. It differs from normal oxygen (O2) but over time or with forced filtration, will break back down to normal oxygen (O2) that we breathe. Many become confused over the term ozone. There is good ozone and there is bad ozone. Most commonly used is bad ozone which is linked to high ozone alerts or smog alerts in certain areas of the world. This kind of ozone is mixed with toxic gases that can be breathed in. Good ozone is found in our upper atmosphere or you may smell the essence of ozone after a thunderstorm. Activated oxygen (ozone) is known as one of the best and most effective means to natural disinfection. This process is commonly used in array of applications such as public water filtration, fruit and vegetable handling, hotel housekeeping, and hospital disinfection. Please see common FAQs to learn more about activated oxygen (ozone) or see activated oxygen in SoClean to learn how the SoClean safely disinfects your CPAP equipment.
<urn:uuid:122f0f57-f836-4f5a-a391-3b04978e81d6>
CC-MAIN-2017-04
https://www.soclean.com/sleep-talk/documentation/activated-oxygen/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00547-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946036
301
4.03125
4
Ensure That You Have A Great Halloween Posted on October 25, 2011 With Halloween just around the corner, Bedfordshire Police has launched a series of posters to remind parents, guardians and youngsters to stay safe during the festivities. The four posters – which can be downloaded from the bottom of this page offer hints and tips to 'Trick or Treaters' as well reminding people that not everyone enjoys Halloween as much as others. There are also posters for shop owners to place in their windows advising that eggs and flour will be sold at their discretion as well as a poster for residents who may not want callers at their door. Officers have already been to schools around Bedfordshire to hand out posters and it is hoped that the campaign will ensure that all residents enjoy October 31 without causing distress to those who do not want to participate. Head of Community Safety for the force, Police Inspector Alex House, said: "During Halloween some people, particularly the elderly and vulnerable, can find it very frightening to have large groups unexpectedly calling at their homes asking for treats. "If possible, parents and guardians should go out trick or treating with their children, sticking to well-lit areas and only knocking on the doors of people they know. Some people may have 'No trick or treat' posters up at their doors and we ask that these are respected. "We don't want to spoil anyone's fun, we simply want to ensure people have a safe and enjoyable Halloween." During this time of year, the police take many extra complaints about Halloween-related activities. Some of these are about noise or general "high spirits" – but often the fun has degenerated into serious inconvenience and outright criminal activity. Activities such as throwing eggs, flour and water bombs at other people or their property are, at the least, frightening for those who are subjected to it and at worst can mean the police investigating crimes such as assault. Coupled with the onset of Bonfire night, Halloween can also mean extra problems with fireworks being thrown or used irresponsibly. It's worth bearing in mind that letting off fireworks near the road is actually a criminal offence. To help reduce these types of incidents Bedfordshire Police will have a number of extra patrols in operation across the county to make sure that everyone has a good time whilst staying safe. - Sorry No Trick, No Treat, No Thanks - Your idea of fun might not be someone else's - During Halloween, eggs and flour will be sold at our discretion - Have fun and stay safe this halloween Source: Ringmaster, Bedfordshire Comment on This Article: All HTML, except <i>, <b>, <u> will require your comment to be moderated before it is publicly displayed. If you would like your own avatar displayed, read about comment avatars.
<urn:uuid:a850cb77-b4f9-4658-8e7b-9a494771a9a2>
CC-MAIN-2022-33
https://eatonbray.com/news/2011/10/ensure-that-you-have-great-halloween
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00667.warc.gz
en
0.971757
578
1.882813
2
Music Reading Primer includes 101 pages, and 50 lessons alternating with pitches in only quarter notes, and rhythms only on an open string. The lessons range in difficulty from barely beginning reading to the notes on all four strings in first position, including accidentals and at least five keys, (but no key signatures); and in the rhythms, from just quarters to wonderfully challenging compound and complex rhythms. The reading student will delight at the snatches of familiar tunes (folk songs, primary, spirituals, Americana, Suzuki, etc.) woven into the lessons as little hidden treasures, but never with all correct notes or rhythms, so the student is not able to shift into “by ear” gear, but must read. Teachers will appreciate the repetitive drilling and review of important skills in reading; for instance, after a tie over the bar line is learned, there is one in every lesson thereafter.
<urn:uuid:54b6140a-64c1-47b1-b7a9-06878f586863>
CC-MAIN-2022-33
https://www.sheetmusicauthority.com/product/i-love-to-read-music-music-reading-primer-cello-bass/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00669.warc.gz
en
0.928442
183
3.1875
3
Middle School Tech Apps, Grade 6 When it comes to technology, there is a lot to learn, and sometimes it’s hard to get a digital foothold. In this course, you will be introduced to some of the most important technological topics to place you on the path to well-rounded understanding. You will learn about your digital footprint, netiquette, and how to stay safe online. You will improve your typing, file management and organization skills as well as your knowledge of software programs. You will also learn about trends, coding, blogs and websites, photo and video software, and more! It’s time to go digital!
<urn:uuid:0b8dbcaf-82c3-4b47-81cc-3938a257e236>
CC-MAIN-2022-33
https://edynamiclearning.com/course/middle-school-tech-apps-grade-6-1a-introduction/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00074.warc.gz
en
0.941219
130
2.921875
3
|Printable version||E-mail this to a friend| BCS computing teacher training scholarships - now open for applications Applications are now open for computing scholarships. For the fifth year running, BCS, The Chartered Institute for IT is managing the scholarship scheme to attract trainee computing teachers. Administered by the Institute on behalf of the Department for Education, the scheme aims to help meet the growing need for computing teachers. Scholarships - each worth £25,000 - will be available this year to find the very best potential trainee computing teachers. Bill Mitchell, Director of Education at BCS says: “We are delighted the scholarship scheme is running again this year and are pleased to have the support of a number of leading industry partners who are as passionate as we are about ensuring we attract the very best people to become computing teachers. The number of high profile employers who continue to pledge their support for the scheme is also very pleasing. Over the last four years we’ve had a good mix of people applying for scholarships including a number of career changers.” The scheme once again has the support of major industry names including Microsoft, IBM, BT, Google, Metaswitch Networks, Compare the Market, HP, Toshiba, Ocado Goldman Sachs, Citrix and Morgan Stanley. Employees from these organisations help to evaluate candidates and identify high calibre computing teachers potentially capable of leading technology education in schools. Simon Holden, Managing Director from Morgan Stanley says: “The scholarships are vital in terms of ensuring we have excellent computing teachers in every school in the country. The trainee teachers who are awarded a scholarship will help to give our children the best possible chance of becoming the next generation of pioneering inventors and entrepreneurs in computing.” Launched in 2013 in partnership with the Department for Education, the scholarship scheme aims to encourage more people into teaching computing. The scheme is open to eligible applicants who start their teacher training in September 2016. To date, the scheme has proved a great success with more than 1000 applications over the four years it has been running. A total of 244 people have so far been awarded scholarships and the Institute has worked with over 130 schools and 17 employers who supported the scheme. Full details of the criteria including how apply for a scholarship can be found at: www.bcs.org/teachingscholarships Scholarships are only available to those taking their teacher training in England. The scheme will be run in conjunction with the National College for Teaching and Leadership on behalf of the Department for Education Latest News from BCS announces CITP agreement with IBM11/01/2017 14:15:00 BCS, The Chartered Institute for IT has signed a new agreement with IBM. The agreement sees the IBM professional certifications awarded to its IT Architects and IT Specialists recognised towards the award of Chartered IT Professional (CITP) status. BCS signs CITP agreement with Swedish Computer Society05/01/2017 14:10:00 BCS, The Chartered Institute for IT has signed an agreement with Dataföreningen i Sverige (The Swedish Computer Society, SCS) licencing the Society to award Chartered IT Professional (CITP) status to its members. BCS supports major initiative to improve diversity and inclusion in science and engineering16/12/2016 13:12:00 The science and engineering professions are taking a big step forward to improve diversity and inclusion across science, technology, engineering and maths (STEM) careers. Female tech representation yet to achieve lift off, new report shows13/12/2016 15:15:00 2016 Women in IT Scorecard published by BCS and Tech Partnership
<urn:uuid:de4e00eb-7a90-47e4-80f7-4d34db64d540>
CC-MAIN-2017-04
http://www.wired-gov.net/wg/news.nsf/articles/BCS+computing+teacher+training+scholarships+now+open+for+applications+23062016112000?open
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00433-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943462
763
1.601563
2
Baja California Sur has fascinated memories which created tradition and customs to give identity to its people. As an initiative to persevere the history of Los Cabos, Yenekamu was born. A civil association which seeks to share the origin and roots of this land through emblematic places which contributed to the development and cultural growth of Los Cabos, especially in the Cabo San Lucas area. Inside this you’ll find Faro Viejo, a beautiful monument in Cabo Falso inaugurated on May, 5 1995 and that for many years’ witness boats that sailed through sudcalifornian waters to every part of the world. Yenekamu seeks to transmit a feeling of belonging in its people, especially in Los Cabos through knowledge, rescuing and spreading the historic, cultural, and natural heritage of the region. In words of the president of the association, Felipe de Jesus Marron Rosas: “for us to be able to love, respect and take care of Los Cabos, first we need to know it. That is why, it is important to acknowledge what we have and what we can enjoy as cabeños, to feel proud and show it with dignity to travelers. You don’t love what you don’t know.” Keeping alive this legacy is the first step to make this paradise not a place, but a home. For more information, please contact: firstname.lastname@example.org
<urn:uuid:908f715e-e206-4666-934d-560581157f63>
CC-MAIN-2022-33
https://tendenciaelartedeviajar.com/en/2021/02/tendencia-en/yenekamu-keeping-sudcalifornian-roots-alive/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00072.warc.gz
en
0.931071
309
1.671875
2
Recent Patents on Drugs Addressing Neurodegenerative Diseases Manuel Van Gijsel-Bonnello, Michel Khrestchatisky, Max de Reggi and Bouchra Gharib Affiliation: NICN, UMR CNRS 7259, Faculty of Medicine, Aix-Marseille Univ., 15 Blvd Pierre Dramard, 13015 Marseille, France. Considerable evidence gained in the past decade has supported a better understanding and management of neurodegenerative diseases, in the face of the continuous increase of their prevalence in the world. Inflammation, mitochondrial dysfunction and oxidative stress are now recognized to be hallmarks of all neurological disorders. Along with therapies targeting these features, new therapeutic strategies are emerging, based on microRNA, vaccination, generation and graft of neurons, as well as therapies based on multifaceted drugs. Are also taken into account vectors designed to deliver large molecule pharmaceuticals or genes across the blood-brain barrier. Current treatments are mainly symptomatic, therefore it is hoped that therapies based on patents described in the present review will lead to really curative treatments. Keywords: Neurodegenerative diseases, new therapeutic strategies, patents, therapy, experimental autoimmune encephalomyelitis, neuroinflammation, infiltrating leukocytes, Cholinesterase inhibitors, Growth factor-like proteins, Cannabinoid receptors, MITOCHONDRIAL DYSFUNCTION, Pyrimidine nucleotide precursor Rights & PermissionsPrintExport
<urn:uuid:3363a548-fc85-4694-a682-9b2b5330fd26>
CC-MAIN-2016-44
http://www.eurekaselect.com/105708/article
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00417-ip-10-171-6-4.ec2.internal.warc.gz
en
0.857972
319
1.523438
2
Dr. Jason Oliver Chang is Associate Professor of History, as well as Asian and Asian American Studies at the University of Connecticut. We use Dr. Chang's zine “Unmasking Yellow Peril” (co-written with Turner Willman and the group 18 Million Rising) as a jumping-off point for discussing the history and present of exclusion, discrimination, and violence against Asian Americans, as well as the field of Asian American Studies more generally. In this time of rising anti-Asian rhetoric and violence, many have looked for educational resources. As Dr. Chang tells us, the lack of familiarity with this history is itself a familiar dynamic because of the “perpetual foreigner” stereotype, which leaves out Asian Americans from the American story. For Dr. Chang, Asian American Studies isn’t only about adding another lost chapter to history, but also about interrogating how our “common sense” historical narratives depend on the absence of certain stories. We also discuss Dr. Chang’s 2017 book Chino: Anti-Chinese Racism in Mexico 1880-1940 as well as his support for a recent push to get Asian American Studies in Connecticut public schools. A similar effort is currently underway here in Illinois. You can download the zine Unmasking Yellow Peril for free or pick up a copy from the Deerfield Public Library’s Podcast Collection shelf. You can also find Asian America: A Primary Source Reader (co-edited by Dr. Chang) in our collection, as well as many other resources here at the Library. Dr. Chang can be found @chinotronic on Twitter.
<urn:uuid:9b9eadfb-2cb0-4fbb-b42a-57aa2725c156>
CC-MAIN-2022-33
https://deerfieldlibrary.libsyn.com/podcast/2021/04
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz
en
0.943275
335
1.765625
2